Tim Cushing pushing for ROGS' Gary Webb award for excellence in gang stalking journalism?

Of all the ways that ROGS blog-the blog you are reading right now-has changed the discussion about organized gang stalking, I think that my Gary Webb Award for Excellence in journalism is probably my best contribution.
That award carries a one thousand dollar stipend, and the winner also gets a golden trophy of a pigs trough with the bottom chewed out, with two golden .22 caliber bullets dangling above it. I will let the awardee contemplate the design of the award for themselves, but note that Gary Webb reported one of the best series in the history of journalism, won a Pullitzer Prize, and then, got gang stalked to death.

Related Story: What does a blog post written in a free WordPress blog look like when the blog is being tampered with, in real time, by an Infragard member, a Fusion Center, or any of many NSA/Alohabet agency speech suppression tools and tactics? see this post here, where I attempted to link the QaNON “conspiracy theory” to a SWAT team member who greeted the vice president wearing a Qanon patch.
1211118-11-20181201140953

That award is offered for any journalist who can use the term “organized gang stalking” appropriately when discussing this issue.
And, Tim Cushing, of the worlds premiere technology blog, Techdirt.com comes awfully close in this article below, but-not close enough to be a contender YET.
And, lesser journalists are starting to step up to the plate to take a swing at that award, as we see with the reportage in another MSM piece that reported on the organized gang stalking of tech guru John McAffee, the worlds first inventor of anti-virus software.
Well, heres another excellent puece by Cushing, covering due process free and BIZARRE police activity, as they stalk, harass, and spy on people in Boston, MA, which has some of the most deeply entrenched Catholic and neocon racism and hidden theocracy in America:
Lawsuit: Boston PD’s ‘Gang Database’ Says People Who Wear Nikes And Have Been Beat Up By Gang Members Are ‘Gang Associates’
from the guilty-until-negatives-proven dept
The Chinese government uses a number of measures to keep tabs on citizens. One is what’s known as a “citizen score” — a compilation of all the good/bad habits the government can track that determines whether a person should be viewed as a contributor to society or someone the government should take out of circulation.
We do the same thing here in the US. Credit scores determine who gets to live where and what vehicle they can own. It also can affect employment opportunities. This version of a “citizen score” is compiled by private parties who have access to information Americans are given no choice in relinquishing.
But the government also uses point-based systems to determine what kind of citizen you are: one of the good OK guys or possible a menace II to society. The ACLU is currently suing the Boston Police Department over its ad hoc “citizen score.” The BPD adds and subtracts points to add and (possibly?) subtract people from its “gang database.” Things citizens actively do — and even things they passively don’t — can put them on this watchlist.
From the ACLU’s public records lawsuit [PDF]:
Under the point system, a person is designated as a “Gang Associate” if he is assessed six or more points, and a “Gang Member” if he is assessed ten or more points. See Exhibit A, Boston Police Department Rules and Procedures Rule 335.
The point system makes it possible to designate someone a Gang Associate or Gang Member without any allegation that he engaged in violence or criminal activity.
An individual may be assessed eight points for being the victim of gang-related violence.
Yes, you read that right: Boston residents magically become “Gang Associates” if they’re shot at by gang members. Or carjacked. Or mugged. If this happens twice, it appears they’ll be upgraded to “Gang Member” thanks to their inability to avoid being victimized by gang members.

Michael Chadwick Fry, Sheriff Tracy Murphree,and claims of brainwashing: I invite Mr. Frys public defender to contact me ASAP, for a ROGS BINGO card: gang stalking case study

Dear future Texas public defender of Michael Chadwick Fry: please contact me here at the ROGS blog, because you will need the free ROGS Bingo card to understand your case.
1536180580800
Your defendant claims that he was brainwashed, and, semantics aside, I believe him.
Your client has named some names, and he encountered odd things after witnessing a deputy involved homicide of hs friend, and your client has also named some names that in themselves have an interesting history in that area.
I would focus in on the Sheriffs department media spokesperson too, because Fry (apparently) named him prominently on his flyers, and that person has an interesting academic history. I can testify with unimpeachable evidence that I have encountered these same types acting in undercover capacity to skirt the law.
And as we see in nearly ALL cases where claims of of mind control and influence operations, or gang stalking operations are presented, so we see that Fry was attempting to garner media attention to an attemp to frame him somehow, and even states that he was the intended target of an institutional homicide.

Related Story: Nearly all major mass shooter events, and other “odd”cases like this reveal that these men and boys partcipated in alternative media and counter-narrative.
We ALSO see that alleged shooters are frequently “on police radar” for years and years as they are stalked inline and off, but ALSO that many-ranging from Omar Mateen whose father was an FBI informant and also had an alternative news show, to Mathew Riehl who used Facebook, and many more were in fact, stalked by local, state and federal poluce but ALSO that their web pages are webscrubbed after their events, often at the direct request of Israel.

And while these claims initially look like classic “delusions,” I urge you to bear with me, as I am prepared to offer you free assistance to understand his claims, and also, organized gang stalking~and please, read this article first, about a media hoax in your area that attempts to discredit people who claim they are under an influence operation.
You see: your client has all the signs and symptoms of being what is colloquially called a “targeted individual of organized gang stalking”and the “symptoms”likely appeared just AFTER witnessing the homicide of his friend, just AFTER he was railroaded multiple times, and spending many months in jail, held for aggregious amounts of time in jails-but apparently NEVER found guilty of crimes.
you might like to know that Dr.Otto Dorr Zoeggers discusses such things in context to torture here and correlates that with what can be descrubed as mind control.
All of that, good defender, is already a full ROGS BINGO, but wait! Theres much more…..

https://answers.yahoo.com/question/index?qid=20090209123524AAPoDtb
http://www.paganlibrary.com/introductory/witchcraft-some_answers.php
https://www.sheriffstx.org/county_map/county/2584
https://m.washingtontimes.com/news/2018/feb/28/tracy-murphree-texas-sheriff-deputies-we-do-not-ta/
https://www.angelo.edu/dept/english_modern_languages/alumni_spotlight.php

‘Wake Up America’: TX Sheriff Rants On Terror After UK Attack

Manufacturing terrorism suspects, fake web pages, and informants using lots of rope in darkness: modern lynching online and CVE programs

Whether the target is a Muslim, a Mormon cattle rancher, a black activist, or a poor white kid like William Atchison who get stalked online and then offline by agents provocateurs, aka DHS/FBI/DIA/private contractor/NGO/foreign spy outfit unspecified, informants, a few patterns stand out in the data:
UNDERCOVER FBI AGENTS SWARM THE INTERNET SEEKING CONTACT WITH “TERRORISTS”who they then profile via behavioral analysts, psycholigical operations, and then endlessly monitor their speech online and off, in concert with HUNDREDS of agencies, and using NSA data.
The FBI’s online activities are so pervasive that the bureau sometimes finds itself investigating its own people.

Almost all targets of provocation are male.
All targets of provocations are ensnared online, and followed, monitored and more offline for using words~aka pure first amendment protected speech~sometimes for decades since the NSA dumped hay all over needles in a theretofore previously non-existent “haystack.”
All targets of provocateurs have long term contact with people working under the counter-terrorism rubtrik, or so calked community policing, who seek to INFLUENCE the speaker, from hidden or occulted positions online and off (for instance, social workers, college, or DV type “counselors” target and track individuals, usi.g multiple databases, and share information about their targets with police)
All targets of these hidden programs are manipulated in “directed conversations”which is well documented in the online TI community,and this unrecorded anywhere.
All targets are manipulated, and frequently their most base impulses to food, clothing and shelter~indeed, their base drives, what Freud called libido~are used as tools to manipulate them, and much more, as we saw with the Tsaernev family being targeted for a decade BEFORE the Boston bombing, as well as in the cases of the Seattle Somalis employment and travel being stifled by federal agents, hearsay, and policy (not law.)
In any study of what is colloquially called mind control, and stemming from Nazi/US/British styled torture, or the well documented MKULTRA and its companions Monarch, Bluebird, Phoenix, Gladio-all of these used base drives as ways to manipulate subjects and targets.
And, all base drives, stationed a man, or a woman in the middle to impede or encourage the target toward one or another behavioral goal. So, any study of targeted individuals must account for ling term state/federal ibstruction of base drives, and achievements.
Related Story: Niftygerbil, Niftychinchilla, and other Nifty names for Tor nodes, courtesy of the same geniuses who gave the world Monarch and Bluebird.
So, we see now, the entire organized gang stalking dialectic mirrors the ACTUAL complaints of targeted individuals. Refer to the ROGS BINGO card at the top of this blog for comparison.
So, OGS is far from a delusional complaint, and rather,indicative of manufactured terrorisms un Constitutional basis, and the occulted use of informants whose work in online terror/criminal/other incitement is undocumented by design-a totally unchecked use of actual psychological operations-agents provocateurs actions are not on the record, or in courtroom documents either.
So, in the very least, these online influence and psyops using unchecked, unregulated, hidden, occulted and obscured methods, repeated over time, do indeed form, as the good doctor Lorraine Sheridan has noted~a closed echo chamber, echo chamber, where words themselves are the primary targets, as are the individuals who use the words- they are literally under close monitoring every time a banned word hits Google/Wordpress/Twitter, etc.
Here from NBC News is a story about how the FBI uses informants online and on social media in occulted fashion to police pure speech, and then, to target individuals:
https://www.nbcnews.com/storyline/isis-terror/no-lol-matter-fbi-trolls-social-media-would-be-jihadis-n226841s
And here is a bit more about that from the Intercepts Cora Courier in 2017: ghttps://theintercept.com/2017/01/31/undercover-fbi-agents-swarm-the-internet-seeking-contact-with-terrorists/
“”According to the guie, an online counterterrorism investigation can target websites or online networks that the FBI believes terrorists are using “to encourage and recruit members” or to spread propaganda. Such probes may extend to the administrators or creators of those forums, as well as people engaged in “the development of communications security practices” or “acting as ‘virtual couriers’ for terrorist organizations by passing online messages among members or leadership.”
The guide classes as online investigations those that rely primarily on online informants or undercover employees, and those that involve surveilling internet facilities or foreign websites hosted on U.S. servers. The FBI often runs such operations jointly with other U.S. intelligence agencies or “international partners,” according to the document.
Since 2008, the Counterterrorism Division has coordinated these operations under a program called the Net Talon National Initiative. Net Talon uses informants, linguists, and FBI employees working undercover, posing as ordinary internet users, to zero in on terrorists’ use of the internet, according to the guide. The initiative was meant to centralize expertise on particular targets and platforms, to “address intelligence gaps,” and to create a clearinghouse of the intelligence the bureau has collected on terrorists’ use of the internet.
The FBI’s online activities are apparently pervasive and uncoordinated enough to lead to confusion. The document refers to “resources being wasted by investigating or collecting on FBI online identities,” including undercover employees, informants, or people who have already been investigated by other offices or agencies. An FBI official told the Intercept, “You would be in a forum, and you’re like, ‘This person’s way out there,’ and we’ve gone and opened up a case, and sometimes that was a local police department, or a friendly foreign service. There are still instances of that, and deconfliction is still necessary.”
Khurrum Wahid and Joshua Dratel, defense attorneys for Ahmed Omar Abu Ali, answer questions from the media after Abu Ali was sentenced on March 29, 2006, at a federal court in Alexandria, Va. Photo: Alex Wong/Getty Images
THE COUNTERTERRORISM POLICY GUIDE shows just how much flexibility informants and undercover agents have when operating online, even when they’re not working specific targets. The FBI insists that there is nothing to see here: In statements provided to The Intercept, the FBI said that “while there are obvious differences between online and offline environments,” FBI employees and informants working on the internet are subject to the same rules, and that bureau employees can only monitor people’s online activity as part of an authorized investigation.
The guide, however, suggests that the internet offers areas of ambiguity. Much comes down to the questions of what informants can do, as opposed to FBI employees, and whether the goal of an operation should be construed as seeking to obtain specific intelligence, simply watching public websites, or developing a profile for an undercover identity.
For instance, the guide states that an FBI employee can visit a message forum or blog only when the site is relevant to an investigation. An FBI employee, according to the guide, could be an undercover agent or an “online covert employee,” a term that presumably refers to FBI workers other than agents, like analysts. FBI employees can’t chat online with someone who isn’t already the subject of an investigation for the purposes of gathering intelligence on that person. They can, however, “engage in unlimited communication with associates” of a person under investigation, if the conversations are relevant to the investigation.
Informants and undercover FBI employees are also allowed to do a great deal online in the name of “building bona fides,” such as creating fake identities or making themselves appear to be normal commenters on online fora. The guide says that in order to establish credibility, FBI employees “may make postings and communicate with individuals who are neither the subjects nor the associates of subjects … there is no limitation with respect to the amount of communication [they] may initiate in this regard.”
And the FBI is allowed to open new investigations on people it identifies through “passive monitoring or active communication” on websites.
An FBI spokesperson clarified that in order for an undercover or covert employee to monitor a website or forum, the site must already be associated with an investigation, “either because the forum was known to be used by a subject [of an investigation], or because the subjects are there. I can’t be in the forum trying to bait you into conversation.”
However, the FBI acknowledges that when its employees participate in online fora, they interact with people who may be bystanders to whatever activity led the bureau there in the first place. And that is not accidental. “We want to know if the subject has other people who are joining in, which people are part of the activity, and who is just there,” a spokesperson explained.
In other words, FBI agents can post and chat online with people who have nothing to do with an investigation, so long as they aren’t collecting intelligence — but in the course of those online communications, they can decide to start investigating someone.
Michael German, a former FBI agent who is now with the Brennan Center for Justice at New York University Law School, said that agents have always had a little bit of wiggle room in this regard. They can have a certain number of in-person meetings with someone, or in some circumstances go to public meetings or public websites, without identifying themselves as part of the FBI. This helps agents avoid a bureaucratic mess when carrying out a simple “buy and bust” drug sting, for example, German said.
But the ability to conduct unlimited online conversations in the name of building bona fides gives agents “a pretty long rope,” German said.
Criminal defense attorney Khurrum Wahid, who has handled or been an adviser on many national security cases, notes that FBI employees or informants frequently pose as experts offering guidance to lost individuals.
“These uninformed young people go online and become almost smitten with people who show a level of knowledge, who often turn out to be informants or undercovers,” said Wahid.
Informants operate under looser rules than FBI personnel. They are allowed unlimited engagement with a target in the course of an “assessment,” a preliminary investigation that can be opened on a loose tip of suspicious behavior, in order to collect general intelligence on a subject, or to evaluate a potential new informant. Assessments were created as a category in 2008. German finds their allowance for the expansive use of informants problematic.
“What we’ve seen in sting operations is that there is this shady portion before the official operation begins which often involves the informant,” said German. “And then it’s passed off to an agent, and it looks like they are ready to commit a crime pretty quickly.”
Wahid noted that at least in online cases, there are generally logs of all the conversations between suspect and informant, whereas “when it’s a live informant, they can turn off the recorder and we never know what it was all about.”
The use of informants in counterterrorism sting operations has expanded since the 9/11 attacks, when the FBI adopted the mantra that its job is to stop terror attacks before they occur, not just investigate them afterward. The government argues that the anonymity the internet affords to suspects necessitates an aggressive approach, including stings. The FBI’s national security director told the New York Times this summer that “using undercover agents online allowed the FBI to ‘flesh out’ suspects by gaining their trust and persuading them to disclose their real identities.” In some cases, the FBI even created fake webpages in order to draw in suspects.
“Agencies are under a lot of pressure to find a needle in a haystack, something that has haunted us since the beginning of the war on terror,” said Karen Greenberg, director of the Center on National Security at Fordham Law School. “It’s true that the internet has changed everything about how we communicate, but are we just going to be trawling online forever? It turns the principles of criminal investigation on their head.””

WA Fusion Center, limited hangouts, disinformatio, misinformation, mind control documents.

Mr X:
The WA state Fusion Center mind control docs are what is called a limited hangout in intelligence circles. The LH is designed to taint a dialogue, or misguide you, but in themselves reveal the cavalier attitude of these domestic spies.
The images widely circulated from raven1.net are among many that were used by one Eleanor White, a self described whistle blower.
She reigned as the go to disinformation specialist about a topic called gang stalking, between 2001- and 2011. White claimed that she was slandered as a pedophile everywhere she went, but in reality, was likely part of the pre-Fusion center deep state, a likely courier for illegally intercepted communications, and the defamation campaigs that followed.
These materials are used to discredit people who psychologists then label as delusional. But as we see, they also nearly and completely describe how the NSA trickles data to state and federal agencies, who then use Fusion Centers, so called community policing elements, and more to monitor activists and dissidents, via real time cell phone tracking, computers, ALPRs, BOLOs, and more, frequently utilizing plainly bizarre methods.
I also wish to inform you that I have been tracked since 2001, by many agencies across America, for many reasons not least of which is that [REDACTED] also wrote the Lewinsky defense, and represented Cheney during the Scooter Libby, Valerie Plame affair; And, a few other things.
I appreciate [REDACTED] FOIA release from the Fusion Center, but also wish to inform you that there are other questions to ask in these cases, because those documents are designed to discredit any who take them too seriously.
The good news is that the real questions that should be asked are easy, once you know where to look.
For instance~regardless of your political stance on gun control~ask about Fusion Centers monitoring activists, and people in alternative media, or even Facebook.
So, black activists, and mass shooters are a great place to start with mind control. Fusion Centers monitor these guys relentlessly, and mercilessly, via phone, computer, ALPRs, and BOLOs.
To understand the mind part, separate it from the control part, outside of due process, and constituting what could arguably be called unusual punishments.
Then, understand it like this: the FVEY nations
cooperate to target and harass each others activists. A great example is a boy named William Atchison, who shot two kids in a NM school, and who was killed by SWAT.
In his case, he was contacted online by British intel, who waged Gamergate across the globe, and also on American citizens, outside the law, and likely in violation of international treaties.
Then, they passed the “anonymous” tip to FBI, who then waged community policing on the boy.
FBI contacted the kid~who never owned a gun in his life~and then FBI CVE kicked in, meaning the kid was frequently followed online and off, by any of many domestic spy/intel/Rotary clubbers/VFW members/etc organizations attempting to “conform him” and these take on plainly bizarre online and offline stalking proportions.
Only after this, did the boy buy a gun, and this we see in case after case after case. Then, the boy goes ballistic, after being isolated and terrorized by literal hidden and actual armies of psychological operations specialists, for WORDS he expressed online.
So, in that one case alone, you can find evidence that what I say above is true, if you learn to ask the right questions.
How many calls went to which Fusion Centers, about What, When, and Why about this one boy, william Atchison. Were ALPRs reporting his license plate every time he drove, and were satellites literally tracking and recording his every move? Which police departments/school officers pinged his computer or cell phone~or did bad stuff like redirect his internet switch?
Did his computer have electronic implants, aka, coded applications that did/do as yet described things/wiretapped/ monitored and utilized key stroke logging?
Etc.
But taken as a whole, the boy was without a doubt, surrounded by influencers, and others who aided, coerced, and manipulated his choices from his first contact online with British intel, who flagged him during Gamergate.
First, they came for the kid online who said bad words (and those words decided by religious theocrats, and others)~then, they came for the mass shooter after they, working internationally, from sectarian religious basis, occulted pisitions along the internet backbone, and in violation of due process, civil rights, and treaties, bullied him mercillessly, via electronic platforms online, commmunity policing offline, and CVE provocateurs.
I hope this can help point you in the right direction.
I can be contacted here, if you wish more details.
Best Regards,
ROGS (my obvious nym)

Washington State, mind control documents, Fusion Center spying, police state bloggers, and GOD BLESS TECHDIRT.COM

DHS Fusion Center Gets Request For Documents On Extremists, Decides To Hand Over Mind Control Docs Instead
from the here’s-the-thing-you-didn’t-ask-for-but-will-probably-enjoy-reading dept

What  is  24-7 monitoring  of targeted  activists,  dissidents,  journalists, and  other  targeted individuals? Fusion Center  spying, the bizarre  quasi-Constitutional DHS/ICE/HSI  methods of secret policing, and the  NSA-Israel-FVEY data  theft  is de facto total  spectrum monitoring and  psycholigical  operations, aka mind  control,  by any  other name.

By  Tim  Cushing, of  Techdirt.com
Once you release a document to a public records requesters, it’s a public record, whether you meant to release it or not. The person handling FOIA requests for the Washington State Fusion Center (a DHS/local law enforcement collaboration known more for its failures than successes) sent Curtis Waltman something unexpected back in April. Waltman asked the Fusion Center for records pertaining to Antifa and white supremacy groups. He did get those records. But he also got something titled “EM effects on human body.zip.”
Instead of intel and assessments on local Antifa/white supremacists, Waltman found things like this:
And this:
The files did not appear to have been generated by any government agency, but rather collected from other sources who thought there might be some way the government could control minds using electronic stimulation or “remote brain mapping.” Why the Fusion Center had them on hand remains a mystery, as does their attachment to a FOIA request containing nothing about electronic mind manipulation.
This inadvertent disclosure has led to more requests for the same documents. Only this time, requesters — like Joshua Eaton of ThinkProgress — are asking specifically for government mind control files.
It appears the Fusion Center first thought about withholding some mind control docs, but somewhere along the line decided it couldn’t pretend the documents that weren’t supposed to be released hadn’t actually been released.
An email chain in the release [PDF] to Eaton contains an apology from the staffer who accidentally sent Waltman the mind control files.
Good afternoon Gretchen,
First of all I want to apologize the same way I apologize with my supervisor Lt Boyle and [redacted] I do not like to give excuses but I really sent this without intention when it was not responsive. I sent the original email to [redacted] with the attachments. I will try not make more mistakes…. Now, because of my error MuckRock sent another PDR. Sorry again for the situation and have great afternoon…
Gretchen (the Public Records Officer for the Washington State Police) tells the staffer not to worry about it. Apparently, sending the wrong files to requesters happens frequently, but otherwise, everyone is doing a great job, including the person who sent mind control files with a batch of extremist docs.
But that apology and forgiveness is preceded by the same staffer asking for another review of documents she already released to another requester, possibly in hopes of denying this release.
Erik,
[redacted] told me if you could review this. Mudrock is claiming that DHS did created this. I think I was not supposed to release this but it was public.
Can you help me what can I tell my Public Disclosure coordinator?
Sorry for the inconvenience
No response from Erik is included in the document so one assumes the release went ahead without his additional input. Now this requester has a copy of this email chain, something pulled from an internet “mind control forum,” and, inexplicably, the KKK documents released to Waltman in response to his FOIA request.
So, if you’re looking to obtain public records but don’t particularly care what records you receive, it appears the Washington State Fusion Center is a great place to try your luck.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

The un-naming of a man: Gang stalking, bizarre claims, chemicals, poisons, delusions, and the DHS- man dies, first responders sickened from chemical poisoning in DeKalb County Georgia GA motel room.

As  we  see  time  and  time  again, gang  stalking victims frequently  report bizarre encounters with people  online  and  off  who  threaten  them  with poisons,  chemicals,  and  fear  or  anxiety about being  murdered by  gang  stalkers.

UPDATE 11-07-2019:This post you are reading is very popular lately, after James Douglass Lark apparently blew himself up last week , while under FBI and GBI surveillance in Dekalb County Georgia, under mysterious -even bizarre circumstances.
ROGS suspects that this was a K 4 rated gang stalking gone bad (or good, considering that the goal of police /FBI/ intel agency stalking is to force a person into an institution, prison, or to commit suicide, which is what Lark apparently did, for some reason )
UPDATE: The un-named man has now been named.He was Frances Wilkes, 47, of Stone Mountain Georgia.
BODY IDENTIFIED IN HOTEL ROOM THAT SICKENED THREE DEKALB OFFICERS
The cause of death for Frances Wilkes has not been released.

Related  Story: Yeah- silence THIS: how internet forum boards are attacked by gang stalking denialists, and not  so subtle  threats of  being  poisoned. This is one  example  from  my  own,  PERSONALIZED,  targeted  experience online.
Here  is  a  case  where  actual  intelligence  agents, from  the  US border  patrol  and the  DHS are  alleged to  utilize bizarre  psychological  and  other  harassment  on  a  whistle  blower, including  mystery  poisoning:  Delusions, poison, bizarre claims, and schizophrenic narrative in gang stalking: the case of DHS whistle blower Julia Davis
And,  the  Russians,  of course, are  suspected  of  poisoning  dissenters and detractors in  Britain, which  is  widely  documented  all  over  the  MSM.
And  the  Las  Vegas  shooter Stephen  Paddock was  said to be so delusional, that  he  kept  a  gas mask  handy, with  fears of being   poisoned.
SO:
How  bizarre is  modern gray  area,  due process-free  policing  that utilizes  intelligence  operations on  ordinary  Joe Blows who  said  something online,  and  then,  were stalked,  harassed, framed,  and  worse by  operatives  who  sit  on  the  internet  backbone  in  Toronto  Canada,  or  San  Diego,  CA?
Or  at Los  Angeles  JRIC which uses miltary grade surveillance gear to target people they do not like, , or  who  are  affiliated  with  Princess Megumi,  from  the Masonic  Capital  of California, whose  relative  just  happens  to  be the  deputy  sherrif  in  those  parts? Bacon  bits,  and  blowflies-or  flying  pig-cow  hybrids  in  fishnet  stalkings  and high heels?
I ask  you, the  reader, to decide  how  bizarre claims  of  poison  are  in  the “delusional  complaint” or  organized  stalkung.
Yeah-  organized  gang  stalking  is THAT  BIZARRE.
ROGS  wonders:  who  will  help  me  keep  an  eye  on  this  story,  below?
Get  out the  ROGS  BINGO  card  before  you  file  FOIAs  in  this  case,  and especially, dig for  records  about the  dead  mans  past-  see  if kangaroo courts, mental  health,  unproven lopsided  claims  of domestic  violence,  and more were there. Because  it  is  possible  you  will  find that  soeone, soewhere,  didn’t  like  what  he  said online  or  off. Also notice that it was a workplace conflict related situation
Something  just  ain’t  right  about High  Heeled,   DVIC  policing,  as  these para-military,  quasi-judicial,  extra judicial  suicides,  homicides-and  poisonings  are  taking  place ALL  ACROSS  THE  WESTERN  WORLD, now.
SO,  here  is  the case where  an “un named man” died  in a  motel  room, from  what  federal  agents  and  the Department of Homeland  Security claim were household  cleaning  agents.
__________
Federal agents investigating hazmat situation that sent officers to hospital
By: Wendy Halloran , Rikki Klaus
Updated: May 13, 2018 – 11:31 AM
Federal agents investigating….
DEKALB COUNTY, Ga. – Federal agents are investigating after police found a man dead inside a DeKalb County motel, and then a chemical odor sent officers to the hospital.
Channel 2’s Wendy Halloran said agents with the FBI and the Department of Homeland Security were investigating inside the room late Saturday night.
“We have a dead body in the room and we can’t make any determination on cause of death until they have cleared the scene,” Shiera Campbell, with the DeKalb County Police Department, said.
All police had determined was there was body a man inside a room on the third floor of the United Inn on Memorial Driver in Decatur.
Guests told Halloran that they were stunned when they were told they needed to evacuate their rooms.
“We were all in the sun standing out for a long time when I did find out what was going on. It was kind of sad,” a hotel guest, who only identified himself as Bryan, told Halloran.
Once inside the room, three DeKalb County police officers knew something was very wrong.
“The officers were feeling a little bit dizzy, weren’t feeling too much like themselves, so they quickly came out of the room,” Capt. Eric Jackson with Dekalb County Fire and Rescue said.
The strong chemical smell sent three officers to the hospital. Firefighters then put on hazmat suits and went inside.
“Based on the samples we took we are going to try to attempt to identify whatever that source was,” Jackson told Halloran.
Hour after hour went by Saturday as forensic investigators waited to see if they could go inside to process the scene and the medical examiner remove the body.
Motel guests waited and watched. Some had to move to other rooms.
Hazmat trucks pulled in late in the night, with all signs pointing to something potentially deadly inside that motel room.
It is still unclear what was inside the room.
Police said late Saturday night the body was that of a 48-year-old man.
………..follow  the  links-  connect  the  dots!
_____________
While many  over the  counter chemicals such  as  bleach,  and  ammonia, and  sulphuric  acid  and  more can  be  freely  purchased from  hardware  stores  and big  box  retailers such as Walmart, they  can  also  be  used  to make  dangerous  chemical  weapons.
Was this a case where hidden policing, and possibly, vigilantes or provocateurs tried to force a bombers hand, or otherwise wage attrition for something the un-named man said online? ROGS asks you, the journalist or researcher of organized gang stalking to decide.
But also, decide WITH EVIDENCE and data that you can access by learning to ask the RIGHT QUESTIINS in these odd, bizarre cases, and to adopt the ROGS framework analysis of the claims inherent in these plainbizarre gang stalking events.
We  know  with  empirical  evidence  that the  alphabet  agencies work with local  law  enforcement and  community  mobs to  wage  hidden and highly personalized war,  psychological  war,  that  frequently  ends  in  suicides,  homcides  and mass shootings, and  that  they  wage  these  outside  of  judicial  oversight,  on  targeted  individuals.
We  in case  after  case  of  case  that  these  political, malicious prosecutions primarily target  speech,  and  speakers,  and, that  online  speech bis .targeted  offline.
And,  we see  the  bizarre  claims  of  threats  of  poisoning,  actual  poisoning,  and rarely~EXTREMELY  RARELY~delusional  people  who  fear  pousoning  by  “imaginary”people  they  “”imagine.
MORE LINKS  TO POISON  IN  THE EMERGENT ONLINE DELUSIONAL  GANG STALKING  DIALECTIC:
A credible analysis by a credible researcher of organized gang stalking:
https://medawarscornflakes.blogspot.com/2009/12/toxic-materials-in-stalking.html
And, those OTHER, likely actual gang stalkers, whose comment section was always filled with Lions Club members from OHIO, TEXAS, USAF affiliates, academics who are well known stalkers, and a few retired police (and someone who lived on Duckwood Drive in Eagan MN,in 2013):
https://neverending1.wordpress.com/2010/11/19/gang-stalking-the-gang-stalkers/
And, one for you, the researcher of organized stalking to figure out for yourself-especially if you are a federal agent, or another “good guy or gal” who wants to STOP gang stalking, as we see that it frequently leads to mysterious deaths:
https://perthsgangstalking.wordpress.com/2017/01/12/posions-and-toxins/

Gang stalking BINGO: targeted individual, targeted real estate, targeted electronics, targeted childROGS ren…….

Let  me  know  if,  and  when  you  start  seeing  patterns in  the  data  of  organized  gang  stalking……because  the  Experts  all  agree that  an  obsession  with patterns  can  indicate delusions, and  maybe  even  schizophrenia!
But  there are,  in  fact, links  between  organized  gang stalking and  real  estate, organized  stalking  and kangaroo  DVIC  courts, links between Gang stalking and Electronic implants: (Here is how the NSA uses electronic implants.) and electronic  implants that  monitor  our  computer  activity, sometimes  for  YEARS.

Related  Story: How secret  policing tactical  assaults  can  induce  delusion-like  symptoms in  politically  targeted  individuals,  as  those  targeted  try to  find  words  for  un-Constitutional  government conduct:
Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology? 
OGS victims obsession  with  patterns can  indicate  delusions to  therapists  and psychologists  on  the  state  teats!

But  here  below is a  case study  in  organized  gang  stalking  that  is  full  of  the  EXACT  patterns that  I  describe here  at  ROGS.  Organized  gang  stalking  IS  what  I  say  it is!
So…BINGO: Lets Play ROGS BINGO, in  the  case  of  the  targeted  activist!
Black  activist jailed  for  Facebook  posts speaks out about secret FBI surveillance that  went  on for  YEARS.
Exclusive: Rakem Balogun spoke out against police brutality. Now he is believed to be the first prosecuted under a secretive US effort to track so-called ‘black identity extremists’
…….. The father of three said he was shocked to later learn that agents investigating “domestic terrorism” had been monitoring him for years and were arresting him that day in part because of his Facebook posts criticizing police.
“It’s tyranny at its finest,” said Balogun, 34. “I have not been doing anything illegal for them to have surveillance on me. I have not hurt anyone or threatened anyone.”
Balogun spoke to the Guardian this week in his first interview since he was released from prison after five months locked up and denied bail while US attorneys tried and failed to prosecute him, accusing him of being a threat to law enforcement and an illegal gun owner.
Balogun, who lost his home and more while incarcerated, is believed to be the first person targeted and prosecuted under a secretive US surveillance effort to track so-called “black identity extremists”.
In a leaked August 2017 report from the FBI’s Domestic Terrorism Analysis Unit, officials claimed that there had been a “resurgence in ideologically motivated, violent criminal activity” stemming from African Americans’ “perceptions of police brutality”.
The counter-terrorism assessment provided minimal data or evidence of threats against police, but discussed a few isolated incidents, notably the case of Micah Johnson who killed five officers in Texas.
The report sparked backlash from civil rights groups and some Democrats, who feared the government would use the broad designation to prosecute activists and groups like Black Lives Matter.
Balogun, who was working full-time for an IT company when he was arrested, has long been an activist, co-founding Guerrilla Mainframe and the Huey P Newton Gun Club, two groups fighting police brutality and advocating for the rights of black gun owners. Some of the work included coordinating meals for the homeless, youth picnics and self-defense classes – but that’s not what interested the FBI.
A march in the wake of the deaths of Alton Sterling and Philando Castile at police hands.
Investigators began monitoring Balogun, whose legal name is Christopher Daniels, after he participated in an Austin, Texas, rally in March 2015 protesting against law enforcement, special agent Aaron Keighley testified in court….follow  the  links  above….connect  the organized  gang  stalking  dots! Because  nearly  ALL  mass shooters  endure YEARS  of these  tactics by hidden  policing,  aka  “High  Policing,  aka Americas secret  police.”

Special Agent Larry "Clint" Wooten, county sherriff's and top LEO's ask: so-what should we do with 'that one bad apple' who gang stalks people to suicide

Once again, the excellent blog medawarscornflakes has produced a story about organized gang stalking, where a group of individuals were describes as a gang, stalked like a gang, treated like a gang, indicted as a gang, implicated in a coonspiracy-but later found factually innocent of all charges.
The story involves a whistle blower who is a Special Agent of the Bureau of Land Management (BLM), SA Wooten. The whistle blower cites the Whistle Blowers protections statutes within the official documentation.
Here is one take on “that one guy,” from the Salt Lake Tribune:

Public Enemy No. 1 for rural Utah sheriffs just happens to be a fellow peace officer: Dan Love, the Bureau of Land Management’s special agent in charge.

Elected law enforcement officers from Nephi to Blanding call him an arrogant and dishonest bully who has little regard for local authority and dodges accountability, derailing a collaborative approach to police work on the state’s federal lands.

Love reportedly just laughed when Garfield County Sheriff James “Danny” Perkins relayed ranchers’ complaints about federal officers

Medawars describes incredibly uprofessional conduct, deliberate attempts at hiding evidence including shredding documents, and a sadistic practice of harassing people until they commit suicide, aka “death by gang stalking.” The Special Agent went on record describing a “kill list”of targeted individuals who a particularly sadistic and unprofessional agent claimed he had stalked to death.
The story has political implications, and if you use the ROGS BINGO card, you will strike gang stalker gold. You might remember that Medawars brought my attention to a case of gang stalking in Texas that involves retired FBI agents, and agents from several other federal agencies, that I covered it here.
As we see time and time again, real estate is at the center of much gang stalking, as are document shredding, retired LEO’s and the LEIU members who participate in this illegal practice. And, once again here is an actual piece of evidence that gang stalking is an actual practice of federal agents working  within many agencies.
But let’s have Medawars tell it:

Dec. 18th, 2017

Kill Books and Organised Stalking: a Spin-Off from the Bundy Case

This article is not about the Bundy case itself: it is about something else, not unrelated, of course, which is pointed up by some of the evidence which has emerged from independent investigations of the Bundy case. There are other respected bloggers who have specialised on this subject and Medawar doesn’t intend to duplicate their hard work or get into pointless arguments: readers can go to them directly.
That being said, anyone remotely interested in the Bundy case should view or read the source material referred to immediately below.
This is a link to a (slightly shakey, but bear with it) YouTube video of Washington State Representative Matt Shea reading from a document of “17-18” pages, which is based on an e-mail sent by Special Agent Larry Wooten to Andrew D. Goldsmith, Associate Deputy Attorney General.
In it, (at roughly time index 13:00 onwards) Mr Shea recounts Special Agent Wooten’s claims that Former Special Agent in Charge Dan Love had  a “Kill Book”: a sort of trophy, containing details of cases where Love proudly claimed to have caused three people in Utah to commit suicide.
Here is a link to Mr Shea’s source material, the communication from Special Agent Wooten.  (It’s a .pdf document). Medawar recommends that readers not only carefully read, but download this. (In this form the document is 16 pages, starting with page 2.) In the first paragraph on page 8 (according to the document’s own numbering, page 7 as far as a .pdf reader is concerned), the “Kill Book” is mentioned.
Medawar would like readers to note that this document is not uncritical of Cliven Bundy and cannot fairly be represented as political propaganda in his cause, or an endorsement of his actions, which Special Agent Wooten believes probably broke several laws and risked an armed engagement which might well have cost innocent lives. It is implicit in Wooten’s view, that Mr Bundy stubbornly acted in a way which actually completely played into the hands of SAC Dan Love and others shown by the document to be highly prejudiced, biased and unprofessional. Special Agent Wooten also implies that, given the grotesque and at times almost unbelievable bias and misconduct within the BLM’s Office of Law Enforcement and Security, that had Mr Bundy recognised the Federal Government and legal system and used them properly, he would have been in a very strong position, because his opponents had mishandled and concealed evidence at every turn -and apparently continue to do so.

What actually matters most here:

The three people in Utah whom SAC Dan Love boasted of having driven to suicide, using (or misusing) his powers and position and the indulgent tolerance of his superiors for misconduct on his part. We know little about them, other than that Dan Love boasted of having caused their deaths in the course of his “work”. There’s no evidence for any of them being a confrontation artist who might be said to have engineered his own doom. They were US citizens, who for one reason or another came to the attention of Dan Love and the BLM, and they are dead.
It is apparent from the context that Dan Love hounded these people in precisely the way that the “targeted individual” community has long claimed that gang-stalkers or “organised stalkers” do. In doing this, from within a Federal Law Enforcement agency, Dan Love must have engaged in a conspiracy with his colleagues, both supervisors and subordinates, to deny these individuals their constitutional, civil and other rights. This is a Federal Felony: “Denial of Rights” under USC 18 Section 241. See also the single-most read article on this blog.
There should be a prompt and thorough criminal Federal investigation into Dan Love and his colleagues for at least three counts of this felony.

What the sauvages are reading today: Moss David Posner comes home, with a bonus thirteen

I spent the night reading up on the odd life and death of a savant: Aaron Swartz, who, for pro or con, was an idealist, and who was likely pushed to the edge like many sensitives are, by the heavy hand of government, aided by corporatocracy™. This is what corporatism does when it sends its soldiers, tax collectors and character assassins after you.

sunset on the wire.jpg
For most people, sunsets are already ruined by the extensive corporate initiatives that blot out our skies. And so, we must draw the lines at OUR MINDS, and become aware of deep state manipulations of our lives, our politics, our media-and the many many hidden operations they use “in darkness” online as they perform brain surgeries on targeted individuals, and whole political groups alike. Can you see what is happening INSIDE those communications cables that string our roads up? Neither can I. And this form of “darkness” enables deep state “operations” all across the world.

And, today, I watched the sun set on actual liberty-the time is drawing near for all of us to pull the wires on the grand internet wiretap. But how to do it?
As many have noted-legitimizing the complaints of targeted individuals is the key. We must cut the group in two, and talk out loud about intelligence level targeting, and leave the “DEW’s and aliens” crowd out of it. And we must separate  and remind the agencies that in fact, the theater of operations does NOT include our minds, without informed consent.
And Aaron wasn’t the first, nor will he be the last to be targeted by a corporation in hidden and nefarious assaults on the individual. And like many before him, being “one of those” kind of people who literally slept in closets, and avoided the limelight and its attendant political confusions, I suspect he was overwhelmed when he saw how evil it all is “out there,” and succumbed to pain and sadness.
Well, he wasn’t the fist, and certainly won’t be the last “targeted individual” to undergo such a horrified awakening, and as we see tie and again, corporatism seeks to own you, control you, or destroy you, failing to otherwise neuter your humanity.
So, let’s look back at the words, and actions of anoher Targeted Individual who was beyond reproach, and whose case is well known among those who have also been targeted by the MIC/PIC/DVIC™. And I apologize to any living relatives of Dr. Moss David Posner for weaving his tale into my own™, but I believe it is useful to remember those who have passed, in times when their lives have new, and positive  meaning to others, as inspirations, or as examples of courage.
So, as my casual readers are likely unaware, and my Regular Readers™ are well aware, I have incurred the wrath of the Pharisee’s and their hench-demons in the Hate Industrial Complex.
Here is a snapshot of that-My Statistics™ from yesterday:
the thirteens.jpg
Two bonus thirteens! Because there are literally more targeted individuals than can be named-and because those who target individuals do so in secret, like the true cowards that they are these that dissect living children ™as the “deep state” interests and their legal bulwarks of layers of state denial™ of the targeting; and that work across institutions much as we see with cowardly MIC/DVIC/PIC™ programs that stalk men like Moss David Posner, or me personally™, or others or that drive “narrative” rather than uncover truth-we have to look at the “phenomenon” of TI’s™ in new ways. And, some of it is so ridiculous that one simply cannot make it up. Look at the “bonus thirteen” in my stats yesterday. Are you seeing any patterns yet? Because proving that patternns exist in the data is a crucial point where we can validate that TI’s are Not Imagining It™. Many individuaals who are gang staked are LITERALLY UNDER ATTACK, here in “freedom.”

So-I watched my statistics for about an hour yesterday, and someone in the UK would read a post, and then someone in the US would read a post, and so on. Like as if they were playing ping pong (Hi Doug!™). But this is the effect my writing tends to have on people, because it is a direct challenge to “official narrative.” As we see, time and again, official narrative is itself a total crock of sh!t.
SO, for those who might have come here searching for information about Dr. Posner, who was a targeted individual, it helps to understand the difference between anti-semitism™, the Brand Name™ of the Hate Industry™, and actual anti-semitism, where those inn the business of hate target Jews and others who are vocal, political, and who stand against their Eastern Bloc Slavery Schemes™.

Have a look at Dr. Posner in his own words, and try to see if you can find “patterns” of who targeted individuals are, and why they are targeted, and who targets them. But very importantly, notice that I maintain a balance between my personal views of those who profit from “hate”-and that hate defined by the hate profiteers themselves-and the views of even Dr. Posner, who is at odds with Noam Chomsky, who I cite in my example page on anti-semitism.
Here is Pozner on Chomsky (who I merely use as a reference to how confused the rhetoric of “anti-semitism” is, and how profitable, for a select group of “professional haters.”).
Here-Google this phrase in its entirety, no quotation marks “the self-indulgent and auto-congratulatory Noam Chomsky, arguably one of the most virulent anti-Semitic Jews you can hope to encounter.”
Then, have fun tracing the actual quote- I just don’t have time today to look into a decade old smear of some kind or another.. But here is one version of where it appears:

http://archive.li/DJFzW
“…the self-indulgent and auto-congratulatory Noam Chomsky, arguably one of the most virulent anti-Semitic Jews you can hope to encounter. His endless diatribes on what he wants you to believe to be the horrible treatment of the Palestinian people at the hands of the cold-hearted Israeli oppressors are unparalleled in literary hyperbole. Unfortunately, he doesn’t offer one shred of evidence to back this up. He invites you to join him, the consummate Jewish intellect, in collective snobbery by simply accepting (because you are so frightfully well-educated as he is) that what he says is so. I have yet to see one single person stand up and ask, “Dr. Chomsky, what is the evidence for this?” Should this take place, hopefully there will be a paramedic team standing by to resuscitate him.”
Moss David Posner, July 3, 2006

Posner, a medical doctor, a critical thinker, a prisoners rights advocate, a compassionate release proponent, and one who knew how complex the treacherous zionist-dominionist collusions are: “as happened with the Middle Eastern Jewry at the time of the establishment of the state of Israel, when the Zionist government encouraged the Arab governments actually to coerce the Jews to flee, it is entirely possible that the Bush and Olmert governments wish exactly the same thing for American Jewry.”
So, as a victim of actual anti-semitism as opposed to Hate Industry™ anti-semitism, said this some five years before he died (he passed in 2011, just as the DHS was ramping up domestic surveillace, and working with UK IC to target gamers in Gamergate, and “improving” mass domestic wiretapping schemes that have spanned decades):

September 7, 2007 Rally at the Capitol, Sacramento

Remarks made by Moss David Posner, M.D.

My name is Moss David Posner.  I have been a physician with the California Department of Corrections for almost five years, before I was forced out.  I’m putting my burden down now.  I’m out of the picture, but I want to say a few things to you:

Here’s the threat:  AB 1539 defines permanent incapacitation, which is the logical first step in compassionate release procedure.  If this is diluted down, which appears to be what is happening, virtually no inmate will be able to meet the standard for compassionate release. AB.  1393, was to have put teeth into requests for disclosure of public records, has been gutted by eliminating the order for punitive damages for any agency which refuses to cooperate with lawful requests for records,
If there is—literally—no way out, then the seriously ill inmates are boxed in between being kept in prison, on one side, and being denied appropriate medical care, on the other.  You have to push back on two fronts: first, the demand for the humane alternative of release of terminally incapacitated, and second, the demand for the needed care for everyone, especially those who are seriously ill.
In order to help you with the medical end of this dilemma, let me tell you why any hope of improving the medical care of the seriously ill is in such a mess as matters now stand.
Here are my credentials:  I started out as a contractor, a staff physician at Pelican Bay.  I went to Salinas Valley, where I was subsequently appointed the acting Chief Physician and Surgeon at Salinas Valley State Prison.  From there, I was transferred to the Substance Abuse Treatment Facility in Corcoran as the acting Chief Medical Officer.  From there, I then transferred to Corcoran-1 and asked by the then-Chief Medical Officer Dr. John Klarich to be the Chief Physician.  When I complained about an anti-Semitic death threat, on paper and as defined by a yard captain, my appointment to the chief physician job was cancelled.  Dr. Klarich told me this to my face.  I have won round one of an action against the Department, and now am waiting on the result of an appellate hearing, which of course the department insisted on.
You see—that was my crime: trying to help inmates.
Let me fill out your picture of what really happens in the medical department.
I ran into brick walls everywhere I went. I worked 14-hour days at SATF, arriving early and not leaving until the restaurants in town closed.  I spent hours each night speaking with distressed relatives, and doing whatever I could to make life more bearable for these unfortunate men.  I kept detailed files on my computer so that I could have the information at my fingertips should any attorney called—and call they did.  They deeply appreciated my help.  I even got compliments from the prison law office, and they were upset when I was transferred.
You would think that all this would be appreciated and encouraged.  You would think so—but you would be wrong.  The California Department of Corrections doesn’t want to help their doctors give quality care.
I cannot count the number of times our requests for consults, requests for outside assistance, requests for equipment were ignored, even laughed at.  Our orders were ignored.  Some Correctional officers would just ignore appointments with us and with outside consultants.  Officers would routinely throw out appliances desperately needed by inmates, when they transferred to other facilities.  Orders for important treatments were ignored, and many cases just cancelled.
Read more here about his stance against domestic torture of the elderly, and his PeacePink page here, and here is one of his articles about thought control via disinformation”How to Control Americans—thought control, mind control, disinformation and other naughty things” and how toxic propaganda derived from the heyday of William Colby styled CIA experiments, and Russian “mind control” and brainwashing, aka”Pavlovian conditioning” is taking over our media, written in 2006.
And, here is United States of America, Appellee, v. Moss David Posner, Appellant, 424 F.2d 181 (9th Cir. 1970), where the government decided he was not a “genuine” conscientious objector.
Related Stories: The CIA owns everybody of any significance in major media and mind control via artificial intelligence programmed by FiveEyes spy agencies is real-and in use EVERY DAY online, via captology, and IC programs like Moonshot CVE, and standard “coercive persuasion” What is Brainwashing, with pictures, from How Stuff Works

Then, it helps to understand that those who are “in the business of hate” are themselves actual anti-semites™ and worse-unimaginably worse, than even Hitler™; and that all or most talk of Hitler is, in the first place, merely coded speech that distracts the listener away from the fact that those who cry wolf the loudest actually are Worse Than Hitler™-and that they are the descendants of those who built Hitler into the horrible boogieman that he was. SO, while Hitler had power for 12 years, the One Percent and their enablers have hid their atrocities across the entire world, which has lasted for 3500 years or or so.
 

What the hungry, the tired, and the huddled masses are reading today

The statue of liberty has a very odd history, that, like many things we take for granted, has hidden meaning.  In linguistics, hidden meanings are a source of nearly erotic excitement-linguists love to discover layers of meaning in ordinary things.
SO, for example, for us, the phrase “War on Terror” is well known to mean “the war on people who know that the One Percent and its agencies and tax collectors and people targeters target speech more than terrorists,” and so on. Speech IS terror to those who stitched and sewed and who control the sows ear that is the NSA-DEA-FBI-DHS/etc agency nationwide wiretap out of nearly whole cloth.
So, let me jam this post in those pig’s eyes of “theirs” and stop up their silky ears today with the soft cotton of my words, wielded like a sharecroppers plow, by filling the local Fusion Center’s “words and people who use them” entrapper with “what my readers are reading today

I get around of 40-70 readers per day, who read between 3-5 posts each. And they come from many nations, because as we see, culture jamming requires an international focus by writers like me, so that cowardly battalions and squadrons of hidden groups of terrorists get shut down.

Update: 07/28/2019– Iget avbout two hundred reads per day from Israel, Cyprus, Hungary, etc.-anywhere George Soros Open Society is politically active, and most hits, some 80%, come from the USA

By far, my most popular posts are the ones teaching people how to document gang stalking for a civil lawsuit, or how to hack the CIA’s hacks, or how to protect themselves against the thousands of roving gangs of security contractors and other gangs of”community police” and “private contractors” and “security state criminals” that are hacking our online conversations, our lives, our web, and our relationships. And, how to spot actual targeted individuals from the hordes of paid speech killers online.
And, lately, many criminal defense lawyers and civil rights attorneys-maybe some journalists and others who know that gang staling is all too real are downloading the Guide to Government Hacking written by the ACLU, the EFF, and the NACDL
How police frame mentally ill people “in darkness,”but ony after brainwashing them
How retired law enforcement, and other nefarious elements of “our” society get away with murder, and more “in darkness.”
How the NSA steals data and stops innovation by hacking corporations and passing data around to the One Percent and their enablers, that influences politics, and people, via back door searches, and thousands of varieties of wiretaps-and by stealing SIM cards.
ANd this is just a sampling of today’s readers, but many other posts get read too.
And Look at the search language that lands here at my simple, free, wordpress blog, aka my “proving gang stalking is all too real” honeypot:
gang stocking research combating the lies
bolo gang
ex-air force organized stalking
champion gangstalking
osi gang stalking ti
psychopath gang stalking
See? Some bright soul wants to see if someone is actually combatting gang “stocking” as opposed to combatting manufactured terrorism that happens because a huge vampire is attached to our lives.
And the BOLO, aka “party flag” is very real. And, my GPS is still missing, but at least I have help looking for it now. Here-maybe YOU can help me find my “lost” GPS?
And while I am flattered tat someone might think I am ex-AirForce, I am not. I was once a nearly hopeless guy like poor Jurgis Rudkus, an immigrant from Osweiczim, Poland (I think) who encountered hardship and economic necessity in the American dream, and then, I learned to use words like these ones you are reading now!
Then, I especially like the fact that some are making the connection between military operations having bled ALL OVER OUR INTERNET, and into civilian operations,  via “black” operations like OSI informers, who run a variety of military programs that track people, target people and coerce and manipulate information out of people.
In fact, I am so pleased that peope are searching for this, that I am going to write a story about the daughter of a former USAF Major, who was a Playboy Bunny back in the heyday of Hugh Hefner. She is a beautiful woman, even many years after her tour of duty at Hef’s Mansion, and she told me about a weirdly fitted bicycle there, where young girls from UCLA…oh, nevermind. I will write that story later…
But as you can see, writing about organized gang stalking is what we must do in order to restore our democracy. And as you can see, I need help doing it. Have YOU had enough of the bleedover yet? Keep in mind: you swore an oath, and I swear a lot, so we have this in common-we are both fighting for our democracy with the tools our constitution guarantees to us. I got words, you got MRAPs and donu shops and weird USAF flyovers loaded with electronics, and bucketseat britches full of sh!t.
Because this is just the beginning, and it isn’t pretty. And I can’t help but feel a bit fattered at whoever it s that came ere looking for a Champion of Gang Stalking, because he’s not here-the writer has left the building, and in his place, only  the ghost of Vonnegut, who reminds us that Dwayne Hoover was kind of an asshole, and that police states by design CREATE terror, rather than any other thing.
Because Look!
When you give low IQ morons whose ballsack’s are falling out of their pants and overly eager to fall dickhead over gloryhole to make an impression on the ladies, and use those fancy toys that Saint FiveEyes the Panoptical Inquisitor gave them, they eventually create a use for them.
And, failing that, they go a bit nuts themselves:
dwaynes martha.jpg
 

Just in case you need a reminder about “what the boys and their ever thankful girlz will do with toys:”
sky penis
 
Why Neocons should be rounded up and locked away in fiery hot gulags in New Mexico, which has odd policing habits
I personally find layers of joy in looking at web pages for hidden meaning, and especially web pages created by teachers, many of whom are not very web savvy, but whose hearts are nearly always in the right place, despite the American education system being a more nefarious propaganda delivery system then many communist nations.
In act, our education systems have become whole-person rendering plants, enabling a select few, while destroying he vast majority of kids that enter into it. Our schools are virtual experiments in destroying human potential via race-class-gender narratives, while continuing to allow the descendants of Eastern Bloc gangland affiliates to have their way with kids.
So, sometimes in pedagogy, it is important to revisit our terms: what do you call someone who would harm a child? And, draw better lines in our society when some murder the crippled, the mentally ill, or the immigrant
Then, let’s revisit  the statue of Liberty, in the 1920’s, for a few facts about how the fourth generation frequently forgets where they come from, or why they came here to America in the first place, for the sake of the 99% of modern parents whose kids will unfortunately encounter the American education system:

Stories of Jewish immigrants throwing their tefillin overboard upon encountering the freedom and promise of life in the United States may be the stuff of legend, but for Mendel Aisenbach, a Chabad-Lubavitch Chasid from the Crown Heights section of Brooklyn, N.Y., such tales emphasize an important point: When they approached the Statue of Liberty, many of the tired and poor masses from across Europe – a good portion of them Jewish – pushed their identities to recesses deep inside in the quest to become Americans.

Then keep in mind that targeted individuals are not a new phenomenon, anywhere in the world; that targeting has been going on here for many centuries.
Today, we see the American agencies financed and inspired in their targeting by the descendants of this exact group of immigrants; and we see them having no sense of why they are here, as they target and harass and stalk us via databases much as Hitler did.
Look! IBM dealt directly with Holocaust organizers, much the way we see Big Data working across continents, across politics, and across human morality aka Transhumanism to eradicate bad ideas and bad thinkers via Total Information Awarenness, and rampant database targeting (as I chronicle here at ROGS).
And, sometimes, I recall their inspirations then, all those repressed men in tefilin, when I recall a certain obese blonde woman in the classroom of a wonderful American teacher, who I will call “Liz” who taught pedagogy in a midwestern college; and this pudgy blonde who “coincidentally” arrived in my class on inter-disciplinary approaches to solving education problems, which is known in some aspects as “The Pedagogy of the Poor,” which has its origins in the teachings of Paulo Freire’.
You might have noticed that I apply the pedagogy of thee poor to my writings about targeted individuals. This is because the One Percent-the descendants of those who financed Hitler-are actively monitoring all of our communications in real time from their escape pod in Israel after the NSA gives them full access to all of us.
And please, feel free to label me an anti-semite, or a self-loathing secularist, or even a hater of God, Gawd, Gad, G_d, G_d, god, dog, Yeshua Ha Nosering, the Virgin, ISIS, or even a disliker of Hashem the provider of great tidings of Chinook flyers,  but keep in mind that I am well aware that non-Jewish Dick Cheney, ambiguously Jewish Rupert Murdoch, and a definitely Jewish Rothschild are active in that country, financing strife, and doing things FROM Israel that are forbidden by our Constitution. I am well aware that Jews are targeted too. So, yeah, call me wutever.
But one thing you CANNOT call me is a hater of Democracy, or even the Statutes that guide our liberty, aka the Constitution, and its guarantees within our Bill of Rights.
And, as I have inter-generational memory as well, I specifically recall things that most “Americans” do not, like this overweight blonde white female who was affiliated with the Department of Homeland Security, and I recall how many of her written papers that we read out loud in the classroom (for a specific purpose) indicated as much, as she was one of many agents of the neocon Hydra that then had just begun targeting American activists and critical thinkers.
And like we see today, these have infiltrated every singe aspect of our culture so that real “change” will never occur again. The police state never looks like the police state when it is being constructed, because frequently, it looks like someones mom. Hitler did it, Stalin did it, an America has done it today via the memetic that women are somehow beyond blame for social problems.

Related Stories: When Hitler’s Perfect Woman Came to Call-how  Hitler used images of idealized women to build Nazi Germany; and ISIS in the American neocon dialectic, aka “The Virgin Mary flapping her garments like boatsails, as flags of anti-misogynist/anti-sexual harassment/anti-educated male,” and the criminalization of speech on the internet, or, this.

In order for the students of the future to understand how integral the DHS is/was/will continue to be in the destruction of American Democracy, via speech prohibitions and high heels policing, and then, the “phenomenon” of social justice warriors and cry-bullies (SJW’s)  after that, one need only keep in mind the image of plump white women who drew double salaries across America, and who targeted many activists of many races and many classes during the “War on Terror.”
And, unlike American propaganda systems, which are designed to limit the potential of American children, these others are designed to rigorously teach kids hard science, math, and more. It’s as if we have succumbed in totality to international finance treating our children as sheeple.
In order to understand how deeply they have inserted themselves into our children, note that the word sheeple , is one of the words that the One Percent and it’s domestic spying and democracy clearinghouse operation the DHS has “terror watchlisted” at one point or another.
Here, have a look at one such page from the early days of the WWW (back when we still called it the WWW!), before corporatism and the War On Terror infiltrated every level of our propaganda stream, and diddled our children’s minds like Facebook billionaires have admitted to doing today by deliberately, and with impunity manipulating dopamine levels in children’s minds.
Also, keep in mind that during the election of 2016, many of the neocon left were echoed in the propaganda stream calling for MANDATORY USE OF FACEBOOK. Then, compare the ideals of Lady Liberty THEN to this neocon version of Jewish-Catholicism and it’s faux assault on speech via sexism/harassment/misogyny memes; ISIS, indeed.
Mystery cults INDEED. Lady Liberty, indeed. Is it misogynist to say that the resemblance is striking these days? :

The Statue of Liberty

“Give me your tired, your poor,
Your huddled masses yearning to breathe free,
The wretched refuse of your teeming shore.
Send these, the homeless, tempest-tossed to me.
I lift my lamp beside the golden door.”
Google
 Web  www.kidport.com


The Statue of Liberty was a gift to the people of the United States from the people of France. She stands in the middle of the harbor of New York City. She is a symbol of hope and freedom for immigrants.

 

An army of Paul Blart the Mall cop and a database walk into the Hero bar: recipes in nauseating social policy and corruption

So, I have documented a distinct link between crisis PR narrative control and how organizations like the Association of Threat Assessment Professionals (ATAP) has deliberately blurred the line between so-called terrorism and domestic violence, utilizing what they call the,”colluding parallel investigation,”and advisinglaw enforcement, LEIUs, and Infragard community policing elements to wage pre-emptive, multiple and never ending investigations on targets;and how auto-antonymal language and double entendre are used in “influence operations”which the ACLU has also noted; and how alternative media is under attack from the “deep state” and it’s hand maidens in civil conspiracy, the psychologists who gaslight TI’s, but who, by proxy, are also those who are causing mass shootings, suicides, social isolation, political corruption, and more.
I have also repeatedly documented the toxic blur between security contractors and police functions that operate in an “intelligence capacity,”as we see a link between the Yellow shirt security contractors and the Stephen Paddock shooting, as well as documented links between Omar Mateen and G4S concurrent with Mateen being “on the FBI radar,” directly because his father is an FBI asset/informant,but how these literally conspire under the ATAP “frame”work and also wage hidden terror and morality/coercion/social conformity/entrapment/social engineering campaigns “in darkness,” and without oversight.
It is these latter subjects who are what can rightfully be called the modern equivalent of Nazi Brownshirts, or Stalinist purge agents, or Israeli Sterns gang members, and the ‘whisper campaign’ is the tactic both groups used to cause strife in local populations. All of that whispering, starts in database abuse, and BOLO’s of various kinds.


UPDATE 10/28/2019
: Actress Rose McGowan, who I mention in this post you are reading , has now sued Harvey Weinstein and his sleazy gang stalking lawyers David Boise and Lisa Bloom, as well as the Mossad affiliated spies that he hired to ruin her life, the spy firm Black Cube of Israel.
Rose McGowan sues Harvey Weinstein, Lisa Bloom, more claiming ‘diabolical’ intimidation plot
Maria Puente

Also note that one of my personal stalkers is also a Mossadi jihadi, and WOW did my blog, and my communications device/s get interesting after I PROVED what gang stalking IS with that one example.

In case you don’t recall what a BOLO is, have a look here especially, then here, and here.
Then, have a look at this Wiki site where the excesses of the unethical post 9-11 “information sharing environment” as we see security industry are documented in one specific community, Aspen Hill Maryland, as an organized gang. This Wiki has valuable information, but also some classic total time wasters like the “”Old Men from Out of Town” story started by private detective David Lawson, which, while interesting in the way that other locker room talk is interesting, has no merit in our Constitutional crisis era of total system failure.
From Aspen Hill Wiki:

“Fake Cops”

Local law enforcement has a very effective and legitimate approach to dealing with localized crime problems. This is “PCAT” or “Police Community Action Teams” programs, in which officers from other areas are given significant opportunities to accrue overtime hours, by concentrating forces in one or a few beats. This effectively floods the streets with both uniformed and plainclothes officers.
Some Organized Stalking groups are well aware of this, and they will occasionally flood an area with their own staff during, or more commonly immediately after, periods of PCAT activity. They can expect cooperation from grateful shopkeepers, mall security, and other property-management types who are allowed to believe that these individuals are operating under, or personally possess, police authority. It’s possible that some persons affiliated with such organizations are in fact police officers, or more likely were at one time police officers. Yet the vast majority of these “Fake Cops” are in fact fake cops. Quite frequently they work with, or are part of, “security gangs”.

“Security Gangs”

Some commercial facilities such as shopping centers or office campuses may be unable or unwilling to afford the level of security available through legitimate private security services. Some such may be approached by organizations offering their services to “help clean up the place”. These organizations are, effectively, unlicensed security officers and also often operate as private investigators with no permits. Or, they may possess permits or licenses which do not apply to this sort of work. For example, Bounty Hunters are in fact law-enforcement and may have special permits… which do not apply to any duties outside of seeking bail jumpers. Yet neither the property managers nor the people “apprehended” (usually beaten, intimidated, or frightened away, instead) by these individuals or groups are quite cognizant of the fact that these persons have no legitimate special authority nor license in these places and situations.

Enablers

Certain specific shopkeepers or property-management people are quite cooperative with either “fake cops” or “security gangs”. To such groups, such enablers are golden. In the rare case that the “fake cops” or “security gang” operatives feel that they are at risk and choose to hide their presence rather than risk the exposure of their operations, such shopkeepers or comparable staffers can act as eyes and ears for the fake cops and/or security gangs. Indeed, given enough time in place, and they may come to manage them, if not in exactly a capacity of being a management-level employee of a corporation or company. Yet they can direct the operations of such organizations, in effect, picking victims.

What makes the documentation of “organized gang stalking” significant in this case is that we see how elements in policing trickle information to security contractors, and “cop wannabees” who then form literal gangs, and use technology and tactics of OGS to seize turf, and “run neighborhoods,” in the disguise of authority; and this, which is a recipe for corruption.
Then, take a look at how “security guards” were an integral feature of “narrative control” in an ever changing story about the Las Vegas shooter Stephen Paddock in order to understand how similar mass shootings are to activities in the Hitler era with Brownshirt marauders corrupting Democracy; and other periods of history where the Constitution of a nation was suspended, diminished, or eradicated entirely.
http://www.latimes.com/nation/la-na-vegas-shooting-20171009-story.html
So, the Maryland Wiki from Aspen Hill has great information, and names some names to some degree, and can help point the researcher, the psychologist, the criminal defense or civil attorney into the right direction in pursuing cases against gang stalkers.
As I have noted, my personal case of OGS began distinctly in 2003-4, and progressed throughout decades, and went into full swing in 2008, and I worked with great lawyers, and began and prevailed in a lawsuit that blossomed to five other independent litigants to literally take a cowardly security contractor OUT OF BUSINESS. As you can see, I am taking my time this time around, and making sure I get it right for everybody.
Without coincidence, 2008 is also when the Department of Homeland Security, working under the “intelligence sharing” platforms where the DEA/FBI/DHS/CIA waged hidden database backdoor searches across agencies, and began to target individuals with ferocity, and devoid of any due process, or even anything resembling due process protections.
In other words, systemic denial of substantive due process became the norm in 2008, as well as a host of other institutional practices that require a separate essay, but simply put: information sharing became indiscriminate, political, slanderous, and frequently sought targets that refused to participate in such a social scheme, which is well documented all over the web as one TI after another becomes targeted with “hidden operations” of many kinds.
Have a look at another of my encounters with hidden internet operators in 2011, which was another big year for DHS backdoor black operations. Like Rose McGwan and tens of tousands of others, we can begin to envision how civil conspiracies of deprivation of rights are traceable to both private contractors, who can  be sued for actual damages, and the DHS which can be sued for complicity and reform, which won’t come easy as major senators sitting on the intelligence committees continue to derive substantial kickbacks under the watchful eyes of the FBI and other agencies.
But because the federal government has managed to skirt color of law claims, due process claims, ad substantive due process claims bu claiming state secrets, FISA exceptions, section 702 loopholes and more, I will leave it to actual lawyers to make the larger arguments.
It is at this point, beyond a reasonable doubt that the government acts pre-emptively in these cases with actual prejudice, maliciously, and with selective enforcement, and that the government has excercised bad faith by using back door searches and OTB methods. But for the lay reader, here below is basic Due Process, 14th Amendment where the federal scheme has shifted the burden of proof to the citizen to bring claims:

Every Due Process Clause analysis begins with the question “Has the government deprived some person of life, liberty, or property?” If there has been no government action, or if there has been no deprivation, then there cannot be a Due Process issue; substantive or procedural.
Substantive Due Process issues involve the states’ power to regulate certain activities.
Procedural Due Process issues involve an analysis of the procedure required by the Constitution when states seek to deprive people of life, liberty or property.

While the majority of persons targeted with these hidden schemes that are waged from behind the DHS and other agencies target low status, low income individuals, a savvy civil or criminal lawyer will see the merits of pursuing redress in cases of OGS because there are other venues whereby proving substantive due process has been occurring on a massive and industrial scale, as we are now faced, literally, with predatory “law enforcement” that is actually not enforcing any laws, but rather, seizing property in record numbers, framing suspects, and using intelligence agency tactics in local communities to create the appearance of crimes instead.
So, OGS has morphed into real estate red-lining, and a CIA styled asset forfeiture racket; but in many other ways too. ANd here is a case from a local community where a citizen has documented other real estate related claims, as did Bob Krlich.
Up until ROGS, few would risk speaking out about ths form of corruption, and worse, the actual language didn’t even exist in many cases, which is by design of the corrupt, and the corruption itself. Look through ROGS foor more links to the dialectic itself-search for tags with “linguistics” and “para-language” and “semantics”  and “jargon” for examples.
One of the chief and main reasons this is allowed to continue is because “security gangs” and “private contractors” are not held accountable to the public, and as we see on an  industrial scale, the public doesn’t even know what any of the many “hidden operators” online are even doing. And how can you litigate for a client, or in a class action lawsuit of the proof of such a diabolical state-level brownshirt scheme remains under authoritarian control, disguised by “state secrets” and other unchallenged privileges?
Well, it helps to have a starting point, but as we see pre-ROGS, there was a dearth of data that verifies OGS as an actual complaint. Fightgangstalking.com is one of the few who has stuck with the facts, and occasionally whistle blowers step forwards; and there are some highly credible online testimonials and a few court attempts like the case of Jeffrey Kantor, but other than that, where to start?!
So-start with the private security contractors and their chain of oversight. and work your way up, combined with other data that proves patterns of state conduct, substantive due process violations that stem directly from the DHS scheme, and the hidden data about back door searches and the electronic trails they leave that became available since Edward Snowden and corporate collusion at the database level.
Further Reading: What is substantive Due Process?

Due Process Clause:
The Fourteenth Amendment reads, in part, that no state shall “deprive any person of life, liberty, or property, without due process of law.” This applies to the states and to local governments. The Due Process Clause of the Fifth Amendment applies to the federal government. Most Due Process issues involve state laws.
Common Law:
The two sources of law are statutory law and common law. The common law is that body of rules and principles developed through the courts over time. While legislatures often overrule an area of common law by enacting a statute, and while courts often overrule an area of common law by refusing to follow it further or by handing down a decision which makes use of a competing principle, the common law carries with it the force of law and is generally binding on courts within that jurisdiction.
Burden of Proof:
In every case one party or another has the onus of demonstrating the truth of some fact or another. The party who must so demonstrate is said to have the burden of proof. In addition to who carries the burden, the burden can be of different loads. For example, in a criminal case the prosecution carries the burden of proof and must prove every element of the crime “beyond a reasonable doubt.” In most civil cases the plaintiff generally carries the burden of proof but must prove every element of her claim only by “a preponderance of the evidence,” which is far short of “beyond a reasonable doubt.”

 

Must Read: gang stalking and actual gangs- when racism and tribalism hide behind community policing schemes, aka OGS

Gang stalking case studies: Lawrence Guzzino, Watsonville fire, racial-tribal-sectarian turf warfare in the US; I ask the reader to click through the highlighted links in order to “make connections” in these cases to what can only be called “botched criminal cases where state actors/snitches/rats/technology/technocrats” directly contributed to the crimes at hand.
The case of Lawrence Guzzino, police families, and slanderous allegations that precede criminal charging
Some anonymous person online wrote about organized gang stalking back in 2013,and that story is one of the more well known stories of OGS: that of Lawrence Guzzino, Linux Systems and Networking administrator and security expert, mathemetician, and systems programmer, which was likely “an inside job” where Guzzino was stalked and eventually framed into a charge of “controlled substance abuse,” and made out to look like a pervert and a potential arsonist.
After a year or more of OGS, he was picked up sleeping in his car, and booked with “controlled substance abuse” which sounds like a drug crime, but in reality was an alcohol related offense; and his eventual arrest was designed to make headlines, and make him sound like a sexual deviant and a potential terrorist. And, real estate was involved as well.

Related Stories: National Strategy for Countering Terrorism Links from 2009, from the US State Department. Then, read up on “what is open source systems disruption,” who does it, who advocates for it, how the “deep state” targets individuals in the information sector, and who do “they” target?

As you might  recall, ROGS is a total and nearly complete refutation to deep state actors and actresses who work in security theater, or who maintain that the online community of gang stalking victims is a “potentially dangerous online community/tribe of troubled minds: but who is troubling them? Meet systems theory at the crossroads of trans-humanism, and one of many of “them,” Techcrunch.com’s guru of information flow disruption.
And, piece by piece, I am challenging and refuting the basis of narcissistic, arrogant, psychopaths in high policing, and the “deep state” that has/have challenged me, personally, and finding links to how private contractors, like Puppets on police strings work “in darkness” to manipulate people at the internet switch, and then kick these cases around between agencies after botched brain surgeries on unsuspecting internet users.
And-they do it from the NSA “deep state” using this exact NSA/DHS/FBI “backdoor” software here in the linked blue letters, as reported by Bruce Schneier, one of the world’s leading tech and security gurus.
Using tools from the UNITEDDRAKE manual (.pdf file here), and other software not-yet exposed in the wild, the multiple intelligence agencies of the Five Eyes Nations play pingpong with each others citizens, targeting dissenters and activists, first amendment and due process scholars as if they are terrorists.  Meanwhile, in Baltimore, an officer was murdered with his own gun, in an alley, in a carefully staged “camera-as-witness” murder, one day before he was to testify against seven other officers who were indicted in racketeering-and the FBI will not intervene.
So, like a parasite sucking at the flesh of a host, or a horsehair worm in the brain of a helpless cricket-or a drake mallard raping a sitting duck (seriously: all sex between drakes and ducks IS rape, by definition of the FBI’s own definition of rape)-these agencies have there way with us, one activist, journalist, whistle blower, or non-conformist at a time, and frequently for periods of time that simply boggle the reasonable or rational mind.

Related Story: Who actually runs Giganews-and WTF is happening behind closed server doors in Texas?

Here, below, is a blog written by a person who some claim has met every founder of every internet company anywhere in the US-and who shares links to Aaron Schwarz, who committed suicide after being charged by the DOJ, and who was persecuted for believing that information should be free (remember: suicide is one of the SUGGESTED outcomes of the DHS/FBI CVE snitch program)
Deep State actors, 101:

Now, back to or subject: the gang stalking of Lawrence Guzzino.
Guzzino’s life fits the often threatened downward trajectory that online and offline  gang stalkers frequently make about the only possible three outcomes being that the targeted individual will “become criminalized, institutionalized, or commit suicide.“And, there is much evidence that those who have been gang stalked do indeed end up in those situations.

UPDATE: Several years after I wrote this post, I also predicted that the case of Andy Ostrowski in Pennsylvania fit a pattern, of people who take on the human trafficking of religious cults and sects that work in secular DVIC settings, and gray area kangaroo courts in America will eventually be framed as,“terrorists” and worse.
That pattern is that activists who challenge, or otherwise litigate against sectarian judicial and prosecutorial misconduct will be stalked, harrassed, and framed for using “profane” words, ideas, and imagery in the privacy of their online media.
And, Mr. Ostrowski, who took on the child traffickers of Pennsylvania, and the powerhouse child rape factory of Penn State was eventually forced to cop a plea, after a decade of gray area slander, and phony mental health incarcerations, because they challenged religious hegemony in secular law,and culture.

Walter Laak-a potential Iraq war crimes whistle blower, went on rampages because he thought his pastor was working as a rat in the FBI CVE program as an informant.
Rose McGowan was provably stalked, monitored by former Mossad agents, and eventually, hit with a cocaine/controlled substance charge, decades after her rape, and then, some ten months after her recent contact with law enforcement, and after her claim that she was raped by Harvey Weinstein was accepted by the public via the media.
And, like the case of Adrian Schoolcraft, the NYPD whistle blower who brought the nation’s attention to illegal stop and frisk quotas, or judicial reform activist and PennState/Sandusky scandal critic Andy Ostrowski who was arrested as he broadcast live on Facebook, in the Kids for Ca$h State where one single judge sold 3000 kids, we see the fingerprints of a discrediting narrative working side by side with powerful instittins and agencies, forced institutionalization, trumped up charges, and state/LEO claims of criminality of those so victimized.
Then, in that same area where this happened to Guzzino, there was a tribal war afoot where white homeowners clashed with Latino’s who sought to be part of community policing” initiatives. They even had gang names for themselves, and fought over turf.
At their heart, many if not all OGS cases are political, and smear jobs are a main feature. In other words-these cases resemble classic, textbook frame job from nearly all angles, as well as catching ten or more points on the ROGS BINGO card. But you can decide for yourself. Like I say, frequently-police states don’t just go away. It takes awareness that we are LIVING IN ONE that begins the butterfly effect of wider social discourse to bring light where there is none.
The question is not “are gang stalking targets” good people, or likeable people, or even innocent people: the question is why has our society devolved into lawless community policing schemes that invade our privacy, security and liberty via our internet connections, our homes and our lives in surreptitious entries? Because as we see time and again, that these are little more than never ending disruption campaigns; modern “Scare-let Letters” that are passed round via Fusion centers and local police departments, based on back-door NSA searches, using tax-payer stationary, but that paper which the taxpayer never gets to read or challenge?
Meet the New Database Lynch Mobs
Here, from redecomposition.wordpress.com , is the 2011 story of Lawrence Guzzino, who has apparently disappeared, and which I reported here many months ago, and from the original story, via Fox News:

After more than a year of being gangstalked Lawrence Guzzino contacted the local media (Foxnews affiliate) and they took him seriously. They published a story and video report (Jan 29, 2011), where they interviewed not only him, but police officer as well who confirmed that “gangstalking” is growing problem and existed before Internet. It’s not clear if there was any police report filed. He said that Facebook and Twitter made it a lot easier to execute such crimes. They didn’t interview any neighbors who allegedly were harassing him or named any names. They used term “gangstalking” to define the phenomena of victim being followed around and systematically terrorized. Lawrence even climbed on the roof demonstrating how he has been harassed even in his own home at night, how he was afraid to go out play tennis or ping-pong. He even started crying explaining how this induced paranoia devastating his life and the relationship with family.

Keep in mind that gang stalking complaints online sky-rocketed in 2008, nearly immediately after the election of President Barak Obama, and that the ACLU issued a scathing report about the rampant and rancid abuse inherent in these political policing schemes, but also that in much of the extant online blogs, 2011 could be described as a “banner year” for gang stalking complaints.
Google “gang stalking” and “2011” for evidence of that, but in 2005, there were just over 30k searches for this language, using the year as a secondary search term, and by 2011, this search returns nearly 74k results. Today, the same search Returns 175k results-gang stalking searches by year have increased 130% since 2011.
So Guzzino’s case comes just after the Department of Homeland Security began its full court, partisan campaign of using the agency, and its associated community policing schemes as a political mob. There are even indicators that funds were used obs of community “change” operated politically, and that tactical method, just like President Obama’s  ACORN.

While some merely had President Obama show up a block away from their home, with Secret Service members stalking the neighborhood, waging whisper campaigns, and political slanders, others had more personal attacks based in race class and gender. I think Guzzino’s case could well be a case of that, augmented by “bullying on steroids.”
Here below is more data from redecomposition’s excellent reporting on this case, where we see a fairly pasty white male devolve into a case study in gang stalking that includes bizarre and unethical narrative “framing”:

Suicide rate in Santa Cruz county is also 25-45% higher than California average.
Gang Stalking, “Bullying on Steroids”
Resume
His archived website
Arrests and mugshots of Lawrence Guzzino (archived copies: 1 2 3)
Bomb-making materials, lingerie found in SUV
Watsonville Man Identified in Castroville Bomb Scare
Highway 1 Bomb Scare Defused
Deputies: No Pipe Bomb Found in Parolee’s Car (website down no archive copy available)
Watsonville man arrested after deputies find bomb-making supplies in SUV
In other words: the war had come fuly home

https://redecomposition.wordpress.com/2013/02/09/case-study-lawrence-william-guzzino/

New Mexico shooting, William Atchison, gang stalking complaints, and being "on the radar: the definition of insanity is doing the same thing repeatedly and expecting different results.

New Mexico, William Atchison, school shooting, active shooter, on the FBI radar
Google has 10, 600 results for the phrases “gang stalking” and “New Mexico.” Here is one comment from a forum about OGS in Alamogordo New Mexico. Notice that “corrupt cops” are implicated, and that sex trafficking ( a major source of federal dollars that flow to the states) is implicated:

The crooked police assist the gang stalkers by alerting them when they have been called, sending corrupt cops to the scene, routing the caller of emergency to the hospital to have them falsely labled as delusional……the gang stalkers also get assistance by the hospital staff that sneak the girl in for treatment because the gang stalkers keep beating them profusely also they transport the girls to various locked areas assisted by the security that work at the hospitals allowing the gang bangers to beat the girls and force them chemical to induce death everybody gets paid from the insurance fraud off of this so they ignore the screams thinking about the money they will collect Many calls for insurance money are made from the hospital staff and homeless shelter staff.
Related Story: Spy Games-how Spooks Infiltrate Online games, and how “white knights” funded by Britain’s GCHQ and sharing information with the FBI hide behind video gaming platforms to manipulate and bully young boys; and some of those who  become mass shooters like William Atchison, who was “privacy raped” before his rampage.
For comparison, note that I recently spoke with an actual targeted individual recently who has hired a private investigator to attempt to re-coup his losses after he was gang stalked. And, get out the ROGS BINGO card in these cases, because gang stalking is real, it crosses all “norms” of society and morality, and it works from within, and from outside of official institutions. As I say repeatedly, each case of OGS is itself a civil or criminal conspiracy from WITHIN official capacities.

Community policing, aka, high policing, aka “insanity and institutional sociopathy”: its what ATAP calls “the parallel colluding invedtigation. ”

The oft-repeated phrase “the definition of insanity is doing the same thing over and over and expecting different results,” appears in pop psychology, group  therapy, Alcoholics Anonymous, and many other places, so much so that it is a “truism” that is well known by most people.
1564392508045
That is to say that “community policing” looks like pure insanity and institutional sociopathy to most people who do not derive their income from the high heeled policing schemes of the DVIC, the PIC, and the MIC in any number of “make work” projects ranging from statistical manipulation in domestic violence cases, to enticing/entrapping/ensnaring/ framing people with drugs after long-term and actual conspiracies against their privacy, to outright creating mass shooters from scratch,with a pretext that the use of pure speech is itself an indicator of crime-that “beliefs” and “talking sh!t” are themselves criminal
This is feminist jurisprudence, because ONLY males are criminalized at any level. Or, high heels policing.
And, it cannot be denied that there is indeed a well orchestrated crisis PR narrative that seeks to push policy that eradicates Constitutional rights and guarantees, ranging from SESTA and now it’s newly morphed acronym of SOPRA (as in “Oprah”) and the first amendment, to pornography and the rights of privacy, to the second amendment and gun control via propaganda initiatives that use people to drive these policies.

Related Story: Police and judges agree that forcing young boys to masturbate is A-OK, as long as it creates MORE child pornography. Meanwhile, in feminist jurisprudence Bizarro world, actual victims of sex trafficking become chess pieces in the billion dollar Eastern Bloc Catholic-socialist version of “save the sex workers,” a multi-billion dollar morality play brought to you courtesy of  the DVIC Moral Panic Theater company.

In the case of mass shooters, we see time and again, that  “suspects” are “on the radar” for days, months years and DECADES of time by any of a number of sooper seekrit agincies. Well-William Atchison was “on the radar” of the FBI for an entire year BEFORE he even bought a gun, or went on a rampage.And lie a pedophile meets a child, or a rapist meets a victim, they met Atchison in secret, at the seat of his privacy: he was playing a video game from his parents home.
He was “in the privacy of his own home” when as-yet to be named psychological profilers, behavioral analysts, and hidden internet operators disguised as gamer’s began to manipulate his mind and his choices.
Then, without a doubt, we can infer that his internet became interesting, his emails were hacked, he was followed, and security theater took place around him. Because gang stalking-and CVE programs- are a full spectrum domination of an individual.
In  other words- this is a pattern in most cases where “active shooters” are, SOMEHOW created. And, then their web presence is carefully filtered before the media. Notice that in the “official presentation” of the shooter’s “intents” that several things are missing

  1. what social media was this on?
  2. what other conversations took place before during and after the evet on that exact platform?
  3. who were his “friends” on that media (provocateurs from Britain, FBI handlers, and military trolls)

First photo shows what investigators say Atchison posted on social media before the shooting. Second photo is what investigators found in trash can at shooter’s home.

So-if the policy of policing is to stop mass shooters, then we see time and time agan that whhatever “they” are doing online ISN’T WORKING. Or: what “they” are doing is insane. But no one wants to say it out loud, because-you guessed it-then YOU become targeted, stalked and harassed; and possibly murdered in one of these institutionally sociopathic events.
The disease is idiopathic, but the effect is ideological: gun control is without a doubt at the center of these events, as we see the link between Rotary Clubs, domestic violence moneypots, gun control and white knights who “stalk the stalkers.”And, the ideological ink is that the FBI shares/outsources it’s dirty work to JTRIG/GCHQ, Britain’s agencies-because while Britain is relatively gun free, and then all of this gets “web scrubbed” afterwards.
Perception Management online, targeted individuals, and Crisis PR planning that precedes mass shooter events
What goes on in the minds of people who are bullied and harassed in their communities before they go on a rampage, or commit suicide, or otherwise create havoc? Here’s what was on the mind of Wiliam Atchison, who was “on the radar” of the FBI and presumably local law enforcement, before he decided to bu guns, “plan” a mass killing, and then, killed two and wounded many more innocent students in New Mexico on December 7th, 2017 (Pearl Harbor Day).
I have highlighted the relevant portion that indicts the social cancer that is America’s devolving two-tiered society of intolerance that has been created by Israelified police forces that work from within secret societies and cults and religious-sectarian frameworks to “incite” individuals into conformity, aka “organized gang stalking”
From Heavy.com Five things you need to know about William Atchison, the New Mexico school shooter:

Work suck, school sucks, life sucks.
I just want out of this sh**.
F*** this state, it really is bad. Think I’m insane? I’m actually more rational, peaceful and less loony than a majority of the citizenry of this entire region.

William Atchison: 5 Fast Facts You Need to Know
All over ROGS here, you will find my critique of modern “community policing,” and Red Squads, and their accompanying Hydra’s of the Panoptical total surveillance state. At any given time, this monstrosity has 17 investigative agencies, five other nations and Israel, and battalions of hidden internet operators ready, willing and able to point their venom, tribal-religious invectives and disguised provocations at single individuals who stand out in some way.
Indeed, as is often repeated online, single women are highly targeted by gang stalking, and frequently, accusations of prostitution or actual prostitution are involved. But when t comes to males that stand out, it is “violence” or “potential violence” that is used as a pretext to target them, individually, in attempts to provoke them.
The cowardly and scurrilous nature of total surveillance states then, hides its bullying and slander behind official purposes, and as such, like cancer, it grows and metastasizes until it becomes synonymous with the host organism itself-and then dies.

Forensic photography and actual gangs: the difference between gang stalkers and actual gang members

UPDATE: Since I chronicled the story below, the web has been scrubbed of the story mentioned herein, shortly thereafter.
That story was about how Canadian intelligence agencies selectively utilize internet and MSM, to create cross-talk (feedback loops ) to speak with mainland Chinese police investigators, while pursuing a suspect, and a gang of suspects.

There is no difference between actual gang stalkers and actual gang members. Zero- Cero. Zip. Zilch. Nada-except for the federal/state paycheck. And the “high policing” basis of criminal morality, of course.
Oh-that, and the fact that official corruption is better financed, far more brutal, operates with total impunity, and it’s illegality and mercenary scope far better hidden from the courts (as we see with the Section 702 and the FISA charade/masquerade ball), because it is easy to pick easy targets and then, drag them before a judge, and say “look! We got a badguy!” because this serves the social purpose of “security theater,” or, what has been referred to in the gang stalking dialectic as “street theater,” finalized by the three well known and often repeated phrases: gang stalking “ends in institutionalization, incarceration, or suicide.”

Related Google Fun: “Bush phone and gang stalking” returns  514,000 results “Obama phone and gang stalking” returns 641,000 results. “Trump phone and gang stalking” returns  750,000 results. Is organized gang stalking just a phenomenon, or is it the emergence of a social contagion? Emergent norm theory predicts that gang stalking is becoming a new normal-and that’s not good for democracy.

The Alcoholics Anonymous  variant is ” incarceration, institutionalization, or death,” and in the online dialogues of gang stalking, we can also find links between it and M. Scott Peck, a Catholic psychologist,and a debunked ponerologist. So, these strange and limited outcomes  of organized gang stalking ALSO and  without irony, derive from the Cult of Bill W., and AA’s across America.In a tenuous way, this links OGS directly to the FBI, and the curious rise of gang stalking complaints.
It cannot be missed that this is a direct dialectical link to specifically James Comey’s FBI, which ran from 2005 until his firing in 2017 because he had turned the agency into a political police that J.Edgar would only drem of, because they didnt have internet drag queen porn durng Hoover’s reign, which would have kept him very busy-possibly TOO BUSY to wage war on American’s.
And, this AA phrase is also linked directly to Mr. Comey’s chosen buddha, Reinhold Niehbur, who is said to have written the serenity prayer(although a few spurious crickets  in the head of Bill W.’s Protestant/Catholic universe dispute the origins-remember; ALL WORDS and SYMBOLS ARE SECTARIAN, and  POLITICAL in “WESTERN” JEWISH-cHRISTIANITY)
Sure- real gangs sometimes use cell phones and computers to stalk, harass, and harm people. But keep in mind that all of THOSE phones are monitored by any of 17 agencies here in the US and hundreds of others in the FiveEyes scheme AS CRIME HAPPENS. Then, the “goodguys” sweep in and grab all the cash from the “badguys”, after pre-emptivey pre-targeting real estate after pre-assessing and pre-apraising and predictively pre-empting crimes that could/might/would/will happen in or on or around a house, aka “real estate;”and that just after they have manipulated a rental property via a Fusion Center, or manipulated a landlord from long distance-Virginia to Minnesota for instance-and filled the property with drug dealers and sex offenders (Google “real estate” and “gang stalking,” or “John Lang Fresno” and “sex offender”).
Tell ya what: if John Forbes Nash didn’t sound nuts BEFORE he met those guys, he sure did AFTER he met those guys. I mean- no gang has anything on this new federal-state-local scheme. The goodguys lost and this is all that’s left of the shredded democracy we all once trusted to rely upon due process. It’s enough to make you wear shoes on your head.
Or:

chinese gangster 20 Photos from a Chinese gangsters lost cell phone (21 Photos)
This is a photograph of a Chinese gangster, in unfortunate circumstances. I ask you, the reader: why does he have a shoe on his head? Google “Chinese” and “sadness” or “mourning” and “shoe’s on head” But WHAT ABOUT THE WATER BOTTLE?

Moving on now: some have at times confused the terminology and blurred the line between “organized criminal gangs” and “organized gang stalkers,” which would be a false binary. As we see time and time again, the Hegelian dialectic has demanded that we choose an “us versus them” paradigm. It also makes us look stupid, corrupt, short sighted, and weak.
As I have noted, I am biologically and psychologically unable to think that way, whereas some 98% of American’s and others from cricket headed cultures think that way by default. I admit: it’s a personal flaw. A fault of my birth, also in unfortunate circumstances in a Catholic-Jewish cultureruled from hidden mechanisms and hidden activity from a sky god who sits “in the cloud.”

Related Stories: What is the FBI’s “bizarre” method of off-the-books harassment aka COINTELPRO 2.0? It’s called a “disruption” campaign. And according to byline.com, these are “How the U.S. Federal Bureau of Investigation is violating the liberty and privacy interests of Americans by using extra-judicial investigations designed to never lead to a formal criminal charge.”

But the problem with that type of thinking is that once “we” adopt it (whoever “we” are on that day/that election/that locality), “we” become gangs ourselves, and thus, there can be no actual morality, and no actual higher purpose. And for me at least, the war on terror has actually been a war on ideas, and the people who have them, because the predatory structure of highly institutionalized and RITUALIZED  illegality (the inter-connected tribal-religious-sectarian FISA/Section 702/Fusion Center/FBI-DHS-CIA ‘backdoor searches’/ political spying/ targeted police brutality/etc) affects some of us, provably more than others of us.
Here- look where their war on my ideas began. I was just a lil’ ol’ amateur journalist then. Imagine where the narrative would be if I hadn’t become a target of their hidden and brutal and constant attacks on my ability to write? I mean-this happened less than three years ago. Whoever the apophonetic “they” are of course, “on that day” in this bizarre inter-connected web of hidden and constant atrocities against liberty.
So as you might guess, I am the crazy guy on the internet, walking around in cyberspace with a pair of shoes on my head, and nothing but pocket litter in my worn out overhauls. And even that, “they” pick through it like a gold strike.
And, as I have documented repeatedly, in many ways, with the best saved for that one important day in the light, because it will take more than me to gain standing to sue this monstrosity of the Panopticon in a court room. And, there is much more than meets the blog- the rabbit hole goes much deeper than your eyes, there, reading this post. And that is what is colloquially called a “Constitutional crisis,” and a well considered challenge to its basis.
Wheeeeeew. I am glad others are on the case now. I’m very tired! I can’t keep the shoes on my head much longer. AND: my green hat falls off when I hang my head, remembering those oddly timed car accidents. But these, too, will have their day in court, again-because, it is in fact, all related.
And look! The ACLU, and the EFF, and the NACDL now has a manual for civil and criminal litigators to challenge government hacking! And generally, it is becoming more widely known that gang stalking” is actually “counter-surveillance stalking” by the “goodguys,” against “everyone else who ruffles their flying pig feathers. Now, if we can just get them onboard with these many entrapment and containment schemes that all agencies are practicing.
That will be THE game changer-when “we” get wider publicity for the fact that kids like the mass shooter in New Mexico are created from the information “sharing” GCHQ/FBI/CVE fraud that targets our son’s online gaming habits on pure speech grounds-or no grounds other than that they are easy targets, alone in “their mothers basements”; and then “privacy rapes” them, while stirring up gender wars via “Gamergate.” How Catholic/Jewish/Protestant is THAT?
Here- have a look at a Chinese gangsters cell phone from 2012, and see how many forensic clues YOU can pick out from his culture/location/situation/status/power.
How big IS this little guy? One western/American/British linguistic feature is to use diminutives like “little” when speaking about Asian men and women, whereas many Asian cultures and specifically Chinese culture uses the diminutive the opposite way- to state that a person has great status and great power)?
chinese gangster 6 Photos from a Chinese gangsters lost cell phone (21 Photos)