Gang stalking and ritual defamation

One of the single most common features of gang stalking complaints is that slander and defamation is being waged behind a persons back. This is also a main fetaure of what psychologiss call “delusional complaints,” of the type suffered by “schizophrenics.” and others who are “mentally ill.” Indeed, religion is often a main feature of schizophrenic delusions as well.

Related Stories: The Case of the “Slenderman” and schizophrenia; then, the odd circumstances where un-empathetic societies that bomb babies and rape our data seek to label others as having a lack of empathy, aka “psycho’s and anti-socials.”

But in politics, certain elements of our western culture suffer the loathsome an literally communicable disease of “neuro-memetic fasciitis of the mind,” too, by spreading memetic slander and defamation by targeting individuals. And, we see this most commonly in politics, academia, and other institutions.

Related Story Update: Bari Weiss, a pseudo-journalist who wrote the defamational smear referenced below has now quit the New York Times, trying to stave off her inevitable firing, and ironically alleging “bullying” and other dubious claims. It takes one to know one, I suppose. See also this post about liar and fraud Sabrina Rubin Erdelywho notoriously concocted the UVA #fakerape story

Few circumstances in modern psychology, sociology, or policing allow us insight into the nefarious practice of gas lighting and official source anomie than the case of ritual defamation, which is widely used in policing, and especially in DVIC gray area policing aka “community policing.”It is this gray area collusion where many civil conspiracies are hatched these days, and I will provide an example below of such a case, and that case, where actual gang stalking takes place.
So, keep in mind that most OGS is the direct actions of local “mobs” of insiders ranging from union members to police and fire, to academics and other institutional forces working together to control an individual, or to craft, or contain a narrative. This is called “framing” in public relations circles, but also is a feature of “bad jacketing” as well. And, the preferred tool of slander these days originates in database abuses, which then frequently becomes the defamation campaign waged in the thin disguise of “police investigatory privilege” via the massive NSA-Israel–FiveEyes data theft that we see today.
So-bad jacketing and ritual defamation is a practice of religious cults and sects who work in institutions and policing, much as we saw with Andy Ostrowski in The Kids for Cash state of Pennsylvania who was targeted by Republican’s, judges, and Scientologists as well ( a virtual trifecta of OGS) because he advocated for judicial reforms, children’s rights to not be bought and sold for state incentive dollars, and more. So, OGS is political in many/most cases.
Asking “Who stole progressivism” is like asking “who stole feminism.” The answer is: the usual suspects at the Anti Defamation League and its related octopus of NGOs.
This was most evident in the last election cycle, when some noticed that the progressive party had been hijacked by an especially vicious form of hate that can only be described as psychopathic-and that, encouraged by people who “are in  the business of hate.” This is how sick our society has become-that hate is actually a business model for psychopaths and DVIC profiteers. And-it proved how hollow their ethos is.
Here is a bit about ritual defamation as practiced by NGO’s and other political elements in western societies as a form of leverage and compromise operation on a grand scale. And keep in mind that these elements used data bases, and then, as we see with many of the new fakerape’s being rolled out every day in the press, actual rapes are being conflated with mere slanderous allegations of impropriety, with the same effect as if they were actual rapes.
This is what ritual defamation IS, and regardless of any opinion for or against the “necessity” of airing all that dirty laundry, we see without a doubt that the same slanderers are involved time and time again-that those who are “in the business of hate” have left their ideological and linguistic, and tactical fingerprints all over the dialogue. This is what the Whisper Campaign IS, which not in-coincidentally, was also a main feature of the Palestinian Exodus of 1948.
So- what IS ritual defamation, and why does it matter? Well, for starters, it is very Jewish. From Yakov Hirsch, citing Laird Wilcox:

It’s important to recognize and identify the patterns of a ritual defamation. Like all propaganda and disinformation campaigns it is accomplished primarily through the manipulation of words and symbols. It is not used to persuade, but to punish. Although it may have cognitive elements, its thrust is primarily emotional. Ritual Defamation is used to hurt, to intimidate, to destroy, and to persecute, and to avoid the dialogue, debate and discussion upon which a free society depends. On those grounds it must be opposed no matter who tries to justify its use

Then, Hirsch goes on to explain how extremely Jewish the smear campaign is in cultural practice and politics, as he cites one after another Jewish whsiperer in the defamation of BDS supporter Linda Sarsour, and Senator Keith Ellison, (D) MN. Also note how the term anti-semite-like fakerape’s-have deflated meaning in such a dialectic.
Then, notice that these smears routinely appear in the New Yarwk Times, just like the original piece about OGS that inspired ROGS blog. The reader will note that my goal is to reduce and eradicate database abuse, to expose political psychiatry/psychology in action, and, to protect future victims, and also provide help for others who are actual TI’s from all folds of this dialectic. But also, to call the blackmailing cockroaches out of their hidey holes.
For me, I encountered people who used the tactics of Gavin de Becker, who is also a Department of Homeland Security contractor. So, for me, there is little doubt that this is one function of this agency, and it’s IA styled black cash hidden domestic operations. Unlike each and every other blog about OGS, here, I provide evidence of these operations, and links to the wider dialectic
Here is ritual defamation in practice, and it is important to note that it is not a delusional complaint:

The reason for this discrepancy over Sarsour is explained by understanding why she is being defamed.

What Linda Sarsour did or didn’t do is irrelevant; the goal is to make her Palestinian perspective taboo. We see more evidence that Bari Weiss has that frame of mind from her description of Congressman Keith Ellison in her same “hate” article. How does Weiss refer to Congressman Keith Ellison?

“Recall that only a few months ago, Keith Ellison, a man with a long history of defending and working with anti-Semites, was almost made leader of the Democratic National Committee.”

To be clear, Bari Weiss is calling Keith Ellison an “anti-Semite.” Non-anti-Semites don’t “defend” and “work with” anti-Semites. But the question that arises is that we know Keith Ellison is not an anti-Semite. Listen to the Jews who know him best….That Ellison is not an anti-Semite earns him no protection from ritual defamers like Weiss.

….It is noteworthy that Weiss’s conscience is clear, that NYT readers will leave her “hate” column believing Keith Ellison hates Jews. Anti-Semitism is a stain Ellison will never remove. Think of the real world “hate” Weiss intended for Ellison. But Keith Ellison being a “Muslim peacenik,” as JJ Goldberg called him, offered him no protection from Weiss. Because from Weiss’s right-wing Jewish perspective, Keith Ellison has a “forbidden attitude, opinion or belief” that must be made taboo.

We clearly see that ritual defamation is both a feature of politics AND a main complaint of those who are gang stalked. And with little to no doubt, we see that organized gang stalking is in fact and practice, a very Jewish tactic-but also a mob tactic- of social engineering and control. In the example above, we see it toxifying progressive politics, and revealing Jewish racism, but also, we see that all roads lead to Israel, no matter whose side you are on. It’s a win/win for that lobby.
Now, let’s look at community policing for signs and symbols where social interactions can be forensically analysed to see if they are affected by OGS; to see what kinds of politics are involved. But also, to see what kind of “electronics” and databases are used to target individuals.
Here is a case where Bijan Ebrahimi, a crippled immigrant, was pedofied by local police and community stalkers who likely were on his internet connection. “They” eventually murdered him, and set him on fire after a seven year long stalking, and some 80 calls to police, where he was “framed” as an unstable liar, and a pedophile. Welcome to the new religious theocracy! And, the “scapegoat” of Catholic and Jewish rituals, and kabbalists.
Here below is a comment from 2004, when both the internet, and organized gang staking as an occut practice, and gang stalking as a political and social engineering tactic took hold across America. Note the specific name of a specific council member who was named in the blog, the use of coded symbols, the mention of ‘mob’ activity’, as well as elements from police and firefighters being implicated as stalkers. Then, notice that license plates are being tracked (click the link to the full article).
This license plate tracking is not insignificant, because as we saw in the case of the Electronic Peeping Toms of Minnesota and the police stalking of Minnesota reporters, journalists, and lawyers around 2011 (just after the DHS ramped up sectarianism and selective enforcement of law and surveillance) TODAY, we see Automated License Plate Reader’s (ALPR’s) in use across the country. Imagine the impact on or political climate? Then, add the NSA full capture database that has been collected since then…..
From LA Indy Media in 2004:

How to otherwise explain the kids all driving around with the decals?
Well, we make them nervous. And they should be….if they are breaking the law.
Maybe this is why GEORGE NAKXXX, YAKUZA BACKED STATE ASS-EMBLYMAN, gets so much support from some firemen’s cells – uh, we mean unions.

I have preserved this conversation here as well, because frequently, webwashing takes place just AFTER I write about or document online evidence of OGS. But like the example of Who’sA Rat which I provided here, from that same era, we see that OGS is very real, and that attempts are made to control the public’s insight into this nefarious practice. And, so, here we see state paid and union backed actors actively subverting the law-or in the least playing hide and seek on state dollars.
Lastly, here is more about RD from Aletho News:

Ritual Defamation: A Contemporary Academic Example

By Daniel McGowan | Dissident Voice | September 22, 2017

The term ritual defamation was coined by Laird Wilcox to describe the destruction of the reputation of a person by unfair, wrongful, or malicious speech or publication. The defamation is in retaliation for opinions expressed by the victim, with the intention of silencing that person’s influence, and making an example of him so as to discourage similar “insensitivity” to subjects currently ruled as taboo. It is aggressive, organized and skillfully applied, often by a representative of a special interest group, such as, ironically, the Anti-Defamation League.
Ritual defamation is not called “ritual” because it follows any prescribed religious or mystical doctrine, nor is it embraced in any particular document or scripture. Rather, it is ritualistic because it follows a predictable, stereotyped pattern which embraces a number of elements, as in a ritual.
Laird Wilcox enumerated eight basic elements of a ritual defamation:
First, the victim must have violated a particular taboo, usually by expressing or identifying with a forbidden attitude, opinion or belief.
Second, the defamers condemn the character of the victim, never offering more than a perfunctory challenge to the particular attitudes, opinions or beliefs the victim expressed or implied. Character assassination is its primary tool.
Third, the defamers avoid engaging in any kind of debate over the truthfulness or reasonableness of what has been expressed. Their goal is not discussion but rather condemnation, censorship and repression.

Now, when  factor in these facts above, and add to them the “delusional complaint” of schizophrenic paranoid anxieties about whisper campaigns, we see a new picture emerge, and it indicts this practice, and the official source gas-lighting that gies along with it.
I ask the reader to look back upon my thesis and do their own homework now. But also, to note how easily Big Pharma psychologists and prison profiteers work within the OGS Big Data abuse schemes-they are the perfect mockingbirds. Because crisi public relations firms do more than just create messages: they monitor them too, and that, sometimes in real time as the monitor individuals.
Related Story: The Association of Threat Assessment Professional(ATAP ) calls OGS the “colluding parallel investigation. ” ATAP is also on record linking the police and private contractor, multi -agency blur of “community policing ”to gang stalking. But also, to agencies that are affiliated with Fusion Centers, and who literally practice what is called psychological operations.

The Shirky-Masnik bureaucracy perpetuation principle

In well organized assaults waged by governments that work in hidden capacities to enforce and socially engineer a society through constant attacks on civil liberties, we frequently find useful idiots who willingly place themselves as obstacles to free speech, and especially, as obstructionist forces that ‘steal time,’ aka ‘time-thieves.’

these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.
-Mike Masnik of Techdirt.com

Organized gang stalking is one such case where we see this at work-how bureaucracies work in “the gray area of law and social oversight” to prevent insight. This is best embodied in the common phrase that appears in the OGS dialectic “what is hidden” which some use because it is a Masonic/other symbolic speech, while others use it to flaunt their access to the many hidden technologies that I document herein, as well as their ability to abuse others in this capacity.
Obstructionism and OGS are Partners in Crime and Civil Consiracy
Techdirt.com does some of the most reputable, fearless, well written public interest journalism in the history of technology-and journalism. As such, while most MSM journalists cower(or put on their knee pads and slurp down some payola) in the face of the 72 Billion dollar per year NSA/CIA/FBI/DEA privacy rape machine, Mike Masnik, and the excellent writers over there have incurred their unfair share of  detractors.
And, as can be predicted, some of those detractors are little more than liars and punks who live in their mothers basements, and guys like Shiva Ayyadurai, who claimed he invented email. And gay robotic toilet slaves, like Peter Thiel, the guy who worked hard to subvert ALL democratic liberty via the Palantir/CIA/Google collaboration. Notably, Thiel has skipped town, and run off to New Zealand, where he is hiding out, no doubt doing “special work” for his corporate and military and CIA overlords.
In the fight to demolish free speech, the MIC and its DVIC handmaidens use every dirty trick, every crooked backdoor trick to obstruct due process and civil rights; but also useful idiots like Thiel and Ayyadurai are the  backup girls for the band of merry robbers who wantonly lie, cheat or steal to destroy the rights of others while getting filthy rich. They are the contrarians of logic, and the cock-block of free enterprise; and it begins with their pillow bitingly wimpish and vain, immature, fascist impulses, attacking pure speech and then, the free press.
SO it cannot be missed that these same are also on the forefront of the technologies that are currently accessing other peoples privacy via their “inventions, and imputing to those who they steal from “intentions” that are not only false, but aslo” classic Freudian projections, and in that light, they are also perverse voyeurs.
A world of smoke and mirrors indeed. From Techdirt.com, Mike Masnik scores a victory over Shiva Ayyadurai’s perversity, and his perversion and abuse of law:

Case Dismissed: Judge Throws Out Shiva Ayyadurai’s Defamation Lawsuit n

As you likely know, for most of the past nine months, we’ve been dealing with a defamation lawsuit from Shiva Ayyadurai, who claims to have invented email. This is a claim that we have disputed at great length and in great detail, showing how email existed long before Ayyadurai wrote his program. We pointed to the well documented public history of email, and how basically all of the components that Ayyadurai now claims credit for preceded his own work.
We discussed how his arguments were, at best, misleading, such as arguing that the copyright on his program proved that he was the “inventor of email” — since patents and copyrights are very different, and just because Microsoft has a copyright on “Windows” it does not mean it “invented” the concept of a windowed graphical user interface (because it did not). As I have said, a case like this is extremely draining — especially on an emotional level — and can create massive chilling effects on free speech.
A few hours ago, the judge ruled and we prevailed.

Now- an object lesson in how all of these companies-and then, their complete subversion of intelligence agents and agencies have the ability to destroy speech at the switch. Look at this paragraph below:

The Shirky Masnik principle states that bureaucracies will d anything to perpetuate themselves-anything.. And that includes using total sh!tbags like Ayyadurai, or his counterpart in institutional sociopathy, Peter Thiel-who was so mad that he was outed as queer by Gawker media that he sued it into the dirt and put it o ut of business. to subvert the very foundations of both free economies, and free democracies.

 
Do you see the paragraph -how convoluted and broken it is? This paragraph was written as this blog, and the computer it is written with, came under ‘attack’ by ‘unknowns’ and the browser froze, and Tor reported multiple “j-script’ malfunctions. And this, just one day after the same browser, on the same computer, was crashed using an attack I cannot identify-one where the browser opened repeated multiple windows until it was useless ( I could identify it, but I am still researching that particular attack).
You see- speech itself is under attack, by the multiple agents and agencies I describe herein, and that attack is at the site of the speaker, which is me in this case, but this goes on all across democracies everywhere, as the United States, working with the Five Eyes Alliance, and literally HUNDREDS of other agencies, NGO’s target speech itself, online speech, and all other media with disruption campaigns; in this case at the site of speech itself as I type into this blog.
I document this as well as note its psychological, and ‘real world’ effects here, but elsewhere too, I have records of these attacks, which are incessant. And in the “TI” community of gang stalking victims, this is an extremely common complaint, and dis-information agents can be found mocking TI’s with comments such as “yes, I have heard that TI’s frequently complain about sticky keyboards, e-mail theft, and computer hacking.”

In fact, hacking “target’s” is what the NSA and the rest are doing, as even the famous (and well funded) “OSI informers” has noted, alongside the fact that TI’s are also targeted with other nefarious attacks such as “porn deluges.” I have preserved a copy of the web page where OSI informers makes this claim, because frequently, the web gets “scrubbed” after I validate one or another fact or tactic of these hidden operators at our internet switches, and the thousands of programs that are trained on TI’s.
Here is a snippet of “OSI informers”claim/advice:
CYBER-STALKING

Cyber Stalking or Cyber Harassment is a related group of harassing behavior occurring via internet/online. Cyber Stalking includes, but is not limited to; Computer Hacking, “Trolling”, Spamming (Often including “Porn Deluges”, Verbal Assaults, Character Assassination, and Impersonations of the victim. Online harassment is a plank of the harassment protocol. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you.

Now- I will rewrite the paragraph above as it was intended, but I note that my computer literally heated up to an extreme degree, and I was forced eventually to crash the browser, reload, and change settings-this is what is called a “social engineering attack” where hidden operators force the user to change behavior, aka “behavior modification.” And I note that while my computer is less secure in this second attempt to write this post, I can write easily now. See how that works? Seeing any patterns yet?
The Shirky-Masnik Bureaucracy Perpetuation Principle
The Shirky Principle forms the headline of the following piece of writing by Mike Masnik of Techdirt.com forms the Shirky-Masnik Principle stated as below describes how OGS online has become an institutional force,with offline consequences, and especially, how writers are targeted by morons with kewl toolz directed at us from ilitary bases, police and Fusion Centers, as well as NGO’s with dominionists, zionists, and Infragard rats working behind the scenes:

Institutions Will Seek To Preserve The Problem For Which They Are The Solution

by Mike Masnick

Filed Under:
business models, innovator’s dilemma, institutions, problems, solutions


from the the-shirky-principle dept

We already wrote a detailed analysis of Clay Shirky’s recent writeup on complex business models. However, a few of you have sent over Kevin Kelly’s recent post about Shirky’s piece that also compares it to Clayton Christensen’s Innovator’s Dilemma, but thankfully highlights the one key line in Shirky’s piece that may have gotten lost in the original:

“Institutions will try to preserve the problem to which they are the solution.”

Kelly calls this the “Shirky Principle.” To me, it calls to mind Upton Sinclair’s famous line:

“It is difficult to get a man to understand something, when his salary depends upon his not understanding it!”

They are not the same point, but they are related. In both cases, these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.


Organized gang stalking and confidential informants

One of the common themes in the OS community is the idea of recruitment. While most if not all domestic intelligence agencies and even police departments today fancy themselves as “intelligence agencies,” and disregard the Constitution accordingly, less is known about how they ‘recruit’  informants. The general dialogue round OS is loaded with references to this, and once a researcher recognizes the language, it is readily apparent that this is true.
In my experience, in the organized gang stalking dialectic, I have been approached many times and asked directly ” do you want to become an informant??” And this often on Twitter in a DM that disappeared shortly thereafter! Any researcher could set up their own honeypot and replicate my results, but for me it was a learning experience.
Then,upon confirmation that this was so, I re-read a few blogs of note, and confirmed the theory. There is a website that attracted a ton of negative attention from law enforcement back in the early 2000’s call Who’saRat.com, which was eventually forced offline-ironically- in a well organized stalking of their links and content. It was not only a foreshadowing of the oppressive total spectrum dominance that we see today, but also a canary in the free speech coalmine.
Here’s one post about how this program is intended to cause what is called in sociology a “social death,” for an individual, and control them to the point where they have learned helplessness:

It is not like I am using this medium to express myself in anonymity. Every single Organized Informant “GangStalker” and colluded Bad Cop knows my identity. I am the one who wants to end this. I WANT TO TURN MYSELF IN! Please tell me what precinct you want me to go and I will show up. NO JUDGE will accept a guilty plea once they learn that every piece of this case -my case- is tainted and biased because of personal HATE against me. So when and where is gonna be? Please tell me!
I want Due Process,
I want a Fair Trial,
I want the Best Defense,
Isn’t that the way is supposed to be?

This fabulous site was one of the early predictors of our current “if you see something say something” culture where every American is being asked to become a rat, the lowest form of life in any culture except the communist bloc nations where being a rat means being a good citizen. East Germany under the Stasi was a great example of a culture where each intelligence agent had some 30  or so citizens reporting to them (I will check that stat later).
Pretty soon, East Germany was crawling with rats, but had no free citizens, as the master plan of all communists and fascist communists is total control of citizens.
From Spiegel Online:

Web of Surveillance East German Snitching Went Far Beyond the Stasi

Everyone knows about the Stasi and the extent to which it spied on the East German populace. But that was only a small part of the informing that went on. New research shows that snitching was vastly more common than previously thought.

DPA/ akg-images
July 10, 2015  05:05 PM

One day in September 1987, the phone rang at the headquarters of the Volkspolizei, East Germany’s police force, in the town of Döbeln, not far from Dresden. On the other end of the line was the voice of an unknown man.

“Good evening. I have some information for you. Grab a pen!”
“I’m listening.”
“Ms. Marianne Schneider is traveling on Wednesday, Sept. 14, to West Berlin for a visit. She doesn’t intend to return.”
“And who are you?”
Silence.
“You would like to remain anonymous?”
“Yes.”
“What is the basis for your information?”
“She said so, to her closest friends.”
Then, the mysterious caller hung up. And Marianne Schneider* had a problem. Officials immediately revoked her travel permit and began monitoring her phone and mail in addition to questioning her neighbors and friends.
 

These rats reported also important stuff like:
“My neighbor uses too much water.”
“The guy downstairs looks at me funny (but not because I am a rat).”
“The woman across the street has two lovers,” and so on.