Organized stalking and “mind control” and influence operations: manipulating voters.

Epilepsy warning: this post contains a swirling graphic image

While our governments, our corporations, and our intelligence and law enforcement agencies believe it is their right to steal our data, and use it to maniulate and even abuse certain people and to wage influence operations on us, in secret, I believe in fair warning, in anticipation of un-intended consequences, hence my epilepsy warning above. This is the difference between consensual behavior, and non-consensual behavior, and the NSA/CIA/FBI/DEA data theft pipeline had  15 year head start on all of us.

Except, me, maybe.

Any cursory research into organized gang stalking reveals that politics are a major factor in “who gets targeted with OGS.” While there are varying levels of targeting, ranging from simple “influence” operations through the internet, to extreme cases where local politicians and others gang up on individuals to harass, intimidate, or otherwise coerce them, the most common “targeting” that individuals face is through advertising.

As we saw in the caase of “Moonshot CVE” and in the cases of Twitter monitoring activists and feeding the data to law enforcement and other un-named parties, and programs like DataminR and Media Sonar being used concurrently at Fusion Centers, and the local police department, as well as yet un-named intelligence agency level programs, there is a constant blurring of lines between advertisers, governments, political PAC’s corporations, and then, police and intelligence agencies targeting of activists and others in spying or conformity enforcement operations.

WElcome to PsyOps, and mind control, and “influence by constant suggestion.. Or, this:

Image result for swirling black and white gif

So, to put this in common terms, imagine yourself walking down the sidewalk, dodging blots of chewing gum, and the residue of mop water dumped across your path. These are ordinary pedestrian obstacles, and most people expect some of that when out walking.

As you continue on your  path, all of a sudden, a bicyclist heads straight towards you, so fast that they seem as if they might just run you over. What do you do? Of course, you step aside, thinking-“what a rude prick. I had the right of way- and bicycles are supposed to ride on the street!”

You brush it off, and continue on your path. An the obstacles become more and more: the couple walking along is as wide as the sidewalk, and you step off into the grass to let them pass. And then, five teenagers on skateboards; and then, at a crosswalk, people are bumping into you from all directions as if you are not there.

These scenarios above are what is described by TI’s who are being gang stalked, and particularly in the last example, this is what is known as “community mbbing,” and also “street theater.” TI’s write endlessly about this online, but they are also described by others who “suffer delusional disorders.” What’s the main difference? Proof- proof is required to indicate that such is actual, real, and happening to you.

In OGS, proof is hard to get, because of the design of community harassment and community policing, but online, it is easier to prove, now that we know with certainty that it IS happening, it IS targeted, and it IS political. And, as we see above, it IS attempting to influence you, your behavior, and your choices.

Here, below, from Breitbart News, we see targeted individuals as swing voters, but we also see that language and particularly, coded and slanderous language is used to label, and further harass or otherwise cause harm to individuals who don’t toe a party line.

While on the surface, it cannot be missed that this targeted “outreach” is yet another example of Democrat demagoguery, it also cannot be missed that “hetero-normative white people” are being labeled in ways that can and do trigger the Department of Homeland Security “threat matrix” and “bad words” lists, as “white supremacists are on every list as “hate groups”:

NH Dem Party Chair Calls Rural, Disaffected Voters ‘White Supremacists’

 

This weekend WMUR’s “CloseUp” interviewed the executive director of “Look Ahead America” Matt Braynard, whose new organization is planning outreach to inactive voters in New Hampshire.

Braynard said, “We’ve identified maybe 15,000 inactive voters who we would consider disaffected, patriotic Americans. And potentially 100,000 or more unregistered adults we’re going to reach out to.”

He explained his organization was using “psychometrics,” saying, “Normally it gets applied to likely voters universes for purposes of persuasion. We are applying it towards identifying patriotic Americans who’ve become disaffected and cynical, so we can engage them on issues relevant to them, get them registered, get them educated and turn them out to vote.”

In response, the chairman of the New Hampshire Democratic Party Ray Buckley said, “The organizing and activating of these extremists, these white supremacists, really could have a detrimental effect on the entire culture of New Hampshire.”

In the aricle above, note the use of the word “psychometrics” which literally means ” the measure of psychological effects in order to cause persuasion.” This is not insignificant, as we see that “influence” is the goal, and that “psychology” is applied as a tool.

In relatively harmless incidents such as this, we must ask ourselves if “influence operations” are harmful, and most likely come up with the answer that they are mildly intrusive, but not necessarily “causing harm.”

However, in these cases, when we add the fact that the data used is derived from the “profiles” that our own ISP’s have sold to outside organizations; and that these profiles are shared and re-sold across gvernment, private industry, political PAC’s, the Five Eyes Alliance, and even in the case of Israel, that our profiles are literally given to a theocratic, apartheid nation state that has not signed any nuclear treaty or even officially disclosed that it is a nuclear power the story of harm versus “no harm” becomes a question that few are willing  to ask out loud; being used against their and it becomes a question where the individual this targeted must make a stand, or simply succumb to being used against their free will in such a manner.

So, this issue of “supremacy” becomes for some of us, a crucial and key point wherein we must ask “whose white supremacy” is being targeted and whose white supremacy is not (most Israeli’s and other supremacist Jews still encourage their daughters to marry only white men). And certainly, other theocratic, nationalistic, racial, and psychological  supremacy becomes part of each persons targeting as well. So-whose decisions are we actually making when we are under chronic and constant “influence operations”?

Regardless of the answer, there is one other level of questionable targeting: the fact that beyond advertisers profiling us, we also have intelligence agencies profiling us, and then, targeting us as well, individually n levels that only nazi maad scientists were able to conceive of in decades past.

Because the past is the present is the future with intelligence agencies, we know with certainty that other, more nefarious and unethical targeting takes place, and that this takes place in secret, without our informed consent- that this entire internet entrapment scheme that has made everyone a target, has now morphed into a wider scheme of political targeting on the ‘consumer’ level; and that despite the consumer’s awareness that it is them, being consumed first, and targeted advertising only after that.

So beyond the citizens rights to protest or even to withdraw from these big data schemes, or the use of our data to make us targets, multiple levels of targeting are taking place at all times, and our decisions are under constant and chronic attack.

Copies of Nothing: police psychology and the replication of power through willful ignorance, and bullying.

It is nearly impossible to impute to the reader how disproportionate the telling of the story of “targeted individuals” of organized gang stalking is in terms of power versus those who are powerless; or that the issue of “TI’s” is in fact one of “first they came for the ________, and I said nothing, because I wasn’t a (member of the Beatrice Six). But the fact is that beyond interagency collaborationn to subvert the Constitution in the name of “goodguyism,” only the little guys and gals get targeted, while others get “flipped” or otherwise compromised.

So let’s take a look at one of the many illegal database schemes that has been minimized or eradicated from our ability to view this illegality in the press, and where innocent people and Americans were targeted by an intelligence agency that was really a multi-agency Hydra of subversion on American-and international shores.

The DEA and the SOD database: They needed a code word to describe their voyeurism, and then, to discredit those they targeted with clandestine, illegal, iun-Constitutional HUMINT campaigns of coercion and terror.

Let’s first take a look at “police psychological profiles” that are generally stuck somewhere in the toilet, as most of the religiously afflicted are, and then, add the opportunistic and voyeuristic and eugenic nature of feminist jurisprudence through the eyes of Kurt Vonnegut, who was popular with militarist feminists during the rise of the neocon “left” and the DVIC, where we discovered that women’s violence is well financed, and internationalist, because “hungry hungry hungry!“:

From “Breakfast of Champions,” where Vonnegut- a survivor of the fire-bombing of Dresden– critiques “white male power” but forgets to note “white female privilege,”which is perhaps more deadly, if Dresden, or Holodmor are any example .

wide open beavers.jpg

So, voyeurism (the NSA to local LEO data theft pipeline) and photography ( they frequently make threats that they have secret databases with TI’s pictures in them; and agencies are indeed using our televisions and our laptop camera’s to spy on us) is a major them of these neo-fascists and their Hegelian counter parts, and the “TI” is their secret passion, as women’s deviance and violence takes different and creative forms.

If I showed you pictures of “TI’s” you might laugh, or mock them somehow, as many of them appear in mug shots, due to the disproportionate force and fury with which western societies prosecute the poor and the disenfranchised. Many of them, like the now-famous Timothy Trespas, are easily discredited because they “don’t look like “us”.”

Odd, how the bane of aging white feminists everywhere-“lookism” has become the exact tool with which these target and harass people in official source gas lighting, such as the case where the New York Times Mike McPhate conspired with Lorraine Sheridan to cover up this crime in last years article.

I have written about TI’s from a variety of standpoints, but one thing that can be said with certainty is that they are frequently “not” super models or muscle bound ‘heroic’ figures from ancient Greece, though there ARE exceptions. And, like anyone, they ave their faults and flaws.

What makes them different though, is that they are often stripped of the pretenses of power fairly early in life, and have frequently been labeled by those who value power. As such, as Glenn Greenwald has noted, they have “no place to hide,” when operations like the illegal and warrantless  NSA/DEA/CIA/FBI decides to turn their lives into a free for all. so beyond merely being involuntary HUMINT assets, they are also mocked for being so, and with the approval apparently, of “psychology,” despite NONE OF THIS being authorized or even acknowledged in a legal framework anywhere.

I recently spoke with a man who was forced onto a stretcher in a “set up,” to try to create the appearance that he is mentally ill, which is bad enough. But the story gets really sick when he describes how “there was even a photographer present taking closeup pictures of my face as they did this.”

And I spoke with a woman whose neighbors-wonderful progressives in a “progressive” city, framed her as the neighborhood crank as they waged loud parties next door. Her mugshot looks exactly like that. And then, after they got a fifty year restraining order on her (because she told the judge ‘why don’t you just make it ten, twenty or forty years’) they moved away! See how that works- let me know if you start seeing patterns-because seeing patterns can indicate delusional thinking.

So, the claim that communitarian policing is framing people is not unusual, nor is it unprecedented when individuals take a stand against this nefarious bullying. And this is no small claim, nor is it an uncommon one in the “frame jobs” that much of these make-work projects of our current government is involved in.

And the internet abounds with video’s of “authorities” in power citing vague “rules” or even more un-Constitutional “policies” that prohibit photographers from filming them-public servants-at work in public. So, without a doubt, photography-which is NOT a crime- has become a tool with which institutions collaborate to defame those it targets.

In the video below, some from the DEA gets their authoritarian asses handed to them by an individual who knows that “policies” and “rules” are not LAWS, and that-for now- citizens still have the right to film and photograph these cowards who work anonymously from behind the internet switches plotting the destruction of free speech rights, due process of law, and more; that these who invade our privacy with impunity, and from behind the veil of absolutist secrecy are themselves annoyed by cameras.

And,  the citizen knows that people who cite policies and rules are in fact cowards who hide behind authority, and mobsterism, and the psychopathology of institutions that are destroying Democracy with obstructionism in the gray area of law.

And especially, note the license plates, as these federal agents work in a state that has granted official “anonymity”to public “servants.” In order to understand “what is a police state” one must understand the “privileged immunity and institutional anonymity” of these operatives.

And this, below, is what breeds contempt for the public by these same. And it cannot be missed that the photographer is described as being 5’4″ tall, and is standing against men and women who top the scales at body mass and weight. Welcome to feminist jurisprudence and policing! It seems that the “little people” are an extreme threat:

MUST SEE VIDEO:

“Fascist DEA Scum bags attempting to Censor 1St Amendment freedom of Press”

 

But for the most part, many if not all TI’s are the product of inter-generational bullying by institutional forces ranging from neighbors and schoolmates to police to mental health professionals, and the hidden networks of “goodguys and gals” who somehow see nothing wrong with “piling on.”So in order to understand my version and interpretation of “TI’s” and OGS, it requires that I define “what is a coward,”as you and others who research organized gang stalking will note that claims that GS are cowards are quite frequent in the online dialectic of OGS, and in fact a staple comment.

So, it cannot be missed that this individual filming is a 5’4″ sprite, unarmed, and questioning the authority of those who are IN FACT AND IN PRACTICE a huge factor in OGS online dialogues. Nor can it be missed that each of these photographers is practicing their rights against thousands of pounds of human meat that makes it’s living from violence, and that they are all armed.

So, beyond institutional sociopathy, and psychopaths whose sickness finds a welcome home in institutions of power, I personally view TI’s as “not mentally ill” anymore than those who pursue them, and “pile on.” It is instructive to note two things about this “phenomenon” that will help put it in perspective

  1. many of those who are “targeted” are people whose civil rights and due process rights were violated in durations of time that defy imagination and are frequently derived from warrantless surveillance and the “War on Terror.”
  2. Nearly all of them that I have talked to report bullying, and “strange” internet encounters with hidden bad actors

Read together, these form a narrative drawn from the replication of status quo superstitions and outright mythological lies that form the narrative of police and state power psychological basis, but also, plain old bullying by any other name.

So, here below is a link farm to stories about how the DEA (which is inseparable in mission or tactical applications, and methodology from the CIA at this point) used a database to illegally, and un-Constitutionally profile, monitor, perform surveillance and harass American citizens.

And for those of us who walk “unarmed” in the world with the expectation that these “goodguys and their gunz and bomz” won’t shoot us for excercising our rights is in fact and in practice, true bravery, because we KNOW they are murderous, slanderous, malevolent crooks who love to “shine a light” on “we the people” but somehow, cringe when the light gets cast on them-or scurry away like cockroaches-the video above is prima facie proof of that.

Special Operations Division (SOD) database abuse and lawsuits to follow? Who would even know where to look for the proof? I have an idea- ask those crazy peepl in the TI community!

Testilying as security theater and “goodguyism gone wild!”: How DEA agents and all other LEO’s use illegally obtained data to create and then “dry clean or launder” a case, aka “parallel construction-as well as to follow peole around and do plainly bizarre sh!t to their internet connections, telephones, cars, homes, etc, etc….

http://bangordailynews.com/2013/08/05/politics/agents-ordered-to-cover-up-dea-program-used-to-investigate-americans-critics-say-methods-unconstitutional/

More on parallel case laundering, dry cleaning alleged crime, and illegal spying

http://www.businessinsider.com/dea-agents-cover-up-spying-program-2013-8?IR=T

Prosecutors and supervisors cover up the program that covers up illegal spying, of “cover up squared,” layers upon layers of subterfuge and criminality from “the good guys and gals”

http://www.rawstory.com/2013/08/secretive-drug-enforcement-agency-dea-unit-told-to-cover-up-massive-spy-program-used-to-investigate-americans/

The cover up of the cover up of the cover ups, layered in a discrediting narrative, aka “who are targeted individuals?” What happens to targeted individuals?”

http://www.reuters.com/article/us-dea-sod/exclusive-u-s-directs-agents-to-cover-up-program-used-to-investigate-americans-idUSBRE97409R20130805

Organized stalking and police surveillance of social media: ACLU notes that targeted ‘influencers,’ activists and other TI’s are ‘real’

Police Use of Social Media Surveillance Software is Escalating, and Activists are in the Digital Crosshairs

By: Nicole A. Ozer
Map of California, with dots marking the areas where local law enforcement has acquired social media monitoring software

It goes without saying that speaking out against police violence or government overreach shouldn’t land you in a surveillance database. But it can, and it does.

The ACLU of California has received thousands of pages of public records revealing that law enforcement agencies across the state are secretly acquiring social media spying software that can sweep activists into a web of digital surveillance.

This set of public records requests is part of our ongoing work with community groups to shine a light on surveillance technologies and call for community control in decision-making around policing. Last year, we worked with local activists in Fresno to reveal that its police department was using a MediaSonar social media surveillance tool that boasted the capacity to identify so-called “threats to public safety” by monitoring hashtags such as #BlackLivesMatter, #DontShoot, #ImUnarmed, #PoliceBrutality, and #ItsTimeforChange.

But we had a hunch that Fresno was not an isolated case.

So this summer, we requested records from 63 police departments, sheriffs, and district attorneys across California. And what we learned from the documents was alarming.

Of the responses we’ve received, 40% of the agencies (20 in total) have acquired social networking surveillance tools — many of them in the last year.

We found no evidence in the documents of any public notice, debate, community input, or lawmaker vote about use of this invasive surveillance.

And no agency produced a use policy that would limit how the tools were used and help protect civil rights and civil liberties.

The utter lack of transparency, accountability, and oversight is particularly troubling because social media surveillance software used by California law enforcement — tools like MediaSonarX1 Social Discovery, and Geofeedia — are powerful. And our records from Fresno and several other communities reveal that some have been marketed in ways to target protesters.

Our records show that Geofeedia’s marketing materials, for instance, refer to unions and activist groups as “overt threats,” and suggest the product can be used in ways that target activists of color. At least 13 California law enforcement agencies have used or acquired Geofeedia.

In one exchange with law enforcement, a company representative suggested to San Jose Police that they should use the product to surveil the “Ferguson situation,” even though the city is roughly 2,000 miles from Ferguson, Missouri. San Jose Police did in fact use Geofeedia software to monitor South Asian, Muslim, and Sikh protesters only a few days after acquiring it.

An email to the San Diego Sheriff touts a “collection” of social media content curated by Geofeedia following the non-indictment of Darren Wilson.

And yet another promotional email invites the Los Angeles District Attorney to learn how Baltimore used the software to monitor and “stay one step ahead of the rioters” after the police killing of Freddie Gray.

Law enforcement should not be using tools that treat protesters like enemies.

The racist implications of social media surveillance technology are not surprising. We know that when law enforcement gets to conceal the use of surveillance technology, they also get to conceal its misuse. Discriminatory policing that targets communities of color is unacceptable — and secretive, sophisticated surveillance technologies supersize the impact of racial profiling and abuse.

The good news is that we’ve seen that when surveillance is forced into the light, communities have the power to call out racist policing practices and stop discriminatory surveillance in its tracks.

Remember Fresno? Armed with proof of Fresno’s social media surveillance experiment, a diverse coalition of local activistsknown as Faith in the Valley successfully mobilized and organized to pressure the police to roll back their social media surveillance program. The community is now pushing to pass a surveillance technology ordinance to make sure all surveillance technologies are publicly debated.

In Oakland, community members organized against plans to build an expansive Domain Awareness Center that would have collected and stored hundreds of terabytes of data on Oakland residents. Now Oakland has a Privacy Commission that advises the City Council on surveillance decisions and is currently drafting a surveillance technology ordinance.

And in Santa Clara County, right in the heart of Silicon Valley, a diverse coalition successfully organized against plans to buy a Stingray cell phone tracker and then worked to enact a comprehensive surveillance technology ordinance that requires transparency, accountability, and oversight for all surveillance technologies.

In this spirit, a powerful coalition of national organizations is launching a multi-city legislative initiative, Community Control Over Police Surveillance (CCOPS), to introduce more local laws to bring transparency and community control to the acquisition and use of local police surveillance technologies.

Here in California, community members are working in Palo Alto, Fresno, Oakland, Berkeley, Santa Rosa, and Santa Cruz to ensure that similar laws are introduced in their cities.

Whether it’s social networking surveillance, stingrays, or something else we haven’t heard of yet — it’s time to push secret surveillance into the light.

We have the power to stop discriminatory surveillance and put control where it belongs — in the hands of the community.

Nicole Ozer is the Technology and Civil Liberties Policy Director at the ACLU of California. 

Read more about community control and surveillance technology in California:

Val is an electrician, and he was approached as a gang stalking recruit in an environment loaded with Durkheim’s ‘anomie’

Val is a merchant mariner, one of the most noble professions I can think of. When he is not at sea, he works with his family as an apprentice electrician, in a wealthy area of a large city. Then, like most men who are men, he spends some time when he is not at sea hanging out with other men in gritty urban environments, and associating with friends from where he grew up.

The only problem for he and his friends is that they all grew up black-and in one of the biggest and most notorious urban ghetto’s that is a virtual powder keg of the toxins and effects of racism and the disparity of wealth. And, they grew up on a watchlist called the CalGang database, which literally monitors gangster babies from birth as if they are a threat to “organized society. And this database like so many others today which are hidden beyond the view of those who are catalogued in them-this database presumes criminality from birth. As such these men are literally and in every sense “targeted individuals.”

As you have probably guessed by now, Val is black. Such is the power of stereotypes, but also the power of language used in propaganda-most western people believe that blacks are the primary residents of ghetto’s ( an out dated term in itself, as “the hood” is used by ghetto dwellers all around the world due to Hip Hop music.) And as such, Val hangs out with other black people. And unlike Jewish ghetto’s of earlier era’s, these men are not self segregated.

” I hang out there when I am not at sea, because it’s my way of giving back, and trying to let them know there’s more than that-living there.”

What Val is saying is that he was fortunate, and that he “got out,” of the enforced entrapment and containment scheme that American ghetto’s are-and that in order to inspire others, he feels he has a duty to go back and “associate” with those who are “still there.” And it is this which made him a target of recruitment for gang stalking; and a possible “threat” in the matrix should he not comply with community policing.

Then, there is a little known fact that black American’s who police their own neighborhoods are tracked, targeted and assassinated for doing so, as we saw in the 1960’s with Black Panthers and others, and even today; whereas Jews have their own police in the Bronx and other places. In fact, in western nations, only Jews are allowed to police “their own.” SO certainly, we must ask who it is that enforces racial barriers, as well as polices speech, and association around these topics.

While association isn’t illegal yet in western countries, in the paradigm of OGS, association becomes a de facto reason whereby police power can entrap and recruit others into the “community policing scheme.” As anyone who has watched the last few decades, change comes very slowly, if at all, and even then, it is mediated by police power, which acts as a gatekeeper between what is “good,” and what is “bad,”- but all of THAT takes place in the many gray area community policing schemes. Good and evil then, are mediated in the internecine battle ground of hidden strife between police power, and “we the people” in a hidden battleground where every day rights and liberties are pphrased-for some, but not all- as “privileges and immunities” or as “necessary compromises.”

Val’s story of being recruited into community policing

” I was back one time, and all of a sudden they swept up on us. We were in a pretty large group, mostly a bunch of guys just hanging out. They put us up on the wall- you know, spread your legs, keep your hands out of your pockets, like that. I had no problem with it really, you get used to it(….) and I complied. Then, after they went through all of our pockets like that the usual stuff(…), they had a job to do (….).”

“So I told them about my service, and he was kind of, you know, surprised, and he took me into his SUV. He was the watch commander- four stripes…and one loop. He asked me why I was hanging around these guys, and I told him what I just told you-because I believe that the only way to make a difference is to come back here, and, you know, show thee guys that there’s something else. He left me his card, and told me to call, you know if you see something and all that. I stilll have his card on my dashboard.”

What Val is describing is the gray area between our Constitutional rights of assembly and rights of association, and the paradox that gray area has produced for exploitation of “the little guy’s” while corporate interests ranging from Peter Thiel’s conspiracy with Google and Palantir, to psychologies reliance on drug comany definitions of mental health. For some, obviously, torture is ok, as lng as it’s the “bad guys” getting water up there nose, or a few “dangerous mentally ill people” popping a few fix-society-by-drugging-you pills when they complain about being “stalked” or “hunted” or otherwise ham stringed and black bagged by gray area policing schemes.

So, for some policing is purely profitable, but for most, the community policing scheme has produced an opposite effect on our society, and on our liberty, that is itself a civil conspiracy by those in power to force the police to become abusers of the Constitution itself.

Due to the lifting of the Constitutional guarantees of rights to life, liberty and the pursuit of happiness,” via the un-Constitutional gray area policing scheme of organized gang stalking, aka community policing,  and the full blown assault on our rights of privacy, speech, press, assembly, and every single other right that can be inferred from the right of privacy not yet enumerated-we see that a vast encroachment on our rights to “freedom of association” are crimped at the internet switch, or our telephones, and thereafter. So, yes, this can have a disparate effect on select people, not least of which is to with draw from society that “perpetrates” such day to day abuses.

So- I would like to re-examine a main thesis of Dr. Lorraine Sheridan and David V. James, two academics whose lives have been lived in academia-which is a major social disease of our times, and which can lead to an echo chamber effect within researchers who have spent NO time in the real world. In fact, their famous study on OGS interviewed “the internet.” take a moment to let that sink in.  Then, nte that the term “gang stalking” is termed “group stalking” because those who wrote the study are practicing what amounts to a form of “gas lighting.” This happens because of the social disconnect between the modern transhumanists and actual, real people from across the spectrum. And not insignificantly, academics notoriously live and dwel in “ivory towers,” which Emil Durkheim discussed when he coined the term “anomie.”

For my purposes, I will note that ivory towers, and the incredible amounts of MIC and AIPAC money consumed by academics, can nearly eradicate human conscience, and any sense of ethics, much less insight into issues as complex as OGS as the fat of the trough swells their eyes shut. Here below is the definition of “anomie,” and some discussion of it next to a summary of the Sheridan James study-and it MUST be noted that those who are “suffering” OGS are being referred BACK INTO THE POLICING SCHEME by Sheridan and James:

an·o·mie
ˈanəˌmē/
noun
noun: anomie; noun: anomy
  1. lack of the usual social or ethical standards in an individual or group.
    “the theory that high-rise architecture leads to anomie in the residents”

And here is the summary of Sheridan and James analyses of OGS as a likely “delusional disorder:”

Group-stalking appears to be delusional in basis, but complainants suffer marked psychological and practical sequelae. This is important in assessment of risk in stalking cases, early referral to psychiatric services and allocation of police resources.

So, Val, who I talked with this morning, reported an attempt to recruit him into the community policing scheme, by a “gang strike force” and offered the hint that cooperation with this as a “normative” duty of his citizenship was expected. Val is neither delusional, nor is he suffering trauma, because unlike others in his peer group, he had a father, he respects his fathers authority, and that father was also a world traveler. His father, as opposed to many others who got swept into high heels policing, such as this example here, encouraged individuality within “normative” association.
And, he imparted to Val a desire to “get out and see the world,” which he did. In doing so, Val, unlike his peer group, Val learned about the “hierarchy of relationships,” and probably a thing or two about kyriarchical paradigms, though he didn’t elaborate it as such. Instead, he had a grasp on what iis anomie, and he tries to make a difference, realizing that “all things are NOT created equal.”
Here is a bit more about Durkheim’s anomie:
It was popularized by French sociologist Émile Durkheim in his influential book Suicide (1897). Durkheim never uses the term normlessness; rather, he describes anomie as “derangement”, and “an insatiable will”.[3] Durkheim used the term “the malady of the infinite” because desire without limit can never be fulfilled; it only becomes more intense.
Durkheim, who used the concept to speak of the ways in which an individual’s actions are matched, or integrated, with a system of social norms and practices… anomie is a mismatch, not simply the absence of norms.
I have discussed anomie and organized gang stalking in terms of gang stalking being an unethical, illicit and illegal practice that psychology, and policing and the hidden networks of abusive social power that are wielded by “community policing” and NGO’s and other’s who participate in it, and yet because there is an absence of “norms” or even awareness, and worse, that in a society where power is the goal, that “norms” themselves are unhealthy; as do the methods of enforcing them, and that inequitably.
None of these that act as gatekeepers and interpreters of “what is normal” have any insight whatsoever, as I have noted that hose who have written on the topic are part of the official denial of the practice; and those that do are themselves corrupt to the point of being OGS denialists who use power to enforce corruption- that corruption for powers sake IS the norm; and that OGS “symptoms” are anomie that is experienced bu those who cannot in any way participate in our current society.
Academia is ill suited to deal with OGS in any substantive way- and I suggest it is because they are socially disconnected themselves- that they embody the worst that Durkheim could have imagined. And, it is not surprising that  in Durkheim’s anomie, and our current pervasive police and surveillance state, that in:
a society with too much rigidity and little individual discretion could also produce a kind of anomie… Thus, fatalistic suicide arises when a person is too rule-governed
Note that in anomie, suicide is a possible outcome, and in fact was the subject f Durkheim’s analyses- and in the OGS dialectic,  there is nearly a constant drum beat for victims to do exactly that.
This is not incidental- it is an integral component of the eugenic nature inherent to the entire dialectic, and as such, and in the case of Val, who “got out” we see the disparate police power attempting to enlist him in the aid of becoming a rat, rather than an individual attempting to make a difference by merely setting a good example as an accomplished individual. That he is being subtly encouraged to become an informer as a first step into a wider dialectical power base, and thus, recruited into the gray area.
So, of the many things that this one example provides, I cannot tell you if Val was stalked in a database before the event he describes. I cannot tell you if Dataminr, Palantir, Media Sonar, or any of the many other ways that our relationships are tracked and monitored by police and others every day were deployed on him.
But I can tell you with scientific certainty that he was profiled; targeted; and an attempt was made to recruit him to become an informant in his community. And with certainty, I can ell you that this all happened in a highly targeted environment, whose future has been mapped frequently from birth.

What THEY are reading: disabling the power of one word which has nebulous but massively important colloquial meaning, and a discrediting value in legal and psychosettings.

One of the common ways that police, prosecutors and judges influence juries; and one way that psychologists are able to broad brush and mis-diagnose mental illness where little or none exists- is that most human beings use common parlance, and unclear colloquial language that, to academics and psychologists, as well as those in the legal system (many of whom genuinely feel that they are a superior “class” of persons who willfully denigrate others with impunitywillfully denigrate others with impunitywillfully denigrate others with impunity) are not precise enough, or clear in the immediate meaning-that in common parlance, which seldom suffers from the factitious disorders and psychopathic lack of compassionate affect that is prevalent in the people who practice in these fields.

Put another way, real people, non-commissioned citizens speak differently than people who hide behind titles and badges and power like institutional sociopaths, and inside Fusion Centers which even the ACLU acknowledges are actually spying on American’s in real time, and deep state propaganda mills and mind control bunkers in Georgia, Maryland, or Virginia (Ohhhh Virginia: have you seen what “THEY” are doing from within the servers at UVA? And that, connected to the huge deep black hole they run from Thailand!).

So, the common person-the lay person- is met at any of the above-mentioned settings with the calculated stupidity of those in power who use blank stares, and failure to make eye contact as signifiers of their willing disregard for common language and meaning that “the average and reasonable person” can infer meaning to, or understand whole cloth upon a single utterance. And that, as they have thrown away our Constitution.

One of those words that stymies even the best psychopaths among  deep state agents, and their associated Booz-Allenaholic types is the word “they.” As in “They are doing this to me.”And in court rooms, psychologists and social workers offices, the ambiguous colloquial nature of “they” stymies each and every trained professional when it comes to state sponsored misconduct, and accountability for institutional harm perpetrated on people outside the iron curtain of state impunity.

Here is a snippet of how this willing stupidity on the part of institutional sociopaths and others plays out:

” Man, they are gang stalking me hard right now, and mobbing my blogs!”

“Who are “They?”

“You know, THEM– the DHS, the CIA, the FBI, who knows? They all work together to slander, malign, and create narratives that benefit the power structure, and the unholy and perverse marriage between the MIC and it’s domestic glory hole the DVIC! And they are mobbing me right now!”

“Well- have you SEEN them? Do you have PROOF of who “they” are?”

“NO-like, these are agents who work within multi-billion dollar industries-and they are sanctioned by governments who look the other way! So, OUR agencies outsource dirty and wet jobs to OTHER agencies who are theoretically not bound by OUR laws! And that think at RAF Croughton! Wow! The Brits were so sickened with what was happening there, they almost kicked “us” out!”

“Yes-but can you prove any of this?”

[ Cut-away to image of homeless guy pulling a couple quarters out of his pocket, along with a Medicaid card, a half smoked cigarette butt,  and some lint. And, for some reason, a small news cliping of an F-15 superimposed above an image of the Virgin Mary, reading a big cash register roll of propaganda from her vagina ]

“Um. How? Who can afford to prove it? It would take millions to follow and stalk them back-to hack THEIR email accounts, and hack THEIR blogs, and to break in to THEIR ADL off the books database full of dossiers that THEY turn over to the DHS/FBI/etc, all of it off the books! In other words- I would have to do criminal things in order to invoke the right to subpoena all of their records and so on-and even then, the DEA burned the SOD database; they will claim national security is why they had to break in to my house and steal all those photos of me nude, in my NERO crown, lounging around the hot-tub with peanut butter on my putz, and the German shepherd?! ”

“So, you can’t prove that THEY exist, can you? That actual people are targeting and harassing you?”

“Um. Well. Not without some form of “power for the people” to subpoena these shitbags. Or maybe- just maybe there exists one cop/LEO/agent/ etc ANYWHERE in the world who will blow the whistle on these low-life mama fuckers and baby bombers…..or….I do have my WordPress “stats and some other vague but admissible circumstantial evidence that indicates I’m probably not wrong ” And they get hit up by the Five Eyed Nations every day-and THEY especially like to read the post about how the CIA/FBI/ et ass industrial complex recruits incestuous Mormons.

And they really really like the post about how LEIU’s and others like the ADL and other racist scumbags run secret spy rings targeting peace activists dissidents, critics and others without oversight, sanction or punishment or even investigation as they follow, stalk, hack and harass people-or who buy the United States Police forces around America cheaper than a Vegas crack whore gets free methadone?? (did I mention that the Anti-Defamation League, which was once busted for spying all over America, was given a slap on the putz by all too willing prosecutors-and THEN the ADL virtually purchased American police cheaper than a rusty Russian oil tanker loaded with fake news??).

Related Story: How the Anti-Defamation League of Spies purchased the power to purchase American police cheaper than a donkey dick show in Juarez, MX.

I mean- who can tell? These are cults within cults! And then- for SOME REASON, they really like my overview of gang staking, and that little bit where I bust them for their “Officer Safety Bulletins,” aka “BOLO’s,” aka “party flags”- and how they use those to monitor, stalk, follow and harass TI’s for YEARS!!?? There is literally one gumshoe for every 30 citizens in the west, and if you add in the Five Eyes circle jerk of hom-erotically charged assfucks who work in the Intel communities, well, WHO KNOWS ANYMORE?? Life is different now that some feel they are empowered to SHIT ALL OVER due process, and wipe their asses with the glorious United States Constitutional rights to privacy-to assembly, and speech, and….and….nothing can exist within the law when the law exists without law!!! Much less legal standing to challenge these creepy neo-zio-nazio’s from East Germany!

“Hmmm. But you still haven’t NAMED anyone. Do you have their names? Who specifically is “following you?” And-are you taking any medication? Will you or won’t you subscribe to the AMA Big Pharma magazine? It’s a magazine about Franz Kafka’s theory of the Panopticon. Every decent citizen should, ought, and must subscribe.

Well, for now, why don’t you just find a hobby-like photography, or…”

“Or blogging about the surveillance industrial complex?”

“No- I would stay away from that- it’s not good for your mental health. Take my word for it- I am here to care about people like you.”

[cut-away to scene in public library in Utah, as a homeless guy types away frantically on a computer that he gained access to after buying fake ID from an undercover agent’s crack addled snitch, who bought it on the Dark Web, after an interesting conversation with someone with an odd pseudonym in an online forum. The lone figure is typing “and just as I  logged in to my bwog, TOR CRASHED INSTANTLY(Teardrop attack, of course)! And- when it was forcefully crashed by one or another agency/softwaretrap/malicious switch/redirection/metasploit, it took my screen-cap of this event with it!

Those fuckers-no warrant requirements anymore, doubled down with hacking help from five other nations, plus several military bases from Pakistan to Japan (Hi Osaka!), to Saudi Arabia UAE- and shit-where’s my metasploit when I need it!!! I am just ONE citizen, and armies and navies, nations and states (Virginia, Maryland, Georgia, and for some reason Ohio and Texas-and especially Kansas, between 2005-20011. This last one reminds me of red shoes and small dogs-probably part of my deep brainwave pattern and frequency distortions brought on by peeking behind the New Iron Curtain- America’s Free Speech Steamroller!]- “they” are aiming Metasploit at me alll thee tiiiimme.]”

Note to self: True story. Oh- and fuck these F@gs. No, wait- I have nothing against f@gs. Fuck these baby bombing, dog dick sucking pedophiles and murderers who hide within Deep State apparatus, twisting words, and narratives using hidden tools and entrapments; speech suppression via real time monitoring of speech; and much more to create pretext and pretense and predicate, silence dissent, and wage war on due process, and the Constitution, while blaming some nebulous agency created “threat” like al Queasy or your-SIS when in fact, most of the time, citizens stand a better chance of being killed by lightning, shot dead by a cop, or killed by non-Islamic domestic terrorists. Yeah- fuck these bastards.

But: before you fuck them, have the camera’s placed just right. And then, do it with a blind fold and slip them some Donkey Dick smeared with Cholula. The internet is the biggest electronic weapon EVER invented. It won’t be hard to parallel construct THAT fact!”

“You sound angry. And your tone-it’s very threatening. As your therapist, I have to inform you that I must call the authorities and report your threats.”

“THREATS??WTF?!! I AM A THREAT NOW??!! WTFFF?”

“Please watch your tone. ”

“Exactly what did I say that was threatening??”

“Well. Donkey Dicks are kind of scary [noticeable sweat beads form on the therapists brow at the mention of donkey’s] Penises are weapons, you know. Most of the ADL, and their cohort of white slaves and Jerusalem syndrome baptized local police find that term offensive. And frankly, I am a bit upset at your deviant masochistic juxtaposition of “Cholula” with the word “penis.””

“But I didn’t SAY PENIS! And the penis was sadistically juxtaposed for maximum effect!!!!

[Cutaway as therapist quickly hits speed dial, to report the word penis to his superiors at the Fusion Center, who immediately send a BOLO out to the local police station.]

cropped-showimage-arcadia-switch
“You said chollo? I’m on it. Waving a weapon of mass deconstruction? WTF is THAT?! But it sounds dangerous-I’ll send a squad or an MRAP over there right away. Oh-and have you got any donuts, or a Starbucks nearby?”

[Sound of vintage teletype tapping out a BOLO:Be on the lookout for a penis. We had an anonymous report that there is the tip of a penis that’s loaded on a chollo, and it is about to get off. Send the bomb squad over there, because the reliable Infragard anonymous tip/institutonal democracy subverter said something about it being really hot. I know the tip was valid, because it was checked out in Israel first, at that ‘special place’ in Tel Aviv ]

[sound of radio crackle from a squad SUV parked behind in the therapists alley where it has been listening in from a celll site simulator the whole time. “Yeah. Tel Aviv. Hehehehe. That was SOME Terror training there in Tel Aviv for suuure….I told that Russian sex slave that I woud “ter her up” Get it? hehehehehe ]

[Sound of Fusion Centerguy. “Yeah…Tel Aviv….mmmmmm. I think I need more training. Or maybe, rescue me a few more bacha boys. Or NOT! hahahahaha.]

Related Story: The MIC-DVIC obsession with watchin’ porn. Or- how to manipulate deep state players minds with their own tools. But F@ck you, for looking in. How’d THAT feel?

 

 

Organized stalking and Five Eyes Alliance, disruption, online mobbing, and database abuse: documenting OGS with evidence

Most of those who write about OGS mention that they are frequently the targets of specialized internet harassment that takes various, often personalized forms*. There is the standard theft of email, sometimes as one writes it; there is the recurrent and constant theme of computers being hacked; and online manipulation of speakers who use words to communicate ideas to others, like we see with the outed JTRIG harassment-but the NSA/FBI DITU and military orgs, often working hand in hand with zionist hasbara roaches from Israel are all in on it, trying to censor and manipulate and control online dialogues, and targeting individual speakers. And, similar things went on in Germany just before the Holocaust as well, with zionists involved at every level.

Well, here, first have a look at the catalogue’s of spy tools that these institutions are using on unsuspecting citizens:

The Electronic Frontier Foundation catalogues  NSA spy tools aimed at us AND them-whoever “they are” since “they” became “us too”:https://www.eff.org/files/2014/01/06/20131230-appelbaum-nsa_ant_catalog.pdf

How the CIA spies on you through your TV, and more: https://www.wired.com/2017/03/cia-can-hack-phone-pc-tv-says-wikileaks/

Renowned security guru Bruce Schneier has the British spies catalogue of tools: https://www.schneier.com/blog/archives/2014/07/gchq_catalog_of.html

One of the ways that the claims of TI’s can be tested-one of the simplest ways actually- is for any researcher to merely write a blog about OGS. Then, use the key words “organized gang stalking,” “gang stalking” “targeted individuals,” and any of any number of keywords that PRISM and XKEYSCORE, and their specially trained, biased and calculatingly and deviant religious analysts are targeting.

You will have more rapid results if you mention the fact that the US Department of Homeland Security gives special black budget money into the hundreds of millions to zionist-Jewish groups and organizations affiliated with the Anti-Defamation League, which they use for organized stalking. Or, if you mention the fact that the FBI is basically a zionist and cult-controlled organization that has benefited from illegal ADL spying operations for  generations, and those hidden campaigns of domestic terror/spying are waged by any of a number of fanatical cults and religious sects in America.

For example-in the summer of 2016, there were two high profile mass shootings, and each one of the shooters shared the fact that one of the many radical sects of radical zionist hatred, called the “Messianic Jews” were involved in workplace mobbing before these events took place. In both cases of Sayed Farook who was taunted about religion bullied in the work place by Nicholas Thalasinos, -and the mosque of Omar Mateen, the Florida shooter, was burned to the ground by a Messianic Jew from “Jews for Jesus” after the fact of his alleged shooting.

It is also not a stretch to note that these same zionists not only helped create Hitler, but they shared similar goals and killed millions of people, while using other egregious forms of database abuse, like the IBM punch cards that were used to round up gypsies, dissenters, the mentally ill, and many other categories of people.

Then, link that blog to any substantive conversation about warrantless surveillance, criticize this system of targeting pure speech online (and in our own ‘private’ emails), or criticize the plausible deniability and unaccountability built into this system, and especially criticize any law enforcement body in any of the 5Eyes nation-states, and watch the fireworks begin! Your blog will suddenly become the darling of the Five Eyes nations as the UK, Australia, New Zealand (have a look at what and WHO is in New Zealand),Canada, and the US start to hit your blog up EVERY DAY, 20-50 hits per day.

You will note that they key in to certain posts and pages that mention their culpability. This blog here is a recent favorite of some who read these specific posts below, nearly every day, in this order-and you can test these results yourself:

1) Gang stalking, Mormons, FBI/CIA recruitment of same
2) Gang stalking and punitive psychology
3) Gang stalking and the Martha Mitchell effect and influence operations; or how retired LEIU members act as auxilliary LEO’s, often outside the law-and as para-judiciary inluencers of the legal process.
4) the CIA and phone hacking/NSA mass surveilance of citizens/ crisis PR counter-narrative about OGS
5) Any post that criticizes, implicates, or indicts LEO’s as particpants in OGS
6) Any post that impicates military involvement in OGS
7) you will especially note that avid readers who target posts about how the surveillance state is a Panopticon especially seek your personal information/contact info/biographical data, and most of THOSE readers from military bases and so on.

In my experience, it takes about a week to ten days before the 5Eyes nations and their many web crawling, word hunting,speaker targeting data analysts, or targeted search bots/Palantir/Media Sonar/etc or any of a number of retired LEIU types and Israeli “mind controllers,” or just plain odd people who are immersed in the even-more-odd disinformation dialectic of the “paranormal” find your blog.

Then, kick your feet up and watch as your email accounts get broken into or your internet gets redirected, and your online life becomes “redirected,” or stalked even by identifiable operators( usually those who follow your blog are affiliated with the groups mentioned above). I advise that you do all of this “anonymously” within reason-but also advise you to use Tor as a research control, just so you can see how easily it is subverted. And then, do ‘timing attacks’ against your own blog using Tor as a control, and your own blog as a subject. Note how slow your blog/s load/s now-or especially, how when you type, your posts begin to drop letters here and there as if your keyboard is full of peanut butter, or cracker crumbs-or screen cast across a Fusion Center control room, or to a couple of squad cars up the block.

Use Tor on one browser, and then use several others- you should find that Tor will be ‘crashed’ frequently AFTER they find your blog, but NOT BEFORE. And, you will find as described above with the ‘suddenly sticky keyboard,” and more. Also, AFTER they find your blog, you will note that Tor loads incredibly slowly, and that frequent time-out errors will occur. Further, if you publish over Tor, you will find it to then be a target of other exploits from the Metasploit toolkit. Teardrop attacks are common, and timing attacks that crash the browser and then time your reconnection to both the internet and your blog-which also leaves your ‘cookie’ and sign in data floating about cyberspace are among the most common attacks.

And-if any of your (hopefully, deliberately anonymized and obscured) blogs become targets of this extra special attention, extra-legal, extra-judicial attention, notice also “what they are reading” across your blogs-that the subject matter frequently seeks to develop a “profile” of the writer as certain posts that contain “personal” information are pieced together to form a parallel constructed “you” in the mind or the dossier of an analyst, investigator, or agency black ops practitioner.

Test it yourself, and prove me wrong-after all, the “pro’s ” and professional activists present a unified front that OGS is a myth- a symptom of mental disease; an indicator that MORE isolation and discrediting is needed to contain the dangers of the world finding out about this practice that benefits those who practice it! So prove me wrong-if you can.

But I have found these things described above for over a decade (as have others), using multiple blogging platforms, multiple computers, from multiple states, countries and localities ranging from communist countries to countries that thrive on mob hush money, to here, in “the land of the free (lol)”and using multiple word/phrase selectors.
These terms and subjects I discuss above are the quickest, and most replicable to get the results I describe, but you can find your own.

The net result is a simple and can be replicated, and prima facie evidence that gang stalking is real in the sense that it triggers both PRISM-like bots and humans, but also triggers intense scrutiny and malfeasance: it is prima facie proof that CERTAIN speakers are targeted, and then harassed, or blog-stalked in the very least, and others are not. In the US, this means that a pre-judicial mechanism of “denial of equal protection” under the Constitution is in effect at a baseline of un-Constitutional government conduct (and really- most Silicon Valley startups from Google to Twitter and Facebook are ALL funded with seed capital from the CIA, and fully interactive with NSA/CIA/DIA/FBI packet capture/black operations via the internet ‘backbone’/influence operations/redirection/code injection/ at ALL times).

Lastly, I would like to point out another fact of OGS: if and when the writer reveals their actual IP location, or actual contact information, they will also be able to document “web interception and redirection” in a variety of ways. This story herein covers that. I bring this up, because upon the discovery of writers and others who document OGS, the Five Eyes then entraps the blog off shore, or on a server that cannot be traced back to them directly-that hose who work in these intelligence collection hubs ‘contain’ or entrap’ the blogs so that further black ops/surveillance/timing attacks/code injection can take place.And this too, can be monitored, and data collected to document that OGS online s indeed a “real thing” and evidence of same accrues as soon as a researcher follows the steps outlined above.

  • some things are just TOO predictable: as I wrote this post above, online-live- I was cut off the net, and the AP that I was using disappeared, replaced by several that are unfamiliar to me, or the location from where I blogged this post. I could not log back in because the AP I used( from a well known corporate coffee shop)completely disappeared. You just can’t invent some things. I ket sceen captures, but I do not have an anonymizer to strip the meta-data from those. But you can test this scenario yourself as well.

Organized gang stalking and Countering Violent Extremism programs: how”Disruption”programs work-a privacy and due process raping boondoggle, and security theater cash cow.

The goal of all of this privacy rape, and due process subversion by the NSA/CIA/FBI/LEO data theft? Who knows, and  whatever-cuz’ it’s “for the children.” And ANYTHING that is for the children is big money in a totalitarian or surveillance state. The ones who aren’t bombed overseas-aka “the remnants of” the “children”-those that are left after the DVIC and the MIC with ts affiliated “industries” has “their way with them,” first. Pre-natal supremacy over ‘the children’ and the MIC is a one way street.

Soft force eugenics and child abuse: how the DVIC and the MIC maintain religious, and narrative supremacy over future generations. Meet the Countering Violent Extremism programs which are really ideological restraints on privacy, rights of assembly, and rights of free expression, coupled with violations of the equal protection clause of the United States Constitution.

Imagine you are a peace activist, or NOT a member of one or another sect/cult/order/denomination of a Jewish-christian religion; or you’re an atheist/humanist/whistle blower/ activist-even a ‘petty criminal’ who smokes pot-and one day, you find that you seem to bump into the same faces all over town-that ‘faces’ re following you. That’s odd, you think: that 6’2″ tall guy in the brown Eddie Bauer loafers, classic Dickey’s slacks, and the close cropped, fawny Germanic brown hair that matches his shoes,and who drives an oversized big red Ford pickup-he was everywhere I was today: whipping into the parking lot at Target, or sweeping into the restaurant that serves the “ethnic food,”and trying to bury his angular 6’2” frame into a booth. Odd, you think- how a guy that big can hide himself behind an 18″ tall menu….

Naw, you think- must be my imagination. The 18″ menu format, I mean.

And then, for weeks, this pattern repeats itself, sometimes with the tall guy, sometimes with others, usually white but frequently erudite and well dressed 6’3″ brown and black people (also, often with dreadlocks and blue suits; or pert Persian women in sensible flats, with cameras in hand, asking to take your picture at peace marches, or anti-apartheid meetings). The squat, weight-lifter framed black woman with the bad weave, and the sensible backpack and recognizable mid-western accent coupled inevitably with the tall brown shoed flatfoot; the Asian man who is a modern Charlie Chan, but with real Asian heritage and ethnicity, showing up on buses, coffee shops, AA meetings maybe (I have that on reliable sources, I promise…).

That’s odd, you think- this has been happening for weeks! Months! YEARS!! And you become a bit ‘paranoid’ and a bit on edge, looking over your shoulder all the time, because those same faces show up frequently; sometimes across the states.

Related Story: The Brennan Center for Justice at NYU CVE link roundup

About then, when you notice, and especially, when you begin to document it in some form-it stops-day after day goes by and you don’t see the tall guy, or the middle eastern or the Kenyan man following you; and the late middle aged shrew with the strange comments in the grocery store about ” I know what you READ!” disappears too. A week or two or a month goes by, and then new things happen: you come home, and the lock on your door is somehow different-usually it is more loose-but now it’s harder to get your key into(this can go both ways, as each lock smith, or lock picking set is different); or there are strange marks on your door jamb (sometimes a three pronged tool is used, other times what appears to be a wide, flat screwdriver).

And the internet, of course- you try to log in to Gmail, and as if you are being transferred to a computer across the world-twice-as it takes between seven and twenty seconds just to log in-EVERY TIME, whereas in the past several years, it was a matter of one to three seconds. You notice that you Gmail address has been switched from San Francisco to Irland, or he UK-odd, that you would take the time to notice that-you probably are losing it.

Strange, you think, I haven’t changed ISP’s, or used a new computer, nor have I changed any settings on ANYTHING. And certainly, I don’t live in Kansas, anymore. And certainly, those brand new wireless AP’s that spring up outside your house with kewl names like “MAdame PSycho,” and “Not the FBI Surveillance Van,” or “TAO2” are all in your head. Sure-that’s an option too.

Hmmm. And the pop-ups and advertisements on your computer will take on a life of their own, as for years upon years, you got ESPN, Manchester United schedules,  and “subscribe now!” popups every time you are on the computer reading news for free, or maybe an occasional ad for the “Penis Pump,” or free Viagra samples(no-really that wasn’t my case, I swear) but you now get pop-ups asking you about tinitus, and advertisements for middle eastern vacations-ads in Arabic. Maybe you get the weird pop-up about gun shows in Texas(“deep discounts for LEO’s who buy in bulk!”), as your IP registers in Nebraska….

And, the phone of course- your phone now has the ability to occasionally talk back to you- about what you did yesterday, or an hour ago (and this will happen only once or twice, just so that you cannot begin to document it.)

This is on the surface one of two things: you are going totally and completely bonkers-nuts to the meat grinder mad-you are deteriorating as if your mind has been taken over by ‘something else” that somehow knows who YOU are, and WHERE you are at all times, even if you’ve never owned a gun in your life, or used a penis pump (well-who HASN’T used one of those?!!).

You become pre-occupied with little strange happenings like your garbage being tipped over in your alley, or the long scraping marks left on the siding of your house by a ladder-maybe in your paranoid mind, you connect those random events: the ladder marks to your now debilitated security cameras whose cables had been disconnected RIGHT WHERE THOSE LADDER MARKS scrape your siding, and ding your white aluminum window trim with deep scars and gray marks.

Maybe the little camera left behind in your sons bedroom is a sign of something evil-who knows, right? It’s your word against the deep state, and all of it’s military/LEO/psychologist/MIC/PIC/religionist/occultists-who-work-in-government. And who are you, really? It’s for the Children (hitler youth), after all!

Or, maybe the reports from your neighbors about how they saw other strange fat white men jumping your fences, or signalling to each other from your alley to the street, or using strange hand signals just as they hopped into cabs that JUST HAPPENED TO BE WAITING THERE in front of your house strikes you as “odd” reports from a good and trusted neighbor.

Suuure. Maybe your going crazy-along with your neighbors, who ALL report these things to you. And some of whom are suddenly building fences, or installing their own security lights and cameras.

Yup-you’re nuts, prolly. Orrr mebbe….

Maybe another option that is a little less crazy perhaps: you are being covertly and totally f@cked with by one of any number of sources ranging from LEO’s to military operations, to strange cultists or organized gangs of pedophiles* that most often are run from within the official cover of state agencies and their affiliated “good guys” and girls (here is one possible case of that. And read through this blog to help understand who else it might be.)

But in many of the early cases-stemming back to around 2001-these were often covert intimidation/recruitment/entrapment/coercion/conformity/manipulation schemes that loosely fall under the category of “countering violent extremism” programs run by any of a number of unethical operators ranging from LEO’s, task forces, and intelligence agencies to private contractors.

And, the one key feature they all have in common has a plausible connection: agents and agencies that practice fraud upon the courts, and fraud upon the Constitution via massive, unchecked database abuse, and surveillance via electronic media such as computers, cell phones, and even televisions. You have been selected, and targeted for intelligence collection (HUMINT), informant recruitment (they want to use you as a rat), or possibly, you have been deemed a criminal, without due process of law,  due to the use of unauthorized access to your computer and Google searches, and, because that access was illegal, and parallel construction not warranted in your case (there’s a joke in there somewhere about warrants) “they” have chosen to use you as a moving target for all their new military grade electronic toys and weapons.

Related Stories: Have a look at the bizarre world of parallel construction from Techdirt.com-the practice of LEO’s breaking the law, and violating the Constitution, and then doing plastic surgery to put a new face on “criminality.”

Sooo…….

Welcome to the shadowy, sketchy, often bizarre (and incredibly well financed) world of CVE programs!

“Countering violent extremism programs have been identified by the government as a top national security priority, but the public knows appallingly little about them,” says Hina Shamsi, director of the ACLU’s National Security Project. “We’re suing because government agencies have repeatedly failed to provide us information that we’ve requested about the nature of their CVE initiatives.”

In a briefing paper released with its lawsuit, the ACLU said that CVE programs often target “people for monitoring based on their beliefs or ideologies,” thus potentially criminalizing speech protected under the First Amendment. It also highlighted past abuses of CVE programs, including instances in which young people who refused to take part were characterized as radicals and where community leaders were told they would have to identity and discuss cases of specific youths with law enforcement.

The Department of Homeland Security declined to comment for this story, citing pending litigation. The Department of Justice did not respond to request for comment.

Government-led CVE efforts in the United States are inspired in large part by programs rolled out in past years in the United Kingdom. Broadly speaking, CVE programs seek to expand counterterrorism efforts beyond law enforcement to involve other government workers, like teachers and social workers, as well as community leaders outside of government, like clergy. They can involve propaganda and other communication strategies as well as monitoring and questioning.

Those programs have been deeply controversial in the UK, where civil society activists have blamed them for exacerbating ethnic tensions within British society while failing to meaningfully fight extremism. In recent months, the U.K. government has also rolled out anti-radicalization programs in schools, which have led to instances in which Muslim schoolchildren have been stigmatized by teachers as potential terrorists.”

*One recurrent theme in almost ALL OGS blogs is that those who are targeted are also slandered with a variety of “labels” ranging from drug dealer/user/ to prostitute to “pedophile”. But the reality is that state organizations, police, psychologists, lawyers, the courts, CPS, foster care, social work, and many other subsidiary organizations are a multi-billion dollar per year domestic industry, subsidized by the Jewish-christian ideological state to get children funneled into the Domestic Violence Industrial Complex (DVIC) by hook or by crook (be the shepherd, not the sheeple and all that.)

Each child that is successfully stolen or otherwise diverted into this “system” is a cash cow (cash sheep?) returning dividends to those who are part of this system. For instance-foster parents can rake in between 800-1800 per month, depending on the state, per child. And any child that becomes involved with CPS ca returns some 70k or so per year to those who participate in this business.

Not surprisingly, Myron May, a man who claimed he was gang stalked, was the product of the multi-million dollar Christian foster care factories that are dotted across America-and no researcher of OGS has yet made this connection between him, and this systematic profiteering off of children as commodities.

Disclaimer: I make no claims herein specifically or intentionally relating to the financing of the Taunton Foster care community, and intend this example as one of many where children are used as cultural capital as well as actual capital.

NSA spying, intelligence cults, and “meta-organized” stalking

At this point in time, we can safely say that most complaints of gang stalking involve contact at man y levels with the vast, unnaccountable, and hidden surveillance apparatus that we now know as ” the end of Constitutional Democracy” in the west.

Using multitudinous, alphabeticus intelligence agencies, and police forces across the globe, and across America, the rights and freedoms that citizens thought were guaranteed have been torn from the roots of democracy, and poisons applied to that which is left.

In America alone, the NSA theft of our data has now resulted in that data being turned over to 17 spy agencies, to do with it what they will. And as the past is the best predictor of the future, that means that the numbers of “targeted individuals” will increase exponentially and build critical mass so that many of those who claim to have been targeted in the past will now have company from many others- perhaps your own son, daughter, or significant other.

And, maybe at that point, you will remember that you were quite content to watch and do nothing as others appeared ‘crazy’ and you did nothing. And, maybe then, you too will join me in bringing awareness to this topic. Because- “first they came for the [ ________ ]and I said nothing….”

Because, of course, all of our unfiltered, whole capture raw and unfiltered data was shared with Israel first, for the last deacdes– and of course, they would NEVER do anything bad with it, cuz, Holocaust! And zionist/dominionist religious fanatics are our friends- right? Who could possibly know more about building a better mouse trap?

Strange equivocation, that.

Law & Disorder —

NSA to share data with other agencies without “minimizing” American information

Rules opposed by civil liberties and privacy advocates.

Image: Ulrich Baumgarten / Getty Images News

On Thursday The New York Times reported that the Obama administration had recently finalized rules to give the National Security Agency (NSA) more leeway in sharing its vast trove of intercepted communications with the 15 other government agencies that make up the Intelligence Community.

Previously, agencies like the Drug Enforcement Agency and the Federal Bureau of Investigation would have to request information on a target from the NSA. The NSA, in turn, would retrieve communications pertaining to that target and scrub the documents of information that was considered irrelevant to the search, including the names of innocent Americans—a process called “minimization.” Now, that middle step has been cut out. The agencies need only get approval from the NSA to access its data, and agents from the agencies are expected to carry out minimization on their own.As The New York Times puts it, “Essentially, the government is reducing the risk that the NSA will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will see private information about innocent people.” Although the agency analysts who will have access to the NSA’s surveillance powers are directed to ignore and redact information pertaining to innocent Americans, if they see evidence of criminal acts in the data they access, they are directed to hand it over to the Justice Department.

Gang Stalking and Fusion Center spying and artificial intelligence: yes, “they” ARE spying on you, in real time

Now that the slow roll-out of totalitarian domestic spying has occured (while you were sleeping, perhaps), we can look back at the many felony lies to Congress by NSA and CIA chiefs, and the local lies from Fusion Centers and the FBI and local police to see that, well, it was all lies.

And, Democracy was dead after that- those with power had, and do, and will continue to destroy our democracy-because they can, and because YOU are letting it happen.

From Techdirt.com, in April of 2013-two months BEFORE Edward Snowden:

You may recall that, last fall, a Congressional investigation completely slammed Homeland Security’s “Fusion Centers” — noting that despite DHS insisting that they were critical to “fighting terrorism,” the actual evidence showed that they had done nothing helpful in the fight against terrorism, but were instead chock full of wasteful (possibly fraudulent) spending… and with an added dose of civil liberties violations (just for fun).

“There’s misconceptions on what fusion centers are,” he says. “The misconceptions are that we are conducting spying operations on US citizens, which is of course not the fact. That is absolutely not what we do.” link

But what ARE Fusion centers- and what are they supposed to do? Nobody, anywhere seems to know, but those who have experienced various forms of “electronic harassment,” and strange internet shenanigans certainly know that these centers are doing something. Targeted individuals have been telling us for years, what we all now know.

From the ACLU: what Fusion Centers are supposed to be doing

Organized gang stalking, psychological and influence operations.

A large part of what the organized gang stalking dialectic seems to be is the result of psychological operations, and influence by suggestion. And some 70% of the blogs I have read talk about something called “electronic no touch torture,” which in my mind at least, is an accurate description of how one feels after their privacy is invaded, and or they are subjected to contact with agency level psychological operations. Every agency has a dirty tricks section, and they use them covertly, and judges and juries much less the average citizen are never aware they were there.

Even the world reknowned authorities David V. James and Lorraine Sheridan on OGS agree that the mysterious and nebulous “the internet” creates an “ideological echo chamber,” i.e. that for some, the targeted advertisements, the targeted switches and targeted routers i targeted American communities who have ISP’s that target words, and CEO’s that target speakers, and community policing that trickles in from the internet switch- and for targeted individualsThe internet creates a sort of ‘closed ideology echo chamber’ wherein people who share unusual beliefs reinforce each other’s thinking”

Which is, or course, by systemic design as we see the redirection method being used by “mystery money” funded startups to influence “jihadists” and the equally nebulous “right wing” alike via linguistic analyses, which is known as “persuasion,” and also “soft force mind control, and more. Then there is the direct access to any given targets mind via hacked cell phones, and then, hacked relationships-because that is EXACTLY what the Panopticon was designed to do.

Most sites and discussions about no touch torture are loaded at the front end and are themselves psychological operations. Butt of the few sites that are not, we see that it is a real concept, and practice.

Psychotherapist Otto Doerr-Zegers, who has treated Chilean victims tortured under General Augusto Pinochet stated; “The psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction. …”

This is similar to the technique of “street theater” that mind control victims described in the Washington Post Magazine article. As torture victims are not mentally ill, mind control victims would not be mentally ill but rather have undergone and are undergoing a traumatic situation comparable to torture, such as the alleged illegal targeting with government mind control weapons.

Here below, is one of the ways it is deployed in the real world, from NBC news, is Britain’s JTRIG dirty tricks division:

“British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”

Imagine yourself sitting down to write an email, and all of a sudden your connection is cut. Then, you look in the body of your email and that masterpiece that you spent some 10 minutes writing to your aunt Alice has also and without explanation, disappeared-and NO COPY EXISTS in you drafts folder.

The first time this happens to you, you would be pissed-but if it happened dozens of times as you write critical stuff-emails to your doctor, a hot tip to your bookie(*jk*), or an even hotter tip to a journalist who believes in Constitutional liberty, you would begin to see patterns in your own mind-that your data is being messed with inside you.And, in fact, the internet has literally come into your home, and changed your behavior even before your fingers hit the keyboard-and altered your actions inside you.

This is what no touch electronic torture really is in real world deployment. And while it may seem insignificant, it has the cumulative effect over time of wearing a person down, letting them know that they are being watched, and that crucial and critical communications are being stopped at one’s fingertips. Important friends and associations are being destroyed each time you bring up these “odd happenings.”

And this, combined with other electronic no touch torture: your computer is hacked repeatedly, or flashing white screens; your cell phone apps turning your phone on and off seemingly at will, or the coincidental amplification of your conversation in your ear. here are literally hundreds of ways that a persons phone can be messed with, and TI’s talk about that too. Taken as a broader picture, it is the cumulative effect that does the damage.

Torture in any form is abhorrent, and never necessary, despite the claims of those who torture, who also happen to be the same people who have collected all of our internet data and are now culling through it  with 17 other agencies for blackmail purposes. If I had told you this is what is happening even five years ago, you would have called me a nutter. And now, I bet, even you are afraid to say it out loud much less do anything about it. First they came for the crazy guy on the internet….

Using neuro-linguistic programming techniques as simple as Google auto search”suggestion,” and subtle verbal intimidation, as well as the deployment of various internet tricks, such as cutting off a persons ability to write blogs, or the interception of emails, much of what we see can be said to have the hallmarks of classic operant conditioning, combined with learned helplessness.

This last link is important because many in the dialectic feel as though they will never be able to overcome their situation. And, the one venue they have, the internet, is subverted at every point as heir blogs get hacked, and their emails intercepted, and so on. Some 50% or more of the hundreds of blogs I have read indicate that these things happen. So it could be an indicator that there is something afoot, as other online communities of bloggers do not report these things, dwell on them, or even infer that they happen.

So, even a casual investigator of this community will readily recognize this feature. And, there appear to be some blogs that use learned helplessness language, and others that d not. Simple phrases like oh, targets, just get used to it, Wherever we go, there will always be gang stalkers,” and so on. A great example of that is the blog https://neverending1.wordpress.com, where the writer never loses the chance to use negative language that reinforces the hopelessness of those who go here for advice.( I refuse to provide a link it is that negative.)

Extra Bonus: Here is the CIA page for psychological operations to control populations.

Sigmund Freud, in “Civilization and its Discontents,” notoriously classified modern men as “men of action,” and the intelligence agencies are really into that.

“The man who is predominantly erotic will give first preference to his emotional relationships to other people; the narcissistic man, who inclines to be self-sufficient, will seek his main satisfactions in his internal mental processes; the man of action will never give up the external world on which he can try out his strength….”

-Sigmund Freud

And, in the targeted individual community, there is no small irony that they begin to refer to themselves as “TI’s” when in fact the PsyWar equivalent is the “TA” meaning targeted audience.

Here from the CIA link above:

The intelligence officer is not inspired by the purpose of merely collecting and evaluating information or making analytic studies. His mission is not an end in itself, but a means to an end — a contribution to the defense and foreign policy objectives of his country. His work is therefore meaningful only to the extent that the information he provides is utilized through appropriate action. The individual operator’s performance, to be sure, does not lose merit if significant information which he acquired in due time and reported to proper authority is not acted upon; but the intelligence organization as a whole has failed to function effectively if the information it produces does not lead to some kind of policy determination or action.

I must at this juncture make note that in classic schizophrenia, there has always been the element that these claim that they are being followed or harassed by the CIA or the FBI. While organized gang stalking DOES have these claims within it, sometimes, even the paranoids are right, as we se now with the Palantir database which is equipped with artificial intelligence an predictive software, as well as a host of other means by which to ‘read a person’s mind’ and control or manipulate their online behaviors.

But it’s simply not fair to blame the CIA for everything, although it is convenient, and the idea is within the vernacular of most people.Since Edward Snowden revealed that the NSA is sweeping up the data of everyone, and all Americans as well, we are now able to track the basic flow of this data in news stories that document the reach of this grand psychological operation we see that the picture is much bigger, in much more horrible ways than the CIA could imagine all by its lonesome.

Here in this link are the tactics and techniques of guiding, misguiding, or poisoning the dialectic entirely, and then, disguising victims in the cloak of mental illness.Any researcher of organized gang stalking will find correlations between the phhrase “electronic harassment” and discrediting tactics outlined in the CIA manual. In the targeted individual community, the psy-war elements are everywhere.

The Five Eyes nations are all in on it, and Great Britain is one of the worst offenders, using the dirty tricks division JTRIG to compromise, blackmail, and discredit targeted individuals.

A slide from the JTRIG dirty tricks and mind control presentation. Note the emphasis of “making something happen in the real world.” Mass shooters anyone? What else are these guys “making to happen?”via The Intercept

Israel has been getting ALL Americans data since forever, and waging hasbara and other psyops across the globe to enforce, reinforce, or otherwise promote Jewish religion and culture (the apartheid, mind control, old lady killing zionist version  of it.)

From the Washington Post:

“The relationship was described in a “Memorandum of Understanding” between the NSA and the Israeli SIGINT National Unit (ISNU)”

So- if those are “our friends”-our enemies must be real shitbags right?  But even China has yet to catch up with us as comes to waging active psy-war on it’s citizens. We can read  CNN as they try to downplay the fact that China is doing EXACTLY what the Five Eyes alliance is doing to suppress, control, discredit and destroy the free speech rights of western nations.Meet the CNN  version of “the Great Cannon of China.”

But-does it hold up well against the Free Speech Steamroller that we use? Only time will tell-or, maybe someone can  get standing to sue our agencies and see what they are really up to. I bet the Chinese are rolling in laughter as they watch how the agencies and law enforcement in general are using our Constitution as toilet paper.

Lastly, it cannot be understated that “the CIA tortured some folks.” And that the American Psychiatry Association provided advice as to how to do this. Meanwhile, their guys always get the help they need when they are done torturing others. I don’t mean to imply that the CIA and other’s are using the internet as a form of torture for some, but YES THAT IS WHAT I AM IMPLYING. But clearly, they aren’t the only ones doing it.

Mao has nothing on our guys when it comes to propaganda, and mind control techniques, and China last I checked had no Manchurian Candidates.