Mind Control Zersetzung Targeted Individuals Organized Harassment NSA FBI COPS LEIU Cointelpro NWO New World Order Jew World Order
Considerable evidence indicates that behind the plot to take over the world through the New World Order, U.N. Agenda 21 (now Agenda 2030), transhumanism, mind control, and organized stalking, etc., are a series of interconnected cults including the “CIA cult of intelligence” (Marchetti, 1989) and myriad other secret society and intelligence-spawned cults, including Rosicrucianism, the Illuminati, Freemasonry, Theosophy, Zionism, Nazism, Scientology, Jonestown, O.T.O., New Age cults, etc. “Targeted individuals” commonly refer to the network of their stalking perpetrators as “the cult.” My own research in mind control and cults indicates that these cults are connected by commonly-held occult rituals and beliefs, most notably including the Serpent’s lie to Eve that “ye can live forever” and “you shall be as gods.” Indeed, it seems that most of the world’s ruling elite are members of “the cult.” Ultimately, it appears all these cults are led by the “master cult,” Judaism. Christ himself referred to the end-times world system as the “Synagogue of Satan.” It appears that this octopus-like organization is comprised of the “Serpent people” (Jews) and their many minions, dupes, and cut-outs, including Freemasonry and other secret societies. In this website and my 9/11 New World Order website, I identify “Judeo-Masonic-Satanism” as purveyors of this “world revolutionary movement” conspiracy (Carr, 1956). At the core of most or all these cults is the Babylonian mystery religion/black magic system described in the Jewish Kabbalah.
For example, Noblitt and Perskin state in “Cult and Ritual Abuse” (2000) that:
“According to Gersi (1991), who indicates that he lived for five years in Haiti studying and participating in Vodoun ceremonies, Haitian Vodoun has also been influenced by the occult practices of the indigenous Arawak Indians and a variety of traditions from Europe including “many aspects of Freemasonry, as well as esotericism, the (Jewish) Kabbalah, occultism, alchemy, astrology, metaphysics, and Theosophy.”
Most gentiles (non-Jews) don’t understand that the “Jewish evolutionary strategy” is based, to a large extent, on Jews’ acting as a collective. (See Professor Kevin MacDonald’s “A People That Shall Dwell Alone; Judaism as a Group Evolutionary Strategy, with Diaspora Peoples” ). They apparently have a (Satanic) “hive mind.” And through media control, propaganda, mind control and organized stalking, they evidently wish to draw all others into the same slave state. This plays out in history as follows: No matter what country they live in, they form networks and criminal syndicates and work collectively to destroy that nation. Because they operate as a subversive “fifth column” in each nation they invade, they are natural-born actors, spies, liars, charlatans, chameleons, con-men and criminals who often hide their malicious intentions behind smiling faces. There are also vast numbers of “crypto-Jews” (secret Jews) who, like other Jews, infiltrate all aspects of society posing as assimilated members of the society they are subverting. This helps explain why Jews have been expelled from over 100 nations during the past 2000 years (Hitchcock, 2007). And it helps explain the statement by Nikola Tesla, perhaps the greatest scientist/inventor of the 20th century: “Never trust a Jew.”
Douglas Reed pointed out in “The Controversy of Zion” (1956) that “Judaism is a political program disguised as religion.” However, despite his excellent research into the topic, Reed seems to have only gotten half the story. The other half is this: While Judaism poses as the religion of the Old Testament, it is, in actuality, the pagan Mystery Babylon/black magic religion that is based on the assumption that Jews are Gods; they are the “chosen ones” destined to rule the earth and enslave or kill all non-Jews (gentiles). Thus, Jews’ and their spin-off secret societies utilize black magic/Satanism in order to help them achieve this larger political goal. Quoting many rabbis, Texe Marrs, in “The Holy Serpent of the Jews: The Rabbis Secret Plan for Satan to Crush Their Enemies and Vault the Jews to Global Dominion” (2016), proves that underlying Judaism is the worship of the “Holy Serpent,” Satan. This is corroborated by Senate Aid, Harold Rosenthal’s statement: “Most Jews don’t like to admit it but the God we worship is Lucifer.”
The Jewish program of world conquest is now far advanced. Today, nearly half of the Jews in the world live in the U.S. Most of the remaining half live in Israel. Due to their gradual “infiltration, contamination, appropriation, and elimination” (ICAE) of American institutions over the past centuries, America today is essentially an occupied nation. Today, Jews control America’s financial, corporate/business, political, media, entertainment, and education systems. And America, especially America’s military/intelligence, is the Jews’ current weapon of choice to implement Adam Weishaupt’s Bavarian Illuminati world takeover program. Based on the research I compiled in Corrected History: (London) “Jew Money Kings,” Nazi Cartels, The Protocols, Zio-nazis, “Anti-Semitism,” American Traitors, and Illuminati Families and Allen Dulles: America’s Greatest Spymaster and Traitor; Illuminati Agentur (this website), I conclude that, in many ways, America today is in a similar position to that of pre-WWII Germany. As in pre-World War II Germany, Jews have now thoroughly corrupted and controlled our nation with the intent to destroy it. However, because they still need America’s military might to complete their conquest of the world, America is permitted to survive…. albeit in a thoroughly degraded, diminished, and dysfunctional state… for now.
Earlier versions of organized stalking were developed and honed in nations that were also under Jewish control. The Soviet Cheka and East German Stasi secret police, among others, included extensive citizen-state security police-spy networks that terrorized, tortured and murdered millions of innocent civilians, particularly Christians. These nations suffered under the hellish system of communism throughout much of the 20th century. Communism was and is a Jewish invention; the Bolshevik Revolution itself was the work of international Jewry, as documented on this website, my 911nwo.com website, and innumerable other sources.
I conclude that, like communism, organized stalking, mind control, and transhumanism are programs invented by Jewish psychopaths to help usher in their Jewish World Order, aka “Tikkun Olam” (Hebrew for “re-invention of the world”). Today, some refer to the ultimate perpetrator of organized stalking as “sentient, inorganic, artificial intelligence (AI).” But don’t be fooled by terms. In my opinion, this system is animated by Satan himself and is carried out by his minions in order to; 1) destroy all non-cooperating and/or non-essential elements of society, and 2) fulfill their Satanic blood lust for inflicting pain, torture, and death upon innocent victims.
Today, it is not politically correct for Christian pastors to mention that Jesus Christ stated to the Jews (Pharisees):
“Ye are of your father the devil, and the lusts of your father ye will do. He was a murderer from the beginning, and abode not in the truth, because there is no truth in him. When he speaketh a lie, he speaketh of his own: for he is a liar, and the father of it.” (John 8:44)
Malaysian Prime Minister Mahathir Mohamad stated: “Jews rule the world by proxy… They get others to fight and die for them.”
Thus, while it appears that organized stalking is mainly coordinated and carried out by America’s intelligence services (NSA, CIA, FBI, DHS, and others) and their myriad private sub-contractors, these agencies in turn, are pawns of more powerful forces through shadowy hierarchical structures.
In my own experience as a “T.I.,” I have been stalked and harassed to a disproportionate extent by Jews. Other perpetrator groups clearly include military/intelligence and ex-military/former intelligence contractors, volunteer citizen-police ‘wannabees,’ “neighborhood watch” dupes, and low-life bottom feeders of all stripes. We “targets” are in good company, however; for Jesus Christ was also gang stalked…. by Pharisaic Jews.
For the above reasons, I conclude that it is no coincidence that “targeted individuals” may feel that they are under “satanic/demonic oppression.” They are. Unfortunately for “satan’s kids” (Jews and their minions), however, satan eventually betrays and destroys everyone. And the “Jewish Utopia,” if it is established on earth, it will be short-lived. Satan and his myriad, duped minions will deservedly be destroyed by the Creator of this world.
The following short statements/articles help expose and explain these confusing phenomena.
I. Who’s Doing the Stalking? From “Gang Stalking and Mind Control: The Destruction of Society Through Community Spying Networks,” A.K. Forwood states:
“Gang-stalking groups derive their members from many sources, including government, military, business, religious, and criminal sectors of society. Members can be drawn into a gang-stalking group at any age, and there are even people who are born into it, and come from a long line of generational members involved in a secret web of power and control that has existed for centuries. These members are usually from families with heavy military, political, or religious backgrounds, but this is not always the case. Many of these people grow up thinking that their secret activities are a normal aspect of society.
Some gang-stalkers may not even realize that they’re involved in anything that is evil, but what they’re doing is deeply satanic, and those people who are members of gang-stalking groups are essentially serving an evil enterprise that is creeping through the shadows of society and slowly taking it over. These gang-stalking groups exist at the very bottom of a hierarchical structure of power and control that rises to the very highest levels of society. Being at the bottom of this hierarchy, their efforts aren’t necessary, but they’re very useful, and even entertaining to the their handlers and controllers.
Those who actually set up gang-stalking groups and direct their day-to-day activities occupy slightly higher levels within the pyramidal structure of power and control. These are the group handlers, and are often police officers, government employees, business operators, church officials, etc. These people are in turn directed by an even higher level within the structure, which is almost exclusively generational bloodline members- those who are born into this satanic web of evil and whose ancestors have served under it for a number of generations. These are the real controllers of these groups, who always keep themselves at a safe distance from the actual groups and their gang-stalking activities.
These bloodline controllers come from families that are much more deeply involved in satanic activities, and will often be active in business, religion, politics, the military, or intelligence. The children of these families are raised from an early age using advanced methods of trauma-based -mind-control- through satanic ritual abuse- to assure they remain subservient to the higher levels of power that they are being brought into. These people have multiple personalities….
Mind-control and satanism go hand in hand, and gang-stalking groups are the perfect conduit for mind-control research and applications. Those bloodline families that are involved in satanism are also connected to the most advanced technologies, including the blackest of black projects of the military and intelligence organs, as well as secret technologies that may have been developed in the private sector. The military have been interested in mind-control technologies since at least the 1920s, and have been developing them ever since. These technologies end up in the hands of satanists because satanism is strong throughout the ranks of the military and intelligence organs. As a new mind-control technology is being developed, it needs to be tested, and this requires guinea pigs to test it on. Sometimes military personnel are used, but often ordinary citizens have become ensnared in these mind-control experiments. The level of sophistication is so good that those who are developing these technologies and targeting the public can create a mind-controlled slave that is totally unaware of being controlled, and without the need to create multiple-personalities through trauma. This opens up the possibility to enslave an entire population, which is the ultimate goal, and at the stage that they are at now, they are able to totally take over an individual’s thoughts and actions and orchestrate that person like a puppet on a string whenever they wish. Gang stalking groups are the ideal conduit for the proliferating this sort of technology, and it seems to be making the method of setting up these groups in the traditional way unnecessary, and a person’s participation can be totally involuntary and unwitting, not knowing that they are being controlled and used in a gang-stalking operation.”
II. The Stalkers Show “Predominance of a Particular Religion:” From Juliane McKinney, U.S. Army Intelligence Officer, author of “Mind Control Harassment and Mind Control Experimenation” — http://www.raven1.net/microwav.htm, http://www.liveleak.com/view?i=5d5_1194548311#MuzfAV1Ybx0wBddB.99, and gang stalking “Targeted Individual” for four decades:
“In addition, to the use of the electrical grid throughout the country, microwave towers, power lines, these (electronic) weapons systems are also used by neighbors who surround people who have been identified as targets of opportunity. What I’ve noticed is that there seems to be a predominance of a particular religion that makes it particularly easy for them to cooperate.
I’m not anxious to start a religious war. But over the years, I’ve made it a point to get to know these people. I’ve been drawing distinctions. And what I’ve found is that the perpetrators appear to belong to one particular religion, whereas the targeted individuals do not belong particularly to that particular religion. I’ve challenged other TIs to get to know the people who are harassing them, to draw those distinctions themselves. This is something I’ve observed over the past 10 years.”:
III. Basis of Jewish Deceit, Destruction, and Arrogance. From Texe Marrs, 2016, “Holy Serpent of the Jews, The Rabbis Secret Plan to Crush Their Enemies and Vault the Jews to Global Domination:”
“American Jews are actually trained since childbirth to interact with non-jews in a deceitful and arrogant way, admits Karen Friedman, herself a Jew, in her Internet blog. “They actually coordinate with each other to emotionally destroy non-Jews and Israel critics. This, she adds, is actually deliberate, wicked, planned behavior motivated a narcissistic, self-righteous fury.”
“The Jew doesn’t care how much he or she hurts others,” warns Ms. Friedman. “Jews only care about what’s good for the Jews.
IV. On Jews, Jewish Gangstalking, Targeted Individuals, and Organized Harassment: From “Wolves in Poor Pathetic Jew Chabad Lubovitch Rabbi Meir Kahane Clothing” By Morris Alba
Filed under: Uncategorized — grypa666 @ 07:20 (http://olivebiodiesel.com/Wolves-in-Poor-Pathetic-Jew-Clothing.htm)
Chart depicts Judaic Radicalization aka self-righteous Jewish Red Squads (the inverse racism of American Gangstalking). This is a global, Anti-Christian phenomena monopolized in the U.S. by Jews… Jewish Gangstalking exposed it’s the Jews. Stupid gangstalking arcticles that minimize Jew involvement are written by Jews. Targeted Individual Organized Harassment via Judaic radicalization, aka American Red Squad encroachment.
The New Millennium Eugenics is committed almost entirely by criminal Jews. The first incident of Gangstalking, the mark or targeted individuals “cherry popping” is usually an all Jew endeavor. 90% of all Morgellons Disease (including Joni Mitchell’s) was and is inoculated criminally by Jews.
At least 75% of all gangstalking organized harassment crimes in the U.S. are committed by Ashkenazi Jews. The remaining Targeted individual crimes / organized harassment crimes are pretty evenly divided between Hispanics, Asians, Blacks, Whites, etc. A preponderance of the targeted individuals are White Christians.
100% of Gangstalker Jews as well as their lackey other race tag-alongs use cell phone apps to stalk and covertly harass their victims. So, one could simplistically call the phenomena of Gangstalking “predator and prey” – if one simplistically subtracted God out of the equation.
‘Cursed is anyone who attacks a neighbor in secret.’ ~ Deuteronomy 27:24.
In God’s time, not man’s time, who is predator and who is prey? In Satan’s realm, who is predator and who is prey?
But I say to you, do not resist the one who is evil. But if anyone slaps you on the right cheek, turn to him the other also. ~ Matthew 5:39.
Gangstalking started out as Operations Predator, Carnivore and Paperclip; the cell phone app was to train the predators to “see” or “sense” their prey through walls, in elevators, etc. The gangstalkers get addicted to the hunt as well as get addicted to indoctrinating friends and family to “join the hunt”. There is no real sense of right/wrong morality, no sense of sin and righteousness. The “hunters” are trivial people like a former Hispanic Sonic Manager in Duarte California, the Asian Manager of Denny’s in Duarte, Anthony (the former Manager of Target in Duarte), etc. The customers who gangstalk are nearly 100% Jews, but they get a wink and a nod from their Hispanic retail chain manager. Literally all of these people see themselves as “God-like”…
“God-like”? In the Stephen King movie, “The Stand” there is a line taken out-of-context here, “why you insignificant little chicken-fried-steaks”. Gangstalkers are portable courtrooms, with their own judge, jury and executioner contained right in the brainstem of a 90 IQ point Jew! There is a Great Truth, which Gangstalkers fail to even see the tiniest glimpse of… …that Gangstalker-Jews and their other-race counterparts are The Chosen of Satan. Repent, before it is too late! Repent, before God judges you ~ do not as “which God” (more arrogance!)… There is but one true God, The God, He is a not twin he is not a Cephalopod, He is Who He Is.
Numerous articles have claimed that aliens are in charge (rather than the Antichrist). Gangstalking is the Antichrist, and those who fully embrace it do share certain qualities with lizards. Repent! Some of you are beginning to look like you are staring out of a third eyelid; there is so much sin and Satan inside!
(Revelation 16:9): They were seared by the intense heat and they cursed the name of God, who had control over these plagues, but they refused to repent and glorify him.
Revelation 19:20: But the beast was captured, and with it the false prophet who had performed the signs on its behalf. With these signs he had deluded those who had received the mark of the beast and worshiped its image. The two of them were thrown alive into the fiery lake of burning sulfur.
Revelation 2:9: I know about your suffering and your poverty–but you are rich! I know the blasphemy of those opposing you. They say they are Jews, but they are not, because their synagogue belongs to Satan.
Gangstalking is Satanic. The Mossad and NSA are Satantic. Most Gangstalkers have been fooled by Satan, some willingly and knowingly serve satan and have rejected God. Gangstalking is sin, and those who live the lifestyle (each act is two felonies under U.S. laws) are breaking God’s laws as well as Federal Laws. Long-term Gangstalkers get a lizard-like facial countenance which is from Satan, not from Gaia. Gangstalkers become possessed by the devil Himself, with the possessed being the last to see the depths of their deludedness. There is a reckoning happening, a judge met of God. Whether you are the Predator or believe you are the prey, Repent Before God. Time is short, Repent of your sin, forgive your oppressors and repent all of your sin..
V. Jewish “Communist” Gang Stalking (http://recordings.talkshoe.com/rss91371.xml)
Supremacist mobbing, group bullying, Stasiland [see book] gang stalking, COINTELPRO II are all about JewsKingPhu control and scaring YOU into submission, if not murder & suicide using a very patient, sophisticated psycho-social process; essentially military grade psy-ops. Overall tactics match those used in the so-called communist Bolshevik and NAZI “revolutions.” Masonic COUPS: Jews funded Hitler and American “NAZIS” TOO! Included are the importing of terrorists to terrorize the masses and to allow false accusations, setups, entrapment, community smearing to allow ‘nature to run its course’, using also a snitch racket and revenge model. (Usually fabricated)
CIA/MILITARY quality infiltration, and zi-op harassment tactics of civilians and their families! ie. HUMAN RIGHTS VIOLATIONS, TRAFFICKING and RITUAL TORTURE OF CHILDREN, terrorist threats, blacklisting, murder of family members via “accidents”, medical, “suiciding”/smearing good cops etc. Many GOOD Russian police, intellectuals and ‘pretty people’ had the peasants turned against them first, and then famines were used to thin the poor Soviet “herds”. (In their minds that’s all we are and to be used for BLOOD sacrifice as needed.) Everything from noise campaigns and extreme staged ‘rudeness’ to sophisticated indirect threats using “psychological anchoring”, poisoning, disabling the target, or members or their family, affecting their HEALTH CARE, LEGAL actions and scrubbing of any involved MEDICAL records. The SAME games law enforcement use against honest officers and drug dealers known as “bad-jacketing”; to eject the former and have peers execute the latter who are “vermin” after all, for using MASONIC DRUGS. This is very ironic that the “Royal” UGLE Crown has been the biggest HEROIN dealer for HUNDREDS of years dating back to China.) “Bad-Jacketing” for Mobbing or group bullying are also being used by teachers on the children of Americans targeted for a variety of reasons. Don’t teens have enough to worry about? Keeping healthy mentally and not allowing provocations is an important topic. Transforming the way you mentally process the harassment transforms the way in which it effects you; you can literally make the impact positive with enough work.
Never forget targets for this treatment usually have superior intellectual skills, ethics, and BALLS, so you’re in good company; these tactics have been used on far more “important” people than us, but now it’s gone PUBLIC. Michael Jackson is a NATIONAL HERO, not a pedophile as the pedo masters claimed on their BOOB TUBE! Beware of the “Loss of faith in humanity” that can accompany being targeted and see that it’s based on a completely FALSE information MODEL. **YOUR faith in your fellow human is a primary target of these NazAyinists; don’t take the bait! This is one of the main functions of the FAKE “targets”; the other, of course is to play into the ‘crazy/paranoid’ scenarios from the Gulag Archipelago [book]. This Podcast was created using www.talkshoe.com
VI. Talkshoe EPISODE66 – Jewish Stalking – November 24, 2015 at 6:55 PM
Here to promote a key update and warning to TIs being stalked, their children attacked, by the Jews and their BORG-like army of drones. Many mind controlled, others on their DEEP POCKET payrolls and of all colors. The Black Gay Boule is a key player in their game plan of creating a race war and Renata is a KEY player in that arena. Whether RACIST Renata and company are MK drones or Prince Hall Masonic (Black Gay Boule) whores, only they and their handlers know, but ALL ‘leaders’ are absolutely ‘controlled opposition’ as Lenin called them, under Jewish so-called “communism”. Here’s some information on this Jewish supremacist stalking, ritual murder crap and the Jewish VATICAN: http://dragonspaw.blogspot.com/2015/11/ http://www.youtube.com/user/TheTempacct/videos Pelosi demands an American CHILDREN as collateral to give dissident a -one way passport to Dallas-! Think JFK: https://www.youtube.com/watch?v=5OkxW2mLN5M
VII. EPISODE65 – KEY Information Update on Jewish Stalking November 13, 2015 at 7:37 PM
Greetings Targets! Trust you’re hanging in there with bells on; some of what I’m about to tell you will be disturbing, but if I’m not 100% certain I will say so; the hardest part has to do with religionS! See my v/blogs exposing demonic RACIST supremacist Jews here: http://dragonspaw.blogspot.com/2015/11/. Both males and females need to be aware of their insidious infiltration methods of using your isolation or sexuality to worm, no SNAKE, their way into your life and then poison or set you up for a suicide via ‘friends’! Their acting skills, primed at a very young age, are honed in forums daily and while they’re more like sharks, they work in schools on naive people turning to the internet. I’ve seen both male and female ‘senior eatas’ to use their term with their love of fun-etical games and methods of interlingually encoding our languages. eloHIM, MENorah, DriedEL, etc. Take care of yourself and learn to “Take No thought” every day and pipe prana/chi into your body to keep it strong. Books: Gulag Archipelago, Stasiland (Funder), Under the Sign of the Scorpion, detail the methods used on us like “Punitive Psychology” by their evil doctors and drones.
VIII. The importance of the corporate sector in “Public-Private-Partnerships:” Insights from Dr. John Hall’s “Guinea Pigs: Technologies of Control” (2014):
“Insidiously, spycraft has been taken out of the sole proprietorship of the NSA, CIA and DIA and contracted out to the “pseudo-civilian” contractors. Private sector intelligence gathering has become an extremely lucrative business with a multitude of privately held companies battling for government contracts. The possession of a government clearance is now openly traded on the free market with many companies actively seeking former government employees with varying levels of security clearance. Government intelligence agencies have become revolving doors for personnel to supply the growing market for independent contractors with security clearances. Author Tim Shorrock, in his book “Spies For Hire: The Secret World of Intelligence Outsourcing,” does a great job of exposing this dirty little secret that has actually worsened since it was published in 2008. As of 2008, apparently 70% of the country’s intelligence work was being contracted out to private intelligence companies. In 2006, more than half of the employees at the National Counter Terrorism Center were private sector contract employees and the NCTC’s control room itself was designed by private sector engineers from Walt Disney Imagineering. Contractors now make up more than half of the workforce of the National Clandestine Service and private businesses doing business with the NSA has grown from 144 companies in 2001 to over 5,400 now. Most of the text messages, cell phones, and e-mail intercepts providecd by the NSA are actually the work of compnaies like SAIC, CACI, International and Northrop Grumman which are responsible for the interception and analysis of the data.
ETK note: Hmmmm, SAIC (Science International Applications Corporation). We learned in my 911nwo.com website, that SAIC was evidently pivotal in the successful use of directed energy weapons that destroyed the Twin Towers on Sept. 11, 2001! Located at 1710 Drive, McLean, VA 22102 (703-676-4300), and probably run by ex-CIA and Pentagon employees, perhaps all Americans should write/call SAIC and congratulate them for being instrumental in bringing us 9/11 and the post-9/11 national security (Gestapo) police state.
… It is estimated that 60 percent of (the CIA’s) annual budget is spent on private contractors…. Under the Obama Administration, approximately 1,931 private corporations work on programs related to counter terrorism, homeland security, and intelligence in more than 10,000 locations across the country.
The NSA has a multi-billion dollar budget and unrivaled technological sophistication which allows them carte blanche access to every form of communication. They know what they are collecting!
….. One must remember that the technology being used to commit these crimes originates at the federal government level. Hence, it is seen being used most often by private investigative agencies that are owned and operated by former FBI agents. These individuals maintain contacts with the agency who work with them in a reciprocal relationship.”
Hmmm… Which group(s) tend to own the corporate sector? International Jewry.
IX. Neocons, the Anti-Defamation League (ADL) and other Jewish Lobby Groups and Think Tanks, Mossad and the Sayanim
In “US Electromagnetic Weapons and Human Rights” (2006), Phillips, Brown and Thornton (this website) state:
“With the advent of the military-industrial complex after World War II, President Eisenhower observed that an internal military industrial power faction was consolidating their long-term plans for the domination of America and, eventually, the world. Eisenhower was in no position to fight these men, and history records his feelings on the subject with the text of his short farewell address:
“….But threats, new in kind or degree, constantly arise. Of these, I mention two only…
…This conjunction of an immense military establishment and a large arms industry is new in the American experience. The total influence – economic, political, even spiritual – is felt in every city, every Statehouse, every office of the Federal government. We recognize the imperative need for this development. Yet we must not fail to comprehend its grave implications. Our toil, resources and livelihood are all involved; so is the very structure of our society.
In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.
We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted. Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together.
Akin to, and largely responsible for the sweeping changes in our industrial-military posture, has been the technological revolution during recent decades. In this revolution, research has become central, it also becomes more formalized, complex, and costly. A steadily increasing share is conducted for, by, or at the direction of, the Federal government.”
We now understand that Eisenhower was referring to the conjunction of redirected tax monies to research secret new technology aimed at nothing less than increasing the controlling power of the military industrial elite to a global scale.
One particular faction of ambitious men, the former cold warriors and emerging neo-conservatives, were close followers of philosopher (and German Jew) Leo Strauss. This elite group included not just generals and industrialists but philosophers, scientists, academics, and politicians have now become the most powerful public-private war organization ever known.
Strauss espoused an elitist philosophy that fawned over the characteristics of those who inherited wealth and lived lives of leisure to pursue whatever their interests may be. His ideas have been transformed into a cogent ideology in which the media, religion, and government are used to subdue the masses while the real “nobles” follow their own will without regard to the laws designed to control lesser men. Strauss was likewise fond of secrecy, as a necessity for control, because if the lesser men found out what was being done to them they would no doubt be upset.
Leo Strauss, Albert Wohlstetter, and others at the University of Chicago’s Committee on Social Thought receive wide credit for promoting the neo-conservative agenda through their students, Paul Wolfowitz, Allan Bloom, and Bloom’s student Richard Perle.
Canadian cultural review magazine Adbusters, defines neo-conservatism as, “The belief that Democracy, however flawed, was best defended by an ignorant public pumped on nationalism and religion. Only a militantly nationalist state could deter human aggression …such nationalism requires an external threat and if one cannot be found it must be manufactured.”
The neo-conservative philosophy emerged as a reaction to the 1960s era of social revolutions. Numerous officials and associates in the Reagan and George H.W. Bush presidencies were strongly influenced by the neo-conservative philosophy including: John Ashcroft, Charles Fairbanks, Richard Cheney, Kenneth Adelman, Elliot Abrams, William Kristol, (Richard Pearle), and Douglas Feith.
Journalist John Pilger recalls his interview with neo-conservative (Jew) Richard Perle during the Reagan administration: “I interviewed Perle when he was advising Reagan; and when he spoke about ‘total war,’ I mistakenly dismissed him as mad. He recently used the term again in describing America’s ‘war on terror’,
“No stages, This is total war. We are fighting a variety of enemies. There are lots of them out there. All this talk about first we are going to do Afghanistan, then we will do Iraq . . . this is entirely the wrong way to go about it. If we just let our vision of the world go forth, and we embrace it entirely and we don’t try to piece together clever diplomacy, but just wage a total war . . . our children will sing great songs about us years from now.”
There is ample evidence available to show that some individuals within government and industry have little problem with violating the public trust and using their positions to kill, maim, torture and destroy. It is of the utmost importance to our traditional American values of human rights and cognitive liberty that we recognize this threat from within. We must move to identify those who show these proclivities and ensure that their activities have adequate oversight.”
Many observers and insiders assert that the “Jewish lobby” groups including AIPAC (American Israel Public Affairs Committee), JINSA (Jewish Institute for National Security Affairs), Southern Poverty Law Center, and think tanks such as PNAC (Project for a New American Century) and the CFR (Council on Foreign Relations whose membership is 80% Jewish), and the Jewish owned MSM (mainstream media) essentially dictate American foreign and domestic policy. Clearly, the two-pronged strategy of Operation 9/11 was as 1) a “war trigger” to justify a series of wars of conquest in the Middle East of which Israel is the chief beneficiary, and 2) to radically increase the totalitarian police state in America. In his book, “The War Against the Terror Masters,” neocon Jew, Michael Ledeen, basically predicts the policy of chaos now being visited on Israel’s enemies in the Middle East:
“Creative destruction is our middle name, both within our own society and abroad. We tear down the old order every day, from business to science, literature, art, architecture, and cinema to politics and the law. Our enemies have always hated this whirlwind of energy and creativity, which menaces their traditions (whatever they may be) and shames them for their inability to keep pace. Seeing America undo traditional societies, they fear us, for they do not wish to be undone. They cannot feel secure so long as we are there, for our very existence—our existence, not our politics—threatens their legitimacy. They must attack us in order to survive, just as we must destroy them to advance our historic mission.”
In the above quote, “we” refers to Jews, and “our historic mission” refers to world conquest. Organized gang stalking must be understood as one of many programs designed to fulfill this larger objective.
Just how powerful are the Jewish lobby groups?
Rep. John Rarick quoted Sen. Jack Tenney of California in the Congressional Record: “The CIA and FBI are tinker toys compared to the ADL.” (Congressional Record, Dec. 6, 1971)
The relationships between major national spy agencies with each other and with lobby groups, think tanks, and political institutions are complex. In general, the OSS/CIA developed under the watchful eye of and in conjunction with British MI6 and the Nazi Gehlen Organization. In turn, the CIA trained and helped to form the Israeli Mossad, whose motto is “By deception, thou shalt do war.” Past and current spying on America and its institutions and the wholesale theft of state and war technology secrets by the Israeli Mossad are well documented.
Additionally, it is estimated that at least a million Jewish citizen-spies, called “sayanim,” are on call to cooperate with Mossad in covert operations in America.
Today, the American government, controlled by the (mostly Jewish) plutocracy, has decided it must have the means to neutralize (kill and destroy) non-cooperating elements within American society and throughout the world. Organized stalking is covert, extra-judicial murder of innocent citizens that is organized and directed by “the cult” and sanctioned by “the state.” “The cult” is international in its scope and objectives and is identified herein. These psychopaths must soon be brought to justice for these monstrous crimes against humanity.
I conclude that a primary objective of current organized gang stalking operations emanating from U.S. intelligence/military is to help ensure fulfillment of “man-made prophecy” in the Jewish Talmud:
When the Messiah comes every Jew will have 2800 slaves.
— Simeon Haddarsen, fol. 56-D
This Jewish plan for world domination is also articulated in the “Protocols of the Learned Elders of Zion.” For this man-made prophecy to be realized, dissidents and non-cooperative gentiles must be neutralized and/or destroyed by state agencies and their surrogates. Mental totalitarianism must be established through hierarchical covert stalking programs and networks funded and perpetrated largely through “Public-Private Partnerships.” In the process, of course, the inalienable rights guaranteed to American citizens in the U.S. Constitution, and indeed the nation itself, are destroyed. The fact that these programs are now being carried out worldwide suggests that the plutocracy (Judocracy) intends to use American military might and organized stalking technologies to complete their long-term plan of world conquest.
Forwood, A.K., 2011, Gang-Stalking and Mind-Control: The Destruction of Society Through Community-Spy Networks, Lulu Publishing, 97 pp.
Hitchcock, A.C., 2007, The Synagogue of Satan, The Secret History of Jewish World Domination, RiverCrest Publishing, 316 pp.
MacDonald, K., 2002, A People That Shall Dwell Alone; Judaism as a Group Evolutionary Strategy, with Diaspora Peoples, Writers Club Press, New York, 492 pp.
Marchetti, V., 1989, CIA: The Cult of Intelligence, Dell.
Marrs, T., 2016, Holy Serpent of the Jews: The Rabbis’ Secret Plan for Satan to Crush Their Enemies and Vault the Jews to Global Dominion,” RiverCrest Publishing, Austin, TX, 217 pp.
Noblitt, J.R., and Perskin, P.S., 2000, Cult and Ritual Abuse: It’s History, Anthropology, and Recent Discovery in Contemporary America, Praeger, Westport, Connecticut, 269 pp.
Reed, D., 1956, The Controversy of Zion, Veritas Publishing Company, 587 pp.
Your email address will not be published. Required fields are marked *
Copyright © 2017 Gang Stalking, Mind Control, and Cults. All Rights Reserved.
... that behind the plot to take over the world through the New World Order, ... mind control, and organized stalking, ... Jewish Gangstalking, Targeted Individuals, ...
Supremacist mobbing, group bullying, Stasiland[see book] gang stalking, COINTELPRO II are all about JewsKingPhu control and scaring YOU into submission, if not murder ...
New World Order; UN/One World Government; New World Religion? ... mind control, and organized stalking, ... Targeted Individuals T.I. Organized Harassment NSA FBI ...
... Organized Stalking and ... at the NSA and CIA 14. Mind Control and Mind ... the civil rights of targeted individuals in illegal conspiracies ...
New World Order? Audio & Video; Search ... [MUST KNOW Jew psychotronic warfare] Militant Judaic ... These are not “the Jews next door”, these are NSA/FBI/Homeland ...
morgellons jewish judaic jews disease gang stalking skin fibers world ... ,Targeted Individuals [Jew World Order HARASSMENT] ... control, gang stalking, new world order .
Gang Stalking, Mind Control and Cults. ... known as the New World Order.-Mark M. Rich, “The New War: ... The new enemy (Targeted Individuals) ...
Feb 11, 2005 · It was during my extended investigations into Operation 9/11 and the New World Order ... new enemy (Targeted Individuals) ... Gang Stalking, Mind Control, ...
... (Global Organized Gang Stalking Operation ... (the Jewish Kahal/British Israel/New World Order). ... “MICROWAVE HARASSMENT AND MIND-CONTROL EXPERIMENTATION ...
Undertake a major investigation of COINTELPRO regarding targeted individuals ... New World Order aka ¨Jewish ... Mind Control Psy Op and the CIA/DOD/NSA ...
Oct 12, 2015 · WHAT IS GANG ORGANIZED STALKING??? (FBI, DEA, ... possibility of mind control, ... individuals targeted by organized stalking in the U.S. today are ...
COINTELPRO CONTINUES TODAY COINTELPRO EXPOSED. Targeted individuals. ... who are targeted by organized stalking and electronic harassment ... New World Order…
The New World Order ... before his murder by CIA mind-control ... - News Media Blackout On 'Revving Bulldozers,' Intimidation And Harassment Of New ...
NSA Transmissions-Mind Control, ... to FBI records, 85% of Cointelpro resources were ... and BONES and New World Order, ‘Proof of Conspiracy-A new American ...
... on the odd chance the New World Order/Illuminati/Freemasons ... police CIA FBI NSA DHS AND U.S ... health/gang-stalking-targeted-individuals ...
... surgical mutilations, ‘mind control’, ... CASE SUMMARIES from TARGETED INDIVIDUALS all over the world, ... BY ORGANIZED STALKING AND ELECTRONIC HARASSMENT
Exposing Intelligence Agency Human Rights Abuses, ... Jewish Psychopathology, Organized Stalking ... heard by Targeted Individuals. If this mind control weapon ...
The New World Order is "Communism" by ... There is no secret kabal of Jews wanting to control the world." ... Video Testimony to Plight of Targeted Individuals in ...
A LETTER ADDRESSED TO "THE SHEEPLE" FROM "THE GLOBALIST NEW WORLD ORDER" ... *Skepticism For Targeted Individuals *Mind Control ... -Organized stalking and harassment ...
Undertake a major investigation of COINTELPRO regarding targeted individuals ... the New World Order´s GOG´S NeW ... Jews were involved in the organized stalking ...
Tactics for Fighting Gang Stalking ... by employing psychological warfare and mind control tactics against “targeted ... (Judaic-Satanic) New World Order.
GOG´S NeW GESTAPO is designed to ensure the implementation of the fascist New World Order aka ¨Jewish ... Organized Stalking/Mind Control ... New (Jew) World Order…
Mirrored from: https://www.zersetzung.org/mind-control/mc-exhibits/61-temp/ayt-articles/328-ayt-organized-stalking-or-psychological-operation
Posted by jeremy on June 17, 2010 5:21 pm.
Nobody likes to admit that they’ve been fooled for months, or even years on end. One has to lead deceived people, step by step, to an understanding that the sources of information which shaped their beliefs may not be trustworthy. Once they have that understanding, they’re ready to begin learning how the world around them really works.
Nowhere is this more true than in the world of state-to-person warfare. It usually takes several years for a targeted individual to grasp the scope of the seemingly all-powerful forces aligned against him. In the process, his beliefs about how his society works are systematically demolished and rebuilt.
What if that targeted individual has simply moved from one level of deception to another?
A person who has not been targeted has several preconceived notions about how individuals and organizations behave, and about what is technologically possible. He believes he understands society and his role in it. He might recognize that dirty tricks can be played on an individual by powerful people, but at the same time, believe that either he isn’t important enough to warrant such treatment, or that he knows what kinds of tricks can be played.
The above is the default belief system.
By contrast, a target of an organized harassment campaign has spent several months or years experiencing pervasive corruption, mobbing tactics, and subversion of law enforcement. He may have experienced advanced technology being used against him. In short, he’s been taught what an organized stalking campaign looks like.
These teachings are a new belief system, replacing the old one.
New kinds of psychological operations - misleading the target about the extent of the social networks after him, and about who’s really behind the campaign - have been made possible, thanks to the target’s new awareness. If the original group behind the campaign lost track of the target or lost interest in him a long time ago, how would he know it?
This is what nobody wants to hear. You may have been spending months or years fighting one operator…
This observation will not apply to every target. It might not even apply to a majority of targets who have managed to find sites like this one. However, my belief is that the majority of targets who have been made aware of “unbeatable” surveillance or “unblockable” weaponry are being managed by intelligence agencies.
If you were adopted by an intelligence agency - who might have been the real instigator of your campaign - you would discover that people around you seemed to know far too much about you. The question would then be: how?
Are they really members of some latter day Stasi-esque organization, or are they ordinary people who are being subliminally influenced (unknown to them) to act against the target? Why should we assume that mind control technology is only used against targets?
Reducing the target’s assets to zero would be an important goal, to make it easier to manage the target. Money is power; money creates options. The more options you have, the more manpower-intensive your handling will be. Those options need to be removed from your life, for the sake of efficiency, and as asset-stripping to help fund clandestine operations.
Logistically speaking, a small group of people could manage everything a target encounters during extreme harassment episodes. Once the target has been sensitized to important themes through a few days or weeks of extreme harassment, he could be managed by one person, part time, who would occasionally use mind control on people around the target to expose him to those themes.
This is what nobody wants to hear. You may have been spending months or years fighting one operator using advanced computer-human interfaces and mind-control technology to manipulate you, and the people around you.
Let’s suppose that a group of people affiliated with an intelligence agency is exploiting people who are targeted - either by their own government (due to being flagged); or by mobbing campaigns that have spread widely enough to include an operative or asset for that agency; or by organizations watched by that agency such as satanic cults, pedophile networks, or the Freemasons. The intelligence agency operatives are likely controlled as well, through blackmail, threats, or explicit trauma-based mind control.
Targeted individuals will be facing extreme stresses, yet those stresses will not be officially recognized because of the institutional corruption and subversion that goes hand in hand with targeting. They are the perfect pawns to assist, willingly or not, with intelligence agency psychological operations. The outbursts of targeted individuals can be controlled and timed to fit a schedule of staged media events.
Are targeted individuals who fit this profile being harassed, or tested and trained?
Why does the FBI refer unwitting targets to websites like this one, under the guise of ridicule?
Is there a master schedule underlying the outing of organized harassment campaigns and technological mind control?
Are targeted individuals being gathered together, and are their inter-relationships being managed?
What’s really going on here?
Copied over from the old server.
The master plan
I think you point out some really important things Jeremy.
I’ve wondered to about the “outing” of the problem. There seems to be a similar problem being outed right now - the non consensual experimentation and torture at Guantanamo. What does our outing serve? To scare the rest of the population into compliance? I don’t think that the harassers/torturers are as efficient as might be supposed, but they appear to be long-term planners.
I happen to believe for very specific reasons that my targeting began at an early age and that it has to do with who I am. I have a theory that we might be passed on from group to group. That is, that this might be some kind of interagency/intergroup thing - we are passed to different groups/agencies at different points and that other agencies or groups that would normally assist us are told not to.
My social engineering takes on the aspects/tactics of a very particular group whose philosophies I find revolting, but who’s to say it’s them. Maybe it’s more psy ops. The harassers love decoying - I’ve seen them do this dozens of times. Even so, I can point to specific individuals and companies that have been directly involved in my harassment, so that should be some kind of clue.
Any group that might help us will, of course, be infiltrated. These people are about total control. As you say, they would like to control our belief systems - not just our beliefs about systems, about what this is about, but even personal beliefs. I can’t recount my story here, but I’ve seen a lot of that.
That being said, I don’t buy into the “Jiverly Wong” thing anymore. I can’t imagine that at a young age someone would have thought that I had any capacity for violence, and I would guess that most targets are similar to me in that regard. It could be they target loose cannons to make post hoc rationalization of our targeting (see, we could be violent), or it could be that they fake those situations. Who knows. Also, who knows what kind of lies they might tell other agencies about us.
I enjoy reading about your theories for this gangstalking.
The possibility of being tested and trained has entered my mind, too, but for what? Are we supposed to join the military and deploy to Iraq or Afghanistan after boot camp to take part in some secret psy-ops?
The FBI are just cops, as far as I’m concerned. I’ve never to my knowledge been contacted by them. The proper channel to contact them would be through the local police or sheriff, as far as I know. (Cops are big on proper channels for everything.) If you report a federal crime, it’ll get mentioned to the FBI, but of course they’re not going to confirm or deny anything.
As far as the NSA goes, I’ve read that even their employees are subject to covert surveillance, with the degree of surveillance increasing with the importance or level of the secrets they have access to. I wouldn’t have driven there or even called their PR office, if I were you.
On being adopted
Perez exclaimed: “ADOPTED BY AN AGENCY ?—sold, traded, slaved by.”
Read James Bamford’s books.
I find the NSA’s employee surveillance understandable if a bit spooky. If they didn’t conduct covert surveillance on their own employees, there would be foreign spies doing so, given the nature of their work.
I don’t know how much of this is relevant to the gangstalking we experience, but if you happen to stumble onto something sensitive or classified, or poke the hornet’s nest, so to speak, you may be setting yourself up to be hounded for the rest of your life.
Who knows? The surveillance is probably getting a bit out of hand. If it has anything to do with the NSA, it’s so highly classified that the FBI will be quaking in their boots.
It doesn’t matter what level/status we are the stalkers are still illegally surveiling me 24/7 That’s one of the big questions we have is why me cause I’m not a politically important person or a celebrity or even in the military or rich or anything so why us mostly called regular normal everyday people…? I’ve come to realize from going thru this and reading theories reports testimony from TI’s So now I say its all part of the NWO’s take over and control and control MORE & ALL the way of the World so I think it doesn’t matter if you’re a TI or a Perp. when it comes down to it we’re all just another human to be controlled
God bless us all
Of course it’s not about what level/status we are. A three-letter agency that conducts massive surveillance on its own employees will find it all too easy to extend that surveillance to civilians who may have stepped on some important toes or gotten too close to some important secrets.
That surveillance will not be so nearly so benign when it is directed at us non-employees. It doesn’t mean we think we’re important, or anything like that, (assuming it is the NSA.)
Believe me, discussing gangstalking is stepping on some important toes somewhere. Still, I think we need to step on those toes even harder.
I bet they would hound us if we stumbled on something secret – I guess it could always be worse. But so far it looks like something secret stumbled on us and the prospects of the harassment being anything but lifelong are pretty grim.
I may as well be open about it: I have in fact stumbled on something that was secret or sensitive a time or two. I’m into theoretical computer science, and things like irreversibility and the possibility of reversible computing really interest me, and studying this led me, rather surprisingly, to a derivation of the Sackur-Tetrode equation for the entropy of an ideal monatomic gas.
I found out that some of the details of reversible computing are classified, and moreover there have been a lot of fake papers published recently in an attempt to refute, obfuscate, and cover up some of the theory. I tried to learn what I could about it without stepping on too many classified toes.
I also became interested in the concept of a “loop variant,” which is critical for proving program termination and total correctness, a subject conspicuously missing from all the theoretical computer science textbooks. This must be classified, too, for all the effort the government expends in covering up, silencing, and discouraging research and learning in this area.
All the trails lead back to the NSA. “Officials from the Department of Defense” will contact the FBI and convince them of “probable cause” to believe that you are obtaining or disseminating classified information in violation of federal law. A general warrant of dubious constitutionality will be issued by a secret FISA court, and the FBI will ask the local police to conduct these searches and surveillance on you. The local police will farm out as much of the work as possible to the neighborhood watch volunteers. All the information collected will flow back up from the neighborhood watch to the local police to the FBI to the NSA, who really has neither the intention nor the grounds to initiate a bona fide criminal prosecution.
That explains gangstalking for me.
I’m kind of a somebody-nobody. (That is, in certain circles I am a somebody just by virtue of my name.) I haven’t seen other targets like that posting on the net. That makes me think that the somebody part of me has something to do with how I ended up on the harassment/torture list. I’m a naturalized US citizen and at the time we came to the US there was a great deal of interest in my home country as well as in ethnic and language studies, etc. Plus there’s some weird things stemming from childhood that appear to be connected to this problem.
I’ve done research in extremely sensitive places and at first I thought that might be why I was targeted. They’ve pretty much gone through all my research files)…. but then I realized that there was some social engineering involved in getting me to those places and that some people in my life who were involved in previous harassment ended up in research areas related to things directly connected with certain facets of this harassment… as if people around me had also been socially engineered.
In terms of what they are up to, I think I have stumbled on a few things since the hacked internet goes down when I try to post certain things in certain sites. It could be decoying on their part but I don’t think so. All I’ll say is that the idea that saying we have this problem is becoming more and more credible. Look up at least 3 things related to this problem that have been going on in recent months. It’s funny - I should be quiet why? They are already killing me.
I’m a nobody-nobody. I dropped out of grad school and for some reason I just never quit studying. I’m basically just a theoretical computer science geek. The government hates people that go off and study stuff on their own, because they’re always looking for the next Unabomber.
It would be nice career-wise for me to go back to school and aim for a PhD. I think teaching and learning are every bit as important as research, because your research doesn’t do much good if it’s published in some obscure journal that costs an arm and a leg just to access, and it’s incomprehensible to all but experts in your particular field, because you really didn’t take the time or have the skills to communicate your work effectively.
There are a lot of things I don’t miss at all about academe, though. There is a lot of petty politics, freemasonry and other fraternities, folks telling you what to study and what not to study, and if you are a professor, you need to feed the “publish or perish” journal mill. It’s quantity over quality. Lots of insignificant publications are always preferable to a few groundbreaking ones.
A lot of the stuff I do (on my own) involves mathematical derivations. Whenever I work out some math, I cite some sources and make a Wikipedia article out of it. That’s about the only place I can put my math where it won’t disappear.
I cannot keep any private “research notes” whatsoever; they are always stolen by the gangstalkers.
For my next area of research, I might even get to learn some stats, because this isn’t really my field: modeling stock market returns (as some have suggested) by a Student’s t-distribution rather than the normal distribution. Stock market returns exhibit an extreme kurtosis (peaked center and fat tails) that is not captured by the normal distribution.
Guess what. Files start disappearing off my computer as soon as I make a spreadsheet and start looking at some of the data. I can’t even teach myself a little stats with these gangstalkers around.
Justin, another likely reason you were targeted is they dont like highly
intelligent people, freethinkers that have scruples.
Randy, a decent rootkit/malware package will not only disguise its presence on the system it’s installed on, it’ll conceal its misuse of system resources (such as a wireless network connection). The only way to keep a malware package from ‘calling home’ without your knowledge and receiving instructions is to make it physically impossible to do so.
There’s some pretty evil stuff that can be done with rootkits, especially when you combine it with out-of-band surveillance. I’m not going to give anyone ideas, but basically, once a person with a hacker team’s rootkit gets physical access to a modern computer, there’s no way you’re going to keep them from doing whatever they want to do, whenever they feel like it.
The files may have disappeared when I was online, or somebody (probably) just sat down at my keyboard when I was gone.
Shortly after that I found that files disappear from my computer even when it is turned off! Somebody who entered my residence simply booted up my laptop and followed password reset procedures to log in and mess around with some files. I came home one day to find my laptop thrown on the floor with the password changed.
Why wasn’t the laptop just stolen? I had a conversation with a surprisingly rather polite police officer who explained that he could not investigate since there were no signs of forced entry, and no items of value were missing, although he acknowledged and did not dispute my report of what happened, i.e., that items were moved. He asked, “Why would somebody want to do that?” I replied that I could not speculate on a motive, but that it was part of a pattern of similar crimes that had been taking place over the years. He had a thought he never quite completed: “Unless it’s … well, let’s not even go there.”
Not terribly helpful, but at least he didn’t try to deny what was going on.
Backups I’ve made have disappeared off thumb drives, too.
The technology (kind of OT)
How widespread is this?
I hate to say it, and who knows how much of it is decoying… but this system of harassment is within academia too.
That intellectual property violation thing is quite annoying – they had done it to me before but now they are more blatant. In some ways, I wonder if this whole set up isn’t just to steal information from us in one way or another.
I’ve had good and bad experiences teaching. But when you are constantly being harassed by these jerks it’s that much harder to give a good class. That being said, I’ve had good semesters even under bad circumstances before. I’m not working right now though – I was knocked off my feet by the more recent overt harassment. Hard to get work done when someone is posting threats to kill you and hurt your little kid. I hope they rot in Hades.
I hate to say it, and who knows how much of it is decoying… but this system of harassment is within academia too.
Academia may be where it started for me, 10 years ago. I just put it down to petty politics, academic rivalry, freemason cliquishness, and so forth at that time. I started learning things I wasn’t supposed to. This or that was “classified,” or I’d show some equation I was working on to a math prof who would ask, “Where did you learn that?” as if it were something I weren’t supposed to know. There was some some spying and some subtle, behind-the-scenes sexual harassment going on, too. However, there were some significant events later in my life that precipitated a change where the everyday hassles of life became undeniable targeted harassment and organized gangstalking. Namely, I got in trouble with the Russian mafia, some dishonest government contractors, and some Israeli intelligence types.
Complicity or corruption in the NSA? When I follow the trails for the harassment that has been targeted at me, they always lead back to the NSA. Nothing else really makes sense.
I’m not sure what it is for me – it reeks of a Lyndon Larouche style “ego-stripping” psycho session and yet there have been defense contractors involved.
My recent harassment had a recruitment theme, which goes to show how abnormal they are… I don’t have trauma bonding with them nor could I ever think well of them. They seemed to keep pushing this 2012 end of the world agenda on me but of course if the world was ending and they knew about it, why would they trust *me* with that information?
Every time I come close to a graduation, they show up in full force – doing everything to delay my academic progress and when that doesn’t work they have someone slander me. I’ve had to relive their crap over and over again – like any time I accomplish something I have those jerks sticking out their foot to trip me.
For me they are a Mengele-like experiment – perhaps cutting off someone’s feet to see if they will still try to walk, then cutting off their legs to see if they’ll still walk then if the patient continues to try – cutting off their knees to see if they’ll scrape themselves on the floor to get away. If the “patient” does continue struggling, then the Mengeles would want the patient to thank them for creating a stronger will to walk. “See how we helped you become a stronger person?!” That’s how arrogant and narcissistic this system is. They can all burn in hades as far as I’m concerned.
Your ever watch “Criminal Minds” comes on CBS? Well I do and started related these stalkers to those “unsubs” in the show(& CSI shows or any movie show where the Good Guys win in the end) But yeah that’s what they are Bad Guys who will Loose in the end For I say that ever day I’m alive evil loses Amen and I say it out loud at the end of a show and theres some elf/v2k in response but I can’t make out what they’re saying… I have faith that we and even all the Earth and Heaven have a purpose in God’s will
God bless us all
D Hoch wrote:
It certainly has grown. Gang stalking is easily formed especially within religious groups, nationality groups and whatever the “reason is” for the stalking which might include sex, money, drugs, etc. those particular groups will get to you one way or another. Gang stalking and following is very difficult to explain because the groups that follow me for example are vast. They will circle me completely like they are afraid of me then at times the stoolies on the street follow me signalling others to do their bidding. I again stress I am afraid for my life. Too many people too many situations and just too many things happen to others with extending the gangs to move freely with help usuing the cell phone as the prime operation for communication in the language of choice. What can I say my life is totally ruined and hurt.My life now is over in my book.
There are people who know, and are upset, but they are afraid to even acknowledge it, much less help us. There are even cops who fear for their lives should they so much as breathe a word, because they know it could happen to them.
I remember one cop who responded to a scene where I had been poisoned/drugged by the gangstalkers. He had a stark look of fear in his eyes, and he was actually shaking when he talked to me.
Perhaps we continue to be targeted because the more we look into this, the more the gangstalkers have to lose, if by some miracle their whole network is exposed. But this makes only limited sense, because we (or at least I) haven’t gotten very far looking into the structure of the network behind this organized stalking of targeted individuals. Nothing I’ve said or posted so far on this can be considered more than an educated guess.
The more I look into it the less I find, except a greater realization and confirmation that organized stalking and electronic harassment is a reality for me and other targeted individuals, and by this I mean an objective reality, not a subjective reality, for the only one who can claim a subjective reality is the One who caused light to appear when He said “fiat lux.”
I read an article in the news about a Brazilian hacker whose hard drive encryption password even the FBI was unable to crack. I do not know how accurate this article is, but I do not believe it is part of a conspiracy. This would indicate that mind control and remote sensing technology is not yet capable of reading text directly from one’s thoughts. But it has been well reported that so much may be inferred from a target’s computer use and internet habits that one may predict the target’s thoughts and subsequent actions with uncanny accuracy.
A great deal of effort was spent hacking into my computers online before I was subjected to targeted harassment in real life, and then the harassment never ceased.
I cannot sleep at night anymore. All night long, car doors slam, I hear crashing and banging noises outside, a car or truck with an unusually loud starter will start up and shine bright lights in my window, and often I hear heavy footsteps up in the attic above my apartment. Then there are the strange high-pitched buzzing sounds I cannot localize that I put down to electronic harassment of some sort. And I’m already on edge from the frequent, almost daily burglaries that I’m experiencing. The intruders – cat burglars – have stolen my mail, left my stove burners on, tampered with my computer, stolen my laundry, returned some previously stolen small items, stolen some of my books, and used my toilet without flushing it.
I read an article in the news about a Brazilian hacker whose hard drive encryption password even the FBI was unable to crack. I do not know how accurate this article is, but I do not believe it is part of a conspiracy. This would indicate that mind control and remote sensing technology is not yet capable of reading text directly from one’s thoughts. But it has been well reported that so much may be inferred from a target’s computer use and internet habits that one may predict the target’s thoughts and subsequent actions with uncanny accuracy
Lots of misconceptions embedded there. First, why would “they” show their hand in a news story, either the ability to crack strong encryption or the routine use of satellite TEMPEST or the more advanced techniques this site focuses on? Second, why assume that every federal employee in every agency has access to every technology? Third, in case you haven’t noticed, they always want more power. An article like this one justifies more power grabs or more spending. “If only we had more power, we could have gotten at this guy’s data…”
Finally, there’s no mistaking the mind-reading once they rub your nose in it. Up until then, you will have been exposed to coincidences that could be explained in several ways. This is one of the methods they employ to get otherwise intelligent targets to run around in circles and waste their energy. You’ll find out the truth of these words - on their schedule, not yours. You have even less control over the situation than you think you do.
I think there is more thought intrusion in pretending that they could read my mind going on than actual mind reading. I’ve been focusing a few random things and they have never appeared in their “orchestrated synchronicity” or whatever it is. I think sometimes it’s just a cheap card trick/decoy.
But then again with the case of the Brazilian hacker, it’s true - why would they show their hand? Also, why would they bother with us and not with “real” enemies like political leaders, corporate enemies, real activists, etc.
It must be stopped
Thank you Jeremy for all you are with this site and all, Let us all Thank the Lord for this day which He hath prepared I shall rejoice and be glad in it… Each day is prepared and the scriptures also say that our paths are predetermined(for lack of exact words) and let us completly not forget to relaxx God is in charge. That’s easy for me to say even tho I’m being stalked right now I seem to have given up on exactly WHO, or WHAT alphabet agency or person with connection I proved soo wrong that they huffed and puffed and put me on a list to be targeted, for nothing JUSTIFIES this evil stalking wicked murdering of our lives. I do believe it all boils down to good vs evil and God’s purposes and will is and shall be done, cream rises to the top and this great filtering process of our Father who art in Heaven shall come to full manifestation.
God bless us all
They will keep doing what they do. You can count on it. It’s like living with crappy weather. Find some strength somewhere in something to tide you through. The “American Dream” isn’t probably going to be on your agenda. But given the choice of Ms. Barbie doll obey my husband and remodel my new sparkling kitchen… to go through hell but educate the world I suppose being killed as the messenger would be more admirable. And I care. I really do.
27, 2010 12:42:07 AM
For behold, the wicked bend the bow,
they make ready their arrow upon the string,
that they may in darkness shoot at the upright in heart. (Psalm 11:2)
I have to pay various website-related costs in the upcoming couple of months and would like to raise a few hundred dollars to offset some of these so it doesn't all come out of my own pocket. If this website means something to you, please click the "donate" button at the extreme bottom-right corner of the page. Thanks.
October 21, 2011
September 5, 2016
August 6, 2013
June 6, 2015
September 16, 2011
October 4, 2017
October 29, 2017
November 19, 2015
March 28, 2015
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
August 14, 2013
February 26, 2014
Sign up now to receive free e-mail updates (sent infrequently).
Oct 31, 2017
Oct 30, 2017
Oct 29, 2017
Oct 28, 2017
Oct 19, 2017
Oct 16, 2017
Oct 12, 2017
Oct 8, 2017
Oct 8, 2017
Oct 4, 2017
Sep 19, 2017
Sep 17, 2017
Sep 15, 2017
Sep 10, 2017
Apr 29, 2017
Mar 3, 2017
Sep 21, 2016
Sep 17, 2016
Sep 6, 2016
Sep 6, 2016
Sep 5, 2016
Sep 5, 2016
Sep 5, 2016
Sep 5, 2016
Apr 21, 2016
Nov 19, 2015
Oct 16, 2015
Jun 6, 2015
May 6, 2015
Apr 21, 2015
Apr 21, 2015
Apr 18, 2015
Mar 28, 2015
Mar 13, 2015
Mar 2, 2015
mirrored from: https://fightgangstalking.com/
“When you talked to people outside the [anti-Vietnam War]
movement about what the FBI was doing, nobody wanted
to believe it.”
– Keith Forsyth, one of the
activists who exposed the FBI’s
COINTELPRO (counterintelligence program) crimes
“COINTELPRO is alive and well.”
– Tom McNamara, CounterPunch magazine,
January 21, 2013
“Think government surveillance is no big deal?
Talk to these victims of police stalking.”
– Scott Shackford, Reason magazine,
September 28, 2016
“Gang Stalking” is, very likely, a disinformation term created by
U.S. intelligence agencies. It refers to the intense, long-term, unconstitutional surveillance and harassment of a person who has been designated as a target by someone associated with America’s security industry.
Such operations have nothing to do with criminal gangs. Official domestic counterintelligence operations of this type are – apparently – perpetrated by federal agents and intelligence/security contractors, sometimes with the support of state and local law enforcement personnel. Unofficial operations of this type are, apparently, perpetrated by private investigators and vigilantes – including former agents and cops, some of whom are members of the quasi-governmental Association of Law Enforcement Intelligence Units (LEIU), sometimes on behalf of corporate clients and others with connections to the public and private elements of America’s security industry.
The goal of such operations – in the parlance of counterintelligence agents – is “disruption” of the life of an individual deemed to be an enemy (or potential enemy) of clients or members of the security state. Arguably, the most accurate term for this form of harassment would be “counterintelligence stalking.” Agents of communist East Germany’s Stasi (state police) referred to the process as Zersetzung (German for “decomposition” or “corrosion” – a reference to the severe psychological, social, and financial effects upon the victim). American and British victims have described the process as “no-touch torture” – a phrase which also captures the nature of the crime: cowardly, unethical (and often illegal), but difficult to prove legally because it generates minimal forensic evidence.
Tactics include – but are not limited to – slander, blacklisting, “mobbing” (intense, organized harassment in the workplace), “black bag jobs” (residential break-ins), abusive phone calls, computer hacking, framing, threats, blackmail, vandalism, “street theater” (staged physical and verbal interactions with minions of the people who orchestrate the stalking), harassment by noises, and other forms of bullying.
Both the facts and the geographical distribution of relevant published news
reports – as well as other evidence cited on this website – suggest
that such stalking is sanctioned (and in some cases, orchestrated) by federal
agencies; however, news reports, credible anecdotal information, and my own
experiences, indicate that such stalking is also sometimes used unofficially for personal and
corporate vendettas by current and former corrupt employees of law enforcement
and intelligence agencies, private investigators, and their clients.
Since counterintelligence stalking goes far beyond surveillance – into the realm of psychological terrorism, it is essentially a form of extrajudicial punishment. As such, the harassment is illegal – even when done by the government. It clearly violates, for example, the U.S. Constitution’s Fourth Amendment, which prohibits unwarranted searches, and the Sixth Amendment – which guarantees the right to a trial. Such operations also violate similar fundamental rights defined by state constitutions. Stalking is also specifically prohibited by the criminal codes of every state in America.
Crimes against Americans at the hands of corrupt government agents and private security thugs have a long history in the U.S. The FBI’s COINTELPRO (“Counterintelligence Program”) scandal in the 1970s was the most notorious high-profile example, but similar abuses of power by “Red Squads” (state and local Law Enforcement Intelligence Units) and private detectives date back to the 19th century.
You can read a full explanation of counterintelligence stalking – including an archive of published news reports on the subject – on the What is “Gang Stalking?” page of this site.
October 7, 2017
Criminality and deniability at the CIA
Author Douglas Valentine had some interesting things to say about the Central Intelligence Agency (CIA) in an interview published last month at CounterPunch. Valentine has written three books about the spy agency. The publisher’s webpage for the latest of these books – The CIA as Organized Crime – features this quote from former CIA officer and whistle-blower, John Kiriakou:
“Doug Valentine courageously takes us inside some of the CIA’s most shameful extralegal operations, exposing everything that is wrong with an intelligence service gone rogue. He is a sentinel of the public interest, and his book is a public service. I, for one, wouldn’t want to live in a country that didn’t have patriots like Doug Valentine.”
Some excerpts from the CounterPunch interview:
The CIA sets up proprietary arms, shipping, and banking companies to facilitate the criminal drug trafficking organizations that do its dirty work. Mafia money gets mixed up in offshore banks with CIA money, until the two are indistinguishable.
…The CIA doesn’t do anything it can’t deny. Tom Donohue, a retired senior CIA officer, told me about this.
Let me tell you a bit about my source. In 1984, former CIA Director William Colby agreed to help me write my book, The Phoenix Program. Colby introduced me to Donohue in 1985. Donohue had managed the CIA’s “covert action” branch in Vietnam from 1964-1966, and many of the programs he developed were incorporated in Phoenix. Because Colby had vouched for me, Donohue was very forthcoming and explained a lot about how the CIA works.
…Donohue said the CIA doesn’t do anything unless it meets two criteria. The first criterion is “intelligence potential.” The program must benefit the CIA; maybe it tells them how to overthrow a government, or how to blackmail an official, or where a report is hidden, or how to get an agent across a border. The term “intelligence potential” means it has some use for the CIA. The second criterion is that it can be denied. If they can’t find a way to structure the program or operation so they can deny it, they won’t do it.
…Everything the CIA does is deniable. It’s part of its Congressional mandate. Congress doesn’t want to be held accountable for the criminal things the CIA does.
…Most people have no idea what cops really do. They think cops give you a speeding ticket. They don’t see the cops associating with professional criminals and making money in the process. They believe that when a guy puts on a uniform, he or she becomes virtuous. But people who go into law enforcement do so for the trill [sic] of wielding power over other people, and in this sense, they relate more to the crooks they associate with than the citizens they’re supposed to protect and serve. They’re looking to bully someone and they’re corrupt. That’s law enforcement.
The CIA is populated with the same kind of people, but without any of the constraints. The CIA officer who created the Phoenix program, Nelson Brickham, told me this about his colleagues: “I have described the intelligence service as a socially acceptable way of expressing criminal tendencies. A guy who has strong criminal tendencies but is too much of a coward to be one, would wind up in a place like the CIA if he had the education.” Brickham described CIA officers as wannabe mercenaries “who found a socially acceptable way of doing these things and, I might add, getting very well paid for it.”
…The CIA dedicates a huge portion of its budget figuring how to select, control, and manage its own work force. It begins with instilling blind obedience. Most CIA officers consider themselves to be soldiers. The CIA is set up as a military organization with a sacred chain of command that cannot be violated. Somebody tells you what to do, and you salute and do it. Or you’re out.
…In exchange for signing away their legal rights, they benefit from reward systems – most importantly, CIA officers are immune from prosecution for their crimes. They consider themselves the Protected Few and, if they wholeheartedly embrace the culture of dominance and exploitation, they can look to cushy jobs in the private sector when they retire.
The CIA’s executive management staff compartments the various divisions and branches so that individual CIA officers can remain detached. Highly indoctrinated, they blindly obey on a “need to know” basis. This institutionalized system of self-imposed ignorance and self-deceit sustains, in their warped minds, the illusion of American righteousness, upon which their motivation to commit all manner of crimes in the name of national security depends. That and the fact that most are sociopaths. [Emphasis added.]
When asked whether he considers the CIA to be “an enemy of the American people,” Valentine said this:
Yes. It’s an instrument of the rich political elite, it does their dirty business.
August 28, 2017
In his column yesterday at truthdig, journalist Chris Hedges made this point about the recent violence between “Antifa” and “alt-right” protesters:
“Street clashes do not distress the ruling elites. These clashes divide the underclass. They divert activists from threatening the actual structures of power. They give the corporate state the ammunition to impose harsher forms of control and expand the powers of internal security.”
August 20, 2017
CIA whistle-blower John Kiriakou on torture settlement
JOHN KIRIAKOU: I know the ACLU is very happy. I know that one of the victims said he was very happy and that he felt that justice was served, but I actually am disappointed in this settlement for a number of reasons. First of all, the decision is sealed, so we really don’t know if justice has been served. We don’t know what the terms of the agreement are. We don’t know if there is any kind of deterrent that has been written into the decision. The fact that it’s not public, it seems to me at least in part defeats the purpose. Second, Mitchell and Jessen, the two CIA contractor psychologists who were the defendants in this case, were indemnified by the CIA in 2001. Even though they were sued, the CIA paid for their attorneys. The CIA is paying for their settlement. The CIA is paying for everything.
When I say the CIA is paying for it, I mean that you and I are paying for it. The American taxpayers are paying for it, so there’s no actual hurt to Mitchell and Jessen. And third, this trial, had it gone to trial, would have exposed CIA documents related to the torture program that we otherwise will never have access to. We’re going to lose that now. Whatever didn’t come out with the Senate torture report and could have come out with this case will not come out. We’ll just never know what the truth is behind this case.
August 20, 2017
Presidential politics and the deep state
Whatever your views of our current president – or his opponent in last year’s election, for that matter – if you are concerned about illegal spying and harassment by government and corporate security-intelligence agencies, you should welcome the increased attention given in America’s news media, to the “deep state” concept. More public awareness of the actual nature of America’s power structure could make it more difficult to abuse surveillance and policing powers.
For anyone unfamiliar with the topic, the core point of the deep state analysis is made, for example, in this October 2014 article in The Boston Globe, which described the views of Tufts University political scientist Michael J. Glennon:
Though it’s a bedrock American principle that citizens can steer their own government by electing new officials, Glennon suggests that in practice, much of our government no longer works that way. In a new book, “National Security and Double Government,” he catalogs the ways that the defense and national security apparatus is effectively self-governing, with virtually no accountability, transparency, or checks and balances of any kind. He uses the term “double government”: There’s the one we elect, and then there’s the one behind it, steering huge swaths of policy almost unchecked.
References to the deep state have increased in both the mainstream press, and independent news sources. Below are a few of the notable deep state references in the media this year.
Richard Engel appears about two minutes into this five-minute video clip, and gives a serious assessment of the presidential intelligence briefings which were apparently held to undermine Trump’s presidency at the outset, in response to Trump’s rhetorical transgressions against the deep state. My take on what Engel says is this: Essentially, the US intelligence chiefs paid a visit to Trump’s shop, and said to him: “Lovely administration you’ve got here. It’d be a shame if anything happened to it.”
“Richard Engel, NBC News chief foreign correspondent, talks with Rachel Maddow about a report that Donald Trump and President Obama were briefed on unverified claims that Russia has compromised Trump with a cache of incriminating or scandalous material. Duration: 5:10”
January 11, 2017 – Matt Drudge, Twitter
A tweet by Matt Drudge explicitly raised the basic question – namely, whether the US intelligence agencies are “corrupt.”
Hersh also questioned the timing of the U.S. intelligence briefing of Trump on the Russia hack findings. “They’re taking it to a guy that’s going to be president in a couple of days, they’re giving him this kind of stuff, and they think this is somehow going to make the world better? It’s going to make him go nuts — would make me go nuts. Maybe it isn’t that hard to make him go nuts.” Hersh said if he had been covering the story, “I would have made [John] Brennan into a buffoon. A yapping buffoon in the last few days. Instead, everything is reported seriously.”
Few journalists in the world know more about the CIA and U.S. dark ops than Hersh. The legendary journalist broke the story of the My Lai massacre in Vietnam, the Abu Ghraib torture, and secret details of the Bush-Cheney assassination program.
…Hersh also said he is concerned about Trump and his administration assuming power over the vast surveillance resources of the U.S. government. “I can tell you, my friends on the inside have already told me there’s going to be a major increase in surveillance, a dramatic increase in domestic surveillance,” he said. He recommended that anyone concerned about privacy use encrypted apps and other protective means. “If you don’t have Signal, you better get Signal.” [Emphasis added.]
Hirthler’s core allegation:
“The enveloping of the president in a cacophony of innuendo is likely a collaborative effort between the Justice Department, the National Intelligence Agency, the CIA, and crucially, the mainstream press.”
“Either he can acquiesce to or fight against a Deep State of intelligence officials who have a myriad of ways to spy on politicians (and other citizens) and thus amass derogatory material that can be easily transformed into blackmail.
“…The reality is that EVERYONE, including the President, is surveilled. The technology enabling bulk collection would have made the late demented FBI Director J. Edgar Hoover’s mouth water.
“Allegations about the intelligence community’s abuse of its powers also did not begin with Snowden. For instance, several years earlier, former NSA worker and whistleblower Russell Tice warned about these “special access programs,” citing first-hand knowledge, but his claims were brushed aside as coming from a disgruntled employee with psychological problems. His disclosures were soon forgotten.”
Robert Parry – an investigative journalist who has written for Associated Press, Newsweek, etc. – makes the case that much of the investigating, leaking, and news reporting involving the Trump administration is essentially a “soft coup” by the deep state.
…most of the nation’s top news executives and much of its political elite share the opinion that Trump’s presidency must be ended and a more traditional chief executive installed.
But no one in authority wants to acknowledge that a “soft coup” is in the works because that would make America look like a banana republic to the world. It also could infuriate Trump’s 63 million voters who might take exception to this sort of “deep state” veto of a duly certified election.
So, what that means is that the planned removal of Trump will be a deliberate process cloaked in high-minded legal principles and much talk about the rule of law.
Greenwald explains that deep state activities are plainly involved in our current presidential politics. I recommend reading the entire article.
“FROM THE START of Trump’s presidency, it was clear that the permanent national security power structure in Washington was deeply hostile to his presidency and would do what it could to undermine it. Shortly before Trump was inaugurated, I wrote an article noting that many of the most damaging anti-Trump leaks were emanating from anonymous CIA and other Deep State operatives who despised Trump because the policies he vowed to enact — the ones American voters ratified — were so contrary to their agenda and belief system. Indeed, they were even anonymously boasting that they were withholding secrets from Trump’s briefings because they decided the elected president should not have access to them.
“…No matter how much of a threat one regards Trump as being, there really are other major threats to U.S. democracy and important political values. It’s hard, for instance, to imagine any group that has done more harm, and ushered in more evil, than the Bush-era neocons with whom Democrats are now openly aligning. And who has brought more death, and suffering, and tyranny to the world over the last six decades than the U.S. national security state?”
August 5, 2017 – Glenn Greenwald, Twitter
Greenwald responds to a skeptic:
July 12, 2017
ACLU sues U.S. Justice Department to expose spying policies
A lawsuit filed last month by the American Civil Liberties Union (ACLU) seeks to force the U.S. Department of Justice (DOJ) to reveal some of the federal government’s policies on secret surveillance. Specifically, the ACLU wants to know how the government views its constitutional obligations regarding (a) the use of evidence obtained through secret surveillance, and (b) notifying individuals whose communications have become the target of government surveillance.
The ACLU filed the lawsuit after the DOJ declined to provide that information when the ACLU asked for it by means of a Freedom of Information Act (FOIA) request. Here is the origin of the lawsuit, as described in the complaint:
“On February 6, 2017, Plaintiffs submitted a Freedom of Information Act request (the “Request”) to DOJ seeking records related to the government’s official policy on the use of evidence obtained through secret surveillance and its duty to notify individuals whose private communications the government has seized and searched.
“…DOJ’s failure to release responsive records is of particular public concern because the Request pertains to the expanding use of secret electronic searches—including surveillance of Americans’ phone calls and emails under the Foreign Intelligence Surveillance Act (“FISA”) and the Wiretap Act (“Title III”). In total, the government conducts hundreds of thousands of secret wiretaps and other searches under FISA and Title III each year. Many of these searches are conducted without warrants or individualized court approval, but are instead conducted under Section 702 of FISA, a highly controversial surveillance law that is currently the subject of intense legislative and public debate.
“The government’s searches under FISA and Title III are generally invisible to the individuals whose privacy they impact. Unlike traditional searches of a person’s home, electronic searches rarely leave any sign, and thus individuals whose privacy has been invaded are entirely dependent on the government’s provision of notice. For this reason, the government’s policies concerning when it must disclose surveillance implicate the privacy interests of numerous Americans, who are often unable to challenge the lawfulness of government searches without proper notice.
“As described below, DOJ has a track record of failing to inform individuals about the surveillance of their communications even when notice is expressly required by law. Accordingly, the public interest in the release of the DOJ policy documents at issue is Substantia.” [Emphasis added.]
“How would you know if the federal government had been electronically spying on you? Short answer: You probably wouldn’t.
“Today, the ACLU sued the Justice Department to find out more about the circumstances under which the government thinks it can spy on Americans without telling them. This challenge seeks important information about a spying statute whose renewal is currently up for debate in Congress.
“The answer to the question above should be simple: When the government invades your privacy — whether by searching your home, your car, your emails, or anything else — it should give you notice of that intrusion unless it has a compelling reason for delay. You see it on television all the time: When the police search a house, they show a warrant or leave one behind at the scene. The individual whose privacy is at stake knows there was a search and what was taken. This isn’t just to amp up drama — it’s a constitutional requirement.
“… It’s worth noting, however, that the federal government has a long history of abusing its surveillance powers. And as the amount of digital data has expanded, the amount of surveillance has exploded, too. So has the secrecy and the absence of accountability surrounding electronic searches. These searches are conducted under various laws, but they have one thing in common: Individuals rarely find out that their private emails, internet chats, or documents stored in the cloud have been searched.
“The vast majority of Americans surveilled under Section 702 will never be criminally prosecuted, so they will never know that the government has been secretly watching them. And without definitive proof that the government spied on them, individuals have an incredibly difficult time challenging the government’s spying in court.” [Emphasis added.]
Full credit to the ACLU for pursuing this issue. Filing a professionally-drafted FOIA request, followed by a credible lawsuit when the US intelligence agency involved – in this case, the DOJ – predictably tries to dodge the request, is an unrealistic option for most victims of illegal spying. Americans could use a lot more such advocacy in defense of their rights these days – especially on issues involving secret activities by public and private agencies in the security-intelligence business.
Arguably, such advocacy – and investigative journalism – is needed even more for uncovering criminality and abuses of power among private security-intelligence firms and local police department Law Enforcement Intelligence Units (LEIUs), since those entities are not (directly) reachable by FOIA requests. Moreover, private contractors and local agencies – to say nothing of informal networks that include current and former enforcement and intelligence personnel – might be far less likely to be internally compromised by whistle-blowers.
Also deserving of notice is a reminder in Anna Diakun’s ACLU blog posting: Searches – of a car or a residence, for example – require a warrant. One implication of this is that if you are the victim of what journalists and investigators often call “black bag jobs” (break-ins perpetrated to gain information or to terrorize the victim, or both – rather than for simple burglary), and you did not receive a search warrant, then what was done to you was probably very illegal, regardless of who the perpetrators and their accomplices were.
This also has serious implications for any “civilian” who participates – for whatever motives – in illegal spying and harassment orchestrated by corrupt public or private security operatives. Breaking and entering, for example, is – at a minimum – illegal trespassing. And in many cases, it’s a more serious crime. Furthermore, if such actions are part of an organized set of unauthorized spying and harassment activities, they also constitute stalking – which is expressly forbidden by the criminal codes of every state in America.
July 4, 2017
Keeping America safe by killing journalists
One of the drawbacks to publicly calling for the assassination of journalists and whistle-blowers is that the targets of the threats are the kind of people who will tell others about what you have said. And, outside of the political class, not everyone is impressed by efforts to shield governments and corporations from public scrutiny. A lobbyist and Democratic party operative in Florida, Evan Ross, is learning this, after tweeting the following comment about WikiLeaks founder Julian Assange:
“[Assange] and his buddy Edward Snowden both deserve to meet their maker. I’d be happy to pull the trigger on both of those too [sic].”
Assange responded to Ross’s brave display of patriotism by quoting Ross’s comment, and tagging it #tolerantliberal. The tweets there also include calls for Assange’s head from other establishment apologists. An article by Jerry Iannelli published today by the Miami New Times provides a good summary of the twitter exchange and its political implications.
“The spat exposes the divide between centrist, hawkish liberals who support the security state and military-industrial complex, and those to Ross’ left, who point out that Snowden is a whistleblower no different from Daniel Ellsberg, who leaked the Pentagon Papers to news outlets in the 1970s. Ross’ comments are sure to upset populists within the local party, who maintain that mainstream Democrats have moved too far right in the past few decades.”
June 7, 2017
Barrett Brown’s Q & A on reddit
Yesterday, journalist Barrett Brown (see preceding posts) participated in an “AMA” (Ask Me Anything) exchange on reddit. Here are some excerpts.
On the future of journalism…
In one of your recent D Magazine articles you noted “But most of all, I realized that journalism will not be enough to save this country.” – can you elaborate on that Barrett? and also what does this mean about the future of your journalism? Thanks!
Journalism is still necessary, but in a nation like the U.S. where the bulk of the citizenry is either fascist or unwilling to do their part to oversee the vast machinery of state that we support through our taxes and which inflicts vast harm at home and abroad, we’re going to need a class of people who make up for the failures of the rest of the country. You can get a sense of what I mean by this by looking through the pursuance presentation [explained below]; this is a framework that is intended to expand into a new and viable force by which to challenge systems from without.
Something along those lines, drawing upon the new ability of humans to collaborate in ways never before possible, is going to happen at some point anyway. We think this is the time to try it.
On the prosecutorial enthusiasm that was directed at him…
What’s your theory as to why the book was thrown at you in particular? Specifically, who do you figure made that decision and why?
That’s best demonstrated by the original search warrants, in which a grand jury was presented with spurious info to justify ongoing surveillance of my activities. Those are still sealed, but the eventual search warrant for the raid, which Michael Hastings posted on Buzzfeed, shows they were concerned with our investigations into the DOJ and FBI’s criminal allies, such as HBGary Federal, and the site on which we compiled our research, echelon2.org (now moved). Here’s that warrant. [The link is to an article by the late Michael Hastings.]
Basically, as explained in several of the better articles, such as those by Glenn Greenwald, Christian Stork, and the like back in 2013 or so, the DOJ and FBI wanted me away from the internet for as long as possible, and pursued over a dozen charges they later had to drop in order to try to do that.
FBI officials get high-paying jobs with these sorts of companies when they leave public “service;” DOJ had been embarrassed by its connection to the companies we’d kept digging into; and they know full well that they can do most anything without real consequences.
On the entities to which he owes court-ordered restitution…
How much do you still owe in restitution? Any chance of getting that reversed? It really pisses me off that you owe money to an entity I consider evil.
I owe something like $870,000 to several corrupt organizations, including Stratfor, which spied on Bhopal activists on behalf of Union Carbide and cooperates with the FBI and Coca-Cola against lawful U.S. activists, among other things. No, the judge has already ruled and we can’t appeal.
On recommended reading about the deep state…
What books about COIN and political repression (past and present) and about useful countermeasures and “security culture” would you recommend, if any?
The Burglary and The Devil’s Chessboard. Most of all, read anything by Peter Dale Scott, the former diplomat and Berkley professor who carefully documented a great deal of the amorphous security culture from the early ’60s to recent years, mostly in regards to JFK and Southeast Asian drug running by CIA affiliates.
On the Anonymous movement…
What do you think of Anonymous these days?
I’m not sure that it even really exists in any measurable form anymore, at least as compared to 2011, when the NSA chief felt the need to drum up paranoia about its capabilities and it was a driving force behind opposition to the intelligence community’s expanding, unchecked powers. As you can see from the pursuance project, I’m more interested now in using process-based frameworks, where roles and duties can be clearly defined and agreed upon (and also less visible to intelligence contractors and other members of the state-corporate criminal class). There were a number of problems with how Anonymous operated, even aside from the FBI infiltration, and it’s best at this point to think more in terms of moving the ball forward rather than trying to restore the past.
More on the Anonymous movement…
Do you think Anonymous still has any political/social relevance in 2017, and if not what would it take (if anything) for it to become relevant again?
I don’t, frankly. That could change, but as I told someone else, what’s needed now is something that can expand and serve as a serious counter against the powerful without burning out in a flash of chaos and disagreement. The pursuance system [see below] will be a mechanism for conducting civic affairs in such a way that everyone has the same clearly-defined rights to operate, to invent, to rise according to their talents and dedication; although Anonymous was allegedly something along those lines, the reality is that some people controlled the mediums, such as IRC servers, where much of the important work was conducted. That’s just one of several fatal flaws Anonymous had – the conflict between its stated nature and its actual nature, and a lack of a mechanism for settling disagreements.
On Brown’s crowd-sourced journalism projects…
[In 2009, Barrett Brown organized an online crowd-sourced analysis of hacked emails from private security firms; it was called “Project PM.” Currently, he’s working with others to develop a comprehensive system, “Pursuance,” to enable activists and journalists to more easily, effectively, and securely organize and manage group projects, such as those seeking to expose crimes by corporate and government security-intelligence personnel.]
are you going to revive project PM?
Not as such, but we’ll be running a “pursuance,” as entities under the pursuance system are known, that will continue much of the same work of documenting the intelligence sector, private and public.
May 23, 2017
Assange on the information war
Binoy Kampmark, in a piece at CounterPunch this week, describes the status of WikiLeaks and its founder, Julian Assange:
The continuing struggle, one between the
guerrilla warriors of the information and transparency movement pitted against
the abuses of the Deep State, will continue. As will the barnacle
determination of Assange in occupying that little bit of Ecuador in
Knightsbridge. “The proper war,” promised Assange, “is just commencing.”
May 22, 2017
More notices about stalking in Guilford, Connecticut
A recent police blotter, in Guilford, CT, lists some incidents which suggest that someone there wants to call attention to the issue of illegal spying and harassment. Apparently, someone has been sending “gang stalking (harassment) letters” to multiple addresses in Guilford. This is not the first time such activity has been reported there. In June 2014, for example, the distribution of flyers about “gang stalking” (disruption operations) in Guilford was reported by the Hartford Courant newspaper. For news links about similar leafleting incidents reported across the nation, see the end of the June 10th, 2016 posting, on this website.
Apart from noting the time and place of the events, the recent incident reports – quoted below – lack any details, but their existence suggests that the issue of disruption operations is a serious concern for the person sending the flyers/letters, and for some of the recipients.
Thursday, April 27
Friday, April 28
Monday, May 1
Last year’s police blotter in Guilford also included a few incidents worth noting:
Sunday, November 13
Sunday, November 20
Regarding the final entry: Anyone distributing flyers and letters should remember that only US postal carriers can place items in mailboxes. (Mailing anonymous letters, however, is completely legal.)
May 12, 2017
A glimpse of America’s corrupt spying and enforcement industry
Journalists Barrett Brown and Glenn Greenwald appeared on Democracy Now! today to discuss Brown’s recent harassment by the U.S. Bureau of Prisons (see the post below), and its implications for journalism and democracy. Anyone with an interest in secret abuses of power by the federal government and its corporate clients – and how such abuses are covered (or not covered) by the mainstream press – should watch this 25-minute segment.
No serious analysis of the reporting on “disruption operations” – intense harassment and stalking crimes by private and government security-intelligence thugs in the U.S. – can begin without an understanding of “the highly secretive world of private intelligence and military contractors” (Democracy Now! host, Amy Goodman), and “this incredibly opaque and powerful faction [of government agencies and corporations]” (Pulitzer Prize-winning journalist, Glenn Greenwald).
Barrett Brown’s case – including the contents of the hacked emails at the center of the case – provides a rare glimpse behind the curtain of America’s security-intelligence business. It ought to make Americans curious about what else is happening there.
May 5, 2017
The feds are not through with Barrett Brown
Barrett Brown – the journalist whose full story is the subject of the preceding post – was rearrested last week, and detained for four days, before his lawyer pressured the Bureau of Prisons (BOP) to release him. Initially, the BOP asserted that Brown’s media appearances – such as the interviews he had scheduled with VICE and PBS – violated the terms of his early release from prison, but the agency backed off when Brown challenged them by means of a good lawyer.
On the face of it, the arrest had no legitimate legal basis, and the BOP knew it. Brown’s inclination to expose criminality and abuses of power by U.S. intelligence agencies and private intelligence-security firms – as well as his reporting on misconduct by the Bureau of Prisons itself – presumably is viewed unfavorably by some members of the spying and enforcement industry; it’s easy to imagine that this might have played a role in the decision to rearrest the journalist – for doing journalism. As Brown puts it, what took place was an example of the “de facto extra-legal power” wielded by America’s intelligence and law enforcement agencies.
Since, by releasing Brown, the BOP implicitly acknowledged that they were in the wrong when they rearrested him, not all the details of the matter will be of great interest to some readers. Several parts of Brown’s account, however – posted on Tuesday at D Magazine – deserve consideration. Here, for example, is Brown on the problem of reporters who are too stupid, too lazy, or too cowardly (or some combination of those traits) to recognize and expose criminality by intelligence and law enforcement personnel:
“The BOP, like all U.S. “law enforcement” and intelligence agencies, depends for its continued de facto extra-legal powers on a press corps that is largely incapable of sorting through facts, that is easily distracted, and that cannot even be depended upon to defend its own rights, nor the rights of individual journalists.”
This problem is familiar to persons with first-hand experience on the victim’s end of the very “extra-legal” activities involved in disruption operations. Most media accounts of the subject are superficial at best, or intentionally deceptive at worst. On the other hand, that makes the infrequent, credible published news reports on the issue all the more interesting.
December 18, 2016
Journalist Barrett Brown released from prison
Barrett Brown, an award-winning journalist (a National Magazine Award winner in the “Columns and Commentary” category, and a New York Press Club journalism award winner), humorist, and former unofficial spokesman for the Anonymous movement, was released from federal prison last month, after four years in detention for acts related to his role in the exposure of emails hacked from the private security-intelligence firms, HBGary and Stratfor, in 2011. The emails exposed the use of counterintelligence schemes by private contractors.
Jeremy Hammond, the activist hacker who stole the Stratfor emails and gave them to WikiLeaks, remains in prison, serving a ten-year sentence. In a 2013 interview with the Pulitzer-Prize winning journalist, Chris Hedges, Hammond gave this explanation of the motive behind the hacking:
“I targeted information security firms because they work in secret to protect government and corporate interests at the expense of individual rights, undermining and discrediting activists, journalists and other truth seekers, and spreading disinformation.”
Hedges wrote this of Hammond’s punishment:
“The [ten year] sentence was one of the longest in U.S. history for hacking and the maximum the judge could impose under a plea agreement in the case. It was wildly disproportionate to the crime—an act of nonviolent civil disobedience that championed the public good by exposing abuses of power by the government and a security firm. But the excessive sentence was the point. The corporate state, rapidly losing credibility and legitimacy, is lashing out like a wounded animal. It is frightened. It feels the heat from a rising flame of revolt. It is especially afraid of those such as Hammond who have the technical skills to break down electronic walls and expose the corrupt workings of power.”
Unfortunately for America’s intelligence-security organizations (public and private), Barrett Brown is as talented with words as Jeremy Hammond is with computers, and – unlike most of the people Brown exposes – he has a sharp sense of humor. While incarcerated, he wrote a dozen or so very funny essays for D Magazine, (“D” for Dallas, Texas – where Brown was born), such as this one, from June of last year. He has since been hired by the The Intercept, for which he has written another nine articles so far, all of which can be seen here. A good example of his writing is this account of prison life. Although it is not the main point here, Brown’s commentary should be of interest to anyone who is curious about the nature of incarceration in America, a country which imprisons its citizens at a higher rate than any other nation.
Although Brown served much less time than Hammond will, he initially faced a potential prison sentence of 105 years, partly because the charges originally brought against him by the FBI, but later dropped, included identity theft and fraud – based upon the fact that the hacked emails to which Brown had posted a link contained credit card information. He was eventually sentenced to five years and three months (prosecutors had argued for eight-and-a-half years), but was granted an early release for good behavior. Brown has also been ordered to pay $890,000 in restitution.
Brown acknowledged responding foolishly when the feds were investigating him for his indirect association with the hacked emails. Seeking Brown’s sources, the FBI obtained a search warrant for his laptop computer, which was at Brown’s mother’s house, and – apparently to put pressure on Brown – they charged his mother with obstruction of justice. Brown responded by uploading a YouTube video in which he angrily threatened one of the FBI agents. Brown was charged with making the threat, interfering with the search warrant, and being “an accessory after the fact in the unauthorized access to a protected computer.”
Whatever one’s judgments of the actions of Brown and Hammond (or, for that matter, the handling of the cases by the FBI and federal prosecutors, and the sentences imposed upon the two men), the Stratfor and HBGary emails revealed interesting things about the practices of America’s shadowy and well-connected private security-intelligence industry. This article by Kit O’Connell, published last year, describes some of the issues – such as collusion between America’s corporate spies and government agents:
“The emails revealed that Stratfor gathers intelligence on behalf of private corporations while also sharing sensitive information with local and federal law enforcement. For example, the company spied on The Yes Men for Dow Chemical, after the activists publicly humiliated Dow on behalf of survivors of the 1984 Bhopal, India, disaster that killed thousands. At the same time, Stratfor collaborated with the Texas State Troopers to infiltrate Occupy Austin during the first months after the group’s formation in October 2011.”
“…[The emails] exposed a portion of the American surveillance state that’s normally both invisible and entirely immune to accountability.” [Emphasis added.]
Indeed, the emails provided a glimpse of a slimy ecosystem of mercenary spooks who perform counterintelligence dirty work for powerful corporate clients, such as Bank of America and the U.S. Chamber of Commerce. Not surprisingly, the matter received relatively little attention from mainstream corporate news media outlets – despite critical implications about free speech issues (Brown initially faced serious charges associated with merely posting a link to material that had already been leaked).
Some alternative media sources recognized that the case involved important issues though, and they published interesting articles on the case. A September 2013 piece in Rolling Stone, for example, provided an excellent overview of Barrett Brown’s life, career, personality, and the main facts of the case which sent him to prison.
Among other things, the article highlights the important role of journalists who understand that scandalous behavior in America’s security industry is not easily uncovered, and that independent journalists such as Brown – in addition to whistle-blowers, and anarchist computer hackers, such as Hammond – play an important role in exposing the moral and legal transgressions. Brown, for example, organized an effort – Project PM – to sort, analyze, and share the huge amount of information that was leaked (he was not involved in the email hacking itself).
Alexander Zaitchik, at Rolling Stone:
Once the hackers who broke into HBGary’s servers discovered that Barr [HBGary’s CEO] was basically a clown, they abandoned pursuit. “There were tens of thousands of e-mails and no one wanted to go through them,” says an Anonymous associate who observed the HBGary hack. “Everyone was like, ‘We’re not even going to dump these, because there’s no point.’”
Brown disagreed. When the hackers posted the e-mails on a BitTorrent site, he used Project PM to organize the painstaking work of collating and connecting the dots to see what picture emerged.
“Nobody was reading more than a couple of the e-mails before getting bored,” says the Anonymous associate. “But Barrett has this strangely addictive and journalistic kind of mind, so he could stare at those e-mails for 10 hours. He’d be sitting alone in the HBGary channel, yelling at everyone, ‘You’ve got to pay attention! Look at the crap I found!’” Brown quickly drew in some 100 volunteers to help him trawl through and make sense of the e-mails.
The HBGary cache offered one of the fullest looks ever at how corporate-state partnerships were targeting groups they considered subversive or inimical to the interests of corporate America.
…Brown’s case is a bellwether for press freedoms in the new century, where hacks and leaks provide some of our only glimpses into the technologies and policies of an increasingly privatized national security-and-surveillance state. What Brown did through his organization Project PM was attempt to expand these peepholes. He did this by leading group investigations into the world of private intelligence and cybersecurity contracting, a $56 billion industry that consumes 70 percent of the U.S. intelligence budget. [Emphasis added.]
One of the best accounts of the whole affair was published three months earlier. A June 2013 article in The Nation, by Peter Ludlow, examined the critical facts about the corporate spies, the activists who exposed them, and the disturbing implications for Americans’ legal rights posed by the numerous private security-intelligence agencies which operate with no real oversight.
Some essential points are quoted below, but Ludlow’s excellent article deserves to be read in its entirety by anyone interested in reports of organized stalking (also called “disruption operations”). Although the article doesn’t mention the issue of stalking, it provides a well-written and useful context for understanding the nature of the spying business in the U.S., which – in turn – is critical to assessing the plausibility of claims about stalking crimes by federal and state government intelligence agencies, law enforcement intelligence units (intelligence-gathering units within police departments), and private security-intelligence contractors.
Among the implications of the scandals exposed by Hammond and Brown is this: private security-intelligence firms in the U.S. (which are largely staffed by former government agents) apparently feel safe launching counterintelligence plots – even against high-profile journalists and high-profile organizations, such as Glenn Greenwald and WikiLeaks (spreading lies to discredit them, as explained below), so you can imagine how little they might worry about harassing – on behalf of their rich corporate clients – low-level targets who lack the connections, resources, and tactical skills to easily resist, identify, and expose the perpetrators.
Also revealed in the hacked emails were disinformation schemes – systematic lying. As everyone who follows national politics in America knows, that subject has been much-discussed recently – both by those who genuinely oppose “fake news,” and by those who disseminate it. Several good examples of the former, incidentally, have been published recently by CounterPunch, such as this one – which helpfully reminds readers that some major establishment news entities, such as The Washington Post have a history of getting caught serving as disinformation conduits for the CIA.
As I argue elsewhere in this website, lying of the sort exposed in the HBGary emails is, apparently, a core element of organized stalking crimes. Specifically, the emails revealed plots to exploit online “personas” (sometimes called “sock puppets”) to spread lies. Again, this is consistent with most of the online information (disinformation, actually) in “organized stalking” websites, comments, and videos. (Most discussions of this topic on the Web are suspiciously similar in the particular ways that they seem to be intentionally non-credible.)
Also worth noting is that at least one of the private counterintelligence operations exposed by Jeremy Hammond and Barrett Brown had connections with one of the U.S. government’s 17 intelligence agencies – namely, The U.S. Department of Justice (DOJ). When Bank of America expressed concerns about WikiLeaks’ claim of possessing a large cache of the bank’s documents, the DOJ advised the bank to contact the powerful law firm of Hunton and Williams, and specifically, an attorney there who represented the U.S. Chamber of Commerce. Apparently, a plan was hatched to undermine the reputation of WikiLeaks by discrediting the most prominent journalist who defended that news outlet, Glenn Greenwald.
Peter Ludlow, in his article for The Nation, described some of what followed:
In November 2010, Hunton and Williams organized a number of private intelligence, technology development and security contractors—HBGary, plus Palantir Technologies, Berico Technologies and, according to Brown, a secretive corporation with the ominous name Endgame Systems—to form “Team Themis”—‘themis’ being a Greek word meaning “divine law.” Its main objective was to discredit critics of the Chamber of Commerce, like Chamber Watch, using such tactics as creating a “false document, perhaps highlighting periodical financial information,” giving it to a progressive group opposing the Chamber, and then subsequently exposing the document as a fake to “prove that US Chamber Watch cannot be trusted with information and/or tell the truth.” In addition, the group proposed creating a “fake insider persona” to infiltrate Chamber Watch. They would “create two fake insider personas, using one as leverage to discredit the other while confirming the legitimacy of the second.” The leaked e-mails showed that similar disinformation campaigns were being planned against WikiLeaks and Glenn Greenwald.
Among the groups occasionally associated with reports of organized stalking and other illegal domestic counterintelligence activities in America are the counterintelligence agencies of the three branches of the U.S. military. The book CHAMELEO by Robert Guffey (OR Books, 2015), for example, documents a stalking operation by agents of the U.S. Naval Criminal Investigative Service (NCIS). Such activities are consistent with the history of such agencies. During the Vietnam War, for example, U.S. Army counterintelligence agents – in addition to the FBI – were caught spying on American protesters. Some of the HBGary emails suggest that these agencies also engage in spreading disinformation online. Presumably, the prospective client for the following proposal was the U.S. Air Force Office of Special Investigations (OSI).
Separate from the plan to target Greenwald and WikiLeaks, HBGary was part of a consortia that submitted a proposal to develop a “persona management” system for the United States Air Force, that would allow one user to control multiple online identities for commenting in social media spaces, thus giving the appearance of grassroots support or opposition to certain policies.
As noted in the Rolling Stone article, when Barrett Brown realized that the documents hacked from HBGary were too numerous for him to analyze by himself, he organized a group of volunteers to help. Ludlow described the effort this way:
“Under Brown’s leadership, the initiative began to slowly untangle a web of connections between the US government, corporations, lobbyists and a shadowy group of private military and information security consultants.”
Even now, more than five years after the computer hacks, the secret, unethical – and possibly illegal – activities discussed in the huge trove of stolen emails has not received the wide attention it deserves. For that matter, although it’s probably unlikely, there might even be some important information in the stolen emails that has not yet been uncovered: The HB Gary hack yielded tens of thousands of emails, and the Stratfor hack reportedly involved several million emails. Just to state the obvious, though: Presumably, much of the communication associated with the most serious crimes perpetrated (officially and unofficially) by current and former security agents (public and private) are not being documented in ways that are likely to be exposed by hacking, subpoenas, Freedom of Information Act requests, and the like.
In any case, Barrett Brown might be able to shed some more light on these matters, now that he has been released from prison. Brown’s reports from behind bars – several of which credibly documented violations of federal policies by employees and managers in the U.S. Bureau of Prisons (BOP) – apparently generated retribution against him, including violations of his rights to communicate, and the illegitimate imposition of solitary confinement. As journalist Kevin Gosztola noted, the treatment Brown received from the BOP was similar to the special treatment of John Kiriakou – the former CIA analyst and whistle-blower. Last year, Tim Rogers, editor of D Magazine, posted Barrett Brown’s statement about that.
Although most of Brown’s writings as a prisoner revolved around his experiences as an inmate, the final dispatch he wrote before his release – published in October by The Intercept, included details of the scandals whose exposure led to his incarceration. Brown explicitly – and without fear of contradiction – referred to the private spying he helped reveal, as a “conspiracy.” Not surprisingly, he discovered that some intelligence-security firms, really don’t want to have their activities exposed to the public:
I did get to indirectly gum up the works at Endgame Systems, which, though one of the four firms involved in Themis’s proposed operations against journalists and activists, managed to avoid being mentioned in most of the press coverage that followed the original exposure of the plot. You see, Endgame’s execs had insisted in one particular email thread that its name never appear in any Themis operational materials, explaining that the nature of the firm’s central activities was such that any public scrutiny would lead to disaster, and that this was a particular concern of their partners. Other emails ended up working against it, though, as I was able to pique the interest of Bloomberg Businessweek by forwarding this hilariously sinister “NO ONE MUST EVER KNOW” exchange to a contact I had there. A few months later, the magazine ran a long feature on Endgame revealing its ability to seize control of computers across the world and that it was offering this service to unknown customers outside of the U.S. government. This in turn prompted sufficient discomfort that the firm had to stop doing this, or at least claim to have stopped. Perhaps that’s why Endgame Systems was listed on my search warrant — and never mentioned again in a single other filing by the government in my case.
Anyone who wades through public news reports and attempts to sort out – even partially – the various government and private security-intelligence organizations which sometimes engage in counterintelligence activities – and “disruption” operations methods (i.e., “organized stalking”) in particular – will discover that the surveillance and harassment tactics are apparently associated with a variety of players in America’s huge web of security entities. In addition, it becomes apparent that those entities are often connected – both formally and informally – with each other. In the emails obtained by Jeremy Hammond and reported upon by Barrett Brown, those intersections between federal intelligence agencies, private security-intelligence contractors, and the wealthy corporate clients whose interests are served by both are clear.
… the chief enemy I’d made was apparently the Department of Justice — because when Team Themis was exposed, the emails revealed that the whole indefensible conspiracy had been set in motion by the DOJ itself, which had made the necessary introductions when Bank of America came to the agency looking for advice on how to go after WikiLeaks. There were no known consequences for anyone at the DOJ; a congressman’s calls for an official inquiry were shot down by Lamar Smith, the relevant committee chair, who proclaimed that the DOJ itself should handle any investigation. Whether the DOJ took Smith’s advice and investigated itself for secretly arranging a corporate black ops partnership is unknown. Rather, it was my head that was to roll, in retaliation for my efforts to keep the story alive in articles I continued to write for The Guardian as well as for my occasional successes in causing difficulties to Themis participants like Endgame and the intelligence contracting industry as a whole, which regularly hires ex-government officials at high salaries and thus has a working relationship with most federal agencies.
WikiLeaks – which is presumably the news outlet most despised by those who believe that the actions of powerful governments and corporations should be concealed from the public – has posted the emails exposed by Hammond and Brown online. This press release about those emails was published by WikiLeaks on November 29th – the day Brown was released from prison.
Much of the harassment associated with organized stalking is clearly illegal (breaking and entering, wiretapping, slander, threats, and such). Some of it, though – such as certain acts of “overt surveillance” might be legal – or at least reside in a grey area of legality, despite the fact that stalking, in general, is prohibited by the criminal codes of all fifty states. In the same way, some of the activities of private security-intelligence firms exposed by Jeremy Hammond and Barrett Brown probably involve varying degrees of criminality and unethical behavior. In any case, the operatives and their clients are, to some extent, above the law, as a practical matter, since (a) they generally operate in secrecy, (b) by contracting and subcontracting, corporations and government agencies can delegate their dirty work, (c) private companies cannot be investigated by Freedom of Information Act requests, and (d) the clients sometimes have connections to the U.S. Justice Department.
Peter Ludlow, in his article in The Nation, precisely identified the core point:
“Some journalists are now understandably afraid to go near the Stratfor files. The broader implications of this go beyond Brown; one might think that what we are looking at is Cointelpro 2.0—an outsourced surveillance state—but in fact it’s worse.”
“…While the media and much of the world have been understandably outraged by the revelation of the NSA’s spying programs, Barrett Brown’s work was pointing to a much deeper problem. It isn’t the sort of problem that can be fixed by trying to tweak a few laws or by removing a few prosecutors. The problem is not with bad laws or bad prosecutors. What the case of Barrett Brown has exposed is that we are confronting a different problem altogether. It is a systemic problem. It is the failure of the rule of law.”
October 22, 2016
TV news report about the organized stalking of a San Diego doctor
A TV news broadcast last week on ABC affiliate, Channel 10 (KGTV), in San Diego, California, featured a woman, Facika Tafara, who reported that she is being stalked by perpetrators who are using the sort of counterintelligence disruption operation tactics described in this website. Evidently, the stalkers have been conducting a variant of “gaslighting” operations (break-ins intended to terrorize the victim).
Although the segment is brief (less than two minutes), it is noteworthy because of the credibility of the victim. Although the news report does not mention it, apparently, Ms. Tafara is the Medical Director and Laboratory Co-Director at Family Health Centers of San Diego.
Also worth noting about this news report is that it features both the negative and positive aspects of local journalism about such stalking crimes. On the one hand, the segment is brief; it does not delve into the national pattern of similar reports, for example. Nor does the report address the question of whether the victim is aware of having crossed someone with connections to law enforcement or intelligence personnel. On the other hand, the decision to air the report shows a willingness to cover certain topics which national news corporations usually avoid, such as criminal activities perpetrated by federal intelligence agencies, Law Enforcement Intelligence Units (LEIUs), and private security personnel.
ABC 10 News posted the link to the video of the TV broadcast on YouTube – along with the text version of the news report, which appears below, in its entirety:
Published on Oct 13, 2016
Story by Brian Shlonsky
A San Diego mother said she was being targeted for weeks, with people she doesn’t know coming in her house when she’s not there.
Facika Tafara thinks she may be the victim of a bizarre practice called gang stalking or community stalking.
“It’s like an alternate reality, really,” Tafara said. “It’s spooky, and it’s my understanding that if this is actually what it is, it can go on for years.”
Community or gang stalking is an eerie practice that takes aim at your psyche to make you almost feel like you’re going crazy.
In Tafara’s case, she said she would notice strange things out of place in her house when she would get home from work, such as her windows being opened, dresser drawers opened, and she said she even found a camera inside the bedroom of her 11-year-old son.
“It’s so creepy, I had a bolt put on the door and I’m having my son sleep in here with me,” she said.
Tafara said she contacted police, and detectives visited her University Heights home, but there isn’t a lot that they can do.
“And they kind of said, well, it’s kind of like, if it happens again call us, but there’s not much we can do because we don’t know who it is, you don’t have a face,” Tafara said.
She told 10News that she plans to beef up security at her home and has even looked into hiring a private investigator.
September 29, 2016
Associated Press reports illegal spying and stalking by police
A report released yesterday by the Associated Press (AP) reveals nationwide misuse of confidential law enforcement databases by police officers. Public records requests were submitted by the AP to every state, and to dozens of large police departments. Among the findings of the AP’s investigation is that illegal snooping in databases is sometimes done to facilitate stalking and harassment of individuals with whom law enforcement officers have personal conflicts:
“In the most egregious cases, officers have used information to stalk or harass, or have tampered with or sold records they obtained.”
“…Officers have sought information for purely personal purposes, including criminal records checks of co-workers at private businesses. A Phoenix officer ran searches on a neighbor during the course of a longstanding dispute.”
Although the AP’s investigation found official records of hundreds of cases of illicit use of the databases in recent years, the full scope of the spying could not be determined:
“The number of violations was surely far higher since records provided were spotty at best, and many cases go unnoticed.”
So, even the AP recognizes that its investigation found only the tip of an iceberg. The full seriousness of the threat to the public, however, was not even hinted at. Although the practice is kept mostly in the shadows, stalking is part of the professional culture of a subset of America’s policing, intelligence, and private security business. Admittedly, this is a large claim, but it is supported by relevant published news reports, archived at this website, when they are considered in the aggregate.
Sometimes this stalking culture takes the form of personal vendettas and obsessions by a single perpetrator (the classic conception of “stalking”), and this was the focus of the AP’s investigation. For example, a woman in Ohio, who was stalked by a former police officer (he pleaded guilty to the stalking last year), is quoted in the AP article:
“…when they use [a confidential database] for ill purposes to commit crimes against you — to stalk you, to follow you, to harass you … it just becomes so dangerous.”
If, as some people – including this writer – allege, illegal stalking is apparently being widely perpetrated by law enforcement agents, intelligence agents, and private investigators in America, it is likely a result of the impunity associated with policing and spying in the U.S. The AP’s findings are consistent with that view. Even when officers are caught using databases for illicit purposes, there are usually no serious consequences:
“Officers are only occasionally prosecuted, and rarely at the federal level.”
Transgressions by individual officers are the primary focus of the AP’s article, but the report also mentions spying motivated by political vendettas:
“Deb Roschen, a former county commissioner in Minnesota, alleged in a 2013 lawsuit that law enforcement and government employees inappropriately ran repeated queries on her and other politicians over 10 years. The searches were in retaliation for questioning county spending and sheriff’s programs, she contended.
“She filed an open-records request that revealed her husband and daughter were also researched, sometimes at odd hours. But an appeals court rejected her suit and several similar cases this month, saying the plaintiffs failed to demonstrate the searches were unpermitted.”
Arguably, such spying is just as disturbing as the sort perpetrated by individual cops who stalk victims for personal reasons, because it reflects an institutional culture of being “above the law.”
Several media sources immediately called attention to the AP’s investigation. Among them was Reason magazine, the libertarian opinion journal which regularly covers civil rights violations. Although that website’s account of the investigation is essentially just a re-statement of what the AP reported, the headline made clear that the story’s importance was not lost on Reason’s editors:
“Think Government Surveillance Is No Big Deal? Talk to These Victims of Police Stalking.”
Essential reading for anyone with an interest in this issue is the analysis of the AP’s investigation by the Electronic Frontier Foundation (EFF). EFF is a non-profit civil liberties defense organization which closely follows issues such as illegal electronic surveillance by the U.S. government, online censorship, and encryption. Their work includes fighting legal battles for individual rights, and reporting on corruption and abuses of power by government agencies. Much of EFF’s reporting and advocacy is based upon information obtained via Freedom of Information Act (FOIA) requests.
EFF has been investigating this issue (corrupt cops snooping in confidential law enforcement databases) even before the Associated Press investigation began. As with America’s local and federal agencies, personnel in state agencies also perpetrate these abuses:
“The AP investigation builds off more than a year’s worth of research by EFF into the California Law Enforcement Telecommunications System (CLETS). EFF previously found that the oversight body charged with combating misuse had been systematically giving law enforcement agencies a pass by either failing to make sure agencies filed required misuse data or to hold hearings to get to the bottom of persistent problems with misuse. As EFF reported, confirmed misuse cases have more than doubled in California between 2010 and 2015.
“Other news organizations have shown the problem isn’t limited to California. In 2013, the Minneapolis Star-Tribune reported on a state audit that found more than half of the state’s 11,000 officers had misused driver data. In August of this year, the Tampa Bay Times found that over just 18 months, police had misused the Driver and Vehicle Information Database (DAVID) 432 times. But the AP’s report demonstrates that this is a pervasive issue throughout the entire country.”
“…It’s a problem that spans all levels of law enforcement and intelligence.”
Although the AP’s investigation – like EFF’s investigation, which preceded it – is a helpful contribution to public awareness about the abuses of confidential databases, a far deeper look into the issue of spying and stalking by America’s law enforcement personnel is needed. Public records requests, which formed the basis of the AP’s reporting, cannot even begin to get at some of the most serious stalking crimes by people in law enforcement agencies, intelligence agencies, and the private security business – because most such crimes are, presumably, not documented in official records.
Anyone who doubts that a huge gap often exists between reality and what appears in official police records should give some thought to the hard evidence which keeps emerging on that point. Some of that occurs in the form of videos that are sparking protests across the nation over police shootings – and the firing of police chiefs for trying to conceal the criminality revealed in such videos. For another clear, more recent example, see the post which precedes this one.
Above all, stalking victims – and anyone else wishing to understand this issue – should keep this in mind: The kind of stalking which exploits Zersetzung tactics – explained in detail, on the What is “Gang Stalking”? page of this website – will (a) be difficult to capture on video, in a manner that is convincing to others, and (b) will not be documented in the kind of easily-obtained official records which provided the basis of the AP’s reporting. Victims of this form of crime must use disruptive tactics – also explained on this website – if they want to expose this form of crime.
September 28, 2016
How some of America’s cops behave when they think no one is watching
Americans who are not personally familiar with illegal conduct by members of the law enforcement, intelligence, and private security industry are understandably skeptical about allegations of stalking and other crimes attributed to members of those professions. A systematic review of published news reports on the subject – such as the one offered by this website – gives a different perspective, but very few people see those reports presented together. Even progressives and libertarians, who often follow news about civil rights abuses by spy agencies and police departments, almost never encounter investigative journalism which specifically – and seriously – delves into the issue of organized stalking.
A primary reason for this is that such stalking crimes (which communist East Germany’s Stasi – its secret police force – referred to as Zersetzung) exploit methods which generate a minimum of forensic evidence. In contrast, for example, unjustified shootings by law enforcement personnel are now difficult to suppress, because of videos, which can be spread via social media. Consequently, it’s important to highlight irrefutable proof of behind-the-scenes police corruption, because such evidence illustrates the polluted ethical culture which would, plausibly, include the sanctioning of stalking crimes.
A perfect example of such a glimpse behind the curtain was reported a few days ago by Jay Stanley, a policy analyst at the ACLU. The case involves retaliation by the police against an American who dared to question the legitimacy of a police state activity (DUI checkpoints). Jay Stanley’s article is a must-read for people who – because of their socioeconomic background and mainstream political views – have few personal experiences with abuses of power. As the article notes, the incident involved serious violations of multiple basic rights guaranteed by the U.S. Constitution.
“The ACLU of Connecticut is suing state police for fabricating retaliatory criminal charges against a protester after troopers were recorded discussing how to trump up charges against him. In what seems like an unlikely stroke of cosmic karma, the recording came about after a camera belonging to the protester, Michael Picard, was illegally seized by a trooper who didn’t know that it was recording and carried it back to his patrol car, where it then captured the troopers’ plotting.”
For perspective, keep in mind that DUI checkpoints, which are staffed by regular patrol officers, are enforcement operations which take place in public. Imagine the corruption which can exist – without scrutiny by the ACLU or the press – among Law Enforcement Intelligence Units (LEIUs). Such entities operate mostly in the shadows (as a quasi-governmental organization, for example, the national association of “Red Squads,” LEIU, is not subject to Freedom of Information Act requests); however, they have been associated with anecdotal and published news reports – discussed in this website – with counterintelligence crimes, which include “disruption operations” (also called “organized stalking”).
Also consider, for perspective, that America has a huge number of private investigators, corporate security personnel, and intelligence contractors – many of whom are former agents and cops. Often, those people operate with even less public oversight than police agencies, and they have the same skill sets, connections, and contempt for legal and moral standards.
September 18, 2016
Collateral damage from stalking
the king’s horses and all the king’s men
Couldn’t put Humpty together again.
President Obama’s doctor and Vice President Biden’s doctor have both reportedly been consulted regarding the medical care for Baton Rouge Sheriff’s Deputy, Nick Tullier, who was critically injured on July 17th. Tullier was shot in the head and stomach by Gavin Long, a man who was apparently the target of a long-term, secret, illegal, stalking campaign by intelligence and law enforcement personnel (see preceding posts here for details). Three other officers were killed in the shooting, and two officers sustained non-critical wounds. Long was also killed in the exchange of gunfire. Since the shooting, Tullier has been on life-support, and has been mostly non-responsive. Stalking has consequences, and sometimes those consequences are beyond the control of the stalkers.
“President Barack Obama met with the family of injured Baton Rouge Sheriff’s Deputy Nick Tullier during his trip to Baton Rouge on Tuesday [August 23rd].”
According to Tullier’s father – who maintains a Facebook page about his son’s status, Tullier is still in an intensive care unit. Apparently, if he survives, he will be transferred to a rehabilitation facility recommended by the doctors who care for America’s president and vice president.
“Some by now have seen the announcement that Nick will be going to TIRR in Houston. I did talk to the three Doctors I wanted to get advice from; President Obama’s physician, VP Biden’s physician & the top Neurosurgeon. All three agre