UPDATE 09/24/2019: Since I began writing the ROGS blog, new facts have been exposed in major media that validate every single thesis statement in this blog. So, never doubt the power of one voice, or the power of free speech- I have changed the media narrative entirely in my tactical assault on gang stalking narrative.
The following post discusses military grade psychological operations (PsyOps) targeting citizens. When I wrote it, the MSM had not yet disclised that the racist, sectarian Anti Defamation League has been secretly targeting people with the Redirect method, or that organizations like the Association of Threat Assessment Professionals, which advises all of the law enforcement agencies I name herein, has been practicing “colluding parallel investigations” on targeted individuals; or that Fusion Centers are actually dabbling in nefarious psychological operations; or that Fusion Center directors are trained in PsyOps either.
The internet is talking to me!
How massive databases that steal the virtual identities of citizens can and are abused, especially when combined with psycholigical and influence operations; and how Google, the NSA, Palantir, artificial intelligence, database abuse, and quasi-legal investigations can-and do-conspire to create the appearance of mental illness in “targeted individuals.”
Databases are forever, and they now hold all of us hostage to corporate and government interests, as our personal data, including whole capture emails, phone call recordings, health and wealth information, entire maps of our online and offline relationships, our entire browsing histories, and much more have enabled hidden operators to access our minds and our decisions from behind the curtains of color of law practices
On the surface, any complaint of organized gang stalking includes what could be classified as paranoid psychosis with”psychotic features.” Classic psychosis entails hearing voices, and having conversations with imaginary people, or other creatures and entities like god, or demons, and so on. Then, there is the often cited claim that these victims, or targeted individuals are followed, and that certain other things occur, which defy rational or logical-or psychological explanations. Then, psychologists generally label these victims as delusional, much as victims of child abuse, or domestic violence were once labeled as delusional.
This is all documented in the literature. However, in reality today, we can see and begin to document something that wasn’t available to psychologists in years past: we can use metrics, and measurements, and screen captures, and IP address location, and alternative news sources to document that in fact, many claims of this nature can be verified, or validated; tested against a new hypotheses.
And, we can look at the modern techniques, tactics, and programs of modern policing that indicate that psychology is out of touch with reality, not the targeted individuals. The fact that police can and do use massive databases that inform them about very intimate and personal details of each individual they target is in and of itself a horrific spectre; a naked abuse of power.
Each police or other agency involvement is no longer as simple as a couple of arrest records, and an address. No-these modern databases have entire family histories in them with webs of interconnected relations; entire web browsing histories and categories that profile individuals; modern databases are essentially mind maps, with augmented personal data, and predictive analyses.
This is bad enough for these unfortunates who encounter agencies that use these databases-but far more troubling is that each encounter adds to the possibility of further exploitation of any individual, as these agents and agencies also pen investigations like never before in our history-and pass the investigations back and forth sometimes for years, as we frequently see in the cases of mass shooters, and purported gang members, petty criminals; whistle blowers, journalists-your neighbor, maybe.
Because the internet is forever, we can also document actual conversations and engage with subjects who claim that the internet talks to them. The internet podcast like websites of Talkshoe provide endless glimpses of likely provocateurs manipulating these subjects, and also, sowing misinformation and disinformation. I will not provide links because I believe these sites are plainly harmful, especially some of the stuff on Talkshoe.
But there are many more examples that any researcher can find. And too, the many blogs and video’s that document OGS as well often do reference databases, or use information gleaned about a target to exploit that target.
I didn’t sign up for this!
Databases are forever, and they now hold all of us hostage to corporate and government interests, as our personal data, including whole capture emails, phone call recordings, health and wealth information, entire maps of our online and offline relationships, our entire browsing histories, and much more have enabled hidden operators to access our minds and our decisions from behind the curtains of color of law practices. The Intercept, the paper that published Edwar Snowden’s leaks, has been actively revealing story after story about how databases are used and abused.
Here is one example of the breadth and scope of the Palantir database to profile, track, run surveillance and communicate with ‘suspects’ and targeted individuals online-and predict, influence, manipulate; suggest, guide, and control the movements and decisions of these individuals in real time. so, when you next encounter a client, or a patient who complains of these things, take into account that “even paranoids are right sometimes,” and increasingly, paranoia itself is looking like it is a mis-diagnoses:
From The Intercept:
Palantir Provides the Engine for Donald Trump’s Deportation Machine
March 2 2017, 6:18 p.m.
Immigration and Customs Enforcement is deploying a new intelligence system called Investigative Case Management (ICM), created by Palantir Technologies, that will assist in President Donald Trump’s efforts to deport millions of immigrants from the United States…
ICM funding documents analyzed by The Intercept make clear that the system is far from a passive administrator of ICE’s case flow. ICM allows ICE agents to access a vast “ecosystem” of data to facilitate immigration officials in both discovering targets and then creating and administering cases against them. The system provides its users access to intelligence platforms maintained by the Drug Enforcement Administration, the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Federal Bureau of Investigation, and an array of other federal and private law enforcement entities. It can provide ICE agents access to information on a subject’s schooling, family relationships, employment information, phone records, immigration history, foreign exchange program status, personal connections, biometric traits, criminal records, and home and work addresses.
“What we have here is a growing network of interconnected databases that together are drawing in more and more information,” said Jay Stanley, a privacy expert at the American Civil Liberties Union. “If President Trump’s rhetoric on mass deportations is going to be turned into reality, then we’re going to see these tools turned in that direction, and these documents show that there are very powerful and intrusive tools that can be used toward that end.”
Although ICM appears to have been originally conceived for use by ICE’s office of Homeland Security Investigations (HSI), the system appears to be widely available to agents within ICE. Officers of ICE’s Enforcement and Removal Office (ERO) — the U.S. government’s primary deportation force — access the system to gather information for both criminal and civil cases against immigrants, according to a June 2016 disclosure by the Department of Homeland Security, although ERO will use a separate system to manage its civil cases. “HSI and ERO personnel use the information in ICM to document and inform their criminal investigative activities and to support the criminal prosecutions arising from those investigations,” states the DHS filing. “ERO also uses ICM data to inform its civil cases.”
ICE’s Office of the Principal Legal Advisor also uses ICM to represent the office in “exclusion, deportation, and removal proceedings,” among other matters, according to the DHS disclosure.
The DHS disclosure states that Homeland Security Investigations is ICM’s primary user….
Although ICE’s enforcement focuses overwhelmingly on immigrants, the ICM funding documents make clear the intelligence tool can also be aimed at U.S. citizens. “Citizenship can be established a variety of ways to include biographical and biometric system checks,” one document states. “U.S. Citizens are still subject to criminal prosecution and thus are a part of ICM.”
The scope of ICM’s use appears to have expanded during the system’s development. The hundreds of pages of funding documents from 2014 make no mention whatsoever of ICE’s Enforcement and Removal Office (ERO). On the contrary, the 2014 records state that ICM was launched as primarily an HSI initiative and meant for use by HSI agents. Yet by June of last year, this appears to have changed: The recent DHS privacy disclosure repeatedly states that ERO uses ICM to support aspects of its mission.
This is not the only case in which it has remained unclear what kind of limits ICE has on the sorts of missions for which its intelligence systems can be used.
A spokesperson for Palantir declined to provide comment for this story. ICE did not respond to a list of questions, including whether FALCON — ICE’s advanced intelligence and analytics system for Homeland Security Investigations — is also made available to ERO agents.