Is gang stalking online real-can “they” actually track my machine as I surf over Tor?

The short answer is, if you have been reading this blog and missed the memo that said “YES THEY ARE TARGETING, TRACKING, GEO-LOCATING, MONITORING, INFLUENCING, and OPERATING on you, your internet connection-and the mind that is using that connectionlike mad scientists at every moment, every time you are online!!!”-then you clearly ARE CRAZY, as some have suggested about “targeted individuals.

This is what I call “feminist jurisprudence” aka “communitarian/community policing.” It cannot be missed that there is a clear ideological link between OGS complaints and elderly white females in technology, politics, the judiciary, or in policing; but especially in the transnational Octopussy that we know as the Panopticon and its attendant plots, political manipulations, and influence/mind control/compromise/blackmail schemes and covert operations.

Related Stories: The Association of Threat Assessment Professionals (ATAP) has linked itself to both gang stalking, AND political /punitive psychology.

More hilariously, the Washington State Fusion Center distributes “mind control” documents to the press, as the Department of Homeland Security renovates the famous “mind control ” facility once occupied by CIA funded doctors who forced patients to take the illicit drug LSD, and unethically tortured children and adults with debunked electro -shock “therapy “.

And worse, they are using the local police, and Fusion Centers, aka, “the domestic spying on citizens apparatus”and the Hegelian conflict oriented communitarian policing scheme to literally cause learned helplessness and fear, in order to enforce conformity, as Fusion Centers (all of which are well hidden, and all 77 have different names across the country) direct resources at “non-conformists.”

Extra points for noticing the number 77 has “mystical value” to religious fanatics, Masonic orders, and others who are invested in harassing citizens with OGS. I am certain all of the religiously deluded morons who work in Fusion Centers actually believe they are doing “gods work,” and that the number 77 means “Son of Circumcision.” Try not to laugh…but I personally like the linguisticexplanation of 77 as a “she goat.”

And while it can make a person FEEL crazy, there are actually programs targeted at EVERYONE that actually involve this form of mind control and influence operation, and that these programs are ill-equipped to decipher human behavior, and that with destructive effects . Here is just ONE example of that, as AI struggles to eradicate “human experience” in order to socially engineer ‘predictable humans’ and using ‘predictive analysis.

And here is one recent example from my own writing online from just today (it took me two days to even write the post ‘live’ in WordPress), but every day, there are thousands of examples available to even the casual observer.

In that light, it is worthy of noting that those who value civil liberty, such as our right to privacy-often overlook the greater right of liberty: the right to consent, or not consent to experiments, or other ‘mind altering’ substances and practices, that are deployed on us as weapons or as research tools. So it is important to note that Tor-the famous privacy software that was made “famous’ by Edward Snowden when he revealed to us that our governments-all five of them, in the Five Eyes Alliance, and others ranging from Israel(which gets every bit and byte of our data unfiltered) to Russia are performing their own experiments.

So-forget about DEW’s and all of that other PsyOp psychobabble, and make yourself aware of Palantir, DataminR, Media Sonar, and more that they are targeting at us, and our online speech every second, AS WE TYPE INTO OUR BROWSERS. OVER TOR….!

Here below is one example from today alone. One of many I caught before the sun met the noon sky:

The example:

  1. I look at today’s statistics about who reads this blog and what they read. I note that my most popular post references the hack of the CIA’s “hacking tools” which I posted in this blog post here. This one post quotes the Intercept, and has links to Wikileaks, where the CIA hacking tools were described as hacking American’s cell phones, and then, destroying the ‘evidence’ that they had hacked my/your/their phone.
  2. I looked around the web for stories that also document how the CIA-and some 16 other US intel agencies alone, not including the entire battalions of soldiers aand seamen and USAF who are hacking American’s at any given time- have destroyed Constitutional due process and leveraged, blackmailed, or otherwise compromised American citizens (and millions of others around the world) because they act with “plausible deniability, and then, impunity. I found this story, about a humble public defender in Washington State, where the CIA hack tools are implicated in hacking citizens.
  3. Using Tor to write this blog,(and using Tor makes one an INSTANT target by these ‘plausibly deniable’ activities by military and civilian agents, agencies, and a host of NGO’s), i read through my stats, and noted “outbound links”-the links that people clicked on my blog to read material that I have linked to OUTSIDE my blog. And, I was under attack the whole time. Here is the story I was writing ‘under attack.’ This caused a net loss of about an hour today alone.
  4. I clicked the “out-bound” link, which was to Urban Dictionary” and the link to a description of “gang stalking methods“. Here, below is a snapshot of that-and notice the advertisement for “CASA” which is a foster care warehouse operation, where state sponsored kidnappings of children are covered up as “foster care placements.” Children who are “placed” in Foster care face an 85% chance of being sexually abused, pimped, or otherwise turned into profitable commodities by these organizations and the related DVIC industries

agang stalking methods

This screen shot, which I have NOT anonymized, for a very specific reason, which I will not disclose, contains all kinds of “meta data” about the machine I am using to compose this posting and nothing more-not a single identifying bit or byte of data connects this screenshot to me, or to this blog-other than the WORDS I use to describe this situation.

As such, I seek to demonstrate that speakers, and words are the actual targets of all of this “sooper seekrit spying,” that claims it is to “protect the little old ladies and the children from rapists and pedophiles” because pedophiles might otherwise sacrifice everyone’s safety for their own liberty in order to to get at  the old ladies and babies whose Constitutional houses are on fire, and burn them to the grounds, tossing their pocket Constitutions into the fire to make it burn faster, and using the broken pieces of civil rights and human rights and even animal rights to build a ladder just to get at the old ladies and babies  even quicker as they plummet out the windows, pre-cooked and ready to rape with shovel handles and pocket Constit…oh never mind that last one(and all of those windows, and Windows 1-10, totally broken already by the “broken windows policing scheme” of the 1990’s)….

So, to recap:

Meta data is personally identifying information that police, investigators, and others who participate in the local, state, and federal level fraud outlined on this blog have been using meta data to make cases against unsuspecting victims of OGS and its accompanying mind control and influence operations. You can Google the term yourself.

But what matters most is a question that now arises in the mind of this researcher-and hopefuly inthe mind of other researchers, lawyers, legal scholars, TI’s, psychologists and others who research organized gang stalking.

And the question is: Why does CASA-an organization that I have roundly criticized over the years, and even now; an organization that has tens of millions in advertising budgets, and tha has notoriously been an integral part of the DVIC scheme-why, exactly, do they have an advertisement on that one weblink, now?

I mean-isn’t web searching and webvertisement coordinated with searches and topics-shouldn’t a ink to “gang stalking methods” have like, a deer tracking book, or a bunch of saggy pants without belts, and some “logo gear” on it; shouldn’t in the very least a link to another website that teaches te “rhythm method” be linked, there? And so, what has CASA have to do with OGS anyways?

I suggest that the answer is in the question-and webterrogation of narrative as well. Webterrogation is not unlike custodial interrogations in many ways, not east of which is that the individual being interrogated is in fact and practice, targeted, and contained, somewhere, at some point. This is not insignificant, but it is also a larger point that I will write about later (especially as pertains to ISP’s and how Infragard members-deputized members of law enforcement, and sh!tloads of political operatives and others literally redirect, re-route, and inject any “live” connection with lots of “who knows what.”)

You can test the science yourself- in fact,my blog here asks any researcher of organized gangstalking to do EXACTLY THAT-test my many theories, hypotheses, and anti-hypotheses against your own, form whatever discipline you practice.

But go over to that link about “gang stalking methods” and see what advertisement YOU get at the top of the page. I got CASA, which is a DVIC subsidiary industry, and a multi-million dollar player in the theft of children across America.

Here below are some links that demonstrates AGAIN, that state level institutions, operatives, and policing itself, is implicated time and time and time again in the pimping, procuring and pornifying of children, as well as the massive crisis PR industry that masks this fact, and gives us boogiemen/drug dealers/terrorists/pedophiles/whistle blowers/journalists/your neighbors farting cat instead ( and it cannot be missed that two of the first five links that were returned to my Tor browser were near, or local to my own location…):

CASA LA: http://casala.org/our-mission/
Sexual abuse in Foster Care: http://www.hg.org/article.asp?id=6703
Is Foster Care modern day slavery? http://medicalkidnap.com/2016/04/15/the-u-s-foster-care-system-modern-day-slavery-and-child-trafficking/

Then, without irony, one must note that Elizabeth Dietrich, one of the few online who has written a scientific thesis as regards OGS, opened her thesis with a brief statement about pornography. This, combined with another part of my thesis-that women’s deviance takes place in unique forms, but especially through positions of power, authority, and then, voyeurism-one cannot help but note that women’s violence-or in the very least, their inability to “comprehend” the violence directed at others is institutional in nature. And this is clearly the case with OGS as well (which is in no way, shape or form similar to the “Pro-Anorexia community” as Dietrich has stated.)

Elizabeth Dietrich’s paper encourages the isolation of victims of OGS. How feminist.

Maybe it’s because Smith College is known as the “Lesbian Capital of the World,” or maybe it’s because all the special snowflakes get better grades when they’re pretty, but Dietrich’s conclusion truly looks like first year work when she comes to the conclusion that

Gang Stalking is just one of the many online communities that uses people’s
conformation bias, meaning making, and wish to belong, to deleterious ends.
For my part-should I ever publish this, I will devote a special chapter to conformation bias, and conformity at the expense of critical thinking….

Related Story: Five Denver Nurses caught looking at a dead man’s amazing cock, then gossiping about it in the lunchroom. Apparently, this is a thing with nurses and other women in the medical community(let me know when you start seeing patterns in western women’s deviance, such as their Freudian “death urge” morphing into endless forever war that kills other women’s sons, lovers, husbands and other babies)

From the very introduction of Dietrichs paper, we see that male dominated spaces such as 4chan and KnowYourMeme, as well as “porn” is an underlying theme of those who officially gas light OGS targets; that, for those who have taken the time to write on the subject (this will be the topic of a later post here). What matters here is that “victims of OGS be isolated” both in Dietrichs narrative, and in that of Sheridan and James, and as such, we see that the two-exactly two papers that addresses the topic-are written by gender feminists, which is telling indeed.

Then, we see emergent norm theory and the interplay of feminist destruction of so-called male dominated spaces throughout her paper, which concludes as I stated above-that victims of OGS should be isolated and ex-communicated from the internet.

CHAPTER I
Introduction
A tautological statement has been growing in popularity among pithy internet-savvy
populations over the last ten years or so: If you ever wonder if it’s on the Internet, it’s on the Internet. Anonymous contributors to websites such as 4Chanand Know Your Meme expanded this idea into a list of 50 Rules of the Internet that include items such as “The Internet has no rules,”and “there is a porn of it, no exceptions.”The root of the joke is derived from a very basic fact: Internet content, for all intents and purposes, is virtually endless. Almost any honest query one enters into a search engine will invariably yield results, usually hundreds of thousands in an impressive .33 seconds, more or less a couple hundredths-of-a-second, depending on what kind
of modem you have. Social connectivity over the Internet is powerful.

.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s