Latest Tor exploits: the “broken mirror screen”and targeted speech.

I will let the viewer decide the meaning, and the veracity of the image I provide below, but especially, do your own research and Google the phrase “CIA” and “broken mirrors.” And, as many of the photo’s I provide, this one is NOT de-anonymized for a very specific reason, which I will not disclose.

Here- look at “screen splitting” over Tor, in WordPress, and ask yourself about possible non-incidental side effects of government hacking directed at “targeted speakers”:

 

Then, below, I will provide several more examples of screen shots and software applications that document various things, such as what a hidden wireless environment looks like when a Stingray or similar device is in use near a target, or the software that documents other hacks of Tor-and keep in mind, that ths has gone on in America since 2001, in so many ways that it would BREAK THE COURTS if the citizens sue for civil liberty. This is how “human experiments” are taking place today:

 

 

Tor so haxd
This is one of the latest Tor exploits as of the last month. Notice the split screen, and the fact that the operability of Tor has been destroyed. Also note that two browsers are being used for reasons I will not disclose–yet. Then, note that the words John Ashcroft appear in a duckduckgo search, and then, the phrase about going to police in the lower portion of the screen. Then, compare my claims- that the internet is in fact and practice a literal mind control operation, and that even that Facebook, on 11/10/2017 has acknowledged that as a literal and empirical fact.
what was actually going on when they isolated spot to the left.png
This is an old screenshot from around 2011-13, of a web IP scanner in use. Especially note the AP whose address is all zero’s. Yup. BINGO! That’s “them” whoever “they” are. I was ClearSpot, and the subsidiary details of what else “they” were doing would horrify the average and “reasonable person.” This screenshot documented a roving AP that came and went fro the neighborhood, and did a variety of exploiting/hacking/manipulating/injecting into other connections.

Look at these screenshots and photos above, and compare them to the many ROGS thesis points herein and ask yourself about the value of being “on voice” against the onslaught of weaponized hordes that attack our civil liberty and due process, every single day on the internet switch. Then, ask yourself about possible effects and other harms that remain hidden, beyond our rights of access, or rights simply “to know.”

Then, ask yourself if mind control is a fact of our current culture-but a fact that remains hidden as speakers are targeted with tools that make the infamous 1960’s MHCHAOS, the MLK letter, or the contrived homicide of activists  look like child’s play compared to this. Or-ask yourself “if this is what they are doing over Tor-what are they doing to my children?”

In the run up to this modern and full spectrum dominance of speakers who use words online, we can see the echoes of the 1960’s MHCHAOS, but also, some of the direct or extrapolated human experimentation of the McGill University era. Especially we see the full spectrum lack of consent to be used in experiments online or off.

Claims of law enforcement investigatory privilege is how much of the targeting of speech and speakers takes place today, and these hidden “privileged” attacks are hidden “in darkness” away from the sight of journalists, lawyers, advocates, journalists and others who eventually encounter targeted individuals, and  comprises the basis of much of the human experimentation that we see across the world today, and the average citizen is plainly terrified that such wide ranging and abusive conduct could be targeted at them should they speak up.

But I have unmasked these “privileged” abuses going back to 2004, by giving the legal scholar, the civil litigant, or the criminal defense lawyer-and maybe even a non-complicit psychologist or two- a peek behind the Curtin at the type of “electronic harassment” that your clients/patients/litigants/activists/journalists/targeted individuals have endured.

While on the surface, these two incidents above could seem trite or inconsequential, it is important to note that I have documented tens of thousands of these types of events, over mind-boggling periods of time, and most political targets don’t even know this is happening to their internet connections-and their lives, and their friends and associates lives-for decades in some cases.

We are, all of us, targeted by hidden sociopaths online-but when these organize stalkings come offline, there are actual, and provable damages to communities, and individuals in communities. The only question that I have is this: can you imagine the punitive damages from a class of persons thus harmed? It would be bigger than any tobacco lawsuit ever.

And this is the problem with that: again, we will see the state try to co-opt the individuals right to sue, in the name of the same bunch of criminals that got the money last time: The hens will cry “but we have no henhouse!” and the fox will cry “Hey-how did you say that from so deep within my protective bowels? I ate you years ago!”

And the pigs, by then, will have chewed through the center of the earth, and made it-finally to China, where over a billion citizens haven’t yet seen how hungry they are.

I tink we, the people, have to beat the Edward Bernaysian ad agencies, and then, the state “health” slush funds to the punch on this one- that if the creative litigants apply some pre-emptive PR, and organize around individuality-we could break this scheme into pieces in a proper legal forum. And, I suspect there might even be a few deep staters/union members/police and others who don’t wear high heels-but I could be wrong.

 

 

 

 

 

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s