How to document organized gang stalking: Gavin de Beckers perverse philosophy and blackmail

In order to document gag staking and gang stalking, you have to have a “starting date” or an approximate “date of onset.” In psychology, the time or date of “onset” is also a feature of a mental health diagnoses. And, as I demonstrate repeatedly psychologists and the “healing community”are weaponized, and politicized, and frequently-especially when the FBI conspires to recruit them in political gang stalking-that countering violent extremism programs are merely COINTELPRO 2.0.

In my case, I not only have the exact time and date where actual blackmail based on political causes (cause stalking) occurred, but also where the tactics and methods of “multi-stalking” took over my life and internet connections, and phone calls entirely- November, 3rd, 2011.

The issue’s then were free speech and first amendment, anonymity, and how hidden operations were taking place online-and I was an early exponent of actual transparency, which we see today that the internet for some is the “god” with which they perform black bag jobs, wage morality campaigns, entrap our children and manipulate their minds and more.

And, those who did it-did it for for decades-frequently quoting from Gavin de Becker’s tactics and techniques of blackmail and slander in the name of “security.” Same eastern bloc blackmail tactics, different century. Here is one example (feel free to sue me for this)-and get out your ROGS BINGO card:

“The damage that could be done to him simply should not be considered. It is irrelevant to any considerations.”

Would you want his blog taken down? Or a letter-writing campaign warning his employer? (Warning an employer privately is another of Gavin de Becker’s professional tactics.) Would you go looking for his personal info to see where he hangs out and who his friends are? A simple missive giving the basic information on the off chance that that will shut him up is sufficient. If one wants to out him.

Would you go looking for his personal info to see where he hangs out and who his friends are? Do you want to send warnings to his family members or his Facebook contacts or his local newspaper or volunteer organization or whatever? Do you want his real name and blog, atheism and all, just floating around the net so that any prospective employer, journalist, competitor or social contact can find it IF they look? (This came up with nursing-student x’s rant, though he outed himself.) Is it okay if someone ELSE does any of these things without consulting you? (Giving his name to other people privately still increases the odds that he gets outed by someone.)

I had been aware for many years that I was a target of entrapment and conformity campaigns-but unlike the 99.99999% of everyone else-I simply cannot be bought, leveraged, blackmailed or compromised-I have seen this sort of gray area policing and social engineering before in many places in history, where due process is a burden for those who prefer official source slander instead. They call it “totalitarianism” and it happens in dictatorships and banana republics; it is the preferred tool of Jewish shtetl’s, the Judenrate, and communists; fascist monarchies, right wing para-military coup led nations; family courts and bordello’s, street gangs and prison snitch operations and worse.

Indeed- a sort of “detachment” occurs in people who are subjected to long term trauma, where they simply cannot relate to the bizarre circumstances around them, when a sort of total theater occurs. But this is what OGS is designed to do to people as well, and the 1960’s version of these programs proved as much.

But unlike others who have endured these long-term institutional sociopaths, I also have names, and IP addresses-and a dialectical and linguistic chain of evidence that verifies my story. Without a doubt, and for the sake of others who are victimized with political policing or CVE programs- I will lend my name to the evidence I present herein. And, I can name names all the way up the DVIC food chain, and DHS/FBI/DEA/CIA who perpetrate sectarian, religious, cultic OGS-and all of that starts in local police departments.

And- I have actual damages forthcoming. But this is how difficult OGS is to document-from today, forward, it has been a seven year long process. So- I wrote ROGS so that YOU can be quicker on your feet and document these people who are undermining due process, and democracy, at our internet switch-and stalking targeted persons after unauthorized abuse of access to data and dossier’s.

Here is the basic case:

I was once an active constituent in a community, who wrote in pseudonym’s online, and influenced major political dialogues. I also activated for progressive causes, but also for the Constitution, the first amendment an due process. As you will see throughout ROGS, some progressives are in conflict with due process as they seek to create their version of change, which, without irony, is exactly what a certain class/tribe/sect/cult of people did in Russia in 1917, in Germany up until 1932, in Rwanda in the 1990’s, and other places ongoing and in many other socialized/communized places across the world.

So, here is my personal case study-which I have used to “diagnose” other exampes from other peoples lives, in order to semantically divorce the psychological gas-lighting on this topic from the semiotic truth behind them as instances of blackmail, entrapment schemes, leverage and compromise operations and more; and to “bring the blackmail into the light.

In my case, I was being blackmailed by a literal, local “gang” of political persons connected to actual gangs, political offices, and police power. It included well known political machine, database abuse, a whisper campaign, and of course-gray area policing which I have documented across the dialectic of ROGS, on this very blog. But I can name names, and will do so in the proper forum.

However, in my case, it took me years to find the data from the original blackmail attempt, which I am now in possession of. I came into possession of the knwledge of this data a few years back-but I did not have the actual links to OGS, or thw actual data that I provide now. AND: using my method, I can help YOU speed up your case of civil conspiracy, but ALSO I can show you where to look for your blackmailers.

Here-have a look at a comment that took me nearly seven years to find, because the people who conspired then actually hid the evdence of it afterwards-so, my personal “civil conspiracy” discovery moment started three days ago, based upon my discovery on 11/10/2017 of an entire internet conversation that took place online around seven years ago. And it is important to note that my personal blackmailers spanned continents from Australia, and England, and frequently cited Gavin De Becker’s work.

My personal blackmailers occupied state offices, police departments, and non-governmental organizations; my stalkers were linked together through collegiate email’s, and institutional databases. And all of this-is so far beyond the grasp of mos targeted speakers online that it is simply no possible to capture them at it, unless you know where to look.

I started with linguistics, and what at the time i had no words for, which we know now as the CVE schema working under the DHS as a de facto modern COINTELPRO. Proving even one case is the beginning of tipping the world in the right direction, so you can have a look at my case here.

Gavin de Becker is one of the many heads of the DVIC hydra that derives weaalth from exploiting people in secret, using illegal practices that, if discovered, can hep you gain legal standing to sue “these people” in court, but aso, to validate OGS as a hidden practice.

Becker’s techniques, you might recall, are well known in blackmail and compromise operations-and frequently found in online dialogues of organized gang stalking. He is also a major DVIC profiteer, and a moral campaigner, pandering for federal dollars, and his “work” is linked across the country in all kinds of civil conspiracies where organized gangs of DVIC stalkers and crybullies use the internet to spy, selectively target and enforce,  cause harm, and then play victim as those who they targeted respond with unorthodox or irrational practices, such as we see with altRight trolls DOXing the crybullies today, the way these flying monkey’s targeted the altRight several years back.

Here below is the ONE comment from blackmailers. One of them-the one who inserted dialogues about de Becker- at that time had an IP in Los Angeles CA, while others worked from Australia and the midwestern states of the US; and several were academics active in politics, political figures ranging from senators and lawyers, federal agents and others who were then selling the tools and toys that Edward Snowden revealed. I can and evntually will document it in it’s entirety-but this is where our current hidden police state, mediated at the ISP level began.

How does internet policing take place: proof of organized gang stalking via state vendors and offices 101

The first comment here is not the primary blackmailer, but rather, part of the “ideological echo chamber” that was formed by five specific participants and ONE actual person who  claimed to have “my” data” and that data from a state level database.

Then-after I called them out for blackmail? They literally conspired, in the definition of the term “conspiracy” to webscrub their trail. This all happened on a major web platform, on a international forum, and it took considerable political clout to cause a major web provider to webscrub an entire web forum-but they did it. And-someone else saved the data elsewhere; and all of this has left a vast web presence.

Meet my blackmailer, and note that actual political offices have been elected to, and actual database thefts have occurred, real estate markets and public policies impacted-and all of that under the watchful eyes of “the good guys and gallies” since this event happened November 3rd, 2011.

Note the layers and subtleties of the threat narrative based in gray area policing tactics-but also note that ACTUAL blackmail and that, from state and federal, and local databases:

Blackmailer says: One of those decisions is easy. I know who “x” is. I’ve met him, in fact. He’s local to me, but that’s all you’re going to find out from me about who he is unless I think someone’s safety depends on it. This is partly because he’s the only x I’ve seen actually engage in activism–for racial minorities rather than men who feel abused. It’s partly because he is actually a victim of a system………It’s partly because I know someone who has access to protected information about him.………………

Blackmailer says: Now a meatspace acquaintance of his has found out what he’s been up and was not made any happier by the revelation. In fact, this person took x’s real name and gave it to x, one of the people x’s been particularly ugly in attacking. We’ve been discussing what to do with it. The location checks out with comments he’s left on x, where he’s banned but morphing to leave x-style comments. It’s also checks out with regionalisms on his blog. We’re confident of having the right guy. We just have to decide what to do about it.

The uses of pseudonymity have come up in the discussion, of course, and there is an argument to be made that the power is on the side of those of us making the decision, We’re all well-connected and respected.

So the challenge is this: Knowing what I know, having the information I do, give me a good reason why I’m not morally obligated to attach his real name to this kind of behavior as publicly as I can.

Anon:4214 “#4208 & 4211 So you two are saying that x actually has some private information which reveals some of the commentators here to be self-serving

ROGS says:It’s getting so Soprano around here…!

The only actual defense to secwet information held by blackmailers is a full publication and a map to the addresses, and/or other easily obtainable public information, or local info about the personal places, people and things–the habits of a blackmailer, and the3ir enablers.

The trick with blackmail, though, is that the identity of the blackmailer is supposed to be secwet too! Not such a good job when the blackmailer outs themselves though.

And, if the maps and tax records, and local calls to the housing inspectors and so forth doesn’t get ‘er done–or some random madman with a vendetta doesn’t show up– you presuppose a few truly anonymous, super secwet, out-state Big City boys with black gloves, binoculars, bathroom photographs,poisoned pet baits, and tire irons can do the deeds–just for good jolly laughs and all.

The reader will note my attempts at humor, in the face of those who are engaged in blackmail or attempting to compromise me. As I have said-humor is your best defense against this vast conspiracy, where institutions, colleges, police power, and politics seek to compromise and individual-they are mocking due process at every step, and with impunity, because the individual is seldom aware of what hit them. One can only parody such blatant, endemic  corruption. It is also a good way to call it what it is, rather than fall prey to their blackmail, and adopt their terms.

The reader will also note that everything I said in the last paragraph is exactly hat had been done to me. All of it except the poisoned pets, as I had been under OGS for nearlysix years BEFORE they began the blackmail-and as you look through ROGS you will see other evidence of my claim. But you will also note the distinct absence of many other features of the ROGS dialectic-for instance, I will not at this time provide an answer to “why do victims of OGS use strange language, or adopt linguistic and dialectic conventions of OGS that other blogs have in them?”

The short answer-and why ROS here is an incomplete story with minimal evidence-the short answer is tha the story itself didn’t come to me for free, and it cost me actual damages. The story, then, is to “be sold, not told,” as one censored writer once said.

My reader will note that in cases such as Harvey Weinstein, and in the general media today, we see certain blackmail tactics and techniques being hidden behind law office fronts, and state level investigations in the name of counter-terror, but make no mistake- these are political blackmail schemes at their very center, and public officials are involved .

And so we also see these campaigns of leverage and blackmail ensconced in the colleges and in the NGO’s( the case of Rose McGowan and how Weinstein hired Black Cube to follow, harass, intimidate, and blackmail her, provides us a glimpse of how all of this works-get out the ROGS BINGO card for these cases.)

And, we see college servers being used to plot nefarious crimes, and which hold vast troves of evidence of how “counter-terrorism” has been translated by some as “political opposition and dissent.” Then, we also see that these counter-terrorism “service providers” are in fact and practice involved at every level, as we see in my case, as Gavin de Becker was frequently cited in a make-work project that spans the depth and breadth of liberty, lie a wet blanket..

So- in my case-which spanned decades, as the internet grew and “evolved” with the hep of well disguised hidden actions and hidden actors-and of the mysterious and “delusional complaints,”and comments that “gee the cops can’t seem to help out” we see now, the psychologists are in on it,  as are the entire DVIC industries of wholesale exploitation of persons.

I have provided for you, the reader, a glimpse of my seven years of research. And there is so much to these cases that it simply boggles the mind of anyone who is targeted by firms like de Becker’s, and political machines that are state and federal level stalking. I am simply not one who can be blackmailed, or compromised-and this is what OGS is primarily.

If you read through ROGS here, you will see how you can build your case, or refute the case they are trying to put on you. And you wil see that at every single level, politics are involved, and investigations under color of law and authority. You will also see a vast bleed-over between military operations and stalking of civilians.

You will see that, primarily, the vampires who despise free enterprise, and who derive their financing from nursing the state teats are those who are most often responsible for OGS. This is the primary tool that some are using to create their version of a “new world order,” and none of it follows la or due process-and ALL of it starts and ends at our access to the internet.

As I write this today, I note that some 11 nations looked in here yesterday. And, I also note that the news itself is reporting what I have documented since 2004. This web of internet crime that has at it’s roots zionist and dominionist elements work in secret, in darkness, to pervert law and civilized discourse. The problem isn’t words- the problem is the billions of dollars that ave weaponized speech, and use it against us in the great goal of recreeating the dark ages, a time when their versions of God, god, G-d, G_d, Gawwd, and God Damn for all of us to cower before.

But as a a student of history, I saw this coming in 1993, and began writing about it-but the obstacles that I faced then have only increased, as others made billions to suppress my words, compromise me or my choices, or outright sabotage my reputation.

And so it is that last point where I began to write ROGS, as they have revealed themselves as what I say “they” are, whoever “they” are. And today, we see that nearly all MSM is beginning to write about what I wrote then.

This is not insignificant-as I have long been a target of many nefarious actors, working from hidden capacities ranging from crybullies and fraudster’s to  local masonic elements, to NGO’s that are dependent on the state teats to college administrators and counter-terrorism fake hero’s and computer programmers in Infragard; Ruby on Rails designers, and programmers;  to stall and obfuscate these simple truths that, when viewed in totality, are quite a complex web of interconnected conspiracies in and of themselves; but that ATEOD? A really just a simple thing in practice: it is organized gang stalking, and it is how a corrupted Democracy works in it’s end days.

And when I lifted mysef up from the ashes of this vast and terrible thing, I discovered only one simple fact: no matter how complicated all of this is? There is ony ONE conspiracy, and I am NOT part of it.

It is the conspiracy of silence around how these things work against a demoocratic government; and against law and due process-and now, you are listening, and hopefully, ending your own silence.

But one thing that OGS is NOT: it isn’t “delusional people” on the internet-it is people who have no idea what hit them, who use the words that scumbags and security contractors, cultists and sectarians and DVIC teat suckers give them to describe their experiences after raping their privacy, and wasting their time. And I will have no part in that, because first they came for the crazy guy on the internet, and I said nothing; because I wasn’t the crazy guy on the internet. And then….


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s