I first experienced an electronic implant in or around 2004-5. Computer implants are real, NSA and other agency break-ins to hardware and software are real, and documented in main stream news.
In case you were sleeping during the takeover of the United States by the so-called “deep state,” aka the collusion between international finance and its hydra’s and Octopussies of NGO’s slopping the troughs of American police and intelligence agencies such as the FBI, the CIA and the DHS, as the NSA spies on all of us, here is one of the phrases they use online to distort the meaning of the phrase “gang stalking,” and to obscure their illegal actions:
They stuck “electronic implants”in me!!!!!
Electronic implants are very real in many ways, but not the way they are discussed in the online dialectic of OGS. In fact, the use of the term as a biological implant is designed to obscure other more real implants, because in case after case ranging from intellectual property theft BY the state or a subsidiary corporate, private intel gathering firms like Facebook, or the host of DHS “contractors” who stalk political targets, to major spy operations.
And surely as we see in case after case of mass shooters, we see long term agency involvement in those peoples lives as predicate for these mass homicides, and quite frequently, contact with zionism, FBI careerist CVE stalking, and Jewish Supremacy in college settings, as we saw with the recent Texas cases, and dozens of others ranging from Stephen Paddock, to this guy here, Mathew Riehl, and attorney who himself ranted AGAINST Nazi’s and the Eastern Bloc Judenrate’s favorite go-to pundit, white females, before he was shot in cold blood in Colorado after invoking his Constitutional rights to be served a warrant before he is gunned down in his own home by Israelified “Ich, Du” Buberism and Hegel, in a steroid can.
Related Story: The Doctrine of Superior People-How a racist and actual Cabal of misanthropes murder with impunity, wage slander and disinformation, steal resources, control cultures, buy police forces cheaper than dime store drag queen lipstick, and get away with it, century after century-and blame it all on YOU!
And dozens of other well documented abuses of databases, and actual electronic snooping and hacking such as the Minnesota cases of reporters stalked by hundreds of NGOs/AIPAC/federal dollar/DVIC funding related stalkings- to cases of journalists like former CBS investigative reporter Sharyll Atkisson are sabotaged and spied on by political police (the FBI, DHS, et al are merely that), we do in fact see electronic implants as part of the illegal Constitution defying nature of the FISA court coup, the DHS sectarianism, and the attendant cowardly conduct at the SCOTUS.
As I have noted, my personal circumstances indicate that I have been targeted by multiple cause based/ religion based/ and other stalkers for decades, because I defy their mystery cults and religions-but also because I refuse to be circumscribed by their un-Constitutional gray area policing methods, and have been a first amendment fighter and more for decades (Here’s lookin’ at YOU Phil!)
I first experienced an electronic implant in or around 2004-5, as progressive organizations and institutions ranging from colleges, to state agencies and their attendant database abuses worked to frame me/harass me/ implicate me/ cause me to be “flipped” as a useful idiot to their political causes, or otherwise charged criminally in a variety of ways.
There I was, sitting in a college newsroom, when the computer redirected, all by itself, as if a spell had been cast upon it! To Nazi-land!….an imaginary place created generation after generation by the SAME FOLKS, as international bankers create, and then gut local economies.
But what really mattered then more than anything, was that they attempted to defuse my activism by following me around with nebulously middle eastern photographers, and tried to neuter my ability to have political effect. And what an effect! Only lately is MSM talking about how a militant, AIPAC financed zionist sect of rapists and baby killers has taken over our airwaves, and purchased our police cheaper than donkey-dick-meat in a Mexican strip bar.
Well, at least Marcy Wheeler sees the utility of the word “targeted” now, and how it pertains to individuals, despite her emergent socialist bent (oh, those poor deluded young people…) And the Intercept-despite its ADL sponsorship, occasionally takes on organized gang stalking in one way or another-especially the manufactured terrorism parts of it, as these cases-case after case after case indicate that OGS is in fact a precipitator, and NOT a mental illness at all. Get out the ROGS BINGO card!
And while this benefited a few people in the short term-like the bald headed AIPAC sponsored college president, a notorious AIPAC shill and an American Studies professor/rat whose favorite read then was “Blood in the Face” by notorious James Ridgeway ( a likely informant), and a handful of dirty cops whose testosterone outweighs their shrinking testicles- in the wider dialectic.
And, it revealed to me that the facts I put forward herein are true and replicable elements of how the political processes of America are entirely broken-but also how a lawsuit could begin to challenge these practices. I mean- a few militant armed American neo -Nazis/alt-Rightists/bad-guy-racists-du-jour (those who aren’t Jewish in the first place, like the famous Nazi of Skokie, Frank Collin, ne~ Cohen, or who aren’t working for the agencies, if any can be found) have NOTHING on people who can purchase the American police cheaper than trailer park trucker meth made out of truck-stop pep pills.
But actual electronic implants aren’t anything like what you read about online, and anything to the contrary is pure insanity. You see: agents of the state and its Israelified, racist, zionazi sponsored spy aparatizionazi sponsored spy aparati literally gave me a computer that phoned home to a local political precinct, several political organizations in a certain state, the local police department, and computer servers located curiously between a college and these various agency operated and maintained computer main frames.
And THOSE main frames were situated curiously close to SEVERAL of the above named agencies. They were literally within blocks of each other, as is the case with most cities and towns across America. But, of course, much of the evidence of THAT disappeared in a burglary in 2009, which I have documented elsewhere.
Well- of course I sabotaged the crap out of their sooper seekrit recruitments, entrapments and implantations, much to their chagrin, and found friends who were less crappy than them. And here below is how they were using implants then, but only I and a select few others knew this, and many of those are now deceased, distanced and afraid, or otherwise co-opted. And, my discovery THEN is when the break-ins to my homes began in force as well, because I laughed in their faces, every time.
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
“Equation Group” ran the most advanced hacking operation ever uncovered.
In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
Second, a highly advanced keylogger in the Equation Group library refers to itself as “Grok” in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined “How the NSA Plans to Infect ‘Millions’ of Computers with Malware.” The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
….read the full article on the NSA’s 14 year hidden domestic spy operation here.
Gray area policing, aka “high policing,” and Grayfish computer intrusions
Well, anyways- for the researcher of organized gang stalking, the legal defense counsel or civil litigator who encounters the “gang stalking dialectic” or one of its many actual victims-and for the sworn *cough, cough* peace officers whose goal is to uphold our law and our Constitution-I suggest you have a read through that article-because now, other nations are peeking in here, quite routinely-and some of THOSE are peeking at you as you peek in at my writing.
And, for those who I have named herein-I suggest you keep your eyes open at night, because the moon near YOUR house will be getting brighter. A LOT brighter now. Bright enough to encompass whole families.
Try not to see patterns, though….and maybe, watch your back, too. Apophenia, and all that kind of makes life hard, if you know what I mean. And certainly, that trick you played on Sharyll Atkisson wasn’t funny. Yup-I hear gang stalkers want to make you go broke fighting for your rights in courts that have deaf ears and blind eyes.
In all, Kaspersky has tied at least six distinct pieces of malware to Equation Group. They include:
EquationLaser: an early implant in use from 2001 to 2004.
DoubleFantasy: a validator-style trojan designed to confirm if the infected person is an intended target. People who are confirmed get upgraded to either EquationDrug or GrayFish.
EquationDrug: also known as Equestre, this is a complex attack platform that supports 35 different modules and 18 drivers. It is one of two Equation Group malware platforms to re-flash hard drive firmware and use virtual file systems to conceal malicious files and stolen data.
It was delivered only after a target had been infected with DoubleFantasy and confirmed to be a target. It was introduced in 2002 and was phased out in 2013 in favor of the more advanced GrayFish.
GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts. Whereas EquationDrug re-flashed hard drives for six models, GrayFish re-flashed 12 classes of hard drives. GrayFish exploits a vulnerability in the CloneCD driver ElbyCDIO.sys—and possibly drivers of other programs—to bypass Windows code-signing requirements.
GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.
“This allows it to control the launching of Windows at each stage,” Kaspersky’s written report explained. “In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly.”
Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.
TripleFantasy: A full-featured backdoor sometimes used in tandem with GrayFish.
Want to know the real reason the “deep state”(aka AIPAC sponsord organizations, racist sectarian political factions that hide behind NGO’s, and of course, every other American “law enforcement agency” is at war with Kaspersky? Read the full article!But I for one, am not scared of the Chinese, or the Russians taking over anything.
Hell, I will show them to your door;-)
Related Story: That time-just that ONE-where I was approached by someone from Vegas who knew about these hacks, and wrote to me here at ROGS.