How to report clandestine activity to intelligence services: start with “cellular data,”work your way to “evidence laundering.”

Modern terror cells masquerade as “see something say something” types, both online and off. The reality however is much darker than mere charades and cloaked purpose, as we see time and again that “gangs” of “stalkers” aka gang stalkers are ALL intelligence agency affiliated, operating in domestic spaces, targeting civilian populations.

So, who do you call when its the cop-callers and “informers” doing the dirt?

One of the primary concerns within the gang stalking dialectic is that law enforcement and other “responsible report taking outlets” mask the clandestine activity* of intelligence agencies operating on civilian populations. There are thousands of ways to report terror related activity, simply by searching “report terror/illegal activity” and filling in your favorite agency name after that term. The only problem though, is that gang stalking IS our own people doing it, to others of our own people, which is against the law of all western nations, and even the UN Human Rights Declaration.

Related Reading: Hiding the Ball– Lawfare reports on the international Five Eyes Surveillance State

This voyeurism based “hiding the ball” scheme is particularly rampant in the former democracies of the west, known today as the “Five Eyes,” “Nine Eyes,”or the “Fourteen Eyes” nations, and while some forms of it it take place in every developed country, never before has the world seen the international exploitation of entire communications networks on such a scale. This form of monitoring, and then, pursuing so-called legal channels of prosecution is known as “evidence laundering” and it looks like this below:

Evidence Laundering and Intelligence Agencies 101

The Five Eyes pundits yammer on about how “the communists” of Russia want to close off their internet to foreign voyeurism, and nations like “communist” China struggle with simple “fair play” in an era of rampant spying by “democratic” nations via international fiber optic cables, going so far to call this last gasp of western Jewish-christian nations the ” axis of white supremacy,” a claim that has merit, as we see echoed in the Fort Worth Weekly article about targeted individuals, people like Tiffany Fontenot, who peddle junk science and unscientific garbage like “reverse speech.*”

Tiffany Fontenot peddles the junk science of reverse speech. I listened to a recording she made and it said “I believe in reverse speech,” but when I played it backwards, is said “Herp derp I’maperp.” These crackpots hard right liars and frauds are who gang stalkers are.

Read More: Wired takes on the junk science of Hceeps Esrever, and here’s more about the “police science” of lie detection, another notoriously garbage pseudo science. All gang stalking is utilizes psychobabble, pseudo-science, bullying, and harassment by current and former police and their associates

These crackpots and pundits appear in force in that article to defend the practices of gang stalkers, including extra-judicial monitoring of human beings(read that article). All of this derives from police narratives, and all of it is based in pseudo-science, lies, and deceptions. Here is David Oates peddling his junk science, and here is crackpot Tiffany Fontenot peddling it too. This is important, because we also see her virulently attacking someone in the comments section of the article after her and her cyber-bullies refused to comment in that article.

The problem has been particularly highlighted since the western governments scrapped their constitutional protections in favor of totalitarian measures of a “capitalist surveillance state.”

Where once (some) people in democracies could (sort of) rely on civil liberties like free speech, due process and privacy protections–all of that was erased after 911. And what was put in its place was an intercontinental surveillance network that eradicated these protections for all citizens, backed by smear campaigns and harassment by these groups. And in turn, that put ordinary people in immediate and direct contact with intelligence agents and agencies who had weaponized the citizenry as little more than the mobs we read about in history books, but this time, armed with Fusion Centers and internet. The cat was out of the meme, and it was no longer just a joke on the internet-it was now a matter of the cat coming and crapping on your door.

Recently, I explored a few different “social engineering exploits” that were targeted at me by people in the USA and Britain, and I did some social engineering of my own, in order to prove my claims. Here is part of that here, where we see “linguistics”exploits, and social engineering exploits in action, as I gained a few (literally three followers) here at this blog, all of whom are intelligence community (IC )affiliated. I wont name them here yet, but you can look at my followers yourself.

Well, part of social exploits requires tracking and tracing gangs of stalkers, and one of the best ways to get them to reveal themselves is to start a free WordPress blog, where you talk about who they are, rather than blather on about “electronic weapons/aliens/flat earth!/LIZARD PEEPLE/ or PIZZAGATE!!!!

Having done that, many times, I have learned a few things:

-the Gemalto hack was an exploit whose ripple effect is still being felt today, unlike the “Nokia” chipset exploit( a UK/British operation).

-they all use the number 12 or 13 symbolically, for a variety of purposes, especially derived from Jewish and christian mysticism; but also these numbers are used in other pagan, neo-pagan and so-called Satanic practices too.And, it appears in military and police practices too, where we see teams of IC agents and other secretive groups organizing around this number.

-they are all Mi5/JTRIG/CIA/NSA/DoD/Mossad affiliated (in the west). Examples can be found here, by searching “number thirteen; 13,” etc.

-they ALL talk a hard right game online (see the flat earth/PIZZAGATE reference above)

-they all have contacts in the IC, and form networks of current and former spies, primarily working in clandestine domestic theater, disguising that activity as “counterintelligence and terrorism.”

-they all use masking software/IP spoofing/online repositories to gather intel against their targets. Exploits as simple as using comment forums to collect IP addresses, to more complicated exploits like the NSA hack of Gemalto chipsets, which I will cover below.

*see the CIA Glossary of Intelligence Agency Terms at this link for terminology explanations.

**I am currently mapping an undersea cable network that goes from certain Asian nations to South America (with a few curious stops in between) and for some strange reason, onward to Britain and Israel, via the NSA. Feel free to write, and vindicate yourselves,and your activity on those cables, lol. But ALL gang stalking dialogues, no matter how bizarre they seem are actually intel operatives and spies talking in what I call “dialectic para-language” to each other. The old school intel agency right wing version of that christian dialectic of “reverse speech,” is where we see christian superstition extrapolating that coincidence is in fact “Satan, talking backwards,” or some other “mind control” and influence operation.The entire western narrative depends from exactly these forms of ignorant gibberish.

Leave a Reply

Your email address will not be published.