Gang Stalking Lawsuits: Richard Moore is suing Union County, Mississippi sheriffs department and a few associated gang stalking cowards named Blake Smith, Keith Roberts, and Jimmy Edwards.

I am following the case of a man in Mississippi who has been gang stalked by the usual suspects in policing, and its tentacles in the community.

Via Justia, filed in the Northern District of Mississippi, comes now Richard Moore, suing a few “gang stalkers.”

Moore v. Edwards et al

Plaintiff:Richard Moore
Defendant:Blake Smith, Keith Roberts, Union County Sheriff’s Department and Jimmy Edwards
Case Number:3:2021cv00080

Richard Moore has been stalked and harassed by people who think they are above the law. And as we see in these cases, often they are “the law,” at least in their own minds. But the reality is that they are criminals, doing criminal things, and their is no one to “police” the police.

As we see in nearly every case of gang stalking, these gangs are comprised of nearly 100% current and former police, firefighters, investigators and others who cover over each others stalking and harassment crimes; and none of them believe in the rights enshrined in the US constitution, or the rule of law.

The cases of Rick and Cindy Krlich, which details “Small Town Terrorism,” and the case of the eBay “cockroach cult” currently being prosecuted by the Department of Justice, the case of the cold blooded murder of Ahmaud Arbery, and most recently the case of the Pasco County Sheriff targeting children are all examples of gang stalking lawsuits (more on the latter here, and here, where one of that departments k-9 officers is suing too.).

For many decades, an under current of conversations regarding western social structure discussed “police gangs” in somewhat hesitant manner for the obvious reason that critics of law enforcement become targets themselves. This threat FROM law enforcement is very real, and claims actual victims, including homicides.

Here below is one example of how actual police actually threatened people, after an actual gang of now-indicted police “gang members” murdered two people in cold blood after lying on a no-knock warrant, and planting evidence-an unimaginably anti-democratic practice:

Joe Gamaldi, he president of the Houston Police Officers’ Union said:

We are sick and tired of having targets on our back,” Gamaldi said. “We are sick and tired of having dirtbags trying to take our lives when all we’re trying to do is protect this community and protect our families.”

Gamaldi said while we live in the greatest city in the world, there are some who are fostering resentment against police in Houston.

“Enough is enough. If you’re the ones out there spreading the rhetoric that police officers are the enemy, well just know we’ve all got your number now,” Gamaldi said. “We’re going to be keeping track on all of y’all, and we’re going to make sure to hold you accountable every time you stir the pot on our police officers.”

Police as targets? Since when? Since never. And as we see in the case above, Gamaldi was not just protecting “the narrative” by threatening anyone who looked deeper into it, but also, protecting an actual gang of actual criminals whose charges include two murders, lying to the authorities with malice, theft, drug possession, clock milking, and other typical criminal behaviors.

Keep in mind that this was an actual threat, and it was indeed directed at me, and others who write about these issues. My old blog was hacked and de-platformed shortly after I named these people online. And I even traced the hack to Texas. So what we have is a bunch of actual indicted criminals covered for by other criminals who issue threats, no different than any other organized mafia. How did we get here?

It started with scapegoats, and the ever present threat narrative promulgated by these exact same people, as we see in the example above. It’s unthinkable that police should be threatening people, but threaten they do. So the threat is very real.

But since the egregious abuses of the War on Drugs brought us scapegoats, and then, the War on Terror brought actual CIA designed and funded programs into our every day lives, laundered through many various state and federal agencies, these conversations have become louder, angrier, and more informed.

For example, mainstream media has covered various privacy invading CIA domestic projects ranging from Automated License Plate Readers (ALPRs) which track people across cities and states, to the more well known examples of Fusion Centers monitoring people’s home computers, and collecting dossiers of our activities.

None of it is within the scope of democratic practices, and all of it is completely in line with totalitarianism as discussed in our most basic school textbooks. Indeed, America and the west in general have become the exact bogeyman they feared from Russia, or China, or any banana republic ever.

Related Reading: As the USA disintegrates into a banana republic police state that we see above, China is set to lead the economic recovery of Asia, and the Pacific Rim region

Richard Moore is a so-called sex offender, and last time I checked, he is on the sex offender registry. Indeed he himself has written about it quite openly. His case is one of those deals where a guy gets caught up in one of the many entrapment schemes run by police.

These schemes are disguised under “investigation privileged” tactics and methods, and include all kinds of illegal activity BY the police and investigative agencies that it shocks the conscience of ordinary people once exposed. This includes what are colloquially called “frame jobs” and unethical practices that range from undocumented wiretaps of peoples homes and computers, to . Here below are just a few:

-Muslims are targeted with pop-up advertisements cajoling them to join jihadist movements. I myself have observed these in the presence of Muslim friends and allies.

-suspected “white supremacists” are targeted with “speech baiting”by the Anti Defamation League and other race-based groups who monitor social media and the internet

-sex offenders are targeted in so many types of bizarrely crafted schemes as to defy the imagination. Here’s more about that from the Florida Action Committee

-people who seek to buy marijuana pipes or seeds online are targeted with enticements to buy heroin, cocaine, and other drugs

Beyond the insanity of these registries, which is well documented, we find that they perpetuate the most hypocritical and worst examples of Jewish0christian culture, specifically the practice of “scapegoating,” which you can read about here

I encountered Mr. Moore’s case in this article from the Fort Worth Weekly, where a journalist explored “gangs” of “stalkers” and nearly 100% of those stalkers were and are current and former police, investigators, county coroners, and others associated with the massive US policing and privatized prison industries. Indeed, if you dig deep enough, you will find real cases of gang stalking.

But perhaps most strikingly is that the author, Teri Webster, who also writes for the Dallas Morning News, had asked to interview a notorious (and well funded) group called “Targeted Justice” who claim to “help” actual targeted individuals, but who are in fact, actual stalkers. They refused to be interviewed, but then, showed up in the article claiming otherwise. This is fairly typical for these groups, because in media terminology, they are called a “misinformation” and “disinfrmation” operation–a cover for this illegal police activity.

The leader of the group in that area is one Richard Lighthouse, and these people are well known frauds, all of them with one form or another of military and spy agency credentials.The entire operation is designed to discredit targets, and spread bad information, such as “electronic brain zappers! !mind reading locusts!! and aliens!! and GHOSTS!!! and talking to the dead!!!,” etc.

But its not as often that either of the following things happen:

-an actual main stream media outlet discusses gang stalking, and

-an actual psychobabbling moron appears in the comments section rambling about debunked pseudo science from the 1980’s era CIA “Satanic Panic” catalogue

I advise any journalist, researcher, or psychologist to read that story, to better understand gang stalking, and especially to note how disinformation is spread. In this case, we see one “Tifffany Fontenot” actually attempting to discredit Mr. Moore, and in doing so, clearly attempts what is colloquially called “mind control,” by inserting psychobabble straight out of the CIA. Note in the following exchange that she has reversed the idea that victims are in fact perpetrators–a staple ploy in their dialectic bag of tricks:

Here is her attempt:

There is a particular man in your article who literally appears to be a perp. Moore is a registered sex offender complete with tattooed tear drop coming out of his eye. How did you find that guy? He ran a smear campaign on a leading member in the TI community using very common perping tactics such as name calling (one thing he called her was a whore among many others) and claiming others were doing to him what he, himself was actually perpetrating, and yet that same guy showed up in your article? Interesting coincidence isn’t it? There are many people claiming to be TI’s who actually are not in order to attempt to keep this global torture and trafficking network from being discovered by the public. They attack TI’s and try to make TI’s look delusional in order to keep the torture/trafficking network going.

Teri, Did you get benefit for writing this article in any way from the defense or law enforcement, or medical industry, or through anyone at FWW in ANY way via an EMF targeting business making money off of people you are doing a hit piece on? I’m just wondering because these smear pieces are a regular occurrence against TI’s being used as medical guinea pigs in the Global Ai Arms Race to weaponize the brain nonconsensually and being slowly slaughtered unto their deaths.

In this example, we see many things at play that to an ordinary observer just looks like another rabbit hole full of strangely shaped bunnies, but to the keen observer we see that Ms. Fontenot’s entire dialectic is hard right, religion based, full of actual and provable lies, and more, including that she has indeed targeted someone online, and likely offline too. She is a proponent of “reverse speech analysis,” which was concieved as a way for hard-right religious nuts to analyze rock and roll music to find hidden messages, a sort of offshoot of other junk science that seeks to find “the devil” or the Virgin Mary in slices of toast, and tree bark. Here’s more about that total time waster, from her (time wasting) website.

These groups are massive, well funded, and dangerous, with actual homicides to their credit. Its is time we do indeed “target targeted individuals,” but this time by first identifying their actual victims, and then, suing those responsible, because the threat they pose is very real.

Pernicious and toxic: FVEYs-Israeli spying, Mossadi Jihadi’s, and Negev-billies. Gang Stalking is really “counterintelligence,” operations, with religious fanatics at the helm

In gang stalking dialogues, one frequently is cast into the Jewish-christian “horseshoe of semi-circularity.”

It is a dialogue that seeks to force the issue of religion upon those who opt out of such a bizarre and mystical dlaectic. I mean–who cares what some fucking rabbi said two thousand years ago? And who cares if the mystical and mythical Jesus was or wasn’t real?

Horseshoe Theory

Horseshoe Theory

In political science and popular discourse, the horseshoe theory asserts that the far-left and the far-right, rather than being at opposite and opposing ends of a linear political continuum, closely resemble one another, analogous to the way that the opposite ends of a horseshoe are close together.

Sadly, lots of (crazy) people do “go nuts” over the Jesus and his Jewish stalkers–so many in fact that it is the very root of western civilization for over two thousand years, having stealthily coopted Pagan religions, Greek and Roman Pantheons, and many many other tribal belief systems.

And as we see in the Jesus fable, he was gang stalked too, by rabid Jewish scribes and Pharisees who didn’t like the words he said because it didn’t fit their somewhat incestuous, nepotistic and wholly tribal narrative. That incest and nepotism was then embroiled in a colonial Roman conquest, and the Jesus mythology sprang from that time, and much as we see how christian cultures are exploiting the narrative of prostitution-v- poverty and immigration today, or how the conflict created “manufactured terrorists” who were a threat to official narratives, we saw similar issues then.

So it goes then, that The Jesus was tossed around like a three cornered ping pong ball between mystical religious forces, Jews and Romans until they lynched him. I mean–if its possible to lynch a guy who maybe didn’t even exist in some interpretations, or as we see in others, was arguably not who modern people say he was..

The same is true in cases of gang stalking, as western intelligence agencies target speakers online, and toss that “information” around between them, targeting speakers. This is what gang stalking is.

Related Story: Mossadi Jihadi’s mask their hatred for others in dialogues about “counterterrorism” and then they mercilessly stalk, cyber stalk, and harass their targets. The case of the Pensacola shooter.

So, occasionally, I engage with those who “hate the Jews”–some of them with good reason, it turns out– and try to shine a light on how it isn’t just fanatical Jews doing this stuff, that in fact it is organized religions banded together in this lunacy.

Here is part of a recent response I gave to someone who has found what I have found: that Mossad operations run around the world have a human toll, and that this is what western narrative, and narrative control is (and as registered in my statistics, via my new reader from a tech company along the Hong Kong undersea cable).

My correspondent generally thinks that the Jews are “behind it all,” forgetting how both Jews and christians have constructed a careful narrative of self-preservational gibberish in order to continue bombing babies in the name of religion and the “prince of peace”(lol)/patriarchal religion/ Jewish nepotism/greed. I had questioned why they blame onluy Jews in that conflagration of a construct, they replied to my question, and I answered thus:

Interesting. Do you have evidence that the Mossad has actually affected/stalked/harassed you? I would be interested in it if it is solid evidence.

It is quite well known that they have ongoing operations in the US, targeting those of us who are critics of Israeli apartheid, Jewish racism, or friendly to Palestine; or who disagree with the AIPAC mafia. Civil rights lawyer Stanley Cohen, also a Jew, is himself a target of both FBI and Mossadi jihadists.

In my case, I was harassed by a former USAF liaison to the Mossad, and I documented it with screen captures, and other methods like SOCMINT and OSINT. That revealed that her work in the USAF in the 1960’s was MKULTRA era stuff, and even her Twitter bio brags that she belongs to a gang of “13 members.”

In one communique, she tried to tell me that I am a mass murderer (classic PSYOP b.s.) and in another, she was rambling on about how she “isn’t afraid to engage” with a man in combat. She reminds me of the rabid Rita Katz, who pops up after almost all of the mass shootings, and who herself is a well known cyber stalker disguised as a “counter-intelligence” firm.

So I am empathetic to the idea, but I would like to see proof if you have it. Is there a link here at your blog?

And. I agree that Mossadi jihadi’s are every bit as toxic as any other terrorists. I have frequently been attacked by the hasbara and Negev-billy Squad 8200 online, so its definitely a worthy topic.

AS for Protestants, etc., yeah, watching organized religions battle each other through the centuries is hilarious, like watching Tom and Jerry. It seems the cat changes into a mouse every few centuries, and vice versa.

But there are plenty of secular Jews out there who aren’t clinical sociopaths or genetic psychopaths (it seems inbreeding, which is common in the orthodox tribes can lead to such conditions). Maybe find them and make a few friends or something.

How to report clandestine activity to intelligence services: start with “cellular data,”work your way to “evidence laundering.”

Modern terror cells masquerade as “see something say something” types, both online and off. The reality however is much darker than mere charades and cloaked purpose, as we see time and again that “gangs” of “stalkers” aka gang stalkers are ALL intelligence agency affiliated, operating in domestic spaces, targeting civilian populations.

So, who do you call when its the cop-callers and “informers” doing the dirt?

One of the primary concerns within the gang stalking dialectic is that law enforcement and other “responsible report taking outlets” mask the clandestine activity* of intelligence agencies operating on civilian populations. There are thousands of ways to report terror related activity, simply by searching “report terror/illegal activity” and filling in your favorite agency name after that term. The only problem though, is that gang stalking IS our own people doing it, to others of our own people, which is against the law of all western nations, and even the UN Human Rights Declaration.

Related Reading: Hiding the Ball– Lawfare reports on the international Five Eyes Surveillance State

This voyeurism based “hiding the ball” scheme is particularly rampant in the former democracies of the west, known today as the “Five Eyes,” “Nine Eyes,”or the “Fourteen Eyes” nations, and while some forms of it it take place in every developed country, never before has the world seen the international exploitation of entire communications networks on such a scale. This form of monitoring, and then, pursuing so-called legal channels of prosecution is known as “evidence laundering” and it looks like this below:

Evidence Laundering and Intelligence Agencies 101

The Five Eyes pundits yammer on about how “the communists” of Russia want to close off their internet to foreign voyeurism, and nations like “communist” China struggle with simple “fair play” in an era of rampant spying by “democratic” nations via international fiber optic cables, going so far to call this last gasp of western Jewish-christian nations the ” axis of white supremacy,” a claim that has merit, as we see echoed in the Fort Worth Weekly article about targeted individuals, people like Tiffany Fontenot, who peddle junk science and unscientific garbage like “reverse speech.*”

Tiffany Fontenot peddles the junk science of reverse speech. I listened to a recording she made and it said “I believe in reverse speech,” but when I played it backwards, is said “Herp derp I’maperp.” These crackpots hard right liars and frauds are who gang stalkers are.

Read More: Wired takes on the junk science of Hceeps Esrever, and here’s more about the “police science” of lie detection, another notoriously garbage pseudo science. All gang stalking is utilizes psychobabble, pseudo-science, bullying, and harassment by current and former police and their associates

These crackpots and pundits appear in force in that article to defend the practices of gang stalkers, including extra-judicial monitoring of human beings(read that article). All of this derives from police narratives, and all of it is based in pseudo-science, lies, and deceptions. Here is David Oates peddling his junk science, and here is crackpot Tiffany Fontenot peddling it too. This is important, because we also see her virulently attacking someone in the comments section of the article after her and her cyber-bullies refused to comment in that article.

The problem has been particularly highlighted since the western governments scrapped their constitutional protections in favor of totalitarian measures of a “capitalist surveillance state.”

Where once (some) people in democracies could (sort of) rely on civil liberties like free speech, due process and privacy protections–all of that was erased after 911. And what was put in its place was an intercontinental surveillance network that eradicated these protections for all citizens, backed by smear campaigns and harassment by these groups. And in turn, that put ordinary people in immediate and direct contact with intelligence agents and agencies who had weaponized the citizenry as little more than the mobs we read about in history books, but this time, armed with Fusion Centers and internet. The cat was out of the meme, and it was no longer just a joke on the internet-it was now a matter of the cat coming and crapping on your door.

Recently, I explored a few different “social engineering exploits” that were targeted at me by people in the USA and Britain, and I did some social engineering of my own, in order to prove my claims. Here is part of that here, where we see “linguistics”exploits, and social engineering exploits in action, as I gained a few (literally three followers) here at this blog, all of whom are intelligence community (IC )affiliated. I wont name them here yet, but you can look at my followers yourself.

Well, part of social exploits requires tracking and tracing gangs of stalkers, and one of the best ways to get them to reveal themselves is to start a free WordPress blog, where you talk about who they are, rather than blather on about “electronic weapons/aliens/flat earth!/LIZARD PEEPLE/ or PIZZAGATE!!!!

Having done that, many times, I have learned a few things:

-the Gemalto hack was an exploit whose ripple effect is still being felt today, unlike the “Nokia” chipset exploit( a UK/British operation).

-they all use the number 12 or 13 symbolically, for a variety of purposes, especially derived from Jewish and christian mysticism; but also these numbers are used in other pagan, neo-pagan and so-called Satanic practices too.And, it appears in military and police practices too, where we see teams of IC agents and other secretive groups organizing around this number.

-they are all Mi5/JTRIG/CIA/NSA/DoD/Mossad affiliated (in the west). Examples can be found here, by searching “number thirteen; 13,” etc.

-they ALL talk a hard right game online (see the flat earth/PIZZAGATE reference above)

-they all have contacts in the IC, and form networks of current and former spies, primarily working in clandestine domestic theater, disguising that activity as “counterintelligence and terrorism.”

-they all use masking software/IP spoofing/online repositories to gather intel against their targets. Exploits as simple as using comment forums to collect IP addresses, to more complicated exploits like the NSA hack of Gemalto chipsets, which I will cover below.

*see the CIA Glossary of Intelligence Agency Terms at this link for terminology explanations.

**I am currently mapping an undersea cable network that goes from certain Asian nations to South America (with a few curious stops in between) and for some strange reason, onward to Britain and Israel, via the NSA. Feel free to write, and vindicate yourselves,and your activity on those cables, lol. But ALL gang stalking dialogues, no matter how bizarre they seem are actually intel operatives and spies talking in what I call “dialectic para-language” to each other. The old school intel agency right wing version of that christian dialectic of “reverse speech,” is where we see christian superstition extrapolating that coincidence is in fact “Satan, talking backwards,” or some other “mind control” and influence operation.The entire western narrative depends from exactly these forms of ignorant gibberish.

What is “alien abduction” in the gang stalking dialectic? Start with Counterintelligence terminology, in re: “abduction”

When Targeted Individuals tell me: ” I have been abducted by aliens!” I say, “Read this!” Then, I watch them squirm, like rodents in a trap.

Abduction in counterintelligence jargon, and terminology:

CI Glossary — Terms & Definitions of Interest for DoD CI Professionals (2 May 2011) GL – 2

Abduction. [One of the four basic types of reasoning applied to intelligence analysis,] it is the process of generating a novel hypothesis to explain given evidence that does not readily suggest a familiar explanation. (DIA, Intelligence Essentials for Everyone, June 1999) Also see deduction; induction; scientific method. For additional information see Knowledge Management in the Intelligence Enterprise by Edward Waltz (2003) and Critical Thinking and Intelligence Analysis by David T. Moore, JMIC Press (2006).

Counterintelligence Terminology, below:

https://fas.org/irp/eprint/ci-glossary.pdf