News articles about organized gang stalking, lawsuits and “targeted individual programs” are gaining steam in the mainstream press, four years after I waged a one person public relations blitz against this form of “intelligence led predictive policing” which is really just junk science, and orthodox biased reporting combined with equally biased data.
Unlike the stories you will find using ROGS Analysis, main stream media is partisan, and biased, and always defaults to “official sources” in the narrative. Yet recently, even the USA Today covered “targeted individual programs,” and called them by their proper name, and even cited the movie “The Minority Report,” as many gang stalking targets have discussed online too. .
Unfortunately, the “official sources” in the gang stalking discourse are all police, forensic investigators, and pro-police psychologists who encouraged the racial profiling and rampant surveillance abuses of the last two decades. You can view these scurrilous persons here, most notoriously the internet famous “anonymous poll” created by Dr. Lorraine Sheridan, whose negligent commentary on that issue has unarguably led to homicides and suicides of targeted individuals.
The Pasco sheriff’s office, in its lengthier statement, said the program is modeled after one adopted in the United Kingdom in the 1990s and that the idea is not to target anyone for harassment.
“It is the goal of the Pasco Sheriff’s Office to have a positive impact on these individuals and our community,” the statement says.
The sheriff’s statement specifically mentions the 2002 film “Minority Report,” which starred Tom Cruise as chief of a “precrime” police bureau that arrests people before any crime is committed based on information provided by psychics.
The program, the sheriff’s office says in part, is not “in any way, shape or form the ideals or implementations projected in the film ‘Minority Report.'”
A central piece of that movie is the idea that some of the psychics disagree with the majority on whether a specific person will become a criminal.
Other jurisdictions have tackled similar issues. The Los Angeles Police Department, for example, last year scrapped for financial reasons a controversial program called “Pred-Pol” that sought to predict where property crimes would occur. Critics said it focused disproportionately on Black and Hispanic communities.
The Florida lawsuit contends the Pasco program violates constitutional amendments that protect rights of association and due process, and against unreasonable searches and seizures
So, when even the most pasty white piece of pabulum journalism on the planet earth–the USA Today— calls a targeted individual program a “targeted individual program,” you can bet that more is to come. Stay tuned.
Modern terror cells masquerade as “see something say something” types, both online and off. The reality however is much darker than mere charades and cloaked purpose, as we see time and again that “gangs” of “stalkers” aka gang stalkers are ALL intelligence agency affiliated, operating in domestic spaces, targeting civilian populations.
So, who do you call when its the cop-callers and “informers” doing the dirt?
One of the primary concerns within the gang stalking dialectic is that law enforcement and other “responsible report taking outlets” mask the clandestine activity* of intelligence agencies operating on civilian populations. There are thousands of ways to report terror related activity, simply by searching “report terror/illegal activity” and filling in your favorite agency name after that term. The only problem though, is that gang stalking IS our own people doing it, to others of our own people, which is against the law of all western nations, and even the UN Human Rights Declaration.
This voyeurism based “hiding the ball” scheme is particularly rampant in the former democracies of the west, known today as the “Five Eyes,” “Nine Eyes,”or the “Fourteen Eyes” nations, and while some forms of it it take place in every developed country, never before has the world seen the international exploitation of entire communications networks on such a scale. This form of monitoring, and then, pursuing so-called legal channels of prosecution is known as “evidence laundering” and it looks like this below:
The Five Eyes pundits yammer on about how “the communists” of Russia want to close off their internet to foreign voyeurism, and nations like “communist” China struggle with simple “fair play” in an era of rampant spying by “democratic” nations via international fiber optic cables, going so far to call this last gasp of western Jewish-christian nations the ” axis of white supremacy,” a claim that has merit, as we see echoed in the Fort Worth Weekly article about targeted individuals, people like Tiffany Fontenot, who peddle junk science and unscientific garbage like “reverse speech.*”
These crackpots and pundits appear in force in that article to defend the practices of gang stalkers, including extra-judicial monitoring of human beings(read that article). All of this derives from police narratives, and all of it is based in pseudo-science, lies, and deceptions. Here is David Oates peddling his junk science, and here is crackpot Tiffany Fontenot peddling it too. This is important, because we also see her virulently attacking someone in the comments section of the article after her and her cyber-bullies refused to comment in that article.
The problem has been particularly highlighted since the western governments scrapped their constitutional protections in favor of totalitarian measures of a “capitalist surveillance state.”
Where once (some) people in democracies could (sort of) rely on civil liberties like free speech, due process and privacy protections–all of that was erased after 911. And what was put in its place was an intercontinental surveillance network that eradicated these protections for all citizens, backed by smear campaigns and harassment by these groups. And in turn, that put ordinary people in immediate and direct contact with intelligence agents and agencies who had weaponized the citizenry as little more than the mobs we read about in history books, but this time, armed with Fusion Centers and internet. The cat was out of the meme, and it was no longer just a joke on the internet-it was now a matter of the cat coming and crapping on your door.
Recently, I explored a few different “social engineering exploits” that were targeted at me by people in the USA and Britain, and I did some social engineering of my own, in order to prove my claims. Here is part of that here, where we see “linguistics”exploits, and social engineering exploits in action, as I gained a few (literally three followers) here at this blog, all of whom are intelligence community (IC )affiliated. I wont name them here yet, but you can look at my followers yourself.
Well, part of social exploits requires tracking and tracing gangs of stalkers, and one of the best ways to get them to reveal themselves is to start a free WordPress blog, where you talk about who they are, rather than blather on about “electronic weapons/aliens/flat earth!/LIZARD PEEPLE/ or PIZZAGATE!!!!“
Having done that, many times, I have learned a few things:
-the Gemalto hack was an exploit whose ripple effect is still being felt today, unlike the “Nokia” chipset exploit( a UK/British operation).
-they all use the number 12 or 13 symbolically, for a variety of purposes, especially derived from Jewish and christian mysticism; but also these numbers are used in other pagan, neo-pagan and so-called Satanic practices too.And, it appears in military and police practices too, where we see teams of IC agents and other secretive groups organizing around this number.
-they are all Mi5/JTRIG/CIA/NSA/DoD/Mossad affiliated (in the west). Examples can be found here, by searching “number thirteen; 13,” etc.
-they ALL talk a hard right game online (see the flat earth/PIZZAGATE reference above)
-they all have contacts in the IC, and form networks of current and former spies, primarily working in clandestine domestic theater, disguising that activity as “counterintelligence and terrorism.”
-they all use masking software/IP spoofing/online repositories to gather intel against their targets. Exploits as simple as using comment forums to collect IP addresses, to more complicated exploits like the NSA hack of Gemalto chipsets, which I will cover below.
*see the CIA Glossary of Intelligence Agency Terms at this link for terminology explanations.
**I am currently mapping an undersea cable network that goes from certain Asian nations to South America (with a few curious stops in between) and for some strange reason, onward to Britain and Israel, via the NSA. Feel free to write, and vindicate yourselves,and your activity on those cables, lol. But ALL gang stalking dialogues, no matter how bizarre they seem are actually intel operatives and spies talking in what I call “dialectic para-language” to each other. The old school intel agency right wing version of that christian dialectic of “reverse speech,” is where we see christian superstition extrapolating that coincidence is in fact “Satan, talking backwards,” or some other “mind control” and influence operation.The entire western narrative depends from exactly these forms of ignorant gibberish.