I. NSA spying, intelligence cults, and “meta-organized” stalking
May 8, 2017 ~ researchorganizedgangstalking
At this point in time, we can safely say that most complaints of gang stalking involve contact at man y levels with the vast, unnaccountable, and hidden surveillance apparatus that we now know as ” the end of Constitutional Democracy” in the west.
Using multitudinous, alphabeticus intelligence agencies, and police forces across the globe, and across America, the rights and freedoms that citizens thought were guaranteed have been torn from the roots of democracy, and poisons applied to that which is left.
In America alone, the NSA theft of our data has now resulted in that data being turned over to 17 spy agencies, to do with it what they will. And as the past is the best predictor of the future, that means that the numbers of “targeted individuals” will increase exponentially and build critical mass so that many of those who claim to have been targeted in the past will now have company from many others- perhaps your own son, daughter, or significant other.
And, maybe at that point, you will remember that you were quite content to watch and do nothing as others appeared ‘crazy’ and you did nothing. And, maybe then, you too will join me in bringing awareness to this topic. Because- “first they came for the [ ________ ]and I said nothing….”
Related story: gang stalking and “electronic implants”: How the NSA, Israeli spooks, and other agencies use the words electronic “implants,”when speaking of hacking through air-gapped systems,such as the case of the Iranian nuclear program, from Ars Technica
Because, of course, all of our unfiltered, whole capture raw and unfiltered data was shared with Israel first, for the last deacdes– and of course, they would NEVER do anything bad with it, cuz, Holocaust! And zionist/dominionist religious fanatics are our friends- right? Who could possibly know more about building a better mouse trap?
Strange equivocation, that.
Law & Disorder —
NSA to share data with other agencies without “minimizing” American information
Rules opposed by civil liberties and privacy advocates.
Megan Geuss – 1/12/2017, 4:30 PM
Image: Ulrich Baumgarten / Getty Images News
On Thursday The New York Times reported that the Obama administration had recently finalized rules to give the National Security Agency (NSA) more leeway in sharing its vast trove of intercepted communications with the 15 other government agencies that make up the Intelligence Community.
Obama administration closing in on rules to let NSA share more freely with FBI, CIA
Previously, agencies like the Drug Enforcement Agency and the Federal Bureau of Investigation would have to request information on a target from the NSA. The NSA, in turn, would retrieve communications pertaining to that target and scrub the documents of information that was considered irrelevant to the search, including the names of innocent Americans—a process called “minimization.” Now, that middle step has been cut out. The agencies need only get approval from the NSA to access its data, and agents from the agencies are expected to carry out minimization on their own.As The New York Times puts it, “Essentially, the government is reducing the risk that the NSA will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will see private information about innocent people.” Although the agency analysts who will have access to the NSA’s surveillance powers are directed to ignore and redact information pertaining to innocent Americans, if they see evidence of criminal acts in the data they access, they are directed to hand it over to the Justice Department.
II. The CIA hack and cell phone surveillance: gang stalking and cell phones
March 9, 2017 ~ researchorganizedgangstalking
Targeted individuals often claim that their cell phones are being used as tracking devices, and that intelligence agencies are using them for target practice and experimentation. Now, we know that part of that is true: A disgruntled CIA contractor is alleged to have dumped a list of all the tools that the CIA has been using to spy on us via our cell phones for the last decades. But don’t just point the finger at the CIA, because then, you WILL sound crazy, and Dr.’s Sheridan and James might get a whack at your mind, mind mind!
UPDATE: This post is becoming one of the most popular on this blog. While I experienced “cell phone mirroring” as early as 2010, and “offline computer situation rooms” as early as 2001, you may have just discovered this vast plot against constitutional liberty. Read on, and use my ‘search this blog’ section to find posts relevant to your own OGS.
Then, in a side note, be aware that the US agencies have long farmed out all of their intelligence collection to private contractors, Israeli’s and the Five Eyes Alliance, so any given abuse of your phone could be by : any of 17 US agencies, or any of Britains eight agencies, and many more, not counting the douchebags who work in private security firms, and even local police agencies-and ALL OF IT without a warrant, or even a paper trail.
And the fact is that ALL 17 intelligence agencies in the United States have turned on American citizens, using us for target practice of varying shades of “illegal and unconstitutional” so, they have lot’s of Company (there’s a joke in there, somewhere, about Corporations. Wait-oh never mind.). Your country is also doing these same things to you and your countrymen.
UPDATE: This is one of my most popular posts. So I thought I would add a link for software tat you can buy to do some of the same stuff to these agents and agencies that they are doing to you. Here’s Spyera mirroring and more for cell phones, but there are many others you can use, many freeware (but be careful-most freeware comes with the hidden cost that it was created by-you guessed it….)
You see, these days, electronic tools and toys, entrapments and entrainments of electronic surveillance and propaganda tactics that were once directed at millionaires and mobsters, third world dictators and Iran Contra’s and Osama bin Laden are now directed at ordinary common people who buy houses next to the fire chief, or who seek to trim the budget; or smoke a joint here and there, or who forgot to pay their vehicle tax. This is partially due to the fact that all of the agencies are crawling with corruption, and blackmailing each other, in the Spirit of the LEIU’s, who, bar none, perform more black bag jobs around America than any CIA agent ever did.
Related Story: Watch this video to see how some of us knew in 2005-2008 that our phones were being used as tracking devices. And, that some would repeat our conversations back to us. Watch it from 4:27 minutes. Disruption campaigns that target activists and others take on purely diabolical and bizarre proportions within six degree’s of a persons relations. The newscaster notes that the FBI use cell phones to “keep tabs on critical conversations between known members of the mafia.”
(psssst: Don’t tell anyone, but this story here about how retired LEO’s work with current LEO’s and intel gencies to perform assasinations and black bag jobs is one of America’s best kept seekrits)
And many wonder how it is that they could write something online, and then, shortly thereafter, have a squad car pull up outside their house.
This is enabled by the highly integrated, un-constitutional mechanism of OGS and the tracking in real time of targeted communications of targeted individuals, and coordinated with massive database abuse and fraud on the courts at the local, national, and international level.
Any researcher of OGS can verify that at least, it is true, that indeed 17 intelligence agencies ARE following targets, and doing many other nefarious things as well. Here, below, from the Intercept, is the case of the CIA software that mirrors your cell phone, and uses it to perform MIM attacks on YOURSELF; and here is a full list of the tools that these agencies use to target journalists, whistle blowers, the neighborhood crank, wankers, dole dippers and a few potheads the same as if they are all terrorists, with download links from Wikileaks). But be careful….honeynets and limited hang outs go two ways.
CIA Has an “Impressive List” of Ways to Hack Into Your Smartphone, WikiLeaks Files Indicate
March 7 2017, 12:29 p.m.
A concerted effort by the CIA produced a library of software attacks to crack into Android smartphones and Apple iPhones, including some that could take full control of the devices, according to documents in a trove of files released by WikiLeaks Tuesday.
The attacks allow for varying levels of access — many powerful enough to allow the attacker to remotely take over the “kernel,” the heart of the operating system that controls the operation of the phone, or at least to have so-called “root” access, meaning extensive control over files and software processes on a device. These types of techniques would give access to information like geolocation, communications, contacts, and more. They would most likely be useful for targeted hacking, rather than mass surveillance. Indeed, one document describes a process by which a specific unit within the CIA “develops software exploits and implants for high priority target cellphones for intelligence collection.”
The WikiLeaks documents also include detailed charts concerning specific attacks the CIA can apparently perform on different types of cellphones and operating systems, including recent versions of iOS and Android — in addition to attacks the CIA has borrowed from other, public sources of malware. Some of the exploits, in addition to those purportedly developed by the CIA, were discovered and released by cybersecurity companies, hacker groups, and independent researchers, and purchased, downloaded, or otherwise acquired by the CIA, in some cases through other members of the intelligence community, including the FBI, NSA, and the NSA’s British counterpart GCHQ , the documents indicate.
One borrowed attack, Shamoon, is a notorious computer virus capable of stealing data and then completely destroying hardware. Persistence, a tool found by the CIA, allows the agency control over the device whenever it boots up again. Another acquired attack, SwampMonkey, allows CIA to get root privileges on undisclosed Android devices.
“This is a very impressive list,” tweeted former GCHQ analyst Matt Tait, noting that at least some of the attacks appeared to still be viable.
Matt Green, cryptographer at Johns Hopkins University, agreed the leak was “impressive,” but concluded there weren’t many “technically surprising” hacks. This lack of originality may have stemmed from a desire on the part of the agency to avoid detection, judging from one document contained in the trove, in which apparent CIA personnel discuss an NSA hacking toolkit known as Equation Group and its public exposure. It was also previously known that the CIA was targeting smartphones; drawing on top-secret documents, The Intercept in 2015 reported on an agency campaign to crack into the iPhone and other Apple products.
In addition to the CIA’s efforts, an FBI hacking division, the Remote Operations Unit, has also been working to discover exploits in iPhones, one of the WikiLeaks documents, the iOS hacking chart, indicates. Last February, while investigating the perpetrator of a mass shooting in San Bernardino, the FBI attempted argued in court that Apple was obligated to give the FBI access to its phones by producing a weakened version of the device’s operating system. If the WikiLeaks documents are authentic, it would appear FBI and other elements of the intelligence community are already deeply involved in discovering their own way into iPhones. The compromise of the documents also calls into question government assurances in the San Bernardino case that any exploit developed by Apple to allow the FBI access to the killer’s phone would never be exposed to criminals or nation states….