Saturday, February 27, 2021

Counter Intelligence Against Political Dissidents

For some previous articles on this topic, see here. Also, see this post for some counter-intelligence techniques. To learn about the technology they use, see here and here. See here for how to discredit someone with Hi-Technology.
=============================================================================

FBI Director J. Edgar Hoover issued directives on COINTELPRO, ordering FBI agents to “expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate” the activities of these movements and especially their leaders. Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan.

Their tactics against the very people whose tax contributions pay their salary included anonymous phone calls, IRS audits, and the creation of documents that would divide their target’s families.

Targeted Individuals are harassed for months or years before they realize that they are being targeted by an organized Life-Torture Program.

Many innocent people are targeted for these harassment programs.  Their friends, family, and the community at large, through massive media control, are used to monitor, prosecute, and harass them. In the former Jewish controlled USSR these programs accused innocent people of being an  “enemy of the state,” or “mentally unfit,” and many were institutionalized or murdered using this form of governmental systematic control.

According to attorney Brian Glick in his book War at Home, the FBI used four main methods during COINTELPRO:

(1) Infiltration: Agents and informers did not merely spy on selected targets. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters of the target through lies and false accusations. The FBI and police exploited this fear to smear genuinely good people as agents, accusing their victims of doing what the FBI itself was doing;

(2) Psychological warfare: The FBI and police used myriad “dirty tricks” to undermine people who they opposed. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad-jacketing to create suspicion about targets, sometimes with lethal consequences;  They sent people to marry into and befriend the families of their perceived enemies, also usually with lethal consequences.

(3) Harassment via the legal system: The FBI and police abused the legal system to harass regular people and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, “investigative” interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters;

(4) Illegal force: The FBI conspired with local police departments to threaten dissidents; to conduct illegal break-ins in order to search dissident homes; and to commit vandalism, assaults, beatings and assassinations. The object was to frighten or eliminate dissidents and disrupt their movements.

The Final Report of the Select Frank Church Committee blasted with the behavior of the intelligence community in its domestic operations (including COINTELPRO) in no uncertain terms:

“The Committee finds that the domestic activities of the intelligence community at times violated specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal questions involved in intelligence programs were often not considered. On other occasions, they were intentionally disregarded in the belief that because the programs served the “national security” the law did not apply. While intelligence officers on occasion failed to disclose to their superiors programs which were illegal or of questionable legality, the Committee finds that the most serious breaches of duty were those of senior officials, who were responsible for controlling intelligence activities and generally failed to assure compliance with the law. Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that – the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence.”

In counter-intelligence organized-stalking programs, civilian spies are recruited from every segment of society, and everyone in the “targets” life is made a part of this ongoing, continuous, and systematic form of control and harassment, with such actions that are specifically designed to control the target and to “keep them in line,” like a Pavlovian Dog.

Despite the fact that these actions are designed to mentally, physically, emotionally, spiritually, financially, socially, and psychologically destroy the target over years, to make them appear to be crazy, and leave them with no form of support, whatsoever, in actual practice something very different happens.

I’ve observed that these malicious operatives end up becoming mentally, physically, emotionally, spiritually, financially, socially, and psychologically destroyed themselves over the years,  while their targets, such as myself, manage to adapt their lives in very creative ways.  Those who end up appearing to be crazy, and with no form of support, whatsoever, are the ones doing the torturing.

For the state, this appears to be a way to keep their targets in line, control them, or ultimately destroy them.  Instead, we’ll be seeing the state itself destroyed along with every person who depends on it for cash and status even while they work to destroy the very source of that cash and status, the productive tax-payers whose dependence on their pirate system diminishes as a result of the harassment.

This systematic form of control is funded at every level of government, every agency is involved in it.  All of them. Targets can be chosen for many reasons, but mainly they are targeted for political reasons.  People who don’t cooperate with the rape and pillage of our nation will find themselves labeled as:

(1) whistle-blowers;
(2) political dissident;
(3) one who asserts rights at work;
(4) one who has personally displeased members of the elites in our society;
(5) one who is too outspoken;
(6) one who is an investigator ;
(7) a signer of a petition;
(8) a writer of letters;
(9) one who is reported as  “suspicious” by a civilian spy/snitch
(10) one with a family history that displeases those in power

The goal of the state-sanctioned intelligence agency organized-stalking and domestic torture program is to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalized, or forced suicide. Other goals of this harassment are to destroy the target's reputation and credibility, and to make the target look “crazy” or unstable.

The process often involves sensitizing the target to every day negative and even horrific “stimuli” as a form of control, which is used to control targets when they “get out of line.”  Targets of this relentless and merciless harassment become vulnerable and destitute, and often become homeless, jobless, have a breakdown, are driven to suicide, similar to targets of the banned COINTELPRO. The government eliminates perceived “enemies of the state” in this manner.

Every time the target moves, the same defamation, lies, libel, and slander will be spread, and the systematic harassment will continue. Online defamation, libel, and slander on the internet has made this continuation of counterintelligence organized-stalking a great deal easier.

People from all segments of society can be recruited to be the “eyes and ears” of the state, such as laborers, drug dealers, drug users, street people, prostitutes, punks, church groups, youth groups, your best friend, your lawyer, local policeman, doctor, emergency services, a neighbor, family, social workers, politicians, judges, dentists, vet, supermarket cashier, postman, religious leader, care worker, landlord, anyone.

Most of these recruited civilian spies/snitches do not understand or even care that the end consequence of this harassment protocol is to eventually destroy the targeted person, and function as “useful idiots” of the state-sanctioned COPS gang-stalking program.

It has been reported that people and family members participate in this organized stalking because it:

(1) gives them a sense of power;
(2) is a way to make friends;
(3) is something social and fun;
(4) breaks down race/gender/age/social barriers;
(5) is forced or blackmailed upon them by the State or police to take part;
(6) is told to them that they are part of “homeland or national security” to help keep an eye on “dangerous” or “emotionally disturbed” individuals where they are “heroic spies for the state;”
(7) is used on local thugs or informants who are already being used for other activities where their energies are diverted into these gangstalking community spy programs;
(8) is either a choice of spying for the State or police, or else go to jail;
(9) involves outright lies and slander about the target to get them to go along with ruining the targets life;
(10) includes average citizens recruited by the state the same way citizens were recruited in the former East Germany and other countries.

Some techniques used against targets in this organized stalking program include:

(1) classic conditioning where a target is sensitized to everyday stimuli over a period of months and years to harass them in public to let them know they are constantly being harassed and monitored;

(2) 24/7 Surveillance following the target everywhere they go, learning about the target and where they shop, work, play, who their friends and family are, getting close to the target, moving into the community or apartment where they live, across the street, monitoring the targets phone, house, and computer activity; I’ve known them to marry family members.

(3) isolating the target via defamation, libel, and slander campaigns, (eg, people in the target’s community are told that the target is a thief, into drugs, a prostitute, pedophile, crazy, in trouble for something, needs to be watched, false files will even be produced on the target, shown to neighbors, family, store keepers);

(4) constant or intermittent noise and mimicking campaigns disrupting the target's life and sleep with loud power tools, construction, stereos, doors slamming, etc;

(5) talking in public about private things in the target’s life;

(6) mimicking actions of the target and basically letting the target know that they are in the target’s life;

(7) daily interferences, not too overt to the untrained eye, but psychologically degrading and damaging to the target over time;

(8) everyday life breaks and street theater such as flat tires, sleep deprivation, drugging food, putting dirt on targets property;

(9) mass strangers doing things in public to annoy targets such as getting called/text messages to be at a specific time and place to perform a specific action;

(10) blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from the target;

(11) “baiting” tactics where a surveillance operation can selectively capture evidence of a targeted person responding to harassment, and then that evidence could then be used to justify the initiation of more formal scrutiny by a government agency.

The Gang-Stalking Program, as all other state sanctioned/approved gang-stalking programs, have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These coordinated efforts then join hands with others for this systemic form of control and harassment.

Such operations have nothing to do with the target’s criminality – they are led and perpetrated by federal agents and intelligence/security contractors, often with the support of state and local law enforcement personnel.

Unofficial operations of this type are often private investigators and vigilantes – including many former agents and police officers, sometimes on behalf of corporate clients and others with connections to the public and private elements of America’s security industry.

The goal of such operations is “disruption” of the life of an individual deemed to be an enemy (or potential enemy) of clients or members of the security state. Arguably, the most accurate term for this form of harassment would be “counterintelligence stalking.” I would call it simply “Torture."

Agents of communist East Germany’s Stasi (state police) referred to this process as Zersetzung (German for “decomposition” or “corrosion” – a reference to the severe psychological, social, and financial effects upon the victim). Victims have described the process as “no-touch torture” – a phrase which also captures the nature of the crime: cowardly, unethical (and often illegal), but difficult to prove legally, because it generates minimal forensic evidence.

Tactics include online and personal slander, libel, defamation, blacklisting, “mobbing” (intense, organized harassment in public), “black bag jobs” (residential break-ins), abusive phone calls, computer hacking, framing, threats, blackmail, vandalism, “street theater” (staged physical and verbal interactions with the minions of the people who orchestrate the stalking), harassment by noises, and other forms of bullying.

Such stalking is sanctioned (and in some cases, orchestrated) by federal agencies; however such stalking is also sometimes used unofficially for personal and corporate vendettas by current and former corrupt employees of law enforcement and intelligence agencies, private investigators, and their clients.

As was stated above, organized stalking methods were used extensively by communist East Germany’s Stasi (state police) as a means of maintaining political control over its citizens. Although this is supposedly illegal in the US, the same covert tactics are quietly used by America’s local and federal law enforcement, and intelligence agencies, to suppress political and domestic dissent, silence whistle-blowers, and get revenge against persons who have angered someone with connections to the public and private agencies involved.

Wednesday, February 17, 2021

Proof FBI Snitching & Organized Stalking Program

This connects right into Homeland Security and the FBI InfraGard. (See here and here for more about InfraGard.). The RCMP is also doing the same. See here for some of the Stasi tactics they use. Also see here, herehere and here. For more about classified and hi-technology go here and here


Tuesday, February 2, 2021

Is This a Reflection of Canadian Values? More Examples of Crazy Jewish Supremacy

See here for more about this. See here for perfect examples of crazed supremacist ideas. See here for Jewish supremacism exposed. See here for Jewish supremacist quotes that you must hear to believe. See here for more about the Jewish Talmud. Also, be sure to watch this short excellent video from an honest Israeli talking about the problems of Judaism and Israel.  







Monday, February 1, 2021

Zionist Vigilantes With James Altucher and Curtis Sliwa. Read James Altucher's Subvocal Speech, Hook His Brain Up To a Headset or a Brain Computer Interface, See What He is Covering Up- No More Secrets Psycho

You Like Lying James? You Think You Can Get Away With Lying to Everyone & Being a Phony? See Links & Screenshot Below
the Video!







2. The head of the Guardian Angels is one of the speakers in the bottom video here: watch the video. James Altucher used to have a picture up on his Twitter with him and Curtis, James was wearing a Guardian Angels outfit.


3. James Altucher: Entitled Lying Psychopathic Zionist Scum: see here and here.


Thursday, December 31, 2020

Inside the Massive (and Unregulated) World of Surveillance Technology

 

Shoot 8 Year Old Child in Gaza = Quality Human Being

Be sure to watch to the 7 minute and 14 second part of the video below. Shoot kids just like dropping white phosphorus on them like this.  Total psychopaths, takes no account into consideration that he is the occupying force and that he is an 8 year old child. "The most moral military in the world!" Yes, they can say that with a straight face, amazing.  I know Jews liked comedy but come on! They are the only country in the world that even says this. Such hubris.

See here for past articles about Zionist terrorism.  Something to read here




Wednesday, December 30, 2020

A List Of Silicon Valley Entrepreneurs That Needs to Be Seen For What They Really Are --- Evil Twisted Lying Psychopaths

See the Pictures Below!

Every single one of the individuals below knows about the classified and hi-technology on my blog. (See here and here for more about classified technology. See this video from a person from Silicon Valley talking about technology that many people do not know about. See here for more about former U.S. Representative from Ohio and candidate for the President of the United States Dennis Kucinich's attempted ban of space-based weapons.)

This makes them traitors to their country. They are greedy scumbags who need to be shown out for what they are... LIARS. There are tons of smart people that can do what these people are doing. What makes the individuals that are below unique is their level of corruption and how they have sold their souls to the powers of this world. They are working with intelligence agencies, they would not be in the positions they are if they didn't. There has always been a close relationship between Silicon Valley and the Intelligence  Agencies. ( See here and here for more about this.) Facebook is a Zionist Stasi apparatus, people don't understand what these people are doing. (See here for more about dealing with Zionists.)

Some of the individuals below are also heavily associated with the Transhumanist movement. 

Transhumanism is literally being pushed by some of the biggest Silicon Valley companies, especially Google. (See hereherehere and here.)  They know what Transhumanism is, its connections to eugenics ---- and how it is being implemented on humanity without the public knowing.  See here and here for the connections between Transhumanism and Judaism. See here for some introductory videos about Transhumanism. See here for the Transhumanist category on my blog. Be sure to go through all of the articles. The other industry that some people below are involved in is drugs --- especially marijuana As any informed individual knows, the CIA has always been involved with drugs and organized crime. It is not a coincidence that this piece of crap had the forward written for his book by the ex-CEO of Twitter. James Altucher has connections with Jewish organized crime and the orthodox community, intelligence agencies, Wall Street and Silicon Valley. See here for more about Homeland Security, torture, political prisoners, classified technology and drug dealers. 

Here you can see the connections between drugs, organized crime, Silicon Valley, intelligence agencies and stalking losers in my local area. Like this and this shows, Silicon Valley has always had close connections to the intelligence industry. 

For the most part, but not always.... you will often find that most of the people that are engaging in stalking and using classified technology are Zionists
(Jews or Gentiles that are supporters of Israel.) Why? Well, one of the reasons is because it's literally a part of Homeland Security. See here for more about how fighting "GLOBAL Antisemitism" is a part of American foreign policy. See here and here for the Jewish hand behind the internet. See here for how Israel backdoored everything. None of the individuals below seem to think it matters that a bunch of people are being tortured with electromagnetic weapons and their brains are being beamed out like a live radio station to a bunch of stalking psychopaths. (See here for more about Mark Zuckerberg talking about synthetic telepathy, see here for more about Facebook and typing with your thoughts.) 

This is exactly what is happening, this is not an overstatement at all. THIS IS WHAT THE MEDIA IS COVERING UP. This is how some of these sick assholes get off, torturing people and watching it like a reality TV showA good example of this is shown in the movie "The Circle." But, it is actually much, much worse because the technology is more advanced and dangerous. They can get nanotechnology inside your body and transmit electromagnetic waves and sound waves right into you. They can literally control the minds of people. In fact, mind control was already possible in the '60s with microwaves.  Watch this documentary to learn more about this. A good example is the Jose Delgado experiments with the bull, also see this clip from CNN from the '80s and this old newspaper article from the New York Times. This technology is extremely advanced now. See here for a list.

This is how sad countries like the United States and Canada have become, it is absolutely sickening and pathetic. This is the modern-day Stasi Octopus, it starts at the top with the intelligence agencies and Silicon Valley and works its way down. It involves everyone from businessmen and women, real estate agents, mortgage brokers, government employees, trades personnel, (for example; pest control or property management,) law enforcement, drug dealers, writers, doctors, lawyers, journalists, actors, sports figures, priests and religious leaders, addiction recovery groups, university professors, waiters and hotel personnel. This is exactly what it was like in East Germany. There isn't one group they didn't infiltrate. Now your society has become just as sad, our countries have turned into Stasi nightmares. 

Sergey Brin- Jewish
Larry Page- Jewish

Former CEO of Google




Jim Lanzone, CEO of Yahoo Inc.



Elon Musk 
(Probably Jewish)
Tesla
(Now owns Twitter or X)



Used to be CEO of Twitter

Jeff Weiner-Jewish

Managing Partner at The Founders Fund

Jimmy Wales-Jewish

Kevin Systrom-Jewish 
co-founded Instagram





Max Levchin-Jewish
Cofounder PayPal
Affirm


Adam Mosseri-Jewish
CEO of Instagram


Sam Altman -Jewish
CEO of Open AI


Mark Pincus-Jewish
Founder of Zynga, a mobile social gaming company. Pincus also
 founded the startups Freeloader, Inc., Tribe Networks, and Support.com


Steve Ballmer-Jewish
ex CEO of Microsoft









Wednesday, December 9, 2020

Smart Dust Is Coming. Are You Ready?

 Bernard Marr

Contributor
Enterprise & Cloud


Imagine a world where wireless devices are as small as a grain of salt. These miniaturized devices have sensors, cameras and communication mechanisms to transmit the data they collect back to a base in order to process. Today, you no longer have to imagine it: microelectromechanical systems (MEMS), often called motes, are real and they very well could be coming to a neighborhood near you. Whether this fact excites or strikes fear in you it’s good to know what it’s all about.

What can smart dust do?

Outfitted with miniature sensors, MEMS can detect everything from light to vibrations to temperature. With an incredible amount of power packed into its small size, MEMS combine sensing, an autonomous power supply, computing and wireless communication in a space that is typically only a few millimeters in volume. With such a small size, these devices can stay suspended in an environment just like a particle of dust. They can:

  • Collect data including acceleration, stress, pressure, humidity, sound and more from sensors
  • Process the data with what amounts to an onboard computer system
  • Store the data in memory
  • Wirelessly communicate the data to the cloud, a base or other MEMs

3D printing on the microscale


Since the components that make up these devices are 3D printed as one piece on a commercially available 3D printer, an incredible amount of complexity can be handled and some previous manufacturing barriers that restricted how small you can make things were overcome. The optical lenses that are created for these miniaturized sensors can achieve the finest quality images.

Practical applications of smart dust

The potential of smart dust to collect information about any environment in incredible detail could impact plenty of things in a variety of industries from safety to compliance to productivity. It’s like multiplying the internet of things technology millions or billions of times over. Here are just some of the ways it might be used:


  • Monitor crops in an unprecedented scale to determine watering, fertilization and pest-control needs.
  • Monitor equipment to facilitate more timely maintenance.
  • Identify weaknesses and corrosion prior to a system failure.
  • Enable wireless monitoring of people and products for security purposes.
  • Measuring anything that can be measured nearly anywhere.
  • Enhance inventory control with MEMS to track products from manufacturing facility shelves to boxes to palettes to shipping vessels to trucks to retail shelves.
  • Possible applications for the healthcare industry are immense from diagnostic procedures without surgery to monitoring devices that help people with disabilities interact with tools that help them live independently.
  • Researchers at UC Berkeley published a paper about the potential for neural dust, an implantable system to be sprinkled on the human brain, to provide feedback about brain functionality.
Disadvantages of smart dust

There are still plenty of concerns with wide-scale adoption of smart dust that need to be sorted out. Here are a few disadvantages of smart dust:

Privacy concerns:

Many that have reservations about the real-world implications of smart dust are concerned about privacy issues. Since smart dust devices are miniature sensors they can record anything that they are programmed to record. Since they are so small, they are difficult to detect. Your imagination can run wild regarding the negative privacy implications when smart dust falls into the wrong hands.

Control:

Once billions of smart dust devices are deployed over an area it would be difficult to retrieve or capture them if necessary. Given how small they are, it would be challenging to detect them if you weren’t made aware of their presence. The volume of smart dust that could be engaged by a rogue individual, company or government to do harm would make it challenging for the authorities to control if necessary.

Cost:

As with any new technology, the cost to implement a smart dust system that includes the satellites and other elements required for full implementation is high. Until costs come down, it will be technology out of reach for many.

What should you do to prepare?

The entities who have led the development of smart dust technology since 1992 and large corporations such as General Electric, Cargill, IBM, Cisco Systems and more who invested in research for smart dust and viable applications believe this technology will be disruptive to economies and our world.

At the moment, many of the applications for smart dust are still in the concept stage. In fact, Gartner listed smart dust technology for the first time in its Gartner Hype Cycle in 2016. While the technology has forward momentum, there’s still quite a bit to resolve before you will see it impacting your organization. However, it’s important to pay attention to its trajectory of growth, because it’s no longer the fodder of science fiction. We might not know when it will progress to the point of wide-scale adoption, but we certainly know it’s a question of when rather than if.

Thursday, November 19, 2020

Originally posted in March of 2019, Proof That the Israeli Government is Following Me at the Highest Level: Another Israeli Who Blocks Me Because I'm Intolerant Of Their Intolerance (See Picture)



Not only am I being followed at the highest levels of my own country, but, I'm also followed at the highest levels of Israeli government. See the PROOF below! 

See the screenshot pictures and the video below! 

One is a screenshot from the CSE of Canada Twitter account, which is the equivalent of the NSA in the USA, the CSE is the military intelligence of Canada. As you can see, they were blocking me. The other screenshot is from someone in the Israeli government at the highest level, in fact, you can see her in the former Prime Minister of Israel's (Benjamin Netanyahu,) cabinet picture below. I had no idea who this woman was until I read an article about her, looked her up and found her Twitter account. As you can see, she was blocking my old Twitter account that was banned. 

See her Wikipedia here. For some of her interesting comments see here. Here is a small sample of her loving disposition: “May you be raped in your grave,” says the new darling of Israel’s ruling Likud party. Sounds like this charmer here who said Palestinian mothers give birth to “little snakes.”  I am used to being blocked, it is no different than the Canadian Military Intelligence Agency that blocks me. (See picture below.) For more of this classic Israeli and Jewish intolerance, see this soccer game in Israel

Imagine if we had people in the Canadian government saying this? Thankfully we don't --- they just kiss the asses of the people who believe such insanity. See here for more about Judaism. 

See her in red in center. Click on pic above to enlarge, she is right behind
Benjamin Netanyahu (the previous Prime Minister,) and right beside the
 current Prime Minister of Israel. 


Watch 30 Seconds into the video to see her!

Tuesday, November 17, 2020

Monday, November 9, 2020

Relevant to Today- Absolute Must Watch Video About the Protests in 2018- See the TRUTH of What is Really Happening in Gaza

Watch the video below! See how full of crap some of the Jews really are, see how they lie to us every single day. They are attacking innocent defenseless people, just like the organized stalking program in North America which is done by Public Safety Canada and Homeland Security. Absolute evil incarnate. Sick, demonic, cowardly, and full of lies. How do you defend this Canada? Just twisted beyond anything you could ever imagine.

To see some pictures from the past conflict in 2014 see here.