„In case you were sleeping during the takeover of the United States by the so-called “deep state…“
Gang stalking and Electronic implants: Here is how the NSA uses electronic implants.
FEATURED ~ RESEARCHORGANIZEDGANGSTALKING
I first experienced an electronic implant in or around 2004-5. Computer implants are real, NSA and other agency break-ins to hardware and software are real, and documented in main stream news.
In case you were sleeping during the takeover of the United States by the so-called “deep state,”(and it might be noted that both left wing AND right wing opinion leaders agree that the deep state, aka criminal syndicates in government, are real.) aka the collusion between international finance and its hydra’s and Octopussies of NGO’s slopping the troughs of American police and intelligence agencies such as the FBI, the CIA and the DHS, as the NSA spies on all of us, here is one of the phrases they use online to distort the meaning of the phrase “gang stalking,” and to obscure their illegal actions:
They stuck “electronic implants”in me!!!!!
Electronic implants are very real in many ways, but not the way they are discussed in the online dialectic of OGS. In fact, the use of the term as a biological implant is designed to obscure other more real implants, because in case after case ranging from intellectual property theft BY the state or a subsidiary corporate, private intel gathering firms like Facebook, or the host of DHS “contractors” who stalk political targets, to major spy operations.
And surely as we see in case after case of mass shooters, we see long term agency involvement in those peoples lives as predicate for these mass homicides, and quite frequently, contact with zionism, FBI careerist CVE stalking, and Jewish/zionist Supremacy in college settings, as we saw with the recent Texas cases, and dozens of others…“
„As I have noted, my personal circumstances indicate that I have been targeted by multiple cause based/ religion based/ and other stalkers for decades, because I defy their mystery cults and religions-but also because I refuse to be circumscribed by their un-Constitutional gray area policing methods…“
„I first experienced an electronic implant in or around 2004-5, as progressive organizations and institutions ranging from colleges, to state agencies and their attendant database abuses worked to frame me/harass me/ implicate me/ cause me to be “flipped” as a useful idiot to their political causes…“
„There I was, sitting in a college newsroom, when the computer redirected, all by itself, as if a spell had been cast upon it! To Nazi-land!….an imaginary place created generation after generation by the SAME FOLKS, as international bankers create, and then gut local economies.
But what really mattered then more than anything, was that they attempted to defuse my activism by following me around with nebulously middle eastern photographers, and tried to neuter my ability to have political effect. And what an effect!
Only lately is MSM talking about how a militant, AIPAC financed zionist sect of rapists…“
„How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last.. “Equation Group” ran the most advanced hacking operation ever uncovered.“
„2015: In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
First is the group’s known aptitude for conducting interdictions, such as installing covert implant firmware in a Cisco Systems router as it moved through the mail.
Second, a highly advanced keylogger in the Equation Group library refers to itself as “Grok” in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined “How the NSA Plans to Infect ‘Millions’ of Computers with Malware.” The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
….read the full article on the NSA’s 14 year hidden domestic spy operation here.
Gray area policing, aka “high policing,” and Grayfish computer intrusions
https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt=“The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code („blue pill“, „red pill“ – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly „swallows.“
The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.”“
In all, Kaspersky has tied at least six distinct pieces of malware to Equation Group. They include:
EquationLaser: an early implant in use from 2001 to 2004.
DoubleFantasy: a validator-style trojan designed to confirm if the infected person is an intended target. People who are confirmed get upgraded to either EquationDrug or GrayFish.
EquationDrug: also known as Equestre, this is a complex attack platform that supports 35 different modules and 18 drivers. It is one of two Equation Group malware platforms to re-flash hard drive firmware and use virtual file systems to conceal malicious files and stolen data.
It was delivered only after a target had been infected with DoubleFantasy and confirmed to be a target. It was introduced in 2002 and was phased out in 2013 in favor of the more advanced GrayFish.
GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts. Whereas EquationDrug re-flashed hard drives for six models, GrayFish re-flashed 12 classes of hard drives. GrayFish exploits a vulnerability in the CloneCD driver ElbyCDIO.sys—and possibly drivers of other programs—to bypass Windows code-signing requirements.“
„Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.“
„Research and Data About Organized Gang Stalking, aka Police and Counter-Intelligence Stalking, aka Community Policing and Police Stalking..Most educated accounts indict the NSA’s FIVE-EYEs massive wire tapping scheme that trickles Americans and others illegally captured communications across borders and jurisdictions, working with so called community policing, and hidden policing tactics, like Law Enforcement Intelligence Unit’s (LEIU’s), and organizaions like Stratfor, or any number of other FBI / DHS/CIA private contractors and co-conspirators in INFRAGARD and Fusion Centers who pass our illlegally obtained information to local police, who pass that information to cowards and subverters of Constitutional due process. This „community policing“ is an endless make-work project that drains tax dollars, targets lawyers, journalists, dissenters and activists, and each community is different-so your personal stalking might include: Mormons and LDS Church; Baptist, Protestant, Catholic, Evangelical, and Jewish cults or other sects working from churches and Soros/Koch brothers funded NGOs or their various Multi Kultural Kovens and Klubs or, academics; pseudo-feminists and their associated multi-cultists, SJW’s, crybullies and others who get federal dollars from waging hoaxes, lies and the manipulation of DV stats; Christians and others who want to enforce conformity or cause superstitious fears; and especially political parties fueled by progressive or neo-con cult mentality. Begin tracing your stalkers HERE! Arm yourself with a camera, and blog it live. Start YOUR legal research here, because these are primarily civil conspiracies against your rights-so document EVERYTHING, and especially take names….and stick to talk about wiretaps, Fusion Center domestic and political spying, and hidden database abuses with the FBI’s Infragard as the political spying nexus that has stolen or redirected our data, and enabled most targeted, personalized, and local illegal ‚electronic‘ surveillance.“
„Organized stalking and CIA operations manual: what you are experiencing is “counter-intelligence stalking.”
SEPTEMBER 3, 2017 ~ RESEARCHORGANIZEDGANGSTALKING
I get a lot of readers from Russia, the Ukraine and elsewhere who seek information about the CIA phone hacking and then, influence operations, propaganda and gang stalking operations.
While much has been written in the last decade about “far right” groups of “organized thugs” who stalk and harass people, it is important to note that the left is doing this today as the right has lost power-due to tactical assault like OGS. And the left has done this before as well- Stalin’s Russia, Hitler’s Germany (the blur between Jews who profited from the Holocaust one way or another is striking, as we see some Jews today encouraging racism and stalking), and Italy under Mussolini, in short, anywhere there was totalitarianism,or fascism there is OGS (Organized Gang Stalking)..“
„In the modern world, formerly respectable governments have allowed groups of citizen spies, known as “non-governmental organizations’ or NGO’s to wage “culture wars’ on individuals, as the police look on and do nothing, because they will get paid no matter what happens to the targets of these stalkings. And, these organizations are likely to be full of religious/sectarian/ foreign agents in the west, many of whom are military trained in psychological operations or other intelligence agency practices that amount to little more than bullying and terror.
See this post here for more about that. But many hidden operators and programs active in our societies and on our internet allow some to wage crime on others, based upon a persons political beliefs or suspected beliefs, based on the illegal capture of our cell phone and internet data that our governments have stolen from us without our informed consent.
I was aware in 2003-4 that all of my personal communications were entrapped because I was a target of multiple local/globalist agenda’s of the welfare state to police state operatives, and other afffiliated sectarian religious or political operators who redirected my internet communications, but others only became aware after Edward Snowden in 2013. Here is a link to the files that Snowden liberated from the spy agencies that document how our governments are targeting our privacy, due process rights, speech, assembly, assoiation etc; and subverting due process).
And targeted individuals were as likely to be high level politicians as they were opposition candidates, or even low level drug dealers with an “in” to the “party circuit” or other social circles. These people who get stalked are what is called “influencers” and while they are the people who suffer the most in OGS, it is really the “larger audience” that is the actual target-the people who the “influencer” can influence. This larger audience is called the “targeted audience” aka the “TA.”“
„So, one TI can lead agents and agencies to a larger TA-got that? And that is straight out of the CIA operations manual or any of a number of other intelligence agency playbooks-they really are all the same with slight differences that aren’t worth discussing here. This one was from this era, where America lost its grip on industry, and went to a “black cash” budget instead.
And, from high level diplomats to low level drug dealers acrss town from you, OGS is the tactic, various TA’s are the actual targets, whether it is a cop with a vendetta because you banged his wifey who sics the dogs on you in the form of “women’s rights advocates” and the associated “umbrella agencies and NGO’s that get cash for DVIC stalking, or the Russian’s, or the local good guys and their do-gooders who seek to kidnap your child by framing you into a crime, the tactics are IDENTICAL.
Most notorious today are the “women’s shelter advocates” who stalk men in order to cretae crime, or the college and university multi-kultural klans and their kovens, but George Soros, Haym Saban, and the right wing billionaires also use OGS and it’s associated “high policing” from state and federal agencies to silence journalists, dissenters, and activists as if these are all terrorists.“