Gang Stalking World

United we stand. Divided they fall.

Beat them at their own game

Gang Stalking life disruption

Gang Stalking life disruption

So here are some things that I think we can do to get more exposure for our case. I think we should be contacting people in the web 2.0 world. My recent encounters with unwarrented government surviellance strongly suggests that they do not want a wider range of people finding out what is happening, and so to that end we neeed to be exposed as much as possible. Maybe you can help. My most recent post. http://blog.jajah.com/index.php?url=archives/299-JAJAH-turns-iPod-touch-into-an-iPhone.html#feedback {Hi there, I had a quick question about the security of your services. I am wondering if there is a way to hack into the services and listen in on the calls? If someone does use the Jajah application how secure are the calls? I am specifically concerned about people who can hack into phones and other communication devices. My commuinty are currently experiencing unwarrented covert government surveillance issues, and I am wondering if using the Jajah network is secure and what level of privacy it offers? Many people would like to know that using this service is secure, I have heard that skype calls can in some cases be intercepted and listened into. I would really love to hear your feedback on this thanks.} Much like other forms of communication, it’s not letting my post go through. My code is entered correctly at the bottom of the page, the other information has been filled in correctly, but much like other public postings of this manner, where an uncontrolled group might be introduced to the concept of Gang Stalking, my posting or communications stop working. This has been happening a lot more recently. What does the government have to hide, that they need to stop posting going through? This give me much hope, and I think that we can utilise this to our advantage. I do think it might be time to see if we can take some other types of action, I think so far what I have seen is that they will push and get away with what they think they can. I think we should see what legal means we can use, and we do need to expose them as much as possible and use existing technology to do so.

February 22, 2009 - Posted by | Gang Stalking | , , , , , , ,

3 Comments »

  1. […] about Web 2.0 as of February 22, 2009 Beat them at their own game – gangstalking.wordpress.com 02/22/2009 Some here are some things that I think we can do to get […]

    Pingback by Articles about Web 2.0 as of February 22, 2009 | The Lessnau Lounge | February 22, 2009 | Reply

  2. Now some people will say that blog posts don’t go through some times, but what I am saying is that since January about 80% of these incidents have been happening, and this is what life disruption is like. One or two your don’t notice and would hardly comment on. I think it’s say to say that I am pretty efficient on the internet, and this is something that is out of the normal, the level of failures for emails going through and these types of posting. That is the kinds of things that go on.

    One by one they make no difference, but collectively that’s life disruption and that’s what it’s all about.

    Comment by gangstalking | February 22, 2009 | Reply

  3. Very informative post, i have same concerns while using VoIP services are these services are really secure?? I doubt!! i am using another VoIP service called Vopium they are also offering Sync feature but my concern is, are they really secure to share the contacts / data or voice calls on them!!

    Comment by Jessica | February 24, 2009 | Reply


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: