Gang Stalking World

United we stand. Divided they fall.

Square does cash now

https://squareup.com/ca

Square does cash.

There is this program called square, I think I might have recommended it in the past for offline payments, but did you know that they now do cash transactions as well?  https://square.com/cash

They now have a link for cash and email money transfers, if it works, and if it’s the correct thing, it’s what we will be using online, along with a few other situations.

The only thing I would recommend is that they add the security question and answer to square, that way only the sender and receive can figure out who is sending it. Not sure if they can use the verified by visa situation, or leave it optional, but the situation, sounds neat.

Here is the link. https://square.com/cash

It’s only available in America right now so the U.K. and Canada have to wait, but it’s pretty cool, it’s not international yet, but this is the type of service we all dream of, something that could be international, that’s easy to send and receive money.

Here is the article on it.
http://www.theverge.com/2013/10/15/4842518/square-cash-send-money-over-email-iphone-android

http://www.dailymail.co.uk/sciencetech/article-2465274/Square-Cash-lets-users-send-money-EMAIL.html

October 18, 2013 Posted by | activism, Awareness | , , , , | Leave a comment

Government Backdoor?

Does the government have a back door to the internet? I have posted before about strange happenings, but here is something that should be of interest.

I posted a comment at TMZ using my normal email address, the confirmation email did not arrive. I found it strange. So I created a different email address and posted a comment on a different article.

That email confirmation arrived. So it could just be that something was wrong with my original email right? So to test the theory, I created a second account with a different user name, and posted a bubble (meaningless comment) comment. For the bubble comment and different user name, I immediately received the following email. Portions have been edited, but you get the general gist.

(Please activate your comments by clicking this URL:

http://www.tmz.com/confirm/

The comments below will be added to the post titled )

So I got an email confirmation and password, which would allow me to post comments without any need for more email confirmations. I then went back to post my original comment that had a bit more substance, using the password and email, and it does not post. Remember I now have a password, and email, but my original comment is not posting.

So the question is do those that are doing the monitoring have a secret back door to the Internet that allows such things to happen? I think it could be more simple than that. Is there a way to prevent emails from arriving that a hacker could do? Cause I and many targets have seen emails not arrive, but in this case, my original did not arrive, the second did, and the third did not. I usually have better things to do, but I think I can somewhat prove this, ofcourse in typical fashion, after posting this, watch a billion comment show up on TMZ.

It’s not that far off a question considering that the military created the internet, why would they not have backdoors? Even if this specific situation is not caused by a government backdoor, is it not reasonable to assume that they have one?

If they do not have backdoors, then what can they do?

So to test out the theory further I created a third account, using the same mail company where the second email did arrive and lo and behold the email just like with the first email, same user name did not arrive.

I created a different user for the comment. This shows deliberate interference and I think this should make a rational person wonder, just a little bit if something odd is ongoing.

Now only is the comment being prevented from being posted, but emails are being prevented in this case.

So what happens to the emails? see in the first case, you could just assume that the email did not arrive, but the second email with the another company did, but the third email which was created using the first comment, with the second email company did not arrive.

The only difference with the emails is that one comment had a reference to Gangstalking and the other comment did not. Comment two which was a test comment was just a bubble comment, and it make it through.

I don’t think this is happening at TMZ’s side, cause I have seen this before on too many websites. This might be the closest that I have come to proving this. I believe it’s happening at the local end and the idiots doing the monitoring are responsible. So is there a hack that can do this? If so what? What is the work around?

If they need to block emails that badly, then that’s a good thing. It shows that they are scared of this being exposed, and I think this means we are doing better, than expected. Sure getting illegally blocked is not fun, but this can work in our favor.

If we continue to do what we are doing, then I think we can get this exposed.

Lastly when did google mail start requiring a sms phone confirmation for new emails? I have never seen this before.

What happens if there users don’t have a mobile or choose not to send? Can they still create an account in google. I have never seen this before, and would love some feedback from others.

I just checked and it typical make the target look crazy and discredit them, the postings are all there.

Except for a couple of things. Because I used the never signed up at TMZ option for my first email, I should have gotten a response in my in box and did not. So I contacted the site saying, hey I did not get my confirmation email. That was at 3:57 and up until I made this post, none of my comment were on that site, except for the bubble comment, which did not appear up until 4:31 and that was because I finally got an email in the second email account I created. Yet when I go back to this site, I can see comments from myself at 3:51 pm, which were my original comments. So how did the original comments post without the required email verification?

Let me recap. I posted a comment at 3:51 or there abouts. It did not post. No email was received. I tried it again, and nothing. I contacted the site at 3:57 and got their auto responder. Shortly after I created a second account, and posted a bubble comment just for the hell of it. That made it through right away after clicking on the confirmation email, plus another email giving me a user name and password. Subsequently I went went back to post and again nothing happened.

Yet now all the comments are showing. This is typical, trying to discredit the target, but I took the screen caps, which I find help a great deal.

The auto responder from 3:57. At this stage none of my comments where showing up on their site. So I emailed them to say hey what the heck, my comments are not showing.

My original comments are now showing. Those comments that I never received a confirmation email for, which were not showing up at the time of this posting, but are now fully there.

I also have a screen cap of my bubble comment which did post right away at 4:31 Pm on another article.

So were the comments just not showing from my end? A resonable explanation, but then why could I see the bubble comment and not the rest? Where are the missing emails? Why are all the posted comments now showing, about 6 of them in total, which just looks like spam now, but they were not showing at the time. Keep in mind that other comments were posting and those showed up just fine.

It’s a small thing, but sometimes it’s proving the small things that will help you prove the larger things. I by no means thing this is definitive proof, but it should make you go hum?

December 12, 2009 Posted by | Censorship, Gang Stalking | , , , , , , , , , , , , , , | 16 Comments

Hodgepodge

I didn’t know what to title this. There is so much that I want to say, and if I don’t say it all at once a lot of it get’s forgotten.
Movies.
Eg. Movies, I meant to post about movies that you should check out, and keep forgetting to. I also don’t have the time to post about them now.

 

Unity.
I think it would be nice for the Gang Stalking targeted individual community to come together, but how would this happen? We will be stronger if we are united, that is true, but then how could we avoid the problems we already have, and then the problems that the members of the Cointelpro community faced? If we can’t find a way to come together, then we might  be able to succeed, but if we come together as one voice, if it’s not the correct voice or voices, we are right back where we came from.

People like to come together, they like groups. They like a sense of community. That is one of the worst parts of this, because when you finally meet others like yourself who are going through the same thing that you are, you should be able to just sit back relax and trust. This is the thing that programs like Cointelpro, and men like J. Edgar Hoover, stole from so many people. It’s a legacy that has been left behind, a sick legacy, but a legacy none the less.

I do think about what will bring us together, should we attempt it? Aren’t we together now? No we are not. I check the forums and there is still so much disinfo out there. It’s incredible, and again I wonder, with so many alleged targets out there, why are there not more people on these forums, getting the correct information out there? I mean we have videos, articles, etc. I think there is enough good evidence to show and prove some of the things we have been saying, but that information is simply not getting disseminated and I wonder why that is?
Changes.
Has anyone else noticed that when they update a site or blog, or make corrections the corrections are gone or changed sometimes? I had solid proof of this at one time. I had made an update on the what is new section, and then the next day the update was gone, and the post count had reversed itself. I notice that sometimes I will do an update and then check back sometime later and the update will not be there. Not a big thing, but if it’s happening to anyone else, it’s just a heads up.

Simple things like I will do a spelling correction, then check back and the article will be reverted to an older copy that does not have the correction. That just happened with something I updated, and it just reminded me to ask if anyone else get’s this.
Evidence.
As you know, I have been researching a great deal. I have found many good articles.

You can read the slightly updated Gang Stalking FAQ posted here, plus watch the videos.

http://www.gangstalkingworld.com/GSFAQ.html

The structure of oppression article has been updated.

http://www.gangstalkingworld.com/Structure.html

The resources section has also been slightly updated.

http://www.gangstalkingworld.com/Resources.html
I found a reference to the sign language that they use when out on patrol. I found a Covert Agent Training Manual, and I found a reference to what I was looking for.
http://gangstalkingworld.com/Forum/YaBB.pl?num=1221987345

[quote]

Conduct covert foot surveillance operations

Summary

This unit is about performing covert foot surveillance operations in order to gather
information, intelligence and/or evidence.
To be competent in this unit you will need to be able to prepare for the operation.

You must be able to deploy from a vehicle and conduct a foot surveillance on a subject using approved techniques to gather information, intelligence and/or
evidence, negotiating hazards whilst remaining covert at all times and assisting your team members to remain covert also. You are expected to use a range of equipment suitable for the task (e.g. cameras, radios, image intensifiers). You must maintain
communication within the team using approved and recognised methods and be able to rejoin a vehicle covertly. The accurate recording of any information, intelligence and/or evidence gathered during the operation is also required.

The purpose of conducting surveillance operations is to gather information, intelligence or evidence and therefore this unit links to unit 2A1 ‘Gather and submit information that has the potential to assist policing objectives’.

There is one element:

2F1.1

Conduct covert foot surveillance operations

This unit was developed by the Police Skills and Standards Organisation.

Skills for Justice

National Occupational Standards for Policing and Law Enforcement
April 2005
Page 10
Element
2F1.1

Conduct covert foot surveillance operations

Performance Criteria

To meet the standard, you
1
provide researched, flexible and plausible cover stories consistent with your appearance and the operational environment
2
make appropriate use of any clothing and props necessary to remain covert
3
make an effective use of cover, distance, timing and positions during surveillance operations
4
react to changing situations by employing appropriate tactics
5
employ close control techniques where necessary to gather information, intelligence and evidence covertly
6
employ other appropriate surveillance techniques where necessary to gather information, intelligence and evidence covertly
7
identify, assess and continually review potential risks in relation to the operational environment and react appropriately
8
operate and maintain equipment in accordance with training and manufacturer’s instructions in a way that maintains covert operation
9
communicate with other team members accurately and effectively using recognised and approved methods
10
assist other team members in remaining covert throughout the surveillance operation
11
carry out all roles in recognised foot surveillance systems effectively, efficiently and covertly
12
recognise counter surveillance activities and use approved and recognised tactics effectively to combat them
13
recognise anti surveillance activities and use approved and recognised tactics effectively to combat them
14
where appropriate, co-ordinate your actions and communicate with other teams and individuals to maintain effective surveillance operations
15
deploy from and rejoin vehicles covertly where used
16
recognise the limits of the authority for the surveillance operation and take the appropriate action in respect of changing circumstances
17
appropriately document all actions, information, intelligence and evidence in accordance with current policy and legislation
Range

1
Operational environment
a
hostile
b
non-hostile
c
rural
d
urban
e
daylight
f
night time
g
good environmental conditions
h
poor environmental conditions

Skills for Justice
National Occupational Standards for Policing and Law Enforcement
April 2005
Page 11
2
Communicate
a
by radio
b
by telephone
c
by using hand signals [/quote]
See hand signals. I don’t want to say I told you so, but well…

The next thing I found out is that they are using Terrorist laws to do surveillance on innocent ordinary people.

Here are a few clips from the article.

http://www.sundayherald.com/news/heraldnews/display.var.2342364.0.how_

local_councils_use_antiterror_laws_to_spy_on_ordinary_people.php
http://gangstalkingworld.com/Forum/YaBB.pl?num=1221946888
[quote]
SCOTTISH COUNCILS ARE USING SURVEILLANCE AND security powers intended to fight terrorism and organised crime in order to spy on ordinary members of the public suspected of petty offences such as breaching the smoking ban, playing music too loudly and dropping litter.
 
Local authority chiefs have ordered staff to spy on unwitting members of the public some 3579 times since being granted the powers in 2002. Under the Regulation of Investigatory Powers Act (Ripa), councils have the power to secretly film and bug people, use paid spies to inform on a suspects activities, and even intercept communications data such as mobile and land line use and information about email traffic.
[/quote]

[quote]
The council claimed “most commonly, directed surveillance is used by community safety staff to investigate complaints of anti-social behaviour. A small number of authorisations will be made by Environmental Health and Trading Standards staff investigating breaches of legislation relevant to their area of work. Finally, staff dealing with fraudulent benefit claims will have made a small number of applications”.
 
Edinburgh also said it used “covert human intelligence sources” (CHIS) four times. A CHIS could be a friend paid to pass information to the council, or someone paid by the council to gather information on a target and relay details of their life back to local authority bureaucrats. Edinburgh Council defended Ripa as “an important tool” and said it only used the powers “as a last resort”.
[/quote]
[quote]
Details from Moray showed just how badly informed and trained council staff were about the Ripa legislation. A restricted inspection report from the Office of Surveillance Commissioners dated September 2004 says the council’s policy on using covert human intelligence sources was “clearly confused” and “displays a lack of understanding”. “Every record” relating to covert human intelligence “was significantly defective”.
[/quote]

[quote]
Richard Haley, secretary of SACC, said he was “astonished and baffled” by the misuse of Ripa, adding: “We need to be clear that this is not about a few more CCTV cameras. This is directed surveillance, likely to obtain private information on ordinary people. We are talking about the use of cameras and microphones and agents.
 
“If these cases are serious, then they warrant proper policing, not amateur detective work by council officials acting as if they were part of a private detective agency. Profound civil liberties issues are raised here.”[/quote]
ONE NATION UNDER SIEGE
This video is a must see.

http://uk.youtube.com/watch?v=AbS025eJWls

Section 5,6,7 are very interesting.

The whole movie is interesting, but those sections talk about the community policing programs, electronic harassment, RFID chips and other relevant information.

I would recommend anyone who has questions about what is happening to check out this movie.
There is more to say, but I think this is more than enough to think about for now.

September 21, 2008 Posted by | Citizen Informants, Civilian Spies, Cointelpro, crazy, Electronic harassment, Gang Stalking, Gangstalking, Life, one handed signals, sign language, Snitches, Spying, Stasi, State target, Targeted Individual, telecommunications, youtube | , , , , , , , , | Leave a comment

YouTube S1959.

YouTube Mass Censorship in effect. (S1959)

http://uk.youtube.com/watch?v=rUn3gE4bncg&feature=email

Hand someone a bible and be considered a terrorist. That’s the kind of thing we are dealing with under laws such as this S1959. This is what is being said about this law.

Well what YouTube is doing is they are going to be censoring many videos.

This is a strict bill that has not passed yet, but YouTube has gone ahead and implemented this massive form of censorship. They seem to keep silencing voices.

The video says they have been trying to raise awareness about S1959, because if this bill passes, it will make disagreeing almost impossible. This apparently attacks the first amendment.

A lot is happening and it happens while we all sleep. Now I saw another more alert poster blog about the YouTube bans a few days back, and for some reason forgot all about it.

However it’s been brought to my attention and I am doing my part by raising immediate awareness. If you can, do all that you can to stop the bill from passing, write letters, etc.

Also for YouTube, let’s use other file sharing sites if they insist on  implementing this ban.

Soon the Internet will not be a free place, they really do want to silence us in every way possible. Right now we have a bit of freedom and a small window of opportunity to make a difference, let’s each try to do what we can.

September 19, 2008 Posted by | Controlled society, google, Internet, Laws, New World Order, NWO, Politics, revolution, Social Control, society, youtube | , , , , , , , , , , , , , | Leave a comment