There is no exit from my situation.
There is no one to help you escape. Everyone in a position to help has been manipulated.
They have each acted on bad information. They have violated professional ethics, responsibilities and the law. They have been manipulated and must be concerned with their liability.
|Lawyers||Ethics violations, Advising their client to commit criminal acts|
|Software Company||Liability for Denial, Due Diligence Failure|
|Township Police||False Arrest, Civil Rights issues, Failure to Act|
|County Detectives||Fraud, Abuse, Failure to Act|
|District Attorney||Fraud, Abuse, Failure to Act|
|Custody Master||Fraud, Abuse, Ex Parte Communications|
|Judges||Ex Parte Communications/Orders, Disregard for Law and Procedures|
Because of the potential for charges or a civil suit against them, it is not in their best interest to risk any reduction in the terror and harassment directed at you.
THAT WOULD WARRANT THIER ACTIONS? WHAT LIES HAVE THEY BEEN TOLD?
Why destroy me and make sure that I have no relationship with my son.
If my son were to reveal more clues, they would all be in jeopardy.
This is pure evil.
– – – – – – – – – – – – – – – – – – – – – – – –
‘They’ control any method of communication – electronically or by telephone. After 2 years of this redirection, you can identify know when you are writing or speaking with one of “their” people.
TARGETED COMPUTER INTRUSION
If this was a virus, you might stand a chance of recovering. THIS IS NOT. You have been targeted and those responsible have a vested interest in making sure you do not recover or survive.
The Anti-virus companies have abandoned their responsibility. They ignore the program that has destroyed you.
The Anti-Spyware Coalition bridges the technology between the software companies and the anti-virus/anti-spyware Companies. These companies are all current members. They will allow your computers to be taken over by WebWatcher and other programs which are equally dangerous.
National Center for Victims of Crime
National Cyber Security Alliance
National Network to End Domestic Violence
The companies listed above will display adcvertisements and reassurances of security and protection on your screen while you are scanning your computer for viruses. It may take hours to scan, but it doesn’t matter because they are not going to detect it.
As you are targeted, they have been watching what you are doing to get around their control and making modifications to prevent it. You have become their research and development lab rat.
The program has been placed inside your BIOS memory. The programs to prevent that from happening, or identify its occurrence will possibly be released in 2009.
Virtual Machine technology allows them to place your windows INSIDE a hidden copy of windows that they control and you cannot access. You will know it is there because your “virtual computer” will not respond to all hardware changes as it should. Programs may freequently not work exactly as you expect.
“It is the world pulled over your eyes to blind you from the truth”
Forget escaping from their control of your computers. You don’t have any choice.
Your telephones have been hacked also.
This permits them to prevent you from effective communication. Your email is under their control. Your Phone is under their control. They will hack your new equipment if you can afford to buy it.
The phone company will not cooperate unless the police request them to get involved.
(Police have not done their job since they were manipulated into liability for arresting and involuntarily commiting you.)
As such, you cannot escape the phone hack. Verizon is not responsible for that level of your phones programming anyway.