2009
02.24

There is no exit from my situation.

There is no one to help you escape.   Everyone in a position to help has been manipulated. 

They have each acted on bad information.  They have violated professional ethics, responsibilities and the law.  They have been manipulated and must be concerned with their liability. 

Lawyers Ethics violations, Advising their client to commit criminal acts
Software Company Liability for Denial, Due Diligence Failure
Township Police False Arrest, Civil Rights issues, Failure to Act
County Detectives Fraud, Abuse, Failure to Act
District Attorney Fraud, Abuse, Failure to Act
Custody Master Fraud, Abuse, Ex Parte Communications
Judges Ex Parte Communications/Orders, Disregard for Law and Procedures

 

Because of the potential for charges or a civil suit against them, it is not in their best interest to risk any reduction in the terror and harassment directed at you. 

THAT WOULD WARRANT THIER ACTIONS?   WHAT LIES HAVE THEY BEEN TOLD?
Why destroy me and make sure that I have no relationship with my son. 
If my son were to reveal more clues, they would all be in jeopardy. 
This is pure evil. 

–  –  –  –  –  –  –  –  –  –  –  –  –  –  –  –  –  –  –  –  –  –  –  – 

‘They’ control any method of communication – electronically or by telephone.   After 2 years of this redirection, you can identify know when you are writing or speaking with one of “their” people.

TARGETED COMPUTER INTRUSION
If this was a virus, you might stand a chance of recovering.  THIS IS NOT.  You have been targeted and those responsible have a vested interest in making sure you do not recover or survive.

The Anti-virus companies have abandoned their responsibility.  They ignore the program that has destroyed you.  

The Anti-Spyware Coalition bridges the technology between the software companies and the anti-virus/anti-spyware Companies.  These companies are all current members.  They will allow your computers to be taken over by WebWatcher and other programs which are equally dangerous.

AhnLab
Aluria Software
Anchiva Systems
AOL
AVG Technologies
Bit9
CastleCops
CNET Networks
Computer Associates
Dell, Inc.
ESET
Facetime Communications
F-Secure Corporation
Google
HP
ICSA Labs
IronPort
Lavasoft
McAfee Inc.
Microsoft
National Center for Victims of Crime
National Cyber Security Alliance
National Network to End Domestic Violence
Panda Security
PC Tools
Radialpoint
Safer-Networking Ltd
Sana Security
Shavlik Technologies
Sophos
Spamhaus
Sunbelt Software
Symantec
Tenebril
Trend Micro
Webroot Software
Yahoo! Inc.

The companies listed above will display adcvertisements and reassurances of security and protection on your screen while you are scanning your computer for viruses. It may take hours to scan, but it doesn’t matter because they are not going to detect it.

As you are targeted, they have been watching what you are doing to get around their control and making modifications to prevent it. You have become their research and development lab rat.

The program has been placed inside your BIOS memory. The programs to prevent that from happening, or identify its occurrence will possibly be released in 2009.

Virtual Machine technology allows them to place your windows INSIDE a hidden copy of  windows that they control and you cannot access.  You will know it is there because your “virtual computer” will not respond to all hardware changes as it should.   Programs may freequently not work exactly as you expect.

“It is the world pulled over your eyes to blind you from the truth”

Forget escaping from their control of your computers.  You don’t have any choice.

 

Your telephones have been hacked also. 

This permits them to prevent you from effective communication.   Your email is under their control.  Your Phone is under their control.   They will hack your new equipment if you can afford to buy it.

The phone company will not cooperate unless the police request them to get involved.

(Police have not done their job since they were manipulated into liability for arresting and involuntarily commiting you.)

As such, you cannot escape the phone hack. Verizon is not responsible for that level of your phones programming anyway.

Visitor map

No Comment.

Add Your Comment

%d bloggers like this: