7. OBSTRUCTION OF JUSTICE

VIA CUTTING EDGE MILITARY AND NATIONAL SECURITY GRADE WEAPONIZED CYBER AND TELECOM CAPABILITIES


OBSTRUCTION OF JUSTICE

A criminal offense that involves interference, through words or actions, with the proper operations of a court or officers of the court.

The integrity of the judicial system depends on the participants' acting honestly and without fear of reprisals. Threatening a judge, trying to bribe a witness, or encouraging the destruction of evidence are examples of obstruction of justice. Federal and state laws make it a crime to obstruct justice.

Besides these specific prohibitions, section 1503 contains the Omnibus Clause, which states that a person who "corruptly or by threats of force, or by threatening letter or communication, influences, obstructs, or impedes, or endeavors to influence, obstruct, or impede, the due administration of justice" is guilty of the crime of obstruction of justice. This clause offers broad protection to the "due administration of justice." Federal courts have read this clause expansively to proscribe any conduct that interferes with the judicial process.

Two types of cases arise under the Omnibus Clause: the concealment, alteration, or destruction of documents; and the encouraging or rendering of false testimony. Actual obstruction is not needed as an element of proof to sustain a conviction. The defendant's endeavor to obstruct justice is sufficient. "Endeavor" has been defined by the courts as an effort to accomplish the purpose the statute was enacted to prevent. The courts have consistently held that "endeavor" constitutes a lesser threshold of purposeful activity than a criminal "attempt."

CNN Lockheed gets $1 billion FBI Contract 

http://articles.cnn.com/2008-02-13/tech/fbi.biometrics_1_fbi-contract-new-database-biometric?_s=PM:TECH

Cyber Crime on the Rise: Can Cyber Security Firms Reverse The Trend

http://www.businessinsider.com/cyber-crime-on-the-rise-can-cyber-security-firms-reverse-the-trend-2011-8

Jesse Ventura Conspiracy Theory - Big Brother Part 3 of 6

http://www.youtube.com/watch?v=WwqUiRB8FTU&feature=related


http://www.youtube.com/watch?v=lVRds78KN7c&feature=related

The Global War on Terror, has elicited this Paranoid need by the State to SPY on all it's citizen's, whereby, hundreds of billions of dollars in National Security have been dumped post 9/11 into the creation of cutting edge surveillance, biometrics, cyber. telecommunication and other technologies for the purpose of TOTAL SURVEILLANCE AWARENESS.  

There is also a growing number of Citizen Recruits who are enlisted by these State and Corporate sponsored Terrorist's who ask their Citizen Recruits to SPY on the Target who may also be their neighbor, or have THEM deploy Psychological Tactics and Techniques; like flash mobbing or crowding the target in public places with malicious intent, stalking, using a series of vehicle, (the FBI terms this operation the floating box system), the only difference is, these Terrorist Recruits do it, in order to deliberately cause vehicle accident, that can be blamed on the Targeted Individual. 

These same citizen recruit's will be told to show up in front of target's home, or drive by if they are in the neighborhood, and use a variety of noise campaigns, either with their vehicles (idling, honking horns, setting off alarms, slamming doors, and other acoustic devices, and/or speaking in group formation, at all hours of the day and night.

in addition to other petty vandalism, breaking and entering, with either keyed access, or literal break-ins without the permission, or consent of the Targeted Individual, who did not give them key access, or permission to enter their private residence, without their knowledge, consent, or if they were away from their residence, or to tamper, vandalize, and/or steal their private property within their residence, or vehicles, as well as their illegal access to papers, and other items within the privacy of their HOME. constitutes BREAKING and ENTERING - there are no grey areas to such violence, and because these TERRORIST'S were given access to a key, made a copy of a key - given to them by someone else - does not make what they are doing - legal entry into the private property of the Targeted Individual.  Basically, without a Warrant, knowledge, or consent - anyone who has access to the unit - that has not legal business to enter - is BREAKING and ENTERING - regardless of key access.

If you are not INVITED, if you enter when the Target is NOT THERE - if, someone gave you access to the original keys - and copies were made - these are all CRIMINAL ACTIVITIES - because at NO TIME - did the Targeted Individual's - give their permission - consent - or access thereof - once, again regardless of their possession of a key - it is STILL BREAKING and ENTERING - period. - there are NO EXCUSES OR GREY AREAS - anyone - WHO ENTERS THE PRIVATE RESIDENCE of ANOTHER INDIVIDUALS - WITHOUT THEIR KNOWLEDGE - OR CONSENT - IS BREAKING AND ENTERING -

Within the rental laws - the LANDLORD MUST GIVE - PRIOR NOTICE AND EXPLANATION TO THE TENANT BEFORE ENTERING THE PRIVACY OF A TENANTS PROPERTY, IN PARTICULAR WHEN THE TENANT IS NOT THERE.


these crimes are committed because they were either given access to, then made a copy of the keys which belong to the Target's home and/or vehicles. 

At no time EVER would the Targeted Individual's gives these Terrorist's - access to the privacy of their home or vehicle knowing the levels of insidious Terrorism, vandalism, theft of private property, theft, searches and seizures of papers, and other personal items - which these Terrorist Assassin's and their Citizen Recruits' believe they have the criminal rights to do.  Broken down, the only way these Terrorist's enter the privacy of a Targeted individual's home is because SOMEONE ELSE - allowed them to do so - not because THE TARGETED INDIVIDUAL DID.



This means comprehensive human intelligence, being given a boost with cutting edge weaponized surveillance technologies. 

What all Targeted Individuals' need to realize is, part of the Terrorist's success has been their ability to OBSTRUCT JUSTICE. 

HERE ARE SOME OF THE WAYS THESE STATE AND CORPORATE SPONSORED TERRORIST HAVE DEPLOYED IT:

Warrantless wiretapping

use of audio and video surveillance,

use of cutting Edge, National and Homeland Security experimental, and developed Cyber and Telecommunication hacking, monitoring, and shadowing devices or software.

human intelligence spying,

EXPERIMENTAL,

NON LETHAL CROWD CONTROL WEAPONS - direct energy,. non kinetic/non lethal weapons that harness the electromagnetic spectrum, IN ORDER TO ALTER BIOLOGICAL FUNCTIONS - for the purpose of mass crowd control.

use of EXPERIMENTAL cognitive nano/neuro Science and Technologies, to coercively force various behavioral modifications, for the sole purpose of forcibly eliciting negative neurological and/or biological responses out of the Targeted Individual.  It is also used as a form of enhanced interrogation, input of negative imagery, and words, used to falsely extract information, and impair cognitive neurological and/or biological function. 

This is done by firing a trans-cranial magnetic stimulation (TMS), through the targeted individual's skull, into specific regions and neurons in their brain, in order to disrupt, disorient, alter, change, and scramble those neurons in the defenseless target's human brain. For the purpose of seeing what the negative neurological and/or biological effects and reactions the Targeted Individual may have. 

The majority of said Targeting, is done. when the TARGET is SLEEPING via the use of Microwave or Synthetic Telepathy- placing them in a hyper-sensitive state, making them more susceptible but defenseless to the myriad of firing that is taking place in the illegal use of these Weaponized Technologies.  Thus, forcing the defenseless human brain of the non consenting targeted individual to be jammed with any number negative command and triggers.  Similar to hypnosis' - only used to DESTROY the HUMAN LIFE of the TARGETED INDIVIDUAL - HENCE, THE TERM - CONTRACT KILLING -

By firing these Weaponized Technologies at an unarmed, defenseless Human Target - they have found they can coercively force, an involuntary negative neurological and/or biological reaction out of their HUMAN GUINEA PIGS also known as the Non Consenting Targeted Individual, in several non consenting experimental protocols.

 These forced, involuntary negative reactions via the weaponized firing to the neurology and/or biology of the Targeted Individual by Defense technologies, upon a non consenting target is then used to further demonize, character assassinate, set up, and/or be used as a premeditated justification to others why THEIR EXPERIMENTS must continue. 

As opposed to the LITERAL TRUTH, and full on knowledge that these Terrorist from Defense found out, if you weaponize Nano/Neuroscience and/or use Direct Energy Non Kinetic/Non Lethal Weapons they can LITERALLY BE USED FOR MASS SUBJUGATION.  As such, their crusade to develop within this 21st Century Arms Race, has led them to illegally, further poison the Fruit of the Poisonous Tree doctrine, against law abiding, non violent, defenseless Targeted Individual's.



be it a phone conversation to an attorney, a congressional leader, a federal agency, non government organization - such as making a prior appointment, looking up a number on theienc internet, or sending a complaint via email - these are all having prior knowledge to the moves the law abiding Target is making.

Some examples of what is done:

Your private email account is programmed to appear to be SPAM, since most people have SPAM guards, they will never receive your email. 

If, you send an email, due to their cyber capabilities, they will actually hold in coming and outgoing email before they reach their destination.  the held outgoing emails, could be deleted altogether, or altered before they reach their legal destination, any alteration to these original documents would appear to give the false impression of what the target is trying to say, or to demonize, and character assassinate the targeted individual even more.

Even, hand carried documents to federal and other agencies appear to be BLOCKED by the person at the front desk, or the person you deliver it to - via prior CONTACT by these State and Corporate sponsored Terrorist's -

Much of this appears to be done via their access to a virus worm called STUXNET - whereby, they have shadowing capabilities on your computer, and much of the time - your documents will either be deleted off your desktop or else - documents will be altered, or scrambled.   Thus, they can see whatever you are doing on your desktop, but more insidiously, they can actually - alter data or destroy data, stop emails from being delivered, or before they are delivered to their proper legal destination, they have long since been altered. - as such - you are the victim of SEVERE CYBER TERRORISM.

If, the Targeted Individual sustains an Direct Energy Non Kinetic Electromagnetic Firing from a myraid of Crowd Control Military Grade weapons for the purpose of non consenting experimentation to illegally research the neurological and biological effects of said Crowd Control Non Lethal weaponry. 

In addition to the use of Cognitive Neurotechnologies which can be controlled via wireless access - these Terrorist's will send a Trans or Intra-cranial Magnetic Stimulation, through the Targeted Individual's skull, into a specific region of their brain, in order to literally scramble the neurons in that region, for the purpose of forced alterations to the brain functions.  This in turn causes various neurological and biological effect from increasing anxiety, anger, aggression, terror - and this is done in a premeditated fashion in order to further Victimize the Targeted Individual.  (see neuroscience non consenting human experimentation)



- when this is done - it will forcibly elicit a human responseisrupt the neurons in that region of the brain, in order to impair neurological functions:  Hence, to increase aggression, cause anger, anxiety, terror - and then uses any of the negative neurological and biological effects as a WEAPON to further demonize the Targeted Individual.  What is NEVER SAID, is the literal fact that these Terrorist Architect's are FULLY AWARE they are doing this, and know there will be a coercively forced negative effect,. which then is used to provide the perfect lies and excuses to JUSTIFY continued ILLEGAL, NON CONSENTING HUMAN EXPERIMENTATION. 


The bottom line is due to these cutting edge Department of Defense, surveillance, video, audio, cyber and telecommunication capabilities,
these terrorist with prior knowledge will in fact use it, abuse it, and then turn around and crusade to OBSTRUCT the Targeted individuals from gaining access to their rights, and request to legitimate legal council.  

By illegally, MONITORING, SPYING, HACKING, SHADOWING, STALKING, USING VIDEO and/or ACOUSTIC SURVEILLANCE to obtain Private information and/or listen in to private conversations the law abiding Targeted Individual is having, while they are in the privacy of their home, vehicle, via their communication methods, be it by landlines, cell phone or internet - the TERRORIST'S are LITERALLY given prior information, which is used in a premeditated manner to: SABOTAGE, BRIBE, PROVIDE FALSE WITNESS to the Person or Person's the Target may be attempting to get in contact with in order to find a LEGAL REMEDY to the TERRORISM being inflicted upon their lives.  

Thus, these Terrorist's are in a premeditated manner, due to prior stolen information: IMPEDING, INTERFERING WITH, and OBSTRUCTING the judicial process for the Targeted Individual.  Which then becomes full blown premeditated deprivation of rights under the color of law. 

 


OBSTRUCT of JUSTICE - the Terrorist's Teams must first CONSPIRE with others, lie to others, bribe others. intimidate or blackmail others to PARTICIPATE - from this point, what you get is a CONSPIRACY TO COMMIT, AND A CONSPIRACY TO OBSTRUCT - 

The following is a definition of CONSPIRACY TO COMMIT CRIMES....

http://www.lacriminaldefenseattorney.com/conspiracy.html

A conspiracy is an agreement by two or more persons (each referred to as a conspirator or co-conspirator) to commit a crime. Conspiracy is commonly referred to as a “partnership in crime.” Conspiracy is a separate offense from the one it is formed to accomplish, and is punished as a separate crime. Conspiracy                        is a crime even if the planned acts were never completed. Conspiracy charges may be filed in federal court, which may result in a harsher penalty, or a state court.

A member of a conspiracy is criminally responsible for all of the crimes committed by the co-conspiratorsthat occur within the scope and in furtherance of the conspiracy, regardless of whether he or she assisted in the commission of the crimes or was even aware of the crimes.

Obstruction of justice is an attempt to interfere with the administration of the courts, the judicial system or law enforcement officers. It may include tampering with or intimidating, hiding evidence or interfering with an arrest. It is something a person does to impede the administration of a court process or proper discharge of a legal duty. Interference may be with the work of police, investigators, regulatory agencies, prosecutors, or other (usually government) officials. Often, no actual investigation or substantiated suspicion of a specific incident need exist to support a charge of obstruction of justice. Such activity is a crime.

The crime of threatening a witness in federal cases is defined by statute at 18 U.S.C. § 1512, "Tampering with a witness, victim, or an informant". The punishment for such an offense is up to 20 years if physical force was used or attempted, and up to 10 years if physical force was only threatened.

COGNITIVE NEUROSCIENCE/ NEUROTECHNOLOGIES - AND ENHANCED INTERROGATION -

WELCOME TO THE AGE OF PRE-CRIME - BUT MORE IMPORTANTLY - FABRICATED INFORMATION USED TO SET UP - INNOCENT PEOPLE - CAN THIS BE DONE - THERE ARE TENS OF THOUSANDS OF GLOBAL LAW ABIDING TARGETED INDIVIDUALS WHO HAVE COME FOWARD TO PROPER AURTHORITIES - SET UP BY THE ILLEGAL USED OF EXPERIMENTAL COGNITIVE NEUROTECHNOLOGIES - AND COGNITIVE NANO-TECHNOLOGIES -

APPEARS TO HAVE STARTED WITH IMPLANTED DEVICES - HAS MOVED TO NANO= SCALE DEVICE WHICH MAKES IT VIRTUALLY IMPOSSIBLE TO DETECT -

ENHANCED INTERROGATION - Harsh interrogation techniques authorized by top officials of the CIA have led to questionable confessions and the death of a detainee since the techniques were first authorized in mid-March 2002

1. The Attention Grab: The interrogator forcefully grabs the shirt front of the prisoner and shakes him.

2. Attention Slap: An open-handed slap aimed at causing pain and triggering fear.

3. The Belly Slap: A hard open-handed slap to the stomach. The aim is to cause pain, but not internal injury. Doctors consulted advised against using a punch, which could cause lasting internal damage.

4. Long Time Standing: This technique is described as among the most effective. Prisoners are forced to stand, handcuffed and with their feet shackled to an eye bolt in the floor for more than 40 hours. Exhaustion and sleep deprivation are effective in yielding confessions.

5. The Cold Cell: The prisoner is left to stand naked in a cell kept near 50 degrees. Throughout the time in the cell the prisoner is doused with cold water.

6. Water Boarding: The prisoner is bound to an inclined board, feet raised and head slightly below the feet. Cellophane is wrapped over the prisoner's face and water is poured over him. Unavoidably, the gag reflex kicks in and a terrifying fear of drowning leads to almost instant pleas to bring the treatment to a halt.

Fruit of Poisonous Tree Doctrine

The Fruit of the Poisonous Tree doctrine (also known as the Derivative Evidence Doctrine) is a rule in criminal law that makes evidence that was derived from an illegal search, arrest or interrogation inadmissible. In other words, the evidence (the “fruit”) was tainted due to it coming from the illegal search and seizure (the “poisonous tree”). Under this doctrine, not only must illegally obtained evidence be excluded, but also all evidence obtained or derived from exploitation of that evidence. The courts deem such evidence tainted fruit of the poisonous tree. The origin of this doctrine is found in the landmark Supreme Court case, Wong Sun v. United States, 371 U.S. 471 (1963).

The Fruit of the Poisonous Tree doctrine



In the latest Huffington Post UK article it goes way beyond simply phone hacking, into what is big business of data mining and human stalking in order to obtain private and personal information about an individual which there is no telling what nefarious, illegal, and/or negative protocols will be designed in order to further victimize the Targeted person.

THIS ARTICLE CONFIRMS FOR ALL TARGETED INDIVUALS - THAT IN FACT AND FOR YEARS - THESE STATE AND CORPORATE - WHORES - WERE STEALING PRIVATE DATA - AND THEN TURING AROUND AFTER DESIGNING A PROFILE OF THE TARGET - AND THEN SELLING THESE LIES - FOR PROFIT. 

could do what they wanted.  In the case of law abiding, non violent, innocent Targeted Individual's who have come forward to proper authorities - it appears the information obtained was used set the targeted individual up, character and credibility assassinate, basically. if someone was willing to pay for the TARGETED HIT - these ILLEGAL SURVEILLANCE AND HACKING INFORMATION - would be RE-DESGINED AND REVERSE ENGINEERED in order to DESTROY THE TARGETED INDIVIDUAL.  What this article does is ENCAPSULATE the TRUTH about what has been taking place for years at the highest levels of both Government and Corporate corruption. 

 what all Target's who have written, spoken to via phone or in person have outlined, only to be LABELED and then TURNED AWAY

Heather Brooke: Data Dealing Is A Bigger Scandal Than Phone Hacking.  Dina Rickman

http://www.huffingtonpost.co.uk/2011/08/17/heather-brooke-data-deali_n_928985.html


There appears to be an aggressive Covert and Illegal Profiling using cutting edge cyber, telecommunication, surveillance equipment, and human intelligence via organized stalking for the purpose of Extensive Profiling of the Targeted Individual.  Once this profiling is complete, a Protocol is designed in negative false light, and half truths about the Targeted Individual in what can only be considered Defamation of Character. 

 RECRUITMENT, TRAINING, AND EXPERIMENTATION PROTOCOL taking place, and that Targeted Individuals who are in whole or in part are Older, Law Abiding, Non Violent, and mainly Unarmed.  That the very fact that Target

When I was fleeing Los Angeles, CA in terror to the aggressive crusade to Stalk, Mob, Crowd, have training sessions in electronic warfare deployed upon and against my cyber, telecommunication, electronic and electrical devices, in addition to not knowing there were names for some of the cutting edge experimental Neurotechnologies, Biometrics and other non kinetic/non lethal direct energy weapons -


Thus, I had not been abandoned, but these two men chose not to participate with these State, Corporate, Educational, and Citizen Recruit Terrorist's.

The second statement is most profound, but it becomes Truth Incarnate.  These Terrorist's will strike out at every aspect of your life with the intent to MURDER YOU in the FIRST DEGREE.  And, as such, some Target's have not been able to withstand the levels of sheer and utter barbaric violence that has been inflicted upon and against their human lives. 

This is a reminder to ALL TARGETED INDIVIDUALS' who have come forward to proper authorities, and to the Targeted Individual Groups/Communities.  N0 MATTER WHAT, IF THE ULTIMATE ACTS OCCUR - AT EITHER HANDS - YOU MUST ALWAYS REMEMBER - IT IS MURDER IN THE FIRST DEGREE.

TO REITERATE HOW PERVASIVE THESE TYPE OF PRIVATE CORPORATIONS WHO WOULD LITERALLY SPY ON YOU IN ORDER TO OBTAIN AND OR USE FALSE DOCUMENTS TO DISCREDIT THE FOLLOWING INCIDENTS TOOK PLACE DUE TO HACKING OF A PRIVATE SECURITY FIRM WHO DESIGNS SET UP AND DISCREDITING AND CHARACTER ASSASSINATION PROTOCOLS FOR THEIR WELL PAYING CORPORATE CLIENTS.  WHAT YOU WILL ALSO FIND IS THAT THESE VERY SAME PRIVATE CYBER AND OTHER SECURITY AGENCIES ARE WELL FUNDED BY THEIR UNITED STATES GOVERNMENT CONTACTS AND THEN DECIDED TO DOUBLE DIP WITH THEIR ACCESS TO THESE WEAPONIZED SURIVELLANCE AND SPYING TECHNOLOGIES AS A MEANS TO GARNER BUSINESS FROM THE PRIVATE SECTOR IN ORDER TO DESTROY THEIR CLIENTS PERCEIVED ENEMIES.

http://www.wired.com/threatlevel/2011/02/spy/


http://www.dailykos.com/story/2011/02/15/944614/-HBGary,-Themis,-bloggers,-and-traditional-media:-What-a-tangled-Web

http://thinkprogress.org/economy/2011/02/10/143419/lobbyists-chamberleaks/




This is by and large the single most pervasive criminal violation that occurs once you are Targeted in either the Covert or Go Live, OVERT phase in the ORGANIZED TERRORIST STALKING Techniques.  This is done via cutting edge Military and National Security Grade capabilities in warantless wiretapping: of telecommunications and cyber/internet capabilities.  These Terrorist's Teams will use said cyber and telecommunication capabilities to track every move the Targeted Individual makes, as such, they will TAKE THE ILLEGALLY OBTAINED INFORMATION via these capabilities and then proceed in a PREMEDITATED manner, OBSTRUCT the Targeted Individual from obtaining proper legal council, law enforcement protection, and/or other agencies, designed to protect or assist in the egregious and heinous violation of fundamental rights and liberties under the color and rule of law which the Targeted Individual continues to be deprived of. 

Thus, by being given access to military and national security grade weaponized spying tools, these Terrorist's have in fact, taken any and all information, to include tampering with documents, and then turning around and using it to further Obstruct, Exploit, Victimize, Set Up, and/or Entrap the Innocent Target. 

It is also used to find out if the Target will make an appointment with an Attorney, Law Enforcement, Non Government Constitutional Rights, and/or Civil Right Agencies - and then design a protocol to OBSTRUCT, if not SMEAR, and CHARACTER ASSASSINATE the Targeted Individual before they ARRIVE at said APPOINTMENTS, and have thoroughly been demonized in the Eyes of these Agencies, who therefore, have PRE-JUDGED without DUE PROCESS the Targeted Individual, before they are allowed to STATE THEIR CASES of CONCERN from such CRIMINAL TERRORIST ACTIVITIES.   as such, these agencies will LITERALLY TURN these TARGETED VICTIMS away, using some pre-judged notion that the Target is somehow making the entire crimes eing committed against them UP.

Thus, a DOUBLE - FORM OF OBSTRUCTION OF JUSTICE.....

Thus, Targeted Individual's are NOT being treated in an EQUAL manner within a civilized society that states they are required to do so by law.  Since, Targeted Individual's are now a GROUP of PEOPLE within society who have come together to Speak Out, about their similar and/or exact methodologies of Targeting, and who have made numerous attempts in writing, in person, and/or by phone to ALL Government and NON Government agencies, be they local, state, federal, private, alike who instead of protecting the Targeted Individual in an equal, unbiased, non discriminatory manner, chose DENY and OBSTRUCT this GROUP of their fundamental rights and liberties.


By these Terrorist's having access and ability to use these cutting edge military and national security grade weaponized cyber and telecom capabilities, it give these Terrorist's prior knowledge of what the Target is planning to do, in the case of the Law Abiding Targeted Individual's, 99% of what they do is to SEEK HELP from the JUSTICE SYSTEM in ALL ITS FORMS in order to obtain PROTECTION from these type of insidiously violent acts of criminal terrorism being inflicted upon and against their lives - without due process, and in full denial of their basic and fundamental rights and liberties under the color of law.

denial of that Target's fundamental rights and liberties guaranteed to all citizen in an equal, unbiased, and in a premeditated, and EXTREME PREJUDICIAL manner, which then become DISCRIMINATION based upon the FALSE PERCEPTION being sold to either the citizen's of the Target;s community, or else the legal and justice system of that targets community/city. 

GROUP of INDIVIDUAL'S sharing the SAME CRIMINAL ATTACKS against person and property.

Therefore, what happens in almost, if not all cases of being the TARGETED VICTIM of warrantless cyber and telecommunication tapping, and surveillance by these State, Corporate, Educational and Citizen sponsored Terrorist's - you will find that they abuse their positions of power and access to these State and Corporate cutting edge technologies, in order to either OBSTRUCT the Targeted Individual from OBTAINING their legal and CONSTITUTIONAL RIGHTS to due process, in addition, to using information obtained, which is then shared with, broadcast, to include ALTERATION of DOCUMENTS in order to further VICTIMIZE the Target in the EYES of those WHO IN FACT - should be PROTECTING rights and liberties of said Targeted individuals. 

Due to the nature of these illegal, cutting edge US Military and National Security Cyber, Telecom, and other Surveillance capabilities that harness the electromagnetic spectrum, in a warrantless manner, in denial of the Target/s due process also become Premeditated due illegally obtaining prior information from what the Targeted Individual is doing in their attempt for criminal justice at their Targeting -

Therefore, it is not just OBSTRUCTION OF JUSTICE, but becomes a FULL BLOWN WEAPONS SYSTEM of MASS DESTRUCTION upon, and against the innocent, law abiding, unarmed, Targeted Individual's entire living life - in DENIAL OF THAT TARGET/S RIGHTS AND LIBERTIES, so that these Rogue Terrorist groups can further expand, recruit, training, deploy and execute Terrorist Activities.



ċ
HOWTHECORPSDESTROYWHISTLEBLOWERS.zip
(316k)
aldamysteriosa1,
Dec 19, 2011, 1:36 PM
ċ
HUFFPOSTUKHeatherBrooke-DataDealingIsABiggerScandalThanPhoneHacking”.pdf”.zip
(181k)
aldamysteriosa1,
Dec 19, 2011, 1:37 PM
ċ
TEAMTHEMISProposalForTheChamber.pdf”-1.zip
(231k)
aldamysteriosa1,
Dec 19, 2011, 1:38 PM
ċ
TeamThemis_HWProposal_110310-1.zip
(1407k)
aldamysteriosa1,
Dec 19, 2011, 1:39 PM