Additional Source Link Will Provide you With All other Documented Information from my Website Published in 2011, You Tube Channel, and Live Talk/Chat Archived Recordings - Documenting these Tactical Operations:
https://plus.google.com/109434737843036763455/about
UPDATE -
18 August 2014: 11:27 PM PDT #1 HOUSE RULE - ABSOLUTELY NO OVERNIGHT GUESTS - Michael Hassan continue to have Overnight Guest - and this was actually an accident. I was going out to document that Michael and His Female Guest had Entered the Exterior Security Door and Left it Wide Open - Upon going back to my room - I LUCKED OUT - HIS FEMALE GUEST WAS EXITING the BATHROOM -
UPDATE -
01 August 2014: 11:09 PM PDT - Michael Hassan REFUSES to CLOSE EXTERIOR SECURITY DOOR -
Another NIGHT - Same Culprit, only this time his FACE is Caught full on Video. None other than the Resident Provocateur Michael - you know the same Male Resident that has Physically Assaulted me, LAPD Omitted to place this Culprits name on the Yellow Call Receipt - while the Property Owner and Rental Agent Retaliate against me the Victim, oh, and by the way, I received NOTICE as a RETALIATION that My RENT IS GOING UP - . But ... then again, THIS DOMESTIC TERRORIST COMMUNITY of STREET TERRORISM - ALWAYS, COVERS EACH OTHERS CRIMINAL ACTIVITIES.
This is a TIMELINE in a week and four days in the Life of a Targeted Individual, and the Constant Residential and Community Street Terrorism that Transpires.
These Tactics are conducted by Property Owner, Resident's, Recruited Strangers, and the Pervasive Nature of Retaliation and Harassment that Transpires in a Conspiracy to Commit for the purpose of Reckless Disregard, Reckless Endangerment, 1st Degree Provocation, Harassment, Intimidation, and Terror.
Received Written Notice from Property Owner, Song Cha Choe that my RENT would be INCREASING starting September 1, 2014. RETALIATION? Although provided adequate written notice, this Property Owner, along with the shyster lawyers for this Domestic Terrorist Organization, are attempting to get another Signed Document, which will NOT be happening.
ALSO NOTE: On 21 July 2014 at approximately 23:00 PM PDT - It was necessary to telephone the Los Angeles Police Department because Resident Provocateur Michael Hassan, seen going into his room, after leaving the Exterior Security Door Open, decided he had the right to physically shove me out the exterior doorway because I was not moving fast enough. This was the Third Incident where this male resident felt he had the right to physically attack and assault me, and the final time I was going to stand for it.
Upon contacting the Rental Agent Keith Kim, he immediately stated I was the person who was doing the provoking, and that he was seeking to have me Evicted from this residence.
What the above 31 July 2014 Video will show is my finally catching the Culprit who continues to leave that Exterior Security Door Wide Open, so that when I come out of my room, I am forced to close it over, and over, during the course of any given evening after it is shut for the night. What this shows is how Residential Harassment and Provocation transpires - only this time, the CULPRIT and REAL PROVOCATEUR is CAUGHT.
Treasure Map is anything but harmless entertainment. Rather, it is the
mandate for a massive raid on the digital world. It aims to map the
Internet, and not just the large traffic channels, such as
telecommunications cables. It also seeks to identify the devices across
which our data flows, so-called routers.
Video of the German Telecommunication Engineers' and their SHOCK at realizing they have been TARGETED by the NSA/GCHS
A. Cisco
®
NAC Guest Server enables organizations to deploy guest network access
on Cisco NAC appliances or Cisco wireless LAN controllers by unifying
the creation of guest accounts with provisioning in the network and
adding full reporting capabilities to a guest network deployment. It
facilitates the creation of guest accounts by permitting any designated
internal user to sponsor a guest and create the account for them in a
simple and secure manner. In addition, the whole process is recorded in a
single place and stored for later reporting, including details of the
guest accessing the network.
Q. Why should I care about Cisco NAC Guest Server?
A. Cisco NAC Guest Server reduces
the complexity and cost of deploying guest access within your
environment. It ties together creation, provisioning, and reporting of
guest user accounts to deliver an easy-to-use system. In addition, Cisco
NAC Guest Server enables you to take control of the security and audit
requirements that relate to providing guest access.
Q. What are the business benefits of Cisco NAC Guest Server?
A. The business benefits of Cisco NAC Guest Server include:
• Increasing productivity and partner/customer satisfaction by providing guest access
• Simplifying the task of provisioning guest accounts, leading to increased usage
• Saving money by making it possible for sponsors to create guest accounts
• Meeting the audit requirements associated with guest access
• Enabling an additional layer of policy-based security, if desired
• Providing a consistent WHAT SERVER ARE THESE DOMESTIC, CYBER, and BIOLOGICAL TECHNOLOGICAL TERRORIST ACCESSING?
The following videos and information will better explain the process by which the Civilian Domestic and Biological-Technological Terrorist Organization are ACCESSING, via some changing Web Address/Site into a Dedicated SERVER (Comcast/Xfinity) that is HOUSING both ELECTRONIC WARFARE, Computer Network Exploitation and Computer Network Attacks against my Electronics, Cell Phone, Appliances, etc.
and the BIOMETRIC Data, via Subcutaneous/Implanted Sensor Devices inside my human biology, that is feeding into a Close Range Biometric Base Station.
Hence the Term Passive (reads out data) and Active (input of alterations to subcutaneous implanted device)
This can also be applied to the CTX4000 which is a Continuous Radar Waveform Device that emits continuous radar waves in order to communicate with Ant-Chips that are placed in electronic devices. Thus the Passive (reads out information) - Active (allows for alterations to transpire)
WHERE ARE THE SERVERS? At one or more of the Following Sites, funded in whole or in part by the Department of Energy - i.e. or some Military Installation - the KEY is to Find Out who the Service Provider is - in the case of the Location where the following Dep of Energy Labs are - the Key Service Provider is Comcast/Xfinity.
Los Alamos National Labs, Sandia National Labs, Lawrence Livermore National Labs -
ALL OF THIS PERTAINS TO WHAT IS KNOWN AS THE 21ST CENTURY ARMS RACE - Direct Energy, Domination of the Electromagnetic Spectrum, be they communications, to internet, to the planetary surveillance, to Direct Energy, Non Kinetic/Less Lethal Anti-Personnel Weapons i.e. Crowd Control Weapons - Active Denial, LRAD, Acoustic Weapons, Microwave, all the way to the MOST IMPORTANT - COGNITIVE NEUROTECHNOLOGIES - the ABILITY TO DISRUPT, DISORGANIZE, IMPAIR. ALTER, INCAPACITATE - COGNITIVE, MOTOR, CENTRAL NERVOUS SYSTEM, and/or BEHAVIORAL FUNCTIONS -
In addition - Instead of it being a Wireless Subcutaneous Biological-Technological Implant inside the human biology - Think of them as Wireless Chips/Spyware criminally implanted into your Electronics, Appliances, etc. and the Base Station being a close range Wireless Reader with Passive (Feeds Out Info) and Active (Can Send Changes to) i.e. CTX4000 - but the SERVER always remains the Hub, and where the Physician's computer Becomes the NSA/GCHQ OPERATOR/s.
Although this is showing an Implanted Pacemaker, it provides so far the BEST VISUAL into how these Biological Technological Weapons of Mass Destruction are being Abusively Utilized by this Civilian Domestic Terrorist Organization -
In this location, they are utilizing a CISCO GUEST SERVER, at an External Location - that appears to be Housed at the Department of Energy, or a Military Facility - whereby, Recruited Civilian's are provided Password Access in order to Bring up the Below photo . The above Video will show what transpired at this residential location, when this print of the CISCO Guest Server, too Command and Control over 901 / 903 S. Catalina's - Time Warner Cable Modem, and WiFi Router that feeds a (2) Room Building. And BLOCKED anyone in the Building from Accessing the Internet - to include via WiFi Router, that is how Powerful this Guest Access/Server was.
Upon Logging in through this Guest Server, via Internet Access, be it desktop, laptop, iPads, to PDA/Cell Phones - the Following Type of Screen Must Populate, and Pinpoint Biological and Neurological Targeting via some type of Crosshair Capability is then Targeted, upon hitting Enter or Send - it Feeds it back through the Server, into the Biometric Close Range Base Station, which then sends that Alteration or Targeted hit to the Criminally and Illegally Implanted Sensors - littered throughout a Targets human biology and neurology.
I venture to Guess the Screen that Populates for these
Civilian Domestic Terrorist's will be less complicated, and more
animated, so as to provide the "world of cartoons" as opposed to the
reality that they are blasting someone else's human biology with charges
of Electromagnetic Energy, and Electrocuting another human being. The
below photo is an early version of the Department of Defenses advances
in Nano-Networked Medicine for Field Operations, and provides real time
computational biometric data for a soldier in the field of battle.
These Civilian, Radicalized Extremists' from this Domestic Terrorist
Organization, are simply looking at an animated version, where they can
TARGET, AIM, PINPOINT, and FIRE - The Real information is based on the
linked article and this screen photo of what they are REALLY DOING. At
the EXPENSE, TORTURE and DEATHS of Human Scapegoated Targets.
28 July 2014 : 15:58 PM PDT Started Documenting the constant Signal Jamming and Tampering
ELECTRONIC WARFARE continues via Computer Network Exploitation and Computer Network Attacks. Today, was constant signal jamming, backdoor tampering with desktop files, opening programs, and logging me out of my Google Accounts -
Being a Targeted Individual, who has sustained massive Biological-Technological Targeting, and from a Preliminary RF Scan Emits a RF Signal coming from my human biology - This cluster of lightening struck victims was more about Activating these Bio-Technologies and this cluster turning into Live Wireless Antennas.
The following article is of significance and possible importance due
to the number and nature of what transpired when a freak, short
lightening storm rolled into Southern California, to include Venice
Beach, CA and Catalina Island.
A man in his 20s was killed after lightning struck 13 people Sunday at Venice Beach in Southern California, according to news reports.
Los
Angeles Fire Department spokeswoman Katherine Main told The Washington
Post that during a thunderstorm witnesses heard a loud thunder clap and
saw lightning strike Venice Beach.
People who were there said, “It sounded like a sonic boom” and “The whole place shook.” One said, “We got zapped” and another claimed, “My hair was standing up.” ...
Due to the "CLUSTER"
of victims' it immediately Red Flagged me that there was more to this
than just, some random freak accident. This was more like turning
passive bio-technology, into Passive/Active Bio-Technology and these
individual's becoming what I call Live Wired Antennas.
Passive
RFID Technology means it only feeds out information, similar to the BAR
CODES they Scan at the Market or Retail Store. That Bar Code is read
by the scanner that picks up on this form of technology and provides the
input data information i.e. Price, Item Description.
When
the Technology is also Active, it can Input Data Back Into - If there
are Bio-Technologies that have been placed Subcutaneous i.e. Implanted
below the skin surface, or other Bio-Technological Implants, generally
in the Neck Up i.e. Cranial/Brain and Central Nervous System that are
both Passive and Active and run off of Wireless Radio Frequencies, then
the Individual becomes what is known as an ANTENNA wherby, the
Wireless/Radio Frequency Electromagnetic Signals can be TRIANGULATED
thus allowing for GPS Location Tracking, or in the case of myself
Biological-Technological Targeting. YOU ARE BASICALLY A LIVING ANTENNA -
These Victim on
the Beach - may have Unknowing Passive Technology, that was activated, to see what would happen to this Cluster on the beach, and thus these people became Live
Wireless Antennas, which Lightening seeks out, finds, then strikes at,
and are what has been referred to as - NON SYMPTOMATIC - they have no
knowledge, and brush off any biological anomalies to something else.
Whereas, Targeted Individual's like myself are Symptomatic, and are able
to Pick Up on the Radio Frequency Electromagnetic Fields being
Generated to Target, either electronics or the Target's human Biology
and Neurology, and can Feel when they are being utilized.
ONE OF THE MOST CRITICAL THINGS NOW IS FOR MEDICAL EXAMINERS TO ISOLATE THE POINTS OF ENTRY because those location, if my Theory is correct, will be where possible subcutaneous devices are implanted.
What is odd is that on Friday, 25 July 2014 - I posted pictures of being "Zapped" and the biological damages sustained due to this constant targeting. (SCROLL DOWN for Photos of Damage to foot, ankle, legs, and Point of Entry. When a person is electrocuted, there is usually a making of what is known as the Point of Entry.
The following article, and the posting of a You Tube Video from 22 July 2014 - are not just the theoretical, and sometimes practicum of what is concerning these U.S. Lawyers - but My video will show just how much there is to worry about.
The first two areas I went to after the 2006, GO LIVE! Overt In Your Face Targeting transpired to let me know in no uncertain terms that I was the subject of Overt Targeting - which actually has a name based on the Top Secret Snowden Leaks, which refers to this process as, "BLITZING" someone, and to date in the year 2014 - I continue as a citizen who resides in a Civilized Society, that is Governed by a Constitution and the Rule of Law - These are the areas one would seek out in order to STOP the Insidious violence being inflicted upon every aspect of my human living life.
1. Contact Law Enforcement at the Local, State, and Federal Levels
2. Contact Lawyers
3. Contact Non Government Civil Rights and Constitutional Organizations
Today, covered reports about both Journalists and Attorney's Concerns about the NSA SPYING, this one begins to focus on Lawyers, and the Sheer Compromises to Attorney's when INSIDER INFORMATION is obtained, in order to Sabotage, Disrupt, or Gain Information to assist the other side in how to Usurp an Lawyer's ability to Represent their Client/s.
Many American attorneys are spooked by the U.S. government’s mass surveillance programs, a new report says.
Human Rights Watch and the American Civil Liberties Union compiled the report, titled "With Liberty to Monitor All,"
to document how National Security Agency programs exposed by exiled
whistleblower Edward Snowden impact journalists and lawyers.
“The
legal community, perhaps even more so than the media, is plagued by
uncertainty and confusion over the implications for their work of
surveillance of the scope revealed during the last year,” the report
says.
Attorneys interviewed for the report are largely “feeling frustrated,”
and there’s an apparent “erosion of the right to counsel,” researcher
Alex Sinha, a fellow at Human Rights Watch and the ACLU, said Monday at
the National Press Club.
On, 22 JULY 2014, I was able to obtain some Proof in reference to just how pervasive this Obstruction and Sabotage can be. When a Potential Client i.e. ME - is near STOPPED at the very point of Contact, by way of being told... "Unfortunately, we don't have any Civil Rights Attorney's" -
This is in line with an Attorney who is Targeted, who recently explained how his Practice was completely sabotaged, by way of non receipt of information, information not reaching their destination, clients calls not being received, or information not reaching the clients. Court Dates and Times being changed, etc.
I explained that from my point as the Client who is Targeted, was unable after having a person to person meeting with this solo Attorney, who stated he would take on my case, and how I was Stopped from being able to communicate with this Attorney after that initial meeting.
I would call, leave messages, send documentation to this Attorney and never hear back. It was by the stroke of luck, that this Attorney on his own one day, decided to call me and ask why I had stopped contacting his office or returning his calls. I explained that I was calling his office constantly and leaving messages. After that ALL CONTACT was LITERALLY STOPPED - Not because this Attorney or I the Client would not have worked together, but because the Communications were STOPPED - With NSA Capabilities I am sure my Cell Number went into NSA Pre-Recorded Voice Mail or some Pre-Recorded this Number was No Longer In Service - When I telephoned the Attorney, I was usually dumped into his voice mail, or when I got through to a live body, that information was not being forwarded.
The point being - Obstruction of the Due Process of Law by way of NSA Insider Interference, that can literally STOP YOU from moving forward. The above recording is a PERFECT Example of the Point of Contact - and how from that point, much is and has been STOPPED.
Therefore, you do not need the CEO, etc. You just need his/her Assistant, the Secretary, the Bank Teller, the Receptionist, the Customer Service Representative that can Access Your Account, the Store Clerk, the Building Maintenance, the Postal Worker, the Delivery Person, etc. Once these people are Compromised they have Access to where a Target is not allowed to get past, and even when they are fortunate enough to get past this first line of Networked Civilian Sleeper Cells - you are only transferred to the Next Level of Compromised Civilian Sleeper Cells. Or, placed into the Voice Mail that is never heard because it is simply a HI-JACKED Voice Mail, that FoxAcid Server Transfers you To.
UPDATE BELOW VIDEOS TO INCLUDE TARGETED INDIVIDUAL KEN BAKER SHOT ON ANAHEIM FREEWAY BY PERP - AND RESIDENTS AT 901 S. CATALINA, LOS ANGELES, CA - CONTINUE TO LEAVE EXTERIOR SECURITY DOOR WIDE OPEN -
July 28, 2014:
THE MOST IMPORTANT ASPECT - THE PROPERTY OWNER SONG CHA CHOE - ALWAYS HAD THE EXTERIOR DOOR KEY - but INSTEAD of Making (5) Copies for the resident's who rent rooms in this section -
ALL OF THIS WAS ALLOWED TO TRANSPIRE -
but it truly shows this pervasive nature of Organized Harassment in the form of RESIDENTIAL and COMMUNITY STREET TERRORISM Tactics, Harassment - and HOW THE CONSPIRACY AGAINST MY RIGHTS UNFOLDED - From the Property Owner, to the Rental Agent, to those Residents' who have decided they want me out of the building.
In, January, 2014 due to security concerns, and even before - I had asked the Rental Agent Keith Kim and Property Owner that the Exterior Security Door needed to be Closed and Locked at Night. The only thing the Property Owner would do is post a sign stating that at night the Exterior Door should be closed -
What transpired was an argument between myself and another tenant on this side of the building by the name of Michael Hassan, who was then and continues now to PROVOKE the situation by refusing to close the Exterior Door -
January, 2014 due to someone continually Opening that Exterior Door EPISODE476-LA Perp Resident Michael PROVOKES Situation, THREATENS ME In this incident I notified both the Rental Agent and Property Owner that it was NOT Acceptable for anyone to Touch or Grab me, from which at that time the Rental Agent said maybe I should film this person in action. Who then denied or attempted to backtrack his statement because after the Bed Bug Incident, he as he stated on video he knew was filming, that he was NO LONGER ON MY SIDE. And, again it was about 1. $15 deduction from rent for the laundry I had to do due to the Bed Bug Spraying of my room 2. Wanted to Remove Box Spring where they found the Bed Bugs Suddenly turned into Eviction, Everyone in the Building wants you out of here, etc. (I have it recorded, to include Michael Hassan, interrupting this private conversation in my room and refusing to leave or back way from my door - from which i had to get up and close my room door because the rental agent refused to tell this tenant to back off ) THIS IS WHAT I HAVE HAD TO GO THROUGH - AND THE LITERAL THREATS LEVIED AGAINST ME, AND THE FALSE ACCUSATIONS - AND THE CONSPIRACY BETWEEN THE PROPERTY OWNER, RENTAL AGENT, AND VARIOUS RESIDENT WHO WANT ME OUT OF THIS BUILDING - AND BECOMES A CONSPIRACY OF FELONY HARASSMENT - HATE CRIMES -
The following videos will show a process of, Gross Negligence, Reckless Disregard, Reckless Endangerment, and the sheet Intimidating and Threatening Retaliation, in particular EVICTION - While NEVER addressing the Issue of Safety and Security - and allowing those Residents and Property Owner back in April, 2014 OUT OF THIS BUILDING (Motive)
From which something as far back as January, 2014 - Could have been resolved, by way of making (5) Key Copies for the (5) Rooms that are accessed by that Security Door.
And, today, it was Proven that the Property Owner Song Cha Choe, ALWAYS HAD A COPY OF THIS KEY, but refused to do anything, while I continued to Voice My Concerns.
06 AUGUST 2014 Resident Harassing and Terrorist Perps Continue to LEAVE EXTERIOR SECURITY DOOR WIDE OPEN
1st Degree Reckless Endangerment, Reckless Disregard, Criminal Negligence, and Provocation, along with a false belief that Los Angeles Police Department will continue to COVER their CRIMINAL HARASSING ACTIVITIES - but LAPD should scroll down to 01 August 2014 with Targeted Individual Kenneth Baker, who was SHOT by a Radicalized Extremist Perp, the same Network that is allowing the Residents at 901 S. Catalina, Los Angeles, CA to get away with Physical Assault by Resident Michael Hassan against me.
Also, even with the copy of the key, Resident Michael Hassan, along with other Residents' will continue to leave the door wide open, two examples in the last couple of days -
26 July 2014
11:00 AM PDT
UPDATE:
Targeting the HEART - in the same manner that you see the Internal Damages to the Veins in the leg from Target Specific Direct Energy Weapons Targeting - is the Exact same they can do to any given Biological Organ, or Region. Today, the Radicalized Extremist Domestic Terrorist with their Illegal and Criminal Access to these Biological-Technological Weapons are Targeting the HEART.
25 July 2014
These are recent photos of the Biological Damage
Sustained due to Direct Energy, Non Kinetic/Less Lethal Anti-Personnel Weaponry in the form of Direct Pulsed Electric Shocks (below see Point of Entry Damage, from Floor Shocks and Electrocutions), to Full Body Electrocutions, and Directed Electromagnetic Pulsed Blasts. This Targeting is Specific to feet, Ankles, Legs, and Inner Thigh Arteries.
One of the very, very few Assets I ever had were Slender
Legs, that were CLEAN, meaning no major scaring, protruding veins, varicose veins, etc.
But Clean Legs that did not require you to even wear nylons. It is Pure and Concentrated Sadistic Torture, Causes Excruciating Pain, and it has left me with a form of Mutilation and Maiming of what once were decent, nice legs.
In
the last couple years, and in particular this Koreatown Location at xxx
S. Catalina, Los Angeles, CA, the Sheer Sadistic Violence of Feet and
Leg Targeting, in particular Floor Electrocution, and Electric Shocks, on or pulsed through the Plantir Nerve or Nerve Root
Nerve Route
The tibial nerve branches off the sciatic nerve in the upper leg and goes behind the knee
to the inside ankle. The tibial nerve then goes through a tunnel and
divides into the calcaneal nerve and the medial and lateral plantar
nerves.
of
the Feet, which Travels all the way Up My Leg, it is Some of the most Excruciating Tortures that this Extremist Cult is allowed to Fire at a Target, and has been pervasive, and extensive.
These Photos
Represent the LITERAL VISUAL DAMAGE that IS NOW FULLY APPARENT - due to
the INDISCRIMINATE VIOLENCE that these CIVILIAN CULT DRIVEN DOMESTIC
TERRORIST EXTREMISTS' have been ALLOWED TO BLAST THROUGH MY HUMAN
BIOLOGY.
What this also shows is the FIRST DEGREE NATURE of
DELIBERATELY MUTILATING ANOTHER HUMAN BEING by these CIVILIAN EXTREMIST
CULT MEMBERS'.
This is what you call FELONY MAYHEM and TORTURE -
because EVERY SHOCK causes EXCRUCIATING PAIN and I SUSTAIN DAILY
RITUALISTIC TORTURES BY THESE TERRORIST'S who are PROVIDED ACCESS to
this DOD BIOLOGICAL-TECHNOLOGICAL WEAPONS SYSTEM.
*Think if this is what happens to the biology from floor electric shocks, and electromagnetic pulses to my legs, what type of internal damage is sustained when they are Targeting the Cranial and Central Nervous System? What about Internal Organs, Tissue, Cellular, and Molecular biological make up?
ALSO NOTE: Varicose Veins look Very, Very, Different . This is Biological Damage due to Floor Electric Shocks, and Direct Energy Electromagnetic Pulsed Shocks to feet, ankle, legs, and artery area.
RIGHT UPPER THIGH - from the KNEE Cap, to the INNER THIGH, and ARTERY
RIGHT BACK OF LEG/CALFS
RIGHT INNER ANKLE - SHOCKS FROM FLOOR - RED CIRCULAR BLOTCHES ARE THE POINT OF ENTRY
Inner Right Ankle, and Vein Protrusion, note Circular Red Blotches, These are the POINTS OF ENTRY- From Electric Shocks/Direct Energy Weapons Pulsed Blasts to Ankles and Feet -
LEFT UPPER THIGH - THIGH FROM KNEE CAP, TO INNER THIGH and ARTERY Vein Protrusions.
Not sure when something Happened to this MicroUSB Adapter, but on, 24 July 2014, doing my usual charging, I noticed that the Top portion on one side was missing. Later that evening, by sheer luck, I found the clipped or broken off part, and was able to snap it back on. The Keyword being Snap it back on, to appear seamless to it being broken.
Thus, it appears someone was in my room at some point when I was gone, and there was tampering with this MicroUSB Adapter.
I keep this cord hanging so it can be pulled, and the phone can be plugged in, and is out of the way of something like this happening
The attached photos, will show that it appears more like a strategic clipping or cutting in order to get inside the MicroUSB Adapter, then snap it back together so as not to be able to determine there was any compromise to the MicroUSB.
There are one of two reason for this to be so accurately cut -
1. Snapped off to damage ability to utilize
or
Based on the Top Secret Snowden Leaks there is an actual capability of implanting bugs into USB and other Electronics for Surveillance of these Items, without the Need to be connected to the Internet, etc. How the NSA Monitors Target Computers with Radar Wave Devices
Some Excerpts:
Germany’s Der Spiegel has published a couple of disturbing articles on the NSA surveillance activities. The media agency has focused its articles on the Advanced/Access Network Technology (ANT) division of the NSA’s Tailored Access Operations (TAO) elite hacker unit, and the capabilities of the division in the development of advanced tools to infiltrate practically every technology. Der Spiegel published an internal NSA catalog that offers spies backdoors into a wide range of equipment from major IT vendors. ... The catalog includes many tools and their prices, for example, a base station for fooling mobile networks and cell phones is $40,000, bugs disguised as USB plugs are $20,000, and there are also cheaper rigged monitor cables for spying on targets’ monitors. ... The tools belong to the ANGRYNEIGHBOR family of bugs. The series of bugs implemented as RF retro reflectors communicate with the use of an external radar wave generator such as CTX4000 or PHOTOANGLO. Appelbaum at the Chaos Communication Congress confirmed the existence of the device (CTX4000 or PHOTOANGLO), described as a portable continuous wave generator. He added that it’s remote controllable and works in combination with tiny electronic implants to bounce waves of energy off monitors, keyboards and printers to analyze what has been respectively viewed, typed and printed.
Attached is what Happened to my MicroUSB Adapter - because of the way it was broken off, it was more strategic than actually if it had been smashed, etc. This short video clip shows how it was snapped back on.
These are STILL Photos of the Actual Damage, but when Snapped back together you CANNOT tell there was any compromise to this Micro-USB Adapter. Like I said, had it not fallen off, and me being fortunate enough to find the pieces later in the evening, I would NEVER have known how VISUALLY SEAMLESS it can look.
THIS IS WHAT IT LOOKS LIKE ONCE SNAPPED BACK TOGETHER, YOU CANNOT TELL THERE WAS ANYTHING WRONG WITH THE MICRO USB.
As a victim of this State, Corporate, and Academia, Sponsored, Sanctioned, and Covered Up crimes that are taking place in Community, after Community, City, after City, and State, after State -
The CONNECTIONS are REAL and VALID.
The first REAL indication where there is A COLLABORATIVE NETWORK that are WORKING TOGETHER, was a fortuitous find that came from the LOS ANGELES DIVISION OF InfraGard -
Our Mission Statement We are a private sector
organization sharing information and intelligence and integrating assets
with local, state,and federal resources for the protection of our
nation's critical infrastructure.
Los Angeles is one of the largest InfraGard Alliance regions as it
represents the same seven counties as the FBI office out of which it
operates. Membership is organized into the Dept. of Homeland Security's
18 critical infrastructures. The L.A. region also includes three unique
sub-sectors:Education,Entertainment/Large Venues and Faith-Based
Venues.
So, that laid the groundwork to validate the criminal claims against all these sectors for being heavily involved at the Civilian Level in this entire Residential and Community Street Terrorism that is transpiring across this nation. InfrGard is but one of several of these type of agencies that are actively participating in the recruitment of the civilian population under FALSE FLAG Operations.
It outlines the WHO, and What Segments of the Target Audience's aka Civilian Population are being heavily recruited and indoctrinated, but where is the PROOF?
WELL, below is the Start of this Conspiracy and Collaboration amongst this State, Corporate, and Academia, Sponsored, Sanctioned, and Covered Up NETWORK, via this Civilian Sleeper Cell/Informant/Domestic Terrorist Radicalized Extremist Cult.
I GOT MY PROOF - based on a Battery Incident Against me by Resident Michael Hassan. This was the third time this male resident, who is a good foot taller than me, felt he could lay hands onto my person, and shoved me forcefully out of a shared doorway. Because it was the third incident, and both Rental Agent and Property Owner have not only failed to do anything about this, but have in point of fact Taken the side of this Abuser, and in this latest incident I was yet again, THREATENED by the Rental Agent with Eviction, or I should say HE WAS WORKING ON GETTING ME EVICTED.
Needless to say, I found out by a Clean Cop yesterday, that When an LAPD Officer is Called to the Scene of an Incident, they are supposed to leave a Yellow Copy Receipt. All I received was what you will see in the photos.
Today, I received the Yellow Receipt that I was supposed to have been provided by the Officer before he left the scene of the battery against me.
I also have a recording of the incident, and now I am glad that I do, because what is briefly written is not accurate, but most of all -The name of Michael the Resident who has repeatedly Lied, and Physically Assaulted me, is LEFT OFF the Original Yellow Copy of the Call to Location.
By leaving off the name of the Attacker/Assailant Michael Hassan -it begins to show that Local Law Enforcement has Compromised Officer's, who are a part of the NETWORK, and when called to the scene where they know a Targeted Victim is, much information may well be LEFT OFF these INITIAL REPORTS.
This was Provided to me by the Officer who took my information, and he provided the address to the Court House where I should go and obtain the Civil Harassment Restraining Order against this Resident.
It was Officer Kong, who stated that before I do that, I needed to Wait for the Detective to Interview both of us. I had already assessed Kong to possibly be compromised, but it was when he attempted to STOP me from going to get a Restraining Order against Michael, that I knew he was compromised.
This is the front of the LAPD Business Card Provided to me, with the names of the LAPD Officer's who came to the scene after I called them about the Battery/Physical Attack by Resident Michael Hassan - NOW EVEN MICHAEL'S LAST NAME IS TO BE QUESTIONED FOR ACCURACY.
What this establishes is that NOT ALL LAPD or Local, State or Federal Officers' are Compromised by this State/Corporate Domestic Terrorist Organization, but enough of them are, and this is why Target's have not been able to obtain justice. It only takes a few that are strategically placed. From the Person who answers the phone, from not getting your calls through, or patching them through to one of the compromised. I have stated, you do not need to have the Head of Anything i.e. the Mayor or City Council Member, Police Chief, etc necessarily, you only need those who have the ability to PASS INFO onto them. If, they STOP that process, then it stops the Targeted Victim's ability to get through and obtain and seek TRUE JUSTICE.
I spoke with an Attorney Target, who provided me with information about how his business was destroyed, because he was being sabotaged, to include NOT GETTING information about his clients, i.e. phone calls, etc. or his clients not getting his information - thus leaving his business thinking he was a total flake.
I explained to him, I totally understand, because I used to call an attorney who was willing to take on a case for me, and I would call everyday, asking to speak with him, but he would never call back. One day out of the blue, he was coming from court, and telephoned to ask why I had not called him. I explained that I was calling everyday. Thus, the LAWYER who is Targeted, is not receiving information from his clients, does not knows his clients have called, receipt of inaccurate court dates and times, etc. and the CLIENT who is Targeted is NOT having their information passed onto the Lawyer or the Lawyer's information passed onto them.
Just to explain how this Compromise Happens, on 24 July 2014, I telephoned the Department of Fair Employment and Housing (800) 884-1684, because of a long queue, they provide you with the option to have them call you, once your number in line is up. I dialed in my call back number, it was repeated back to me, I confirmed, and waited. I NEVER RECEIVED A CALL BACK.
The point being you do not need the heads of any company, retail outlet, store, office, Government Public Service, or Corporate setting or lead, you just need the person who answer the phone, the operator or intake service person, the person works in the mail room, delivers the packages, stocks the shelves, is the teller at a bank, the receptionist at a doctors office, does filing, is a customer service representative who can access your accounts -
And, this is where your CIVILIAN ARMY is coming from - for once they INFILTRATE, then Compromise every segment of society, and can be called upon, they can do MUCH DAMAGE.
I am not saying those in High Positions, are not Compromised or a Big Part of this Conspiracy Against Right, Subversion against this Nation and Constitution, because there are many who TRULY ARE, some of whom are a big part of the ARCHITECTURAL STRUCTURE behind the Cover Up and Targeting, but the everyday boots on the ground, where such compromises easily SUBVERT if not OBSTRUCT the Due Process of Law, only needs to be at a much lower level.
And, Remember this You Tube Posting from 22 July 2014 - I was told initially and immediately that there are no Civil Rights Attorney's in Los Angeles. I did leave a message for the Beverly Hills BAR Association, where I was placed in a voice mail box, from which I did leave a message. To Date, I have NOT RECEIVED a call back.
And, I am now using the term Compromised with this Corrupted Network. I utilized it while telephoning LAPD to obtain the report number for the incident on 21 July 2014 - I was immediately given the run around, after looking up my name, and SO, I, FINALLY STATED. (paraphrasing, but you will get the gist)
I will no longer speak to you, you are compromised, please get me a non compromised LAPD Officer to speak to, one who remembers they swore an oath of office. And, I repeated myself, I will not speak to you anymore, you are Compromised.
!! THIS STATE, CORPORATE and ACADEMIA, SPONSORED, SANCTIONED, AND COVERED UP NETWORK IS TRULY THE GREATEST THREAT TO NATIONAL SECURITY OUT THERE TODAY !!