2011
07.08

The SFC (System File Checker) program may run and report no errors in your system files.

The surveillance software is using a routine which hides all of the files involved with its program when any access is attempted, or you click on the folder to open it. This is usually immedaitely noticeable because in a folder where there are alot of hidden files, the hourglass will come up for a few seconds. If your anti-virus program never ends, consider that it may be continuing to chase the moving files until they stop moving (They won’t) or you shut down the scan or reboot. Leaving your system infected.

When System File Checker runs and find problems in your files which it cannot repair, you have to read a HUGE log file to find the notation of the file which it has detected is bad. You then have to find a clean copy of that file and replace it. OH and as soon as you leave the folder, the hide-and-seek program will overwrite it with the surveillance program”s version of the file.

Is Microsoft really keeping your computer secure when they have built in so many ways for their program files to be corrupted and hidden from you? And they have failed to provide any trustable method to obtain the file from their own site.

Another item that you definitely cannot trust… is anything marked with the word TRUST. Like TRUSTED INSTALLER. The designers of this software to protect your children from the bad guys on the internet have thrown your computer security out the window. One of the first things their installer does is install the routines to secretly corrupt the security that Microsoft has complicated beyond any reason. How about locking the files down and preventing them from beng corrupted? Is that such a crazy concept?

2011
07.08

It never hurts to pay attention to the updates coming from the WINDOWS UPDATE PROGRAM, or any of the automatic update programs.


You may notice increasing number of failures to install properly.
You may notice you are getting an update which was released months ago.
You may notice you are getting more frequent updates that one would normally expect.
You may not notice and trust the existing Security Software to protect you.

One of the first things the developers of surveillance programs do is to disable the functions of your security and anti-virus oprograms. The good news is you NEVER detect another virus again when it does a scan. The Bad News, the program has modified the security settings and the program is no longer scanning for anything when it goes through the files. This will open the door to every virus program affecting your machine. Should you notice any suspicious activity, you will think you are scanning for something and fixing it. The Surveillance programs have the same auto update triggers. (AND IS LIKELY HIDING IN YOUR BIOS CHIP.) It’s going to let you get every virus that arrives.

On a good note, if your computer or network access gets affected by a real virus program, just leave the computer on overnight. You will likely wake to the problem being gone and all connectivity installed. This is because they need that connectivity to continue surveillance. They will fix these issues when they arise. PAY CLOSE ATTENTION TO IPv6. There is something very curious in the sneaky nature of the protocol. And, Bluetooth is being used to enable surveillance on computers and phones. When you find a surprise activation of BlueTooth, it’s time to start becoming suspicious.

If you check Windows Update regularly then you know the schedule and the pattern for the updates. When one shows up appearing late, back dated, you might not question it. Realistically, who would have the time to spend going thru the list and try to confirm the correct KB number and date for the updates. So the pattern to watch for is the frequent updates related to Security and Program Execution. You want to trust Microsoft, but you can’t be sure it is from them.

Once your machine has been hacked with the leading surveillance software programs, you can never be entirely certain you are ever getting to the real location you think. A clue to this will be web pages disappearing and being unavailable. A more remarkable cluee is for one or two pages on a major site to be in the wrong format or using the wrong colors and style sheet from the rest of the site. I have personally noticed this on Microsoft.com and McAfee.com, among others.

(Keep in mind you are also probably getting frequent updates to Flash, Adobe, and Printer Drivers.)

In order to protect the stealth qualities of the Surveillance program, the software will no longer let you really go to the Microsoft Windows Update Site for updates. Your computer is being redirected and you really have no way to tell or confirm it without looking for it when anomalies arise.

The redirection code is hidden well in the registry. It is in an unnamed key which has protection on it to prevent edits. The data is in Hex format, so it is not imediately readable. AND just in case you try to read it, the data is further encrypted.

Through the years the developers have left thier signatures in their program file segments. Every hacker likes to leave their mark behind. Many have adapted the Bluetooth symbol slightly to indicate their work. It will frequently appear in the code files.

NOTE: ONCE YOUR MACHINE HAS BEEN ILLEGALLY HACKED FOR REMOTE CONTROL, SURVEILLANCE AND OBFUSCATION YOU CANNOT GET AROUND THE SURVEILLANCE, ALL YOU CAN DO IS NOTICE IT; BE AWARE OF IT, AND BE HINDERED BY IT’S ACTIVITY. ANY ATEMPT TO GET AROUND IT MAY TARGET YOU FOR FURTHER TECHNOLOGY ATTACKS.
NO ONE WILL HELP YOU.
THERE ARE NO SOFTWARE PROGRAMS TO PROTECT, DETECT OR REMOVE IT.

2011
07.08

Vista reports an incorrect resolution error. The error indicates that Works won’t display everything corrrectly when the settings are below 1024 x 768.

The screen settings are 1280 x 720.

The error message is using invalid information.

This can happen when you computer is under surveillance.

It may seem to be working like before… BUT, when inside the virtual machine it is very hard to tell you are working on a window within a window. The thing that doesn’t get passed realtime or on the fly when in a virtual machine is a hardware setting or change.

I’d speculate that they can’t pass the data easily or recognize the change occurred to pass the info.
OR
They need to strictly control your access to hardware changes to prevent you making a hardware change which circumvents or exposes the surveillance software.

Just one of many hardware related clues you may encounter when your computer has been hacked.

2011
07.08

A sociopath is somebody who exhibits sociopathy, who behaves in a way that suggests a lack of conscience.

Unlike the average human, a sociopath does not feel any sense of guilt or remorse when committing morally wrong actions or actions that their society deems unacceptable. Because of this utter lack of fear for the sanctions of society, sociopaths take advantage of the social system and use manipulation and amoral behaviors to obtain their goals.

The types of behaviors they exhibit are those that would make someone with a conscience uncomfortable.

The words in this definition appear over and over throughout this blog… One has to wonder. I’ve had nothing to gain from publishing this nightmare. I never approached any topic out of malice, anger or threat.

I tried to survive through the divorce, where no one was able to help, where the judges acted without regard to the law, where I was under constant terror of what they would bring down on me next. i did not commit suicide. That was unfortunate for them, it was/is their goal. I do not plan to oblige them.

So… Why?
I suppose it would take someone with a social conscience to answer that… And I have not yet met that person.

2011
07.08

Does the FBI investigate graft and corruption in local government and in state and local police departments?

Yes. The FBI uses applicable federal laws, including the Hobbs Act, to investigate violations by public officials in federal, state, and local governments. A public official is any person elected, appointed, employed, or otherwise having a duty to maintain honest and faithful public service. Most violations occur when the official solicits, accepts, receives, or agrees to receive something of value in return for influence in the performance of an official act. The categories of public corruption investigated by the FBI include legislative, judicial, regulatory, contractual, and law enforcement.

BUT IN THIS CASE, that police officer has already done that thing to you which we don’t want you to know about or figure out because it was really wrong and efforts are already being coordinated to confuse you and make you believe you are under a Federal investigation for um, something;
AND
when the head of family court, Judge Rhonda Daniele, is the first to violate the rights of the defendant and has done so secretly, in an order they would prefer the defendant not know about, having it hidden in the Prothonotary and not available for review; (If you knew about the order, you might challenge the allegation, prove it false and thereby deny yourself the opportunity to review all of the custody rules for the next 3 years while Judge delRicci schedules delays and runs out the clock until your son is 18 and the court no longer has jurisdiction. Sorry, you should have filed sooner. Perhaps before your wife began planning to surprise you with that divorce. She did have a 5 month head start.)
AND
the defendant is characterized and mocked as ‘the paranoid computer guy” by Judge Thomas delRicci who issues an Order which directly infringes on the Defendant’s First Amendment Rights at the same hearing where he acted to conceal the existence and content of the secret order signed by Judge Daniele.
AND
followed by Judge Emanuel Bertin extending impunity to the Plaintiff to violate any order, miss each deadline, and fail to provide complete and accurate documents ordered in Discovery to conceal some prior judicial indiscretions;
AND
then Judge Carolyn Carluccio clears her desk of all pending petitions in violation of procedure and law, (Well come on. She had to. You filed those documents with truthful statements and evidence and exhibits. Documents like those could put a judge out of work. She is supposed to decide what is true and you took all the fun out of it.), refuses to recuse when presented with her inappropriate actions, and then issues an unappealable ruling which she has crafted so it cannot be appealed to a higher court because it is not a valid final order; she further terrorizes you, makes you homeless, without any medical benefits (or teeth by now), and turns over the house to my “ex”-wife (who had abandoned the home IN WRITING in May 2007…)

The FBI will not become involved and they won’t tell you whether they will or won’t investigate or take any action. Somewhere in the last 5 years of constant litigation, I hadn’t realized that the Judges threw away the rulebook and joined the Plaintiff as an additional party. The absence of the Law from the judge’s rulings is only exaggerated by the fraud, false allegations, perjury and impunity bestowed on the Plaintiff.

Does the FBI investigate computer-related crime?

Yes. The FBI is charged with investigating computer-related crimes involving both criminal acts and national security issues. Examples of criminal acts would be using a computer to commit fraud or using the Internet to transmit obscene material. In the national security area, the FBI investigates criminal matters involving the nation’s computerized banking and financial systems; the various “9-1-1” emergency networks; and telecommunications systems. See our Cyber Crime webpage for more information…

BUT not in this case, because the computer related crimes affected a business and all of the business’s clients. caused identity theft, cost the Defendant thousands of hours to identify, and affected his financial transactions and online banking, requiring all banking to be performed through other people’s unhacked equipment and accounts, and further affected his ability to work or find employment,
AND
because the Defendant removed all existing hard disks and stored them securely, thus denying the Plaintiff the opportunity top place obscene material remotely onto his computers
AND
there’s that thing we don’t want to discuss about the officer, but he may have worked with this tech type guy on a task force that can help maybe.
AND
One might suggest that the involvement of a Private Investigator could prove or conceal the direct involvement of the Plaintiff in the computer crime, OR further evolve into a campaign of electronic harassment to distract the Defendant which has continued for the last several years,
AND
He’s good because his their work experience gained during the years before they retired from the FBI and started doing this detective thing. So he could maybe talk to the guys he worked with and see if he can get them to help 9(wink).

Yea, umm, right, the FBI might want to get involved if it would lead to embarrass the organization to investigate, charge, and prosecute their retirees. Let them continue to victimize you. They won’t stop anyway. We’ll additionally extend the impunity granted to the PI to the Plaintiff so that the plaintiff cannot be forced to reveal what is going on through any discovery Documents, testimony, or encounter, and has no risks in her future litigation.

NO, the FBI has better things to do than worry about the tiny problems which you really don;t have alot of time to pay attention to anyway. They are writing up some dooseies of petitions to help you learn the laws which the judges are not going to apply to your case anyway. Are you still here?

I hope my embellishments to the questions and answers from the FBI website do not discourage you. Perhaps finding help with a smaller, less critical issues. I apologize for the sarcasm. If I didn’t use it, I would only end up crying again. And how can you not cry. These people destroyed you. The people you turned to for help were the people who were destroying you. There is no justice for anyone who has suffered an injustice, and these judges refuse to rule on anything as that would allow an opportunity to appeal to a higher court. The Courts are too busy, so we’ll just keep you spinning through our courtrooms until some judge decides to go all in. She will show you what injustice is. She will issue it, and not permit an appeal, and delay any request for reconsideration until she schedules a hearing in a few more weeks and then decides to recuse leaving you homeless, living out of bags, sleeping on a couch, harassed by technology which hasn’t worked in 5 years (wink), and trying to prepare any Federal Lawsuit against the collection of people who have worked for the last 5 years to destroy you. Yes, good luck trying to do that in time while we order a few more things for you. Ya know, we are truly disappointed we never got the opportunity to lock you up for something (again). Perhaps if you weren’t at home afraid and terrorized and had gone out more. Well, that home’s not a problem for you any longer (except financially and maybe emotionally). She’s been so busy throwing your things out and hiding anything she wants, and fixing it up for herself to sell, that she forgot to list it with a realtor. Where’s that impunity card?

WHEN EVERY JUDGE FAILS TO FOLLOW PROCEDURE AND LAW, AND REFUSES TO EXPLAIN THEIR ACTIONS, OR CONCEALS THEIR ACTIONS, AND FURTHER ENTERTAINS PETITIONS ATTEMPTING TO HOLD YOU IN CONTEMPT OF UNCONSTITUTIONAL ORDERS, THERE HAS BEEN EIGHT OF THEM…. AND THERE IS ONLY ONE OF YOU…
Why are you still here?
“I have to be, I am the Defendant in this divorce. I have been ordered to participate and be further victimized by professionals who resort to games, and tricks, and sneaky manipulations and legal distortions when serving up injustice. I’ve got no choice but to follow the rules and expect justice. You folks have been lawyering all these years, and well shucks, you sure know how to keep yourself entertained, but you never resolve anything. So what flavor of delay is being served today?”

It’s been 5 years, over 300 docket entries, it is time to stop hiding behind the litigious masturbation, wash your hands, and do your job. Justice. Interpret the law, don’t twist it. I expect a judge’s first responsibility is justice, so let’s try that and then you may go back to conspiring to cover up what everyone has been doing for the last 5 years.”

Why are so many judges risking their careers and reputations to terrorize and harass me? It is apparent the court does not care about the family, or the people. If the court cared at all about the kids, they wouldn’t prolong custody cases splitting people apart. If they cared about justice, they wouldn’t ignore the amount of time wasted at the courthouse. Alot of people voted for you to be sitting on that bench. They did not expect you to need you courtroom full of familiar faces each month. Resolve a case. You will get to meet new people. You don’t have to continue to manipulate the same case. I have already seen your demonstration of power. I get it. You are the judge. You can do what you want to me. You can lie and have me surrounded by guards. You can act unethically and I can’t do anythign about it. And if I want it corrected, you have made it so that I have to ask you.

It’s judicial masturbation until satisfied with yourself… or until someone sees what you are doing and there’s a scandal.

%d bloggers like this: