Search This Blog

Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Saturday, September 19, 2015

Donald Trump Gets Religious Buys Casino Private Security Investigative Firm

Donald Trump Buys Casino Private Security Firm 
Sugar Company CVS Ted Cruz Built By Drug Traffickers and 
The Brady Bunch goes Larry Flint 


Seven Trillion Dollars for Chinese Surplus Surveillance
How They Do It?
 See Link Read Closely 


Report United States State Department 
I Am a Victim, Informant, and Witness of Several Terrorist Acts 
Intense Interrogation and Torture

http://somethingstakesarealtexascowboy.blogspot.com/2013/11/congressman-lamar-smith-war-crimes.html

Anybody Else Want To Breach My Private Documents and Force Disclosure In Public? My Privacy Why It Should Concern The United States State Department of Defense and Those That Breached my notes and Used That Information to Harm The Integrity of Several Federal Agencies
Texas Film Developer Thieves Bane & Co. The Same People That Brought you 'The Campus Killing Fields'
Grandma stalked by 3 Ton Mosquito to Walgreen's to pick a roll of film opened by Private Security Firms I have 40 more rolls. Don't do that again. 9-17-2015. So that is what happened to my negative of the UFO over panama! A Matter or the DOD reported to the proper authorities at the time of the events including taser my child's eyes that means somebody is going to die his mother was just found dead in a Lotus position and is A Native American Indian 

http://whistleblowersappreciationdayjuly30th.blogspot.com/2013/08/ted-cruz-political-targeting-brings.html

Email after posting "Horacio stop Retaliating?"
So We Know A lot More Than I Have Written On Documents. Not one investigator has come to my home or asked me for Information or To Take a lie detector, which I have already offered Nappler!

They did one I got the message "Ball Don't Lie"


Valid Criminal Complaints To Law Enforcement Is Not Retaliation or is it 'Whistleblowing'
http://thenewmiddleeastsouthcentraltexas.blogspot.com/2014/04/senate-investigation-after-death-of.html

Rick Perry signature of authorization for Houston Se to embedded indicators and pics in my P.C. so when the Tea Party Campaign Money from the Mexican Drug Cartel Gets Out of Prison They Can Find and Kill Me - They already tried reported by my neighbors!

How Serious Is It?
http://thenewmiddleeastsouthcentraltexas.blogspot.com/2014/04/ted-lavender-takes-stench-of-corruption.html
Attempted Murder and Possible Homicide Cases by Way of Hacking




Texas Covert Drug / Human Trafficking / Gun Walking

How Can We Fix Something If You Tell The World Nothing Is Broken

Blame your own actions on
 "The United States Attorney General?"

Metalanguage Points to the Killers
You Have Documents in Hand
I Am Sure Glad You Said It
And The FBI Has Saved It


I get an Email from the secret Service as I published the event in a University paper for my protection, what the Texas University social worker instructed me to do, once he knew that I was telling the truth. The Email from the SS read, “I am sure glad you said that.” Scared, I write the Director of the CIA after finding out one was a card carrying CIA agent and wrote, “If the Secret Service can find my house but Federal Express cannot, then why can’t they find Osama Bin Laden, who gets carrier service each week.” Twenty-four hours later he is dead. 

Claiming to be NSA face value aka facebook 'The Seven Seals' page William
Sessions Waco Wacko harassed me for a year “Who Ordered the Kill on Osama bin Laden?” 


Take Responsibility for Your Actions
In The U.S. Senate


Senator Cornyn "On June 14, 2013, I attended the classified briefing provided to Senators by Director of National Intelligence James Clapper, NSA Director Keith Alexander, and other Obama Administration officials.  You may be certain that I take seriously the role of Congress in providing oversight of these programs, and that I have been and will continue to closely monitor the intelligence activities of the U.S. government.  I am always appreciative when Texans take the time to reach out and share their concerns.  Thank you for taking the time to contact me. Sincerely, JOHN CORNYN United States Senator”  
Writer Observed - He Should Have Some Closure

How Many People Have Been Harmed?
Senator Ted Cruz Rhetoric 

Does This Guy Know That There Is A War Going On?

       Crimes Against Humanity Is No Game be glad We Can Communicate  
They Work For Us We Don't Work For Them

You Should Clean-Up Your Own 'House of Death' Before You Come to Clean-up Mine

Texas Covert Drug / Human Trafficking / Gun Walking
A Decade Before Fast and Furious
Gun Walking dates back 200 years to the arms race with native Indians and the United States Calvary during diplomatic talks. 

And new artifacts of the Texas 'Migrant Workers' Trail with gates built for their safe entry and exit were welcomed in Texas for 500 years before and after the United States Constitution was Applied up to the year Circa 2000.
What Hackers cost the Republican Party Their will never be another Republican president as long as hackers are on my pc

Migrant Workers from Mexico, now called illegal aliens, did not want to stay permanently in the United States and new statistics show the same, they are seasonal workers and come to work at jobs not stay in the USA and take up jobs most United States Citizens would not work at any price such as farm labor. Predators now called Republican hackerscalled Coyotes exploited these workers for  100rds of years and the monthly income for these Coyotes who are United States citizens is $250,000 non-taxable or traceable see District 28th Congressional Statistics Report: 1,000,000 Mexican Nationals live in the Untied States legally and 1,000,000 United States Citizens work in Mexico legally and probably will retire in Mexico.

How Can We Fix Something If You Tell The World Nothing Is Broken
and Blame your own actions on "The United States Attorney General"

Why Work My Concerns? You Work my concerns you work Every-bodies Concerns, a proposition that is still true today because of the multilevel agencies involvement State and Federal of the subject 456135816, a fact finding mission offered to United States Senator John Cornyn. 

We Don't Need Answers We have given the U.S. Senate Valid and Sound Solutions

   Crimes Against Humanity is no Game! Be glad we can communicate


 "I have been and will continue to closely monitor the intelligence activities of the U.S. government (Senator Cornyn)." That is not my complaint, which is "Closely Monitoring My Intelligence Activities Like Driving Grandma to The Grocery Store?"


Texas Covert Drug / Human Trafficking / Gun Walking
A Decade Before Fast and Furious

How Can We Fix Something If You Tell The World Nothing Is Broken

and Blame your own actions on "The United States Attorney General?"


Filed June 13 2012 Dist Atty 81st Texas,
Case Numbers 12-04270, 12-04429
See Link: http://linearism.org/DOJCriminalChargesTexasJune132012.html
Charge 1. Stalking Retaliation, Including International Stalking of a student and disabled Veteran  

Charge 2. State Sponsored Terrorism

Charge 3. State Deployment of Bio-Lethal Weapons On Texas Citizens

Charge 4. Low Altitude Border Drone Stalking Deep within the State of Texas On Texas Citizens, Done by Governor Rick Perry

Charge 6. Federal Data Manipulation, Hacking

Charge 7. stalking by deadly Force, Aerospace Domestic Surveillance

Charge 8. The delay in prosecution of the above crimes sent to the United Attorney General Office by certified mail 

Received on April 15th 2013 by the U.S. Department of Justice Civil Rights Division, 950 Pennsylvania Avenue, N. W., Office of the Assistant Attorney General, Main
Washington, D.C. 20530

These are criminal acts with threats of deadly force that fall under the Civil Rights Division. The Civil Rights Office is the Federal Law Enforcement Office responsible to prosecute these claims. No Response As Of 05/17/2013.

Hacking My Pages is not the Proper Response when the local Police can and do call me, and we have access to the FBI for protection and can pick up a phone any day of the week and call me, a systemic problem by experimenting with different types of media broadcast applications that when in the wrong hands, or the experts can and are used to harm the public and never worked before they put these systems on line Stop:

Note: the 'e' forced below, I have no idea what 'e' is, and Hindus do not need special codes or any electronic device to communicate or why they as well as other animism faiths like the Navajo Code Radio Operators during world war II were successful and these profiles make the best application programmers.

No access to legal representation or library access 'Ignorance of the law is justified not an excuse, and a federal violation to conceal the meaning of law and new laws and bills from the public who are the approval authority on laws passed by State and Congressional Legislatures.

Example Proven In a Texas Court: We have no idea what the following statements means. A person face value claiming to be The Department of Homeland Security told Me to Paste It To Reduce The Retaliation.

“Whoever intentionally obstruct the proceedings before depts., agencies, and committees, obstruct this criminal investigation and/or retaliate against me because I am a victim, you will be punished to the full extent of the applicable law in 1505 of Title 18 Obstruction of proceedings before depts., agencies & committees, 1510 Obstruction of Criminal investigations, 1513 of Title 18 Retaliating against a witness, victim or an informant, or 1514 Civil Action to restrain harassment of a victim or witness. Whoever intentionally alters, destroys, mutilates or conceals records, or documents with the intent to impair the object’s integrity or availability for use in an official proceeding will be punished to the full extent of law as defined in 1519 of Title 18”                                                                                      


Saturday, August 30, 2014

Chapter 2: Privacy Why It Should Concern THEM!

It's Like A New Language 'The Big Beat' of the native drums

Chapter 2: We the People Are the Best Intelligence 

08/04/2013 Same Story New Understanding Hacked Off Our Web Page
http://www.linearism.org/PenitratingTheObscureJungleIntoTheLight.html



I’m sharing my story with you 54 after I was born just in time to see the first men to travel to and back from the moon and witness the carnage of the technical age with regular nuclear detonations. On some occasions I would watch hydrogen bomb test explosions on our neighbor’s brand new RCA color TV, just before the Walt Disney Show aired.  

President Lyndon Johnson seemed to like scaring the daylights out of people with regular warnings of a nuclear attack until he decided, “I will not run for reelection as your President,” 

As if anybody really wanted him to be their president, especially if you still have living memory of an accidental nuclear detonation in your South Texas town. On November 13, 1963, at approximately 11:00 a.m., an accentual nuclear detonation shook the town of San Antonio, Texas. As it happened, President Kennedy was in San Antonio that day. The explosion broke windows 30 miles away on the north side of San Antonio. It was the only known accidental nuclear device detonation openly reported in the United States. 

Ten days later the story was overshadowed and largely forgotten when Kennedy was assassinated in Dallas. 

Johnson became president and took total micro control of the military police action in South Vietnam. I believe the war would have ended within months instead of years by the diplomacy of John F. Kennedy had he lived to complete his term. 

There was also a near global nuclear launch triggered in 1982 that left many of us mistrustful of human judgment and with a strengthened belief in a common, everyday God as real as the invisible nose on your face but outside the peripheral perception. [60 Minutes Report was not valid 08/30/2014 He Who Owns His Own Library is King]

I tell my family and friends to stay clear of me on November 13, even to the extent of leaving town. In addition to the explosion that took place on that date, November 13 was the day in 1995 of the first Osama Bin Laden-financed terrorist bombing  that destroyed a federal building next where my now dearly departed wife, a Federal employee, was working. CNN reported on the bombing: 

Witnesses said the scene was chaotic right after the blast. Bystanders helped to load bleeding casualties into cars to be taken to hospitals. “We are seeing a lot of burns,” said a hospital spokesperson in Riyadh. Witnesses said the blast was felt across the city. “A huge explosion shook our building,” a Riyadh resident said. “It was like an earthquake.”“ 

I thought it was evident the attack on American ex-patriots occupying Saudi Arabia was planned financed and orchestrated by Osama Bin Laden, who I understand was the leader of a  group called the Islamic Movement for Change that claimed responsibility of the bombing. 

Evidently, President George W. Bush was unaware of this connection and retained ties to the Al-Qaida terrorist leader and his family for six more years. It makes a lot of sense that the 9/11 attack on New York would have never happened if our intelligence agencies had known what was common knowledge by people who witness the bombing in Riyadh, Saudi Arabia. However, nobody asked us. The Investigation of Al-Qaida’s first bombing is just one of many examples that prove people are the best intelligence. 

The consequences of going beyond the philosophical debate of water-boarding by the Bush Administration in 2001 made certain types of nonlethal torture legal in Texas. Academics at George Washington University created the distinction of two types of torture in America, legal and illegal. 

In the fall of 2006, I interpreted with vivid accuracy that I was under hyper-surveillance for human research at the local university where I was registered as a sophomore studying philosophy and anthropology. 

I did not give it much thought at the time, because I considered the research benign and strictly controlled by regulated protocols that protected the subject of research—in my case, a severely disabled student continuing his education in hopes of returning to some useful position in society. 

Although I was not an unwilling participant, I was not contractually bound to their observation of me. Nor did I have anything to hide and thought it interesting that I would be a candidate for the better good. 

Unfortunately, my classmate Mary began to withdraw and was no longer her normal happy self. I did not know that she too was a target of research even though she was not registered at the school. She always joined me when she could in an empty seat or just to enjoy the activities at the school such as art exhibits, plays, concerts, and open public discussion groups on any given subject. 

In my younger days, I spent a lot of time in my father’s primate laboratory where I actively participated in animal research. I thought much of it was cruel but also necessary in order to save future human lives.

We also followed strict protocols and went beyond the rules by making the animals as comfortable as possible during experimental surgeries such as transplanting organs on primates. My father’s lab was also used to experiment on cadavers but he never let me take part in those experiments. Never in my wildest dreams did I think that humans would be unknowingly experimented on and bring harm to the subject of the experiment.

Nevertheless, this is my story and it is as true as the experiments the Japanese performed on live Chinese prisoners of war, nerve gas tests on conscientious objectors drafted into the army, and as real as the LSD experiments on Afro-American heroin addicts in prison who were given a fix after being injected and observed. 

Mary’s condition became worse; she no longer came with me to the university, stopped eating, and finally stopped drinking liquid or communicating. Before her demise, she complained about being watched and that we had routine helicopter visits directly over our farm at low altitudes, but I was still in denial that anyone would be so interested in me and what I do. I guess working in primate experiments rationalized my belief that it would be beneath a university to knowingly harm the subjects of research. 

I finally called an ambulance; Mary was institutionalized and declared a ward of the state. I was told that she may never recover. Mary’s doctor told me that it would be probably better to just leave her there indefinitely, but love would not let me let her go. I spent every free hour at the San Antonio State Hospital, either visiting Mary or being assessed by a board psychiatrist or in some training class for certification as an official guardian for a ward of the State of Texas. After several months, I signed a guardian contract making me responsible for Mary’s care and could take her home. 

Like I said, I received all the signs that danger was lurking but I was in a state of denial and never expected that domestic surveillance would grow so big and go so far. Finally, after several clairvoyant slaps in the face, I acted on my premonitions, and went to the person’s office that had been trailing Mary and I along with what I called CUBIT gang members. 

CUBIT of Cubase was a scam program designed to protect the University from harsh discrimination fines from gangs stalking the disabled. It was developed by an attorney who had ties with Senator John Cornyn when he was Texas Attorney General from 1999-2002.

I knew nothing more about her except when she stuck her nose into this mystic’s business; a personal intrusion that I saw clearly in my mind’s eye every time she accessed a medical file, sent an email that concerned me, or talked about me on the phone.

Any clairvoyant worth his/her weight would never think of intruding into someone else’s life, but pity the person who is so bold to stick their noses into a clairvoyant’s business with bad intent. This is not the case of retribution but of self-preservation, usually ignored as a nuisance by the intruding party unless it is a continual bombardment of personal space. 

When it gets to the point where a group of people are surrounding you orchestrated by another, you have to intervene as nicely as you can before they bring harm to you or themselves.

I approached her office with caution and respect and sat down and said, “Look, I have been having a lot of problems here lately with my professors and I know that all my problems are coming from this office. After all, this is a university, not the gin mill down the street—smart people hang out here!” 

She jump to her feet in a frightened rage and ordered me out of her office immediately, which I was happy to do, confident she and the others would finally leave me be and mind their own business. Later, I filed a formal ADA complaint that simply said, “The University’s Quality Assurance Program was hard-wired to favorable responses.”

I also followed through with police reports that were destroyed. Months later, after some episodes of retaliation, I made additional complaints but the police again ignored them. This was in 2007 just after I returned from China after working there for two years and after the Virginia Tech massacre where Seung-Hui Cho killed 32 people and wounded 25 others. Like me he was a philosophy major. 

Finally, after all reasonable complaints of due process failed, I went to the University Administrator that had been working on my case and threatened that if the action did not stop, “There is a team of lawyers foaming at the mouth to get in here.” 

At the time I didn’t realize that was a big mistake because it made the school think I was suing for monetary damages when all I was trying to do was get my diploma and leave.

Little did I know that the Bush Administration had changed its attitude concerning disabled students and considered any lawyer pursuing such a claim a Commie or Socialist. Little did they know how they contributed to the rise in campus violence and deaths for not pursuing each case.

But why should they pursue my case? After all, I must be delusional, since I contacted the Secret Service right away because my top secret clearance dictated that I do so, and told them that our farm had been visited three times by the Secret Service and CIA, who threatened my elderly disabled father and our whole extended family. 

But they were not federal Secret Service agents; they were Texas Governor Rick Perry’s Secret Militia of mafia goons, misrepresenting themselves as the CIA. 

I did not know that the Texas Fusion Center I was contacting for help was Perry’s command and control center. You would think a clairvoyant like me would get a clue after replacing the eighth crushed mail box at the end of some dusty Texas dirt road every time I wrote letters requesting due process. 

On February 14, 2008 another mass shooting happened on the Northern Illinois University campus. Steven Kazmierczak killed five and injured 21 before committing suicide. I watched the television news thinking Kazmierczak went through the same thing I had; however, the hyper-surveillance drove him insane just as it did the Virginia Tech shooter. So being the oldest kid in the class I had to step-up and went to the local FBI office to explain what was going on.

Unbeknownst to me the university hosted the FBI Academy and billions of dollars for research had been allocated to the university for the Anti-Terrorism Domestic Surveillance Program mandated by George W. Bush and now I was the number one suspect. The retaliation and high tech surveillance only intensified and tracked me and anyone associated with me on and off campus. They accessed my personal computer, read every email, listened to every telephone call. 

To this day, I have not received a single reply from Governor Perry or Lieutenant Governor David Dewhurst, who was in command when Tricky Ricky was campaigning for the Republican presidential nomination. How bizarre of a coincidence that David Dewhurst is running for U.S. Senator. Every time I see him on TV he brags that he was once employed by the CIA! 




Months later, I was still visiting Mary in the hospital and her condition seemed to worsen and she continued to complain about being watched, and reminded me on several occasions when I was being trailed on campus, but I ignored her stories only to realize at a much later date, even the helicopters flying over our farm were tracking our movements. It was hard to accept that Mary was telling the truth that we were both victims of human research outside of protocol and well outside terrorist threats. 

The act of being stalked was something Mary could see but I could not. If it were not for the election of Barack Obama and the hard work of his administration, I would be dead or doomed to prison for life along with many others, victims of a covert anti-terrorism domestic program that had gone completely out of control.

Let me make it clear to the uninitiated: top secret weapons are not a secret; they are controlled by our Senators in Congress who can approve or disapprove funding for these programs. Senators decide what programs will be used in their own state, that is why some states have laws against the use of bio-weapons and some like Texas do not! 

The problem is that the whole picture is not seen by the whole body of the Senate, or the President. The speed of new technical discoveries such as non-lethal weapons is so complex that our representatives must rely on the people they hire to help them understand. I believe in some cases the job is left to information toadies, who have total disregard for everything, other than their own paychecks! 

In truth, George W. Bush was a good president; however, he hired the wrong people. A great President puts his own opinions and beliefs to the side and tries to surround himself with the most honorable and brightest of minds America has to offer. Being President means relying on our representatives in Congress. 

The problem with the use of non-lethal weapons of the mind is not just an American phenomenon or something that occurs in a back alley of a third world country. Non-lethal weapons of the mind are a global concern.

However, in America we elect who represents us in the Senate. Think hard before voting for a Texas GOP Senator such as David Dewhurst or Ted Cruz whose principles are to govern the will of the people by any means. 

However it is FBI Director Robert S. Mueller who should answer for crimes against Mary and me. As FBI director he is mandated to:


  1. Protect the United States from terrorist attacks; 
  2. protect the United States against foreign intelligence operations and espionage; 
  3. protect the United States against cyber-based attacks and high-technology crimes
  4. combat public corruption at all levels; 
  5. protect civil rights; 
  6. combat transnational/national criminal organizations and enterprises
  7. And combat major white-collar crime. 


Fortunately, some Texans have come forward putting themselves at risk of more abuse, to insure fellow citizens are aware of the hazards, protect themselves by any means, and resolve harmful events of the past by reporting damages to the United States Attorney General. 

Sunday, January 19, 2014

Car Wreck Lawyers You Won’t Believe This One

Car Wreck Lawyers 
You won't Believe This One!

Thanks for Being An Ambulance Chaser 

Who Pays for Satellite Communication Scrambling? 

W'e' are going find out how much 
You Owe U.S. 

Turn I.T. On or Turn Your Budget Off
Find a Real Job

Wednesday, October 9, 2013

The X-Files Returned To My PC After Two Years One Still Missing Essay Fisher Pen Asset TAX

The DOJ Was Alerted Concerning the Missing Essay Fisher Pen Asset TAX

Submitted Through The Office of Henry Cuellar
I Want It Back For A Movie Script

Update 11/14/2013

Fisher Pen ‘Tax Their Assets’ Plan 
Essay Missing Submitted To Congress a 2nd Time 
The lead in paragraph went something like this at this link: 


http://somethingstakesarealtexascowboy.blogspot.com/2013/11/texas-email-hacking-connects-to.html

But I bet Somebody Would Like It For Other Means?

This Note Was With It

Facts are Boring I Know


Just The Facts Jack!

Saturday, October 5, 2013

Texas has a contract with Adobe to read your personal information sense 2001

The State of Texas The Real Hackers 

Not NSA
Texas Has Been In Your Computer 
The Whole Rick Perry Tea Party Term


The state of Texas has been illegally collecting and sharing information about you well before 2006, and protected from disclosure in Texas as a non-profit or a Private Investigative Firm or the  Texas Governor’s Supremacy order RP08.

READ THIS DOCUMENT

Snowden was from Texas?




What Adobe Says Is Not The Reality of Things


Adobe says hackers stole source code, customer data 
Reuters  1 day ago | By Joseph Menn   of Reuters 

Adobe Systems said Thursday that hackers had stolen source code to popular software such as Adobe Acrobat, plus data about millions of customers' accounts.


BOSTON — Adobe Systems Inc. said on Thursday that hackers had stolen source code to some of its most popular software and data about millions of its customers.

Hackers leak credit, debit card info of 3M Adobe customers

Hackers leak credit, debit card info of 3M Adobe customers 
 19 hr ago 1:46 Views: 34k  Newsy  

Security experts worry about the theft of source code because close review of the programs can lead to the discovery of new flaws that can be used to launch hard-to-detect attacks against all users of that software.
Texas Fusion Centers, which are federally funded have been hacking accounts well before 2006, and protected from disclosure in Texas as a non-profit or a Private Investigative Firm with the rights of a person by the Citizens United ruling.
The Supreme Court has ruled not all Corporations have the rights of a person, which includes those contracted by the DOD, Homeland Security or NSA. The dangers of such were first noted by the public as reported in headline news by the Associated Press, July 5, 2011 "Private detective in UK tabloid hacking scandal issues apology in Guardian newspaper" concerning the hacking of a 13-year-old girl.
Recent Congressional investigations last October, may have put a stop to the Texas Fusion Center hacking, that have yet to uncover one single terrorist threat; otherwise, these Fusion centers are in violation of unwarranted searches, which have and can bring harm to fellow Texans.
Texans have seen this abuse Post Vietnam era and it was not until our own legislators started to complain about aerospace speeding tickets, that the Privacy Act of 1974 was applied to the fullest extent of the law in Texas. When a state or Federal representative’s own family members are jailed or face criminal charges from unwarranted searches without due cause, we see swift changes on the way expressed law in Texas is applied.
I recommend you read "Google Tells Cops to Get Warrants for User E-Mail, Cloud Data" By David Kravets posted today at this link: http://www.wired.com/threatlevel/2013/01/google-says-get-a-warrant/


The article was an open invitation for me writing this blog, because professional Texas journalist are brow beat or fired for saying something negative about the Governor of Texas.
I am not a journalist or an attorney. I am a Human Rights Activist not by inspiration but out of desperation! If I needed an attorney in Texas, I would have to raise $50,000 just to challenge constitutional Civil Rights and Liberties, that are supposed to be enforced by the Department of Justice Civil Rights Section or the FBI!
These Federal Agencies are so overloaded (Pg 18) to the point; one has to be killed for them to investigate, after the fact. We can compare their case priorities to an emergency room, and if you just have a cold or a Civil Rights complaint, you will be sitting in the emergency room until doomsday or you are sent home with aspirin.
Much of the violence we are seeing in Texas, starts with simple Civil Rights violations at the street level, which escalates to point people arm themselves and harm others. In Texas, Civil Rights and Liberties are violated as if they do not apply in Texas (pg 19) and people are seriously abused or another senseless death occurs.
The overriding authority for Rick Perry Supremacy EO RP08 can be understood after reading "U.S. Electromagnetic Weapons and Human Rights (12/2006) By Peter Phillips, Lew Brown and Bridget Thornton:
"Human Rights belong to people collectively. To believe in rights for some and not others is a denial of the humanness of people worldwide. Yet, denial is exactly what Congress and George W. Bush did with the signing of the Military Commission Act of 2006. The new official US policy is that torture and suspension of due process are acceptable for anyone the president deems to be a terrorist or supporter (Now Includes Peaceful Occupy Activist). This act is the overt denial of the inalienable rights of human beings propagated in our Declaration of Independence and the Universal Declaration of Human Rights. More so, US actions declared to the world that the US suspends human rights for those it believes are evil (Phillips)."
Full Article
http://mindjustice.org/censored12-06.htm
The ACLU sponsored a Texas Road Trip such as the civil rights activist did traveling to Mississippi in the 1960's last year, and at the end of the dusty trail scratched their heads and reported back "Everything Is Broken." The truth is everything in Texas is bias under Governor Rick Perry Supremacy EO RP08, rightfully put into place after the 911 attack and is still being used to override common law, based on religious beliefs of the Governor or what he believes to be 'evil' not necessarily shared core beliefs (Murder, Torture, Exploitation,Theft or what we all believe to be true).
This is the answer every journalist has been asking for when thy approach Texas Governor Rick Perry, "You seem well like outside your state but not very popular in your state, why?"
Another danger, even if you have done no wrong, are Texas Private Investigative Firms known as "Private Dics" by those that have been harassed by Texas GOP political targeting. Texans were bombarded by Romney Dollars vested in these firms to hack or collect data about you and used for political targeting.
These were not mere irritations of privacy because once that information is collected it can be sold, hacked by a third party, or the custodian of those records is breached or mishandles the data such as the case last week.  A Federal worker misplaced a storage device such as a laptop after transporting the data to her home, opening 500,000 individuals to recent phone calls threatening law suits from third party private college loan collectors [from memory I do not have the reference article detail or source document handy].
Keep in mind, once you cross that Texas border the year may be 2013; however, by law in Texas you travel back in time to 1876 (Parh 20).That is one of the many reasons the United States Attorneys General’s
Office gets so many complaints from Texas.
Further, if our own Congressional Representatives or Senators do not respond to our pleas of injustice, then the only other option we have is a plea to the President of the United States. Of course, these complaints are handled by the White House Administration (Pg 5) not the President himself, and simply fall through the cracks referring the person in crisis back to the State of Texas.
Thousands of Texans suffer from the Iron fist of oppression, with or without due cause, based on the religious interpretation of what the Governor of Texas believes is ‘evil’ based on his own religious beliefs, compounded by the fact there is no separation of powers in Texas between the justice department and the Governor Supremacy order RPEO8.
The state of Texas has been illegally collecting and sharing information about you well before 2006, and protected from disclosure in Texas as a non-profit or a Private Investigative Firm or the  Texas Governor’s Supremacy order RP08.


Gregory O'Dell 01/24/2013