Search This Blog

Saturday, November 29, 2014

Texas PHD Independent Movie Producers Attacked by Mafia Goons

'B' Movies 
The Billion Dollar Deal Take Out The Syndicate
You Can Say They Wanted It All!

Card Left in House By a Breacher 
Not A Preacher

Connection to Mit the Twit Romney Who Leaves a gun on an US registered Airplane
Federal because the blood shed crossed State and International Waters

It's Not Over Until the Fat Lady Sings


Larry03 link to associated syndicate homicide 
Pat Harvey East Meets West
http://whistleblowersappreciationdayjuly30th.blogspot.com/2015/09/the-colorodo-joker-web-prompt.html

Monday, November 24, 2014

The Fallacy of Robotics

Why We Need NSA
http://www.hrw.org/news/2012/11/19/ban-killer-robots-it-s-too-late

The Mayan Hackers
Collect and Sell False Intel
Bring Harm to Others for a Price any Price You Pay Them
They are Used by Drug and Human Traffickers
http://somethingstakesarealtexascowboy.blogspot.com/2014/11/texas-blocks-return-phone-calls-feds-dc.html




What Do You Do?
Costly Clay Fusion Experimentations 
DARPA Deep Space Contract 
Planned for Airport Hangar Near Pleasanton Texas


Misspellings can be deadly and hackers commit manslaughter. This note is a classic example


I am sure glad somebody said it! 

Those that knew and did not say anything because they might lose money for an application that failed - then it is Murder by Intent.

07:00 AM 11/24/2014 Information was deleted not by me 'Buy Amazon.com 
Texas Longhorns (Search Box) B000ETMDAC' the private small business sector raped by the 'Global Economic Crisis Scam'  UT Regents and Texas Leadership as 'Perry writes the biggest hot check in Texas History' make these people Pay the Money back!

Take Senator Cruz off this case and give it to the Secret Service, who is just as anxious to find these killers and fraudsters as We ARE! 


Saturday, November 22, 2014

Calls Homicide Detectives New Evidence and Jehovah Witness Come Knocking 12/31/2015

“If the Jehovah Witnesses can find my house but FedEx cannot maybe they can find Jesus”
http://somethingstakesarealtexascowboy.blogspot.com/2013/10/to-penetrate-obscure-jungle-into-light.html

 Wallgreens RX 3321745-02458 11/06/12 Found Just Like the Replaced DVD Player "Old DVD Players for New (Pack-rat Thieves)" See Below The Evidence is overwhelming to witnesses but the breachers an't got a clue or does the homicide department when they do not return phone calls. The message read add to police report 15-01097 and tell me what to do with the evidence still holding for your call. FBI Tip 07:09 01/01/2016
Pirates Breachers The Last Nail In A Dead Man's Chest
"By George!"
  This documentation Completes This Part of the Investigation

Have a Warren Burger On Me
Agnes, Michael, and David B. Guralnik, PHD, eds. "Webster's New World College Dictionary." Webster's New World College Dictionary. 4th ed. Cleveland: IDG, 1998. 195. Print. 50th.
Hamburger
Audio Recording Adds Words of Wisdom

A roar of conversation erupts while the much-awaited
sandwiches are procured. Each peel back the brown paper disguising important distinctions between one sandwich from the next -- those with mayo, without mayo, with pickles, and so on. Then without a word, each guest folds the sandwiches back together and begin enjoying their lunch as if one mind sharing the [Illegal edit Copyright theft ] same essential thing.

Packrat Burglar Traded Old for New 
The Last Nail In A Dead Man's Chest
http://whistleblowersappreciationdayjuly30th.blogspot.com/2013/08/ted-cruz-political-targeting-brings.html

'May God Continue the unity of our country as the railroad unites the two great oceans of the world. 
Inscribed on the Golden Spike, Promontory Point, 1869.' (Page 23 of a USA new passport)



[Become Illegal State Militia Such as White Supremacy Generals ect.. ext.. ]

1. A person who commits Burglary

2. Burglary 

a. The act of breaking into a house at night to commit theft or some other felony such as hacking, breaching your home, or the use of any *Vector
http://whistleblowersappreciationdayjuly30th.blogspot.com/2013/08/ted-cruz-political-targeting-brings.html

b. The act to break into a building [Private sector Protected by the FBI] at anytime to commit theft, some other felony or misdemeanor

Examples: 




Breacher To Break or violate  (a contract, covenant, ect) 

A "Breacher" is a burglar who commits a felony to enter any home for personal gain, retaliation, evidence tampering, petty theft, stalking, harassment, Financial Decimation, information sharing or to demoralize a citizen of the United States of America. 

Breacher School Location South Texas Now Closed
http://somethingstakesarealtexascowboy.blogspot.com/2015/04/the-texas-out-of-sight-out-of-mind.html


Friday, November 21, 2014

Russian Hit Man Knows Damn Well He Has Been Cheated

This “moving into” is a natural state of human consciousness synchronized to the twilight moment of the experience. Just as the most advanced technologies of earth are guarded from the profane, so too exists an hierarchy of command common to Texas. 

This higher court resembles a platonic monarchy based on experience and service. This all-volunteer force oversees and protects many from disturbances caused by careless or in some rare cases aggressive clans, or genera.

If we analyze the essential features of the way we speak and the way we think, we can easily identify and redefine words or phrases of a particular cultural emphasis, which predetermine our opinions. In other words, by applying a few principles of Linguistics, the way we speak, to the way we think, we can, with little effort, loosen the bonds of cultural control, guaranteeing our right to freely reason on our own.

This complex power system is baffling to the Texas Outsiders, whose own reason has been corrupted by multimedia fantasy.

We all praise rationality but seldom do we apply the same criteria in the quiet of our own minds.

If you lose It, Don't Worry it will find you!

If heaven exists, and I argue that it necessarily exists, our own solar system must be nested within its heavenly properties.  In contemporary literature, we lose this association because our language now determines these concepts as “abstract ideas” such as the Philosopher A. Kripke writes, “A. Kripke-Plantinga (KP) world is an abstract object of some sort.” How can it be established that our solar systems, including Earth, spins in abstract space, an area that can only be appreciated intellectually?

The United State Copyright Office Owes Us Fifty Paid For Copyrights!
The U.S. Is the Only Country That Did Not Sign An International Copyright Agreement

Nothing to do with Globalization, National Security, 
Just Common Sense Ownership Law

Dodging Bullets Real Ones Since 1982

Please Mrs. Aria I Just Want To Tell Her I Love Her
Just The Facts Jack 
Want To See A Surveillance Film 1979

Updated To close in your face and personal 12/09/2014

Saturday, November 1, 2014

Farmer Where is the Build That You Threw The transponder On

On Your Office
Or Why The TV Has Been Ripped Off 8 Times. "Moving on up to the SAT East Side...." The Jefffersons
http://www.southtexas.va.gov/locations/FTOPC.asp
They 
Know How!
Apace Mechanic Borrows my Truck and Say "Dam! Why are all the helicopters following me?"
No Bank Web Access From this Date Have To Drive To The Window How Can You Have a Budget with No Access?
Nitro-bution from the Farmer Who Can Not Spell
The Things They Tried To Dig Up In My Own Backyard
"Then Up from The Ground Came A Bubblin Crude. Oil that is Texas Tea"

Retaliation Victim, Witness, Informant of a Warden of the United States Department by
SAPD RICO Governor Perry
Obstruction of a Terrorism Investigation


Hacks distorted A Federal Terrorism Reporting Form by an Official TSA Responder

(Well if you ask any police Chief if they need more officers they will say yes. Henry Cuellar and I tripled the number of first responders without increasing the budget added note 11/13/2014) 

Proof [I let It lay] was Fax Last Night Mailed This Morning
NSA You Should Be Able To Secure Our Systems with 1/2 the Budget
I Have Developed a System of No Code No Hacker Ready To Mass Produce in the USA




First Posted 10/30/2014
The Hillbillies

She was diggin up some food and 
up from the ground came a bubblin Crude
'watagoosiam' (ancient sanskrit)
http://www.linearism.org/HomeBoysView.html
Mary, Mary, quite contrary
BY MOTHER GOOSE

Mary, Mary, quite contrary
How does your garden grow?
With silver bells and cockleshells
And pretty maids all in a row.
Source: The Dorling Kindersley Book of Nursery Rhymes (2000)




The Animals They Poisoned or Killed
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1qgjFZYOC5VROEekBpkSomLCHMzEtKKa0Ow8tdpJgaRGBPXTCNbCef-PNFbbq3QwWZTe7t8jBNJOtk5t1GyuWQ3tpIcGYnS3XHCOphBEPrrpmVr4NJnlrTcDDk7UwThSI8l8_WWRZieg/s1600/OnAADAComplaint11152008.jpg
The Night of the Living Dead 08/10/2014
http://whistleblowersappreciationdayjuly30th.blogspot.com/2014/08/the-night-of-living-dead-08102014.html

What Happens when your own P.C. and Digital Storage is Hack to A Point You Do Not Have Access to YOUR OWN Copyrighted or Patient Content?
Kick Howler and Scream!

Violating Your Personal Privacy Is a Threat To U.S. Interest And Should Be Protected by National Security Not The State. A Lesson Learned After Vietnam.
www.linearism.org

Friday, October 31, 2014

Chapter 1: Texas Domestic Surveillance: They Did And Each Count Is A Federal Conviction Against The State of Texas

Texas Domestic Surveillance
And They Did Killed Crew Members 11/17/2015 A day of infamy 
http://somethingstakesarealtexascowboy.blogspot.com/2014/11/gets-his-picture-published-on-front-of.html


To The Wrong Texas Cowboy
Each Count Is A Federal Conviction Against Texas Hackers

No Response After Aircraft Disaster That Killed The Crew so Reported To Sheriff Atascosa County After FBI and OIG 11/17/2014 12:00am by law

Who Says He Got A Whole FBI File On Me
No! You Don't But You Should 

"We won't agree on everything (Cornyn to Lynch)" 

Why not be transparent on everything? The Senate Life your Kids and Congress too? After penetrating the jungle into the light. A person see things on a broader Plateau

 U.S. Department of Homeland Security Transmission to the FBI San Antonio U.S. Department of Homeland Security
Office of Inspector General/Mail Stop 2600 245 Murray Drive, SW, Building 410 Washington, DC 20528 Dear Department of Homeland Security
http://solidstateindependence.blogspot.com/2014/09/do-you-tea-party-hackers-want-to-die.html


1st Post Molested by Katheryn (Dick) Tracey 08/04/2013

Just another voice in the wilderness, I had no idea that by exchanging my writing tablet and No. 2 pencil for a Windows Word computer application would cull me out of millions as I rose to the top of web browsers in the summer of 2000. Born in the year BC—Before Computer—I can say, “In the beginning was the word and the word was without form.” 




There are those who will argue that computer systems have a history going back more than 100 years, represented by a variety of machinery such as the mechanical cash register, calculators, and even Enigma, used by the Germans during World War II for the encryption and decryption of secret messages.


Most will argue that the first computer was developed as far back as 3000 B.C. The abacus was an arithmetic calculator that used rows of wooden balls. The device is so reliable and trustworthy; it was still used in China during my stay in the early 1990’s. The system certainly seemed much more efficient than the registers I was accustomed to in Mega Grocery Stores that seemed to stop operating the moment my place in line moved to pay the cashier. 


Perhaps it was just a matter of odds or a coincidence that for some reason or another, when I came to pay, the cashier would open up the receipt printer and pull long lines of wrinkled paper tape out of the device to get it operational again. Many times the procedure would not work and the cashier would have to call the manager, who had key to override the system. 




Twenty years later, not much has changed for me. When my credit card is swiped everything stops for a brief moment as terabytes of data are electronically transferred by satellite or land line to overhead cameras that identify my biometric profile at that time and at that place. I know instinctively the pause is no coincidence. I have been targeted by a domestic surveillance system that had gone completely out of control. 


Those at the extreme right will say, “If we can we should,” but that does not include those that campaign for such in the name of national security, justified by the 9/11 Patriot Act. I have no objection when it comes to national security. My concern with the “If we can we should” argument is who is ‘we’ and do they know what they are doing? 


It's My Fault I Care About Other Texans


How displeasing to have representation in the Senate such as Tea Party member Ted Cruz (R-Texas), who cries for justice after the IRS allegedly targeted ultraconservative nonprofits, while in reality many progressive groups were also targeted and Cruz has not issued one complaint about that. Others were targeted for and murdered by Texas ex-NSA employee
Note: Texas nsa? just like Snowball http://www.telegraph.co.uk/news/worldnews/northamerica/usa/9457007/Sikh-temple-massacre-gunman-was-white-supremacist-Wade-Michael-Page.html


The Senator is also aware that thousands of Texans have been victimized by non-lethal and bio-lethal weapons; however, he has not made one speech standing up for those who experience loss of life, financial decimation, or are held in Texas prisons innocent of any crime. 


Thousands of Americans on United States soil have been unjustly targeted, persecuted, and oppressed by the corrupt few who can buy access to this information. Some such as the Dixie Cup billionaires Charles and David Koch along with a co-conspirator like Texas Governor Rick Perry will buy or manipulate the press to their own selfless needs; even to a point of endangering the lives of fellow Americans by censorship. 


Worst of all was the National Security Agency’s (NSA) illegal incorporation of private investigative firms and contractors who are protected from disclosure. 


Even today the federal government unknowingly pays top secret militias operating without orders; quality assurance programs hard-wired to favorable responses.


Over a 10-year period starting with the signing of the 9/11 Patriot Act, NSA grew so large that it collapsed the whole global economic system and currently consumes more than half the federal budget. 

In the State of Texas, Governor Rick Perry formed and led a top secret militia used to hold power by targeting and oppressing groups or individuals, causing financial decimation through intrusive electronic eaves-dropping and behavioral control devises. 


Many understand this to be simple GPS tracking; they do not understand the dangers of the most vile, disgusting, and intrusive devices conceived by man since World War II.


Cases are still being brought before the international courts for crimes against humanity for those who escaped justice by fleeing Germany. And yet Texas Governor Rick Perry and his network of handpicked co-conspirators, who are linked to patent infringement, the theft of mineral reserves, copyright infringement, human electronic exploitation, drug / human trafficking, and manslaughter, go unpunished. 


Most notably, the governor is linked to more than 250,000 people harmed by drugs or devices produced by big pharmaceutical corporations, with 88,000 that are known dead, and thousands more likely deceased. The numbers are still being calculated by forensics, In the State of Texas if they can, they will, and they did. 


The many disclosures by NSA personnel warning of a police state never has been a secret if you have been harmed or attacked by non-lethal and bio-lethal weapons. The notion, “Why should it concern me? I have done no wrong,” adopted by plantation slaves that happily accepted a false sense of protection from their masters, unaware the security was a form of mind control intended to oppress and keep the slaves working on the farm. 


Today’s civil division is between those that know and those that do not. Those who advocate for those that do not know are unjustly stalked down by the same domestic surveillance systems. 


Thank God they underestimated the potential of the human soul. I gave them fair warning into the same data stream used to harm me and others, first with a published essay, Who is watching who and do they know what they’re doing? 


“Unfortunately, behavioral scientists ignore the fact that some clairvoyants can take a peek into the future, visualize an eminent threat, and know instinctively when someone has their attention on them or looking at them even when the observation is done remotely by a camera or even a satellite.” 


The civil war that never manifested between the Texas corrupted few and the oppressed is to the credit of those who have made sacrifices by seeking justice in the courts. 


Credit also goes to the Honorable Barack Obama, President of the United States, who was also attacked by electronic devices and falsely accused of devising the system that was actually first developed in the State of Texas by George Bush mandates that later gave Governor Perry a blank check of discretionary spending. 


Where did the trillions of dollars go? If not for the offshore financial leaks, forcing those of Texas public trust as well as judges to belly-up and disclose their tax shelters, we would not have a clue. 


Justice is not always a popular opinion and seldom do we know the truth the whole truth and nothing but the truth. There was a time when throwing Christians to lions was the justice of the day as was tarring, impaling, and set on fire so the games could be viewed all through the evening from any seat in the Roman Coliseum. 


Not far in the future, we will have a clearer idea of what has transpired once the invisible crimes against humanity are brought before the courts, one victim at a time. Those who are still in denial with the notion of “why should it concern me; I have done no wrong,” will understand the dangers to themselves and family from intrusive violations of privacy


Clearly it is a war between good and evil. Texans and other citizens across America filed Victims of Crimes applications for relief from damages caused by the Rick Perry/ Koch Brothers insurrection and the Tea Party rebellion against the United States of America. The Tea Party of today was founded to shelter those who became experts at extracting federal funds for their own means. 


Not realizing the severity and the numbers of those involved, I published an apology to the United States Attorney General


"Dear Eric Holder, it is with my deepest regrets that your honorable position as the United States Attorney General has been attacked by the most depraved souls elevated from the depths of Hades to lead the great state of Texas, since her annexation into the union, in the year 1845........."

April 2009: Holly Hacker and Texas campus community members want to know if there is a connection. The FBI, Secret Service, and Campus Police data sharing has got to be a money making scam but this is just speculation, private citizens like me are not gifted fortune tellers like our trusted law enforcement officials. “Thomas Calucci of the University of Texas at San Antonio Police Department, who headed a team formed to identify folks on campus with psychological issues who could pose threats.”


Hyper surveillance or Hyper-surveillance can and does Permanent Harm

There must be a lot of money in terrorizing the public with anti-terrorist training and data sharing.


WE WANT ANSWERS FROM THE JUSTICE DEPARTMENT AND WE WANT THE TRUTH MADE PUBLIC - NOW BEFORE THESE PEOPLE CAUSE  MORE DAMAGE.

Senator if you want my support then practice what you preach; shut down the hyper-surveillance of students on Texas college campuses which include my OWN CHILDREN! 



The Problem with Fusion Centers in Texas
Texas Governor Rick Perry's Republican GOP POLITICAL Behavioral Control Centers
You Have A constitutional Right to Full Disclosure Freedom of Information Act
The 911 Act’s Intrusive Disregard for Privacy and Protection Has Not Revealed One Terrorism Scheme
A Decade of Corruption 1,000’s of Texans Targeted Murdered or Jailed without Due Cause
Fusion Centers Have Never Identified One Threat to National Security except Governor Rick Perry

The Texas Republican GOP uses Fusion Centers to attack Political Opponents to hold their own seats of power. There would not be a Texas Republican Super Majority without the aid of privacy intrusions by Texas Fusion Centers.  Ex-FBI Director William Sessions’ famous last speech at the Oak Hills Country Club San Antonio, Texas, “We are trying to tell the world what the rule-of-law is. It is incumbent on law enforcement to police their own behavior. We must share; we must find ways to do it (2008).”
 Suzanne Reed Bexar County District Attorney was present, has been aware of the problem, but failed to uphold “equal protection under the law” based on political and racial bias! A good example: Hyper-surveillance or the use of human sensors and cameras in poverty stricken areas, policing the poor and those of color, while the same systems in the wealthy districts are used to police the poor and those of color, who do not live in prominent white districts, but may enter those communities to access goods and services! Reed led the South Texas Anti-Terrorist Task Force, targeting Texas citizens costing Federal Tax payers 98 Billion in 2009.
The Bush 911 Data Sharing failure reported by the Associated Press 4 hours ago, today October 3, 2012, four years after I requested a congressional investigation of campus shootings. I believe these shootings were caused by the illegal sharing of private information and gang stalking, justified by the 911 Patriot Act in the name of National Security.
“A multibillion-dollar information-sharing program created in the aftermath of 9/11 has improperly collected information about innocent Americans and produced little valuable intelligence on terrorism, a Senate report concludes. It portrays an effort that ballooned far beyond anyone's ability to control.”
“We The People” became subjects of ungodly human experimentation; subjects became suspects, suspects became enemies of the State. Texas Governor Rick Perry will go down in history as the "Longest Serving Communist Dictator of Texas" by eating "The Fruit of the Poisonous Tree." “Due Cause” in Texas is hand-picked political apples, nurtured by Fusion Center Data Mining and Sharing, paid for by Federal Dollars. This is a huge problem that has corrupted the Texas Justice system with 4,500 bias appointees, appointed by Governor Rick Perry, not elected by the people!
Texas Republican GOP Dualistic (Pluralistic) Application of Law is the root cause of so many innocent Texans jailed, while several have been executed over the last 10 years! Most tragically, those favored by police and Republican GOP - get away with even Murder!
The right thing for the Department of Homeland Security to do is to prosecute my Texas Civil Rights claims, as well as thousands of others, because the Governor will not mediate. Texans have no access to legal counsel for a Class Action Civil Suit because of the corruption. Sadly, thousands of Texans are warehoused in Perry's Prisons for Profit. Most of these Texans are non-violent substance abuse convictions decided in backroom Texas Courtrooms, without due cause.
The ‘Right’ Thing for Texas Governor Perry to Do Is Step down Now - But The Devil Won’t Let Him Do It!
"I believe Satan exist (Rick Perry 2012)" and I believe the Governor has made all Texans true believers!

Intelligence effort named citizens, not terrorists
By EILEEN SULLIVAN and MATT APUZZO | Associated Press – 3 hrs ago.
WASHINGTON (AP) — A multibillion-dollar information-sharing program created in the aftermath of 9/11 has improperly collected information about innocent Americans and produced little valuable intelligence on terrorism, a Senate report concludes. It portrays an effort that ballooned far beyond anyone's ability to control.
What began as an attempt to put local, state and federal officials in the same room analyzing the same intelligence has instead cost huge amounts of money for data-mining software, flat screen televisions and, in Arizona, two fully equipped Chevrolet Tahoes that are used for commuting, investigators found.
The lengthy, bipartisan report is a scathing evaluation of what the Department of Homeland Security has held up as a crown jewel of its security efforts. The report underscores a reality of post-9/11 Washington: National security programs tend to grow, never shrink, even when their money and manpower far surpass the actual subject of terrorism. Much of this money went for ordinary local crime-fighting.


“Texas Electronic Exploitation Class Action Law Suit” A Community Service Report G. N. O’Dell October 3, 2012

http://somethingstakesarealtexascowboy.blogspot.com/