Federal Hacker Block Access
No Access To Congressman Henry Cuellar Grants
For Five Years Until Last Week 05/05/2014
Just The Facts Jack
WE DID SUBMIT BY GOING TO HIS OFFICE NO RESPONSE
I AM TALKING ABOUT A SYSTEMIC PROBLEM NOT A PEOPLE PROBLEM
for Recovery As He Passes Out Checks To Undeserving
Websites Corrupted We Go Video
We Pay High Dollars For Video Rendering
Hacked
We Go Print
Proud To Be On The Texas Honor Roll
No Access To Congressman Henry Cuellar Grants
For Five Years Until Last Week 05/05/2014
Just The Facts Jack
WE DID SUBMIT BY GOING TO HIS OFFICE NO RESPONSE
I AM TALKING ABOUT A SYSTEMIC PROBLEM NOT A PEOPLE PROBLEM
for Recovery As He Passes Out Checks To Undeserving
Websites Corrupted We Go Video
We Pay High Dollars For Video Rendering
Hacked
We Go Print
Proud To Be On The Texas Honor Roll
Turning Texas Blue
Who Is Watching Who!
Three letters Were Received by That Office
A Sample Box and Informant To The DOJ Went to the Judge
And District Attorney
Intrusive Illegal Non-lethal Devices Used by the Local Sheriffs Office As Retaliation |
One day, the King who commanded all the power in world but lives a life of loneliness and sadness sent for a slave of an Inn and commanded him to take off his clothes, give them to the King and the King commanded the slave to wear his royal wardrobe and mascaraed as the King over the great empire.
High School Students Hired In Rural South Central Texas Shop Go On To College and Came Back To Thank Me :) |
Small Business In South Central Texas Bush Wacked How Many Other Productive Small Business have Gone Unrecognized And Closed Because of Bush Era Intrusive Mandates |
Latter, the slave dressed as the King arrives at the inn for dinner. He fears the guards would notice him as a slave they had beaten daily but they are blinded by social invisibility of the Kings Horses, carriage and coat. They all bow to the slave mascaraing as the king, and bark to the King in slaves clothes to bring him drink, which usually was hot water or light tea.
The Slave Dressed as the King trembles in fear as his chair at the main table is pulled out and carefully pushed under him to seat.
The Hand Sign That Stopped The World 2009 |
Hat's Off To You NSA
God Bless America
Why I Support The Commander-n-Chief of the United States of America!
In Memory of Anne Paterson – O’Dell
We both survived a terrorist bomb November 13, 1995
|
Chapter 5: Why I say the Things I do Privacy Why It Does Not Concern Me!
I Don't Like It But I Guess Things Happened That WayIn Memory of Anne Paterson – O’Dell
We both survived a terrorist bomb November 13, 1995
"Intrusion into my personal space, by persons or networks of mindless electronic devices, plagiarizers and patent trolls have robbed me of my creativity, spirituality, copyrights, income, and dreams; but what are these things to a dead man?."
"The Lost Key Example" Animated Page 2
I Don't Like It But
Things Happened This Way
Who Was The Idiot? Not the Pilot - He Did His Job.
Who are what application triggered this event?
I don't have 'A Need To Know'
You 'need to know' that I was Cased and a Rifle was Pointed at My Back and Federal Files were Manipulated Before This Event
And You need to know what Displayed on my TV
You and the FAA have that information.
I Did My Job.
Please Do Yours!
My Family is Counting on the FBI
FBI I Went To You For Help I Except It - Help that IS! |
Let me tell you something, when somebody goes the FBI because their family or life has been threaten, they do not need to be influenced (PSYOP) for a full confession and specific details, unless you want a fairy tale? or Directions from hackers to Bullshit island as follows:
Psychological Warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been known by many other names or terms, including Psy Ops, Political Warfare, “Hearts and Minds”, and Propaganda.[1] Various techniques are used, by any set of groups, and aimed to influence a target audience's value systems, belief systems, emotions, motives, reasoning, or behavior. It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator's objectives, and are sometimes combined with black operations or false flag tactics. Target audiences can be governments, organizations, groups, and individuals.
No comments:
Post a Comment