Search This Blog

Showing posts with label Hackers. Show all posts
Showing posts with label Hackers. Show all posts

Monday, January 26, 2015

To Identify Roadside Home Intruders Illegal Hacking Private Security Firms

VC151730564
New report Casing of home 3:30 am awake and check the mail find a letter from Texas Victims of Crime ambiguous question from the same source the VC numbers don't correlate to any rational reasonable investigation - a problem with a solution. 

VC151730564
You already have the report and the officer's name and a tapped call contacted as demanded by Texas Victims of Crime Contact Colorado County Sheriff's Office
"The Sheriff Deputy Help Us the victims and I Am Sure They Will Help Texas Victims of Crime"

"The Kidnapping and death of Ruby C. O'Dell
and Retaliation victims and material witness informant to the biggest bio-chemical attack on the United States
and the thief of trillions of dollars in mineral rights and inside trading

Stalking with deadly force across Texas international borders deep inside Mexico OCR Dallas who also has the subjects of Merck Vioxx lab reports 06152306 by UT system contact the FBI with an information request. I don't think it would be moral, ethical or legal to give you my own copy - oh that's right! Rick Perry not NSA has a hacked copy from my computer. 

Bannafatch communication leads to illegal vars and amputation breach UT Systems
"Once You understand the Texas Chinese model by the abuse you will understand  Texas corruption and wealth sharee only by the select few who are criminals under investigation for crimes against humanity"
Intense Interrogation and Torture

How they did it can be requested by from the FBI 
See Stalked Down with Deadly Force




Could of been routine patrol who are suppose to be casing the caser not my home - arresting the mail tampering roadside caser(s) is something everybody supports

Links to all information provided to the FBI 
This blog page is not where this belongs ask the hack to write their own blogs - hey! another reward leading to the arrest and convictions of see FBI US Senator Cornyn Handwritten Request. See Surveillance photograph of two witness removing a letter from the mailbox addressed by Senator Cornyn that does not mean the Senator was involved by a fellow in a brand new suburban that was bought by funds allocated to prosecute the case of Bush Mandate abuse Disabled students on Texas Campuses

This Note should be posted on mail tampering post but the browser in not in my control or any of the content because the hackers are liable for the content not me and after due process (Something the disable of Texas never See) and the convictions are those that are  felons and still have access to illegal equipment. 

"There goes Texas Right Wing Voter Privileges" 

Poetic Justice

Why Am I Still Alive 

“It’s shocking to me,” said Ron Brooks, a former director of the San Francisco fusion center, now with a Washington D.C., consulting and lobbying group specializing in criminal intelligence issues."





Irregular War Crimes Against Humanity

Who Started World War IW and Is It Like 

The War On Drugs That Never Ends?


http://solidstateindependence.blogspot.com/2013/05/who-started-world-war-iw-and-is-it-like.html






2007-2013

NDAA Detention? Cut me loose! Set me Free!


Aerospace Surveillance Held Prisoner Five Years 

In a Farm House at the End of Some Dusty Texas Dirt Road



1982




Irregular War (IW) is the domestic surveil-lance program started in 1982 by Vice President George H. W. Bush that failed to 'Keep us Safer' in place before the the Oklahoma Bombing of a Federal Building, the first international bombing of Federal Building by Osama Bin Laden in Riyadh Saudi Arabia November 13, 1995 and the 911 attack on New York. 


We cannot say nobody saw it coming, "TSWG was an original subgroup of the IG/T, which later became the Interagency Working Group on Counterterrorism (IWG/CT). In its February 1986 report, a cabinet level Task Force on Counterterrorism, led by then Vice-President Bush, cited TSWG as assuring “the development of appropriate counterterrorism technological efforts.” 

2007

In 2007 George W. Bush declared Irregular War or IW after declaring war on Iraq to keep the funds flowing under the acronym CTTSO, which is the funding source for TSWG:


"Today, TSWG still performs that counterterrorism technology development function as a stand-alone interagency working group. TSWG’s mission is to conduct the national interagency research and development (R&D) program for combating terrorism requirements.
It also has commenced efforts to conduct and influence longer-term R&D initiatives and, reflecting the shift to a more offensive strategy,
balance its technology and capability development efforts among the four pillars of combating terrorism: antiterrorism, counterterrorism, intelligence support, and consequence management."

April 2009


Robert J. Meadows, Ph.D., chairman of the Criminal Justice and Legal Studies Department at California Lutheran University in Thousand Oaks.


Dear Robert J. Meadows, Ph.D., chairman of the Criminal Justice and Legal Studies Department at California Lutheran University in Thousand Oaks.


RE: Your Article “Why the epidemic of mass murders?”


Your closing argument that mass murder is a rare occurrence is incorrect, “While these shocking murders will unfortunately happen again somewhere, mass murder is still a rare occurrence in our culture.”


I write you to inform that these occurrences are not rare and will increase because there is a causal relation to the Bush Domestic surveillance program and a ‘free for all’ police attack on student populations on US campuses.  In part or in whole, ex-law enforcement officials are making millions on erroneous security assessment training creating the occurrences by way of hyper-surveillance.


http://www.linearism.org/LSilverBarTribehtm.html



There has been a dramatic spike in campus violence and shooting deaths and the primary cause is a closed anti-terrorism security system that has firewalled students from their own protection. See my page of personal experiences with the department of justice over the last two years at UTSA and is a open OCR investigation in process for two years.


http://www.linearism.org/LinearismPage012.html


Many journalists such as Holly Hacker with the Dallas News want to know if there is a connection, “Here's something from Holly Hacker:

Now this is curious. You'll remember we told you that Colleen Ridge resigned as police chief at UT-Dallas amid an internal investigation. School officials have not said why she left or what the investigation's about, citing personnel matters. Well, now comes this news from UT-San Antonio. The Express-News is reporting that David Hernandez, UTSA's police chief, was placed on paid leave Tuesday "pending the outcome of an internal investigation. "Adding to the mystery, UT-Pan American fired its police chief last year. Coincidence or connection?


My response


Dear Holly Hacker Dallas News


In response to your inquiry concerning ‘coincidence or connection’ 3 police chiefs suspended from the University of Texas Systems, please refer to my web page http://www.linearism.org/index.html for inside facts to the justice department and failure to protect due process. I am just a graduating student of UTSA turned civil rights activist by desperation and as you will see I am not a journalist but I am a responsible reporter. All the information is true and correct and backed by academic sources.


There is a causal connection to all UT systems and a corrupt justice department exposed by the termination of Belinda Cardenas’s ousted president of UT El Paso and her political connections serving on the congressional committee of civil rights and board of regents UTSA. Although, I am angry with the police department at UTSA, I cannot believe the problem is a corrupt police force. After all, they are officers for hire and their misgivings are the blame of their employer’s legal policy writers such as Cardenas, and an overriding moral obligation to protect students after the tragic event at Virginia Tech (2007) a prelude to a series of horrific repeats at campuses across America by way of policy.


There is a solution – return the classroom back to the professor. They are professionals and as captains of the ship, all the behavioral intervention needed in adult higher education. Campus violence (shooting statistics) reflect a spike in campus homicides / suicides after policy changes in the years 2004 – present as each college applied the new polices which fire walled students from participation in their own protection who fear soliciting help from the campus police less they be identified as targets of suspicion.


Reference Article: Five Years Later "Texas Is Not Getting The Message"





03/22/2013
An Email From The Texas Gang of Four 
"I Need Your Help?"

The Honorable Senator John Cornyn Thank you for your note, “I need your help.” I needed your help but still you don’t get it? See my story at this link: http://solidstateindependence.blogspot.com/2013/03/gang-stalking-texas-gang-of-four.html


Don’t have time for the long read then enjoy a 3 minute video of your constituents living conditions for the last 5 years, held captive in their own home in "a farm house at the end of some dusty Texas dirt road." at the following link http://youtu.be/YJgb1aiRJdc


Your Faithful Community Servant G. N. O'Dell


Full Article : http://solidstateindependence.blogspot.com/2013/03/gang-stalking-texas-gang-of-four.html



May 17, 2013


Texas Fusion Center Threatened by Budget Vote, Could be First to Close 

May 17, 2013 08:04:33 am


In a surprising move, Texas House and Senate budget negotiators agreed to wipe out funding for the Department of Public Safety’s fusion center, part of a nationwide intelligence gathering initiative that has generated controversy, reports the Austin American-Statesman. If the House and Senate affirm the change, it could make Texas the first state to pull the rug from under one of the statewide fusion operations that began under a Department of Homeland Security offensive that has been criticized for wasting taxpayers’ money. “It’s shocking to me,” said Ron Brooks, a former director of the San Francisco fusion center, now with a Washington D.C., consulting and lobbying group specializing in criminal intelligence issues.


Despite their terrorism-focused origins, Brooks said the more than 70 fusion centers across the U.S. have evolved into “all-crime centers” to coordinate information sharing among local, state and federal agencies. Such information sharing provides “smart policing” of everything from street gangs to homicide investigations, Brooks said. He knows of no other state that has eliminated funds for a statewide center. A factor in the decision, was a report by a U.S. Senate investigative subcommittee that lambasted the fusion centers for “irrelevant, useless or inappropriate” intelligence gathering and wasteful spending on private contractors, while doing little to keep the country safer.


http://www.thecrimereport.org/news/cjn/2013-05-tx-fusion-center-threatened



March 2010
Texas Fusion Centers The GOP Political Machine

"Rick Perry Should Not Be The Governor Of Texas November 2010 (Bill White)"

*Dear Bill White the Next Governor of Texas,


I just sent my final report to the White House about the abuses of Rick Perry justifying free-for-spending and Military attacks on political opponents which in my case is a matter of court record with 100 of pages of testimony as a matter of record stored in  investigation files with the following agencies: The Office of Civil Rights Dallas, Kathleen Sebelius Secretary of Health and Human Services Washington D.C., Ralph Ruiz FBI Head Quarters San Antonio Texas, and Court Documents Blanco County Texas April 23, 2010. The essay or report is lengthily but straight to the point delivering a mountain of evidence against Rick Perry Governor of Texas who retaliated against me and my family for filing a civil rights grievance in 2007. I believe, if you look the document over carefully, you will see it is your ticket to the newly renovated Governor Mansion in Austin, that should be ready for you and your family after you are elected in November 2010. The full report is located at this URL


http://www.linearism.org/The911PatriotActUnconstituional.html


And thank you for your personal letter to me actually signed by your own pin 


Gregory O’Dell


P.S. If you know a good lawyer in Texas that is not still practicing law in the year 1876 and might have an interest in pursuing my case, you will be doing a lot of people of favor by not having to deal with me personally!



*Actual letter written in response. I have nothing to hide including my emotional distress



November 18 2009
A Basis of un-Employment and Texas Oppression

“Obama says he met with half brother while in China"

BEIJING – President Barack Obama said Wednesday that he met briefly with a half brother who lives in China and who recently wrote a semi-autobiographical novel about the abusive Kenyan father they share.”


http://news.yahoo.com/s/ap/20091118/ap_on_re_as/as_obama_brother


Mr. President, It’s a small world after to all! What an interesting enlightening story posted by the AP associated press revealing a little of your personal life and happy reunion with your brother in Shenzhen China. I believe, even the president of the United States has a right to a privacy, but we thank you for a chance to view your personal story, family, and worldly associations which  help us all to understand how interconnected each American citizen is tied to worldly affairs.


Your case is not unique, there are thousands of U.S. ex-pats as well as businessmen, students, health care professionals, and family members from almost every country of the world who live and thrive as guest aboard. 

Thousands and possibly millions of Americans live aboard in countries the U.S. media portrays as unjust or anti-American. People are people, we share so many common ethical core beliefs, if were not for the color of our skins, we would claim the whole world as our brothers, sisters, children, and close friends. Although, I detest Chinese turtle soup served in most PRC restaurants, the years my family lived in the PRC and many other foreign domains, resolved our biases or let’s say changed our view of the people of the world from a stereotype of odd, unreasonable or different people to the reality of similarities we all share as a family of mankind!
http://solidstateindependence.blogspot.com/2015/05/fe-fi-fo-fom-fisa-fifa-united-states.html

Lastly, I believe the employment criteria for working for the state department or even the Peace Corp., screen out the best people as ambassadors to the world. I have spent the majority of my working life outside of America as an individual contractor sometimes with “only buttons in me pockets” the state department labels us as an EX-Patriot. Thank god we don’t live up to the literally meaning of the term and act and behave as ambassadors for the people of America. 


Personally, I have been applying/testing  for employment with the State Department, the Peace Corp as well as other agencies sense the age of seventeen as an ambassador of good well, always to be rejected and turned away; even though, I have scored in the highest ranks of worldly knowledge. As a disabled 52 year old graduate of the economic class of fall 2008 University of Texas, I still hope and dream to one day represent the United States as an ambassador to the world in any country I may be assigned. If fortune five-hundred business can pick-up the phone, call me at home, and expect me to arrive in any country for work within a moments notice, why I am I always screened/ rejected from the people of State Department most fit citizens who after they have gained employment status, constantly complain about their assignments, conditions, and pay? Thank you for reaching out as the president of the United States of America and an ambassador of good well to the whole world. 


Please enjoy my essay contest posted in the Guangzhou PRC news paper 1993 asking visiting Americans to participate in a national Chinese Essay contest, “China through My Eyes” at the following link”


http://www.linearism.org/LTheStoryOfTheMonkeyPeoples.html


Gregory O’Dell

Somerset Texas



“Whoever intentionally obstruct the proceedings before depts., agencies, and committees, obstruct this criminal investigation and/or retaliate against me because I am a victim, you will be punished to the full extent of the applicable law in 1505 of Title 18 Obstruction of proceedings before depts., agencies & committees, 1510 Obstruction of Criminal investigations, 1513 of Title 18 Retaliating against a witness, victim or an informant, or 1514 Civil Action to restrain harassment of a victim or witness. Whoever intentionally alters, destroys, mutilates or conceals records, or documents with the intent to impair the object’s integrity or availability for use in an official proceeding will be punished to the full extent of law as defined in 1519 of Title 18 Destruction, Alteration or Falsification of records in Federal investigations and bankruptcy.”


Friday, September 20, 2013

News Max Poll Weighted Just Like We Saw Votes Electronically Manipulated To GOP Lies

Texas Illegal Hackers Who Bring Harm to Others 
Are Still in My Personal Computer System not NSA! 

What do we do - go back to a Chisel and Stone Slate 
like the Flintstones?

Why Start Any Project? If You Have Already Reported Criminal Thief of Patient Rights and Copyrights?

***************

One reason - If Your Project is The Burden Of Proof

The Eyes of Texas Are Upon You!


I Didn't Punch That Dogie

Texas
Electronic Human Exploitation 

"Why even start on a project using a digital device 
if you know that information will be stolen or used against 
you by painting a picture to demoralize you, take illegal action against you or illegal discovery, particularly in the State of Texas there are several cases."

Electronic exploitation can be defined as both a way to benefit mankind and also a way to harm innocent people.  Most importantly, is to develop a list of hazards that have been shared by those that have been harmed and now form a cultural collective consciousness.

1.     Exploitation that is begin or brings no harm such as political speeches,  products/ service advertisements, and computer applications that connect us collectively,  as a network of beneficial knowledge. This may also include research and experimentation that brings no harm. At worst, this type of exploitation is an irritation, not and electronic attack that brings harm.

2.     Government control by overriding of the media inclusively and completely, including radio broadcast, television, and the internet. This is extremely important to National Security in case of a disaster or an attack by a foreign country. In this case, it is best for one voice on the bullhorn to lead us to safety.  This is not electronic exploitation; it is our national broadcasting alert system.

3.     Government intervention by corrupting web pages, scrambling satellite communications, slowing web pages, or making web pages inaccessible.  This has been a complete failure and was first noticed by the public in 2004, when a middle age man thought local college students were corrupting his pages for fun.  He complained several times because the web pages were his only source of income. The corruption of his pages continued and out of the blue, he went off the deep end, took a rifle to the college and began shooting innocent students.  This is the noted campus shooting before the Virginia tech massacre in 2007. 
     
        Additionally, Texas Governor’s Command and Control Centers corrupting the information on web pages of many innocent people; such as minority religions, academic writers, or clubs and societies. Other than the extreme case of the college shooting mentioned, this type of intervention was not just an irritation, but a loss of academic papers, a dumbing down, financial loss, loss of credibility to the authors, and a violation of freedom of speech. 

       Tangible loss include such things as copyright infringements, patent thief, and destroys innovation by sharing your private information such as a business plan or perhaps a priority map to a gold mine. Several small businesses were destroyed because of the middling by people, who don’t know what they are doing. After your hard work has been stolen one or two times, you refrain from designing, planning and even creative writing. Ideas belong to everybody but if you file for a patent or copyright the royalties belong to you! 

       Why even start on a project using a digital device if you know that information will be stolen or used against you by painting a picture to demoralize you, take illegal action against you or illegal discovery, particularly in the State of Texas there are several cases.

i.              The intent to target specific persons or groups was to hold power and monetary gain including voter fraud in favor of the Texas GOP.

ii. We should not censor the internet by overriding the system, but let others discredit those with false or misleading information. If a web page is threatening, then call the local police and ask them to investigate by knocking on the individuals’ door and tell them they are disturbing the public, just as if they were disturbing the peace with loud music a 3:00 am in the morning.

iii.             Immediately after the 911 attack we went into martial law and did everything we could with the resources we had. Trillions of dollars were wasted, while trillions of dollars were prudently invested.
In the case of martial law, it is always the case that someone is targeted that is innocent, but that is what happens in a state of war.

iv.            Many years after the 911 attack, the term ‘Terrorist’ and ‘Terrorism’ became a profitable way to justify anything mindless corporations wanted. Inside trading became a way of doing business for those in the know, creating the white elephant we know today as Top Secret America.

v.               Incumbent politicians used media intervention to hold power and to target political adversaries. This is still going on today. I am not talking about attack ads, where one politician attacks the other, I am talking about electronic attacks that are illegal in every state of the union under “Human Exploitation.”


vi.                The police have used these devices without due cause and convicted many innocent victims. Others officers had knowledge of how the surveillance system works and became human and drug traffickers. Several were caught, tried and convicted after Obama stepped into office.

vii.               In 2009 Texas Governor Rick Perry Refuse to debate with the Democratic candidate Bill White to hold his seat, “If I say anything, I will lose the election, we have computers that do that (Rick Perry 2009).” This raises a whole new level of voter fraud. People are electronically conditioned, go to the polls thinking that they are making a rational decision, and vote as instructed by the computer application.

vii.       The most obvious violators come from Marketing groups who sell goods or services. We know this because most of these crimes are visible, we get angry and file a complaint, but these companies also participate in invisible Electronic Human Exploitation, that brings harm to those targeted or incite a riot. Data mining is not as if a corporation owns a gold lease and is mining gold that belongs to them, data mining at some extremes is thief, targets the innocent and can bring harm.

4.      Government intelligence could not keep up with electronic attacks by other countries and decided to bring in private firms to assist. These private firms became corrupted by the protection of the Supreme Court Ruling, Citizens United, corporation person-hood or corporations have the right of a person; therefore, they need not disclose the information that they shared about you with anybody willing to pay for the data, including the police, without due cause.  False negative and False Positive reports were forged at a price.  A good example Is Bain and company working as a private security firm in Texas without a competitive bid.

5.      The contracting of private manufacturing companies, meant people without the proper security clearances, were now in a position to create deadly electronic and Intrusive surveillance devices. Reengage employees used these devices on innocent people. Example, a hacking device that is now off the market was used by private detectives as extortion. In other words, these private Dics were paid hush money from the victims they hacked without due cause. Micro wave RMF devices were used on innocent victims. This device uses a microwave gun that by-passes the auditory cortex and play sounds and images in the victims minds. These same devices were used for retaliation by government officials and for political control. Many other un-godly devices were manufactured and used on targets or for experimental purposes that are still classified. One case in my local area, a high intensity sound device was used to torture innocent victims, seemingly picked out of random.


6.      Hyper-surveillance can and does bring harm. Some people are more sensitive to surveillance than others.  People started to act with symptoms of paranoid schizophrenia and would fill every psychiatry office available, thinking they had a mental illness when they did not. Many of these people were treated with medications that damaged their brains, who had no mental illness in the past, but because of the treatment with toxic drugs are now permanently disabled.

7.      Black domestic helicopters seemed to go out of control by some central command station, breaking FAA regulations, swooping people close enough to threaten them or force them to hide in shelter.


8.      Electromagnet crowd control devices such as the device that cause the Rodney King riot, were use on innocent victims or any person that were on the target list, in order to control their behavior; however, the outcome cannot be predicted and some of these people became hostile, made threats and were thrown into jail and still remain there at no fault of their own.

9.      Automated computer applications were designed that issued automatic payments to companies that offered no services or products. Automated applications were used to communicate information that requires human intervention that caused the deaths of countless people.  Procurement agents were replaced by computers applications for high dollar threshold products and services to by-pass protocol for competitive bids, so the process would not get in the way of those with a vested interest.  This is still done today by some states and local governments by forming corporations and non-profits to protect them from disclosure by the Supreme Court ruling citizens united, or corporate personhood, Corporations have the rights of a person.

Covert operations in Texas such as gun walking, drug/ human trafficking started in 2002, allowed these operations to cross our borders to track how these operations worked, but were unsuccessful, other than delivering another report to congress to extract more funds for more covert operations. These operations began in 2002, and ended with the fast and furious operation that was exploited for political purposes. Many other innocent civilian victims, including border control agents and police officers were injured and killed during these operations; however, no mention of an investigation has taken place.

There is a cultural consciousness that is growing in numbers, not by popularity but out of desperation to protect themselves from harm from electronic exploitation. These people have been abused one time or another, tried to report their concerns to the authorities by due process; however, justice was never served, and the perpetrators of the crimes are still employed within our National Security Network.  Additionally, the public is unaware of these dangers, because they are hidden by destroyed police reports, manipulated data, or investigative committees seal what is known by many from the main populace, that can bring harm to themselves and family members. 

At the Federal level , the Obama Administration stop the use of such devices on United States Citizens the moment he step into office; however, some states still use these devices and money making schemes in the name of National Security justified by the 911 Act. National security does not rest in the power of the states, but in the powers of the Federal Government – God Bless America!