Search This Blog

Showing posts with label Intellectual Property Thief. Show all posts
Showing posts with label Intellectual Property Thief. Show all posts

Wednesday, January 14, 2015

MLK Day Supreme All Lower Laws Obey

This is my Blog - 
'Hey You Stay off my Cloud'
MLK So All Peoples Can Walk About Freely

The Biggest MLK Walk 2015
The Cowboy Capital of the World San Antonio Texas
Safe In High Places
Some things Take A Real Cowboy


ADA Complaint Valid Work My Case 06152013 Don't Work Me Over
Always Trust Your Dog
Bank Safe In Higher Places "The Bank Shared It You Bare It"

Disabled Veterans Safe In Higher Places

City Water Lowest On The Surveillance Hierarchy of Command

4:00am 01/14/2015 
Trespasser Turns off Water
"How Did The Water Company Know?"

This Is Not A Question
or is this:

Texas Attorney General 
Ken Paxton Paradox 
 'The Texas Tea Party' 
are Real International Terrorist 


 And


You Can Question The FBI On This
http://somethingstakesarealtexascowboy.blogspot.com/2013/10/take-my-hand-penetrate-make-move-reach.html


 Filed In A Texas Court of Law 

And Reported The FBI
Three known targets with empirical evidence 2005-2014

October November 2007

"The FBI Helped Gregory O'Dell and Family and 
I Am Sure They Will Help You"

Friday, November 15, 2013

What Is Electronic Exploitation?

Texas Electronic Exploitation Is 
Texas Human Exploitation and Is 
Deadly!

Electronic exploitation can be defined as taking an unfair advantage of person by way of any electronic device, ranging from a simple radio political broadcast, telephone sales call, television advertisement, computer application pop-up or even the extreme of an electronic attack. 

Electronic exploitation is not necessarily a bad thing; exploitation was once an ambiguous term that included sometimes irritating sales pitches, which are the driving force of capitalism or way to make profit by selling goods or services. 

In the sense of fair appropriate business promotions and exchanges, we really cannot call these events exploitation, if we live in free market and expect to barter by competition for the best price and quality of goods or services.

Electronic exploitation is anything beyond what is fair and reasonable. We identify electronic exploitation culturally, which defers among diversified groups geographically, religiously, politically, or what a particular group holds to be fair and reasonable collectively.  

All electronic communications of today are covered by the Privacy Act of 1974, the applications may have changed but the provision had foresight that includes most of today's applications with some exceptions. 

The FBI and CIA have always had the authority to wiretap in the case of a serious threats, which we call a 'terrorist threat' today. 

What is fair and reasonable is defined by a particular Cultural Collective Consciousness, and this is why social networks fail overtime, because social consciousness is naturally competitive, and over time excludes the majority of customers. 

Culture is the best a group of people can do; however, they do not disqualify themselves by competition, or disband because of a dominant social norm by a majority more popular than another, they simply quit using the product. 

Some groups never participate because the product is not accessible, uses a foreign language they do not understand, or is financial out of reach as well as many other determinant factors. 

Communication devices change as technology produces better ways and means to communicate; however, will never go out of style, be it a post card or a cell phone, or any new device in the future, because they connect members of cultural groups not social networks. 

In the domain of politics, social networks are important indicators but for intelligence agencies they are of little importance and give false readings of the current state of global affairs.  Social networks of today or even the internet is a temporary way to police uprisings, or threatening behavior;  but once you have arrested a few with contrary opinions, the rest of the group stops using the device, or learn to communicate abstractly in ways only members of that particular group understands. 

We call this type of communication collective consciousness, not to be confused with universal consciousness, nor to lessen to any electronic device, because some groups can communicate without the use of a satellite, with other members anywhere on the globe, anytime without any electronic device or use of a post card, with or without a complex code. 

Personally, I threw my cell phone in the dumpster the moment I was released from a fortune five-hundred company, simply because I was being tracked by that cell phone. 

The majority of people would not understand my reasoning, but if you have been targeted as a person of interest or just an experiment, electronic exploitation becomes intrusive, and endangers those who are identified on ridged data bases. 

Even more threatening, are data bases that can be easily manipulated, a person can be targeted for just political reasons or retaliation. I have seen some cases; people are targeted just for fun, by people who should not be employed by our National Security Agency!  

One way to avoid this type of situation is mandatory conscription, were all people of a particular country must serve in the military service for a certain length of time such as Switzerland, all male adults must serve for two years.  The rotation of National security personnel strengthens any countries intelligence operations to avoid a segregation of those that know, who overtime will abuse those that do not. We have seen this in America after World War II, Vietnam, and now post 911. 

Within the last few years,  we all have seen the dangers when an executive leaders of a state of country remains in that position for long periods, who has authority over both overt and convert intelligence operations; knowledge is power and absolute power corrupts absolutely. This is why our own president of the United States serves no more than two terms or eight years.

Of course, if everyone could be trusted to do the right thing all the time, then GPS tracking by cell phone is a good technology to keep us safer. There are many good examples for carrying a GPS devices such as if your vehicle broke down in a remote area, a lady is in a compromising position, a child is lost, or you’re the only witness to a fire, and need a telephone to call the fire department. The paradox is that GPS devices as well as other electronic devices are also used to harm or exploit innocent people.

We have defined electronic exploitation as both a way to benefit mankind and also a way to harm innocent people.  Most importantly, is to develop a list of hazards that have been shared by those that have been harmed and now form a cultural collective consciousness.

1. Exploitation that is begin or brings no harm such as political speeches,  products/ service advertisements, and computer applications that connect us collectively, as a network of beneficial knowledge. This may also include research and experimentation that brings no harm. At worst, this type of exploitation is an irritation, not and electronic attack that brings harm.

2. Government control by overriding of the media inclusively and completely, including radio broadcast, television, and the internet. This is extremely important to National Security in case of a disaster or an attack by a foreign country. In this case, it is best for one voice on the bullhorn to lead us to safety.  This is not electronic exploitation; it is our national broadcasting alert system.

3. Government intervention by corrupting web pages, scrambling satellite communications, slowing web pages, or making web pages inaccessible.  This has been a complete failure and was first noticed by the public in 2004, when a middle age man thought local college students were corrupting his pages for fun.  He complained several times because the web pages were his only source of income. The corruption of his pages continued and out of the blue, he went off the deep end, took a rifle to the college and began shooting innocent students.  This is the noted campus shooting before the Virginia tech massacre in 2007. 

Additionally, the people (Top Secret America) corrupting the information on web pages of many innocent people; such as minority religions, academic writers, or clubs and societies. Other than the extreme case of the college shooting mentioned, this type of intervention was not just an irritation, but a loss of academic papers, a dumbing down, financial loss, loss of credibility to the authors, and a violation of freedom of speech. Several small businesses were destroyed because of the middling by people, who don’t know what they are doing.

i. The reason they were targeting the wrong people is because of the selection process of National Security. The NSA process screens people out who are qualified to make such assessments and is still that way. They need a more diverse experienced workforce and to do so they must make exceptions to the screening. And most importantly, what is there to hide if we have had a free press sense the founding of our nation. We should not censor the internet by overriding the system, but let others discredit those with false or misleading information. If a web page is threatening, then call the local police and ask them to investigate by knocking on the individuals’ door and tell them they are disturbing the public, just as if the music was too loud.

ii. Immediately after the 911 attack we went into martial law and did everything we could with the resources we had. Trillions of dollars were wasted, while trillions of dollars were prudently invested. In the case of martial law, it is always the case that someone is targeted that is innocent, but that is what happens in a state of war.

iii. Many years after the 911 attack, the term ‘Terrorist’ and ‘Terrorism’ became a profitable way to justify anything any businesses wanted. Inside trading became a way of doing business for those in the know, creating the white elephant we know today as Top Secret America.

iv. Incumbent politicians used media intervention to hold power and to target political adversaries. This is still going on today.

 v. The police used these devices without due cause and convicted many innocent victims. Others officers had knowledge of how the surveillance system works and became human and drug traffickers. Several were caught, tried and convicted after Obama stepped into office.

 vi. In 2009 Texas Governor Rick Perry Refuse to debate with the Democratic candidate Bill White to hold his seat, “If I say anything, I will lose the election, we have computers that do that (Rick Perry2009).” This raises a whole new level of voter fraud. People are electronically conditioned, go to the polls thinking that they are making a rational decision, and vote as instructed by the computer application.

 4. Government intelligence could not keep up with electronic attacks by other countries and decided to bring in private firms to assist. These private firms became corrupted by the protection of the Supreme Court Ruling, Citizens United, corporation person-hood or corporations have the right of a person; therefore, they need not disclose the information that they shared about you with anybody willing to pay for the data, including the police, without due cause.  False negative and False Positive reports were forged at a price. The contracting of private manufacturing companies, meant people without the proper security clearances, were now in a position to create deadly electronic and Intrusive surveillance devices. Reengage employees used these devices on innocent people. 

Example, a hacking device that is now off the market was used by private detectives as extortion. In other words, these private Dics were paid hush money from the victims they hacked without due cause. Micro wave RMF devices were used on innocent victims. This device uses a microwave gun that by-passes the auditory cortex and play sounds and images in the victims minds. These same devices were used for retaliation by government officials and for political control. Many other un-godly devices were manufactured and used on targets or for experimental purposes that are still classified. One case in my local area, a high intensity sound device was used to torture innocent victims, seemingly picked out of random.

5. Hyper-surveillance can and does bring harm. Some people are more sensitive to surveillance than others. People started to act with symptoms of paranoid schizophrenia and would fill every psychiatry office available, thinking they had a mental illness when they did not. Many of these people were treated with medications that damaged their brains, which had no mental illness in the past, but because of the treatment with toxic drugs are now permanently disabled.

6. Black domestic helicopters seemed to go out of control by some central command station, breaking FAA regulations, swooping people close enough to threaten them or force them to hide in shelter.

 7. Electromagnet crowd control devices such as the device that cause the Rodney King riot, were use on innocent victims or any person that were on the target list, in order to control their behavior; however, the outcome cannot be predicted and some of these people became hostile, made threats and were thrown into jail and still remain there at no fault of their own.

 8. Automated computer applications were designed that issued automatic payments to companies that offered no services or products. Automated applications were used to communicate information that requires human intervention that caused the deaths of countless people.  Procurement agents were replaced by computers applications for high dollar threshold products and services to by-pass protocol for competitive bids, so the process would not get in the way of those with vested interest.  This is still done today by some state and local governments by forming corporations and non-profits to protect them from disclosure by the Supreme Court ruling citizens united, or corporate personhood, Corporations have the rights of a person.

 9. Covert operations in Texas such as gun walking, drug/ human trafficking started in 2002, allowed these operations to cross our borders to track how these operations worked, but were unsuccessful, other than delivering another report to congress to extract more funds for more covert operations. These operations began in 2002, and ended with the fast and furious operation that was exploited for political purposes. Many other innocent civilian victims, including border control agents and police officers were injured and killed during these operations; however, no mention of an investigation has taken place by NSA.

10.  It would be a false statement to say people cannot use multimedia for self-protection that was proved as in the recent cases of Mexican nationals being blamed for their own murders for communicating on the web for protection. The many articles written are a good example that web communication can be used as protective speech if the person believes he or she is in a threatening position. However, none of this activity included any illegal action such as hacking or electronic data mining or as described by law.

There is a cultural consciousness that is growing in numbers, not by popularity but out of desperation to protect themselves from harm from electronic exploitation. These people have been abused one time or another, tried to report their concerns to the authorities by due process; however, justice was never served, and the perpetrators of the crimes are still employed within our National Security Network. 

Additionally, the public is unaware of these dangers, because they are hidden by destroyed police reports, manipulated data, or investigative committees seal what is known by many from the main populace, that can bring harm to themselves and family members.  

At the Federal level , the Obama Administration stop the use of such devices on United States Citizens the moment he step into office; however, some states still use these devices and money making schemes in the name of National Security justified by the 911 Act. National security does not rest in the power of the states, but in the powers of the Federal Government – God Bless America!

Perhaps Mystics dwell in the peripheral blind spot of social invisibility. Could it be that there is an everyday ordinary common god, as close as the invisible nose on my face, working miracles in my life?

This essay was posted for editing by one of editors; however it was attack by Mitt Romney’s paid publishers to bash President Obama in regards to the arrest of Osama Bin Laden which ended in his death.  At first I ignored the comments, and then took on the challenge that was censored with white lines, and a bizarre attempt to tie the essay to the Benghazi attack reported by me to law enforcement and homeland security. Again, you have done no wrong, why should it concern you?

The essay that turned into nightmare, became my saving grace, as I pulled my FAA first Responder Card from my wallet and reported an near miss high speed attack over my home as a report, it could have been a police emergency, but I still do not know, “One By Land Two By Sea Can Elephants Actually Swim”

Read Full Essay at This Link:
http://somethingstakesarealtexascowboy.blogspot.com/2013/11/gullible-fast-and-furious-travels-from.html

G N O’Dell July 7 2012
Read The Book Tunneling Has Been Going On For 150 Years 
The Commodity has change but it is still the same
Quicksilver Wars Is More Than A Fast Buck

Border Control
Congress Is Making Decisions based on Political Gain
At This Moment People Are In Servitude and Tortured

You have thousand of Anthropology Students 
Looking For Something To Do
Take The Classroom To The Sites
That's What They What Do
Dig Things Up

http://news.yahoo.com/us-mexico-unearth-sophisticated-border-drug-tunnel-191557173.html

Stop Thinking about the Gulf Coast Border When Making Decisions
on The TexMex Border South Central and South West Texas
Not Free Speech Forced Participation For Protection

Why Does It Concern Me and My Family?
We Are Stakeholders That The Police And FBI Have Still Not Asked Us
One Single Question or Opened and Investigation
Billions of White Collar Crime
********************************

Quicksilver Wars!
Repost 08/25/2013

Chapter 4 Perry Assumes Control


"With Phillips' departure from Terlinguna in autumn of 1906 following his wife's accident, the Chisos mine entered a new phase of administrative control"

The FISA 
New Mexican Connection Leading to arrest of 
public officials Involved with Convert 
Action not Approved by Congress over the last Decade 
before Fast and Furious was even Conceived

Solicitation 1: Anthropologist Field Researcher Seeks 1 Mil Federal Funds to finish 
Academic Field Research diaries such as use and documentaries illustrating the least understood cultural margins of District 28 ant 23 along the Texas Mexico border.
Solicitation 2: Anthropologist Completes Six Years Field Research Seeks 3.8 Million In Federal Funds to establish a two year program that will include Field Research students working in South Central Texas from multidisciplinary schools such as Forensics, Linguistics, Geography, Cultural Anthropology, Fine Arts, Literature, Philosophy of Religions, Archaeologist, Aerospace, and Law Enforcement. 

The Tex-Mex Border is the least understood most controversial District in Texas and Bordering District in the United States of America including Mexico. An international-exchange program would be more desirable and will bridge diplomatic misunderstanding bred from 
ignorance. 



 Write  to: 1290 McCoy Road Somerset Texas 78069



Thursday, October 24, 2013

Take My Hand Reach Out of the Darkness into the Light

You Got To Come To Me I Cannot Go To You
Just Reach Out of The Darkness
I Am Here For You!

It's Just My Lot In Life 



All The Bad Guys Are Dead or In Prison or Soon Will Be

It was My Pleasure I Could Not Have Done It Without You!
Makes Sense They Hit A Target That Reported Them
I Am The Only Witness That Can Testify Who Is An Expert And Is Not 
Restricted by A Clearance
They Sure Did Leave Town In A Hurry
Somebody is operating with equipment not authorized by the Secretary of Defense?
I understand that the National Guard Bureau Is Now Part of These Electronic Warfare Operations

 Filed In A Texas Court of Law
And Reported The FBI
Three known targets with empirical evidence 2005-2009
October November and December 2012

Secretary of State January 20, 2001 December 18, 2006  Donald H. Rumsfeld Illinois 

Secretary of State Gates Robert M. Gates Texas December 18, 2006 July 1, 2011 May 28 2011

Secretary of State Leon E. Panetta California July 1, 2011 February 27, 2013 

U.S. PSYOP forces are forbidden to target (i.e., attempt to change the opinions of) U.S. citizens at any time, in any location globally, or under any circumstances.[7] However, commanders may use PSYOP forces to provide public information to U.S. audiences during times of disaster or crisis. PSYOP includes Electronic Warfare that can target human beings at any distance!


On January 7, 2011, President Obama signed the National Defense Authorization Act with several redesignated titles within the Department of Defense. These changes included renaming the DDR&E as, once again, ASD(R&E).[2]

Alan R. Shaffer (Acting) Nov 21, 2007 – July 1, 2009 Robert M. Gates George W. Bush

Assistant Secretary of Defense (Research and Engineering)
Zachary J. Lemnios July 2, 2009 – January 7, 2011 Robert M. Gates Barack Obama 

Assistant Secretary of Defense (Research and Engineering) 
Zachary J. Lemnios January 7, 2011 – November 30, 2012 Leon Panetta Barack Obama 

Zachary J. Lemnios (born February 21, 1955)[1] is an American scientist who formerly held the post of Assistant Secretary of Defense for Research and Engineering (ASD(R&E)), which used to be known as Director, Defense Research and Engineering (DDR&E), in the United States Government. He was confirmed by the United States Senate on June 19, 2009, and sworn in as on July 2, 2009.[2]


On November 20, 2012 he was reported to have submitted his resignation letter to President Obama.[3] On November 30, 2012 he left Pentagon and joined IBM.[4][5]
Did They Experiment On Their Own Children
or Members of Congress or the Senate?



Now These Guys Are Protecting Me
I Am Glad Their Cannons Are Ready
Don't Come Around A Night
This Is Me and This Is Your Brain

USE YOUR BRAIN!


Master of Self-Defense
Penetrating the Obscure Jungle of Federal Data Manipulation
Volunteer Federal Aviation First Responder

Federal Aviation Administration
April 2000 – Present (13 years 7 months)|Atascosa County Texas
Report And Respond To Downed Or Suspicious Aircraft


Identified a break in National Security and worked with Congressman Henry Cuellar to now include Federal First Responders single point reporting with the Texas State Emergency Response System. Anyone who holds a Valid FAA certificate can now participate from any location 24/7 adding thousands of eyes and ears to our National Security Network.

No Recognition Just Retaliation and Financial Decimation These People are Going To Prison
Too Big To Jail Bullshit



Federal Data manipulation which is a matter of national security violated by the RICO Act changed or deletes my file in the Oklahoma data base for all FAA certificate holders. Certificate holders have been tracked for 25 Years. 

The First To Be Drug Tested by Law and The First 'First Responders'
 language any language over time migrates to the complex away from FACT!

Make no assumption, it is important to know where we are at because by Federal law we must act as First Responders excluded from the Texas State wide Communications Interoperability Plan 2008 – 2010 Version 1.1 scam plan by Governor Rick Perry; however, Obama was elected cutting him off from lining his pockets with gold. Texas Governor Rick Perry still gets 98 billion - I report!




Tuesday, October 22, 2013

Knows How to Ring That Bell Well Intellectual Property Thieves Raided Ran Over A Simple Device That Is Worth Millions


Beach Ball Satellite Marker My Last Project On A Digital Device They Steal Everything
 Intellectual Property Thieves Raided My Shop and Ran Over
A Simple Device That Is Worth Millions
Pay Me
One Criminal Complaint everyday tell Christmas
Just Think How Many Other Things That Make The World A Better Place Stop That Day 
It Took Me Years to Perfect the Technique