Search This Blog

Showing posts with label Privacy. Show all posts
Showing posts with label Privacy. Show all posts

Friday, November 22, 2013

Drives to the Beach to write those things he holds private on a writing tablet

Small Business The Foundation of USA Economy The Elephant Dies Without Small Business
Port Aransas Texas Police Department 03/22/2015 2015000001906
See! Even the President Does not Use A Digital 
Typewriters for Those Things 
He holds Private 


We Are All Counting On Science To Get Us Back To Were We Need To be, So We Can Write Freely without fear of 
of Intrusive Devices Intruding Our Personal Space

Thursday, September 12, 2013

Would Never Cheat At Cards or Exploit Another Human Being

Privacy Why It Should Concern Them!
Dear Congressman Pete Gallego, I attended your DADS HHS Protective Legal Services Friday, July 19, 2013  10:30am – 1:30pm  1714 SW Military Dr., Ste. 110   San Antonio, TX 78221. I have not received an intelligent response why the justice department is not prosecuting my case against the State of Texas with all the evidence provided U.S. Department of Justice. After requesting a congressional investigation from you, I receive this letter from Senator Cornyn "On June 14, 2013, I attended the classified briefing provided to Senators by Director of National Intelligence James Clapper, NSA Director Keith Alexander, and other Obama Administration officials.  You may be certain that I take seriously the role of Congress in providing oversight of these programs, and that I have been and will continue to closely monitor the intelligence activities of the U.S. government.  I am always appreciative when Texans take the time to reach out and share their concerns.  Thank you for taking the time to contact me. Sincerely, JOHN CORNYN United States Senator ” 
                                                                                                 
Civil Rights Division March 30, 2013 
950 Pennsylvania Avenue, N. W. 
Office of the Assistant Attorney General, Main 
Washington, D. C. 20530 
(202) 514-0716 


11. State and Federal Student Aid Inquires to third party government agency ordered not to answer 
12. Stalked by Drone 
13. Stalked by Armed Domestic Helicopter (three killed last 4 months and Texas is the only state that they are armed) 
14. Hit by a bio-lethal electronic device 
15. The control of device in our house such as electricity and television programs used for psychological testing and behavioral control; controlled from a remote location. 
16. Loss of a small business 
17. Police Swatting 
18. Retaliating visits(s) from Human Health Services 
19. Five years of my entire extended family being stalked and retaliation 
20. Domestic surveillance of our home 
21. Sneak and peak searches of our home and small business 
22. Corruption of my business web pages due to political and religious beliefs  
Chronological Allegations and Reporting Agencies who rendered little aid over a five year period 
i. Department of Homeland Security OIG  
1(a) Case Numbers C1307209 Friday March 15 2013 
Includes Stalking by Deadly Force Aerospace and home intrusions 
1(b) Drone Stalking at low altitude 
1(c) Follow up on original case of Stalking abuse of the disables 
1(d) Original complaint contained in number 2 and previous complaint followed with the office of Victims of crimes International Terrorism Complaint (Published in newspaper) 
1(e) Complaint Against the Department of Education OCR Failed to protect us from retaliation or investigate properly  
2. Multiple counts of low stalking by deadly force domestic helicopters 
2(a) Case Numbers C1307206 Friday March 15, 2013 

Please let me know the status of my valid serious complaints thank you Gregory O'Dell

The State of Texas Now Has Several Criminal 
Complaints of Attempted Murder

Senator John Cornyn cannot  ignore these complaints as a function of the state of Texas and not his responsibility in the U.S. Senate. Even if someone were successful, these crimes have a heavy price and the criminals will be brought to justice. 

I do have a concern with Tea Party Senator Cruz, who failed to work my concerns and come to the aid of a protected United States Veteran. Senator Cruz owes his allegiance the foreign state of Canada? 

The fact alone does not disturb me because he is an elected official to the United States Senate but his emails support a treasonous Tea Party, who stole trillions from the Federal reserve. 

Sense nobody has answered any of my questions after reporting high profile crimes, I have good reason to have such an opinion and so do thousands of other United States Citizens.

There is a cultural consciousness that is growing in numbers, not by popularity but out of desperation, to protect oneself from harm from electronic exploitation. These people have been abused one time or another, tried to report their concerns to the authorities by due process; however, justice was never served, and the perpetrators of the crimes are still employed within our national security network.

Additionally, the public is unaware of these dangers, because they are hidden by destroyed police reports, manipulated data, or investigative committees seal what is known by many from the main populace, that can bring harm to themselves and family members. 

At the Federal level , the Obama Administration stop the use of such devices on United States’ citizens the moment he step into office; however, some states such Texas and other Red States still use these devices and money making schemes in the name of national security justified by the 9/11 Act.


Is There Justice In Texas?

"Intrusion into your personal space, by persons or networks of mindless electronic devices, plagiarizers and patent trolls has robbed you of your creativity, spirituality, copyrights, income, and dreams." 

Chapter 8: What Is Electronic Human Exploitation 

Electronic exploitation can be defined as taking an unfair advantage of person by way of any electronic device, ranging from a simple radio political broadcast, telephone sales call, television advertisement, computer application pop-up or even the extreme of an electronic attack. Electronic exploitation is not necessarily a bad thing; exploitation is the driving force of capitalism or way to make profit by selling goods or services. In the sense of fair appropriate business promotions and exchanges, we really cannot call these events exploitation, if we live in free market and expect to barter by competition for the best price and quality of goods or services. 

Electronic exploitation is anything beyond what is fair and reasonable. We identify electronic exploitation culturally, which defers among diversified groups geographically, religiously, politically, or what a particular group holds to be fair and reasonable collectively. What is fair and reasonable is defined by a particular cultural collective consciousness, and this is why social networks fail overtime, because social consciousness is naturally competitive, and over time excludes the majority of customers. 

Culture is the best a group of people can do; however, they do not disqualify themselves by competition, or disband because of a dominant social norm by a majority more popular than another, they simply quit using the product. Some groups never participate because the product is not accessible, uses a foreign language they do not understand, or is financial out of reach as well as many other determinant factors. 

Communication devices change as technology produces better ways and means to communicate; however, will never go out of style, be it a post card or a cell phone, or any new device in the future, because they connect members of cultural groups not social networks. In the domain of politics, social networks are important indicators but for intelligence agencies they are of little importance and give false readings of the current state of global affairs. Social networks of today or even the internet is a temporary way to police uprisings, or threatening behavior; but once you have arrested a few with contrary opinions, the rest of the group stops using the device, or learn to communicate abstractly in ways only members of that particular group understands. 

We call this type of communication collective consciousness, not to be confused with universal consciousness, nor to lessen to any electronic device, because some groups can communicate without the use of a satellite, with other members anywhere on the globe, anytime without any electronic device or use of a post card, with or without a complex code. Personally, I threw my cell phone in the dumpster the moment I was released from a Fortune 500, simply because I was being tracked by that cell phone. 

The majority of people would not understand my reasoning, but if you have been targeted as a person of interest or just an experiment, electronic exploitation becomes intrusive, and endangers those who are identified on ridged data bases. Even more threatening, are data bases that can be easily manipulated, a person can be targeted for just political reasons or retaliation. I have seen some cases; people are targeted just for fun, by people who should not be employed by our National Security Agency! 

One way to avoid this type of situation is mandatory conscription, were all people of a particular country must serve in the military service for a certain length of time such as Switzerland, all male adults must serve for two years. The rotation of national security personnel strengthens any countries intelligence operations to avoid a segregation of those that know, who overtime will abuse those that do not. We have seen this in America after World War II, Vietnam, and now post 9/11. 

Within the last few years, we all have seen the dangers when an executive leaders of a state of country remains in that position for long periods, who has authority over both overt and covert intelligence operations; knowledge is power and absolute power corrupts absolutely. This is why our own president of the United States serves no more than two terms or eight years. 

Of course, if everyone could be trusted to do the right thing all the time, then GPS tracking by cell phone is a good technology to keep us safer. There are many good examples for carrying a GPS device such as if your vehicle broke down in a remote area, a lady is in a compromising position, a child is lost, or you’re the only witness to a fire and need a telephone to call the fire department. The paradox is that GPS devices as well as other electronic devices are also used to harm or exploit innocent people. 

We have defined electronic exploitation as both a way to benefit mankind and also a way to harm innocent people. Most importantly, is to develop a list of hazards that have been shared by those that have been harmed and now form a cultural collective consciousness. 

1. Exploitation that is begin or brings no harm such as political speeches, products/ service advertisements, and computer applications that connect us collectively, as a network of beneficial knowledge. This may also include research and experimentation that brings no harm. At worst, this type of exploitation is an irritation, not and electronic attack that brings harm. 

2. Government control by overriding of the media inclusively and completely, including radio broadcast, television, and the internet. This is extremely important to national security in case of a disaster or an attack by a foreign country. In this case, it is best for one voice on the bullhorn to lead us to safety. This is not electronic exploitation; it is our national broadcasting alert system. 

3. Government intervention by corrupting web pages, scrambling satellite communications, slowing web pages, or making web pages inaccessible. This has been a complete failure and was first noticed by the public in 2004, when a middle-age man thought local college students were corrupting his pages for fun. He complained several times because the web pages were his only source of income. The corruption of his pages continued and out of the blue he went off the deep end, took a rifle to the college, and began shooting innocent students. This is the noted campus shooting before the Virginia tech massacre in 2007. 

Additionally, the people of Top Secret America are corrupting the information on the web pages of many innocent people such as minority religions, academic writers, or clubs and societies. Other than the extreme case of the college shooting mentioned, this type of intervention was not just an irritation, but a loss of academic papers, a dumbing-down, financial loss, loss of credibility to the authors, and a violation of freedom of speech. Several small businesses were destroyed because of the middling by people, who don’t know what they are doing. 

i. The reason they were targeting the wrong people is because of the selection process of national security. The NSA process screens people out who are qualified to make such assessments and is still that way. They need a more diverse experienced workforce and to do so they must make exceptions to the screening. And most importantly, what is there to hide if we have had a free press sense the founding of our nation. We should not censor the internet by overriding the system, but let others discredit those with false or misleading information. If a web page is threatening, then call the local police and ask them to investigate by knocking on the individual’s door and tell them they are disturbing the public, just as if the music was too loud. 

ii. Immediately after the 9/11 attack we went into martial law and did everything we could with the resources we had. Trillions of dollars were wasted, while trillions of dollars were prudently invested. In the case of martial law, it is always the case that someone is targeted that is innocent, but that is what happens in a state of war. 

iii. Many years after the 9/11 attack, the terms terrorist and terrorism became a profitable way to justify what businesses wanted. Inside trading became a way of doing business for those in the know, creating the white elephant we know today as Top Secret America. 

iv. Incumbent politicians used media intervention to hold power and to target political adversaries. This is still going on today. 

v. The police used these devices without due cause and convicted many innocent victims. Others officers had knowledge of how the surveillance system works and became human and drug traffickers. Several were caught, tried, and convicted after Obama stepped into office. 

vi. In 2009 Texas Governor Rick Perry refused to debate with the Democratic candidate Bill White to hold his seat, 
“If I say anything, I will lose the election, we have computers that do that,” said Perry. 
This raises a whole new level of voter fraud. People are electronically conditioned, go to the polls thinking that they are making a rational decision, and vote as instructed by the computer application. 

4. Government intelligence could not keep up with electronic attacks by other countries and decided to bring in private firms to assist. These private firms became corrupted by the protection of the Supreme Court’s Citizens United ruling, where corporations have the right of a person; therefore, they need not disclose the information that they shared about you with anybody willing to pay for the data, including the police, without due cause. False negative and false positive reports were forged at a price. The contracting of private manufacturing companies, meant people without the proper security clearances, were now in a position to create deadly electronic and Intrusive surveillance devices. Reengage employees used these devices on innocent people. Example, a hacking device that is now off the market was used by private detectives as extortion. In other words, these private dicks were paid hush money from the victims they hacked without due cause. Microwave RMF devices were used on innocent victims. This device uses a microwave gun that bypasses the auditory cortex and play sounds and images in the victims’ minds. These same devices were used for retaliation by government officials and for political control. Many other ungodly devices were manufactured and used on targets or for experimental purposes that are still classified. One case in my local area, a high intensity sound device was used to torture innocent victims, seemingly picked out of random. 

5. Hyper-surveillance can and does bring harm. Some people are more sensitive to surveillance than others. People started to act with symptoms of paranoid schizophrenia and would fill every psychiatry office available, thinking they had a mental illness when they did not. Many of these people, who had no mental illness in the past, were treated with medications that damaged their brains and because of the treatment with toxic drugs are now permanently disabled. 

6. Black domestic helicopters seemed to go out of control by some central command station, breaking FAA regulations, swooping people close enough to threaten them or force them to hide in shelter. 

7. Electromagnet crowd control devices such as the one that caused the Rodney King riot, were use on innocent victims or any person that were on the target list, in order to control their behavior; however, the outcome cannot be predicted and some of these people became hostile, made threats and were thrown into jail and still remain there at no fault of their own. In fact,  the testing of this equipment started a war in downtown Los Angeles that had world wide coverage as I watched the turmoil from China via satellite TV.

8. Automated computer applications were designed that issued automatic payments to companies that offered no services or products. Automated applications were used to communicate information that requires human intervention that caused the deaths of countless people. Procurement agents were replaced by computer applications for high dollar threshold products and services to bypass protocol for competitive bids, so the process would not get in the way of those with vested interest. This is still done today by some state and local governments by forming corporations and nonprofits to protect them from disclosure by the Supreme Court ruling citizens united, or corporate personhood, Corporations have the rights of a person. 

9. Covert operations in Texas such as gun walking, drug/ human trafficking started in 2002, allowed these operations to cross our borders to track how these operations worked, but were unsuccessful, other than delivering another report to congress to extract more funds for more covert operations. These operations ended with the Fast and Furious operation that was exploited for political purposes. Many other innocent civilian victims, including border control agents and police officers were injured and killed during these operations; however, no mention of an investigation has taken place by NSA. 





There is a cultural consciousness that is growing in numbers, not by popularity but out of desperation, to protect oneself from harm from electronic exploitation. These people have been abused one time or another, tried to report their concerns to the authorities by due process; however, justice was never served, and the perpetrators of the crimes are still employed within our national security network.

Additionally, the public is unaware of these dangers, because they are hidden by destroyed police reports, manipulated data, or investigative committees seal what is known by many from the main populace, that can bring harm to themselves and family members. 

At the Federal level , the Obama Administration stop the use of such devices on United States’ citizens the moment he step into office; however, some states such Texas and other Red States still use these devices and money making schemes in the name of national security justified by the 9/11 Act. 
National security does not rest in the power of the states, but in the powers of the Federal Government – God Bless America! 

Wednesday, September 4, 2013

You can take the Texas Veteran out of Texas but You Can’t Take U.S. Military training out of the Texas Veteran

Federal Classified Documents Hacked from County Hick’s P.C.
By the State of Texas not NSA
LA Women In Memory of Anne Patterson-O’Dell

All it took was an alert to the FBI ICC Unit everything seen to stop for a brief moment as terabytes of data were electronically transferred by satellite or land line to overhead cameras that identify my biometric profile at that time and at that place – Hackers Busted and the information neutralized, after I unplug every electrical device including TV and Telephone and the experts took them out!


Chapter 1: Texas Domestic Surveillance: If They Can They Will
And They Did
Sunday, August 4, 2013 by A Real Texas Cowboy

Just another voice in the wilderness, I had no idea that by exchanging my writing tablet and No. 2 pencil for a Windows Word computer application would cull me out of millions as I rose to the top of web browsers in the summer of 2000. Born in the year BC—Before Computer—I can say, “In the beginning was the word and the word was without form.”

There are those who will argue that computer systems have a history going back more than 100 years, represented by a variety of machinery such as the mechanical cash register, calculators, and even Enigma, used by the Germans during World War II for the encryption and decryption of secret messages.

Most will argue that the first computer was developed as far back as 3000 B.C. The abacus was an arithmetic calculator that used rows of wooden balls. The device is so reliable and trustworthy; it was still used in China during my stay in the early 1990’s. The system certainly seemed much more efficient than the registers I was accustomed to in Mega Grocery Stores that seemed to stop operating the moment my place in line moved to pay the cashier.

Perhaps it was just a matter of odds or a coincidence that for some reason or another, when I came to pay, the cashier would open up the receipt printer and pull long lines of wrinkled paper tape out of the device to get it operational again. Many times the procedure would not work and the cashier would have to call the manager, who had key to override the system.

Twenty years later, not much has changed for me. When my credit card is swiped everything stops for a brief moment as terabytes of data are electronically transferred by satellite or land line to overhead cameras that identify my biometric profile at that time and at that place. I know instinctively the pause is no coincidence. I have been targeted by a domestic surveillance system that had gone completely out of control.

Those at the extreme right will say, “If we can we should,” but that does not include those that campaign for such in the name of national security, justified by the 9/11 Patriot Act. I have no objection when it comes to national security. My concern with the “If we can we should” argument is who is ‘we’ and do they know what they are doing?

How displeasing to have representation in the Senate such as Tea Party member Ted Cruz (R-Texas), who cries for justice after the IRS allegedly targeted ultraconservative nonprofits, while in reality many progressive groups were also targeted and Cruz has not issued one complaint about that. Others were targeted for and murdered by NSA employee.

The Senator is also aware that thousands of Texans have been victimized by non-lethal and bio-lethal weapons; however, he has not made one speech standing up for those who experience loss of life, financial decimation, or are held in Texas prisons innocent of any crime.

Thousands of Americans on United States soil have been unjustly targeted, persecuted, and oppressed by the corrupt few who can buy access to this information. Some such as the Dixie Cup billionaires Charles and David Koch along with a co-conspirator like Texas Governor Rick Perry will buy or manipulate the press to their own selfless needs; even to a point of endangering the lives of fellow Americans by censorship.

Even today the federal government unknowingly pays top secret militias operating without orders; quality assurance programs hard-wired to favorable responses.

Over a 10-year period starting with the signing of the 9/11 Patriot Act, NSA grew so large that it collapsed the whole global economic system and currently consumes more than half the federal budget.

In the State of Texas, Governor Rick Perry formed and led a top secret militia used to hold power by targeting and oppressing groups or individuals, causing financial decimation through intrusive electronic eaves-dropping and behavioral control devises.

Many understand this to be simple GPS tracking; they do not understand the dangers of the most vile, disgusting, and intrusive devices conceived by man since World War II.

Cases are still being brought before the international courts for crimes against humanity for those who escaped justice by fleeing Germany. And yet Texas Governor Rick Perry and his network of handpicked co-conspirators, who are linked to patent infringement, the theft of mineral reserves, copyright infringement, human electronic exploitation, drug / human trafficking, and manslaughter, go unpunished.

Most notably, the governor is linked to more than 250,000 people harmed by drugs or devices produced by big pharmaceutical corporations, with 88,000 that are known dead, and thousands more likely deceased. The numbers are still being calculated by forensics, In the State of Texas if they can, they will, and they did.

The many disclosures by NSA personnel warning of a police state never has been a secret if you have been harmed or attacked by non-lethal and bio-lethal weapons. The notion, “Why should it concern me? I have done no wrong,” adopted by plantation slaves that happily accepted a false sense of protection from their masters, unaware the security was a form of mind control intended to oppress and keep the slaves working on the farm.

Today’s civil division is between those that know and those that do not. Those who advocate for those that do not know are unjustly stalked down by the same domestic surveillance systems.

Thank God they underestimated the potential of the human soul. I gave them fair warning into the same data stream used to harm me and others, first with a published essay, Who is watching who and do they know what they’re doing?

“Unfortunately, behavioral scientists ignore the fact that some clairvoyants can take a peek into the future, visualize an eminent threat, and know instinctively when someone has their attention on them or looking at them even when the observation is done remotely by a camera or even a satellite.”

The civil war that never manifested between the Texas corrupted few and the oppressed is to the credit of those who have made sacrifices by seeking justice in the courts.

Credit also goes to the Honorable Barack Obama, President of the United States, who was also attacked by electronic devices and falsely accused of devising the system that was actually first developed in the State of Texas by George Bush mandates that later gave Governor Perry a blank check of discretionary spending.

Where did the trillions of dollars go? If not for the offshore financial leaks, forcing those of Texas public trust as well as judges to belly-up and disclose their tax shelters, we would not have a clue.

Justice is not always a popular opinion and seldom do we know the truth the whole truth and nothing but the truth. There was a time when throwing Christians to lions was the justice of the day as was tarring, impaling, and set on fire so the games could be viewed all through the evening from any seat in the Roman Coliseum.

Not far in the future, we will have a clearer idea of what has transpired once the invisible crimes against humanity are brought before the courts, one victim at a time. Those who are still in denial with the notion of “why should it concern me; I have done no wrong,” will understand the dangers to themselves and family from intrusive violations of privacy.

What Did Jimmy Stewart Say?

It’s over for me or I would say a new beginning. I guess I can start by planting a few things in my front yard and remove all the thistles, weeds, and vines that have crawled over my front door. I just might get a visit from a friend, neighbor or family member separated from me by a Texas domestic surveillance system gone completely out-of-control abused from political targeting in Texas.
Once In A Blue Moon Production

Whose blog is it anyways 09/05/2013 gno


*******************


Tender Mercy is our book, it’s meant for all families to enjoy. Our fable starts in Old Mexico and takes us to all to eternity.


Dedicated To All Life
Written In Prayer In Christ God

- DANNY O’DELL


 ‘Whale of a Fight’ is over before It Started


La ballena y el Western
Apologetica historia sumaria / Apologetics summary history 3 (Obras Completas De Bartolome De Las Casas): Bartolome De Las Casas

Vaquero de Tejas
No, no era lo que había estado con su hermana, pero que era de la familia, por lo que le molestaba . ¿Cómo podía ser la vida de esta manera? Y los cultivos en el campo ? Se fue en dirección norte sin saber qué camino tomar . Paso del Aguila , pensó, nunca he estado tan lejos de Chihuahua, mis tíos siguen trabajando en Nueva vicaya . Voy a pasar a través de la Sierra Madre, así que puedo decir justo bien a mis buenos amigos , voy a encontrar una nueva vida de la prosperidad y la riqueza. Caminó mucho , viaja siempre a sus pies calzados con sandalias hicieron blancos como caliches . Kilómetro tras kilómetro sed vagó sucesivamente, deseo mucho que ver La Junta de los Ríos. Fue el Pescado indios que les habían dado a él , él los había conocido allí bajo aquel árbol de mezquite con sombra. Él había estado masticando un grano de mezquite para mantenerse con vida . Pensó , pues si he de morir tengo que pasar primero a través de Nuevo León, quien sabe tal vez pueda encontrar trabajo. Fue allí en ese árbol, donde sus amigos indios dieron a él, esa vieja bolsa de cuero , en ella, las piedras milagrosas . No eran más que simples piedras de río , pero se llevaron las visiones de los tiempos. Se le dijo que si los echan en un charco de agua, un aspecto se manifestará , podrás ver lo que tu corazón necesita saber. No más , no más Tamaulipas Zacatecas, Coahuila no más , tengo que ir al norte de la riqueza y de los campos fértiles. Miró a su alrededor , sus amigos eran sólo una nube de polvo en el horizonte, estaba otra vez solo, fue una sorpresa para él , no fue tallada en ese viejo árbol , se preguntó por qué no lo vi antes , era simple, pero no podía entender lo que era , sino que leyó LBJ . Volvió a llamar a sus amigos, pero ya no estaban .


No eran más que simples piedras de río ,
pero se llevaron las visiones de los tiempos


Su cabello creció mucho , mientras que en los días de su cuerpo maldijo el sol del mediodía. ¡Mira! Hay , por allá , un oasis de una multa arroyo y un estanque de agua , a la sombra de un cepillo. Shush ! Pensó para sí : ¿qué es ese ruido. Era hombre , podía oírlos hablar por lo que se acercó a presentarse . Casi como si fuéramos viejos amigos se saludaron , había ocho de ellos, se ayudaban unos a otros con las historias de donde habían estado . No fue sino hasta tarde en la noche cuando tenían un fuego no pudo escuchar la historia, que uno de los hombres se había matado a su propio hermano , y ahora se estaba corriendo por su vida. Dijo que su padre lo odiaba , no podía volver. Todos ellos compartían los nombres de las familias que habían dejado atrás . Se dio cuenta de que en uno de los brazos de los hombres era una marca hecha con algún tipo de colorante , sino que tenía la forma de una paloma, una paloma de la mañana , fue escrito bajo las letras LBJ . Tenía miedo de preguntar, pero él quería demasiado mucho. El hombre de las piedras estaba feliz de conocer a sus nuevos conocidos ya que había sido un viaje largo y solitario , sino que habló de sus viajes por el saco de piedras , y luego tiró una piedra al agua limpia y fría . Todos ellos lo vieron , no hay cuerpo atrevió a dudas, era diferente , era otra época , se levantó de un salto gritando de alegría saltando en gran medida a la piscina. El agua se agitaba , el aire agita un viento el polvo se levantó sobre ellos ; allí estaba mirando ellos. Era el ojo del coyote. Los hombres no sabían qué hacer, miraban a su alrededor a la vuelta y correr , pero ya era demasiado tarde . La voz de una mujer, una mujer sabia , contando otra historia Jesty para hacer que los hombres hacen sus obras, las armas y el ruido y los caballos , era la guerra , fue realmente una guerra, y todo lo que dio un paso a la derecha en él.


A well thought Out Alternative. Probably The Only
Well Thought Out Alternative

Friday, August 30, 2013

To Report Political Targeting

If I Where Wendy Davis I Would Sue Today!


Search for messages from this sender","fromObj":"{"name":"Wendy Davis","email":"wendy@wendydavisforsenate.com"}


Confirmed Computer Devices By Private Investigative Firms
and Corporate Marketing Criminals
"If You See Something Say Something"


Hacking By The State of Texas Not NSA

Republican GOP Machine
Political Targeting Your Emails

“Everything our state has achieved could be ruined if liberals like Wendy Davis and Battleground Texas have their way. Pledge to Keep Texas Red and get your FREE bumper magnet today (Senator John Cornyn)!”

The Tea Party founded financed by Texas Governor Rick Perry and the Koch Brothers Is Dr. Frankenstein

The Tea Party of April 2009 Died in spring of 2010 and has come to be known as The Tea Party Rebellion and Insurrection against the citizens of the United States I

The Tea Party of Today or Tea Party II is not the same Tea Party of April 2009 but the grass roots and funding was from illegal sources of the Tea Party I
(I have no opinion or do I know of being harmed from the Tea Party II but I know of thousands of valid criminal complaints concerning The Texas Tea Party I)

1. The Tea Party. 
OC Media
Anthony J. Tarquinto Still a Virgin, Still OC
By Matt Coker Thu., Jan. 26 2012 at 9:38 AM 17 Comments
Categories: OC Media

“A couple years ago I introduced readers to Anthony J. Tarquinto and The Real 40 Year Old Virgin of Orange County, the Aliso Viejo author's self-published tome that mixes his unique lack of sexual experience with a political ideology that finds Barack Obama a threat to America. In the months since, Tarquinto has spread his "expertise" on celibacy and tea party ideology. Others are taking notice, although nothing has apparently changed his status between the sheets.”

“Tarquinto shared some of his views on an entirely different subject in a July American Thinker piece titled, "The Federal Reserve and Financial Repression." While he does not exactly call for the death of the central bank ala Ron Paul, Tarquinto sets a chain-of-events in motion that could eventually cause a run on ATMs and average Americans being unable to buy gas and Slushies. The ad next to the copy he sent has an image of Obama pointing and the words, "OH YES, YOU CAN! 21 Ways to Frustrate Obama's Army of Snoops, Busybodies, and Asset-Grabbing Bureaucrats."
http://blogs.ocweekly.com/navelgazing/2012/01/anthony_tarquinto_virgin_orang.php  

2. The U.N. Inquiry Concerning Texas Voter Fraud [GOP ballots counts increase in numbers by remote control devices]

3. Mitt Romney and Texas Governor Rick Perry Investments in Electronic Behavioral Control Devices

4. Texas Human Experimentation without consent that brings harm (Bush Post 911 Mandates)

5. Non-regulated Marketing Firms use any make or model including those in the Non-lethal weapons electronic arsenal to win the Romney Election but failed.

6. Federal Data Integrity is Breach to bring harm to the harmless such as VA records

7. Texas Police Swatting

8. Texas Aerospace Surveillance at low altitudes 

9. Texas financial decimation of children, disabled, and elderly

10. Denied access to Federal Funds and health care entitlements

11. The use of non-lethal weapons on Texas children, disabled and elderly

12. Political Police Raids on Disabled Housing in Texas so Texas Governor Rick Perry can “show you where your tax dollars are going” which is the opposing - 75% of the disabled want to work!

13. Koch Brothers Covert Operations Against The Citizens of the United States

":"","isFlagged1":"","mid":"2_0_0_1_32509294_APL1i2IAAD40UfKTLwAAAJku+GE","rawDate":1374851887,"data-size":"data-size=\"34372\"","size":33,"attached_files":""},{"xapparentlyto":"odellgregory@yahoo.com","colorIndicator":"","fromDir":"","from":"Wendy Davis","fromTitle":"wendy@wendydavisforsenate.com","to_frm_srch_title":"Search for messages from this sender","fromObj":"{"name":"Wendy Davis","email":"wendy@wendydavisforsenate.com"}","subject":"It's up to you","snippet":"","flags":" unread ","flags1":"info-unread","status_title":"","msgicon_title":"Unread","inboxservices":"","hide_attachments_else":"","isFlagged2":"","isFlagged1":"","mid":"2_0_0_1_32508221_APL1i2IAAD4EUfKPTgAAALtzWwI","rawDate":1374850894,"data-size":"data-
<!doctype html><html lang="en-US"><head > <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>odellgregory - Yahoo! Mail</title>       <link rel="shortcut icon" href="https://s.yimg.com/ok/u/assets/img/favicon-fresh-107777.ico"> <script>if(self!=top){top.location.href=self.location.href}if(self!=top){while(navigator.userAgent.toLowerCase().indexOf("khtml")>0){}  }window.NeoGV=window.NeoGV||

************************************

“Whoever intentionally obstruct the proceedings before depts., agencies, and committees, obstruct this criminal investigation and/or retaliate against me because I am a victim, you will be punished to the full extent of the applicable law in 1505 of Title 18 Obstruction of proceedings before depts., agencies & committees, 1510 Obstruction of Criminal investigations, 1513 of Title 18 Retaliating against a witness, victim or an informant, or 1514 Civil Action to restrain harassment of a victim or witness. Whoever intentionally alters, destroys, mutilates or conceals records, or documents with the intent to impair the object’s integrity or availability for use in an official proceeding will be punished to the full extent of law as defined in 1519 of Title 18”

To Keep From Turning Red

“You Can’t Make This Shit up! 
(Guy Clark Texas 2008)
*It's The State of Texas Not NSA 


An Email From Senator John Cornyn 

Gregory,

“Everything our state has achieved could be ruined if liberals like Wendy Davis and Batleground Texas have their way. Pledge to Keep Texas Red and get your FREE bumper magnet today (Senator John Cornyn)!”

“Texas is under attack by the Obama Machine and we need your help to fight back (Senator Cornyn).”


This is a Texas Greg Abbott and Rick Perry Machine with orders “Eat What You Kill” and they do Kill innocent people!


Why Stick a Red Magnet on Your Bumper
When A Squadron of These Machines is on Your Ass?
I Don’t Consider Myself a Conservative but Why Stick a Red Magnet on Your Bumper When A Squadron of These Republican GOP Machines is on Your Ass?


Video Guy Clark Texas 2008 
"You Can't Make This Shit Up!"

“You Can’t Make This Shit up! (Guy Clark 2008)” See My Links: http://somethingstakesarealtexascowboy.blogspot.com/2013/08/a-picture-is-worth-thousand-lives.html


Crimes Against Humanity Is No Game
http://solidstateindependence.blogspot.com/2013/05/texas-crimes-against-humanity-is-no-game.html

Texas Domestic Surveillance Links Governor Rick Perry To Cocaine Cartel
http://solidstateindependence.blogspot.com/2013/06/the-satel-elite-rico-perry-cocaine.html

A Message From Received At The Alamo 
http://solidstateindependence.blogspot.com/2013/07/general-
houstons-message-received-alamo.html

*It's The State of Texas Not NSA 

Judas Priest! Do You Know What Rick Perry 
Has Been Doing To His Own People


":"","isFlagged1":"","mid":"2_0_0_1_32509294_APL1i2IAAD40UfKTLwAAAJku+GE","rawDate":1374851887,"data-size":"data-size=\"34372\"","size":33,"attached_files":""},{"xapparentlyto":"odellgregory@yahoo.com","colorIndicator":"","fromDir":"","from":"Wendy Davis","fromTitle":"wendy@wendydavisforsenate.com","to_frm_srch_title":"Search for messages from this sender","fromObj":"{&quot;name&quot;:&quot;Wendy Davis&quot;,&quot;email&quot;:&quot;wendy@wendydavisforsenate.com&quot;}","subject":"It&#39;s up to you","snippet":"","flags":" unread ","flags1":"info-unread","status_title":"","msgicon_title":"Unread","inboxservices":"","hide_attachments_else":"","isFlagged2":"","isFlagged1":"","mid":"2_0_0_1_32508221_APL1i2IAAD4EUfKPTgAAALtzWwI","rawDate":1374850894,"data-size":"data-





I Think Any Option would be better than what has been going on in Texas over the last decade! I agree with Guy Clark You Can't Make This Stuff Up!

Texas Radio And The Big Beat
http://solidstateindependence.blogspot.com/2013/03/texas-28th-el-paso-texas-radio-marty.html

Thursday, August 22, 2013

Black Gold Black Gold Texas Lunacy Pandemic

Texas Tea


Texas 28th District
The FLAME Consumed Texas Homes
Black Gold Texas Tea
South West The Medina River
"We Don't Go About Framing People (Apraio 2012)
Use Federal Dollars Outside the Sheriff's Jurisdiction



Electronic Human Exploitation Is No Game - Take No Prisoners

I Got the Message Loud and Clear - 

The President said it all “The Refutation of Fear, our Sword and Shield (Obama 2013)”

Monday, August 19, 2013

Taking Back Texas One Piece at a Time Scrape It Right Off Your Shoes


Taking Back Texas One Piece at a Time Buy or Build Your Own Drone
What We Hold Sacred 

Sacred [Bing Dic.] 2. Entitled to veneration or religious respect – Personal Space is the only thing a Hindu Owns. 

The State of Texas wants that too? 

No Place But Texas?

What We Hold Sacred
Wendy Davis for Governor of Texas

 "We Can Tack Anybody We Want In Texas (Senator John Cornyn 2012)."

Getting Closer To A Patent


Dear Customer,            


This is an automated response that does not accept incoming emails. Please do not reply to this email. For order support, please visit http://help.rcdiscuss.com/

Thank you for shopping at XHeli! 
Your order number is 31689717. Your order is being processed. 
You will receive a shipment notification email message as soon as we send your order.
This portion of your order is being prepared for shipment and cannot be canceled or changed.


The order shipped to address is:

Texas
US United States

Order Number: 31689717
---------------------
Quantity    Item
1    Syma S34 3 Channel Chinook RC Drone 2.4ghz (Camo)





Please keep the Order Number 31689717 for future reference.
Please do not hesitate to contact us if we can be of further assistance. 

Thank you for shopping with us and your continuous support for our RC community. 

Sincerely,

XHeli.com – America's #1 RC Heli Store!


- We The People