2007
12.26

Petitioner now seeks to modify the Order because:

1. Sonya L. Healy has prevented Brennan Healy from visitation and communication with his father.

2. Sonya L. Healy has prevented Brennan from freely communicating with his father by maintaining recording devices which monitor all conversations.

3. Sonya L. Healy has inflicted harm on Brennan by previously agreeing to a best effort daily phone call with his father with full knowledge that conversations are being recorded.

4. Brennan Healy loves both of his parents, however his knowledge of the illegal actions of his mother with regard to a series of harassing actions since February 2007 prevents him from communicating freely with his father as it is understandable he would want to protect his mother from criminal charges.

5. Brennan Healy has not been permitted contact with his extended family – aunts, uncles, cousins and grandparents since July 2007.

6. Brennan has not been provided with any source of therapy which might permit him to discuss his situation with someone freely and without bias.

Wherefore, Petitioner respectfully requests that this Honorable Court modify the present Custody/Visitation Order.

Respectfully Submitted,

Terance Healy

2007
12.12

Sonic Nausea

http://www.shomer-tec.com/product/sonic-nausea-266.cfm

http://www.shomer-tec.com/product/sonic-nausea-266.cfm

2007
12.09

As I am aware that the police are not interested in investigating anything which will potentially lead to the resolution of the computer surveillance.  I report to them that my cell phone has been hacked and that I have information which will connect it to the computer surveillance.

I do it only because someone in law enforcement should minimally be aware of it. If they don;t know about it, it is more difficult for them to ignore it.

2007
12.07

Survival.  LOL, next they ruin your credit.

f

2007
12.06

The available software sends every conversation, every text message, and every phone number to a web site for review.

The software also allows the phone to be used as a microphone.   Your privacy is at risk whenever the phone is nearby, even if you are not on it.

The only way of detecting the intrusion is that your battery will die quickly.  They use up the battery while using your phone to spy on you.

The phone can be hacked by simply receiving a phone call or text message from the hacker.  My new phone was hacked in December 2007.  I watched it happen.  After avoiding answering a call from a strange phone number that had called several times, I received an email indicating it was microsoft support.  When I answered the phone, no one was there  AND the bluetooth functions were activated.

If the phone has bluetooth and your computer has bluetooth, they could be hacking each other.

I have a theory that the cable box is also connecting to phone and computers.  All networking access and protocals seem to be in the set top boxes.

The FBI has the capability to activate your land line phone and listen in on you even if the phone is hung up.

The FBI has the capability to use your cell phone to surveill you. 

Federal law requires computer manufacturers and software companies to leave a way into your computer in case the government wants to tap your computer.   Those are the same backdoor that the hackers are using to access you data.  The capability to do this has been additionally provided to your local police.

The computer situation creates an entire anti-virus industry.  The anti-Virus industry has a list of programs they agree to ignore.  The Anti-Spyware Coalition determines if the program should be detected.  

It is not too far of a leap to beleive they can also use the cable box for surveillance?  When you look at the situation, and the mandatory rollout of digital television nationwide it makes you wonder as digital television will require everyone to have a digital device, who can say they are not using it for surveillance.    Motorola makes the cable boxes for all of the major cable companies.