2009
09.30

There seems to be some great discrepancies with regard to scope of an issue and the period of time permitted to be discussed.
The restrictions are only applied to me.

Robert Angst is not restricted by either.

During the hearings, my questions are constantly interrupted with accusations that the topic is outside the scope of the issue; or that the question pertains to a period of time outside the period permitted to be discussed. YET, my question is in reference to prior questions

    which were permitted

without being filtered by period or scope.

Even after surviving that frustration, in submitting the briefs to the court, I held to the scope and period which was defined during the hearing. Robert Angst in submitting his brief did not only not adhere to the scope and period, but introduced topics which were never presented.

How is it that those topics for which there was no testimony, have found their way into the judge’s ruling?
The constant introduction of CHAOS, completely undermines everything.

There is no doubt there are multiple justifiable grounds for appeal of Judge Bertin’s rulings. I do not say this because the judge has erred in any way. He has not. The rulings as written almost write the appeal themselves. BUT, I don’t know the appeal process. This is the first time I’ve actually seen a ruling. Taking the personal emotion out of a document which seems to vilify me, the ruling is directly or indirectly indicating all of the reasons for the appeal.

Robert Angst would definitely appeal any decision, to keep the chaos going. CHAOS is a tactic he has used

    throughout his career

. His other favorite tactic is the discovery/delivery of documents game. I on the other hand will not know as much about the appeal process so as long as the ‘balls stay in the air’ there will not be enough time for me to appeal, and continue to petition, and research, and learn… it is overwhelming most of the time.

2009
09.30

As I begin the next round of documents, I expect that the computer will again be affected and slow my progress. I’ve got 7 dead computers in the basement now, and a safe deposit box full of hard disks, dvds, cds etc.

When I attempt a counter strike, I am always petrified about how they will attack and make things even harder.
– During the last attempt, they fried the BIOS in the laptop.
– Before that they caused the printer to only print blank pages, until after Judge DelRicci sent a letter indicating he would recuse himself in 2 weeks. How do you suppose Judge DelRicci found out I was printing the Petition requesting his recusal?

I persevere…

2009
09.30

AN OBSERVATION:
It would seem I am not able to see the ForensicSoft.com web site… there must be something on it that will reveal the surveillance. ForensicSoft is responsible for the world’s first forensically sound windows bootable environment.

The blocking program being used against me is very powerful… even to the more resourceful people.

Can other people get to the site??? Please try and leave a comment here for me.

( I DO NOT PUBLISH THE COMMENTS WHICH ARE RECEIVED TO THE WEB. THIS IS INTENTIONAL. I DO NOT WISH TO EXPOSE ANYONE WHO HELPS ME TO THE RETALIATORY ACTIONS OF THOSE WORKING AGAINST ME.)

blocked from forensicsoft.com

blocked from forensicsoft.com

It should have looked like this: (from Google Cache)

forensicsoft1


Note to ForensicSoft, if there was a traffic spike at about the same time as this post to my site which caused your site to crash, we should talk about the entities which are attacking me and why they appear to have caused your outage.

2009
09.29

Is Your Cell Phone Spying on You?
Updated: Thursday, 21 May 2009, 12:16 AM CDT
Published : Wednesday, 20 May 2009, 8:15 PM CDT

NED HIBBERD
HOUSTON – Let it out of your sight for just a few minutes, and your smart phone can be turned into a rogue agent that spies on you.

The internet is crawling with software that claims to be able to bug someone’s cell phone.

FOX 26 News tested one such program. It cost $250 and took about ten minutes to install on the target phone.

Once activated, the spyware revealed the calls placed by and received by the phone, listing phone numbers, times, dates and length of each call.

It also logged every text message, both incoming and outgoing.

And it enabled a third party to dial in to the target phone without detection, activating the microphone so the spy could hear everything said in the vicinity, even though the phone itself appeared to be “asleep.”

“Cell phones are not like computers,” said security consultant Michael Fjetland. “There’s no firewall, there’s very little in the way of anti-virus software so once they make that connection, basically, it’s an open door.”

Top five signs your cell phone might be bugged with spyware:

5) Phone is unusually warm even though you haven’t been using it– could indicate unauthorized transmissions.

4) Battery life drops dramatically, for no reason– could indicate surreptitious communication.

3) Screen flashes on and off, without cause– could indicate an incoming spy call.

2) Monthly bill shows an unwarranted spike in SMS or data transmission activity– could indicate your phone is being accessed without your knowledge.

1) Phone receives nonsensical text messages (for example, <*#62><123456789>)– could indicate botched attempts to send system commands.

Ultimate privacy solution
—-
If you want to guarantee a private conversation stays that way, don’t just turn off your cell phone–remove the battery.

WHY ARE THE CELL PHONE COMPANIES DOING NOTHING TO PREVENT THIS TYPE OF INTRUSION????

2009
09.29

Easy Ways to Tell if Your Cell Phone is Bugged
BY WARREN RIDDLE (RSS FEED) — MAY 26TH 2009 AT 7:30AM

If you’ve got a lot of enemies (or watch too many spy movies), you’ve probably noticed those online ads for cell phone bugging software and thought: “Hey, I wonder if my phone is bugged?” Fortunately, the news crew at Fox 26 in Houston shares your paranoia: it recently tested out some cellular spyware to figure out if your ex-girlfriend or ex-boyfriend is listening in.

After dropping $250 for the software on the Internet, the crew had it up and running on a test phone in 10 minutes. As you can imagine, the spyware enabled call- and text-monitoring, gave access to the phone’s contact list, and kept extensive logs of call times and duration. The coolest function let the testers tap into the test phone from a remote location and activate its microphone, allowing them to listen in even with the phone on standby and concealed in a pocket.

As for figuring out if your own phone is bugged, the Fox team says to watch out for significant, unexplained drops in battery power or random screen flashes. Strange billing activity and text messages with random numbers and symbols could also be signs of a bugging. To be safe, you should lock your phone with a password, and if you want to go super clandestine, pop out your phone’s battery when you go meet that guy with the briefcase chained to his wrist. [From: Fox 26]

WHY ARE THE CELL PHONE COMPANIES DOING NOTHING TO PREVENT THIS TYPE OF INTRUSION????

2009
09.29

I don’t spend alot of time searching for clues on the torture. It serves no purpose more than making a notation of it. Those responsible for Law Enforcement have been directly involved in the conspiracy and coverup since August 2007. But every now and again, I encounter a paragraph that someone posts that explains their experience – for whatever reason – and it reads as if they were writing about mine.

from the site BadExperiment.com

It appears that a primary objective of the adversity thrust upon me is to force me to abandon civility, control, and good manners. Therefore, maintaining calmness and composure is not merely desirable, it is critical to my survival. A help in this regard is maintaining a positive view of people. I look for the good even in those employed in the harassment against me, and treat all with good manners. By dignifying others, I dignify myself. Doing so neutralizes much of the psychological warfare employed against me. It is the most emotionally healthy way of coping with the ill treatment of others. Responding to ridicule and humiliation with respect is also a powerful way to teach by example.