2013
06.30

There are only two reasons a judge would knowingly violate the law…
1) incompetence
2) corruption

Judge Garrett Page believes that once a case is reassigned from another judge there should be no opportunity to correct ERRORS committed previously. Seriously, even when presented with the evidence on the court record, Judge Page chooses to ignore it and continue blindly. Well, blindly but in a very determined manner.

He actually writes in his Opinion that once one judge violates your civil rights, it is the responsibility of the following judges to make certain you never correct the error no matter how grievous the damage… or how basic the violation to your rights… even when it permits opposing counsel to leverage the conspiracy to prevent justice to further the injustice.

Amazing…. what he said in his 10 page Opinion confirms that once Judge Rhonda Daniele issued her Secret Order, the Montgomery County Judiciary was going to destroy me verses correcting one judge’s error. The judiciary guarded that secret for 3 years, and had begun their attack against my most basic civil rights.

The judges also retaliated against the clerk who inadvertently provided the secret document to me. The Montgomery County Judiciary demonstrated their merciless mindset. Everyone in the courthouse knows what they did to him. Everyone in the courthouse knows what they are doing to me. If anyone at the courthouse thinks about whistleblowing, they will be destroyed. There is no stopping a corrupt band of judges… should you encounter a judge with integrity, he will be reassigned from your case permitting the opposition to further their leverage.

Judge Haaz has been the only judge who has addressed the ‘leverage’ by Angst & Angst directly and immediately. Unfortunately, he was reassigned from the case by the administration in December 2012 never holding the hearing he ordered to be scheduled scheduled. Judge Haaz knew he couldn’t hold the hearing while an Appeal was pending. Enter Judge Page…

In the last 8 years, this matter has been before 18 judges… So either Judge Page is the MOST INCOMPETENT JUDGE OF THE MILLENIA … or he is corrupt and lacking any ability to uphold his oath, the law, or even basic human decency. He thinks his function is to extend further injustice to victims of injustice. His job is to ignore the law and the truth to protect those who have ignored the law and the truth.

Using 10 pages to say that the judiciary would NEVER correct a procedural error… The actions to twist their situation designed to bury the victim… just PRICELESS. ABSOLUTELY PRICELESS.

page
Judge Page, it is time for your resignation. You proved my point. Once you are a victim of their injustice, the Montgomery County Judiciary will not take responsibility for their errors/crimes.

THEY WILL DESTROY YOU… THEY WILL DESPISE YOU FOR SURVIVING THEIR ACTIONS…and they will not stop their terroristic injustice until you have committed suicide. And, there is no other abuse of power more difficult to survive than a corrupt judiciary. Judges have the power to compel law enforcement to exact their abusive orders.

I PERSEVERE.

2013
06.22

Imagine…

Imagine waking every day wondering how you didn’t kill yourself the day before.

Imagine the regret.

Imagine feeling like that for over 8 years.

Imagine no escape.

I don’t have to imagine.

2013
06.21

contact-deniers-banner

2013
06.18

Why didn’t the Anti-Spyware programs protect from the NSA surveillance intrusion?

Maybe because their programs PERMITTED THE ILLEGAL surveillance programs to install. The antivirus/antispyware companies DID NOT PROTECT THEIR CUSTOMERS.

The following companies conspired and sold out the computers of the world:

AhnLab
Aluria Software , an Earthlink company
Anchiva Systems
AOL
AVG Technologies
Bit9
Canadian Coalition Against Unsolicited Commercial Email
US Coalition Against Unsolicited Commercial Email
Canadian Internet Policy and Public Interest Clinic
CastleCops
Center for Democracy & Technology
CNET Networks
Computer Associates
Dell, Inc.
ESET
Facetime Communications
F-Secure Corporation
Google
HP
ICSA Labs
Internet Education Foundation
IronPort
Lavasoft
McAfee Inc.
Microsoft
National Center for Victims of Crime
National Cyber Security Alliance
National Network to End Domestic Violence
Panda Security
PC Tools
Radialpoint
Safer-Networking Ltd.
Samuelson Law, Technology & Public Policy Clinic at Boalt Hall,
UC Berkeley School of Law
Sana Security
Shavlik Technologies
Sophos
Spamhaus
StopBadware.org, Berkman Center for Internet & Society at Harvard Law School
Sunbelt Software
Symantec
Tenebril
Trend Micro
Webroot Software
Yahoo! Inc.

Check out the organization which decided to IGNORE selected spyware.
http://www.antispywarecoalition.org/

2013
06.17

The worst news is yet to be revealed.

It will show the lengths that the surveillance tools were further misused to prevent their exposure to the public.

It was necessary to protect law enforcement from being prosecuted for Constitutional violations.

It was necessary to prevent judges from being held accountable for their misuse of the data illegally collected.

Of course, the judges did not permit the information to be presented in court. How would anyone explain their having obtained the information? All levels of law enforcement failed to address my repeated complaints filed lawfully about the intrusive and destructive surveillance.

Could they just reveal what they had collected and hold me accountable without any concern for my intentional actions taken to cause the surveillance to be revealed.

Using the illegally obtained information to justify continued use of the intrusive surveillance became inescapable. For example, corrupt and prevent my banking, and then use the fact that I no longer had a bank account to suggest there was something more to investigate. They caused the financial problems upon which they were suggesting further secret investigations would be necessary

It is also likely that the judges had issued additional warrants permitting the surveillance and those were kept secret. The game quickly became “Tell Terance Nothing”. Keep Terance isolated. keep the injustice and lawlessness going… and hope another flub doesn’t occur like the one which after 3 years of terror provided the Secret Order of Judge Rhonda Daniele from August 2007. Issuing a libelous and slanderous Court Order and keeping it a secret from the target prevents the Defendant from addressing the crime being committed against him, creates a conspiracy of silence designed to inflict paranoia, and robs their target of years of his life.

When it turns out that wasn’t the only “secret order” issued by Rhonda Daniele. It demonstrates a deliberate trend. Rhonda Daniele’s abuse of judicial power goes even further to punish the person who unintentionally revealed her corrupt orders.

NEVER LET TERANCE GET ANY ANSWER TO EVEN THE MOST SIMPLE QUESTION… because if you do provide an answer, the conspiracy will reveal itself.

2013
06.16

The software was written using an Asian character set to make it more difficult for US Programmers to decode.

It was initially a virus, until Awareness Technologies packaged the program as surveillance, remote control and obfuscation/redirection programs for soccer moms who do not trust their kids.

The package is VERY powerful and available to the general public so that it makes it harder to detect exactly who has you under surveillance.

Dick Cheney blasts NSA leaker Edward Snowden as ‘traitor,’ says he may be Chinese spy

2013
06.16

The ability to ‘share’ the ill-gotten surveillance is already in place.

RISS.net consist of multiple locations like the MAGLOCLEN site in Newtown, PA which permit the exchange of data between different levels of law enforcement.

Include Private investigators among those who can do whatever they like – immunity from prosecution when acting on behalf of local law enforcement.

It becomes clear that Americans have had no privacy for many years.

My evidence indicates back as far as 2007, with equipment being distributed to local law enforcment in 2003.

2013
06.13

I first noticed the surveillance in February 2007.

It wasn’t the NSA. It was my spouse as she planned her divorce surprise. On the advice of her lawyer she broke a few federal laws.

When discovered they needed an out. Her lawyer spoke to her mentor the judge and they found a private investigator. Turns out the same PI that did ‘work’ for the county… and the county drug task force.
AND I NOTICED.

At that point the judge’s began acting on their illgotten and secret data – it was also false. BUT, they couldn’t explain so they just kept terrorizing. I noticed. I reported it to every law enforcement agency, but NO ONE HELPED. NOT EVEN AN INVESTIGATION.

Judges kept acting without jurisdiction, no hearings, no due process. The lawyer kept making sure they had no jurisdiction. AND used that leverage to get me terrorized more and more. I reported it. No one helped.

At some point every Federal Agency with an interest in jurisprudence was regularly visiting my web site to see what was going on. And not doing anything. They couldn’t. If they did, they would reveal the illegal surveillance going on and the levels to which it was being utilized to obstruct justice and terrorize an innocernt victim who detected it.

I always knew it would be unassociated – someone’s completely selfless act which would reveal the nightmare.

Enter Edward Snowden.

Snowden’s report revealed that with an email address they could access and turn a life upside down. It’s not just surveillance. It is redirection, obfuscation and more. I know what he revelaed, I lived it. I know the danger he is in.

I’ve lived it.

How laughable is it that Montgomery County PA has just initiated a policy that all litigants must use an email address to access their system. They have previously used corrupted java certs to compel their surveillance into computers. To overcome that I reload an operating system on every reboot and no longer use hard disks. In light of Snowden’s revelation, Montgomery County just became very obvious. But, that was something I have known all along.

I indicated years ago that the District Attorney’s Drug Task Force had become the paramilitary arm of the Court of Common Pleas. That was pinpoint accuracy. Judges reacted to things I typed and never filed. But, no one helped.

I saw a young girl harassed by a cop and his buddies. When she reported it to the town, they mocked her. The DA called her a LIAR. The DA used a grand jury whom she kept uninformed about her drug tyask force surveillance, redirection, remote control capabilities. She let the police lie. And then she had the audacity to call Gabriele Drexler a LIAR. There is no reason for Gabriele to have lied. And the only reason for the DA to go after her was because the leverage of a cop on the drug task force to reveal the surevillance is too strong to be ignored.

Police on the drug task force never get fired. They get reassigned whenever they screw up. They know too much. They have leverage. The surveillance information is powerful leverage.

Jim Gearthart from NJ 101.5 suggested the other day that if the NSA had the info and the police wanted to know, the police could call the NSA and get it. He doesn’t know about the RISS.net and places like MAGLOCLEN. These are the databases which collect and share the information collected by law enforcement with other law enforcement.

Yes, Wally. MAGLOCLEN does exist.

It connects all the data points. The PI’s hired to subvert your rights, the local law enforcement who are subverting your rights, the federal authorities subverting your rights.

Now you may think that if you are doing nothing wrong it is no problem. THINK AGAIN.

If you are dealing with judges (18 so far) and you’re actions will reveal their failures and crimes. Their treasonous actions without jurisdiction. Their abuse of power which has robbed you of every aspect of your life for the last 8 years. Their judicial abuse of resources further implicates and involves county employees in their crimes. The surveillance is used to try to silence and destroy you further to prevent them from being caught, prosecuted, or held responsible for their actions.

It is more than surveillance. It is redirection, filtering, obfuscation and remote control of technology. Phones, computers, etc…

My name is Terance Healy. I have been the victim of terroristic actions since 2007. And no one has ever helped because the power of the necessity to maintain the secrecy of the secret surveillance actions in the US is far greater than the Constitution, the law and any human rights. This site documents my terror. And my story and it is all truth…

Read on, and see what happens to an innocent caught in their criminal surveillance.

2013
06.08

The tools were provided to local law enforcement under a ‘drug enforcement’ program in 2003. It enables the stealth surveillance of computers and phones. The problem discovered and concealed by the Justice Department is the misuse of the tools by law enforcement, and further misuse of the tools to target individuals who detected the intrusions into their lives. All well documented as part of my Terroristic Divorce. www.work2bdone.com/live

Julian Assange: NSA, FBI programs amount to “mass spying” on Americans

NSA surveillance pits liberty against security

Assange on PRISM: US justice system in ‘calamitous’ collapse

WikiLeaks founder Julian Assange has slammed a recently exposed NSA mass-surveillance scheme as a “calamitous collapse in the rule of law.” Google, Facebook and other tech giants apparently involved have denied giving the NSA access to their servers.

Assange accused the US government of trying to “launder” its activities concerning the large-scale spying program PRISM. The system was made public after a leaked classified National Security Agency (NSA) document was revealed earlier this week.

“The US administration has the phone records of everyone in the United States and is receiving them daily from carriers to the National Security Agency under secret agreements. That’s what’s come out,” he said.

President Barack Obama earlier defended PRISM, saying it was a key part of the country’s counterterrorism efforts and that privacy was a necessary sacrifice for the sake of security. He also lashed out at the media, and those who leaked information on the massive spying program.

“If every step that we are taking to try to prevent a terrorist act is on the front page of the newspapers or any television, then presumably the people that are trying to do us harm are going to be able to get around our preventative measures,” Obama said.

Critics of the Obama Administration have accused it of an unprecedented crackdown on whistleblowers – more government officials are being prosecuted for leaks under Obama than all previous administrations combined. News of PRISM comes just after reports that the Justice Department secretly obtained two months of AP reporters’ telephone records and tapped Fox News reporter James Rosen’s private email.

“Over the last 10 years, the US justice system has suffered from a collapse, a calamitous collapse, in the rule of law,” Assange said.

The US tech giants apparently involved in PRISM have rushed to deny they participated in the program; their logos were visible on each the 41 PowerPoint slides of the leaked NSA document.

“Indeed, the US government does not have direct access or a ‘back door’ to the information stored in our data centers. We had not heard of a program called PRISM until yesterday,” Google CEO Larry Page and Chief Legal Officer David Drummond said in a statement.

Google’s remarks mirrored those by Apple, Facebook, Microsoft, Yahoo. All have claimed they have no knowledge of whether the NSA had direct access to their servers, and that only upon legal orders do they provide the government with data on specific persons.

While activists debate the legality and ethics of online espionage and high-tech firms try to distance themselves from the revelations, a former NSA official believes PRISM is largely ineffective, as the amount of data it collects cannot be effectively digested by a surveillance system.

“In fact it adds more of a problem because what that means, quite simply, is that if you go into a larger database, you get more data back no matter what the query is. It’s like making a query with Google. If you go in with a Google query you can get tens of thousands, or hundreds of thousands or even a million returns. Well, there’s no way you can go through that, all of that, to see what you’re really interested in. So what that does is make them less proficient at doing their jobs,” former NSA analyst William Binney told RT.

2013
06.02

It is something I have encountered throughout the ordeal.

People who know I am telling the truth and can produce the evidence to support my every statement, who know the situation is extreme and I am sane… THEY are afraid to face the facts.

The human mind has a primitive ego defense mechanism that negates all realities that produce too much stress for the brain to handle.

It is called DENIAL.SuicidalMan

The hardest part is I understand people who can’t imagine the reality of what has occurred…

I have had no escape though. I deal with the reality directly and set aside the humiliation and insults required to explain and to persevere.

In dangerous times, there is no sin greater than inaction. Denial has become a global pandemic.