2010
04.22

Emily Weideman ‘googles’ herself just about every day.

Here you go, Emily, something new for you to find.

You burglarized my home. The pictures show your criminal activity. Your father was a township police officer so you got away with it, BUT IT DOESN’T FORGIVE YOUR CRIME.

The laugh of it is your email to me years ago about electronic harassment… I bet you know alot about using technology to harass people.

2010
04.22

“Feeling pain is a hard way to know you’re still alive.”

I wake every day under attack. Never knowing where they will strike next. Knowing they are apparently untouchable. They can commit every crime without repercussions. They violate court orders. They commit perjury. They commit fraud. They conspire.

Revenge has not been a motivation for me. I haven’t sought any form of revenge. I haven’t threatened any type of revenge.

I just want them prosecuted for what they have done to me.

I want a life. I’d even settle for an hour of releif from the terror I feel every minute of every day.

2010
04.20

A lawyer whose advise results in their client’s commision of a crime will do everything within their power to avoid their own prosecution and disbarrment.

A Private Investigator will not expose the actions and tactics of another Private Investigator.

Police won’t generally expose the improper actions of other police, or former police officers.

County Detectives follow the same and protect the police from exposure.

The District Attorney’s Office protects their own staff who have directed detectives and police not to act.

An organization known as the AntiSpyware Coalition advocates against detection and removal of the surveillance software.

Software companies like McAfee, Symantec, Microsoft, etc… code their anti-virus, anti-spyware programs to permit the stealth installation of surveillance programs. They allow the programs to run secretly. The programs are not invisible. The programs are permitted to hide very well.

When you detect them, don’t expect any assistance…. they will all pretend to have no comprehension of the science fiction type idea you are presenting. They will all concentrate their efforts on ignoring you.

This is what has happened to me since July 2007 when I proved the software was illegally installed on my computers in February 2007. BUT, I have survived and persevered for several years. I had no choice or any other option. Sorry, I am just not capable of suicide. I imagine there have been plenty who exited by that method.

The longer I last the more likely their whole conspiracy will be exposed…
… Now everyone knows about the sci-fi program that can activate a camera remotely and spy on students in Upper Merion school District.
… Now everyone knows your neighbors can hack your computers like Philly’s so-called Bonnie & Clyde.

“Through their own words. They will be exposed. They’ve got a severe case of the Emperor’s new clothes.” – O’Connor

2010
04.20

This morning, while I was making some calls and preparing to post a few entries, there was a noise in the basement.

The noise can best be described as ‘a series of circuit breakers being thrown’. There was no one else in the house at the time. There hadn’t been anyone in the basement since yesterday and nothing was left on. I went down to check out the noises and there appeared to be nothing to note.

My general thought is that it may well be time to investigate exactly what is hidden behind the one wall. One wall has been at the center of many questionable ‘things’. I had always thought that they had found a way back in to remove whatever it was hidden there… but apparently they have not yet removed it. I think I know what it is and does. I am very curious to see exactly what it looks like after all this time. I had only read about their use in the UK. How do you suppose one ended up in my basement?

2010
04.20

Last time they were unable to schedule anything it held up Judge Del Ricci scheduling anything from March 5, 2009 until mid-June delaying any actions in custody until he arbitrarily decided to recuse himself in July 2009.

Previously, Sara Goren had delayed scheduling the custody issue EVEN AFTER being told it was ridiculous for her to have suggested my waiting 3 weeks to reconsider going to court with the custody case. After waiting 6 months for her to have her waste of time conciliation conference? and it had been almost a year since I had seen my son. She waited anyway and I got wind of plans to take my son out of the US without my permission which was required.

The two petitions which have not been scheduled will directly affect the ability to comply with the next submission requirement. And when I don’t do something, THAT is blamed for everything which does and doesn’t happen.

So again, we have scheduling delays… this time we find Sonya is trying to leave the USA. If she didn;t return, well things would just continue much the same with her attorneys continuing to handle the harassment and her not available for anything. (Expecting their paranoid accusations.)

Perhaps Montgomery County Court Administration is a much more involved participant in this ‘divorce’.

2010
04.20

The Upper Merion School District is also in Montgomery County. It comes as no surprise to me that the surveillance software was being utilized with the knowledge of law enforcement. Police were using the programs to track stolen computers and catch the theives. Police were also aware of the potential for abuse of the program. Only a fool wouldn’t recognize the potential for abuse.

The first round of stories included lies about “limited usage” of the program and the types of surveillance information obtained. They also tried to pin all the blame on some IT staff at the school district. They had the student’s parents being ‘influenced’ to drop the issue because of what it would cost the school district and neighbors tax impact. Now we find there are over 56,000 pictures from the over 2300 students laptops.

My troubles began when I detected the illegally installed software. Funny, all of the issues being raised in the Upper Merion School District case is just a partial list of those I have persevered through alone. They should be happy they won’t have to deal with all of the harassment and obfuscation directed at me once I reported my issue to police.

Here’s the story from the local paper:


Pa. district took 56,000 images on student laptops
By MARYCLAIRE DALE, Associated Press Writer Maryclaire Dale, Associated Press Writer – Tue Apr 20, 8:24 am ET
PHILADELPHIA – A suburban school district secretly captured at least 56,000 webcam photographs and screen shots from laptops issued to high school students, its lawyer acknowledged Monday.

“It’s clear there were students who were likely captured in their homes,” said lawyer Henry Hockeimer, who represents the Lower Merion School District.

None of the images, captured by a tracking program to find missing computers, appeared to be salacious or inappropriate, he said. The district said it remotely activated the tracking software to find 80 missing laptops in the past two years.

The Philadelphia Inquirer first reported Monday on the large number of images recovered from school servers by forensic computer experts, who were hired after student Blake Robbins filed suit over the tracking practice.

Robbins still doesn’t know why the district deployed the software tracking program on his computer, as he had not reported it lost or stolen, his lawyer said.

The FBI has opened a criminal investigation into possible wiretap violations by the district, and U.S. Sen. Arlen Specter, of Pennsylvania, has introduced a bill to include webcam surveillance under the federal wiretap statute.

The district photographed Robbins 400 times during a 15-day period last fall, sometimes as he slept in bed or was half-dressed, according to his lawyer, Mark Haltzman. Other times, the district captured screen shots of instant messages or video chats the Harriton High School sophomore had with friends, he said.

“Not only was Blake Robbins being spied upon, but every one of the people he was IM chatting with were spied upon,” said Haltzman, whose lawsuit alleges wiretap and privacy violations. “They captured pictures of people that have nothing to do with Harriton. It could be his cousin from Connecticut.”

About 38,000 of the images were taken over several months from six computers the school said were stolen from a locker room.

The tracking program took images every 15 minutes, usually capturing the webcam photo of the user and a screen shot at the same time. The program was sometimes turned on for weeks or months at a time, Hockeimer said.

“There were no written policies or procedures governing the circumstances surrounding activating the program and the circumstances regarding turning off the activations,” Hockeimer said.

Robbins was one of about 20 students who had not paid the $55 insurance fee required to take the laptops home but was the only one tracked, Haltzman said.

The depositions taken to date have provided contradictory testimony about the reasons for tracking Robbins’ laptop. One of the two people authorized to activate the program, technology coordinator Carol Cafiero, invoked her Fifth Amendment right not to answer questions at the deposition, Haltzman said.

About 10 school officials had the right to request an activation, Hockeimer disclosed Monday.

The tracking program helped police identify a suspect not affiliated with the school in the locker room theft, Hockeimer said. The affluent Montgomery County district distributes the Macintosh notebook computers to all 2,300 students at its two high schools, Hockeimer said.

As part of the lawsuit, a federal judge this week is set to begin a confidential process of showing parents the images that were captured of their children.

The school district expects to release a written report on an internal investigation in the next few weeks, Hockeimer said. School board President David Ebby has pledged the report will contain “all the facts — good and bad.”

2010
01.16

There has been a ‘wound’ on my head that appeared in August 2007. Oddly, it does not heal even after being treated with medicated shampoos, antibacterial ointment, burn ointment, etc… When I began treating it as a burn, the size of the ‘wound’ was reduced to about the size of a dime. It is still a dry hard patch of skin, and hair doesn’t regrow in the spot.

I had been thinking the wound was the result of minerals in sweat being heated by the ultrasonic radio waves used to monitor the house. The ultrasonic radio waves were noticed in August 2007, and confirmed in December 2007. The ultrasonic harassment has been documented and demonstrated in other articles on this site.  In my opinion, after my dog was drugged during the Robbery in March 2008,  the constant exposure to the ultrasonic waves prevented his recovery and affected the animal’s liver and kidney function, causing the dog to waste away and leading to the dog’s death in October 2008.

AND THEN, Monday January 11, 2010, on CSI:Miami. I was stunned to see a device used in their storyline – a subcutaneous GPS being used by a mother to track her daughter. I knew that GPS devices came in a variety of sizes, but had no idea they could be this small… and implanted without the target being aware.

Here’s a few pictures from the show…

Picture #1 – the GPS device in an evidence vial

Picture #2 – The GPS device pictured with a scale to indicate it’s size. The device is smaller than a grain of rice.

Picture #3 – The CSI style closeup of the device and syringe as it is implanted under the target’s skin.

Crazy, right? Consider the following…
– These devices have been around for a few years already.
– These GPS devices are widely used in countries where kidnapping risks are high. Parents inject their children to enable faster recovery should the child be kidnapped.
– The devices are coated with a material which hardens the skin at the implanted location to prevent the device from floating/migrating to another part of the body.

– On at least 2 occasions while housecleaning I found what I believed at the time to be small car fuses that someone may have dropped. The only other person in the house at the time strangely denied ownership. ( I still have them. )
– I have found a topical local anesthetic on the floor and the two people in the house at the time strangely denied ownership though it had to be one of theirs. It was an item I have never purchased and IT WAS ON THE FLOOR IN THE MIDDLE OF THE ROOM. ( I still have the tube. )
– I have discovered bruises on both forearms on at least 3 occasions which are not the part of any bump or injury I can recall. The bruises resembled a handprint – when a hand was placed over the bruise as if it was holding my arm down to restrain me, it matched up with the thumb and heel of an adult sized hand.

I was reminded by a friend, that she saw the bruises which appeared in July 2009. After a sudden, mysterious, and unexplained exit of a house guest caught in a series of lies. When calmly presented with questions about his story, at around 1:30AM, he decided to leave immediately. The tone and attitude of his parting words suggested he somehow knew my wife directly. “You’re a nice guy, and you do not deserve what’s happening to you. I wish I could help, but… your wife is an absolute bitch.” And he disappeared… and has since avoided any communications or contact.

The FBI does not tag people they may be investigating. Not even terrorist suspects get tagged.
THE FBI HAS NO REASON TO BE INVESTIGATING ME.
Local Police and County Detectives would not use this type of device and their investigations rarely exceed a few weeks.
THEY ALSO HAVE NO REASON TO BE INVESTIGATING ME.
But, how about a private investigator who is attempting to cover up the illegal activities described on this web site and avoid Federal, State and local prosecution?

2010
01.11

When I filed my first petition which could possibly be considered a counterstrike, it was dismissed. The judge indicated it was not cognizable and could offer no further explanation indicating he could not provide me with legal advice.

Was it cognizable when first submitted as a counter petition? Which the judge asked me to resubmit as a separate petition.

After resubmitted, was it cognizable at the Short List conference where the document was not reviewed at all?

Was it cognizable as it was scheduled and rescheduled on the court calendar?

Was it cognizable at the Hearing to which I was ordered to appear?
Which had not been on the judge’s schedule?
AND TO WHICH THE OPPOSING PARTY AND HER LAWYERS DID NOT APPEAR? How did they know it wasn’t REALLY scheduled for then? And whoever informed Angst & Angst that it wasn’t actually on the Judge’s schedule, took NO ACTION to inform everyone involved.
[ Big surprise, someone in court administration is issuing incorrect paperwork. ]

Was it first scheduled for a date when it would have been cognizable? Then moved to a Family court date?

Cognizable? It was dismissed because it wasn’t cognizable, BUT NOT BECAUSE IT HAD NO MERIT. They had no defense. Yet, won fees… because it wasn’t cognizable.

Why did it take from August to December to find out it was not cognizable? How does one determine if the petition is scheduled under the judge’s Family Court schedule (with limited cognizance) or on his Civil Court schedule to which she would have been found guilty on all counts?

2010
01.11

The use of false testimony from witnesses and informants, in addition to the practice of preying on suspects, stealing their money and covering up police crimes with false arrests and search warrants, led to the arrests of five cops in Philadelphia.

The city of Philadelphia had to release almost 500 prisoners and subsequently paid $4 million to settle civil rights lawsuits because of improper police conduct.

2010
01.11

(Excerpts from www.TalkLeft.com)

Confidential Informants Used Heavily in Philadelphia

TalkLeft has often discussed the damage that informants do to individuals and families, to law enforcement agencies, to privacy rights, and to the criminal justice system and the society that depends upon it to operate fairly. The Inquirer reports allegations in the context of a larger issue of crime policy: law enforcement’s nearly unregulated reliance upon police informants.

Despite the work done by informants, the head of the city’s police union said many officers regard them with contempt.

So why would a dutiful officer who is skeptical of informant credibility rely upon informants at all? It’s better to put informants at risk than to risk the lives of undercover cops. Of course, officers will minimize the risk to informants, but are “looking at the welfare of the police officer first.”

If risky activities are so important, shouldn’t the trained professionals who get paid to assume the risks associated with law enforcement make them, rather than recruiting frightened and desperate and often drug addicted individuals who are pressured to take risks they would ordinarily avoid?