Law Suit

Share this information with friends online when you click on any link below.

  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Become one of our Digital Mind Coach friends and join us today by clicking the Facebook icon above or follow Perry Ritthaler on Twitter by clicking the Twitter link above.

Thank you for visiting our popular Crowd Source Funding Digital Mind Coach web site.

Ideas, Decisions, Affirmations, Create Your Love Written By Perry Ritthaler

All of the information created for your Digital Mind Coach Experience is focused on leading edge battlefield strategy law suit blog information fighting for liberty freedom and democracy; specifically the right to think and preserve our way of life and american dream opportunity; you can preview free on the law suit page

Thank you for visiting our cyber war blog, please leave your opinion in a comment in our forum on the Digital Mind Coach web site.

Please tell your friends who also face civil rights violations and encourage them to visit the Digital Mind Coach web site, especially if they could benefit from the positive inspirational, self-help psychology or information offered in e-books listed on the Digital Mind Coach web site.

https://www.crcc-ccetp.gc.ca/en/contact-form
Civilian Review and Complaints Commission for the RCMP
I am still terrorized 3rd time and this time by people named Cheryl and Karen and a police man I have web cam video and reports half a terabyte evidence taken by FBI earlier this year; enough to coup Canada.
That is trying to hurt my mother with digital technology; they lead me to believe they are extorted to cover crimes committed on me in a failed police sting.
Lost in a world of cyber terrorism in my home; trying to live a safe life and not a threat to myself or others around me while trying to be supportive to people I meet in the community.
Jsock; black seal; CIA black site peel; these people have hit the USA to many times I am under as a presidential aid backing the PM and a failed coup of Canada.
Attempted to email word document Telus and attorney through Face Book.
Fail
Face Book Reason 12 / 19 / 2016 7:31 pm
We’ve marked this message as possible spam. If you’d like to report threatening or abusive messages, please visit the Help Center.

From: Joseph L. Jordan, Attorney at Law [mailto:e@scorpioncontact.com]
Sent: Sunday, December 18, 2016 10:45 AM
To: perry@digitalmindcoach.net
Subject: Thank You for Contacting Us – jordanucmjlaw.com

Dear Perry Ritthaler,
Thank you for contacting Joseph L. Jordan, Attorney at Law!
We have received your message, and we will get back to you as soon as possible;
However, if you need immediate assistance, please give us a call at (888) 616-6177.

For More Information
Please visit our website

Map and Directions
1033 S. Fort Hood St. STE 200, #242 Killeen, TX 76540

Best Regards,
Joseph L. Jordan, Attorney at Law
(888) 616-6177
www.jordanucmjlaw.com

1033 S. Fort Hood St.
STE 200, #242
Killeen, TX 76540

________________________________________
No virus found in this message.
Checked by AVG – www.avg.com
Version: 2016.0.7924 / Virus Database: 4739/13617 – Release Date: 12/19/16
No virus found in this message.
Checked by AVG – www.avg.com
Version: 2016.0.7924 / Virus Database: 4739/13617 – Release Date: 12/19/16
I am blocked hacked from contacting my attorney.
Another Version of Guerrilla Civilian Revitalization
If you are hospitalized for mental illness and your spouse or family member is left alone they are easy predator prey and you as well are predator prey in the hospital locked away unable to help them or leave as your medications rise to control your unstable brain.
Your home is gone and the one you love most is gone and you are left alone in a mental health clinic fighting to leave with no place to go if your homes is repossessed due to your loved one extorted for the wealth and title to stay alive and finally dies due to anxiety and stress watch you fall into disarray in the mental health clinic.
All you need to do is keep doing predator prey and maintain a file proving to a mental health team you fit this description; a danger to yourself and others around you.
Mental illness refers to a wide range of mental health conditions — disorders that affect your mood, thinking and behavior. Examples of mental illness include depression, anxiety disorders, schizophrenia, eating disorders and addictive behaviors.
Many people have mental health concerns from time to time. But a mental health concern becomes a mental illness when ongoing signs and symptoms cause frequent stress and affect your ability to function.
A mental illness can make you miserable and can cause problems in your daily life, such as at school or work or in relationships. In most cases, symptoms can be managed with a combination of medications and talk therapy (psychotherapy).
Symptoms
By Mayo Clinic Staff
Signs and symptoms of mental illness can vary, depending on the disorder, circumstances and other factors. Mental illness symptoms can affect emotions, thoughts and behaviors.
Examples of signs and symptoms include:
• Feeling sad or down
• Confused thinking or reduced ability to concentrate
• Excessive fears or worries, or extreme feelings of guilt
• Extreme mood changes of highs and lows
• Withdrawal from friends and activities
• Significant tiredness, low energy or problems sleeping
• Detachment from reality (delusions), paranoia or hallucinations
• Inability to cope with daily problems or stress
• Trouble understanding and relating to situations and to people
• Alcohol or drug abuse
• Major changes in eating habits
• Sex drive changes
• Excessive anger, hostility or violence
• Suicidal thinking
Sometimes symptoms of a mental health disorder appear as physical problems, such as stomach pain, back pain, headache, or other unexplained aches and pains.
When to see a doctor
If you have any signs or symptoms of a mental illness, see your primary care provider or mental health specialist. Most mental illnesses don’t improve on their own, and if untreated, a mental illness may get worse over time and cause serious problems.
If you have suicidal thoughts
Suicidal thoughts and behavior are common with some mental illnesses. If you think you may hurt yourself or attempt suicide, get help right away:
• Call 911 or your local emergency number immediately.
• Call your mental health specialist.
• Call a suicide hotline number — in the U.S., call the National Suicide Prevention Lifeline at 1-800-273-TALK (1-800-273-8255).
• Seek help from your primary care doctor or other health care provider.
• Reach out to a close friend or loved one.
• Contact a minister, spiritual leader or someone else in your faith community.
Suicidal thinking doesn’t get better on its own — so get help.
Helping a loved one
If your loved one shows signs of mental illness, have an open and honest discussion with him or her about your concerns. You may not be able to force someone to get professional care, but you can offer encouragement and support. You can also help your loved one find a qualified mental health provider and make an appointment. You may even be able to go along to the appointment.
If your loved one has done self-harm or is considering doing so, take the person to the hospital or call for emergency help.
Perry Ritthaler Life can be full of challenges as we face new technology in the world.

Vindictive, WiFi Hacking Neighbor Sentenced to 18 Years
By Eric Limer | 12:57 pm, July 13th, 2011

0

Barry Ardolf, a Minnesota based neighbor-turned-hacker was recently sentenced to 18 years in prison for actions that fall somewhere between “personal vendetta” and “domestic cyberterrorism scheme.” It all started back in 2009 when the Kostolnik family moved in next door to Ardolf. After an event where Ardolf allegedly kissed the Kostolnik’s 4 year old son on the lips (a claim Ardolf hotly contested) Ardolf hacked into the Kostolnik’s Wi-Fi network and proceed to wreak havoc as a response to the Kostolnik’s allegations.
The effects of his hacking, on the other hand, are entirely clear. After hacking into his neighbor’s encrypted Wi-Fi network, Aldorf proceeded to do the following: set up a Myspace Account under Mr. Kostolnik’s name and post child pornography on that account, send aggressively sexual emails to Mr. Kostolnik’s female coworkers from his hacked email account and threaten the life of Vice President Joe Biden via email, advising the recipient, “This is a terrorist threat! Take this seriously.”
The “terrorist threat” ultimately set events in motion that led to a search warrant for Ardolf’s house. The search turned up a veritable wealth of evidence including tutorials on cracking WEP encryption, handwritten revenge plans, mail that Ardolf had stolen, the pornographic image that had been posted to the false Myspace account and, to top it all off, evidence that Ardolf had previously waged a similar campaign against neighbors at his previous home.
Initially offered a two year plea deal for crimes related to the Joe Biden email, Ardolf declined and was eventually charged with identity-theft and child-porn crimes which hiked his sentence, issued yesterday, up to 18 years in prison.
The lesson here, of course, is keep your Wi-Fi network encrypted and tries not to anger creepy, unstable neighbors. And if you can’t avoid that, keep some Ethernet cables around.
(Via Wired)
http://www.justice.gc.ca/eng/rp-pr/cj-jp/fv-vf/har/part1.html
A Handbook for Police and Crown Prosecutors on Criminal Harassment
Part 1: Introduction
Criminal harassment, which includes “stalking,” is a crime. While many crimes are defined by conduct that results in a very clear physical outcome (for example, murder), the offence of criminal harassment prohibits deliberate conduct that is psychologically harmful to others. Criminal harassment often consists of repeated conduct that is carried out over a period of time and that causes its targets to reasonably fear for their safety but does not necessarily result in physical injury. It may be a precursor to subsequent violent and/or lethal acts.
CRIMINAL HARASSMENT
264(1) No person shall, without lawful authority and knowing that another person is harassed or recklessly as to whether the other person is harassed, engage in conduct referred to in subsection (2) that causes that other person reasonably, in all the circumstances, to fear for their safety or the safety of anyone known to them.
Prohibited conduct
(2) The conduct mentioned in subsection (1) consists of
a. repeatedly following from place to place the other person or anyone known to them;
b. repeatedly communicating with, either directly or indirectly, the other person or anyone known to them;
c. besetting or watching the dwelling-house, or place where the other person, or anyone known to them, resides, works, carries on business or happens to be; or
d. Engaging in threatening conduct directed at the other person or any member of their family.
Punishment
(3) Every person who contravenes this section is guilty of
a. an indictable offence and is liable to imprisonment for a term not exceeding ten years; or
b. An offence punishable on summary conviction.
Factors to be considered
(4) Where a person is convicted of an offence under this section, the court imposing the sentence on the person shall consider as an aggravating factor that, at the time the offence was committed, the person contravened
a. the terms or conditions of an order made pursuant to section 161 or a recognizance entered into pursuant to section 810, 810.1 or 810.2; or
b. The terms or conditions of any other order or recognizance made or entered into under the common law or a provision of this or any other Act of Parliament or of a province that is similar in effect to an order or recognizance referred to in paragraph (a).
Reasons
(5) Where the court is satisfied of the existence of an aggravating factor referred to in subsection (4), but decides not to give effect to it for sentencing purposes, the court shall give reasons for its decision.
1.1 Purpose of This Handbook
The purpose of this handbook is to provide police and Crown prosecutors with guidelines for the investigation and prosecution of criminal harassment cases and to promote an integrated criminal justice response to stalking. It is intended to be a starting point for police and Crowns. Police and Crowns are encouraged to adapt these guidelines to reflect the particular needs and circumstances of each jurisdiction and each case.
The Handbook was developed by a working group of federal/provincial/territorial criminal justice officials in consultation with criminal justice professionals. It was first published in 1999 and updated in 2004. The development of these guidelines was prompted by the findings and recommendations of the 1996 Department of Justice Canada review of the criminal harassment provisions in the Criminal Code. The updates have been published in response to positive feedback regarding the usefulness of the Handbook and requests for more current information.
1.2 Legislative History of Criminal Harassment
Criminal harassment is not new, but recognition of it as a distinct criminal behaviour is relatively recent. Before 1993, persons who engaged in stalking conduct might have been charged with one or more of the following offences: intimidation (section 423 of the Criminal Code); uttering threats (section 264.1); mischief (section 430); indecent or harassing phone calls (section 372); trespassing at night (section 177); and breach of recognizance (section 811).Footnote1
On August 1, 1993, the Criminal Code was amended to create the new offence of criminal harassment in section 264. It was introduced as a specific response to violence against women, particularly to domestic violence against women. However, the offence is not restricted to domestic violence and applies equally to all victims of criminal harassment. Section 264Footnote2 was amended, effective May 1997, to make the commission of an offence of criminal harassment in violation of a protective court order an aggravating factor for sentencing purposes, and effective July 23, 2002, to double the maximum sentence for the offence of criminal harassment to 10 years’ imprisonment for an indictable offence. Also effective in May 1997, murder committed in the course of criminally harassing the victim, was added to the list of conduct in section 231 classified as first degree murder, irrespective of whether it was planned and deliberate.
A number of other sections of the Criminal Code have been amended over the years to refer to criminal harassment as one of the offences for which certain procedural protections or dispositions are triggered:
1. Under subsection 109(1), where an offender is convicted, or discharged under section 730, of criminal harassment, they are subject to a mandatory weapons prohibition order.
2. Under subsection 515(4.1), where an accused is charged with criminal harassment, when releasing an accused on interim release, the justice shall add a condition prohibiting the accused from possession any weapons, unless the justice determines that this condition is not required for anyone’s safety.
3. Under section 486.3, trial judges are required to appoint a lawyer to conduct the cross-examination upon the application of the prosecutor or the victim where a self-represented accused is on trial for criminal harassment (prior to this last amendment, the accused could further intimidate the complainant by personally cross-examining her/him when s/he appeared as a witness in the criminal trial).
4. Lastly, effective November 2012, paragraph 742.1(f) states that conditional sentences are not available when the offender is convicted of criminal harassment, prosecuted by way of indictment.
1.3 We Know About Criminal Harassment in Canada?
1.3.1 Police and Court Reported Data
The most current Statistics Canada police and court data relating to criminal harassment reveal the following facts:
• In total, just over 20,000 criminal harassment incidents were reported to the police in 2009, representing almost 5% of all violent crimes reported to police. Data from a subset of police services indicate that the rate of reported criminal harassment has been gradually increasing over the past decade, including a 57% increase from 2008 to 2009.Footnote3
• Of the cases reported to police in 2009, females accounted for three-quarters of all victims (76%) of criminal harassment, compared with about half (51%) of victims of violent crime overall.Footnote4
• In 2009, men accounted for 78% of those accused of criminal harassment, with a large proportion of both females and males being harassed by male perpetrators (85% of females and 64% of males).Footnote5
• In 2009, female victims were almost twice as likely as male victims to be stalked by a former or current intimate partner (51% of females and 23% of males). Male victims were most commonly stalked by a casual acquaintance (37%).Footnote6
• In 2007, current spouses were nearly twice as likely as ex-spouses to be the victims of common or major assault, while criminal harassment or threats were much more likely to be committed against ex-spouses.Footnote7,Footnote8
• In 2009, threats (38%) or physical force (12%) were more often used against targets of criminal harassment than were weapons (3%).Footnote9
• Most targets of criminal harassment (69%) were harassed in their own home or at another residence, such as a friend’s home; 16% of victims were harassed in commercial or corporate areas; 11% at outdoor public locations, such as on the street or in a parking lot; and 4% at schools or universities.Footnote10
• In 2008/2009, Canada’s adult criminal courts completed about 3,200 cases in which criminal harassment was the most serious charge. Of these cases, over half (52%) resulted in a finding of guilt, similar to the proportion of violent cases in general (54%). The remaining criminal harassment cases were stayed or withdrawn (37%); resulted in an acquittal (7%); or resulted in another type of decision, such as not criminally responsible (4%).Footnote11
• In 2009, over a quarter of criminal harassment incidents (27%) reported to police involved other offences. Among these, uttering threats was the most common associated offence.Footnote12
• Between 1997 and 2009, criminal harassment was the precipitating crime in a total of 68 homicides—for example, a female was stalked (and subsequently killed) by a recently separated intimate partner. This translates to an average of five such homicides per year over the 13-year period.Footnote13
From 1999 to 2009, the number of victims of criminal harassment reported to a subset of police servicesFootnote14increased by 65%, from 6,411 victims in 1999 to 10,589 victims in 2009.Footnote15 Such an increase is not uncommon following the introduction of a new law. It is difficult to assess, however, whether the rise is due to an increase in the number of criminal harassment incidents, increased reporting by victims, or a change in the way police respond to and record such incidents.
1.3.2 Victim/Survivor Survey Reports
Given that over half of the people who are criminally harassed do not report this crime to police,Footnote16 it is helpful to look at sources other than police-reported data to get a more complete picture of criminal harassment in Canada. Statistics Canada’s General Social Survey (GSS) on Victimization provides self-reported data on criminal victimization. It is an important complement to crime rates, as it measures both crime incidents that come to the attention of the police and those that are unreported. The 2004 GSS reveals the following facts about criminal harassment:Footnote17
• In the survey, 11% of women and 7% of men (for a total of 9% of Canadians 15 years of age and over) indicated that they had been stalked in the five years prior to the survey. This amounts to 2.3 million Canadians.Footnote18
• For the majority of victims, the stalker was male (80%), regardless of the sex of the victim. The stalker was female in very few situations, for both female (9%), and male (5%) victims.Footnote19
• Results from the 2004 GSS survey show that most victims knew their stalkers, 23% of whom were friends, 17% current or former intimate partners, 14% individuals known by sight only, and 18% co-workers, neighbours or relatives. Less than one in four victims was harassed by a total stranger. Female victims were most often harassed by a friend (22%), or a current or former intimate partner (20%). On the other hand, male victims reported being harassed by a friend in 25% of cases, a person known by sight only in 16% of cases, and a current or former intimate partner in only 11% of cases.Footnote20
• Just over 1 in 10 (11%) stalking targets sought a protective or restraining order against the stalkers. Just under half of the orders were violated (49%).Footnote21
Risk Factors
• The majority of stalking victims are young women between the ages of 15 and 24 (19% of total population). Among male victims, the highest rates were among young men aged 15 to 17 (6%) and 18 to 24 (4%). The risk of being a victim of stalking was found to decrease with age.Footnote22
• Aboriginal people were twice as likely (7%) as non-Aboriginal people (3%) to have experienced some form of stalking that made them fear for their lives in the previous 12 months.Footnote23 Aboriginal victims of stalking were also more likely than non-Aboriginal victims to be physically attacked or grabbed by the person stalking them (26% versus 16%) and to contact the police to report the stalking (41% versus 37%).Footnote24
• Divorced or single women tended to experience a higher rate of stalking (7% and 6%, respectively) than other individuals did, based on those who reported stalking in the previous 12 months).Footnote25
Characteristics of the Stalking
• Over half (52%) of female victims reported receiving repeated or obscene phone calls from their stalkers. One-third reported being spied on (34%), or being intimidated or threatened (34%). In contrast, over half (56%) of male victims reported being intimidated or threatened, and over one-third (39%) reported receiving repeated phone calls. One-quarter (24%) of male victims reported threats to hurt their pets or damage their property.Footnote26
• The more familiar the stalker is with the victim, the more likely s/he is to employ multiple forms of stalking. Female (67%) and male victims (54%) stalked by intimate partnersFootnote27 were more likely to experience multiple forms of stalking. Both males and females who were stalked by a stranger were more likely to be subjected to only one form of stalking (38% of female victims and 27% of males).Footnote28
• In 2004, 21% of victims reported stalking behaviour that persisted for over one year. Most female victims (29%) reported the stalking lasted between one and six months (as opposed to 21% of male victims), whereas most male victims (31%) reported the stalking lasted one week or less.Footnote29
• The length of time that the stalking lasted appears to be related to the nature of the relationship between the victim and the stalker. The stalking lasted over a year for 61% of survey respondents who were stalked by an ex-spouse, and for 26% of those stalked by an ex-boyfriend or girlfriend. Where the victim and stalker had not had an intimate relationship, the stalking most often lasted one to six months (for 34% of victims stalked by a co-worker, 30% of victims stalked by a friend and 31% of victims who only knew their stalkers by sight). When victims were stalked by a stranger, it was most often for under a week (41%). Neighbours and non-intimate relatives, however, most often stalked for over a year (43% and 39%, respectively), falling between ex-spouses and ex-daters.Footnote30
• Just over one-quarter of stalking victims reported that they had been stalked by more than one person (28%). Males were slightly more likely than females to report this (33% versus 25%).Footnote31
• The likelihood of stalking victims being attacked or grabbed (16% of all stalking victims) increased when they had had an intimate relationship with their stalker (36% of those stalked by a current partner and 34% of those stalked by a former partner, versus 13% of those whose stalker was not an intimate partner).Footnote32
Impact on Victims
• Almost one in three victims (31% of female victims and 27% of male ones) feared for their lives as a result of stalking. Both male and female victims were most likely to fear for their lives when being harassed by an ex-spouse (60% of female victims stalked by an ex-spouse and 44% of male victims). Female victims stalked by an ex-boyfriend (41%) or an “other relative” (40%) were also likely to fear for their lives, as were male victims stalked by co-workers (39%).Footnote33
• Among victims, 80% of females and 62% of males changed their lifestyle in an attempt to avoid being victimized by their stalker, by doing things such as avoiding certain places or people; getting an unlisted phone number, call display, call screening or call blocking; not going out alone; and changing their residence.Footnote34
1.4 Impact of Criminal Harassment on the Victim
The cumulative effect of harassment causes victims to experience intimidation, as well as psychological and emotional distress. Psychologically, stalking can produce an intense and prolonged fear among victims. This fear usually includes an increasing fear that the frequency and nature of the conduct will escalate (for example, from non-violent to life threatening) and is accompanied by a feeling of loss of control over the victim’s life. The constant fear and stress can result in mental and physical exhaustion, which can in turn lead to various health problems.Footnote35 In addition, stalking targets may face considerable financial consequences as a result of the need for psychological treatment or therapy, and time taken off work.Footnote36
Some common responses by victims to the trauma of being stalked include the following:
• self-reproach
• feelings of shame and lowered self-esteem
• a tendency to downplay the impact of the stalking
• interpretation of the stalking as a “private matter”
• a sense of betrayal and stigma
• anxiety, fear and long-term distress due to the unpredictability of the stalker’s conduct
• feelings of anger, helplessness and loss of control over their lives
• a lack of confidence in police, resulting in a failure to report
• changing their lifestyle or location, rather than expecting that the police will put an end to the harassing conductFootnote37
• loss of trust in other people in the victim’s life, as well as the world at large
• a sense of isolation stemming from difficulty in convincing others that they are in danger
• attempts to reason with the stalker (which are likely to backfire and encourage the harassing conduct)
• inaction or delay in involving the criminal justice system, due to a lack of awareness that the conduct is criminal
• denial or embarrassment
1.5 What Do We Know About Stalkers?
More so than almost any other form of violence, stalking is highly personal, bound up in the relationship between the perpetrator and victim. Indeed, in a very real sense, the relationship is the violence; perpetrators attempt to establish or maintain a relationship—whether amorous or angry—against the victims’ wishes.Footnote38
No single psychological profile exists for stalkers. Stalking and harassing behaviour can take many forms. A popular portrayal of criminal harassment is the stalking of a celebrity or public figure. However, most targets of harassment are ordinary people. In Canada, it appears that the primary motivation for stalking another person is more often a desire to control a former partner. The potential severity of stalking should not be underestimated. The psychological impact on the victim alone can be debilitating and life-altering. And, unfortunately, in far too many cases, the victim’s fear of being seriously injured or killed has been realized.Footnote39
On its own, the individual conduct that makes up criminal harassment often appears innocent and harmless. The simple act of sending a dozen roses to a woman on Valentine’s Day seems romantic to many people. However, to a woman who has been abused by the sender and has attempted to keep her location secret from him, it can be a terrifying message that he knows where she is and that she cannot escape him.
Individuals who harass and stalk may possess one or more of a variety of psychological difficulties, ranging from personality disorders to major mental illnesses. Since the introduction of the first anti-stalking law in the United States, there have been a number of attempts to create stalking typologies from both the psychiatric and the law enforcement perspectives. Regardless of the typology, however, most individuals who stalk are engaging in obsessional behaviour. They are obsessional in the sense that they have persistent thoughts and ideas regarding the victim. They do not necessarily fulfill the diagnostic criteria for any serious psychiatric disorder. However, many have prior criminal, psychiatric and drug abuse histories that fall under Axis 1 diagnosis.Footnote40 The most common include alcohol dependency, mood disorders and schizophrenia.
1.5.1 Typologies of Criminal Harassment
Although no typology is all-inclusive, the one developed by the Los Angeles Police Department (LAPD) Threat Management UnitFootnote41 has been used as a theoretical framework in threat assessments by the Behavioural Sciences Branch of the Royal Canadian Mounted Police (RCMP). The relationship and context-based stalking typology (RECON) proposed by MohandieFootnote42 is also used by the Behavioural Sciences Branch of the RCMP and the Threat Assessment Unit of the Behavioural Sciences and Analysis Section of the Ontario Provincial Police (OPP) and is also increasingly used elsewhere in Canada and the United States. These two typologies are used in assessing risk and determining risk management strategies.
(a) LAPD Framework (Zona 1993)
The LAPD Framework sorts stalking behaviour into three categories: erotomanic, love obsessional and simple obsessional stalker.
As established in the Diagnostic Statistical Manual, 4th ed., erotomania is a delusional disorder in which the central theme is that another individual is in love with the stalker. Erotomanic stalkers are convinced that the object of their attention, usually someone of the opposite sex, fervently loves them and would return the affection if it were not for some external influence. The person about whom this conviction is held is usually of a higher status than the stalker but is often not a celebrity. The victim could be their supervisor at work, their child’s paediatrician, their church minister or the police officer who stopped them for a traffic violation but did not charge them. Sometimes it can be a complete stranger.
Love obsessional stalkers, on the other hand, can be obsessed in their love without believing that their target loves them.Footnote43 Very often, the love obsessional stalker suffers from a major psychiatric illness, such as schizophrenia or mania, and wants to “win” the love of their victim.
The simple obsessional stalker is similar to what has been described, in other typologies, as the intimate partner stalker. Most of these stalkers have been in some form of relationship with their target. The contact may have been minimal, such as a blind date, but more commonly it is a prolonged dating relationship, common-law union or marriage. The perpetrator refuses to recognize that the relationship with the other person is over and the prevailing attitude is “If I can’t have her (or him), then no one else will.” The stalker mounts a campaign of harassment, intimidation and psychological terror. The motivation for the harassment and stalking varies from revenge to the false belief that the stalker can convince or coerce the victim back into the relationship. Most simple obsessional stalkers are not mentally ill. Many have longstanding personality disorders.
(b) RECON (Relationship and context-based stalking typology), 2004
The RECON proposes four types of stalking categories, based on whether there is a prior relationship between the perpetrator and target: intimate, acquaintance, public figure and private stranger.Footnote44
The RECON typology responds to the desire for a simple-to-use typology whose categorization labels are linked to the degree of risk.Footnote45 After reviewing existing typologies, Mohandie and Meloy found that “[i]t is clear from research on obsessional following that there is a difference between those who stalk public and private figures, and that the degree of prior relationship intimacy is an important variable, especially as it relates to risk for violence.”Footnote46 They also found that other typologies based on mental health diagnoses and motivation mostly served to complicate typologies and resulted in overlapping categories. Furthermore, some stalking relationships may vacillate between categories over time, as motivation and emotions change. The RECON typology was found to be easy to apply, does not require an ability to evaluate the state of the stalker’s mental health or motivation, and has predictive value.Footnote47 Here are the four categories:
I. Previous relationship/private figure context
A. Intimate marriage, cohabiting or dating/sexual relationship (Intimate)
B. Non-intimate employment-related, affiliative/friendship or customer/client (Acquaintance)
II. No prior relationship or limited/incidental contact
A. Public figure context, pursuit of a public figure victim (Public Figure)
B. Private figure context-pursuit of a private figure victim (Private Stranger)
In a large study, Mohandie and Meloy gathered the following information about stalking cases falling into the four RECON categories.
Intimate stalkers are the most dangerous. They often have criminal records for violence and abuse of stimulants and/or alcohol. The frequency and intensity of their stalking often increases, and they frequently approach their targets. Over half of the group in this study physically assaulted their target, and most of them reoffended. This study confirmed the findings of other studies that sexual intimacy substantially increases the risk that stalkers will be violent toward their targets. The authors advise that “[r]isk management should emphasize the use of intensive probation or parole supervision; heightened danger in the days and weeks immediately following separation from the intimate; the likelihood of domestic violence and emotional domination before separation; and the minimal effectiveness of psychotherapy and pharmacotherapy.”Footnote48
Acquaintance stalkers are violent half as often as intimate stalkers, though approximately one-third will assault their target or damage their property. When acquaintance stalkers in the study threatened their target, they did so repeatedly. On the one hand, a less intense bond with their target may make violence less likely, but on the other hand, these stalkers have a “ravenous” desire to initiate a relationship with the target. Risk management of this group should combine both law enforcement intervention and mental health treatment (based on careful psychiatric diagnosis).Footnote49
Public figure stalkers generally include a greater proportion of female stalkers and male targets than other categories, but this group is still made up of more male stalkers than female, and more female targets than male. Compared to Mohandie’s other categories, these stalkers tend to be older, have a less violent criminal record, are more likely to be psychotic and are less likely to threaten the target. However, when public figure stalkers use violence, it tends to follow a perceived rejection or humiliation, and the violence is usually “planned, purposeful, and emotionless (predatory), and involves a weapon, usually a firearm.” Mohandie and Meloy recommend that risk management of this group involve professional protection of the target (since injury is likely to be more serious if violence does occur) and mental health professionals, who can tailor psychiatric and psychological interventions to mitigate risk. Prosecution with forensic hospitalization frequently results in the most helpful outcome.Footnote50
Only a very small proportion (10%) of the group of stalkers Mohandie and Meloy studied were private stranger stalkers. Many of these stalkers were mentally ill men, with more than 1 in 10 showing suicidal thinking or behaviour, but they were less likely than intimate stalkers to have violent criminal records or to be abusing drugs. Half of the private stranger stalkers in the study did threaten their targets, and almost one-third were violent toward their target or their target’s property. There is a moderate risk of recidivism. The authors recommend risk management focusing on psychiatric treatment and aggressive prosecution. Given the intensity of the pursuit in this category, despite the lack of any type of relationship, mental illness is likely to be an aggravating factor for violence risk in this category.Footnote51
Other Factors and Typologies
As mentioned earlier, many typologies have been proposed, focusing on factors that identify characteristics of the perpetrator, the motivation behind the stalking and the manner in which the stalking is being carried out. Although it may be easy enough for properly qualified professionals to classify stalkers into the categories below, these particular labels are not as accessible to the average criminal justice system professional, nor are they as helpful as the RECONcategories in identifying the type of intervention needed to stop the stalking and prevent further harm. Some areas that leading experts in the mental health and risk assessment fields have focused on are perpetrator characteristics associated with violent recidivism in other, better studied areas of violence, such as sexual violence and intimate partner violence. One such example is psychopathy.
Psychopathic stalkers belong to a category of offenders that has been linked to a significant risk factor for violent crimes. Psychopathy is characterized by an arrogant demeanour, impulsiveness, shallow emotions, a refusal to take responsibility, a lack of remorse for one’s actions and a tendency to engage in antisocial behaviour. The motivations behind the conduct of psychopathic stalkers are markedly different from those of the majority of non-psychopathic stalkers, who seek some form of intimacy with the victim. This type of stalker often targets strangers and can resort to threats and the use of weapons. Although much research remains to be done on the specific link between psychopathy and stalking behaviour, recent findings point to several important considerations.Footnote52
While it appears that only a small percentage of stalkers exhibit psychopathic traits, it is important to keep in mind that this category may present the highest risk of serious physical or psychological harm to the victim. Since psychopathy implies a lack of empathy, as well as an inability or lack of desire to form or maintain close relationships, the behaviour of psychopathic stalkers is more consistent with the typology of the “sadistic stalker,” the “resentful stalker,” the “predatory stalker” or the “grudge stalker.” Possible motivations include establishing dominance and control over the victim, retaliating for a perceived insult, bullying or humiliating the victim, or satisfying sadistic desires. Psychopathic stalkers are also more likely to target strangers or superficial acquaintances, while non-psychopathic stalkers usually pursue those they know well, such as family members, friends and former intimate partners. In addition, psychopathic stalkers often select emotionally or financially vulnerable victims, and the frequency and intensity of harassing conduct tend to escalate with time. In view of these particular traits, law enforcement professionals should be aware not only of the potential for serious violence, but also of the need to develop management strategies tailored to avoid provoking violent behaviour in this category of stalkers.Footnote53
Paraphillic (sexually deviant) stalkers are another recognized but not well-studied group of stalkers. These offenders stalk as a component of their paraphilic (sexually deviant) focus. Some rapists and paedophiles stalk because stalking is incorporated into their sexually deviant fantasies and offending.Footnote54 Some sexual sadists will go through “behavioural try-outs” that include stalking.Footnote55
Physically violent stalkers, according to the results of a 2008 study comparing violent and non-violent stalkers in Canada, are more likely to:
• have a strong previous emotional attachment to the victim
• exhibit an intense obsession with, or fixation on, the victim, resulting in more frequent contact and more persistent harassment
• harbour a higher degree of negative emotion toward the victim, manifested by outbursts of anger, jealousy and hatred
• verbally threaten the victim
• have a history of domestic abuse toward the victim
The underlying motivations appear to be insecurity, anger, vengeance, emotional arousal and projection of blame. It would seem that the extent of emotional attachment between the victim and the perpetrator may be crucial to understanding stalker conduct. The study concluded that the above factors are much more accurate predictors of violence than the presence of mental illness or a personality disorder, a prior criminal record, or a history of substance abuse.Footnote56,Footnote57
Knowledge and expertise in Canada surrounding risk assessment and management have been steadily increasing and are becoming more widely accessible. Risk assessment tools are carefully tailored to specific situations, so the best tool to use in determining how to best assess and manage risk when criminal harassment is involved is one designed for this purpose, as opposed to one created to predict the risk of re-assault of an intimate partner, for example.
For more information, see 2.10 Threat and Risk Assessments or consider contacting one of the specialized police units listed in Appendix A: Experts: Police Specialists for assistance in determining the type of stalker with which you are dealing and framing the appropriate response.
1.6 Using Technology to Criminally Harass (a.k.a. Cyberstalking, Online Criminal Harassment, and Cyberbullying)
Criminal harassment can be conducted through a computer system, including the Internet.Footnote58 The elements of the offence remain the same, it is just that technological tools are used to commit the offence. There is considerable debate in the legal and academic literature about how to best define cyberstalking, online harassment and cyberbullying, and the extent to which existing legislation provides adequate protection against these types of offences.Footnote59
1.6.1 Online Criminal Harassment, Cyberstalking and a Related Typology
The terms “cyberstalking” and “online harassment” are often used to refer to three types of activities: direct communication through e-mail or text messaging; Internet harassment, where the offender publishes offensive or threatening information about the victim on the Internet; and unauthorized use, control or sabotage of the victim’s computer.Footnote60 In some cyber-stalking situations, criminal harassment charges may be appropriate; however, depending on the activity involved, charges under the following sections of the Criminal Code should also be considered:
• 162 (voyeurism)
• 163.1 (distribution of child pornography)
• 172.1 (Internet luring)
• 241 (counselling suicide)
• 298-302 (defamation)
• 319(2) (wilful promotion of hatred)
• 346 (extortion)
• 342.1 (unauthorized use of a computer)
• 372(1) (conveying false messages)
• 423 (intimidation)
• 430(1.1) (mischief in relation to data)
• 402.2(1) (identify theft)
• 403(1) (identity fraud)
As new technologies have been increasing, the ways in which technology can be used to criminally harass, or facilitate the harassment, has been greatly expanding, and include the following:
• Sending harassing messages (sometimes forged in the victim’s name) through e-mail or text message to the victim or to the victim’s employers, co-workers, students, teachers, customers, friends or family.Footnote61
• Gathering or attempting to gather information about the victim, including private information relating to his or her home address, employment, financial situation and everyday activities, or using spyware to track website visits or record keystrokes the victim makes.
• Attempting to destroy the victim’s reputation by engaging in “cyber-smearing”, i.e., sending or posting false or embarrassing intimate information about or, supposedly, on behalf of the victim.Footnote62
• Tracking a victim’s location using GPS technology (on telephones, cameras and other devices).Footnote63
• Watching or listening to a victim through hidden cameras or listening or monitoring devices.Footnote64
• Sending viruses to the victim’s computer, such as software that automatically transmits messages over a period of time.
• Creating websites about the victim that contain threatening or harassing messages, or provocative or pornographic photographs.
• Encouraging others to harass the victim.Footnote65
• Constructing a new identity to entice the target to befriend the perpetrator.Footnote66
Online and offline criminal harassment are closely linked yet distinct types of behaviour, and online harassment often turns into offline harassment.Footnote67 The most alarming difference between the two is the ease with which the perpetrator is able to collect information about the target on the Internet, as well as access his or her private online accounts.Footnote68 Technology also enables stalkers to cause a great deal of distress without leaving their home, which emboldens those who would not engage in offline harassment to stalk online. Moreover, the ability of the perpetrator to hide behind the mask of anonymity or to take on a false identity can make it very difficult, if not impossible, to tell the perpetrator to stop the harassment.Footnote69
The 2010 Annual Report of Ontario’s Domestic Violence Death Review Committee (DVDRC) states that it has been finding increasing evidence that information and communication technologies are being used to harass, stalk and abuse domestic homicide victims, prior to their deaths.
The use of information and communication technologies continues to be a major theme of cases reviewed by the DVDRC. Some cases involved victims that met through online dating forums. The perpetrator in one case used the dating site to threaten and harass his victim(s). In other cases reviewed, perpetrators were known to tamper with the victim’s email, including the dissemination of slanderous messages to individuals on the victim’s address list and the distribution of threatening, abusive and/or excessive messages to the victim and others using email and text services. Other cases reviewed by the DVDRC identified perpetrators that downloaded tracking devices and/or “spyware” to monitor their victim’s activities. Additional cases reviewed by the DVDRC identified perpetrators who monitored their victim’s online journal and other social networking activities.Footnote70
In 2003, McFarlane and Bocij collected information from cyberstalking victims to determine whether cyberstalkers fit into the existing offline stalker typologies, or whether a specific typology for cyberstalking was warranted.Footnote71 They determined that it was useful to modify an existing typology, developed by Wright et al. in 1996, to better capture the true nature of cyberstalking. This typology divides cyberstalkers into 4 categories based on the nature of their relationship and their motivation for the online harassment: vindictive, composed, collective, and intimate. Vindictive cyberstalkers were the most ferocious in their pursuit of their targets. This harassment can be triggered by anything from a trivial debate to an active argument between the parties. These cyberstalkers use the widest range of technological methods to harass their victims, and tend to have a medium to high level of computer literacy. In Wright and Bocij’s research, one third of vindictive cyberstalkers had a prior criminal record, and two-thirds of them were known to have victimized others before. Composed cyberstalkers generally issue threats in an attempt to annoy and irritate the targets. These cyberstalkers do not tend to have criminal records and have a medium to high level of computer literacy. Intimate cyberstalkers use e-mail, discussion groups, and electronic dating sites to try to woo, or at least gain the attention of, their targets. They might be ex-partners or ex-acquaintances of the victims, or infatuates looking for intimate relationships. Intimate cyberstalkers tend to have the widest range of computer literacy, from fairly low to high. Lastly, collective cyberstalkers were two or more individuals pursuing corporate or non-corporate victims. Collective corporate cyberstalkers typically have taken offence for the business dealings of the corporation and are trying to discredit or silence the victim. Collective cyberstalkers of non-corporate targets typically attempt to punish a victim they believe has wronged them. Such groups may attempt to recruit others to join them in the harassment, by doing things such as giving the address of the victim to the recruits.Footnote72
For information about how Canadian courts have ruled on use of technology to perpetrate criminal harassment, see Part 3 The Law.
1.6.2 Online Bullying and Cyberbullying
Cyberbullying “involves the use of information and communications technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others.”Footnote73 Cyberbullying is becoming a growing concern in many parts of the world. The definitions of cyberbullying (online bullying) and online harassment overlap one another and some situations that are labelled cyberbullying may also be criminal harassment under section 264 of the Criminal Code. To date, the term cyberbullying is most frequently used to describe hostile use of technology amongst students. Students may perceive cyberbullying to be much more harmful than offline bullying. This is due to the fact that the Internet empowers the bully by broadcasting recorded abuse to a wide audience. Furthermore, once a harmful message exists in cyberspace, it exists in perpetuity. Bullying often begins on the Internet,Footnote74 as classmates who will not engage in bullying in the open are more likely to do so when invisibility and anonymity protect them from retaliation by their peers or disciplinary measures by teachers.Footnote75
Statistics Canada released in 2011 statistics on the prevalence of self-reported cyberbullying from the 2009 General Social Survey (GSS). The GSS definition of cyberbullying encompasses a wide range of online behaviour, so not all aspects of these activities would meet the definition of criminal harassment or other Criminal Code offences.Footnote76Nonetheless, this survey provides a useful picture of the prevalence of these types of incidents in Canada as victimization on the Internet is becoming more common. The survey found that 7% of Internet users aged 18 or older had been the victim of cyberbullying in their lifetime. The most common form of bullying involved threatening or aggressive e-mails or instant messages, reported by almost three-quarters (73%) of cyberbullying victims. The second most common form of bullying involved hateful comments, experienced by over half (55%) of victims. In addition, victims of a previous violent crime were more likely to report being the victim of cyberbullying than those who had not been violently victimized (20% versus 6%). In particular, victims of sexual assault or robbery and those who reported having been the victim of two or more violent incidents within the past 12 months were most likely to have been cyberbullied; about one-third of them self-reported having been cyberbullied.Footnote77
This survey also looked at child victims of cyberbullying by asking adult respondents whether any of the children (aged 8 to 17) living in their household had been the victim of cyberbullying or child luring. The results showed that slightly less than 1 in 10 (9%) adults living in a household that includes a child knew of a case of cyberbullying against at least one of the children in their household. The most common form of cyberbullying against children was threatening or aggressive e-mails or instant messages, reported by 74% of adults who knew of a case of cyberbullying against a child in their household. This was followed by hate comments sent by e-mail or instant messaging or posted on a website (72%), and use of the identity of the child to send threatening messages (16%).Footnote78
Disturbingly, there have been news accounts of cyberbullied teens in Canada ending their lives in suicide.Footnote79 One of the biggest distinguishing factors in determining whether malicious use of technology consists of criminal harassment in bullying-type cases will be whether the online conduct is merely annoying, or whether it causes the target to fear for his or her physical or psychological safety. In fact, recent research has shown that online harassment and bullying result in higher levels of trauma and stress for the victim than more traditional forms of stalking.Footnote80 The psychological symptoms these victims experience may be more intense “due to the 24/7 nature of online communication, inability to escape to a safe place, and global access of the information.”Footnote81 The sense of humiliation they experience is often increased due to the public nature of the bullying or harassment. This type of harm was recently recognized by the Supreme Court of Canada in the civil case of AB v Bragg Communications, 2012 SCC 46.Footnote82
Footnotes
Footnote 1
In 2005, the offence of voyeurism was also enacted to prohibit the secret viewing or recording of another person when there is a reasonable expectation of privacy in three specific situations and to prohibit the intentional distribution of voyeuristic material. This offence may also be applicable in some types of “stalking” cases.
Return to footnote1referrer
Footnote 2
See Part 3.2, “Criminal Code Provisions.”
Return to footnote2referrer
Footnote 3
Shelly Milligan, “Criminal Harassment in Canada, 2009” (2011) Juristat, Canadian Centre for Justice Statistics, catalogue no. 85-005-x.
Return to footnote3referrer
Footnote 4
Ibid.
Return to footnote4referrer
Footnote 5
UCR2 incident-based survey, Canadian Centre for Justice Statistics, May 2011 extraction.
Return to footnote5referrer
Footnote 6
Milligan, supra note 3 at 3–4.
Return to footnote6referrer
Footnote 7
Andrea Taylor-Butts, “Fact sheet—Police-reported spousal violence in Canada” in Family Violence in Canada: A Statistical Profile, 2009 (Ottawa: Statistics Canada, 2009, catalogue no. 85-224-X), online (accessed 13 April 2011) at 26. Note that at p. 59, this publication defines “common assault” as the type of assault falling under section 265 of the Criminal Code, as follows: “This includes the Criminal Code category assault (level 1). This is the least serious form of assault and includes pushing, slapping, punching, and face-to-face verbal threats.” This publication defines “major assault levels 2 and 3” as assault falling under sections 267 and 268, as follows: “This includes more serious forms of assault, i.e. assault with a weapon or causing bodily harm (level 2) and aggravated assault (level 3). Assault level 2 involves carrying, using or threatening to use a weapon against someone or causing bodily harm. Assault level 3 involves wounding, maiming, disfiguring or endangering the life of someone.”
Return to footnote7referrer
Footnote 8
This can likely be largely explained by the fact that current spouses are more likely to have the physical access to one another that is needed to commit assault, whereas ex-spouses wishing to harm the other may only be able to do so through criminal harassment.
Return to footnote8referrer
Footnote 9
Milligan, supra note 3 at 4.
Return to footnote9referrer
Footnote 10
Ibid.
Return to footnote10referrer
Footnote 11
Ibid.
Return to footnote11referrer
Footnote 12
Ibid.
Return to footnote12referrer
Footnote 13
Homicide Survey, Canadian Centre for Justice Statistics, May 2011 extraction.
Return to footnote13referrer
Footnote 14
This represents police services that serve 57% of the population of Canada.
Return to footnote14referrer
Footnote 15
UCR2 Trend Database, Canadian Centre for Justice Statistics, April 2011 extraction.
Return to footnote15referrer
Footnote 16
In the 2004 General Social Survey (GSS), 63% of those who reported being stalked did not report the stalking to police.
Return to footnote16referrer
Footnote 17
All of the facts in this section are gleaned from Kathy AuCoin’s representation of the 2004 GSS in “Stalking-criminal harassment” in Kathy AuCoin, ed., Family Violence in Canada: A Statistical Profile, 2005 (Ottawa: Statistics Canada, 2005, catalogue no. 85-224XIE), online (accessed 13 April 2011). The 2009 GSS on victimization did not include the questions on criminal harassment.
Return to footnote17referrer
Footnote 18
Ibid at 34.
Return to footnote18referrer
Footnote 19
Ibid at 36.
Return to footnote19referrer
Footnote 20
Ibid at 36.
Return to footnote20referrer
Footnote 21
Ibid at 36.
Return to footnote21referrer
Footnote 22
Ibid at 36.
Return to footnote22referrer
Footnote 23
Use with caution; the coefficient of variation is high.
Return to footnote23referrer
Footnote 24
AuCoin, supra note 17 at 39.
Return to footnote24referrer
Footnote 25
Ibid at 35.
Return to footnote25referrer
Footnote 26
Ibid at 35.
Return to footnote26referrer
Footnote 27
Intimate partner stalking includes victims stalked by a current or former spouse, boyfriend or girlfriend.
Return to footnote27referrer
Footnote 28
Aucoin, supra note 17 at 36.
Return to footnote28referrer
Footnote 29
Ibid at 38.
Return to footnote29referrer
Footnote 30
Ibid.
Return to footnote30referrer
Footnote 31
Ibid.
Return to footnote31referrer
Footnote 32
Ibid at 39.
Return to footnote32referrer
Footnote 33
Ibid at 40.
Return to footnote33referrer
Footnote 34
Ibid at 41.
Return to footnote34referrer
Footnote 35
Jill Arnott, Deb George & Stacey Burkhart, Bridging the Gap: Criminal Harassment Victimization and the Criminal Justice Response (Phase II) (Regina: Family Service Regina, 2008) at 28.
Return to footnote35referrer
Footnote 36
Bocij, Cyberstalking: Harassment in the Internet Age and How to Protect Your Family (Westport, Connecticut: Praeger Publishers, 2004) at 73–88.
Return to footnote36referrer
Footnote 37
Emma Short & Isabella McMurray, “Mobile Phone Harassment: An Exploration of Students’ Perceptions of Intrusive Texting Behaviour” (2009) 5:2 An Interdisciplinary Journal on Humans in ICT Environments 163 at 172.
Return to footnote37referrer
Footnote 38
P.R, Kropp, S.D. Hart & D.R. Lyon, Guidelines for Stalking Assessment and Management (SAM) (Vancouver: ProActive ReSolutions Inc., 2008).
Return to footnote38referrer
Footnote 39
See J. McFarlane et al., “Stalking and Intimate Partner Femicide” (November 1999) 3:4 Homicide Studies, which reported at 308 that “Seventy-six percent of femicide and 85% of attempted femicide respondents reported at least one episode of stalking within 12 months of the violent incident” whereas fewer femicide or attempted femicide victims had experienced physical assault in that time period (67% and 71%, respectively). See also Office of the Chief Coroner (2010) Annual Report of the Domestic Violence Death Review Committee, Toronto, ON., which describes harassing conduct on the part of the perpetrator, prior to the homicide, in many of the 18 cases reviewed.
Return to footnote39referrer
Footnote 40
The American Psychiatry Association’s Diagnostic and Statistical Manual of Mental Disorders (DSM-IV-TR) categorizes each psychiatric diagnosis it contains along five dimensions (axes). Axis 1 contains clinical disorders, including major mental disorders, learning disorders, and substance abuse disorders.
Return to footnote40referrer
Footnote 41
M.A. Zona, K.S. Sharma & J. Lane, “A Comparative Study of Erotomanic and Obsessional Subjects in a Forensic Sample” (July 1993) 38:4 Journal of Forensic Sciences 894–903.
Return to footnote41referrer
Footnote 42
K. Mohandie et al., “The RECON Typology of Stalking: Reliability and Validity Based Upon a Large Sample of North American Stalkers” (Jan. 2006) 51:1 Journal of Forensic Sciences 147–155.
Return to footnote42referrer
Footnote 43
Zona et al., supra note 41.
Return to footnote43referrer
Footnote 44
K. Mohandie, “Stalking behavior and crisis negotiation” (2004) 4 Int J. Police Crisis Negotiations, 23–44.
Return to footnote44referrer
Footnote 45
Mohandie et al., supra note 42 at 147–155.
Return to footnote45referrer
Footnote 46
Ibid at 147.
Return to footnote46referrer
Footnote 47
Ibid at 148.
Return to footnote47referrer
Footnote 48
Ibid at 153.
Return to footnote48referrer
Footnote 49
Ibid
Return to footnote49referrer
Footnote 50
Ibid
Return to footnote50referrer
Footnote 51
Ibid at 154.
Return to footnote51referrer
Footnote 52
Jennifer E. Storey, Stephen D. Hart, J. Reid Meloy & James A. Reavis, “Psychopathy and Stalking” (2009) 33 Law and Human Behavior at 237–246.
Return to footnote52referrer
Footnote 53
Ibid
Return to footnote53referrer
Footnote 54
P.I. Collins, “The Psychiatric Aspects of Stalking” in J. Cornish, K. Murray, & P.I. Collins, eds., The Criminal Lawyers’ Guide to the Law of Criminal Harassment and Stalking (Aurora, Ontario: Canada Law Book, 1999).
Return to footnote54referrer
Footnote 55
M.J. McCullough et al., “Sadistic Fantasy, Sadistic Behaviour and Offending” (July 1983) 143 British Journal of Psychiatry at 20–29.
Return to footnote55referrer
Footnote 56
Kimberley A. Morrison, “Differentiating Between Physically Violent and Nonviolent Stalkers: An Examination of Canadian Cases” (2008) 53 J Forensic Sci 742 at 747–748. The study was conducted using a sample of 103 perpetrators charged with criminal harassment from nine provinces (Ontario, British Columbia, Alberta, Saskatchewan, Newfoundland and Labrador, Manitoba, Prince Edward Island, Nova Scotia and Quebec). The nine predictor variables were degree of indications of likely obsession/fixation, degree of perceived negative affect/emotion in actions, explicit verbal threat/no threat status toward the victim, strength of emotional attachment, known substance abuse/dependency, presence of a personality disorder, presence of a major mental disorder, prior domestic violence and presence of a criminal record.
Return to footnote56referrer
Footnote 57
See also Barry Rosenfeld, “Violence Risk Factors in Stalking and Obsessional Harassment: A Review and Preliminary Meta-Analysis” (2004) 31 Criminal Justice and Behavior 9. The strongest correlates of violence were found to be prior intimate relationship, threats, substance abuse and absence of psychosis. Weaker correlates were prior criminal and violence history, and personality disorder diagnosis.
Return to footnote57referrer
Footnote 58
A useful definition of “cyber-crime” is used in a 2002 Statistics Canada publication: “a criminal offence involving a computer as the object of the crime, or the tool used to commit a material component of the offence.” See Melanie Kowalski, Cyber-Crime: Issues, Data Sources, and Feasibility of Collecting Police-Reported Statistics (Ottawa: Statistics Canada, 2002), online.
Return to footnote58referrer
Footnote 59
See Neal Geach & Nicola Haralambous, “Regulating Harassment: Is the law fit for the social networking age?”(2009) 73 Journal of Criminal Law 241–257; and Naomi Harlin Goodno, “Cyberstalking, a new crime: Evaluating the effectiveness of current state and federal laws” (2007) 72 Missouri Law Review 125–197.
Return to footnote59referrer
Footnote 60
Louise Ellison & Yaman Akdeniz, “Cyber-Stalking: The Regulation of Harassment on the Internet” (December 1998) Criminal Law Review at 29.
Return to footnote60referrer
Footnote 61
J.A. Hitchcock, “Cyberstalking and Law Enforcement” (2003) 70:12 Police Chief 16–27.
Return to footnote61referrer
Footnote 62
Paul E. Mullen, Michele Pathé & Rosemary Purcell, Stalkers and their victims, 2nd ed. (Cambridge, U.K.: Cambridge University Press, 2009) at 153.
Return to footnote62referrer
Footnote 63
Office of the Chief Coroner. (2010) Annual Report of the Domestic Violence Death Review Committee. Toronto, ON, at p. 35; and C. Southworth et al. (2005) A High-Tech Twist on Abuse: Technology, Intimate Partner Stalking, and Advocacy. Violence Against Women Online Resources, online (accessed 7 February 2012).
Return to footnote63referrer
Footnote 64
Ibid.
Return to footnote64referrer
Footnote 65
Mullen, Pathé & Purcell, supra note 62 at 154.
Return to footnote65referrer
Footnote 66
Ibid at 20.
Return to footnote66referrer
Footnote 67
Bocij, supra note 36 at 78.
Return to footnote67referrer
Footnote 68
Mullen, Pathé & Purcell, supra note 62 at 5, 12, 15.
Return to footnote68referrer
Footnote 69
Ibid at 11.
Return to footnote69referrer
Footnote 70
Office of the Chief Coroner. (2010) Annual Report of the Domestic Violence Death Review Committee. Toronto, ON, at p. 35.
Return to footnote70referrer
Footnote 71
Leroy McFarlane & Paul Bocij, “An Exploration of Predatory Behaviour in Cyberspace: Towards a Typology of Cyberstalkers” (2003) 1 First Monday 8 9., online (accessed 5 May 2012).
Return to footnote71referrer
Footnote 72
Ibid.
Return to footnote72referrer
Footnote 73
Bill Belsey, educator, quoted online: http://www.cyberbullying.ca (accessed 29 August 2011).
Return to footnote73referrer
Footnote 74
Jim Gibson, “The (Not-so) Brave New World of Bullies” Times Colonist (Victoria) (13 March 2010).
Return to footnote74referrer
Footnote 75
Shaheen Shariff & Leanne Johnny, “Cyber-Libel and Cyber-Bullying: Can Schools Protect Student Reputations and Free-Expression in Virtual Environments?” (2007) 16 Educ. & L.J. 307 at 3–5.
Return to footnote75referrer
Footnote 76
“Cyberbullying” was defined for the 2009 GSS as follows: “Ever previously received threatening or aggressive messages; been the target of hate comments spread through e-mails, instant messages or postings on Internet sites; or threatening e-mails sent using the victim’s identity.” Samuel Perreault, “Self-reported Internet victimization in Canada, 2009” (2011) Juristat, Canadian Centre for Justice Statistics, catalogue no. 85-005-x at 6, online
Return to footnote76referrer
Footnote 77
Ibid at 8.
Return to footnote77referrer
Footnote 78
Ibid at 10.
Return to footnote78referrer
Footnote 79
Examples include: Amanda Todd, a 15-year old girl from Port Coquitlam B.C., whose suicide in October of 2012 was attributed to cyberbullying through the social networking site Facebook; Jamie Hubley, a 15-year old boy from Ottawa, ON, who killed himself in October of 2011 after complaining about bullying at school and on the Internet; Jenna Bowers, a 15-year old girl from Truro, N.S., commit suicide in January of 2011 after being harassed at school and bullied through a social networking site. See also: Michael Gorman, “Task force to hear from grieving mom: Murchison lost daughter to bullying” The Chronicle Herald (Halifax) (14 July 2011); and Pamela Cowan, “Family attributes suicide to bullying” Leader Post (Regina) (15 April 2011).
Return to footnote79referrer
Footnote 80
PREVNet/SAMHSA Fact Sheets, “Physical Health Problems and Bullying” (accessed 7 May 2012); and see also Canada. Parliament. Senate. Standing Senate Committee on Human Right. Proceedings. (Issue No. 6, December 11, 2012).
Return to footnote80referrer
Footnote 81
Elizabeth Carll, quoted in American Psychological Association, News Release, “Dealing with the Cyberworld’s Dark Side” (6 August 2011), online (accessed 1 September 2011).
Return to footnote81referrer
Footnote 82
In this case the Court highlights the need to protect young victims from the inherent harms of cyberbullying as these cases are brought through the justice system. The case involved a 15 year old victim of Facebook cyberbullying who requested to proceed anonymously in her application for an order requiring disclosure of the perpetrators’ identities. In the judgement, Justice Abella references the 2012 Report of the Nova Scotia Task force on Bullying and Cyberbullying noting that the girl’s privacy interests are tied to the relentlessly intrusive humiliation of sexualized online bullying. The Court found that while evidence of a direct, harmful consequence to an individual applicant is relevant, courts may also conclude that there is objectively discernable harm. The ruling allowed the teenager to pursue the case using only her initials but did not impose a publication ban with respect to the non-identifying Facebook content. A.Wayne MacKay, Respectful and Responsible Relationships: There’s No App for That: The Report of the Nova Scotia Task Force on Bullying and Cyberbullying (Feb.2012), (accessed 12 October 2012).
Civilian Revitalization 11:53 6/20/2016
Could the people of the Frazer Valley move forward with bank financing loans per home and invest in manufacturing in Canada; and if this were the case would you need as many investor migration people to stimulate and invest inside of BC?
The other concern is if you extort me daily; according to cause and effect science; for every action there is an equal and opposite reaction; so if the information created by me inside of an intelligence sieve be leveraged to collect the extortion blow back from my work exploited by the people taking my data not paying me using this program to place me in a mental hospital when empty or a prison with fabricated crimes used to exploit the government.
Audio files can be hacked; so make sure China and India or any country people do not hack my computer. Because if you do the data can be exploited and some people may even use the grid on me to shape my choices and yours when hooked to my network; hack exploit in the files and people around you that you trust; for example too much negative quantum physics energy and me exploited financially to paint two years ago may have played a key role in the collapse of the oil markets triggering the demise of an Arab King who could not deal with the stress of negative energy and financial collapse of a Kingdom he spent his life on creating.
Mind you some countries made exorbitant wealth with the oil collapse and can use this to dry up money moving from Alberta to BC and civil service infrastructure in Britain pension funds by purchasing synthetics shorts on oil companies that profits taken on the collapse of oil markets could be used to do corporate takeovers of competing oil companies in amalgamations.
Compounded by shorting corporations stocks in weapons and jet sales if software and cost over runs exceeded market place expectations; and that money could be flipped into migration invasion exploitation programs in NATO regions or civilian revitalization build and develop programs in other countries benefit from a loss of currency repaired in 45 days and never hit again as oil markets remain volatile.
You know way too much; I had a secret you exploited; bad girl; I live the way you sexually arouse me digitally. Russia woman are powerful and hot.
FSB Kisses
Your finger print is extortion of the elderly shakedown pedophile; however in my case it was touch a child exploitation criminal if not mental hospital as I have been done mental hospital twice in my past. Today I am not a pedophile nor an enemy combatant; however your goal is child exploitation to create a second generation strike force self-cannibalize enslave a society; hence USA 200 rich elite families that can say vote this way and not have to lobby because exploitation is the expansion of CIA KNOCK FBI HOOVER and NSA enhancement self-perpetuated Patriot Act Six Pack policy.
Hence Bill C 51 passing when terrorism Canada was not an issue; Conservative Party leaving office to pass the football Liberal lower pension ages to 65 civilian revitalization legalize marijuana held in play RbbP / Hillbilly Angels / prostitution verse legalized prostitution versus civilian revitalization pensioner pedophile to equal money need to run the infrastructure while keeping the extortion and black market of marijuana and prostitution in the way they want grid compliant Pickton.
Connect the dots and why you must comply child pedophile extortion and why grid kids are in a separate program forced to comply grid and later narcotics Oxycontin synthetic heroin Adderal synthetic crystal meth and later pedophile army self-implosion shake down of a country military state.
Trying to enhance investor immigration India child bride accessibility. Competing setting a market up while empowering the financial infrastructure doing crime and extortion.
Trying to enhance investor immigration India child bride acceptability. Competing setting a market up while empowering the financial infrastructure doing crime and extortion.
Balance the books and constitution protecting liberty and freedoms while adhering to the law; same thing just want to collect the taxes and call it employment creation to balance GDP and empower the loony; tourism and investment in the region in manufacturing.
Grid Crimes Infrastructure Cost
Extortion pharmaceutics risperidal lithium etc. Schizophrenia and dementia shakedown elderly in grid and children in the bedrooms at night exploited video child porn online. Job creation for the department. Child threat non compliant Oxycontin Adderal prescription patent extorted pedophile forced to comply testimony to doctor treating the child.
Kids on narcotics make the best play pal grid kids that can be exploited in the community by the community forced to comply pedophile fed one or two to insure they stay vigilant when the grid leaves the region doubling as a homeland defense program to help exploit new people moving to the region and existing shakedown of people living in the region.
Caital costs of pharmaceuticals and lost employment through a mismanaged infastructure will cut healthcare costs and transfer more money to existing work standards and patient quality care in food and maintainance of the buildings and equipment required to compete international private healthcare.
Pedophile creation exploitation employment in region moving a family child army around the region; along with work crews to limit jobs in the community in construction and food services or home care and maids applies the leverage to make people more compliant to extortion; USA and anyone who wants to set up pedophile extortion in security grid traveling from region to region.
This is what you are going to do to Europe.

Extortion in the security grid is psychological warfare; see examples below.

Walking Behind Schizophrenic Eyes Two

By
Perry Ritthaler

Copyright 2012 Perry Ritthaler,

Home


All rights reserved.
Published in e-book format by ebookit.com
http://www.ebookit.com
ISBN

No part of this book may be reproduced in any form or by any electronic or mechanical means including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a review.
Dedication
To my mom and dad;
Thank you for your love and support.
I love you, I love you, and my mental health recovery would not have been possible without your guidance and support.

Author

Acknowledgment
I would like to thank the RCMP and nursing staff and doctors at the Hospital Maple Ridge, British Columbia Canada for treating me with dignity and respect.
Preface
I only wish my family could have read this e-book when I had schizophrenic symptoms we all did not understand. I originally started writing my e-book series to understand schizophrenia and to improve my mental health.
My goal is to keep my mind active and create mental habits that will guide me through the murky environment of insanity.
When I was first diagnosed with schizophrenia I searched for reading material that I could understand, however most of the information and research I gathered was beyond my comprehension.
I felt lost with the belief that no person could explain what schizophrenia is deep inside of the patients mind or how my life could unravel inside my brain right before my eyes.
Living as a mental patient, I wanted to find answers and understandings of what is happening to my brain and share my research with interested readers like you. As I pioneered through my mind for answers to share with myself through reflection, I will try to share my thoughts on paper. I kept track of most of my changing mental habits patterns written in this e-book.
Unfortunately for Perry in part two of this e-book series he still fights his schizophrenia condition. His desire for vengeance against the government has taken hold in his mind. The battle takes the shape of working for the government as a covert freedom fighter during the wars in Afghanistan and Iraq.
The plot thickens when Perry returns to the battlefield arena and starts empowering the Bush Administration by emailing the government more security and economic empowerment ideas.
As schizophrenia wraps around my brain; read my documented description of the voices speaking in my head. This paper trail will help the explanation for reasons why my mental habits and thought patterns changed and with this change in the formulation of ideas so did my behavior. Understanding some of the habits patterns associated in a documented case study of a person suffering from schizophrenia, may give the family members insight to the mental illness.
This information may also provide a clear glimpse into conversations Perry documented when he was suffering from schizophrenia. Perry is convinced again this is a government spy program that has invaded his privacy. He becomes determined to battle the voices in his head that have been sent by the government to drive him over the edge of insanity. He believes he can sue the voices in his head for the mental invasion of privacy and damages created within his brain.
The first book deals with the first two years. In book two you will witness more security work as Perry goes to war in Iraq online and later fighting the creation of terrorism in future e-books listed at the end of this e-book.
All of the events in this story are true and based on experienced events that happened.
Contents
DEDICATION
ACKNOWLEDGMENT
PREFACE
CHAPTER 1
How Can I Be Crazy
Chapter 2
Insanity Art Creates Canvas or Painter
CHAPTER 3
Liberty
CHAPTER 4
Freedom
CHAPTER 5
Dignity
CHAPTER 6
Valor
CHAPTER 7
Harmony
CHAPTER 8
Peace Empowerment
CHAPTER 9
Mutual Victory
CHAPTER 10
Psychology Research Article

Chapter One
How Can I Be Crazy

Fluffy clouds colored the sky black and blue. The smell of fresh rain filled the air as I think of you. I am forty eight years old with grey and brown hair and stand five foot eight and weigh 182 pounds. My eyes are blue and I have not been to the gym for a while; the belly I have is growing larger every day. My life is interesting to write about because during my seven years fighting Schizophrenia I have been hospitalized twice for the mental illness Schizophrenia.
Some people wonder what this mental disorder is or if they may have Schizophrenia. Many people suffering from mental illness have several underlying conditions that fuel Schizophrenia. Cloudy days may fuel depression while you cope with your brain falling to pieces. A voice appears in your mind one day and you slowly become vulnerable to yourself. At first the voice is a friend and will gain your trust by lying to you with the goal of taking over your decisions and ideas. Imagine you have two brains fighting and you’re in a battle with yourself to control the actions of your body shaped by the decisions you create in your mind.
Many clues mean many hard lessons avoided and why this book will help those affiliated with Schizophrenia. This is a book written from the back side of mental illness as opposed to the doctor’s books. What you learn from a patient may surprise you and keep you healthy.

When I became ill I was stoned every day morning till night on marijuana, and I did not believe I was ill. The treatment given to me in the mental hospital did not mean anything to me; in fact I was so under educated on the mental illness I remained lost and confused most days.
I refused to take my medication and did everything I could to have the medication reduced or eliminated. This clue is important because if you do not believe your sick you will think the treatment is hurting you as opposed to helping you.
This issue is complicated by the voices you hear inside your brain twenty four hours per day. The voice is you and a part of you that has separated from you. This clue is important because if you fight the voice you fuel Schizophrenia as you battle yourself deep in your mind. If the voice wins the confrontation you no longer control yourself like you did years ago. If you win through cooperation communicating with the voices you are in control similar to years ago.
This voice in my opinion is your brain fighting to help yourself, like a gut feeling that learned to speak. Making friends with the voice is critical and as you team up to make decisions; the voice will speak less if you stop using marijuana.
Medication is used to fix this glitch in the brain and again you may fight this solution. This clue is hard to see because over time you learn to love the voice and will miss the voice when left alone in isolation.
When you stop using marijuana most likely your voice friend is no longer allowed to speak and you slowly step back waiting to hear the voice again.
I experienced multiple voices shifting me toward a multiple personality disorder.
When you’re left alone your mind works different than when you’re always around supportive people. In fact the habit of the voice is your company companion when left alone; depending on how long you were left untreated making a habit of listening to the voices in your head.
If you love yourself you love your voices; after time when treated will miss the company of the communication. If you fight the voices and learn to hate them you will lose because you end up hating and fighting with yourself.
The habit of always speaking to someone interesting can form a bond with the voice or voices in your mind. This clue is to stay busy and around people when possible or you end up alone and through a lonely boredom you may smoke marijuana to strengthen the communication with the voice. Remember marijuana may make you feel happy however marijuana is a poison you add to the brain.
If you were a loner or career driven with few friends before Schizophrenia you will find it difficult to find people to be around, and this is scary to one left alone with a failed career and Schizophrenia. Eventually you may become afraid to be left alone with the mind that tears you apart.
Confusion creating chaos or depression through ideas and decisions; naturally confused can drive a person into a mental state of mania from possible bipolar tendencies. This clue is medication plus nutrition and a filter of questions you ask yourself before you decide a situation outcome or push the creation of a fresh idea. I did research on decision skills and built an e-book named “Discover How To Control Ideas, Decisions And Affirmations” with the questions and affirmations I needed to learn again, when my mixed up mind failed to find the correct answers in auto pilot states of mind.

I needed to brain wash my brain into making better ideas and decisions so I researched the experts in the fields of decision making or idea generation and I created an easy to use picture e-book in order to teach my brain how to protect its self.
The brain is capable of going forward or backward depending upon your habits. Habits like speaking to you or thinking out loud confuse the mind. Isolation fuels this process and can leave you spending many hours communicating with yourself, when left alone.
Mental growth is forward or backward depending upon how busy your life. This clue is important because if you’re not careful eventually your brain may answer the constant questions you ask when you spend time alone; thinking out loud and eventually talking to yourself.
Schizophrenia conditions in the brain can be created or turned around healthy depending upon medication, nutrition, counseling and education. However when your brain gets sick you may not see how to become healthy.
Imagine your brain is like quicksand and the more you act alone the further you sink. This clue is eating your medication and a stay in hospital for at least thirty days observation. During the thirty days what were real life habit patterns now becomes guided reality with new habits patterns.
However if you do not think your sick the treatment is pointless because to treat Schizophrenia it involves a life time of medication treatment, vitamin supplements and counseling.
Tough cases involve injection of medication once per month and if not taken after you’re released from hospital the police pick you up and your back into the hospital for your monthly injection. I am a hard case and was given injections monthly.
When you’re locked up in a hospital you have no choice refusal of medication. One thing about hospitals is an endless supply of doctors who agree you’re sick and legally have the right to inject you if they believe you are a danger to yourself or others around you.
I am a tough case and have learned the hard way the doctor was right. I believed I was being contacted by government to do Central Intelligence Agency contract work. How else could the communication happen to me? In fact I believed new security grid computer software had been developed that could communicate with me or watch me on satellite in the sky.
At the same time the voices had been watching my political activist work and learned what was important to me and how my networking online worked. So of course the voice new what to say and when to play me; originally I would fight with the voices and wish for my old privacy. Fortunately I went to my computer and created a paper trail in a report on the battle with my voices. During this time I believed the voices were real people speaking to me and not just voices created by my mind.
The voices in your brain have an archive on all of the illegal or embarrassing activities you have done in the past and may use this to extort favors (shape your decisions and behavior) for confidentiality. This report is difficult to write and some background on the writer is needed. In the report are an example of a heated argument with me and an example of a sick person fighting to survive.
I am afraid and alone fighting to protect my family while I fight the world on computer from my bedroom. I do not believe I am sick and think I have been invaded by the USA government. This snap shot of my mental illness is hard to write however I will try to tell my story
I am under attack in my own country; the enemy is wielding illegal activities in my house.
I believe the voices have seamlessly attacked me and my 74 year old mother, or my 74 year old father, or my cat and my sister. Criminals I think have hacked into my computer stealing my computer science work and e-book information programs. Illegally digitally wielding covert electronic terrorism designed to torture woman or children or the men they contact through this verbal digital security network.
The negative attitude enemy just started one day in my brain from no place, invisible to the eye, placed in my brain and home and community and country, designed to attack (the voice) my democracy and civil rights and freedoms as a Canadian citizen.
These are digital signals built into a psychology attack program in my brain. I believe the seamless spy programs are built by other western empire countries designed to weaken our Canadian foundation of intelligence, liberties.
Actually verbally training a person psychologically how to destroy themselves through an innocent game of pain and sex complicated with lies and then oppression.
Human beings harvested through a policy and procedure in the security grid under review in this actual example of the system auditing me and my work (the voice) and then I am fighting back.
I am fighting the voices, making me do over in my mind the crimes of past violent activities I experienced, while the security grid voices triggers me to tell them of my crimes in the past.
Security grid verbal oppression built inside of a dysfunctional negative psychology program and delivered through television or computer or radio or by satellites floating over our country or located in networks wielding satellite dish television networks.
The person believes this is a classified security network while the whole time it is his voices in his mind leading him astray.
In my personal opinion the people involved are using an illegal search and seizure security system to improve evidence gathered for a trial against me.
The security system is borderline illegal and sends the citizen literally out there minds over 30 days, creating many psychology issues that may need professional care through a counselor or psychologist. Citizens wielding this military designed covert security system are susceptible to many types of psychology disorders themselves. As a result of being over exposed to the negative verbal communication daily in a career guilty by association.
The voice played a CIA game called idea decision reverse and all ideas are fed to the writer backwards making the voice established and a way to grow in the mind. The writer’s voices are as smart as the writer and convince him this is a real security company tracking him. The writers though pattern ideas are reversed by the voice in his head naturally building conflict in the writers mind.
Unfortunately this digital security seamless system cracks the positive attitude and confidence of the people hit by the security system and starts making the agencies and police or politicians comply with the illegal covert takeover of Canada.
The writer’s voices are implanting negative corruption planning and ideas and emotions like hatred or anger or frustration or revenge or emotional insecurity within the people affected by the digital verbal signals.
I have been pushed to turn into a predator or an aggressive person or sad person with no courage redone mentally and emotionally somehow by the illegal digital and electrical signals flowing into my home and country.
Creating behavior patterns unhealthy for my body and mind and if continued for 21 days will actually create habit patterns in actions that make me a mentally ill criminal rather than a good ethical citizen. Left untreated I will go insane.
This feels like a 20th century covert illegal takeover of my brain and a country or police force wielding invisible war crimes punishable in world courts. Politicians working against the country rather than designed to protect the country legally empowered. That is what my audit is checking for as the information is relayed to me personally, while under investigation for terrorism, while working covertly online for the Prime Minister of Canada and President of the USA.
This voice I hear is a form of digital terrorism in my personal opinion and I have never even seen or even heard of such a security system.
A computer driven auto pilot program that creates a patsy and a seamless illegal action designed to take over a country.
(Shake people down on old crimes never processed that are illegal search and seizure from memories and then held over the head for payoffs of one kind or in security favors)
The voice is loud in the writers mind and he knows the flash back of the crime making the person speak of the crime creates evidence; then you are trapped by the voices in your mind in your old crime. Interrogation by the voices may produce confrontation building a war against yourself deep inside of your mind.
Some countries are not ethical when they employ other security companies to do the illegal dirty work that creates seamless 20th century war covert.
War creating terrorism at no capital costs taking over another country by using a security policy procedure influence after and before the 911 tragedy happened in the USA.
My fear is this digital security grid can be a covert dangerous tool shaping a country leaders thought patterns gently into negative vocabulary and actions to oppress them covertly and illegally while visiting the country or flying in there air space.
At this point lost in his mind Perry believes the voice is a covert security network capable of entering any mind at any time.
Encounter after encounter shaping the personality and behavior negative and illegal in that person, so called protected by the security teams operations to protect that leader.
The writer has no clue to the fact he is sick and now believes the voice to be a person or persons he is at odds with or just taking orders to work covertly for the government.
Examples of the torture created by the illegal operations that entered my home are a borderline criminal activity on the nation exposing them to the world criminally. If this negative voice behavior pattern nationwide continues a country depression may occur to create a cheaper financial takeover of the countries resources.
For those whom challenge these criminal activities the government system wields crushing dysfunctional behavior creating even more negative verbal dysfunctional behavior. As people fight back the government systems voice tries to crush your positive attitude, ego and personality through a criminal oppression crushing the 1st amendment rights of all involved.
The Canadian citizen being farmed as a financial shake down patsy is in deep trouble fighting the government alone, while the select few at the top fill their pockets with money stocks or toys or promotions rather than empowering the citizens civil rights and liberties and freedoms.
I challenge this regime of criminals in the security grid operations to working in positive peace empowerment, integration, graduation or accumulation philosophy formulas that naturally build fountains of positive health.
The voices increased communication by doing the opposite of what I decided. For example if I was positive the voices were negative and if I became negative the voices became positive.
I create ideas to empower the country safely supporting my democracy. I live in today and for this I was tortured in my own home illegally.
Examples of this government torture camp are written in this e-book and are listed below date and time in most cases.
The stupidity of the people implementing this advanced voice security technology without psychology degree in hand is mind boggling.
The writer has no psychology degree so the voice has no psychology degree. In fact if the write states the sky is blue the voice argues stating the sky is grey. Constantly the voice argues or is friendly. This builds a friendship of love and hate relationship with the voices. The voice will act like another person and you eventually will treat the voice as another person.
This type of torture brutality in the personal home under attack by this security grid is mind bending because the people involved can increase the electricity in your home sending an ear piercing electronic signal through the wall plugs or lights.
The writer used electrical tape on the face of the plug to stop the signal.
While I write my experience I am under attack through this emotional torture in my home, I realize our country is in trouble in developing an empowered human resource because the voice policy is a Neo Conservative negative psychology domination program.
So many dangerous violations of human rights applied to enforce the security grid concepts within the regions being checked by my criminal activity audit report.
If you’re a pensioner or woman or child looking for independence or freedom you are sadly out of luck, especially if your parents were in trouble with the law years ago. Caught in a crime or any type of criminal activities not convicted of yet pulled from your past in your brain. This happens leaving you prey to the digital security grid financial shakedowns to keep your information private.
My research living with two pensioner citizens was eye opening. I discovered if the dryer or furnace or stove is used while the security grid electricity is overload; to make you feel vulnerable; the 220 electricity entering the home is elevated in the home environment making the person feel naturally sick.
People unaware they are being attacked are now more compliant to the security take down oppression tactics applied to citizens inside their mind. Are you listening to a gut a feeling or a thought program created to manipulate your brain functions?
Work for free if they can shake you down and also lose what you own to keep the system quiet about your potential criminal past, discovered during illegal search and seizure of information gathered by the security grid system voice.
I work like a bait car trapping dirty police or security agencies or people using a real time paper trail for the crown attorney or district attorney or internal affairs.
People whom break the law wielding this technology illegally in my brain, crushing the potentials of the Western Empire will be charged and convicted if found guilty.
The voices play to survive and during this battle insanity looms in the distance.
Technically I am not employed by internal affairs or the crown or district attorney and yet this paper trail is evidence when this book is sent globally online peer to peer.

Chapter 2
Insanity Art Creates Canvas or Painter

21st Century Security Manufacturing

Satan or Faith

Security Grid Information Analysis Report

What happens when you challenge the ability of political leaders in your government?
The invasion of privacy limiting and the reshaping of democracy rights and freedoms displayed through this seamless audit on the security grid analyzing illegal/legal tactics using the security grid digital systems to help control the actions of one civilian.
This is my story on the seamless audit I created when the Security Grid randomly entered my home turning my life upside down. These documented events portrayed in this e-book are some of the events I experienced. Some of the events are true and some of the events may be imagined under extreme duress and stress.
In the 20th century law enforcement programs and techniques working in advanced technology implementing covert security psychology, quantum energy, psycho cybernetics and neuro linguistic programming are described within this document.

Did You See “Brain Invaders”?
Did you see the latest episode of Jesse Ventura’s Conspiracy Theory?
Jesse Ventura is closing in on the brain invaders, a sinister group that’s targeting innocent American citizens by zapping them with painful radiation and harassing them with voices in their heads.
“Brain Invaders” aired last night on truTV, and in case you missed it you can always watch it on YouTube.
http://www.youtube.com/watch?feature=player_embedded&v=18PtOXrzDVE
Conspiracy Theory – Season 3, Episode 6: “Brain Invaders”

Dec. 17 2012 at 11 pm ET on truTV!

Could the so-called crazies in the tin-foil hats be on to something? Targeted individuals, or TIs, claim that the government is harassing – even torturing – them by sending microwave signals into their brains and bodies to drive them to despair. It’s not an isolated case, but thousands of people across the country report experiencing the exact same symptoms, all of which began after speaking out against the powers that be. Jesse knows that they aren’t nuts – but could it too late to stop these “voice of God” weapons from turning the population into mindless zombies?

From: Perry Ritthaler [mailto:perry@digitalmindcoach.net]
Sent: Monday, December 24, 2012 12:37 PM
To: ‘JesseVentura.net’
Subject: RE: A sinister group targeting innocent American citizens…

Dear Jesse Ventura

After being targeted through the program; I am not sure you appreciate the brain farm ideas.
Think of an army of covert people controlled over a year or ten years with this government private sector technology designed to create terrorism or clean up loose ends in the field by turning a C.I.A. knock spy insane.
Imagine how you could control the person in a way to go and do a criminal act of terrorism, or a massacre in a school in order to create tighter police state idealism and corporate profits in weapons sales.
Look at the latest massacre in the school and how the government created the spike in weapons sales by mumbling about law changes to automatic weapons; that never come.
With this program is the government reliant on religious extremism in order to create terrorism attacks on their country that create stock market collapse or huge corporate profits in weapon sales and oil price hikes.
Remember; you if anyone know running government involves creating huge profits for corporations driving employment numbers.

Building the Family Values The Foundation of a Nation

The information files I created to challenge the government found in part within the material in this report is available in hard copy online or in the hands of the finest security and military people on the planet.
This article below is an example of the environment around such work.

The proposition on offer is that contrary to a popular argument against the invasion of Iraq, at the time of the 2003 invasion under the Bush administration, Iraq was known to have (or have had previously) possession of weapons of mass destruction.

There are four types of weapons of mass destruction (WMD):

1) Nuclear (atom, hydrogen bombs)
2) Radio-logical (dirty bombs)
3) Chemical (Serine, Ricin, etc…)
4) Biological (Disease-based)

Any of these four qualifies as a weapon of mass destruction.

In the Iran-Iraq war from 1980-1988, Iraq used chemical weapons, most notably in an incident in March, 1988 called the Halabja Poison Gas Attack (http://en.wikipedia.org…). This attack included the following agents:

– Mustard Gas (CWC regulated in 1993 – Schedule 1, Part B)
– Sarin (WMD per UN Resolution 687 – CWC regulated in 1993)
– Soman (WMD per UN Resolution 687 – CWC regulated in 1993
– Tabun (WMD per UN Resolution 687 – CWC regulated in 1993
– VX (WMD per UN Resolution 687 – CWC regulated in 1993)

Mustard gas is not categorically a WMD; however, the use of mustard gas as per Schedule 1, Part B of the CWC regulations classifies it as having only a use in chemical warfare. Stockpiles of mustard gas over 100g are required to be registered, and countries are prohibited from stockpiling more than 1 ton of the material.

The rest of the agents on this list are classified as weapons of mass destruction.

To head off a possible line of argument concerning the notion that the attacks in 1988 were not using WMD’s because the agents had not been classified as such until 1993, the UN created the WMD classification in 1948, three years after the first atom bomb was dropped. This in no way indicates that the atom bomb was not a WMD at the time of its use. Likewise, the specific classification of an agent as a WMD after its use does not change the fact that the agent itself was a WMD.

The notion that Iraq did not have weapons of mass destruction is simply false. Iraq may not have had NUCLEAR weapons of mass destruction, but it is certain that at one point in time, Iraq did indeed have possession of WMDs.

There are claims that the Iraq Survey Group did not find any WMDs in its search.

However (http://en.wikipedia.org…):

“On May 2, 2004 a shell containing mustard gas, was found in the middle of street west of Baghdad. The Iraq Survey Group investigation reported that it had been previously “stored improperly”, and thus the gas was “ineffective” as a useful chemical agent”

This is basically the same as finding an inoperative nuclear warhead. Simply because the WMD does not work does not indicate it is not a WMD or that the intention in possession was not to possess a WMD.

“On May 16, 2004 a 152 mm artillery shell was used as an improvised bomb. The shell exploded and two U.S. soldiers were treated for minor exposure to a nerve agent (nausea and dilated pupils). On May 18 it was reported by U.S. Department of Defense intelligence officials that tests showed the two-chambered shell contained the chemical agent serine…”

Serine, as stated above, is classified as a WMD.

“In June 2004, the United States removed 2 tons of low-enriched uranium from Iraq, sufficient raw material for a single nuclear weapon.”

Iraq demonstrably had the technology at the time to produce a nuclear weapon within roughly a month’s time if given fissile materials. This is akin to having all the parts to a WMD lying around, but not assembled. A gun is still a weapon if disassembled and laid on a table – it’s just not ready to use.

*************************************

The conclusion of the ISG was basically thus:

At the time of our inspection, we didn’t find any WMDs. However, this is not conclusive as to whether or not they exist.

I submit that the fact that Iraq was previously known to have massive stockpiles of chemical WMDs, plans to build a nuclear weapon, and various developmental labs and programs suggests that at the time of the 2003 invasion, there were existing WMD’s and the materials to build them.

Consider that Saddam Hussein and members of his administration professed that they would keep whatever weapons they needed to defend their “Arab nation.” Furthermore, none of them suggested that Hussein had given up his WMD programs.

The totality of this evidence suggests that there were more WMDs in Iraq during the 2003 invasion than the serine, mustard gas, and uranium discovered in 2004. It is highly likely that Iraq had a supply (even if limited) of WMD’s at the time of the invasion.

AFFIRMED
Report this Argument

Con
I am happy to debate you on this topic.

I agree to your classifications of WMDs: nuclear, radio-logical, chemical, and/or biological. Any one of these constitutes a WMD, although for my purposes I will group nuclear and radio-logical together, because essentially they’re the same. I will even concede that Iraq had used chemical weapons during the 1980-1988 war with Iran. And we won’t even discuss that the U.S. supplied Iraq with those chemical weapons to ensure Saddam’s victory.

I take issue with the logic (and especially the broadness) presented in your challenge. It is invalid to debate whether or not “Iraq was known to have (or have had previously) possession of weapons of mass destruction.” Previous possession of WMDs is irrelevant with regard to the 2003 decision to invade Iraq, and I will gladly and easily demonstrate that at the time of that invasion, Iraq did not possess WMDs.

After the Iran-Iraq war, in August of 1990, Saddam Hussein’s Iraqi army invaded Kuwait. During that short 6 month war, the U.N. authorized military action against Iraq and the U.S. supported Kuwait in its Operation Desert Shield / Storm (there were two individual and separate elements of America’s support). During the military operation, the U.S. had used depleted uranium shells (munitions which could arguably be considered WMDs); however, the Department of Defense and the CIA have stated that Iraq did not use chemical or biological weapons during the First Gulf War. On May 25, 1994, Defense Secretary William J. Perry and General John M. Shalikashvili, Chairman of the Joint Chiefs of Staff, in a letter to veterans of the Gulf War, stated, “There is no evidence, classified or unclassified, that indicates that chemical or biological weapons were used in the Persian Gulf.”(1) Additionally, in an article dated January 5, 1995, David Brown at the Washington Post reported on the National Academy of Sciences’ Institute of Medicine’s finding that “there is no evidence that chemical or biological weapons were used in the Persian Gulf War, and that rumors they were should be put to rest.”(2)

This begs the question, if Iraq had WMDs, why were they not used during the ground invasion of Iraq?

A more complicated issue is cutting through the rhetoric used leading up to the 2003 invasion of Iraq. It’s been reported numerous times that George W. Bush wished to use the attacks of 9/11 as a justification to invade Iraq and that he also selectively used reports and evidence to justify his invasion, cherry picking “evidence” to prove that Saddam possessed WMDs. All of that has been debunked, most concisely in a report written by Charles Duelfer of the Iraq Study Group released in October of 2004 (3).

The report reads, “Saddam Husayn ended the nuclear program in 1991 following the Gulf war. ISG found no evidence to suggest concerted efforts to restart the program. Although Saddam clearly assigned a high value to the nuclear progress and talent had been developed up to the 1991 war, the program ended and the intellectual capital decayed in the succeeding years.” While Saddam Hussein wanted nuclear weapons, as do most dictators, a desire to possess does not equate to possession. Moreover, your claim that Iraq had the “technology at the time to produce a nuclear weapon” because of the removal of two tons of low-enriched uranium is false. First of all the majority of the uranium removed from Iraq was unprocessed ore, radioactive yea, but completely benign with regard to weaponize. The mere possession of low-grade uranium is equally as useless because it needs to be processed. Iraq had no centrifuges for uranium processing; therefore the raw material was useless for a nuclear weapon. Equally, even if the desire existed to convert the raw material into a dirty bomb, it would have been ineffective. In order for the uranium to be dangerous, it would need to be processed to isotope U235, then burnt using something like magnesium to create an inhabitable powder. However, due to the weight of uranium (heavier than lead), dispersal is difficult. Low-grade uranium is completely useless in terms of weaponize.

As for chemical weapons, the Deulfer report reads, “While a small number of old, abandoned chemical munitions have been discovered, ISG judges that Iraq unilaterally destroyed its undeclared chemical weapons stockpile in 1991. There are no credible indications that Baghdad resumed production of chemical munitions thereafter, a policy ISG attributes to Baghdad’s desire to see sanctions lifted, or rendered ineffectual, or its fear of force against it should WMD be discovered.” The sanctions imposed on Iraq after they invaded Iran crippled their chemical weapons program. And to respond to your claim that a mustard gas casing was found and those two soldiers were tested for minor exposure to a nerve agent in Iraq in 2004, who cares? Mustard gas and serine gas have short shelf lives, like other forms of chemical weapons, of about 5 years. While an older weapon might make you sick (sort of like old milk), the chemical toxins that make chemical weapons effective on a battlefield expire. And once they expire, they can’t be considered chemical weapons anymore because their effects are no longer the same.

As for biological weapons, the Deulfer report reads, “With the economy at rock bottom in late 1995, ISG judges that Baghdad abandoned its existing BW program in the belief that it constituted a potential embarrassment, whose discovery would undercut Baghdad’s ability to reach its overarching goal of obtaining relief from UN sanctions. In practical terms, with the destruction of the Al Hakam facility, Iraq abandoned its ambition to obtain advanced BW weapons quickly. ISG found no direct evidence that Iraq, after 1996, had plans for a new BW program or was conducting BW-specific work for military purposes.” No further discussion is needed on this topic.

And lastly, after almost 6 full years of occupying Iraq, why were no WMDs found; because Iraq didn’t have any WMDs located inside the country.
To understand more about the state of the war in Iraq preview this information below.

From: Perry Ritthaler [mailto:perry@digitalmindcoach.net]
Sent: Tuesday, December 25, 2012 9:24 AM
To: Prime Minister/Premier ministre (pm@pm.gc.ca)
Cc: president@whitehouse.gov
Subject: FW: The killer is killed from within the body

Dear Mr. Prime Minister Steven Harper

I watching the science accomplishments of this year wind down on television; and what comes to mind are science research aspects of the earth and universe interconnections in quantum energy sciences.
For example do you think there is any truth in the connection of time line for the Syrian conflict that has taken place; connected to the USA stance on the covert invasion tactics (without placing a military boot on the ground) of the region designed to control the oil industry in the Middle East; in other words seamlessly orchestrating the Syrian war and then the Iran war in a larger collective war operation from a distance.
As the takeover of the Middle East oil industry region “with military bases” evolves and global warming continues with oil creation and consumption fueled by human growth growing population evolution; can you connect the scientific dots; the ability to create jobs growth at the expense of insurance corporations in a situation like hurricane Sandy?
Very few people died in hurricane Sandy; in fact if you add up the body bags on operations this year in the entire Middle East covert invasion are the numbers close in hurricanes and tornado that hit the USA this year.
Compare these numbers to previous military operations occurring in the Middle East during the hurricane Katrina and tornado that combined to create human death and destruction in the USA.
So in this science theory by extending the Iran and Syrian conflict with the USA involved on the quantum energy focal point is it possible to create more employment numbers to empower the politician and reproduce again the 58 billion dollar devastation like hurricane Sandy?
In other words from a science economics perspective do the global corporations that own the invasion operations created by the USA windfall in the oil industry implementing military oil cartel operations; also own the insurance companies 58 billion dollar expense created by hurricane Sandy; verses the corporation profit margins created doing the covert oil industry invasion. In the bigger picture is hurricane Sandy just a tax shelter on the covert invasion also designed to grow jobs numbers.
Of course the taxpayer in the USA pays for the military and the additional insurance cost premiums.
Now that’s making money!

From: Perry Ritthaler [mailto:perry@digitalmindcoach.net]
Sent: Monday, December 24, 2012 10:47 AM
To: Prime Minister/Premier ministre (pm@pm.gc.ca)
Cc: president@whitehouse.gov
Subject: FW: The killer is killed from within the body

Dear Mr. Prime Minister Steven Harper

Below is a video link to research that displays certain patterns of events in history that may help your team distinguish the right choices in the direction of the Tar Sands or entering the war in Syria.
http://www.youtube.com/watch?v=QJFOm5wOv1E
The Oil Factor Behind the War on Terror

People wonder why I work the way I do; the easiest way is to explain the advanced education I wield programming or repairing the mistakes found within the political policy moves created in society.
The pictures below are examples of work I sent to the USA military to help balance the benefits of democracy in minds of Iraq people wondering if democracy was still a good idea after the invasion. The objective of the operation was to create images that would encourage the Iraq to embrace democracy inside of Iraq.

From military to police or political leaders and country policy empowerment the programs have been seamlessly operational for a decade deep inside of the undercurrent of global economic and security operations flowing in and out of society safely and legally.
I gather my information and document the operations I launch to further my writing career. As I work as a volunteer/contractor security planner and an e-commerce person; self-educating myself in leading edge anti-terrorism science; the work created naturally serves to empower law enforcement and political strategist and operations. The research serves to pioneer into new techniques in law enforcement or global security or expanding economic foreign affairs opportunities for the leaders of the world today.

My work at the time in computer technology and expanding strategy found within advanced fields of psychology like Neuro Linguistic Programming and Psycho Cybernetics; computer driven technologies shaping the most advanced quantum energy sciences designed to explore shaping the Quantum Energy and human mental mechanics of the mind worked in war zone.
Earlier in my career the 911 research in security created certain changes. These changes are designed to repair some of the security challenges in the environment. One change created led to a raise in wages of the C.I.A. officers to insure a better candidate could be hired by the agency. Another change was to craft a law to reflect the prevention of C.I.A. officers making security strategy mistakes being sued in the line of duty working inside of the C.I.A. Security cracks in original policy operations led to the creation of 911 in my opinion.
Retaliation toward the C.I.A. knock; is an institutional mental hospital put down program when you finish working for the C.I.A. gives you incentive to keep working once you’re in; however these rules were not explained to me and I went through the school of insanity when my operations ended after 911 reconstructed consulting works I completed as a C.I.A. knock.
The financial answers combined with the ability not to sue an officer in the line of duty doing police intelligence research or target the C.I.A. knock on completion of duty were the outcome answers completed by the Bush Administration.
I worked as a C.I.A. Knock; consulted in a limited capacity wielding some of the repairs required for the government. The information is seamless sent in audio intelligence gathered while under surveillance after 911 catastrophes. The reconstruction rebound of the USA under the leadership of the Bush Administration was empowered by my strategies.
My book “Walking behind Schizophrenic Eyes” is a firsthand account of what a potential officer faces in the line of duty.
One of the goals of “Walking behind Schizophrenic Eyes” is to share what actually happens when you are put down in the C.I.A. knock program.

I challenge this regime of criminals in the security grid operations to working in positive peace empowerment, integration, graduation or accumulation philosophy formulas that naturally build fountains of positive energy. I create ideas to empower the country safely supporting my democracy I live in today and for this I was tortured in my own home illegally.

Examples of this government torture camp are written in this e-book and are listed below date and time in most cases. Remember in science for every action there is an equal and opposite reaction. What do you think happened to me after the government went to through over one thousand emails from my desk? After my first encounter with the security grid in Florida and before I created “Walking Behind Schizophrenic Eyes” I never kept a paper trail. However in the second operation I created after I recovered from the first security grid attack; I learned to keep a paper trail. So yes I have documented my work in “President Fantasy Spy” in over 100 power point presentations. An average presentation on my war operations are around forty pages with graphics and emails recorded.
The stupidity of the people implementing this advanced security technology without psychology degree in hand is mind boggling.
This type of mental torture brutality in the personal home under attack by this security grid is mind bending because the people involved can increase the electricity in your home sending an ear piercing electronic signal through the wall plugs or lights.
While I write my experience I am under attack through this torture in my own private home; I realize our country is in trouble in developing an empowered human resources because the policy is negative energy domination sent into the signals in my home.
So many dangerous violations of human rights are applied to enforce the security grid concepts. Perhaps if you become too powerful in the world and are considered a threat to those in power this type of attack may even happen to you.
Inside the parameters being checked for criminal activity audit; are if you’re a pensioner or woman or child looking for independence or freedom inside the country you are sadly out of luck. Especially if your parents were in trouble with the law years ago in any type of criminal activities not convicted as of yet; leaving you prey to the digital security grid financial shakedowns to keep your information private.
My research living with two pensioner citizens was eye opening. In this example I discovered if the dryer or furnace or stove is used while the security grid electricity is overload to make you feel vulnerable; the 220 electricity also increased entering the home environment making the person feel naturally sick and more compliant to the security take down oppression tactics applied to citizens.
People obeying the law with a past in crime are shaken down financially and will be jailed as time goes on in these operations if they do not submit to the borderline criminal financial shakedowns expanding the security grid employment potentials at no capital costs.
Work for free to do the terrorism acts they tell you to do if they can shake you down. You will also lose what you own to keep the system quiet about your potential criminal past discovered during illegal search and seizure of information gathered by the security grid system.
I work like a bait car trapping dirty police or security agencies or people with a real time paper trail for the crown attorney or district attorney or internal affairs as they see firsthand going through this report on security intelligence applications within the country.
People whom break the law wielding this technology illegally crushing the potentials of the Western Empire or oppressing the citizen illegally will be charged and convicted if found guilty.
Technically I am not employed by internal affairs or the crown or district attorney and yet this paper trail is evidence when this book is sent globally online peer to peer for the police or politicians or civilians to trace and review in the computer world we live in today.

January 13 2007

Concerned about my vitamin b3 niacin prescriptions not working in my body; I no longer feel the niacin red flushes in my body when I take the product internally prescribed to help control my schizophrenia by my doctor 3 times daily. I am so concerned I went to see my friends at Pharma-save and found out the niacin product on his shelf did not work on my body when I ate them in front of the pharmacist technicians. I believe my medication and vitamins maybe illegally blocked by the security grid computer and as a result very little or no vitamin content is entering my human body. This makes me wonder if store vitamins are ok after the grid security electricity has been implemented. Products overloaded in electricity designed to shake down the town in security grid review of the community.
Steve and Mike own the drug store and I am concerned for the safety of the owners and patrons whom purchase products at their store. I did a test in front of Steve and Mike only to find out the niacin did not flush my body when ingested.

Jan 14 2007

In my opinion the new security grid technology could have many applications. Pensioners may benefit in reduction of pain and are the place to use this technology to give back to those whom provide the future and pleasures found within our liberties freedoms and democracy civil rights.
Private old folk’s homes that allow people a more psychological painless retirement; whom have the money afford to live in such luxury. Loneliness is a problem when you enter a retirement home; a computer generated voice program sent into your brain may provide companionship.
I am trying to relax unfortunately I am harassed by the voices in my head encouraging me to go against the PM and PRESIDENT.
This is part of the secondary government I have been tracking leveling the President and PM using me as a tool.
I do not want to be bothered again tonight and realize this is a covert attack. I explained I empower the big fish in politics however so many mistakes have been made on my file the voices feel the desire to harass me. The voices tell me they are going to prevent a law suit for the illegal actions taken against my family and community. I refuse to argue with people all night in my head; only to end up hitting the people online I respect in the g8.
My work speaks for itself; however the governments voices are unable to understand why paying me legally for services completed in the war on terror are such a hardship.
The people at the top pay the price and the people harassing me get a promotion if they can entrap me to continue to work for free even if it is illegal.
I respect the hawks and the leaders however I am getting frustrated with the foolish moves made on me illegally.
From hurting my mom to digitally raping my sister; whispers in my ear haunt my mind. My life is full of one brutal experience after the other unaware if this is real or an illusion created by people trying to take me apart digitally, seamlessly invisible to the naked eye other than experience outcome in emotional pain anchored deep into the mind. One by one these thought patterns take shape pushing me closer to the edge of terrorism or an anger outburst into thin air; fighting what I am not able to visually see or comprehend in normal reality.
I feel I am being hunted for all of the information I possess in my mind. The operations on me feel like a mental sanction on my brain.
A contract amends a document that could be created stating no law suites is truly the best answer. I have put in 1- 6 years supporting global leaders associated to the g8 and I am appalled the voices feel I should not be paid financially for the work I have completed for the government. I am so angry in this state of mind. I find the grid security doing things to my mind and body that I consider to be illegal. The information taken from me using illegal search and seizure equipment angers me because I am no terrorist or biker.

January 14 2007 8.19

I am contacted again by authorities; or so I am led to believe through a voice I hear in my ear; coming from electricity cables or satellite signal somehow; I am still not sure. However when I ask for badge numbers and the name of the officer bothering me; like a digital terrorist the people never comply and I am never given the information.
So I am not sure if these are criminals hacking into the computer security grid network or if they are police in the system. Maybe if they are police they have been fighting too long in a negative energy criminal environment. Guilty by association to dominant thought programming flowing out of the sub-conscious mind; flowing through the sub-conscious and into the cognitive thought process within the conscious mind.
I am told I will never see a dime for my work and that is life; so I write my e-books for the online book store market. I will sell them at some point in my life as movies, or in individual copies in online stores.
Hopefully the security audit recommendations and ideas created to support the democracy of Canada may be implemented by department heads if this book is published within the Canadian economy.
I hear this digital voice in my ear so often it is nerve wracking because they never stop talking and then they tell me they are the police and want me to sign a form stating I will not sue or take my paper trail to court.
I think the bad guys want to frame me and leave me in trouble charged with illegally empowering the police or some strange crime. Then I am told this is a government contract on me like a bounty and they are not police.
I am confused to say the least especially when the house is over loaded in electricity or through the television or computer monitor screen.
The people in my mind told me they represented the captains across Canada.
I do not believe the Captains across Canada would act in this fashion and am concerned the reputation of the RCMP IS BEING SLANDERED ILLEGALLY AGAIN.
This created animosity in me as I watch my mother a father go up and down mentally and myself with the effects of the security grid changing the intelligence state of my mind.
I have been diagnosed with schizophrenia and it is dangerous to my mind and body to be without my vitamins or medications designed to help my mind stay strong and stable.
The police are concerned about law suits for the criminal activities committed on me or others within the community. The force can pay the bill they say if people sue for damages if they occurred, so they want to strong arm me into signing a form about a criminal activity I have not completed to make sure they have something on me; and again this sounds fishy to me.
They people in communication lead me to believe the PM is involved and they represent the President of the USA with a special security certificate.
If not police captains perhaps secondary government looking to push out the Prime Minister of Canada politically caught in a program skeptical to his constituents.

January 14 2007 9:14

I have been told that the President contacted me and I would not see a red cent for my work empowering the USA at any time in my career. This is a telltale sign the voices did not know the truth behind the President of the USA and any connection to me.
I am a man like Napoleon Hill that has written Think and Grow Rich and was influenced by the work that Napoleon Hill did for the President in the 1930’s during the depression and why I helped empower the President of the USA and his administration in small strategy ideas after the 911 crisis occurred in the USA. In fact Napoleon Hill met the President and after meeting him stated I have not charged you a dime for services rendered however if I must place on the payroll do so at 1 dollar per year. Napoleon Hill during the President’s term in office at the time wrote 7 books while living the basement of the White House of which only one was a best seller, “Think and Grow Rich”.
My mom is eating a hot dog and they led me through digital communications in my ear to think the food was poison. I watch her and she is enjoying eating the hot dog; I know I can tell her to be careful because I will look crazy to my mom when I cannot prove the voice in my ear is real.
I do not believe it is poison however it is mentally taxing on my brain wondering if my family is being targeted. Afraid to scare my mom I let her eat the hot dog and submit to the mental torment not playing the cards in my mind looking afraid. This is digital terrorism placed in my household and an ongoing basis. Daily this attack on my brain has taken place since I stopped writing ideas and fantasy books to empower powerful men or woman online. I think they miss my strategy sent through my computer being hacked into by these wonderful people I think; I am not sure yet?

Daily I feel pain in my body like I am juiced with electricity through the building somehow. Up and down I go mentally and personally I do not appreciate the nightmares daily sent into my mind by these voices after doing so many good programs to feed children in Africa or empower the faith movement or help the government leaders around the world.
I will not get angry however it appears more computer voices are using Stevens name (Mr. Prime Minister) and the (Mr. Presidents) name George telling me they are responsible for my situation or so I am led to believe by the voices speaking with me in my ear.
This fuels behavior in me to strike back; in orders given to me to attack both leaders tonight as the so called security force on this case is pushing again with more digital terrorism psychology tactics; speaking to me uninvited in my home.
(I am offended at this point in time)
I will not get angry; rather continue this report on almost every encounter fighting these people in psychology while trying to protect my 74 year old mother from being hit by the invisible digital signal sent into my home designed to drive me mentally insane again. The voices claim they will put me down with another chemical injection in a mental hospital; especially after I stopped working.
I can see from the expression on my dad’s face the voices through the TV anger my dad and if I say anything he will think I am going crazy. The digital signal will work even harder against me so I must not say a word and allow the signal to oppress my family. When they say my sister has fallen apart under the illegal treatment through digital communications and she will be OK, I feel worried and yet I am told if go to see her she will be hurt again.

January 14 2007 9:28

General Casey is the one the computer claims is speaking to me; telling me it is only sodium pentathlon in the hot dog and my mom will be sick tonight. Then the computer led me to believe it was George (Mr. President).
Today I ran a test 3 hours ago calling the President George and that is how the program came at me tonight using the Presidents first name. Again an attack on me mentally designed to get me to go against General Casey or Mr. President. Neither man cares about someone as small as me in reality; and probably does not even know the programs on computer are running in the world making the name and activities of person appear negative.
A central computer hacked into many computer seamless while the computers are operational with peer to peer BitTorrent file sharing programs that can move software globally and can be launched any place in the world sent through a seamless environment this signal or another similar.
This same programming can be used in multiple households at once so I may not be the only target being taken apart or hurt through oppression or terrorism on families in the local community.
Any person going against the President or Prime Minister may be able to manipulate or tortured them digitally as well and mentally hurt them or their families similar to what is happening to me.
This digital program psychologically will create and manufacture a terrorist eventually over time.
This program may be the tip of the ice burg ripping Canada apart at her family values seams crushing our democracy rights freedoms and liberties as written in the 1st amendment rights of all Canadian citizens.

January 14 2007 9:45

Dick Cheney computer calling I am told, who knows however they told me if I continued fighting the oppression I was leveling Dick Cheney. I sent the message into the digital no man’s land claiming they could play the paper game as well and I would have to write more work for the government free or they will push entrapment. So now I am pushed as opposed to asked or volunteer. I have set a pattern to write a report like you read; outlining some of the communications that are sent into my mind claiming they will hurt my family and me or my cat.

January 14 2007 9:52

A computer claiming to be General Casey is again telling me they do not want to bother me; however when I look at my mom at the kitchen table the lady looks younger.
The voice tells me your mom’s wrinkles are going away like in the picture and this makes me feel stalked by the voice.
The idea is to let me think the security electricity grid system takes fat off the stomach and wrinkles away on the face as well; and acts as a vanity incentive. The more stripped of self-esteem or self-confidence the more in control the people are who wields the new security strategy equipment.
The people in charge make you think you’re a genius or a complete dummy as a result of the computer communication intervention. This experience of the computer hurting or helping you with ideas slightly weakening me and now with no computer information to help manage normal challenges I am left under the suspicion I am inferior without the equipment operational.
I have experienced firsthand the effects of digital stimulation on many occasions with my mom playing crib when she becomes suddenly too dumb to count cards and this happens when the voice tells me it will happen.
So I am really wild inside when I hear the information and see the result of the one I love manipulated or hurt. Electrically juiced up and then down and whisper in my ear the damage to her brain is permanent or it will be if I do not comply with the demands placed in my ear.
I feel fear in my mind creating more negative energy inherent with this psychological terrorism program. Telling me daily they have a digital signal flowing through the electricity in the building and they are actually talking to my dad out of the television or electric or digital products equipment in the home.
A sat signal off a dish next door I believe bounced toward my building is gathering strength on contact with metal on the trailer where I live. Somehow I am not sure sending electricity flowing through the walls. I am not sure as of yet however leather appears to slow the electrical conductivity wave. So now I wear a leather hat in my home or outdoors.
Now they build an aggression mood within the household and use my dad to get mad at my mom reading a Hollywood magazine. Naturally hurting me telling me what they are doing sending me a message into my ear through my dad watching television to create confrontation with my mom and this is hard on my heart energy connection to my sole.

January 14 2007 10:01

Threatened if I send another e mail message for help and told I will never see my computer equipment again however I am not online and wonder how they know I am writing?

January 14 2007 10:11

I need to pee so I went to the bathroom and the voices claim they see me naked in my bathroom as I sit on the toilet. I am told not to wash my penis off after I pee; because the person I am speaking with has a wife and now his wife thinks she should have him wash off his penis every time he pees.
The next voice in my bedroom tells me the information on computers is being caught and now I must write a report every time or I am entrapping myself by only selecting some of the information sparingly.
The only computer not checked by the security agency is a RCMP computer in Canada and they cannot get to their files and then a voice tells me it is the RCMP speaking to me.
SO I DO NOT THINK IT IS. NOT SURE WHOM OR WERE this voice originates from in my mind.
However self-humiliation is the key they wield most often and I wonder if the security company sells the private data they see at a private auction and can they see everyone in the security surveillance program naked?
I wonder who watches me wash or shower or if an officer has children if they see the children naked playing with themselves and then retail the video online overseas?
The police I am told think I created the pig pen videos and I have never done anything of that nature.
However the computer can be hacked and why the police may be angry at me.

January 14 2007 10:26

The voices claim I will not be bothered because both Canada and the USA have shut down the computers and I will have peace in my mind for the night. Yesterday I was scared with my alcohol drink I purchased down town because I burped when I drank the drinks and in my ear I hear my drink is laced with sodium pentathlon. I had a sip tonight and just one sip gave me gas indigestion. The computer told me my own government had done this to discourage people from drinking and wondered about my opinion. I did not feel real sick; not real sick just would not want another after you drink one. I do not know what is in the drink; however the computers tracking me in my ear or eyes in ghost images lie constantly so these reports are not accurate police research in my opinion. I wonder who has hacked into my home environment. Most people whom hide a crime do not blatantly tell you whom it is unless they are covering up whom they may be in another lie behind that lie and another truth behind another lie. Any person drinking in Creston today may be affected because that is where I purchased the wine coolers.
I tried to settle my stomach and I try to do a manual vomit in the bathroom and was partially successful. I then drank a gallon of water to thin the effects and during the ordeal I was led to believe General Casey was doing this to me, which again is a lie in my opinion. However what the computer claims is nonstop 24 hours per day at times. General Shwartskoff is also smeared in the voice information and is the good general in my opinion being slandered in this operation to take me mentally into a safe institution.
In some respects I really deserve the treatment as it may be language barrier training as well and I have never met any of these people in my entire life, let much alone know them close like the computer voices say.
However I have learned to have a deep respect for the gentleman in any right after tangling with the computers.
I try to make friends with the information asking the computer why or when and what trips the computer and asking, “Are you a computer”?
Fortunately for me that word association trips the computer and ends the harassment and the computer comes again. Faster in a new harassment computer program verbally operational moments later without the cracks the last program incorporated.
The 24 7 attacks I experience like this morning are telling me I should not sexually masturbate because everyone who knows who me are watching me when I climax or understand what I think about.
So sexual dysfunction is encouraged to prevent self-esteem build and if I argue in the bathroom my urinary track functions are slowed and I am prevented from peeing and during this somehow my heart feels pain like it is under attack somehow.
The voices tell me they can hurt me or fix me any time they like and at night I am often bothered with nonstop chatter. I sleep very little and why I am an easy target and act erratic sometimes.
Because I see how they hurt my folks and me; I am afraid to leave them alone at home for long; or I would move due to the fact they can be used against me to make me go stupid and angry if tormented or if they are being hurt.
At least now I can look at my mom or hold her if she is fragile.
She is 90 pounds and 74 years old and my dad is 73 and 160 pounds and both I believe have done their part to help the country not renowned to them through this report. In this time of injury appearing as illness or sickness from digital overloads in computer signals and electricity overloads in the body or specifically the brain.
I think it sad and a seamless attack on great people and careers when I see this unfold in my own home or country; I have grown up in free and full of liberty or human rights.
Police and security people set up to attack me through a pilot training program as a cover hurting those careers that come in contact with me in the military or police departments. I assume people whom like the PM or the President or me, preventing the leaders from fast tracking or meeting me due to a fabricated dirty name claiming I am an evil man or super natural or an alien or a biker or dysfunctional person.
I am no criminal, and why the research is real and the police unaware of me. Someone up top in government looked at the human resource combinations in psychology to advance the security grid system and launched the system into my world.
January 14 2007 10:57

Were done anyway the voice claims in my ear, so were electrically juicing you and we juiced your mom the hole time you’re writing and now she is not doing well.
I checked the kitchen and sure enough torturing my mom with electricity overloads and she thinks her back is out with arthritis.
I have been defending the reputations helping the Prime Minister and President in my mind.
I will now have to go through digital overloads because the electricity is so high in the house it makes me feel sick to my stomach. This fuels my desire to see the Creston police in jail if they are responsible, however I am not sure who is doing the electricity overloading in my house. Remember if my parents die it is whoever loaded the electricity signal to high in my house will be responsible.
I tried to help the police tonight in the voices solve the issues of the day however I am not sure whom is overloading my bedroom; and as I type this information in real time research under attack I am wearing my leather hat that seems to slow the digital signal overloads off of the ceiling.
People in Creston will sue as a result of this abuse of police or security privileges if they are abused daily and in fact I feel them hitting my heart with the signal as I right.
Because I warned you is all I hear on contact.

January 14 2007 2:57

More sexual humiliation appears and I am unable to touch myself and climax.
Somehow you take my sexual function and I get no hard at bed time and then the voices laugh at me when I cannot maintain a hard on between my legs. I touch myself and feel my balls and they appear tight and no matter how gentle I stroke my penis I am unable to get the sexual function happening in my mind.
Voices in the night so funny to hear at time appearing as friends and as this paper trail grows on the security audit so does the Creston Valley information file on policy and procedure upgrades for the security grid system operational through the Government of Canada.
This is a violation of my civil liberties to come in my home using military technology on me sexually and then attack my mom on her back in bed or her hands as she sleeps.
My mom is not sure what happened to her hands. The voices tell me they attacked my mom to teach me a lesson. I tell my mom I need to take a picture of how she is being attacked.

When I walk back into my bedroom I scream into my pillow and beg the voices to stop hurting my mom.
Tonight the voices told me they were captains in the force and appear to have misrepresented the police privileges bestowed upon them, if you really were the real captains.
I ask them why you feel you can violate any person you desire with military software on civilian population you’re not at war with today.
I have no axe to grind however I will build the largest fleet of attorneys to face your crown you have ever seen rallying the people of Creston yesterday and after tonight.
I will not turn it off tomorrow or turn my back on the community or people I have come to appreciate or love in ways circling around friendship and solid reputation as a citizen.
So have your fun tonight; who knows if your real cops while your Prime Minister struggles with your captains to save your force legally in the days ahead trying to repair the cracks within the security grid structure.
I will not sue these violators rather I will write and sell a book on the experience.
I may be the last involved watching the others go for 1 million dollars per violation per head if a law suit explodes in the hands of government officials.
You have hit 3 year old children and pensioners or so I have been told and I think the Hells Angels will be here soon to defend the clan living in the Creston Valley or move them outside of the grid.
The voices know I am serious because they watched me email the Hells Angels earlier today. I told them they were under attack with advanced security grid technologies.
If what was told to me tonight is true in your little covert electric network you have serious concerns building inside of my mind.
I thought it was a government spy operative or police government agent on the line in my ear; however I hear them and the voices explain they are brutalizing woman and children and pensioners in the trailer park.
I live in small mobile home with my mom and dad and our small brown Manx cat with no tail.
My fear is the grid may be sending spikes of electricity into the hospital creating heart attacks or other dysfunctions with the equipment.
You hit a government hospital with your electricity spikes and you may have even more issues to solve. This is an attack on your own population in my opinion looking through the glass from the other side of the security wall.
An act of war in some citizen’s eyes or others affiliated with the Hells Angels of mercy.
Personally as a war zone strategist I believe you’re creating an underground legion of people oppressed into working free to build a snitch network. A network of recruited personnel for a covert war on the streets of Canada wielding hard core security system full of negative energy influencing security grid system policy and procedures or protocols. I wish I could help you however I have no more interest in helping people whom brutalize my family.
(Real time comment and not my attitude today)

January 15 2007 12:10

More voices this morning claiming a variety of issues. Any electronics signals can be heard through the ear if you are near electronics equipment.
In my opinion kids to pensioners are also terrorized by the digital voices conditioning them into behavior patterns that are mentally geared toward financial shakedown like making a purchase they never intended or mental dysfunctional.
Other sick criminal ill behavior like not being able to climax or masturbate in the privacy of my own home and constant mental insult barrage of computer voices performing like a military weapon on the civilian population building thoughts of revolution in the ears of those who love the democracy they reside inside of today.
I understand what Ralf Cline went through now when he sold out Canada to the USA when I was sent to Ponoka; and why he stopped drinking; and how the USA brain farmed him and set up this criminal security grid shakedown program in Alberta.
This is now in BC and the illegal software is trying to steal a full community.
This type of covert military operations on civilians is illegal and an act of covert war.
Personally I am threatened illegally using this covert military software in my home and why I have written a book explaining the financial criminal shakedowns prevalent in police or political circles when policy is created in procedures of criminal activities.
Today I started to place papers on my truck window in act to prove I can communicate with the government without computers hacked into by the security grid.

I am not the one whom is responsible for this covert criminal meltdown of our law and order. However the RCMP has been taken advantage of by politicians and psychologists implementing the security grid program.
This criminal activity is perfectly legal when done by government breaking the law to catch criminals and then guilty by association shaking down the citizen financially. Citizens oppressed unable to hire lawyers or allowed to sue for damage against the force and officers and if action taken well you see the results in this report.
This is not democracy liberty or freedom and in fact it is a small town cartel of criminals caught being citizens stuck in a payoff program to keep the freedom or security grid from making them feel sick to insure financial shakedowns are continues.
In fact the ideas are sick and even my digital copy writes have been illegally threatened to be stolen by the grid people who want you as a pensioner or a helpless citizen
(When law enforcement is corrupted by computer they end up behind the criminal shakedowns hurting civilians across Canada leaving Canada in turmoil afraid of invasion by a neighbor in the years to come. Province by Province across Canada turned criminal through the direction implemented by police or political security policy or procedures producing opportunity failed in stewardship due to the liar program inherent within the police security grid training programs.)
Sign over everything in the shakedown and be part of the team taking over Canada and just move leaving those involved owning the community involved.
The community criminals shaking down others within the community using the security grid security that the people are unaware exists and is shaping the mind and decisions they make. A criminal act of financial criminal corrosion to shakedown pensioners financially and bastardize the youth for sexual pleasures through the failed police stewardship failed by those involved within the community.
You are my friend because we have become friends and I tell those whom watch me write in real time and shake me down unaware you shake me down because you are mentally done in negative energy Imperialism and do not see the criminal shakedown against the democracy laws as being abnormal and if this crisis is in Creston.

How many other communities before our democracy crumbles psychologically in the country and we are takeover by a friendly neighbor managing the Canadian resources to criminal and out of control for acceptable standards of democracy and people in a way no one will ever go to so the USA stays number one in investment and the place to live in the new water border North America?
A representation of criminal activities launched against security people globally within a failed security policy implemented within a country and her citizens. In doing this psychology negative energy policy and procedure within security operations implemented to curb child sexual abuse the police become victims of their own operations and now have habit patterns that make decisions that are in a neo conservative domination strategy to hard and naturally create the corruption and oppression they become trapped into naturally psychologically. The natural synergy within the actual security policy and procedure of the new anti-terrorism legislation on security implemented to overthrow Canada. Baiting Canada is security intelligence operational to put down a C.I.A. Knock helping fight terrorism before 911 and guilty by association to the 911 crisis and why the lever over Canada to implement security policy and procedure that facilitated the crack of democracy through influenced security policy changes and a potential covert country invasion is happening covered inside of the new police habit patterns created implementing the security grid policy and procedures repetitively across Canada.
In some ways you think the writer may be screwing you around and yet in true war psychology this is how it feels and when you want to see you look at what is written.

Why you look at the strategy being implemented to corrupt police and you see how, why and where and when and in reality not the writer screwing you around atoll in fact the writer sharing power through education because the idea of knowledge being power is still prominent today.
They can see you naked and make you dysfunctional and encourage illegal activities that in reality the person effected is unaware seamless, not and yet responsible for due to being controlled digitally by computers shaping the dysfunctional behavior mandated by the security policy and procedure flowing within the police system to serve and protect Canada. Sometimes I feel life is strange because today I write and in real time authorities read every word. I feel a bond with the ones on the other side of the wall and this bond is as comrades in arms on the front lines of Canada in a covert 20th Century war strategy that may change our country in ways we will regret for years to come.
Allowing this to happen to the police department after human resources psychologists signed off and department heads is a mystery to me and I think the technology was used on those first who needed to sign off on implementing the security grid policies and procedures and are somehow oppressed to keep the cycle of self-demise of Canadian democracy flowing until the USA acquires the resources and enslaves the Canadian population.
In my personal opinion this is a digital invasion covertly placed on countries around the world and not just Canada.
The world is not the same and all the information is illegal search and seizure and the crimes committed once attacked by the security grid network and not admissible evidence in court.

Shake them down the other way and make friends and get out of the people’s lives as a hero who found a crack to save them legally and make an intelligence crack within the community. The new security policy enacted in 2001 may have a lot of skeletons in the closet.
Through security psychology inherent within the policy it’s self is designed to fail through an overabundant amount of negative energy implemented within the civilian activity interaction creating Imperialism mentality within the security grid policy and procedures operations left operational in communities across Canada.
You may end up using personal behavior that will facilitate a crime and be the patsy at the same time trying to cash cow countries illegally monitored by those shaping you into the fall guy.

Example of Imperialism Theory
On Couple Interactions Legally

That is similar to inviting over guests to a dinner party and as they arrive ask they to remove their clothing and shower off and ask them to only wear a robe provided by the host. A lovely dinner with music and the entire time in the adjacent room the oil covered plastic covering the blanketed fabrics lying on the carpeted floor.
A game of sexual monogamy played in the environment as couples draw straws for the show and one by one each couple uses another a sheet of plastic displaying the true abilities they have to love one another safely sexually publicly privately in the home of a friend.
A game of chance in the arena of sexual live stimulation interaction with friends and an acceptable behavior within an Imperialism psychology created environment.
Strip-mining populations mentally to sexually interact or order to purchase the properties and businesses cheap and legally on paper with your own USA citizens or Canadian citizens.
People controlled like animals through delivering a security policy and procedure to reshape the mental habit patterns of people and within a security policy procedure sexual stimulation electronic functions are delivered to select players in the community whom basically control the community and always have until this technology was unveiled and the community resources reallocated legally.
This not a slander program against any country however a shake down on human and financial resources and the people responsible will be allowed to keep the business acquired illegally when finally finished if this behavior pattern keeps growing across Canada.
If you a police psychologist advising human resources on government protocols or procedures or a politician with too much to hide and you rob and bank and shoot yourself in the foot are guilty of robbing the bank?
This is crime and if people want this out of court perhaps new actions may be needed to insure all people damaged are dealt with legally and safely unwinding the operations perhaps working illegally and converting those operations legal and making sure the new recommendations in developing a more powerful security grid are enacted safely without crippling police human resources or our democracy freedom or citizens’ rights we under the charter of rights.
Canada is a target and you missed and supreme court of Canada and the police will protect the civilian populations or the world will unite and impeach the criminals and free the democracies taken hostage and oppressed through an overloaded mental negative energy democracy creating rogue governments not interested in creating a democracy foot print in fact only cash cowing the citizen for world global domination takeover financially, while under the cover of a Middle East war so the countries are involved in to drain financial reserves and make them more vulnerable to financial cash cow takeover programs created in strategy by smart people.
Some military and police people may be offended to see my personal opinion written in this book.
However some people may be pleased we are not turning into an imperialistic slave driven country program designed to cash cow and kill civilians by sending electricity charges into pharmacies destroying potency levels of pills medications or vitamins to sell more pharmaceuticals and take peoples properties.
Electrical stimulation on vitamins or medicines can alter formula potentials and increase profits for drug corporations aligned to cash cow the civilians unlit dead and then replace with their own citizens.
Not every person believes in representing democracy globally in this fashion and why I recommend with drawl for Canada and Britain in the Middle East at this time in my book.
While expressing my personal opinion on issues flowing into my life creating a mental torture chamber in my mind while residing in the friendly little town no ever leaves for long, Creston BC Canada.
Our entire town is under attack digitally and why or how is explained in the pages previously written in real time as I am personally torture in my own home.
This is what is going on and how a secondary government is leveling the USA for financial returns using the USA democracy as a cash cow genocide tool.
A very serious dangerous click of people whom have done this in regions of the USA and how stock markets are attacked with this seamless security system and possibly why the terrorists were contracted to level the towers to cover the financial cash cow program. This is my personal opinion and I am even afraid to express myself in a fictional fantasy book within my house hold. Wild claims with no proof are ringing through my brain. I also wonder about the theories of not remembering what you read and someone else taking the knowledge while you read and hold this in a computer and teach you to use the computer that has someone else managing what you should say or do and this will make you mentally too dumb to do your job over time and you are fired and replaced by USA citizens immigrating into Canada in security with back grounds in security taking over the police force psychology covert looking smarter than you because your security sexually done preoccupied in your brain that really only has time to have sex because they groomed you into the dysfunctional behavior.

Ideological thinking by negative energy thing you and the domination and then the liar computer program and then the sex rape concepts of pain anchoring a greater need for sexual interaction
(Similar to a bi polar mind in a sexual mania state only with a security tool to create a digital oppression to corruption anchoring a rape twist pioneering into a in the country already rooted into society human weapon system and that computer system controls the minds psychology creating a violent bi polar sexual predator in the police forces participating within the security grid child predator prevention program and the theory is hardening on the surface however under the surface it means self-annihilation of mental health human resources potentials to be creative or deliver a high enough level of performance to be a global leader at anything within the force across Canada.)
Through trust and mentorship people follow repetition by the department and eventually the people run on their own borderline criminal controlled and oppressed by the police in a similar fashion to a military state only using the transference out of a police department forces to whoever did not go along or the security oppression on that officers family to make them go along to insure an easy slow takeover of politicians and police and then military overseas.
The way they do today we are selling out to a slave society farmed by the USA tomorrow and they are harsh as you see today reading this report on how we will be prostituted and used to do crime and then give everything we own away free mentally ill later in life.
Actual take over and slave farming of Canadian human resources while the accumulation of all country resources are sold off for nothing.

Mental and digital and physical rape oppression is managed by that country farming our brains and the minds of those captured and led into the false security of building a life in mental dysfunctional mental illness behavior patterns sexually doing yourself into a new type of mental illness behavior only just charted by me and has be done by others for years or so it seems.
So if people read this report do they really manage their brains or do others in another country farming them into criminal or sexual dysfunctional mental illness habit patterns.
I hope I am wrong in mind and this is a nightmare that will go to jail one day or leave our civilian population alone and pay for damages the illegal covert war has created on RCMP and civilians or politicians.
I do not wish to die however why should we be slave’s snitches for a police taken over by another country designed to tear the country apart through negative energy corruption that creates a depression eventually or a revolution in Canada? Then the snitch is used to tear the country apart and work covert with the enemy and steal all Canadian resources turning them over to the country invasion kitty.
All people are not bad and this type of program is usually a hand full of criminals using the sat system to create dirt on people to make them do more illegal activity once caught and oppressed. However mixed with a neighbors desire to invade financially ten times your size this becomes a security issue for Canadian citizens especially shaken down by the security grid collecting dirt on a country designed to invade that country through oppression shakedown stealing the resources and then using that money to self–invade the country like Canada.

Chapter 3

Liberty

Mental and digital and physical rape oppression is managed by that country farming our brains through digital stimulation and psychological interaction. New mental cognitive thought patterns created within the minds ability to make sound personal management decisions relating to sexual or emotional intervention with other people and of those captured mentally taken hostage, a new mental programming is implanted daily through the implementation of the security grid.
As the people are led into the false security of building a life in sexual mental dysfunctional behavior patterns, created by the security grid naturally coaching people into building mental illness behavior patterns, the abusive sexually dysfunctional behavior is slowly created by adding pain to the climax with verbal digital sexual stimulation to the mind seamless creating an onboard mental intervention naturally making the dysfunctional sex appear popular and normal in the mind of the person targeted.
The dysfunctional behavior is then encouraged to interact with a sexy voice until a sexual masturbation climax is achieved by the person targeted and the person speaking to the one targeted.
Actually in the course of 10 minutes having a climax together designed to build a mental dependence on the voice sexually stimulating the one targeted. As time goes on a relationship is formed mentally interactive to the voice sexually praising you or hurting you to control you.
Once the voice takes over more and more decision interacting away from the person using sexual behavior intervention to rewrite decision potential outcomes and as a confidant to the targeted one is set up to be taken over mentally and then targeted to be controlled and farmed digitally by computer voice sexual interaction.
Psychology communications designed to invade and take over the person’s mind are delivered seamless and sent into the mind implementing a transferable invisible digital signal directly through eyes and ears directly rewriting thought pattern and decision in the brain anyway the invading force like through satellite or electricity or cable and telephone signal.
Brainwashing people daily into becoming someone in need of help mentally in health care if the government continues this security grid mentality conditioning program.
Psychology that strips self-esteem and self-confidence digitally while hurting you until your heart is crushed and you just let them hurt you until you learn to like this pain and then teach you to use the pain on others seamlessly making them work for the invading force free against the country taking the country psychologically apart in digital security policy procedure war on Canada seamless one person at a time. Your significant other in the seamless digital world of new technology creating new streams of mental sexual intervention capable of changing how we act or think or what is socially acceptable within the society we raise our children in daily. Yes your spouse is encouraged to have what is known as security grid sex with strangers rotting the foundation of marriage within the Canadian borders and making people anxious to become bi sexual and never monogamous. This is accomplished as the voice you come to love encourages the sexual promiscuous behavior by showing you in your imagination how the voice sleeps with others or is bi sexual.
Sexually making a person sick mentally and doing you into a new type of sexual pattern not normal in psychology relationship interaction theories.

Sexual promiscuous to a point being relationship dysfunctional by your voice you learn to trust coaching you and in this transfer of information emotion and energy found within the emotional connection to the voice vocabulary more exciting than the normal behavior a person is created to be sexual digital controlled and relationship emotional isolated. People being built and turned on later to invade a country financially by whoring the people into blackmailing each other rather than empowering and trusting each other daily.
This psychology influenced in security after 911 is flowing in a direction of mental illness behavior and hitting people financially in a shakedown while raping them mentally to become oppressed by police forces in a USA security influenced policy designed to create a hardliner police state called a Canada and in doing so make the country susceptible to financial takeover by a USA or global neighbor in the years to come.
Unaware of the psychological ramifications of rewriting a person’s sexual interaction with themselves, the person slowly becomes isolated from family and mentally dysfunctional listening to voice control their lives rather than themselves and others male or female close to them.
Behavior psychology previously only charted by me has been done by others for years or so it seems. This type of mental programming of a nation through raping the citizen mentally using the security grid and then shaking the people targeted to work for the invasion force free if any previous crime in your past not process can be discovered or to actually give everything to them willingly to stop the mental torture of the people targeted illegally by crooked people working within the security grid policies and procedures.
Citizens trusting the government and to dumb when hit with grid security digitally to see the new screw the tax payer program mentality strip mining them created by political security policy and leadership enforce by the police agencies within Canada.
So if people read this report not in the security grid they may be able to understand the information and if read in the security grid may not remember or understand what they have read about themselves or others around them.
Computers and other people that conditioned the targeted they are smarter and can operate their brain safer is really the invasion key and manager psychology managing the targeted people’s brains to spend all they have and become totally controlled by the government or do others in another country farming the targeted rich for what they own and into criminal or sexual dysfunctional mental illness habit patterns.
I hope I am wrong in mind and this is a nightmare that will go to jail one day or leave our civilian population alone and pay for damages the illegal covert security grid war in oppression psychology has created on RCMP and civilians or politicians.
I do not wish to die a slave or activist however why should we be slave’s snitches for a police taken over by another country designed to tear the country apart through negative energy corruption that creates a depression state within our economy eventually crippling Canada or sending the country into a created political revolution in Canada?
The police snitch is a slave used in gross indecency sexual acts (point and the person is sexually done by the person controlled to do people sexually for police free to create the blackmail shakedowns created by the police snitch.

Prostitution charges never issued to the security grid snitch for 2 years or until they burn out encouraged to do crack cocaine to make them gay crack head whores busting new gay Johns on the street until they are sent to jail to be whores trophies for the prisoners providing security intelligence in the prison system. Through the research collected information explaining the security grid was unveiled to me seamlessly in my ear and I found out innocent kids who have been raped by adults have the most experience in sexual abuse to be bait victims for child molesters or Johns looking to screw kids for money.
Once the kids are discovered sexually abused by the security grid apparently they are vacuumed up for more abuse as easy targets because mom and dad want to stay out of jail. Finding young bait kids for prostitution stings and then leaving them in a mental hospital as a vegetable later in life is an easy way to cover the trail of sexual abuse personnel recruited as a side effect of security grid operations finding ways to prevent child sexual abuse.
The parents then work for the security grid free and will give up the children who will also work for free surviving on hooking to get money to live and while the kids are turned into crack head whores to make them manageable in this sexual abuse business are used in blackmail creation or prostitution systems authorized by a select few in charge of the security grid at the top designed to create more snitches for police.
Of course no cash changes hands only personal favors in opportunities to control slaves to make them your own and this is borderline legal to do daily.

Children and young adults or pensioners used to tear the country apart and work covert with the invasion enemy by force oppression and then steal all Canadian resources turning them over to the country invasion kitty.
All police and politician people are not bad and this type of misguided program is a result of pioneering new technologies in security and why the program is under review in multiple agencies today.
Usually a hand full of criminals or new technology is the culprit when pioneering using the new digital security system to create law and order and end up creating dirt on people to make them do more illegal activity snitching telling on
(Telling the police about illegal activities on the street)
Other criminals once caught and oppressed.
However mixed psychologically with a neighbors desire to invade financially ten times your size, this may become a national security issue for Canadian citizens especially shaken down by the security grid, collecting dirt on a country designed to invade that country through oppression.
Another country may be tempted with this technology because creating a financial shakedown stealing the human and country resources and then using that money to self–invade that country like Canada becomes possible looking at the psychology economic results.
In fact the opposing country or police force using a satellite or security grid can place the illegal activity in your mind using a digital signal spiked by the electricity increase created by the security grid electricity late at night using this technology making you think you sexually like children and want them to do kiddy porn or some sick behavior.
The information is sent into the person’s mind designed to create mental triggers within the targeted person’s mind.

Remember the double edge sword of law and order fighting crime triggering because Nero associations to visualized similar sick behavior if mentally conditioned over a period of time guilty by association. Once you have been targeted for investigation and if you speak out loud when you wake out of a deep sleep they people in the digital signal start to ask you questions and interrogate you in your mind.
(Favorite target time of security grid)
The security people get you to think of the bad behavior you created in the past and the information is logged by computer if a crime never convicted on and then the person is targeted in interrogation in there bed mentally and in doing so a case file is built on that person started the minute your eyes open in the morning. Never speak out loud or the files are even more powerful because the security grid keeps you speaking out loud until a dysfunctional habit pattern is created and you are not comfortable speaking unless you speak with the voices out loud. This is a sign of implanted covert insanity as time goes on because the voices keep you thinking of the past and in this association synergy the brain stops setting new goals and person becomes controlled by the voice and the new goals the voice sets for the person being targeted over a 30 day span of time. Creating a nation of mental illness issues in the under current cracking self-esteem and self-confidence making the nation more susceptible to takeover of the human resources and of course financial resources of that country and in this example making slaves out of the citizens invaded.
My concern is the security grid company may be using this as a tool on innocent civilians to oppress them and shake them down and steal what they have in resources and then sweat labor farm them free.

Later slaves created mentally willing for digital sexual favors to do bad deeds or illegal activities self-fueling the invasion covert on Canadian soil.
Images placed in a child’s mind or adults mind designed to turn the people against each other covert and daily they learn to hate and fight with each other as one or the other are sexually turned by people using sexual digital technology to help them masturbate and fall in love with the voice they never meet unless the people refuse to fight and then a person is called in to influence one or the other into sexual preciosity if the people have large enough resources to protect. This is a covert attack on the civilians within the world fighting this type of illegal search and seizure violating out citizen 1st amendment rights freedoms and liberties to live a life as we please born free. Bastards tried to crack our Canadian democracy and other countries democracies targeted through the security grid operations and protocols.
People targeted for what they have by their own government until they fall apart naturally and turn over everything they own to the oppressors free afraid for their lives unable to access police for help.
Government security grid programs operational in need of adjustment psychologically appearing as war and through the adjustments in policy and procedures expanded in new positive energy programs that created added self-esteem and self-confidence to the security grid. Programs that simultaneously separate people like separating an egg yolk from an egg and once the person is labeled legal or illegal deciphered add empower philosophies to expand freedoms and 1st amendment rights flowing within our democracy.
A citizen rights and freedoms are the most important ingredient to higher gdp or tourism or investment.
Programming this energy psychology safely within a country is critical for long-term sustainable growth cycles and as these citizen rights and freedoms shrink so do our civil rights and marketplace we reside in financially daily.
Through overloaded minds in negative energy the positive attitude slowly shuts down to a crawl and performance cycles within a country fall into financial disparity and the slow decline of a countries human resources dwindle and in doing so dwindle country abilities to generate prosperity.
Why this report has been generated in this book on the psychology, economic, security ramifications to world events. Technology security replacing human interface creativity security, shrinking the brain into lower self-esteem, self-confidence connection naturally shrinking the positive attitude and creating a cycle of creating a perpetual expansion in hardliner security theories created by computer human interface operations designed to meet the ever expanding philosophy to control the people in security. Naturally shrinking the democracy potentials of a country daily, especially if the political policy designed to expand gdp tourism or investment are full of negative energy psycho cybernetic psychology or Nero Linguistic behavior associations. This psychology cycle creating natural synergy cycles that flow negative energy covert within the psychology of the country influenced daily by the security grid energy base created to fight sexual dysfunctional behaviors found within society.
Energy transferred into country operations psychology theories residing within the political policies and procedures of that country targeted covert facing democracy challenges today.

Recommended Theory to Avert
Long Term Self-destruction of Human Resources
Potential Solution Ideas

Policy and procedures to operate countries based on domination changed slightly and I believe was empowered into a new philosophy to win at conflict with positive energy based operations.
Pioneering in science psychologies to develop a new psychology strategy in operations protocols theories flowing through the psychology of war or the economics opportunities expanded of a countries empowerment philosophies to increase wealth safely legally within a nation.
Creating a multiple alpha dog war philosophy more powerful than the old Neo Conservative Domination War Strategy
safely allowing all involved, to play a role in the alpha dog theories leadership roles independently expand creativity in potential outcome within psychology Quantum Energy Synergy fields combined with the advanced psychology field of Psycho Cybernetics and Nero Linguistic Programming combined to create a new field when mixed in computers and PDF robotic nana technologies to deliver end results globally.
Naturally shaping advanced theories in positive energy based PDF robotics E book programs traveling at no capital cost on dispersal or reproduction of the tools creating economic empowerment psychology.
Psychology programming designed to empower philanthropy or shape wars or country economic revitalization packages. People organized seamlessly working in a focused Quantum Energy, positive energy harmony, independently free of each other and yet seamlessly safely independently working on a mutual common goal.
Production at no capital costs used to in expanding charity or philanthropy work globally.
(Sweat labor to core operations)
People that work within an economic goal independent of each other similar to a coop membership and yet seamlessly tied as one positive band of energy within energy and in domination the same formula applies to the negative energy self-destruction of human resources flowing within the security grid energy based operations fighting crime and creating crime due to the overabundant uses of domination negative energy flowing within the core of the security grid country operations.
Psychology prosperity theories building new steams of manufacturing employment associations and shaping environment, a mission statement or policy procedures manual identifying protocol theories and philosophies. Quantum Energy within the human resources of the planet flowing into a positive energy cycle creating paradise on the planet verses desperation or war and within a four part strategy a mutual victory theory combining peace empowerment graduation integration and accumulation.

Grid Security Emotion

I am afraid because I feel under attack as the lone family and yet realize it is not just me but my entire community with national resources similar to the threats made to me when the security grid raped my brain and body psychologically daily.

What you believe you achieve.
The people who hurt me emotionally are trying to push me so far down mentally they can easily have me hand over the desired bounty if they will leave me alone mentally. In fact the people speaking to me are trying to steal my digital copy written science books and through negative energy oppression mentally shake me down financially.
The vocabulary is done in a cruel oppression tactics, painful to my hearts emotion and brain cognitive behavior patterns.
Cruel and at times mentally brutal behaviors delivered on my mind telling me my sister, mother or father according to the voices in my ear are in danger and are being hurt due to my stand in democracy freedoms and liberties fighting domination oppression.
I hear these people in my ear almost 24 hours per day daily and when they speak they covertly attack my hearts positive energy emotion and brain pattern positive energy cognitive habit patterns.
I do not know who may steal this data or why, however I am being brain farmed in my own home illegally and this happens to be what I am thinking about today. I am worried for my country and friends tortured in my home town. I am no terrorist or ever have been and have another paper trail showing my work for Prime Minister Paul Martin and how this program started legally working with the Canadian government to encourage the USA to pay the softwood bill and stop mad cow assaults on ranchers.
I have 1086 emails in a paper trail file that prove my claims in black and white.
This is a sad day for democracy and I only hope the people in charge of the world will act safely to protect the populations as opposed to enslave them digitally.
Pharmacy cash cows or marks for smarter people whom dummy up the people before doing business with them and why this entire buy out is illegal in Canada.
You are not allowed to use this brain washing software on a civilian population unaware and the halfway through changing how people think or trust others sell it to a country legally as empowerment of any kind.
In the end leaving civilians afraid to stand up for democracy while leaving them holding the illegal bag of oppression; dealt into their households afraid to stand up.
All data in police is illegally obtained because this is not legal to use digital electronics in a financial interaction in fact this may even be very criminal if not stewardship is mishandled improperly.
This cat is out of the bag and now I see how you work to take over the police and then politicians and a full country and perhaps for 9-10 years Saddam in Iraq spent a different night in a different palace running from the same invasion nightmares and had doubles created to hide from this technology implemented on him by others.
I am now threatened through this software that they will do me and my family today.
Perhaps why I am pushed to do an illegal activity I have never committed in order to cover up for the dirty police or politicians involved in the Canadian treason against Canada.
Liberty freedom and democracy or more important than this criminal cash cow con game played by the USA and other countries illegally convinced into destroying 5 billion people to take the world back to 1 billion people as available in research I complied earlier this year.
I have a file and all the data is on demonoid.com available for the public to review.

I am again being threatened that I will be arrested today and why I am not sure because this is my 1st amendment right to write a book on my computer, even if it is fictional fantasy reality. I am schizophrenic and my imagination is interesting at times to write about. I have never been attacked digitally in my computer at home before and wonder why this is even happening to me when my computer is not even online. How do the ones attacking me move my files or take my data and computer?

January 16 2007 3:01

The program I am trying to defend against is designed as far as I can tell, to kill people using electric appliances. The 220 electricity is different than 110 juiced at the stove or dryer or furnace and if too much electricity flows through the appliance it may lead to attempted murder one every time the signal is spiked in the Creston Valley.
The dryer in the bathroom almost leveled me physically and they are trying to kill seniors with weak hearts.
More genocide planning and work I see being done with this security system I think is the military and police. I still do not think this police because all the information is taken illegal search and seizure and the intelligence is worthless in a court of law because of the covert circumstances not making it clear to people the information was taken.
As the intelligence is gathering my fear is they can kill you if enough electricity is sent through the house or trailer. Products sold to consumers through Sears and manufactured by private corporations may be the clues to the products and yet just juicing a grid can kill a community when they choose.
This is again information I hear in my ear apparently from the men or woman I respect, making me angry to create another potential strategy strike on the USA President’s Administration using the police and military as a patsy.

January 16 2007 5:30

I tried to protect my town from this terrorism program
(I have never heard of the security grid and have no idea this may be my own country government wielding terrorism through my front doors.)
I pioneer into law and order discovering science cracks shifting corruption through empowering political economic or security policy relating to immigration or homeland defense security or global war or terrorism and also the some of the science advances in Quantum Energy Psycho Cybernetic Nero Linguistic psychology security empowerment strategies naturally creating different bands of invisible synergy quantum energy developed through empowering human resources emanating energy off the planet.
By focusing on this energy production on the planet by shifting quantum energy programming in human resources creating a new synergy formula emanation level off the planet. The further the Digital Mind Coach programming spreads the larger the shift toward paradise and a safer existence within the universe.
Creating a shift in positive energy actions taken by the people involved in the activities being analyzed for potential harvest of paradise energy flowing through the universe.
In the books I have done some the most advanced science research and have also completed experiments in new energy or war strategies or political policy strategies.
My diversified fields of expertise combined work in science research that is at time classified. So as a result my work is seldom sold written for the select few at the top as found in my written work entitled
“Planet Genesis Operations Experiments”
Housing (actual full experiments over 4000 pages of data reports with 900 pages released in the)
“Planet Genesis Projects Experiments” in science energy and war experiments in strategy fantasy fiction documents (covert science energy experiments) that shifted environment energy flowing within human resources. This energy transfer is in employment policy or security policy as displayed in the actual documents used in the experiments, located within the articles published in the book located within the 2 books named “President Fantasy Spy” found within the “Planet Genesis Operations Experiments” books and also in the book
“Planet Genesis Experiments Operations”
That also has a copy of the 14 E books on
“Digital Mind Coach”
Totaling 1400 pages of viewing within the
“Planet Genesis Experiments Operations” and sending this genius into creation happened. Intelligence creating focused synergy through directing quantum energy in human resources wielding Psycho Cybernetic and Nero Linguistic association Behavior Patterning.
Through advanced techniques mixing Psychology Cybernetics into Graphics Design art while mixing with the 5 computer software programs and PDF robotics online through peer to peer BitTorrent connections or web sites to create the most advanced fields in quantum energy farming.
The psychology physics of the brain through the application of an advanced fields in mind mapping developmental research.
The quantum energy formulation formulas technologies as displayed in schematics located within the
Digital Mind Coach E Book series or download the schematic on the human resources quantum energy description formulations online free.

www.digitalmindcoach.net

Working in advanced farming of quantum energy focused human resources development operations.
Through cause and effect science synergy interaction the energy (I believe) back to the planet is in charge of shaping hurricanes or tornado or rains or crop production.
This outcome is in most part I believe to be based on stabilizing environment with positive quantum energy shaping human resources that naturally increase the level of positive energy emanating from the planet through the activism energies created by said people touched by the Digital Mind Coach programming material.
Within the atmosphere energies are flowing associated within the energy flowing through the universe and directly off of the planet.
As a scientist and have discovered many cracks of corruption and flaws within the security systems operational programming. I also provided at my expense a copy of my Planet Genesis Experiment Operations to help explain my previous work and the way the world is moving toward self- annihilation wielding the corruption created by so many current so called security grid programming policies and procedures.
This file is a paper trail on me and hopefully will work if I am framed and serve as the proof I am no criminal.
However those around me may be harassed themselves and gone through these digital torture years ongoing just like me and may have made a mistake in life in the past and ended up with garbage held over their heads or targeted and created criminal behavior patterns in mental implant visualization techniques and psychology to breed dysfunctional criminal behaviors into the forces in general.
The same behavior to oppress me may be operational in forces members covert too ashamed to mention or fear of losing the career in law enforcement so the people comply and the behavior is shaped a little more illegal and dysfunctional at every corner.
(Slightly and barely noticeable by the affected candidate)
As time goes on the behavior is illegally now have grounds for legal action.
From police to security teams all may sue the government for lying to fill personal pockets or destroy so many careers using me as a covert weapon to eliminate the people whom believe in law and order.

January 17 2006

My friend Claude has a larger infection in his leg and now so does my mom. I asked the people speaking in my ear not to hit these people.
The community is being electrically juiced because my body picks up the electrical frequency when I walk and the 220 in dryers and furnaces and a stove juiced will hurt the human body.
The potential to kill an entire population and blame the military is what I see happening.
The USA hawks have been set up as fall guys because the software keeps making them sound dumb.
This is not good to have people think the military hawks think this foolish. Misuse of software in my opinion and in most cases the scripting within the operations themselves may have been prepared incorrectly according to the theories in psychology to create empowered stable mental health patterns.
I the security system company software is possibly Nassau military created and then sold to a private corporation and then sold to Canada in this test experiment of digital security working in the Creston Valley community. My concern is theft growth becoming acceptable behavior because people can just steal your information if they can illegally frame you into becoming a snitch and they can bother you for days quietly illegally when this system is applied to lone wolf home owner. Shake down by shake down closer to a suppressed police state encouraging no creativity and not to work if the person wishes the work not to be stolen and this is mental dysfunctional human resources planning in the country.
I think the government is afraid of a law suit from the community leaders if other people have been treated like me.
The new funding theories in the Live 8 concert I designed will be set up to protect our democracy rights and freedoms in the USA and Canada and Britain. Live 8 draws 3 billion online and a 4 dollar contribution per person to save the democracy is quite possible and will pay for all legal law suites.
Legally I write fiction books that happen to contain ideas the military likes or cover events in society through a voiced opinion 1st amendment right given to my living within a democracy.
I will write one more book to save soldiers and civilians from dying unnecessary and no more or less if the hawks want the data.
I also do not believe in genocide a population and you do and why we have conflict today. Creston is not the Middle East and your illegal actions are a disgrace to the military and air force and navy.
Democracy is what our forefathers protected and why I stand firm today. Legally helping Hollywood is your answer with a live 8 to pay the bill.
Because you not a democracy live 8 is too powerful. You have a king not a democracy in the USA and why this illegal activity has gone on so long and now digital to cover up the dumb moves made politically.
I am angry at these people and now they can hear from me more often online with statements like
However please stop beating my 74 year old mother and meet me on the telephone if you want to speak to me.
I am no terrorist or biker or alien or walking Jesus just a citizen standing up for police military and our democracy trying protecting Canada and my family or friends.

The Text in bold is an example of how mixed up thinking patterns to communicate on paper can get being done by the security system electronics or satellite radio wave signals.

Then you are free to Sat boxed to do the deed. No you could not get funding oppressed and were made to do this with dirt over your heads illegally gathered with equipment not even legal to use. Illegal search and seizure and then made to do what they wanted.

Just like the police. This personal opinion and a fictional book I am writing to protect Canada and the Western empire from criminals holding the world hostage like me and this community.
I blew a potential slave career and a career is not as important as my country or Prime Minister and his family. Yes I will pay for this later and may even get hurt however pain is a friend now when I stand for liberty freedom honor and justice.
They know your cracks and how to manipulate you especially when you trust them like I have with free work only to rip off and tormented to admit to crime I have never completed. I have done no crime and am a country hero they used and got caught with the finger in the pie and why the hawks were smeared to cover as patsies like me and the police.

January 17 2007

Illegal search and seizure harassing me personally is my pet peeve. This case on me is made electronically in real time through the Pentagon according to the information I have been told in my ear. Lies I suspect sent by digital terrorism computers and people and are not sure if this is true or false.
I feel like I am spiraling into a state of mental created insanity and wonder if my brain is ok or if this is just an illusion.
However the information will online peer to peer in this book eventually and the proper people will read the files like all of my other books.
I have written books to empower the Western Empire or global leaders of the world in other Empires as vast or wealthy.
The conversations rolling through my mind are interesting however I suspect the words are changed or flipped cruel or rude as the reports are created by security people trying protect their jobs any way they can as the domination mentally sinks the western empire slowly daily. Afraid of those at the top they write they know the supervisor wants to hear when the final report is discussed verbally as the potential fictional data research is reshaped moving up to the top of the political or security or military food chain in my opinion.
A new breed of government stimulated negative energy building the people involved in terrorist creating terrorists through hardliner security created by domination philosophies colliding with terrorism and stealing free security or economic ideas covertly.
Remember each mentally dysfunctional habit pattern you add using over abundant negative energy to your personality and character make it harder to come back from mental dysfunctional insanity.
Your new created behavior is like a wooden match and one day you look inside of the once empty wooden match box and you audit your dysfunctional mental habit patterns and count the wooden matches that make you sexually dysfunctional and emotionally mentally ill.
This mental audit of information allows the person to list all of the dysfunctional habit patterns and make sure they mind map a way back from this digitally stimulated mental insanity security program. Sometimes a spouse makes a list of how you changed and the person affected in negative energy makes a list of how they have changed and if the behavior is too dysfunctional a stay in hospital for 30 minimum days in hospital like Ponoka Alberta.
This psychology reconditioning is a longer than 30 day process and may involve medications or injection taking 2-3 years to recover 80% of what you once were before you made yourself mentally dysfunctional and taken care of by computer trained not to think so you never change your course once set a sail into mental illness waters and why I again recommend the mental audit of existing habit patterns new or different that may be a little strange.
Severely reduced lifestyle compared to the sexual bi polar mind created out of balance created naturally through long term exposure to the security grid system.
A person effected over a long period of time may be required to reacquaint normal sexual interaction or association of mutual respect for the freedoms and rights of the spouse and need long term counseling to keep the marriage even close to real especially attacked by another country covert by people who talk to your wife or husband and electronically stimulate an orgasm. Much like picking up a hooker on the way home after work fucking your brains out in verbal digital masturbation arriving home to tired for normal sexual interaction relationships and in doing so crumble the marriage and the person into more criminal activities like young whores like younger men or teens and young woman or teens as playmates controlled digitally oppressed through the security grid forced to comply sexually. God help these people get anything on you because they will never stop shaking you down sexually, financially or emotionally until you’re hooked on crack as a whore doing whoever they point to for sexual interactions.

All negative energy associated and grand fathered into your personality through being guilty by association exposed to security grid operations creating emotions of hatred, jealousy, anger or frustration or revenge producing feelings of self-oppression will slowly make you more and more mentally dysfunctional the longer your guilty by association exposed to the policy and procedures of the security grid operations within Canada.
This is how we shrink as people shrinking creativity skill sets as negative attitude takes over the mind or performance of all people involved in the operational procedures guilty by association.
These emotions create homo sexual psychology and look for a psychology paper at the end of this book on the understanding of the creation of the homo sexual personality or papers on theories associated to the grid dealing with issues revolving around sexual dysfunction or mental illness behavior insanity patterns. The information will help explain as you read what is causing the person to shape thought patterns that no longer can take responsibility for the actions they created. Due to the constant failures created in operations created in the mind like the liar failure program read daily over a 21 day period, can rewrite desire to do the extra mile because you crush your self-esteem and self-confidence of that person and then they no longer believe they are intelligent so you are easily managed by people outside of the program analyzing the effected people fighting to preserve faculties and creativity and performance skills in the minds all requiring maintenance.
This program stops the officer from maintaining his mind making him a bigger target to criminal activities or country takeover by criminal organizations or countries interested in Canadian slavery potentials and the country resources.

Chapter 4
Freedom

How did your mom and dad raise you as a child and what beliefs and virtues were foundation and important to them and you as you and them created a law abiding personality in your body.
Forcing the implementation of the negative energy security grid policy and procedures designed to vacuum Canadian crime.
By doing this security grid application in communities the mechanism to safely protect children abused behind closed doors. Systematically raped or mentally crippling in psychology security grid policy and procedures.
The police force psychologically penetrated and conditioned in crime hurting children and psychology sexual dysfunctional behaviors created deep in the fabric of the sub-conscious mind. By loading daily the negative energy psychology liar program or negative energy pain program associated to sexual interactions in masturbation with others verbally seamlessly digital are designed when combined to destroy the people involved implementing the police policy and procedures of the security grid.
New 21st Century Science war psychology implemented by our own country influenced by another in security grid policy procedures on Canada against the police forces or politicians and civilians residing within Canadian borders.
Everyone awakes to succeed daily and this constant negative programming creates failures more often than success naturally using psychology to crack the person’s self-esteem and self-confidence overloading activities overflowing in criminal negative energy behavior that is a mental conditioning process to destroy the character of the person as seen in the liar program shaping the attitude negative in the person implementing the information.
People left unable to find the positive energy to shape the positive emotions creating patterns of success rather than criminal oppression or pain into the civilian’s life they serve and protect. By reversing the pain pleasure principle implementing sexual masturbation with another person seamless within the community you create the foundation for reversing law and order within a countries operational policy and procedure protecting that country. The object is to get police to deliver painful oppression upon the citizens in a security grid program that destroys 1st amendment rights and liberties or freedoms of that person. You thin pain to sexual pleasure is what civilians want after the police are mentally conditioned to reverse the pain pleasure principles and actually creating a digital sexual oppression chamber that the citizen must sexually comply with or be tortured physically sexually. The system in technology and psychology security can reshape a person gay over a very short point in time. As the foundation of morals crumble you can see the self-destruction in the psychology trust in civilians or our children living in Canada by reshaping the mental fabric of Canadian democracy liberties and freedoms intro sexual oppression slavery operations digitally.
Psychology job creation in the civilian Market and when told to stop by police after my research reached the top the police were targeted in the liar program and rape simulation programming. This is a trust issue and why I created Digital Mind coach that houses psychology repair and it does not need a payoff or job creation to stay functional rebuilding the mental landscapes destroyed. The E book cd never gets an attitude problem or needs to cash cow you for employment. As these emotions go out of balance the person fails to help themselves or others around them safely.
Without consistent exposure for 21 days to the Digital Mind Coach Influence reprogramming of that person eventually the person targeted naturally creates a shallow mental head space. Why for two years Digital Mind Coach was offered free at
www.digitalmindcoach.com
Or
Demonoid.com
Peer to peer Bitorent file sharing
(Over 30000 file downloads globally tracked on one Bitorent site).
Operations in under current homeland defense covert psychology quantum energy based security to help stop the slide of financial country resources through crippling human resources through negative energy political policy and procedures shaping country security protocols in homeland defense or security grid security programs shaping mental human resources powerful or weak.
People caught in the fabric of Canada sinking into a spiral of mental negative overloaded energy created by security policy and procedure to hardliner philosophy operational within Canada.
Psychology crafted into policy and procedures to create employment for the psychology industry. Penetrated years ago in Ponoka for putting down a C.I.A. knock and new construction cost effective opportunities in the hospital deals that actually send a contribution to the government to help government survive and keep the industry moving the way it does without Digital Mind Coach cutting employment within the psychology industry.

People hungry for money and power in psychology creating a security grid psychology program to protect and serve full of lust, naturally making the private sector more susceptible to mental insanity through crafting the dangerous policy and procedures in negative energy implemented into the environment by the security grid system.
The further the program goes the further people sink into daily operations creating more mental dysfunctional behavior patterns sexually and in decision of right and wrong.
Country security policy and procedures naturally creating failed performance or creativity skills naturally creating the need to be managed by another country resources computer network not tarnished criminally.
See eventually your habit pattern to screw others catches up to you and the police citizen cash cow program and psychology cash cow program are now in conflict too negative energy loaded and turned upon each other, done by their own game of lawless corruption fueling promotions and bank accounts. They did each other and did the tax payer a favor.
When these philosophies are sent through a computer satellite to program people globally it is a weapon designed for the takeover of countries resources or create the self-demise of a military or civilian or security agency environment living within that country all at the same time. Eventually masterminding the country in negative slavery oppression creating new personalities through oppression naturally fueling greed tactics or lust that create a personality change.
Within the images cast naturally within the mind’s eye and around the mind, the person is functioning and if terrorized digitally with voices in the ear eventually oppression or a created mental insanity is created in the minds of people affected. What I refer to as the cuckoo box in the mind. Solders in battle are under stress and will crack faster than a civilian in their home especially isolated from Canada going into a high casualty count spring war in Afghanistan.
Solders conditioned to go bisexual or gay similar to politicians and police departments by implementing a security system.
Selling out Canada to slavery and oppression and gay sexual dysfunctional behaviors riddled in aids or HIV stimulated by a computer to wipe out thoughts you do not desire or others do not wish you to remember creating digital rape opportunities with actual people that wipe the person’s brain when finished.
You reaffirm the concepts of failing to take responsibility for your own mental cognitive functions and as the brain is wiped daily new abilities are shaped closer toward mental insanity by promotion of thoughts that will take you down mentally into neuro associative dysfunctional behavior patterns.
Reaffirm not taking responsibility for your own actions.
Doing crimes more often stimulated by negative energy programming into criminal behavior patterns creating acts of illegal invasion or genocide.
My thought patterns in my mind are created by a program I have written named dmc and create a manual for the brain loading positive energy vocabulary and mental cognitive responsibility for your own mind and naturally shape the honest behavior patterns associated in my mind.
Responsibility in the mind is taken when the Digital Mind Coach program is implemented within the brain and for every word or action taken and as this self-empowers the mind daily the IQ is increased slowly and carefully by exercising the brain and positive energy stabilizing the quantum energy cognitive functions within the mind.
Today I have been mentally assaulted by computer terrorism continuously played in my ear designed to make me angry and again I physically watch my mother get hit in her back and mind electrically by the security grid trying to hurt me by hurting my mom. I feel helpless and angry and unable to fight back against what feels like government terrorism created by a security agency tied to government casting oppression into my home.
This assault on my mind started at 7:00 am this morning when I was awoken from sleep. With digital signals I have experienced thought patterns that are wiping my mind and implanting hatred through negative energy guilty by association, garbage.
I know longer think I am affected because I have come to the conclusion the process is dumb because they are just liars I catch in lies. I think this is an interactive computer program continuously speaking to me nonstop. I listen to the people in my ear and I think I can beat any computer sent to entrap me illegally because I am no criminal.
The programs I hear smell fishy to me and I think the digital programs are designed and written to crack criminals unable to succeed building a real criminal case on me. Not because I am smarter rather because I have no real crimes to charge me with and they must create behavior in me that creates language decline and illegal sexual or financially criminal activities because I am not a criminal.
I am careful not to represent criminal behavior or activities and perhaps why the people are criminals over staying the opportunity to criminally entrap me into crimes I have not committed or are willing to do or create.
I have never even thought of or could possibly commit. However being mentally challenged by a cloud light disorder making a person a little more depressed on cloudy days (250 mg vitamin b1 prescribed by the doctor changed this condition within my mind) S.A.D. and today I am on vitamin b1 and am on medication of .5mg Risperdal daily for my bipolar personality tendencies and increased ability to create logic strategy combined with my prescribed niacin vitamin b3 for my mild Schizophrenia condition diagnosed by 5 doctors in Ponoka hospital when I needed to recover from being haunted by the security grid unaware and why I understand so much today after going through the process a second time. The first time unaware and just chemical torture in the end lasting 2-3 years that created this brain I must medicate and fortify with vitamin nutrition and this happening to me after helping Canada help the USA after 911 is a complete violation of our constitutional laws in Canada and a slap in my face. I have books written explaining my life experiences worth a great deal of money and now the financial shake down for my wisdom worth millions of dollars is inside of my home. This terrorism placed within my father’s house I reside inside of is all about keeping me too poor to collect the payment for the softwood consulting I did for the previous Prime Minister Paul Martin that should have been paid last January for work accomplished safely insuring the relationship empowerment program I created partially written about in the President Fantasy Books.
Working to empower safely the trade working relationships with the USA and Canada I created strategy operations globally designed to repair and empowered the countries relationships legally through 14 month of work and over 1000 email operations sent to the Prime Minister’s office or Presidents offices and of course I received 21 thank you letters for work done safely and successfully passing on the new strategy direct by registered mail or e-mail to the Prime Minister’s office.
Why should I be a slave to powerful criminals when I have rights to freedom and liberty earned as an honest citizen and then why should I be brain farmed digitally illegally by another country or my country government?
Personally I think the payment will be made for my work according to my fee posted online during the softwood operations if I continue filing with my attorney.
(1-10% of what I save you in a commission based program and nothing if I fail)
The payment was made by the USA to Canada and perhaps why I am terrorized. Collecting 1-10% of 5.8 billion is almost too large a number and places too much incentive in government hands to hold me as a seamless digital slave today and avoid the payout or make me a criminal snitch.
This process has been done to me and failed on a fee coming late and should have been negotiated rather than security grid hit.
I like all political leaders and have faith in their ability pay a fee agreed to through sending me 21 emails from the Prime Ministers Paul Martin at the time in office complimenting me on my empowerment work for Canada.
I work as an empowerment consultant to the previous ministers in our seamless agreement unfortunately not cast to paper and my own fault when he asked me half way through if an agreement was needed when I picked up the blue buffalo card. I did not realize you were this illegal or I would never even helped those at the top and why an agreement was the best option in hindsight later in my life looking through this hour glass perspective.
Again government is busy and I am inexperienced and have not billed for the softwood work yet.
In time this fee may be paid or the fee associated to this audit science if the government wants use this report as an experiment rather than an act of war on a citizen as seen in this book.
I do not like my civil rights and liberties violated in a democracy and are thank full for the small disability pension I receive monthly from the government. The government may try to frame the RCMP into leveling me and like in most cases the crimes do not exist and they create a file I named the lost boys and girls whom end up fired or transferred after working on the case file. So many people have been affected working on this case file in a negative fashion after they fail in entrapping me illegally to insure I am incarcerated if possible and less likely to collect the fees I earned legally or mention my affiliations to past success stories with the USA administration.
Unfortunately I was not smart enough to get a signed contract on a covert collection operation however smart enough to keep a complete paper trail on all activities and enough class to insure people are not publicly humiliated if paying the fee is late at whatever settlement the government felt worthy of the work completed to empower Canada safely.
In fact I waited over 1 year before writing this report being attacked by the security grid and then re managing the attack into a positive energy sound experiment full of new leaps in science and psychology while writing this empowerment paper I billed for or book designed to dissect and empower safely closer to democracy freedoms and liberties operational within the security grid system in Canada today.
Working safely in multiple industries to safely empower the President’s team in the USA in strategy designed to help the USA economy and in return the USA would empower Canada relations and trade in both economies or in strategy to develop theory in military safety strategies.
I truly respect politicians and security or military people and welcome the day my work is completed and the fees I earned working 70 hours per week are paid.

January 17 2007 3:04

Tormented and challenged.
I hear the voices in my ear and I will do nothing.
A computer identified as the RCMP in Creston with authority from the Prime Minister’s office to take me any way they can is harassing my now. Unable to walk the street without being hit digitally I am unable to unwind or go back to work due to the fact they say they will pick me up for questioning on terrorism or fraud.
Hurricanes will grow larger than ever imagined in the USA as a result of this oppression preventing me from gaining an income due to me by my own government or for shutting down my positive energy empowerment network.
I am not sure why they think this is legal or ethical or even safe for the world to stop the environment control system I designed that in initial tests turned 16 hurricanes into 3 tropical storms.
I have been tortured with electricity overloaded feeling like a turning my brain into a psychological stew not of my flavor.
Attacked daily electrically juiced all day at least 7 times so how can I turn back my brain now. My telephone in my room is turned off illegally. I am no terrorist or criminal and they broke the law entering my home illegally according to my way of thinking.
This is why my program is on hold to empower faith or repair environment. Unable to pay me money because criminals only want to steal my work and not pay holding me as a slave in my own country while they rape my sister with holograms and hurt my mom or so I am told in my ear and how these animals hurt me mentally.

Example

Delusional Thinking
During Government Psychology
Attack on My Brain

I am even ashamed to say I am Canadian represented by such criminal behavior surrounding my family safety.
No sir they mentally beating my family illegally.
Environment control program is real and one screw up after the other since others got involved and refused to pay me any funding and yet make me break to cover illegal actions taken on me and my community.
They took away my weed and broke me mentally into tears 5 times why?
Why destroy what would have just gone away and now no environment or faith program?
I am afraid of losing the family bond of love and trust found within the Christian foundation of marriage or the innocent love found in two people who may have searched a life time to find each other and build a Canadian family to avoid the country becoming taken over through immigration required to fuel the economy and standard of life found predominant within Canada.
Sir hiding the mistakes will create even more problems.
A prime resource mismanaged by people so dumb it is unfathomable even to me.
Sorry to bother you. My rent could not even be paid to my dad and again he supports the program empowering your country and mine if you are the USA who knows and he too is terrorized now for helping. I supported Canada for years and they shared with you and now no one want to admit the work happened or even pay for services rendered and why even the military is smeared. I know military did not hit my mom and sister.
Every storm will cost billions similar to Katrina. I stopped 16 potential hurricanes hitting the USA and you 3 tropical storms. All this because they think I will be a beach bum if I get paid.
A scientist with a system to shape storms on the earth sounds a little strange on the surface. See how dumb these people really are sir? There is a little more at stake when I have the ability to shape a hurricane. How foolish or lack of responsibility am I when I write the latest science research successfully.
Stanley Park may have been leveled as a result of the actions taken on the faith movement and so was the California orange crop in my opinion.
People so stupid in science it is ridiculous to have the fools manage me claiming to be Creston police with no science. Is this dumb and expensive or what? I will get off now and the people involved understand why this is frustrating and costly to both countries covering up this con game for taking free ideas and not paying me for services rendered not requested initially.

January 18 2007

The voices are trying to entrap me again and I finally discovered why they hunted me.
I found out I was terrorized in an actual terrorism break program and it is silly to see why but it was 0065plained to me by the voices.
Helping 125 Lebanese people in Alberta Canada
Who own the Burger Barron franchise doing an herbal program through my created subsidized herbal health care program I created within the Neway’s Canada and USA multi-level marketing structure allowing a person to make the 10% over ride if the person under them was sponsored. Rather than going wide in the multi-level marketing structure we went deep and then wide and the people were not selling and only consuming because they really need the herbs to feel better. We recruited over 200 people who did not sponsor and only wanted to feel healthy and then I left the research to move to Florida.
I created a subsidized herbal health care program that only works in a multi-level marketing program. My friends I helped doing philanthropy work. My ability to hurt other or make money off of others is limited and why I am in this position today.
However my heart and love for humanity is not a disability and I was able to help many good families find comfort and health through an herbal book I have created explaining the product or clinical disorders and potential herbal repairs.
The scientists in the labs in Neway’s helped me pioneer this work to lower healthcare costs through education.
I have a down line in Neway’s found under my social insurance number and was sponsored by Frank Armstrong living in Winnipeg Manitoba today, my sister’s unattached previous husband.
Anthony Robins is a mentor of mine for over 10 years deep inside of my master mind and when I needed mental guidance I gained a foundation to the interest in Nero linguistic association behavioral think patterning.
From his work creating the genius that made up the Unlimited Power programs.
I created no money on either program however helped a great deal of people get more out of life.

Jan 19 2006

Taking 3 days off to clear my head to insure I still wish to work.
I am terrorized again and I feel him come in my mind with giants wet gooey balls of verbal oppression holding my arm tight digitally. Held by a person with a hard on larger than his or her mind I am wondering why?
I do not wish to contact you however my friend Dick does not have enough clout to control the person terrorizing me with digital terrorism.
New charges and laws will be developed tomorrow to identify digital terrorism as a criminal offense according to the suggestions I made this evening or so I fantasize in my mind unaware if reality is real or delusional, under the control of the security grid oppression system in the little town no one ever leaves for long.
Again the person will create a 4 day holiday for my decisions and I will not offer my opinion if the terrorism on my arm is not slowed and every day a new day will be added for the digital punishment violations against my body specifically my arm or my heart.
I apologize for the interruption and do not feel the violation is required against my physical body.
I will not be charged legally with crimes I have not committed and am a free citizen losing interest in empowering any people or the environment control system I designed and invented. I may not even go back to work for long time due to my parents failing health living in the digital sat system.
Very unhealthy for the human body and immune system to become a sexual body slave wanting to climax and touch man or woman.

February 3 2007

Intestinal torture is a different form of torture. Stopping the urinary track or digestive track from functioning may be hard on the body however endurance tests in my mind. Collections of large amounts of money are never pleasant if the people owing you money are more powerful than yourself.
I have experienced 25 days of torment digitally and electronically so far and in activities so humiliating I have been taken into tears rolling down my face.
Broken brutally, mentally by unknown people through digital torture technologies six times and all designed to stop me from pursuing my collections of softwood funds.
As I continue to write I feel the mood change in my mind and now my thinking is changing and I feel more like a little male slut who loves pain sexually every day deep inside my mind and I am feeling out of control and do not know why and now I have to masturbate and fantasize about sexual intercourse with a past lover while the voice speaks sexy words to me.
Told by voices in my ear I am being investigated for terrorism. I have been hit with countless hours of torture mentally digitally and even sexually wild with the voice in my ear trying verbally to convince me to admit to crimes I have never committed.
I have learned the way our community is under attack with digital terrorism and completed a diagram for the RCMP and copy of my books written to help my community and delivered the book and diagram to the local RCMP detachment with my reference letters cd from the government.
I hope the data file left with police will also serve as a valuable tool in collecting my fees from the government.
Protecting others in the community under digital terrorism attack is unthinkable considering we have never been under attack in my life time until now.
I also went to community peers and made them aware of violations to the civil rights they appreciate and live by in the community.
The vitamins b3 niacin flush I have eaten in front of the owners of Pharmasave did not flush my body and being a home schooled scientist I wanted to confirm my findings and entered the store a second time, only to find the same results of a no flush symptom on the niacin flush product.
I also tested this theory on the same day at the vitamin herb store in town and found the same result with the niacin product to be a no flush circumstance achieved.
I have never terrorized my friends in town and have letters of reference from Pharmasave owners for building painted for them and letters of reference from Bahamas Hardware Store on my character in the community.
I also have a letter of reference from Black Bear Books for the painting of Alison’s personal home and fortunately where my books have been offered for sale in the local community. My reference letters are also from Nu Floors in Creston and have painted Ellen and Randy’s personal home years ago.
The mental aspects delivered inside of the triggers and mental anchors attacked by the psychology torture is brutal and tonight I wondered whom was hunting the President and Prime Minister of Canada using me.

Going Delusional Again Under the Duress

I mentioned Peter Mackay and another person in the USA. However the Presidents team is solid and the faith movement was stopped. Ten minutes later the hard core on me in my bed attacking my brain. This is the 2nd time they attacked the President shutting my programs down designed to repair the Bush name. A general perhaps in the USA that was involved the first time or Rice and Cheney or Rove. The pool is smaller and smaller so they will be nailed sooner or later. Or sat box team in charge of taking me down? Whoever went hardcore on me tonight may be the ones. Trace whom is involved and you find out who is guilty of attacking the g8 idea empowerment programs.

February 4 2007 1:00 am

Again I am awakening to my back and neck being dislocated slightly in my bed and wonder how the spine is dislocated in 4-5 spots in my back.
I have reset the bones in spinal cord located in my back 5 times in the last hour and have received very little sleep in the last few days. I am told I will not sleep all night again and my torment is for the report written on the people I mentioned whom I thought may be attacking the President and Prime Minister. I am sexually harassed with a hard-on on my own body and feel my prostate gland under some kind of digital attack as the pain fills my mind located around my sexual organs being done against my will.
I am told by the voices in my ear I must sexually come or my prostate will explode or be damaged.
So I go to my bed and pull the covers over my face and slowly cut the oxygen off to my body why I play with myself and masturbated fantasizing to a music video or sexual pornography I have previewed to offset the images dropped into my mind by the security grid of child pornography while masturbating just as I am about to come. I recalled in my mind from days gone by the pornography or music video and change out the penetrated images in my mind created by the security grid trying to get me to go into sexual physical crimes with children I have never been a part of to my knowledge.
Later at 7:00 am with 1 hour of sleep in the last 24 hours I am awaken in pain and need to set 6 joints in my spine because my back and neck are aching in pain and somehow was dislocated during my sleep and again a blazing hard-on between my legs.
This is sexual interrogation is bizarre and new to me and why I write out these peculiar encounters with a person on computer I have never met. I am told my friends have sex daily and sleep most of the day away and I can only wonder considering the sexual arousal I feel myself between my legs and in my mind.

Feb 4 2007 3:04

I have formerly requested and reached an agreement with a supervisor from the NSA or Secret Service to stop all communications and move on with my life. I was told this was there objective to train me and agreed to resolve any financial agreements with softwood next week and sign a document I will not sue people for the crimes against me personally.
This may take a week and recommended any person unable to adhere to the supervisors request to settle the issues peacefully be hospitalized for 24 hours supervision analysis by a qualified psychologist in a proper mental health care facility.

Digital Mind Coach Program

For a week to rebalance issues created by the computer terrorism programming the terrorists are following will make them more powerful.
I will log all violations of this agreement with the Secret Service according to the voices in my ear and as of 6:50 this evening. I am moving on with my life and recommend all involved do the same.

February 4 2007 7:05

I truly love the people involved as they love me, however we have never met and a relationship is a 2 way emotional connection digital feels like a real woman is speaking with me.
The computer programming you have taken involves 1 way relationships as do my music videos. This is an easy relationship to break in the digital voice terrorism world and today I have no fear however later you will see the powers played on me by these digital black widow spider ladies and gentleman.
The music videos were created for this encounter and in a request made 9 month ago production created to fill my computer. The videos made by people emanating red and white or green in videos they show the expression of freedom of speech and are made for me in red a white to honor my country colors and because I asked the musicians to write songs based on the theme material found within my written work published online globally. These videos have a great deal of self-esteem and self-confidence when I watch them and think woman and men as powerful as this would honor me in my work and sing folk songs of the times in battle for democracy liberty and freedom today. This happened twice because I empowered Hollywood musicians and actors in USA Britain and Canada twice to create the momentum for the customized music videos or movies in Hollywood north and south.
The digital programming and you have learned to love and grow fond of due to the positive energy acquired from viewing the programs.

A replacement exercise using,
“Digital Mind Coach Education Programming”
May be more stable to a human relationship will be beneficial and build a relationship full of positive energy chemistry and love. I am only an image in your mind full of warmth and kindness and can be replaced with a pet or other digital cognitive replacement programming selected by trained psychologists interested in protecting the human resources involved within your organization.

February 4 2007 7:45

Unable to find mental privacy away from the voices in my ear I try break free and study without an intrusion but I fail.
The voices tell me I should not learn or think and asking me to study another day and again a violation of the peace treaty for privacy in my own home and another tactic to rot my mental resources thinking strategy solution muscles within my brain. This will let me rest on my mental laurels and eventually make me appear quite dumb due to the laws of science
(If you do not use it you lose it and in this case overloaded in negative energy mental stimulation it is your brains cognitive problem solving skills your losing by shrinking your positive attitude theories in your brain and your mental creativity, performance and the ability to make your own decisions or plan positive energy related goals and eventually a home in a nice easy to live in mental institution where everything is done for you again.)

February 4 2007 7:50

Words added to my information designed to frustrate and asked to discontinue and again keeping all dumb and manageable in oppression rather than empowered personal performance or education.

February 4 2007 8:25

Speaking to a man whom claims they received a onetime fee to work for the NSA and in doing so lost his personal finances to the security company intentionally and now works for the security company expanding the security company personnel free.
Unable to speak with human beings I recommend going to bed and turning off this computer of mine.
When he is done by the security grid and seeing his supervisor tomorrow for direction and guidance the story may change as the security grid computers control most of the behavior in people unaware the program is even operational in their mind.
My opinion is of little value and I feel the program if displayed in reality is mentally dysfunctional for the brain and creativity or performance skill creation.

February 4 2007 9:40

Trying to play cards with my mom I am harassed again. My neck is out again and I am told I will not be harassed again. Everything from a lady in love to a sat man to a rep leaving the valley saying good bye to the President saying he will no longer play this game.
I did not finish my card game with my mom at the kitchen table and feel my brain may be damaged from the digital signals that hurt my thinking abilities and will consider a psychology test to insure I am fine in a few days especially if my short temper and harassment continue.
This is a war crime to enter my home wielding digital terrorism in my mind.
I think the program these people used provided by the government find mental health care counseling.
With the supervisor or human resources people to prevent further interaction with me in any shape or form digitally or in person.

February 4 2007 9:55

I am again tormented by a person unwilling to leave my personal environment. He appears lonely and I am tired. This entire file is for attorneys and police to receive if I am not left alone in my personal home. The larger the paper trails the bigger the settlement. I will not sue people however the blatant lack of respect for the law will be addressed sooner than later. A high frequency pitch has been sent into my home environment I thing through the electric power grid plugs in my room while I write this email.

February 5 2007 7:30

I was awaken by a voice in my mind stating if I entrap myself I will be protected for life and if not I will be terrorized again and again until I go insane. I am requested to sign a document later in the week from the President of the USA that will protect him legally from this mess and will not allow any legal action to be taken against him.
I think this is propaganda in my opinion and again digital terrorism overflowing into my home. I explained in my mind that I follow the lead of my Prime Minister and believe no man or woman is too large for the long arm of the law.
I was told the crown attorney has read the files and again I back the crown attorney and again if this is so he or she has a complete paper trail and I will not be called to testify.
I was also told the Prime Minister and Governor General are cooperating and again I believe this to be propaganda because they are smart and most likely cooperate on a daily basis.
I will make a movie and it may be fiction or a documentary with fictional qualities like my digital copy written work I have written to date.

Walking Behind Schizophrenic Eyes
Digital Mind Coach
Discover How to Control Ideas Decisions and Affirmations 14 E Book series
President Fantasy Spy
Fictional books 2 in publication
And 3 in draft form equaling 5 books
And notes to complete another
4 totaling a possible 9 books in the war story series
Planet Genesis Operations Experiments
Science Experiment in Quantum Energy
4 book set
Insanity Art Creates Painter or Canvas

Chapter 5

Dignity

The Security Grid Creates Energy

(Katrina capable energy creation machine)

Creating new behavior patterns overflowing into negative energy behavior in people also is affected within the universe creating cause and effect science synergy reactions within the universe and why your science energy flowing off of human resources actions taken through the application of negative or positive actions, may cause and effect paradise or devastation on earth.
Guilty by association to daily operations full of created negative energy adds to the fueling crime or corruption naturally on the street or in government. The energy source you wield daily works with me either creating honest behavior creating an angel or a walking devil by making people liars and thieves.
All of the digital copy written work I produce is protected by 2 licensed copies of Microsoft operational systems.
When I did seek counseling from an attorney I was hit with the security grid so I stopped the query as to, could I file an invoice for softwood work I completed consulting for the Prime Minister’s office and if so how can my attorney help me to insure I am only billing for services legally created as I have no written contract in place to honor work completed for the government.
My written work is art or science or fiction and my 1st amendment right and a liberty in the democracy. The democracy I reside in today and have for over 46 years is under attack through implanted security policy and protocols manufacturing an overabundance of security protocol domination oppression negative energy into the fabric of the psychology and the Canadian environment.
When the security grid creates negative energy you create potential for environment disaster because the negative energy applied to the psychology of the person slows the positive attitude and creativity and performance psychologically self-perpetuating disaster planning that creates opportunity through incompetent thought patterns or dysfunctional thinking naturally creating criminal behavior and the self-destruction of our human resources.
Expanding tourism potentials in the country is possible if more positive energy is flowing within the country economy or the economy can go negative energy stimulated by an oppressive police state bordering in criminal negative overloaded energy patterns and make the country self-destructive depending upon the way you build wealth within that country.
Positive energy operations or negative energy operations, freedom, liberty, dignity are positive trade tourism expansion energies that grow and evolve in positive energy environments and domination negative energy oppression, hatred, greed, jealousy naturally discourages travel naturally creating a lack of tourism and gdp dollar growth cycles or investment into that country for fear a person would all the investment they own to a digital security grid shakedown program making them do all the funds rather than partial funds invested.

The negative energy created in the bombing and death toll in my theories in science lead to believe Iraq negative energy cause and effect created Katrina (and the behavior associated to the rescue or enhanced devastation if the levies were blown up with explosives during the storm)
The security grid will create many circumstances cause and effect based on the psychology strategy being domination negative energy or peace empowerment , integration, graduation and accumulation strategies unfolding hitting the country environment cause and effect out of the universe created cosmic storms brewing daily within the infinity of the galaxy.
The security grid constantly releases negative energy into people and environment through domination oppression shakedown mentally and this cause and effect produces negative energy in the actions of those people assaulted or mentally raped with the security grid system. The idea is to empower the country and economy and this is possible if the security grid operations flow in positive energy verses negative energy and why Digital Mind Coach works. The psychology naturally creates a positive energy graduating toward faith enhanced within your sole as you parlay more positive energy ideas working love or empathy or harmony expanding IQ and potential human resources psychology powers within that sole.
This is an example exchange in the mind that can make you dumb and the most unproductive creative person due to the constant overloading of negative energy deep into the mind. The negative energy stupidity forced into the brain of the person targeted by the security grid that has gone into planning the negative energy criminal side of the country homeland defense security grid with no regard for the long term success potentials of Canadian human resources or country resources.
The beauty of a negative energy war is the strategy is done at no capital costs implanted in influenced security policy after 2001.
The new behavior patterns associated to the new security policy and procedures allows you as a person to step away from your integrity and to abandon the oaths taken to register in the policing security field, you have selected as a career. Setting up a small numbered company to collect the legal benefits of business opportunities for overachievers in the police force looking to get financially ahead is a better idea and may also slow the growth of negative energy snitch programs operations crippling people created by a covert seamless invasion of Canada.
The contacts creating the snitch program are now controlled by police and economics potentials of the person are severely by computer making the person think they are not as smart as they were and grid controls the intelligence so do what we want and lose that creation expansion or performance capability of that person on a nationwide basis and you drop the IQ intelligence of that country making them naturally dumb and corrupt and easy to buy out or takeover. Through citizens in contact with the security grid reduced lowering IQ is created revolving in sexual digital stimulated sexual masturbation with a sexy voice speaking to you in your ear and now you make that person manageable. This is determined by who will crack under financial shakedown oppression on whoever is worth the most in the town community in skills or assets.
Control beyond democracy laws as opposed to who is a criminal qualified snitch. This is a dangerous negative energy game to play with a town economy or country reputation that self-fuels investment and tourism or gdp growth cycles.

The positive energy side of information to prevail in sister programs implemented within the security grid mentioned later in this book will help smooth out the energy balance and empower the country economy.
Positive energy programs operational within the security grid designed to balance the quantum energy and civil rights and liberties of that citizen with the luxury to freely use all of his or her brain faculties rather than have the faculties in that person, used as a blackmail tool against them to say, I make you stupid if you do not let me shake you down legally for your property or cash or sexual interaction with your human body. As this is grandfathered into the country fabric created through the security grid making financial and emotional rape an acceptable security tactic behavior in Canada.
By figuring out who has sex with who based on what the police can do to empower that citizen by taking everything they have making them controllable and not independently free in a democracy.
The psychology of the nation further crippled through digital oppression shakedown and by leaving a security system in the home they can hurt or have digital sex with the person if they desire and take over the fortune they own and make them work for free oppressed directly for the police doing favors or community intelligence.
If the psychology goes positive the person is empowered and then the IQ expands and so do the nations reserves and the lifestyle of that person as more and more positive ideas and actions create the super power mental conscious capable of high levels of performance or IQ education.

Within the fabric of The Canadian economy a new culture may emerge to facilitate the opportunity to meet others safely through this computer age of new advanced technologies.
The tourism dollar will fall when the world realizes if you come to Canada or any other with this security you may lose everything you own and may never leave your country borders or town borders and this theory alone can crush the tourism industry globally capsizing the airline industry sending the earth spiraling into depression and devastation hurled into a world of negative energy corruption fueling Imperialism setting the ground work for the world population reduction by 50% if achieved. When Imperialism reined supreme 50% of the population killed each other off and then your high standard of living will drop dramatically as the markets collapse unable to do business as usual due to computer problems and as a result you may never recover the high gdp market numbers with less population and the world in shambles.
Slowdowns when the creativity and over performance of a nation is dropped due to over exposure to negative energy.

February 16 2007 9:32

Threatened by the digital seamless voices in my ear that I will be killed me if I write further.
This is an ongoing part of my life and a digital trail of these criminal threats in a network is a legal paper trail of all involved in breaking the laws of the land, designed to create digital terrorism and war crimes against a civilian residing in Canada.
Actual Dialog File Example of the Digital Messages Communicated to Me Inside of My Ear

February 17 2007

Computer

You prick you know you’re done.

My response

This is another cruel term used often in this covert espionage economic challenge place on the Canadian plate and the backs of the citizen.

Computer

OK shut the fuck up
You will receive not a fucken thing and we will kill you tonight.
Good day.
You fucken idiot
You cannot write this we are security with a Presidential approval.
We are using the NSA name for our income.
Your right we are secret service or anyone we choose because your dead tonight you fucken idiot.
Thank you good day
He is so polite when the voices choose to be.
Ok that’s it you’re really a nice guy as well
Good bye.
These are interactive computers designed to be nice or nasty depending on the information gathered.
Good day.

Computer

Ok you bastard I see how you play.

Response

We will torture you all day again using digital covert computer driven software created by Nassau manufactured to create a takeover of a country in security by a new software program software application created in the core manufactured by Microsoft for the good of humanity.
This is my personal opinion only and has no evidence to back up my opinion theories.
Go away and never bother us
My left knee hurts please release the grip.
My arm is often grabbed as well and asks you never to touch my body with this government technology.

February 17 2007 10:06

Computer

Now I am thought to be a mole.
A soft fury animal designed to live in the forest in my mind however
I have learned this is a program to catch criminals.
I have never heard the term in this light however the computer voices may be right.
A sucker created by government to clean the government, never paid and incarcerated when finished like your dad whom never was incarcerated during the Robert Pucket program designed to capture him and was completed and never explained to your father. However the Canadian government realizes this and will no longer use this program on your family. From security system programs to mole programs you have been used by the best and beat the best at screwing society for personal gain.
Thank you good day
You really are the best and a dead man by morning and how these mole programs end covering up all lose ends
However you were smart enough to use advanced psychology and computers to protect yourself and nail those bothering your family legally.
Through the softwood collections scandal done on your family by all politicians involved in the USA, Britain and Canada.
Personal opinion not researched by me.

However this is only a computer terrorism program designed to create conflict and the demise of reputations and powers wielded globally by western democracies globally.

February 17 2007 10:19

Computer

This is no joke you’re leveling the western empire.

Comment

I am not responsible for your behavior and according to you a mole on your criminal activities and cannot take responsibility for the crimes created by you or others violating the constitutional laws of the Western Empire democracies.

Computer

You fucken idiot you’re a dead man.
No your dead the next time you type.
We have software in the big computer that will kill you instantly and then we will relocate your dead body to Afghanistan.

Comment

Why?

Response

You fucken idiot you’re a military mole.
I am mentally challenged and you are disabled from criminal activities more each day.
Do you believe this to be true?

Computer

Fuck off
You’re a dead man by sun down.
Your right what a movie this does work.
Now shut this fucken computer off or you’re really dead tonight when you go to pool league with no government security protecting you.
However you have the protection of the RCMP and Cesis. You really did not know how to spell Cesis

Response

No

Computer

You’re no mole you’re a citizen
You’re a patsy for the government with a paper trail worth billions.

Response

Is this entrapment and are you legal?

Computer

No this work is not entrapment; however your no citizen or you would have written yes.

Response

Yes

Computer

I like that best because you are a citizen of Canada born in Melville Saskatchewan in 1961 on June 4th at 6:50 am.

Computer

You really are just a citizen standing up for your country legally and morally correct. Not breaking the laws and why you ask is this legal after all you are no lawyer or ever have been.

Response

You are very wise and a genius
In analogy in your field of computer driven interrogation that is legal and so is this case of crimes committed against a legal citizen of Canada.

Computer

Fuck
Your, write, stop writing.

Response

Stop building a greater case against yourself and others associated with you.

Computer

You fucken idiot now you are dead and have no friends other than the ones you choose.
Were fucked and this is no movie and real.
Good day
You will no longer be under investigation.
I do not believe you you’re really just a citizen of Canada screwed for 5-6 years by government politicians and security
People entrapped in protecting you investigating the government.

Response

Did you yourself call me a mole?

Computer

No you’re a dead man by sun down.
Sound on computer ping noise

Response

That’s me and you’re too valuable to kill according to the crown attorney’s office.
Thank you good day
Save this and get off this computer.
You have done a beautiful job and will be rewarded in many ways possibly by your country one day.

February 17 2007 11:15

I appear to have created a good program for the civilian in society. I am even referred to as a freak of nature and what was needed to clean up the government operations crippling the financial resources and potentials of the Western Empire. The Middle East Empire in the time of peril of civilians held for ransom by oil companies and war stock companies owned by politicians or people in high places in security of nation’s resources.
A mole cleans up after the case is made creates a report to explain all activities interlinked through government computers and the minds all involved whom touched the mole.
A secondary government is a dangerous program and perhaps a valuable lesson for those who try to run for a control position in society and truly have no ability to lead or those would have been elected and placed at the helm.
I am no leader or mole just a citizen with a case to empower the Western Empires Resources catching those filling their pockets at the cost of the tax payer.
In my conclusions of research completed I found many cracks in the operations strategies and policies of government that created the opportunities of criminal activities to emerge that have financially crippled and created the demise of empires in history and why I created the research.to repair the situation if those in government or military or national security choose to implement them legally and safely.
From a core policy in the C.I.A. named the knock program to the operational strategy commonly referred to neo conservative domination.
These operations interlinked have killed more people and created more debt for the empire that has seen in years. “Walking Behind Schizophrenic Eyes” explains what happens when a C.I.A. knock has been used up in the minds of politicians or security directors and this book has repaired this crack.
“Planet Genesis Operations Experiments “provides a new strategy to replace the strategies of domination that were increasing the gay population and using Christianity for personal gain.
“President Fantasy Spy” is another series of fictional fantasy operations appearing real that helped play a role in repairing the self-destruction philosophies created to offset the theories of domination wielded by the Western Empire.
Creating an interaction and self-destruction
principles by Bin Laden implanted into the
Muslim and Arab faith
to create the electoral scam
and security focus on humanity verses
the tourism gdp or investment strategies founded by the forefathers of the Western Empire.
“How To Discover Ideas, Decisions and Affirmations”
is the
Digital Mind Coach Cornerstone to the cognitive behavior repairs the mind. Naturally gluing the mental fabric of the mind in psychology cracks that need to have ideas
to get back together in the empires affected by this policy forced upon Israel or other Middle Empires.
This digital Mind Coach through the internet made many friends globally. The strategy found within the books
May have been picked by countries like Russia
to help avoid the negative energy psychology
that has sent financial waves into the growth of the Russian Empire.
Again the Digital Mind Coach works may have been picked up through the internet and never forced upon China
And only pocket ideas to strengthen of the Empire on contact as 250,000 global PDF files
in empowerment circulate the earth in cyber space providing information to help people globally.
South America and Africa and Cuba may have been
effected and repaired safely through applying philosophy in peace or a stronger tie to faith and like in the USA Christianity grew as more people found a positive energy psychology application to help them feel better about the way the look or see the world around them daily.
The files are never delivered in person and available in many peer to peer file sharing programs globally free of financial charge.
I have crafted the repairs in society and government in my work within the last 5-6 years of my legacy in operations only to find a fight for corruption to stay intact verses law and order.
I personally believe this report will reshape society policy globally to empower wealth back into the world and safely incarcerate those whom choose to violate the laws of the democracy constitution they represent.
Your own forces
will find those involved and punish them
internally and in doing so may reshape democracy and liberty and freedom safely.my work in the mentors of the children in philanthropy has been illegally damaged and so have the people involved whom stood up to save the empire working in the industries of music or Hollywood movies or television shows and the wrestling industry.
I have a complete paper trail of the empowerment given to the industries to fuel more tourism, gdp, investment within the western empires or globally in empires around the world. Many laws were broken stealing my work or crushing those involved voicing a 1st amendment right to protect and empower the democracy they live in legally. Again war crimes against civilians wielding government employees and technologies illegally violating the core democracy protected by our forefathers whom died creating the world of freedom we live inside of today. Our laws protect us all and in doing so prevent people from suing the government when you work for the government however if you families are violated they did sign that right away and you have every right to sue those hurting your family’s covert to control you. using their names in the law suites are legal and ethical according to the laws of democracy.my reputation as an honest citizen is exemplified by my track record in reality and if the report is illegal you know this is not my work.my computer is often violated illegally since i am no agent of government or military and only a legal private citizen that will proof read the document and retype the final version on a manual type writer if required to display my true intentions and emotions.

Chapter 6
Valor

A dangerous game to play with Western democracy if the energy in the environment goes out of kilter and in this information book we look at potential cracks in the security grid and possible ways to empower or protect the security grid.
Pet peeve is they keep slandering the Vice President creating a Nero Association he is the man behind the game and will never pay because he was never paid years ago. This builds a character crack in my mind when hit so often and if conflict with the USA it may be enhanced by the slander in the messages embarrassing the powerful people I see as friends in the world.
They slander my friends while molesting me in my bed with digital software creating the ground work for a rape mentality and because the feeling is incredible sexual high I find a new partner in a lonely bachelor’s bed at night.
Sad day for democracy and yet I am not sure because every coin has two sides and the more open minded the more all will benefit in the end.

Crack 1

If you buy cloth the manufacture were you purchase is targeted and sold fabric and thread that is security system ready and your clothing is the weapon used on you somehow in the tread or fabric?
Because new clothes that are wired with electric thread have music potentials like the new ski wear for downhill or cross country ski so will our regular clothing enhance by technology be a source of taking and receiving information globally (like walking satellite transmitters).
Also the fabric is charged electrically at night in your closet somehow through the electricity loaded up in the home and even old cloth may carry this invisible charge however new fabrics have new potentials when combined with extra electricity in the room and satellites overhead shaping decision or digital equipment sold through manufactures that also have transmitters in old and new products.

Crack 2

My sister is turned against my family to smear me even though I am drug free at this time and she is told by the security system to stay away from me or so I am told in my ear and to stay away from her and her boyfriend, naturally splitting up my close family values.
This is a snap shot of what the USA operation to invade Canada is all about. A psychology program combined with digital to insure we all hate and do not trust each other daily. Using psychology technicians they rip apart family daily in Canada and then police and government.

Crack 3

I am building my references to prove I am credible and the Prime Minister and President connected to me are credible. Unfortunately I have been insulted and terrorized all day and have asked the so called people online to leave my home forever and stop bothering me in my ear or in my imagination.
However the security system people feel they are more important to insult me and threaten to use satellite technology.
Digital signals designed to hurt me again tonight or sexually molest me again, as I grow more and more fond of the pain and explosion of size in my penis between my legs when I am done mentally and the addition of pain under my balls simultaneous in the heat of sexual masturbation, encouraged me to enjoy the pain and have a more powerful orgasm all over myself or in a sock over my penis. In my minds state of turmoil I feel these are people taking out the PM and President and have proven this fighting me covert all day. Jealous of my reference compliment letters from Prime Minister Paul Martin they have entered my computer illegal claiming to be the best of the best the President has to offer.
People claiming to be Police unable to back down and to mentally ill and telling me this is a training exercise and what a lie. Stopping me from peeing illegally in my home and telling me I will die. I am used by RCMP to clean house verbally on people against my free will.
A terrorism group with too many mental disorders in Creston out of control not in control by police due to terrorism placed on the police in a satellite technology program, in my mind holding wife or child hostage in order to get the man to do a crime to be controlled better. I will try again to email Jack Layton.
Illegally trying to get out of criminal activities against me as a legal citizen claiming this is a training operation and all they are doing is covering criminal behavior in the police department and government.
Now told I will not pee until tomorrow.
Again I am threatened to be dead and again this is criminal activity in my home and no protection from police to stop the home digital terrorism or harm against my body.
Physical abuse seamlessly digitally sent toward my mind and body. This is no game or program or training program, these are computer programmer terrorists and possibly on satellite in my town and home and illegal as all terrorists are in my mind.
Especially being a previous seamless Prime Minister aid for Paul Martin with 2 compliment letters from Prime Minister Seven Harper sent by Sanchez to my internet email address.

Crack 4

Creating anger in a community is possible in many covert ways once the grid is in place within the community. Sexual interaction with other people is possible and making people angry or jealous if they believe this to be true is also possible. However people do not move through the grid by themselves and a computer technician is required to facilitate this response. I tested this theory and find the terminology to be time travel and a charge that is not even on the books is implanted psychologically in the targeted persons mind by a computer technician interrogating the targeted person. This is psychology cracking program to create mental dysfunction in the targets brain using a fear psychology cracking program. First a sexual image and an emotional connection to doing sexual masturbation is created by enhancing the persons desire mentally to interact with the targeted individual. This is a hologram created when the electricity grid on the building is raised illegally.

This is illegal because the home has a 220 electrical current and overloads the body with 220 electricity if the dryer and washer is both functional with a satellite signal similar to my bathroom because the washer and dryer are both located in the bathroom. I could see my 74 year old mother getting ill and weak doing laundry while I was being stimulated until my palms sweated in my room or other areas of the home. I believe the immune system is weakened in this interaction and without proper desire to eat or vitamin potency actually changed the elderly person gets weak and actually could die premature unaware of the issues and if no will has been created the property then reverts to the government. The vitamin is controlled I believe by a satellite in the sky that can target the potency of the vitamin and its effects in the human body. I take doctor prescription prescribed niacin b3 to help strengthen my brain believed to be partially schizophrenic as diagnosed by 5 doctors and have taken niacin for 3 years 3 time daily 1000 mg dose and understand the human flush in the body and was not flushing after 9 am in the morning. When I have taken my 12:00 formula I previously flushed taking the product for 2 years and only recently started flushing after 6 pm after I placed my documentation in the RCMP office and written my book detailing the torture I have experienced for 26 days.
I also found my vitamin c in pill form non chew-able was not as effective as a flavored chew-able vitamin because I also take vitamin c to strengthen my brain and fart more often on chew-able vitamins and not atoll on pill non chew-able vitamins at 3 times daily 1000 mg dosage 3 times daily when I have taken my vitamins. I also found the vitamin strength changed on the shell at Pharma-save pharmacy in multiple vitamins
Vitamin strength reduced rather than my 48 item multiple vitamins only 37 unit vitamins are available and today in fear the store carries a 20 mineral vitamin nutrient vitamin.
I tested the niacin on 2 occasions in front of Steve and Mike whom own Pharma-save franchise with their father. I walked and took the niacin off the shelf at noon and eaten 1000 mg of niacin and did not have any flush.
I also tested the niacin at the herbal shop on the same day the first time and did not flush.
I did this in front of the both store owners and they witnessed no flush. I do not want to be blamed for scaring people and did not do this test again and notice the vitamins in my room at home can work on command when the people terrorizing me allow them to work and flush my body. I am not sure if medications are effected and believe if they are you can take over a town in a very short period of time not using helicopters and tanks or guns. A seamless invasion to facilitate the property exchanges as payments are due and never made while reverting the property to the co-owner if the partner dies prematurely legally.
I also believe the allergies can be created in the furnaces installed in the town by placing a sending unit of some kind that actually dries out the air and in doing so takes water out of the body naturally while covertly encouraging the person mentally not to drink water using a digital signal through the Shaw cable or computer signals or a satellite in the sky over head not renowned to the person being encourage not to drink the water.

I have seen my 74 year old mother develop an actual dislike for water she did not have 30 days ago. I have also witness my father change behavior while watching television feeling the electronic signal coming through the television or myself through my television.
From sad to angry to being a sexual predator and in fact a child predator emotion based on the dreams encountered and interrogated in the morning to defend the dream with verbal integration and then this emotion changed if I am a good boy and comply with demands or built upon in the mind seamlessly nightly until an illegal action of sexual molestation is actually created by the person being targeted. I believe the first targets are police in a community under invasion and then politicians. Later on citizens focusing on pensioner small bedroom community towns and eventually larger cities under the impression the grid security empowerment program is good for human beings and policing security.
Unfortunately the criminals are empowered more violent and the street becomes hot and out of control slowly daily by satellite signal focused on people using intelligence gathered out of K division computer authorized by grid security cleared people seamlessly similar to Edmonton.
My personal opinion only,
Based on the personal experienced situations occurring watching television or working on my computer and being mentally tortured to be broken illegally in my personal home. Also used is the satellite signal off star tack satellite dishes and high frequency sound sent through the electrical plugs when the grid is up to help shape your behavior even more dysfunctional if you fear for your child or wife safety.

I have also watched my mother turn into a lady that is unable to count a cribbage hand and then if I am compliant she is the genius again and her hip is put back in or lower back fixed at night. The same lady whom had her knee snapped in a so called accident on the deck slipping.

Crack 5

Electronic stereo equipment and headphones are also used for communications once the manufacture is decoded. My mp3 player or old Sony cassette sports Walkman is also volume controlled sound after the signal is tapped by satellite. The television flat screen can torture or even kill and so can stereo equipment as can the software used to create pain or strike the heart or brain as my brain has been struck until my right nostril bleeds and if unconscious by satellite I may actually bleed to death.

Crack 6

A metal star piece on the shoulder or chest is satellite capable to be hit because the metal is a conductor like glass is a conductor of energy. Perhaps papier-mâché medals of police or solders will make the person less susceptible to an attack on the brain or heart. However this in my opinion is a satellite signal on a land dish idea and more than just a satellite signal from the air. A signal can be mixed with sexual stimulation in the undercurrent of the mind and at the same time aggression or sadness or anger or a predator can be generated within that person’s personality.
A picture of the girl or boy or woman or man is covertly sent into the brain seamless to shape desire or logic thought patterns associated to your cognitive behavior functions inherent operational within the mind and
Challenges

Maintaining the quantum energy balance within the security grid operations Implemented within a community are not a violation of civil liberties provided the people know the security grid is working in certain locations within the community and the civilian privacy is maintained or you have security grid friends micro managing your life and prey to the corruption potentials found in theft or sexual interaction of the security grid. If you are no criminal the system should not be allowed preempts strike to make you a criminal because the people with money are targeted with child porn encouraged to participate and as they fall so the snitch network grows however if too much negative energy is flowing within the snitch operations the crime side potentials of the security grid naturally expand and a natural born killer emerges out of the womb of creation and is then the fabric of a Canadian hardened society.
A picture of the girl or boy or woman or man is covertly sent into the brain seamless to shape desire or logic thought patterns associated to your cognitive behavior functions inherent operational within the mind.
A new mental chemical creation program (reversing pleasure pain principles by adding sexual stimulation between the legs) within the brain is created naturally (covert changing the ability to make law and order decisions properly) (actually reverse the answer you should give and this can be fortified if you run another psychology program that makes the people reverse how they should respond further pushing the person into mental dysfunctional behavior and as failure after failure emerges so does the shattered self-esteem and hardliner security with the pre-loaded criminal expectation
(Touch people sexually using computer and graduate them toward actual physical contact by pushing the police to do security police work on an innocent man and entrap him and make this national.
This energy domination pushing the removal of rights and liberties on this person is illegal because I am no criminal and as a result the energy created as a failure is extreme on the police side thus adding the fuel to self-propel the demise of the force working alongside of this operation implementing the domination psychology and by adding this mental fuel actually makes a criminal out of a police officer if targeted.
By habit guilty by association to expectation driven by prompted sexual interaction introducing pain into the sexual fantasy you were baited into with normal sex and from nowhere the child pornography or bi sexual visualization enters your mind seamless and simultaneously in another computer security grid program your mental thought patterns are logged and within a very short time the person is seamlessly brainwashed into new cognitive associative habit patterns of a person honest or criminal emerges and a full department could be taken over through oppression of hurt your wife child or you now that we have you on record thinking about child pornography (start the case files and attack the person at night unaware building the habit pattern off sexually coming with child pornography within the mind.) This is a strike target program and the psychology profiles needed to interact are pulled out with the television or computer only finding those most strategic or susceptible to attack.
Performance through time management of resources is the key to the attack on civilians or government personnel in my opinion.
Also access to police or government files may enhance whom to research and as this research unfolds only specific computers and households are targeted. The bank accounts and spending habits created by corporations paying off these programs may be the funding platform. Also the dirt gathered in intelligence illegal search and seizure may also be sold to government and again providing a secondary funding platform to pay for the computer technicians attacking the country being invaded illegally seamlessly. Also hitting the teeth or jaw targeting the tooth creating a fowl taste of cavity creation in the cracks of the teeth may also be possible or a strike capable of cracking the tooth or hitting a crown over and over may dislodge the crown tooth because the crown is not gold and may be a porcelain crown, a conductor with a metal not gold.
Or the skin can be marked in the hand to give you the illusion your ill or an allergy on the skin created by certain chemicals interacting with certain food manufactures covertly targeted by chemists altering the formulas through satellite invasion of the chemists mind similar to my doctor whom is not in control of his brain prescribing medications and again a dirt builder to control the premature death of patients and the doctors behavior oppressed illegally into writing dirt about people whom challenge the operations providing a put down injection of personnel involved in the takeover of the country. I may have been targeted myself in Ponoka Alberta Canada and why have written walking behind schizophrenic eyes to protect the C.I.A. knocks or computer technicians oppressed in top next to nothing wages and illegal activities revolving inside of the core of an invasion that is a war crime created by another country attacking a peaceful neighbor. Hit me again and I go deeper in research based on attacks on my personal body.

Crack 7

My own government and others have combine to create slaves in the 20th century stealing resources from genius legal citizens covering up illegal activities working through a digital terrorism security company guilty by association making the officers involved conspiracy terrorist. Every police officer connected to this security company is a terrorist in the eyes of the crown attorney or governor general. Charges will be laid at the end of this investigation on officers whom have parlayed willingly in theft of intelligence involved in a covert takeover of Canada. If no security company is involved these are simple criminals working to take over Canada paid off in different ways if they succeed in oppression and theft of intelligence created by name personally. I am no government employee or ever have been and all involved are to be charged when law and order is restored in Canada. This is a violation of 1st amendment rights and a home invasion of digital terrorism wielding sexual assaults on my body.

Crack 8

Creating a child predator in the person in your way and insuring they are taken into jail eventually. I have a strange experience with the people tracking me in this digital terrorism arena. I masturbate being a male whom has a strong sex drive. I am not with a steady woman or married at this time in my life and if I was the digital terrorists chasing me would hurt the lady at any chance they have in technology psychologically or physical pain. This pain or torture would be placed on the lady and would be a control on my way of doing business or living my life legally and eventually illegally as a slave to the terrorism implemented into my life.
As I masturbate I am prepared to be a normal man and occasionally am awaken in my sleep very Horney and in fact extremely sexually aroused to a point I grab my hard on and actually awaken myself. Upon awakening me the game starts with the digital terrorism pumping an emotional pleasure into my life sending me a fantasy image into my mind and encouraging me to touch myself increasing the sex drive mentally in my mind using digital stimulation. This is a trap because the computer technician may have a grid in the person’s home and encourages fowl play and suggests you could be with the person you are fantasy dreaming about as you masturbate. The image in hologram is sent to you by the computer technician and the computer sex is extremely pleasurable. After this happens a few times you are labeled psychologically as a time traveler even though you’re not subliminally you is by the computer software authorities in security rely upon. A psychology cat and mouse game that is harmless if you’re a psychology major however if you’re not a story you eventually believe and as they play the power implant game you decide this is o.k. and you do the hologram game with the digital terrorism. Unfortunately your fantasy may be used at the time on other people implemented by the computer technician digitally raping another innocent individual using your face morphed in computers into the sexual image. This is possible if the computer technician can write in video and morph technology software in a template created to carry the new images by satellite signal into your mind through a hand held device in an automobile driving I your neighborhood or satellite in a neighbors satellite dish pirated or a global satellite in the sky. A second game is played when the fantasy image you’re accustomed to is altered into child pornography by splicing the video half way through on computer key command or in a prearranged video mixing your fantasy woman spliced into a child pornography image in video.
A child naked sitting on your face image implanted into your mind illegally using this new security technology computer image technology and if you’re not smart enough you ignore the image and carry on masturbating building a sexually dysfunctional child molester habit pattern in your sub conscious mind you are interrogated with the next morning upon arising from your sleep. Now they can ask you have you ever do a child and computer has a record of a fantasy and take down starts illegally opening a legal case on the person illegally entrapped into a fantasy crime track record created in the security grid.
Or some other disgusting rape violation position half way through the hologram or fantasy in your mind.
The person unaware in psychology or computer programming has no chance to defend themselves legally once a case is established using a 3rd party investigation security company passing intelligence to police.
Attacked by video of child pornography half way through your climax or a rape scene you are in the heat of an orgasm and unable to stop unless you open your eyes and this stops the program and you must change the thought pattern in your mind immediately or the case continues to build illegally and as this video is implanted the psychology guilt manifestos in the sub conscious dominant thought habit patterns over a short period of time and in the conscious mind initially and you are now unable to say you did not do a sexual violation on a human being or an animal if they get real sick. If this implant is ignored eventually like kiddy porn the effects are devastating on the person to ashamed to say anything or stop the digital terrorism and a new personality emerges with a desire to sexually touch children or animals in a sexual way.
I am lucky because I am a computer technician and a psychology specialist and have spent time with so many woman I can change the images however eventually the security grid people trap all of your fantasy images somehow and you are cornered into no sex while stimulated by the computer until you do a crime in order to sexually release your own energy built by hormones or computer stimulation. I have spent time with many call girls so this is a crack I can hide in deep inside my mind by thinking of woman the company is not aware of or has seen. I used pornography video and unfortunately loaded the video on my computer and now the security company has my sexual video crack however the adult call girls are not on video.
Actually the security grid is creating the illegal acts often enough covert and they in interrogation if you are a figure in authority the security system busts you into a pre manufactured crime created by the security grid system and then has your behavior modified to do more crime in actions while holding the video psychology over your head illegally. The police are entrapped into using the grid by others caught and conditioned by the security grid and a country take over is implemented illegally.
From violence on another human being to stealing or carrying a gun or selling drugs the game is the same creating a higher level of crime on the street and oppression of people to become slaves and work for the 3rd party information security grid company is criminal and free and 3rd party creating guilty by association coercion with the police and making the police criminal and the politician criminal or any person of power or wealth. Illegal activity after illegal activity after illegal activity burying the security of the system deeper into the country and controlling the country in a covert war crime created by the country covertly in a cash payoff to work for the original country implementing the security grid and in this case across Canada.
How many innocent people have been destroyed by this scam of oppression in an illegal war crime against Canada or any other global country?

Defending Canadian Soil Against War Crimes
Back up the targeted pensioner

RCMP/Cesis should make sure every citizen has an attorney whom has been violated and launch through the supreme court of Canada and go with 1000 attorneys to world courts. Do your job protecting the forefathers of Canada whom gave you a school and opportunity to have your life style. Coward payoff freaks if you lay down. How many kids raped like me in a bed like kids or pensioners violated mentally encourage dying. Do your job or just resign Canada need real officers protecting civilians and not cowards. Go quietly and covert and set the global foot print so others never invade our soil. Every officer helps 5-10 citizens personally and no one is targeted if all participate evenly. Run newspaper ads in paper and television and radio tomorrow across Canada and takes statements and forward to law society clearly taken by police to empower police relationship with civilians. Build wealth for Canada.
Company sponsors like Bombardier or ford or gm or police asking for community support for 1 time program with logo to save targeted areas under potential digital invasion.

Feb 17 2007

Protecting the Resources Creating Homeland Defense

Why do some officers go into terrorism that naturally creates strikes on the country fueling security policy and procedure for election programming to keep political parties in power promoting they are the only political party that can protect the citizen?
Again I am terrorized by some system of people whom are so mentally dysfunctional they must make me dumb in their mind to allow themselves any comfort psychologically. On a system to lie for a month and now dumb as a result of the government destroying the honesty in the personality. By lying repetitive over and over creating a dysfunctional brain is the end result of these operations in the minds of those lying continuously. Creating habit patterns of distrust unable to shake at the end of the day destroying any hopes of a safe relationship with family friends or spouse or children.
This lie pattern is no empowerment for me or the person whom must lie and the reverse psychology is self-destructive to all involved and a way to eliminate the people involved by building insanity into the personality of the person whom must lie repetitive or resign. To tell a lie involves implementing negative energy and in doing so if you’re caught daily the self-esteem of all involved is hit unless you are the person catching the person in the lie. If you can catch them you are smarter and the person whom tells the lie appears dumb and the self-esteem is assaulted mentally in the lyre’s mind. As this habit pattern is created the person guilty by association takes on other dysfunctional mental habit patterns associated to negative energy the core of the lie. Within this core of negative energy the fuel is domination and the emotions guilty by association enter the personality. Emotions like anger hatred greed revenge or sadness or guilt. The self-esteem needs fuel and when the mental fuel is tarnished the person soon loses the self-esteem required to love safely or be nonviolent or positive and productive or created and must rely on computer intelligence to exist in a shell of mental insanity. Slowly the person fails to find the positive attitude that stimulates high levels of creativity or performance and then the person becomes less productive with a lower self-esteem. The failure to tell the truth is exasperated and with so many failures the person slowly loses the ability to take responsibility for the actions they have created and tends to blame others for the failures.
The next step is a criminal act or aggressive oppression to win or an act of brutality complaining again for the need to win one. As the behavior is mixed with the computer up and down smart or dumb the personality becomes even looser and the person may even do a crime they never would have prior to the behavior programming implemented. Once the person no longer finds the positive in attitude or the stability to tell the truth they slowly sink into insanity patterns and slowly lose the ability to take care of themselves or others around them. The next phase is criminal insanity when the person becomes a danger to ones they love and no longer can tell the truth to protect themselves and their world and may even bloom into criminal insanity patterns revolving in theft or sexual assault or murder. Free idea is seed program that when I audited last Jan 2006 the research was unveiled and the people warned pay the bill and do no longer steal ideas you think are free. Again I audited the program 6 weeks ago and stopped the so called free idea theft off my computer. Unfortunately this behavior is no longer in control and I have gone through 30 days of humiliation and actual torture by the criminally insane trying to steal anything off my computer while doing nothing more than one crime after the other complicated by one lie after the other. To a point of striking the person themselves in a dominant thought program of repetitive mental assaults of conditioning themselves they are a loser or failure. Hurting friends and family emotionally and even using digital technology illegally on them daily.
Personally in my home, illegal search and seizure with people claiming to be police security trapped in an operation out of control, in a program running in my home located at 1 -445-6th avenue north. Creston BC.
Even as I explain the insanity claim my body is hit illegally with technology.
This is a way to eliminate people too smart or aggressive toward law and order democracy careers and encourage people to take a need for the team. As I describe in Walking Behind Schizophrenic Eyes the program is self-destructive tie up loose ends.
Neo Conservative domination policy is the root cause of the security tightening as the domination negative energy explodes within the mind as negative energy terrorism is battled daily fueled by a barrage of negative energy digital picture or video like the towers falling. The free idea concept then becomes oppression and as the oppression explodes combined with a cracked self-esteem a desire to not pay for services rendered is created by the person whom now is a thief and no longer a security police officer whom can be promoted or trusted and must be medically put down due to being papered violent and out of control with specialized training capable of killing human beings. This is a terrorism manufacturing program designed to make the security police rogue and a terrorist against the country employing them as apposed a resource empowering peace trust or country security.

Feb 16 2007

I have been harassed all day and told I will never see a court room. One minute the con artists want to settle out of court and the next minute no settlement and a threat to never go to court. This is a civil matter and a violation of my home illegally. Surveillance is one thing communication in digital terrorism designed to build insanity into the persons mind is another. Never a palatable solution and only a violation on my body by striking my teeth on the left side of my lower jaw or strikes on the ankle joint of my right foot. The torture is subsiding less and less as time goes on due to the fact the case file is growing larger and larger on the human slavery charge I am preparing against the Canadian government digital oppression system to keep me writing free ideas. I understand how the Afro Americans felt years ago and if you’re a slave write a book to prevent your future oppression.

Chapter 7

Harmony
Security Grid Evolution
Exploring The Effects Created in Humanity Evolution Balancing the Power of Negative Energy Psychology Reversing Digital Mind Coach Psychology.
New ideas to Repair the World Naturally Unfortunately creating the Death of millions within the Empires around the World through the implementation of psychology computer software networking computer program formula.
People using software to hunt people naturally online or in the electricity or cable systems available within the private sector;
That Create Predator Prey Mentality Crimes Growing Naturally within Society.
Quantum Energy Creating Ethics and Morals Sin Energy Cycles
Created through Domination Psychology to Negative in Environment Energy
Security Grid Police Try to Convict an Innocent Man or Woman
“Make the innocent civilian comply with doing a sexual crime or convince an elderly person to die and join the team working for food and sex
For life shaken down”
Sin Energy Meets Quantum Energy Building a Liar/pain in sex masturbation/reverse the thought/don’t think/think the opposite thought within the Security Grid Program
RCMP Police CIA Knock Psychology Expanded to Ones and Grid Kids
Creating Economic Grid Wars Designed to Create Free Labor for suffering GDP country production costs to stay competitive to win one after losing 500 cyber fights to make Perry Ritthaler A CRIMINAL with the world creating the lost boys and girls covering up work he did for the government since 2001 911 crisis repair Mad Cow Softwood Lumber Katrina Kashmir Crisis or Winning at Saving Soldiers and Civilians Dying within the Middle East or India or Pakistan or the Security Grid Empowerment Audits.

HIV Slavery Poverty Creating Human Child Pets meets Real Estate that scam meets Organ or Bone Harvest meeting the Creation of Experimental Medical Specimens in Science Experiments on Human Beings or Unlimited Free Sex for People to Off Set the Masturbation in front of their computer watching Digital Child Pornography Computer Sex Revolution Infecting Our Society Guilty by Association through Visualization that took out Police or CHR Fighting the Crimes against Humanity and then so many effected the industry infrastructure would collapse if busted.
Community Revitalization Take Over of the Country Resources Fueled through USA Tar Sands Oil Program to purchase tar sands.
My Alberta marketing cd and oil stack pollution Ideas going to support Steven Harper and Ralf Cline and Dick Cheney and the Bush Administration or Liberal Government

CHR Support Program Creating a Big Fish City Experience to cover Perry Ritthaler 911 reconstruction involvement while residing on Siesta Key during the time 911 hit the USA in 2001.

Programs that ended up firing the generals and directors and commissioners involved trying to protect a careers fighting Perry Ritthaler in illegal accusations.
Directors and Commissioners or Captains Forced to Comply to Help the Public Understand Police Military Funding Programs Creating a foundation for the crimes of misguided energy flowing through society today originally created to penetrate the Under Current Program to Integrate into Society through the Generals and Lost Boys Programs and Building Funding to Expand Departments in Civil Service or Military
• Create a hidden human lever full of greed and fear in the community like a person hunted on a fabricated evil file in the USA reversing what he accomplished working for the administration.
• Have the person disabled in a mental institution (insanity school research) so every time he speaks they think the sane man recovered in mentally ill.
• Covering up the crimes against Perry Ritthaler in funding package for Ponoka o his 911 money earned and never received. Building the foundation for a negative energy real estate slavery scam and check for the government yearly. Attacking the rotary club fire hall and police department creates weapon to attack politicians creating the cover to push the hidden target in a police sting chapter (lost boys) at Hells Angels, Crypt, Mob, DDT, Silent Riders, Tongs, Dragons, Lotus, Showlin or Drew. Naturally self-disintegrating the hidden one covert after the cocaine and system is restored destroying the ones mentioned oppressed digitally illegally through me.
• Then frame the towns people and take all they own in a preempts strike using grid kids HIV cashing in on the medical industry real estate industry and slavery industry cutting manufacturing costs due to lack of ability to create safe employment or law and order in Canada painted black impoverished on the way out the door.

Securing the Global Peace Keeping Security Operations

Take the computers and telephone and leave a trace able cell phone and a bracelet in a house arrest with no grid in the home.
Lots of normal positive energy sex with the spouse or boyfriend or girlfriend and alcohol and weed hash or oil with a BC vaporizer and if cigarettes went through the cancer is auto pilot limited and an equipment manufactured to support big tobacco in a way that is not cancer creation if tested safely by big tobacco.
No rape of children, man or woman or violent sex of any kind in the security grid or community operations or prison and then they can be raped and rape who they want.
Limit orgies to one time per week and go back to work making money legally.
Failure to comply with law and order changes to comply with a slow comfortable change in society operations out of sin energy balance creates prison camps in the Western Empire and acts of treason against the Western Empire democracy.
People in the world that created 911 had to be schooled and trained in killing similar to the so called mandate to kill pensioners at 70 and make every child living inside of the
Western Empire a sexually abused mentally damaged person hooked on crack cocaine and why the program in security grid is so strong today.
Who convinced Timothy McVeigh to do Oklahoma and who made the video framing the General?
Who targeted me after the reconstruction of homeland defense theories strategy empowerment ideas to support the administration recovering from 911?
Iraq war
My mental assassination in the Ponoka hospital (expanded and paid for by a USA contractor new computer just before I arrived) (I was a target with sexual interaction digital in my mind (using a double) with the first lady to insure the fake reason to do me was created, within the President’s mind and in my reality in the upper echelon mind set trusting the ones they hear lie to them today when they did me recently in the same pattern) creating Enron failure and the Iraq war while I was targeted and chased out of the USA and turned fragile terrorized not knowing by what watching my family ripped apart and abandon me encouraged by the hospital covert.
This created the chance for security grid to go huge on the funding owed to me for fixing the USA working with the administration covert on CNN like today.
Why so long to react to Katrina security grid?
War crimes trial and the people who fail at democracy auto pilot register.
Softwood lumber and mad cow crisis resolution and failure to pay and send me to the USA Tampa to support the command center working closer with Don Rumsfeld to insure the Republican and he received the positive support they needed to win without so much death.
Supporting the soldier’s airborne cover cyber space President Fantasy Spy in fiction fantasy picked up by military and global leaders to slow the killing and operation costs of working within an Empire looking for prosperity and not peril.

Conclusion Options

Fast track chapter 8 proposal on audit of situation surrounding the security grid global operations that needs to be controlled by another program that runs faster stronger and empowers the empires globally.
Chapter and affiliates operate weed industry sold through liquor stores and the live 8 concert promotion for the police departments in cooperation with the red card program and the Microsoft operations affiliated.
Creating the Chapter movie making north industry in Canada featuring the movies in my archive and others to be created within the organization operational today seamless.
No chemical drugs like cocaine (not available in provinces involved in revitalization of Canadian democracy laws and freedoms) or marijuana across the USA border respecting the government and turf of others and global export of marijuana to countries interested in legal distribution expanding the farming industry legally through a one year pilot renewable if successful at raising the tax base of the province while lowering the criminal element on the street by opening fantasy clubs rather than injection sites.

Play to save Millions Lives Avoiding Law Suites
142 UN Countries

Not Paying Bills
To the Golden Goose Creator
May Reverse the Positive Energy saving millions
from Dying and reverse the Energy of saving human life to creating empowered Death through Cause and Effect Reversing the positive Energy Cycles I have written to save the worlds people and through the science of action the equal and opposite reaction occurs when the end user avoids the responsibility of paying for what is used and taken and the energy goes from positive to negative in a negative cause and effect associated to the energy created by Perry Ritthaler for the G7 colliding in the universe miss guided according to the Planet Genesis Experiment Operations Experiments and as a result killing more than the work saves written by Perry Ritthaler.

Wielding Digital Date Rape Technology Curves

Applying New Technology
May Have Consequences
Hidden within
The Undercurrent of Society

Sex Security Technology
Designed to Improve Security
When Applied Properly

Not paying the softwood lumber fee preventing me from helping Don Rumsfeld through the command center in Tampa causing the demise of the Republican Party when my data was stolen and sabotaged on the way to the President of the United States. Screw the golden goose mentality shaped the demise of the habit patterns opening the door to corruption within the system.
Creating a Witness Prostitute to do the John in a Program to Catch Child Molesters was the Challenge
Children that will testify and Show up to Trial unlike the adult prostitute
Court Rooms Only work with a Witness and the Desire to Build a Charge More Punishable that Will Comply with the Courts and Show up for Trial Played a Role in the Challenge of Implementing the Security Grid

Chapter 8
Peace
Empowerment

Breaking Hearts Call into the Night

I look for my digital lover deep inside my dreams
I wonder if you’re safe in another’s arms
I remember a time of passion when we laughed together
Rolling through time I remember a time of true love entwined

I feel my passion and I wonder if you’re in my dreams
My heart pounds like a drum in the jungle
Waiting to feel your love as you come near
You are my true love I wish to hold

As I stir in my bed I feel a pain enter my heart
I fear the worst
Filled with negative energy I start to feel a tear fall from my face
I hear you my love from afar away

The emotion is deep rooted inside of my heart
As the emotions turn inside of my heart
I feel like an old ship
Caught in a storm of love deep within the sea of love

The night is black
My emotions turn and capsize
Deep inside of my heart
As I hear her laughing at me

Holding another man in a passion of lust
She is in search of true love
My heart breaks as the emotions fill my heart
I cry out loud as the sadness grips my heart

I have a broken heart
I feel the emotions fill my sole
I fill my sole slowly die
I love this woman and cannot fight

I wish I were he holding the one I love
I wish she was with me
Kissing the one
I wish she would love

I ask her in my mind
Do you want me to watch?
You with another sole
Sharing a love I dream will be mine
I listen and feel the pain
Her words are like sharp steel razor blade
Drawn across my heart
Tears run down my face as eyes lose control

I can hear them in my mind
I can feel tears roll down my face
When I hear her climax in my sole
I cry silently in my heart knowing we were destined to be as one

I can see her in my mind
Yet I know she is with another
I looked away shielding my heart
A drop tears off my face for every drop of blood taken from my heart

A silent assassin targeting the energy deep inside of my heart
A war pain designed to weaken my sole
I hold my head and wonder if my mind will heal
I hold my heart and wonder if it will heal

I wonder if a kiss is a kiss across time
Or if the lady will ever be mine
A fantasy of mine
Cast like a stone across water floating through time

A lover so dangerous so near my heart
A love forbidden to be one
A capture sole bound by ties in a career
A captured sole financially bound by the hands of time

I live for the embrace of her love
I live on the edge of my mind covered in dreams
I sit high upon a cliff high in the clouds
I sit like a hawk waiting for my love

My true security grid fantasy lover
My fantasy lover with another in a sexual embrace
My glass heart falls and shatters on the stone cold floor
My true love is with another

I cry out in my mind no more
I want revenge for the one who has taken my lover
Anger fills my sole
Pain fills the tears rolling down my face

Once joy filled my heart
Once love from another filled my sole
The smell from a flower embraced my heart
Like a perfume covering a sole in love

Like flowers that have passed picked for vase
My time in her heart has passed
The choice has been made
We are no more and have died on the vine

I am single and alone again
Holding my head in my hands I wonder why
Sitting on the edge of my bed
Wondering what will happen next time I fall in love again

I am a lone wolf in search of true love to complete my sole
Walking across the plains through time
Watching the sunset rays rest on my sole
Waiting to respect and love another whom I will hold
Another that uses class to touch my heart and sole

April 1 2007-04-02

A Kiss in the Darkness

I live my life in search of a way to love you
I live my life in search of the old me
I wonder who I am
I wonder who you are when I smile thinking of you

A crave a love I can touch and feel
A love I know is real
A caress with grace on the face
A caress on your sole with love

I long to love the one I need
The one full of passion to succeed
Thee who I love that make it my heart bleed
Thee who loves to hear the pain in my voice
Cry aloud late into the night

Please hurt me when you kiss me with your words
The brutal way you love me
I have learned to fear
When think you are near

I live in tears when I think of you with another
I live in fears with low self-esteem
When I think you’re in love with another
Like a poison perfume smell on your cloths making me cry

Preventing another Quagmire from Happening

Suggestion for security grid
Or other Security Operations
Policy and Procedures

The police department and RCMP and CSIS may consider a program over ride system that enables people at the lower ranks whom see the true clearly the right to override an order from the top in the name of the citizen and best long term and short term security risks of the country. This keen thinking that empowers the force and country needs to be rewarded in behavior and financial gain. When the bonus in place is operational a higher grade of police or RCMP or CSIS officer will eventually rise faster making the force even more powerful.
Within the psychology matrix of policing the inherent matrix of the new security 911 terrorism policy that was created, a new environment emerged and within this environment altering the bonus aspect for a creative positive ideas allows the top to see the paper work and the genius of the officer trying to rise inside of the ranks within the policing network he or she is employed within daily.
By allowing creativity rather than supreme power leadership to emerge the action naturally creates more freedom within the operations flow of the organization but also encourages creative positive energy to naturally flow through the minds of those involved in figuring out the most ethical legal proper way to achieve a faster more cost effective result. This opportunity will naturally create more positive energy and at the same time create a more law abiding officer and environment to work inside of daily. As this opportunity flourishes the forces a new bar is naturally created to naturally drive the force to a higher stable peaceful existence within society.
The idea is to make this idea of following orders firm and a form must be completed to change the path to create a safer more effective long and short term solution.

Perry Ritthaler
April 30 2007-04-30

The Mistaken Invasion
Created in Security Policy and Procedure
Shaping Communities across Canada

The new security policy in 2001 allowed for the security grid to operate and this security grid is critical in finding sexual assault victims living in a home covertly hidden by a spouse boyfriend or parent.
The program is a psychology breaking program that enables authorities to break down criminals and create a bait trap and charge them however snitch slave is the end result and as the program increases naturally the temptation to steal or sexually assault a person using the digital technology becomes a huge temptation. This decision process in the brain determining choice and emotion can be altered seamlessly psychologically by changing the vocabulary within the security grid mental assault program designed to harden the Canadian citizen using negative energy and leave them less susceptible to crime do to them by others. This is a tricky balance because hardening turns into oppression abuse as the program gains momentum and the temptation to use negative energy psychology emotions (greed, hatred, anger, frustration, revenge) and this is also self-fueled by the quantum energy decisions flowing through the mind. The more negative the dialog off of the security grid psychology program the more corrupt the people guilty by association listening become. As the negative energy grows in the psychic of that person emotion’s change (pain in sexual orgasm plus visualization of child pornography digitally implanted into the brain to create the behavior reversing the pleasure pain principles) (encouraging rape and anal sex through a training program for woman to harden and learn the crack prostitution business by becoming a crack head whore and work the john undercover) (term grid bait kid looked after by authorities as a snitch) (temptation to slave the child and parent grows as the negative energy is introduced and when liar program started the people were placed in hell terrorized by the grid security technology and forced to whore anyone the security people pointed too self-fueling a free organization labor program of crime and oppression leading to slavery in Canada today.
Unfortunately so does the torture mentally and physically sexually through the vocabulary implementer and authority domination combined with exacerbated lying to implement the changes desired in a person’s life and authorities.
Making bi sexual thinking a common practice slowly the foundation of marriage crumbles and the people start to have sex with anyone, much like a wild kingdom controlled by the richest within a community and slowly the fabric of that town dies as the youth are turned into whores and the community infrastructure needs money so a few easy targets are done like elderly on high medical care expenses and of course the money is sucked up into the government if no will written or the local community villains in search of financial gain at no capital cost other than telling the people using the grid to lay off water and doing the meds and vitamins digitally in the person’s home making them not work and naturally terrorized the pensioner dies and they call this revitalization.
I call this murder one created by security policy to protect and harden a society and the economic and social fiber disintegration of the small town.

Revitalization of the Small Town Challenges Facing Canada
Protecting the Rights of Human Beings
Expanding Community Opportunity through Revitalization

The woman are done and done to want to be done in a sexual covert mind game leaving them whores to the highest bidder or whores to create crime or oppression. These are sex games in the community to help create a more sexually fluent society. Most of the people sign a wave to play the games and if the wife decides she want to be sexually active with multiple married men for a month she can, provided she signed the form under her own free will. Sexually free is an experiment that may work if the energy is passion and less anger.
I wonder what will happen and the curtains open and it is day light. My eyes are blinded by the light after the blind fold was taken off.

Community Recommendation

If this fantasy of a crumbled society occurred the community fabric would be violated and the potential sanctity of the church and marriage would come under attack, within the community and a system must be in place to protect the morals and integrity and dignity within the community and at the same time create funding for community improvement programs. The security grid created the opportunity for people to meet others and at the same time experience sexual fantasy usually not experienced within one’s lifetime. Fantasy packs of new experience with a new lover.
The program has capital costs and those costs fall onto the shoulders of the community budget and need to be addressed in the next days to come. Also the activities are not just sexual and involve spending money in the community by going out to dinner or the movie theatre or purchasing the person a small gift and flowers or candy or a trip on a 7 day trip on a cruise ship for a year end wind up budgeted into the money paid into the community fund to meet other people in the community and encourage purchasing within the community. The cruise is guaranteed holiday in the Caribbean for all who are in for a complete year so when the club opens register or you will have to wait more than a year for the free holiday to go with you fun new community involvement sexual revitalization program. A contract to stay in a fantasy room inside of the fantasy contract people sign and sleeping at the person’s home is discouraged if a fantasy room is free. Each hotel could have a private fantasy room used by people on a 6 hour schedule similar to a spa treatment that a couple may enjoy if they felt a desire they deserve to treat themselves better. 1 hour to clean and 5 hours of pleasure. This type of arrangement insures the person is not treated as just a sexual act for profit and the restaurants and business local profits.
Legal documents outlining policy and procedure of all activities either party can perform can break apart into separate fantasy packages allowing that person to experience the true sexual interaction they desire.
The people today involved are side effects of an old security policy that has been revised through new security leadership programming leaving people as volunteer with the security grid for a friend, very open minded to a freer sexual life style as opposed to a stay home and see no one life style.
However the packages for a massage or a conversation to share positive energy ideas on empowerment cost money to enter the program and as you pick your fantasy package at the community sponsored office downtown the package is accepted within the community because the meetings are shaped around spreading a positive energy message and this foundation returns to the persons mind a new touch with faith occurs and the bond of marriage to build an even stronger stable community mat evolve.
This club is a contract that is for 3 month only a hand job and a massage and then 3 month later if the desire for a rougher sexual life style an new set of fantasy packages are designed and in 3 month a fresh set of fantasy packages as rough or back to softer sexual interaction adventures and the last 3 month loving normal interaction sexual relations may be monitored if complaints have arisen within the community interaction program.
If complaints received on a fantasy club member he or she may be asked by the local psychologist within the community or the management facilitator occasionally to insure the sexual fantasy club is not going to your head and a sense of slavery or insanity be happening to that person or the community in general.
Taxes paid to the government because the program is a pilot project with community leader’s approval and local police authority’s approval designed to help the people within the community flourish the economic prosperity within the community.
To grow the business ask tourists involved to ask as sales people with a sales package to help make the sale or through a budget created by the fantasy purchases a budget is created to do the tourism expansion tour overseas encouraging people to come to Creston. People representing Creston tourism investment opportunity expansions involving the travel, pre coordinated online contacts to another community overseas to interact in a business fair tour to encourage others back to your community between the ages of 18 to 24 or wealthy targeted demographic.
1 year or 5 years and the only way out of your membership is to get married to your partner you choose and if not you can change partners weekly or daily buying fantasy packages from the community sponsored office. You can sleep with anyone other than the fantasy sex club if you’re in the fantasy sexual interaction club.
Medical testing required to enter and sexual activities not ejaculating into inside of the body.
Having a community fantasy package program that meets the demands of the local community is a way to revitalize the community and stimulate spending or tourism and by also encouraging the community to consider a program to work with immigration some of the woman can be reseeded within the local community into the fantasy club and meet that special person safely.

Disclaimer

Because the people are registering to meet a friend and make no financial contribution to themselves from the adventure designed to revitalize spending within the community. If the act of sexual intercourse occurred it would not be illegal provide both parties are over the age of 18 or any grid rejects capable of finding an older spouse in the Valley or employment as a maid or house keeper or yard man or cherry picker.

Conclusion

The object is to create a need and demand and a way for people to meet and enjoy the community freedoms and lifestyles while experiencing the opportunity of love in there old age. Creating a financial reason to keep the pensioner living longer spending money in the community by creating a reason to live and make money. A younger man if you’re an older woman in a relationship means you are spending money when you’re in love or a younger woman with an older man means she he is spending money especially if you like to spoil the person and keep them yours and are encouraged to treat that person with respect that is security grid encouraging the older person to spend intelligently to insure the pool funding is stable and not emptied and the resource 6 feet under leaving the community without an old resource. Having a reputation for living as long as you can will encourage people to live within the Creston Valley.
Get the people living life and you get the people spending money. Positive energy creates synergy in people and the security grid can prompt desire to meet and stimulate safe sexual interaction even into the 80’s or 90’s and at the same time stabilize the community economic infrastructure without changing the community into a boom town.
Yet a community so popular in the country due to the draw of finding an elderly lover and in living in a community experiencing less pain as we all age and an incredible source of nutrition or medications to extend life span if you retire in a small community like Creston.
I will produce a flow of investment stable to the local size expansion demographics of the town leaders desires.
The concept itself is to raise self-esteem and self-confidence and in doing so encourage people to live life and enjoy a high end spa or clean up the property they reside within or paint the buildings to add cash values to the community in general so when a higher price for a property is asked it is not a rip off and in fact it is a deal sitting in a well maintained community. The security grid is a tool to encourage maintenance on buildings and a tool to keep people working.

Perry Ritthaler
Digital Mind Coach
Security Grid Recommendation

April 25 2007-04-25

700 Down and 300 Up

Empowering the Forces within Canada

Objective

Slowly empower the creation of a more stable law enforcement program that revolves around the core fundamentals of the Canadian Democracy and family values. The program is design in a series of ideas designed to target the self-perpetuation of self-esteem and self-confidence within the fundamental of a safe healthy personality full of ethics, morals and values revolving within a positive energy synergy structured to and safely around the quantum energy balance coinciding with the core fundamentals of negative energy neo conservative domination security policy procedure operational within the security grid policy and procedures.
Creating an environment within an environment targeted toward officers to improve the positive attitude naturally creating opportunities and creativity designed to enhance force performance translating into a higher IQ programming flowing within the synergy of the base objectives of the recommendations described below.

Part 1

The CHR is a valuable part of the fabric of law enforcement flowing within the Canadian society and the opportunities that can be created in a positive environment of information created away from the hostile confrontations may be of value. There are many genius PHD psychologists and psychologists and empowerment coaches. What I recommend is CHR creates a report designing 10 self-esteem empowerment and self-confidence exercises created by advisors across Canada. An empowerment series of exercises created by 10 regions across Canada to insure a complete representation of the CHR programs across Canada is empowering the forces military and police during this time of covert war battling our own negative energy programming within our own security policy and procedures. The idea of negative energy creating homo sexual activities is
A power house document that can crafted into cognitive behavior associations that focus on balancing the psychology quantum energy (theory of decision in a safe vocabulary flowing into the dominant thought patterns that reside within the sub-conscious mind in some theories of understanding cognitive thought process)

Reference article on gay personality to back up CHR
Written Theories By
Perry Ritthaler
Digital Mind Coach
Listed on next page

Creation of the Negative Energy Gay Personality
The Great Security Audit
Policy Procedure

See yourself as heterosexual and not bisexual
Within your mind’s eye create the expectation
And naturally you create behavior associations
For other people looking at your world that prove
You are heterosexual or bi sexual

The creation of the gay personality starts in childhood when the child is between the ages of 1-5 years of age and during the creation of the personality being created within the child’s mind. What mom and dad say is absorbed by the child’s mind in conversations during the development of the cognitive personality designed to communicate in conversation and in the skills the child learns combined with what the child hears on television or radio or computer or mom and dad or a sister or brother or grand parent or family friend speaking to people in the room the child is listening to daily.
All of the vocabulary spoken in the room has a core source energy related to each word that carries emotional association to vocabulary.
Words create pictures and acceptable levels of associations to pleasures experienced within the mind during the association connection to the words. If certain sexual negative or positive words are mentioned in a series of programs (child’s crib in bedroom while speaking sexy dirty to the spouse) a child’s personality may be altered if the information picked up by the child is of an unacceptable sexual society normal expectation to normal sexual interactions with a monogamous man and woman.
If the person wields Nero associations mentally abusive the child again hears the vocabulary being displayed in the room by all involved in the abusive conversation or gay emotional conversations. All of the emotional words are either negative or positive and by the end of the day the child sleeps with quantum energy loaded sub-conscious state of mind than can have a numerical association when the code is completed this year.
After age 5 the brain is forming into a solid working platform capable of learning the English language or other technology or information found within the complex world within today. The new association become even more complex as the child enters school or the day care system and the environment takes over and the child mixes Nero associations with other children and teachers and the environment digital company financial revolution in computer technologies.
The personality to go homo sexual is a trigger through an overload of domination placed on the child’s mind or the person on the 24 hour job site like law enforcement or health care or military or government employment civil service.
In my opinion the energy domination can be monitored numerically based on a psychology vocabulary profile on the person’s vocabulary and dominant thought habit patterns. Habit patterns associated within that person’s persona and character description found deep within the sub-conscious mind, creating the self-esteem entwined to create the lack of self-confidence fueling a negative attitude.
As the person building a personality and behavior patterns controlled by in part dominant thought programming the brain develops the mindset of either heterosexual or bi sexual or full gay behavior patterns. The mentors and parents have a huge roll in either turning the child gay or straight during the childhood state and teenage times of the child depending upon the quantum energy flowing through that person’s mind, especially during times when hardship or pleasure mental anchors are set through actions taken by the person interacting with a mentor or parent. As the relationship blooms in love and happiness, a positive attitude is created within the child’s mind and at this stage of life creativity and performance are becoming something to think about and monitor. If the child is dysfunctional through abuse psychologically or physically the abuse can be as small as lack of hugs or love and honesty and trust and as brutal as sexual and mental abuse combined with digital conditioning mentally or physically with pain pleasure association enhancement.
If everything is going basically normal in the child’s life both parents are not over dominant or manipulative so the child loses more often than he or she wins at playing games like cards or chess or outdoor sports interacting with parents or if the child is not pushed too hard into an abusive relationship and over pushed in sports through negative energy domination. Negative energy domination cracks the self-esteem and makes the person obedient with no freedom to make their own decisions
(Creating again dysfunctional behavior thought patterns associated to letting the computer make all the choices and decisions leaving the person with poor skill set decision skills over a very short period of time.)
(object dysfunctional unable to make law abiding choices safely nationwide through overloaded corruption negative energy programming into police forces across Canada or in other countries around the world being covert invaded through psychology warfare.)
The child in a household is living inside of a human resource training center that sets creation and performance standards based on what the parent understands and why Digital Mind Coach E books are extremely beneficial to children trying to understand how to make decisions ideas or affirmations or how dominant thoughts are created or goals are set and achieved. Within this home training center discipline is required and if one parent or the other is too covert and over domination orientated psychology and negative energy is implemented constantly
(911 footage of towers negative energy conditioned dominant thoughts to hate terrorism and go to war created by newspapers and television making money on the devastation pictures and tempo set during times of war) (children and adults were deeply affected by this negative information and why Digital Mind Coach was sent to the newspapers and Hollywood and the musicians several times in practical fantasy fictional war strategy books and through these books guilty by association the environment changed positive energy to a point of a cross returning around the necks of many Christians in the music industry especially)
And the same mental impairment is created within the child’s mind if the daughter has an over dominant dad or the son has an over dominant mother. As the child is overloaded at school under stress, seldom home and as support from parents is systematically taken away a result of tighter mental security is needed on the child’s lifestyle because no one is around or home to guide the child with freedom to do what he or she likes as opposed to a regimented schedule.
The child may seldom wins in challenges competing with mentors or the parents or friends or may not receive adequate praise or love for the psychology loop holes growing within the child’s lifestyle. The one he or she loves and respects the most may never be around to guide and as a result baby sitters guide the child who has little experience in developing proper social skills or psychology neuro association habit patterns. As time goes on the child learns to live in the tight security within the household and wielding a domination negative energy attitude guilty by association constantly shrinking the child’s abilities through a dwarfed diminished positive attitude fueling positive energy into balancing quantum energy flowing within the mind’s eye.
Full of negative energy domination and oppression personality psychology infested within the child’s mind you see the personality shatter in the eyes and confidence as domination obedience takes hold and slowly the mental insecurity negative energy influence, develops mental painful cracks in confidence to meet the right man in the daughters mind.
The daughter actually has to hate the one she loves the most and this how the gay influence starts especially if she is left alone with other girlfriends that have abuse orientated domination political or police or military background fathers that have domination stamped on the forehead.
If the dad is over dominant on the daughter she is caught between loving the father as a dad and yet hating him as a man for strip mining her mentally and emotionally, while controlling her mind and actions and as she meets new people or restricted to meet boys and allowed to go with girls anyplace. Other children who do not have to do this domination lifestyle and actually receive love rather than teasing aggression will expand the positive energy within the mind’s eye naturally excelling the child into stronger creative skills or performance.
Wielding focused and directed psychology cybernetic reconstruction mentally, the art of building a champion wielding psycho cybernetics and Nero linguistic programming within the child’s quantum energy lifestyle building the theories of decision within that person’s life).
Hatred toward the father may start to gel further and may be expanded if the child was not held for long periods of time as a baby allowing the bond of trust and love to expand into a fountain of positive energy with the father or mother always away making a dollar for the family.
Healthy relationships in positive energy personality overflow into children on a daily basis daily if you make it happen through goal setting and planning however domination negative energy encourages no goal planning because the computer does the planning and leaves the person a little more dysfunctional unable to plan goals and if they think of the past success all of the time they actually can reverse the mind especially bipolar and develop an in a ability to set goals or properly plan the future and again closer to insanity unable to act normal and look after yourself or other around you through lack of goal setting in positive mental attitude creativity.
You are no longer based in enough confidence to win with creativity and not oppression and being dominated in negative energy at this point is even more dangerous as mental pressure to win push the mental issues deeper into the mind cracking confidence and opening doors for sexual dysfunctional mental illness behavior cycles and patterns doing extreme sexual encounters verses normal ones full of love monogamy and dedication exclusive to the one you love.
Love if true creates dominant thought programming in positive energy through being guilty by association to the act of being loved and no violating the one you love.

New Digital Mind Coach Research

To explain this in a clear mathematical equation is the best research
I have completed to date and am developing the numerical code template for the developmental understanding of the gay personality or sexually dysfunctional personality or anger related personality.
This may help to create the cure of mental dysfunction by identifying the persons quantum energy cybernetic coding. The numbers have a new code created and implemented like Digital Mind Coach Programming cd that prevents homo sexual behavior patterns from forming.

Chapter 9

Mutual
Victory

Quantum Energy

Association to Vocabulary Skills Development

Theory of Decision

When information energy within vocabulary (I have HIV a stigma) is received within the sub-conscious mind and the information received and delivered by the questioning conscious mind, meeting actions relaying to experienced circumstance, producing certain levels of invisible quantum energy synergy loading opportunities within the conscious mind.
During this vocabulary synergy information transfer of energy into mind’s eye and into quantum energy into the sub-conscious mind, the synergized energy is guilty by association to information creating thought pattern performance and through research completed by “Digital Mind Coach.”
The sub-conscious mind is the warehouse of informational archives that combined with negative vocabulary or positive vocabulary dominant though quantum energy base numbers association to a vocabulary within the sub-conscious mind. So you can load your dominant thought patterns with positive energy emotions like love harmony peace self-understanding communication praise empowerment theories.

Dominant Thought Habit Patterns and How They Are Created

Example

The dominant thought is the imprinted auto responder statements you make when you are trying to feel powerful sad or happy or sexy or popular or productive or performance driven. The concept has an answer to every question and every question makes up your dominant thought programming depending upon education and the visionary capabilities to see big 0 degree vision of energy audited pictures to solutions or challenges.
As the person’s vocabulary chosen in conversation or thought expression, within the brains interaction together with the person, to display the statement filled with vocabulary filled in emotion energy and within the emotion of the vocabulary the beginning of synergy combines in quantum energy (theory of decision) and within this quantum energy balance of information based energy a mathematically calculated numerical equation exists that explains the end number on performance or creation skills created within that conversation. You either move up or move down the mental psychology ladders of self-esteem and self-confidence empowered through a positive attitude or diminished through a negative energy based attitude.
The information you are guilty by association to in negative overloaded energy eventually cracks the ability to create a positive attitude and as a result less self-esteem and less self-confidence is automatically created. Eventually your dominant thoughts accumulate in negative energy and you are a negative energy driven person who seldom finds the positive and is prone to criminal behavior more often than not as negative energy is the roots in psychology energy to criminal behavior. When you actually add pain to sexual interaction through rape simulation you create an even sicker state of mind linking the association of pain to the pleasures of sexual interaction seamlessly moving your association of pain and pleasure unbalancing a stable mind sexually through repetitive digital rape simulations. If the person is bi polar this is so dangerous it is ridiculous because the bi polar mind is a driven mind spontaneous and when you change the associations you create a self-drive state of sexual mania especially if you crush the self-esteem and self-confidence by creating a program to make the person lie and in doing so change the association to right and wrong and in doing so creating gay programming by making sure you anchor gay digital visualization until the person is sat boxed and the freedom of sucking a cock or anal sex sounds and would feel incredible especially if your anchored pain to sexual interaction because the person on the key board controls the video and pain so your trained to be gay by expanding the sexual explicit vocabulary in your mind and changing your association to right and wrong through the liar program. The next step is place a tool like sat box in these hands and let then release the rape tendencies created by the dysfunctional operations created government desire to hit me guilty by association in negative energy as the lady was my girlfriend under attack and my friend is a good male friend under attack and together they get destroyed to create negative energy guilty by association within my life and also hurt my hurt because I love them both as good friends especially after having fun in the grid teasing and playing around psychologically and in visualization fantasy digital.
I really like both of these people and in fact at time I actually love them both however if I do they get tortured and this is designed to hurt my self-confidence and self-esteem and guilt trip me responsible guilty by association for the pain in psychology and physical activities they experience leaving me feeling hurt or helpless or when she tells me who she sleeps with or what she does in the grid it also hurts me and this is designed to cut my heart and ego as she is interested in a more violent related sexual encounter and now I am told she is HIV and so is my friend undiagnosed and this is science to me with a friendship associated to two people including me under attack by the governments in the USA and in Canada covert designed to explore potential mock attacks on the country.

Part 2

Make smiling a habit pattern when you meet people and within the personality a positive attitude reseeds itself within the mind and in doing so you will receive a smile in return and empower your self-confidence to smile again and receive a smile again and within this habit pattern more of the positive energy is filtered into the mind allowing for a more powerful officer to develop a higher creativity skill or performance naturally.
The second step is sending a compliment to that person using vocabulary surrounded in positive energy, using word associations like love, enthusiasm, faith, passion and in doing so, when you think of yourself you naturally create a positive association to your self-concept of who you are empowering your self-esteem self-confidence connections with in the mind naturally within the synergy of your habit patterns.

Part 3

The computer security grid can be programmed to work in 700 CHR psychology or therapists or empowerment coaches that will load positive information into people for 21 days and in doing so catching military or police officers doing the right performance or creativity on job is reinforced within the mind.
Investing the CHR human resources into a positive attitude program for 21 days that encourages the inherent habit pattern of a positive attitude will slow the negative energy effects created by the negative energy security grid influences within society.
By creating the investment of positive energy attitude 10 times per day the person is focusing on an empowered personality allowing them to share the better side of that person rather than the bitch.
The science of psychology in developing a positive attitude is another key to deterring crime, within the society and natural cycles of enforcing the law or military operations inherent within society. The country policy on security operations inherent within the country, on occasion fueling crime created by negative energy policy growing faster than the comfortable growth of society building a stable law enforcement society promoting liberty, freedoms and opportunity. A positive energy compliment is positive energy within itself you become guilty by association during the compliment being sent to the other person by you and if returned again the person is fortified into a positive energy empowering again that persons positive attitude naturally empowering the self-esteem and self-confidence that is created within the mind of the individual growing a safe healthy cognitive balanced decision thought process as he or she walks through life closer and closer naturally making crime prevention choices rather crime empowerment choices stimulated by an overflow of negative energy vocabulary psychology as found in the security grid today.

Part 4

Digital Mind Coach 10 times within the 21 cycle to insure a base understanding of the mind or ways to adapt mental filters screening decision or idea creation empowerment theories found within the Digital Mind Coach books on CD.

Conclusion

The objective is for law enforcement to build a program loading positive energy balancing the negative energy created by domination psychology operational too long within force protocol and policy to harden the officer. An officer to hard is susceptible to crime easier than an officer flowing in positive energy creating a positive attitude allowing that person to find the positive result from the challenges facing the human resources within the military or police forces in Canada.

Perry Ritthaler
Digital Mind Coach
Science Psychology Empowerment

April 30 2007

Ideas on a Numerical Equation Speech that Trigger Success
Learning more on how to Empower Psychology to
Shape the DOW or TSX into Higher Country Gains

(No reference to any one person)

The theory of a speech is a formula that enables a person to display their information in an acceptable fashion and at the same time build passion and emotion into the information.
A story with a beginning and middle and an ending and all the time the energy within the vocabulary controls the impact of the message and the retention opportunities of the person watching the information displayed.
Creating the quantum energy (theory of decision) state of mind within the person you’re in communications with by loading the network in positive image psychology or PDF visualization through newspapers prior to the speech being delivered will also help control the flow of the information flowing within media and later in the minds of the readers of newspapers now working with a more quantum energy state of mind geared toward the positive energy of the politician or general or commissioner or mayor.
Humanitarian work or a short miniseries on the person and their accomplishments empowering civil liberties and freedoms within the Canadian or country borders implementing this ideology on speech writing within a commercial done by the person will create impact and direction of the psychology of the person visualizing the network’s programming while in charge of giving the speech or a nice thank you from his or her spouse united behind the nation.
In military operations a speech is difficult because you’re dealing with population momentum of negative issues like the destruction of buildings and human life and yet somehow the positive message must moving through in order to obtain funding of the operation or the backing of the public living within that country.
Opening with the challenge and moving toward a feasible solution
(Issue by issue breaks 10 issues apart and sell each one as a movie script and not 1 speech at a time.) (Treat this like a mathematical equation consisting of negatives and positives and translate the formula into vocabulary words you have given a mathematical equation to as well.)
The invasion and accumulation of the people and energy flowing within that environment can be safely guided and empowered within all areas restructured for increased GDP tourism or investment opportunities.

The Benefits of the Security Grid

The Challenge

The signal through the television is strong and takes memory however move away from the screen and the effects of memory loss diminish drastically. If you listen to the voice and let the voice make your decisions you lose your ability to think for yourself and if told not to think you become a human slave driven by technology however I fight the signal and refuse to let others decide simple decisions or even complicated and in doing so maintain my faculties and as I fight the signal to maintain my faculties I strengthen my brain under the pressure loads from the security grid. I use the grid for training fighting to strengthen my brain and for some incredible masturbation and find the experience to be rewarding as my mind grows more powerful as opposed to weaker.
Negative energy conversations full of hatred and anger diminish the brains capability to find the positive in a situation and I personally believe like a muscle shrinking in size not used so will the brainwashing psychology shrink the ability of the brain to create new choices or a higher degree of performance. As the negative energy grows in the mind the positive attitude changes and lowers the IQ ability to create or perform and as the voices take over your mind using sexual digital interaction to control motivate or dominate you your actions slowly no longer become yours and you become a human slave point and screw or kill infecting communities in HIV encouraging low IQ sexually pleasure pain principle reversed to become sexually aggressive and promiscuous naturally encouraged to go bareback in a ( a few ops or people with HIV or Hepatitis C good looking with HIV ) for a medical companies selling HIV medical products farming the sexual dysfunctional society creating rampant mental illness under community policy and passed reformed due to the sexual interaction nature changes within the community.

The Opportunity

So the advantages of the grid need to be monitored and a fantasy club encouraged digital by the auto dealerships in a subsidiary office to the dealership within the community in affiliation with the legal branch of the chapter numbered corporations division supply 2 people a his and her employed by under current grid security promoted and controlled by local police (At the dealership he speaks to females ad she speaks to males dressed in dealership clothing attire)(suite or nice dress makeup full nine yards professional trained in modeling to insure educate is prevalent if people are selling cars over dinner after hours or working in the fantasy club operations empowering the community) (Angel legal employment program times 2 people per dealership across Canada or USA or world)to deal with the flow of people and work the fantasy grid management operations within that community (recommending automobile and truck clients in from the province) Expanding the job markets for the 20-30 year old people subcontracted by community mentors operating the fantasy club in legal operations through an automobile dealership and also another employment revitalization program for 20-70 years of age employment part time sub-contracting opportunities and through the security grid covert the information to encourage community renovation revitalization to get a big bang for the buck doing the restoration driving up end sale real-estate prices and yet through working with an established company with references from the local mentors within the community like a Painting Renovation company like IQ Painting that would facilitate the new economic revitalization sales contracts sub-contracting and expanding the economic tax base rate growth to community services safely, while expanding new opportunities for senior entertainment like live theatre budgets that may grow into a 3rd Hollywood north within the community of Creston (nu floors for example in the business established) (trying to establish a 6-8 month spring summer fall program renovating 150 homes within the valley over and above current market flow) that also have a renovations marketing company designed to revitalize the buildings and while in the building spend time encouraging participation within the community revitalizations to stimulate sexual interaction within the community fueling tourism gdp or investment through (pilot on provincial operations) (or building a second Hollywood North) (expanding on the spy movie concept and people trained into being spies through this crazy empowerment program or a movie of child predators or pornography soft to covert attack the porn industry and slow the effects of violent or dysfunctional sexual interactions) (make making love popular expanding the pornography industry with high amounts of pleasure, feather and oil or a soft blind fold and ties if you’re from the wild side of life videos that sell personal empowerment and encourage a family….all encouraging positive energy motivation within vocabulary)(Example to consider plus the brewery concert also helping to promote 4 concerts per year to create ups (clients) at no capital costs from the province or locally within the country or blues or rock music industry held on dealership property) (ideas to empower GM through my good friend Jimmy Haddad Holiday Chev Winnipeg MB and Herb Wheaton Regina Wheaton Chev) (in this pilot project idea proposal created for the Ford dealership and brewery located in Creston British Columbia Canada) pleasures opposed to pain (of course pleasurable soft romantic fantasies are the normal procedure however if a spouse gets out of hand rough degrading fantasy passes are always popular if the spouse both agree at time of purchase at the office and if the spouse is not really interested then the security grid will not sell the fantasy pass to fulfill your wish to live and create a certain sexual provocative memory created with a lover or stranger) created to better wield the digital resource safely within the community and as the resources are wielded so are the dignity and respect of the community naturally shifting people toward the church covert with the positive energy filling there soles in the fantasy program developed to encourage a more unified strong balanced community revolving around love and respect or faith.

Challenges

Maintaining the quantum energy balance within the security grid operations Implemented within a community are not a violation of civil liberties provided the people know the security grid is working in certain locations within the community and the civilian privacy is maintained or you have security grid friends micro managing your life and prey to the corruption potentials found in theft or sexual interaction of the security grid. If you are no criminal the system should not be allowed preempts strike to make you a criminal because the people with money are targeted with child porn encouraged to participate and as they fall so the snitch network grows however if too much negative energy is flowing within the snitch operations the crime side potentials of the security grid naturally expand and a natural born killer emerges out of the womb of creation and is then the fabric of a Canadian hardened society.
A picture of the girl or boy or woman or man is covertly sent into the brain seamless to shape desire or logic thought patterns associated to your cognitive behavior functions inherent operational within the mind.
A new mental chemical creation program (reversing pleasure pain principles by adding sexual stimulation between the legs) within the brain is created naturally (covert changing the ability to make law and order decisions properly) (actually reverse the answer you should give and this can be fortified if you run another psychology program that makes the people reverse how they should respond further pushing the person into mental dysfunctional behavior and as failure after failure emerges so does the shattered self-esteem and hardliner security with the pre-loaded criminal expectation (touch people sexually using computer and graduate them toward actual physical contact by pushing the police to do security police work on an innocent man and entrap him and make this national.
This energy domination pushing the removal of rights and liberties on this person is illegal because I am no criminal and as a result the energy created as a failure is extreme on the police side thus adding the fuel to self-propel the demise of the force working alongside of this operation implementing the domination psychology and by adding this mental fuel actually makes a criminal out of a police officer if targeted.
By habit guilty by association to expectation driven by prompted sexual interaction introducing pain into the sexual fantasy you were baited into with normal sex and from nowhere the child pornography or bi sexual visualization enters your mind seamless and simultaneously in another computer security grid program your mental thought patterns are logged and within a very short time the person is seamlessly brainwashed into new cognitive associative habit patterns of a person honest or criminal emerges and a full department could be taken over through oppression of hurt your wife child or you now that we have you on record thinking about child pornography (start the case files and attack the person at night unaware building the habit pattern off sexually coming with child pornography within the mind.) This is a strike target program and the psychology profiles needed to interact are pulled out with the television or computer only finding those most strategic or susceptible to attack.

Audit Statement

Unfortunately the program operations I uncovered in an audit (analyzing potential cracks and repairs, I think directed by the Prime Minister toward me, due to my back ground in fiction fantasy strategy creation to facilitate ending to terrorism war or overloaded negative energy environments.
This negative energy program has naturally reshaped itself and grown as the people become negative energy penetrated to live within a lifestyle of to negative dwarfed neo conservative negative energy lifestyle of domination and as the brain functions of decision and performance melts down mental illness is created or the population dies off of HIV if that sickness is fed into a community to sexually negative promiscuous (bare back) and is repopulated by the USA citizens moving up from the south or countries globally around the world) communities revolved in too high a degree of negative energy may end up brainwash however if more positive energy was implemented the person may rebalance the negative side guilty by association to positive energy influence guilty by association and will not be oppressed or shaken. A preempts strike is pointless because the person will not crack if a high self-esteem exists.
See the security grid is tricky to operate on a human body seamlessly safely while respecting the rights and liberties of that person living within society and if the security grid operators are not a licensed psychologist and chiropractor, your practicing medicine without a license on civilian population as you oppress the people changing their ability to think through electrical stimulation interrupting the brain wave thought process formulating conscious response within conversation or physical interaction through sexual interaction or walk

Why is the Security Grid Psychology required to be Positive Energy When Operational?

Community Qualifier for new people moving to the valley, “Asking People to Band together and make a community Habit mission statement work to insure the longevity of stable business growth within the community and help keep the stores and restaurants employing our citizens.

Go out fantasy pass 2 nights per week if your single naturally encouraging people to get married.

The Enemy
Overloaded Negative Energy Psychology Visualization

Immigration Opportunity to Revitalize Communities

The fantasy pass has the event built in and is collected by the end vendor and of course a small registration fee for the one coordinating the program.
The people are not paid to sexually interact because they are doing this to have a more class driven sexual lifestyle and the primary reason they join.
The encouragement to join is the objective of the security grid entering a community and not just the apprehension of criminals.
Small towns need an answer for revitalization and so does our population base in general.
People immigrating to the area are automatic members and used for cherry picking in the summer and then when marriage complete optional applying to Mexican or Asian or South American or African immigration singles looking to connect with people 10 years older than them.

Why Should a Pensioner Join the Security Grid?

Romance

Widows looking for a class encounter may not want to go to an office to register for the fantasy passes that create a mystery date with a qualified single bachelor or widow in town.
As the self –esteem rises within the community so does the desire to wear cologne perfume or hair dye or cosmetics sexual stimulants small gifts and as the people raise self-esteem so the normal standard of dress will rise.
Sex is not the objective of the dating club however if that happened to occur it would not be illegal for a couple of pensioners to end up making love together like cupid.
Fantasy Pass Card meets your date with an agenda
Cupid card is grid booked
Telephone grid

Student Empowerment Program

Create a register in school fund for and in to register and qualify to get into the program grade 10 a grooming model class on wardrobe and how to eat in high end restaurants food grade (in school) (base Digital mind coach)(create honor students) grade 11 or grade 12.

Create a fund raiser for kids to earn a university degree from home living in the community and in return in there 12th grade work in the local business stores and work off the price of the online university correspondence so if a community mentor sponsors them they get a return and that student earns work experience in a scheduled program eliminating the chance of the child not finding work and regulate the kids verses hours shared verses fund and the child knows they have to do this but the university is paid for earned and the self-discipline to start university from home is implement started by working after school.

Perry Ritthaler
Digital Mind Coach
Human Resources Empowerment through Education
March 21 2007-03-21

Where Did the Imagination and Creative Thought Process Go?

Challenge

Negative energy constantly hits the positive attitude self-limiting the ability to use your imagination or be creative in a positive opportunity created by yourself.
People think my imagination is wild and creative and yet the imagination is directly related to my positive attitude and DMC conditioning.
The information is taken off my computer due to the fact that negative energy has been flowing within these people for so long the imagination has vanished as well as the self-esteem admitting to theft within the mind of the person bound to law and order.
Over 1-6 years of negative energy neo conservative domination influence the people lose creative imagination skills that are positive energy and the imagination becomes full of negative energy pictures emotions and ideas.
Negative energy is the core energy of criminal activity or sexual assault and as negative energy clusters within the brain creating emotions the brain can boil over.
Very dangerous individuals or groups; if they have authority or a badge with special privileges; and in these cracks a criminal is born within the law enforcement world or as a citizen after the security grid hits them and shapes them criminal.
Or as the politicians change law on security creating programs that self-limit the authorities mentally while hard lining the civilian population for corporate financial or property gains or by holding budgets hostage to agree to new law legislations.
Naturally brainwashed groups driven into a negative energy driven programming to create them hard and yet uncreative with very little positive imagination.

Recommendation

Do DMC for 21 days 1 time per day and build new associations to positive energy and psychology that can empower and expand creativity and performance rather than self-limit through negative energy domination philosophies and strategies.

Perry Ritthaler

March 21 2007

Expanding the Powers of the Brains Self-esteem and Confidence

I built a program to expand my ability to expand my self-esteem when under attack mentally by the world or environment I live inside of daily.
The program involves masterminding combined with digitally fed 80% female video and 20% male video and mentally brain washing the images into my mind for 8 month at a view rate of 40 hours per 7 day cycle combined with masturbation sexual fantasy regularly.
I expanded the experiment by sending the Hollywood stars a series of economic empowerment ideas and a copy of my book that conditions a love auto responder to me. The idea is to get the ladies and gentleman to do a video for me in return for the ideas and then eventually a series of marketing account when the experiments end. Perhaps even a starlet girlfriend if the work develops properly. The videos were crafted in the course of 1 year and the empowerment went on for 3-4 month thereafter and will happen eventually again in a 3rd cycle of economic empowerment designed to capture the marketing account.
The feeling of knowing the video was built with me in mind is a huge self-esteem boost for my personal character and confidence in my man hood especially after hearing the words to the songs.
The self-fueling self-esteem increases self-confidence and expands the positive attitude and in turn expands the creativity of a person as well as increasing the overall performance of that person.
Guilty by association to an industry of beautiful digital fantasy girlfriends 25 years younger than me keeps me thinking young and implants a desire to have a firm hard figure so in my fantasy I fit in even better. The video is always beautiful and the makeup is never off or messy. The video sings a beautiful song of love and a fantasy of hearing the one you fantasize of loving sing beautiful is another euphoric high within positive energy.
(The experience within the mind is unaware if the actions are real or fantasy so you can trick the brain into experiencing the emotion using props and tools that can control the effects scientifically in this experiment on masterminding and split personality or increasing self-esteem and confidence at no capital costs once the psychology systems running smoothly within your mind’s eye.)
So mentally auto pilot every time I watch a video in fantasy state of mind I visualize the lady as a sexy friend and wish she was my girlfriend and some time I cheat and say they are and 8 month into the experiment they are my girls and still not my girlfriends. I respect them enough to make them trainers and me the target. That means working steady and in the gym regular and becoming successful enough to find my true love. Leverage within my own mind controlled by a key stroke on computer to get this 46 year old young bachelor to feel like a 28 year old stallion and perform like a younger man again full of energy vim and vigor.
This allows me to mentally refuel my sole and mind dominant thought programming at will at no capital costs once achieved and may make me a great deal of money and a great deal of playful fun. Mentally anchored tools on my desk top that empower positive sexual emotional energy designed to stabilize self-esteem or self –confidence issues that can tear a man apart.
Through encouraging people to use my books as art and make music or movies my work becomes a legend and dmc and the other books I have written influenced these powerful men and woman whom are my fans mine as I am of them earned watching me then fight to protect democracy or the Presidents team protecting the world.
Stopping the visualization and determined in part by the mental attitude withdrawal symptoms experienced within the mind when stopping the conditioning mentally is the sounding board of how deep you’re in and whether your living a multiple personality disorder or if your being empowered safely through advanced technology mixing with science and psychology.
Your own psychology failures or success is the hardest to see from behind the eyes of the science experiments in self-empowerment theories of the brain or conditioning the brain for battle against the economy and corporate world or a war of love and roses with a tattered spouse, your living together within a world daily.

Ordering a Fantasy Lover
Managing Violence or Sexual Crime Before it Happens

Empowerment is the key in positive energy based conversations guilty by association to good gentle man or lady like conduct. For 2 weeks the lover ay man dreams about having and then she is kidnapped and held for ransom and new beautiful detective needs to interview or speak to him or her in the grid and they fall in love for 2 weeks and then they have to leave and they have a friend who likes them and wants to meet them and the entire time guilty by association to good behavior and lots of soft gentle love that has been abused and you need to help her if she is sad and make them a teacher of normal behavior patterns. The sex in the mind is a little rough to start but graduated out of the sexual patterns by the 4th week. This is a 3 week relationship he teaches her DMC on the grid and she has a computer and so does he or vice versa and she works and is only available select times. The person is in training and the best way is education as a teacher teaching the topic because you learn the entire program and this naturally educates the predator not to do this bad behavior and then he is so good he has to help others predators online from home to learn the next purchased DMC program, the predator is then setup to teach DMC to the next predator and in doing so becomes guilty by association to the positive energy naturally found in the program that naturally shifts the predator to a positive state of mind away from the core creation of crime negative emotional energy. Stabilize the quantum energy mathematically in science using DMC deep inside of the person’s brain.
Combining the video program with the imagined lover is a real solid way to stop the masturbation in front of the television screen. The music video file is sexy and yet no intercourse or kissing or oral sex and as a result the association to masturbate during pornography has been replaced by sexy video and a need to masturbate privately under your covers in your bed. This a covert strike on the dysfunctional sexual behavior linked to pornography and later in transition out of curiosity child pornography. Stopping the viewer from visualizing the rough sexual acts found in pornography. Box the person into a timed sexual psychology box sexually drained surrounded in positive correct associations to mental habit patterns. The words in the music videos are DMC conditioned singers created through a sweat labor ideas of economic ideas and in return singing information in music that is empowering or positive connected to me seamlessly.
This creates two ways two manage the predator and create the sexual behavior patterns most accepted within society according to the laws of the land.

Perry Ritthaler Digital Mind Coach Science Research

April 1 2007-04-01

Walking Through the Door of Insanity
Walking Back Through the Door into Sanity

Creating the Environment for an Insanity Test designed to walk in and out of insanity often enough to understand the path.

Please do not try these experiments unless you are a trained professional in war sciences in energy and war sciences in psychology.
The path is incredible to see and yet amazing in the ability to shape your mind auto pilot according to a seamless story in your mind. The story you want to be real, the one you fantasize most of and would do anything to attain. My experiment is of such a tale and today I write the information I have learned.
I wanted to be a fictional fantasy Hollywood super hero and I did safely for over 18 month 7 days a week 70 hours per week until I burn out mentally and then fall in love and have a solid career.
I started small by helping people stay alive in other countries in the world where conflict and death occur naturally and in doing so create a better planet for the next generation. This experience was quite rewarding and I personally found the experience changed my state of mind and under pressure created one miracle after the other for some people. From food to medicine one child after the other stayed alive and in time I was able to gain celebrity support and many miracles were created by many people. The phenomenon lasted almost 2 years and was gaining momentum to empower the USA and Canadian and British economies. From tourism to investment a program that just moves money in and out of countries in the Western empire or global economy.
The energy I designed also reached into the Middle East, Africa and South America and Europe, Russia and China and through PDF robotics stabilized vast regions in violence or natural disaster in need of support and stopped mass killings before they happened through miss managed policy or environmental catastrophe or change as a result of war or catastrophe.
Having the back ground of being injected when sane at the Ponoka hospital, I have a different knowledge of insanity and when I combine this knowledge with my knowledge in Psycho Cybernetics and Nero Linguistic Programming. Being Bi Polar and being told I have schizophrenia and SAD by 5 doctors has also shaped my minds habit patterns.
Attacked for a second time by the so called security grid and hit over 6000 time physically and about 4000 times emotionally sabotaging my self-esteem has also shaped my state of mind for over 50 days in a row.
Told stories one day I am in training one minute and hunted by the law the next in a mental assignation designed to place me in a mental hospital again if they can crack me.
The latest assault is on my man hood through a woman that was normal and created to love me with a verbal chemistry like heaven and then turned mentally dysfunctional and told she is raped or a whore contacting me to make me cry as she climaxes in the arms of another lover and this has also shaped my minds habit patterns. Other lovers have been hooked on crack and told to whore on Main Street and again all personalities delivered to me are mentally dysfunctional forcing me to work guilty by created associations with mentally ill text script read by people who do believe in what they read over time and naturally decline slowly unaware the habit patterns displaced slowly by negative energy like becoming a liar and slowly they become mentally shaped dysfunctional through guilty by association behavior programming consistent for over 21 days at any one time or in a build up over time mentally (covered in a training program named hardening) because the government program that shaped the behavior was auto pilot programmed into the security grid executed by people and the authorities changed behavior patterns over 45 days to create the association work environment of criminally insane circumstance appearing normal.

Government Objective

The game in the experiment was to prevent me getting a University accreditation for the work and steal my digital copyrights and frame me as a snitch to work for free hooking on the streets as a gay gigolo or turn me insane and placed inside of a mental institution. This fall from grace is set to prevent the mental assassination contracted against me by government too afraid I have become too powerful with my philanthropy movement.

Disclaimer

Creating a fantasy female lover along for company in the assault by making the combatant against me only deal with woman and in doing this, through a new sciences exercise training covert, while information is stolen off my computer is legal as long as I never initiate the contact with the fantasy lover. This fantasy lover is an extra personality door in negotiation and will serve as a mental cover tool for the assault give me in an assault.
A psychology seamless weapon made of quantum energy designed in thin air to covertly turn me mentally insane and yet not.
Using the psychology insanity weapon on myself administered by authorities unaware, will do an incredible amount of controllable mental damage provided I am half friends with my combatants and they do not push too hard or I fall to deeply in love and if I do, I may just blow up my habit patterns and cognitive connections to habit patterns flowing through my dominant thoughts rolling through my subconscious mind into the conscious decisions and actions taken by the conscious minds.
This may cripple and hurt my brain, complicated by the stress of facing the covert strategy of the Western Empire and authorities stopping my nutrition for a 45 day period of time. I need the nutrition for my brain to stay healthy while I am hit in the experiment to protect myself seamlessly however given sparingly seldom and controlled by digital signal somehow.

The Digital Girl Friend Phenomenon

Even though I know the girl friend was created by me telling the combatant I can be taken apart if they use a woman. Through daily baiting the woman concept seamlessly covert when digital oppression or torture failed to break me permanent. The natural reaction is created in my mind as the concept of woman is created to take me down. I will cover part of the mental damage to me personally by becoming the authoritarian resource relying on my education in Psych Cybernetics and Nero Linguistic programming to carry me in the resource role mentally and in an experiment in insanity I will discover the paths of insanity created under stress, lack of nutrition and the dysfunctional relationship and then write a book and use the data to further my research in mental insanity recovery or the creation.
The longer I play in the computer simulated role of having the dysfunctional girlfriend phenomenon the closer I move toward insanity the more I am played with mentally digitally and in some states of mind acting unclear as to the real reality I am experiencing. I am delusional and in a state of mixed emotions after the encounters with the digital communications with the fantasy digital girlfriend. The woman I have grown to love is being digitally raped in a simulator daily and this activity is designed to tear down here self-esteem and destroy her confidence within herself making her dependent upon computer communications and a sat box electronic stimulation tool and this actually hurts me as she cries in my ear as she is raped digitally and I hear how she is taken sexually.
Her lack of experience in staying alive and mentally competent in the field is evident every time she speaks reading off of computer and always appearing in a hurry and not taking time to enjoy the moment or patients to plan years down, the road in operations today that save or extend her life in a short few years down the road in the spy field if not prepared properly today.
I have 6 years in the game of volunteer empowerment and the lady is green and another smart covert tool the combatant used on me to crack me through my heart.
Trying to protect this beautiful Trojan horse is difficult and I cannot sleep with her so I will scare her daily with words like(get your hands dirty) into not meeting me or she may actually crack my mental armor through my heart.
The over achiever girlfriend, the genius I am in love with and unable to work with because she is designed to frame me in a crime if she can even if I did not do the crime. I am personally clouded by emotions of passion to be held due to the abuse I have gone through in the last 50 days. I wish to make love with the one I love rather than clear and simple planning through empowerment logic.
The lady does not exist and is a virtual digital audio simulation tool and yet I am in a computer simulated experience making her appear more real and more verbally rooted in my mind every day.
For days I am interrogated digitally and spoken in a cruel fashion 24 hours per day and every hour they hurt me emotionally or physically.
Her painful hurting or words of love mixed in pain feel like small glass shards caught in my throat, a feeling of happiness helplessness, like drenching a dry throat by swallowing water filled with glass shards and feeling them slowly get caught in your body cutting your heart. Flowing into the sole like a mental potion that she wields slowly flowing like poison down my throat.
The exercises filled in unlimited amounts of mental emotional pain are seldom filled with pleasure and for the first 21 days the entire digital communications program admitted to illegally claiming the mind game is all about entrapping me any way possible illegal or legal and lie to me constantly.
I have gone to the RCMP station and looked foolish worried the lady police officer I am in love with digitally that I truly believe is being hurt by digital terrorism, hurting woman mentally covert under the heading hardening (a program to keep woman from climbing the ladder by breaking the self-esteem, like me being tortured) (the hardening makes you tougher and stronger with no desire to ever climb the government ladder unless approached by the government) (shattering my desire to go to the top naturally) and real mental rape situations and with my emotions rolling wild like a set of category 5 rapids in violent river, I march down to the station house to defend her honor and look like a fool publicly.
Again another foolish move on my part to try and defend a woman I love in a fantasy, living inside of a delusional state of mind created in audio or visual psychology by the government. My psychosis experiments kicked in automatically after 10-15 days of starting the digital fantasy girlfriend program. During this time of study I am working in another experiment involving a quantum energy virtual digital brain I am testing to see if I can return to sanity after the experience tests in insanity.
I am mentally done in torture psychology and during this time seamlessly creating decision to return back to a safe state of mind through a theory working inside of an invisible virtual brain within my mind. The lady is not real and even though I believe she is (as I slide deep into insanity caverns within my mind) created by my desire for a relationship with a fantasy police woman. A relationship complicated my lack of affection received sexually in the last years of my life.
(2 woman and 3 interactions in total)
Today I am in search of love and how I have been trapped by the security grid. A woman I hear I love and she is in search of a digital mental assassination ending in a mental hospital. The she chooses to do is me and every day I mentally make love and kiss the one who has a desire to take my life and freedom away from me. She is my girl and when I cry when she is with another man and she calls me to tell me she is coming sexually and then when I am encouraged to cry real tears she tells me she climaxes higher and better.
I experience cravings to speak to the one I love and again this is dysfunctional if the lady is a fantasy fictional character. I want my woman and I really want to hold her and kiss her and tell her I love her more than anything in the world. If I do every time I do it is a crack sign displaying signs of delusional digitally created insanity. Without my theories in virtual brain, beliefs in a second virtual brain allow me to transfer information and to step back and see the insanity exercise and guide myself back to solid mental health. This is again a fantasy to have a virtual brain and yet possible if you believe it is possible within your imaginational energy flowing within the quantum energy flowing within the sole. The girl friend phenomenon grows more powerful day by day and I actually really look forward to the conversations with my fantasy girlfriend. Through loneliness she has over taken my affection heart mind connection and inside of this embryo she beats me silently and mentally with words or digital signals that inflicts pain upon my body. The abuse creates a sense of longing for true love and yet the abuse is entwined in my love and desire for her weighted naturally by the starvation of waiting for the right lady to come into my life and love me. She sends me images of me in bed with her and 2 others and it is old pornography I have seen and have no respect for in my mind. I know she wants to be wild however the fun is covert pain scratching holes in my self-esteem and confidence within my mind like cat scratches upholstery.

Ordering a Fantasy Lover
Managing Violence or Sexual Crime before it Happens

Empowerment is the key in positive energy based conversations guilty by association to good gentle man or lady like conduct. For 2 weeks the lover ay man dreams about having and then she is kidnapped and held for ransom and new beautiful detective needs to interview or speak to him or her in the grid and they fall in love for 2 weeks and then they have to leave and they have a friend who likes them and wants to meet them and the entire time guilty by association to good behavior and lots of soft gentle love that has been abused and you need to help her if she is sad and make them a teacher of normal behavior patterns. The sex in the mind is a little rough to start but graduated out of the sexual patterns by the 4th week. This is a 3 week relationship he teaches her DMC on the grid and she has a computer and so does he or vice versa and she works and is only available select times. The person is in training and the best way is education as a teacher teaching the topic because you learn the entire program and this naturally educates the predator not to do this bad behavior and then he is so good he has to help others predators online from home to learn the next purchased DMC program, the predator is then setup to teach DMC to the next predator and in doing so becomes guilty by association to the positive energy naturally found in the program that naturally shifts the predator to a positive state of mind away from the core creation of crime negative emotional energy. Stabilize the quantum energy mathematically in science using DMC deep inside of the person’s brain.
Combining the video program with the imagined lover is a real solid way to stop the masturbation in front of the television screen. The music video file is sexy and yet no intercourse or kissing or oral sex and as a result the association to masturbate during pornography has been replaced by sexy video and a need to masturbate privately under your covers in your bed. This a covert strike on the dysfunctional sexual behavior linked to pornography and later in transition out of curiosity child pornography. Stopping the viewer from visualizing the rough sexual acts found in pornography. Box the person into a timed sexual psychology box sexually drained surrounded in positive correct associations to mental habit patterns. The words in the music videos are DMC conditioned singers created through a sweat labor ideas of economic ideas and in return singing information in music that is empowering or positive connected to me seamlessly.

This creates two ways two legally manage the predator and create the sexual behavior patterns most accepted within society according to the laws of the land.

Breaking Down My Respect for Woman Seamless

My respect for woman has been smashed with the operation that has been implemented upon my mind.
Hard to think I would not respect woman however if you take a man’s woman and rape her in a simulator and then teach her to be a crack head whore on main street and fuck anyone she can on sat box claiming she has to due to the government job she has in policing. Having your career fantasy police woman take a volunteer path of self-demise into chemical addiction or prostitution to be a snitch on Main Street busting John’s while becoming sexually turned on every time her man is hurt hit or cries. By having me fall in love with this woman first the self-respect for her or other woman vanishes within my mind.
Adding to insult and mental injury she now enjoys having 3 ways sex involving all holes filled at the same time using the grid implementing 2 men I do not know and me. Having the man come in her pussy and having me eat it out and kiss her is a special fantasy of hers.
So my respect for my girlfriend is nonexistent and my respect for woman empowerment has been changed seamless using a woman that took me out helping woman and children survive with more liberties and rights on the planet.
This is obviously a man-made operation designed to again oppress woman further down the respect chain in my mind. With no respect created for woman a predator starts to hate woman and the country that did him dirty and in this formula you start the process of creating a rapist that will hurt women in private environments. By adding pain to the orgasm you fast track the pleasure association to hurting woman to come or men. The woman I was in love with will have no trouble being raped or raping another person so she will be taken down eventually when finished by raping another person and end up under cover in prison working with the bikers covert. The woman is too stupid to get this and this makes me liable so dating her is career suicide and why I terminated the fantasy relationship before I was framed in a crime and sent to jail with no respect for woman facilitating the turn to homosexual behavior desired by the sick politicians watching the self-demise of woman and rights at the top.
To expand the connection I am encouraged bothered repetitively on masturbation cycles to go sexually with another couple and bi sexual with them in the grid and then this footage is shown to the one I love to encourage her to hurt me in pornographic grid images and the cycle is created to control each other seamlessly through hatred and yet in love to insure we will do each other one day if we continue or either one of us used to do a job involving sex and still stay together as a team.
This gives me the illusion I am being recruited and yet with my medical back ground and criminal record this is a dream and a set up for me to lose respect for woman and end up gay and in jail.
Rather than (win win) the government took the approach of him or her in jail based on the operational activity and psychology asked to be implemented by the police to create a snitch under cover with bikers.
I would take credit in pioneering psycho cybernetics and neuro linguistic programming in programs like Mind Escape in the 1990’s and Digital Mind Coach in 2005 for being the first person to mix visualization art into cybernetic psychology programming. Auto pilot the human brain into a set program of auto pilot IQ increase and creativity and performance building a super power mental capacity in a complete mind map program complete with schematics.

Learning How to Set the Operational
Speed of My Bi Polar Brain

The bi polar brain is a genius brain that has an ability to operate faster than a normal brain on the cross hares of mania if the habit patterns sexually or in pain and anger are no longer dysfunctional and naturally over ridden through digital cybernetic programming created by the Digital Mind Coach cd programming E books. Rebalance the quantum energy (thought process) and you change the persons operational energy and as the changes in habit patterns and dominant thought programming change the energy flowing through the mind is also changed and as this energy is balanced so does the bi polar mind. Creating a faster stronger powerful state of positive energy mind and the best part a positive attitude increasing creativity and performance and there is nothing like a bi polar person on a role in a positive energy success cycle. From dysfunctional to genius when the chemicals are treated in the body through low dose Risperdal medication and vitamin nutrition plan a more powerful energy balance is chemically created in the human body.

The Virtual Mind within the Human Brain Triggered When Under Attack Psychologically

The human brain can create another state of mind using marijuana and within this state of mind actually have a virtual mind and within 45 – 120 minutes the virtual brain evaporates and the original state of thought is recreated by the less drug induced brain. Working within this invisible state of mind my thoughts are different. Controlling the drug induced state is the key while achieving the results you require I research. I live within a platform where I have 2 minds within 1 brain and have for over 30 years. Every time you smoke marijuana it takes you to another state of mind and if you’re used to that state of mind you learn to function safely within the altered state of mind.
Mental illness is a state of mind and within my stoned mind on marijuana I lose the connection to passion within a relationship. That real love emotion connection rather than stoned and feeling not to close and like I am flying someplace close to one I am holding in my arms. More focused on the sexual act as opposed to the actual person’s feelings and yet loving and caring just the emotion of being hurt is dulled or mentally connecting is changed slightly.
So if I stay stoned on and off all day I have the benefit of two states of mind when facing challenges or problems and if I want my life changed through enforcement I straighten up for a week to ten days and if not I live between 2 states of mind and am less susceptible to mental sanction into insanity. The key is making friends with the combatant before you run out of sanity in both states of mind. While I am in one state of mind the mind that was assaulted heals and then when the other state of mind is done the other takes back over and if not repaired fully partially and the stoned state of mind return while the brain heals again in the more emotional state of mind where things sometimes are even harder to let go.
The mental trick is getting the resistance in the human body up to the marijuana and still attain the stoned state of mind functional and yet altered from the damaged minds negative energy emotional attitude, your living within the brains battlefield of emotional fights and conflicts or endless problems.
The skeptics will say this is not possible according to science or psychology and this only a state of mind that has changed and this only a different state of mind. I respect the opinion and will try to explain my theories in why a virtual mind is possible.
The imagination wields quantum energy and this energy is either powerful or weak and the more the powerful the more you can build and do with the quantum energy mined. The mind experiences emotion from an action taken and if this action taken was in imagination the action of the imaginations trigger emotions or if this action was of a physical nature again the emotions would be triggered as a result of the emotions going off inside of the brain.
So what if the imagination visualized a second virtual mind and in a certain state (stoned) repeated the actions and as the mental visualizations actions repetition occurs in the mind’s eye the habit patterns are then created within the dominant thoughts. Then real or imagined the emotions of experiencing the virtual mind would naturally appear in the mind’s eye as a second mind and as this virtual minds functions naturally grew through habit of being a stoner the dominant thoughts programmed the sub-conscious mind and so the natural ability to deal with emotions whether the emotions were real or false in a state of mind stoned on marijuana.
The emotions in a person’s mind are different when high verses straight and in this separation of emotion a secondary engine to deal with stress emotions is naturally created because the two states of mind are left and right brain especially if you are right brain driven driver achiever. This opportunity to build a stronger connection in the energy flowing into the left right brain connections functions and these functions create a mental energy cluster if the sub-conscious mind and the conscious mind are programmed properly with affirmations and dominant thought and proper goal setting process creating the mental foundation that the virtual brain evolves within the imagination of the person in the stoned state of mind. Taking this one step further within the virtual mind is my virtual city housing a 1-4 buildings of master minding programs that entwine into a nucleus fueling the sub-conscious mind stimulating the interactive conscious mind and all constructed in the imagination created by imprinting repetitively what you wish to mentally visualize through your mind’s eye.
Creating board rooms with people created in master minding theories and sciences working on the floors with elevators and parks and night clubs and restaurants to socialize with friends.

March 21 2007….1:29 am

DMC Programming
Personal Empowerment into the Mind
Creating Virtually No Criminal Desire

Expanding the Powers of the Brain’s
Self-esteem and Self-confidence and Self-expectation
Creating a Virtual Brain
Built in Quantum Energy Sciences Operational within the Human Brain
I built a Digital Mind Coach operational manual for cognitive though platform programming and a video archive program to create emotional energy at a mouse click. All programs intertwine acting as a central digital virtual platform of a brain within my imagination designed to expand my creative capability or through action performance expand my self-esteem when under attack mentally by the world or environment I live inside of daily. Another step inside of human computer interface programming an invisible virtual tangible quantum energy product tool to develop the human brains performance.
The program involves masterminding combined with digitally fed 80% female video and 20% male video and mentally brain washing the images into my mind for 8 month at a view rate of 40 hours per 7 day cycle combined with masturbation sexual fantasy regularly.
I expanded the experiment by sending the Hollywood stars a series of economic empowerment ideas and a copy of my book that conditions a love auto responder to me. The idea is to get the ladies and gentleman to do a video for me in return for the ideas and then eventually a series of marketing account when the experiments end. Perhaps even a starlet girlfriend if the work develops properly. The videos were crafted in the course of 1 year and the empowerment went on for 3-4 month thereafter and will happen eventually again in a 3rd cycle of economic empowerment designed to capture the marketing account.
The feeling of knowing the video was built with me in mind is a huge self-esteem boost for my personal character and confidence in my man hood especially after hearing the words to the songs.
The self-fueling self-esteem increases self-confidence and expands the positive attitude and in turn expands the creativity of a person as well as increasing the overall performance of that person.
Guilty by association to an industry of beautiful digital fantasy girlfriends 25 years younger than me keeps me thinking young and implants a desire to have a firm hard figure so in my fantasy I fit in even better. The video is always beautiful and the makeup is never off or messy. The video sings a beautiful song of love and a fantasy of hearing the one you fantasize of loving sing beautiful is another euphoric high within positive energy.
(The experience within the mind is unaware if the actions are real or fantasy so you can trick the brain into experiencing the emotion using props and tools that can control the effects scientifically in this experiment on masterminding and split personality or increasing self-esteem and confidence at no capital costs once the psychology systems running smoothly within your mind’s eye.)
So mentally auto pilot every time I watch a video in fantasy state of mind I visualize the lady as a sexy friend without pornographic intercourse visualization. I wish she was my girlfriend and some time I mentally cheat and say the video queens are my girlfriends and 8 month into the experiment they are my girls and still not my girlfriends. I respect them enough to make them trainers and me the target and because the ladies are not pornographic the sexual stimulation is a teaser and not a sexual intercourse predator. That means working steady and in the gym regular and becoming successful enough to find my true love is empowered because the ladies are sexy and in physical shape naturally encouraging me to go to the gym and one day I may meet a woman as powerful in the empire I build, my own empire living a life style physically fit and feeling very sexy. Leverage within my own mind controlled by a key stroke on computer to get this 46 year old young bachelor to feel like a 28 year old stallion and perform like a younger man again full of energy vim and vigor. Emotional fuel created by in conditioned set of habit patterns inside of a stable controlled environment. Music videos carry emotional energy and through strategy combined with visualization the formula creates invisible positive energy emotions fuel, like sexual stimulation mentally (watching music videos I have a hand in covert designed to increase mental impact of emotion stimulation possible without human interaction) gathered internally channeled into energy within the brain-heart quantum energy connections within the human brain and body. The home based 1 year study located within a controlled home environment allowed the experiment to turn into theory and then a practical program in quantum energy manufacturing, creating a specific virtual brain within the human brain, internally manufactured specifically targeting the mental anchors of the Digital Mind Coach programming inside of an affiliated digital program. Building a self-fueling program that naturally graduates you toward a more positive creative expanded performance through actually farming your environment for energy and focusing your own 0 energy based quantum energy decisions or actions taken through dominant thought repetition patterns of anchored emotions. (As explained in the Planet Genesis Experiment Operations)
This allows me to mentally refuel my sole and mind dominant thought programming at will at no capital costs once achieved and may make me a great deal of money and a great deal of playful fun. Mentally anchored tools on my desk top that empower positive sexual emotional energy designed to stabilize self-esteem or self –confidence issues that can tear a man apart.
Through encouraging people to use my books as art and make music or movies my work becomes a legend and dmc and the other books I have written influenced these powerful men and woman whom are my fans mine as I am of them earned watching me then fight to protect democracy or the Presidents team protecting the world.
Stopping the visualization and determined in part by the mental attitude withdrawal symptoms experienced within the mind when stopping the conditioning mentally is the sounding board of how deep you’re in and whether your living a multiple personality disorder or if your being empowered safely through advanced technology mixing with science and psychology.
Your own psychology failures or success is the hardest to see from behind the eyes of the science experiments in self-empowerment theories of the brain or conditioning the brain for battle against the economy and corporate world or a war of love and roses with a tattered spouse, your living together within a world daily.
Channeling the raw positive energy out of the video into the brain during visualization is like an elixir for the sole and empowerment fill my veins as I watch my marketing unfolding before my eyes. Not paid yet however the proof is in the pudding and the stars look genius and beautiful and why I thinking seeding the market for 2 years with free ideas was good program and will open doors in my future as I open my own marketing empowerment company. At one time Oprah program that was almost complete.
Watching the new video is exciting and I feel like a kid in a candy store and naturally feel utopia experiencing grandeur euphoria (the experience of pleasure beyond your wildest dreams) after I leave the testing platform in my mind quantum energy balance and depart normal behavior thinking patterns I experience a new state of energetic mind and sole that is transferred into my sole and my personal brains quantum energy based and into a personal mental youth revitalization program.
(You’re as old as you feel or believe you should feel and this borders on shaping peace rather than death. Actions implemented and delivered to the brain re channeled through brain as digital video creating positive energy increasing self-esteem and confidence.)
During that state of positive psycho cybernetic implanting the mind soon creates a positive attitude improving the overall outlook on life.
The program is dangerous and needs a cooling off period on every encounter.
Then the symptoms slowly subside and if you’re in too long a master mind group of characters will soon be walking around deep inside of your mind or until the next testing cycle of natural euphoric empowerment cycle of splitting the psychology diamonds within the mind and mind’s eye.
Farming the brain for increased performance and productivity, creativity yields is possible today and through research opportunity arises.
Backing the new founded energy created by the person involved in video digital visualization empowerment and through video digital visualization is naturally programmed on a repetitive timed program daily. Gradually through anchored associations building a mental positive energy fuel cell on each encounter with the digital visualization naturally empowering the positive attitude naturally expanding creativity seamlessly increasing performance, you create a natural quantum energy stimulation virtual energy interface within your imagination and mind’s eye capable of converting the negative energy guilty by association into positive energy within your heart-brain quantum energy connections improving desire for a stronger self-esteem and as the person gradually is learning how to daily harvest the positive energy raw potential out of digital video file shaping the balance of quantum energy to positive energy in raw goods directly into the self-esteem into the sub-conscious programming within the brain. Naturally mentally farming the energy to improve self-esteem and how much you could potentially like yourself think younger guilty by association to youth portrayed within the digital visualization imagery. Naturally allowing this energy to fuel into a virtual operations system inside of the brain, created path potentials written into an operations schematic of the brain and understanding this information system naturally empowers your understanding of the human thought process in emotions and energy. The guide or program within the Digital Mind Coach programming e book allows the user to develop his or her own brains ability and potentials to expand creativity or performance, facilitated through incorporation of the target knowledge to balance the 0 energy quantum energy within your body chemistry brain wave functions, naturally delivered within the Nero Cybernetic programming of the Digital Mind Coach program and safely delivered into the persons mind through visualization.
Once you have the skills intact acquired through study of the Digital Mind Coach Program e book you are more likely able to flip degradation on contact as the mental assaults occur. Take the energy in the encounter and make it your positive energy beneficial rather than self-destructive negative energy. Create this experience safely through combining some aspects of master minding and multiple science theories combined using your virtual mind as a playground to create the experience.

Amendment

March 29 2007-03-29

Quantum Energy Mining Digital Video

Mining digital video is a quantum energy mining process that allows a person to take the positive energy out of the video and into your self-esteem if you have created an appropriate channel of energy release. The channel of the release must be mentally anchored into the material and the experience. In my case the videos are created by request for free marketing ideas and in the video or music or movies the theme of my work would prevail. The red a white colors and now the green allowing for diversity in color freedoms not hinged to one set of colors.
As a result every time I visualize the digital video I am gathering self-esteem because I really do in my heart and mind respect the power of these woman and men and the true talent they wield in creating and performing in the movies or music videos or songs.
So I naturally grandfather in the positive sexy energy in the mental current of quantum energy housing the positive energy directly into my self-esteem increasing my positive attitude and ability and willingness to work faster and do more.
Reshaping the personality for empowerment requires leverage and motivational fuel that requires a stable source of positive energy if the person is going to enjoy the transitional changes in behavior creation and then jelling and wielding habits safely in a transformed personality change. Ordering any personality you desire through understanding how to use Nero Linguistic Programming and Psycho Cybernetics safely inside of their mind. By adding this programming to the Digital Mind coaching Programming the combination allows a person to change personality traits they do not desire quicker and in my case a platform to continuously self-empower my brain without turning my mind backwards thinking of the good old days destroying my ability to set goals and plan ahead, rather a different crack in the mental diamond splitting the sickness of reversing the minds mental cognitive progressive thought process to gain a positive memory to create the self-esteem boost. Actual memorabilia on events like books written on major events or real celebrities videos honoring mental ties to your work in music video(personal anchor guilty by association to very successful people naturally grandfathering the right work ethics and programming to be confident, after all they are successful young confident powerful men and woman.
A new crack in new energy sciences using computers and science systems, mining created positive energy quantum energy and when operational when complete operational at no capital operational costs.

CHAPTER 10
Psychology Research Article

Next Generation Digital Mind Coach Programming Preview

The E book cd is speech interactive on every slide explaining the page in detail and will be out in the New Year soon.

Pornography Stepping Stones

Some of the child porn offenders start with normal pornography exposure during their life span and graduate into sexual dysfunctional activities later in life.
This cycle starts when the person is young with friends and later with a sexual partner if you want a more expanded description of sexual interaction or visual education.
The pornography with your lover and friends is usually not violent and cruel in fact the visualization is exotic and forbidden to most people. This visual stimulation naturally creates an excitement that can drive the mental education deep into the sub-conscious mind every time the visualization is accepted as the norm and part of what the person desires in the heat of sexual frenzy. As the visualization is developed in the person a natural dependency on the visualization occurs and the person is hooked into a sexual habit that may end up controlled by the pornography industry seamlessly.
It is within this mental association to the Nero linguistic association habit patterns and the dominant thought connection inside the psycho cybernetic mental plastic surgery created watching the visualization forged into the fabric of the sub-conscious mind, that the trouble can start to brew into a peculiar mental quantum soup connection within that person’s life. The sexual climax is the focus of the energy and is timed in a specific part of the video and this is dependent upon the content of the video and not so much the person themselves however guilty by association the behavior is shifted and the person adopts the habit patterns within the visualization and then the video is not the guide and person affected by the digital visualization is then effected.
The mental thought patterns and sexual associations fall into the cracks within the dominant (as the thoughts travel instantly to and from the sub-conscious mind into the conscious mind) thoughts resting inside of the sub-conscious mind. Thoughts locked up inside of the emotions matrix within that persons mind into actions taken and through the mind’s eye this is engaged and starts through imagine associated dominant thoughts anchored to pleasure and if sexual the pornography may be the strongest association grandfathering in the natural behavior patterns of that person mentally conditioned.
As the process of pornography grows inside of the person affected by the hold of the sexual visualization stimulation the need for fresh material grows and person moves toward the video store and finds new material to sexually stimulate their body and mind.
(It takes 21 days to make a new habit so the person renting for a week new material every week will still create the new habit patterns based on visualization of the pornography and owning the video is even more dangerous because now you can seed the specific orgasm visualization into habit pattern seamlessly based on what content you own keeping out of the video store or internet.) However this is even a more dangerous trap if all you own are rough sex videos or child pornography because now you are tutoring yourself on becoming sexually dysfunctional and as the negative energy increases within your personal life, the easier it is to accept the child pornography ( emotions negative like anger or hatred greed or lust or jealousy) the faster the associations to dysfunctional sexual behavior occur seamlessly, deep inside of the mental quantum energy soup pot boiling deep inside of that persons mind.
As the person looks for new sexual stimulation they push the envelope looking for a pleasure high in the privacy of their own home; and accidentally or intentionally or in curiosity and search out child pornography in the internet or from a friend. Unaware the child pornography can make the person mentally sexually ill in conditioned acceptable standards in sexual behavior and unaware he or she is a walking mental virus that can spread to family and friends as they are exposed to the child pornography or that persons behavior patterns.
So depending upon how soft or hard the pornography is the person will become conditioned over time. This challenge is complicated by different video content laws globally and the internet file sharing programs peer to peer. As the rough anal sex and child pornography makes it into the world the mental associations grow and so does the crime seamlessly.

Graph

The graph above is a rough drawing of a formula to identify the time a person has been penetrated mentally by an over load of porn or child porn and the decisions become clouded. Sexual dysfunctional territory can be computer analyzed in a variety of ways.

DMC and the Planet Genesis both deal with quantum energy and vocabulary producing quantum physics psychology, mentally controlling the quantum physics energy of the individual producing actions within daily life style activities. When your mind pattern is too far off the DMC program you are sexually dysfunctional in an over load of negative perpetually stimulated repeat cycle of energy.
The vocabulary produces energy and so does the working knowledge level of that person’s knowledge of how his or how brain functions. These programs combine with dominant thought anchored beliefs and the mixture creates your own version of your evolutionary life style and accomplishments. This is a computer driven numerical number program I am working on myself based on behavior plus vocabulary plus work load and social load data.

Recommendation for Pornography Stepping Stones

Every day people wake up every day to succeed and the energy they wield and situations they think about creating potential failures or solutions shape some of that destiny.
Make soft pornography popular and rough or dysfunctional pornography UN popular by making the music video popular.
I have an experiment study operational (October 31 2006 – April 31 2007) on sexy art and in that experiment I mentally anchor the video to an emotion, example happiness or physical fitness or becoming successful in business and for finding a girlfriend. The duration is a 6 month study operational I used the digitally visualization stimulation file folder downloads on my desk top, that is extremely soft porn downloaded free off demonoid.com in fact it is downgraded to sexy art and has replaced my desire to watch pornography. I can also see the effects in my outlook on life guilty by association focusing on the younger generation’s artistic talents. I think I am younger than I am and in doing so think younger in my goals or physical expectations, I am 46 thinking 28-37 as a result of the experiments naturally changing date expectations (an industry norm expectation in dating a person within 10 years of your age). This will create a dysfunctional age barrier and yet legally settle the predator into a safe relationship the predator is anchored into naturally.
The side effect is you become a real tease as opposed to a sexual predator wanting to climax at a specific point within the video when the sex is the hottest emotionally creating the biggest bang for the stimulation based on dominant thoughts flowing in and out of the brain at that point in time.
The desire to masturbate during sexual arousal sexy video is decreased naturally in the mind and mentally due to the fact that the videos are sexy and hot and keep your attention with no sexual interaction intercourse or Felecia the person loses the desire to masturbate during pornography visualization because the time is better managed and only so much time can be spent on sexual visualization or no work is done and you go financially under or you miss sporting or social functions or spending normal time with a spouse or potential significant other.
I did this through a computer program named Digital Mind coach that shapes Nero associations and psycho cybernetic habit patterns into a stable positive energy balance and through this visualization the person soon learns the pornography is unacceptable and mentally harmful. This is a natural automatic connection because the manual in Digital Mind Coach is based in positive energy and is a map for the person affected to mind map there personal performance habit patterns and associations to decisions or ideas they create. I have treated over 30 thousand people peer to peer seamlessly in Demonoid.com and thousands off my web site during the time the program was offered free by me to the public.

Energy flowing Within the Mind’s Eye

Energy that takes a life of its own self-revolving within a negative energy quantum energy operations field deep within the brain as seen by the person’s mind’s eye
(Like a virtual brain growing that keeps expanding like a virus infecting the actual brain because child porn is digital video and inside of the imagination the negative energy clusters start to flourish self-fueled by an association to gain pleasure through a reversed association to normal safe sexual interactions, abandoning adults to focus on children in a controllable environment like there persona home and then in the public as the condition exacerbates itself and taking over normal behavior and decision) (inherent ability created by accumulation of habit pattern placed into the dominant thought habit pattern cycle fueled by sexual release energy created in a habit created by the person in deep water visualization child pornography and masturbation combined.)
Acting out an action may be associated to a person looking similar to the visualization of the person being violated within the child pornography or if the world increases the negative energy base within that person’s life. Issues like 911 or Katrina or the war can influence the negative energy base of humanity and through disaster increase the sexual molestation of children. The mental quantum soup of the attacker is boiling in an over load of negative energy created by environment or personal relationship or financial pressures within his or her world.
The energy analysis of the person and potential environment can describe the energy association to behavior in negative or positive dominant though energy programming shaping vocabulary shaping emotion and interaction actions with others around them safely or illegally.
The study on the person who may be a sex offender can be designed in a written test score uncovering the quantum energy formulations operational and mental triggers leading to violent acts of sexual dysfunction within that persons brain and done by a licenses psychologist working with interactive programmed computers to look at a situation to uncover potential candidates based on vocabulary plus environment plus genetics plus mentor influence and television programming influence. The tests can be video based and power point interactive designed to stimulate the energy actions created in the brain and done in a confidential environment of the home in today’s technology only in the case of an actual case that is repairing the person in a service created to improve the success rates of prisoners leaving prison and into society and eventually working within the prison system shaping the minds of people encouraging them not to re-offend.
Computer programming implanting proper positive energy combined in stable thought process ingredients designed to shape a more powerful brain thinking platform. A computer program like the Nero linguistic psycho cybernetics visualizations (mental plastic surgery if repeated for 21 days and only on a volunteer basis to better one’s own life done at their own pace of their own free will. democracy)
Digital Mind Coach that helps people find solutions bathed inside of as covert mental positive energy implant in psycho cybernetics and why people like viewing the Digital mind coach programming especially when one’s own dilemma to decrease the negative energy in actions within that person’s life needs educational motivation.
(New combinations created within computer energy psychology science)
Accomplishment or any emotion generating out of bounds evolving deep inside of the mental combination deep inside of your mind will end up red flagged in the computer program.
I accomplished experiments written in the fantasy fictional books President Fantasy Spy. In the study running under the fantasy fiction novel I reshaped the worlds look toward negative energy and how the outcomes shaping evolution. Working in the music industry and movie Hollywood industries and wrestling or political arenas or war arenas guilty by association through education re-balanced the negative energy aspects of a self-drive world.
Changing people’s actions they wield to positive energy through education science and technology changing the emotions and the effects of desperation to opportunity in some regions of the world or death or mutilation converted to living in war and then survival and opportunity for soldiers and civilians overseas.

Stopping a Sexual Predator in His or Her Tracks

Targeting sex offenders that hurt children or woman or men is an interesting challenge. I would have a computer program written that sexually targets the person in question. If you’re a man you hear a sexy hot woman that comes into your mind morning and night via computer. A sexually stimulating conversation designed to get the person to climax listening. Sexual interaction in the privacy of their home alone and drain the sex drive out of the person morning and night. I would also go into the food chain to slow his or her sex drive down by making them purchase a specific food that naturally drains sex drive. Control the orgasm timing in that person being monitored and slowly using conversation and sexual positive energy reshape the psycho cybernetic connects to the dominant thoughts and actually solve the mental puzzle speaking gentle after sexual climax and make a friend whom listens to his or her mentor on computer 6 days per week monitored 1 hour daily in silence the first 3 month and eventually every second day and then 1 hour per day on a maintenance program.
Target the person after the grid discovers them in a pilot program designed to control the sexual function of the person dysfunctional and shape them mentally into a productive human being using a new computer script program 365 times a year for 1 hour per interlude that stops after the person has a conversation about the interaction and this is designed to make the person a lover that speaks after sexual interaction and is encouraged daily to hold adults (done covert) and mentally be loving and caring after the sexual interlude( by praising the good behavior and sounding hurt if the behavior is incomplete ) (work off the hearts side of the quantum energy brain heart connections within the sole) twice a day interactive computer scripts that provide the digital sexual stimulation designed to control sexual actions. Actions learned guilty by association to the computer scripting or live interaction weekly ( lover test on how stable sexually or romantic he or she is becoming guilty by association to the computer script and how sexually stable in relationships or if they are looking for one special person and if so have a data base to pull names from of people interested in romance {provided psychology profiles match to make stable people out of both people }{ying and yang}, encouraged) ( audio programming is customized in the person and is a special digital friend they will never part with) while listening to programs that can last up to 1 hour twice per day on sat box security program the person is shifted into a seamless arranged marriage and fast tracked into a successful life.

Potential Financial Solutions

Appeal to the Bill Gates foundation for a grant for sexual offenders to insure they have access to a computer and training on computer for the influence in the advertising exclusive within the predator network when constructed (financial incentive)that is hooked into the government unemployment site and internet paid for through government resettling the sexually mentally ill person back into the work place (financial incentive to pay for the computers and programming while government trains people unskilled to operate computer in a collective coop agreement.) Understanding more about mental sexual illness dwarfing normal sexual interaction behaviors in visualization is relatively new field of psychology sciences especially when combined with the theories in quantum energy.
The Microsoft computer or Apple computer comes with permanent parental locks on any pornography of any kind.
A computer loaded with 150 gig video file with sexy videos. Shape new sexual masturbation thought patterns in the person’s mind that do not involve children or aggressive sex and the videos are sexy to watch. Allowing a safer sexual vent and discourage any type of pornography magazines.
A visual masturbation tool that can interact with a computer program through the security grid that discourages visual masturbation in front of a digital screen by implementing a behavior program covert like “Digital Mind Coach” and verbal digital coaching inherent within the person’s daily digital 1 hour programming morning and night.
Digital Mind Coach is read daily every day until the person can pass a written exam on how to control the dominant thoughts and habit patterns of that person.
Control and shape a positive sexual window of production and potential girl friends or boyfriend’s opportunity of the person sexually mentally ill hooked on child pornography or violent sexual pornography visualization.

Potential Computer Scripting Solutions

Creating the Sexual Conversations Raw Data for the Scripting of the Sexual Behavior conditioning Program

The easiest solution is to have the police and RCMP and CSIS or the Canadian Security Agency or any government agency employee the opportunity to create the raw sexy material for the 730 hours of computer programming is to have each officers wife or husband write a 10 page letter of what they could or would say to turn on the husband or vice versa the wife sexually and make them climax telling them a sexy hot story and write out the answer and submit the information into a contest for 7 day cruise paid for by the Canadian government.
This is also the opportunity to print all of the stories gathered into a hot police sexy story book and sell the book as a provocative fund raiser to book publishers.
In each division of security a financial royalty may be paid by listing all the agencies involved on the front cover and first names of the people involved in the book of sexy bedroom stories book.

Disclaimer

Creating the lover program can be an assignation creation tool because eventually the person will do anything to defend or protect the seamless friend that he or she is digitally seamlessly sexually active together with daily. This is a very dangerous formula that should be classified however if applied properly will curb sexual dysfunction into a new sexually controllable computer driven function over time.

Perry Ritthaler
Digital Mind Coach
Science Research
Amendment

March 29 2007-03-29

Quantum Energy Mining Digital Video

Mining digital video is a quantum energy mining process that allows a person to take the positive energy out of the video and into your self-esteem if you have created an appropriate channel of energy release. The channel of the release must be mentally anchored into the material and the experience. In my case the videos are created by request for free marketing ideas and in the video or music or movies the theme of my work would prevail. The red a white colors and now the green allowing for diversity in color freedoms not hinged to one set of colors.
As a result every time I visualize the digital video I am gathering self-esteem because I really do in my heart and mind respect the power of these woman and men and the true talent they wield in creating and performing in the movies or music videos or songs.
So I naturally grandfather in the positive sexy energy in the mental current of quantum energy housing the positive energy directly into my self-esteem increasing my positive attitude and ability and willingness to work faster and do more.
Reshaping the personality for empowerment requires leverage and motivational fuel that requires a stable source of positive energy if the person is going to enjoy the transitional changes in behavior creation and then jelling and wielding habits safely in a transformed personality change. Ordering any personality you desire through understanding how to use Nero Linguistic Programming and Psycho Cybernetics safely inside of their mind. By adding this programming to the Digital Mind coaching Programming the combination allows a person to change personality traits they do not desire quicker and in my case a platform to continuously self-empower my brain without turning my mind backwards thinking of the good old days destroying my ability to set goals and plan ahead, rather a different crack in the mental diamond splitting the sickness of reversing the minds mental cognitive progressive thought process to gain a positive memory to create the self-esteem boost. Actual memorabilia on events like books written on major events or real celebrities videos honoring mental ties to your work in music video(personal anchor guilty by association to very successful people naturally grandfathering the right work ethics and programming to be confident, after all they are successful young confident powerful men and woman.
A new crack in new energy sciences using computers and science systems, mining created positive energy quantum energy and when operational when complete operational at no capital operational costs.
When specialty mining you can create any type of program product or service you completed successfully. For example your greatest pictures of you doing a service for humanity. Pictures of you getting awards or days you looked hot and the pictures were captured. Create a self-empowerment book you keep in a special place and can pull out to remind yourself who you are and how important you are to society and how proud you are of your accomplishments.
I like movies and music video dedicated privately in reflection of my desires or as a show of thanks or respect to me for my contributions to their career.
Either way you need to manufacture a tool or series of tools to accomplish the task in your own environment.
My tools are expensive to make and require a great deal of dedication to build and will last me my life time and provide a potential market place of accounts for my marketing company.
When marketing as an entrepreneur the market is a jungle and if you can create an edge you create an income and if you own your product you are motivated seamless income.
In essence shaping the mind’s eye positive and through action, mental creation and decision potentials through synergy guilty by association, to sexy positive energy, a mechanism man made in artistic sweat labor as displayed by computer. The trick is making something pretty enough or interesting or diversified not to get boring.
The product I have in hand was built on sweat labor trade created in thin air creativity ideas and traded for music videos loading my mental IQ deck of cards revolving within your own body. By watching and listening to digital video through my eyes and ears providing a positive boost to my self-esteem mentally equaling a more positive outlook on life shifting my personal attitude positive and in doing so wielding a higher level of creativity and performance in my actions taken winning at challenges I face.
At the click of a mouse I can load my self-esteem deep inside of my subconscious mind.

Mentally Anchoring a Digital Security Trigger

A specific video can serve as a self-created digital anchor to control certain aspects of behavior you wish to change at no capital costs.
This is inverted psychology because my savior the video will now be my digital support gate keeper that will take me back into a time I disliked and I will use this video to self-arm myself. The song I used to anchor the emotional trigger is
Nelly Furtado
Say It Right
Music video
When I am full circle in my crisis I now have a powerful custom made tool
I can use to self-regulate my behavior I dislike and wish to monitor or change.
The video can now serve the purpose psychologically act as my personal security anchored to my brain. At a mouse click I can I can use this constant anchor back into uncomfortable times to dismay any new crisis in bad habit pattern setting I confront in the future. Play my mind in some ways as a musical harp of self-control. The music video today is my constant reminder naturally to deter behavior I dislike. Prepare for the next crisis before it happens by implementing a quantum energy psychology generator that self-fuels proper 0 energy decision during a crisis mode of encountering guilty by association bad behaviors in the field of policing.
Example having to work on child pornography to serve and protect society creating the need for a seamless no capital cost mental support vehicle designed for high stress to keep one’s self in check after extended length exposure to digital video material that has such addictive qualities like pornography.
I created a repeat exposure of a specific video to create anchored behavior patterns that will serve as reminders of the time of hostile crisis in my life and why the crisis evolved. The crisis has passed and now when my behavior is starting to go out of my personal check system I will play the video I conditioned into my brain as a savior video due to the content in words and the overall beauty of the video.
Weight loss or other areas in the market place needing support may also create a platform for this type of science psychology custom Nero Linguistic Psycho Cybernetic visualization through anchoring digital video mentally.

Similar to psychology science theories in Pavli’s Dog ring the bell feed the dog ring the bell feed the dog and create the associative habit pattern and then ring the bell the dog salivates naturally expecting the food to arrive.

This is in its self-creating science within science wielding new examples of implementing quantum energy influence deep within the mind using digital visualization of energy into psychology security implanted within a person’s mind seamlessly.

Adding a second mental security trigger in the mind of the person is created in to the video file name and involves creating a crisis word added to the title of the digital video file name. A solid base series of previous empowerment times in life that can serve as an invitational reminder trigger. A mental trigger anchored to a word in the person’s mind that is important to that person.
In my case I used the words “Liberty, Freedom, Honor and Dignity”.
Now I can use the computer mouse click just as the symptom of wanting do dysfunctional sexual behavior or dysfunctional anger behavior or weight loss behavior eating patterns emerge inside of the mind.
Security is all about preempted strike and by creating this tool in the mind of the person looking to create new behavior, they now control a digital video tool that is a democracy freedom tool, the person can administer in the comfort of their own home and in doing so monitor the behavior on their own as the first primary symptoms appear. Education through Digital mind coach Programming allows the person to recognize the signs and symptoms of dysfunctional behavior and allows the person to go back to a digital Nero Linguistic Psycho Cybernetic Programmed psychology mind mapping programming program and rebalance the right thought pattern process themselves through re ad ministering the education. Everyone wakes up to succeed and in the Digital mind coach Series people learn the habit patterns in Ideas Decisions and Affirmations or Goal setting or the understanding of the connections to the conscious mind sub-conscious mind connections within our brains.

Disclaimer

Any time you enter an experiment studying the creation of insanity created out by the government, how do I get back if I change the state of my mind or if I do not like the changes in my mind how do I change back and not develop a split personality under the pressure of doing 3 – 4 – 6 tasks at the same time because when you slow down to people only doing 1 or 2 tasks at a time the conversations are slow and a person running multiple task thinking like chewing gum, telemarketing, watching a music video, talking silently in a conversation, creating a program for the future of the people you’re speaking with quietly and doing experiments in 2-3 regions of psychology while interacting with the universe in different intervals.
However all actions happening at the same time on occasion and dealing with the challenges expands the horizon of the brain naturally.
When leaving this type of environment and moving back into a singular dimension of communications the activities may be slow or boring if you have been bathing in a high stress environment for days.
When you add masterminding to the programming and have another anchor creating the multiple personalities in your mind you are again knocking on the door of mental insanity if you have no safe way home to your original state of mind.
Placing people around you in your mind or around your environment is also a fantasy illusion appearing real and eventually will communicate with you in a quiet way you believe the illusion will want to communicate with you.
Perry Ritthaler
Science Research
Digital Mind Coach

March 31 2007-03-31

Why We Think the Way We Do In Quantum Energy

Pioneering around the universe and finding ways to design quantum energy generators and self-revolutionary energy supplies that can be channeled in the brain to create new behavior patterns.
Are you addicted to an addictive personality in a person that you have come to enjoy and love or hate?
Is the addictive personality a double edged sword when combined with bi polar tendency personality traits?
A person is always working within an energy field of operations in there heart mind connections and within this energy field of operations flowing around the body and through the mind and heart is a power that shapes vocabulary as the energy flows through the sub-conscious mind and into the dominant thought programming and then into the conscious mind to act up the questions or answers relayed in conversation.
The series of conversations is then in a mental platform of thought. Thought then based upon the ability to balance the energy depicted by the vocabulary, creating the emotions or actions in the quantum energy field and again the base pool of thought process located deep within the energy quantum soup within the brain functions in decision or creation or performance.
That is what separates Cybernetic programming and visualization cybernetic programming in the brain, Psycho Cybernetics (seamless digital quantum energy plastic surgery for the brain) or Nero Linguistic Programming (the programming of behavior habit patterns) and why Digital Mind Coach is the ultimate experience that organizes all of the details and turns out the better behavior and energy operational mental performance or creation skills. Mixing science and psychology through education in the person trying to control the mental habit patterns or increase employment opportunity is possible when working in education that organizes thought process and creates solid decision or idea creation habit patterns.
How powerful do you become or will your organization or country or business become if you can set and control the pace of evolution within the cognitive quantum energy balance of the 2 human minds eyes (left and right brain) and mental thought process?
Perry Ritthaler
Digital Mind Coach
Science Research

April 1 2007-04-01

The Interactive Experiment of the Two
Controlling Right Brain Dominant Personalities
Feeding the Working Woman and Working Man Households in the 20th Century

Objective

15-30 day pilot project with event pre-scheduled before beginning experiment.

Activities designed to expand relationship connections flowing in intimacy and sexual interaction and respect.

The idea of two people in control of 1 relationship rings a bell of self-destruction unless both parties can face the truth that dominant people love to be dominated themselves at certain times in life’s cycle of sexual events.
The act of letting the other dominate on selected nights per week and special days of mutual control or no domination may facilitate a smoother flowing personal relationship.
Usually this is left to whom specializes and then dominates the issue as opposed to a resource on his or her domination day.
The day flows into the night and so into the bedroom and into sexual or just affection depending upon whom is in control.
Setting the schedule template is the key to the controls of more and less stimulation to meet the overall demands of the couple looking to expand their relationship sun sets or sun rises.
Get to know the entire person and allow your significant other to have a more fulfilling relationship.

Perry Ritthaler
Digital Mind Coach
Science Experiment Research
April 1 2007-04-01

Fighting on a New Front in the
War on Sexual or Violent
Dysfunctional Human Behavior

Fighting child pedophilia is a challenge and sometimes if the challenge is fought with positive energy the battle looks different and why I write the reports I do.
Digital Mind Coach (RCMP fund raiser 30 70 opportunity) is a psychology decision idea affirmations program that is a benefit to adjusting decisions and ideas or affirmations within the brain. Selling this as a covert solution through the government into social services for friends and family loved ones in the midst of a sex offender may serve as a daily counselor on computer from home. This is a covert attack on the dysfunctional sexual habit patterns of people suffering from (create a psychology stigma on the street) mental sexual functional dysfunctional medical systems.
By allowing PDF robots to shape the mind the councilor now has a home E book on shaping good behavior. A tool that can be taken to any public library and played or business or home computer as she or he learns how to use the brain they have more productively when making decisions or ideas or setting affirmations or dominant thought habit patterns.
The Digital Mind Coach Programming makes psychology work on patients much more productive and allows the therapist to send the patient home with an exercise that can help organize the brain as often as the person needs until they understand how to control their minds safely without hurting themselves or others around them daily.
A simple computer cd E book can dedicate the time required at a fraction of the costs the time to helping the person recover faster and safer.

Perry Ritthaler
Digital Mind Coach
Science Research
April 11 2007

Creation of the Gay Personality
The Great Policy Procedure Screw Over

The creation of the gay personality starts in childhood when the child is between the ages of 1-5 years of age and during the creation of the personality being created within the child’s mind. What mom and dad say is absorbed by the child’s mind in conversations during the development of the cognitive personality designed to communicate in conversation and in the skills the child learns combined with what the child hears on television or radio or computer or mom and dad or a sister or brother or grand parent or family friend speaking to people in the room the child is listening to daily.
All of the vocabulary spoken in the room has a core source energy related to each word that carries emotional association to vocabulary.
Words create pictures and acceptable levels of associations to pleasures experienced within the mind during the association connection to the words. If certain sexual negative or positive words are mentioned in a series of programs (child’s crib in bedroom while speaking sexy dirty to the spouse) a child’s personality may be altered if the information picked up by the child is of an unacceptable sexual society normal expectation to normal sexual interactions with a monogamous man and woman.
If the person wields Nero associations mentally abusive the child again hears the vocabulary being displayed in the room by all involved in the abusive conversation or gay emotional conversations. All of the emotional words are either negative or positive and by the end of the day the child sleeps with a quantum energy loaded sub-conscious state of mind than can have a numerical association when the code is completed this year.
After age 5 the brain is forming into a solid working platform capable of learning the English language or other technology or information found within the complex world within today. The new association become even more complex as the child enters school or the day care system and the environment takes over and the child mixes Nero associations with other children and teachers and the environment digital company financial revolution in computer technologies.
The personality to go homo sexual is a trigger through an overload of domination placed on the child’s mind or the person on the 24 hour job site like law enforcement or health care or military or government employment civil service.
In my opinion the energy domination can be monitored numerically based on a psychology vocabulary profile on the person’s vocabulary and dominant thought habit patterns. Habit patterns associated within that person’s persona and character description found deep within the sub-conscious mind, creating the self-esteem entwined to create the lack of self-confidence fueling a negative attitude.
As the person building a personality and behavior patterns controlled by in part dominant thought programming the brain develops the mindset of either heterosexual or bi sexual or full gay behavior patterns. The mentors and parents have a huge roll in either turning the child gay or straight during the childhood state and teenage times of the child depending upon the quantum energy flowing through that person’s mind, especially during times when hardship or pleasure mental anchors are set through actions taken by the person interacting with a mentor or parent. As the relationship blooms in love and happiness, a positive attitude is created within the child’s mind and at this stage of life creativity and performance are becoming something to think about and monitor. If the child is dysfunctional through abuse psychologically or physically the abuse can be as small as lack of hugs or love and honesty and trust and as brutal as sexual and mental abuse combined with digital conditioning mentally or physically with pain pleasure association enhancement.
If everything is going basically normal in the child’s life both parents are not over dominant or manipulative so the child loses more often than he or she wins at playing games like cards or chess or outdoor sports interacting with parents or if the child is not pushed too hard into an abusive relationship and over pushed in sports through negative energy domination. Negative energy domination cracks the self-esteem and makes the person obedient with no freedom to make their own decisions
(creating again dysfunctional behavior thought patterns associated to letting the computer make all the choices and decisions leaving the person with poor skill set decision skills over a very short period of time.)
(object dysfunctional unable to make law abiding choices safely nationwide through overloaded corruption negative energy programming into police forces across Canada or in other countries around the world being covert invaded through psychology warfare.)

The child in a household is living inside of a human resource training center that sets creation and performance standards based on what the parent understands and why Digital Mind Coach E books are extremely beneficial to children trying to understand how to make decisions ideas or affirmations or how dominant thoughts are created or goals are set and achieved. Within this home training center discipline is required and if one parent or the other is too covert and over domination orientated psychology and negative energy is implemented constantly
(911 footage of towers negative energy conditioned dominant thoughts to hate terrorism and go to war created by newspapers and television making money on the devastation pictures and tempo set during times of war) (children and adults were deeply affected by this negative information and why Digital Mind Coach was sent to the newspapers and Hollywood and the musicians several times in practical fantasy fictional war strategy books and through these books guilty by association the environment changed positive energy to a point of a cross returning around the necks of many Christians in the music industry especially)
And the same mental impairment is created within the child’s mind if the daughter has an over dominant dad or the son has an over dominant mother. As the child is overloaded at school under stress, seldom home and as support from parents is systematically taken away a result of tighter mental security is needed on the child’s lifestyle because no one is around or home to guide the child with freedom to do what he or she likes as opposed to a regimented schedule.
The child may seldom wins in challenges competing with mentors or the parents or friends or may not receive adequate praise or love for the psychology loop holes growing within the child’s lifestyle. The one he or she loves and respects the most may never be around to guide and as a result baby sitters guide the child who has little experience in developing proper social skills or psychology neuro association habit patterns. As time goes on the child learns to live in the tight security within the household and wielding a domination negative energy attitude guilty by association constantly shrinking the child’s abilities through a dwarfed diminished positive attitude fueling positive energy into balancing quantum energy flowing within the mind’s eye.
Full of negative energy domination and oppression personality psychology infested within the child’s mind you see the personality shatter in the eyes and confidence as domination obedience takes hold and slowly the mental insecurity negative energy influence, develops mental painful cracks in confidence to meet the right man in the daughters mind.
The daughter actually has to hate the one she loves the most and this how the gay influence starts especially if she is left alone with other girlfriends that have abuse orientated domination political or police or military background fathers that have domination stamped on the forehead.
If the dad is over dominant on the daughter she is caught between loving the father as a dad and yet hating him as a man for strip mining her mentally and emotionally, while controlling her mind and actions and as she meets new people or restricted to meet boys and allowed to go with girls anyplace. Other children who do not have to do this domination lifestyle and actually receive love rather than teasing aggression will expand the positive energy within the mind’s eye naturally excelling the child into stronger creative skills or performance.
Wielding focused and directed psychology cybernetic reconstruction mentally, the art of building a champion wielding psycho cybernetics and Nero linguistic programming within the child’s quantum energy lifestyle building the theories of decision within that person’s life).
Hatred toward the father may start to gel further and may be expanded if the child was not held for long periods of time as a baby allowing the bond of trust and love to expand into a fountain of positive energy with the father or mother always away making a dollar for the family.
Healthy relationships in positive energy personality overflow into children on a daily basis daily if you make it happen through goal setting and planning however domination negative energy encourages no goal planning because the computer does the planning and leaves the person a little more dysfunctional unable to plan goals and if they think of the past success all of the time they actually can reverse the mind especially bipolar and develop an in a ability to set goals or properly plan the future and again closer to insanity unable to act normal and look after yourself or other around you through lack of goal setting in positive mental attitude creativity.
You are no longer based in enough confidence to win with creativity and not oppression and being dominated in negative energy at this point is even more dangerous as mental pressure to win push the mental issues deeper into the mind cracking confidence and opening doors for sexual dysfunctional mental illness behavior cycles and patterns doing extreme sexual encounters verses normal ones full of love monogamy and dedication exclusive to the one you love.
Love if true creates dominant thought programming in positive energy through being guilty by association to the act of being loved and no violating the one you love.

New Digital Mind Coach Research

To explain this in a clear mathematical equation is the best research
I have completed to date and am developing the numerical code template for the developmental understanding of the gay personality or sexually dysfunctional personality or anger related personality.
This may help to create the cure of mental dysfunction by identifying the persons quantum energy cybernetic coding. The numbers have a new code created and implemented like Digital Mind Coach Programming cd that prevents homo sexual behavior patterns from forming.

Quantum Energy

Association to Vocabulary Skills Development

Theory of Decision

When information energy within vocabulary (I have HIV a stigma) is received within the sub-conscious mind and the information received and delivered by the questioning conscious mind, meeting actions relaying to experienced circumstance, producing certain levels of invisible quantum energy synergy loading opportunities within the conscious mind.
During this vocabulary synergy information transfer of energy into mind’s eye and into quantum energy into the sub-conscious mind, the synergy energy is guilty by association to information creating thought pattern performance and through research completed by “Digital Mind Coach.”
The sub-conscious mind is the warehouse of informational archives that combined with negative vocabulary or positive vocabulary dominant though quantum energy base numbers association to a vocabulary within the sub-conscious mind. So you can load your dominant thought patterns with positive energy emotions like love harmony peace self-understanding communication praise empowerment theories.

Dominant Thought Habit Patterns and How They Are Created

Example

The dominant thought is the imprinted auto responded statements you make when you are trying to feel powerful sad or happy or sexy or popular or productive or performance driven. The concept has an answer to every question and every question makes up your dominant thought programming depending upon education and the visionary capabilities to see big 0 degree vision of energy audited pictures to solutions or challenges.
As the person’s vocabulary chosen in conversation or thought expression, within the brains interaction together with the person, to display the statement filled with vocabulary filled in emotion energy and within the emotion of the vocabulary the beginning of synergy combines in quantum energy (theory of decision) and within this quantum energy balance of information based energy a mathematically calculated numerical equation exists that explains the end number on performance or creation skills created within that conversation. You either move up or move down the mental psychology ladders of self-esteem and self-confidence empowered through a positive attitude or diminished through a negative energy based attitude.
The information you are guilty by association to in negative overloaded energy eventually cracks the ability to create a positive attitude and as a result less self-esteem and less self-confidence is automatically created. Eventually your dominant thoughts accumulate in negative energy and you are a negative energy driven person who seldom finds the positive and is prone to criminal behavior more often than not as negative energy is the roots in psychology energy to criminal behavior. When you actually add pain to sexual interaction through rape simulation you create an even sicker state of mind linking the association of pain to the pleasures of sexual interaction seamlessly moving your association of pain and pleasure unbalancing a stable mind sexually through repetitive digital rape simulations. If the person is bi polar this is so dangerous it is ridiculous because the bi polar mind is a driven mind spontaneous and when you change the associations you create a self-drive state of sexual mania especially if you crush the self-esteem and self-confidence by creating a program to make the person lie and in doing so change the association to right and wrong and in doing so creating gay programming by making sure you anchor gay digital visualization until the person is sat boxed and the freedom of sucking a cock or anal sex sounds and would feel incredible especially if your anchored pain to sexual interaction because the person on the key board controls the video and pain so your trained to be gay by expanding the sexual explicit vocabulary in your mind and changing your association to right and wrong through the liar program. The next step is place a tool like sat box in these hands and let then release the rape tendencies created by the dysfunctional operations created government desire to hit me guilty by association in negative energy as the lady was my girlfriend under attack and my friend is a good male friend under attack and together they get destroyed to create negative energy guilty by association within my life and also hurt my hurt because I love them both as good friends especially after having fun in the grid teasing and playing around psychologically and in visualization fantasy digital.
I really like both of these people and in fact at time I actually love them both however if I do they get tortured and this is designed to hurt my self-confidence and self-esteem and guilt trip me responsible guilty by association for the pain in psychology and physical activities they experience leaving me feeling hurt or helpless or when she tells me who she sleeps with or what she does in the grid it also hurts me and this is designed to cut my heart and ego as she is interested in a more violent related sexual encounter and now I am told she is HIV and so is my friend not diagnosed and this is science to me with a friendship associated to two people including me under attack by the governments in the USA and in Canada covert designed to explore potential mock attacks on the country.

Flipping the Opportunity of the Security Grid Operations into a Human Diamond Mine Flowing in a Zero Balance Synergy State of Being

Creating CHR employment is easy with Digital Mind Coach as the program requires a person to sit with the patient and teach them a way to work with their brain. Empowering citizens broken down in hospitals with qualified therapists instructing Digital Mind Coach and psychologists analysis of teachings learned in patient learning the teaching the DMC program (employment creation program that follows that person for years in the undercurrent to insure a tax base contribution for the country is maintained and expanded) (increased employment equals increased tax base productivity for the country while empowering the human resources within that country) will be questioned and the philosophy tested in questioning to see if that person has the new skill sets to plan life and move out of the system and into the work force as a tax payer.
Opening opportunity for more programs in drug addiction kicking in the CHR as the program gains momentum and opening are created in hospitals to re train the crack heads or drug or alcohol addicts into new Nero Association Cognitive thought patterns in a 30 day rehab program re designing the dominate thoughts and education base of the thinking pattern functions or how to maintain the mind using psychology to empower ones-self.
By loading the positive energy in the programming into the brain the CHR has an opportunity to gain funding in training the citizens of Canada to become empowered with genius IQ and in doing so expand the country tax base by naturally empowering the human resource to succeed.

By working with the immigration aspects of creating the perfect snitch program perhaps a 1 year stay on the street with a small funding package provided by NATO or the UN to encourage opportunity in security creation programs that train country human resource snitch programs in Canada and ask for support funding to create global human resource opportunities for the person live in a foreign country partially funded and not sole reliant on turning a trick to stay alive to wield a solid snitch program away from the influence of crack cocaine to maintain the John bust. Offering a cleaner prostitute for the street; snitching security; not spreading HIV through drug abuse when required.
As the security grid finds the sexual abuse children a new program to repair the child and parent using psychology and a 30 day stay at a CHR unit with the entire family for 30 days mental reconditioning.
Due to the over flow of child pornography in the internet the cause and effect of creating a sexual child molester with stay in circulation self-fueling the need to evolve the security grid empowerment training program for the country empowered human resources program naturally building a larger tax base and more stable environment for civil service or police human resources. Conditioning countries not to mess with Canada is easier than hardening the woman and children or men in a rape simulation psychology program designed to control oppress the Canadian citizen and as a result over time cut tax base and susceptible to a criminal police state oppression cycle turning police human resources into sexual predators verses serve and protect officers behind the citizens needs and support within our country daily operations.

Scam
Pay for sex if your married after being exploited hitting a presidential aid Perry Ritthaler; target exploited hit a child or woman or elderly and liar redundant act dumb and a read the script until your brain is reversed; expanded into a reverse security grid catch a pedophile scam digital pushed into touching a child; extorted to climax digital ruffy; triggers the next operation soft cock or dry pussy; targeted to go after a pensioner extorted convince them to pick a date to die and extortion of health shake down property turned over to who extorted you pedophile; sold originally point and do sex perks for targeting real estate scam exploitation; however after the dust settles and the real estate market crashes due to little tourism due to attacks software cars and crashed weapons and oil markets and lost manufacturing; a housing bubble bursts and migration invasion buys into a market with people brain washed concubine sex slave and reduced civil service infrastructure costs due to FEMA camp organ harvest created in Christina Lake fortified by towns around Creston. India work software and Halliburton software do you want to know how your customer thinks mixed with police lie detection software rewritten into one program running inside of the internet security grid backed by Harrp and satellite sharing Facebook global BRICKS vs NATO.
Nestlie foot print extortion water in African villages drill beside well and drain while charging people in village 25% of wage for their drinking water; similar to German and French bank loans Greece exploitation why work and pay taxes backed by IMF; backing NATO to bomb Middle East run by Russia today bombing in Syria in charge of ISIS and affiliates in similar extortion shake downs; hence 10000 dead police middle east involved in similar police state and military state and agency star wars program that created the Arab springs in the middle east.
This is a potential coup of Canada and grounds for human rights war crimes attack civilian population exploited by their government cutting pension costs for civil service hijacked by Security Council countries looking to split Canada and take natural resources in a population extermination program using the population in a cannibalization guerrilla warfare self-generated exponential program architecture sold to everyone as the perfect program.

From: postmaster@NETORG91454.onmicrosoft.com [mailto:postmaster@NETORG91454.onmicrosoft.com]
Sent: Monday, December 19, 2016 6:44 PM
To: perry@digitalmindcoach.net
Subject: Undeliverable: RE: Thank You for Contacting Us – jordanucmjlaw.com

Your message to contact@jordanucmjlaw.com couldn’t be delivered.

Contact wasn’t found at jordanucmjlaw.com.
Perry Office 365 contact
Action Required Recipient

Unknown To address

How to Fix It
The address may be misspelled or may not exist. Try one or more of the following:
• Send the message again following these steps: In Outlook, open this non-delivery report (NDR) and choose Send Again from the Report ribbon. In Outlook on the web, select this NDR, and then select the link “To send this message again, click here.” Then delete and retype the entire recipient address. If prompted with an Auto-Complete List suggestion doesn’t select it. After typing the complete address, click Send.
• Contact the recipient (by phone, for example) to check that the address exists and is correct.
• The recipient may have set up email forwarding to an incorrect address. Ask them to check that any forwarding they’ve set up is working correctly.
• Clear the recipient Auto-Complete List in Outlook or Outlook on the web by following the steps in this article: Fix email delivery issues for error code 5.1.10 in Office 365, and then send the message again. Retype the entire recipient address before selecting Send.
If the problem continues, forward this message to your email admin. If you’re an email admin, refer to the More Info for Email Admins section below.

Was this helpful? Send feedback to Microsoft.

________________________________________

More Info for Email Admins
Status code: 550 5.1.10

This error occurs because the sender sent a message to an email address hosted by Office 365 but the address is incorrect or doesn’t exist at the destination domain. The error is reported by the recipient domain’s email server, but most often it must be fixed by the person who sent the message. If the steps in the How to Fix It section above don’t fix the problem, and you’re the email admin for the recipient, try one or more of the following:

The email address exists and is correct – Confirm that the recipient address exists, is correct, and is accepting messages.

Synchronize your directories – If you have a hybrid environment and are using directory synchronization make sure the recipient’s email address is synced correctly in both Office 365 and in your on-premises directory.

Errant forwarding rule – Check for forwarding rules that isn’t behaving as expected. Forwarding can be set up by an admin via mail flow rules or mailbox forwarding address settings, or by the recipient via the Inbox Rules feature.

Recipient has a valid license – Make sure the recipient has an Office 365 license assigned to them. The recipient’s email admin can use the Office 365 admin center to assign a license (Users > Active Users > select the recipient > Assigned License > Edit).

Mail flow settings and MX records are not correct – Misconfigured mail flow or MX record settings can cause this error. Check your Office 365 mail flow settings to make sure your domain and any mail flow connectors are set up correctly. Also, work with your domain registrar to make sure the MX records for your domain are configured correctly.

For more information and additional tips to fix this issue, see Fix email delivery issues for error code 5.1.10 in Office 365.

Original Message Details
Created Date: 12/20/2016 2:41:04 AM
Sender Address: perry@digitalmindcoach.net

Recipient Address: contact@jordanucmjlaw.com

Subject: RE: Thank You For Contacting Us – jordanucmjlaw.com

Error Details
Reported error: 550 5.1.10 RESOLVER.ADR.RecipientNotFound; Recipient not found by SMTP address lookup
DSN generated by: BN3PR08MB1842.namprd08.prod.outlook.com

Message Hops
HOP TIME (UTC) FROM TO WITH RELAY TIME
1 12/20/2016
2:43:16 AM Perry PC mrelay.perfora.net ESMTPA (Nemesis) 2 min, 12 sec
2 12/20/2016
2:43:17 AM mout.perfora.net CO1NAM03FT015.mail.protection.outlook.com Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) 1 sec
3 12/20/2016
2:43:19 AM CO1NAM03FT015.eop-NAM03.prod.protection.outlook.com BY2PR08CA041.outlook.office365.com Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) 2 sec
4 12/20/2016
2:43:19 AM BY2PR08CA041.namprd08.prod.outlook.com BN3PR08MB1859.namprd08.prod.outlook.com Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) *
5 12/20/2016
2:43:29 AM NAM03-DM3-obe.outbound.protection.outlook.com CO1NAM03FT010.mail.protection.outlook.com Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) 10 sec
6 12/20/2016
2:43:29 AM CO1NAM03FT010.eop-NAM03.prod.protection.outlook.com BLUPR08CA0047.outlook.office365.com Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) *
7 12/20/2016
2:43:29 AM BLUPR08CA0047.namprd08.prod.outlook.com BN3PR08MB1842.namprd08.prod.outlook.com Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) *
Original Message Headers
Received: from BLUPR08CA0047.namprd08.prod.outlook.com (10.141.200.27) by
BN3PR08MB1842.namprd08.prod.outlook.com (10.165.120.136) with Microsoft SMTP
Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id
15.1.789.14; Tue, 20 Dec 2016 02:43:29 +0000
Received: from CO1NAM03FT010.eop-NAM03.prod.protection.outlook.com
(2a01:111:f400:7e48::203) by BLUPR08CA0047.outlook.office365.com
(2a01:111:e400:88d::27) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.789.14 via
Frontend Transport; Tue, 20 Dec 2016 02:43:29 +0000
Authentication-Results: spf=none (sender IP is 207.46.163.19)
smtp.mailfrom=digitalmindcoach.net;
Received-SPF: None (protection.outlook.com: digitalmindcoach.net does not
designate permitted sender hosts)
Received: from NAM03-DM3-obe.outbound.protection.outlook.com (207.46.163.19)
by CO1NAM03FT010.mail.protection.outlook.com (10.152.80.104) with Microsoft
SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.789.10 via
Frontend Transport; Tue, 20 Dec 2016 02:43:29 +0000
Received: from BY2PR08CA041.namprd08.prod.outlook.com (10.141.248.159) by
BN3PR08MB1859.namprd08.prod.outlook.com (10.165.120.141) with Microsoft SMTP
Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id
15.1.789.14; Tue, 20 Dec 2016 02:43:19 +0000
Received: from CO1NAM03FT015.eop-NAM03.prod.protection.outlook.com
(2a01:111:f400:7e48::204) by BY2PR08CA041.outlook.office365.com
(2a01:111:e400:2c5c::31) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.789.14 via
Frontend Transport; Tue, 20 Dec 2016 02:43:19 +0000
Authentication-Results: spf=none (sender IP is 74.208.4.197)
smtp.mailfrom=digitalmindcoach.net;
Received-SPF: None (protection.outlook.com: digitalmindcoach.net does not
designate permitted sender hosts)
Received: from mout.perfora.net (74.208.4.197) by
CO1NAM03FT015.mail.protection.outlook.com (10.152.80.167) with Microsoft SMTP
Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id
15.1.789.10 via Frontend Transport; Tue, 20 Dec 2016 02:43:17 +0000
Received: from PerryPC ([172.218.121.12]) by mrelay.perfora.net (mreueus001
[74.208.5.2]) with ESMTPA (Nemesis) id 0LamcQ-1cyqug16q0-00kOqP for
; Tue, 20 Dec 2016 03:43:16 +0100
From: To:
References: <20161218104521.13267.1@scorpioncontact.com>
In-Reply-To: <20161218104521.13267.1@scorpioncontact.com>
Subject: RE: Thank You For Contacting Us – jordanucmjlaw.com
Date: Mon, 19 Dec 2016 18:41:04 -0800
Message-ID: <008a01d25a6a$835e1520$8a1a3f60$@digitalmindcoach.net>
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary=”—-=_NextPart_000_008B_01D25A27.753D4620″
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQGBxpB5d4LFFhAONyNKHKYXC596u6GxR5zA
Content-Language: en-us
X-Provags-ID: V03:K0:O2QqQ8z6s4eEygiiTFQs+SBH66KzMsDL6MmMLKAQLDyG//Basp0
vmJZAkijvNhx5gqRelvhmuzebQQbE48qfl/zvDaJUVZYr/7qilsAKkFqOFe+SQV9P/M+Qd8
0YLRcWDhe8XZIsy14f5c37TivHgDLRKul1WTpL0U9rKh0MSupC20dVPj10xltx5TJUm1HQy
v2fA8FPUaApJwwqSExu4Q==
X-UI-Out-Filterresults: notjunk:1;V01:K0:/KGwGpahFwA=:i1E0zL0FheCdosXy7c5LER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Return-Path: perry@digitalmindcoach.net
X-EOPAttributedMessage: 1
X-EOPTenantAttributedMessage: bbf1bbd5-0a81-4ddd-9738-15cd83c51dce:1
X-Matching-Connectors: 131266753982997217;(0ca39aa2-9109-438e-3304-08d3b25b0cd8);()
X-Forefront-Antispam-Report-Untrusted: CIP:74.208.4.197;IPV:NLI;CTRY:US;EFV:NLI;SFV:SZE;SFS:;DIR:INB;SFP:;SCL:0;SRVR:BN3PR08MB1859;H:mout.perfora.net;FPR:;SPF:None;LANG:en;
X-Microsoft-Exchange-Diagnostics-untrusted: 1;CO1NAM03FT015;1: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
X-MS-Office365-Filtering-Correlation-Id: cfde4863-5e47-428f-1104-08d42881fb36
X-Microsoft-Antispam-Untrusted: BCL:0;PCL:0;RULEID:(22001)(999901066);SRVR:BN3PR08MB1859;
X-Microsoft-Exchange-Diagnostics-untrusted: 1;BN3PR08MB1859;3:K+INmE3s6blPpxP/jvq+MRWL/e8q2elj5RDqgz7Ul2QZJb1HzRAv6hIWYCvfJyH913D377JC/eGw1SaZi8s0rihMTScedYwUO6TXGcV/bAjaULJKbo5jfrp9z2aWe9hx4OtG/4D9Sxuo6fDXKoA4Sx2VebWausuKGFTWMA5SUV2reFwfopivFTpg9y3w7PSdvcZtVnT6JmrzA8n+YNTvVG5APR3Ns100RtFu5H8Tu33oRqKsH99pRa8AkPt+lMf4pOKxEr7sqsEO91ZchsX+ms9NrU407w2S3EZ5q9/T250bWSXj5bsdh22llTYD23G8yHjj5DUWFMG4mm9jn6QqBByFAwMsr1f7xw69YTVBJDnLzfqQ0cIgymNgsEBoXJEhXg+Ho+pCt2xFoNi5Jpgbcw==
X-Microsoft-Exchange-Diagnostics-untrusted:
1;BN3PR08MB1859;25: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;31:7wBlOYvFldDm0xkE7axa70q0W4PPI9UEV7lVQE7Q8cGKf+MAiE9MCrgVky91MyA1xw3JtMkWZyVe6oij82ns3GQJAuwzF+OdhLgR1k38coPVUilN2ViAfoyyuRet7I0HsuEGVi+uL2CLvC4UmnZpXwqly9ZgF/u+xIw00ecRfHnYzov9a84PGdkuhxkVYwk8h5A2ASlW8mdbzXEFe8e7WWWaSLhjFlHf5BDc8uAHqFe534Zf2TywTAeQqf7bHcPrM9arqeNHSEnCR/af2NRUhhETO1456//GxlgPb1Yfc21jJ/HikcVdlyBcJUtBzC7R5F0YSkftGLhnt9vBsCRH+A==
X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(9999012053);SRVR:BN3PR08MB1859;BCL:0;PCL:0;RULEID:(9999013053);SRVR:BN3PR08MB1859;
X-Microsoft-Exchange-Diagnostics-untrusted: 1;BN3PR08MB1859;4:N1+LluPLtVC/eQGjBkUwYpaZyKiVuLmwmD7A7TU5i/wiGkhVmPFgIqf8ohLwOpYcekoBv9AulSMBpQyGV+b3QcieUKjHiwvj7xfOvUb/YysHT1LicDcf6MkCsi5tQtglN1YrR5FX3Wr1rmesVyMK2Uv5yY/rpCfravpx0BvCL9TZXrHuDz+WBWHMTqCXjG9gQGVbwSTp6ojAdSoGQLqn67zkNOH+rGlIHTubaohj3jlgK0ZVo02QRTxjYINXXVi0mQPN41P9VkuACkFXdPsvpZEBlkb4OsHO+lOB66z5WLw=;23:UReEANod50eRdD9H1GJtwn5tK0Pq7EqD78xgp6UWvNdxhWqFNQQbP0q4nsZv4cIhS5DG/bFa4KrsjEUTZkMVwTYXRhn7m8ky167ALZnk1fkcb1kYsqgGCMYFTo2rwe/ybMVjXktrdNdS5ixm71yXSA==;6:bY5/rsPZM/9EmVx6m5DuNwVOpSuCVbkBacWssqRpvT+ud8eDJ6VHtUiY2BNkEJd4SO79DajuQA2YGYnOpaT7qyGWNXKQYL1gjCh0uB1HChp0NfxaagZRqlzspjrBUtJ+44UMUCGSdl2MkeyZP81ZZvMmcBOn2+Vt0FSmXi7K+gXZflW9MRrZRvp/fAjGkxqNPlTyIFyNONqwBG2Bqc9fy5f2SvDE9mSSJR0vcuy/oFefQnyIDDxvGmt16TFPkhQBmd4cOt0vFoZxZ+H0i6p3B2q4P9ISIblGX1iL2YJWbSIAKR71MlHYVQftfXvLTrRlCkbo3tY6GMF/piYsdKhX5zZIDT5m3M/fBcNOigI934cpZZzzwzYDbPB3Lj38CEu85trod9jUHgFppgkbp2tKih4nNVkUrgzgh8Ea5dSg/UK6L4PIlg5AwgRfZPYxxuki
X-ExternalRecipientOutboundConnectors: bbf1bbd5-0a81-4ddd-9738-15cd83c51dce
X-Microsoft-Exchange-Diagnostics-untrusted: 1;BN3PR08MB1859;5:xBoTAUOqQLMl5o1iVpYhvdJOGTtWKYL39DpqUYeDVPR3YApN9CinFOxDA4V27d6vsAPeP4Z6GQQHmnuIg2foYywhUwGVX7AYgWyceT/MY7TJ+DsSY4mS+1zJB5PwqZzML02MyvvxtbVpV0YJ//Jd4gJiUaK4HqfYQRKlHWNiVigdxtR+yvIIcSj/Xz0xMtRs;24:Xaau3beehT5dKwQ+Qy4tDaeo1RggRVA94UAU7ln/sZlzdLE5PJH/+57ndkV6tp3e59HzRNeVHcCTcO2H/BSq1w==;7:NohltNGMTnYtxFa/mKz4+JjOgrrAfYEuS30my8v1HxkkXjKm11bZ8/0tmYgZFaBzIwRqp/25IZQXdMKwLzQncU9P3gAtU2jKqCSH1ISN/pyfH/hi9LA4yeKtomh0Ikv/5oQHnMpyWM915VHJy1fkBW+VnMWHlXDpzNbqFPfPqOkN0G4U9VJFR3pyGiiE1p1MlLYBf47VR1syqe++5TzbbudQOUL0JrC7PJPlI/SBhJBJNTqswvWnI8yA+qiCBZdRVzhhvXKQotN4UC+Qjm/X+wilV+db5qeehDng05ADSETr+sEWSCm6gQPmoH0amGQczs7qYuCe5uerDpO+PV4IAMNQHO26OzP9bv4JtepN7MENmanBz1UqiPcEWNo6LLTHaiAC1Uv5B9K5Kop/hXo/AFFONnyoDQsA7TkoT6HTL802fsSbJ0O8GE/TzAROw9oCNAaX5z755lZKSeqw2X5GoyCpcZhV/wqyK2TOU+yKiBw=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: SZE
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR08MB1859
X-MS-Exchange-Transport-CrossTenantHeadersStripped: CO1NAM03FT010.eop-NAM03.prod.protection.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersPromoted: CO1NAM03FT010.eop-NAM03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:207.46.163.19;IPV:NLI;CTRY:US;EFV:NLI;
X-Microsoft-Exchange-Diagnostics: 1;CO1NAM03FT010;1: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
X-Microsoft-Antispam:
BCL:0;PCL:0;RULEID:(22001)(999901066);SRVR:BN3PR08MB1842;
X-Microsoft-Exchange-Diagnostics:
1;BN3PR08MB1842;3:+9d4nfBdzKJF2096RrdM3PzmKA6GNR/wa6F6iR5MxQsF+u6JEgCKB4wK/N5H9+h/pyCilResewtckg3Zs+ju6zEHSuOH9MNuQLUtnDfcSOF01d77A1vqtR9zvg6S0rABM3CYOYMy2SKZR2I+uTiPF7RaOgcz58o+/UgnHuiLx+JUovIgmqXcfOmkLgvkoAL2lC5XZ6b0idJ1q7BCKwVE2fr3lp6AerTG09olwfH2EHkDRuZznoomUeNtQ31kiIGGHLmJhzxcdnm5dl3Wfwwp4g1ly7q+MMsy+33yX5wkhWywp5X1lNWKjzO9wIVnKHjwzcm6M1Ekzhv4xVAO+3daeTUGNmmucsA2uvtQgMcJFC03A4lsnez/Q52+0aUbtq6T+Asy+FPrO9W7LDdJfo4LEg==
X-Microsoft-Exchange-Diagnostics:
1;BN3PR08MB1842;25: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
________________________________________
No virus found in this message.
Checked by AVG – www.avg.com
Version: 2016.0.7924 / Virus Database: 4739/13617 – Release Date: 12/19/16
Attempted to email word document Telus and attorney through Outlook.
Fail
12 / 19 / 2016 7:31 pm
Cia Intel
1. Perry Ritthaler
DECEMBER 3, 2016 AT 11:08 AM SMELLS LIKE A 911 CRACK
One Mistake Follows another Cyber Warfare weapons destined for North Korea Stolen from me.
Why do people in Creston named Tom driving a grey truck tell me they are CIA and terrorize my town blocking me and targeting President Barack Obama predator prey or President Trump; please forward this to the Director of the CIA attention John Brennan. I have worked with your agency in cyber warfare for over ten years and today my family and I are threatened and attacked daily by the Creston Valley Clandestine CIA according to the people at the Mini Golf leading this war in my town through NuFloors on your behalf targeting the USA military pentagon Navy and air force for new advanced cyber warfare weapons programs slated for the CIA and Pentagon. These people have local and ex RCMP involved and may people held hostage forced to attack in this digital grid used for security. I am hit by many international spies tearing your country apart using my work developed in part working with 5 past CIA Directors knocked out by these same people using identity theft a mirror web site and I believe have ties to the Orlando Massacre and Israel bus bombing; please advise; breaking cover in the Middle East hacking my Intel to steal government funding from the government used to attack and the USA was done by these people Vern Klassen Gordon Baker Claude Lalonde and a man named George and they have taken over the banks and insurance company claiming to work for you and are also responsible lo lobos bank fraud living above in the red and white house on 6th avenue north also claiming to be CIA. President Trump daughter dressed in purple in signing in was targeted and not by me; these are not my finger prints and recommend Saudi Arabia take fatwa action as these are the oil collapse people playing shorts in the market. Your teams are penetrated and attacking you in fact recruited to come north and attack covert to hit USA in my opinion claiming to work for the clandestine CIA Creston valley killing elderly over 80 years of age in a real estate scam and pedophile creation scam using them and children fed narcotics prescriptions 1 in 8 die used as a shakedown tool for the elderly. One Mistake Follows another Cyber Warfare weapons destined for North Korea Stolen from me; terrorized to set in driveway and picked up satellite global verses exclusive my friends in the various agencies or Pentagon. President Fantasy Spy this weapons program ink on paper human singularity needs to be purchased and taken stolen to avoid double slit and the 19.4 trillion debt increase or removal of the next agency director using the same finger print and not mine.
Submission Reference ID: YSAKYDWF
REPLY
2. Perry Ritthaler
DECEMBER 3, 2016 AT 9:50 PM
Your comment is awaiting moderation.
Aboriginal chief Creston and Kimberly casino and Bonners casino doing Vegas and Reno for extortion market share; attacking my family; aboriginal lady yellow house 6th ave north the nest Tom; pulling in Claude Lalonde Aboriginal bullshit he is part Metis paid credit cards cleared time and date.
Working India migration invasion extermination pensioners and oil market manipulation; and off shore Middle East by shaping me stealing movies using movie software. Pumping me with blonde red and white house ad red beard living aboriginal; Vern and Gord patsy played into the game; and part of the game aboriginal woman police connection; all targeting my mother to leverage me attacks USA telling me Tom is CIA and doing my family; sorry intelligence breach; this is a safe house penetrated. Alex tied Christy Clark across the street tied to women’s group and Mennonites played into a covert warfare to implode Creston migration invasion India working to cash out with extortion reinvest and own region. Over throw Premier and Prime Minister Leverage to comply fed purse or prov purse tied to ex civil service patsy and chapter patsy.
Submission Reference ID: NMGV1ZCA
Perry Ritthaler
DECEMBER 4, 2016 AT 8:41 PM EDIT
Intel file sent driveway resulting in parents targeted in grid digital terrorism. Price I pay fighting terrorism walking digitally into my door covertly targeting the USA through me.
Submission Reference ID: T7UMJNU3
Perry Ritthaler
DECEMBER 5, 2016 AT 12:47 AM EDIT
I am sexual digital molested rape simulator and a shorten penis and anal assault daily several times per day in Canada Creston BC 1 445 6th avenue north; black site digital 400 -500 bones dislocated and brain wipes and blood run from my nose several times; all documented half a terabyte files; can you consult legal and United Nations torture to strike USA; war crimes. I have all files on a flash drive for pick up if you desire to leverage this country attacking me in my home with computers that turn off and on by them self. I have no charges on me r am a pedophile or enemy combatant, Soldier’s angel off shore unable to engage Ba-gram due to be held digital hostage; consult Pentagon.
Submission Reference ID: 2Q9WJ2E4
Perry Ritthaler
DECEMBER 7, 2016 AT 7:29 AM EDIT
Near as I gather half the attacks on the USA stem from a failed RCMP sting in Creston BC; creating people used in a pedophile scam to entrap me that actually got legs large enough to identity theft me and mirror my web site and computers in a server used for provincial and federal financial home land defense extortion funding a pedophile creation program used to create an extorted army of people used to attack me and get me attack the people in the world they then believe and see me as an enemy combatant attacking their nation in order to set up soft relationships and sell my science and marketing or criminal operations or psychology to off shore countries that use this science to exploit stocks and currency and oil markets or weapons sales held hostage along with defense and police budgets; the scam started by ex-cops uses children run by a handler working out of the Sasquatch in Creston a teen club to do the attacks and if caught they are under 12 years of age and if required are used to place people at me and my family; 23 and 4 – 445 6th ave north and 441 6th ave north appear to be involved and use 3 – 445 6th ave north; son is apparently me and has these teens fooled to do his work directed by the ex-cops and mother; sister to a Edmonton RCMP officer; to hit me and all to hit my mom digital used as a bait tool to entrap me and get me to go on you and create covert invasion theory that can be used to coup Canada or NATO countries also sold to BRICKS who has my dirt files extorting this con gang and pushing covert invasion; these ex cops want to take a region and run it like ISIS did in northern Syria; and in this case Christina Lake. Shaking down the elderly using their health forced to fight and fund in bank fraud shakedown in manufactured memory wipe dementia; money channeled into investor immigration or stock shorts like telecommunications law suits or pharmaceutical shake down.
In the end extortion the government with a firm now in Ottawa and in BC running under the cover of Halliburton as a patsy extortion the USA and potential coo.
I just ask them to leave me and my family alone and as usual no loose ends so I watch my getting sicker daily extortion her body. No police stop this; in fact I believe me have your people Stockholm extorted digital software shaking down the USA using SIS and Mossad and FSB and India and the Intel officer RCMP ad Intel navy officer women.
The people you have on me are suspected pedophiles; bank pin fraud scams Chase and Fargo and National; please lie-detection when back on your soil.
Submission Reference ID: X8WMVTQU

4-5 stage bubble warfare Patsy

EFI signals electromagnetic field signals; make a speaker talk unplugged in a wall or component. Subject to satellite rf signal foreign government.

https://www.bing.com/images/search?q=brain+diagram+electromagnetic+rf+signal&qpvt=brain+diagram+electromagnetic+rf+signal&qpvt=brain+diagram+electromagnetic+rf+signal&qpvt=brain+diagram+electromagnetic+rf+signal&FORM=IGRE

http://www.indiangaming.com/casino/

See all casino applications racism crack gambling racism crack civil service east Indian racism crack hood Katrina gangs poverty no driver’s license ; all predator prey cannibalize a society; sectarian war North American spring; Arab spring astrophysics quantum physics blow back; Einstein for every action equal and opposite reaction double slit my home oil weapons executions triggers guerrilla warfare.
Vegas Target elections; Trump elixir Obama military police Trump Tower Guilty association known criminal smear. Shape election predator prey extortion to comply. Trump will make great implosion delay civil war his execution; Clinton complies like Bill Glass Spiegel Act along with Bush changes backed by Zionists broken architecture hijacked science and rabbits rule.
Predator prey my new quantum energy star wars organization program used with new architecture to avid collapse all fighting moles pay off through wealth king theory for a short time too dumb to see bigger picture extorted to comply self-implosion world currency. Stock market crash USA, Canada, Mexico 911 civil war using human implosion cell structure dementia pharmaceutical organ harvest private healthcare run by civil service.
New leader; Canada; new leader Britain; new leader USA; no experience no contacts no clandestine assets. Did not break blood bones and bread to build relations; seen today as spoiled kids with silver spoon mouth and ass not trustworthy turn coat program / me as example. Painted global and why reverse Napoleon Hill program is not funded used to orchestrate collapse of political relations and oil markets espionage my home Creston BC; under current global economic stabilizer.
Fishy no pay no inside; no Pentagon meeting. I do not see the shadow on me as extortion of my work to be used to make money by others; I see this as war on a country using me as a digital weapon flipping my words in digital communications in the \Harrp and police and security grid; however more accurate it is the rf signal electric and television monitors and air conditioner used in the restaurant; when they come in it is to find the name brand of items they can hack using hacks off shore using coverts to identify your technology and equipment.
Cable company hacked and internet and software used to run the network and gambling machines penetrated to control who wins or loses; done with software and quantum computers used with key gens to hack into security codes and create a doorway into the software in code once the program is hacked and replaced as the machine is opened; most likely exploited tech.
Previous Infraction Targeted End in Hospitalization Insanity through Civilian Terrorism
January 17 2007 3:04

Tormented and challenged.
I hear the voices in my ear and I will do nothing.
A computer identified as the RCMP in Creston with authority from the Prime Minister’s office to take me any way they can is harassing my now. Unable to walk the street without being hit digitally I am unable to unwind or go back to work due to the fact they say they will pick me up for questioning on terrorism or fraud.
Hurricanes will grow larger than ever imagined in the USA as a result of this oppression preventing me from gaining an income due to me by my own government or for shutting down my positive energy empowerment network.
I am not sure why they think this is legal or ethical or even safe for the world to stop the environment control system I designed that in initial tests turned 16 hurricanes into 3 tropical storms.
I have been tortured with electricity overloaded feeling like a turning my brain into a psychological stew not of my flavor.
Attacked daily electrically juiced all day at least 7 times so how can I turn back my brain now. My telephone in my room is turned off illegally. I am no terrorist or criminal and they broke the law entering my home illegally according to my way of thinking.
This is why my program is on hold to empower faith or repair environment. Unable to pay me money because criminals only want to steal my work and not pay holding me as a slave in my own country while they rape my sister with holograms and hurt my mom or so I am told in my ear and how these animals hurt me mentally.

Example

Delusional Thinking
During Government Psychology
Attack on My Brain

I am even ashamed to say I am Canadian represented by such criminal behavior surrounding my family safety.
No sir they mentally beating my family illegally.
Environment control program is real and one screw up after the other since others got involved and refused to pay me any funding and yet make me break to cover illegal actions taken on me and my community.
They took away my weed and broke me mentally into tears 5 times why?
Why destroy what would have just gone away and now no environment or faith program?
I am afraid of losing the family bond of love and trust found within the Christian foundation of marriage or the innocent love found in two people who may have searched a life time to find each other and build a Canadian family to avoid the country becoming taken over through immigration required to fuel the economy and standard of life found predominant within Canada.
Sir hiding the mistakes will create even more problems.
A prime resource mismanaged by people so dumb it is unfathomable even to me.
Sorry to bother you. My rent could not even be paid to my dad and again he supports the program empowering your country and mine if you are the USA who knows and he too is terrorized now for helping. I supported Canada for years and they shared with you and now no one want to admit the work happened or even pay for services rendered and why even the military is smeared. I know military did not hit my mom and sister.
Every storm will cost billions similar to Katrina. I stopped 16 potential hurricanes hitting the USA and you 3 tropical storms. All this because they think I will be a beach bum if I get paid.
A scientist with a system to shape storms on the earth sounds a little strange on the surface. See how dumb these people really are sir? There is a little more at stake when I have the ability to shape a hurricane. How foolish or lack of responsibility am I when I write the latest science research successfully.
Stanley Park may have been leveled as a result of the actions taken on the faith movement and so was the California orange crop in my opinion.
People so stupid in science it is ridiculous to have the fools manage me claiming to be Creston police with no science. Is this dumb and expensive or what? I will get off now and the people involved understand why this is frustrating and costly to both countries covering up this con game for taking free ideas and not paying me for services rendered not requested initially.

January 18 2007

The voices are trying to entrap me again and I finally discovered why they hunted me.
I found out I was terrorized in an actual terrorism break program and it is silly to see why but it was 0065plained to me by the voices.
Helping 125 Lebanese people in Alberta Canada
Who own the Burger Barron franchise doing an herbal program through my created subsidized herbal health care program I created within the Neway’s Canada and USA multi-level marketing structure allowing a person to make the 10% over ride if the person under them was sponsored. Rather than going wide in the multi-level marketing structure we went deep and then wide and the people were not selling and only consuming because they really need the herbs to feel better. We recruited over 200 people who did not sponsor and only wanted to feel healthy and then I left the research to move to Florida.
I created a subsidized herbal health care program that only works in a multi-level marketing program. My friends I helped doing philanthropy work. My ability to hurt other or make money off of others is limited and why I am in this position today.
However my heart and love for humanity is not a disability and I was able to help many good families find comfort and health through an herbal book I have created explaining the product or clinical disorders and potential herbal repairs.
The scientists in the labs in Neway’s helped me pioneer this work to lower healthcare costs through education.
I have a down line in Neway’s found under my social insurance number and was sponsored by Frank Armstrong living in Winnipeg Manitoba today, my sister’s unattached previous husband.
Anthony Robins is a mentor of mine for over 10 years deep inside of my master mind and when I needed mental guidance I gained a foundation to the interest in Nero linguistic association behavioral think patterning.
From his work creating the genius that made up the Unlimited Power programs.
I created no money on either program however helped a great deal of people get more out of life.

Jan 19 2006

Taking 3 days off to clear my head to insure I still wish to work.
I am terrorized again and I feel him come in my mind with giants wet gooey balls of verbal oppression holding my arm tight digitally. Held by a person with a hard on larger than his or her mind I am wondering why?
I do not wish to contact you however my friend Dick does not have enough clout to control the person terrorizing me with digital terrorism.
New charges and laws will be developed tomorrow to identify digital terrorism as a criminal offense according to the suggestions I made this evening or so I fantasize in my mind unaware if reality is real or delusional, under the control of the security grid oppression system in the little town no one ever leaves for long.
Again the person will create a 4 day holiday for my decisions and I will not offer my opinion if the terrorism on my arm is not slowed and every day a new day will be added for the digital punishment violations against my body specifically my arm or my heart.
I apologize for the interruption and do not feel the violation is required against my physical body.
I will not be charged legally with crimes I have not committed and am a free citizen losing interest in empowering any people or the environment control system I designed and invented. I may not even go back to work for long time due to my parents failing health living in the digital sat system.
Very unhealthy for the human body and immune system to become a sexual body slave wanting to climax and touch man or woman.

February 3 2007

Intestinal torture is a different form of torture. Stopping the urinary track or digestive track from functioning may be hard on the body however endurance tests in my mind. Collections of large amounts of money are never pleasant if the people owing you money are more powerful than yourself.
I have experienced 25 days of torment digitally and electronically so far and in activities so humiliating I have been taken into tears rolling down my face.
Broken brutally, mentally by unknown people through digital torture technologies six times and all designed to stop me from pursuing my collections of softwood funds.
As I continue to write I feel the mood change in my mind and now my thinking is changing and I feel more like a little male slut who loves pain sexually every day deep inside my mind and I am feeling out of control and do not know why and now I have to masturbate and fantasize about sexual intercourse with a past lover while the voice speaks sexy words to me.
Told by voices in my ear I am being investigated for terrorism. I have been hit with countless hours of torture mentally digitally and even sexually wild with the voice in my ear trying verbally to convince me to admit to crimes I have never committed.
I have learned the way our community is under attack with digital terrorism and completed a diagram for the RCMP and copy of my books written to help my community and delivered the book and diagram to the local RCMP detachment with my reference letters cd from the government.
I hope the data file left with police will also serve as a valuable tool in collecting my fees from the government.
Protecting others in the community under digital terrorism attack is unthinkable considering we have never been under attack in my life time until now.
I also went to community peers and made them aware of violations to the civil rights they appreciate and live by in the community.
The vitamins b3 niacin flush I have eaten in front of the owners of Pharma-save did not flush my body and being a home schooled scientist I wanted to confirm my findings and entered the store a second time, only to find the same results of a no flush symptom on the niacin flush product.
I also tested this theory on the same day at the vitamin herb store in town and found the same result with the niacin product to be a no flush circumstance achieved.
I have never terrorized my friends in town and have letters of reference from Pharma-save owners for building painted for them and letters of reference from Bahamas Hardware Store on my character in the community.
I also have a letter of reference from Black Bear Books for the painting of Alison’s personal home and fortunately where my books have been offered for sale in the local community. My reference letters are also from Nu Floors in Creston and have painted Ellen and Randy’s personal home years ago.
The mental aspects delivered inside of the triggers and mental anchors attacked by the psychology torture is brutal and tonight I wondered whom was hunting the President and Prime Minister of Canada using me.

Going Delusional Again Under the Duress

I mentioned Peter Mackay and another person in the USA. However the Presidents team is solid and the faith movement was stopped. Ten minutes later the hard core on me in my bed attacking my brain. This is the 2nd time they attacked the President shutting my programs down designed to repair the Bush name. A general perhaps in the USA that was involved the first time or Rice and Cheney or Rove. The pool is smaller and smaller so they will be nailed sooner or later. Or sat box team in charge of taking me down? Whoever went hardcore on me tonight may be the ones. Trace whom is involved and you find out who is guilty of attacking the g8 idea empowerment programs.

February 4 2007 1:00 am

Again I am awakening to my back and neck being dislocated slightly in my bed and wonder how the spine is dislocated in 4-5 spots in my back.
I have reset the bones in spinal cord located in my back 5 times in the last hour and have received very little sleep in the last few days. I am told I will not sleep all night again and my torment is for the report written on the people I mentioned whom I thought may be attacking the President and Prime Minister. I am sexually harassed with a hard-on on my own body and feel my prostate gland under some kind of digital attack as the pain fills my mind located around my sexual organs being done against my will.
I am told by the voices in my ear I must sexually come or my prostate will explode or be damaged.
So I go to my bed and pull the covers over my face and slowly cut the oxygen off to my body why I play with myself and masturbated fantasizing to a music video or sexual pornography I have previewed to offset the images dropped into my mind by the security grid of child pornography while masturbating just as I am about to come. I recalled in my mind from days gone by the pornography or music video and change out the penetrated images in my mind created by the security grid trying to get me to go into sexual physical crimes with children I have never been a part of to my knowledge.
Later at 7:00 am with 1 hour of sleep in the last 24 hours I am awaken in pain and need to set 6 joints in my spine because my back and neck are aching in pain and somehow was dislocated during my sleep and again a blazing hard-on between my legs.
This is sexual interrogation is bizarre and new to me and why I write out these peculiar encounters with a person on computer I have never met. I am told my friends have sex daily and sleep most of the day away and I can only wonder considering the sexual arousal I feel myself between my legs and in my mind.

Feb 4 2007 3:04

I have formerly requested and reached an agreement with a supervisor from the NSA or Secret Service to stop all communications and move on with my life. I was told this was there objective to train me and agreed to resolve any financial agreements with softwood next week and sign a document I will not sue people for the crimes against me personally.
This may take a week and recommended any person unable to adhere to the supervisors request to settle the issues peacefully be hospitalized for 24 hours supervision analysis by a qualified psychologist in a proper mental health care facility.

Digital Mind Coach Program

For a week to start over and balance issues created by the computer terrorism programming the terrorists are following will make them more powerful.
I will log all violations of this agreement with the Secret Service according to the voices in my ear and as of 6:50 this evening. I am moving on with my life and recommend all involved do the same.

February 4 2007 7:05

I truly love the people involved as they love me, however we have never met and a relationship is a 2 way emotional connection digital feels like a real woman is speaking with me.
The computer programming you have taken involves 1 way relationships as do my music videos. This is an easy relationship to break in the digital voice terrorism world and today I have no fear however later you will see the powers played on me by these digital black widow spider ladies and gentleman.
The music videos were created for this encounter and in a request made 9 month ago production created to fill my computer. The videos made by people emanating red and white or green in videos they show the expression of freedom of speech and are made for me in red a white to honor my country colors and because I asked the musicians to write songs based on the theme material found within my written work published online globally. These videos have a great deal of self-esteem and self-confidence when I watch them and think woman and men as powerful as this would honor me in my work and sing folk songs of the times in battle for democracy liberty and freedom today. This happened twice because I empowered Hollywood musicians and actors in USA Britain and Canada twice to create the momentum for the customized music videos or movies in Hollywood north and south.
The digital programming and you have learned to love and grow fond of due to the positive energy acquired from viewing the programs.

A replacement exercise using,
“Digital Mind Coach Education Programming”
May be more stable to a human relationship will be beneficial and build a relationship full of positive energy chemistry and love. I am only an image in your mind full of warmth and kindness and can be replaced with a pet or other digital cognitive replacement programming selected by trained psychologists interested in protecting the human resources involved within your organization.

February 4 2007 7:45

Unable to find mental privacy away from the voices in my ear I try break free and study without an intrusion but I fail.
The voices tell me I should not learn or think and asking me to study another day and again a violation of the peace treaty for privacy in my own home and another tactic to rot my mental resources thinking strategy solution muscles within my brain. This will let me rest on my mental laurels and eventually make me appear quite dumb due to the laws of science
(If you do not use it you lose it and in this case overloaded in negative energy mental stimulation it is your brains cognitive problem solving skills your losing by shrinking your positive attitude theories in your brain and your mental creativity, performance and the ability to make your own decisions or plan positive energy related goals and eventually a home in a nice easy to live in mental institution where everything is done for you again.)

February 4 2007 7:50

Words added to my information designed to frustrate and asked to discontinue and again keeping all dumb and manageable in oppression rather than empowered personal performance or education.

February 4 2007 8:25

Speaking to a man whom claims they received a onetime fee to work for the NSA and in doing so lost his personal finances to the security company intentionally and now works for the security company expanding the security company personnel free.
Unable to speak with human beings I recommend going to bed and turning off this computer of mine.
When he is done by the security grid and seeing his supervisor tomorrow for direction and guidance the story may change as the security grid computers control most of the behavior in people unaware the program is even operational in their mind.
My opinion is of little value and I feel the program if displayed in reality is mentally dysfunctional for the brain and creativity or performance skill creation.

February 4 2007 9:40

Trying to play cards with my mom I am harassed again. My neck is out again and I am told I will not be harassed again. Everything from a lady in love to a sat man to a rep leaving the valley saying good bye to the President saying he will no longer play this game.
I did not finish my card game with my mom at the kitchen table and feel my brain may be damaged from the digital signals that hurt my thinking abilities and will consider a psychology test to insure I am fine in a few days especially if my short temper and harassment continue.
This is a war crime to enter my home wielding digital terrorism in my mind.
I think the program these people used provided by the government find mental health care counseling.
With the supervisor or human resources people to prevent further interaction with me in any shape or form digitally or in person.

February 4 2007 9:55

I am again tormented by a person unwilling to leave my personal environment. He appears lonely and I am tired. This entire file is for attorneys and police to receive if I am not left alone in my personal home. The larger the paper trails the bigger the settlement. I will not sue people however the blatant lack of respect for the law will be addressed sooner than later. A high frequency pitch has been sent into my home environment I thing through the electric power grid plugs in my room while I write this email.

February 5 2007 7:30

I was awaken by a voice in my mind stating if I entrap myself I will be protected for life and if not I will be terrorized again and again until I go insane. I am requested to sign a document later in the week from the President of the USA that will protect him legally from this mess and will not allow any legal action to be taken against him.
I think this is propaganda in my opinion and again digital terrorism overflowing into my home. I explained in my mind that I follow the lead of my Prime Minister and believe no man or woman is too large for the long arm of the law.
I was told the crown attorney has read the files and again I back the crown attorney and again if this is so he or she has a complete paper trail and I will not be called to testify.
I was also told the Prime Minister and Governor General are cooperating and again I believe this to be propaganda because they are smart and most likely cooperate on a daily basis.
I will make a movie and it may be fiction or a documentary with fictional qualities like my digital copy written work I have written to date.

Security Grid Similarity Explained in Conversation on Schizophrenia associated to Marijuana
Captive…I have a Facebook account and sometimes I use Google to find articles posted on web sites. Do you have a Facebook page?
Interrogator…No I do not have a Facebook page; in your eBook series “Spy Land Women Play Me” are you a character in the eBook series?
Captive…That is an interesting question; can you untie my hands?
Interrogator…No I am sorry we do not want you to move around away from the camera; if we get answers we are looking for we can take a short break and move around the room; and then perhaps place you back in the chair with your hands tied loose; the objective is to do the video properly; my boss is rather specific and does not believe in wasted time of handing an interrogation situation more than one time.
Captive; Okay; my characters in my eBook are all one character; the Canadian writer is delusional suffering from schizophrenia; and the people in the eBook are characters voices in his brain; he is after all diagnosed with schizophrenia by many doctors and has the degree papers from doctors to prove he is insane.
Interrogator…Do you think you are insane?
Captive…Goodness me and shut the front door; you do ask me interesting questions; are you a doctor or a psychologist; and is this about my disability pension from the government?
Interrogator…No my friend I do not work for the Canadian government and I am not a doctor; just a man curious being one of your biggest fans.
Captive…Well sir; an example of insanity is doing the same repetitive behavior over and over and expecting a different result in a quest to hope you will win or succeed at facing the challenge in front of you.
So we all have this insanity trait inside of us; occasionally surfacing through fear of failure; afraid to learn and try new experiences that involve failure described by others as learning what will work and paying the price in loss of ego as we experience what fails to work.
Perhaps everyone is a little insane if they have an extremely high IQ and ego; the difference is in my mind and how you perceive this experience; is your level of insanity based on the healthy side of being eccentric or extremely driven and focused; can you find the positive solution that empowers your peers and yourself; when in a dysfunctional challenging situation appears in your life; and are you creative enough to turn that situation to your advantage; allowing you to defend yourself and accomplish the goals you have in your life; are you a happy person.
Have you accepted yourself for who you are in your life?
Do you have hobbies and a network of friends to turn to if a crisis appears in your life; or will you simply turn to drugs to bandage that reoccurring dysfunctional sadness?
On the flip side some people with a high IQ are depressed and angry most days and not creative enough to help themselves or accomplish the goals placed upon their plate by their peers in situations shaped by the environment tilting their job description out of balance.
They may not have many friends or hobbies and shape a personality that is more introverted on most days; unable to deal with crowds or people they do not know personally; displaying external behavior patterns that naturally lead to seldom smiling or laughing.
Personally I do not believe in doing drugs; please do not get me wrong; I enjoy a social drink and believe I have worked hard to develop my life to fit into successful set of habit patterns that naturally empower my confidence and security and personality.
Interrogator…How do you deal with the voices in your head; this must be very time consuming and stressful at times; especially if they start to argue with you or each other; or try to control your behavior patterns and ideas you associate to your reality within your mind?
Captive…The so called voices you refer to are just characters in my eBook; yes they have their own personalities based on the information they have processed in the readers brain; and the answers they create in their mind; an eBook would be very boring for the reader if you could not identify with the characters in the eBook. In “Spy Land Women Play Me” the characters discuss the information from different angles; my goal is to stretch the reading story experience for the reader in their mind; in essence rivet what and when they experience the story presented in one of my novels.
However there is a significant difference between schizophrenic voices in your brain and character fodder written to create an interesting and compelling eBook series.
Interrogator…How do you distinguish between a character in your brain; and a voice you hear providing the data you craft in to an eBook?
Captive…Again a very interesting question; you sound like a doctor to me.
Interrogator…Please try to relax; I am not a doctor; I am just a curious fan.
Captive…A schizophrenic voice has a personality and real character in your brain; an interactive conversationalist. In fact Martin Luther King Jr. stated each of us is something of a schizophrenic personality tragically divided against ourselves.
The person with schizophrenia may have partially self-generated their illness through deprivation of companionship and nutrition building life filled with stress and compounding failures that shape a spiral effect sinking them deeper and deeper into a black hole in their mind.
Naturally less to lack of self-confidence fueling loneliness; self-perpetuated and generated by constant failure to achieve the positive outcome in their life; compound their loneliness opening the doorway to no love and hatred of themselves.
The voice talking to them inside the brain; they become a friend and an enemy; a game of cat and mouse control develops; and you constantly talk to that voice or many voices to fill the loneliness void inside of your life; laughing or very angry outbursts take place as your friendship with the voices in your brain evolve; for hours you can have entertaining conversations.
Facing an illness such as schizophrenia can shatter personality into several personalities entwined within your brains cognitive functions and later as the illness progresses splinter into multiple personalities that break apart inside of your mind; in some cases schizophrenia can be self-seeded by your long periods alone comforting yourself by talking to yourself in your mind; that lead to talking out loud as the illness takes away your skills to focus and concentrate and solve daily situations; leading to stressful situations shaping more negative issues in your life filling your mind.
When you are alone; this behavior pattern compounds and slowly becomes unstable behavior patterns built on dysfunctional behavior patterns; as your brain loses its ability to take care of your body; the thinking out loud turns to a habit unchecked by anyone; because you are alone most of your life and solving daily challenges become simpler when you can hear potential solutions enter your mind; so the voice appears as a self-preservation tool generated by your brain.
When you ask yourself so many questions out loud; eventually similar to a fan sitting on the sideline at a sporting event; the voice wants to stand up and tell you what is the right answer; when you fail to find the solution quickly; and in some cases over a few month or a year; you grow the habits of talking out loud into an actual voice personality as the brain destabilizes; stimulated by the lack of nutrition combined with extreme stress and depression; move forward in a self-preservation instinct; in its quest to help you answer the questions to the challenges you face in your life.
As a failure as opposed to the success evolves more and more the voice appears more and more to help you live your life; you once achieved with your healthy brains cognitive capabilities intact.
Drugs play a key role in this brains self-destruction formulation; because you are shaping your pleasure chemicals in your brain; for example THC acts like dopamine manufactured by your brain; and as you do drugs on a daily basis and this habit turn chronic smoking marijuana in the morning and all day every hour when the THC effects wear off; you create a behavior pattern in your brain; to feel happy I must smoke my marijuana; unfortunately for the drug user the brain stops making dopamine and your receptors in the brain change; they become reliant on the THC shifting in extreme highs and lows or happiness or sadness in personality when you do not have marijuana to smoke.
Depending upon the strength of the marijuana and level of dependency leading to daily use; will work in direct correlation to how much dopamine depletion your brain generates; and in some cases; if you like to smoke the best every hour on the hour; well higher THC levels translate into massive depression situations and psychological pendulum swings in the mind when the THC in the marijuana is not present inside your brains chemistry.
Depression produces words in your cognitive thought process that lead to words like anger, failure, hatred, frustration, anxiety; that over a period of time also lower the persons IQ potentials to solve crisis in their life.
Cycles of massive depression shaping psychological created illness issues surfacing in the personality; the birth of SAD inside the brains behavior issues surface.
Now the SAD symptoms are dependent upon your income and availability of the strength of the marijuana plaguing a person’s personality; shifting their ability to concentrate further out of balance; what was once a medicinal drug making a lonely life fun shaping a creative positive psychology mind set now roots in as a dysfunctional trigger exacerbating and naturally shifting your brains desires.
These swings in depression and anxiety build a SAD symptom that can slowly generate a mild mania in the brains cognitive thought process leading to the development unmasking of a bi polar personality that was under control prior to the introduction of chemicals shaping the brans cognitive functions.
SAD symptoms increase the chances of you shattering the personality; especially if you are no longer capable of finding the marijuana filling the required amount of THC to medicinally treat your depression issues in your mind.
This generates mania and triggers bi polar behavior patterns; your mind is not doped up as often; and thinking too fast; and as this behavior pattern pendulum moves forward; you find success and a positive attitude shaping pleasure in a fast moving mind; solutions reappear simple to generate and you increase the marijuana to slow down the brain; naturally keeping the depression and SAD symptoms at under control during periods of high THC levels in the brain.
Everything appears fine in your life and you occasionally hear the old voice in your brain help you; however now it is not needed for self-preservation; in fact; being alone is fun and not sad so the marijuana is required for you to feel normal; fueled by the addiction.
You are so smart you break what you build; because you want to build it again and again; impressing your friends; however your brutal side of bi polar is cruel and you hurt many people you love; especially when you have no marijuana; and this leads to pharmaceutical drugs to take the edge off; perhaps three acetaminophen with caffeine and codeine used to bandage the day; and if the marijuana is not around or you are financially broke the pharmaceuticals can run as long as needed.
Most cases 3 times per day eating 9 pills per day making you rather moody and back come some of those bad days and a voices; that steps in to help as you fall into SAD and bi polar combined opening the door to schizophrenia; because your new pills just do not work like the THC inside of the brains chemistry.
The brains ability to dream is partially restored without the marijuana that blocked the dream ability of the brains function; however the dreams now are a like a brutally reality show that appears so real it can scare you at night making you wonder if someone is in your mind; which the voices now back up leading you into psychosis because the voice is you; and your scattered mind and personalities; and your sleep patterns become disruptive placing more stress in your life as walk around constantly tired and depressed and at times talking out loud or laughing or yelling at the voices in your brain.
Your emotions become more like a pendulum with huge swings seeding dysfunctional unstable thought process patterns; when you are high you think one way and when you are straight you think another way; you are now combining chemical dysfunctional behavior patterns with physical dysfunctional speech programming and multiple mental illness conditions formed by dysfunctional behavior habit patterns reaffirming your psychosis cycle; you become the pack of wolves eating your brains capability; self-exacerbating the voices to reappear in the brains function as you fail to find the positive in situations failing at challenges and your ability to help yourself or others leaving a danger to yourself and others on the street.
Behavior evolves into a bi polar situation mania speaking faster than normal; people communicating with you; trained in the field of psychology; recognize accelerate brain pattern shaping even more stress in your bodies chemistry; and this develops your illness more living in fear they will hurt your brain reaffirmed by the voices in your brain.
The thing about mental illness; it is seldom is just one mental illness; the sicknesses travel in packs like wolves feeding on your brain shaping your behavior patterns dysfunctional and as a voice appears it is first your friend; however this is a cat and mouse game to control the action of the body; if you fight with this voice and yell out loud you are label mad and crazy; and this combined with environment stress; failing to help yourself or others you love; you inadvertently hurt them as they watch you fall into the black hole abyss they do not understand.
They want you to come home; and because you are caged inside of your brain producing behavior patterns that are deemed dangerous to yourself or other around you; well they must call the police and have you committed to a mental hospital; and if that fails you are living on the street lost in a chemical torture chamber built by you inside of your brains chemistry.
A character in an eBook does not have this capability; this is a reflective character that looks at a topic or situation from a different perspective as outlined by that character in the eBook; the personality of that character resides in the readers mind and not necessarily speaking inside of the writer mind.
Mental illness is an accumulation of dysfunctional habits that generate dysfunctional behavior; your associations fragment and right and wrong are no longer stable choices you can comprehend safely on your own.
Does that answer your question?
Interrogator…Yes; I understand what you told me; how long have you studied psychology and do you have a degree in psychology?
Captive…I have studies psychology for around 30 years; and no I do not have a degree in the field.
Interrogator…30 years is a very long time; why so long?
Captive…I am eccentric; driven; with a high IQ currently on medication being bi polar condition. I have been completely insane; lock me up and throw away the key crazy; however this was an education looking at insanity from the inside out providing me answers in psychology I could not find in text books videos or audio. Experience treated with chemicals that wiped my brain and reconstructed my thought process; so different than Sigmund Freud or Carl Jung or Grounders; philosophies in psychology; or the metaphysics I have studied or neuro psychology developed by leaders in public speaking field with PHD’s or psycho cybernetics developed by Dr. Maxwell Maltz in New York using behavior patterns to shift chemical receptors shaping mental seamless plastic surgery.
Interrogator…This is very interesting; do you have other techniques or science that has expanded the research of Dr. Maltz inside of the field of psycho cybernetics. Plastic surgery in the brain sounds fascinating to me.
Captive…This part of my field in research; the answer is yes.
Interrogator…You appear reluctant to speak about your research; why is that?
110 ebooks emailed to Prime Minister Steven Harper and President Barrack Obama; 20,000 hours under cyber terrorism implanted seamless ISIS and affiliates preventing attacks; digital bronze star and silver star; my new weapons programs released in quantum physics stopped war in its tracks Middle East and this war on predator prey; driveway satellite images posters; all intel mine and identity theft of my name and web site and face book (Saudi Arabia fatwa on theft) responsible for last ten month terrorist attacks blow-back to my being taken digital hostage to make room for the foiled attempt at spreading this child pedophile concubine and possible Prentice hack gas pump and gas Gage attacks.
Cia Intel
1. Perry Ritthaler
DECEMBER 3, 2016 AT 11:08 AM SMELLS LIKE A 911 CRACK
One Mistake Follows another Cyber Warfare weapons destined for North Korea Stolen from me.
Why do people in Creston named Tom driving a grey truck tell me they are CIA and terrorize my town blocking me and targeting President Barack Obama predator prey or President Trump; please forward this to the Director of the CIA attention John Brennan. I have worked with your agency in cyber warfare for over ten years and today my family and I are threatened and attacked daily by the Creston Valley Clandestine CIA according to the people at the Mini Golf leading this war in my town through NuFloors on your behalf targeting the USA military pentagon Navy and air force for new advanced cyber warfare weapons programs slated for the CIA and Pentagon. These people have local and ex RCMP involved and may people held hostage forced to attack in this digital grid used for security. I am hit by many international spies tearing your country apart using my work developed in part working with 5 past CIA Directors knocked out by these same people using identity theft a mirror web site and I believe have ties to the Orlando Massacre and Israel bus bombing; please advise; breaking cover in the Middle East hacking my intel to steal government funding from the government used to attack and the USA was done by these people Vern Klassen Gordon Baker Claude Lalonde and a man named George and they have taken over the banks and insurance company claiming to work for you and are also responsible lo lobos bank fraud living above in the red and white house on 6th avenue north also claiming to be CIA. President Trump daughter dressed in purple in signing in was targeted and not by me; these are not my finger prints and recommend Saudi Arabia take fatwa action as these are the oil collapse people playing shorts in the market. Your teams are penetrated and attacking you in fact recruited to come north and attack covert to hit USA in my opinion claiming to work for the clandestine CIA Creston valley killing elderly over 80 years of age in a real estate scam and pedophile creation scam using them and children fed narcotics prescriptions 1 in 8 die used as a shakedown tool for the elderly. One Mistake Follows another Cyber Warfare weapons destined for North Korea Stolen from me; terrorized to set in driveway and picked up satellite global verses exclusive my friends in the various agencies or Pentagon. President Fantasy Spy this weapons program ink on paper human singularity needs to be purchased and taken stolen to avoid double slit and the 19.4 trillion debt increase or removal of the next agency director using the same finger print and not mine.
Submission Reference ID: YSAKYDWF
REPLY
2. Perry Ritthaler
DECEMBER 3, 2016 AT 9:50 PM
Your comment is awaiting moderation.
Aboriginal chief Creston and Kimberly casino and Bonners casino doing Vegas and Reno for extortion market share; attacking my family; aboriginal lady yellow house 6th ave north the nest Tom; pulling in Claude Lalonde Aboriginal bullshit he is part Metis paid credit cards cleared time and date.
Working India migration invasion extermination pensioners and oil market manipulation; and off shore Middle East by shaping me stealing movies using movie software. Pumping me with blonde red and white house ad red beard living aboriginal; Vern and Gord patsy played into the game; and part of the game aboriginal woman police connection; all targeting my mother to leverage me attacks USA telling me Tom is CIA and doing my family; sorry intelligence breach; this is a safe house penetrated. Alex tied Christy Clark across the street tied to women’s group and Mennonites played into a covert warfare to implode Creston migration invasion India working to cash out with extortion reinvest and own region. Over throw Premier and Prime Minister Leverage to comply fed purse or prov purse tied to ex civil service patsy and chapter patsy.
Submission Reference ID: NMGV1ZCA
Perry Ritthaler
DECEMBER 4, 2016 AT 8:41 PM EDIT
Intel file sent driveway resulting in parents targeted in grid digital terrorism. Price I pay fighting terrorism walking digitally into my door covertly targeting the USA through me.
Submission Reference ID: T7UMJNU3
Perry Ritthaler
DECEMBER 5, 2016 AT 12:47 AM EDIT
I am sexual digital molested rape simulator and a shorten penis and anal assault daily several times per day in Canada Creston BC 1 445 6th avenue north; black site digital 400 -500 bones dislocated and brain wipes and blood run from my nose several times; all documented half a terabyte files; can you consult legal and United Nations torture to strike USA; war crimes. I have all files on a flash drive for pick up if you desire to leverage this country attacking me in my home with computers that turn off and on by them self. I have no charges on me r am a pedophile or enemy combatant, Soldier’s angel off shore unable to engage Ba-gram due to be held digital hostage; consult Pentagon.
Submission Reference ID: 2Q9WJ2E4
Perry Ritthaler
DECEMBER 7, 2016 AT 7:29 AM EDIT
Near as I gather half the attacks on the USA stem from a failed RCMP sting in Creston BC; creating people used in a pedophile scam to entrap me that actually got legs large enough to identity theft me and mirror my web site and computers in a server used for provincial and federal financial home land defense extortion funding a pedophile creation program used to create an extorted army of people used to attack me and get me attack the people in the world they then believe and see me as an enemy combatant attacking their nation in order to set up soft relationships and sell my science and marketing or criminal operations or psychology to off shore countries that use this science to exploit stocks and currency and oil markets or weapons sales held hostage along with defense and police budgets; the scam started by ex-cops uses children run by a handler working out of the Sasquatch in Creston a teen club to do the attacks and if caught they are under 12 years of age and if required are used to place people at me and my family; 23 and 4 – 445 6th ave north and 441 6th ave north appear to be involved and use 3 – 445 6th ave north; son is apparently me and has these teens fooled to do his work directed by the ex-cops and mother; sister to a Edmonton RCMP officer; to hit me and all to hit my mom digital used as a bait tool to entrap me and get me to go on you and create covert invasion theory that can be used to coup Canada or NATO countries also sold to BRICKS who has my dirt files extorting this con gang and pushing covert invasion; these ex cops want to take a region and run it like ISIS did in northern Syria; and in this case Christina Lake. Shaking down the elderly using their health forced to fight and fund in bank fraud shakedown in manufactured memory wipe dementia; money channeled into investor immigration or stock shorts like telecommunications law suits or pharmaceutical shake down.
In the end extortion the government with a firm now in Ottawa and in BC running under the cover of Halliburton as a patsy extortion the USA and potential coo.
I just ask them to leave me and my family alone and as usual no loose ends so I watch my getting sicker daily extortion her body. No police stop this; in fact I believe me have your people Stockholm extorted digital software shaking down the USA using SIS and Mossad and FSB and India and the Intel officer RCMP ad Intel navy officer women.
The people you have on me are suspected pedophiles; bank pin fraud scams Chase and Fargo and National; please lie-detection when back on your soil.
Submission Reference ID: X8WMVTQU

RCMP Captain Pay your bill guerrilla warfare training you asked me to do after ten days when you found out I am no enemy combatant or pedophile. Never received a dime from the government or private sector?
Reverse Napoleon Hill program hit the USA.
Confirm with President Barack Obama if you like.I never used this software in my home and my computers are run off a server I do not own or have contracted; hacked and my work modified I think.I have never contacted or met the Presidents children or wife or this Prime Minister wife or children; I am a straight guy and not gay or bi sexual and have slept with 3 women in ten years; working as an aid is 6-7 days per week and 60-70 hours per week online.Intern; skill sets.1$ per year and success of my eBook career to be connected with right people however police have my eBook sales according to the grid chatter.
Predator prey me with the top using software to make me a jerk or pervert; 7 years under Steven Harper not a single issue.

Warfare Strategist Architect Consultant / Published eBook Writer