"Carl- everything works on electricity, electrical impulses ( from atoms to the Body) Computer science has reached the point of Human rights violations (as we know).
It's a form of cyber espionage, theft of services. Again- telecom fraud"
"Someone has to have ability in Transmission. As in Radio ( is why it's telecommunications fraud).
He has to have background in electronics, radios, computers.
Access to those things show afilliation. FCC should be contacted s that is a…"
"Robin Yan- Idea if everyone Mailed the Same Complaint to ECHRmor ICC.
Inundate them. Inundate the System. It will get noticed.
Media may pick it up.
Another Idea- Volunteer to Help someone. Or to pass Good along.
this Creates a better…"
Thomasa- Abuse includes Cyber stalking, Exploitation for cyber sex, Computer intrusion, Property theft/ Property destruction, Surveillance with no reason, being Set up after police contact, Slandr/ Libel/Advrtising injury, hospitalization, incarceration.
i have documented evidence of police having falsified investigations.
All documented. I intend to get full Accountability.
I consider myself a Federal crime victim.
Do not give in to the garbage being done. Those people are just garbage with personal problems. Perhaps having No guidance in life.
What type of abuse have you gone through? I am attacked by actual people because I have night black outs. Some evil males in the neighborhood found out and have been stalking me and using me sexually when they can. If I move they let others know and new people join in. It has to be some kind of occult that won't leave me alone. I am not being hit by energy weapons it's actual people who are cruel, even though people using technologies are just as cruel!
"Please forward this below . Not only for me.
UNUN Human RightsUN Human Rights CouncilInternational Bar AssociationInternational Criminal CourtCanadian Government
They are now intercepting, hacking, and deleting everything no matter who you…"
"When you say they are hacking the UN, etc, if you mean they are manipulating people's minds everywhere, then I do think that is probably the case. I don't think they are necessarily hacking your technology per say, unless you mean they are…"
https://www.youtube.com/watch?time_continue=82&v=5PJtpvCMhkAThis video shows experiments designed to prove the theory of Learned Helplessness, a now outdated theory on which CIA psychologists Jessen and Mitchell based their torture program. The idea was that repeated and inescapable pain attacks lead to helpless feelings and depression. The original experiments were done on dogs.…See More
"This is what I found out anything you need to harm a person from far way go to........... INFORMATION UNLIMITED .....anything you need from lasers to remote neural monitoring Jammers anything pricey but they are all there......so a loot of our PERPS…"