Create a Ning Network!
Worldwide Campaign to stop the Abuse and Torture of Mind Control/DEWs
... and make you pay your life for it.
Accuse me right in my face.
So will see your own sanity (or the lack of it) reflected in my eyes as I answer you with a "duh?!? I did what to you?".
Reminder to somebody crazy who thinks I am not YET talking about him because of his presumed reasons.
Cut the crap out and admit that you have engineered everything because you know I know things that you are afraid will come out.
You created your own shadow, now accept it as it's gonna be pinned on you.
well, I'll admit that all crimes committed are committed, and I could have just killed myself, but that wouldn't have been fun. I'm going for a ritual sacrifice--as usual. http://www.youtube.com/watch?v=NOubzHCUt48 I figure they can try to fix us. they're just killing us and that's not fun.
Go you. I'm going after my sociopath too http://www.youtube.com/watch?v=Y4eajk8jxJQ This is probably the hardest thing I've ever done.
Except that I know who my perps are.
They treat everything as ARG, a game they make money and get 15 minutes of fame from.
Every time they do something to the PC here, there'll be "news feeds" about Davao, a local place here they are using to refer to the particular PC the mole has access to.
What do I find after one of the times she installed an app to control it? When I made sure the Trusted Installer or their assigned controller isn't the one with full admin access to the PC but the actual PC owner, they disabled the PC. When I checked the contents of the drive, what I saw instead was System reserved: and characters that could be read as DVAO.
Th mole here installs the trojans/controllers by opening compromised files, visiting hook pages and installing the files there.
The one on the other side, processes all the files being siphoned (stolen!) here.
When they can no longer address the technical issue, they cede control to the one controlling this remotely.
This plus the fact that the trojan they installed allows it to act as AI, addressing the mite, anticipated issues.
Important: without physical access to hardware and software, this whole process can't be initiated.
Without the one controlling this remotely, the tool will just be a tool, the AI will only work according to its already programmed parameters.
The reason it always recurs is because there are insiders ensuring the AI is tailored to every change in security being fixed here.
Sign Upor Sign In
Or sign in with:
© 2020 Created by Soleilmavis.
Report an Issue |
Terms of Service
Please check your browser settings or contact your system administrator.