Worldwide Campaign to stop the Abuse and Torture of Mind Control/DEWs

Three ways for mind control victims to seek justice.

(1) One route is to appeal, which is a administrative procedure,and that is exactly a way one lawyer does not dare and does not have the energy.

Write appeal letters to government departments, senators, representatives, to urge government to investigate such horrible crime, sentence torturers according to law, and help victims.

(2) Another route is to seek public support.

With enought supporting voices from public and with evidences, government must answer our appeals.

(3) File lawsuits to sue government who do not take their responsibilities to investigae such horrible crimes, and help victims.


Some victims have received letters from ICC. You can write your own case to ICC, and you also can support these victims with their Ref No. A letter from ICC about "How to submitt information to ICC" are attached below.  how_to_submit_to_ICC.DOC

International Criminal Court
Head of Information & Evidence Unit
Office of The Prosecutor
Post Office Box 19519, 2500 CM The Hague, The Netherlands
Boîte postale 19519, 2500 CM La Haye, Pays Bas
Telephone / Téléphone: + 31 70 5158515 • Facsimile / Télécopie: + 31 70 5158555 •


John Finch

Reference: OTP-CR-70/07   EM_T08_OTP-CR-70_07_002.pdf

A letter to ICC by John Finch

Soleilmavis (China)
Ref No. EM_T01_OTP-CR-00122_07  EM_T01_OTP-CR-00122_07.pdf,  
James Yue Gee
Ref No. EM_Ack_OTP-CR-742_09  EM_Ack_OTP-CR-742_09.pdf


Liu Wei, China



European Ombudsman

1 avenue du Président Robert Schuman

CS 30403, F - 67001 Strasbourg Cedex

T. + 33 (0)3 88 17 23 13

F. + 33 (0)3 88 17 90 62

Directorate A


Acknowledgement of receipt

for Soleilmavis’ ( ) Complaint

Registration number: 1191/2012/MF (S2012-156875)

for John Finch COMPLAINT: O497/2012/MF


Some lawyers suggestions on how to file a court case :

Here are some responses and replies from Government and Public

Some lawsuits filed by Soleilmavis 

David Larson's case


Please go to LAST PAGE OF "Replies to this Discussion" to read NEWEST Information

Views: 5788

Reply to This

Replies to This Discussion

Weapons of Mass Destruction- Non Lethal Weapons, Mind Control Weapons, or psychotronic weapons has been listed as weapons of Mass Destruction by UNIDIR-UN

Dear Madam Sainty, Registrar Cameron, Court Registry and Legal Experts ,
Please look at my affidavit regarding the Bill of Cost. This matter has been dismissed 3 seperate times or more, because the DOJ comes to court with the wrong billing. There is Law, Stare Decisis, "Let the decision stand." Meaning the decision of the Hon. Justice James Williams and his Judgement of July 8, 2009, should stand on my lawsuit. Justice Schultes had only been appointed to the Supreme Court on May 14,2009. He heard my matter in August 2009. He was not an Elder Justice and certainly does not have the authority of Justice James Williams. My submissions, are all in my affidavit for you to review.
Best Regards,
D. J. Ross

Are the Courts in British Columbia, blind to justice?
The Presidential Commission for the Study of Bioethical Issues in March 2011
Presidential Commission for the Study of Bioethical Issues May 18-19-2011
Microwave Warfare - Barrie Trower.
Interview with Barrie Trower In November 2010. Barrie Trower is a former Royal Navy microwave weapons expert and former cold-war captured spy debriefer for the UK Intelligence Services. Mr Trower is a conscionable whistle-blower who lectures around the world on hidden dangers from microwave weapons and every-day microwave technologies such as mobile-phones and WiFi. Mr Trower has also repeatedly assisted the UK Police Fedration in their struggle to protect police officers from Tetra/Air-Band radio-communications systems that are harmful to health.
Confidential Report
on TETRA Strictly for the Police Federation of England and Wales. BARRY TROWER
“Brain-Chip” Implant in the brain of Magnus Olsson
Thought Controlled Computing - Ariel Garten, CEO, Interaxon
Victims of government electronic surveillance group

University of Sonoma Human Rights and Electro-Magnetic Weapons by Professor Peter Phillips
United States Army Intelligence and Security Command Freedom of Information Office Bioeffects of Selected Nonlethal Weapons
Criminal Investigation of a British Columbia Judge and his conflict of interest relationship with the Department of Justice in Vancouver, British Columbia.


---------- Forwarded message ----------
From: Waraich, Sukhi a href="" rel="nofollow" target="_blank">>
Date: Thu, Jun 7, 2012 at 10:43 PM
Subject: RE: Hearing-Bill of costs Thursday June 14, 2012
To: Jonathan Ross a href="" rel="nofollow" target="_blank">>
Cc: "Murray, Mary" a href="" rel="nofollow" target="_blank">>

Good day Mr. Ross.

I am writing to remind you of the Bill of Costs hearing which is set for Thursday June 14th, 2012 @ 2pm (Vancouver time).

Please dial 1.604.660.8551 begin_of_the_skype_highlighting 1.604.660.8551 end_of_the_skype_highlighting prior to the start of the hearing.

Also, I have attached a copy of our proposed Bill of costs.




---------- Forwarded message ----------
From: Soroka, Debbie a id="yui_3_2_0_1_13397260747976557" href="" rel="nofollow" target="_blank" name="yui_3_2_0_1_13397260747976557">>
Date: Fri, Apr 27, 2012 at 6:15 PM
Subject: Re: Ross v. Ministry of Public Safety - S117620
To: J R a href="" rel="nofollow" target="_blank">>, "" a href="" rel="nofollow" target="_blank">>, "" a href="" rel="nofollow" target="_blank">>, "" a href="" rel="nofollow" target="_blank">>

Good morning Mr. Ross

You have been approved to appear at the hearing on June 14, 2012 @ 2:00pm, our time. Please call us at 604-660-8551 begin_of_the_skype_highlighting 604-660-8551 end_of_the_skype_highlighting and we will connect you to the court room.



Domestic Surveillance and Mind Control Technology?

The following are the first six pages of evidence in a lawsuit filed by a citizen against the National Security Agency (NSA) in 1992 alleging harassment and seeking relief for same. This lawsuit was filed in the U.S. Courthouse in Washington, D.C.

Evidence for the Lawsuit filed at the U.S. courthouse in Washington, D.C.

(Civil Action xx-xxxx)

Xxx Xxxx vs NSA, Ft. George G. Meade, Maryland.

My knowledge of the National Security Agency's structure, national security activities, proprietary technologies and covert operations to monitor individual citizens.

The NSA's mission and the NSA's domestic intelligence operation
Communications Intelligence (COMINT) Blanket coverage of all electronic communications in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960's. NSA technology is developed and implemented in part from private corporations, academia, and the
general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic field around it which gives off EMF waves. The NSA/DOD has developed proprietary advanced digital equipment which can remotely analyze all object whether (tran-maze?) or organic that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is
completely disguised and hidden from the public.

Tracking individuals in the U.S. is easy and can effectively implemented with the NSA's electronic surveillance network. This network (DOMINT) covers the entire U.S. and involves thousands of NSA personnel, and tracks millions of persons simultaneously. Cost-effective implementation of operations is achieved by NSA computer technology designed to minimize operations costs.

NSA personnel serve in quasi-public positions in their communities and run cover business and legitimate businesses that can inform the intelligence community of persons they would want to track. NSA personnel in the community usually have cover identities such as social workers, lawyers, and business owners.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA's domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwilling citizens by NSA operatives is likely to happen. NSA DOMINT has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to
cause subjects to be diagnosed with ill mental health.

NSA's domestic electronic surveillance network

As of the early 1960's the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has advanced technology computers that are 15 years ahead of present computer technology.

The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, regardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA's Signals Intelligence (SIGINT) mission.

The NSA's electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented and kept secret in the same manner as other electronic warfare programs.

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic intelligence network.

The NSA's EMF equipment can tune in RF emissions from personal computer
circuit boards (while filtering out emissions from monitors and power
supplies). The RF emission from PC circuit boards contains digital information on the PC. Coded RF waves from the NSA's equipment can resonate PC circuits and change data in the PCs. Thus, the NSA can gain wireless modem-(?) entry into any computer in the country for surveillance or anti-terrorist electronic warfare.

Detecting EMF Fields in Humans for Surveillance

A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance.

NSA personnel can dial up any individual in the country on the Signals
Intelligence EMF scanning network and the NSA's computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural
Monitoring (RNM) and Electronic Brain Link (EBL). EMB Brain Stimulation has been in development since the MK Ultra program of the early 1950's which included neurological research into "radiation (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as "Radiation intelligence" defined as "information from unintentionally emanated electromagnetic waves in environment, not including radioactivity or nuclear detonation."

"Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all of the electrical activity in the brain continuously.
The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for bring-to-computer links. (In military fighter aircraft, for example.)

For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject's verbal thoughts. RNM can send encoded signals to the brain's auditory cortex thus allowing audio communications direct to the brain (bypassing the ears).

NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject's brain and show images from the subject's brain on a video monitor. NSA operatives see what the surveillance subject's eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject's brain while they are in R.E.M. sleep for brain-programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940's. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audiovisual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D
sound, and subliminal audio can be sent to the auditory cortex of the subject's brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject's perceptions, moods and motor control.

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audiovisual brain-to-computer link.

NSA Signals Intelligence Electronic Brain Link Technology

NSA SIGINT can remotely detect, identify and monitor a person's bioelectric fields.

The NSA's Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 Hz 5 milliwatt electro-magnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 Hz 5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are patterns called "evoked potentials."

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding "evoked potential" or net of "evoked potentials". The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject's brain.

NSA SIGINT uses EMF-transmitted Brain Stimulators as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects for a non-perceptible level).

EMF Brain stimulation works by sending a completely coded and pulsed
electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brains' neural circuits. EMF Brain Stimulation can also change a person's brain-states and affect motor control.

Two-way electronic Brain-Link is done by remotely monitoring neural
audiovisual information while transmitting sound to the auditory cortex
(bypassing the ears) and transmitting faint images to the visual cortex
(bypassing the optic nerves and eyes). The images appear as floating 2-D screens in the brain.

Two-way electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote neural monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community.

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz. to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation

Brain Area

Motor Control Cortex

Auditory Cortex

Visual Cortex

Somatosensory Cortex

Thought Center

Bioelectric Resonance Frequency

10 Hz

15 Hz

25 Hz

9 Hz

20 Hz

Information Induced Through Modulation

Motor impulse coordination

Sound which bypasses the ears

Images in the brain bypassing the eyes

Phantom touch sense

Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible.

Each person's brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person's brain at the frequency of another person's auditory cortex would result in that audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact with the
Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to the authorities about their activities against the Plaintiff in the last twelve years.

The Kinnecome group has about 100 persons working 24 hours-a-day at Ft. Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operation method.

NSA techniques and Resources

Remote monitoring/tracking of individuals in any location, inside any
building, continuously, anywhere in the country.

A system for inexpensive implementation of these operations allows for
thousands of persons in every community to be spied on covertly by the NSA.

Remote RNM Devices

NSA's RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send mental images through the nervous system to affect their performance.

Now I know you aren't going to read all of them, they are doing it and it's much more complicated than that, and think what this means to those with whom you have come to love, to your family and to yourself.

From Carl Sperr

Friday, June 15, 2012

Criminal Charges Filed Against Austin Texas Fusion Center

EMF Microwave Attack

An EMf Microwave attack, is much like being shot with a bullet to the head with less visual trauma left behind by microwaves, which are non-ionizing radio particles that enter the skull to alter the brain to cause pain or delusions, within the skull of an unknowing subject.


EMF Brain Device Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) int the brain, thereby forming sound and visual images in the bran's neural circuits, EMF Brains Stimulation can also change a person's brain-states and affect motor control..


Two-way electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel.


Microwave non-ionizing particles damage the Nero-sensors, and cardiovascular system. The damage done to the cardiovascular system usually affects small capillaries that deliver blood supply to joints. Over exposure can cause permanent damage to the skeletal system, particularly the joints by starving the regenerative process that cause diseases such as AVN. Aircraft workers, are some of the first extreme cases of damage done by microwaves. See Image below:


Radio Microwaves Infrared X-ray Use on U.S. Citizens

The Burden of Proof Public Notice

Re-Post Texas Representatives were notified on April 10, 2011


Public Notice:

The CRS Report To Congress (Rl31787) Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues, Updated March 20, 2007. Explains a lot about what has transpired between January 2006 and now. In my opinion, these types of devices and technologies should have never been shared with civilians.

The biggest problem we have is that Homeland Security makes decisions on any civilian that may be a threat to National Security, and the Military attacks United States Citizens Electronic Weapons.

Who these idiots are, that make such an assessment, need to be identified, because they have used lethal devices such as radio, microwaves, infrared, X-ray, and all other options for directed energy, on me and members of my family.

Senator Cornyn, Congressman Cuellar, The FBI, and The Secret Service were directly informed and failed to protect us. Nor did they check my file to see if I have technical knowledge of such devices. I may be the only living person that can stand before congress and deliver the burden of proof if need be. I have a bother in a mental institution because of electronic attacks. I have been hospitalized for siezers and stroke. You have all been directly informed by me verbally, and in writing.

Consider yourself publicly notified that you better take care of this or arrange for my transportation and a time to stand before congress! Let me tell you again, innocent people have targeted by Texas Governor Rick Perry for political control, and he must pay the price. Remove him from office for starters.

Gregory O'Dell You Know My Phone Number and My Address - I Am a known!


DOD Information Operations Core Capabilities

DOD identifies five core capabilities for conduct of information operations; (1)Psychological Operations, (2) Military Deception, (3) Operations Security, (4) Computer Network Operations, and (5) Electronic Warfare. These capabilities are interdependent, and increasingly are integrated to achieve desired effects.


DOD Information Operations

The current DOD term for military information warfare is “Information Operations” (IO). DOD information operations are actions taken during time of crisis or conflict to affect adversary information, while defending one's own information systems, to achieve or promote specific objectives.3 The focus of IO is on disrupting or influencing an adversary’s decision-making processes. An IO attack may take many forms, for example: (1) to slow adversary computers, the software may be disrupted by transmitting a virus or other malicious code; (2) to disable sophisticated adversary weapons, the computer circuitry may be overheated with directed high energy pulses; and (3) to misdirect enemy sensors, powerful signals may be broadcast to create false images. Other methods for IO attack may include psychological operations such as initiating TV and radio broadcasts to influence the opinions and actions of a target audience, or seizing control of network communications to disrupt an adversary’s unity of command. Computer Network Defense (CND) is the term used to describe activities that are designed to protect U.S. forces against IO attack from adversaries. Part of CND is information assurance (IA), which requires close attention to procedures for what is traditionally called computer and information security.

DOD places new emphasis on the importance of dominating the entire electromagnetic spectrum with methods for computer network attack and electronic warfare. DOD also emphasizes that because networks are increasingly the operational center of gravity for warfighting, the U.S. military must be prepared to “fight the net”.4 Because the recently declassified source document containing this phrase has some lines blacked out, it is not clear if “”means the Internet. If so, then this phrase may be a recognition by DOD that Psychological Operations, including public affairs work and public diplomacy, must be employed in new ways to counter the skillful use of the Internet and the global news media by U.S. adversaries.


Psychological Operations (PSYOP)

DOD defines PSYOP as planned operations to convey selected information to targeted foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.5 For example, during the Operation Iraqi Freedom (OIF), broadcast messages were sent from Air Force EC-130E aircraft, and from Navy ships operating

in the Persian Gulf, along with a barrage of e-mail, faxes, and cell phone calls to numerous Iraqi leaders encouraging them to abandon support for Saddam Hussein.

DOD policy prohibits the use of PSYOP for targeting American audiences. However, while military PSYOP products are intended for foreign targeted audiences, DOD also acknowledges that the global media may pick up some of these targeted messages, and replay them back to the U.S. domestic audience. Therefore, a sharp distinction between foreign and domestic audiences cannot be maintained.8

However, the DOD Information Operations Roadmap, published October 2003, states that PSYOP messages intended for foreign audiences increasingly are consumed by the U.S. domestic audience, usually because they can be re-broadcast through the global media. The Roadmap document states that, “...the distinction between foreign and domestic audiences becomes more a question of USG (U.S. Government) intent rather than information dissemination practices (by DOD).”42

This may be interpreted to mean that DOD has no control over who consumes PSYOP messages once they are re-transmitted by commercial media.


Computer Network Exploitation (CNE).

CNE is an area of IO that is not yet clearly defined within DOD. Before a crisis develops, DOD seeks to prepare the IO battlespace through intelligence, surveillance, and reconnaissance, and through extensive planning activities. This involves intelligence collection, that in the case of IO, is usually performed through network tools that penetrate adversary systems to gain information about system vulnerabilities, or to make unauthorized copies of important files. Tools used for CNE are similar to those used for computer attack, but configured for intelligence collection rather than system disruption.


Computer Network Attack (CNA).

CNA is defined as effects intended to disrupt or destroy information resident in computers and computer networks. As a distinguishing feature, CNA normally relies on a data stream used as a weapon to execute an attack. For example, sending a digital signal stream through a network to instruct a controller to shut off the power flow is CNA, while sending a high voltage surge through the electrical power cable to short out the power supply is considered Electronic Warfare (However, a digital stream of computer code or a pulse of electromagnetic power can both be used to also create false images inadversary computers).


Electromagnetic Non-Kinetic Weapons.

Non-kinetic weapons emit directed electromagnetic energy that, in short pulses, may permanently disable enemy computer circuitry. For example, an electromagnetic non-kinetic weapon mounted

in an aircraft, or on the ground, might disable an approaching enemy missile by directing a High Power Microwave (HPM) beam that burns out the circuitry, or that sends a false telemetry signal to misdirect the targeting computer.18

Also, at reduced power, electromagnetic non-kinetic weapons can also be used as a non-lethal method for crowd control. The Active Denial System (ADS), developed by the Air Force, is a vehicle mounted nonlethal, counter-personnel directed energy weapon. Currently, most non-lethal weapons for crowd control, such as bean-bag rounds, utilize kinetic energy. However, the ADS projects a focused beam of millimeter energy waves to induce an intolerable burning sensation on an adversary’s skin, repelling the

individual without causing injury. Proponents say the ADS is safe and effective at ranges between 50 and 1,600 feet. The nonlethal capabilities of the ADS are designed to protect the innocent, minimize fatalities, and limit collateral damage.19

The Pentagon reportedly has requested immediate deployment of at least 8 ADS devices to Iraq to assist Marines in guarding posts, countering insurgent snipers and protecting convoys. The ADS system would be the first operationally deployed directed-energy weapon for counter-personnel missions.20


New U.S.A.F. Cyber Command

Secretary of the Air Force Michael W. Wynne recently stated that the new mission of the U.S. Air Force is to “fly and fight in air, space, and cyberspace.” This means that military action in cyberspace now includes defending against malicious activity on the Internet, and anywhere across the entire electromagnetic spectrum (including the energy spectrum bands for radio, microwaves, infrared, X-ray, and all other options for directed energy), where national security is threatened.21

However, the DOD Information Operations Roadmap, published October 2003, states that PSYOP messages intended for foreign audiences increasingly are consumed by the U.S. domestic audience, usually because they can be re-broadcast through the global media. The Roadmap document states that, “...the distinction between foreign and domestic audiences becomes more a question of USG (U.S. Government) intent rather than information dissemination practices (by DOD).”42

This may be interpreted to mean that DOD has no control over who consumes PSYOP messages once they are re-transmitted by commercial media.

Citation: Information Operations, Electronic Warfare,and Cyberwar: Capabilities and Related Policy Issues Updated March 20, 2007


Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division

A Criminal Complaint of an EMF attack was hand carried to the District Attorney Office of Texas District 28th on June 13th Against the State of Texas, Texas Governor Rick Perry and Other Agencies. I was told I would have a response to my complaint by June 23rd 2012.


The Obama Administration band the use of such attacks and experimentation the moment he stepped into office; however, Texas Governor Rick Perry engaged in an insurrection and Tea Party Rebellion that same month, and should be removed from office for crimes against the citizens of the State of Texas.


The Governor of Texas abuse his power for political control without a concern for the lives of Texas Citizens,


I Notified the Office of Attorney General this morning and explained that the attacks against his integrity could be to stop the prosecution of such cases and other Covert Acts initiated by George W. Bush against the citizens of the United States of America, which include gun walking, drug and human trafficking, and other convert programs funded by the Texas U.S. Senate, who were fully aware of such operations, that have damage the lives of thousand of Texas citizens.


Senator Cornyn attack on the United States Attorney General were to devert attention away from his own criminal acts and should be prosecuted to the fullest extent of the law, as well as any other person knownly involve with convert act in the state of Texas 2000-2008.


Issued under De Jure Naturalis by the Human Rights Trial  Division of The International Common Law Court of Justice (Established under the Customary Land Law Jurisdiction of Sovereign Nations)


September 15, 2012

To: (Name of Defendant)

In the Matter of HRTD Case Docket Numbers A-091512-001 through 005 inclusive

BE ADVISED that you have been named as a defendant and a primary witness in a matter brought before this Court for adjudication, in that you are charged in a personal and corporate capacity with ordering, aiding and abetting, colluding in and concealing Crimes against Humanity and other criminal acts, and with personally and deliberately participating in a Criminal Conspiracy.

BE FURTHER ADVISED that you or your attorney have ten (10) working days as of this date to respond in writing to this Public Summons and to indicate your willingness to participate in a pre-Trial Conference and Examination.

Failure by you or your attorney to respond to this Summons can be understood and interpreted by this Court to mean that you do not dispute or challenge the charges made against you by the Plaintiffs named in these cases, and that by your silence you are consenting to the proceedings. As a potentially incriminating admission, such a refusal to respond may cause a guilty verdict to be delivered against you by this Court in absentia.

If you do not respond to this Summons, the Court will reserve the right to appoint a legal counsel to represent you in your absence.

A complete list of charges, specifications and Plaintiffs in these cases will be forwarded to you separately.

Following depositions, the opening arguments before this Court will commence on Monday, October 15, 2012, in the absence of a pre-Trial Conference and Examination.

Issued by the Office of the Clerk of Court, Human Rights Trial Division, ICLCJ, Brussels, and through the Offices of the Court in Rome, London, Dublin, New York and Toronto.

Signed and sealed,

17 September 2012

This Summons is being issued today to the following persons in their named capacities:

Joseph Ratzinger, alias Pope Benedict, Head of the Roman Catholic Church Incorporated, Rome

Adolfo Nicholas Pachon, Superior General of the so-called Society of Jesus, or Jesuit Order

Pedro Lopez Quintana, Papal Nuncio to Canada

Angelo Sodano, College of Cardinals, Rome

Tarcisio Bertone, College of Cardinals, Rome

Angelo Bagnasco, College of Cardinals, Rome

Elizabeth Windsor, alias Queen of England, London

Rowan Williams, Archbishop of Canterbury, London

Fred Hiltz, Primate of the Anglican Church in Canada

Bob Bennett, Bishop of Huron Diocese, Canada

Steven Harper, Prime Minister of Canada

Murray Sinclair, Chair of the Truth and Reconciliation Commission

John Milloy, TRC officer

Nora Sanders, General Secretary of the United Church of Canada

Gary Paterson, Moderator of the United Church of Canada

Jon Jessiman, legal counsel of the United Church of Canada

Marion Best, former Moderator of the United Church of Canada

Brian Thorpe, Art Anderson, Foster Freed, Bill Howie and Phil Spencer, officers of the United Church of Canada

John Cashore, former minister of the government of British Columbia

Robert Paulson, Superintendent of the Royal Canadian Mounted Police of Canada

Inspector Peter Montague, E Division, RCMP

Daniel Fulton, Chief Executive Officer of Weyerhauser Logging Corporation

Ron Huinink and other members of the Law Society of British Columbia

Former members of the congregation of St.
Andrew's United Church, Port Alberni, Canada

Sean Atleo, so-called Grand Chief, Assembly of First Nations

William Montour, Chairperson of the Six Nations Confederacy

Head officers of the New England Company, London

These persons have until October 2, 2012, to respond to this Public Summons, after which criminal proceedings will commence against them.

In closing I wish to add a personal appeal and message to all of you watching this broadcast.

Last year, after commencing preparations for this court, I was arrested, imprisoned and then deported from England without any reason given. I was informed recently that the British Home Office has ordered my detention if I try returning to England.

So let me say that in the course of my travels throughout Europe over the next few weeks, or upon my return to north america, if I am arrested and held in communicado, I rely on each of you to confront the authorities about my arrest, and their crude attempts to obstruct justice and shut down our efforts to protect the children of our world from predators in power.

No amount of repression can stop the wave of justice represented by the survivors of church terror who are now
coming forward. By jailing or harrassing individuals, the state is simply empowering more of us by awakening us to the tyranny around us.

But let me say on the record that if anything happens to me or to those I work with over the next, crucial period, I ask you all to hold the following auhtorities responsible: the Home Secretary and security forces of Great Britain, the Vatican secret service and assassination network known as the Holy Alliance, and the Canadian Security Intelligence Service and the RCMP.

Once again, I call upon the police forces of every country to obey their oaths of office and defend our civil liberties, and refuse to protect and aid child raping criminal organizations like the Vatican and other churches named in our Court.

Please stay tuned on October 2 for more updates from that Court. And remember the words of the English poet Percy Shelley, who wrote after the infamous Peterloo massacre of the poor in Manchester in 1819,

Rise like lions after slumber, in unvanquishable number;

Shake your chains to earth like dew, which in sleep had fallen on you.

You are many; they are few.

Thank you.

Frank Olson's sons sue CIA over LSD mind-control experiment




I do not know exactly what the below email is implying since most everybody knows that “Freedom from Covert Harassment and Surveillance” (FSCHS) is a group of respectable people that are combating this Electronic Abuse (similar cases throughout) like the rest of us are.

Among about one hundred emails I received from Greg “Global Federation Resistance”, I received one from him yesterday, (among the daily dozen of different topics and decisions) that basically knocked the hell out of FSCHS for not supporting him. Now, one of the current emails as of today Dec. 29, from Greg is implying that other people and/or groups SOLICIT Greg’s help in support from FSCHS … does this make sense so far? - NO - which is the way this entire mess has gone for a long while (i.e. one confusing thing after another).

More so, it has been one big International alarming, time consuming unprofessional nightmare that is ridiculous after so many years of hard work that has been done.

I do not know Greg or many other people personally but have been around this pathetic business for years as per my website report

Like most all other Targeted Individuals, I will help and have tried helping everybody that I can - knowing how miserable this coward ABUSE is. This includes Greg in the beginning of this mess – but the most I received from him was smart unintelligible remarks (some with profanity on Peacepink. I think he has good intentions but is somewhat consumed and astray; however, I would still help him or anybody else, because we all know what this abuse HAS DONE to us and our families - (WE NEED TO WORK TOGETHER) ... there are ways of accomplishing what we all want - but not all these misleading inaccuracies. In fact, this will take us the opposite direction if allowed to continue.

I have had so many appointments with Congress and the FBI through the years and they are NOT simply going to admit to this HIGH TECH ABUSE with all the accumulated liabilities (massive liabilities). This is regardless of HOW MANY people are involved in a Mass Suit which seems to be drilled into all of us as if we were absent. The fact is this would give the FBI an opportunity to spread this case out for so many years that none of us would see the sun shine again; in addition possibly rid our legal rights for good. This is just a couple of things that they would have the opportunity to do!

Lastly, please read a portion of my site report that will give some ideas on what and how the FBI functions and to rearrange - (and NO – I am not promoting the website) – I am ashamed of how long this has been around my family and me (typical of all of you) …. The time consumption, suffering and security breaches have been shameful - and how the FBI has inappropriately misrepresented this Country on behalf of the World is a massive liability that they will not escape them. It all started here in the United States and the FBI has jurisdiction and it is their responsibility to remedy our basic Constitutional Rights on their own.

Our “Main Stream” Government is now in AWARENESS and our Worldwide Allies should be included automatically, however, what has been going on for so many years will not get accomplished nearly as soon as we all want because of SO MANY INTERNATIONAL LIABILITIES.

If a suit is still what the majority of everybody still wants, then possibly it can be initiated all over again with more unity, planning and professionalism.

I would really like to hear from as many of you as possible so we can INITIATE A PLAN TOGETHER rather than ONE person attempting SOLE responsibility - with claimed representation that does not exist.



Robert O. Butner … … email –

December 29, 2012

Letter to ICC by Jorgen Christiansen



How The National Security Agency (NSA) Illegally And Unconstitutionally Harasses Law-Abiding Americans Everyday. How, you ask? Quite simply, actually. It's done by EMF or ELF Radio Waves, and a technology known as "Remote Neural Monitoring". Haven't you ever wondered about that ringing in your left ear? Well, here are the reason(s). And just why should the NSA do this, you ask? To silence any who who dare to speak out against them or any other agency, or the Government or simply to think for themselves, and "outside the box", if you will. Think not? Then, read on..........

How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM)
John St. Clair Akwei
NSA, Ft. Meade, MD, USA

Adam Dobrin

1:50pm Feb 23

In order to stop Mindwar (OSEH, gangstalking), the victims need to organize. We are all victims of a horrible crime, torture and witness tampering at the hands of an unknown enemy. Many of us believe we know who the perpetrators of the crime are, aside from a small group of individuals however, it is very hard to trace the source. I believe the following plan of action will succeed in getting publicity to the crime, and eventually in stopping it.

First, each individual victim must file a written complaint with their local FBI field office. This complaint should be as detailed as possible, and also include ALL of the following details:

1) The crime is being committed using advanced technology which enables both monitoring and remote stimulation of brain function. It also involves the use of advanced surveillance technology. This is a gross violation of the 4th Amendment of the Constitution.

2) The perpetrator(s) of the crime act in a way to create the appearance of insanity in the victim, in order to discredit their testimony against the perpetrators in a Federal court. This is a violation of 18 USC 1512.

3) The crime is torture. Victims experience significant mental pain and suffering. This is a violation of 18 USC 2340. Infliction of physical pain, and/or death threats should be mentioned specifically.

4) The crime deprives the victim of civil rights. A violation of 42 USC 1985.

5) The crime involves a significant number of individual perpetrators, whose individual actions are part of a RICO conspiracy to violate the above laws. A violation of 18 USC 96.

All federal laws should be mentioned specifically in the complaint.

In addition to the above, a narrative of the victims experience should be included with the complaint. I have created a template for these narratives and it is available here:

If the FBI investigates your complaint and solves your problem... GREAT. If not, we move on to step 2.

All victims who have filed a complaint form a class, and sue the FBI in Federal Court for violating 42 USC 1985 & 1986

42 USC § 1985 - Conspiracy to interfere with civil rights
42 USC § 1986 - Action for neglect to prevent

With a significant number of class plaintiff's there is no court in the world that would not be forced to hear testimony related to the crime. With no action taken on the part of the FBI to investigate or stop the crime being committed against you, you are entitled to significant monetary damages from the FBI.

Further, a class action suit will garner the attention of the mainstream media, and hopefully decent legal representation.

We are all victims. The proper procedure when you are a victim of a crime is to report it to the proper law enforcement authority. This is exactly what I am suggesting we do. Inaction on your part further victimizes you, isolates you from society, and denies you your rights as a citizen of the United States.

Please, take action.

Dear Sir/Madam:


I am writing this statement to report my present experiences which match historically proven COINTELPRO [Counter Intelligence Programs] operations of a federal agency. My experiences force me to believe that a federal agency is responsible for present COINTELPRO operations. Only a federal agency has the capability and the proven past record of using these operations to terrorize and torment innocent citizens.


Access to our mail:


I have been a victim of mail fraud in 2001 but this has now been resolved. I complained to the Federal Trade Communications who sent me a handbook on how to prevent identity theft and the related procedures so I contacted the postal office and have a reference number. Mail was constantly being taken from my place.


I was also a victim of Credit Line Fraud - had to start new banks accounts to prevent identity theft.


On numerous occasions and when receiving my delayed mail, envelopes had a slit on the right hand side which wasn't noticeable but upon closer inspection you could see the tampering of the envelope had occurred.


Access to our email or technological devices:


Some of my emails is being scrutinized or maliciously tampered with such as rearranging sentences and or words that had been there and then suddenly would disappear. After submitting the email and relooking at after I had sent it, what I originally typed was not the same as I had submitted. I am still being blocked occasionally from using the browser function of the internet.


Ability to enter our apartment, home at any time without visible signs of breaking in:


Sometimes you would see visible signs that someone had entered my place even though my premises had always been locked or secured. I had a marble table which was broken and other items that had been stolen, but there was one time someone broke in and busted my window in my bed room and I told the police who did it and they didn't do anything.


On my daughter's art work there were symbols depicting that of a "Nazi white supremacist' writings which were attempting to send me a meaning that it's a "racial discrimination" message.


As to my gas stove, the perpetrators broke the gas line so when I entered my place I had to try and shut the gas off.


I had a storage unit in Whittier, California and when I made a sexual complaint against the maintenance man, he put a lock on the unit so I couldn't get any of my items out and the police wouldn't do anything or file any reports and I got the impression that the police were unhappy that all my stuff in the storage rental did not get stolen.


Ability to know things that we say or do within the "privacy of our home" by means of


electronic surveillance devices:


There has been many times when I said something or did something it was repeated -1 was in the Health Spa taking a shower and I said


 that at Macy's they are having a free gift at the Estee Lauder counter and when I


arrived there, several other people where there.


 I am riding on the bus I will hear


someone say the exact same thing that I had just said in the privacy of my home


regarding whom I'm having sex with or what I'm not willing to do sexually.   


On one occurrence when using a payphone, I saw a man dressed in a security uniform but there was no security personnel employed at this place but what I had observed was that he had a black box in his hand and put the box against the wall and was listening to what I saying on the payphone.


Several times, I have experienced "cross-talk" and my calls have been transferred.


No matter what phone I use, such as cell, landline or payphone or any means of telecommunications, the perpetrators "control" the situation, by switching me to another person, they play my voice to back to other people and my mother received a call which she was very sure it was my voice that she was speaking to but I did not call my mother that time, it was someone else who had called my mother.


Ability to tamper with medications:


I have been forced to take medication and shots in are very own hospitals’ or they would threaten me to strap me strapped down.


One time I drank some juice at home that I had in my refrigerator and I dropped down on my kitchen  floor and it seemed that all my muscles wore stuck to the floor but I could feel every thing, see, hear and speak anyone could of done anything to me and I couldn't even move my body at all.


Plus, it was another time someone put poison in my coffee at a donut shop and it took a few minutes after I ate a jelly donut after I drank the coffee then I passed out. I have written out what happen and I also shown many people what I wrote.


Availability of unlimited numbers of people to harass us in various ways:


I was incriminated no matter where I went restaurants, postal offices, by strangers, stores, family members, all law enforcement agents, but a few police officers use to argue among each other about what they wore doing to me and when anyone is targeted by the law enforcement the gang members target the individual that’s targeted also because the police wont do anything to them in less the gang member is targeted also, but than the gang member puts a rat jacket on the TI if she or he tells the police anything if she/he the TI gets rob, stab or even gang raped and the police are very aware of what is going on.


There were a few people that wanted to help me, but they wore afraid because who was involved, and there were a few people that tried to help me, but some of them end up in prison or dead or targeted also or some just disappeared. Law enforcement would make my life difficult and others some realize what was going on, but on the other hand, many don't. That’s why these preps get away with what going on. Being a targeted individual it seems that no one does care.


One of the times when I called the Whittier Police when they came to my home one of the police officer told me to move out of Whittier and I told him he can't tell me to move out of my very own home so they forced me to move out by harassing me and spreading rumors about me it took them a year to force me out and I became homeless for a few years.  It seems that the only thing I was able to do when I was homeless is to shower and the police and others tried to stop me from showering.  I was so thin and frail when I was homeless and people put me down for that.


Ability to obtain police participation: Police did not always file their reports to my vandalism and I had one cop tell me "I owe them". I have been physically harassed, abused, mentally, and sexually by these police officers and others. They have been rude and I have been involved in arguments and fighting with them. One cop said to me once, "don't you know me" and I had never even seen or met him before.


Ability to alienate friends and relatives through false accusations or false evidence used to create false negative beliefs about us: Anyone you tell this problem to or about what is happening to you, your family and friends suddenly stop visiting and calling you. Before long you feel the isolation of your neighbors', friends and family. But some how I kept faith and hope in myself because I know I am a better person than what these people were saying. Plus, I new that I couldn't been the only person in the world that’s going through what I have gone and still going through by believing in myself and the Lord our saver made me stronger inside just by believing to carry on when I was the weakest. I even had a police officer get agree at me because I cared about myself. You might not know this but I had to go through all this to find out how much I really love and care about my self more today then I ever had. I'm met to be alive to help others that have been through what I have or just to let others aware in what is going on in our world today.


Documented above are COINTELPRO experiences and that the facts do very clearly and unquestionably prove government agency responsibility because (1) they demonstrate capabilities that are available only to a government agency and not to ordinary criminals; and (2) they demonstrate methods and techniques that match the COINTELPRO operations, which were thoroughly proven by congressional investigations, by journalistic investigations, and by court cases to be the work of a specific government agency which has been engaged in secret, unconstitutional wars of crime and psychological torture against innocent citizens since the early 1950's.


The evidence does not prove specific responsibility of specific persons in government and thus does not give the victims grounds for seeking court remedies but that the evidence does very clearly establish that 36 years of COINTELPRO crime and torture, which was proven hi the past to be the work of a specific government agency, have continued for an additional 20 years to the present day without formal proof of responsibility and that these secret, illegal, unconstitutional government agency operations will continue indefinitely into the future until congress meets its responsibility to undertake a full and thorough investigation to fix specific responsibility of specific persons in government for present government COINTELPRO operations and to enact legislation that will provide remedies to the victims who presently have no legal or practical remedies to prevent the continuation of covert government wars against them by methods such as those described in the statement. This great nation of the United States of America has constitutional laws and under those laws, I am being denied my 'rights' and 'freedoms' and this type of activity can not continue and must be brought to a halt and the perpetrators responsible brought to justice.




I revoke my support of any petition or previous statement alleging responsibility of locally organized gangs since I now realize that my experiences can only be explained as the COINTELPRO operations of a US federal agency.




Kelly Caslar



Case Summery

Name: Kelly Caslar
Citizenship: USA
Year Torture/Abuse Began: 2001


I would like to draw your attention to some extreme and horrendous
criminality being conducted with the involvement of United States
Government-related Agencies and the complicity, if not participation,
of many other governments, security agencies and/or shadowy
organizations’ - involving the use of DIRECTED ENERGY AND NEUROLOGICAL
WEAPONS on defenseless’ people.

I can confirm that the technical abilities and powers to:-

1. Place a human subject under continuous surveillance, no matter
where he/she is, from remote locations.

2. Continuously monitor a human brain from remote locations, including
thought, reaction, motor command, auditory event and visual image

3. Continuously input directly into a human brain from remote
locations, including the ability to override, control and alter
consciousness, and to introduce voices, noises, other disturbances,
images and "dreams" into the brain

4. Directly interfere with, abuse, torture and hit bodies - including
performing advanced medical procedures - and objects - from remote

5. Directly interfere with, alter, and insert etc. data, files,
communications and legal evidence from remote locations - even during

6. Make live TV, and other screens and monitors, two-way - for
surveillance, invasion of privacy etc...

7. Control the flow of information and orchestrate the media -


There is massive ignorance and secrecy regarding this, and victims
such as I am being subjected to uncontrolled and unacknowledged
torture and mental and physical destruction. This has remained
completely unreported and undiscussed publicly. There are many others,
all over the world, who are being subjected to similar torture and
abuse - some of us are being subjected to the most extreme and
totalitarian violations of human rights in human history




As well as being inhumane and criminal the crimes being committed
against us are contrary to the Principles and Values of all the major
religions and ethical systems - and yet our appeals for justice,
protection, assistance and/or publicity to Government Representatives,
Government Officials, Government Agencies, International
Organizations, Human Rights Organizations, Universities, Scientific
and other Institutions, and the International Media have been almost
completely ignored and/or suppressed.

For anyone at all concerned about human rights, liberty, democracy,
privacy, the rule of law and ALL aspects and degrees of  human
freedom, individuality and mental and physical integrity and health
this uncontrolled and unacknowledged technology and torture and abuse
is intolerable!

Your attention and assistance is urgently needed to halt these
atrocities, control and regulate the use of these technologies, and to
bring these extremist elements to justice.


Please assist urgently.




Kelly Caslar

Reply to Discussion


Latest Activity

Soleilmavis commented on Daniel Rogers's blog post V2K
"I have not heard any ways which could block it."
33 minutes ago
Profile IconJuan carlos Gomez and Jann Hope joined Peacepink
36 minutes ago
Lez commented on Sonar♦0's group Victimes Francophone De "Mind Control".
"Pour le moment la vaccination n'est pas obligatoire . Certes. Mais nous sommes , aussi, habitués aux volte-faces .  Alors, autant prévoir"
7 hours ago
tour medan posted a group

tour medan murah

Anda akan melihat pemandangan panorama dalam perjalanan ke kota Berastagi yang travel agent medan sejuk dan indah. Pergilah ke Pasar Buah tradisional di kota, di mana Anda akan disambut oleh hiruk pikuk warna dan paket tour medan aktivitas yang ramai saat penduduk setempat menjalani bisnis sehari-hari. Lau Debuk Debuk adalah mata air belerang alami yang paket wisata medan merupakan tempat yang tepat untuk menikmati…See More
18 hours ago
tour medan posted an event

tour medan at medan

November 25, 2020 all day
Lau Debuk Debuk adalah mata air belerang alami yang paket wisata medan merupakan tempat yang tepat untuk menikmati pemandian umum di tour medan murah air belerang yang mengepul. Anda juga bisa mengunjungi Bukit Gundaling; tujuan wisata populer di wilayah ini, karena menawarkan paket tour medan murah pemandangan gunung berapi Sibayak dan Sinabung yang sangat indah. Sumatera Utara adalah paket tour medan murah rumah…See More
18 hours ago
tour medan posted a discussion

paket tour medan murah

Di Berastagi, kunjungi Pagoda Emas, yang tertinggi dari jenisnya di Indonesia dan city tour medan terbesar ketiga di dunia.  sebuah contoh indah dari arsitektur Indo-Mogul yang dibawa dari Tamil Nadu di India, yang berisi banyak ornamen menawan dan travel agent medan pajangan warna-warni di dalam kuil yang menjulang tinggi. Lanjutkan ke kaki bukit berhutan city tour medan pegunungan Bukit Barisan, di mana…See More
19 hours ago
Martti Koski commented on H's group Finland
" uomen Joukkovainottujen seuraava tapaaminen onLauantaina 12 joulukuuta Ravintola Teerenpelissä kello 16.Viime tapaamisssa oli toistakymmentä henkeä, joten jouduimme jakaantumaan useaan pöytään. Tapaamisessa oli…"
21 hours ago
Robin Yan posted a blog post



© 2020   Created by Soleilmavis.   Powered by

Badges  |  Report an Issue  |  Terms of Service