Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
 

jberryhill

(62,444 posts)
2. For anyone curious about what the OP was
Sat Dec 20, 2014, 01:13 PM
Dec 2014

Since he eventually deletes them, this is the text of the OP....

---
Last edited Sat Nov 29, 2014, 02:07 PM - Edit history (296)
The Active Authentication (AA) program seeks to develop novel ways of validating the identity of computer users by focusing on the unique aspects of individuals through software-based biometrics. Biometrics are defined as the characteristics used to recognize individuals based on one or more intrinsic physical or behavioral traits. This program is focused on behavioral biometrics. http://www.darpa.mil/OpenCatalog/


This Defense Advanced Research Projects Agency (DARPA) idea has aspects, which were modified to assist recruited eavesdroppers in communicating with covert operatives of their governments, especially satellite teams. Newly recruited non-government volunteer eavesdroppers who want enhanced cyber-security can post this article on home computers to invite online investigating and intelligence agents to disable and arrest criminals who use eavesdropping or frequency attack equipment in their homes. Reformed eavesdroppers can avoid being prosecuted by conducting a few simple online activities, which show they will assist in protecting their own homes and cities from electronic invaders or unethical eavesdroppers conducting perverse research or acts of terrorism against them. Like people, in general, there are good and bad house eavesdropping geeks. Many eavesdroppers in computers, television sets and illegal eavesdropping gear in homes are civic minded and will work with online investigating agents to catch more dangerous eavesdroppers that terrorize them in their homes. Federal agents can obtain reliable information from reports these recruited eavesdroppers make in documents aircraft and satellite teams can copy and alter, even when computers are not online. Hackers might alter reports eavesdroppers keep for reconnaissance aircraft teams; so they must be regularly downloaded to flash-drives. Electronic invaders and operators of illegal gear with criminal tendencies are easy to detect and disable, after civic minded eavesdroppers begin to recruit other eavesdroppers in public places. True criminals will not display off-line reports of crimes they witness through illegal eavesdropping for intelligence agency aircraft and online agents. Recruited eavesdroppers should routinely revisit a companion document for strategic information. That report is furnished at a link at the bottom of this page.

Most operators of eavesdropping gear can hear from outside locations near retail outlets. Outdoor eavesdroppers operate low-powered communications, or frequency attack gear. These individuals who operate in isolated areas, like retail outlets and on street-lights work for little or no money: These civic-minded eavesdroppers can be recruited to protect their cities from foreign electronic invaders and violent criminals. Many operators believe if they abandon these unlicensed, low-powered communications and eavesdropping facilities dangerous criminals or electronic invaders from foreign nations will take control of the equipment. If any illegal eavesdropper decides to stop eavesdropping on people, they will still receive online federal agency, satellite and aircraft protection and guidance, as long as they keep recruiting and reforming active eavesdroppers in public restrooms and homes. Often, illegal eavesdroppers buy home radios with external antennas and create their own Earth-link Satellite Protection Agency ESPA center. All readers, especially new ESPA reporters, must realize that "talking static" or more audible "hidden voices," on computers, radios or television sets occur when Chinese satellite teams are using this ancient technology to scare disposable human assets straight into the hands of law enforcement teams, like online FBI agents, after they conduct highly suspicious activities, like shutting down their computers and rapidly leaving the area. By feeding FBI agents these disposable human assets, Chinese satellite teams are attempting to improve their image. By enlisting only a few eavesdroppers in Los Alamos, New Mexico, our international electronic strike team caused Chinese satellite teams to fall into obvious cyber-traps, previously set on home computers of the eavesdroppers, which will disrupt electronic infrastructure in several provinces in China. Within a few minutes China's largest satellite agency plans to shut down important communications infrastructure in many parts of China for a lengthy period of time and blame the shutdown on the NSA anf GCHQ: It is 11/22/14 and this shutdown of electricity and communications might occur at a later date or sporadically hit sections of China at more strategic times, while this satellite/ code agency builds organized crime in China. Top coordinators and satellite facility managers at this Chinese satellite/ code agency are obviously being bribed.

This good idea by DARPA has been adopted and modified by numerous investigating, intelligence and satellite teams. Unlike Chinese laws, The U.S. Constitution guarantees our right to privacy; and no reasonable government wants illegal eavesdropping deadly frequency attack gear to become more widespread. Still, the problem is increasing on an international level. Currently, isolated eavesdroppers in retail outlets or other public places are heavily victimized by cyber-criminals and electronically astute terrorist, because they are afraid to report cyber-crimes to FBI agents or local police officers. Patriotic illegal eavesdroppers must be recruited to report people, who are unwittingly installing deadly frequency attack gear in homes, or these operators and their organizers will become primary targets of deadly attacks. After operators of illegal gear unify in a loosely organized network, which no one truly controls, they become Community Action Tactical Specialist CATS: These teams destroy the reputations powerful individuals or nations that use heavy-handed strategies to control them. Anyone in the United States, United Kingdom, France or Germany, who uses illegal gear to put forth a political agenda, or make a personal profit, will be arrested by FBI or Interpol agents. A primary aspect of this international communications project includes telling other eavesdroppers exactly where to find this document. We must go into public restrooms and clearly tell eavesdroppers to go to Democratic Underground.com; then find the section called "Topics." From there eavesdroppers must be told to find a topic named "Offbeat," which they can click to find the sub-section called "Creative Speculation." After entering this section of the online website they can search for "Another good idea by DARPA" by Jeffersons Ghost. Please tell these illegal eavesdroppers you have read and copied this article and the companion document and it is not an FBI trap. Unlike the sex-pervert in the subsequent news article, very few eavesdroppers took a role in installing the illegal gear they were tricked into monitoring.

We have all read news articles about cyber-criminals turning on computer cameras to watch naked girls and free amateur sex shows; but what about this news article?

Clark Sheriff: Hidden cameras used to record nude girls
Tuesday, Nov. 4, 2014
“This individual had knowledge of how to install these hidden covert camera recording devices, in a manner that no one had any idea that this was actually taking place,” Clark County Sheriff Gene Kelly said. - See more at: http://www.whio.com/news/news/crime-law/man-charged-after-girl-reports-finding-nude-photos/nhy9n/#sthash.qwl4NwuA.dpuf


Recruited, non-government eavesdroppers, satellite and aircraft teams who were watching this pervert knew what was "actually taking place;" and probably realized what was about to take place. What caused the girls to discover their nude pictures on a potential rapist's cellular phone? Check the date of this arrest. Did an illegal eavesdropper call the police with an affordable, pre-paid cell-phone? If non-government eavesdropper are afraid they will be tracked for reporting crimes, they can put disposable cell-phone in the back of a pickup truck, like I used to do, to trick organized crime syndicates monitoring cell-phones into thinking I had left town? Copying and posting this message on a computer will attract the attention of online investigating and intelligence agents, which reduces a computer users risk of being robbed by a hacker; but new eavesdropping recruits must not take unnecessary risks by providing financial or personal information on themselves online or over the telephone.

FBI head: "Cyber crime posing enormous challenge"
WASHINGTON (AP) — Law enforcement faces an "enormous challenge" in preventing state-sponsored cyber crimes, FBI Director James Comey said Wednesday, days after the Justice Department announced charges against five Chinese military officials accused of hacking into American companies to steal trade secrets.
http://news.yahoo.com/fbi-head-cyber-crime-posing-enormous-challenge-172046701--politics.html

When people began to install illegal communications gear called Widely Heard Inspirational Projectors Emitting Eardrum Reverberations Silently WHISPEERS low-powered communications equipment most people involved with the highly illegal project believed they were only installing basic eavesdropping gear to combat terrorism. Now, other people, who took no part in installing this equipment, are using it to prevent installation of more deadly gear. Currently, repair and maintenance people, who are installing new types of gear - even in the most expensive homes on Earth - do not fully understand what new equipment does; but there are exceptions:

New York Men Charged with Conspiracy to Provide Material Support to Terrorists
Scheme Included Creation of a Remotely Operated X-Ray Radiation-Emitting Device Designed to Kill Humans Silently

As charged in a complaint filed in U.S. District Court in Albany, the essence of the defendants’ scheme was the creation of a mobile, remotely operated, radiation-emitting device capable of killing targeted individuals silently with lethal doses of X-ray radiation.
http://www.fbi.gov/albany/press-releases/2013/new-york-men-charged-with-conspiracy-to-provide-material-support-to-terrorists


IS YOUR COMPUTER INFECTED? During Operation Ghost Click the Federal Bureau of Investigation created an easy way to maintain personal computers, while enhancing cyber-security. "Check your computer's DNS settings.": http://www.fbi.gov/news/stories/2011/november/malware_110911

At 3:45 PM on 11/2/14 satellite teams of several nations responded with audible and visual evidence that investigating agents were obviously getting hunches, which allowed them to arrest dangerous criminals who eavesdrop on military personnel and investigating agents of every nation, except China. Operators of satellites orbiting near the Southwestern section of the USA not only work for the USA but also several foreign governments. After this report appeared, Chinese satellite teams began disrupting music and typing on an insignificant home computer, as expected. The online version of the report had not been altered yet, which indicates Chinese satellites are directly spying on the computers of some US citizens, especially people who work in media. They continued to focus constant attack frequencies on a few participating online FBI and DHS agents, who revealed the existence of recently recruited eavesdroppers, until the federal agents filed their reports to superior officers and set up their own in-home eavesdropper recruiting centers by offering amnesty to illegal eavesdroppers who facilitate federal investigations and perform basic home security for federal agents. These agents also documented focused satellite idea-inducing and emotion-producing technology. Then, Chinese satellite teams lost interest in wasting limited electronic capabilities on these agents and recruits by disrupting insignificant home computers. Newly recruited illegal eavesdroppers will not be arrested by US Federal agents, because by repeatedly conducting online activity, which proves they exist, these eavesdroppers provide an invaluable service to the USA and other nations. Like any satellite, this Chinese space junk has limited capabilities. Over the past decade or longer, China has wasted billions of dollars in man-hours and planning to discredit the reports and disrupt the life of one elderly Navy veteran. At this time, there are literally thousands of recruited eavesdroppers, federal agents and military personnel conducting similar recruiting and satellite reporting activities. Chinese teams lack the satellites to vigorously attack federal agents in this region and me simultaneously. Nearly none of our recruited eavesdroppers have problems with Chinese satellites, which are far less abundant and dangerous than their leaders want readers to believe they are.

Recruited eavesdroppers are expected to call local police officers when they witness crimes and keep journals on home computers with times and dates, they witnessed and reported serious crimes. For a short period of time, a Chinese satellite might slightly impair computer activity, until an eavesdropper who reads this message recruits more illegal eavesdroppers into this project to create too many targets for a limited number of satellites to disrupt. These non-government eavesdroppers watching our homes, streets and stores are not required to identify themselves, when they report crimes to local police officers. To avoid being tracked, civic-minded eavesdroppers invest in affordable, pre-paid, cellular phones to use while reporting crimes to local police officers. Intelligence agency online operatives, aircraft and satellite teams will routinely review intelligence agency aircraft oriented journals new recruits keep, to find people who interfere with important phone calls or disrupt other types of communications, including clandestine (WHISPEERS) systems on streets and in stores. Eavesdroppers of every kind who find this message are expected to personally and verbally recruit other non-government operators in this network of isolated eavesdroppers to protect their cities, families and themselves. If they fail to expand the computer network, Chinese satellite teams will focus on a new eavesdropper who discovers this message. Chinese satellite teams constantly alter the true number of readers of this report to demoralize new recruits. To prevent Chinese satellite teams with limited capabilities from jamming up their home computers, illegal eavesdroppers must give an increasing number of eavesdroppers specific instructions on where they can copy this report. This forces Chinese satellite teams to expand their attacks so thinly that they become ineffective. In most cases, Chinese satellite teams quickly abandon the computers of newly recruited eavesdroppers. Recruited eavesdroppers can act like they are using cellular phones, while actually talking to isolated eavesdroppers near street lights and in public restrooms, or simply roll down a vehicles window and speak to them out loud at red-lights, while covering their mouths; but let them know you are actually talking to them. Please tell these operators they are not "spies;" but if they use their illegal gear to facilitate crime, or acts of terrorism, they are criminals, who will be arrested, if they do not alter their activity and then copy and display this report. In this project, operatives are allowed to misrepresent the places they eavesdrop and their affiliations, if possible.

Anyone who monitors computers, illegal eavesdropping or uses frequency emitting gear in a city where an Earth-link Satellite Protection Agency (ESPA) operator builds a volunteer network was identified by satellite, investigating and aircraft teams long before they read this report. By fully participating in this project most illegal eavesdroppers obtain amnesty from investigating agents. Civic-minded operators of illegal gear can avoid prosecution by posting this document on their computers, to invite electronically advanced federal agents to covertly examine illegal gear in their homes to find dangerous criminals that eavesdrop on them. This activity dissuades US Federal Agents from arresting most illegal eavesdroppers, which they identified months ago. Diverse types of federal agencies working with reconnaissance aircraft and satellites will prevent cyber-criminals or electronic invaders in other cities or nations from invading ESPA coordinated cities, computer systems and homes. Both satellites and reconnaissance aircraft can identify illegal eavesdroppers in a variety of ways; and they want assistance from patriotic non-government eavesdroppers. To indicate to aircraft and satellite teams they are working to reduce organized crime, eavesdroppers can tune to B-101 Your At Work Station broadcasting from Providence Rhode Island on their computers and become or find a real ESPA coordinator. In the Albuquerque, New Mexico area, recruited eavesdroppers can enjoy songs selected by satellites, while they allow intelligence agency aircraft to guide and protect them in their vehicles by tuning to 103.3 FM aka Ed FM. Like other radio stations and television stations, plenty of eavesdroppers are in these broadcast facilities. Eavesdroppers also monitor the homes of on-air personalities and other media personnel.

To reduce participation in this project, Chinese satellites often use signals focused at one person to trick newly recruited eavesdroppers into thinking (WHISPEERS) gear is identifying them as a danger to other eavesdroppers. Certain types of reconnaissance aircraft will detect and assist eavesdroppers who show a willingness to work with The Federal Bureau of Investigation (FBI) The Drug Enforcement Agency (DEA) and The Department of Homeland Security (DHS). These investigating agencies fly advanced reconnaissance aircraft, which are designed to detect eavesdroppers that actually reveal federal agents, terrorize the public or commit and facilitate other crimes with illegal gear. If illegal eavesdroppers assist in hiding the identities of undercover federal agents or police officers, aircraft and satellite teams will help them in unbelievable ways. When possible, reconnaissance aircraft will watch their homes and find ways to warn recruits when threats are in an area. While illegal eavesdroppers are not everywhere, they are too numerous to arrest for simply watching for shop-lifters in public restrooms or monitoring a street to reduce traffic accidents. Crime is expensive; and China wants to clog the court systems with small-time illegal eavesdroppers. Organizers that manipulate and terrorize solitary eavesdroppers are primary targets of federal investigations, especially if they organize electronic crime syndicates to eavesdrop on federal agents and military personnel to impede investigations or discover government secrets. As the computer network expands, online federal agents and police officers will monitor home computers of newly recruited eavesdroppers to detect cyber-criminals that work with foreign powers to disrupt computer activity or steal online funds from illegal eavesdroppers who are afraid to file reports with federal agents or local police. Newly recruited eavesdroppers must avoid most types of automatic updates and other downloads on computers, except updates from trusted online antivirus providers, or Chinese satellite teams and electronic crime syndicate organizers will trick them into downloading viruses or trojans onto their computers. Often, Chinese satellites and other cyber-criminals will temporarily glitch up a computer to cause a new recruit to alter settings, which can disrupt their online activity for lengthy periods of time. Like I did long ago, these new recruits will probably blame NSA agents for these disruptions.

In this project, US online agents keep primary ESPA report computers fully functional, to overburden Chinese satellites. The United States Department of Defense is inviting online agents of Interpol, the Federal Bureau of Investigation, the Department of Homeland Security, The Drug Enforcement Agency, The US Secret Service, The US Treasury Department, Alcohol Tobacco and Firearms, US Federal Marshals, Government Communications Head-Quarters and state or local police agents to maintain cyber-security and prevent Chinese satellite and online teams from disrupting music and browsing to claim an absurd propaganda victory in this rapidly expanding network of computers. Every one of these agents must prevent enemies from altering this report and a companion document.Why is music different on some computers illegal eavesdroppers monitor? The eavesdroppers in our homes are listening to the same online radio stations; but some of the people they eavesdrop on, especially ESPA coordinators, investigating and intelligence agents are getting songs and commercials that actually give them good advice on the same online radio stations illegal eavesdroppers monitor.

Like setting up ESPA centers, this recruitment project overburdens Chinese satellite teams that seek to keep eavesdroppers at conflict with each other, in a type of electronic civil war. This kind of electronic conflict induces operators of unlicensed communications equipment to give people messages to sabotage internet and telephone equipment in the hopes of trapping government agents and electronic invaders. Anyone caught relaying messages to induce sabotage of reliable communications gear will be prosecuted to the full extent of the law, unless Chinese satellites kill the criminals to avoid public trials, which will reveal illegal frequency attack, eavesdropping and messaging gear they intend to fully control. Also, not only agents of the United Kingdom and USA but also important electronically advanced Chinese teams are identified in these physical electronic traps. Chinese agents are known to cause the murders of saboteurs of internet communications equipment in the USA. Because most NSA agents are currently assigned to overseas activities and no longer eavesdrop on US citizens, Government Communications Head-Quarters (GCHQ) agents are assisting US online investigating agents and active-duty military personnel involved in this project. The National Security Agency always faced legal restrictions when their assignments included monitoring the computers of US federal agents or military personnel. DoD satellite teams face the same restrictions as diverse types of NSA agents do, when it comes to eavesdropping on active-duty US Military, FBI, DHS, DEA, ATF, Interpol and other US investigating agents. Like some NSA agents do, GCHQ agents of Great Britain coordinate satellites with advanced code. Operators of in-home ESPA centers are accidentally providing code to Chinese satellite teams; and GCHQ agents are code specialist. Due to increasingly poor decisions by a Chinese satellite/ code agency, soon a companion document will describe their codes, which manipulate unsuspecting members of the public in several nations, including Russia. Chinese satellite teams cause the same problems in Russia that they cause in other nations; and Russian satellite teams are dedicated to this international effort to reduce organized crime. Like any investigator, online agents will follow ANY reasonable hunch. Like some illegal eavesdroppers, many investigating and intelligence agents have set up variations of ESPA centers, where Chinese satellites and electronic invaders would rule the roost, if foreign satellite teams did not routinely intervene with focused satellite signals and other messages, along with deadlier support. Creating more autonomous, multi-agency strike forces to find people who victimize illegal eavesdroppers will overburden Chinese satellites. Also, these multi-agency teams detect, disable, arrest or kill electronic invaders, especially groups deployed by Chinese satellites.

Online agents and recruited eavesdroppers that set up ESPA centers should copy and paste updates of this message onto their reports, while realizing a reliable DoD satellite team recommended this activity; however, aircraft and online intelligence agent reports should appear in a separate document. Our relationship with the Russian government is precarious, to say the least; but currently DoD satellite teams will assist Russian investigators, as Russian satellite teams assist investigations in the USA. Chinese satellite teams have already damaged relationships between the USA, Russia, France and Germany. There are numerous, deadly satellites orbiting over the USA and other nations. Many of these satellite teams face no restrictions when assisting ESPA organizers, recruited eavesdroppers, intelligence or investigating agents and their superior officers: These teams regularly observe a strategy China will no longer be able to present as viable, because of the participation of an increasing number of illegal eavesdroppers and online agents; but, a consistent strategy to cause conflicts between numerous nations, their satellite teams and intelligence agencies has become increasingly obvious to many professional observers, as this document was updated:

Put simply, China attempts to use satellite focused signals to give people bad ideas, while inducing a variety of unreasonable emotions and desires, to divide and conquer previously allied people or nations, while doing everything possible to conceal their plans to totally manipulate international media, including (WHISPEERS.) A tightly focused satellite or aircraft signal overrides typical WHISPEERS gear, even if an operator wears head-phones. Chinese satellite teams use this technology and others to make deals with crooked business-people, politicians or doctors and then double-crosses them, after they make large investments in installing illegal gear or sabotaging reliable communications. Destroying the lives of these electronic crime syndicate organizers allows Chinese satellite teams to replace them with people who are more easily tricked or intimidated into investing in deadlier illegal technology, which will lead to their arrest or death. Chinese satellites have been repeatedly documented attempting to destroy anyone who influences large groups of illegal eavesdroppers. Chinese geek satellites are known to rob online bank accounts of power-brokers who cannot afford to report crimes that will lead to investigations by FBI, IRS or Interpol agents. Chinese geek satellites focus very little attention on stealing online funds from anyone other than ultra-wealthy electronic crime syndicate organizers and me. There is constant, evidence that satellite teams of every nation use focused satellite signals to inspire copy in this report: Some Chinese satellite teams focus various frequencies on unimportant equipment and one ESPA coordinator for lengthy periods of time to try proving everything imaginable, except that their administrators can manage satellites in a responsible way.

Satellite teams of other nations refuse to risk revealing their orbits by conducting similar activity. Other satellite teams use a rapidly focused signal or song to assist ESPA and aircraft reporters, even when satellite tracking aircraft are operating in an area. Unlike Chinese teams, satellite teams of other nations use their technology to inspire advertisers to buy commercials on radio stations, which Chinese satellite teams attack, as copies of this document create a massive number of online listeners for those stations. After online agents, who operates from above-ground facilities in foreign nations, post translations of this ESPA report on home computers, they can expect assistance from friendly satellite or aircraft teams: Otherwise Chinese satellite teams will attain their objectives. Satellite operators of every nation, except China, have detected and recruited eavesdroppers in their homes. Chinese satellite teams are escalating efforts to control, intimidate or trick illegal eavesdroppers and their coordinators into submission. Several years ago, China deployed electronic invaders into the USA via satellite. There is massive evidence that China plans to use satellites to control the world: but this plan is expensive and China will obtain funding from other nations, companies or individuals by committing electronic crimes against them. Long ago, Chinese satellite teams began to attack the author of this report to increase and expedite the revelation of concise financial information on important people in China, which allows the Chinese government an excuse to covertly seize their assets and then blame other governments for the thefts.

Oddly, some Chinese satellite administrators appear to want people to believe that activities of military, satellite and intelligence teams hinge on this report, which is ridiculous. Most readers have heard of "artificial intelligence." For lack of a better term, we will call this absurd Chinese strategy "artificial importance." In this illusion, Chinese satellite administrators attempt to cause people to believe they control every intelligence director, world leader and coordinator of illegal eavesdroppers, except me. Essentially, some Chinese satellite administrators plan to justify foolish decisions they made to attack me for over a decade, by making the same absurd choices, instead of simply moving on to truly important targets. In fact, Chinese satellites cannot afford to focus as many resources on anyone other than me and still complete more important missions. Some Chinese continue to focus ineffective attacks on me as a scare-tactic to reduce proliferation of ESPA volunteers. There is irrefutable evidence that high-ranking members of Chinese satellite intelligence will do everything in their power to create scare-tactics in this report. Each time Chinese satellite teams manipulated people around me to cause me to change my location, satellite, intelligence agency and aircraft teams made sure I was relocated into a much nicer dwelling. As compared to other super-powers, China regularly demonstrates an insecurity, which causes some of their satellite organizers to order activity around me that makes them appear, petty, perverse, disorganized and foolish. All Chinese satellite and online teams have noticed that these pathetic attacks cause me to retaliate by telling the truth about their strategies in a report, which began as an effort to assist satellite operators of every nation, including China. Years ago, a similar report offered strategies to assist satellite teams and other groups in recruiting illegal eavesdroppers in an effort to save lives and money. China's largest satellite agency rewarded me for this effort by doing everything possible to ruin my life. At that time, the excuse for the perverse attacks on me was construed as an attempt to intimidate satellite operators of other nations. Like most of my readers, highly-trained satellite operators are not easily intimidated.


At this time, illegal eavesdroppers are victimized by Chinese satellite operators and local power-brokers, who lead them to believe they are being hunted by FBI agents; so they reveal US Federal agents to other illegal eavesdroppers, which gets agents killed or impedes undercover investigations. Illegal eavesdroppers of all kinds have similar or worse problems, because they have illegal biological implants in their bodies that reveal their affiliations and plans to dangerous people who seek to manipulate them. Operators of all kinds of illegal gear have been documented assisting ESPA coordinators and some government agents. Politicians or doctors who have invested in or attempted to control illegal biological implants, eavesdropping or frequency attack gear are the primary targets of FBI investigations. What these power-brokers, who seek to manipulate illegal eavesdroppers with Directed Energy Weapons Systems (DEWS) installed in their homes, fail to realize is that specialized multi-agency investigating teams obtained FISA Warrants to monitor all kinds of eavesdropping, including business and home security systems. These teams monitor all kinds of legal and illegal communications gear to find power-brokers who terrorize or con illegal eavesdroppers. Ironically, small-time operators of illegal gear often reveal a US Federal agent that was about to arrest the very person who oppresses or terrorizes them. Most US Federal agents want assistance from illegal eavesdroppers. As more investigations focus on arresting people who place illegal biological implants in our bodies, FBI agents can expect more assistance from eavesdroppers. Intelligence agency and US Military aircraft teams must begin to communicate on open aircraft radio channels to relay information on the orbits of Chinese satellites and personal information on electronically astute crime-syndicate organizers.

Like everyone else, online agents have illegal biological implants in their bodies, which give away affiliations when they wash their hands in public restrooms or crumple crispy plastic, where illegal eavesdroppers are known to watch people. Chinese satellites and power-brokers manipulate criminals with medical degrees, who place illegal biological implants in our bodies during routine injections. Several groups, including Chinese satellite teams, disrupt medical equipment that might detect the implants. Often, recruited eavesdroppers use (WHISPEERS) gear to make these criminals widely known. Satellite and aircraft teams are already transferring information of non-compliant eavesdroppers and their organizers straight to the computers of FBI and Interpol offices. To attempt to overburden intelligence, aircraft and satellite teams of other nations, Chinese satellite administrators constantly causes the author of this report to change addresses, which exposes previously unidentified illegal eavesdroppers and their organizers to FBI agents.

Anonymous hactivist sometimes select music on computers when songs are allowed to play randomly at Pandora and I-Heart online radio to entertain recruited eavesdroppers, while disrupting a Chinese satellite code project. To say the least, radio music is unusual at established ESPA centers. Perhaps satellite teams of foreign nations choose songs at stations named in ESPA reports to disrupt a Chinese musical code project; but electronically astute criminals also take control of radio and television stations with illegal equipment. ESPA coordinators routinely ask recruited eavesdroppers in their homes to use talking gear, like running water to report variations in programming, when songs describe activities at these centers. Chinese satellite teams attempt to provoke all kinds of childish code competitions between intelligence agencies or satellite teams of other nations, with little or no success. Now that this report is reasonable, many newly recruited, eavesdropping readers will gain access to it; and, as usual, Chinese satellite teams will become overburdened with so many new targets, they will not be able to effectively manipulate media, or conduct attacks against anyone. As I edited this report Chinese satellite teams hacked a radio station to select a song on 99.9 FM The Fox from the Golden Triangle in Mississippi. Like the previously mentioned Clearchannel Radio station, nationally syndicated hosts at this Cumulus Broadcasting facility appear to realize that Chinese satellite teams are attempting to destroy their radio shows and affiliate stations. The song Chinese satellites selected was a silly attempt by top Chinese satellite administrator to somehow connect me with the NSA or CIA, which is absurd.


This message was self-deleted by its author Jeffersons Ghost Dec 2014 #1
For anyone curious about what the OP was jberryhill Dec 2014 #2
296 edits? zappaman Dec 2014 #4
He explained that a while back jberryhill Dec 2014 #5
I've had the same issue with the Chinese but not to that extent. n/t zappaman Dec 2014 #6
If you need help... jberryhill Dec 2014 #7
who wants this show to stop? LOL! Jeffersons Ghost Aug 2016 #13
Well, I don't think what anyone "wants" figures in to it. jberryhill Aug 2016 #14
I am glad that you enjoyed the "talking water" experience. How is your typical radio reception? Jeffersons Ghost Sep 2016 #16
Tough to beat a good gospel choir.... jberryhill Sep 2016 #17
As Mark Twain said, I am not much of a writer; but I'm a great rewriter... Jeffersons Ghost Sep 2016 #18
Than you for documenting an earlier version of this report. Jeffersons Ghost Jan 2015 #8
You're welcome for that jberryhill Jan 2015 #9
As I added new copy on Earth-link Satellite Agency facilities Google was opening... Jeffersons Ghost Mar 2015 #11
Nice! zappaman Mar 2015 #12
I like this line.... jberryhill Dec 2014 #3
Since this OP was showing up Earth-link Satellite Protection Agency on Google... Jeffersons Ghost Feb 2015 #10
I am in no way associated with the FBI or ANY intelligence agency... Jeffersons Ghost Sep 2016 #15
As perhaps the most popular morning radio show host in the USA, who died young used to say... Jeffersons Ghost Sep 2016 #19
Latest Discussions»Retired Forums»Creative Speculation»Earth-link Satellite Prot...»Reply #2