Jameel Jaffer: See No Evil

The report issued Tuesday by Glenn A. Fine, the Justice Department's Inspector General, is overflowing with new information about the development and implementation of the Bush administration's torture policies. The report's most important finding is that some of the administration's senior officials — possibly including Condoleezza Rice, who was then the National Security Advisor — knew as early as 2002 that FBI agents and some Justice Department personnel believed that interrogation methods being used by the Defense Department were not just ineffective but also illegal.

Torture and America

The report makes clear that the CIA, too, knew that the interrogation methods it was using were of dubious legality. In early 2002 — before the Office of Legal Counsel supplied the CIA with a memo sanctioning the use of harsh methods — an FBI agent told CIA personnel that the methods being used against one prisoner were "borderline torture."

In the story told by the Inspector General, the FBI comes off relatively well. While the Defense Department and CIA were authorizing their interrogators to use torture, FBI agents were documenting the harsh techniques being used by their military counterparts, refusing to participate in interrogations that were abusive, and in some cases conveying their concerns about abusive interrogations to their superiors and military commanders. (Amrit Singh and I have written at length about all of this in a recent book, Administration of Torture.) The Inspector General's report, though, raises serious questions about the actions that FBI headquarters took — or, more significantly, failed to take — in response to the concerns being raised by FBI agents.

The key question, I think, is why the FBI — which is, after all, supposed to be the nation's principal law enforcement agency — didn't try to end the abusive interrogations being conducted by other agencies. FBI agents concluded in 2002 that interrogation methods being used by the Defense Department and CIA were illegal. Indeed, some agents collected their notes about abusive interrogations in a "war crimes" file. But when agents at Guantánamo documented abuse in 2002, the agency waited six full months before giving the agents permission to finalize and distribute their memo. (According to a footnote in the report, the FBI's leadership was afraid that distributing the memo would offend the military.)

At some point in 2003, FBI agents were affirmatively told not to maintain the "war crimes" file; they were told that "investigating detainee allegations of abuse was not the FBI's mission." And the agency waited until May 2004 — a month after the publication of the Abu Ghraib photographs — to issue written guidance requiring FBI agents to report abuse. Even after the FBI issued written guidance, the agents were told not to question the expansive authority that other agencies' interrogators had been given; they were told instead to report incidents in which other agencies' interrogators had exceeded their authority. They were told, in other words, to ignore criminal activity that they ought to have been trying to stop.

Overall, the FBI's leadership seems to have been more interested in ensuring that the agency would not be held responsible for the abuse of prisoners than in actually ending — or even documenting — the abuse. FBI agents who raised concerns about the lawfulness and effectiveness of abusive interrogation methods deserve credit. The FBI's leadership, on the other hand, should be held accountable for having turned a blind eye to torture.

Add a comment (20)
Read the Terms of Use


There is something much worse, that is accepted, joked about, and in fact, sometimes even expected and wished for, that American's allow every day. I'm talking about sexual abuse in prisons. On a moral level, it is truly disgusting that we allow this to go on. People work to stop the death penalty as unreasonable punishment, but this is allowed to go on and on. You really find it strange that a culture that jokes about some naive 19 year old going to prison for smoking pot getting to know Bubba closely, wouldn't care to much about abuse of prisoners? Come on now, we allow and joke about abuse of prisoners every day. Add in the high prevelance of AIDs in the nations jails, and a short prison sentence can also be turned into a death sentence because of this lack of caring. If you want to go after something, go after the implicit allowing of this abuse in prisons. It happens to much more people than what you write about, every single day.


Unfortunately our government has become lawless. Bush vetoes all legislation that Congress offers to try to bring the country back to a semi-lawful one.
If you allow this type of tyranny to continue, the next congress and President might follow suit thinking the citizens don't really care about the Constitution or international law.
Spying on Americans, restricting their travel, jailing people without benefit of counsel, and torture are some of the egregious actions that make this government impeachable.
Please proceed as quickly as possible so that we can love and respect our United States once again.

Dean Holden

YES. Of course the F.B.I.'s leadership must be held accountable and ultimately so must the Executive Branch of Government.

But it is not going to happen.

The system is BROKEN! The whole kit and caboodle. ALL 3 BRANCHES and their bizzillion dollar sappling farms.

If somehow States could hold trials for the entire Executive Branch of government individually for high treason and we televised it for Al Jazera-that would be a good starting point.

My thinking. If you start a war and you are wrong-you get the consequences. Not me! What? Yeah. I'm responsible. Not Bush. THis is a Democracy remember! I said there was WMD ova ther' What?

If we could do that. I would be proud to be an American and then we could hold trials for the businesses who made profits on murdering people in Iraq. I favor this method-we would get Congressmen, Senators, and every person in our society who is destroying it behind bars or better yet-let Iraqis decide what to do with them. They destroyed their country after-all. And we are a nation based upon the rule of law. And what would be more just then handing over our traitors to the people whom they betrayed the most!

We gotta start somewhere. I like the top-down approach.


Jameel Jaffer is suspected of actually being Saad Echouafni. The questions is can you notice him wearing any makeup? The bone structure is correct, the eye allignment, the nose, ears,. grown in hair all in par with a typical mobster on the run. His strategic position against the FBI is exactly where he should be to try to ensure his own freedom, and keep the FBI from racial profiling and getting better survielance. SAAD is an ex satatlite communications criminal. If someone can tell if Jameel Jaffer (Possible Jamil Jaffer) wears makeup could you please contact the FBI by telephone, or in person.

Rhys Paul Hovey

High tech organized crime and the “Mind Control” media cover story

From the perspective of a computer scientist, victim, and technological crime unit applicant

Written by Rhys Hovey, 2008
B.C.S University of New Brunswick

Contrary to the majority of available information (through mass media, and internet) about high tech organized crime, we have reached a catastrophic period in history. This may be one of the largest conspiracies in American history, involving billions of dollars worth of technology, public figures and corporations. It is conceivable that several groups are hiding underneath the same media cover story. Reputable science from leading universities (MIT, Maryland, Oxford,…) and several corporations is in direct conflict to a massive online / media propaganda outlet. Parts of this document may be “hard do believe“ for non-scientifically trained readers, partially due to the online/television entertainment propaganda explained in this document. This is a highly calculated crime, and several aspects of it are reminiscent of TV programming and propaganda during the “cold war” period and the presidency of Ronald Regan. It is with the utmost urgency that I warn people that the FBI and other law enforcement agencies are NOT doing a very good job at catching these high tech criminals, and the list of victims is growing rapidly, and includes some extremely young people, even children.

Major action may have to be taken in the following areas:

* Protection from surveillance / high tech “torture/harassment” of applicants to technological crime fighting units.

* Basic awareness of cyber-law / biological privacy, starting at a young age. (even elementary school)

* Demystification about neurological computer science, bioengineering / biotechnology (AKA: computational neuroscience, computational neurology, BCI, brain computer interface, brain machine interface).

* Regulation of computer “bug” crimes, and ethics for computer science students, (whistle blowers policies, cyber law).

* Awareness about the actual “state of the art” in computer automated surveillance, and so called “mind control technology”, and the criminal propaganda outlets that attempt to confuse victims, lawmakers, and crime fighters.

* The ideas and processes behind “information hiding” and automated internet censorship (internet, TV, print) (covers, cults, secrets societies,..)

* The psychology of so called “Mind Control” and the abuse of the psychiatric system / committal laws.

* Investigation in FBI corruption in cyber crime units as well as units involving the Church of Scientology, and the distinct possibility that this organization uses media and actors to "make themselves look stupid" when indeed they are hiding the high tech mafia.

Mind Control

Definitions and keywords:

Mind control is a scary and misleading term for a predominantly online propaganda collection, that acts a hiding mechanism for illegal bioelectromagnetic weapons, modern surveillance equipment, and abusive psychology techniques. Part of this online “scam” is the increasing set of pseudonyms , some include:

* Gang Stalking
* Psychotronics Abuse
* Ritual Abuse
* Covert Harassment
* Electronic Harassment
* V2K
* Covert Tracking
* Covert Surveillance
* Targeted individuals (TI’s)

The constant renaming, and convolution of such names is fueled by both the criminals and the victims themselves. These names and definitions serve several purposes:

* The are scientifically inaccurate and do not point to real and obtainable research on relevant technologies

* They follow typical vague speech patterns associated with schizophrenia (ambiguous names, or redundant in definition)

* Some are semantically / syntactically “set up” to be hidden online underneath similar high ranked information in search engines (V2K and Y2K for example, or TI is Texas instruments) and made easier to “google bomb”. (ex, search for V2K under google, or TI)

* Some are real technologies that will prove to be irrelevant when investigated ex: Electronic harassment (prank phone calls, hacking, spamming, online threats)

* serve as a mechanism to convince victims that crime fighters are their enemies (NSA, CIA, FBI), so they will not call for help, and will sound schizophrenic when they do.

It’s unfortunate that some of the victims, in attempts to cry for help, put their own theories / definitions views about the crime, online. Often these people have no scientific background, and assume the propaganda vocabulary, and thereby, make themselves seem more schizophrenic and discredited, and in effect hide themselves further.

References: Youtube, Google, Yahoo!, MSN, Wikipedia, “the mind control forum” (search under ANY of the listed pseudonyms for mind control) The amount of video and testimony is overwhelming.

Psychologically manipulative Propaganda: (blogs, videos, testimony, forums)

Much of this “goal oriented” propaganda about mind control is obvious, from the perspective of typical psychological / persuasive sciences. I have observed the following patterns amongst the rapidly growing online propaganda:

Well documented psychological procedures / processes in effect:

Classical conditioning, cognitive behavioral modification, negative / positive reinforcement, “follow the leader effect”, competitive psychology, criminal psychology, psychological profiling, Maslow’s hierarchy of needs and wants.

A sense of hopelessness achieved by propaganda

Psychologically, it is safe to say that victims often feel that there is no hope for them, after watching propaganda videos on mind control, and believing that the government is “doing it to them“ and the FBI . CIA are in consent of the attack on their lives. The purpose of this hopelessness, is most likely to convince victims, not to call for help, to hide themselves, or to take the law into their own hands, or commit suicide (and get thrown in jail, and discredited in case of trail, and to keep awareness about actual mind control crimes down) Some examples of how this is achieves: (based on research of several online videos)

Saying that others have fought mind control and no-one has won, even people that are assumed to be strong well connected leaders, like Jesse Jackson, or Martin Luther King, no one can get justice for mind control.

Saying that the government itself, as large powerful organization, simply lets it happen, or are the actual criminals, and point to secretive organizations that cannot be “learned about” very easily, such as the NSA/CIA or DARPA.

Saying that Mind Control is almost mythological in it’s age, not a “new high tech crime” (freemasons, illuminati, skull and bones, scientology)

Giving “fake expert testimony” about how mind control simply cannot be solved, and government corruption is inevitable and unbeatable.

Implying that such criminals rely on astrology and mythology over real sciences.

A sense of fear:

Very often a blatant attempt to scare the victims is in effect, by associating mind control with other dangerous organizations and concepts that are more realistic or have a past history. This fear is meant to further drive the victim into a panic or danger state, putting their lives at further risk. It is usually the victims lack of knowledge about the subject or propaganda, in combination with their desperation, that aides in the belief of this “bluffing”, as they hope for an answer. Much of the propaganda appears to be “against” the criminals, when indeed the intent is to relay confusion and fear.

Video imagery and testimony being claimed related to “mind control” from online users of unknown origin.
(See you tube, Yahoo Video, Targeted individuals, Ritual abuse, Scientology)

* Satanic Cults, KKK, Son of Sam, (Ritual Abuse, Scientology, Kidnapping stories,..)
* NAZI’s
* Gross / disturbing imagery (concentration camps,..)
* Murder Conspiracies
* Government conspiracies and secret drug programs (MKULTRA)
* Mass murder (Charles Manson)
* Charismatic Leaders

Overstatement of technology (as it relates to a fear producing mechanism):

The overstatement of technology not only serves to hide the real technologies, but can easily threaten those who have little knowledge of physics, and a level of gullibility, enhanced by the introduction to mind control technology, itself, as it is not widely accepted, and lied about in mainstream media. For example, having fake claims online, that victims have had their “faces burned” or their sexual organs begin to dysfunction. Some online patterns and examples:

* Active denial system (video shows protestors being chased)
* Microwave weapons (burn your face from orbit, fake “old looking“ secret documents)
* Lies about “ECHELON” and “MKULTRA” and various other code names
* Lies about the size and power of criminal organizations (the church of scientology have 10,000,000 members for example)
* Artificial life forms
* Aliens
* Implants
* UFO’s
* Roswell

Fake victims and fake victim resources

A lot of the propaganda also consists of fake victims, that will actively contact / blog with the real victims and lead them further astray from getting real help, and giving real help to the authorities. These fake victims and fake “saviors” are easily made online with basic “free” hard to trace internet accounts and videos (you tube, face book, mind control forum, e-mail). They also may serve as a way to test and monitor the actual victims, and find out, who is close to contacting the proper authorities with proper information, acting as an early warning sign.

* Discrimination “stalking“: This is an online stalker, or computer AI, that continually tells the victims to seek medical attention and that they have a mental illness. I am quite sure that I have even observed computer automated version of this on several blog sites. (ABC news blog is suspected of having a computer program that responds to certain keywords with an immediate response to “you sound mentally unstable“ or “please seek medical attention”) as well as having censorship that masks in the form of a computer “sever error“.

* Fake victims: Many of the contacts that are available and EASILY found, under the headings of “Mind Control” that claim to be experts in the subject, are some of the most misleading people of all. Recently (approx April 2008) I have personally noted frequent contact from other victims, all specifically calling themselves “TI’s” like a bandwagon effect within the span of 1-2 months. I noted this term, and soon found an associated propaganda video of unknown origin, associated with my own testimony (see Yahoo! video) that outlined this term, as well as made several bold “visual suggestions” that other power figures such as Martin Luther King and president J.F. Kennedy were “targeted individuals”, following this typical propaganda formula. This again is a bad term for a victim of organized crime, because of the acronym TI is monopolized by Texas Instruments online, as well as being somewhat self redundant. Again several online personalities often suggest videos that are very misleading, and these personalities pretend to be sympathetic victims. After 4 years of victimization by high tech organized crime, I have never have a scientifically accurate video “suggested” to me by someone else.

Up to date examples of suspicious groups and online figures: (so called “experts” and activists)

Theodore Gunderson - He is claimed online to be an ex-FBI officer with “credentials”. He appears to be being discredited on WikiPedia.

J.K. Ellis - Mind Control 101 newsletter,. Relates mind control to basic “mind tricks” for getting what you want.

Mind Control Forum - It is my belief that this page is ran by organized crime. They would not let me post my personal testimony, and their high rank in search engines, is in line with the typical of the crime formula in question.

Talking Brains - A blog from scientists (university of Maryland) talking about “mind reader technologies” (computational neurolinguistics), directly contradicts press releases from (Ambien technologies, “The Audeo”, as well as several from NASA)

Operation Clambake - Again, following the pattern of the scientology hater, being the source of disinformation.

EFF / CCHR (electronic frontiers foundation, and Scientology’s Citizens Commission on human rights abuse). From a victims perspective both of these groups gave me complete denial of attention. This would coincide with the typical pattern of the criminals taking control over / forming, the aid groups themselves, and monopolizing the online presence of being the “friend of the victim”.

ACLU- Unfortunately I have found that the ACLU is lying about the state of the art of mind control technology, and claim that they are very suspicious about fMRI polygraphs, when indeed the first public “mind reader” (voiceless speech recognition) has been unveiled, with several witnesses from hospitals, and a major news network. Vague wordings around the term “mind reader” are also present in the ACLU biotechnology section. The ACLU also seems to fit the online propaganda outlet which blames the government for these crimes.

The technology of high tech organized crime (Mind Control technology)

To my knowledge the main forms of technology used by these criminals are:

* Computer Hacking
* intentionally software engineered “backdoors”
* Web page customization / personalization
* Surveillance (several forms) Manual, Automated, Neural, Optical, high tech bugs, telephone,..
* “sound weapons” , ranging from very quiet ultrasound, to loud (as well as typical non-lethal weapons, like buzzers / beepers)
* Psychological based Computer AI
* Long range MEG or EEG processing
* telephone rerouting
* a myriad of surveillance techniques

Personal Computer Hacking:

As a computer scientist, the tricks of the trade of hacking SOFTWARE itself, have not changed much, as commercial operating systems (Windows, MacOS) continue to grow and evolve. The basic fundamentals of computing have remained fairly consistent (networks, passwords, signals, encryption, reverse engineering). Although it is much less known about the state of hardware based hacking, and EM interference crashing. This means that the computer can be hacked or controlled by microwave or radio wave remote control, as well as crashed with basic EM interference. One of the main purposes of computer hacking, from the victims perspective, is to block communications to authorities, where necessary. One of the main purposes of hacking from the criminals perspective, is no doubt major theft, espionage, even terrorism.

Software hacking types/ keywords:

Exploits, Virus, Trojan horses, spy ware, malware, reverse engineered backdoors, password cracking, and decryption, denial of service attacks, DNS cache poisoning.

With computer hacking, most of these hacks, if not all, are able to give complete control over the computer system, to the criminals, for communications block-offs, communications fakery, online framing (sending e-mails from your computer, to the police, or setting up terrorist activity points)

Web page customization / personalization

In attempts to confuse, or redirect a persons actions, or intentions, or incriminate victims, false web pages, and/or personally contextualized web pages, (even public ones, like www.abcnews.com) may be presented to victims. For example, fake police press releases online could be used to attempt to change the behavior, by making the victim think that a certain event has happened, like a major trade has happened that has not, or an arrest, or that a new law is being formed. It is possible, although difficult, for the entire “internet” to be proxies for an individual, and filtered, and all appropriate government and police web pages, redirected to servers owned by the criminals, what engage in large scale data warehousing (Yahoo, Google)


There are many different types of surveillance, ranging from optical, to neural / biological, as well as 3D / volumetric surveillance technologies similar to SONAR. I believe a somewhat cost effective combination of technologies is in use by major criminals, with their most important and well hidden being the long range neural surveillance, capable of recognizing “subvocal or unspoken” speech, and that it is achieved computationally through a somewhat similar means to “The audeo” (Ambien technologies, www.theaudeo.com) but at long distances, via standard electromagnetic signals, similar to UHF/VHF TV signals. The area of bioelectromagnetics is widely known via biomedical engineering. (fMRI, MEG, EEG, PET,…) This unfortunate reality gives these criminals an extreme advantage, when it comes to industrial espionage, and terrorism. Unprotected victims, are unable to inhibit the transmission of the majority of unspoken language, including passwords, and credit card numbers, and psychological factors, for use in computer automated “torture AI“. Non neural password generators are available.

(See dept of electrophysiology of language at U of Maryland)

Non Neural Password Generator (can be of help to victims):

Extremely high tech microwave / satellite tracking computer systems (shape tracking)

The tracking of a victim is likely accomplished by super computer controlled satellite arrays, and electromagnetic / microwave signals, similar to fMRI signals. Hitachi also claims to be able to achieve brain computer interface (BCI) with infrared techniques. It is highly unlikely that standard computer vision or photogrammetry techniques are used, as it is known to be too accurate. The human body contains several very unique biometric characteristics, (skull shape for example) that can be used as 3D points of reference to orient MRI like snapshots, which in turn are fed to pattern recognition computers. These technologies are even well known to basic Geographical information systems companies.

Basic computer automated surveillance equipment tested in shopping mall:
(contact any university computer vision dept for proof)

Sound / Ultrasound weapons (computer/AI controlled)

Of the utmost importance is the understanding of the sound/ultrasound weapons incorporated by these criminals. This type of long range weapon makes these criminals very difficult to catch, and their victims seem mentally ill. Through interviews with other victims and my own personal experience, I can verify that this weapon, is a very quiet computer controlled AI system, that is used in conjunction with the long range “subvocal speech” extraction technology. (See links above) This AI system, incorporates recognizable algorithms originating from IBM style AI systems from the 70’s and 80’s up to more sophisticated pattern recognition, and computation linguistics, and is often obvious, even error prone. If a victim is aware that this is computer AI, it can be easy to fool, although it is likely that it has similar algorithms, similar to a standard polygraph to aid in filtration of properly “true” input.

This AI often searches for information from the victim, in a “fill in the blanks” style of psychological trick. For example “John hates _______” or “I'd be good looking if it weren’t for _______” “The worst memory that I have is ______“ , “It hurts me when you ________“ will become audible to the victim, while in front of the mirror, or other places (shower, bed, TV). These fill in the blanks style statements, are a computer AI (and voice synthesizer) looking for the victims own personal weaknesses, so that they can be reminded about them, quietly by this system, almost 24 hours a day. Once again, once sub vocal speech is extracted, this AI technology is often less advanced than some video games.

This “sound weapon” can also be used to simply repeat the same abusive statement at the victim for hours or days at a time, all the way up to simply planning “buzzers” and beeps at the user, similar to more loud non-lethal weapons in use by police / FBI. I have personally been able to record this device, but it took me quite some time, because these system is programmed to become more quiet when attempts are made to record it, furthermore it is VERY quiet to start with, and is heavily “band pass filtered“ (narrow frequencies). A recording can be found at: www.youtube.com/rhyshovey

For further information on how sound can be “localized” and directed in this way, a commercial and simplified version of this technology is available. Rest assured that older engineers have no doubt much more sophisticated version of this technology.

For a demonstration of “sub vocal speech extraction”:


This computer AI has many “scripts” which attempt to model the language or conversation of real world situations, using voice synthesis. (illuminati cults, scientology, next door neighbors, virtual “fan clubs”, satanic cults, scientists, CIA… ) This VERY often confuses the victim into thinking that actual people are following them or are interested in them for some reason,, and that their own paranoia /ego is the reason for the attack on their lives. This sounds very bad to police / FBI and often ends with the victim being committed to a mental institution, with symptoms of delusions of grandeur or schizophrenia. It is the computer controlled AI that makes the process economically feasible for the criminals, as they must attempt to keep this large crime and it’s technology a secret, when their main purpose is no doubt large scale theft and industrial espionage, and terrorism.

Basic strategy for public awareness in lue of mass media corruption

Given the nature of this crime and it’s secrecy, and the electronic communications blockage methods used by these criminals, coupled with the known behavior of the FBI/RCMP as of September 2008, a basic public awareness strategy can be taken, and in turn, the eventual capture and punishment of these criminals can happen, thereby saving our children, and possibly even you, from being exploited by these corporate and political criminals. Again, this is HIGHLY calculated crime, and the FBI may not have the satellite/microwave technologies necessary to catch these criminals.

* use of Non neural password generators, and other non-biologically reliant password generators (mechanical) when calling for help or spreading word, see also "TOR" online.

* continual in person “word of mouth” to law enforcement at all levels.

* continual usage of mass-media capable internet technologies (Youtube, Blogs, e-mails, video games, mass mailing, e-mail crawler applications, e-mailing screen savers, in software public service messages,.. ) to contact the Dept of Justice, the FBI, the CIA, the Government accountability office (GAO), major and minor media companies, police departments, and even university campus police departments, intelligent agencies of other countries, INDIVIDUAL MEMBERS of human rights groups, any public figure.

* protests

* handing out pamphlets on streets

* word of mouth on streets

* word of mouth to other large groups: churches, YMCA, the promise keepers, the American auto association, the NRA, SAG, ACTRA,..

This document is a work in progress, for updates please e-mail rhyshovey@yahoo.com or simply search for Rhys Hovey online. I will continue to attempt to clarify this “sci-fi” like crime, as much as possible. Once again, I am an applicant to various high tech crime units, that may have been blocked, representing a civil war worthy pattern on corporate and political criminals, relying on internet, and biological technologies. The FBI is not responding to this crime and the evidence is overwhelming to scientists. Please do your part for the protection of our children, and spread this document, or file a complaint to your local police. I have actual suspects that may help lead law enforcement to this criminals from several universities, including MIT and U of Maryland, I would love to give their names to you.


Dear Rhyshovey:

So how does one seek help in this situation if the ACLU and other such entities along with our "noble" FBI don't help?


Look up the case file on the internet for John St. Clair Akwai (or Akwei) and Jesus Maldonado who were all victims of government surveillance systems. My group confirmed with a private detective agency the existence of microwave surveillance and the side effect of that is physical illness and it can cause auditory sounds similar to schizophrenia or depression. It is a clever way to discredit the victims. However, if you can’t get legal help and know for sure who the person (people) involved in this without a doubt, but without the hard evidence to prove it, perhaps giving their identities away via a website or perhaps to 3rd party entities (foreign nations/agencies/groups) may be an effective means for retribution. Visit http://www.us-government-torture.com and mindcontrolforums.com

Rhys Hovey

In response to razorhead, and our dear, Noble FBI,.. NO ONE will help these victims,. if you call the FBI as a "mind control" victim, you will most likely get fake call takers, and online you will get blocked and erased by their ISP, Akamai technologies,. NO ONE will help these victims,. not the ACLU,. not Amnesty, not OBAMA,. these are the victims of rich american computer mobsters,. almost all resources for these victims are owned by the mob to mislead,. PLEASE JUST WARN YOUR KIDS about so-called voices behind their backs in the shopping malls, and while sitting at their home computers.

mind control victim

well i want to know is their will be any updates on mind control ,its we get eextreame abuse and mind control broiling my brain and body and turn it to sick joke,its like i get paid for making my brain suffer from extreame broil in the brain with sick radiation
please send and pay mind contorl attention becuase its way sick poiling our brain in our sleep in our own houses for un known reasons


There is absolutly one thing that I can assure you from knowing several mind control victims, is that you will sustain NO physical damage from TV signals and quiet ultrasound,. mind control victims believe these blufs,. get scrared and hurt themselves in a pannic. I know one girl who has been a victim of this computer system for almost 10 years,. remmber it is almost ALL computer automated,. no wants to spend the time it takes to do this to a person manually,. this thing may have been invented for corperate use on our chilren. I suggest you spit on FBI agents,. it's their fault.


Sign Up for Breaking News