Greed Consumes Itself... as seen in the ouroboros.
Declaration of Independance
Constitution of the United States of America
Helsinki Final Act, 1975
UN Universal Declaration of Human Rights
Geneva (all accords, conventions for hostages and prisoners)
Law of Nations -
(Summary Executions) Violates U.S. Constitution Fifth Amendment (1791)
Prevention: "Governments shall prohibit by law all extra-legal, arbitrary, and summary executions and shall ensure that any such executions are recognized as offenses under these criminal laws; and are punishable by appropriate penalties which take into account the seriousness of such offenses."
"Causing disappearance" is a universally recognized wrong under the Law of Nations.
(California, U.S.A. international tort)
"Enforced disappearance of persons" means "the arrest, detention or abduction of persons by, or with the authorization, support or acquiescence of, a State or a political organization, followed by a refusal to acknowledge that deprivation of freedom or to give information on the fate or whereabouts of those persons, with the intention of removing them from the protection of the law for a prolonged period of time." Rome Statute of the International Criminal Court art. 7(2)(i), July 17, 1998, 2187 U.N.T.S. 90 [hereinafter Rome Statute].
"Enforced disappearance undermines the deepest values of any society committed to respect for the rule of law, human rights and fundamenta freedoms, and... the systematic practice of such acts is of the nature of a crime against humanity." (Declaration on the Protection of All Persons from Enforced Disappearance.)
(Condemned): "The practice of killing and executing political opponents or suspected offenders carried out by armed forces, law enforcement or other governmental agencies or by paramilitary or political groups under the overt or tacit authority of government officials..." (1980 Sixth United Nations Congress on the Prevention of Crime and Treatment of Offenders (Held in Caracas, VZ)
??The right to be "rescued??
"The writ of Habeas Corpus may be imposed.. the judge is to resolve the issue immediately, even while there is a state of siege.
(Constitution of Argentina)
Habeas Corpus, Impunity
Reference: European Commission for the Protection of Human Rights and Fundamental Freedoms
Human Rights Watch
UN High Commissioner for Human Rights
International Covenant on Civil and Political Rights
International Covenant on Economic, Social, and Cultural Rights
Organization for Security and Cooperation in Europe
Regional Human Rights Systems
UPDATE JUNE 6, 2017: On Facebook, I entered and shared: "See the cut in the doily? Some of my tools were also thrown out onto the lawn, this morning, followed by a threat, aloud, that further attacks are forth-coming from the blond woman I call nutty buddy herself and her corrupt so-called police personnel friends. This comes on the heels of all attackers being ordered by the gov't. and contractors to cease attacks upon the targeted individuals and the U.S.A. and allies. Attacker is a known white woman who loudly and blatently lies and conducts herself as aggressor and then threatens to play innocent harmed individual. She has been seen in Alpharetta, GA, USA, and was on foot this time. A white pickup truck was also present and she has been seen in a white small car with horizontal racks many times before. I accuse and charge this individual white woman with being an enemy of the U.S.A. at war and a physical threat to humans and property. She accuses me of killing a cat that already has an admitted killer and of creating bowl litter when that is already recorded by others who have already acknowledged that they know who is responsible. Obviously it would not be me. Attacker poses as cat feeder and says she works at hospital. Unsafe." Note: Attacker is neither Gigi Whiteside nor Amanda Whiteside. Attacker used the name Marian on one occasion.
UPDATE: MAY 26, 2017
Today would have been my mother's birthday. She died at Reston, VA Hospital Center's Hospice on January 1, 2004. I found out today that I will need to provide Real-ID in order to purchase a copy of her death certificate. As an opponent of the police-state Real-ID Act No. 215, I am placed in the position of having to ask others to let me copy their copies of the certificate, which I can do. I am Florence Heitmann Lawson's oldest living child. This is another example of the problems caused by that treasonous and unConstitutional piece of legislation. And, no. The spies and crimes have not yet stopped as of this date.
UPDATE: JULY 23, 2016.
Asha Ariel Aleia (same biometric as Melinda Ann Lawson Tressler, formerly aka Lynda Tressler, pre-1988) remains trapped on the technology despite repeated claims that her attackers had removed her. Ditto can be said for the remainder of the list of individuals who were targeted as a result of guilt by association with Asha A. Aleia. Asha reminds the reader that another term for her is the "way" and/or "nexix," whether referring to wormholes, nexus, and tunnels, channels, or crossovers to parallel universes. Ask yourself: why is it that engineers of quantuum or other physics-related advanced technologies and their workers or students can manage to obtain hundreds of millions of dollars of contract and r&d funding because of their expertise and inventions, but seem incompetent to locate and remove the programs, algorythms, or biometric addresses of incorrectly and illegally targeted individuals trapped in their systems? We are not your patent protected property, government chattel nor legitimate convicts or test subjects. Nor does the kidnapping and harm of these individuals qualify for state secrets protection or top secret classification. The genious is to be admired and the technology is interesting. BUT using unwilling victims is NOT THE WAY!! Violation of FREE WILL.
UPDATE DECEMBER 26, 2016 Chemtrails are an example of technologies which could be used to save lives and crops...or to destroy them. Directed energy attacks or "traveling" pinpoint attacks which use weather elements such as rain, lightning, wind, temperature or tidal forces along with force fields for pre-addressed specific particular harm to individuals or the individuals' properties constitute acts of war. We possess the technological ability and the technology users to be able to help or harm even our own citizen public. Who is minding the store in regard to removing outdated, expired, inappropriate biometrics, John Henrys, bar codes or other tracking info which directs advanced weaponry against non-volunteer, non-convict, non-chattel human beings and other biological and botanical life??
UPDATE NOVEMBER 14, 2016: The question remains and applies to all Presidential candidates: On what date will you finally release the illegitimately blacksite renditioned advanced weapons targeted individuals, such as Asha Ariel Aleia/Melinda Ann Lawson Tressler et al? None of you??
UPDATE MAY 19 and May 25, 2016
Old-fashioned attack methods continue in the United States of America in the 21st Century: Contractors or military/police/government solicitors pay to use trained, lured and (by employing advanced technology) controlled/wrapped animals, such as raccoons, for purposes of harm. The animals invade inside private homes, storage buildings or property which belong to or house a human target or their property. These attacks constitute destructive and/or dangerous planned agression. Using animals to harm, steal from, or intimidate the general population is barbaric, illegal, and appeals only to degenerated minds.
UPDATE: APRIL 4, 2016
Lance C. Ringhaver, a former employer of Lynda Tressler in Florida (amplified or expanded watchlist person or CT expired list individual?)
was killed when a red semi flatbed truck, driven by Isbel Perez Guzman (according to newspaper reports) "just happened" to pull out and basically block his path on Hwy. 41 before he could stop. Guzman, uninjured, was cited only for failure to yield the right of way. Was this another assassination? Sure feels like it. Ironic that Lance owned a large heavy equipment business, the type which might use large flatbeds to deliver Caterpillar tractors or relateds. Was it a setup by pros trained to stop fleeing vehicles by blocking the highway completely with large trucks/firetrucks/semis or those individuals trained to create crashes, having witnesses to the training/work?
UPDATE JANUARY 7, 2016
To this date, the targeting continues and the "contractors" and "agendas" continue to harm Asha Ariel Aleia (Nee Lawson) and the many other targeted/marked persons who have been harmed intentionally by these cowards and liars. Asha thanks the whistleblowers and those who have been and continue to work toward ending this enormous harvesting of human beings for nefarious agendas and associated coverups. Now they say that "maybe 2017 or 2022 or when the blindsited hostages die" it will end. But while listed folks have died already, their impostors continue to use the deceased's identities and histories/dossiers. So, frankly, who would believe such so-called government and civil defense claims?
REAL ID ACT 215
To top it off, The Constitution has been altered to, effectively, change birthrights to privileges of Declared Residents only and even that privilege being potentially revokable or nonrenewed in some instances in the future. The Real ID Act 215 is, in this writer's opinion, UnConstitional and in conflict with other, previously existing Rights, such as the free speech rights, which include the Right to Remain Silent, re-emphasized by Miranda Right and the Fifth Amendment. The Act Requires Declaration of Residency status (violating right to remain silent) and the presumption that each and every person in the USA is a criminal until proven innocent by Declaration and Proof of said Declaration (violation of "innocent until proven guilty" and Fifth Amendment) The Act ultimately overthrows the basis of our Constitution and robs America's citizens of their birthright. What about those oaths to protect and defend the Constitution? REPEAL this act and rewrite it or drop it all together. Asha chooses to remain hopeful though NOT deceived.
UPDATE JULY 25, 2013:
The news networks are filled with stories about the government employee whistleblower who "OUTed" the NSA for wiretapping citizens all across the nation, directly or indirectly leading to the Congressional Oversight Committee charging that the representative for NSA had misled, falsely testified or lied to the committee regarding the extent and nature of its wiretapping of USA citizens. NSA countered that it was only accessing "metadata." Since everything is basically metadata, is that not an admission, also??
UPDATE AUGUST, 2012:
MUST BE DONE NOW
Read this link for what you can do for starters...
Still not ended - why has Asha Ariel Aleia's biological address and other vectoring information not been removed from the entire weapons/stalking/theft machine - the "killing machine?"
UPDATE FEBRUARY, 2012:
H.R. 3051 sponsored by Rep. D. Kucinich and 15 others would abolish the federal death penalty for such things as treason and espionage. It has gone to sub-committee. New Jersey has repealed its state death penalty.
"Multilevel Killing Machine... Wall of Confusion..." Racketeering... THERE IS NO TERRORIST ON U.S.A. SOIL,
NO WAR TIME DECLARATION,
NO COMETS CRASHING TO EARTH...
WHY CONTINUE FEMA/GEMA FUNDS OR PERSONNEL ORDERS/CONTRACTS?
FRAUD - TREASON - ILLEGAL WAR FLAGS WHICH SEND OUT PERSONNEL/ORDERS/FUNDS TO ATTACK U.S. CITIZENS: YOU DO NOT HAVE THE AUTHORIZATION TO DECLARE WAR ON BEHALF OF THE UNITED STATES OF AMERICA. ATTACKING THE CITIZENS WITH OPS LANGUAGE OPTIONS, MILITARY EVASIVE MANEUVERS, TECHNOLOGY, HOSTAGE TAKING AND "WAR" FLAG CONSTITUTES A DECLARATION (ACT) OF WAR AGAINST THE U.S.A.
WHO IS TO BE HELD RESPONSIBLE?
WHY IS IT NOT STOPPED AT ONCE - BY END OF THIS DAY? WHAT EXCUSE TO CONTINUE?
YOUR ONLY OPTION: RELEASE THE HOSTAGE (ASHA ARIEL ALEIA), ANY ROBOTIC TECHNOLOGY (SPIRIT ROVer?) AND ITS SOFTWARE/HARDWARE/SUPPLIES) IMMEDIATELY (INCLUDING ALL HUMAN AND COMPUTER BRAIN/EMF ACCESSING TECHNOLOGY).
What is the crime?
What terrorist, spy, dangerous persons are there here? Noone on this particular list of human beings - citizens of the USA and other allies of the USA - persons who were all cleared (300%) at the beginning - OR SHOULD WE SAY JUST AFTER THE BEGINNING OF THE PUNISHMENT PHASE THE NEGATIVE CONSEQUENCES PHASE, THE PHASE WHICH WOULD NORMALLY COME AFTER A GUILTY VERDICT AND IN A COURT OF LAW and which would not include assassins and other executions. Violations of protocol - FBI protocol for example - resulted in this mess of enormous proportions. Stop stalling and allowing the technology to continue to be used illegally on this particular citizen of the U.S.A. (Asha Ariel Aleia) and these many hundred/thousand other innocent citizens, already harmed and perhaps next for the EM weapons of the killing/disappearance/replacement machine. Asha Ariel Aleia's biological address, programmed into the system, gives it away: the destination of your signal will always be this address until it is changed. Rerouting/relaying do not deter the eventual connection with the end destination/start destination of your signals: Theft of biological address of a U.S. citizen on home soil with no legitimate cause and no legitimate permissions. This is malice murder at the least or intent to harm, etc.
T H E
V U L N E R A B L E S S E R I E S
R A C K E T E E R S
I N A M E R I C A
WHAT IS OOPS? WWOOPS?? MOOPS?? POOPS?? WOOPS?? SNOOPS, WWWOOPS, FOOPS, TROOPS?? TREASON.
OPS = OPPOSITES (of facts or truth, by definition, (usually short for "operations.")
Examples: Opposite of innocent = guilty; opposite of citizen = stateless; opposite of female = male; opposite of white = black; opposite of 5'6" = 6'5" (5'5-1/2" rounded up to 5'6", first); opposite of cease and desist = continue and do not stop no matter what; opposite of illegal operation = legal operation; opposite of here and now = some other time/some other place = not now (also termed, "never"); opposite of closed case = open case; opposite of dead = alive; opposite of the end/final = resurrection or "never ending." Thus the resurrection system/racketeering by way of the killing machine and wall of confusion and the enabling of attacks on the United States of America for profit by those within and without the borders of the country = illegal acts of war/theft by deception of FEMA authority and funding by way of the Dept. of Homeland Security and its partnering contractors or other agencies/branches/departments/schools of government. This has already resulted in illegal armies/weapons/attacks/occupation of the territory of the United States and its citizens and their property Despite notification and knowledge of the situation, a complete dismantling of the technology and the walls, ending of shifts of participating personnel, students, and others, dismantling of the incommunicados (all) = HAS NOT YET HAPPENED IN ALL THESE YEARS!.
NO EXCUSE TO CONTINUE.
TO WHOM IT MAY CONCERN...
Asha Aleia, Asha Ariel Aleia, owner of Asha of Antares is NOT: a satellite, robot, computer, planet, iceburg nor other inanimate object, spy, spy student, military personnel, professional thief nor assassin. Nor did she agree to be the substitute for one. Please check your wiring and software systems...
BEWARE TERMINOLOGY THAT IS SIMULTANEOUSLY SIMILAR WHILE HAVING TOTALLY DIFFERENT APPLICATIONS! Example? "Altered Dimensions" or "Total Possession" are terms used by militaries or criminal scientists for sinister purposes while also used with the standard psychic interpretations and useage in the non-militarized and non-technological psychic community. "Paranormal" and "Paramilitary" are NOT THE SAME AT ALL. This is not to say, however, that they do not ever cross paths. That "evil spirit" who must be "exorcized" from the stricken human being or pet may well be an operator in a military or experimental operation using advanced technology on a mark or target or a substitute for himself or herself. The target, unless rescued, will die or be lost to imprisonment, disappearance and torture/other use. Yes it is that serious.
Some of the crimes?
Part two of Listcase.
ELECTIONS 2011: Why would a thinking ciitizen vote for anyone who has not put a stop to the events spoken about in "Target" and "Listcase" of "Racketeers In America?" asks Asha Ariel Aleia. Asha was told to wait until "after the election" back in 2006!!! "How many more elections?" she asks in 2016. After this it will be the next Presidential election...and then another. The time is NOW, not at political convenience, which would be never...
"MAD, BAD AND DANGEROUS TO KNOW."
Said of Lord Byron by Lady Lamb.
Would this world famous writer have made the terror list today?
"Tis strange - but true; for truth is always strange; stranger than fiction." Lord Byron, 1788
"'Curiouser and curiouser!' cried Alice." Lewis Carroll
(Fictional President:)"What do you know about..."
(Fictional citizen:)"I know you should have picked a better cover story..."
(Fictional President:)" And I can't appeal to your sense of what's in the nation's best interest?"
(Fictional citizen:)"I always thought that truth was in the nation's best interest." Deep Impact, excerpt from the movie.
"REEL 752" "7-1/2 FLOOR" "Uses emergency stop to get to it." From Being John Malkovich
"This portal is mine and it must be sealed up forever. For the love of God." (Malkovich) "With all due respect, sir, I discovered that portal. It's my livelihood." (Schwartz) "It's my head, Schwartz. It's my head. I will see you in court!" (Malkovich) From Being John Malkovich
Sounds just like an intro to what is currently being done with the technology that has been also "weaponized" and has been used against Asha Ariel Aleia, located in the USA and a USA citizen - how many more???
Theft of biological markers? Tracking/stalking using high tech and entry into the electromagnetic field of Ms. Aleia's human body and brain/mind/spirit for purposes of harm.
(Part of the 21st century version of identity theft and a method of operation for physical harm.)
FEMA (FEDERAL) AND STATE EMERGENCY FUNDS: Detach the killing machine/disappearance machine from FEMA/GEMA and other state emergency funding/authorizations/designations. Do not renew on October 1!! Discourage racketeering by cutting off their "disaster" or "war" flags.
True Fact: Take down the broadband currently in use (2006-2011) and dismantle it, until all biological addresses, hostages, hidden weapons and devices are removed...
Public safety hazard: OPS (oops) opposites and SMS similars for communications language options, functions language options and keyword/selection/voice altered/voice on command language options: set all intelligent software to SAMS (las mismas) language option immediately and permanently. Accept no identification for services except biometric live testing onsite - no previously typed results. No altered devices. IDs are no longer reliable. Homeland Security and its contractors and criminals/spies have completely destroyed their safe use. Passwords and code words for computer software accounts and bank accounts are also permanently compromised by overwhelming technology which is now prevalent in the criminal world and encroaching government employees, rendering these codes useless except in the case of the smallest of criminal attempts. REMOVE ALL INCOMMUNICADOS FOR HUMANS AND ROBOTS - NOW. Take down Voice Altering Software from weapons channels and espionage frequencies and other broadcasts that are paid for by tax dollars - they are a huge national security breach. So is the practice of military evasive techniques - used while "hitting and running" with weaponry (nmd's and Pelicans （sp?）E.M.Pulse, microwave V2K, D.E.W, for example) against legal U.S.A. citizens on their home soil - CIVILIANS! This is an illegal act of war and treason: Dept. of Homeland Security (incl. FBI and ICE and Dept. of Justice, etc.): you are charged with TREASON AND ILLEGAL ACTS OF WAR. YOU STARTED IT - YOU WERE ORDERED TO STOP IT AND YOU HAVE NOT... It is your responsibility. Cease all operations and take down that illegal broadband, etc.with its human hostages and human "marks" and illegal, even non-existing targets - and desist at once.
In a secretly administered war or experiment, i.e. "classifications levels," it becomes very hard for the public to know who the "good guys" are and the public knows only that bad and terrible things are happening to the people of the world and to their own families and even their own selves. When scientists, students or military go missing or are murdered, there is the question: Did the bad guys silence a good guy? Did a bad guy get what he deserved but without publicity as to who, what took care of disposing of him? SECRETS KILL BOTH SIDES AND HIDE THE TRUTH. One internet article (if still available) lists 300 deaths of employees which are questionably connected to such secrets:
Dead Scientists Who Knew Important Secrets
UPDATE MARCH 1, 2016
THANK YOU MAGISTRATE JUDGE JAMES ORENSTEIN for the wisdom to take known prior events and a knowledge of the Constitution of the USA to say "no" to those government agencies who would, once again, have abused power to participate in the "framing" of innocent folks. There is already established in facts and confessions and known prior legal cases, the practice of agencies and contractors teaching and using advanced technology to enter locked vaults using "wraps" and SMART shapes. THIS ALLOWS THE THIEF to enter the vault with the victim to see what is there or photograph it or take it or harm the human himself-total hostile possession aka silent killer/silent thief. My experience with passwords has been that the only person prevented from entering my protected account was my own self! Thieves were already inside and even called me "slow"in getting in. They have numerous ways to enter already. So, you may ask, why bother to ask for the law's blessing from the magistrate judge for designing another method. First, it distracts from checking out the MORE INVASIVE techniques when they are already being employed and which can be deadlier. Second, it helps those who want to create "apparent evidence" against an individual who is being framed. Imagine that one person/team hacks the phone and puts incriminating info on it. Subsequently, a second individual/team "finds" it on the phone of their "target" or "mark," establishing a case which results in his arrest or death or ruination or all of the above. History shows it has already been done: NSA and Treasury Department conspired to "frame" individuals for financial crimes or for supporting terrorism so that government agencies could justify placing the targeted individual on what can only be nicknamed "death lists." FBI Inspector General Glenn Fine testified before Congress that as many as 35% of 1.1 million human beings had been placed on lists at the time who did not qualify AT ALL in the first place and yet were still on the lists years later: to be there in such extreme danger for their life, property and reputation. And what has been done to date to end the attacks on them and to restore them? Where are the victims all these years later? The REAL ID ACT, (another case) as enforced, sets a dangerous precedent and must surely be Unconstitutional and would not even achieve its goal regarding terrorists or illegal immigration. The Real ID Act's current enforcement requirements set the precedent of overthrowing the Foundational Law of our country's government, The Constitution of the United States of America, instead of complying with it. In the APPLE, INC case, thanks to Judge Orenstein's decision to DENY government (Justice Department) in regard to its desire to interpret the All Writs Act of 1789 as giving government the authority to force APPLE, INC. to comply with demand the demand of agents. (APPLE challenged the government's desire to force it to create a "back door" for government's hackers to use for the purposes of harming the owner) While we can certainly understand an investigator wanting to have all the available and most advanced tools at his/her disposal and authority to use them, we do not want to throw out our country in pursuit of a case. A disastrous second precedent has been at least delayed while calm heads THINK first.
MARCH 1, 2016- DEVELOPMENT IN THE NEWS
Wanted to remind folks that I am not usually a "political" sort so my commenting on a few government issues is the exception and it is because they are of "life and death" importance to me and others; neither for political agenda nor politics as usual for gain. But, while I am addressing this issue, in that vein, I want to ask Supreme Court Justice Thomas: Now that a convenient 10 years has elapsed (since 2006) and you are speaking again, (per article in THE WALL STREET JOURNAL March 1, 2016): What is your opinion of my claim that the Real ID Act, as enforced, is most UNConstitutional, to put it as understatement? If you agree that it was and is Unconstitutional, why did you remain silent for 10 years about it, if you did? You have the right to be silent but WHY WOULD YOU??
|"Well, not to be a... nudge, but you do realise how many people we have after us. We probably have
our own satellite by now." (National Treasure)|
AMERICA 2011: TREASON - ILLEGAL ACTS OF WAR - WEAPONS OF MASS DESTRUCTION - CYCLOTRON MAZERS - PARTICLE ACCELERATORS - SYNCHROTRONS - CONTRACTS - CERTIFICATIONS - WMD AND NMD (INDIVIDUAL AND WMD) FOR WEAPON USE IN AMERICA ON CITIZENS AND INCONVENIENT (BITCH) CASES) ... LISTS OF INNOCENT PERSONS PRINTED IN OPPOSITES WHICH DO NOT TRANSLATE BACK MODE - BROADBAND CHANNELS WITH WEAPONS ATTACHED... USED AGAINST AMERICAN CITIZENS HERE IN AMERICA... DARPA - BROOKHAVEN - OAK RIDGE - MILITARY - POLICE - SPIES - CONTRACT CRIMINALS AND VOLUNTEERS - SPECIAL PERMISSION TO COMMIT CRIMES AGAINST CITIZENS - KILLING MACHINE/WALL OF CONFUSION UNDER GUISE AS TRAINING ONLY AND WEAPONS CERTIFICATION AND OTHER "BLONDE HAIR" (BIN LADEN?) TREATMENT - ALL FIVE CATEGORIES OF DESTRUCTION CHOSEN FOR AN AT WILL CITIZEN (AND HOW MANY, MANY OTHERS)
NATIONAL SECURITY COUNCIL... THIS IS ON YOUR WATCH... FIRST PATRIOT ACT PUTS PERSONS ON A DEFACTO DEATH LIST WITHOUT PROBABLE CAUSE, THEN PERSONS ARE HIRED BY THE GOVERNMENT TO FRAME U.S. CITIZENS WHO HAVE NO PROBABLE CAUSE AGAINST THEM AND THEN THIS. WHEN WILL ASHA ARIEL ALEIA/MELINDA LAWSON TRESSLER BE TAKEN OFF THE TREATMENT (IN REALITY AND NOT JUST ON PAPER)FOR WHAT MUST BE THE LARGEST CRIME IN AMERICAN HISTORY) AGAINST HER AND THE U.S.A.
TAKE DOWN THE ENTIRE BROADBAND THEY USE MANUALLY - NOT WITH WORDS WITH A "VOICE ON COMMAND" OR "VOICE ACTIVATED" SYSTEM! STOP ALLOWING THEM TO BROADCAST VERBALLY OR TELEPATHICALLY ON THE SYSTEM OR IN THE "WRAPS" SINCE PRACTICALLY EVERY WORD OUT OF THEIR MOUTHS/THOUGHTS IS CODED TO KEEP THE SYSTEM/WEAPONS ON OR BRING THE SYSTEM BACK UP. THEIR "OPERATIONS" ARE NOT ONLY ILLEGAL, BUT ARE ALL CODED COMMANDS. LANGUAGE IS IN OPPOSITES TO DECEIVE AND GIVE APPEARANCE OF LEGALITY OR COOPERATION. EVEN IN "SAMS" MODE ATTEMPTS CONTINUE TO USE COMMANDS. BROADBAND MUST BE MANUALLY TAKEN DOWN BY HAVING MILITARY TROOPS (NON-INTELLIGENCE) APPEAR AT ALL SITES AND DISMANTLE THE COMPUTERS... TAKE THE Y2K COMPUTERS OUT OF SERVICE... ERASE AND REMOVE COMPLETELY MY BIOLOGICAL ADDRESS FROM ALL DEVICES, WEAPONS, AND CHANNELS.. REMOVE WEAPONRY FROM SIGNALS... ARREST EVERY ONE INVOLVED AND CLEAN OUT THE KILLING MACHINE-ALL LEVELS. TAKE DOWN THE WALL OF CONFUSION... REMOVE THE INCOMMUNICADOS FROM MYSELF AND THE ROVER AND ANY OTHERS.... REMOVE THE "PELICAN" AND THE "WRAP" WHICH USE MY STOLEN BIOLOGICAL ADDRESS. REMOVE WHAT AMOUNTS TO "DEATH LISTS." THIS IS NOT A FOREIGN WAR ALTHOUGH IT IS BEING CONDUCTED IN WAR MODE AND AGAINST THE AMERICAN CITIZEN AND AMERICA'S INDUSTRIES. THIS IS AN INVASION AND AN OCCUPATION AND A ROBBERY. THIS IS MURDER USING BRAIN-INVASION CRIMES AS WELL AS THE CONVENTIONAL KIND. THIS IS OBVIOUS TREASON. TAKING YEARS AND YEARS TO "SOLVE" THE OBVIOUS IS ALSO TREASON.....IT IS ON YOUR WATCH. IT IS YOUR RESPONSIBILITY PRES. BARACK OBAMA, VP JOSEPH R. BIDEN, JR., HILLARY RODHAM CLINTON, ROBERT M. GATES, DENNIS C. BLAIR, ADM. MICHAEL G. MULLEN, USN, TIMOTHY F. GEITHNER, GREGORY B. CRAIG, JAMES L. JONES, JR. LAWRENCE H. SUMMERS, JAMES L. JONES, JR. THOMAS E. DONLION... STOP THE INVASION AND TREASON NOW OR STEP DOWN AND ALLOW SOMEONE ELSE TO DO SO.
EMBARRASSING = SAVE ONE AND SAVE BOTH
Originaly it was said that "embarrassing" meant that one would live and one would die. Does it also stand for EM technology and/or THE PROGRAM and other operations? For example, why is the Brian Nichols case and the Asha Ariel Aleia case mixed together, except for the government agents involved and the money? The cases have nothing to do with each other. The same can be said for the Nikolas case and the Hurricane Katrina victims case - all have nothing to do with Asha... unless you consider that the criminals managing this case wanted to conceal her within the contents of other cases and keep the money coming in (FEMA fraud?) as well. We have a technology communication disaster on the national and international level and, rather than speaking in codes and carrying out contracts to "kill" each other and our own technology, it is imperative that we make manual repairs to all software on all devices so that the language that the computer's mind speaks to itself will be consistent and clear to it and to the user and to other devices and each with the other. One cannot sequence or travel or turn on/off if the computer's brain is set on "opposites: up=down, true=false! True=true. Equal=equal.
Save the Mars ROVer, Save the Human citizens, save the intelligent computers, include the international community (manually, mano a mano, face to face communication until the repairs are made worldwide and in space.
"One is dead already. Two will remain understanding" = read in the opposite direction. (1-2-3 becomes 3-2-1; therefore, we are going in the opposite direction: "OPPOSITES:")
The opposite of understanding becomes opposite in both tense (future becomes past) and word "remains understanding" and the translation becomes: remains understanding = became mis-communication (misunderstanding). Step 2 is "miscommunication." One (opposite) becomes zero or does not exist at all (1-1=0). If you proceed from ONE to TWO (misunderstanding), then THREE will be apocolypse (disaster and chaos. And BECAUSE everything is "opposites" language in the technology settings (default and language options settings for definitions and words/terms for all devices, instruments, vehicles, weapons, communications, reports, contracts, orders), then, in the reverse direction, it all reads: THREE = "oasis," then TWO = misunderstanding/miscommunication and then ONE=ZERO (no one left = we do not exist - on both sides). The answer obviously lies in step TWO: REPAIR SETTINGS SO THAT THEY ALL SAY "SAMES" FOR LANGUAGE DEFAULT OPTIONS ON ALL DEVICES. Same for inside pages. ALL DEVICES, NO EXCEPTIONS. NOW-NOT LATER. What has become "Death - imprisonment-loss of all pleasure and prosperity" becomes again "Life, Liberty, and Pursuit of Happiness," its opposite.
Save the others and save yourself.
If the original Homeland Security computer was defaulted or otherwise set to "opposites" for either definitions or terms or both for language, then "innocent U.S. citizen with family and no crimes and normal priority, female, white" becomes "guilty, foreign male loner, black with every crime in the book, which would then include murder, treason, terrorism, spying, espionage, etc. and top priority for Homeland Security." This is not only a "frame job" but a deliberate falsifying of every report and description, resulting in other devices acting with opposite data or language or commands, if any were intelligible to the computer at all. This last would endanger any devices such as Rover space vehicles, trains, automobiles or airplanes and weaponry
Instead of extending legal protections for criminal behaviors, repair the computer problems caused by humans in the first place and watch how quickly all those persons and robots and bank accounts for homeland security systems past and present repair themselves and so-called foreigners or terror-related persons and "lone wolves" become innocent American citizens with families, etc. Change the original internal computer language definitions/terms pages and settings all to "sames" === and do not use other settings such as "similar" or "opposite" which totally changed the definitions of the list itself and all other communications since that day years and years ago!!! Instead of killing humans and rovers and accounts, repair computer defaults and pages... alternately this is treason.
"Dusty" (Rusty?) Foggo in jail
(Is there a Phago in any other CIA?-ed.)
"Prosecutors dropped 27 other counts against him and agreed to seek a prison term no longer than three years and a month. Read more at: "Ex CIA Executive Pleads Guilty..." Not naming names gets 27 charges dropped... this is not a matter of national security... who else should be in jail? "Conflict of interest" benefits criminals? Dusty Rhodes? Assorted criminals?.... Use of scanners, split laser weapons, stun guns and more on this and other U.S. citizens in both illegal ways and immature judgements. Hiding bigger changes... changes in the definition of "citizen."
HENRY PAULSON AND TIMOTHY GEITHNER TREASURY SECRETARIES.
ON THEIR WATCHES: OFAC/THE PROGRAM
Presidents and Royalty have been notified over the years: Presidents Gerald Ford, Ronald Reagan, George H. W. Bush, William Clinton, George W. Bush and Barack Obama, as well as, Great Britain's Queen Elizabeth II, and Jordan's Queen Noor.
ON THEIR WATCH: TERROR LISTS/THE PROGRAM/EXECUTIVE ORDERS
EXECUTIVE ORDER NO. 13224. OFAC. Asha is an American citizen. When they attempted to "frame" Asha for "The Program," the criminal got caught and confessed. Later, whistleblowers like Agent Tamm informed the world about "The Program - Executive Orders." The money and all those criminals who keep this nonsense going need to be rounded up (including those working "p.click/GA Tech/incommunicados") and other espionage devices used to attack the business and others like Yahoo Small Business. Apparently, she was also placed on the OFAC list, a list for FOREIGN "enemies of the state" by hiding birth/citizenship documents. She apparently was also placed on the Terror List PRIOR TO REVIEW by the Committee for the List, despite protocol which calls for the review to come first. Three-for-three: The Program, OFAC, Terror List. Framed (proven), illegally classified as "foreign" enemy of the state (proven) and wrongly placed on Terror List by placing name on list without review first (proven). Asha of Antares does intend to prosecute and sue for all losses and inconveniences and delays caused by interruptions or theft of services and defamations. The government of the United States of America and through its representatives and agents and contractors/subcontractors is hereby informed as are other parties. Who has been jailed/fired or otherwise stopped from this criminal practice?
Was DARPA involved? How many other "ARPAs", and advanced technologies?
Solving this case is hampered by the use of code words and cover names which are then reversed or switched with something else so that it is necessary to solve for each person, place, thing, state, phrase or word, even when it is provided as a solution. The use of twin names, cities, and companies also conceals the real location. The result is that the date, location and person involved in the crime report/testimony can be deliberately misleading. Example: Sandy Springs, GA and Sandy Spring, MD; Atlanta, GA and Atlanta, VA; Roswell, GA and Roswell, NM; Johns Creek, GA and Johns Creek, MI. Are the other locations provided on the report the sites where criminals remotely ccmmit these crimes affecting vitims in Georgia? Or is this deception? Are these locations just wild geese? Spy dates are especially confusing and assist in hiding files, as well. If the key to the dating system is missing, a file from 2006 may actually be filed in the section for the 1960s, 1970s or 1980s where it is unlikely to be found in a file search for evidence. This obstructs justice in that it conceals evidence and serves during trial to make it appear that the criminal was at a different location than the victim at the time of the crime and helps them to avoid both prosecution and restitution/civil lawsuit seeking financial responsibility.
FULTON COUNTY, GA: DISTRICT ATTORNEY PAUL HOWARD'S OFFICE PHONE kept stalking my cell phone weekly. Where is accountability?
FULTON COUNTRY SERVICES INCLUDING THE PUBLIC LIBRARY'S CENTRAL LIBRARY LOCATION shamefully functioned as "spy central" along with GA Tech, allowing CIA, FBI, NSA, p.click, various contracting spies/espionage (electronic theft and other signal theft) to steal original content/images from my business files.
|RACKETEERS IN AMERICA asks: "Why are the Foundation and the school, and/or contracted agents, continuing to stalk, spy and defame Asha? Why are they collecting money or credits or tuition, more than a year after Dusty's imprisonment? ... 10 months (more?) since they LOST their bogus case? (Hint: Contracts, money, lies, coverup, illegal school credits... $70 million - $85 million?) Why is already admitted fraudulent information being repeated (for pay and credit) by agents/guards years after? (Asha is not and never has been an "alcoholic" despite insurance/other fraud. More importantly: they already know it. It has already been admitted.) Special Note to "Fraud, Waste, and Abuse" in Judiciary (and others): "$100 million - 5-year plan" qualifies and you've been out on it already. By the way, isn't this also Contempt of Courts and Security Fraud? Some are carrying weapons, some are in government vehicles, some are using spying devices and bluetooths, some are in train stations, trains, buses, etc. as they continue the illegal targeting of a U.S.A. citizen for financial profit, the commission of a crime/crimes, despite court rulings. Asha demands answers. Taxpayers are defrauded and Asha assaulted, robbed, defamed, frozen and locked illegally... blocking her normal commerce - in violation of the U.N. agreement. Her applied psi clients of （now 27）years deserve answers.|
To the spies: It's not "sad," it is criminal and the criminals are you. Cease and desist this racketeering and attack on U.S. citizens, their product, their businesses or commerce and their families."
**The number of these cases that were or were not "vulnerables" is not known by this author at this time. It was stated that they did not belong on the list in the first place and should not have remained on it.
****Asha Ariel Aleia is the original psychic and was exonerated completely in the case written about on this page. Other persons, who either "borrowed" her name illegally or otherwise used similar names, contributed to the confusion known as "The Aleias." (For example, OTHER PERSONS GOING BY THE NAME OF Asha Aleia, Marsha Aleia, Asha Aleia, etc. as enactresses, replacements or other, individuals who are not the same person as the above, but whose records and crimes, whether as spy, assassin, thief, or general criminal, were attached to the name of Asha Ariel Aleia, the psychic, resulting in death sentences for her, including "death by contract."
|Follow-up response from Asha at end of year 2008: |
To the one who asked today, "Is Asha mad?"
"I've been shot with a split laser device (weapon) in the head and heart and other body parts and hit numerous times; (DARPA is a part of the Dept. of Defense, as are many of the guards. Calling up troops, helicopters, drones, satellites, animals, and weapons in order to attack and/or guard A. U.S. citizen on U.S. soil, without cause (other than your financial profit), is tantamount to an ACT OF WAR, as well as Defense contract FRAUD (... is it not subversion and conversion of the military - troops and spies! And weapons!). I've been mental-health arrested and placed in a mental ward for telling the truth in order to silence me; I've had my blood drawn against my will to see if I was all-white; I've been detained in handcuffs and later stabbed with a needle containing Haldol (an anti-psychotic) while still in handcuffs, sober and sane - just for standing on the public sidewalk in the middle of the day. I do not put meds in my body; I do herbal teas. My express wishes not to be medicated were ignored. I was shoved against the wall. (Are they trying to disable my psychic ability?) I've had my copyrighted book and all articles, website and information stolen and given out to private special interests to claim as their own material and to profit from financially; I've had my auto destroyed and then impounded; my then almost 21-year old business' clients and business associates were told that they could not do business with me or that they would be in trouble, freezing my income; no one was allowed to assist me even in filing an accident report unless the other party (at fault) chose to do so; I've been falsely imprisoned 24/7/366 by guards for several years; I've been forced to continue to live apparently homelessly for years beyond the proposed "homeless project," i.e. "Target" end date (2005 or first quarter 2006) because of the original freeze on income and the machinations of various contractors and subcontractors since then; intimidation of clients and businesses and deliberate lying, spying, and illegal information gathering and disemination for financial profit and cover-up of illegal activities; I've been illegally wiretapped and hacked, watched as I bathed and dressed by males unknown to me and without permission; I've been defamed and lied about to the public with deliberate, false accusations for the purpose of targeting me and collecting many millions of dollars for themselves at my expense and that of my family by continuing the spying for years. I've been forced to "work" for the spies against my will, since all of my work was stolen on the spot on a daily basis.
Even now, persons claiming to represent the government are making "previously admitted fraudulent" claims that state that I am "an alcoholic." This is entirely untrue. Defamation and a pattern of vocalizing false charges against Asha Ariel Aleia by those who would continue this outrageous rape of the Constitution perpetuates prior enormously illegal and physically dangerous behavior.
That is a beginning sample of my past few years. I can say that I am outraged that the taxpayer is being duped and that there are victims of this - still in our time. The conclusion I have drawn is that those corrupt ones who exploit the persons they think cannot fight back, such as, silent majority, peaceful types（nonviolent and meditative types of beings）or homeless, mentally ill, recent immigrants, etc., is ongoing today. There was a timeline (past the Presidential election) and a cover-up and a payoff (millions).
As was predicted by the Vulnerables Series and the Racketeers In America (aka: Target Project) in particular, "living" the part of a vulnerable one for the purpose of bait was very effective and, unfortunately, not long in catching ones who purported to be keeping citizens safe! (Did they help the economy either? Who got paid and how much?) When the corrupt ones say, she is/was "homeless" know that this is their confession to the charges against them. They continue to try to justify the above illegal actions with the phrase, "she was homeless" (which is therefore, their self-spoken reason for attacks upon her person and possessions in manners which are illegal without cause. Are they saying that homelessness is cause? What about being a "homeless advocate," "tutor to homeless families," "volunteers for homeless shelters," or other connection to "homelessness?" However, this was continued for the duration. Is "mad" the proper word for it? If you read the basis for the Vulnerables Project (Part I and Part II), you will see that this fits the concept presented there.
In the course of the several years of this case, Asha has been falsely accused of being an illegal alien, spy, terrorist or terrorist supporter, traitor or "knew too much," threatening the president, stealing a million dollars, connected or knew about a murder, broke Homeland Security's code... and being an alcoholic. CHARGES
Mad is not the word."
Editor's Note: *Asha of Antares, the business, has never been homeless. Asha, the being, is neither alcoholic, addict, mentally ill or insane, or felon. She has income, friends, associates, clients and was already a known citizen and public speaker for decades when the "targeting" began.
She is not a genius. She is a professional psychic (since 12/17/88) and applied-psi expert of excellent reputation in the field. Even the Internal Revenue Service, who audited her practice in the 1990s passed her with flying colors.
To the spies: "Homelessness" of a U.S. citizen is not a crime and certainly is not probable cause - especially probable cause for spending millions (tens of millions, hundreds of millions) of taxpayer dollars to spy on, steal from, and prevent them from earning a living or receiving aid. What is the "appearance of homelessness?"
STILL NOT STOPPED... Are Asha Ariel Aleia, her business Asha of Antares, as well as various others, （wondering if confused with the MER-A, Mars Exploration ROVer named "Spirit"）are still being held in various states of "incommunicado," "immobile" "incognito" "do not prosper," "enemy of the state" and "death" states illegally - ( Was it a growth industry for various jobs, contracts, subcontracts, assignments, student and volunteer work for the U.S. government and its allies?) - this many years after it was known and stated that Asha A. Aleia was a known female caucasian U.S.A. citizen who was free-to-go, "at-will?" Asha could claim 400+ years descendancy from the Original Thirteen Colonies throughout the founding of the United States of America. Are they furthering legal, financial, and political futures and outcomes while continuing this illegal and treasonous hostage situation? Free the American hostages!
Do we need to call INTERPOL? If the Feds do not "stop the crime," "admit that this has been a series of illegal acts of war on a U.S. citizen on U.S. soil with no probable cause... (terror list? OFAC? Framed for "the program? and all that follows that... 4+ years...)
There is a need to close down sll orders/activities connected to (nicknamed) "Exhausteds" for: Asha Ariel Aleia, Melinda Lawson, Melinda Tressler, and all associated family names/other names. Some "Exhausteds" include: illegal access by the "criminals" to the U.S. citizen's telephone/telephone service, Email, regular mail telepathic communication, transportation, banking: credit/debit/other accounts. "Exhausteds" are illegal when placed in the #1 User position (interrupt/block) for all of these. It is also illegal to use "p.click" or other servers to hold or prevent delivery of files/mail.
The signal (frequency) being used for the purposes of torture/theft/brain damage,etc. has continued to be directed through Asha's brain unstopped since the inception of these crimes. A continual line of deliberate audible sounds made by paid contracted individuals/teams are then added so that the effect is a constant sonic attack (technology-driven combined with natural). Add to this the use of "transparency" and "push/jump" weapons and EMPs and you have another contracted period of attempts to destroy or take over the individual (sometimes called "total possession" or "total control." Since this is happening well after the case should have been closed and the "victims" rescued, it has finally and long-overdue become the time for outside forces to take stock of this situation... devices and organizations which may impact not only the immediate location, but can lead to expansion or copy-cat behavior. Not only greed at home but greed world-wide can lead to an unacceptable situation that could have been controlled and should have been controlled before it got out of hand... it is time to remind Interpol and the UN that these devices and technologies are being used on innocent citizens and not just their computers! A new investigation into why they have been assisted/allowed to continue despite being ruled illegal years ago has begun and names will be posted of the guilty of all sides/agencies. We demand that the signals be stopped/removed from Asha and that the devices be seized, hackers/tappers stopped as well as stalkers/encroachers/illegal guards/surveillance and the guilty arrested, etc. immediately. 2006 - 2010 and how many millions of tax dollars later?
UPDATE AND INVITATION 2009:
It has passed the time. Now is the time to get restraining orders, gag orders, and contempts of court for any persons continuing to engage in paper searches, gossip, and the illegal sharing of information about Asha's life (much of it has been defamational and fraudulent): also for anyone continuing to hack her mail, website, or phones, anyone guarding or stalking her, etc. In short, anyone continuing to work her case under the guise of "solving it." The courts have already spoken: They lost their bogus case long ago and there are also folks in jail and/or going. Some want to write checks. Why are these folks still being paid to perpetuate fraud and to continue a host of crimes against Asha, her family, and her business and product? Do they need to be removed in handcuffs? Asha is a U.S. citizen descended from 400 years of founders and citizens. She had worked professionally as a professional psychic and applied psi expert for 21 years in December 2009 (12/17/88). Where she lives is her private business. Why she lives that way is her privacy-protected business. Her current situation is clearly and provably the result of their illegal actions over the past few years. (What happened to her car, for example. How much did they cause in repairs?) Do the taxpayers need to demand restitution of those tens of millions of dollars, too? Now is the time. Actually, the time was several years ago.
UPDATE: MARCH 1, 2009 (ENTERED FEBRUARY 28, 2009):
Heard every day and night since December, 2008:
"She's Homeless?" "I'm shocked!"
Puhleese! So glad you've been following this webpage and project since its inception YEARS AGO! When one considers the fact that the background check and first-hand accounts, from the initial phase, when Asha was placed on the "list," clearly stated her "locale"; and, also, that other records which were "hacked" and/or handled by government moles indicated this, as well.... When you add the fact that this web page declared that Vulnerables Project Part II - Target - was designed to catch those who profiteer from people who "appear to be vulnerable and/or unable to fight back".... You are correct if you see through the latest spin from this group. They are shocked? Surprised? Spinning pure codwallow on our tax dollars? On Asha's life/career? Why? Remember the original concept? Get their money's worth (contracts, paychecks, equipment, hardware), cover-up, keep it going until after the election?
If you've been keeping track for several years now, you know that they've spun and spun - and deceived, intimidated, defrauded, stole, blocked target's communications, and conspired.... Now that the election has passed, they orchestrate the shocking discovery of what has been known from the start and advertised on this website - which the spies were paid to hack and to analyze.
Do you know about RICO? Racketeering and organized crime? Fraud? Greed? Special interests? Cover-up?
Asha hopes that those who are in positions to see the human cost of this, as well as the financial one, will take action to put an end to this practice at once. Apparently, this is not an isolated case, even today.
A NOTE ABOUT TIMING AND RACKETS:
As you may recall reading, conspiring agents, in the Fall of 2006, speaking inside the Library at Georgia Tech, a location replete with NSA, FBI, and other undercover agents, hackers, and spies, decided to "get their money's worth" before ending the case, which they admitted to knowing was wrong and illegal already. In subsequently overheard conversations between government agents (Einstein's Bagels, Atlanta, GA), it was noted that "three years and every day's the first day of school" pertained to the timing of this plan. Security Fraud? Conspiracy to racketeer? Coverup? Meanwhile knowing full well that Asha was being prevented from conducting her full time business and having all means to do so blocked by destruction of property, theft of mail and registered mail, hacking, wiretapping, defamation and "orders" to "freeze her assets."
EVEN MORE HEINOUS
SCANNERS, SPLIT-LASER WEAPONS, STUN GUNS, TASERS
EMPulse WEAPONS, INSTRAMENTS, and DEVICES: EMF SUITS WITH PUSH-STYLE TECHNOLOGY,
AND EM SHACKLES, TITT,
(THOUGHT TRANSPARENCY), V2K, WEAPONIZED WEATHER, PUSH,
JUMP, ESPIONAGE AND OTHER TECHNOLOGIES
FOR WEAPONS/THEFT OF
DEVICES AND COMMUNICATION.
Enslaving the brain and electromagnetic field of the individual; harming these, including torture, injury and death, imprisonment of the individual through restraint of motion/injury using "shackles, restraints of body, legs, arms, hands, head, brain" and other microwave-EMF/Push-style/transparency devices: all against the individual's will, paid for with defrauded tax dollars, and for the illegal benefit of the criminals.
Not only are paid agents and thieves stealing by electronic means, or by direct taking, downloading or copying my "copyrighted text" to sell/use as their own or to sell to special interests (under the pretext of solving crime), but now they are using spyware SCANNERS/EMF, other microwave, ELF, radiowave technology, receivers designed to steal original and proprietary information, ideas, data, research, drawings, sounds, colors, designs, inventions that authors/inventors/scientists, artists/musicians/chefs/investors have still inside their heads - in their minds (brains) - PRIOR to these people having the opportunity to type, draw, telegraph or otherwise convey these ideas to others for the purpose of sharing, copyrighting, patenting or obtaining credit for them. This allows the thief to steal these proprietary ideas/inventions/plans and claim them for his/her own (or for special interests) for the purpose of financial profit or acclaim. Such forms of theft eliminate the possibility of the originator prosecuting or suing or getting credit for his/her own work, invention, creation, or research.
These devices/technologies also are invading the individual's personal space (electromagnetic field/aura/brain/physical body) without permission in order to tap into innermost thoughts and plans - a form of assault on the physical body and command/control/communication centers - for financial profit of others. Artificial telepathy also allows for conversation at frequencies wich can be heard by others who are able to receive at these frequencies with devices. (Psychics have naturally built-in scanners and receivers.)
**Manufacturers/distributors should be available to produce defensive technological devices so that the target can shield or deflect or prevent harm if they perceive that they are being attacked. Also, doctors and investigators should have technologies available to them to detect after the fact any evidence of this type of invasion/attack.
The increased use of scanners will affect persons all over the world. What happens now? What laws will be made to protect from thought-form scanners? This is not counter-intelligence. When scanners are used without the consent of one of the two parties then this amounts to theft. A conversation between two persons may be perceived as consensual; however, others may, without the permission of the initial pair, listen to the conversation and this scanning would be illegal.
Those who currently use them are using them in already determined to be "illegal" cases, so respect for laws in their case is no deterrent. Should the devices be banned? Should possession of a device be enough for arrest? Congress and the Supreme Court need to rule on this immediately and not in "the future" or on a "case-by-case basis." They are already in use. In my case, after getting "caught" stealing (electronically) my copyrighted books and articles, the thieves resorted to these devices so that they could steal any remaining or future material without proof that it was mine! Will they steal your material? Will they know your investment plans or reorganization plans so that they can interfere or steal from you? Will they steal the "small stuff" in the form of knowing where you hid your house keys or household money? How far does this go? Will all thoughts become common property - thus stealing the ability of some to financially support themselves? Are we making the shift to ALL forms of property and enterprise being for common use. Will it all be free? That could be a good thing - a garden... or will it be for the few mega-criminals?
This is a landmark decision and a paradigm shift, not just an "issue" of our times.
In addition to
SPLIT-LASER WEAPONS, STUN GUNS, SUPER STUN, PROFESSIONAL STUN, EMPTY TASER AS STUN, SCANNERS are being carried around and used by numerous thugs and other so-called executioners, assassins and general nuts, for paychecks and school credits on our tax dollars. They are targeting random folks selected as guinea pigs, marks, or other targets; they are also targeting those who know too much or are inconvenient.
Overworked names used by "teams" who speak on espionage channels using voice-altering technology and hide illegally behind false (framed persons'?,framed or once-cooperative business' names?)identities: "Rusty," "Boris," "Nicholas," "Brian/Bryan Nicholas," Steven/Stephen," "Marsha Johnson," "Marsha (Marcia) Gray Smith," "Michael," "Russell," "Ross," "John Ross," "Ross Peraux," "Rusty Phago," "Sylvia,""Sonya/Sonia" (= Sojourner space rover? as well as also aka's of certain assassins/contract killers/thieves?) "Stuart"/"Stewart," "Jason" "tommis" "Roger,(as in ROGER-DODGER? NASA?" "Buster," "Austin/Austen" and other sound-alike names to known people. If you still have the software for the NASA ROVer or B-D or Maria Shriver, or Arthur Anderson... you must return them at once... if they are, as they would appear to be, stolen property. Are we speaking about two messes that are really one mess? Two seperate events, merely coincental to one another OR one event causing both "messes?" Can you answer this NOW, not later? Could the problems that NASA has been having with the Spirit rover and other communication or function/direction problems be rooted in the NSA/other spy related changes on computers/eye-in-the-sky spyware which results in disaster when conveyed through other systems? Example: Setting the language options page in the default or other related pages away from "sames" for definitions and terms to the setting "opposite" and, later to the setting "similar" would result in settings that are not only opposite, but unreadable until cherry-picked adjustments were done. In the case of the rover craft, "up" would mean "down" and "off" would mean "on" and in the human case "innocent citizen" would mean "guilty stateless person." (i.e. homeless person). FIX THE COMPUTERS AT ONCE. THIS IS TREASON. (Some of those monetary accounts will show up again, also.) Recently named: "Anne Richardson's campaign."
Another repeat offender in the field of illegally blocked emails/internet surfing, etc: = "p.click" and/or other personal/government/business servers and criminal IT workers at libraries and web companies. We know who is behind "p.click" servers!
**Transparency is a euphemism for technology shapes and "smart boxes" or "atmospherics" which begin with the capture of an individual's biological address/EMF and then ae extended or separated but which inevitable remain linked to the original EMF - the captured one. Transparancy is also used to describe the virtualy invisible overlaying or underlaying sheets which cover the original page on the computer so that what is read is different from what really exists on the original page. Hackers/thieves/interceptors use this technique and may even place many transparancies on a page. This is not only a criminal act, but using the false authority to create a hostile takeover of a web site or a human being, animal, plant, building, vehicle, or etire city/state/nation, this constitutes an illegal act of war. Once captured/renditioned and without permission or protection, electromagnetic devices and/or other technological weapons can be deployed on one or many persons. Paid for by tax dollars and illegally authorized by fraudulent FEMA/EMA or other funding, this constitutes looting of the nation's treasury and, in this case, the individual citizen or the nation's allies, as well. How are we, as citizens ending this illegal attack? It is here and already being employed. Did tax dollars or contributions pay for the R&D?
WHO TO HOLD RESPONSIBLE
FIRST: (AS IN: 1-2-3): THE NATIONAL SECURITY COUNCIL AND ALL ADVISORS FROM THE MILITARY AND DEPARTMENT OF DEFENSE; THE SUPREME COURT, ALL DEPARTMENT OF STATE ADVISORS TO THE PRESIDENT AND TO BOTH PRESIDENTS AND VICE-PRESIDENTS AND SPEAKERS OF THE HOUSE, AND THE COMMITTEE FOR THE TERROR/OFAC LISTS. It has been "on your watch." It's kindergarten simple. If you can count 1-2-3 or say a-b-c - it's not "rocket science" to straighten out this "mess." It is plain corruption and easily fixable.
1. The one(s) responsible for supplying the broadband (or other type) channel signal(s) at exactly the frequency of my thoughts and facilitate sonic attacks (psychic attacks) both technological and natural and/or function in conjunction with other technologies to enable attacks on lmy EMF/brain or to allow theft of proprietary thoughts/enslavement of brain or body or injury to same, or loss of EMF related life force/death.
2. The ones responsable for setting/maintaining/deleting/changing the vectors (coordinates/addresses) of all devices/technologies/weapons which specificlly target my brain or EMF.
3. All technologies/devices have operators, stock holders, who benefit financially, as well as those issuing the contracts and those contract holders. Those who are employed to monitor or end illegal or accidental targeting of incorrect persons, places, or things with weapons and theft devices for ways of enslaving the brain/actions of humans/animals as automatons against their will.
4. Ultimately, those who research and develop/invent the devices can and will be held responsible so that it is in their best interest to follow legislation regarding responsibility of users/suppliers/manufacturers/
5. Those who know about the devices and use of them on humans worldwide have a responsibility to inform/educate the public/taxpayers/voters who finance the technological development and use of the devices/weapons/spyware and will, ultimately, become the targets.
6. Those who "activate" devices and are responsible for deactivating/readdressing them.
Technology development which:
1. Creates devices using some technology but which is used for positive functions, such as healing, communication, transport of humans/animals.
2. Acts as shields, reciprical-to-one-way conversion devices for defensive measures and mirror-reject and return-volley-type defensive devices to protect the target and to destroy the attacker's entire network and his capabilities. Barring these protections, the public is a sitting group of ducks and totally vulnerable to attack by thieves and killers and brain/body enslavers.
Using technology which intercepts thought, spoken and written words, testimony is altered (all or part) even to the point of expressing the very opposite of that originally intended. Thoughts are intercepted by technology before they reach the communications portion of the brain and can be spoken by the original thinker, then transferred by technology to written and spoken form and sometimes altered. This creates the effect of a false confession or falsified report. It also aids in the creation of "fabricated" facts or descriptions which facilitates a human being's "replacement" by someone else. It also degenerates the quality of the work or speech with incorrect information or poorly chosen/altered/opposite words. Additionally, there is technology ("VOICE ALTERING TECHNOLOGY") which uses the person's voice (in this case without permission) to make pronouncements or to issue orders. Orders issued by telephone or recording can be alteed by use of these devices. This results in false orders which are given by unknown different persons and acted upon. VOICE ALTERING TECHNOLOGY can also result in the false identification of an individual as being another person, especially when his/her voice is heard over the air, on the telephone, or by recording device and the person speaking cannot be seen by the listener. In emergencies, an original speaker can seek assistance only to have that assistance reversed when a different person cancels the request using the original speaker's voice. Additionally, emails from what is "apparently" the person's email address, along with "lifted" signatures/forgeries and voice altering techology can create a complete picture which is totally different from "the truth." This is not only a threat to the individual, the family or the business, but also a national security threat.
A M E R I C A
S U C C E S S!
P L U S M I N E!!
SOME ARE IN JAIL!
SOME WANT "TO SETTLE."
IT'S OVER!! WHY ARE THEY STILL HERE?
STOP PAYING THESE CRIMINALS, TAXPAYERS!
SECRET ORDERS TO RANDOMLY SELECT CITIZENS FOR "the list..." or "the Program."
Is this not permission to "RACKETEER?" - as much as 35 percent of the listings?
FRAMING U.S. CITIZENS?
BY GOVERNMENT EMPLOYEES OR
CONTRACTORS/SUBCONTRACTORS ON TAXPAYOR SUPPORTED PAYROLES/CONTRACTS?
Is this "CONSPIRACY TO RACKETEER?"
Is this "TRAFFICKING IN HUMANS/
HUMAN BRAINS/MINDS OR ORGANS?"
ARMS DEALS/PRODUCT DEMONSTRATIONS FOR ARMS AND ESPIONAGE-BASED ELECTROMAGNETIC BASED AND LASER/FREQUENCY BASED-THEFT/WEAPONRY
USED ON THE U.S. CITIZENRY, SUCH AS ASHA ARIEL ALEIA
HUMAN EMF/BRAIN/BODY TRAFFICKING? USE OF PERSONAL VECTORS/ADDRESS FOR EMF/BRAIN WITHOUT CITIZEN'S PERMISSION?
Is this not
"THEFT OF PRIVATE INDIVIDUAL CITIZEN'S 'ADDRESS' (VECTORS/COORDINATES) FOR THE ELECTROMAGNETIC FIELD (EMF)/BRAIN/PERSONAL
Is this "CONSPIRACY TO MURDER/ASSASSINATE?"
Is this "CONSPIRACY TO AVOID PROSECUTION AND RESTITUTION?
ARE THESE NOT ILLEGAL ACTS OF WAR AGAINST U.S. CITIZENS ON THEIR OWN HOME SOIL WITHOUT PROBABLE CAUSE?
Is this "DEFENSE CONTRACT FRAUD?"
Is this "DEATH BY CONTRACT?"
ARE AMERICAN CITIZENS BEING PLACED ILLEGALLY ON "LISTS" SIMPLY FOR PROFIT? LISTS SUCH AS "TERROR WATCH" OR OFAC OR TREASURY/NSA (THE PROGRAM)? IS THIS THE OPPOSITE OF HOMELAND "SECURITY?"
"HIGH CRIMES, MISDEMEANORS AND IMPEACHABLE OFFENSES?"
THIS IS TREASON
AND "ACTS OF TREASON"
HOMELAND SECURITY, YOU CURRENTLY STAND ACCUSED. IF NOT ONE OF YOUR OWN VENTURES, THEN IT HAS BEEN ONGOING ON YOUR WATCH FOR YEARS!!
(BY THE WAY - WHEN DID "FRAMING CITIZENS" BECOME LEGAL? IS THERE A DIRECTIVE OR EXECUTIVE ORDER TO DO SO? LET'S READ IT, PLEASE...
NATIONAL SECURITY COUNCIL: (BOTH ADMINISTRATIONS) TREASON HAS HAPPENED ON YOUR WATCH. WHAT DID YOU DO ABOUT IT AND WAS IT DONE PUBLICALLY?
T H E
R A C K E T E E R S
I N A M E R I C A
By Asha Ariel Aleia
From the first day... 4+ years later... still counting
They never had one... Still do not have one... There is...
NO LEGAL TARGET
|THREE DOCUMENTS PLUS TWO DOCUMENTS - ALL THAT IS NEEDED.|
Birth certificate, Constitution, Declaration of Independence, PLUS U.N. Universal Declaration of Human Rights, Helsinki Final Act 1975, and Geneva... - the United States of America is in breach of contract in this case and others. One change: Putting the computer on "opposites" setting, entering data sheets/profile sheets/reports on American citizens results in the opposite profile and resultant alerts and contracts, loss, ruination, torture, imprisonment/hostage-taking, death. This time, it not only affected a human American citizen, but the space program's ROVer and perhaps others - apparently many others. Stop playing the Shell Game ("Button, button. Who's got the button") with the multi-level cover-up surrounded with the Wall of Confusion and supported by military evasive techniques/orders which should have never been written and have not been cancelled for the victims... connect the dots between the money for homeland security and FEMA/GEMA and treason ala murder and criminal contracts for dollars.
AT ONCE: GIVE NASA BACK ITS MARS ROVER MISSION SOFTWARE/RELATED
LABORATORIES/BUSINESSES BACK THEIR SOFTWARE, SUCH AS LAWRENCE LIVERMORE, N. BOHR INSTITUTE, B-D OR OTHER. GIVE AMERICA BACK TIS SPACE PROGRAM, STOP SABOTAGING INTERPLANETARY COMMUNICATION AND PERSONAL PRIVACY. If any part of the former or current Department of Homeland Security or the Department of Defense/"spies"/moles currently still has possession of anything belonging to NASA or Lawrence Livermore or B-D or N. Bohr Institute, etc. - it is this writer's opinion that it must be immediately returned to NASA (JPL- Jet Propulsion Lab, Pasadena) itself. This refers to its non-spy employees! Spy planes/eye-in-the-sky satellites and incommunicado/pending servers should be searched for files and software/hardware belonging to the space program and returned at once. Do not allow delay by those who may be afraid of being discovered. How long have these been in the wrong hands already? Opposite settings on computers? Confused orders and manual settings or even unplugging computers/shifting software or files to other computers that may even belong to other companies? With interplanetary travel and safety requirements: get the spies out of that area! Return these to NASA immediately. To knowingly continue in this fashion for up to five years (more?) without rescuing either the Rover (Spirit)in one instance or the citizen in the other instance (or both) is treason, with its related crimes (acts of treason). And to continue to search for a ROVer while your computer's settings are on "opposites" or "sames" is worthless. Test or study results are going to be completely wrong if computed using settings "opposite" or "similar" for the language options for the dba and maps or coordinates cannot possibly be correct if "up" or "north" equals "down" or "south" to the computer. It will not be saying what it means! It will be lost in its communication and navigation and all information will be unreliable. An "incommunicado" ROVer being sought by persons using correct data but connected to those whose computer is not properly languaged will not be found or will be unable to communicate to the right site at best. Where is the ROVer? Do these computers even know where the planet Mars is? Do the scientific data readings certify whether they are reading a planet or a human body? Which one has a water core? Rover is not lost... The Constitution may, however, be permanently lost if this continues.
Asha Ariel Aleia was and remains a legal citizen of the United States of America. Her family members are also United States of America citizens, as well as the majority of persons on the lists acquired by Dept. of Homeland Security personnel or their contractors/subcontractors/volunteers. She was on her own home soil (USA) and their was no probable cause when these listings/crimes/acts of war were committed against her or in her name. Was apparently being first listed as a "foreigner" on this soil and later apparently being listed as a U.S.A. citizen who was traveling/living on "foreign" soil (U.S. of Eritrea, Country of Georgia, Outer Space, Egypt(?), for example, the method used to "cover up" the fact that this was an
ILLEGAL ACT OF WAR
ON A U.S.A. CIVILIAN CITIZEN?
Asha Aleia's "address" for her body's PRIVATE PROPERTY - HER EMF was stolen for the purposes of attacking her using instruments/technology/weapons which employ these addresses in order to individually pinpoint attacks. These devices can, in some instances, be expanded to include surrounding areas of rooms or larger spaces, but the ability to kill/harm/torture/steal or attempt to otherwise control the use of the brain/mind in an individualized manner requires the use of the specific address of this individual (in many cases this includes espionage frequenceis which then are part of the system used to vector for the exact person's EMF/mind/body. Are broadband signals and perhaps satellite signals/computer connections also used at taxpayers' expense? At any rate the victim did not give permission for this access and does not qualify for its interception/theft and the resultant damage to her physical health and financial status, among other losses. If the "Defense Department" or "Homeland Security" claims ownership of these technological devices/instruments, then it must admit either their theft or its own personal use of them in what is, of course, an illegal act of war, since there is no probable cause and we are on home ground and this is a U.S. citizen. Retrieval of all the devices and the cessation of their use against Ms. Aleia msst be immediate. Why so long to "find" them when they emit a signal and have a home address themselves, as well as the fact that they were purchased and addressed by someone? It has been too long for credibility. Is Asha's case unique or are other civilian U.S. citizens being individually targeted with these "transparencies" (a nick-name) on their own soil?
(This site refers to events regarding: Asha Ariel Aleia, Melinda Lawson, Melinda Tressler, her social security numbers, her company name, Asha of Antares. Secondarily, it also regards her family members rights and protections, as well.)
WHAT'S MORE...WATCH OUT FOR ATTEMPTS AT "REPLACEMENT/SUBSTITUTION."
BIOMETRIC IDENTIFICATION (Who has your biological markers, vectors/coordinates or personal algorithm?) and DETERMINING WHETHER OR NOT RE-ENACTMENT FILMING/DOCUMENTATION ARE LEGITIMATE OR CRIMINAL ACTS is necessary (with no persons excepted) for all stages and activities of this series of events/the case because of professional actors/criminals/identity thieves/re-enactors who, by their very existence and the nature of their employment, put the true identification of the crime victim at risk when it comes to claiming any settlement or court judgement or credit for their own work. Meanwhile, it also confuses the solving of the case for wrongdoing, as well as placing both the criminal and crime victim at risk for "substitution" when it comes to assassination or other negative event. Judging from behavior to date (2006 to 2010) this cannot be left up to the integrity of the employees/contractors.
TARGET Project Dates: September, 1999 to - September 2006. (Asha alternately lived in hotels, camped or went through various "shelter" or outdoors conditions for this project, alternating between working this project and her regular schedule for applied-psi.)
September, 1999 - End November, 2001: Part II; Stage I, trial runs and preplanning
End November 2001 - April, 2005: Part II; Stage II, California Stage
April, 2005 - September, 2006 Georgia Stage
End of Project
Project Extended: 2006-1009
Reason: Made the terror watch list and foreigners who cannot do business with the U.S. and an illegal order for 24/7/365 guarding/spying! Read On...
On first level:
Asha was incorrectly and illegally labeled as an "alcoholic" when that category (box on the form) was NOT selected as an option by Asha and, indeed, is not now nor has it ever been applicable (it simply is not true.) The option choice results in financial gain for those places who present the claim for funding, (selecting "None of the above" results in no funding category being selected) while the client -Asha in this case - becomes the victim of defamation and false information being presented to the permanent record.
On second level:
Asha was illegally targetedby government agents and falsely imprisoned (24/7/365 guarding and surveillance and spies), illegally spied upon and the victim of numerous crimes, (details following and in attachments), for the financial benefit (tens of millions of dollars in contracts, materials, and benefits, college credit, military credit, promotions, resume builders) of others, at the expense of the target, her family, and her business/product.
For those who want to see only the "financial" events of being listed, go to: YOU'D BE CAMPING IF
ASHA ARIEL ALEIA,
dba ASHA OF ANTARES
It's On Your Watch
It's your current responsibility:
NATIONAL SECURITY COUNCIL/MILITARY CHIEFS OF STAFF AND PRESIDENT:
This should be on your immediate to do list:
Stop all orders to harm all citizens on the list generated from Asha Ariel Aleia's friends, family, clients and all harmful contracts concerning them at once.
Remove all "walls of confusion" in the continental U.S. and islands (Nassau, Jamaica, etc.) and allied countries.
Dismantal NMDs/WMDs in U.S.
Retrieve my stolen biological address.
Do not allow "mole" computers to be connected to the networks of the company's that host them or employ them, so that there is no possibility that changes that are made to mole computers (such as language options = opposites instead of sames or exacts) will alter settings for machinery, equipment, transportation or sensitive studies or laboratory experiments/data, credit or police reports or bank accounts, private or commercial.
FEMA/GEMA/State EMA accounts, i.e. disaster accounts/homeland security accounts should be audited for the past five-six years and the "old homeland security computers" should return all internal software to host companies, including NASA immediately. Homeland Security networks should be external to commercial/private accounts/computers. This is about "safety." We want to be safe, not "secured," a penal institution term. Safe and not "occupied," a war term. We pay for Homeland Security... with our taxes.
|T H A N K Y O U 'S|
When the Feds don't do it, there you are. Why is INTERPOL shown in the middle of a schematic for the Deparment of Homeland Security （the spies）and not separately? Do we citizens have to leave the country in order to get help/rescue from this MESS from foreign nations, UN or the Hague??
PRESIDENT BARACK OBAMA
Thank you for the special protective status provided in order to save an innocent citizen's life in extraordinarily treacherous and dangerous conditions, including being held hostage on U.S. soil.
U.S. MARSHAL'S SERVICE
Special thanks to these heroes who came in to battle assassins and protect Asha during the intensely dangerous conditions.
U.S. FOREST SERVICE
Hundreds of scent trained dogs with Asha's scent? "Death by dog" kill contracts? How to gather up this many killers? And they were often hidden until night-time. Thanks to the Forest Service men and women.
Many thanks to Senator Patrick Leahy, FBI Inspector General Glenn Fine, and Agent Tamm,
SEN. PATRICK LEAHY
Senate Committee for Fraud, Waste, and Abuse in Judiciary,
Judge Colleen Kollar-Kotelly
FISA Court, Senator Rockefeller's Committee On Intelligence,
as well as the whistleblowers, undercover agents, code-breakers, others
such as Edward Snowden, former CIA employee who exposed NSA violations and obtained documentary evidence of secret government activities or who "turned state's evidence"; finally, to regular citizens who helped expose this collosal case of crime,fraud, human and civil rights abuse, and abuse of power and trust. Numerous changes in policy have been instituted for several of the agencies involved so that cases like this are, hopefully, not encouraged in the future. There have been arrests. 24,000 persons' names who were put illegally on the list (and KEPT THERE!) have been revealed. The beginning...
THE SUPREME COURT - JUSTICE SOTOMAYOR
The Supreme Court will be a necessary partner in ridding the country of these treasonous acts/people with rulings, including a necessary revisiting of the issue of giving immunity to prosecutors who knowingly participate in cases involving "frame" jobs. Surely the court has known for years about this case - what are they doing about it???
TO DO LIST: COMPLETE FOIA's FOR: notices/letters/emails releasing Asha Ariel Aleia/Asha of Antares/Melinda Lawson/Melinda Tressler from any lists she was on even for one part of one day: Terror List, OFAC List, "The Program."
Racketeers In America is the second in the documentary series, Vulnerables. In Part I of the series, Rippers In America, spirit asked us to return to the scenes of crimes from the late 19th century in America and ask the question: "Was Jack The Ripper a cover story for organ harvesting?" We have been very pleased with the results of both the study and the response. We asked ourselves, what about today? We are more educated and there is more oversight. Are the vulnerable groups still targeted for things like this? Racketeering or guinea pigs? A small followup project was begun, the idea being to do an addendum to the first one. Just a short one. YEARS LATER, the results are in. Be sure to read: Part II, Vulnerables Series, "Target," Asha is advocating for endangered groups: the homeless, disenfranchised or marginalized who are targeted illegally/unethically for the political or financial profit of a corrupt few. This is a continuing series.
PROJECT UPDATE 2009: Government agents are now telling listeners that Asha is "just a homeless person." (More correctly said, would be to say that they had illegally listed me as a "stateless person." Thus the lawsuit/prosecuttion - reason for a cover-up? What do they mean by "just?" And, what do they mean by "homeless person?" Is that meant to stereotype Asha AGAIN? Asha, whom you know, remains in business, etc. Is this meant as one more way to confuse clients, who may be lead to believe that Asha has gone out of business? Since both being homed or being without real estate are LEGAL, there remains no probable cause. Why are they saying ANYTHING at all at this point? Why are paid government agents STILL TARGETING ASHA? For those of you who have been clients, friends, and associates of Asha's for decades, you know that this is not only misleading, but deliberately failing to mention the business, the project, etc. (Asha remains in business (and intends to rebuild the enormous loss due to being targeted). The field project results are almost finished. All original claims (illegal alien, terrorist, spy, etc.) have been admitted as false. No surprises here. For those who remember that Asha warned them in the early days of the project that, if not stopped, the list would grow to include as many non-qualifying persons as they could get away with (racketeering/jobs/special interests): At that time, you may remember, the list had 400,000 names. Today, it has one million. Do you really want your friends/family to be next? To the spies and students: If you were not told about the target's then 22 year business (begun 12/17/1988) and the website, including this page, you have been a victim of suppression of evidence. Remember, this page has BEEN THERE FOR YEARS. Clients find it. Congress and press find it. Hackers get paid to hack it. Analyser gets paid to see it. Did they not read it or tell you about it? Ask yourself why they suppressed it?
PROJECT UPDATE 2008: VICTIMS OF OUR OWN SUCCESS
-Number of insiders admitting that the case detailed in the pages of this project is and has been "bad" from the start has increased exponentially.
Read: WHISTLEBLOWER ARTICLE-Newsweek An insider from Justice Department speaks with Newsweek about "the Program."
-Number of corrupt agents now admitting to attempting to use "homeless" as their excuse for spending enormous amounts (millions? Hundreds of millions?) of taxpayer dollars in FBI/Homeland Security/Law Enforcement coverup.
To read some of the many actions Department of Homeland Security (FBI, NSA, CIA, local, state and federal law enforcement, military, neighborhood watch, business and charitable organizations, etc.) illegally brought against Asha, see Asha's preliminary list of charges against them for lawsuit on LISTCASE
MAGNETIC DEVICES?? MICROWAVE/SPEED OF LIGHT/ESPIONAGE/
THOUGHT FREQUENCY WEAPONS/DEVICES/
INSTRUMENTS?ELECTROMAGNETIC PULSE? MASERS? TOWERS? WORMHOLES? FORCE FIELDS? EM TUNNELS? USING TARGETED AND PHYSICALLY UNPROTECTED HUMAN BEING'S BIOLOGICAL SIGNATURE AS BUILDING BLOCKS?
Are neuro-electromagnetic (espionage/thought-frequency-based, microwave-based, speed of light-based), cyclotron, gyrotron MASER-connected devices, instruments, and weapons being used in my case? Apparently this is so. Look for a set of BIO-ADDRESSES (vectors, if you will, and other electro-chemical indicators, etc.) which are unique to my brain and physical body. Beginning with a direct attack upon this bio-address, the attacker could (and has), at his/her choice, remained at my individual vector or relayed or expanded to other vectors, thus converting the device/instrument/weapon to a "weapon of mass destruction" (expandable and/or relayable weapon or substance or biological entity). Nicknamed "the pelican" or "transparencies" or "saran wrap" (no relation to the kitchen product!) or "invisible shackles, arm or hand restraints," and "silent killers or silent-invisible thieves," for example, one thing can be said in the way of "proof of intent to harm Asha Ariel Aleia." Asha's bio-address was programmed into these devices. No matter how cleverly this was disguised, as you know, programmed addresses are going to be honored by the device. This means that the signal or light or heat or object will be transmitted, propelled or otherwise sent to the address which was programmed into this device or its controller (computer or other control). Unless this address is altered when the device is used, irregardless of the label or description of the target on the surface or report, all transmissions will continue to hit the original, defaulted or programmed bio-address. In other words, it will continue to hit the same human being or other individual electromagnetic field infinitely UNTIL AND UNLESS THE ADDRESS IS CHANGED! No change in address = no change in the target. One must disregard all reports to the contrary and research the history of the vectors which were programmed (input) into the controller/device. Even "0" can be "ON" and at a default address (whichj, in this case, usually was the same one each time - Asha Ariel Aleia's bio-address, unique to herself and without permission. With such an access (totally illegal without permission), it is possible to control the brain, to steal all thoughts, dreams, ideas, intentions, emotions, to control functionality of the body, to erase memory or fill it with other material/photos/films/memories, to torture, harm, kill, to destroy vision or create "false" images, to restrain, to alter atmospheric conditions and more.
BIOMETRICS! It's time to fingerprint and use other sophisticated biometric means for all participants and seize their devices/weapons/equipment/ID papers.
A N O T H E R Q U E S T I O N...
What "order" supposedly legalized "framing" citizens of the United States of America? Was that part of the "program?" Who ordered it or began this process? Who is authorized to end it? NOW IS THE TIME.
|5 Y E A R S (AND M O R E)|
AN A R M Y OF PEOPLE
DEPARTMENT OF DEFENSE
DEPARTMENT OF JUSTICE
DEPARTMENT OF HOMELAND SECURITY
CONTRACTORS... VOLUNTEERS... BUSINESSES
A S S A S S I N S  A N D S P I E S
AN A R R A Y OF TECHNOLOGY
A $100 MILLION (MORE?) BUDGET
ALL TO DESTROY:
ONE middle-aged, female, U.S. citizen, known public speaker, author, practitioner, who was only supposed to have a social security number retired. NUMBER RETIRED - NOT THE HUMAN BEING. NOT THE BUSINESS. NOT THE FAMILY, FRIENDS, SOCIAL CONTACTS, CLIENTS, TEACHERS, STUDENTS...
When did a retired social security number become a target for the treatment it is getting? Did the number and subsequently the person become transferred to the OFAC or terror list? How long before the truth comes out? How long can pretended "disaster" or "war" funding be used or "school" be blamed for an obvious cover-up... "OPS" or opposites for definitions/terms settings which do not translate back to original statement or command, resulting in in data being produced that was opposite the true facts, i.e., the opposite of a citizen is a stateless person and the opposite of innocent is guilty. This is your responsibility to repair at once. This is breach of contract with the six basic agreements: Geneva Conference/Accord for handling of prisoners, hostages, and detainees, The United Nations' Universal Declaration of Human Rights,The Helsinki Final Act of 1975, the Constitution, The Declaration of Independance, and my USA birth certificate???? There are serious international issues here.
To get some idea of why such a fraud on the American public would occur and to ponder it along with Asha, read: TARGET ARTICLE: WHY?
A followup article to "Why?" mentions some more unconscienable events - on our tax dollars: Why? The following days.
THE CASE FOR RACKETEERING Randomly putting Americans on a list for profit.
NATIONAL SECURITY LETTERS AND EXIGENTSAs early as 2007 the government had admitted that serious errors and questionable methods were found in the use of these letters, including not following their own policy.
A glimpse at Asha's notes on 2007 TARGET DIARY and LETTER will give you a feel for the mood of the early period.
SUPPRESSION OF EVIDENCE AND FRAMING? What happened here?
MOTIVES FOR PUTTING YOU ON THE LIST?Some thinking points about WHY there are so many on the list.
WHISTLEBLOWER ARTICLE-Newsweek An insider from Justice Department speaks with Newsweek about "the Program."
Where does the target's income go?ASSETS FROZEN/INCOME STOPPED - YOU'D BE CAMPING IF...
TARGET ARTICLE FORM will help give you an idea of what YOU can do to help.
THINKING POINTSSome thoughts to ponder before paying your taxes and before voting.
TARGET.FISHING Fishing for targets at McDonald's?
NSA wiretapping citizens illegal: NSA ILLEGAL HACKING.
Is is part of a larger secret? Read: COVER UP
Read:CEASE AND DESIST LETTER OPENLY PUBLISHED Are the civil rights and free speech rights of taxpaying citizens being endangered or otherwise infringed in order to have institutions like the public library help in these "coverups?" Whose telling?
LETTER TO THE GOVERNMENT
An open letter to the government regarding the listing of an American citizen on a list for which they do not qualify... and continuing to pursue the case for YEARS. What is being done about it?
ASK YOURSELF: WHAT IS "p.click?" Are fraudulent government agents hacking your site using this malicious server? Are you paying for it?
WHO IS ASHA OF ANTARES?
Asha Ariel Aleia is also known in her business as Asha of Antares. (Asha will pass a biometric test for being Asha Ariel Aleia. No other person can pass a legally administered biometric test for establishing identity as this person.) Known in the field as an applied psi expert since the 1980s, Asha is the well-known and respected NATURAL (non-technology based) walk-in, Asha Ariel Aleia,***** who uses mediumship/professional psychic abilities to assist clients with phenomena that is outside the "box"... hearing ancients explain the beginnings and endings... staying in front of NOW. Asha had worked with thousands of persons over her more than twenty-two years as a professional and in the years as a non-professional prior to that. She has given seminars and workshops and spoken in numerous states across the country. Most well known throughout the late '80s and '90s for her connection with extraterrestrials and ufo's and the concept that we have never been and are not now "alone," Asha has also been working in everyday form to assist landwalkers.
Asha has been filmed for cable TV and CBS local news, Time Warner's "Mysteries of the Unexplained" Series, and for Actuality Productions' documentary for the History Channel about the infamous McGurk's Suicide Hall in New York. She has also appeared in magazines and trade shows. Traveling nationally and internationally whenever she can, Asha provides lectures, classes, and consultations using applied PSI. Research, investigations, and searches offer opportunities to apply PSI to mystery-solving.
Asha has written two books, ANCIENTS and REAL-LIFE GHOSTS' STORIES, a short poetry/prose booklet, AND...NOW. She has also written numerous articles based upon applied psi: APPLIED PSI ARTICLES. Asha of Antares and Antarian Enterprises are the producers of the documentary series, "VULNERABLES."
Copyright 2007-2016.Asha of Antares.Asha Ariel Aleia.All Rights Reserved. Background courtesy:lawlibnews.blog.asu.edu Alien courtesy:www.wilsoninfo.com Cartoon bubble courtesy: i213.photobucket.com Lord Byron courtesy: www4.ncsu.edu Shadow image courtesy Asha Ariel Aleia/Asha of Antares personal photos. INTERPOL logo courtesy: infidelsare cool.com US Forest Service logo courtesy foreforest. blogspot.com Ouroboros artwork courtesy:freakyfauna.com HRH Elizabeth II photo courtesy rrgleason. HRH Noor photo courtesy cdinstagram.hpphotos Timothy Geithner photo courtesy: themajlis.org Henry Paulson photo courtesy: wonkette.org George W. Bush photo courtesy: www.esoterically.net Barack Obama photo courtesy: www.dmiblog.com National Treasure Script courtesy: www.script-o-rama.com Dusty Foggo photo courtesy: talkingpointsmemo.com Judge Kollar-Kotelly photo courtesy: www.wired.com Sen. Patrick Leahy photo courtesy: nytimes.com Glenn Fine photo courtesy: cache.daylife.com Agent Tamm photo courtesy: wordpress.com Edward Snowden photo courtesy: truthisradical.wordpress.com.