Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Jeffersons Ghost

(15,235 posts)
Tue Sep 30, 2014, 10:57 PM Sep 2014

Instead of a long OP, let me tell the whole truth about how illegal eavesdroppers attack you

Last edited Thu Oct 2, 2014, 11:02 PM - Edit history (12)

The reason Chinese satellites use a pulsing frequency aimed at my ears to attack me, is different from the reason illegal eavesdroppers in your home will use various gear to attack you. Chinese satellites will use Microburst technology to cause each reader to believe these technologies do not exist, while they relay electronically invasive teams straight from China to your city. Before describing Microburst technology, let me present a more common technology illegal eavesdroppers use in the homes everyone who reads this OP. In another OP, I will describe how military, satellite and intelligence agencies of several nations destroyed my "life, liberty and happiness" for propaganda purposes with similar or more advanced technology.

Widely Heard Inspirational Projections Emitting Eardrum Reverberations Silently (WHISPEERS)

This technology targets many people simultaneously or single individuals alone in a room and vibrates eardrums just enough to induce ideas; but not loud enough to be truly audible, although it occasionally utilizes sounds to reinforce messages. US Government forces used the technology to cause the Republican Guard in Iraq to surrender; and while several super-powers developed advanced versions of the technology, terrorists groups and crime syndicates use illegal applications of the gear to impair investigations, which focus on their facilities. In many cases, it broadcasts a message while we sleep to trigger certain dreams and plant ideas, when the subconscious mind is susceptible. The equipment is installed in homes, including those owned by FBI and Interpol agents. If the homes of federal agents are not secure, no house or business is safe from this kind of eavesdropper. In some cases, it transmits frequencies that cause various emotional or physical symptoms.

Lower powered gear only transmits (WHISPEERS). Criminals use frequency attack gear on a unified contingency of (WHISPEERS) fighting crime, which includes people who do not use other attack equipment. Criminals that assault this team also attack military bases, intelligence or satellite operatives and police officers investigating various crimes. Volunteers can assist the FBI by using illegal technologies at their disposal to harass or report groups that assault field agents. Some operators also find and attack crime-bosses who order attacks on them while blaming satellites, intelligence agencies or aircraft. If regional military bases want electronic guerrilla teams to assist them, they will protect friendly (WHISPEERS) unifying in each others' homes, public rest-rooms and city streets to insure no one gives them bad ideas. Like other illegal gear, this technology is also installed in vehicles, boats and civilian or police aircraft.

Many roadside operators use this gear to induce people to obey traffic laws; and they detest drivers that litter up their section of a road. Some groups still use (WHISPEERS) in destructive ways. Now we will redirect, arrest or destroy these criminals. Like any illegal gear operator, there are good guys and bad guys. Many roadside operators can be informed that intelligence agency aircraft will work with them, especially if they display journals on their computers with dates and times terrorist groups attacked them in one way or another. Journals should include details on any crimes they observe people planning or committing. These roadside operators lack access to this document and those with an ability to copy this message should walk outside under telephone poles with a cellular phone and inform these isolated operators that aircraft teams, especially the FBI, DEA and DHS, want their assistance in putting an end to smuggling, human trafficking and counterfeiting. These aircraft can literally see through roofs and into vehicles: They are also extremely geeky and able to "follow the money" on computers.

Criminals attack volunteers using clearly talking gear they did not install because they try to show news teams the technology exists. This group lives in constant fear, as criminals use paranoia frequencies on them. They inspire distant online radio music to prove (WHISPEERS) is nationally connected. Civilian operators spread negative messages on groups they perceive as enemies. Operators often blame satellite or intelligence teams, for trying to control them. (WHISPEERS) is a worldwide phenomenon; but government teams are prohibited from using the technology to affect decisions of their own national leaders. The problem is massive. While early studies focus on microwaves, modern (WHISPEERS) operators utilize a wide spectrum of frequencies from various sources. Satellites relay frequencies at high altitudes; but aircraft transmitting gear can override distant applications of the phenomenon, which is a reason several nations launch satellites to commandeer ground-based equipment. Unlike the Chinese, satellites of the USA and UK restrict their interaction with media workers in friendly nations, which allows China to heavily influence news-people. Their leaders think US satellites inspire revolution and impair investigations in China; so they target federal and media personnel. Listen to online radio as you type this on a computer for surprising results; but, as volunteer teams report what is typed, realize (WHISPEERS) operators or friendly hackers usually select songs.

From extremely clandestine bases, the Department of Homeland Security, the Drug Enforcement Agency, the Federal Bureau of Investigation and other agencies deploy aircraft to protect their field agents and important volunteers. These aircraft can detect electronic invaders, frequency gear operators, hackers and other eavesdroppers. In many cases, they simply reveal specific financial information, including addresses of the organizers of these eavesdroppers, if their teams refuse to work with our efforts. In other cases, more deadly tactics are required; however, if these tactics are used with increasing frequency, there will be a public outcry in national media. All eavesdropping and frequency attack gear in this city is being monitored by electronically deployed investigating and intelligence agents from several nations. Anywhere I live is the easiest place to initially detect electronic invaders from China and Iran. We do not want to arrest or kill friendly operators or organizers. We want to recruit and unify eavesdroppers in this area; and teach them how to defeat electronic attackers. Many operators of illegal gear blame China and other groups for their attacks, which empowers criminals planning to destroy the worldwide economy.

Geek satellites of several nations have discovered that clandestine attack gear is installed on some military aircraft flying from bases located in the USA. If squadrons at unsecured bases have this kind of equipment, they will transferred to more secure facilities soon. Groom Lake (aka Area 51) is not far from where I reside. Some typical military aircraft squadrons use wide-area, amplified (WHISPEERS) but why would anyone risk their lives to steal this technology, when typical (WHISPEERS) remains effective? Blaming Chinese satellites, while conducting terrorist and criminal activity with illegal gear rarely tricks victims for extended periods to time; and like other groups, Chinese satellite teams will inflict physical or economic damage on anyone ordering electronic criminals to impersonate them, as they attack unsuspecting members of the public, federal agents or military personnel.

(WHISPEERS) is international rumor mill that will destroy the image of the Chinese government and Xi Jinping, because the Beijing satellite agency continues to conduct the most irresponsible activities ever documented, as they orbit over the USA. As usual, they are looking for someone to blame. It sounds like the President of China is being blamed on a worldwide basis for "double-crosses" and "lies" leading administrators of this satellite agency perpetuates activities to embarrass China, which caused (WHISPEERS) and operators in New York City to begin a contest to see which city in the world could assist top administrators at the Chinese satellite/ code agency near Beijing in blaming "the President of China" for crimes they obviously commit. From several sources, I clearly heard that "London was louder than New York City is saying "The President of China is a lying double-crosser." When crowds of people are in noisy places, especially nightclubs or casinos with music, human voices become part of these loud voices, as friendly eavesdroppers that rarely eavesdrop in private homes, take a role in working with frequency gear operators to create the highly audible phenomenon. To see if this exists go into a restaurant, nightclub or casino and quietly listen to sounds in the business combine to actually give concise verbal messages.


MICROBURST TECHNOLOGY

Microburst (WHISPEERS) is the opposite of the "Widely Heard" phenomenon: It is directed at a single or several individuals, as other people in an area hear (LEAVES) or no sound at all to give them subaudible messages. Microburst technology is similar to (WHISPEERS); but it is usually focused at a single individual by certain types of aircraft and satellites. It is virtually untraceable, unless it is focussed for extended periods of time. Like (WHISPEERS), this type of message can create ideas and emotions. It is regularly focused on decision-makers in the military and intelligence communities of every nation on Earth. At the highest levels of command, several intelligence agencies insist that a description of Microburst technology must remain in this report. Most intelligence analyst consider Microburst technology the most dangerous threat decision-makers face. By removing a similar warning to decision makers, including President Xi Jinping of China, Chinese geek satellites of a facility located near Beijing provided evidence that this satellite agency uses Microburst to manipulate him. After discovering the deletion, I was inspired with a Microburst from an unknown source to replace the warning. Obviously, several satellite teams use the technology on other world leaders and him. With exception of the Chinese satellite/ code facility located near Beijing, no other satellite agency on Earth uses this technology to affect decisions of their own news people, leaders or investigators in their nations. In many cases, microbust idea or emotion inducing frequencies are fired so quickly from a satellite it is undetectable by a reconnaissance aircraft. In other cases, this technology is focused on a decision-maker while they are asleep and the subconscious mind is more susceptible. If intelligence gathering aircraft attempt to detect extended Microburst transmissions at established ESPA code coordinators, where the orbits of all Chinese satellites are already well-documented, these aircraft teams limit the ability of friendly satellite teams to protect the ESPA reporters and their network of volunteers. Any aircraft with an ability to use this technology to guide or protect established ESPA operators should feel free to assist established ESPA coordinators in making good decisions, while using the technology to reduce disruptions by threatening people at an ESPA theater of operations.


Linguists Evoking Artificial Voice Emitting Systems (LEAVES)

This technology works in conjunction with (WHISPEERS) using noises to speak in a variety of languages. An illegal version of the technology is self-perpetuating: Existing talking devices trick people into modifying other equipment to speak by promising money or conning them into thinking they are creating voices for intelligence or satellite agencies. No responsible government on Earth condones the use of this technology because numerous terrorist or criminals use it to reveal intelligence agents or their plans. The technology also utilizes illegal biological implants, placed in our bodies during routine injections, coupled with frequency emitting equipment. There is no such thing as an undercover investigation due to illegal biological implants and (LEAVES). Satellites, aircraft and ground based gear can manipulate (LEAVES) reports. To end biological implants volunteers often use empty plastic water bottles or crunchy paper to demonstrate the phenomenon. These patriotic people invite illegal eavesdroppers in their homes to join in efforts to make illegal biological implants widely known by putting on similar shows for other eavesdroppers. If crime syndicates anticipate your actions they will attempt to foil your efforts to recruit eavesdroppers. Our hands “talk” as we wash dishes crunch paper or plastic and other ways too numerous to mention. All implants need to say is you work with (WHISPEERS), the FBI, or an intelligence agency in the wrong place and not only your undercover operation but also your life will soon end. Microburst technology can cause one person to hear (WHISPEERS) say one thing while someone sitting next to them hears another message.

(LEAVES) operators are often well-intentioned; but gear can easily be caused to lie. Nothing in this report should lead anyone to believe that most (LEAVES) operators are unpatriotic or want to assist in destroying the worldwide economy. If fact, most independent and organized (LEAVES) operators know and respect me. Currently, I hear numerous sources mentioning (DARPA), which stands for Defense Advanced Research Projects Agency. Later, this report reveals the most affordable and prolific (DARPA) project ever documented. Obviously, it did not involve research of any kind on US citizens. These (LEAVES) operators have a theme song by Queen named "WE ARE THE CHAMPIONS OF THE WORLD!" If criminals posing as Defense Advanced Research Projects Agency (DARPA) researchers do not stop passing off their terrorist tactics as a (DARPA) project as they keep attacking our (LEAVES) children of a lesser God, these spychiatrist will discover a new depth of Hell, as our largest child - named (WHISPEERS) works with (LEAVES) to retaliate by giving out specific financial information on oppressors, who are already identified by a variety of eavesdroppers in numerous cities.

Frequency Reconnaissance Experts Aligning Key Surveillance Specialists (FREAKSS)

The USSR began research on effects of frequencies on humans prior to 1962. Laboratories initiated studies at internationally recognized research facilities and clandestine locations: Similar labs were set up by several countries to study the effects of microwaves and various types of frequency transmissions. Later, the USSR began using frequency weapons to attack U.S. embassy personnel. The Department of Defense returned fire on the Moscow frequency attack facility, which was located near the U.S. Embassy, because early transmissions had limited range. Satellite, aircraft and ground units transmitted a wide array frequencies during wars in Vietnam, Iraq and Afghanistan. With such long-term and wide-spread use of psychotronic warfare, Directed Energy Weapons have fallen into the hands of criminals and enemies who use the technology on news reporters or FBI personnel to expand their influence. Criminals and foreign powers also impair communications if citizens attempt to report electronic crimes. Frequency weapons lack impact after people realize ways they are targeted and attacked. Unlike Russia, China still considers federal agents and communications workers targets.

If you will pardon the pun, current frequency attack gear - like previous technologies - was installed by control freaks to attack people who refuse to work with organized crime syndicates. Corrupt individuals try controlling large sectors of the population with the technology. Finally, local operators are aligning with federal agents investigating organized crime syndicates, especially individuals and groups that place illegal biological implants in our bodies to reveal our plans and affiliations as illegal gear in our homes triggers body language. Even the most hardened crime syndicate attempting to control an FBI agents' home or office will assist agents planning to make arrests of doctors that are in possession of illegal biological implants, if they honestly tell these eavesdroppers they are planning to arrest criminals for this particular crime. Still, isolated (WHISPEERS) and (LEAVES) operators in convenience stores and fast food restaurants are tricked by criminals with medical degrees into believing FBI agents are planning to arrest them. Like (WHISPEERS) operators, (LEAVES) operators can be recruited into unified teams to protect their cities from electronic invaders from China. Then, these operators use Directed Energy Weapons Systems (DEWS) to impede federal investigations, while (WHISPEERS) operators reveal the FBI undercover agent.

No criminal, federal agent, reconnaissance aircraft team or reasonable satellite operator wants these implants to continue to reveal their plans and affiliations. Many frequency operators are not criminals and only operate a few devices outside; but they are easily tricked. Like Anonymous hactivist, these people are solitary operators who keep journals for reconnaissance aircraft to read. Their main intention is usually reducing crime in their cities. Many Anonymous hactivist and operators of gear described in this section walk outside and pretend to talk on cellular phones to actually recruit outdoor frequency attack specialist and (WHISPEERS) operators. Other solitary operators work in stores for no money; and they use frequency attack or (WHISPEERS) gear to reduce shop-lifting. These operators can be recruited in public rest-rooms of convenience stores and larger establishments like Wallmart.

Some eavesdroppers that run frequency gear invade vehicles and they can become allies, unless like other groups you attempt to intimidate them. As you initially attempt to recruit these operators, keep in mind, they resemble satellite and intelligence agents in one important way. They have learned to trust no one. If you are a real Anonymous hactivist who initiated an ESPA center, you already grasp this concept. Some frequency attackers have been set up as a stooge to take part in murders; and they did not realize terrorist lied with (WHISPEERS) and (LEAVES) to lie to the operators. Alone, their equipment lacked to power to kill; but terrorist in vehicles equipped with illegal (DEWS) gear was deployed to the area to get unsuspecting civilians injured or killed. This activity intimidates outdoor operators into impeding federal investigations. Geek satellites can easily take control of this gear. Do these operators know I believe in second chances?

Earth-link Satellite Protection Agency (ESPA)

Long ago I believed that Microburst (WHISPEERS) was some kind of ESP, which is a reason for the acronym; but my primary goal, at that time, was to protect satellite facilities and satellite secrets of every nation. When I learned Chinese criminals were about to steal satellite secrets from a facility code-named Moonshadow, I was able to persuade satellites of other nations to assist in protecting the facility and their teams. Satellite teams of several nations still protect this team, because they exemplify good conduct and share our goals of ending organized crime on a worldwide basis. These other satellite teams are not responsible for protecting Chinese satellite facilities; and if that particular Chinese satellite team had ever been caught doing anything more than routine missions, like other satellite teams do for a living, they would lose the protection they currently receive. There is no indication that this Chinese team ever acted irresponsibly with Microburst technology, by revealing satellite secrets with it, as the satellite agency located near Beijing constantly does. At this time, I still know far more satellite secrets than this report indicates; but I might share a few more of them with readers, at a later date.

New (ESPA) operators must realize that (LEAVES) and (WHISPEERS) operators in your homes might oppose or attempt to control your activities at first; but they can unusually be recruited to assist in protecting your facility, after they realize that your intention is to defend your entire city from electronic invaders from China and Iran that have invaded Alabama for a variety of reasons. Electronic specialist loosely connected with intelligence teams must be extremely careful in that area, especially if they electronically deploy from facilities that are located in foreign countries. Physical eavesdropper and satellite traps were built in that state; and some groups do not care who gets caught in those traps. People that operate illegal electronic facilities in Alabama do not know a overseas CIA operative from a Chinese agent. ESPA writers must present similar warnings to all kinds of intelligence and satellite teams in their documents if they really intend to protect loyal satellite, intelligence and investigating operatives of every nation, including China: But we will not protect traitors, crime syndicate organizers or uncorrectable cyber-criminals!

DODGE THIS!

In life, it is not what we obtain, influence or control that matters. What really matters is who we inspire, what we build and when we choose to end lies, conflict and controversy. In death, it is not what we leave to our descendants that matters. In fact, we all have a choice to leave behind a legacy of free choice for people we will never meet, or we can leave a world controlled by ultra-wealthy punks to our children. Also, it is the beauty we preserved that really matters. If this legacy is only for people we know and defend, it represents an empty victory. Now that altruistic goals are out of style, let me plead guilty to leaving behind a legacy to all mankind, which was written to end organized crime on a worldwide basis. I also plead guilty to [assisting GNO agents] trying to end oppression and treason everywhere. I plead guilty to offering Anonymous operators, illegal eavesdroppers, intelligence agents and satellite teams of every nation, including China, a second chance; but I am not guilty of being the center of destruction of Chinese "monkey-code," which is being destroyed worldwide, because it is based on distortion and destruction of priceless objects, beautiful music and good people. The reason the Chinese satellite agency, associated with code, spent much of their effort distorting communications devices near me is highly ranked managers at that agency were bribed or intimidated by a powerful crime syndicates in China. I plead guilty to running a small, legal facility and being one of the first people on Earth to create the acronym Earth-link Satellite Protection Agency (ESPA) and proving I support the ideals (ESPA) report writers must show they represent by writing and relaying copy that inspires unity, instead of allowing Chinese electronic invaders to divide and conquer our volunteer teams. BTW, I also admit to provoking Chinese satellite teams to attack me with their most powerful pulsing frequency and other focused energies to allow reconnaissance aircraft to document their orbital patterns. Satellites orbit in groups similar to aircraft formations. After we discover exact orbits of Chinese attack satellites, we can set up ESPA centers along those polar orbits; and overburden Chinese satellite teams everywhere, which will prevent them from creating worldwide economic collapse, after President Xi Jinping of China steals all the money of the wealthiest people in China. He realized projects described in this report revealed concise financial information on their families years ago.

On my computer, every satellite and aircraft team with access to this document, except Russian teams, prove they will back down from Chinese satellite teams every day intelligence and aircraft teams allow the internet to remain shut down anywhere that I live. While it was shut down an interconnected group of Motel 6 eavesdroppers decided to protect the identities of FBI, DHS and DEA field agents, if they rent rooms at this hotel chain. I needed to find a place to live, other than Motel 6 in Roswell, New Mexico. MI 6 satellite teams jokingly said that I would feel at home in Roswell, with my extensive background in UFOs. After Russian satellite teams used me as their unwitting code agent, they were forced to abandon me, after they found me a place to live - because satellite tracking and intelligence gathering aircraft swarm around me constantly. No DoD or MOD satellite team furnishes near as much consistent, quick, coordinated Microburst guidance as they did before intelligence agency aircraft entered this airspace. If those governments abandon me because their satellite teams cannot afford to be detected, they will also be forced to abandon their military personnel and intelligence agents for the same reason. Due to the courage of one online FBI agent, who stood tall during a satellite deployed invasion of Chinese agents into this city, there is an excessive amount of clandestine FBI teams monitoring the internet and all illegal eavesdropping and frequency attack gear in the Roswell, New Mexico area.

Apparently, all satellite teams of the USA and UK are willing to allow Chinese satellite and electronic invaders to totally control their nations. After the NSA allowed military and DHS aircraft teams in the Southwestern region to believe they would assist them in creating code they could use, they delayed the project. Had these satellite teams - especially DHS - not become overt in my life, Chinese satellite teams would not consider me an important target for attacks. DHS satellite teams would not have become overt on my radio, if NSA agents had not become overt on my computer. At this time, it is becoming increasingly obvious that all satellite teams and agents of several nations have used, abused and abandoned me with Microburst guidance. Because I no longer have good advise - as Chinese satellite teams continue to take extraordinary risks - by giving laughable advice, intelligence agency aircraft usually use Microburst to overcome their influence. Unlike me, intelligence and satellite teams of all these nations appear to be willing to allow the Chinese to control their countries with satellites or they will kill well-known offenders in Chinese satellite intelligence immediately. Microburst technology can dispatch a killer. By continuing to focus absurdly impotent attacks on me, all Chinese satellite agencies involved in the attacks are revealing specific information on their orbits, while forcing satellite and intelligence agents of every nation to kill high-ranking leaders or their family members in China.

Before the NSA can evolve a regional code project, DHS and military aircraft personnel must set up ESPA centers in their off-base homes, which protect military bases by providing specific financial information being revealed in streams in New Mexico by satellites of several nations. These satellites use a pulsing frequency to make water actually spell out Chinese names and concise financial information of people in China. Cyber-attackers or electronic invaders will copy this valuable information from home computers and leave, instead of risking their lives by electronically invading military homes or bases. FBI agents that obtain information on high-ranking leaders in the Chinese satellite community or leading citizens in China, can protect FBI offices in the same way. Electronic invaders will simply copy down information on home computers and leave; but they will usually return for new information to sell. Reveal specific information on Chinese satellite orbits, as it becomes available. This will prove to electronic invaders that Chinese satellite teams will steal massive amounts of money from electronic crime syndicate organizers of any kind, while blaming Russian geek satellite teams for the thefts. This Chinese plan has already hit the worldwide (WHISPEERS) rumor mill. Now, Chinese satellite teams will begin to loot electronic crime syndicate organizers, who cannot go to FBI agents they manipulate to complain, because satellite teams of many nations will inspire the FBI agent to ask all kinds of uncomfortable questions.

If Chinese agencies want this project talking stream information distribution to become manageable, they must stop attacks on me of any kind and find me a reasonable lover for a code project criminals eavesdropping on Chinese satellite teams cannot use and an affordable rental room in Roswell New Mexico. Every time I move, reconnaissance aircraft are able to obtain triangulation on Chinese satellites that previously attacked me. After reasonable demands are met, I will name a limited number of streams for distribution of vital information, instead of allowing every waterway with eavesdropping devices located near it to continue to reveal a wide variety of specific information. If I am forced to move away from Roswell, (WHISPEERS) and (LEAVES) gear in numerous area businesses in New Mexico will begin to provide similar information.

Each business will continue to provide a few names, addresses and concise financial information, instead of information overload, which became a problem in a redefined Defense Advanced Research Agency (DARPA)[GNO=10010100010010010@darpa.mil key to source code] project in Mississippi, to create radio reliability, while discovering disruptive agents of military and civilian radio. Chinese satellite teams caused me to become central in a modified DARPA project we called Operation Devil's Triangle on 9/11/13 by disrupting normal FM radio reception in my home and vehicle most of the day. I was living in the Golden Triangle at the time. That project is over and never included experiments involving the use of illegal frequencies or eavesdropping on humans. During the project, foreign satellite teams had some fun with US Military reconnaissance aircraft teams by causing minor disruptions of avionics. As expected, Chinese satellite teams became extremely aggressive toward military personnel; so they set up ESPA centers in their homes near military bases, which created FAR too many targets in the Southeastern Region of the USA for Chinese satellite teams to manipulate. By setting up these ESPA centers, we overburdened the ability of Chinese satellites of every kind. At these ESPA centers military personnel furnished concise financial information on leading citizens in China, which they heard in area waterways. Instead of electronically invading military bases, hackers began to quickly copy this valuable financial information and quickly leave before selling it by telephone to other electronic invaders.

After I began to provoke Chinese satellite teams into firing various energies straight at me, for extended periods of time, reconnaissance aircraft simply flew through these traceable beams of energy to detect the positions and orbital patterns of Chinese satellites. Intelligence agency aircraft must transmit these orbital patterns on open radio channels to military aircraft teams in this region, to save jet fuel. Remember, US tax-payers buy that expensive fuel! After we detect the orbital patterns of Chinese satellites, we will set up ESPA centers all along their orbits. Chinese attack satellites orbit along with satellites that can see through roofs and geek satellites that alter drug screenings of military aircraft personnel to cause them to be grounded and discharged from the military. Now satellites of every nation - including Russia - will spread concise financial information on EVERY beach along the Gulf of Mexico and every waterway in New Mexico, because reasonable demands were not met by Chinese satellite administrators. It was 4:30 PM on 10/1/14 and China had far less than 48 hours to comply with demands in a previous paragraph. Now, top organizers of Chinese satellite teams clearly show they are being bribed by criminals that give them absurdly embarrassing orders through a heavily compromised communications system. Previously, multiple intelligence agencies offered these Chinese satellite organizers a code that would trap criminals eavesdropping on Chinese satellite facilities; but the President of China refused to take reasonable measures to correct communications problems in China. Xi Jinping apparently intends to rob wealthy families in China, while blaming intelligence and satellite teams of several other nations. Obviously, orders for Chinese satellite operators to conduct totally ineffective attacks on me are detrimental to any reasonable goals. Starting now, distribution of this information will escalate on an epic scale in China.

During this period of time, one online FBI stood tall against vigorous Chinese satellite attacks of every kind. He kept turning music back on for reconnaissance to track a Chinese geek satellite, which fools running it kept using to turn off the online radio station. Chinese geek satellites are known to alter drug-screenings of military pilots and aircrew to cause them to be grounded and discharged from the military. After their undesirable discharges, military personnel make fierce ESPA code coordinators. As a result of his courage and dedication, not only was a team of international intelligence agents that monitor and control all illegal eavesdropping gear formed in his home and office but also numerous new online agents formed up on his computer. New teams must include white-hat Anonymous hactivist and Russian code specialist. Russians are allowed to conduct activities in the USA and UK that laws prevent federal agents from doing. These online teams will conduct search and destroy missions of Chinese online agents electronically invading numerous nations. After these teams form up, they will be deployed and concealed by satellites of many nations to sections of internet all over the world that are currently inaccessible for individual online agents. Some of these teams will also obtain the protection of clandestine intelligence teams that monitor and control illegal eavesdropping and frequency attack gear in their homes, vehicles and offices. After agents on these online teams gain the attention of Chinese satellite operators, Microburst technology from Black-ops aircraft and satellite teams will guide them. Their superiors should regularly seek the advice of these agents, instead of simply giving them orders. Online agents should come listen to the music in my room for the day, as I offer them verbal instructions that will not appear in ANY written document. By altering online and offline versions of this document and creating computer disruptions to music on my computer, a Chinese geek satellite team is taking risks that no other satellite team on Earth - including wiser managers of Chinese satellite facilities - would take. This Chinese satellite team continues to make every satellite team of the Peoples' Republic of China sound like fools.

Like numerous non-government eavesdroppers and military reconnaissance aircraft personnel who create ESPA centers in their homes to assist in this international effort, this FBI online agent will have his name revealed too. These names will be enshrined alongside mine at the National Crpytologic Museum at NSA/ CSS Headquarters in Fort Meade, Maryland. In accordance with federal law [010100110101=source-code@DARPA.mil] FBI online agents are not allowed to create ESPA code centers in their homes or offices, which reveal specific financial information on leading citizens in China or Chinese satellite coordinators and their families.

4 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Instead of a long OP, let me tell the whole truth about how illegal eavesdroppers attack you (Original Post) Jeffersons Ghost Sep 2014 OP
This is a long OP n/t arcane1 Sep 2014 #1
It is about to become longer and FAR more interesting for online intelligence agents Jeffersons Ghost Oct 2014 #3
I look forward to a longer and more informative post to come! zappaman Oct 2014 #4
too long sorry but not even going to try! n/t wildbilln864 Sep 2014 #2
Latest Discussions»Retired Forums»Creative Speculation»Instead of a long OP, let...