6-24-04 Bemerkungen über 1-18-02 Tatbestand
Find out which JESUIT CONSPIRATOR is constantly turning off the power to my computer and/or is messing with this house’s water supply (probably using satellite technology) and give them the death penalty for drawing attention to my ETHNOGRAPHY in order to orchestrate a conspiracy (among their other CONSPIRACY LAW violations). Have my mother watch their cross-examination, CONFESSION STATEMENTS and public execution of these people who are knowingly and willingly turning off the power to my computer as I work on CONSPIRACY LAW and/or who are messing with the water supply to this house. They are causing me to lose my work (about 4 times today) and creating confusion as I work on CONSPIRACY LAW.
Here are some suggested questions to ask these Jesuit THUGS:
Did you or someone you assist (directly or indirectly) participate in the use of SATELLITE LOOPHOLE ACTIVITIES (see Sect. 59 of 666-Computer Laws or Satellite Computer Laws for PLPs and RSPs) on Gail Schuler or Bill Fuller or Misao xxxxx or any other person? They must answer this question with “yes”, “no” or “I don’t know”. If the answer is determined to be “yes” or “I don’t know”, ask them the next 4 questions.
Why did you (or someone you assist) wait until all of Gail Schuler’s LOOPHOLE PROGRAMS were removed before you utilized any of your SATELLITE LOOPHOLE ACTIVITIES on any PERSON-PROGRAM?
Why and how are you (or someone you assist) constantly turning off the power to Gail’s computer as she works on CONSPIRACY LAW about SATELLITE LOOPHOLE ACTIVITIES?
Why and how are you (or someone you assist) messing with the water that goes to Gail’s house at Melbourne, FL?
Exactly what kind of illegal programming changes did you introduce into Gail, Bill Fuller and Misao xxxxxxx’s PERSON-PROGRAM using your SATELLITE LOOPHOLE ACTIVITIES? Have them describe what they did, how they did it, and why they did it.
Vladimir has informed me that some of our PROGRAMMING ANALYZERS were aware (for months) that LOOPHOLE PROGRAMMING was being used on PERSON-PROGRAMS to cause illegal damage and alterations to PERSON-PROGRAMS and have deliberately not reported this violation of CONSPIRACY LAW to the proper authorities.
I just today wrote a clear-cut law which makes it a death penalty to be aware of an ANOMALY and to not report it in a CONSPIRACY REPORT (see Sect. 55.12c of Int. PLP and RSP-Network Conf.). However, these LAW ENFORCEMENT PERSONs who did not report these ANOMALIES (about LOOPHOLE PROGRAM induced alterations to PERSON-PROGRAMS) have violated Sect. 51.51 of International PLP and RSP-Network Conf. (which is a death penalty violation) and have violated the clear-cut principles of CONSPIRACY LAW; and, so, deserve the death penalty for willingly and knowingly violating Sect. 51.51 of Int. PLP and RSP-Network Conf. which was written before we established the PROGRAMMING ANALYZER position. They can’t use the excuse that CONSPIRACY LAW didn’t make it clear that to not report that LOOPHOLE PROGRAMMING was being used to damage PERSON-PROGRAMS was a death penalty violation, since Sect. 51.51 (and other sections of CONSPIRACY LAW) show that these persons violated other death penalty violations of CONSPIRACY LAW. And these laws were written way before the PROGRAMMING ANALYZER position was created. Most of these violators were not Jesuits, but took large bribes to keep their mouths shut–so they were Jesuit supporters.
They need to be given the death penalty to show that we do not support the use of the 666-Computer by our own LAW ENFORCEMENT PERSONS to harm or kill people. If we allow these LAW ENFORCEMENT PERSONS to get away with this, it will make it appear that WE AGREE WITH WHAT THEY DID–which is to cooperate with criminals who use the 666-Computer to kill people. So, they must get the death penalty they deserve.
See Sect. 51.51, 54.51, and 55.640 of Int. PLP and RSP-Network Conf. These PROGRAMMING ANALYZERS have definitely committed death penalty violations.
51.51 A WEAKNESS is anything or any technology (including satellite technology) which a Jesuit Conspirator could employ to wrest (in part or in whole) 666-Computer or satellite computer and satellite control away from an authorized user of a 666-Computer or satellite computer and satellite computer. ➔ A WEAKNESS is also anything or any person or organization which could encourage/or are violations of CONSPIRACY LAWS. Any person who is aware of a WEAKNESS and who (deliberately, knowingly and willingly) does not report it (as soon as possible) to the International government [and/or to one of the BRANCH COUNTRIES’ government (if the WEAKNESS involves that BRANCH COUNTRY)], will receive the death penalty as a JESUIT CONSPIRATOR. 666-Computer or satellite computer mind-reading, emotion-reading and memory-reading technology will be used to determine why a WEAKNESS was not reported and/or if the report was delayed, why the WEAKNESS was not reported as soon as possible by any one who was aware of a WEAKNESS. 666-Computer or satellite computer mind-reading, emotion-reading and memory-reading technology can also help determine whether or not a WEAKNESS was reported as soon as possible.
55.640 Also, if the PROGRAMMER becomes aware of any CONSPIRACY LAW violations (such as LOOPHOLE PROGRAMS) or WEAKNESS (see Sect. 54.51) while doing work on a 666-Computer or satellite computer or satellite program (see Sect. 25 & 26 of ICL:ST), that PROGRAMMER is required to report the CONSPIRACY LAW violation or WEAKNESS as soon as possible (in a CONSPIRACY REPORT) to the INTELLIGENCE COMMITTEE (instead of the CONSPIRACY LAWS DEPT.). Also, any willing, knowing and deliberate delay or neglect to file a CONSPIRACY REPORT about any CONSPIRACY LAW violation or WEAKNESS (which is noticed by a PROGRAMMER) to that PROGRAMMER’s INTELLIGENCE COMMITTEE will result in the death penalty as a JESUIT CONSPIRATOR to that PROGRAMMER. Any willing, deliberate and knowing intent to delay or neglect the filing of any necessary CONSPIRACY REPORT can be determined by 666-Computer analysis of the alleged criminal’s mind.
GENERAL 666-COMPUTER AND SATELLITE COMPUTER LAWS:
7.0 SECRET TECHNOLOGY is defined as any technology (especially technology which utilizes the 666-Computer or satellite computer or satellite technology) which can be used (directly or indirectly, legally or medically or in any other way) against the CONSPIRACY LAW PRESIDENT or Gail Schuler and is technology that the CONSPIRACY LAW PRESIDENT and/or Gail are unaware of. All Jesuit technology (which the CONSPIRACY LAW PRESIDENT and/or Gail are aware of) may be described in CONSPIRACY LAW documents. For security purposes it may be necessary to not describe all known Jesuit technology in CONSPIRACY LAW documents, but all known Jesuit technology will be described (in the International military tribunals) in a document entitled JESUIT TECHNOLOGY. Therefore, any technology which is employed against Gail or the CONSPIRACY LAW PRESIDENT and which is used against us and which is not described in the JESUIT TECHNOLOGY document is SECRET TECHNOLOGY. For instance, Gail had noticed that she had been a victim of DIRECTED STUMBLING, where her arms, hands, feet, or legs seem directed to stumble into specific targets. It was a mystery how this was accomplished, since she was under the direction of a PLP, who did not appear to be violating the CONSPIRACY LAW PRESIDENT’s instructions.
7.01 SECRET TECHNOLOGY INFORMATION is defined as any knowledge or information about SECRET TECHNOLOGY (as defined in Sect. 7.0 of this document).
7.1 A JESUIT CONSPIRATOR is defined as anyone willingly (directly or indirectly) involved in a conspiracy designed to strengthen the Jesuits’ legal case against the CONSPIRACY LAW PRESIDENT and/or Gail Schuler or who is part (directly or indirectly) of any conspiracy designed to help the Jesuits in their imperialistic designs upon the world. An EMOTIONAL or FINANCIAL HISTORY (see Sect. 77.03) can be done on any JESUIT CONSPIRATOR.
7.2 In order to defeat the Jesuits’ in their imperialistic designs upon the world, it is necessary to be aware of any SECRET TECHNOLOGY which they may use against us. Anyone who is aware of any SECRET TECHNOLOGY which the Jesuits and/or their Al-Qaeda network could use against the CONSPIRACY LAW PRESIDENT and/or Gail Schuler and who does not reveal this SECRET TECHNOLOGY INFORMATION to the International government within 7 days will be investigated as a JESUIT CONSPIRATOR. Anyone found guilty of being a willing JESUIT CONSPIRATOR will be executed and their name and full identification listed in a JESUIT EXPOSURE ADDENDUM. Any person who has any SECRET TECHNOLOGY INFORMATION has 7 days to come forward with this information. After 7 days, any person discovered to have SECRET TECHNOLOGY INFORMATION (which has not been disclosed to the International government and described in the JESUIT TECHNOLOGY document–see Sect. 7.0) will be considered a JESUIT CONSPIRATOR, and if found guilty of being a JESUIT CONSPIRATOR, will be executed and their name and full identification listed in a JESUIT EXPOSURE ADDENDUM.
7.3 Exceptions will be for those who have this SECRET TECHNOLOGY INFORMATION and who were held against their will from coming forward during the 7 day period (and this will be verified by lie-detection). Those who held this person against his/her will become JESUIT CONSPIRATOR suspects.
7.4 Exceptions will also be for those who have this SECRET TECHNOLOGY INFORMATION and who were unaware of the 7 day deadline (and this will be verified by lie-detection). Those who were unaware of the deadline will only spare themselves the death penalty if they will make a sworn confession as to how they were unaware of this technology and this confession will be entered into the military tribunals.
7.5 Exceptions will also be for those who have this SECRET TECHNOLOGY INFORMATION and who discovered this SECRET TECHNOLOGY INFORMATION after the 7 day deadline (and this will be verified by lie-detection), these must also make a sworn confession as to how they discovered this technology after the deadline and this confession will be entered in the military tribunals.
7.6 Anyone who discovers any SECRET TECHNOLOGY INFORMATION after the deadline is required to immediately report it to the International government. Those who neglect to do so will be executed and their names and full identification listed in a JESUIT EXPOSURE ADDENDUM, except for the exceptions noted in Sections 7.3 through 7.5.
7.7 Written confessions (which will be published and entered into my written statements with all the rights of my written legal documentation as defined in my 3-9-03 Power of Attorney document) may be substituted for the death penalty for some JESUIT CONSPIRATORS. All JESUIT CONSPIRATORS will be identified (with full identification) in a JESUIT EXPOSURE ADDENDUM, regardless of whether or not they are executed or given the death penalty.
These PROGRAMMING ANALYZERS have definitely violated the principles of CONSPIRACY LAW–TERRORIST MONEY LAWS:
5.0 A CONSPIRACY HISTORY is defined as a document which lists all conspiracies (which have been brought up in military tribunals in connection with a PERSON OF INTEREST☛ these are called PERTINENT CONSPIRACIES) and then analyzes a PERSON OF INTEREST’s memory (via 666-Computer or satellite computer) to see if any of these conspiracies were KNOWN to the PERSON OF INTEREST. After this analysis, these conspiracies (in relation to the PERSON OF INTEREST) are categorized in a CONSPIRACY HISTORY as KNOWN or UNKNOWN CONSPIRACIES. The purpose for a CONSPIRACY HISTORY is to check to see if the person had knowledge about a conspiracy when it was occurring. For this reason, the date when the knowledge of the PERTINENT CONSPIRACY first came into that person’s mind should be noted in the CONSPIRACY HISTORY (this date should be available via 666-Computer and satellite computer memory analysis).
5.1 A PERSON OF INTEREST is a person who is legally connected to a PERTINENT CONSPIRACY.
5.2 A KNOWN CONSPIRACY is defined as a conspiracy which, when it was occurring, was known (or familiar) to the PERSON OF INTEREST. For a conspiracy to be a KNOWN CONSPIRACY, the PERSON OF INTEREST must have known about the conspiracy as it was occurring and must have had some knowledge of its methods of operation, who was involved with it, its purpose or how it was started. The 666-Computer and satellite computer will be used to determine if a person KNEW about the PERTINENT CONSPIRACY. To KNOW about a conspiracy means that to the PERSON OF INTEREST, the conspiracy is a KNOWN CONSPIRACY.
5.3 AN UNKNOWN CONSPIRACY is defined as a conspiracy which, when it was occurring, was NOT known (or familiar) to the PERSON OF INTEREST. The 666-Computer and satellite computer will be used to determine if a person did NOT KNOW about the PERTINENT CONSPIRACY. An UNKNOWN CONSPIRACY is a conspiracy with which the PERSON OF INTEREST has no knowledge of (when it was occurring)– which means the PERSON OF INTEREST was totally unaware of its methods of operation, who was involved with it, its purpose or how it was started, and that the PERSON OF INTEREST (because of his/her ignorance of the operation) could NOT have orchestrated or conceived (or participated in) the conspiracy. This will especially be assumed–if–after analyzing the PERSON OF INTEREST’s memory (via 666-Computer and satellite computer), it is also determined that any knowledge or involvement this PERSON OF INTEREST had about this conspiracy, was NOT removed from his/her memory (via 666-Computer or satellite computer amnesia). To NOT KNOW about a conspiracy means that to the PERSON OF INTEREST, the conspiracy is an UNKNOWN CONSPIRACY. Any person who is listed in this UNKNOWN CONSPIRACY list and who has a long list of conspiracies after his/her name– will be mentioned in INTERNATIONAL BROADCAST NEWS as being excessively targeted, and that they are targeted IN ORDER TO BE FRAMED WITH criminal CONSPIRACY INVOLVEMENTS. It will especially be assumed that this person is targeted, if they have few or no conspiracies mentioned after their name in the CONSPIRACIES KNOWN list. A comparison between the two lists (KNOWN and UNKNOWN CONSPIRACIES) should be mentioned in the news presentation. The number of conspiracies after the person’s name in the UNKNOWN CONSPIRACY list will be mentioned in INTERNATIONAL BROADCAST NEWS☛and some details about the conspiracies may be mentioned. If it is known WHO is behind the targeting, this may be mentioned in INTERNATIONAL BROADCAST NEWS as well.
5.4 Three lists will be made: 1) CONSPIRACIES KNOWN, 2) CONSPIRACIES UNKNOWN, and 3) HIDDEN JESUITS.
5.5 In the CONSPIRACIES KNOWN list, all PERSONS OF INTEREST who KNEW about a conspiracy will be listed. This list will be updated daily; all changes made to this list will be dated and legally documented. Names may be changed to protect the innocent, if the name is changed it will be recorded in the International military tribunals. No one will be listed in this list unless this person is (or has been) involved with legal proceedings regarding the PERTINENT CONSPIRACY. Beside each PERSON OF INTEREST listed, will be a symbol or identification (I.D.) which will identify the particular conspiracy (or conspiracies) associated with that PERSON OF INTEREST. If amnesia (via 666-Computer or satellite computer) was used to block a person’s memories of a conspiracy, but the person KNEW about the conspiracy before the amnesia, that person will be listed in the CONSPIRACIES KNOWN list.
5.6 All conspiracies mentioned in these lists will have I.D.s. Next to the I.D. will be mentioned the start and end dates of the conspiracy (if known). If the conspiracy is still continuing, or the end date is uncertain, then no end date will be listed. These I.D.s will be listed in an index which will describe the conspiracy associated with each I.D. This index will be called CONSPIRACY DESCRIPTIONS.
5.7 In the CONSPIRACIES UNKNOWN list, all PERSONS OF INTEREST who did NOT KNOW about a conspiracy will be listed. This list will be updated daily; all changes made to this list will be dated and legally documented. Names may be changed to protect the innocent, if the name is changed it will be recorded in the International military tribunals. The purpose for this list will be to identify those PERSONS OF INTEREST who may be victims of unfair attempts to frame them for conspiratorial crimes which they had no knowledge of. No one will be listed in this list unless they are (or have been) involved with legal proceedings regarding the PERTINENT CONSPIRACY (or CONSPIRACIES). By each PERSON OF INTEREST listed, will be a symbol or identification (I.D.) which will identify the particular conspiracy (or conspiracies) associated with that PERSON OF INTEREST, and which were conspiracies which that PERSON OF INTEREST did NOT KNOW.
INTERNATIONAL CRIMINAL LAW: SPACE TECHNOLOGY
26.2 SATELLITE PROGRAMMERS are responsible to maintain, inspect, and evaluate the programming for those FORCEFIELD BLOCKS (for those satellites which are under the jurisdiction of their country) to insure that these FORCEFIELD BLOCKS are operating in compliance with CONSPIRACY LAW. For instance, German SATELLITE PROGRAMMERS are responsible for all German satellites in space. But any SATELLITE PROGRAMMER who is aware of any violation of CONSPIRACY LAW is required to report it in a CONSPIRACY REPORT to his/her HOMELAND SECURITY DEPARTMENT, even if the violation is from another country besides his/her own.
I’ve quoted enough law to hang these people three times over and I need to try to sleep. I’m suffering right now from their violations of CONSPIRACY LAW. My LOOPHOLE PROGRAMS are removed and I still have symptoms induced by illegal 666-Computer use.
Electronically signed: Gail Chord Schuler
Place: Melbourne, FL