Myanmar...

Discussion in 'World Events' started by David, May 10, 2008.

Thread Status:
Not open for further replies.
  1. kathaksung

    kathaksung New Member

    657. Internet control and computer plant (12/16/2010)

    On Dec. 7, I wrote "655. Bin Laden and Julian Assange, False flag and living plant (12/7/2010)". Later that day, I learned that Assange turned himself in to the British police. I think that was a swift reaction to my analysis. When Assange's real face was exposed, it was unnecessary to maintain the puppet show. Anyhow, his mission is done. The Internet censorship law- COICA, will go through the House next month even he is absent. WikiLeaks established in 2007. The high tide is in recent days. Feds finally consume Julian Assange in my case. On 12/4, they set up a link between Assange and I by answering my post with his name. Then when I correctly revealed his role is a false flag on 12/7, they ended his hide and seek game earlier than planned.

    This time the possible accusation the Feds apply on me might be "access the secret site". I worry that Feds had planted some secret in my computer. I bought a note-book one year ago. I seldom use it because it was heavily harassed by the Feds. The telephone line was blocked; wireless didn't work; even the software Microsoft Word didn't work. Three months ago, my wife suddenly became active on computer with the excuse that she wanted to watch the movie from the Internet. Then came an AT&T technician who found problem in outside station. So the line was opened. Then my wife asked a computer specialist work on my note-book. He downloaded some program into my note-book. So I could go Internet at home and write, store articles with Microsoft Word Pad.

    Sometime later, I found that new Microsoft office software having strange character. It kept pop up when I didn't use it. Have you ever seen the Word Pad actively invite you to use it? It also started to request my name if I want to use it. I suspect some one was controlling my computer remotely. They might covertly collect my material through spy software downloaded by that specialist or even input some "confidential material" into my computer without my awareness. My wife never watch a movie from the Internet until now. What she did three months ago, was an action instructed by the Feds. They set up a trap in computer for me. I allege.

    To eliminate my suspicion, the computer specialist my wife invited was S.Y.. He was my neighbor 15 years ago.
    That was 1995, when I returned from Shanghai, I found my next door neighbor changed. Two families shared a four bed-room house. One family was a couple named Y with a son. The other one was a single mom with a daughter. My wife also had a new colleague: G-man who had a girl. (see 643. Foreign agents or foreign support groups? (8/12/2010) )
    The three children were at similar age to my daughter.

    My daughter had had three playmates before 1995, they lived cross street or several buildings away. They were all moved away at that time. Instead, Feds found three new playmates for my daughter. From them, I learned that when Feds put one under surveillance, they even get the child included.(my daughter was 6 then) And how close it was? Two families were in next door. One worked as my wife's colleague.

    C.Y. was a Chef. He never worked long in any restaurant. Sometimes one week in this one, sometimes a month in that, he changed his employer all the time. When Mrs. Y said her husband had almost worked for every restaurant of the Bay Area, I interpreted it as: the Feds had investigated all restaurants in Bay Area.

    S.Y. was a boy then. Last time I saw him, he was still a pupil. Now he is a young man. It seems the Feds have cultivated him as a computer "specialist".
     
Thread Status:
Not open for further replies.

Share This Page