The third ICJ trial over the suspect Lawrence C Chin, July – September 2016 The third International Court of Justice trial over the suspect: French/ Russian vs Homeland Security Part IV 15 February ± 8 March 2016 RESUME The Secret Society women consist of (February 2016): ANG (G: Angelina Le Beau Visage), KRN (J: Kiersten), SDW (Maura), and the German Lady (K: Karin/ Carine). With auxiliary members like Dina B, SDW©s Tampa friends, VJ, the female victims of the suspect©s vandalism, etc. It©s not clear whether Dr P (Petterson) is still involved with the Secret Society©s operation. This is how you must picture to yourself the situation in the International Court of Justice. At issue are these two contradictory ªwarningsº or ªprofilesº, one originating from Homeland Security, which says the suspect is a misogynist, schizophrenic, and plagiarizing terrorist cyberstalker of women and the Secret Society women are his victims and expert witnesses on his morbid psychology, and another originating from the TMU and the CIA which says the suspect is not a terrorist, not a stalker, and not a misogynist and does not suffer schizophrenia, does not hack people©s computers, and does not plagiarize, and the Secret Society women have not been victimized by him and have no expert knowledge of him and are a bunch of pathological liars who like to pretend to be victims under the cover of ªvictim confidentialityº. The Russians and their allies now affirm that Homeland Security©s warning is correct. However, the results of Interpol©s, and previous law enforcement detectives©, investigation which are streaming into the ICJ courtroom all show that the TMU/ CIA warning is correct. Nevertheless, the Russians can still win this if they can prove that the suspect has the habit of using the status which Homeland Security has conferred upon him as a ªterroristº to do damage ±- in which case, even if the TMU/ CIA warning is correct, they can still use Homeland Security©s false warning as if it were true to benefit themselves. The CIA©s only response then is to prove that the suspect, when he does use his status as a terrorist to do harm, is merely being sarcastic, and doesn©t really believe he could do any real harm. This debate characterizes the subsequent course of this third ICJ trial. It should be said that the CIA©s case more accurately describes the suspect. The following reconstructs the Secret Society women©s operation and the associated ICJ trial up to 8 March 2016. It is within this period that the Secret Society women would give up on their case with the Interpol and open a new case against the suspect with the Secret Service. Trump©s campaign would become involved. 15 February (Monday; German Lady©s meetup tonight) 1 The third ICJ trial over the suspect Lawrence C Chin, July – September 2016 First, let©s look at the suspect. 12 AM, before he goes to bed, he downloads many of S Snitzer©s Talk Shoe program recordings. He is looking for SDW©s participation in them, but finds none. It©s not clear whether the Russians and FN would submit the surveillance of the suspect©s doing to the ICJ as evidences confirming his conformity to Homeland Security©s false profile of him (that he is cyberstalking the Secret Society women). The suspect wouldn©t fall asleep until 4 AM. He wakes up past 12 PM. At the bus stop, 1:30 PM. There is no bus. Today turns out to be a holiday. On the bus, 2 PM. He ends up in Bru-Coffee. At one point, scolded and complained about by patrons of the gymnasium next door for smoking on the sidewalks. He works quietly in Bru-Coffee until 8 PM. Skylight. Jons, chicken. 9 PM, he is going home. An uneventful day. Now let©s look at the Secret Society women©s actions. After almost three and half hours, the Secret Society women resume operation. 6:02 AM, 80.39.42.27, staticip.rima-tde.net, Madrid. 80.39.42.27 - - [15/Feb/2016:07:02:22 -0700] "GET /badvisits/5712-43.png HTTP/1.1" 404 614 "https://www.google.es/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_2_1 like Mac OS X) AppleWebKit/601.1 (KHTML, like Gecko) CriOS/47.0.2526.70 Mobile/13D15 Safari/601.1.46" How the suspect is cyberstalking with his visitors© log. The second visit to this image since the resumption of operation yesterday. 8:27 AM, 84.147.133.81, ipconnect.de, Nuremberg, Germany. 84.147.133.81 - - [15/Feb/2016:09:27:12 -0700] "GET /scientificenlightenment1/totem1.jpeg HTTP/1.1" 404 625 "http://www.stylepinner.com/totem-poles-in- stanley/dG90ZW0tcG9sZXMtaW4tc3RhbmxleQ/" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:44.0) Gecko/20100101 Firefox/44.0" Plagiarism. 9:28 AM, 76.67.170.194, dsl.bell.ca, Montreal Quebec. 76.67.170.194 - - [15/Feb/2016:10:28:30 -0700] "GET /badvisits/5712-43.png HTTP/1.1" 404 614 "https://www.google.ca/" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5 Build/MMB29Q) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36" Cyberstalking. The third visit. 9:45 AM, dsl.sta.frenabb.no, Elnesvagen, Norway, 85.252.188.91 - - [15/Feb/2016:10:45:35 -0700] "GET /scientificenlightenment1/dividedline.jpg HTTP/1.1" 404 633 "http://www.bing.com/images/search? q=platos+three+divided+human&view=detailv2&&id=0DC8D2A40A7C80B87B0C9B2EB38382E862 DA54B6&selectedIndex=8&ccid=Bwp5%2bLpC&simid=608031898138182782&thid=OIP.M070a79f 8ba42d2bb668ddfde9f09fe69o0&mode=overlay" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko" Plagiarism? 10:11 AM, 208.90.106.2, vpn.northark.net, Arkansas Research and Education Optical 2 The third ICJ trial over the suspect Lawrence C Chin, July – September 2016 Network, 208.90.106.2 - - [15/Feb/2016:11:11:51 -0700] "GET /scientificenlightenment1/dividedline.jpg HTTP/1.1" 404 633 "http://www.bing.com/images/search?q=Plato %27s+Divided+Line+Theory&view=detailv2&&id=A6FC276F9DAFCC0B3F658C95ADF7CD22290 C50AE&selectedIndex=12&ccid=tSVQyvcW&simid=608010187077258647&thid=OIP.Mb52550caf7 166b68cd5675c63bca3344o0&mode=overlay" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko" This is North Arkansas College, a two-year college. Presumably to reinforce the previous false testimony ± and its credibility reinforced by the volunteer©s status as a college student. 10:53 AM, 187.172.249.15, dyn.prod-infinitum.com.mx, Saltillo, Mexico, 187.172.249.15 - - [15/Feb/2016:11:53:39 -0700] "GET /scientificenlightenment1/asmatpoles.jpg HTTP/1.1" 404 628 "https://www.bing.com/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.10240" Plagiarism. Then, 11:09 AM, 197.156.102.54, Ethiopian Telecommunication Corporation, 197.156.102.54 - - [15/Feb/2016:12:09:36 -0700] "GET /scientificenlightenment1/higgsfield.jpg HTTP/1.1" 404 632 "https://www.google.com.et/" "Mozilla/5.0 (Linux; Android 4.3; HUAWEI Y530- U051 Build/HuaweiY530-U051) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.114 Mobile Safari/537.36" Plagiarism. 11:45 AM, OARnet, Steubenville, Ohio, 206.244.94.102 - - [15/Feb/2016:12:45:41 -0700] "GET /scientificenlightenment1/dividedline.jpg HTTP/1.0" 404 595 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.109 Safari/537.36" Decoy or plagiarism. 12:42 PM, 189.70.99.153, veloxzone.com.br, Belo Horizonte, Brazil. 189.70.99.153 - - [15/Feb/2016:13:42:41 -0700] "GET /scientificenlightenment1/totem1.jpeg HTTP/1.1" 404 625 "http://www.stylepinner.com/totem-poles-in- stanley/dG90ZW0tcG9sZXMtaW4tc3RhbmxleQ/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.109 Safari/537.36" Plagiarism. The second visit to this image today. 1:35 PM, 159.45.71.9, out.wellsfargo.com, St Louis, Missouri, 159.45.71.9 - - [15/Feb/2016:14:35:59 -0700] "GET /scientificenlightenment1/asmatpoles.jpg HTTP/1.1" 404 628 "http://www.bing.com/images/search? 3 The third ICJ trial over the suspect Lawrence C Chin, July – September 2016 q=camel+symbol+on+totem+pole&view=detailv2&&id=9E0F5F6EFAF18D88DD60F4AD3507C58B 2E74EDE5&selectedIndex=113&ccid=7EtatK23&simid=608051766653684011&thid=OIP.Mec4b5ab 4adb7e5203302a86069d814eao0&mode=overlay" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko" Plagiarism. The second visit to this image today. The Secret Society women then take a long break of five and a half hours. They might be just sleeping since they have been busy throughout the night last night. It could also be related to the fact that the German Lady is preparing for her meetup. She will be hosting her meetup 5:45 PM at Amigo©s Restaurant and then take the group to see the movie ªWhere to invade nextº. Finally, 6:53 PM, operation resumes: 72.75.219.84, blflony.fios.verizon.net, Buffalo, New York, 72.75.219.84 - - [15/Feb/2016:19:53:14 -0700] "GET /1/iroquoissociety.jpg HTTP/1.1" 404 614 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.109 Safari/537.36" Plagiarism. Then, on 7:20 PM, the Secret Society women send a volunteer to the suspect©s new domain: 142.177.99.26, fibreop.nb.bellaliant.net, Moncton, New Brunswick.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages108 Page
-
File Size-