GARBAGE IN = GARBAGE OUT… Easy algebra.  But translated into English coherence: The 2014 mid-term elections were NOT an indication of the Failure of The Democratic Party and the efforts of the Obama administration. The 2014 mid-term elections WERE an sign that a Greater percentage of Americans either are, or support, FAILURE. Because of all the money the insurance agencies, hospitals, doctors, and people with dictator streaks, pumped in to the ‘brainwashing’ of American voters ==> yielding:  the GOP contaminated the voting reaction.

The GOP is NOT interested in passing ANY Immigrations bill.  The last thing they want is a new unified voting block of American Workers struggling to earn a paycheck and save for their future.

Then there is the issue of the pipeline… Mary Landrieu’s pipeline full court press is about as strategic at Mitch McConnell’s “no government shutdown promise.” Senator Reed, it wasn’t important enough to ‘force’ a 2015-2015 unemployment extension bill to the President’s desk… Jobs? The job creators are only hiring Zombies, not the best qualified. The GOP is only interested in brainwashing and enslavement of the American Population. They will re-write the US Constitution if given the opportunity. Protecting against a free and democratic vote in America is the only priority of the weak desperately trying to stay in power.

GOP ‘Read My Lips…’ keep the pipeline in Canada. Send TransCanada Keystone straight out the Canadian Coast. It might be strategic to incorporate a dead-closed ‘T’ for future consideration, but Keystone XL is a homeland security nightmare and an environmental time bomb for the Gulf Region. The US will not get any of that oil and the US will not get paid ‘rent’ for it’s land usage; most certainly not commensurate with the RISKS the adjacent land basins will have to bear. The Keystone XL is not a bargaining chip…

Republicans are not interested in ANY human issue that affects the bottom 98% of Americans. Three Cheers for Scott Walker?  Come now Mr. Boehner, we all recognize that you would make a presidential candidate. It is not that I don’t like you, I am just not interested in smelling the ‘stench’ [Paul Ryan’s words] of the GOP garbage that is being left out to rot.




Observations on Electronic Harassment Created through Standard Radio Based Scanner Broadcasts

Under construction—draft 2

January 24, 2014 first entry

Disclaimer:  I understand the basic issues of the human mind, and the fluctuating control of the Id, Ego, and  Super-ego.  The Id represents the unorganized instincts and drives.  The Ego functions on ‘the reality principle’ which satisfies desire in a realistic paced and longer term pathways versus choices that will bring short-term grief.  The Super-ego guides towards perfection through guidance and socially appropriate focus. [see,_ego_and_super-ego ]  So some mud-slinging smarty pants MAY try to argue that as a defense mechanism, when one of these three components seeks to control the brain, IT MAY BECOME SO STRONG AS TO AUDIBLY PRODUCE SIGNALS TO REINFORCE THE NEEDS AND DRIVES INNATELY CONTAINED IN ITS STRUCTURE.  In other words, putting a microphone to an artificial voice given to a particular part of the consciousness, and a speaker placed in the ears so has to over-ride the brain’s reasoning structure.  This synthetic strength would bypass thought processes, and manifest in human abnormal behavior.  This phenomenon described might be labeled as psychosis or multiple personality disorder.  However, the proliferation of electronic signal saturation, and plain dirty trick playing harassing individuals, may seek to create a false diagnosis by employing undefined or unsuccessfully prosecuted technologies and techniques.  Perhaps some people’s brains are more susceptible to penetrating radiation, some may be just plain targeted. [see microwave auditory frequency, wiki;  ]

Gary Sklaver is the attorney that told me, in Attorney Fretel’s office, ‘you can’t stop us…’  Around that time, interfering but audible sound bites and streams started to blend in to my television and radio broadcasts.  I am postulating that these interfering signals are two-way conversations that are similar to the systems that are used by municipal agencies to communicate with each other or some high frequency signal designed for the same purpose .   These conversations seem to place my speakers in the middle, and become decoded by use of a simple signal scanner or ham radio setup.   I performed this step by using a free online scanner, scrolling through the channels, and finding where the blended sound-bites match what are emanating over other non-networked but powered speakers attached to other broadcast medium, connected to unrelated media streams…

This phenomenon seems to match another case Attorney Sklaver was involved in, where not his client, but his opposition faced some sort of similar harassing tactics.  This gentleman later was discredited, signed over his business ownership, and then is quoted of feeling ‘other’ forms of non-traditional manifestations of terror.

As author Molly Ball wrote in her piece ‘A Grab for the Wheel…’ in the Yale Herald Online,

Spoerndle signed over control of the club—he claims he was told the agreement was temporary. Now, thanks to a 12-step program, he says he’s been sober for over two years, but he’s still locked out of Toad’s. In May, he filed a civil suit in New Haven Superior Court, claiming Phelps took advantage of his debased condition and fraudulently induced him to give up his property.

“At that time, I was totally out of my mind. I mean, I was in and out of eight or 10 psych wards. The aliens were at my house, I thought,” Spoerndle says. “And, you know, people sometimes take advantage of people who are out of their minds. But there are laws that protect people.” Spoerndle hopes that those laws will eventually put Toad’s back in his hands.

“I’m not the hotshot I used to be [Spoerndle] , but I’m happier, I’m more at peace,” he says. “I’m extremely grateful I lived through it, grateful to be free. I believe I was allowed to live so I can help others.” Spoerndle currently devotes his time to volunteer work at 13 detox and rehab centers in the area, “helping people get out of that tortured place and have lives.”

Spoerndle’s lawsuit alleges that Phelps “knew that Michael Spoerndle was suffering from mental and physical problems which rendered him incapable and incompetent to han-dle his own affairs” and took advantage of this knowledge to “induce…Spoerndle to sign away his property and his right to control over the Toad’s Place business.”

Phelps and his lawyer, Gary Sklaver, declined to comment on the suit.

Molly Ball, Yale Herald Online;

Unfortunately, I am unable to contact Mr. Spoerndle about his experiences, except perhaps by séance.  In this case, though years have passed since the suit was initiated, [circa year 2000].  Mr. Spoerndle was found dead in his East Haven House in 2011.  Brian McCready of the New Haven Register reported [Posted: 05/07/11, 12:00 AM EDT]:

NEW HAVEN — The man who made Connecticut rock has died. Mike Spoerndle, 59, of East Haven, who founded the legendary New Haven music club Toad’s Place in 1975 was found dead in his home Friday. The exact cause of death remains unknown…”  Brian McCready, New Haven Register

A very sad day for New Haven Music, Arts and Entertainment, but most importantly, a link lost for my research.  I would have liked to compare notes, and gotten HIS opinion about Attorney Gary Sklaver, and the harassment he claimed to experience.

Not quite the Danny Casloaro story, but…? [ ]



draft…not completed

Most people lead normal enough lives that they enjoy a good scare once in a while.  The toughest decisions are which to choose, a suspenseful book or scary movie.  Who done it and why.  When the monsters come out the stalker chooses their weapon or the nightmare penetrates the calmness, the show begins.   Terror begins to sketch out its shape.  No problem, most normal people choose to watch, and a huge money machine supports fear generation.  The viewer can always click to another channel, or get up for a snack.  The spell is broken. 

 But what if the individual couldn’t stop the show.  What if the terror keeps coming on, slowing creeping into every corner of living days.  A year or so ago, I was watching late night television.  I remembered an old Halloween KIT Vincent Price used to promote.  It allowed children to carve apples, dress them with fake hair and apparel and bake them in the oven.  Shrunken Heads for a scary season.  Tick, Tick, Tick, DING… it was just that easy.

Modern stalkers have arrays of magical jars of clay to shape and extrude from.  They just don’t create fear with their scary ‘dolls.’  The voodoo slight-of-hand steals small bits of the victim’s essence and enchants new zombified identities to multiply the depth and breadth of illusion.  As individuals proceed with daily life, jobs, family, activities, they feel slowly drained.  The real fear of this horror is unexplained loss of control of the small things.  The world still spins and cycles.  Days continually progress.  But in the recesses of the victim’s mind, a small fear takes shape until it overtakes the happy sequences.  This show won’t be made for T.V. and it doesn’t end in a two-hour format. 

When the attacks penetrate a victim’s physical and living ‘walls,’ feelings composed of exposure and alienation are generated.  “Exposure” feels like ‘the whole world is watching me,’ and “alienation” feels like ‘no one cares.’  Silent screams vibrate from the victim, but the walk of real life trudges on.  Exhaustion is no reason to stop the show,  life takes patience.  Attackers repeatedly proceed until the victim gives up, loses their identity or submits to the given terms.  Some move away or ‘transfer’ to a different life.  A few disappear or commit suicide.  ‘Just sit down at the desk and write that note,’ the “voice” silently whispers.

Wikipedia defines CYBERBULLYING as “communications that seek to intimidate, control, manipulate, put down, falsely discredit or humiliate the recipient.”  [Wikipedia, English, Cyberbullying]  Victims are most often described as exceptional people.  They often exhibit qualities of competence, CREATIVITY, and integrity.  Victims are often very intelligent and dedicated people.  This inspires jealousy in attackers, who wish to gain an advantage over or actually taking their place.  Sometimes attackers steal their work or credentials, leaving victims dumbfounded and penniless.  This extended type of bullying, stalking and DAMNATIO MEMORIAE, or the cancellation of every aspect of a person’s life, CAN occur to children as well as adults. 

The ACLU and other parent / teacher organizations have started to take notice of the damage this bullying, Cyberbullying and Cyberstalking is causing.  Customized programs for young adults can report bullying by using web apps such as BOB. This stands for ‘Back Off Bully,’ and if the attacks are warranted, networks are in place for follow-up.  Unfortunately, adults have to use a higher standard of proof.  The FBI has developed the IC3 program, has created anti-harassment petitions, and web sites allowing personal comments have been initiated to learn from ‘victim wisdom.’  Other services such as ‘Life-Lock’ and ‘’ protect physical and online pieces of presence, but attackers use more advanced and saturating techniques.  For example, Character Assassination can occur through implicit or explicit permissions.  Wikipedia has warned about this type of structured character destruction by explaining “the mobilization toward ruining the reputation of adversaries [is] the prelude to the mobilization of violence in order to annihilate them.”  In other words, patience and turning the other cheek in these matters has always ended in physical assault of the victims. [Wikipedia, English, character assassination]  Apparently, Wikipedia and its authors have seen this movie before.

CHARACTER ASSASSINATION is defined as a deliberate and sustained process that aims to destroy a person’s reputation and credibility.  Topic incarnate might manifest itself as receiving a phone call immediately preceding a court hearing.  When the news on the phone is worse than the meeting with the judge, a line is crossed.  This is a form of Electronic Harassment that gives new meaning to ‘you have the right to remain silent.’  Officially done to remove a part of someone’s physical appearance.  Unofficially activities such as these might be interpreted as take a fall on this one, because the next attack will be worse.  Character Assassins blend different types of methods ranging from raising false accusations, planting and fostering rumors and manipulating information. [Wikipedia]

GAS LIGHTING.  Originates from the 1938 American Release Play Angel Street (Gaslight).  In this one, Ingrid Bergman’s husband deliberately manipulates small elements their shared living environment.  He proceeded to insist to her and her friends that she is mistaken or mis-remembering details.  The husband searches for Treasure in their house, and when using the attic’s gas lights, causes the house lights to dim simultaneously.  When Bergman accurately notices, her husband continually denies her observations.  This has the effect of causing the victim to doubt his or her memory.  It can involve higher levels of organization.  For example, if a police officer issues an ‘incorrectly written summons’ of manslaughter [murder], the victim may be forced to accept lesser charges.  When multiple steps in the enforcement chain conspire to work together, details become impossible to verify. [parallel construction]  Family and Friends may be led to believe that victim is disoriented.  When the victim is unable to prove the bizarre events by the abuser(s) are incorrect (perhaps the lawyers are in on the show), the falsely accused victim has been ‘Gas Lighted.’  This plot may also occur between parent-children relationships.  Lying and deliberate false hoods undermine perceptions.  Calef and Weinshel described in their article “Some Clinical Consequences of Introjection:  Gaslighting” that this technique involves the projection and interjection of psychic conflicts from the perpetrator to the victim. [Wikipedia, English Gaslighting]

Scary Movie??? As in many cases of life, the ability to resist the scam depends on the victim’s ability to TRUST THEIR OWN JUDGEMENTS.  If you see something, say something, try to get other’s to view the story through your eyes, and most importantly, follow your instincts.  Do your best to correct and validate the facts where able, avoid extraneous conflicts and seize the moments when able.

Like all of the greatest scary movies, the victim tries and tries to elude his attacker(s).  Turning corner after corner in rapid succession; where is the next safest spot?  Unfortunately, like a masterful script writer, the attacker seems to have all of a victim’s life mapped out.  Next example of creating detachment for a victim from their life is at their workplace. 

MOBBING at a person’s job, as described by Wikipedia, occurs where poorly organized production and working methods exist.  Inattentive and participative managements allow a type of emotional assault to occur to the victim whereby they become the victim of harmful or disrespectful behavior.  When correct actions are mismarked, activities continue to single out the victim as non-compliant when clearly, best practices are being performed.  Mobbing is executed by a leader whose actions draw in others to ‘gang up’ on the victim.  In the 1980s, a professor named Heinz Leymann noted that one of the possible side effects of ‘mobbing at the workplace’ is post-traumatic stress disorder.  Somatic Symptoms and psychological trauma have also been noted.  It is very depressing for the victim to have to return day after day to this place of hopelessness, unable to reach out to anyone.  Gossip, rumor and unfounded accusations eventually force the victim to leave.  Mobbing has also been described to exist in schools, academia and during the peer review process.  Ultimately, attacks by one or a few bullies are led by people who have gained positions of power.  This type of horrifying character enjoys abusing their gained power to attack and harm the vulnerable.

People should respect their jobs and their bosses.  But when a correctly diagnosed victim wakes up identifying the specific type of attacking person(s), work is a scary place to spend your day.  Some people are stronger than others.  Some are able to look forward to other things in their lives to block out what is being done. Victims might frequently ask themselves ‘no money could be worth this treatment because this is so far away from the job description.’  INTERFAITH WORKERS JUSTICE is one agency that understands these types of complaints and provides outlets for grievance mediation.  Author Kim Bobo, writer of Wage Theft in America, started this initiative to supplement and enrich existing workplace organizations including the DOL.  Don’t wait until it is too late.  Document your feelings and actions, at least through the lens of a personal journal.  The victim’s voice and words are the greatest protection and ally.  Victim’s need to be their own defender and they should follow the safest mechanisms available.

As the drama unfolds, the targeted individual becomes increasingly confused, disoriented, self-doubting and spiritually weak.  Friends and family may begin to question an individual’s behavior.  The main objective of a CYBERSTALKER is to inflict harm, debilitation and repeated dissociation from areas of strength or solitude.  The reach of the attacker(s) are extended by leveraging electronic and communications methods to create the feeling of ‘heavy breathing on back of the neck.’  These activities at a distance act like a cloak of invisibility, increasing the fear factor, and the difficulty in pinpointing the offending parties.  Multiple people often work together in this electric harassment.  Experts have named this hostility a ‘digital pile on.’  Imagine having an unseen thumb pushing you down every time you try to look up for information.  Internet services, mobile technologies, web pages, discussion groups, instant messaging and SMS all are used.  So whether one person is using multiple entry points or multiple people exploiting one or a few, the harm and hostility is VERY difficult to stop.  A victim getting attacked while conducting daily business is especially bewildering because we as global people sign in with these tools every day.  This basically forces you not to do human activities, so virtual death occurs by getting ‘blocked in’ because of self-paralysis. 

It doesn’t have to be this way.  These attacks are vicious and unrelenting.  It IS difficult to educate authorities and close relations.  Get over the fact that people want to write you off as useless or depressed.  Be your own best friend, and trust your own judgment.  Patiently document everything with multiple sources.   Protect your identity and possessions the best you can.  First question is how hard will you work to hold on to your ideas, values, sanity, and possessions.  I look at these abuses like this;  although videotaping or recording the attack in progress is the best evidence, we do live in a more educated society.  Try your best to be clear and calm.  Fifty or more years ago these types of attacks would be near impossible to prove.  Just ask Ingrid Bergman.  Stay on top of things, and don’t do anything injudicious.

The spelling of Cyberbullying, Cyberstalking and Gang Stalking may appear the same.  Each word even sounds the same.  An example of Gang Stalking would be if you were walking in a parking lot, and an unknown person approached but maintained distance outside your safety zone, say ten or fifteen feet away.  Using their smart phone and social media, some entity at another location would send messages to be read or acted upon, directly relating your personal information.  They make ‘speak to the air’ facts that only you would know, facts that could create and emotional reaction in your brain.  What would you do, fight or flight?  One way or another, your sense of reality has been affected.  At the top of the pyramid, the attacker is usually represented or is the actual information provider, affiliate, or information supplier of a competitor or a competitor itself.  Another example of Gang Stalking would be constant pacing outside your open window, employing the same tactics.  “We’re going to break into your house, steal your mail, hurt your pets,” or use any other personal information against you to get a reaction. 

Cyberbullying employs the same tactics, but uses the devices to create direct or indirect electronic activity.  Threatening emails, texts or internet attacks are all used during Cyberbullying campaigns.  Suicides have occurred through this behavior, most notably Ryan Halligan and Megan Meier.  Victims have many other reactions including reduction of self-esteem, retaliating or acting out, and being scared, frustrated, angry and depressed.  The victims that mange to live with this stress have shown retreat from their friends and activities.  This adds to loss of control and increased exposure to attacks due to the loss of support networks.  Cyberbullying attacks are also aimed at victim’s earnings, employment, reputation, safety and intellectual property.  As the victim gets older in age, courts change the label to Cyberstalking.  And all mentioned techniques CAN be brought closer to the victim by broadcast via speakers or vibratory impulses through tooth or medical device implants.  This is called Electronic Harassment, and skull to ear messaging.

Cyberstalking encompasses the above tactics, with the additions of monitoring, identity theft, damage to data or equipment, or gathering information for solicitation of minors for sex or in order to harass.  A repeated pattern[s] of this behavior to a target by an adult, both in an on-line and off-line environment, is recognized as CyberstalkingCYBERSTALKING is a sub-form of CYBERBULLYING.  Teams of attackers can form together united in purpose, for money or social activities, or simply because it has been successfully carried out against them, and they gave up the keys of hope

The constant monitoring is a particularly vicious attack.  For example, after immediately building a computer, an electrical spike is sent which destroys your new computer.  After the rebuild, the same happens again.  Back to the store, more parts, more labor, and as soon as you get online, the electrical spike occurs again.  Same procedure can be used with the television.  Best remedy here is to use surge protectors and Uninterruptible Power Supplies.  Another example is each time you change your password; an attacker seems to break back in.  Keyloggers and activity replay schemes make all online activity exposed to cyberstalkers.  Some attackers place a victim in a state of fear by copying public pictures that are provocative, pretending to be old yearbook buddies [catfishing] or the tried and true phone pranking. [phreaking].  They may be forced into a situation to protect a worse one in the future, or to insulate something from their past.  Of course, all future activity will be recorded as well.  Motives often include romantic, business conflict, intellectual disagreement, personal dislike or extortion.  Targets often exemplify qualities that the stalker admires but finds personally lacking, and is unwilling to develop in their own persona.  Apparently these activities are fun for some people, but let it be known that all of this is illegal and attackers ARE put in jail.  Imagine getting your Federal Freedom of Information Act returned clean, and your request for harassment records denied by the State of Residence.  The best overall policy is to keep yourself as private as possible and trust your own judgment.  An elder once told me, ‘if you steal, things will be stolen from you.’  Cyberstalkers will stalk stalkers when easier targets are unavailable, or to obtain more challenging prey.

 After all the popcorn and ju-ju bees are eaten, and the soda is almost finished, the twist of fate ending hits you.  What if you stalker lives next door, or can impersonate your physical past life by using a critical piece of your identification.  It is a small piece of non-laminated paper that all databases use.  You may have moved sometime during your life, but often a fact of your first or previous residence exists as a ghost in the machine.  Many philosophers have opined that a photograph traps a bit of one’s soul.  Your original social security card often shows the first location where your number was applied for.  Or perhaps you changed your address on the card once for college, but not the house you share with your spouse.  Your SSN in its paper form is ALSO a valid data record, because your SSN number is correct.  So even though you may have moved away and correctly registered your updates, the old address is tied to a valid number.  The type inked paper form is also kept as a record.  And in your absence, someone might use that old record to create a new invisible profile.  As long as they don’t get caught by someone who remembers you, it can create a tangent path to start a new background.  Unfortunately, crimes and deeds that this invisible person commits are tied to your valid profile.  Best bet is to finish the movie.  Ask questions and pay attention to all the sub-plots.  Life can be a scary place, but by using logic and determination, it doesn’t have to be a nightmare.