ACTUAL VIDEO FOOTAGE OF NSA HACKING INTO AMERICAN WHISTLE BLOWER, - TopicsExpress



          

ACTUAL VIDEO FOOTAGE OF NSA HACKING INTO AMERICAN WHISTLE BLOWER, BRYAN TEWS, COMPUTER WHILE HE IS TALKING TO HIS ATTORNEY IN USA ON SKYPE AFTER FLEEING TO NICARAGUA & CUBA GO TO THE 52th SECOND ON THIS VIDEO AND BEGIN WATCHING AND IN JUST A FEW SECONDS YOU WILL WITNESS NSA HACKING INTO COMPUTER WHILE ON PHONE WITH ATTORNEY This was a confidential communication protected by the laws of privilege and the CIA/DoD operatives had no legal right to interfere. They did this for the same reason they have been doing the same thing with my doctor visits, recording them all, so they could disrupt the legal and medical in REAL TIME. They have no case against me and never had one. They have been using this lie that they are investigating me so they could manipulate other governments against me and to make sure to do whatever it took to derail lawsuit they are caught in audio recording secretly trying to derail and prevent proper medical treatment of my injuries because that medical treatment is tied to that lawsuit and normally the feds wouldnt care but they are caught in an audio recording - secretly recorded by me - committing multiple felonies and are doing everything in their considerable power to mitigate any further damage to themselves or the doctors they have previously illegally and unethically used against me to misdiagnose me, so the lawsuit would stop. As soon as I complained over and over they were disrupting my ability to post this video, the NSA stopped blocking and allowed me to post it to destroy my credibility and establish Plausible deniability for themselves. THIS IS AN EXTREMELY COMMON TACTIC OF NSA AND CIA! The CIA/NSA operatives have a daily contingency plan and daily protocol in place to daily destroy the credibility of the targeted individual. If the target does THIS then CIA/DoD operatives will do THAT and if the target does THAT then CIA/DoD operatives will do THIS. They have a daily protocol in place to daily destroy the credibility of the targeted individual on a daily basis. So, they wage a massive CYBER-OFFENSIVE against the target to spread misinformation and disinformation. Whistle blower is stunned by the sheer MAGNITUDE of energy effort, manpower, time, money, logistics, additional personnel, etc., going into trying to destroy his credibility on a daily basis. It is so MONSTROUS an operation it is STUNNING to witness! These disruption tactics are designed to destroy the credibility of the targeted individual and are daily and constant so that when the target finally is able to upload the video, picture, email, fax, etc., to Youtube FB, etc., then people will say my complaints were frivolous. What they do not understand is that the CIA/DoD operatives constantly work off of If & Then algorithyms. If the target does THIS then CIA/NSA operatives will do THAT and if the target does THAT then CIA/NSA operatives will do THIS. Everythng is based off of If & Then. What they are doing is seeking to disrupt/derail the legal and medical in real time so they engage in these tactics constantly. This is the same exact tactic they are using with the audio recording of the CIA Operatives committing multiple felonies that I secretly recorded and then rushed the recording into the hands of attorney William Bingle, of Toledo, Ohio, before I subsequently fled USA. That attorney has had the recording for 3 and a half years and refuses to send me a certified copy of it before he sends the original. He knows I cannot take the original until I first receive a certified copy because DoD/CIA operatives may have altered it like they altered another recording I turned into my previous attorney Megan Burke, also of Toledo, Ohio. A favorite tactic of the CA/NSA is to create as much chaos as possible behind the recording and then allow it to go through years later to me, or someone else, UNALTERED, so that my attempts to properly retrieve it from the corrupt attorney, William Bingle, who has been compromised by CIA/DoD, and my complaints that this CIA/NSA interference was happening will all appear FRIVOLOUS. This is important to the CIA/DoD operatives because if they can make my complaints and attempts to retrieve the recording appear FRIVOLOUS then the recording itself must, by default, also appear as FRIVOLOUS. Again, this is a common tactic the CIA/NSA operatives have used against me a thousand times almost over the last seven years. So, the target is forced to document these disruptions are happening to prove his case. However, as soon as the target does this the CIA/NSA operatives will turn right around and do the exact opposite. Hence, the targeted individual is caught in a Catch-22. If he does not complain it is happening and document it online then the disruption tactics will never end, but if he does complain and document it online then the CIA/NSA operatives will just do the exact opposite, or something different, so as to destroy credibility of targeted individual. So, they have engaged in this MASSIVE confusion and disruption campaign. Again, these are constant disruption tactics designed to destroy credibility of targeted individual. As soon as the target complains they turn around and do the exact opposite, or something different, to destroy the targets credibility by making his complaints appear frivolous. Hence, NSA operatives are constantly engineering these If & Then scenarios all for the purpose of establishing Plausible Deniability for themselves while simultaneously rendering the complaints of the targeted individual that it is happening to appear as frivolous. This is important to the CIA/NSA operatives because if they can make the trivial complaints of the targeted individual appear frivolous, then the more serious complaints of the target must also appear frivolous. You see, by constantly engaging in these Trivial & Paltry tactics, it makes the complaints by the targeted individual that they are happening look, by default, Trivial & Paltry. Great emphasis is placed on confusing the targeted individual so that he/she makes mistakes and discredits themselves, which will absolutely happen because in addition to all of these massive disruption tactics, the targeted individual, like me, is subjected to the most brutal inhumane torture imaginable causing them to have to work and function through severe pain and trauma on a daily basis. I do not possess the technical skill or expertise to counter their constant, daily, high tech magic tricks on my computer. What they do is a game of deception and manipulation, combined with torture and murder of activists, whistle blowers, etc. Do not accept anything they say as truth and do not believe anything their system interrogates you about as truth. Deception & Manipulation! youtube/attribution_link?a=KFmGb_kf_L8&u=%2Fwatch%3Fv%3DXotyweynJEY%26feature%3Dshare
Posted on: Fri, 26 Sep 2014 03:10:27 +0000

Trending Topics



Recently Viewed Topics




© 2015