Advertisement
Guest User

wtf

a guest
Dec 22nd, 2017
158
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.50 KB | None | 0 0
  1. EMAIL 1
  2. December 22,2017
  3.  
  4. I’m here to warn you about the urgency of our as in United States of Americas cyber-security and the States that make up North America. In which you will find out that are systems are un-manned in meaning there isn’t a single person conducting any security. Now, I understand that a lot of people as in citizens and immigrants alike are depending on us to get subject matter straight as in down to the littlest detail.
  5.  
  6. But, we cannot do it alone and therefore you have to step up and take security measures of your own such as in using encrypted applications to share sensitive information. I don't believe everybody is who they say they are when encounter digitally, face to face and/or legal documentation in the form of identification always more pleasant to I even when it comes to handling business with a co-worker, colleague, employer and the latter.
  7.  
  8. An IT is define as Information technology (IT) is the application of computers to store, study, retrieve, transmit and manipulate data, or information, often in the context of a business or other enterprise and not a person.
  9.  
  10. Telecommunications is the transmission of signs, signals, messages, words, writings, images and sounds or information of any nature by wire, radio, optical or other electromagnetic systems. Telecommunication occurs when the exchange of information between communication participants includes the use of technology.
  11.  
  12.  
  13. Telecommunication technologies may primarily be divided into wired and wireless methods. Overall though, a basic consists of three main parts that are always present in some form or another:
  14.  
  15.  
  16. A telecommunication system that takes information and converts it to a .transmittersignal A , also called the transmission mediumthat carries the signal. An example of this is the"free space channel" A receiver that takes the signal from the channel and converts it back into usable information for the recipient.
  17.  
  18. A communication channel is The term "channel" has two different meanings. In one meaning, a channel is the physical medium that carries a signal between the transmitter and the receiver. Examples of this include the for sound communications, glass for some kinds of , for communications by way of the voltages and electric currents in them, and for communications using , , , and . Coaxial cable types are classified by RG type or "radio guide", terminology derived from World War II. The various RG designations are used to classify the specific signal transmission applications.This last channel is called the "free space channel". The sending of radio waves from one place to another has nothing to do with the presence or absence of an atmosphere between the two. Radio waves travel through a perfect just as easily as they travel through air, fog, clouds, or any other kind of gas.
  19.  
  20. The other meaning of the term "channel" in telecommunications communications channelMHzbandwidthkHz"carrier frequencies"
  21. is seen in the phrase , which is a subdivision of a transmission medium so that it can be used to send multiple streams of information simultaneously. For example, one radio station can broadcast radio waves into free space at frequencies in the neighborhood of 94.5 (megahertz) while another radio station can simultaneously broadcast radio waves at frequencies in the neighborhood of 96.1 MHz. Each radio station would transmit radio waves over a frequency of about 180 (kilohertz), centered at frequencies such as the above, which are called the . Each station in this example is separated from its adjacent stations by 200 kHz, and the difference between 200 kHz and 180 kHz (20 kHz) is an engineering allowance for the imperfections in the communication system.
  22.  
  23.  
  24. A Operating system (OS) is define An interactive operating system is one that allows the user to directly interact with the operating system whilst one or more programs are running. There will be an user interface in place to allow this to happen. It could be a command line style of interface or it could be a graphical interface.
  25.  
  26.  
  27. Here is a list to better educate on operating systems that are set forth subject matter:
  28. 1.Batch operating system
  29. 2.Time-sharing operating systems
  30. 3.Distributed operating System
  31. 4.Network operating System
  32. 5.Real Time operating System
  33. 6.Hard real-time systems
  34. 7.Soft real-time systems
  35. 8.Program execution
  36. 9.I/O Operation
  37. 10.File system manipulation
  38. 11.Communication
  39. 12.Error handling
  40. 13.Resource Management
  41. 14.Protection
  42. 15.Spooling
  43.  
  44.  
  45. Now that you acquired a little information on this so ever growing day to day harassment of subjected matter you unconsciously assault your knowledge with to find reasoning.
  46.  
  47. Surveillance ( or ) /sərˈveɪ.əns//sərˈveɪləns/behaviorclosed-circuit televisionInternet trafficpostal interceptionsurveillanceFrenchsurveillersousveillanceis the monitoring of , activities, or other changing information for the purpose of influencing, managing, directing, or protecting people. This can include observation from a distance by means of electronic equipment (such as (CCTV) cameras) or interception of electronically transmitted information (such as or phone calls). It can also include simple no- or relatively low-technology methods such as human intelligence agents and . The word comes from a phrase for "watching over" (means "from above" and means "to watch") and is in contrast to more recent developments such as .
  48.  
  49. Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organisations to plan and commit crimes, such as robbery and kidnapping, by businesses to gather intelligence, and by .private investigators
  50.  
  51. Surveillance can be understood as a violation of , and as such is often opposed by various groups and activists. have laws which restrict domestic government and private use of surveillance, usually limiting it to circumstances where public safety is at risk. government seldom have any domestic restrictions, and international is common among all types of countries.
  52.  
  53. The area of surveillance is increasingly a topic of academic study, including through research centers, books, and peer-reviewed academic journals even though the United States of America is ranked 25th globally in Academics.
  54.  
  55. Respectively yours,
  56. George Lee Odemns III
  57. 3636 16th St. NW
  58. B-211
  59. Washington, DC 20010
  60. (202)556-9049
  61.  
  62.  
  63.  
  64.  
  65.  
  66. George Odemns
  67.  
  68.  
  69. EMAIL 2
  70.  
  71.  
  72.  
  73.  
  74. December 22, 2017
  75.  
  76.  
  77.  
  78.  
  79. Thanks to you all class action dummies in your very own domiciled place of business posing as Information Technologist in the "IT" department as actual wage employees or thanks to affirmative action that you all still have jobs.
  80.  
  81. Nothing is accomplished by trying to persuade someone who lacks authority to do what your asking-whether it's a hotel clerk with no discretion to adjust your bill or a receptionist who cannot bind the company to the contract you propose. Persuasion directed to an inappropriate audience is ineffective.
  82.  
  83. So it is with judges, whose authority to act has many limitations-jurisdictional limits-relating to geography, citizenship of the parties, monetary amount, and subject matter.
  84.  
  85. From justices of the peace to justices of supreme courts, judges face as a first task to be sure of their authority to decide the matters brought before them and to issue the orders requested.
  86.  
  87. If they don't have that authority in your case, you don't just have a weak case, you have no case at all.
  88.  
  89. So I told the District of Columbia Superior Court honorable Judge Julie Beck on December 11,2017 at 11:50 a.m. courtroom 310, that I george lee odemns lll can't be a just juror in which was number 39 if I didn't reveal the truth of my very own personal subject matter and that is I am currently a non agriculture slave who by the way is a victim of human trafficking(service-trafficking, not sex nor labor) and domestic terrorism by United States of America, the 50 states with U.S.A., it's territories and also the District of Columbia for 37 years and my services rendered to the set forth above defendants affected interstate and foreign commerce in which the crime is still in commission.
  90.  
  91. How can a person render any legal service that's not documented nor taxable by any formulation of goverment? Why would you not enjoined aggravated identity theft with the crime persay?
  92.  
  93. Consult with professor Mark George at the University of South Carolina, he knows alot about biological weapons, radiological dispersal devices, and machines that conduct synthetic telepathy, raygun, railguns, brain computer interfaces to name a few health concious activities that is conducted by officials it department employees on a daily basis towards innocent civillians in the United States of America and on American soil.
  94.  
  95. Watch out for officials it department employees intercepting citizens phone calls by gaining there ESN, stick to old fashioned lanline phones... You can always ask for an employee ID number, Badge number or repeat the number I just call, because most time calls get forwarded to another random or conspirators phone number during transmissions in which is hands free using foreign telecommunications carrier software, so beware and keep your guards up, don't let them catch you sleeping!
  96.  
  97. Just like the terroristic attack that was caught on surveillance satellites that also have a data collecting system in which I assisted in the creation of such that is only under the authority and controlled by the United States Air Force in which caught a few officers from the New York police department planned and excuted such attack that wasn't a published exercise by the training coordinator and therefore it is domestic terrorism.
  98.  
  99. Alot of employees privacy data in what you call privacy is mostly acquired from your Information Technology employees, yes your very own co-workers and your kids as well they are teaching them at a young age on how to hack in the home personal computer and sell that data for a little extra lunch money.
  100.  
  101. But. To you it's everything and that's why I am building better cyber security software even though personally my very own software is encrypted ask your employer and not your co-workers, if you can't talk to your employer then the software will continue to be unknown.
  102.  
  103. Use encrypted Messengers like confide(pgp) in which nobody can hack and manipulate the system and that's all hackers do is manipulate files to change the rules or laws to your operating system and bingo, your data isn't safe anymore.
  104.  
  105. Now on a more serious note alot of American citizens are bully gang-members, hey I been a victim of human trafficking and domestic terrorism by USA, it's Territories and the 50 States also the district of Columbia goverment employees for 37 continous years and it's still in commission from my own sources to say the least that alot of times it stems from people who don't know how to be an employee so they don't know who is liable for unlawful act that is conducted on their employer property and most employees have a grandiosity personality disorder in which they think their employer property is there property.
  106.  
  107. But don't worry about me, worry about yourself that is all you have and your family.
  108.  
  109.  
  110. Sent from AOL Mobile Mail
  111.  
  112. United States of America is not the country that represents knowledge nor academics, it's actually 25th globally so in other words people really and can solely prey on that, while tearing down the little learning infrastructures we built or acquired.
  113.  
  114. When you think back only handful of people or United States citizens get selected for being one of the brightest and not every citizen that enters nor ever birth in United States of America, Such Albert Einstein, Sir Issac Newton, and so on.
  115.  
  116. It is a lot more of studying such as adult reading in terms of literacy such as cyberspace, surveillance system and so on, because foreign countries are already pass us in which most don't even use, that's the first rule.
  117.  
  118. If you don't depend on external devices more power to you and the more you depend on external devices you intend to lose.
  119.  
  120. I wish the best for America and they need real change coming from an academic turnaround or stand point.
  121.  
  122. If the federal government shut down on the 22nd, will the district of Columbia goverment be affected since it's currency is overseen by the United States Congress? In which will also constitute as The district of Columbia being a federal city with federal jurisdiction and/or powers, correct?
  123.  
  124. I want to know and maybe I am wrong but won't it will be a conflict of interest to represent another person within the same body, such as government employees being represented by district attorney or staff of the same body when there purpose is to defend the district itself, e.g. the district of Columbia attorney cannot represent an employee of district of Columbia therefore it will automatically create bias such as picking up a case at a giant foods store robbery and not giant foods store itself even though a police caught the suspect with regards to the conviction of allege guilt of the giant foods store robbery in which will be totally bias for the district of Columbia towards the defendant in the case against the store robbery at giant foods store, since it wasn't against the district of columbia per-say, nor it's employees and the district attorney represnt the district not the district employees.
  125.  
  126. My interpretation of the above subject matter is to arrest the suspects for the alleged crime and ask the store if they want to press charges or move forward with the case and if not the said alleged defendants are free to go and/or barred from the store premises as in permanent or temporary stay away order.
  127.  
  128.  
  129. EMAIL 3
  130.  
  131.  
  132.  
  133. You finally learned the identities of the ones you been following and lead by as it the great Hannah Senesh (1921-1944) was from Palestine in the parachute corps of world war 2 and had a brother name George senesh, who also wrote a letter to her brother describing of what life was like and the reason of her decisions in which was written December, 23,1943. This is who you all choose to write about, copy and mimic in real time as development in your economical future. If you look at the city from a different perspective you will see of what has become of being desperate to create new tools of surveillance while using Microsoft spreadsheets to correspond or relay work to one another. The choice is yours as in finding thy truth of any matter and what hides in the dark always makes it too the light. It don't matter who you choose to be guided by just make sure that you can die by it as well. Who's in your city? Who do you choose to consume for your way of life? Don't need a reply just a view you can vision yourself while asking yourself some critical questions.
  134.  
  135. How you not allow the klu klux klan and the neo-nazi's in which their nationality both are from Germany the hanging of Negros nor tolerating them beating the wholly crap out of us Negros, but allow them to strip us of our identities and knowledge by allowing them to falsify our history with this made up black history while none of it can be authenticated, bot mere vision of myths, hypocrites and fore-tellers.
  136.  
  137. The telepathy machine and thought reading machine don't collect information from the locations of where they are at but collect information of whom the electrodes are on and since it is an illegal practice in United States of America you won't find no Doctor, School nor a clinical trial(s) willing to use illegal weapons of war or weapons of mass destruction in which was also created by the Germans in which is why it's further prohibited because of the holocaust for one and second because of the health risks in which they are allowed to function or thrive in Jewish businesses in America, corporate America.
  138.  
  139. United States of America are the biggest debt collectors on the planet and have the best debt collecting system also while the Jews own every property in the United States of America in which the numbers were released by Nancy Pelosi yesterday and they were 99% have-nots and 1% have in which are american naturalized Jews.
  140.  
  141. Now haven't know business person or employee has ever gave out their personal information as in location of home or home address over broadcast (Broadcasting is the distribution of audio or video content to a dispersed audience via any electronic mass communications medium, but typically one using the electromagnetic spectrum (radio waves), in a one-to-many model.Broadcasting began with AM radio, which came into popular use around 1920 with the spread of vacuum tube radio transmitters and receivers. Before this, all forms of electronic communication (early radio, telephone, and telegraph) were one-to-one, with the message intended for a single recipient.) during my 13, 570 days on earth and if one did know their personal information while it wasn't gain through said, thy person itself then I would think it constitutes as surveillance.
  142.  
  143. Now watch closely to what happened to america general population PSYCH when people kill people, go to war, commit crimes, go to prison or even get apprehended all in their real identities. You wouldn't call a grizzly bear a Zoo, a artist an easel, a contractor the White House, A US President the american soil than why would you allow it for someone else?
  144.  
  145. When you pull all software that is violating someone from your entity than what is left? E.g. recording software.......
  146.  
  147. Phone hacking is the practice of manipulating or gaining unauthorized access to mobile phones, such as by intercepting telephone calls or accessing voicemailmessages. When the unauthorized access is to the phone user's conversation, it is more commonly referred to as phone tapping.
  148.  
  149. A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering,[1] challenge, recreation,[2]or to evaluate system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the computer underground.
  150.  
  151. III Odemns, George Lee
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement