A fascinating demonstration of Android stalker activity today. Walk in, send message, walk out. Stalkers standing outside doing the same. And not five minutes went by without someone approaching me with an Android, some of them running after me, to make a call after establishing proximity.
It has been apparent that military slime have been coordinating and directing the cop-bitch stalker traffic, and they are very capable of constructing a scenario of illegal activity using their technological capabilities which have been demonstrated on many occasions. My computers, e-mail accounts, blogs, website, and anything else associated with an Internet connection has been hacked to pieces.
This has been going on for so long it was apparent years ago that military slime will never cease and desist, that there is no remedy or relief until some sort of charges are fabricated, handed to the cops who basically wait for the military to perform this function. They know about it, because they have to be in position for photo-ops, to author the police reports when military slime makes a bogus complaint, and when necessary, to use their authority to confiscate property, to detain and steal.
But today I saw something that was only a suspicion until now. I've already pointed out that when I look up, no matter where I happen to be, it is very likely the clerk or the nurse or the whatever is ex-military. The same goes for just about any location, but I usually can't verify it. There has been an older gentleman who always seemed to be around when I was updating the website or writing, and of course he had his Android in use when the typical stalkers came and went, but I'm not supposed to notice the connection between the guy with the Android and the stalkers.
Sometimes they look at each other, nod, or gesture as subtly as possible, indicating the scam in progress, but the old guy clearly wants to conceal the fact that he's directing the traffic, using his Android to do it and probably also sending communications that supposed to be attributed to me, and of course, the fact that he's ex-military.
But I came to find out he was, and began to watch his movements and Android usage more closely. Sure enough the Android use preceded an inordinate number of cockroaches entering the establishment. There didn't appear to be a connection to be honest, the acting rather subtle for a change. But I saw there was eye contact between a typical cockroach and the old guy. The cockroach went into the restroom, and within a minute, so did the old guy. When the cockroach exited, he was carrying something in a rolled-up plastic bag and carrying a sheet of notebook paper with a lot of writing on it. This is the sort of cop bullshit I've seen so many times before, accentuated with a posing event directly in front of the surveillance camera and then an exit.
The old guy came out just after, and apparently decided it was time to go, and left shortly after some small talk with the manager who apparently knew him well. That folks, was a hand-off, preceded by Android use and the entrance of the cockroach which coincided perfectly, the entire charade enacted within minutes of accessing he WiFi source.
There really hasn't been any doubt about this occurring because the coordination and interaction between people that just happen to look a lot like military personnel and those that appear to be recently released from jails or mental institutions is unmistakable. The fact that there are always Androids or similar devices in use which appear to be necessary to affect these portrayals cannot be attributed to random circumstance, especially when you've seen the charade repeated thousands of times.
There have been occasions when I've seen similar occurrences, but usually one party or the other producing something from their pocket for photo-op purposes, or perhaps a shopping bag or a backup that could have come from anywhere. But I had not seen something as obvious as this before. An ex-military guy who had been texting just prior and a cockroach that was carrying nothing whatsoever, and could not have concealed it if he had been when he entered, connecting in a restroom.
I have always wondered how the Android attacks and proximity-posing connected to something or someone involved in illegal activity. But what's the point of all these portrayals otherwise except perhaps as an annoyance? The cops have been through my property dozens of times and could do so at any time as they have proven on so many occasions. I've been through security checks on dozens more occasions, and none of the elements of illegal activity, phone, weapons, contraband, have ever been present, the script-reading events notwithstanding and the possibility that a computer hard-drive provided an excuse for it.
So this was an interesting day, not because dozens of Android stalkers chased me around or started showing up once I sat down, but because I wasn't supposed to know that the old guy was ex-military, or notice that a hand-off took place, or the probable signaling that took place just prior. But based on experience, and being a scholar on the subject of cop bullshit, I would be willing to bet that the guy that carried the plastic bag out of that bathroom was pulled over not far away, because it wasn't very long after both of the restroom buddies left the premises that a cop drove by and identified me at the same location.
As I've pointed out so many times, it was directed and coordinated by ex-military, the timing based on observation of my movements, supported by a dirt-bag and his scary-looking girlfriend that probably had some pending issues with the cops, along with some form of contraband or a contrived means of communication that was probably quickly recovered by the cops as planned. That folks is cop bullshit, and without the ex-military slime and the cops having knowledge of it in advance, it wouldn't have been possible.
I could be wrong of course, but damn if a day doesn't go by when military slime, dirt-bags and cops don't hand me something to write about. Another scam, another clue, but the players, the motives, the bad acting and the objective remain the same. And of course, another reason to assess the probabilities of ex-military personnel with Androids sitting down within twenty feet minutes after my log-on to a wireless ISP.
To the pathetic little worm I referred to in a previous blog: You just proved everything I said was true. Better figure out a way to get a uniform. Without it your nothing. And the same goes for the military slime I've accurately described. All you've done is validate every descriptive word I've written, except of course, for the ones that were hacked, deleted or altered. The fact that law enforcement has been getting illegal assists from military slime does not make the “evidence” any less bogus. The bogus complaints and other allegations made against me, supported by falsified police reports, are not validated by anything I've done.
On the contrary, the allegations I've made have been supported by everything military slime and cops have done, in conjunction of course, with their useless counterparts the boot-lickers that perform tricks for them. And nothing that can be said about me, phony allegations, bogus complaints or charges, makes John Andrew Whitcraft, jr., Steve Cooley, or anyone else less culpable.
The notion that suppressing the articles, kidnapping the writer, does anything to change the validity of the reports that law enforcement refuses to acknowledge is ludicrous. Instead, the effort to suppress publication correlates with the accuracy of my reporting on the subject.
When cops plant evidence on someone, it doesn't make them guilty. It just means the cops planted evidence. When military slime engages in the tactics I've described here, it's because my reporting is accurate. If it wasn't, the big effort to silence the writer wouldn't be necessary, nor would the hacking, the thefts, the kidnappings, the fraudulent database entries, the phony police reports, the contrived scenarios of illegal activity, or the bogus complaints.
All you assholes have done is prove everything I've said is true, and without the criminal offenses committed against me and my mother, you'd be as useless to anyone as you are to this country and the public which has provided you with uniforms and authority, not knowing the nature of their error.
And the fact that the corporate criminals were required to fabricate evidence proves what I said about fascism. (Actually, Benito Mussolini said it. I only quoted him because he seemed qualified to provide the definition).
Every day I'm provided with more examples of military slime criminality, and when I see their progeny its a reminder that they are breeding more of the same, people that are incapable of doing anything besides the only job that anyone with a pulse can qualify for; the military.
Just the fact that their big "problem" is a destitute journalist without motive, profit or contraband says it all. They have to fabricate all the elements of illegal activity and the only thing they've proven is that they're capable of doing it in a domestic environment when they don't have to worry about being prosecuted for the criminality involved, or any of the other crimes listed previously. Gee, I'm really impressed. Better come up with something though, because Steve Cooley won't be enjoying his retirement if my book gets published.
And BTW folks; The website was taken down because the law enforcement community wants to associate me with two Google e-mail accounts that were hijacked as soon as they were created using one of the many methods referred to in previous posts. In other words, after they've controlled the accounts for most of a year (minus my participation), it's time to attrbute whatever activity has been occurring from those accounts to this writer.
This is consistent with expectations based on cop logic and experience with cop bullshit. It is very possible that the Android attackers were accessing one or both of those accounts and so it would make sense that law enforcement would want to associate them with me at this juncture. It was obvious they had been accessed, the alterations and internal hacking easy to spot.
This is a familiar Google phenomenon, and the resaon I don't use Google services except as necessary to upload videos to YouTube. Unfortunately, once you have any involvement with Google, you might as well just send the passwords to law enforcement and find out later what they attributed to you. All the indications are that Google has a low regard for users as exemplified by their prevarications regarding theft of passwords using their Google Maps vehicles, something they have denied repeatedly before getting caught lying.
Of course, it wouldn't be necessary to verify an association with a Google account if they were in use, but because I don't use them law enforcement had to come up with a device to associate me with them. Ergo, they take-down the website until I do.
"We hijack your property, control it for our purposes, redirect your log-ins somewhere courtesy of AT&T, and when we're done falsifying evidence, we come up with a device to associate you with it. Thanks."
See how that works? Exactly what I've been talking about throughout these articles.