Morally Conscious


Logo Design by FlamingText.com

I highly recommend Ella Free's website FFTI: Freedom For Targeted Individuals
This website is amazing and comes with lots of information for people from credible sources. It's one of the best I've ever seen and Ella is a really great Podcast host as well!!!


Wednesday, February 8, 2017

The Switchboard Operator From Hell: Laurie's Verizon Is Off On The Horizon


We all know and love Lily Tomlin's classic "Ernestine", "one ringy dingy, two-ringy dingy" character, telephone operator, but when it comes to working a switchboard for a telephone service, Laurie is nothing like her.  While Lily makes all of us laugh to tears, Laurie has a different way of making us cry.  Apparently, these days may be coming to an abrupt end.  Thanks to some updates from Verizon, Jonathan Mendenhall's quick thinking and some help from some other sources...allegedly.

If you know about this crime, you know that much of what you learn is disinformation.  Many victims have the incorrect belief that they are being watched in their homes via tiny cameras, which, in some cases, may be true, but more likely is misunderstood.  Most victims in Palm Springs, California are the victims of RFID microchipping and don't realize that they are the instrument of their own surveillance.  Why install a camera and a microphone inside of someone's home, when the victim, himself, can be made into one?  Yes, the victim of the crime is his own worst enemy.  Once raped and implanted with an RFID chip, he has become his own recording device.  It's as simple as sticking a tiny cellphone like device just under his skin at the temple that looks like those microchips they put in your dog or cat at the veterinarian's office.  They look just like this:
This is an RFID chip compared to a grain of rice...with cellphone capabilities
Developed by the military, many years before this was available to the public, dogs and cats have been microchipped for almost thirty years.  Think about it.  Stephen Hawking has been talking to all of you via his computer for just about as long.  He thinks it and it appears on his computer screen and now a voice synthesizer gives him a speaking voice.  You know Stephen Hawking because of this technology, but you ignore me because I talk about it.  It's weird how things work sometimes.  He's famous for being brilliant, I'm told I'm "mental" for showing you what he does as a matter of course.  He sits and expounds about the universe and theory using the technology and I can't get you to believe it's real.  Funny isn't it?  Not really.

The thing that makes me laugh about all of this is how easy it is to take the power right out of Laurie's wart covered hands.  It's really quite simple.  Her disinformation is as easy as taking her stolen computers away from her.  Taking her methamphetamine away from her.  Taking away her finances that she has stolen.  Arresting her for pretending to be someone she isn't in a court of law.  Looking in to what she's done with her own telephone is a great way to start.  The latest chapter is a good example.  The rumor is this.

She's always been rumored to have used the stolen Verizon computers that she has to access their system and manipulate these RFID chips.  One of the things that she has to do is spy on people that try to stop her.  To do that she has to spread disinformation by pretending to be someone else on her own telephone or someone else's.  This means she is constantly transferring someone else's phone number to a phone to make herself look like the person she is impersonating.  That's called portability.  She wants to look like a cop so she transfers that cop's phone number to a cell phone and pretends to be that cop.  Without the Verizon computer, she can't do that.  The other thing she can't do is use her own phone to be herself now.  Why?  Well, it would appear that, for years, she has put herself on "friends and family" accounts using the Verizon system for her mom or sister without their permission.  She could actually do that with any Verizon customer without them knowing, if the customer didn't check, they wouldn't know.  Legitimately, it looks best if she uses her own family's account.  Her mom and sister simply would call and tell Verizon, "Under no circumstances will there be a friends and family account set up under my name and nobody will ever be allowed to do this," with an explanation and Laurie will never be able to have a phone again.  Without the ability to put her phone on anyone else's friends and family account now, Laurie is S.O.L. (Shit Out Of Luck).

Apparently the new Verizon operations computers are installed and their old computers in Laurie's home aren't working...so they can't assign numbers the way they use to.  Either this or Jonathan's quick thinking got all the information from those computers and he took down the computer information and gave it to Verizon to block those computers from working.  So now Laurie is experiencing an interruption of services...and is having the dilemma of a lifetime.  If the home owner had to check all the circuit breakers in the home that she is squatting in and the electricity had to be shut off for say fifteen minutes for a home inspection...then that last computer might just not come back up!  These things must be checked every six months by code.  Inspections have to be made or owners can be fined.  Now I know that the owner wouldn't want to get fined for these kinds of lapses...

The simplicity of taking down Laurie's terror network is actually quite easy.  It's a matter of learning what kind of network she is running from that location.  Is she actually using a Verizon network?  If so how is she using a Verizon network and paying for it?  That would seem kind of odd seeing as how she isn't a Verizon business.  She certainly isn't a Texas Verizon business operating in California.  Someone is paying for this.  We do have IP Addresses from this location.  I have listed a series of addresses from this location in the past and they can be provided on this blog, but more important, how can Internet Protocol be followed if they are not a business using a business network from a private home?  I would imagine that the activity from those IP Addresses is going to show a lot of banking activity for accounts that aren't associated with the residents that live there.  I've been involved in a lot of court cases and I don't think that it looks very good for someone like Laurie to be accessing the accounts of people that she isn't doing business with.  Accessing credit reports, accessing bank accounts, moving money, reading emails, sending emails, number portability...this all looks like a scam to me, but who am I?  I'm just someone that has been victimized by this woman for forty years.  What do I know?

The simple fact is that nobody ever really looks deep enough into the alleged life of Laurie and Brian.  The listen to her on the phone.  They read texts.  They read emails.  They hear phone messages.  When was the last time someone put them in an interview room and looked at their income taxes?  When did someone actually delve into their past?  When did someone actually talk to people that had to live with them?  You see when you remove the fear that these two will go home and get on their computers and start threatening them with their guns, bullets, diseases and stalkers...the pair isn't something to fear.  The two of them need to be confronted with their own blood analysis.  Their own DNA.  Their own pictures and videos.  Their own past and fingerprints.  It's time that their own evidence is used to confront them.  Instead of all of us fearing that we've done something wrong, it's time that the people that have caused us to live in fear have to look at the mess they left behind.

We need to live with hope.  Hope that the end is better than the beginning and the middle.