666-COMPUTER OR SATELLITE COMPUTER LAWS FOR PRIVILEGED LICENSED PRACTITIONERS AND REGISTERED SATELLITE PRACTITIONERS

Gab Share

77.0 Once the laws of this document or of any CONSPIRACY LAW are enforced in a country, no changes (alterations to, deletions to, additions to these laws) can be made to these laws without a WRITTEN amendment. The approval for this written amendment must be in WRITING, and SIGNED and DATED by the country’s PRESIDENT (in the presence of 14 witnesses who will also sign and date the amendment as witnesses to the President’s signature). This amendment will be filed with the military tribunals.

77.01 NEIGHBOR LAWS (see asterisked sections of Sect. 2 of General 666-Computer or satellite computer Laws) are not as comprehensive as my CONSPIRACY LAWS, but are a portion of my CONSPIRACY LAWS. A country’s President can choose which of my CONSPIRACY LAWS he/she wants to adopt for his/her country. But whatever laws he/she chooses to adopt, once these laws are adopted, and then if these laws are modified in any way (by additions to, deletions to, or alterations to these laws), an AMENDMENT must be made public (as described in this Sect. 77) and filed with the military tribunals.

77.011 The term INTERNATIONAL, when used in this document, refers to any country or countries (or citizens of any country or countries) which is not listed as a TERRORIST NATION on the CONSPIRACY LAW PRESIDENT’s website. The term INTERNATIONAL or INTERNATIONAL GOVERNMENT also refers to the jurisdiction of the CONSPIRACY LAW PRESIDENT– which encompasses all nations which willingly cooperate with CONSPIRACY LAW (and the CONSPIRACY LAW PRESIDENT) and which nations are not listed as TERRORIST NATIONS on the CONSPIRACY LAW PRESIDENT’s website.

77.012 All violations of CONSPIRACY LAW are considered violations of INTERNATIONAL LAW.

77.02 Any legal actions taken by the international government to defend itself against terrorists (including the use of any of the CONSPIRACY LAWS) can be broadcast on GABRIELLE CHANA FOX NEWS CHANNEL.

77.022 For all death penalty violations of CONSPIRACY LAW, public direct or cross-examinations on GABRIELLE CHANA FOX NEWS CHANNEL must be done, not only for the main perpetrator, but for all those directly or indirectly involved with the violation. All who are determined (directly or indirectly) to be willingly, knowingly and deliberately part of the conspiracy (which was/is a death penalty violation of CONSPIRACY LAW) must be executed at the same time in order to establish the criminal conspiracy’s involvement to the violation–because, right before or after the executions, the criminal conspiracy’s motive (and the identification of the criminal conspiracy behind the violation–with the mention of the names of those executed, and the date and time of their executions) will be exposed and identified on GABRIELLE CHANA FOX NEWS CHANNEL’ (and/or its website). If the number of persons publicly executed for a CONSPIRACY LAW violation is large or more criminals (for that violation) are discovered later, another public mass execution on GABRIELLE CHANA FOX NEWS CHANNEL for that same violation can be done at a different time (from the time of the original mass execution for that violation), as long as the identification of the criminal conspiracy behind that violation and the motive for that violation is firmly established and mentioned (right before or after the public executions). It is quite possible that 100 or more people may be executed for the same death penalty violation of CONSPIRACY LAW. In order to cover these extensive direct or cross-examinations, GABRIELLE CHANA FOX NEWS CHANNEL, will have two broadcasts on two different stations (with one broadcast specifically devoted to the direct or cross-examinations, confession statements and executions of death penalty CONSPIRACY LAW violations)–see Sect. 4.41 of TERRORIST MONEY LAWS.

77.023 Most CONSPIRACY LAW death penalty cases will be decided by motive, this will be mentioned before all public direct or cross-examinations of alleged death penalty violators on GABRIELLE CHANA FOX NEWS CHANNEL and before all public executions. Questions 24 & 25 of Sect. 2 of CONSPIRACY LAWS AND GOVERNMENT may be especially helpful in determining motive.

77.024 A DEATH PENALTY MOTIVE is a motive (which accompanies a violation), and which is a motive that is a death penalty violation of CONSPIRACY LAWS.

77.025 A PUBLIC EXECUTION is defined as the listing or reading of the names of those executed for death penalty violations of CONSPIRACY LAW on the GABRIELLE CHANA FOX NEWS CHANNEL television broadcast, and this listing or reading will identify the violators (along with the conspiracies they are involved with) and will identify their death-penalty motives which were determined through direct or cross-examination (under 666-Computer lie-detection).

77.026 Before public direct or cross-examinations and public executions, the death-penalty motive which can bring the death penalty will be read aloud (and a reference will be made to the CONSPIRACY LAW[s] which cover those death-penalty motives [for those violations which are being direct or cross-examined or for which executions are taking place]).

77.03 All those who are suspected of (or are convicted of) any crime outlined in the CONSPIRACY LAWS will be required to undergo FINANCIAL, EMOTIONAL and CONSPIRACY HISTORIES (which will be updated daily). Highlights from these FINANCIAL, EMOTIONAL and CONSPIRACY HISTORIES (or the actual word-for-word HISTORIES) may be broadcast and/or published in GABRIELLE CHANA FOX NEWS CHANNEL or in Gail Schuler’s statements (with all the rights of Gail Schuler’s legal documentation as outlined in her 3-9-03 Power of Attorney document). EMOTIONAL HISTORIES are required as well as FINANCIAL HISTORIES, because Jesuits are using extortion to force people to take bribes, so the international government needs to know WHY a person took a bribe. The death penalty is not given to those who are victims of extortion. Anyone who uses extortion (and who is not an extortion victim himself/herself) to force anyone to take a Jesuit bribe will be given the death penalty.

77.031 No UNWILLING AGENT is permitted to have on his/her person any dangerous weapon, nor can any UNWILLING AGENT be placed in any position where he/she can use any type of lethal force against any person (such as the use of missiles, bombs, etc.). Any UNWILLING AGENT who has a concealed weapons permit must have this permit revoked and that UNWILLING AGENT cannot carry any dangerous weapons until he/she is no longer vulnerable to being used as an UNWILLING AGENT. Those UNWILLING AGENT members of the military, police and other agencies who normally use (or have access to) dangerous weapons must be revoked of their weapons (or their ability to use lethal force) and must not be permitted to carry any dangerous weapons on their person (or to use any type of lethal force) until that person is no longer vulnerable to being used as an UNWILLING AGENT. Any (direct or indirect) deliberate, knowing and willing attempt (or action) to allow any UNWILLING AGENT to carry or use any dangerous weapons (or to have the ability to use lethal force) will bring the death penalty as a JESUIT CONSPIRATOR to any person who cooperates in such a scheme.

77.04 All those who are executed for conspiracy crimes will have all their memories recorded (via 666-Computer or satellite computer) before execution (if possible) in order to obtain the intelligence information the international government needs– to learn how these criminals commit their crimes. The international government needs to learn more about Jesuit methodology, since the Jesuits rely on pioneering scientific advances in their warfare and the international government is not familiar with many of their methods of warfare. The international government learns about Jesuit warfare methods day by day. The international government needs to be more efficient in learning about the sophisticated and very advanced scientific and medical technology Jesuits use to conduct their warfare; so, if possible, all conspiracy criminals executed will have their memories read (via 666-Computer or satellite computer) before execution.

77.1 CONSPIRACY LAWS are defined as the laws (including updates) which Gail Schuler has (or will have) written regarding any conspiracies involving reproductive conspirators, space conspirators, or 666-CCs. These documents are currently named General 666-Computer or Satellite Computer Laws, International Criminal Law: Space Technology, Russia’s Neighbor Laws, 666-Computer or Satellite Computer Laws for Privileged Licensed Practitioners and Registered Satellite Practitioners, Conspiracy Laws and Government, Terrorist Money LawsInternational PLP and RSP and RSP-Network Configurations, and International Reproductive Laws. These laws would also include any laws Gail Schuler wrote that are incorporated into any of Gail Schuler’s written statements.

77.12 GAIL SCHULER is defined as the woman who was born on 9-15-57 in Miami, FL whose birth parents are Misao Satake Fuller and Robert Leonard Chord.

77.13 RECORDED CONFESSIONS, delayed executions, or community service before the execution takes place, may be substituted for immediate executions or the death penalty (in some instances). If a person is allowed to make a confession or has a delayed execution or must do community service in order to avoid the death penalty (or immediate execution)–this is not a permission for this person to continue to commit the crimes for which he/she confessed or to commit other crimes which would incur the death penalty. If evidence is found that this person continues to commit the crimes for which he confessed or that this person commits other capital crimes, then he/she will have no more opportunities for a confession to replace the death penalty (in those cases where a confession relieves this person from the death penalty) and this person will be executed. The international government can choose whatever method of execution it desires, and may choose to use the 666-Computer or satellite computer or satellite technology to execute this person (using 666-Computer or satellite computer or satellite induced terminal illnesses) in order to mitigate Jesuit attempts to make a conspiracy out of the executions.

77.14 If the international government makes an exception to the death penalty for a JESUIT CONSPIRATOR–the international Government will document the reason why and back up its reason for substituting the death penalty with another punishment with sound evidence. For any exceptions to the death penalty for a JESUIT CONSPIRATOR, the rationale and evidence obtained (which caused the international government to feel the death penalty would be unwise) will be put into written form and entered into the military tribunals. This rationale and evidence obtained (which caused the international government to feel the death penalty would be unwise for a particular case) will be put into written form in a document called RATIONALE FOR DEATH PENALTY SUBSTITUTION. Everytime a JESUIT CONSPIRATOR is guilty of the death penalty and a substitute punishment (rather than the death penalty) is meted out to that conspirator– a RATIONALE FOR DEATH PENALTY SUBSTITUTION must be written and filed with the military tribunals. For significant cases, the contents of this RATIONALE FOR DEATH PENALTY SUBSTITUTION may be broadcast on GABRIELLE CHANA FOX NEWS CHANNEL and/or published in Gail Schuler’s statements or on the CONSPIRACY LAW PRESIDENT’s website.

77.15 In all instances, when a substitute punishment is meted out in place of the deserved death penalty, this substitute punishment will be mentioned in the RATIONALE FOR DEATH PENALTY SUBSTITUTION. It is essential that some sort of serious punishment is meted out in place of the death penalty (when the death penalty is substituted with another punishment), or else the death penalty will not be taken seriously by criminals. A justifiable reason for substituting the death penalty with another punishment would be if, perhaps, the execution, itself, could be used by the Jesuits as a conspiracy or could create a martyr hysteria (which could promote anarchy and bloodshed). A death penalty substitute is never allowed in order to make it easier for the criminal to go out and commit more capital crimes.

77.2 An amendment by a President will also be necessary, if the President does not approve of updates or revisions which Gail Schuler has made to CONSPIRACY LAWS which this President has already enforced as laws in his/her country. The amendment, in this case, would need to state in unambiguous language which updates/revisions the President will NOT incorporate into the present CONSPIRACY LAWS which he/she has already incorporated as laws in his/her country; and then state in unambiguous language which portions of Gail’s updates he/she WILL incorporate as laws in his/her country.

77.3 If an amendment to a CONSPIRACY LAW is written and/or approved by the President, the public must be informed of this amendment (and proof must be submitted to the military tribunals that the public was/is made aware of this amendment and proof must also be submitted to the military tribunals that the public has easy access to the unaltered amendment in its entirety; and these proofs that the public has been made aware of this amendment and that the public has easy access to the unaltered amendment, must be submitted to the military tribunals within 22 hours after the amendment is passed or approved by the President, and this proof will be filed permanently in the military tribunals). This amendment will be considered PUBLIC RECORD, and will be easily accessible to the public (for the public to view the UNALTERED amendment IN ITS ENTIRETY) and it will be an exact, unaltered copy of the amendment which the President signed and dated for approval, which will be shown to the public. There will be no alterations (omissions, deletions, etc.) to the wording of the amendment which will be shown to the public, and it will be the same amendment (with all wording exactly as it was) when the President signed and dated the amendment.

77.4 Any SECRET changes to the laws of this document WILL NOT BE TOLERATED and all those involved in a SECRET conspiracy to change, void, or make of NO EFFECT the laws of this document will, if found guilty of this secret conspiracy, be guilty of HIGH TREASON and will receive the death penalty WITHIN 10 YEARS. The military tribunal will decide when this death penalty will be executed, because this is a most serious crime, and no arbitrary date will be set as an execution date.

77.5 To DISREGARD is defined as one who (directly or indirectly) strives to circumvent the laws of this document, once they become law in a country, either by ignoring the laws, rewriting them secretly, or in any way making the laws of NO EFFECT, so that the laws are not enforced as written in this document.

77.6 Once the laws of this document are enforced in a country, and the laws are WILLINGLY ignored or made of NO EFFECT (through default or deliberate DISREGARD of these laws), and someone is AWARE of this DISREGARD and does NOT report it to the government. If this person (who is aware of the DISREGARD) is found out, he/she will be tried for a conspiracy involving HIGH TREASON and, if found guilty, will be given the death penalty within 10 years (possibly sooner, depending on how the military tribunal decides). Because of 666-Computer or satellite computer technology, MOTIVE will play a key role in deciding these types of cases (involving 666-CCs, RPCs, SCs or those guilty of high treason).

77.7 PRESIDENT is defined as the leader of a country, who has the duties, responsibilities of a president, prime minister, chancellor, etc., (which would be a position equivalent to what the American President George W. Bush is for the United States) for his/her respective country. The Pope is also considered to be a President, because he is the President of the Roman Catholic Church which has the country of the Vatican which has adherents all over the world. Anyone (anywhere in the world) who is a member of the Roman Catholic Church (or has been a member of the Roman Catholic Church within the month of Sept. 2003), including all members of the Jesuit Order (regardless of name or organization changes or withdrawal from the Roman Catholic Church) will be considered citizens of the country of the Vatican for legal purposes. Those criminals who will be executed or have been executed (by order of The Pope) will have their names (in a manner which fully identifies each criminal) listed on a list, which will be attached as an addendum to my 1-18-02 statement (with all the rights of my legal documentation as described in my 3-9-03 Power of Attorney document). This published list may include DNA records, photographs, or whatever is necessary (alongside the criminal’s name) in order to identify which criminals have been or will be executed by ORDER OF The Pope.

77.8 A CONSPIRACY LAW PRESIDENT or the INTERNATIONAL PRESIDENT is the government official who has the power of a President or chief executive of a country, and who uses that power to execute, administer and enforce CONSPIRACY LAWS– through the authority of that country’s government [which would be the country which grants the CONSPIRACY LAW PRESIDENT the power of a President (or chief executive of that country)]. Vladimir Putin, the current Russian President, has been the acting CONSPIRACY LAW PRESIDENT since the CONSPIRACY LAWS were founded by Gail Schuler in 2003. Currently, on this 8th day of April 2004, the Russian government has granted Vladimir Putin, the power of the International President and of the CONSPIRACY LAW PRESIDENT in order to execute, administer and enforce CONSPIRACY LAWS through the authority of the Russian government. However, Vladimir anticipates that when he finishes his 2nd term as Russian President, that he will accept Germany’s offer to grant him the power of the German Chancellor in order to execute, administer and enforce CONSPIRACY LAWS through the authority of the German government. For this reason, the name of the former Russian BROADCAST NEWS (which is a CONSPIRACY LAW news network), has been changed to GABRIELLE CHANA FOX NEWS CHANNEL on this 8th day of April 2004, and the GABRIELLE CHANA FOX NEWS CHANNEL team will work with German broadcasters to integrate the former Russian BROADCAST NEWS with the German news team, in preparation for GABRIELLE CHANA FOX NEWS CHANNEL’ new headquarters (which will be in Germany).

77.9 A SATELLITE COMPUTER is defined as any computer which is used (directly or indirectly) to carry out or execute any computer program (which is a program which directly or indirectly manipulates or changes, alters or controls in any manner a human, animal or any inanimate or animate object), and which involves (or utilizes) satellite technology to execute or carry out these actions (or attempts).

77.91 All Jesuits, if granted a trial, will be tried in military tribunals– and Jesuits will be denied due process and will be treated as prisoners of war when captured. The nations of Russia and Germany have made a formal declaration of war against the Jesuit Order.

77.92 All the CONSPIRACY LAWS which deny UNWILLING AGENTS positions of influence, also apply to Jesuits or Jesuit supporters. For example, since no UNWILLING AGENT may hold any LAW ENFORCEMENT or government position–therefore, no Jesuit or Jesuit supporter may hold any LAW ENFORCEMENT or government position– and any willing and knowing attempt (or action) to promote Jesuits into positions of influence, will bring the death penalty as a JESUIT CONSPIRATOR.

*************************************************************

See the IRL and ICL:ST documents for the definition of STOP ORDER. Definitions may be borrowed from other CONSPIRACY LAW documents like International Reproductive Laws or International Criminal Law: Space Technology, so those documents need to be examined alongside this one. And some definitions may be further defined in other CONSPIRACY LAW documents; for instance, the definition for “practitioner” is broad and is listed in many documents.

Whenever it becomes necessary to disable or execute a practitioner, criminal or technological system (including 666-Computer or satellite computers, satellite, etc.) because it is ordered by a law in this document, and this disabling or execution is INTERFERED WITH (by whatever method), whoever interferes with this disabling or execution will be immediately executed. If the country which has jurisdiction over this interferer does not immediately execute and/or disable the interferer/interference, that country will be listed as a TERRORIST NATION on the CONSPIRACY LAW PRESIDENT’s website, and will be treated as a terrorist nation according to Sections 3.1 to 3.4 of the General 666 Computer Laws document.

When the term PLP (privileged licensed practitioner) and RSP is used, it will be understood to mean ALL LICENSED 666-Computer or satellite computer practitioners (including JAIL PRACTITIONERS), unless noted otherwise.

Though the CONSPIRACY LAW PRESIDENT may be referred to in the masculine sense, the CONSPIRACY LAW PRESIDENT could be a woman. When the term Vladimir is used, it is referring to Vladimir Putin, the CONSPIRACY LAW PRESIDENT.

Refer to the legal document GENERAL 666-Computer or Satellite Computer LAWS or General 666-CLD or other CONSPIRACY LAW documents for more laws and/or definitions which may be applicable to the matters discussed in this document.

1.0 To INTERFERE is defined as using the 666-Computer or satellite computer (or satellite technology) in a manner which violates the CONSPIRACY LAW PRESIDENT’s instructions. All of the CONSPIRACY LAW PRESIDENT’s instructions to his PRIVILEGED LICENSED practitioners (and REGISTERED SATELLITE PRACTITIONERS or RSPs) must be recorded, so that the CONSPIRACY LAW PRESIDENT can prove that this practitioner violated or operated independently of his instructions. The CONSPIRACY LAW PRESIDENT should consult with International lawyers to draft a legal document which he will call GENERAL INSTRUCTIONS, since the CONSPIRACY LAW PRESIDENT cannot stay awake 24 hours to give detailed instructions to his PLP and RSP practitioners. These general instructions should delineate principles to be followed by his PLP and RSP practitioners, so that if violations occur when the CONSPIRACY LAW PRESIDENT is not able to communicate with his PLP and RSP practitioners, he can prove they violated what HE WOULD HAVE wanted done in a certain situation. AND/OR the CONSPIRACY LAW PRESIDENT can hire someone to have POWER OF ATTORNEY to give instructions to PLP and RSP practitioners IN HIS STEAD. This person who has power of attorney, must follow the CONSPIRACY LAW PRESIDENT’s guidelines from the CONSPIRACY LAW PRESIDENT’s general instructions. And if this person (who has power of attorney) violates the CONSPIRACY LAW PRESIDENT’s instructions in a manner that is clearly not what the CONSPIRACY LAW PRESIDENT would have wanted, this person will be executed.

1.0(a)-1 When the term RSP (registered satellite practitioner) is used, it will refer to those satellite practitioners who will have satellite control (under the jurisdiction of the International government) over their designated persons. Each country will have a RSP Network, which will be satellite practitioners who have satellite control over (or monitor and care for) designated citizens of their country (or of other countries). These satellite practitioners will use satellite technology programs (called DIAGNOSTIC AND TREATMENT PROGRAMS or called in other sections of CONSPIRACY LAW–DIAGNOSTIC PROGRAMS) to rebuild bones, dental fillings, artificial heart stents, artificial limbs, and teeth and parts of the body (including artificial parts) which cannot be manipulated (or controlled) through 666-Computer technology alone. They will use these DIAGNOSTIC AND TREATMENT PROGRAMS to repair those parts of the body (including artificial parts needed for life or health) which cannot be accessed by 666-Computer technology alone. They will also use these programs to kill germs and undo cancers, using satellite’s ability to genetically modify any genetic code and/or alter molecules and atoms–therefore, those persons who have illnesses caused by germs or cancers will have those germs or cancers in their body targeted by the DIAGNOSTIC AND TREATMENT PROGRAMs of the RSPs (which will use satellite or 666-Computer technology to destroy or alter those germs or cancers). These DIAGNOSTIC and TREATMENT PROGRAMS should be able to kill or modify all germs and/or cancers, including antibiotic-resistant germs and germs which mutate from one form to another as they infect a person (since Jesuits use genetic manipulation to mutate germs within the body, in order to thwart the attempts by physicians to bring the patient to healing), because all germs and cancers are vulnerable to genetic modification (via satellite technology) and/or these germs or cancers could be destroyed or altered by satellite targeting techniques–since satellite technology can operate (and target) at the genetic and molecular level.

1.0(a)-1-a All professionals used in this Sect. 1.0(a), such as the MEDICAL RECORDS TEAM and the DIAGNOSTIC TEAM [see rest of this Section 1.0(a)] are considered full fledged LAW ENFORCEMENT PERSONS and have all the rights and responsibilities of LAW ENFORCEMENT PERSONS as outlined under CONSPIRACY LAW.

1.0(a)-1-b ***All the programming in this Sect. 1.0(a) must be set up so that medical professionals involved with the patient can quickly retrieve diagnostic and treatment reports about their patient and can also quickly retrieve totally accurate and pertinent, comprehensive medical histories on their patient. In fact, the program should be set up so that the health care provider can also request certain types of histories, which may be all he/she needs. To assist in this effort, our TRUTH PROGRAMMERS will work with specialists from all fields of medicine to create specific diagnostic and history sheets as needed for the different specialists of medicine.

UPDATE on July 10, 2006: Due to serious problems with the DIAGNOSTIC AND TREATMENT PROGRAMS, all those who work on (or program) the DIAGNOSTIC AND TREATMENT PROGRAMS can only be those men who are on Gail Schuler’s MARRIAGE LIST (the men who are absolutely committed to marrying Gail Schuler). These are the best men to do this extremely important job because we only choose the very best to be Gail’s possible husband and Gail has quite a list of men who want to marry her. Many of these men are professionally trained in medicine or related fields. Since we are having big programming problems, we feel it is better to train these medical men in programming and let them do the programming, than to rely on any man who is not on Gail Schuler’s MARRIAGE LIST to be involved in the programming and administration of the DIAGNOSTIC AND TREATMENT PROGRAMs.

We have had glaring diagnostic failures, which should never happen with the DIAGNOSTIC AND TREATMENT PROGRAM–where serious and very obvious diagnoses are missed, and this is an indication that our TRUTH PROGRAMMERS are not dependable. We will have to really weed down who we use to create and administer the DIAGNOSTIC AND TREATMENT PROGRAMs. We are having serious UNWILLING AGENT problems with our programmers, and, it appears, the best way to address this problem is to use perhaps only 10 to 20 men (from my marriage list) to do all the work on the DIAGNOSTIC AND TREATMENT PROGRAM, even if we have to train them to be programmers and even if we must train them in areas where they are deficient.

Better to have a small, dependable group of men (that we can train), than a large, undependable group (who won’t honor CONSPIRACY LAW). I feel the most dependable men are those from my MARRIAGE LIST. Compensate them generously for their time and pay them well, we need them. THEY ARE INDISPENSABLE and are perhaps doing the most important job in CONSPIRACY LAW. They will all have the rank of general in my military and should assist us in war strategy. All the men on my marriage list are highly intelligent and are capable of learning what is needed to do the job for the DIAGNOSTIC AND TREATMENT PROGRAM.

They can create a program that would work for everyone, that would detect all known health problems known to mankind and would be programmed with specific treatment modalities. They can receive assistance and ask for help (where they have questions)–but only the men on my MARRIAGE LIST can create and administer the actual programs for the DIAGNOSTIC AND TREATMENT PROGRAM–many of the men on my marriage list are physicians and dentists and medically trained men–teach them how to do programming, and LET THEM DO THE PROGRAMMING. WE HAVE HAD MAJOR PROGRAMMING PROBLEMS, AND IT APPEARS WE CAN ONLY DEPEND ON THE MEN ON MY MARRIAGE LIST TO DO THE JOB RIGHT. WE WILL TRAIN THEM HOW TO BE PROGRAMMERS FOR THE DIAGNOSTIC AND TREATMENT PROGRAM.

You may say, how can ten men administer all the DIAGNOSTIC AND TREATMENT PROGRAMS for every person on the planet? I think it can be done, because satellite/computer technology today is incredible. They can receive assistance from the NANOTECHNOLOGY RESEARCH TEAM to help them come up with ideas. Our biggest problem is not lack of resources or lack of brains, it is lack of dependability in our programmers. Our programmers are not honoring CONSPIRACY LAW in the way they program and administer our computers.

We are better off with ten TRUTH PROGRAMMERS (from my MARRIAGE LIST) who will do the job RIGHT, than with 1,000 TRUTH PROGRAMMERS who will create programs that miss significant diagnostic benchmarks (which is what is happening NOW), so that people suffer unnecessarily with life threatening conditions, that should have been caught and treated appropriately (and in a timely manner) by the DIAGNOSTIC AND TREATMENT PROGRAMs.

1.0(a)-1-c This group of computer and medical professionals who create these diagnostic and history sheets will be called the MEDICAL RECORDS TEAM. A heart specialist about to perform an operation may only need those histories and diagnoses which pertain to the surgery he is about to perform. This programming is not only designed to assist medical professionals in diagnosis, but also to assist them to have the totally accurate, up-to-date, comprehensive histories (which that particular medical person needs) on their patients at all times. And the records will be maintained by the computer, so there is less likelihood that records will be lost or misplaced. And a new health practitioner for the patient will have the same records that an established health practitioner for that patient would have.

1.0(a)-2 This DIAGNOSTIC and TREATMENT PROGRAM will be much more effective than antibiotics in neutralizing disease germs, since it only targets those germs which it is programmed to target and leaves the rest alone, and because it will be continually updated to reflect changes in the infection and any secondary or third or fourth infections which have developed. It will also note any genetic mutations which have occurred in the pathogen and will adjust itself immediately to deal with these mutations and with any secondary, third or fourth infections (or internal or external injuries) which may have developed after the original infection (or injury).

1.0(a)-3 This DIAGNOSTIC and TREATMENT PROGRAM will be programmed to recognize every known pathogen (and injury) or ailment in existence and to effectively neutralize that pathogen (or injury) or ailment within the body (as soon as that pathogen or injury ailment is detected by the program). The program will be programmed to recognize when the germ has become pathogenic to the body (for various reasons–including allergic reactions to the pathogen, because the formerly benign microorganism is now in imbalance within the body and has become pathogenic, etc.). So this DIAGNOSTIC AND TREATMENT PROGRAM will perform 3 basic functions:

1.0(a)-4 1) DIAGNOSIS MODALITIES: Pin point accurate CAUSAL (see below) diagnosis, since the program will analyze the germs by their genetic code and will be programmed to recognize every known CAUSE for every human injury or ailment in existence.

1.0(a)-5 The DIAGNOSTIC CATEGORIES in modern medicine are woefully inadequate and need to be corrected and these corrections need to be made into the DIAGNOSIS MODALITY of the DIAGNOSTIC AND TREATMENT PROGRAM. For example, most diagnoses are diagnoses of the symptoms and not the cause of most ailments in medicine. This absolutely is not the best way to deal with ailments, especially when using programming to detect, prevent and treat ailments. For example when one has a heart attack, we diagnose the person with a heart attack, a far more useful diagnosis would be something like follows: This person is diagnosed with a condition of high bad cholesterol levels caused by inadequate absorption of vitamin B12 in the small intestine, inadequate aerobic exercise, high dietary intake of bad cholesterol, faulty metabolic processes in the liver which do not remove bad cholesterol from the blood, etc. ALL DIAGNOSES USED IN THE DIAGNOSTIC AND TREATMENT PROGRAM MUST BE A DIAGNOSIS OF specific CAUSES OF ILLNESSES AND AILMENTS. We will not use diagnoses which are only general descriptions of illnesses or ailments and which do not pinpoint the specific CAUSE of the condition. We must not create treatment programs for symptoms, we must create treatment programs for CAUSES of symptoms.

Every human condition which is programmed into the DIAGNOSTIC PROGRAM must be screened for in the patient (by the DIAGNOSTIC AND TREATMENT PROGRAM) to eliminate the possibility that the patient may be suffering from any of the conditions programmed into the DIAGNOSTIC PROGRAM, and willing and knowing failure by any TRUTH programmer to fail to program the DIAGNOSTIC PROGRAM in such a manner that it screens all ailments programmed into the program (as described in this sentence), will bring the death penalty as a JESUIT CONSPIRATOR to that violator. One of the main purposes of the DIAGNOSTIC PROGRAM is to be a thorough and accurate screening program to detect unknown ailments (or unknown changes in the course of illnesses) which may be in that patient.

This means if the DIAGNOSTIC PROGRAM was programmed with the diagnosis of lack of intrinsic factor in the stomach, that the DIAGNOSTIC PROGRAM would have caught the fact that my stomach does not produce intrinsic factor, and my severe vitamin B12 deficiency would have been caught earlier. A vitamin B12 deficiency is easy to overlook, since doctors are usually concerned about other problems. That is why it is so important to use the DIAGNOSTIC PROGRAM (which may detect conditions that the doctor might miss). This is because the DIAGNOSTIC PROGRAM screens for every known human ailment in the person every 15 minutes! You cannot beat this method of diagnosis. It is quick, accurate and totally comprehensive. It will make a landmark and catastrophic difference in medicine! The DIAGNOSTIC PROGRAM is designed to assist doctors to carry out comprehensive, quick, and totally accurate screenings for all known ailments in the human condition, and then to accurately diagnose those ailments which it discovers.

1.0(a)-6 So someone with a heart condition, will NOT BE DIAGNOSED WITH A HEART CONDITION. Instead, he will be diagnosed with more specific diagnoses which pinpoint the causes which have led to his heart condition. Like the following: Patient A has the following diagnosis: lack of intrinsic factor/hydrochloric acid in the stomach, which led to a vitamin B12 deficiency which causes faulty homocysteine metabolism, and which has led to atherosclerosis.

1.0(a)-7 OR someone with diarrhea will NOT be diagnosed with diarrhea, instead the cause of the diarrrhea must be mentioned in the diagnosis. Example: Diarrhea caused by lack of intrinsic factor in the stomach/vitamin B12 deficiency, bird flu infection in the bowels, and erosion/irritation of the bowels from intestinal virus (should mention which virus/pathogen, since we can be very specific with computer/satellite technology), vitamin B12 deficiency, etc. etc. The CAUSE(s) mentioned in the diagnoses will be targeted by the TREATMENT PROGRAM of the DIAGNOSTIC AND TREATMENT PROGRAM–this is why it is so important that all diagnoses used in the DIAGNOSTIC AND TREATMENT PROGRAM mention the specific cause(s) of the condition. We will use no other type of diagnoses (other than causal diagnoses) in the DIAGNOSTIC AND TREATMENT PROGRAM and the cause mentioned must be specific and detailed enough so that enough information is given to create an effective and comprehensive treatment program for the CAUSE of the condition. In this case, since the CAUSE is the lack of intrinsic factor in the stomach, the treatment program will be programmed to improve the ability of the stomach to produce intrinsic factor!

1.0(a)-8 If we had a diagnosis for lack of intrinsic factor/vitamin B12 deficiency (which is a CAUSE and should therefore be considered a valid DIAGNOSIS) in the DIAGNOSTIC AND TREATMENT PROGRAM, then my vitamin B12 deficiency could have been caught much earlier and my mysterious shortness of breath over the past several months could have been corrected earlier, AND I would have a stronger immune system and would be less likely to catch infections. I seem to get sick an awful lot. The reason my vitamin B12 deficiency was not caught is because we did not have a diagnosis for lack of intrinsic factor in the stomach in the DIAGNOSTIC AND TREATMENT PROGRAM (and all the PLPs and RSPs who worked on my program missed this diagnosis as well). This lack of intrinsic factor in the stomach should have been a diagnosis in the DIAGNOSTIC AND TREATMENT PROGRAM! In most of medicine a lack of intrinsic factor/vitamin B12 deficiency is NOT considered a DIAGNOSIS–well, it will be considered a DIAGNOSIS in the medicine we practice, because we will not allow any DIAGNOSIS which is simply a description of symptoms and is not a specific description of a specific CAUSE (or causes) of illness. All known causes for any and all ailments in human existence must be programmed into the DIAGNOSTIC PROGRAM by the DIAGNOSTIC TEAM (see below).

1.0(a)-9 All DIAGNOSES used in the DIAGNOSTIC AND TREATMENT PROGRAM must be CAUSES of conditions. In fact, every single CAUSE for all ailments on the planet must be in the DIAGNOSTIC AND TREATMENT PROGRAM as a DIAGNOSTIC CATEGORY. This means every possible vitamin/mineral deficiency (and the CAUSES for these deficiencies), every metabolic imbalance in the body (and the CAUSES for these imbalances–like a lack of hydrochloric acid or intrinsic factor), every computer/satellite attack on the body (since these are CAUSES of ailments) must be listed as a DIAGNOSTIC CATEGORY in the DIAGNOSTIC AND TREATMENT PROGRAM.

1.0(a)-10 You may say this is an overwhelming task. Yes, that is why we will have a group of LAW ENFORCEMENT PERSONS called the DIAGNOSTIC TEAM (composed of medical professionals such as medical doctors, nutritionists, naturopaths, chiropractors, dentists, surgeons, acupuncturists, physical therapists, programmers, computer experts, etc.) whose sole job will be to create the DIAGNOSTIC categories for the DIAGNOSTIC AND TREATMENT PROGRAM and who will update these categories on a daily basis. We use programmers in the DIAGNOSTIC TEAM since much of the ailments we suffer from today are induced by criminal use of computer/satellite technology. So a causal diagnosis could be the criminal use of computer/satellite technology to genetically modify cells in the lungs to create cancerous lung cells. The treatment program would be to counter/undo the effects of the criminal genetic modification of the lung cells.

This would be the same as diagnosing one who has suffered a gunshot (bullet) to the lungs as follows: Gunshot/bullet (the cause) to the lungs has created a hole in the lungs and internal bleeding, etc. etc. The treatment program would be to patch the hole in the lungs (get oxygen to the tissues) and stop the internal bleeding, etc. etc. Actually, with our current knowledge of medicine, this person may not make it, but you never know. . . maybe someday. . .

As more research is done and we learn more about the causes of illness, then this new information must be integrated into the DIAGNOSTIC categories used for the DIAGNOSTIC AND TREATMENT PROGRAM.

1.0(a)-11 Any (direct or indirect) willing and knowing attempt or action by any member of the DIAGNOSTIC TEAM to omit or create DIAGNOSTIC categories for the DIAGNOSTIC AND TREATMENT PROGRAM which undermine the creation of effective treatment programs and who commits this act/omission with the intent to undermine the DIAGNOSTIC AND TREATMENT PROGRAM, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. The creation of the DIAGNOSTIC categories for the DIAGNOSTIC AND TREATMENT PROGRAM is a very important job, because this determines which treatment programs must be created! And, for instance, if we miss an important causal diagnosis which could lead to a heart attack, then we neglect to create an effective treatment program in that patient to prevent a heart attack!

1.0(a)-12 For instance, we will NOT have Alzheimer’s Disease as a diagnosis in the program. Instead, we will have the causes which have led to Alzheimer’s Disease in the program. These can be as follows: 1) computer/satellite manipulation of the brain cells, 2) vitamin B12 deficiency, 3) faulty metabolism somewhere in the body. The Alzheimer’s disease can be mentioned, but the cause of the Alzheimers must be the DIAGNOSIS, and not just the Alzheimer. It is essential that all the causes of ailments be the diagnostic criteria for the DIAGNOSTIC AND TREATMENT PROGRAM, because these causes are what we must correct to effectively treat the patient. We don’t treat symptoms, we treat causes which lead to symptoms! If this is the approach of the DIAGNOSTIC AND TREATMENT PROGRAM, we will have far better results. Therefore all standard medical diagnostic categories will be rewritten/altered/deleted for the DIAGNOSTIC AND TREATMENT PROGRAM and all diagnostic conditions used by the DIAGNOSTIC PROGRAM must be a CAUSE, not just symptoms. This means we will also create new diagnostic categories that did not previously exist–such as lack of intrinsic factor in the stomach.

1.0(a)-13 I’ve read up on vitamin B12 and iron deficiency/anemia since this is my problem, and my vitamin B12 deficiency/anemia was not noticed by the DIAGNOSTIC AND TREATMENT PROGRAM (or by our PLPs or RSPs) because our diagnostic categories are based on traditional medicine and these categories are woefully inadequate, because they focus on symptoms and NOT ON CAUSES. Long term vitamin B12 deficiency can lead to (or promote) serious mental/nervous system disorders (including Alzheimer’s), as well as other serious problems! Also, traditional medicine underestimates the importance of nutritional deficiencies (notice these are CAUSES) as the cause for many serious ailments in medicine, and our DIAGNOSTIC TEAM better take care of this. We will have diagnostic categories for all nutritional deficiencies, and we will have diagnostic castegories for all the causes of all nutritional deficiencies! It’s not always a poor diet that causes nutritional deficiencies, these can be caused by a poorly functioning digestive system and many other metabolic reasons.

1.0(a)-14 For example, a general diagnosis of diarrhea is absolutely useless in the DIAGNOSTIC AND TREATMENT PROGRAM. What causes the diarrhea?

1.0(a)-15 In fact, it is so important to rewrite the medical diagnostic categories, that we will assign a group of medical professionals from all the branches of medicine used in the DIAGNOSTIC AND TREATMENT PROGRAM to create all the diagnostic categories used in the DIAGNOSTIC AND TREATMENT PROGRAM and these diagnostic categories must all pinpoint the causes which lead to conditions or we will not use them as a DIAGNOSIS. CAUSES of ailments WILL BE THE DIAGNOSIS and we will never use any diagnosis which does not mention the specific and exact cause (or causes) of the condition. This is a grave fault of traditional medicine which must be corrected if we are to make progress in medicine.

The DIAGNOSTIC AND TREATMENT PROGRAM will not use the diagnostic categories currently used in modern medicine, but will create its own diagnostic categories which will be helpful to create effective treatment programs [as outlined in this Sect. 1.0(a)]. It can borrow standard medical terminology to create these categories, but must rewrite the diagnostic categories into CAUSAL CATEGORIES, and not the categories that currently exist in medicine (which are woefully inadequate to help create effective treatment programs for the DIAGNOSTIC AND TREATMENT PROGRAM).

1.0(a)-16 For instance one with a heart attack may be diagnosed as follows: Faulty cholesterol liver metabolism caused by computer/satellite attack on the metabolic cholesterol pathways in the liver, which has led to heart failure.

1.0(a)-17 An AILMENT is defined as any condition which causes the body of an individual to be in imbalance, to be ill, to be in nutritional deficiency or overdose, to be in overdose (or in deficiency) of any substance (including illegal drugs, drugs, or any substance which could become toxic to the body). An AILMENT or illness will not be limited to the views of American traditional medicine, which is largely focused on treatment over more comprehensive and holistic diagnoses such as nutritional deficiencies, candida overgrowth in the body, etc.

1.0(a)-18 In order for the DIAGNOSIS MODALITY of the DIAGNOSTIC AND TREATMENT PROGRAM to be effective, the diagnostic criteria will need to include all viable and scientifically proven causal diagnoses from ALL categories of medicine which are proven to have an effect on the human body (which would include chiropractic, physical therapy, acupuncture, natural medicine as well as traditional and mainstream medicine). In other words, our NANOTECHNOLOGY RESEARCH TEAM will conduct studies of all widely used forms of medicine and will determine which diagnostic criteria (from all forms of medicine practiced all over the world) are viable and whose diagnostic criteria should be included in the DIAGNOSIS MODALITY of the DIAGNOSTIC AND TREATMENT PROGRAM.

1.0(a)-19 What this means is that let’s say someone comes down with the bird flu, and cannot recover because he/she suffers a severe B vitamin deficiency, which is worsened by acupuncture imbalances in the body, and worsened further because the bones in the spine which cover digestion are not in proper chiropractic alignment (because nerves which control the muscles around the spine are manipulating the spine to be in disalignment), and so on and so forth. The DIAGNOSIS MODALITY must write a diagnosis which is broadranging and deals with all the causes of problems in the body (regardless of which specialty of medicine is involved) and which is comprehensive and wide ranging. All diagnoses from every viable category of medicine must be included in the DIAGNOSIS MODALITY of the DIAGNOSIS program of the DIAGNOSTIC AND TREATMENT PROGRAM.

1.0(a)-20 The DIAGNOSIS MODALITY would write a diagnosis such as follows: Patient A has an infection of bird flu in his/her lungs, gastrointestinal tract, etc. etc., which is worsened because of nutritional deficiencies in the following vitamins or minerals caused by lack of intrinsic factor in the stomach, lack of etc., etc. etc.–which is worsened because of nerve problems (induced by a defect in the PERSON PROGRAM) which causes his spine to be in chiropractic misalignment at the number 7 spine etc. etc. which induces gastrointestinal malabsorption (and induces a vitamin B12 deficiency and thus prolongs healing from the bird flu) and this nerve problem induces a acupuncture imbalance in the body at such and such locations etc. etc. In other words the DIAGNOSIS MODALITY must include the knowledge of the cause of every ailment known to mankind from ALL BRANCHES OF MEDICINE (acupuncture, natural medicine, nutrition, traditional medicine, chiropractic, etc that are proven to make a difference in the health and wellness of persons) and must use treatment methods on these causes from ALL BRANCHES OF MEDICINE in its treatment and diagnostic programs. In those instances where help is needed outside of the abilities of the DIAGNOSTIC AND TREATMENT PROGRAM, such as the need for additional vitamin supplementation or the need for a severe chiropractic adjustment or acupuncture or for drastic changes in the diet or lifestyle, etc. (which cannot be accomplished through nerve/muscle manipulation by the DIAGNOSTIC AND TREATMENT PROGRAM alone) then the patient will somehow be informed of the need to do things to hasten his/her health and wellness (and recovery from imbalance or illness) and specific instructions will be given to him/her about what to do to bring him/her to wellness and recovery. Instructions may need to be given him/her about how to deal with CURE RESISTANT PROGRAMs (that have infected his/her PERSON PROGRAM) as he/she applies the treatment protocol.

1.0(a)-21 In addition, the DIAGNOSIS MODALITY will discern which ailing systems of the body are afflicted with CURE RESISTANT PROGRAMS. A CURE RESISTANT PROGRAM is a program which has infected a PERSON PROGRAM, so that when the cure for an ailment is applied to the body, the CURE RESISTANT PROGRAM causes the application of the cure to bring about debilitating, life-threatening or uncomfortable symptoms to occur in the body as the cure is applied to the body–and the symptoms or ailments are brought about to try to undermine the treatment. Any knowing and willing attempt or action by any person (who is able to directly or indirectly manipulate or determine the outcome of any PERSON PROGRAM) to create a CURE RESISTANT PROGRAM in any PERSON PROGRAM, will bring the death penatly as a JESUIT CONSPIRATOR to that violator. If this CURE RESISTANT PROGRAM involves a SIGNIFICANT PERSON connected to Gail Schuler (or is Gail Schuler), this person will be executed by a Sect. 95 (see CL&G) execution.

1.0(a)-22 Example: When Vladimir Putin had his heart attack and it was discovered that he had 4 more heart attacks about to happen, the cure was to go in and clean out his arteries using our computer/satellite technology. Unfortunately, the Jesuits had infected Vladimir’s PERSON PROGRAM with CURE RESISTANT PROGRAMS so that when we went in to clean out his arteries, this induced other arteries to become immediately clogged [so that in order for us to prevent or deal with one heart attack, we had to create another heart attack (because of the CURE RESISTANT PROGRAMs)]. So, we had to go in and clean the artery and risk a clot somewhere else (which is what happened). Fortunately, since we anticipated the heart attacks (created by the CURE RESISTANT PROGRAM), we were able to work quickly and prevent the CURE RESISTANT PROGRAMs from killing him or maiming him permanently, but Vladimir had to endure the heart attacks and we had to put him in the hospital and observe him and he went through several heart attacks JUST SO WE COULD PREVENT HEART ATTACKS in him!

But, the DIAGNOSIS MODALITY should discern where these CURE RESISTANT PROGRAMs are and should begin to deactivate them, so that when the cure is applied, the patient will not have to endure the debilitating, life threatening or uncomfortable symptoms of the CURE RESISTANT PROGRAM (as the cure is applied).

1.0(a)-23 If there is time, the CURE RESISTANT PROGRAMs should be deactivated FIRST (before the cure is applied). Unfortunately, the body becomes “used to” these CURE RESISTANT PROGRAMS (just like it does LOOPHOLE PROGRAMMING) and the removal (in many cases) of these programs must be gradual. This is why it is essential that our DIAGNOSTIC MODALITIES quickly recognize and identify all CURE RESISTANT PROGRAMs in any PERSON PROGRAM according to their type (whether they require an ADJUSTMENT PROGRAM) and deactivate them as soon as safely possible. The longer these CURE RESISTANT PROGRAMS remain in the PERSON PROGRAM, the longer it will take to deactivate them–because the too quick removal of CURE RESISTANT PROGRAMs puts the body into shock. This is why we couldn’t remove the CURE RESISTANT PROGRAMs (which induced Vladimir’s heart attacks) before we began using computer/satellite technology to remove the clots in his arteries. The removal of an entrenched CURE RESISTANT PROGRAM (one that’s been in place a long time) will probably require an ADJUSTMENT PROGRAM.

1.0(a)-24 IN THIS CASE (as is true in most of medicine) PREVENTION (i.e., the quick recognition of and removal of CURE RESISTANT PROGRAMS) IS BETTER THAN TREATMENT (suffering the consequences of too long a delay before recognizing and dealing with entrenched CURE RESISTANT PROGRAMS)!

1.0(a)-25 In this case, if there is time to deactivate the CURE RESISTANT PROGRAM, then an ADJUSTMENT PROGRAM (see Sect. 70) should be used, so that the removal of the CURE RESISTANT PROGRAM will be accomplished successfully (without major disruption to the patient’s life). If there is no time (because the ailment is immediately life-threatening), then we have to go in and apply the cure and do the best we can with the symptoms and ailments brought about by the CURE RESISTANT PROGRAM. The DIAGNOSTIC MODALITY should discern whether there is time to deactivate the CURE RESISTANT PROGRAM before we go in and apply the cure and if this is the case, then the DIAGNOSTIC MODALITY will instruct the TREATMENT MODALITY to halt treatment until the CURE RESISTANT PROGRAM has been deactivated!

1.0(a)-26 If the DIAGNOSTIC MODALITY determines that there is no CURE RESISTANT PROGRAM, then the DIAGNOSTIC MODALITY will instruct the TREATMENT PROGRAM to begin treatment at a time which is best for the patient (which, in most cases, would be immediately).

1.0(a)-27 If a PLP or RSP who monitors that patient feels that the TREATMENT PROGRAM should delay treatment (when there is no CURE RESISTANT PROGRAM in place for that treatment)–then that PLP or RSP must get permission from 100 other PLPs or RSPs to delay the treatment (all 100 of these must concur with the conclusion of the PLP or RSP who wants to delay treatment), and this permission from all 100 MUST BE IN writing and made under 666-Computer emotional analysis and all 100 must be confirmed to be authentic persons (and not in an UNWILLING AGENT state) when they make their permissions.

1.0(a)-28 The DIAGNOSTIC PROGRAM will completely and comprehensively scan the entire body every 15 minutes to search for injuries, causes of infections, ailments, and CURE RESISTANT PROGRAMs and to accurately analyze the cause(s) of the injuries, infections, or ailments and will constantly update its DIAGNOSTIC REPORTS to note any changes in the injuries, infections or ailments in the patient. The program will also analyze how the body is responding to any pathogen, and the program will note any changes (including mutations or genetic modifications which have occurred in the pathogen) in the pathogen and will report these changes in a DIAGNOSTIC REPORT when they occur–which will help in determining the course of treatment.

1.0(a)-29 For instance, one hour the person may be diagnosed with an infection by the pneumonia streptococci, which has infected the lungs, larynx, throat, etc. The DIAGNOSTIC REPORT will note which part of the body is affected, what has caused the illness (if pathogens are involved, it will make 15 minute update reports on which germ or incident –including mutations of the original germs–has caused the illness or injury). It is necessary to have 15 minute updates, because Jesuits constantly change strategy to sabotage the work of our physicians.

1.0(a)-30 A patient could start off with an infection by pnuemonia bacteria and then 5 hours later, the Jesuits have genetically modified this to a different type of bacteria, perhaps one that causes colitis, and then 2 hours later they genetically modify the bacteria into another form. Other tactics they have used are to cause a patient to be exposed to about 30 different pathogens (by using UNWILLING AGENTS to cough all over the person and contaminate his living area and any restrooms he/she may frequent) and then the Jesuits pick and choose which of these 30 germs which are lodged in the throat to “take over” the throat, so the patient goes to the doctor and is treated for a flu virus and then when this virus is “licked”, the Jesuits cause another virus sitting in the throat to take over the throat (and then the patient gets different symptoms). This parade goes on and on and ends up very expensive for the patient. So, it appears the original medicine didn’t work, when, in actuality it did for the condition which the patient came in with, but after the patient left the doctor’s office, the Jesuits modified the condition (or the germ or the germ “balance” in the throat) so that the doctor’s treatment plan wouldn’t work. This is where the DIAGNOSTIC AND TREATMENT PROGRAM will be superior to current methods of medicine which “assumes” that the patient’s condition will follow “predictable” paths.

1.0(a)-31 With Jesuits, nothing is predictable in medicine, since they rely on surprise (and genetic and cellular modification) to undermine us and they have genetic and cellular modification capabilities and can manipulate the health and conditions of the germs in the body and the balance of the germs in the body–so we need to abandon outdated and ineffective diagnostic and treatment modalities and quit practicing the medicine of the 1950s, which did not have to deal with medical terrorism (via computer/satellite technology)–which is what we deal with today.

1.0(a)-32 2) TREATMENT MODALITIES: Once a DIAGNOSTIC REPORT has been issued, the program will immediately go into TREATMENT MODALITIES (based on the DIAGNOSTIC REPORT) and will use 666 Computer/satellite technology to begin any treatment on the patient (via 666-Computer or satellite technology). Though in some cases, treatment may be delayed (if there is a CURE RESISTANT PROGRAM in place to cause complications during treatment). If the ailment or condition requires more conventional medical treatment (or treatment which is unavailable through the DIAGNOSTIC AND TREATMENT PROGRAM), then this information will be forwarded to that patient’s physician, employer or family and the patient will be instructed to go to an appropriate health professional for treatment.

1.0(a)-33 The TREATMENT PROGRAM will automatically issue TREATMENT reports about how the treatment is progressing and these reports will be computer filed with the patient’s physicians and others who may need this information. The TREATMENT REPORT will also deal with any CURE RESISTANT PROGRAMs which may affect the treatment and will instruct about how to handle these. When conventional medicine is used on the patient in combination with 666 Computer/satellite treatment–the DIAGNOSTIC AND TREATMENT PROGRAM will record all conventional treatment used on the patient (which it can observe via computer/satellite technology). This will help to document whether the health care practitioner actually delivered the treatment he/she said he/she would do, (and will help catch medical treachery–such as using a pap smear to insert semen into the patient’s vagina) and will ensure a much more accurate history on the patient, since the report will not be based on hearsay (which is what constitutes much of medical reporting today), but will be based on EVIDENCE (via computer/satellite technology).

1.0(a)-34 If this is what actually happened the TREATMENT REPORT would say something like this: “Physician ____ performed a pap smear on patient ____ and the following tissue was scratched and detected benign tissue, also at the same time the instrument used for the pap smear was contaminated with ______’s semen, which was inserted into the vagina. This resulted in the impregnation of patient _____, when the egg was fertilized by this semen at _____ a.m. on such and such a date. . .” This report will be so accurate, it will be able to give a genetic analysis of the semen placed in the patient’s vagina (i.e., whose semen is implanted into the vagina), when the impregnation occurred (if it occurs, etc.). And it will help the DIAGNOSTIC AND TREATMENT PROGRAM to maintain accurate medical histories in each patient, and it will help in any legal proceedings which may arise from the TREATMENT REPORT, since the report can be used in courts of law as EVIDENCE.

1.0(a)-35 This will ensure far more accurate histories on each patient (and hopefully more moral behavior on the part of health care professionals), since each health care professional who cares for the patient can access the full, complete and accurate medical history on each patient from the DIAGNOSTIC AND TREATMENT PROGRAM (which will include any and all medications –including naturopathic and over-the-counter medications–the patient is on and all the treatments which the patient has undergone exactly as that treatment was delivered and NOT BY HOW THE HEALTH CARE PROFESSIONAL SAID IT WAS DELIVERED). The DIAGNOSTIC AND TREATMENT PROGRAM will analyze what the patient is taking (not by what the patient says he/she is taking, which could be inaccurate) but by analyzing what is in the body (via 666-Computer/satellite analysis of the patient’s blood and tissues). Besides, we’ve had instances where labels have lied and what was supposedly in the container was not what the container said, so the the DIAGNOSTIC AND TREATMENT PROGRAM will analyze what is really in the body and in what quantities it is in the body (based on tissue analysis and blood analysis performed by the computer/satellite capabilities of the DIAGNOSTIC AND TREATMENT PROGRAM). The history maintained by the DIAGNOSTIC AND TREATMENT PROGRAM will be used to help the program to decide on treatments and diagnoses for each patient.

1.0(a)-36 In essence, the DIAGNOSTIC AND TREATMENT PROGRAM will be the “master physician” for each patient and will maintain thorough and accurate histories and up-to-date analyses of each patient’s conditions with pin-point accuracy and no aspect of the patient’s medical history missing from the diagnosis.

1.0(a)-37 When portions of the DIAGNOSTIC AND TREATMENT PROGRAM are broken down, malfunctioning, have programming glitches, or have faulty programming errors– a PLP or RSP (or other qualified LAW ENFORCEMENT PERSON) can takeover the functions performed by that faulty programming. But the PLP or RSP must relinquish his/her responsibilities once that faulty programming is fixed and is responsible to obey all CONSPIRACY LAW (and to suffer the consequences of breaking CONSPIRACY LAW) as he/she performs his/her duties (in the place of the DIAGNOSTIC AND TREATMENT PROGRAM).

1.0(a)-38 The program will be created by the TRUTH PROGRAMMERS in cooperation with experts and researchers from all fields of medicine, including experts in naturopathic medicine, nutrition, dentistry, surgery, chiropractic, medical specialists, acupunture and other fields which have been effective in medicine. The program will note how the body reacts to treatments, medications, etc. and will analyze all treatments and medications to see if they are what they purport to be, etc. It will immediately note and detect defective products and phony treatments or criminal practitioners, will issue CONSPIRACY REPORTS about such instances to the INTELLIGENCE HEADQUARTERS of the ISC in California and Russia. These criminal acts will also be noted in the DIAGNOSTIC AND TREATMENT reports, since this manipulation of the patient’s body should be noted in that patient’s medical history for accurate diagnosis and treatment–since the diagnosis and treatment needs to consider this as part of the overall picture of the patient’s health, diagnosis and treatment plan.

1.0(a)-38-a Update on 12-9-05–THE TRUTH PHYSICIANS: Because the Jesuits have given TRUTH PROGRAMMERS targeted amnesia as they create their DIAGNOSTIC AND TREATMENT PROGRAM, all medical work done by TRUTH PROGRAMMERS must be inspected for thoroughness and completeness by the TRUTH PHYSICIANS. This inspection must ensure that every possible human ailment or condition has been programmed into the DIAGNOSTIC PROGRAM for screening and that all treatment programs for any ailments or conditions are appropriate for the condition or ailment. TRUTH PHYSICIANS will be taken from the ISC and must meet all the requirements for membership as the TRUTH PROGRAMMERS–that is, all the Bible reading requirements, etc. TRUTH PHYSICIANS will be taken from all medical specialties (including dentistry, acupuncture, naturopathic medicine, etc.), but they all must be licensed in a medical field (or have training equivalent to a licensed practitioner).

1.0(a)-38-b These TRUTH PHYSICIANS are medical professionals whose full-time job will be to ensure (and inspect) that the work done by the TRUTH PROGRAMMERS is comprehensive and complete and that all systems of the body are thoroughly and completely analyzed and diagnosed (and properly treated) by the DIAGNOSTIC AND TREATMENT PROGRAM. The TRUTH PHYSICIANS will inspect the program by seeing how it works itself out on dummy patients.

The TRUTH PROGRAMMERS may assist the TRUTH PHYSICIANS to educate them about how the program works. And these physicians may get supplemental training in computer programming from the TRUTH PROGRAMMERS to assist them in their work. It is necessary to use physicians to help in this important work because this program requires sophisticated knowledge of medicine. On the other hand, because it is a program, these TRUTH PROGRAMMERS need to educate the physicians about how the program works. The Jesuits use programming and medicine in their attacks against us and we need to be just as savvy as they are in programming and medicine.

1.0(a)-38-c No DIAGNOSTIC AND TREATMENT PROGRAM can be approved by the TRUTH PROGRAMMERS until it has been examined for thoroughness and completeness by the TRUTH PHYSICIANS. This DIAGNOSTIC AND TREATMENT PROGRAM does a very important job and we can’t afford to have errors (or omissions) in it.

1.0(a)-38-d For instance, in Gail Schuler’s DIAGNOSTIC AND TREATMENT PROGRAM, the TRUTH PROGRAMMER neglected to program Gail’s DIAGNOSTIC AND TREATMENT PROGRAM to check for arthritis and Gail had a serious arthritis problem which remained undetected. Fortunately, Gail noticed she had symptoms in her body and took actions on her own which alerted her PLPs and RSPs to her problem before the problem became so serious that she would have to miss work.

1.0(a)-38-e Any (direct or indirect) knowing and willing attempt or action by any person (including a TRUTH PHYSICIAN) to cause a DIAGNOSTIC AND TREATMENT PROGRAM to be deficient in any manner, so that it does not promote the health of the recipient of that program [or so that it violates the guidelines of this Sect. 1.0(a)-38 or of CONSPIRACY LAW], will bring the death penalty as a JESUIT CONSPIRATOR to that violator. Those who willingly and knowoingly cause a SIGNIFICANT PERSON’s program to be deficient (especially if that SIGNIFICANT PERSON is connected to Gail Schuler) will receive a Sect. 95 execution.

1.0(a)-39 For instance, if the pathogen is in the body, but the body is not affected by the germ, the program will not attack the germ, but will leave it alone. On the other hand, if a normally benign germ, such as candida, is becoming rampant and taking over systems of the body (or the body has developed an allergic reaction to the candida), the program will go into treatment mode, which means it will analyze the state of the body and determine which course of treatment to take to deal with the pathogen. This analysis of the states of the body will be updated every 15 minutes (since we cannot count on the body’s condition being predictable due to Jesuit medical terrorist interference) and the treatments used by the PROGRAM will change as the diagnosis changes from hour to hour. Satellite technology could be applied by Jesuits to genetically modify those germs or cancers to turn them into something benign or beneficial to the body.

1.0(a)-40 3) RESEARCH MODALITIES: Any time a new infection or ailment is discovered, this information will be programmed into the DIAGNOSTIC AND TREATMENT PROGRAM, so that every RSP or PLP on earth will have the latest version of the DIAGNOSTIC AND TREATMENT PROGRAM which will scan each body for all known ailments, illnesses, infections in existence in the human race. Because genetic code analysis will be used for diagnosis and because the “x-ray” capabilities of the DIAGNOSTIC PROGRAM (via computer/satellite technology) is far superior to anything known in medicine yet–the diagnosis should be extremely accurate and will even detect rare or unusual conditions that may be missed by a physician (who use regular diagnostic methods).

1.0(a)-41 SHIELD PROGRAMS (maintained by the TRUTH PROGRAMMERS and the RSPs) will also be responsible to maintain a forcefield block or shield around the entire body or brain or accessories of each person under their satellite control–see Sect. 3.02 and 3.021 of General 666-Computer Laws and RSPs from all over the world will ensure that every person has at least 49 back-up shields, in case of computer failure, so that (as much as possible) each person will be protected by shield to minimize the Jesuits’ attempts to undermine the work of our PLPs or RSPs, so that criminal satellite practitioners cannot harm those under the control of that RSP. The 49 back-up shields will not all come from one computer, since if that computer is knocked out, then this leaves the patient vulnerable to Jesuit attack. Therefore, each of the 49 shields around each patient will be maintained by 49 different computers from all over the world. All these computers will be part of the INTERNATIONAL SATELLITE COALITION for SIGNIFICANT PERSONs and will be only from the KING JAMES computers of our law enforcement networks.

1.0(a)-41(a) Each SHIELD PROGRAM must be extended far out enough from each person, so that that person’s breath (or area just outside his body) can be protected. The reason for this is because let’s say that person is infected with the bird flu and exhales this virus into the area just outside his nose or mouth. The Jesuits are using satellite technology to manipulate the germs he just exhaled, and they use satellite technology to cause these to mutate to other forms in the air just outside this person’s nose. And then this sick person inhales the same germs he just exhaled, except that they are NOT THE SAME GERMS HE JUST EXHALED but have been satellite manipulated into A VARIATION OF THE GERM HE JUST EXHALED. The result is, that he now has a NEW GERM that reenters his body (when he inhales the germs he just exhaled) and it is a new and mutated form of the bird flu, which now reenters his body and gives him a “relapse” of the bird flu with a new germThis is very troublesome, and can greatly increase the chances that with enough mutations, the bird flu could mutate into a form that is impossible to deal with. THEREFORE, IT IS IMPERATIVE THAT THE SHIELD PROGRAM for each person extends far enough out from that person, so that the germs this person just exhaled cannot be manipulated by satellite into other forms, and then inhaled again and thus introduce a new, mutated germ into that sick person’s body.

1.0(a)-41(b) Further, as part of the DIAGNOSTIC AND TREATMENT PROGRAM for each person, once a person becomes infected with any germ, the DIAGNOSTIC AND TREATMENT PROGRAM must have a program that connects with the SHIELD PROGRAM(s) for that person, so that whenever this person exhales, coughs, sneezes, defecates, vomits, urinates, ejaculates, etc. or carries out any action that releases his germs outside his body–that the SHIELD PROGRAM will automatically destroy any germs released from this person’s body, so that even if this person’s germs do reenter his body somehow OR if they enter into another person’s body somehow, they will be harmless–SINCE THESE GERMS WILL HAVE BEEN KILLED by the GERM KILLER PROGRAM.

1.0(a)-41(c) Each SHIELD PROGRAM must be programmed with a GERM KILLER PROGRAM that automatically kills any germs that are released by that person. It will be the job of the DIAGNOSTIC AND TREATMENT PROGRAM to recognize any germs released from that person and to automatically kill those germs (in coordination with that person’s SHIELD PROGRAMs).

1.0(a)-41(d) This coordinated effort between the SHIELD PROGRAMS and the DIAGNOSTIC AND TREATMENT PROGRAMS will be called the GERM KILLER PROGRAM.

1.0(a)-41(d)-GM The GERM KILLER PROGRAM for each person must also be programmed to recognize any attempts to manipulate any germs within the range of that person, and to immediately locate the source of the germ manipulation activity –called the GERM MANIPULATOR (i.e., WHO IT IS THAT IS DOING THIS), so that arrests can be made and so that it can be established firmly WITH EVIDENCE on GCFNC who is the guilty party and who attempts to manipulate germs in order to spread plagues and illnesses (a clear violation of CONSPIRACY LAW).

1.0(a)-41(d)-GM(a) Once that GERM MANIPULATOR is located, he/she must be arrested and his/her case will be tried on GCFNC. Willing and knowing failure to arrest any GERM MANIPULATOR (or failure to program the GERM MANIPULATOR to locate these criminals) will bring the death penalty to that negligent violator. If any person is found guilty of willingly and knowingly conducting activities (or inactivities) that assist the Jesuit Order and that promote the spread of illness in any population, he/she must be executed (after evidence has been established for his/her guilt) on GCFNC.

1.0(a)-41(d)-GM(b) Failure to enforce this Sect. 1.0(a)-41(d)-GM, will also bring the death penalty, since it is important to establish clearly WHO IS THE GUILTY PARTY IN THESE GERM MANIPULATOR VIOLATIONS. This is because the Jesuits desire to create the impression that it is not they, but others, who are the GERM MANIPULATORS that cause death and destruction through the human race. We cannot sit back and allow these murdering bastards to get away with this. Therefore, it is imperative that it is programmed into each GERM KILLER PROGRAM not only to locate and kill all germs, but to locate the GERM MANIPULATOR criminals responsible for these germs (or the spread or manipulation of these germs) and to bring the real GERM MANIPULATORs to justice, and to clear innocent parties!

1.0(a)-41(e) Every person on the planet should have a GERM KILLER PROGRAM in operation on their body. The TRUTH PROGRAMMERS are responsible to get the GERM KILLER PROGRAM working as soon as possible to prevent the spread of a bird flu or other outbreaks that could decimate millions of person.

1.0(a)-41(f) The existence of the GERM KILLER PROGRAM does NOT mean that our MICROBIOLOGY LAWS are not to be enforced. As with all of CONSPIRACY LAW, Jesuits always find ways to outmaneuver our laws. Therefore, we must be diligent in enforcing all of CONSPIRACY LAW and not let down our guard in any area.

1.0(a)-41(g) Any (direct or indirect) willing and knowing attempt or action or inaction to create (or NOT create) the GERM KILLER PROGRAM in such a manner so that the principles of CONSPIRACY LAW are not honored, or so that the principles of this Sect. 1.0(a)-41 are not honored, so that as a result of this inaction or action contagious illnesses are in any manner spread (when they could have been prevented by honoring the guidelines of CONSPIRACY LAW), will bring the death penalty as a JESUIT CONSPIRATOR to that violator. Those violations that involve SIGNIFICANT PERSONs will result in Sect. 95 executions which will be shown on GCFNC. As in all execution, evidence first must be presented to establish firmly who is the guilty party. Once guilt has been established WITH EVIDENCE, the violator will be executed on GCFNC.

1.0(a)-42 Any (direct or indirect) willing and knowing attempt or action by any LAW ENFORCEMENT PERSON to create a program or use a program in any manner to cause false reports to be issued or to cause harm to a patient or to create a DIAGNOSTIC OR TREATMENT PROGRAM which does not honor the guidelines of this Sect. 1.0(a), will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

*********************

1.0(b) Any (direct or indirect) deliberate, knowing and willing attempt (or action) by a RSP or programmer to maintain a FORCEFIELD BLOCK–see Sect. 1.0[c] (or to neglect to maintain a forcefield block) around the entire body of a person (under the satellite control of that RSP) in a manner to allow an unregistered satellite practitioner to have any type of access to any part of that person’s body (and thus render that person vulnerable to satellite attack by criminals), will bring the death penalty as a JESUIT CONSPIRATOR to any registered satellite practitioner or any PLP or licensed practitioner (who in any way) commits such an action or attempt.

1.0(c) A FORCEFIELD BLOCK is defined as a computer-generated and/or satellite generated forcefield around a DESIGNATED PERSON which can only be penetrated by those registered or licensed practitioners who have the password (or direct access) to that DESIGNATED person–and no persons (who are unregistered or unlicensed) can penetrate that forcefield block in order to employ satellite technology on that DESIGNATED person.

1.2 TORTURE is defined as using the 666-Computer or satellite computer or satellite technology in a manner designed to inflict suffering and which is in violation of the CONSPIRACY LAW PRESIDENT’s instructions.

1.21 NON-LIFE THREATENING, NEAR LIFE THREATENING, and LIFE THREATENING TORTURE need to be defined and differentiated in written documents drafted by attorneys and medical doctors and professionals (who are qualified to evaluate what would constitute non-life threatening, near life threatening and life threatening torture in the use of the 666-Computer or satellite computer or satellite technology on people). ANY TYPE OF VERTIGO (or disorientation which in any way resembles vertigo) induced by the 666-Computer or satellite computer or satellite technology will be considered LIFE THREATENING TORTURE and any PLP or RSP who induces a condition of this type WILL BE IMMEDIATELY EXECUTED. This should help to clarify any disputes over what is non-life threatening, near life threatening and life threatening torture in the use of the 666-Computer or satellite computer or satellite technology by PLPs and RSPs. Once these documents are written, any PLP or RSP who uses torture (via the 666-Computer or satellite computer) should be punished as a non-life threatening, near life threatening or life threatening torturer according to the conspiracy laws I’ve written for non-life threatening, near life threatening and life threatening torturers. Bible BELIEVERS are handled differently, see Sect. 1.31 and 1.51. And this PLP or RSP should be punished for any other violations of my conspiracy laws in their use of torture (via the 666-Computer or satellite computer or satellite technology).

1.3 To be under SURVEILLANCE means that all communications to and from the practitioner will be monitored, including all 666-Computer or satellite computer communications.

1.31 A Bible BELIEVER is defined as any person who claims to believe that the Bible is God’s source of all truth and that all other English Bible versions are perversions. A Bible believer will also include anyone who is associated with a Bible believer, such as relatives of a Bible believer or those who work with or attend school or even drive in the same car or bus or train as a Bible believer or those who are drivers of cars or vehicles on the same road as a Bible BELIEVER.

1.4 A PRACTITIONER is defined as one (and any collaborators, such as space scientists who may have a transfer connection with this practitioner) who uses the 666-Computer or satellite computer or satellite technology on a person or animal in order to communicate with that person or animal or to manipulate (in any manner) that person or animal’s brain or body.

1.40 A PRIMARY PRACTITIONER is the 666-Computer or satellite computer practitioner or RSP who has immediate and direct control over a person (via the 666-Computer or satellite computer or satellite technology). In other words, this is the practitioner who can manipulate a person (via the 666-Computer or satellite computer or satellite technology).

1.41(a) When someone is called a DESIGNATED PERSON, that means only privileged licensed practitioners or RSP may use the 666-Computer or satellite computer or satellite technology on this person or animal. ANY OTHER 666-Computer or satellite computer or satellite practitioner users who use the 666-Computer or satellite computer or satellite technology on this person or animal will be executed.

1.41(b) A PRIVILEGED LICENSED PRACTITIONER is a 666-Computer practitioner who is hired by the CONSPIRACY LAW PRESIDENT to use the 666-Computer on a DESIGNATED PERSON. A privileged licensed practitioner must have a written license signed by the CONSPIRACY LAW PRESIDENT (in the presence of witnesses) which licenses them to use the 666-Computer on a DESIGNATED PERSON. Only Privileged Licensed Practitioners and Registered Satellite Practitioners may use a 666-Computer or satellite computer on a DESIGNATED PERSON. Any other 666-Computer or satellite computer users (including IMPOSED PERSONs-see Sect. 2.2 of CONSPIRACY LAWS AND GOVERNMENT) on a DESIGNATED PERSON will be executed. Complete 666-Computer and satellite computer HISTORIES will be obtained from those executed, before the execution takes place (in order to obtain essential evidence for on-going legal cases). The abbreviation for PRIVILEGED LICENSED PRACTITIONER is PLP.

1.41(c) A REGISTERED SATELLITE PRACTITIONER is a satellite practitioner who is hired by the CONSPIRACY LAW PRESIDENT to use satellite technology and/or 666-Computer technology on a DESIGNATED PERSON (see Sect. 1.0[a]). A registered satellite practitioner must have a written license signed by the CONSPIRACY LAW PRESIDENT (in the presence of witnesses) which licenses them to use satellite technology and/or 666-Computer technology on a DESIGNATED PERSON. Only registered satellite practitioners may use satellite technology and/or 666-Computer technology on a DESIGNATED PERSON.Any other satellite users (including IMPOSED PERSONs-see Sect. 2.2 of CONSPIRACY LAWS AND GOVERNMENT) on a DESIGNATED PERSON will be executed. Complete 666-Computer or satellite computer HISTORIES will be obtained from those executed, before the execution takes place (in order to obtain essential evidence for on-going legal cases). The abbreviation for REGISTERED SATELLITE PRACTITIONER is RSP.

1.42 VLADIMIR PUTIN or the acting CONSPIRACY LAW PRESIDENT is defined as the CONSPIRACY LAW or INTERNATIONAL PRESIDENT. Though the CONSPIRACY LAW PRESIDENT may be referred to in the masculine sense, with words like he/his, it is understood that the CONSPIRACY LAW PRESIDENT could be a woman.

1.43 GAIL SCHULER is defined as the woman born on 9-15-57 in Miami, FL whose birth parents are Misao Satake Fuller and Robert Leonard Chord.

1.44 To DISOBEY means the privileged licensed practitioner (PLP) or RSP has violated the CONSPIRACY LAW PRESIDENT’s instructions or has acted independently of the CONSPIRACY LAW PRESIDENT’s instructions.

1.45 A SUSPENSION NOTICE is a written notice, signed and dated by the CONSPIRACY LAW PRESIDENT in the presence of witnesses, which states that the indicated PLP or RSP practitioner has been forbidden to practice any form of 666-Computer or satellite computer or satellite activities for a set time period (which will be indicated on the notice).

1.46 A DISMISSAL NOTICE is a written notice, signed and dated by the CONSPIRACY LAW PRESIDENT in the presence of witnesses, which states that the indicated PLP or RSP practitioner has been forbidden to practice ANY form of 666-Computer or satellite computer or satellite activities PERMANENTLY. Also, all professional licenses to practice any form of medicine will be revoked from the dismissed practitioner. All PLP or RSP practitioners who are dismissed, will be placed under permanent 666-Computer or satellite computer surveillance.

1.45 To be under SUSPENSION or to be SUSPENDED means that a PLP or RSP practitioner is forbidden to practice any 666-Computer or satellite computer or satellite activities for a set time period. All those PLP or RSP practitioners who are suspended will be given a written SUSPENSION NOTICE, signed and dated by the CONSPIRACY LAW PRESIDENT in the presence of witnesses. Any PLP or RSP who violates his/her suspension and uses the 666-Computer or satellite computer or satellite during the suspension period will be immediately executed. Suspended PLP or RSP practitioners will be placed under permanent 666-Computer or satellite computer surveillance.

1.46 To be DISMISSED, means that the PLP or RSP practitioner is forbidden ever again to practice any form of medicine or to use the 666-Computer or satellite computer or satellite technology in any form EVER AGAIN. All professional licenses (for any kind of medical practice) of this dismissed PLP or RSP will be revoked. Any dismissed PLP or RSP who practices any form of medicine or uses the 666-Computer or satellite computer or satellite technology in violation of his/her dismissal will be immediately executed. All PLP or RSP practitioners who are dismissed, will be placed under permanent 666-Computer or satellite computer surveillance.

1.5 Any privileged licensed practitioner or RSP who interferes with the CONSPIRACY LAW PRESIDENT’s communication with Gail Schuler or who uses the 666-Computer or satellite computer or satellite technology on Gail or on a DESIGNATED PERSON in a manner which violates the CONSPIRACY LAW PRESIDENT’s instructions or who uses the 666-Computer or satellite computer or satellite technology on Gail or on a DESIGNATED PERSON independent of the CONSPIRACY LAW PRESIDENT’s instructions, will be given a stop order (which must be recorded with the military tribunals), and will be immediately suspended from ALL 666-Computer or satellite computer or satellite activities and will be placed under PERMANENT surveillance as long as that practitioner is alive.

1.51 Because of Vladimir Putin and Gail Schuler’s stand on the Bible, any PLP or RSP who uses the 666-Computer or satellite computer or satellite to deliberately torture (or attempt to torture) any person who is a Bible BELIEVER (see Sect. 1.31) will be immediately executed. Sadly, it appears that a PLP has already murdered a Bible BELIEVER at xxxxxxx Baptist Church. Recently, there was a funeral for a prominent church member, named Lxxxxx Wxxxxxx (not sure of spelling or name). I am certain that Lxxxxx was murdered (via the 666-Computer or satellite computer). There have (within the past several weeks) been other 666-Computer or satellite computer murders of relatives and/or of those associated with xxxxxxxxx Baptist Church members as well. I believe the reason the Jesuits are murdering Bible BELIEVERS is to create the impression that Vladimir Putin is NOT really a Bible believer, but is faking it, in order to murder Bible BELIEVERS so that he can frame Jesuits with the murder of Bible BELIEVERS and so that he can then frame Jesuits with the eventual murder of myself. Because of this intense targeting of Bible BELIEVERS by Jesuits, it is necessary to strengthen the laws regarding the execution of PLPs (when it comes to Bible BELIEVERS). Therefore, it will not matter if the 666-Computer or satellite computer induced torture on the Bible believer is life threatening, near life threatening or non life threatening. As soon as it is determined that a PLP or ANY 666-Computer or satellite computer practitioner or RSP is deliberately violating the CONSPIRACY LAW PRESIDENT’s instructions and is using the 666-Computer or satellite computer or satellite technology (in violation of the CONSPIRACY LAW PRESIDENT’s instructions) to torture (or attempt to torture) a Bible BELIEVER, that PLP or space scientist WILL BE IMMEDIATELY EXECUTED. An example of a deliberate attempt to torture, would be to use the 666-Computer or satellite computer or satellite technology to manipulate a dangerous dog OR ANIMAL (a Pitt Bull or a Rottweiler, for example) into the vicinity of a Bible BELIEVER. It is necessary to have very strict laws regarding the torture (or attempts to torture) of Bible Believers (by the 666-Computer or satellite computer or satellite technology) in order to send the message that the CONSPIRACY LAW PRESIDENT will not tolerate any type of torture (or attempts to torture) on those who have the same religious convictions as his future wife, because if he tolerates (in any manner) the deliberate torture of Bible believers (via the 666-Computer or satellite computer or satellite technology), then it creates the impression that he may try (using the 666-Computer or satellite computer or satellite technology) to torture Gail Schuler next, and that he supports the torture of Bible Believers and of Gail Schuler in order to frame the Jesuits. And the CONSPIRACY LAW PRESIDENT is horrified by this possibility, so IMMEDIATE EXECUTION will be the penalty for any PLP or any practitioner who uses the 666-Computer or satellite computer and/or satellite technology to deliberately torture (or attempt to torture) a Bible BELIEVER.

1.6 Only 1 stop order is necessary for any 666-Computer or satellite computer user who uses the 666-Computer or satellite computer or satellite technology on a DESIGNATED PERSON in an illegal manner.

1.7 After 1 month of surveillance, the CONSPIRACY LAW PRESIDENT can reinstate a suspended privileged licensed practitioner or RSP (who must be on permanent surveillance), but will tolerate no more disobedience from this practitioner. If he/she disobeys one more time after being suspended, he/she will be PERMANENTLY DISMISSED and will be given a DISMISSAL NOTICE.

1.8 The CONSPIRACY LAW PRESIDENT will tolerate no torture (or attempts to induce dangerous disorientation–such as vertigo-like conditions) on Gail Schuler or on a DESIGNATED PERSON from any privileged licensed practitioner or RSP.

1.9 Any privileged licensed practitioner or RSP who uses near life-threatening or life-threatening torture on Gail Schuler or on a DESIGNATED PERSON will be immediately executed.

1.91 Any privileged licensed practitioner (PLP) or RSP who uses non life-threatening torture on a DESIGNATED PERSON will be given a stop order (which must be recorded with the military tribunals) and will be placed on permanent surveillance and suspended for a month, or if the CONSPIRACY LAW PRESIDENT desires, the CONSPIRACY LAW PRESIDENT can replace them.

1.92 A non life-threatening PLP or RSP torturer may be reinstated (if on permanent surveillance) but no more disobedience will be tolerated. If the torturer disobeys again, that torturer will be given a DISMISSAL NOTICE, and all of that torturers’ professional licenses will be revoked and that practitioner will be forbidden to practice any type of medicine or to use the 666-Computer or satellite computer or satellite technology (in any form) ever again.

2.0 If a PLP (privileged licensed practitioner) or RSP is executed or deceased and had innocent family to which they have left an estate (or proceeds from their will), the innocent family will be entitled to those proceeds or that estate. The International government will not confiscate what was legally willed or left to the innocent family members of the deceased (executed) PLP or RSP.

2.1 However, the PLP or RSP’s will or last testament may need to be rewritten to ensure that the family (or the family’s children) receives the will’s proceeds, perhaps by designating a trust as a beneficiary, in which a trustee would have the fiduciary responsibility to oversee and handle the trust and its funds for the family in the most expeditious and honest way.

2.2 Should the deceased/executed PLP or RSP’s family die before receiving all their proceeds from the deceased PLP or RSP’s will, and the PLP or RSP’s family’s children and all their offspring are dead at the time of the distribution or proceeds from the deceased PLP or RSP’s will, or if the will’s proceeds have not all been distributed; the money or estate from the PLP or RSP’s will, will be held in a trust to be distributed to another deceased/executed PLP or RSP’s family.

2.3 Due to the heavy influx of Jesuit agent physicians who are volunteering to be PLP or RSPs– any new physicians or professionals the International government uses as PLP or RSPs must be willing to be put under total surveillance (including all 666-Computer or satellite computer and satellite communications to and from that person). In other words, all PLPs and RSPs must be under the care of PLPs and RSPs.

2.301 Also, a FINANCIAL HISTORY (see Sect. 77.03) (see TERRORIST MONEY LAWS document) will be obtained on all PLPs and RSPs going as far back as we can go. The requirement to publish a FINANCIAL HISTORY (see Sect. 77.03) may be required for all PLPs and RSPs (if this is possible). The CONSPIRACY LAW PRESIDENT can work with this requirement to publish a FINANCIAL HISTORY (see Sect. 77.03) for PLPs and RSPs, and can adjust how far back he will go in that PLP’s or RSP’s FINANCIAL HISTORY (see Sect. 77.03) (when dealing with PLPs and RSPs for non-SIGNIFICANT persons). The FINANCIAL HISTORY (see Sect. 77.03) for PLPs and RSPs of SIGNIFICANT PERSONs will be published in Gail’s statements (with updates made hourly).

2.302 Because of the tremendous problems we’ve had with PLPs and RSPs, and because they have used the 666-Computer or satellite computer and satellite technology to murder extensively, it is necessary to ensure that any PLP or RSP has not made a previous contract with Jesuits to be a murderer. THIS IS NOT AN INVASION OF PRIVACY. IT IS MORE IMPORTANT TO PROTECT THE PUBLIC FROM MURDERERS, THAN TO PROTECT A POTENTIAL MURDERER’S RIGHT TO PRIVACY. DUE TO THE TYPE OF TECHNOLOGY (666-Computer or satellite computer AND SATELLITE TECHNOLOGY) WE ARE DEALING WITH, AND THE EXTENSIVE USE ALREADY MADE OF THIS TECHNOLOGY TO MURDER— IT IS NECESSARY TO GET A FINANCIAL HISTORY (see Sect. 77.03) ON ALL PLPs AND RSPs. A technique that Jesuits have used with PLPs and RSPs is to make a contract with them (years ago) and then to use the 666-Computer or satellite computer to erase from the PLP or RSP’s memories all knowledge of the contract. Once the Jesuits remove the knowledge of this contract from their agent, then they manipulate the agent like a puppet or automaton (in some cases even manipulating facial expressions and emotions). The contract goes like this: “We will pay you a big bonus later, if you help us succeed in our goals. You make this deal with us, which is: That we will remove from your memories that you made this deal with us, but you must allow our 666-Computer or satellite computer practitioner to manipulate you completely and you allow yourself to be completely manipulated by and to follow all the directions given you by our practitioner.”MANY TIMES THE DIRECTIONS OR MANIPULATIONS WHICH THE JESUITS GIVE TO THE JESUIT PRACTITIONER RESULT IN MURDER. The only way we can tell if such a deal was made with a PLP or RSP, is to examine the PLP and RSP’s memories; and, specifically, the memories of any financial transactions made previously. That is why it is essential that we get a FINANCIAL HISTORY (see Sect. 77.03) on all PLPs and RSPs. Otherwise, we have no guarantee that the PLP or RSP is not a veiled Jesuit puppet (who made a previous deal with Jesuits–WHICH COULD MEAN A DEAL TO BE A 666-Computer or satellite computer or SATELLITE MURDERER). We need to ensure that the PRACTITIONER is NOT totally manipulated and directed by a Jesuit 666-Computer or satellite computer or satellite practitioner.

2.303 Obviously, all PLPs and RSPs must be under total surveillance (including 666-Computer or satellite computer and satellite surveillance) and PLPs and RSPs for SIGNIFICANT persons must have published FINANCIAL HISTORIES (with the history going back over the entire PLP’s or RSP’s lifetime) and these FINANCIAL HISTORIES must be updated hourly. We encourage published FINANCIAL HISTORIES because the bribes are large, and if the bribes are published, it may shame the Jesuits and intimidate them. It is important that the International government can trust its PLPs and RSPs (especially those who monitor SIGNIFICANT persons); and, apparently, the Jesuits are instructing their doctors to volunteer as PLPs and RSPs to help the International government. The International government doesn’t want Jesuit agent doctors working for it. Obviously, if the International government finds any incriminating evidence as a result of total surveillance of the PLPs and RSPs, the International government will take the needed legal actions.

2.304 An UNWILLING AGENT is defined as a person who has his/her decision-making functions and/or emotions and personality (and especially his/her desires and goals) TAKEN OVER and manipulated (by a 666-Computer or satellite computer or satellite practitioner) against his/her will or knowledge and this take over usually lasts for at least a ½ hour or more a day, though it can be limited to 15 minutes or less or can be takeovers for brief intervals with times of respite inbetween–but if the cumulative total amount of takeover time results in a takeover of that person’s goals and personality for more than a ½ hour a week, then that person is being manipulated as an UNWILLING AGENT. This involves a 666-Computer or satellite computer or satellite takeover of a person’s behavior and personality to manipulate that person to have behavior and goals and personality which are not that person’s NATURAL BEHAVIOR or GOALS or personality (see Sect. 63.2)An UNWILLING AGENT TAKEOVER involves any type of takeover of the person (by 666-Computer or satellite computer or satellite technology) that affects the goals, desires and personality of the person and usually turns him/her into an obsessive-compulsive personality (since this is the personality of the Jesuits when they takeover a person as an UNWILLING AGENT), and it would be a takeover which is done without that person’s knowledge or consent. A person in a temporary BRAIN INTERRUPTED STATE is usually not obsessive-compulsive (unless that is his AUTHENTIC PERSONALITY), but has just forgotten something or had a brief memory lapse, but not total amnesia to the point that he/she forgets important items like who his son or daughter is engaged to marry or that he has inherited a million dollars. JESUITS CAN MANIPULATE AN UNWILLING AGENT TO FORGET SUCH THINGS AS WHO THEIR CHILD IS ENGAGED TO OR THAT THEY HAVE INHERITED A MILLION DOLLARS! A person in a temporary BRAIN INTERRUPTED STATE would never forget such things!

2.304(a.1) An UNWILLING AGENT takeover must be differentiated from a BRAIN INTERRUPTION takeover which is not an UNWILLING AGENT takeover, but is a BRAIN INTERRUPTION TAKEOVER which gives a person a brief bout of amnesia or distraction, so that he may forget to (or be distracted and thus forget to) turn the headlights on his car at night when he/she starts his car at night, or he/she may briefly forget something, which he/she will probably recall within a half hour or less or whenever he/she needs to be reminded of it.

2.304(a.2) If an UNWILLING AGENT is about to enter a car, he/she has much more than a BRAIN INTERRUPTION affecting his/her behavior. An UNWILLING AGENT’s desires and goals have been taken over by the Jesuits to the point that they are not that persons’ desires and/or goals in his/her AUTHENTIC STATE and he/she can forget significant events which have occurred in his/her life. A person in a BRAIN INTERRUPTED state does not have his desires and goals and personality taken over by the Jesuits, he just mentally stumbles or forgets something and because the Jesuits don’t have this person as an UNWILLING AGENT, this person usually notices his brain aberration and tries to correct it soon later. UNWILLING AGENTs are so taken over that they are usually not aware that their brain is in aberration or that they are not operating from their AUTHENTIC PERSONALITY. An UNWILLING AGENT TAKEOVER involves much more than a BRAIN INTERRUPTION, but is an almost (or complete) takeover of that person’s authentic personality so that that person is driven by goals and desires which are not his/her natural goals and desires; and the person usually displays obsessive-compulsive traits which are foreign to his/her AUTHENTIC personality–this is because the personality of the Jesuit Order, when they takeover a person, is obsessive-compulsive.

2.304(a) Whenever a very SIGNIFICANT PERSON is taken over as an UNWILLING AGENT by the Jesuits, this will be headline news on GCFNC. This is because the use of UNWILLING AGENTS has been the prime strategy of the Jesuits to foil Vladimir’s attempts to give Gail money or to prevent his marriage to her–so this is very important news and should make the headlines everytime it occurs and it occurs a lot, so this could end up taking the first half hour of news coverage every hour. If the Jesuits did not have UNWILLING AGENT capabilities, Vladimir and Gail would be married by now and Gail would have received all the proceeds from her novel Silver Skies. So this is obviously a very important Jesuit strategy and deserves headline coverage and we need to make a very strong statement of protest about this Jesuit strategy–executions of the IMPOSED PERSONs involved with the UNWILLING AGENT must also be shown.

2.304(b) We must mete out the death penalty for each UNWILLING AGENT violation or else the Jesuits will think this whole headline news reporting is a big joke. The following information must be mentioned in the broadcast report about the takeover of the SIGNIFICANT PERSON as an UNWILLING AGENT before the execution of the IMPOSED PERSON involved takes place:

1) Was this UNWILLING AGENT reading the Bible on a daily basis (at least ½ hour a day) when the takeover took place?

2) WHO or WHAT ORGANIZATION or ENTITY’s IMPOSED PERSONs took over that person as an UNWILLING AGENT and WHY did they do so and HOW are they using this UNWILLING AGENT to further Jesuit goals and HOW were they able to do this? It is very important to establish WHO was behind the takeover to firmly draw sides in this conflict and to clear the innocent who may be implicated. For instance, Prince Harry was taken over by JESUIT IMPOSED PERSONs and this needs to be broadcast on GCFNC.

3) The name of the UNWILLING AGENT can be changed to protect them from being destroyed by the Jesuits and/or their face can be blocked on television coverage to protect their privacy. However, they should be identified in an understandable enough manner, so that the world will not be fooled by any Jesuit attempts to use an UNWILLING AGENT to implicate any innocent party.

4) All Jesuits involved as IMPOSED PERSONS in the takeover of any SIGNIFICANT PERSON will be fully identified with religious affiliation (it’s not always Roman Catholic–Jesuits have camoflauged themselves under various guises) photos, name, race, location, etc. in the headline broadcast.

5) Right after the presentation about the UNWILLING AGENT and how he was manipulated by the Jesuits, the execution of the IMPOSED PERSONs involved must also be shown–unless that captured Jesuit agrees to the terms of Sect. 2.304(g) through (j)–in this case the execution will be delayed for a week (at the longest). This Sect. 2.304(g) through (j) will only apply to a captured Jesuit, since we cannot carry out Sect. 2.304(g) through (j) with a Jesuit who is not in our custody..

2.304(c) We will show before and after footage on GCFNC of the IMPOSED PERSON–right before his/her execution and right after his/her execution. If we cannot apprehend the IMPOSED PERSON, but kill him by destroying his operations–this will be shown on GCFNC and indisputable proof that this IMPOSED PERSON was killed will be shown one way or another.

2.304(d) Right before the execution (if we have the IMPOSED PERSON in our custody) we will ask the IMPOSED PERSON (under 666-Computer lie-detection and emotional analysis) –and we will gauge the correct answer (through 666-Computer analysis) since the IMPOSED PERSON may refuse to answer the question–he/she will be asked whether he/she is a Jesuit or Jesuit supporter and whether he/she is guilty of manipulating that SIGNIFICANT PERSON as an UNWILLING AGENT. If we cannot capture the IMPOSED PERSON, then we will get a Jesuit leader (and put him on GCFNC) and ask him (under 666-Computer analysis) whether this IMPOSED PERSON is guilty of manipulating the UNWILLING AGENT involved, and then we will execute that IMPOSED PERSON or show how he/she was executed (with irrefutable evidence that the execution took place). Once the 666-Computer lie-detection and emotional analysis determines that this IMPOSED PERSON did indeed manipulate a SIGNIFICANT PERSON as an UNWILLING AGENT–he/she will be executed within an hour and publicly on GCFNC [unless Sect. 2.304(g) through (j) applies–in which case the execution may be delayed or prevented]. The after footage must be indisputable and must be shown in such a manner that there is no doubt that this IMPOSED PERSON was executed. So, you can see, those SIGNIFICANT PERSONS who are used as UNWILLING AGENTS will, indeed, make the headline news–because we will show the execution of the IMPOSED PERSONs involved (right after 666-Computer analysis reveals that IMPOSED PERSON’s guilt). We must show the execution of the IMPOSED PERSON, or else the Jesuits can claim that they were not the IMPOSED PERSON and that we lied about them and that a member of the International government was really the IMPOSED PERSON. Since we cannot execute one of our own easily, the fact that we execute the IMPOSED PERSON will be proof that we did, indeed, execute an IMPOSED PERSON who was a Jesuit. So the public execution of the IMPOSED PERSON must be shown. Once we have evidence that this IMPOSED PERSON, indeed, manipulated an UNWILLING AGENT–that is all we need to execute him/her–the execution will take place immediately afterwards [unless Sect. 2.304(g) through (j) applies–in which case the execution may be delayed or prevented] and will be shown publicly on GCFNC and the whole world will see it. This will be our message about how we feel about the Jesuits’ use of UNWILLING AGENTS. This will establish firmly that the news broadcast is accurate in accusing the Jesuit of being the IMPOSED PERSON, because we could not lightly execute an person who was one of our own. And the evidence we have against the Jesuit Order is overwhelming, so the world knows that if we executed this IMPOSED PERSON, that they must have, indeed, been a Jesuit. Though this will not stop the Jesuits, it may intimidate them slightly–not that they are afraid of execution, because we know they are fanatics and have a Satanic death wish for themselves and everyone else– but the fact that we execute them will firmly establish their guilt in the matter of the UNWILLING AGENT, since we cannot lightly execute one of our own (and so it will be indisputable that a Jesuit was executed) and this will throw all their phony arguments about their innocence in the matter of the UNWILLING AGENT out the window. ONE WAY OR ANOTHER THE EXECUTION OF THE IMPOSED PERSON involved with the SIGNIFICANT PERSON must be shown in an indisputable manner, or else the Jesuits will treat this whole headline broadcast about UNWILLING AGENTS as a BIG JOKE.

2.304(e) It is ALSO hoped that if SIGNIFICANT PERSONs who do not read the Bible daily hear this, that it will encourage them to begin and CONTINUE daily Bible reading of at least a ½ hour a day–that is another reason for this exposure. Jesuits can takeover a person who is a casual Bible reader or who reads less than ½ hour a day of Bible. Vladimir tells me that many people start off reading the Bible daily, but QUIT– or read it inconsistently, and then the Jesuits take them over. They will realize that they could end up on headline news as an UNWILLING AGENT if they are not reading their Bibles daily at least a ½ hour daily. Daily ½ hour or more Bible reading of the Bible (or its equivalent) is the only sureproof way we have right now to prevent a person from being taken over as an UNWILLING AGENT.

The report on GCFNC about the IMPOSED PERSON (who is about to be executed) could go something like this, while the photos and full identification of the JESUIT IMPOSED PERSONs involved shown on the screen, the following audio could be presented: These Jesuits successfully took over Prince Harry of England as an UNWILLING AGENT, and manipulated Prince Harry to go to a costume party dressed as a Nazi. Jesuits from the following underground operations in Saudi Arabia, Russia and Australia were implicated in this attempt. The locations of these Jesuit operations were in Saudi Arabia, Russia and Australia and the International government’s military forces have not been able to penetrate all these operations and arrest all the Jesuits in them, so the Jesuits still have capabilities and are using these to the fullest. After questioning of these Jesuits, it was determined that they desired to take over the Prince, in order to implicate the Western nations with Jesuit terrorist activities and to make England and the Western nations appear to be anti-Semitic and to be those who are really behind the Jesuits’ vast and catastrophic underground anti-Semitic and terrorist operations all over the world. Prince Harry is not a daily Bible reader, so it was an easy matter for the Jesuits to take him over as an UNWILLING AGENT, since we have determined that daily reading of the Bible (at least ½ hr. A DAY) makes it exceedingly difficult for Jesuits to use that person as an UNWILLING AGENT. Next, we would question the IMPOSED PERSONs involved and ask them (under 666-Computer analysis) if they were, indeed, the ones who manipulated PrinceHarry and if they were Jesuits or Jesuit supporters at the time they committed the crime. If 666-Computer analysis reveals that this is the case, they will be publicly executed right afterwards [unless Sect. 2.304(g) through (j) applies–in which case the execution may be delayed or prevented] and the corpse will be shown in an indisputable manner, so that there will be no doubt that the execution took place.

Or like this: The following Wal-Mart workers with Gail Schuler have been taken over as UNWILLING AGENTS, though these Wal-Mart workers claim to be Christians, they are not daily ½ HOUR A DAY Bible readers and it was an easy matter for the Jesuits to take them over as UNWILLING AGENTS. It appears the Jesuits are using these workers to undermine Gail at her work and to raise slanders and create false impressions about her and are doing so in a manner to implicate Vladimir Putin with their attempts. However, questioning of the IMPOSED PERSONs involved indicates Vladimir’s innocence and clearly shows the Jesuit’s involvement in the takeover of these persons as UNWILLING AGENTS, and questioning of the IMPOSED PERSONs involved, reveals that the motive for the Jesuits’ takeover of these Wal-Mart persons is to prevent or ruin Vladimir’s marriage to Gail and to assist Jesuits in their attempts to clear themselves of the catastrophic evidence we have uncovered against them from their vast underground operations, which we have recently entered and searched. Next, we would question the IMPOSED PERSONs involved and ask them (under 666-Computer analysis) if they were, indeed, the ones who manipulated the Wal-Mart workers and if they were Jesuits or Jesuit supporters when they did so. If 666-Computer analysis reveals that this is the case, they will be publicly executed right afterwards [unless Sect. 2.304(g) through (j) applies–in which case the execution may be delayed or prevented] and the corpses will be shown in an indisputable manner, so that there will be no doubt that the executions took place.

2.304(f) To prevent the news from being totally negative, the success of our military operations in uncovering and destroying Jesuit operations should also be headline news and interspersed between coverage of UNWILLING AGENT takeovers by Jesuits.

2.304(g) From 1-14-05 and forward, whenever we jail any Jesuit or Jesuit conspirator who has commited death penalty violations (by manipulating SIGNIFICANT PERSONs as UNWILLING AGENTS), we will strike a deal with those jailed and this deal will also apply to the Jesuit Order: If that Jesuit is willing to be locked up in his/her jail cell with only a Bible (or its equivalent) and to only allow the Bible to be his/her input (outside of our once a day questioning of them over their attitude towards Gail’s marriage to Putin and their attitude about leaving Gail and Vladimir alone–, we may spare that Jesuit the death penalty [see Section 2.304(i) about leaving Gail alone for a week]). They will not be able to watch television or listen to radio or have any other form of sensory input for that week. They will be on camera and we will show their behavior on GCFNC while they are in jail– therefore, the world will know if all they did for that whole week was to read the Bible. If we see a Jesuit spend all day for a whole week reading the Bible, then this may be evidence that this person deserves forgiveness and may be spared the death penalty. We will enter that cell everyday and ask that Jesuit (under 666-Computer analysis AND ON GCFNC) if he/she does not oppose the marriage of Gail Schuler to Vladimir Putin and will never in any manner deliberately try to interfere with (or prevent) this marriage and if he/she will not deliberately in any manner try to harm or undermine Gail and/or her family or Vladimir and/or his family. If 666-Computer analysis reveals that that Jesuit is obsessed with Gail, and cannot or will not leave Gail or Vladimir alone and will try to prevent them from having a happy marriage–then the death penalty will remain–even if that Jesuit reads the Bible all the time the whole time that he/she is there.

2.304(h) However, if that Jesuit reads the Bible everyday and does so with an attitude of reverence to the Word of God (and we can pick this up with 666-Computer analysis), we will report this on the news. We want the world to know that the Jesuits love to read the Bible and that they do so with an attitude of honor–if this is the case. If that Jesuit does not read the Bible or reads it with a contemptuous attitude, his/her Bible reading will not be mentioned, and he/she will not get any credit for being a Bible reader on GCFNC. We will not force that Jesuit to read the Bible–nor will we punish that Jesuit for NOT reading it, we are just giving that Jesuit an opportunity to display his/her righteousness and to show the world how criminal we are to give him/her the death penalty. If that Jesuit is truly a God fearing and righteous person, he/she should delight in the Word of God.

2.304(i) But more than Bible reading has to occur, for that Jesuit to be spared the death penalty. During that week that that Jesuit is locked up in his/her cell with the Bible--Gail Schuler is to be left alone by the Jesuit Order and is not to be tormented or harassed (directly or indirectly) with UNWILLING AGENTS or through criminal 666-Computer or satellite manipulation. This also means that during that week, Gail’s mother is never to be taken over and used as an UNWILLING AGENT and Gail’s mother is to be LEFT ALONE by the Jesuits. We must demand this, since this has been the NUMBER ONE WAY THE JESUITS HAVE PREVENTED VLADIMIR FROM GIVING GAIL MONEY AND HAVE PREVENTED VLADIMIR FROM MARRYING GAIL. Since all UNWILLING AGENT attempts against Gail make the headline news, the world will know if the Jesuit Order kept their end of the deal–because once Gail is harassed with UNWILLING AGENTS (because her mother has been taken over as an UNWILLING AGENT) or through illegal 666-Computer or satellite manipulation by the Jesuit Order (and we shown this WITH EVIDENCE on GCFNC)–that Jesuit will be removed from his/her cell and the execution will go forward–he will not remain there for the rest of the week–he will be executed IMMEDIATELY. All we are asking is for the Jesuits to leave Gail and her mother alone FOR A WEEK, in order to spare their Jesuit in the jail cell the death penalty–let’s see how bad they want to save their comrade. We are better than they are, because we are not asking for ransom money, like they do, we are just asking them to DO NOTHING CRIMINAL FOR A WEEK on Gail using their UNWILLING AGENTS or using their criminal satellite or 666-Computer technology. If the Jesuit Order uses any UNWILLING AGENT on Gail or uses (directly or indirectly) any illegal 666-Computer or satellite programming on Gail during that week that that Jesuit is in our jail cell with the Bible, then the death sentence on their comrade will remain, will be carried out immediately, and it will be shown as described in Sections 2.304(a) through (d).

2.304(j) However, if that jailed Jesuit shows unusual piety and reading of the Bible, we may spare him/her the death penalty, even if Gail is harassed–but the piety will have to be unusual and all our questioning of him/her must reveal no attitude of desiring to harm Gail or Vladimir. He/she must also renounce the Jesuit Order and promise never to affiliate with them again. Those who are given this deal have already committed death penalty violations (and evidence for this will be shown) and do not deserve this grace, but since the Jesuits like to make martyrs out of themselves, we will give them an opportunity to do so. We would be very unjust to execute them if they were truly righteous, so we will give them an opportunity to display their innocence before we execute them.

********************************

2.3040 No UNWILLING AGENT (or any person who is vulnerable to being used as an UNWILLING AGENT) can be used as a LAW ENFORCEMENT PERSON (see Sect. 11.1 of General 666-Computer or Satellite Computer Laws) to assist (directly or indirectly) in the enforcement of CONSPIRACY LAW or in protecting a nation from terrorist attacks. Those UNWILLING AGENTS in obvious law enforcement positions (such as police, lawyers, sheriffs, RSPs, airport screeners, etc.) must be reassigned to other duties (or be relinquished of their law enforcement power) where they cannot be in a position to enforce any laws. Perhaps they can be reassigned to do research or other responsibilities not related to the enforcement of the law. They should be strictly monitored to ensure that they are not in any position where they can enforce law. They will be informed that their brain has been taken over by terrorists and that they cannot be allowed to enforce any laws until their brain is freed from control by evil people. Measures will be taken to ensure that these UNWILLING AGENTS in obvious law enforcement positions cannot be used to enforce any laws. If a LAW ENFORCEMENT PERSON’s brain is no longer able to be used as an UNWILLING AGENT, he/she can be reinstated into his/her former law enforcement position. Failures of law enforcement agencies to ensure that those UNWILLING AGENTS within their ranks are not able to enforce any laws can bring the death penalty–see Sect. 3.2040(a). For the purposes of CONSPIRACY LAWS, any person who is an UNWILLING AGENT (or who is vulnerable to being used as an UNWILLING AGENT) will be considered an INCOMPETENT PERSON.

2.3040(a) Any (direct or indirect) deliberate, knowing and willing attempt (or action) to use (directly or indirectly) as a LAW ENFORCEMENT PERSON any person who is an INCOMPETENT PERSON, will result in the death penalty as a JESUIT CONSPIRATOR to any person who makes such an attempt (or action).

2.3040(b) Because the Jesuits are using TRIGGER PROGRAMMING to dramatically increase the number of UNWILLING AGENTS, each PLP and RSP-network will have a special section of PLPs and RSPs (called the LAW ENFORCEMENT SCREENERS) who will screen all LAW ENFORCEMENT PERSONs under their 666-Computer or satellite computer control to ensure that all current LAW ENFORCEMENT PERSONs are not being used as UNWILLING AGENTS by the Jesuits. Those LAW ENFORCEMENT PERSONs who are determined to be UNWILLING AGENTS must be removed from their position as an UNWILLING AGENT [see Sect. 2.3040 and 2.3040(a)] and any person (including a LAW ENFORCEMENT SCREENER) who (directly or indirectly) willingly and knowingly allows any LAW ENFORCEMENT PERSON (who is an UNWILLING AGENT) to remain in a LAW ENFORCEMENT position, will receive the death penalty as a JESUIT CONSPIRATOR.

2.3040(c) These screenings by LAW ENFORCEMENT SCREENERS must be conducted DAILY and those RSPs or PLPs (who conduct the screenings) must fill out a statement at the end of their shift in which they will state (under 666-Computer lie-detection and amnesia-detection) that they have included all the LAW ENFORCEMENT PERSONs (which they have determined to be UNWILLING AGENTS) in their CONSPIRACY REPORT to their HOMELAND SECURITY DEPT. and that no UNWILLING AGENTS (who are serving as LAW ENFORCEMENT PERSONS and who are under the 666-Computer or satellite computer control of that RSP and/or PLP) have been omitted from this report. Any RSP or PLP who fails 666-Computer lie-detection or amnesia-detection regarding his/her report, cannot be used as a PLP or RSP and must be dismissed from his/her position as an RSP or PLP and may suffer other consequences of CONSPIRACY LAW violations (including the death penalty). See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

2.3041 After all knowledge and all memories of the bribe offered to that person by the Jesuits is removed from that person’s remembrance, then the 666-Computer or satellite computer could be used to insidiously take over and manipulate that person against their will and knowledge. The TAKEOVER would usually have to be insidious, so that the person is not aware that he/she is being TAKEN OVER. A FINANCIAL HISTORY (see Sect. 77.03) will usually reveal that the bribe was offered and refused. Once it is documented that a Jesuit bribe or bribes was offered to this person and refused by this person– this person will be classified as an UNWILLING AGENT. THERE CAN BE NO CONTRACT WITHOUT AN OFFER AND AN ACCEPTANCE. And, of course, there can be no duress or extortion involved with the offer and acceptance (or the contract is illegal). This documentation that there was an offer and a refusal of the offer will be filed in the International military tribunals, to show evidence why this person is classified as an UNWILLING AGENT. If the person changed their mind and became a WILLING AGENT later, then the person will NOT be classified as an UNWILLING AGENT.

2.3041(a) Any WILLING AGENT who willingly and knowingly allows themselves to be under the 666-Computer control or satellite computer control of anyone besides a licensed PLP, RSP, or practitioner and who does not have a WILLING AGENT CONTRACT to be a WILLING AGENT (as outlined in Sect. 6 of CONSPIRACY LAWS AND GOVERNMENT) is in violation of CONSPIRACY LAW. Only those licensed practitioners (such as JAIL PRACTITIONERS, RSPs, PLPs) who have control over DESIGNATED PERSONS (as defined by CONSPIRACY LAW) can have 666-Computer control or satellite computer control over any person and all WILLING AGENTS must follow the guidelines of Sect. 6 of CONSPIRACY LAWS AND GOVERNMENT and must have a WILLING AGENT CONTRACT. Anyone who knowingly and willingly participates in any scheme to allow anyone other than a licensed practitioner (who is in conformance to Sect. 6 of CONSPIRACY LAWS AND GOVERNMENT) to have 666-Computer or satellite computer control over their own person will get the death penalty as a JESUIT CONSPIRATOR.

2.3041(b) For the purposes of CONSPIRACY LAW, all WILLING AGENTS (who are in violation of Sect. 6.6 of CONSPIRACY LAWS AND GOVERNMENT--called ILLEGAL UNWILLING AGENTS) must adhere to all the same CONSPIRACY LAW restrictions which are placed on UNWILLING AGENTS. For instance, any person who (directly or indirectly) willingly and knowingly allows an ILLEGAL WILLING AGENT to be in any position which is forbidden to an UNWILLING AGENT (such as a LAW ENFORCEMENT PERSON’s position or as a voter in an election or as a juror), will receive the death penalty as a JESUIT CONSPIRATOR. Additionally, ILLEGAL WILLING AGENTS receive the death penalty if they are in violation of 2.3041(a).

2.305 All PLPs and RSPs who have 666-Computer or satellite computer or satellite control over any other PLP or RSP must daily (or more often) undergo 666-Computer lie detection and EMOTIONAL and FINANCIAL HISTORIES to determine if there is a Jesuit conspiracy “in the works” to destroy a PLP or RSP network. Jesuits love to infiltrate and poison any PLP or RSP network–especially any PLP or RSP network with PLPs or RSPs who have 666-Computer or satellite computer or satellite control over SIGNIFICANT PERSONS.

2.31 If it is discovered that a PLP or RSP has violated the CONSPIRACY LAW PRESIDENT’s instructions, and this violation was not reported by the PLP and/or RSP who has 666-Computer or satellite computer or satellite control over that disobedient PLP or RSP, BOTH the disloyal PLP or RSP and the one who SHOULD HAVE REPORTED THE DISLOYALTY (in other words, the PLP or RSP with 666-Computer or satellite computer or satellite control over the disloyal PLP or RSP) will receive the death penalty. It is ridiculous that we currently have a man (Rich Lemon) who has an advanced case of cancer (due to a disobedient PLP) and that this disobedience WAS NOT REPORTED by the PLP assigned to the care of the disobedient PLPWhy wasn’t this disobedience reported to us? PLPs and RSPs can READ THE MINDS OF THOSE UNDER THEIR CARE, SO WHY WASN’T THIS DISOBEDIENT PLP REPORTED TO US? Those PLPs and RSPs who have 666-Computer or satellite computer or satellite control over other privileged licensed practioners or registered satellite practitioners, WHO NEGLECT TO REPORT a disobedient PLP or RSP who is under their control, will be considered a JESUIT CONSPIRATOR (by default) and will be just as guilty of Jesuit conspiracy as the disobedient PLP or RSP who is under their 666-Computer or satellite computer or satellite control. With the 666-Computer or satellite computer and satellite’s mind-reading capabilities, the disobedient PLP who was inducing cancer into Rich Lemon should have been REPORTED TO US. This type of NEGLIGENCE by those entrusted to the care and monitoring of PLPs and RSPs WILL NOT BE TOLERATED!! In fact, it will be assumed that any PLP and RSP who has 666-Computer or satellite computer or satellite control over a PLP and RSP and who neglects to report a disobedient PLP or RSP under his care and monitoring, is WORKING WITH THE DISOBEDIENT PLP or RSP in a conspiracy against the CONSPIRACY LAW PRESIDENT; and, therefore, the PLP and RSP who has 666-Computer or satellite computer or satellite control over a disobedient PLP or RSP and who does not report that disobedience in a CONSPIRACY REPORT, will receive the death penalty (ALONG WITH THE DISOBEDIENT PLP or RSP). See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

2.32 ALL PLPs and RSPs MUST BE UNDER 24-HOUR 666-Computer or satellite computer SURVEILLANCE. TO BE UNDER 666-Computer or satellite computer SURVEILLANCE MEANS THAT EVERY PERSON WHO IS UNDER THE 666-Computer or satellite computer and satellite control OF A PLP or RSP SHOULD HAVE THEIR THOUGHTS AND EMOTIONS READ CONTINUALLY (24-hours round-the-clock), in order to monitor and catch any Jesuit conspiracy activities (hopefully) before the conspiracy is able to be carried out.

2.33 An hourly report (at least) should be maintained on every person under the

666-Computer or satellite computer and satellite control of all PLPs and RSPs. The MONITORING REPORT will be more than hourly, if there is probable cause that that DESIGNATED person is “suspicious”–because those designated persons who are “suspicious” must be reported immediately (by that “suspicious” person’s PLP or RSP) in a MONITORING REPORT to that MONITORING PLP or RSP’s HOMELAND SECURITY DEPT.

2.34 The PLP or RSP who maintains this report will be called the MONITORING PLP or RSP. Every PLP and RSP should be a MONITORING PLP or RSP. This report will be called the MONITORING REPORT. Every hour this MONITORING REPORT (from every PLP and RSP in a country’s network) must be filed (by computer) with that PLP and RSP’s HOMELAND SECURITY DEPT.

2.35 Every country’s HOMELAND SECURITY DEPT. should check to make sure that (at least) hourly MONITORING REPORTS are being received from every PLP in that country’s PLP network. Any person in a country’s HOMELAND SECURITY DEPT. (who is responsible to ensure that hourly MONITORING REPORTS are received from every PLP in his/her country’s PLP network) and who deliberately, willingly and knowing neglects to report any PLP who is delinquent in filing hourly MONITORING REPORTS, will receive the death penalty as a JESUIT CONSPIRATOR.

2.36 In this PLP MONITORING REPORT (which every PLP must file at least hourly), every person under the 666-Computer or satellite computer and satellite control of that MONITORING PLP will be mentioned, and next to their name will be a brief report. In this MONITORING REPORT, the names of all persons under the 666-Computer or satellite computer and satellite control of that PLP and who appear to be innocent of any CONSPIRACY LAW violations, will have the word “clear” next to their name. And in this report, all persons under the 666-Computer or satellite computer and satellite control of that PLP who appear to be (or are) CONSPIRACY LAW violators, will have the word “suspicious” next to their name. Any person (under the 666-Computer or satellite computer and satellite control of a PLP or RSP) who appears to be a violator of a CONSPIRACY LAW (that is–a “suspicious” person) and who is not immediately listed as “suspicious” in a MONITORING REPORT, and if the PLP or RSP who observed this suspicious behavior does not immediately submit this MONITORING REPORT to his/her country’s HOMELAND SECURITY DEPT.–that negligence will result in the death penalty for the PLP or RSP who deliberately, willingly and knowingly neglected to immediately report this “suspicious” person to his/her HOMELAND SECURITY DEPT.

2.37 Any person who is “suspicious”, must be written up in a MONITORING REPORT by the MONITORING PLP or RSP (who has 666-Computer or satellite computer and satellite control of that “suspicious” person) immediately. And the MONITORING PLP or RSP must file the MONITORING REPORT immediately with that MONITORING PLP or RSP’s HOMELAND SECURITY DEPT. Any PLP and RSP who notices suspicious thoughts, actions, plots or emotions in any person and who has reasonable cause (see Section 2.38) to feel that these thoughts, actions, plots or emotions could be a Jesuit conspiracy in progress or that these thoughts, actions, plots or emotions could be an attempt to violate a CONSPIRACY LAW– and then if that PLP and RSP (who has 666-Computer or satellite computer or satellite control over the suspicious person) deliberately, willingly and knowingly neglects to (or delays to) report the person who has these suspicious actions, thoughts, emotions, or plots in a MONITORING REPORT to his/her country’s HOMELAND SECURITY DEPT.–that PLP and RSP will receive the death penalty as a JESUIT CONSPIRATOR.

2.38 A person’s thoughts, actions, emotions or plots which should cause a PLP and RSP to feel he/she has REASONABLE CAUSE to report that person’s thoughts, actions, emotions or plots in a MONITORING REPORT to his/her HOMELAND SECURITY DEPT.–would be thoughts, actions, emotions or plots which (if carried out) would be a clear violation of a CONSPIRACY LAW and it appears (to the PLP and RSP who has 666-Computer or satellite computer or satellite control over this alleged violator) after analyzing the thoughts, actions, emotions or plots of this alleged CONSPIRACY LAW violator, that this person (who is thinking or feeling or acting out these thoughts, emotions or plots) is about to (or has actually carried out) the CONSPIRACY LAW violation. In the MONITORING REPORT (which the PLP and RSP will write), the PLP and RSP will state why he/she feels he/she has reasonable cause to report this alleged CONSPIRACY LAW violator. If a PLP and RSP feels he has reasonable cause to write a MONITORING REPORT (as defined in this Sect. 2.38) and then this PLP and RSP deliberately, knowingly and willingly neglects to (or delays to) write (and then to IMMEDIATELY submit this report to his/her HOMELAND SECURITY DEPT.)–that negligent PLP and RSP will receive the death penalty as a JESUIT CONSPIRATOR.

3.0 PLPs or RSPs determined (by surveillance) to be possible Jesuit agents, but have not disobeyed the CONSPIRACY LAW PRESIDENT, and there is insufficient evidence to consider them a suspect, may be permitted to keep their PLP or RSP position, and, if retained, will be treated like any other PLP or RSP. The CONSPIRACY LAW PRESIDENT will decided these borderline criminal PLP or RSP cases on a case by case basis.

*********************************************************

4.0 Afghanistan, Albania, Algeria, Andorra, Angola, Antigua & Barbuda, Argentina, Armenia, Australia, Austria, Azerbaijan, Bahamas, Bahrain, Bangladesh, Barbados, Belarus, Belgium, Belize, Benin, Bhutan, Bolivia, Bosnia-Herzegovina, Botswana, Brazil, Brunei, Bulgaria, Burkina Faso, Burma, Burundi, Cambodia, Cameroon, Canada, Cape Verde, Central African Rep., Chad, Chile, China, Colombia, Comoros, Congo, Congo (Dem. Rep.), Costa Rica, Croatia, Cuba, Cyprus, Czech Republic, Denmark, Djibouti, Dominica, Dominican Republic, Ecuador, Egypt, El Salvador, Equatorial Guinea, Eritrea, Estonia, Ethiopia, Faroe Islands, Fiji, Finland, France, Gabon, Gambia, Georgia, Germany, Ghana, Greece, Greenland, Grenada, Guatemala, Guinea, Guinea-Bissau, Guyana, Haiti, Honduras, Hong Kong, Hungary, Iceland, India, Indonesia, Iran, Iraq, Ireland, Israel, leader of the group of people who will comprise the future Palestinian state, Italy, Ivory Coast, Jamaica, Japan, Jordan, Kazakstan, Kenya, Kiribati, North Korea, South Korea, Kuwait, Kyrgyzstan, Laos, Latvia, Lebanon, Lesotho, Liberia, Libya, Liechtenstein, Lithuania, Luxembourg, Macau, Macedonia, Madagascar, Malawi, Malaysia, Maldives, Mali, Malta, Mauritania, Mauritius, Mexico, Micronesia, Moldova, Monaco, Mongolia, Morocco, Mozambique, Namibia, Nauru, Nepal, Netherlands, New Zealand, Nicaragua, Niger, Nigeria, Northern Marianas, Norway, Oman, Pakistan, Panama, Papua New Guinea, Paraguay, Peru, Philippines, Poland, Portugal, Puerto Rico, Qatar, Romania, Rwanda, Samoa, San Marino, São Tomé & Príncipe, Saudi Arabia, Senegal, Seychelles, Sierra Leone, Singapore, Slovak Republic, Slovenia, Solomon Islands, Somalia, South Africa, Spain, Sri Lanka, St. Kitts & Nevis, St. Lucia, St. Vincent, Sudan, Surinam, Swaziland, Sweden, Switzerland, Syria, Taiwan, Tajikistan, Tanzania, Thailand, Togo, Tonga, Trinidad & Tobago, Tunisia, Turkey, Turkmenistan, Tuvalu, Uganda, Ukraine, United Arab Emirates, United Kingdom, United States, Uruguay, Uzbekistan, Vanuatu, Vatican City, Venezuela, Vietnam, Yemen, Yugoslavia, Zambia, Zimbabwe.

4.1 A VIOLATOR COUNTRY is defined as a country which (7 days after receiving a NOTICE OF RESPONSIBILITY) refuses to participate in a PLP or RSP program set up according to the legal guidelines in this document. When changes (updates) have been made to this legal document (666-Computer or satellite computer Laws for PLP and RSPs), the NEIGHBOR COUNTRY has 7 days to implement these changes before it is listed as a VIOLATOR COUNTRY.

4.2 NOTICE OF RESPONSIBILITY is defined as the notice the international government will send to all countries in Sect. 4.0. This notice will inform the country of its responsibility to protect its citizens with a PLP and RSP program set up and enforced according to the legal guidelines in this document. The date in which this notice was sent and the date in which it was received will be recorded and filed in International military tribunal headquarters in Germany or Russia.

4.3 666-COMPUTER OR SATELLITE TYRANNY is defined as any damage caused directly or indirectly by a 666-Computer or satellite computer or satellite practitioner which is newsworthy (in other words the damage is significant enough to be mentioned in a newspaper or in a news report on television).

4.4 A PLP PROGRAM is defined as having a network of PLPs set up according to the legal guidelines in this document, in order to protect the citizens and leadership of that country from 666-Computer or satellite computer TYRANNY. The level of PLP protection must be extensive enough to be effective, and should be as extensive as Russia and Germany’s PLP program. The PLP network of each country will work side-by-side with its RSP network (see Sect. 4.4a), and it is desirable that PLPs be assigned those RSPs who will work with them in having 666-Computer or satellite computer and/or satellite control over their designated persons. This will help to ensure accountability, if there are any violations of CONSPIRACY LAW from PLPs or RSPs.

4.4(a) A RSP PROGRAM is defined as having a network of RSPs set up according to the legal guidelines in this document, in order to protect the citizens and leadership of that country from SATELLITE TYRANNY. The level of RSP protection must be extensive enough to be effective, and should be as extensive as Russia and Germany’s RSP program. RSPs and PLPs work side-by-side as members of each country’s PLP and RSP network.

4.401 A DECISION OF COOPERATION is a written legal document which outlines the laws a country will follow in enforcing its RSP and/or PLP program. Those laws MUST BE IDENTICAL to Russia and Germany’s. Russia and Germany do not want to be accused of showing favoritism to any country.

4.41 Once a country decides to set up a PLP or RSP program, this country’s DECISION OF COOPERATION will be filed in the International military tribunal headquarters in Russia or Germany, and the international government will list that country as a COOPERATING COUNTRY on the CONSPIRACY LAW PRESIDENT’s website. If this cooperating country does not enforce the laws as it states in its DECISION OF COOPERATION, the international government will remove that country’s name as a COOPERATING COUNTRY from the CONSPIRACY LAW PRESIDENT’s website and may enter that country as a VIOLATOR country or a TERRORIST NATION (instead) on the CONSPIRACY LAW PRESIDENT’s website.

4.42 Once a country is listed on the CONSPIRACY LAW PRESIDENT’s website as a COOPERATING COUNTRY, any PRACTITIONER under the jurisdiction of that country who is not a PLP or RSP and who uses a 666-Computer or satellite computer (or satellite technology) will be executed. This stipulation about the execution of unlicensed practitioners will be spelled out in the DECISION OF COOPERATION which that country will file in the international government’s military tribunal headquarters.

4.5 All countries listed in Sect. 4.0 will be given a written notice informing them of their responsibility to participate in a PLP and RSP program set up according to the legal guidelines in this document. The words in the notice and the manner in which each notice is sent to each country will be the same. How the notice is sent to each country will be recorded and documented and filed in the International government’s military tribunal headquarters, and a copy of the notice sent to each country, and proof that it was received or denied or ignored will be recorded and filed in headquarters for the International military tribunals. No favoritism or discrimination will be shown to any country over another.

4.6 Seven days after this notice is received by the country, if that country has not responded or refuses to cooperate with the international government in setting up a PLP and RSP program set up AND ENFORCED according to the legal guidelines in this document, that VIOLATOR COUNTRY will be publicly listed as a VIOLATOR COUNTRY on the CONSPIRACY LAW PRESIDENT’s website. And if this VIOLATOR COUNTRY suffers significant damage from 666-Computer or satellite computer tyranny, the international government will refuse to import or export any medicines (or space technology) from that violator country and will not permit any citizens or residents of that violator country to practice any type of medicine (or space technology) in the international government unless that practitioner is also licensed with an international government’s country to practice in that medical field. Also, the international government will refuse to participate with that violator country in any future space ventures.

4.61 In cases where it is obvious that a country is a VIOLATOR country, that country will be listed as a violator country BEFORE the 7 day deadline in Sect. 4.6. If that country is involved with NEIGHBORS (as defined in the General 666-Computer or Satellite Computer Laws document), it will be listed on the CONSPIRACY LAW PRESIDENT’s website as a TERRORIST NATION (see the General 666-Computer or Satellite Computer Laws document) and will suffer the consequences of a terrorist nation as described in the General 666-CLD.

4.7 The International government encourages all countries to come forward in order to be placed under PLP and RSP protection. It will be assumed that any country which does not participate in PLP and RSP protection is sympathetic towards Jesuit 666-Computer or satellite computer and satellite tyranny. Their lack of PLP and RSP participation will reveal where their true loyalties lie.

4.8 The International government cannot be held responsible for a country and/or its citizens who suffer damage from 666-Computer or satellite computer or satellite tyranny, if that country neglects to participate in a PLP and RSP program set up AND ENFORCED according to the legal guidelines in this document.

4.9 If a country and/or its citizens suffers significant damage from 666-Computer or satellite computer or satellite tyranny and that country has neglected to participate in a PLP and RSP program set up AND ENFORCED according to the legal guidelines in this document (which means it will be listed as a VIOLATOR COUNTRY on the CONSPIRACY LAW PRESIDENT’s website), the international government will not import or export any medicines (or space technology) from that country and no medical or space practitioners from that country will be allowed to practice any form of medicine or space science in the international government territory. Also, the international government will refuse to participate with the violator country in any new space ventures. *****************************

5.0 All PLPs and RSPs are required (themselves), to be under the care and monitoring of PLPs and RSPs. The International government does not want to make it easy for Jesuits to send their instructions to any PLP or RSP via the 666-Computer or satellite computer or satellite.

**********************************************

6.0 A SECRET COMMUNICATION MEDIUM is defined as any communication technology which is used illegally (or outside of the conspiracy laws which I’ve written) to communicate with PLPs and RSPs and/or those manipulated by PLP and RSPs.

6.1 It is obvious that the Jesuits have come up with a method (or methods) to SECRETLY communicate with PLPs and RSPs and/or those manipulated by PLP and RSPs, so that the International government is unaware of these communications and/or is unable to read or intercept these SECRET communications. Anyone who is aware of a SECRET COMMUNICATION MEDIUM and does not divulge it to the International government within 7 days, will be given the death penalty as a 666-Computer or satellite computer conspirator and/or space conspirator. Those who come forward to divulge information about any SECRET COMMUNICATION MEDIUM must cooperate fully in the International government’s investigation of this conspiracy.

6.12 Exceptions will be for those who are held back by EXTORTION from coming forward to the International government during the 7 day deadline with SECRET COMMUNICATION MEDIUM information. If someone is a victim of extortion so that they cannot come forward with SECRET COMMUNICATION MEDIUM information, this extortion victim (when they come forward) must supply the name (and full identification) of the extortioner(s) and make a sworn recorded statement (while under 666-Computer lie detection) regarding the circumstances surrounding their extortion. If it is determined that this person (who comes forward) is truly an extortion victim, this person will be spared the death penalty AS LONG AS THIS PERSON COOPERATES WITH THE International GOVERNMENT IN ITS INVESTIGATION OF HOW THIS PERSON WAS A VICTIM OF EXTORTION and as long as this person cooperates with the International government in its investigation of the SECRET COMMUNICATION MEDIUM conspiracy. Those who WILLINGLY hold this person against their will from coming forward with any SECRET COMMUNICATION MEDIUM information will be given the death penalty as 666-Computer or satellite computer conspirators and/or space conspirators.

6.13 Exceptions will also be for those who know about a SECRET COMMUNICATION MEDIUM technology and who were unaware of the 7 day deadline (and this will be verified by lie-detection). Those who were unaware of the deadline will only spare themselves the death penalty if they will make a sworn confession (under 666-Computer lie detection) as to how they were unaware of the deadline and this confession will be entered into the military tribunals.

6.2 Exceptions will also be for those who know about a SECRET COMMUNICATION MEDIUM technology and who discovered this/these SECRET COMMUNICATION MEDIUM technology or technologies after the 7 day deadline (and this will be verified by lie-detection), these/this person(s) must also make a sworn confession as to how they discovered this/these technology or technologies after the deadline and this confession will be entered in the military tribunals.

6.3 Anyone who discovers any SECRET COMMUNICATION MEDIUM technology after the deadline, is required to immediately report it to the International government. Those who neglect to do so will be given the death penalty as 666-Computer or satellite computer conspirators and/or space conspirators, except for the exceptions noted in Section 6.12 and 6.13.

6.4 If all SECRET COMMUNICATION MEDIUM technology/technologies is/are discovered, the international government may waive Sections 6.1, 6.12, 6.13, 6.2 and 6.3, depending on if the international government has anymore problems with SECRET COMMUNICATION MEDIUM technology/technologies.

**********************

7.0 AN IMMEDIATE REVERSE CANCER CURE is defined as any technology which can immediately or very quickly reverse a cancerous condition, even in cases where the cancer has gotten into the bone marrow or the bloodstream and is very widespread or lethal in the patient.

7.1 It is obvious that the Jesuits have fostered disloyalty in our PLPs and RSPs, so that they are inducing fast-moving and lethal cancerous conditions (via the 666-Computer or satellite computer’s genetic manipulation technology) in violation of the CONSPIRACY LAW PRESIDENT’s instruction, and some of these conditions are so fast-moving that we are not able to overcome them with the current knowledge which we have about the 666-Computer or satellite computer. I believe there is an IMMEDIATE REVERSE CANCER CURE (involving 666-Computer or satellite computer or space technology and that this information is being deliberately withheld from us). The withholding of this information is a conspiracy by the Jesuits against us, while the Jesuits use the 666-Computer or satellite computer to induce cancerous conditions which we are not able to overcome without this knowledge and/or technology. Anyone who is aware of an IMMEDIATE REVERSE CANCER CURE and does not divulge it to the International government within 7 days, will be given the death penalty as a 666-Computer or satellite computer conspirator and/or space conspirator. Those who come forward to divulge information about any IMMEDIATE REVERSE CANCER CURE must cooperate fully in the International government’s investigation of this conspiracy (which involves disloyal PLP and RSPs who induce cancerous conditions and other conditions in violation of the CONSPIRACY LAW PRESIDENT’s instructions to that PLP and RSP).

7.12 Exceptions will be for those who are held back by EXTORTION from coming forward to the International government during the 7 day deadline with the IMMEDIATE REVERSE CANCER CURE information. If someone is a victim of extortion so that they cannot come forward with IMMEDIATE REVERSE CANCER CURE information, this extortion victim (when they come forward) must supply the name (and full identification) of the extortioner(s) and make a sworn recorded statement (while under 666-Computer lie detection) regarding the circumstances surrounding their extortion. If it is determined that this person (who comes forward) is truly an extortion victim, this person will be spared the death penalty AS LONG AS THIS PERSON COOPERATES WITH THE International GOVERNMENT IN ITS INVESTIGATION OF HOW THIS PERSON WAS A VICTIM OF EXTORTION and as long as this person cooperates with the International government in its investigation of the IMMEDIATE REVERSE CANCER CURE conspiracy. Those who WILLINGLY hold this person against their will from coming forward with any IMMEDIATE REVERSE CANCER CURE information will be given the death penalty as 666-Computer or satellite computer conspirators and/or space conspirators.

7.13 Exceptions will also be for those who know about a IMMEDIATE REVERSE CANCER CURE technology and who were unaware of the 7 day deadline (and this will be verified by lie-detection). Those who were unaware of the deadline will only spare themselves the death penalty if they will make a sworn confession (under 666-Computer lie detection) as to how they were unaware of the deadline and this confession will be entered into the military tribunals.

7.2 Exceptions will also be for those who know about a IMMEDIATE REVERSE CANCER CURE technology and who discovered this/these IMMEDIATE REVERSE CANCER CURE technology or technologies after the 7 day deadline (and this will be verified by lie-detection), these/this person(s) must also make a sworn confession as to how they discovered this/these technology or technologies after the deadline and this confession will be entered in the military tribunals.

7.3 Anyone who discovers any IMMEDIATE REVERSE CANCER CURE technology after the deadline, is required to immediately report it to the International government. Those who neglect to do so will be given the death penalty as 666-Computer or satellite computer conspirators and/or space conspirators, except for the exceptions noted in Section 7.12 and 7.13.

7.4 If all IMMEDIATE REVERSE CANCER CURE technology/technologies is/are discovered, the international government may waive Sections 7.1, 7.12, 7.13, 7.2 and 7.3, depending on if the international government has anymore problems with IMMEDIATE REVERSE CANCER CURE conspiracies and/or technology/technologies.

*****************************************

8.0 Any PLP, satellite practitioner, or anyone who uses (directly or indirectly) the 666-Computer or satellite computer or satellite technology to orchestrate a NEWSWORTHY CRIME will be immediately executed. The International President would never instruct his PLPs or anyone to use the 666-Computer or satellite computer or satellite technology in a manner to orchestrate a NEWSWORTHY CRIME. Anyone who willingly cooperates with the NEWSMAKING PLP or RSP will also be immediately executed.

8.1 A NEWSWORTHY CRIME is defined as the use of the 666-Computer or satellite computer or satellite technology (directly or indirectly) to orchestrate crimes which are flamboyant, showy, widespread, theatrical, and/or which target famous persons, or are catastrophic, etc. i.e., newsworthy items, which the news media must cover.

8.2 Any use of the 666-Computer or satellite computer or satellite technology by any practitioner (PLP or not) to orchestrate a NEWSWORTHY CRIME will not be tolerated. This use can include giving instructions to the criminal (via 666-Computer or satellite computer, satellite, or other methods), inducing emotional states (via 666-Computer or satellite computer, satellite, or other methods) to cause the criminal to commit the crime, or ANY direct or indirect use of the 666-Computer or satellite computer or satellite, which is directly or indirectly responsible for the commission of a NEWSWORTHY CRIME. Any such use will result in the execution of the one who commits such an act.

8.2 No PLP or RSP who is guilty (directly or indirectly) of a NEWSWORTHY crime will ever be used by the CONSPIRACY LAW PRESIDENT as a PLP or RSP, and any PLP or RSP who dares to use the 666-Computer or satellite computer or satellite technology again (after the CONSPIRACY LAW PRESIDENT has dismissed him/her for direct or indirect use of the 666-Computer or satellite computer or satellite technology to orchestrate a NEWSWORTHY CRIME) will be immediately executed. In most cases, those who are guilty of participating in a NEWSWORTHY CRIME scheme will be executed, but if there are doubts as to whether the participant was WILLING, that participant may be allowed to live. In this case, if the “unwilling” participant is AGAIN caught participating (directly or indirectly) in the commission of a NEWSWORTHY CRIME, that participant will probably be executed. To participate in a NEWSWORTHY CRIME twice in a row would seem to indicate a WILLINGNESS to participate in NEWSWORTHY CRIMES. And it is not the CONSPIRACY LAW PRESIDENT’s desire to participate in NEWSWORTHY CRIMES, nor is it his desire to BROADCAST HIS LOVE LIFE.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

9.0 Any use of the 666-Computer or satellite computer or satellite technology by any PRACTITIONER to induce disorientation, amnesia, confusion, or any mental dysfunction in an ESSENTIAL PROFESSIONAL as this ESSENTIAL PROFESSIONAL performs their responsibilities, so that the result is that this ESSENTIAL PROFESSIONAL could make or does make mistakes (as they perform their responsibilities and job requirements), and the result of these mistakes could cause (directly or indirectly) the unnecessary deaths of innocents, or could give (directly or indirectly) the Jesuits (or terrorists) an advantage in the war against terrorism, or could interfere (directly or indirectly) with any ESSENTIAL JOB in this war against terror–will result in the death penalty for that PRACTITIONER (with possible immediate execution).

9.1 An ESSENTIAL PROFESSIONAL is defined as any person who performs a job which is of such importance in this war against terror that if mistakes are made in this job, the results could be CATASTROPHIC or could cause SIGNIFICANT LOSSES of innocents.

9.2 A loss that is CATASTROPHIC or SIGNIFICANT is any loss significant enough to affect the outcome of the war, so that the Jesuits gain a significant advantage in the use of any KEY STRATEGY. A SIGNIFICANT advantage is an advantage that could cause the Jesuits to gain an advantage in a KEY STRATEGY that they did not have before, or to cause the International government to lose an advantage in overcoming a Jesuit KEY STRATEGY. Any interference of the brain or health or the equipment or computers of an attorney or lawmaker as he/she writes laws to defeat terrorism or any interference of the brain or health or the equipment or computers of a medical researcher (maybe in the field of medical research as it relates to 666-Computer or satellite computer or satellite technology) or any interference of the brain or health or the equipment or computers of key intelligence personnel or the leader of a military raid into an enemy camp, would be examples of SIGNIFICANT LOSSES.

9.21 An ESSENTIAL JOB is a job which defeats (or helps to defeat) a Jesuit KEY STRATEGY. Many ESSENTIAL JOBS require tremendous amounts of research. Without adequate research and intelligence gathering, the job performance could be significantly impaired.

9.3 A KEY STRATEGY is any strategy which has been used extensively by the Jesuits in this war against terror. Examples are: legal tactics–especially legal trickery or extortion, medical technology, criminal medicine, mass media brainwashing, public relations brainwashing and propaganda, conspiracy orchestrations, the setting up or framing of innocents for Jesuit-orchestrated conspiracies or crimes, build up of military arsenals, acquisition of weapons of mass destruction, slander, proselytizing and recruiting of agents, bribery, misleading and lying newspaper reporting, slanting in legal arguments and press reports, photographic manipulation to create lying photographs, the rewriting of laws in a country to favor anarchy and confusion and criminal activities–so that a dictatorship becomes necessary for law and order, mob and mafia activities, rioting, etc. Some examples of Jesuit activities may give insights into the KEY STRATEGIES which would be necessary to carry out these activities: explosions, terrorist attacks, riots, trade protests, plane and shuttle crashes (Columbia shuttle disaster), train and ferry crashes, cruise illnesses, weird deaths of celebrities, the Scott Peterson case, the Michael Jackson case, the Kobe Bryant case, church sex scandals, sex scandals in general, rapes, bank robberies, anarchy, floods, satellite-directed lightning strikes, hurricanes, weird weather, forest fires, mafia activities, takeover of the American Medical Association, takeover of the American Republican Party, takeover of the American Christian School movement, takeover of American churches, infiltration into the American Jewish Community; takeover of the worldwide press, use of tabloids [their speciality–see Loree McBride], and use of newspapers, computer viruses and worms, takeover and disruption of most of the internet, takeover of American public schools, takeover of the stock market, securities fraud, economic and corporation scandals, takeover of colleges and universities; infiltrations into Harvard, Yale, Columbia, Oxford–the ivy league of England and the U.S., takeover of about 90% of the American Bar Association, takeover of pharmaceutical industries, takeover of insurance companies, takeover of Chrysler Financial and automakers, takeover of all major industries and corporations, takeover of the Muslim religion, takeover of all companies that deal with communications (postal services, faxes, E-mails, you name it), sniper attacks (Lee Malvo and Muhammed), takeover of Hollywood studios and movie and television production, takeover of U.S. Screen Actors Guild, takeover of cable and satellite television companies, takeover of electric and telephone companies, etc.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

10.0 All PLPs and RSPs will be tested by agents (hired by the International government) to determine who would easily betray the International government to the Jesuits. A PLP or RSP will be hit with a bribe from another PLP or RSP (who will act as an agent for the International government to weed out traitors). If any PLP or RSP willingly and knowingly responds favorably to the bribe, that PLP or RSP (who “gives in” to the bribe) will be arrested as a REVOKED PRACTITIONER and his/her medical license will be revoked and he/she will never be allowed to practice any form of medicine again (let alone be allowed to use the 666-Computer or satellite computer or satellite technology again). All bribes (used by PLP or RSP agents hired by the International government to weed out traitors among the PLPs or RSPs) will be bribes only. Extortion will not be used in any manner while the bribe is offered. This is a similar tactic used by law enforcement to find drug dealers on the streets. Someone poses as a drug dealer (and it is all part of a set up to find the REAL drug dealers).

10.1 Once a PLP or RSP has his/her medical license revoked (because he/she “gave in” to a bribe by one of our agents), he/she is forbidden to practice any form of medicine or to be a PLP or RSP. A PLP or RSP like the one described in the previous sentence (because he/she “gave in” to a bribe by one of our agents) is called a REVOKED PLP or RSP. Any REVOKED PLP or RSP caught practicing medicine again or using the 666-Computer or satellite computer or satellite technology (in any manner), will be given the death penalty or immediately executed.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

11.0 Some PLPs or RSPs designated for SIGNIFICANT PERSONS will be tested out with DUMMY COMPUTERS OR SATELLITES. These PLPs or RSPs called DUMMY COMPUTER or SATELLITE SUSPECTs) will be tricked into believing that the DUMMY COMPUTER or satellite or satellite computer they are using is a real and working 666-Computer or satellite computer or satellite. This is to see what they would do if they really manipulated a SIGNIFICANT PERSON (via 666-Computer or satellite computer or satellite). If, while this DUMMY COMPUTER OR SATELLITE SUSPECT uses the DUMMY COMPUTER OR SATELLITE, he/she does something illegal– he/she will suffer the same consequences as if he/she really used the 666-Computer or satellite computer or satellite to manipulate that SIGNIFICANT PERSON. The International government will use 666-Computer or satellite computer analysis on the DUMMY COMPUTER OR SATELLITE SUSPECT to prove that this suspect really believed he/she was manipulating a SIGNIFICANT PERSON (via 666-Computer or satellite computer or satellite); and the 666-Computer or satellite computer analysis of this DUMMY COMPUTER or SATELLITE SUSPECT (which reveals this suspect’s intent to violate CONSPIRACY LAWS), will be entered into the military tribunals as evidence that the DUMMY COMPUTER OR SATELLITE SUSPECT had the intent to violate a CONSPIRACY LAW or LAWs (and this intent will have the same legal consequences as if the intended illegal action(s) was/were committed).

11.1 A DUMMY COMPUTER or SATELLITE is a believable simulation of a real and working 666-Computer or satellite computer or satellite.

11.2 A DUMMY COMPUTER or SATELLITE SUSPECT is a PLP or RSP who, having been tricked into believing he/she is manipulating (via 666-Computer or satellite computer or satellite) a SIGNIFICANT PERSON, allegedly executes an illegal action against that person.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NEW MEDICAL SCHOOL TRAINING FOR PLPs and RSPs

12.0 We need to have new screening procedures for medical, dental, and veterinary schools in how they pick medical students to study medicine. No student should be admitted to a medical, dental, or veterinary school unless they undergo a FINANCIAL HISTORY (see Sect. 77.03) , EMOTIONAL HISTORY and are humanitarians or true animal lovers and show no WILLING involvement with criminal conspiracies. No one who is an UNWILLING AGENT should be admitted to any medical training program. We need a new crop of physicians, dentists, and veterinarians. Then, maybe within 4 or 5 years, we may have more reliable PLPs and RSPs. We can use the new medical, dental, or vet school graduates when they come out.

12.1 Set up a PLP and RSP training program (only admit those with clean FINANCIAL HISTORIES, EMOTIONAL HISTORIES and who are humanitarians or animal lovers). This training program need not be as involved as full physician training–maybe a 2 to 4 year program. It will help us train workers who can use the 666-Computer or satellite computer and satellite technology, to replace the incompetent doctors we have now. I think it is possible to have a streamlined PLP and RSP training course (that may not be more than 4 years) that can prepare a practitioner (who is not an M.D.) for the 666-Computer or satellite computer and satellite technology THIS WILL HELP US IN A CRITICAL SHORTAGE AREA. It’s amazing how much you can accomplish if you eliminate the garbage from the medical school curriculum.

12.2 Medical school training does not have to be as long and complicated as it is. There are a lot of garbage courses that doctors take that don’t help them at all in their practice. The Jesuits probably introduced these. I’ve seen firsthand how Jesuits influence curriculums from my experience with the A-Beka curriculum when I taught school this year. If you eliminate the garbage courses and streamline the curriculum, you would help medical students save money and train better doctors. There needs to be more computer training in training doctors. Probably the physician training should focus on physiology and anatomy, biochemistry, genetics, microbiology, pathological sciences, clinical experience, a strong emphasis on primary care and preventive medicine, nutrition and only the sciences they need to know for their practice. Eliminate unnecessary psychology and sociology courses and excessive paperwork and an overemphasis on surgery and pills. You can’t teach doctors morality (so drop the garbage sociology and psychology courses). Some courses in patient-doctor communication skills (but don’t throw in a bunch of fancy psychological garbage–just teach communication skills) may be helpful. They should have morality before they are admitted to medical school (hopefully they learned it from their parents).

Update on 6-1-05:

12.3 The International government has determined on this 6-1-05, that about 1/3 of the American population has been under the 666-Computer control of Jesuit PLPs & RSPs from various PLP or RSP networks all over the world. It is no wonder we are making so little progress in our war against UNWILLING AGENT use and against criminal computer/satellite technology.

12.3(a) In essence, the Jesuits have spread themselves out all over the world and have infiltrated all of our PLP or RSP networks, though some networks are more infiltrated than others. The German PLP and RSP network is one of the better ones.

12.3(b) These Jesuit medical professionals have lied to the International government and have been operating as Jesuit LAW ENFORCEMENT PERSONs (under cover) within their PLP or RSP network in violation of CONSPIRACY LAW. They have worked in concert with Jesuit TRIGGER or LOOPHOLE programming operators and have disguised their work by making all the CONSPIRACY LAW violations appear to be totally TRIGGER or LOOPHOLE programming violations–when, in actuality, the violations have been a combination of TRIGGER, LOOPHOLE programming violators working in concert with the Jesuit PLP or RSP.

12.3(c) These Jesuit PLPs and RSPs have been discovered because of the mandatory BIBLE PROGRAM for all LAW ENFORCEMENT PERSONS which most of these Jesuit PLPs and RSPs are flunking. And when they flunk this BIBLE PROGRAM we are alerted that the FLUNKY is probably a Jesuit and we investigate that FLUNKY as a possible Jesuit. All Jesuits whom we have discovered within our LAW ENFORCEMENT networks are being executed. Those Jesuits who have worked as PLPs and RSPs will have their trials shown on GCFNC and will be executed publicly on GCFNC. This is to show our outrage over Jesuits who dare to work as LAW ENFORCEMENT PERSONS for the International government. This leaves us with a critical shortage of physicians, dentists, veterinarians–because many of the PLPs and RSPs within our networks have been Jesuits in disguise.

12.3(d) However, because of Sect. 12.0 through 12.2 in this document (which Gail wrote in Nov. 2003), we already have a new crop of medical professionals, who have graduated from the medical school training which was set up according to Sect. 12.0 through 12.2. And these must be used immediately to replace the Jesuit medical professionals who have been executed. Instead of the usual internship and residency which doctors must complete to become certified in their fields, recent medical school graduates can immediately enroll in a computer/satellite residency and internship which is much more streamlined and efficient than the current residency and internship requirements and does not require the ridiculous hours (and sleep loss) that many residents and interns have to contend with. The way the current internship/residency program is set up is probably a Jesuit invention, since Jesuits like to impose their martyrdom creed and their tendency to make martyrs out of themselves onto the entire world.

While these recent medical school graduates are in their computer/satellite residency and internship, they will be trained to be specialists in computer/satellite medicine and will be used immediately as PLPs or RSPs (while they do their internship/residency)–and this is how we will deal with our immediate shortage of doctors to replace the Jesuit clinicians who have been executed in the PLP and RSP networks).

This means that while these recent medical school graduates are doing their internship, they will be required to do the BIBLE PROGRAM for LAW ENFORCEMENT PERSONs–because this will be a requirement of their internship/residency to ensure that none of our residents/interns is a Jesuit. When these medical school graduates complete their computer/satellite residency and internship, they will be considered specialists in computer/satellite medicine.

12.3(e) These new professionals (“green” medical school graduates) will be used to replace the Jesuit medical professionals who have been recently executed. Many medical schools have already implemented the guidelines of this Sect. 12, because Sect. 12.0 through 12.2 was first written in Nov. 2003 (that was 1 ½ years ago, as of this 6-1-05).

12.3(f) We already have some medical school graduates who are prepared to takeover as PLPs and RSPs, to replace those Jesuits within the medical community that we must execute to purge the medical profession of Jesuit doctors who operate like Adolph Hitler did when he ran his concentration camps (using medical experimentation on the victims).

12.3(g) Recent history (the past 100 or more years) shows that Jesuits have had a deep interest in criminal medicine. We have recently learned that the majority of Jesuits are medical doctors, and that is why it is so vital that we revamp our medical schools and train a new group of medical professionals as PLPs and RSPs to purge the medical profession of Jesuit infiltration and poisoning.

12.3(h) It is within our power to ensure that only those who are not Jesuit supporters are admitted to medical, dental and veterinary schools and that the training is improved to better prepare medical professionals to deal with computer/satellite technology in medicine. We need this new crop of medical professionals immediately to replace the Jesuit poisoned PLP and RSP networks of the world. As we remove Jesuit poison from medicine (by executing Jesuit physicians), we must also replace those physicians executed with a crop of medical professionals who will honor CONSPIRACY LAW.

12.3(i) Jesuits managed to infiltrate and takeover the medical community because they used their UNWILLING AGENT technology to admit themselves to medical schools and to undermine those that they didn’t want admitted to medical schools, so that the current medical community is deeply poisoned with Jesuit infiltration.

12.3(j) This will be changed when this Sect. 12 and CONSPIRACY LAW is implemented (because we are executing Jesuit clinicians who dare to be a PLP or RSP in our networks) and we want a new breed of medical professionals who are not Jesuit supporters and who will clean up the medical professions and remove Jesuit poison from the medical community. These new medical professionals will replace those current Jesuit practitioners who appear to dominate and run the current medical professions.

12.3(k) The international government must remove Jesuit poison from the medical community. It is better to have a “green” doctor as a PLP or RSP who is not a Jesuit (perhaps a recent medical school graduate who is in our computer/satellite internship/residency program), than an experienced Jesuit clinician who undermines CONSPIRACY LAW and operates like Adolph Hitler while practicing computer/satellite medicine.

12.3(l) All Jesuit clinicians within the PLP and RSP networks must be executed. This is to send the firm message that we in no way, endorse having Jesuits in the PLP or RSP networks! Though before execution, we will do complete 666-Computer histories on each clinician to obtain any and all intelligence we can from the criminal to assist us in our war against Jesuit terrorism.

12.3(m) Most Jesuits are medical doctors and this is evidenced by the way they conduct their warfare against us, where they rely primarily on medical sabotage (via 666-Computer/satellite technology) to implement their goal of a Jesuit world takeover.

12.3(n) Any willing and knowing (direct or indirect) violation of the guidelines of this Sect. 12 with the intent to assist the Jesuit Order, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

12.3(o) Since the field of psychiatry was created by Jesuits to label and eliminate their enemies, those currently trained in psychiatry will use their skills to free persons from criminal use of 666-Computer/satellite technology to induce mental illness in persons. Many current psychiatric conditions have been created by 666-Computer technology and will be eliminated when Jesuits can no longer use computer/satellite technology on the brain to induce mental illness.

12.3(p) Jesuits will complain that Gail is not qualified to write laws for physicians because she is not a physician. Well, to counter this, we will allow some physicians to comment about how they feel about my laws for physician training, most especially professors from the most prestigious medical schools in the world and we will allow them to comment on GCFNC. Next, GCFNC will show a special on GCFNC about my ancestor from Japan, who was a woman physician and one of the best in Japan, so much so, that a portion of Tokyo is named in her honor. Apparently, medicine runs in my family. I also have a degree in Health from Florida State University and have read many medical books. The amount of medical reading which I have done will be exposed on GCFNC (through the use of our 666-Computer Historians).

**************************************

13.0 PLP and RSP networks from each country will not allow integration of PLPs and RSPs from other countries into their network. This should simplify law enforcement (whenever any PLP or RSP is determined to be an alleged JESUIT CONSPIRATOR). For instance, there should be no Israeli PLPs or RSPs in the German PLP and RSP network. No German PLPs or RSPs should be in the Israeli PLP and RSP network. Each country’s PLP and RSP network should only have PLPs and RSPs who are citizens of ONE COUNTRY (as much as possible). This is done in order to lessen legal complications.

13.1 Each NEIGHBOR country will mete out the judgments and penalties for its own citizens, including its PLPs and RSPs (who are determined to be JESUIT CONSPIRATORS); and that (if possible) other countries will not get involved. Each NEIGHBOR country will have its own autonomy. PLPs and RSPs from another country within the PLP and RSP network of that country, overly complicates matters. So there will be no integration of PLPs and RSPs from one country into another country’s PLP and RSP network. This does not mean that a PLP or RSP cannot have 666-Computer or satellite computer (or satellite) control over a DESIGNATED PERSON from another country (just don’t make it so that the PLP or RSP has 666-Computer or satellite computer or satellite control over a PLP or RSP from the other country–because this would be an integration of PLPs and RSPs from two countries into a PLP and RSP network). The PLP or RSP, himself, should only be under the 666-Computer or satellite computer or satellite control of his own countrymen. An Israeli PLP or RSP will not have 666-Computer or satellite computer or satellite control over a German PLP or RSP, for instance. The membership of the PLP and RSP networks should be strictly segregated (by country)–and should only include PLPs and RSPs who are citizens of that country (and not include PLPs and RSPs who are citizens of other countries). No PLP and RSP network will have a mix of American and German citizens (as its PLPs and RSPs), for instance. The PLP and RSP network will either be all German citizens, or all American citizens. The goal is to keep things simple and keep the countries segregated (when it comes to the PLP and RSP networks), or it gives the Jesuits too many opportunities to use the “race card” in orchestrating conspiracies (which revolve around the PLPs and RSPs).

13.12 Any deliberate, knowing and willing attempt by any person to desegregate a PLP or RSP network (by infiltrating citizens of other countries into that PLP or RSP network) will result in the death penalty (as a JESUIT CONSPIRATOR) for that person, because this is an attempt to induce legal complications, in order to make it difficult for the international government to prosecute criminals. The networks are to be strictly segregated by country. Race is not an issue in this matter, since many countries have a multicultural environment. We are segregating BY COUNTRY, not by race, because to segregate by country simplifies the legal process (in this already extremely convoluted Jesuit conspiracy). Jesuits like things to be complicated because then we can’t prosecute their criminals.

13.2 Any PLP or RSP (who, himself, is not an extortion victim) that extorts another PLP or RSP to take a Jesuit bribe or extorts another PLP or RSP to commit any act (which is an act of a JESUIT CONSPIRATOR) will get the death penalty.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

14.0 The PLP and RSP networks for Canada, Russia, Iran, India, Spain, Turkey, Syria, France, the United Kingdom, Pakistan, North Korea, Iraq, and Mexico have been CANCELLED. When a PLP and RSP network of a country is cancelled, it means that if any medical worker (or any citizen) of that CANCELLED COUNTRY gets near (or uses) a 666-Computer or satellite computer or satellite technology (directly or indirectly) that that person will get the death penalty. The U.S. network has been partially resurrected and is called Pres. Bush’s PLP and RSP network (see Sect. 62 of this document).

14.1 A CANCELLED COUNTRY is a country which is forbidden to operate its own PLP and RSP network, and if any citizen of that country operates (directly or indirectly) a

666-Computer or satellite computer or satellite technology or any citizen of that country has 666-Computer or satellite computer or satellite control over any person or if any citizen of that cancelled country attempts by force, extortion, or threats to takeover a 666-Computer or satellite computer or satellite; that citizen (of that CANCELLED COUNTRY) will get the death penalty.

14.11 Also, if any former PLP or RSP from a CANCELLED country (called a DISCHARGED PLP or RSP) attempts (knowingly and willingly) in any way to communicate with a PLP or RSP from an ACTIVE COUNTRY with a knowing and willing intent to violate a CONSPIRACY LAW or with a knowing and willing intent to orchestrate a conspiracy which violates a CONSPIRACY LAW (motive can be determined by 666-Computer or satellite computer analysis), that DISCHARGED PLP or RSP will receive the death penalty as a JESUIT CONSPIRATOR. No JESUIT CONSPIRATOR can operate a 666-Computer or satellite computer or any satellite technology or attempt to influence any ACTIVE COUNTRY’s PLP or RSP as he/she operates (or in how he/she operates) an ACTIVE COUNTRY’s PLP or RSP-network. An ACTIVE COUNTRY is a country that has an legally active and operating PLP and RSP-network.

14.12 Any PLP or RSP that knowingly and willingly communicates in any manner with any other PLP or RSP (and especially if he/she is communicating with a PLP or RSP from the PLP or RSP-network of a country that is not his/her own) with a knowing and willing intent to violate a CONSPIRACY LAW or with a knowing and willing intent to orchestrate a conspiracy which violates a CONSPIRACY LAW (motive can be determined by 666-Computer or satellite computer analysis), that PLP or RSP will receive the death penalty as a JESUIT CONSPIRATOR and will be forbidden to use (directly or indirectly) a 666-Computer or satellite computer or satellite technology (in other words, he/she will no longer be a PLP or RSP). No JESUIT CONSPIRATOR can operate a 666-Computer or satellite computer or satellite.

14.2 Each CANCELLED COUNTRY’s citizens will be under the 666-Computer or satellite computer and satellite control of a DESIGNATED COUNTRY (or COUNTRIES).

14.3 A DESIGNATED COUNTRY is a country chosen by either the CONSPIRACY LAW PRESIDENT or Gail Schuler as a country that is designated for its PLP and RSP network to have 666-Computer or satellite computer and satellite control over citizens of a CANCELLED COUNTRY.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

15.0 As an emergency measure, when a person is under attack by one country’s disobedient PLP or RSP network, that person can be immediately switched to the 666-Computer or satellite computer or satellite control of another country’s PLP or RSP network in order to save that person’s life or health. For instance, if someone is under China’s PLP and RSP network and is in danger of death because of 666-Computer or satellite computer or satellite attack by disobedient Chinese PLPs or RSPs, that person could be immediately cut-off from the Chinese PLP and RSP network and immediately placed under the 666-Computer or satellite computer and satellite control of Japan’s PLP and RSP network. This switch from one country’s network to another is only allowed when it is necessary in order to preserve that person’s life or health. Random switches of DESIGNATED PERSONs from one country’s PLP and RSP network to another are not permitted. Any willing, deliberate and knowing attempt by any person to switch a PERSON-PROGRAM from one network (or 666-Computer or satellite computer or satellite) to another without receiving proper clearance through the INNER CIRCLE and utilizing a PASSWORD TRANSFER PROGRAM (received from the INNER CIRCLE) to effect the transfer, will result in the death penalty as a JESUIT CONSPIRATOR to that person. See Sect. 57 of this document.

15.1 Once a switch is made, it may not be permanent. If a switch becomes necessary, the INNER CIRCLE will evaluate the switch and decide which country will now have 666-Computer or satellite computer and satellite control over that switched person.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

51.94 If a 666-Computer or satellite computer or satellite PRACTITIONER (directly or indirectly) uses the 666-Computer or satellite computer or satellite to induce feelings of loathing, distrust, or repugnance against a group of people–that PRACTITIONER, and all who cooperated with him/her in this ARTIFICIAL PREJUDICE conspiracy will be given the death penalty. Attempts to induce ARTIFICIAL PREJUDICE (using the 666-Computer or satellite computer or satellite) are attempts to manipulate people’s emotions artificially in order to set up murders and to start wars, and the use of the 666-Computer or satellite computer or satellite to induce feelings of ARTIFICIAL PREJUDICE will not be tolerated.

51.95 The AUDITING team (see INTERNATIONAL PLP and RSP-NETWORK CONFIGURATIONS) will also screen the PLP and RSP networks of the countries to see if feelings of ARTIFICIAL PREJUDICE against any group of people are being induced by the 666-Computer or satellite computer or satellite. If it is determined that feelings of ARTIFICIAL PREJUDICE are being induced by a country’s PLP or RSP network, the evidence for this (from the 666-Computer or satellite computer or satellite readings) will be compiled and presented in the AUDIT REPORT. Those individuals who (directly or indirectly) willingly and knowingly participate in any plot to induce ARTIFICIAL FEELINGS OF PREJUDICE (using the 666-Computer or satellite computer or satellite) will be given the death penalty as a JESUIT CONSPIRATOR. People with NATURAL FEELINGS OF PREJUDICE do not fall under the jurisdiction of the CONSPIRACY LAWS unless they act out their prejudicial feelings in a manner which violates the CONSPIRACY LAWS.For the most part, those with NATURAL FEELINGS OF PREJUDICE will not fall under the jurisdiction of the CONSPIRACY LAWS, but will be dealt with under the laws of the country of which that person is a citizen.

51.96 To induce ARTIFICIAL FEELINGS OF PREJUDICE or ARTIFICIAL PREJUDICE against a group of people with the 666-Computer or satellite computer or satellite means to induce feelings of loathing, distrust or repugnance which are not the natural feelings of that person. If the person already has these feelings of loathing, distrust and repugnance toward a group of people and these prejudicial feelings were not induced by the 666-Computer or satellite computer or satellite– this is a NATURAL FEELING OF PREJUDICE. The International government will not execute people for having NATURAL FEELINGS OF PREJUDICE, as long as these feelings are not acted out in a manner which violates the CONSPIRACY LAWS. Only when the 666-Computer or satellite computer or satelite is used to induce ARTIFICIAL FEELINGS OF PREJUDICE will the death penalty be meted out to the PRACTITIONER who induces (via the 666-Computer or satellite computer or satellite) these ARTIFICIAL FEELINGS OF PREJUDICE. Please note: It is the PRACTITIONER who willingly and knowingly (using 666-Computer or satellite computer or other pioneering technology– like satellite) induces feelings of ARTIFICIAL PREJUDICE who will be executed. The International government will not execute the one who is being manipulated by the 666-Computer or satellite computer or satellite.

51.97 FINANCIAL, EMOTIONAL and CONSPIRACY HISTORIES will be conducted on those found guilty of inducing ARTIFICIAL FEELINGS OF PREJUDICE. Significant highlights from these HISTORIES may be presented on GABRIELLE CHANA FOX NEWS CHANNEL.

*****************************

52.0 All 666-Computers or satellite computers and satellites will be programmed (according to the guidelines specified in a MANDATORY BLOCKED PROGRAMS document for that 666-Computer or satellite computer or satellite and/or its programming), so that certain 666-Computer or satellite computer or satellite programs (on that 666-Computer or satellite computer or satellite) cannot be executed (or carried out) without that 666-Computer or satellite computer’s or satellite practitioner having to go through special override procedures, which would involve “getting permission” to carry out these programs. The FORCEFIELD BLOCK will be used to block satellite programs–see Sect. 25.0 of ICL:ST.

52.01 Every programmer who sets up any 666-Computer or satellite computer or satellite according to the guidelines in a MANDATORY BLOCKED PROGRAMS document, will certify in writing (in a document called PROGRAMMER GUARANTEE) in the presence of three witnesses (under 666-Computer or satellite computer lie-detection and amnesia-detection) that to the best of his/her knowledge the 666-Computer or satellite computer or satellite and the 666-Computer or satellite computer or satellite assigned to him/her for programming, is programmed for maximum compliance to the CONSPIRACY LAWS and is programmed for maximum compliance to the wishes of the CONSPIRACY LAW PRESIDENT and is programmed for maximum compliance to the guidelines specified in the MANDATORY BLOCKED PROGRAM(s) document for that 666-Computer or satellite computer or satellite. He/she will also state under 666-Computer or satellite computer lie-detection and amnesia-detection (in the presence of three witnesses) that the 666-Computer or satellite computer or satellite and the 666-Computer or satellite computer or satellite assigned to him/her for programming, (to the best of his/her ability and knowledge) is set up for maximum protection against any possible interference by any satellite (or any other) technology which could undermine the programming which he/she programmed into that computer. Any deliberate, knowing and willing attempt to lie or present a false impression in a PROGRAMMER GUARANTEE will result in the death penalty as a JESUIT CONSPIRATOR to that programmer.

52.1 These designated programs (which would require override procedures) would be programs such as those that induce heart attacks, cancer, asthma attacks, vomiting, and life threatening attacks of any kind–though the BLOCKED PROGRAMS will not be limited to life threatening programs.

52.12 The lawyers, programmers and PLPs and RSPs of a BLOCKED PROGRAMS COMMITTEE will determine which programs need to be blocked (when they write or modify a MANDATORY BLOCKED PROGRAMS document) and will probably choose to block the programs that PLPs and RSPs have consistently executed (or carried out) in violation of the CONSPIRACY LAWS (and the CONSPIRACY LAW PRESIDENT’s instructions). These designated 666-Computer or satellite computer or satellite programs (which will require override procedures) will be called BLOCKED PROGRAMS.

52.2 A MANDATORY BLOCKED PROGRAMS is any document which outlines those programs which must be blocked for a specific 666-Computer or satellite computer or satellite (and/or its programming). Even though the 666-Computer or satellite computer or satellite programs which must be blocked may be different for SIGNIFICANT PERSONs (as compared to the programs which must be blocked for the general population), the legal consequences for not following the guidelines in a MANDATORY BLOCKED PROGRAMS for a specific 666-Computer or satellite computer or satellite program will be the same (as outlined in this Sect. 52) regardless of whether the violation(s) of a MANDATORY BLOCKED PROGRAMS is a violation(s) of a MANDATORY BLOCKED PROGRAMS for the general population or a violation(s) of a MANDATORY BLOCKED PROGRAMS for a SIGNIFICANT PERSON.

52.21 Any MANDATORY BLOCKED PROGRAMS document can be modified (as needed) in order to make it a more effective legal document to enforce CONSPIRACY LAWS. Modifications to any MANDATORY BLOCKED PROGRAMS document (including those programs for SIGNIFICANT PERSONS) will be made by a group of PLPs, RSPs, programmers, and lawyers (a BLOCKED PROGRAMS COMMITTEE) approved by the CONSPIRACY LAW PRESIDENT and by the German PROGRAMMING-AUDITOR network (see Sect. 54 of International PLP and RSP-Network Configurations).

52.22 After a MANDATORY BLOCKED PROGRAMS document is written by the BLOCKED PROGRAMS COMMITTEE, all members of the BLOCKED PROGRAMS COMMITTEE (who directly or indirectly participated in the writing of the MANDATORY BLOCKED PROGRAMS document) must certify in writing under 666-Computer or satellite computer lie-detection and amnesia-detection–see Sect. 52.221 (with their witnessed signatures) that to the best of their knowledge the MANDATORY BLOCKED PROGRAMS document (which they just created and for which they are certifying) accurately details how to block all life-threatening programs [which could be blocked in that particular MANDATORY BLOCKED PROGRAMS document (since the MANDATORY BLOCKED PROGRAMs for SIGNIFICANT PERSONs are different from those for the general population)]. Those members of the BLOCKED PROGRAMS COMMITTEE (who directly or indirectly participated in the writing of the MANDATORY BLOCKED PROGRAMS document) will further certify under 666-Computer or satellite computer lie-detection and amnesia-detection–see Sect. 52.221 (with witnessed signatures) that not only are all life-threatening programs blocked, but that to the best of their knowledge, any programs which have been consistently used in violation of the CONSPIRACY LAWS have also been blocked in this particular MANDATORY BLOCKED PROGRAMS document (which they just created and for which they are certifying).

52.221 Any person who administers 666-Computer or satellite computer lie-detection and amnesia-detection on any person who was/is directly or indirectly (see Sect. 52.22) involved in the writing of a MANDATORY BLOCKED PROGRAMS document; and if this person (who administers this 666-Computer lie-detection) deliberately, knowingly and willingly presents false, misleading, and/or inaccurate 666-Computer or satellite computer lie-detection and amnesia-detection results in this matter, that person will receive the death penalty as a JESUIT CONSPIRATOR.

52.222 No MANDATORY BLOCKED PROGRAMS document will be approved for use (or considered a legal document) until all those who wrote the document pass 666-Computer or satellite computer lie-detection and amnesia-detection (as they place their certified and witnessed signature to the MANDATORY BLOCKED PROGRAMS document)–see Sect. 52.22. The exception to this will be if there is no reliable MANDATORY BLOCKED PROGRAMS document available to work with–in that case, we will use the best MANDATORY BLOCKED PROGRAMS document(s) that is/are available until a more reliable document is available to replace a deficient MANDATORY BLOCKED PROGRAMS document.

52.23 Any BLOCKED PROGRAMS COMMITTEE member who deliberately, knowingly and willingly lies as they place their certified and witnessed signature to the MANDATORY BLOCKED PROGRAM (in which they certify that to the best of their knowledge all the guidelines for all necessary blocked programs are completely and accurately detailed) will receive the death penalty as a JESUIT CONSPIRATOR. Also, anyone who (directly or indirectly) deliberately, knowingly and willingly writes the MANDATORY BLOCKED PROGRAM in such a manner so that it is possible for a life-threatening program to be executed or so that it is possible for a program (which has been used consistently to violate CONSPIRACY LAWS) to be executed– will receive the death penalty as a JESUIT CONSPIRATOR. There are several ways to write a MANDATORY BLOCKED PROGRAM so that it may be ineffective in blocking the required programs: it could be deliberately written in a confusing or misleading manner, it could omit steps necessary to effectively block a program, it could overlook programs which need to be blocked, amnesia may be used to cause the writers to forget to write essential steps, the writers may lie, etc.if incidents such as these are done deliberately, knowingly and willingly, it will result in the death penalty for the perpetrator.

52.3 The override procedures (and the clearances required)–see Sect. 52.34– (to unblock or get clearance for the programs designated in the MANDATORY BLOCKED PROGRAM for any specific 666-Computer or satellite computer program) will be the same for all MANDATORY BLOCKED PROGRAMS (regardless of whether these blocked programs are for the general population or for a SIGNIFICANT PERSON).

52.3(a) For satellite programs, no REGISTRATION CODE (or password) will be given to an RSP for a satellite signal(s) which must be used in a BLOCKED PROGRAM(s) until the required clearance procedures have been met. See Sect. 52.34 and 52.41.

52.31 The auditing teams will ensure that all 666-Computer or satellite computers have the designated BLOCKED PROGRAMS installed (as outlined in the MANDATORY BLOCKED PROGRAMs designated for those 666-Computer or satellite computer or satellite programs) and working properly so that it will be exceedingly difficult for PLPs or RSPs and/or jail practitioners to disobey the CONSPIRACY LAW PRESIDENT’s instructions to the 666-Computer or satellite computer or satellite practitioner.

52.32 A group of PLPs, RSPs, programmers, and lawyers (called the BLOCKED PROGRAMS COMMITTEE) will come up with a list of programs (such as 666-Computer or satellite computer and satellite programs that induce heart attacks, strokes, asthma, vomiting, amnesia, cancer, tumors, etc.) that must be BLOCKED on all 666-Computer or satellite computers and satellites, so that it will be exceedingly difficult for PLPs, RSPs, and/or jail practitioners to disobey the CONSPIRACY LAW PRESIDENT’s instructions.

52.33 The auditing teams (see INTERNATIONAL PLP and RSP-NETWORK CONFIGURATIONS) will make sure that all designated BLOCKED PROGRAMS for the designated 666-Computer or satellite computer or satellite programs (as outlined in the MANDATORY BLOCKED PROGRAMs for those 666-Computer or satellite computer or satellite programs) are working properly and are installed on EACH 666-Computer or satellite computer and satellite program for every person. The auditing teams (see Sect. 54 & 55 of International PLP and RSP-Network Configurations) will also ensure that the MANDATORY BLOCKED PROGRAMS document(s) (written by the BLOCKED PROGRAMS COMMITTEE) are effective and that they maximize compliance to the CONSPIRACY LAWS.

52.34 Those programs designated (in the MANDATORY BLOCKED PROGRAMs for the designated 666-Computer or satellite computer and satellite programs) MUST BE BLOCKED ON ALL 666-Computer or satellite computer and SATELLITE PROGRAMS and these BLOCKED PROGRAMS on all 666-Computer or satellite computer and satellite programs should be set up so that the PLP or RSP or jail practitioner must go through several “approval” procedures before he/she can execute any BLOCKED PROGRAM. These “approval” procedures will be outlined in a document called CLEARANCE PROCEDURES. Every 666-Computer or satellite computer and RSP practitioner must follow these CLEARANCE PROCEDURES before executing any BLOCKED PROGRAM. In other words, the PLP or RSP or jail practitioner will have to get plenty of clearance before he/she can execute any BLOCKED PROGRAM.

52.41 Any practitioner who manages to execute any BLOCKED PROGRAM without following the proper CLEARANCE PROCEDURES will be given 666-Computer or satellite computer lie-detection and amnesia-detection (while a CONSPIRACY HISTORY, FINANCIAL HISTORY and EMOTIONAL HISTORY is conducted on that practitioner), in order to determine the reason for that practitioner’s disobedience and to determine the legal consequences for that practitioner’s disobedience. All willing, knowing and deliberate attempts (or actions) to execute any BLOCKED PROGRAM without following proper CLEARANCE PROCEDURES will result in the death penalty as a JESUIT CONSPIRATOR for that violator.

52.5 Those 666-Computer or satellite computers and satellites which are not set up and operating correctly (according to the guidelines of their MANDATORY BLOCKED PROGRAM[s]) will be banned until they are set up (according to guidelines specified in their MANDATORY BLOCKED PROGRAMS document[s]).

52.6 No 666-Computer or satellite computer or satellite can be used by any practitioner until the designated BLOCKED PROGRAMS (as outlined in that 666-Computer or satellite computer’s or satellite’s MANDATORY BLOCKED PROGRAM[s]) are installed and functioning properly.

52.7 If it is found out that anyone has deliberately, willingly and knowingly sabotaged (or attempted to sabotage) a 666-Computer or satellite computer or satellite (and/or its programming) so that a designated BLOCKED PROGRAM (as outlined in that 666-Computer or satellite computer’s or satellite’s MANDATORY BLOCKED PROGRAM[s]) on any 666-Computer or satellite computer or satellite program is not operational and working in a correct manner, that saboteur will receive the death penalty as a JESUIT CONSPIRATOR.

52.8 There will also be specific BLOCKED PROGRAMs for every SIGNIFICANT PERSON (called MANDATORY BLOCKED PROGRAMs for [the name or identification of the SIGNIFICANT PERSON]) so that the 666-Computer or satellite computer and satellite programs which will be blocked for a SIGNIFICANT PERSON may be different than those programs blocked for the general population. The document called MANDATORY BLOCKED PROGRAMS for [the name or identification of the SIGNIFICANT PERSON] will be written by a group of PLPs, RSPs, and lawyers (called a BLOCKED PROGRAMS COMMITTEE).

52.9 This document (MANDATORY BLOCKED PROGRAMS or MANDATORY BLOCKED PROGRAMS for [the name or identification of the SIGNIFICANT PERSON]) must be honored by all 666-Computer or satellite computer and RSP practitioners.

52.91 The designated programs in this MANDATORY BLOCKED PROGRAM for [the name or identification of the SIGNIFICANT PERSON] must be blocked on the 666-Computer or satellite computer or satellite (or any 666-Computer or satellite computer or satellite) which has 666-Computer or satellite computer or satellite control over that SIGNIFICANT PERSON. Any deliberate, knowing and willing attempt (or action) to undo the designated blocked programs (as designated in the MANDATORY BLOCKED PROGRAM for [the name or identification of the SIGNIFICANT PERSON]) will result in the death penalty as a JESUIT CONSPIRATOR for the person who makes such an attempt (or action).

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

53.0 To BLOCK a 666-Computer or satellite computer or satellite program is defined as the action (or attempt) to make inaccessible (in any manner) the mind-reading, emotion-reading, memory-reading capabilities and/or any capabilities (especially the INFORMATION-GATHERING capabilities) of a 666-Computer or satellite computer or satellite program to any person who attempts to access this program.

53.01 To make INACCESSIBLE any 666-Computer or satellite computer or satellite program is defined as any attempt (or action) which would make the mind-reading, emotion-reading, memory-reading and/or any capabilities (especially the INFORMATION-GATHERING capabilities) of that 666-Computer or satellite computer or satellite program unavailable, incomplete, or inaccurate to the person who tries to access that program.

53.02 An ACCESSIBLE program is a 666-Computer or satellite computer or satellite program which is totally available, complete and accurate to the person who tried to access this program (and all the information it contains).

53.03 An UNBLOCKED 666-Computer or satellite computer or satellite program is a program which is not BLOCKED and is totally ACCESSIBLE.

53.04 An INFORMATION-GATHERING program is any 666-Computer or satellite computer or satellite program which is necessary in order to read the mind of any person, read the emotions of any person and/or read the memories of any person.

53.05 The information or contents obtained from any INFORMATION-GATHERING program (obtained via 666-Computer or satellite computer or satellite) are not to be made public or available to anyone except those designated to receive this information (as outlined in these CONSPIRACY LAWS). Any deliberate, willing and knowing attempt to give this information to any other party (other than those parties designated in the CONSPIRACY LAWS to receive this information gathered from the INFORMATION-GATHERING programs of the 666-Computer or satellite computer or satellite) will result in the death penalty for the violator (as a JESUIT CONSPIRATOR). THE PRIVACY OF INNOCENT PEOPLE WILL BE MAINTAINED.

53.051 No BLOCKED program (see Sect. 52) is to be connected (in any manner) to any INFORMATION-GATHERING program or is to be connected to any MASTER COMPUTER SYSTEM or to any MONITORING COMPUTER SYSTEM. Only those UNBLOCKED INFORMATION-GATHERING programs (as outlined in this Sect. 53) can be connected to any INFORMATION-GATHERING program or to any MASTER COMPUTER SYSTEM or MONITORING COMPUTER SYSTEM or SATELLITE SYSTEM. Any willing, knowing and deliberate action (or attempt) to connect (in any manner) a BLOCKED program (see Sect. 52) to any INFORMATION-GATHERING program or to any MASTER COMPUTER SYSTEM or to any MONITORING COMPUTER SYSTEM will result in the death penalty as a JESUIT CONSPIRATOR for the perpetrator. The definitions for MASTER COMPUTER SYSTEM and MONITORING COMPUTER SYSTEM and INFORMATION-GATHERING PROGRAM are in this Sect. 53.

53.06 An ACTIVE COUNTRY is a country that has an active and operating PLP and RSP network. In other words, that country’s PLP and RSP network has not been cancelled.

53.07 An INACTIVE COUNTRY is a country whose PLP and RSP network has been cancelled.

53.2 All 666-Computer or satellite computer or satellite programs which allow a 666-Computer or satellite computer or RSP practitioner to read the mind, emotions or memories of any person under 666-Computer or satellite computer or satellite control must be UNBLOCKED and totally ACCESSIBLE on all 666-Computer or satellite computers and satellites.

53.21 All programmers which set up any 666-Computer or satellite computer or satellite program in order to allow all 666-Computer or satellite computer or RSP practitioners to read the mind, emotions or memories of persons and whose job it is to ensure that all UNBLOCKED programs are operating according to the CONSPIRACY LAWS– will certify in writing (in a document called PROGRAMMER GUARANTEE) in the presence of three witnesses (under 666-Computer or satellite computer lie-detection and amnesia-detection) that to the best of his/her knowledge the 666-Computer or satellite computer and the 666-Computer or satellite computer or satellite which was assigned to him/her for programming, is programmed for maximum compliance to the CONSPIRACY LAWS and is programmed for maximum compliance to the wishes of the CONSPIRACY LAW PRESIDENT and is programmed for maximum compliance to the guidelines ([as specified in Sect. 53 of 666-Computer or satellite computer Laws for PLP and RSPs] for that 666-Computer or satellite computer). He/she will also state under 666-Computer or satellite computer lie-detection and amnesia-detection (in the presence of three witnesses) that the 666-Computer or satellite computer and the 666-Computer or satellite computer or satellite which was assigned to him/her for programming is, (to the best of his/her ability and knowledge) set up for maximum protection against any possible interference by any satellite (or any other) technology which could undermine the programming which he/she programmed into that computer. Any deliberate, knowing and willing attempt to lie or present a false impression in a PROGRAMMER GUARANTEE will result in the death penalty as a JESUIT CONSPIRATOR to that programmer.

53.3 Any deliberate, willing and knowing attempt by any person to BLOCK (or make INACCESSIBLE) the mind-reading, emotion-reading and/or memory-reading capabilities of any 666-Computer or satellite computer or satellite, will result in the death penalty as a JESUIT CONSPIRATOR for that person.

53.4 All PLPs, RSPs, and jail practitioners are required to maintain UNBLOCKED (and totally ACCESSIBLE) mind-reading, emotion-reading and memory-reading programs over all those under their 666-Computer or satellite computer and satellite control.

53.5 All these UNBLOCKED (and totally ACCESSIBLE) mind-reading, emotion-reading and memory-reading programs for every person under the control of every 666-Computer or satellite computer and satellite (in a country’s PLP or RSP network) must be connected to that country’s MASTER COMPUTER SYSTEM (which will be monitored by that country’s INTELLIGENCE COMMITTEE). This means that every country that has an active PLP and RSP network will also have an INTELLIGENCE COMMITTEE that gathers and analyzes intelligence information from that network. So, this means that the memory-reading, emotion-reading and mind reading programs for EACH person under 666-Computer or satellite computer and satellite control of each 666-Computer or satellite computer and satellite in a country’s PLP and RSP network must be connected to that country’s MASTER COMPUTER SYSTEM, and that all these INFORMATION-GATHERING 666-Computer or satellite computer and satellite programs FOR EACH 666-Computer or satellite computer and SATELLITE IN THAT COUNTRY (i.e., the mind-reading, emotion- reading and memory reading capabilities) must be totally ACCESSIBLE to all those on the INTELLIGENCE COMMITTEE of that country (who will analyze the readings from these INFORMATION-GATHERING programs for any Jesuit conspiracy activities in progress).

53.6 Each country (with an active and operating PLP and RSP network) will monitor its own PLP and RSP network with its own INTELLIGENCE COMMITTEE and its own MASTER COMPUTER SYSTEM (using INFORMATION-GATHERING data from all the 666-Computer or satellite computers and satellites in that country’s PLP and RSP network). All 666-Computer or satellite computers and satellites in an ACTIVE COUNTRY’s PLP and RSP network must have all their INFORMATION-GATHERING 666-Computer or satellite computer and satellite programs fully accessible and operational and connected to that ACTIVE COUNTRY’s MASTER COMPUTER SYSTEM. And all these INFORMATION-GATHERING programs (for each person under 666-Computer or satellite computer or satellite control in that country’s PLP and RSP network) must be totally accessible (on that country’s MASTER COMPUTER SYSTEM) to every COMPUTER-INTEL AGENT in that country’s INTELLIGENCE COMMITTEE.

53.61 The INTELLIGENCE COMMITTEE will be a department in that ACTIVE COUNTRY’s HOMELAND SECURITY DEPARTMENT and will operate under the authority of that ACTIVE COUNTRY’s President or leader. The INTELLIGENCE COMMITTEE will be comprised of lawyers, PLPs, RSPs, computer scientists (who are experts in how to utilize the information-gathering capabilities of the 666-Computer or satellite computer and satellite), ACUPUNCTURE SPECIALISTS (who will be called the ACUPUNCTURE COMMITTEE–see Sect. 53.610) and intelligence officers of that ACTIVE COUNTRY.

53.610 China will oversee and manage all the ACUPUNCTURE COMMITTEEs (within each country’s INTELLIGENCE COMMITTEE) and will send ACUPUNCTURE SPECIALISTS to every country [who will comprise the ACUPUNCTURE COMMITTEE (which will be integrated into every country’s INTELLIGENCE COMMITTEE)]. No one who is an UNWILLING AGENT (or who is highly vulnerable to being used as an UNWILLING AGENT) can be a member of the ACUPUNCTURE COMMITTEE. Any person who deliberately, knowingly and willingly allows an UNWILLING AGENT (or one who is highly vulnerable to being an UNWILLING AGENT) to be a member of any ACUPUNCTURE COMMITTEE, will receive the death penalty as a JESUIT CONSPIRATOR and will be treated according to Sect. 66 of 666-Computer or satellite computer Laws for PLP and RSPs.

53.6101 The job of the ACUPUNCTURE COMMITTEE will be to work with the PROGRAMMERS of the PROGRAMMER CORPS in each country (and this ACUPUNCTURE COMMITTEE will also work with each country’s PLP and RSP- Network), to ensure that acupuncture principles are utilized effectively in the management and programming of 666-Computer or satellite computer and satellite programs and that acupuncture principles are utilized effectively in how 666-Computer or satellite computer and satellite programs are used by PLPs and RSPs. Once it is figured out how to effectively utilize acupuncture principles in 666-Computer or satellite computer and satellite management (that is– for programmers, 666-Computer or satellite computer practitioners, RSP practitioners, and those involved with 666-Computer or satellite computers and satellites) these guidelines must be written down in an ACUPUNCTURE MANUAL and followed consistently by those who deal with 666-Computer or satellite computers and satellites. China will ensure that the ACUPUNCTURE MANUAL is written in clear, unambiguous language and thoroughly covers those topics which would help acupuncture principles to be used in a manner which maximizes adherence to CONSPIRACY LAW. Programmers and PLPs and RSPs will be expected to follow these acupuncture guidelines as they work with 666-Computer or satellite computers and satellites. Any programmer or RSP or 666-Computer or satellite computer practitioner (or anyone who directly or indirectly works with 666-Computer or satellite computers or satellites), who willingly, knowingly and deliberately neglects to follow these guidelines (that is, if they are in a position where they would be expected to follow these guidelines), will receive the death penalty as a JESUIT CONSPIRATOR and will be treated according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs. This will be especially true if there is a deliberate, knowing and willing attempt (or action) to neglect to use an ACUPUNCTURE BLOCK or if there is a deliberate, knowing and willing attempt (or action) to sabotage an ACUPUNCTURE BLOCK (see Sect. 53.6102).

53.6102 The ACUPUNCTURE COMMITTEE may also train PLPs and RSPs in how to use acupuncture principles effectively (while operating a 666-Computer or satellite computer or satellite), and the ACUPUNCTURE COMMITTEE will work with the PROGRAMMERS of the PROGRAMMER CORPS in programming 666-Computers or satellite computers and satellites so that acupuncture principles can be utilized to create 666-Computer or satellite computer and satellite programs which will be most effective in enforcing CONSPIRACY LAW (especially in the use of acupuncture principles to block illegal 666-Computer or satellite computer or satellite programs [called ACUPUNCTURE BLOCKs]–and the use of acupuncture principles to block such illegal programs as those which create UNWILLING AGENTS or are life-threatening).

53.6103 China’s goal will be to train ACUPUNCTURE SPECIALISTS within each country to assist China in her international work (through the ACUPUNCTURE COMMITTEE).

53.6104 If a member of the ACUPUNCTURE COMMITTEE notices a CONSPIRACY LAW violation, that member is required to report that violation in a CONSPIRACY REPORT to the HOMELAND SECURITY DEPT. (of the country which that ACUPUNCTURE SPECIALIST has been assigned to) and to report that violation to the HOMELAND SECURITY DEPT. of China. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. An ACUPUNCTURE SPECIALIST is considered a LAW ENFORCEMENT PERSON (see Sect. 11.1 of General 666-Computer or Satellite Computer Laws).

53.611 Any COMPUTER INTEL-AGENT (see Sect. 53.613) must immediately report any suspicious incident(s) (which he/she has reasonable cause to believe could be CONSPIRACY LAW violations) in a CONSPIRACY REPORT to their own ACTIVE COUNTRY’s HOMELAND SECURITY DEPARTMENT. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

53.6112 If it is discovered that a CONSPIRACY LAW violation or crime is executed (or carried out) that reasonably (or in a normal circumstance of events) could have been prevented if a COMPUTER INTEL-AGENT or a PLP or RSP or any LAW ENFORCEMENT PERSON [who had knowledge of the incident (or the plot in progress)] had reported the incident immediately, and if it is discovered that this LAW ENFORCEMENT PERSON deliberately, knowingly and willingly delayed (even if the delay was only a matter of minutes or seconds) the reporting of the suspicious incident in order to facilitate (by this deliberate, knowing and willing delay) the criminals’ ability to carry out the CONSPIRACY LAW violation or crime–that LAW ENFORCEMENT PERSON will get the death penalty as a JESUIT CONSPIRATOR. Motive plays a key role in this type of incident. Motive can be determined by 666-Computer or satellite computer analysis of the LAW ENFORCEMENT PERSON’s mind. If it can be established that the LAW ENFORCEMENT PERSON’s motive for his/her delay in reporting the suspicious incident was in order to make it easier for the criminal to carry out his/her crime or CONSPIRACY LAW violation–that motive(which caused the delay in reporting the suspicious incident and which gave the criminal [who was behind the suspicious incident which should have been reported by the LAW ENFORCEMENT PERSON immediately] the time needed to execute his/her CONSPIRACY LAW crime) will be sufficient evidence to establish the LAW ENFORCEMENT PERSON’s guilt as a JESUIT CONSPIRATOR.

53.612 A COMPUTER INTEL-AGENT must follow the written procedures required of any LAW ENFORCEMENT PERSON who reports any incident which could be a violation of a CONSPIRACY LAW. For legal purposes, a COMPUTER INTEL-AGENT is considered a LAW ENFORCEMENT PERSON and has all the rights and responsibilities of a LAW ENFORCEMENT PERSON (as outlined in the CONSPIRACY LAWS–see Sect. 11 of General 666-Computer or Satellite Computer Laws).

53.613 Each person in the INTELLIGENCE COMMITTEE will be called a COMPUTER-INTEL AGENT (or COMPUTER-INTELLIGENCE AGENT). Each member (or COMPUTER-INTEL AGENT) of a country’s INTELLIGENCE COMMITTEE will be appointed to his/her position as a COMPUTER-INTEL AGENT by that country’s President or leader. ONLY CITIZENS OF ONE COUNTRY CAN BE IN AN INTELLIGENCE COMMITTEE. The COMPUTER INTEL-AGENTS would be citizens of that country from which they are gathering information (via their MASTER COMPUTER SYSTEM).

53.62 Each COMPUTER-INTEL AGENT must pass rigid and thorough screenings, which would involve total FINANCIAL, CONSPIRACY AND EMOTIONAL HISTORIES on each agent.

53.63 Each COMPUTER-INTEL AGENT must be under 24-hour 666-Computer or satellite computer screening with total and accessible mind-reading, emotion-reading and memory-reading programs on that COMPUTER-INTEL AGENT available AT ALL TIMES to a MONITORING COMMITTEE.

53.7 A MONITORING COMMITTEE will be formed from a group of lawyers and PLPs and RSPs (from one of the BRANCH COUNTRIES). The MONITORING COMMITTEE will be a department in that BRANCH COUNTRY’S HOMELAND SECURITY DEPARTMENT. This MONITORING COMMITTEE can locate itself anywhere in the world and will have its own 666-Computer or satellite computer or 666-Computer or satellite computer system (called a BRANCH COUNTRY’S MONITORING COMPUTER SYSTEM) which that BRANCH COUNTRY will use to monitor (and have 666-Computer or satellite computer and satellite control) over that INTELLIGENCE COMMITTEE which is designated to them for monitoring.

53.701 Those PLPs and RSPs in a MONITORING COMMITTEE that have 666-Computer or satellite computer and satellite control over persons in any INTELLIGENCE COMMITTEE can only have 666-Computer or satellite computer and satellite control over the COMPUTER-INTEL AGENTS (or PROGRAMMERS–see Sect. 62.92) that are assigned to them and are not authorized to have 666-Computer or satellite computer and satellite control over any other persons. MONITORING COMMITTEE PLP and RSPs will be thoroughly screened and must undergo thorough and continual FINANCIAL, CONSPIRACY and EMOTIONAL HISTORIES and be under 24 hour 666-Computer or satellite computer surveillance. All MONITORING COMMITTEE PLPs and RSPs will be considered SIGNIFICANT PERSONS and will be under the 666-Computer or satellite computer and satellite control of those assigned to control and monitor those PLPs and RSPs by the CONSPIRACY LAW PRESIDENT. Any PLP or RSP, who is a member of a MONITORING COMMITTEE (called a MONITORING COMMITTEE PLP and RSP), who willingly, knowingly, and deliberately attempts to (or actually) obtains 666-Computer or satellite computer or satellite control over any other person besides those COMPUTER-INTEL AGENTS assigned to that MONITORING COMMITTEE PLP and RSP will receive the death penalty as a JESUIT CONSPIRATOR.

53.71 A BRANCH COUNTRY’S MONITORING COMPUTER SYSTEM (under the administration of a BRANCH COUNTRY’s MONITORING COMMITTEE) will be created solely for the purpose of monitoring the INTELLIGENCE COMMITTEEs (of those ACTIVE COUNTRIES whose INTELLIGENCE COMMITTEES have been assigned to that BRANCH COUNTRY’S MONITORING COMMITTEE for monitoring).

53.711 The International government will decide which BRANCH COUNTRY’S MONITORING COMMITTEEs will have jurisdiction (or monitoring) over an ACTIVE COUNTRY’s INTELLIGENCE COMMITTEE. These assignments of ACTIVE COUNTRIES’ INTELLIGENCE COMMITTEES (to certain MONITORING COMMITTEES) will be outlined in a legal document called MONITORING COMMITTEES AND THEIR ASSIGNED ACTIVE COUNTRIES. Those BRANCH COUNTRIES that have active PLP and RSP-networks will have their own INTELLIGENCE COMMITTEES monitored by another BRANCH COUNTRY’s MONITORING COMMITTEE. For instance, Germany’s INTELLIGENCE COMMITTEE might be monitored by Israel’s MONITORING COMMITTEE. And Israel’s INTELLIGENCE COMMITTEE might be monitored by Germany’s MONITORING COMMITTEE.

53.712 The legal document MONITORING COMMITTEES AND THEIR ASSIGNED ACTIVE COUNTRIES can be modified as necessary (and the assignments can be changed). All modifications (assignment changes) to the document MONITORING COMMITTEES AND THEIR ASSIGNED ACTIVE COUNTRIES will be approved and dated by the CONSPIRACY LAW PRESIDENT (in the presence of three witnesses).

53.72 Each country with an active and operating PLP and RSP-network will have its own INTELLIGENCE COMMITTEE. And each ACTIVE COUNTRY’s INTELLIGENCE COMMITTEE will be assigned to a BRANCH COUNTRY’S MONITORING COMMITTEE, so that this ACTIVE COUNTRY’s INTELLIGENCE COMMITTEE can be monitored via 666-Computer or satellite computer by a BRANCH COUNTRY’s MONITORING COMMITTEE (in order to ensure that the INTELLIGENCE COMMITTEE of that ACTIVE COUNTRY is operating within the bounds of the CONSPIRACY LAWS).

53.73 This means that some INACTIVE countries (like Russia–which is a BRANCH COUNTRY, but has cancelled its PLP and RSP networks) can use some of their PLPs and RSPs in their BRANCH COUNTRY’s MONITORING COMMITTEE. This does not mean that a cancelled country’s PLP and RSP network has been resurrected or that OTHER PLPs or RSPs who are citizens of a cancelled country can operate a 666-Computer or satellite computer or satellite.

53.8 Each BRANCH COUNTRY’s MONITORING COMMITTEE will be comprised of a group of lawyers and PLPs and RSPs who are citizens of that BRANCH COUNTRY. Each MONITORING COMMITTEE can only have members who are citizens of ONE country (which must be that BRANCH COUNTRY’s citizens). So, one MONITORING COMMITTEE would be composed solely of citizens of Germany. Another MONITORING COMMITTEE would be composed solely of citizens of Sweden. Another MONITORING COMMITTEE would be composed solely of citizens of Japan. Another MONITORING COMMITTEE would be composed solely of citizens of Israel.

53.801 Any member of any MONITORING COMMITTEE must immediately report any suspicious incident(s) (which could be CONSPIRACY LAW violations) in a CONSPIRACY REPORT to their own BRANCH COUNTRY’s HOMELAND SECURITY DEPARTMENT and this member must also file a CONSPIRACY REPORT of this/these same incident(s) to the HOMELAND SECURITY DEPARTMENT (of the country whose INTELLIGENCE COMMITTEE [or COMPUTER-INTEL AGENT or PROGRAMMER] has allegedly violated a CONSPIRACY LAW). See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

53.802 A MONITORING COMMITTEE member must follow the written procedures required of any LAW ENFORCEMENT PERSON who reports any incident which could be a violation of a CONSPIRACY LAW.For legal purposes, a MONITORING COMMITTEE member is considered a LAW ENFORCEMENT PERSON and has all the rights and responsibilities of a LAW ENFORCEMENT PERSON (as outlined in the CONSPIRACY LAWS–see Sect. 11 of General 666-Computer or Satellite Computer Laws).

53.81 All MONITORING COMMITTEES and their MONITORING COMPUTER SYSTEMS [along with all INTELLIGENCE COMMITTEES and their MASTER COMPUTER SYSTEMS] will be audited (for compliance to the CONSPIRACY LAWS) by the auditing teams (see INTERNATIONAL PLP and RSP-NETWORK CONFIGURATIONS). That is why it is important that each MONITORING and INTELLIGENCE COMMITTEE be strictly segregated by country (to make the work of the auditing teams easier). The exception to segregation by country will be that MONITORING COMMITTEE PLPs and RSPs will have 666-Computer or satellite computer and satellite control over those COMPUTER-INTEL AGENTS assigned to them (and these COMPUTER-INTEL AGENTS [which are assigned to a MONITORING COMMITTEE PLP or RSP] could be from many countries).

$$$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

54.0 All 666-Computer or satellite computer and SATELLITE MILITARY PERSONS AND the FAMILIES of 666-Computer or satellite computer and satellite MILITARY PERSONS will live on MILITARY BASES. CONSPIRACY LAW ATTORNEYS (see Sect. 11.11 of General 666-Computer and Satellite Computer Laws) and their assistants, along with any attorneys, judges, court reporters, legal secretaries, paralegals, etc. who assist those lawmakers or lawyers or judges or law enforcement personnel (who in any manner help to enforce CONSPIRACY LAW)–these will also will live on MILITARY BASES. For the purposes of this Sect. 54, it will be assumed that CONSPIRACY LAW ATTORNEYS and judges and prosecutors (and any person who helps to enforce CONSPIRACY LAW) are considered MILITARY PERSONs. CONSPIRACY LAW plays the most significant role in this war against Jesuit terrorism and the Jesuits know it–therefore, lawmakers, judges, politicians, prosecutors and those who help to enforce, make or implement CONSPIRACY LAW must live and work on MILITARY BASES as much as possible. Since Gail Schuler is a lawmaker and the one who writes CONSPIRACY LAW, this means the Wal-Mart where she works must have the security of a military base and must be constantly guarded and protected by MILITARY POLICE from the ISC. All of Melbourne, FL should be transformed into a military base city (especially any areas that Gail frequents–like her apartment complex, her work area, where she shops), since this is where Gail lives and works and there should be some sort of gates into and out of Melbourne, which are like security gates to a military base, in order to screen all those who enter and leave Melbourne, FL.

54.0(a) SATELLITE MILITARY PERSONS are defined as all persons used (directly or indirectly) to implement any CONSPIRACY LAWS related to satellites and/or who legally control the computers which control or manipulate any satellite in space.

54.01 Persons who operate a 666-Computer or satellite computer or satellite (such as PLPs, RSPs, jail practitioners, the auditing teams, MONITORING COMMITTEES, INTELLIGENCE COMMITTEES, registered satellite practitioners, any satellite practitioners, etc.) or those who assist or work with those who operate 666-Computer or satellite computers and satellites or those who assist in the law enforcement of CONSPIRACY LAW (such as police, lawyers, judges, court reporters, legal secretaries, prosecutors, assistants to PLP and RSPs, etc.) will be called 666-Computer or satellite computer or satellite MILITARY PERSONs.

54.1 The FAMILY of a 666-Computer or satellite computer or satellite MILITARY PERSON will be defined by each country AND a 666-Computer or satellite computer or satellite MILITARY PERSON can include a person as a family member if he/she feels that person should be considered a member of his/her family (some evidence may need to be presented to justify certain persons as family members–these cases will be evaluated on a case-by-case basis).

54.2 These Sections 54 and 55 are written with the goal of making the working and living conditions of 666-Computer or satellite computer and satellite MILITARY PERSONS safe and secure, in order to eliminate extortion attempts by Jesuits on these 666-Computer or satellite computer and satellite MILITARY PERSONS (as these 666-Computer or satellite computer and satellite MILITARY PERSONS carry out their responsibilities). In some countries, family members of 666-Computer or satellite computer and satellite MILITARY PERSONS could include grandparents, aunts, cousins, etc.

54.2(a) Those defendants in ALL trials conducted in the courtroom must be screened by that defendant’s PLP and RSP at least within 30 minutes before he/she enters the courtroom to determine if that defendant has any violent thoughts or plans to engage in violence in the courtroom.

54.2(b) That defendant’s PLP or RSP will make a statement (under 666-Computer lie-detection) in which he/she will state that this is a violent or non-violent defendant (as determined by 666-Computer emotional or other analysis). THIS STATEMENT (called a VIOLENCE STATEMENT) MUST BE ACCURATE because it will be used in the case and will be considered part of the evidence for legal proceedings. Part of the statement by that defendant’s PLP or RSP must include the following words: I have rated this defendant’s propensity to violence in the courtroom (or ________ ) as accurately as I know of (using 666-Computer technology) and to the best of my knowledge, I have accurately rated this defendant’s propensity toward violence in the courtroom (or _________). If the PLP or RSP fails 666-Computer lie-detection regarding his/her statement about that defendant’s propensity toward violence, then that defendant will not be allowed to enter (or get near) the courtroom until an accurate statement (which passes 666-Computer lie-detection over the above italicized section) is passed by that defendant’s PLP or RSP.

54.2(c) Any (direct or indirect) willing and knowing attempt (or action) to issue an incorrect statement about a defendant (regarding his propensity toward violence in the courtroom) by a PLP or RSP, will bring the death penalty as a JESUIT CONSPIRATOR to that PLP or RSP.

54.2(d) If the PLP or RSP determines that this defendant is violent, that PLP/RSP must rate the violence according to a scale of 1 to 10 in his/her statement. The higher numbers indicate a more violent defendant. The MILITARY POLICE will use the number assigned to that violent defendant to determine which policies to use on that defendant while he/she is in the courtroom.

54.2(e) If the PLP or RSP makes the statement that this is a violent defendant, then that defendant will appear in court handcuffed and his/her feet tied down as well OR he/she will appear in court IN A CAGE (like a wild animal is caged) or whatever precautions are necessary (as determined by the number assigned to that violent defendant by his/her PLP or RSP) to ensure that no violence will occur in the courtroom.

54.2(f) THE PROCEDURES OF SECT. 54.2(a) through (e) must also be used on all persons who come within the 5,000 foot circumference or area of any very SIGNIFICANT PERSON, which means that special PLPs or RSPs may need to be assigned VIOLENCE STATEMENT duty for all persons under the care of a PLP or RSP. For instance, whenever Gail works at Wal-Mart or abides at her apartment complex–all persons (including Wal-Mart workers) who enter the store (or her apartment complex) should be screened as if they were entering the courtroom as a defendant [see Sect. 54.2(a) through (e)]. If the PLP or RSP determines that a person entering Wal-Mart or the Wal-Mart parking lot or Gail’s apartment complex is a violent person, then that PLP or RSP must ASAP notify the MILITARY POLICE assigned to that store or area, in order to immediately apprehend that suspect. The basis for the arrest will be the statement by that PLP or RSP regarding that suspect’s propensity toward violence. In cases such as this, 666-Computer evidence and the VIOLENCE STATEMENT will be the primary evidence used in the courtroom. THAT IS WHY THE DEATH PENALTY WILL BE METED OUT FOR DELIBERATELY INACCURATE VIOLENCE STATEMENTS.

54.3 All 666-Computer or satellite computers (and computers which deal with satellites–called satellite computers) will be located on MILITARY BASES and all 666-Computer or satellite computer and satellite MILITARY PERSONs will work on a MILITARY BASE (which will be a SECURE AREA). This means that all courthouses which currently try any cases related to CONSPIRACY LAW (which is just about all legal cases) must be located on a military base and must be guarded and protected by MILITARY POLICE from the INTERNATIONAL SATELLITE COALITION. Judges, police, and prosecutors (and their families) are part of the war against Jesuit terrorism and are very important soldiers in this war and need the protection of the INTERNATIONAL SATELLITE COALITION. You might say, what do we do about the current courthouses, which are not located on military bases? Either these courthouses must be transformed into a military base or they will have to be abandoned and new courthouses will be built (which will be located on military bases). All these judges, police, prosecutors and their families and co-workers (and the families of the co-workers) MUST LIVE AND WORK ON MILITARY BASES. Police can leave the base to conduct their work, but the military police and their families will live on military bases. Criminals and those who need to go to court, must go through the military security gates to go to court and will be thoroughly screened by MILITARY POLICE as they enter the base and are escorted to the courtroom.

For those militaries in Muslim countries or countries which are not considered Christian nations, they will be informed that, so far, the only effective way to prevent one from being used as an UNWILLING AGENT is to follow the BIBLE PROGRAM for LAW ENFORCEMENT PERSONS, we are not forcing these people to believe the Bible or even to follow it, but they must read it every day, because saturating the mind with the Bible (or its equivalent) is, so far, the only thing that works to prevent one from being used as an UNWILLING AGENT. If they want to be a Muslim fine, they can read the Koran (as long as the Koran does not affect their mind as a form of OCCULT MEDIA) and read the Bible, too–but they must follow the BIBLE PROGRAM for LAW ENFORCEMENT PERSONS. If they don’t like it, they will be kicked out of the ISC and in worst case scenarios we may have to bomb out that country’s military bases, so that the Jesuits won’t have a base to operate from.

54.3(a) Further, because UNWILLING AGENT military persons (who reside on military bases) have been used to takeover our computers and use them for Jesuits, all military bases for all members of the International satellite coalition must be segregated into two types of military bases: 1) UNWILLING AGENT military bases and 2) NON-UNWILLING AGENT military bases. Judges and legal persons (who are not UNWILLING AGENTS) and all persons who work on anyone’s PERSON-PROGRAM (and most especially those who work on SIGNIFICANT PERSON’s PERSON PROGRAMs) must reside on NON-UNWILLING AGENT bases.

54.3(b) No one can live on (or visit) a NON-UNWILLING AGENT military base who is an UNWILLING AGENT. Those UNWILLING AGENT military persons who currently live on military bases must be moved to UNWILLING AGENT military bases. Willing and knowing failure to follow this Sect. 54.3 will bring the death penalty as a JESUIT CONSPIRATOR to the violator, along with expulsion from the military.

54.3(c) NON-UNWILLING AGENT military bases are considered a type of bootcamp to train our military members to have the mindset needed for effective warfare. No one is fit to be a soldier if they aren’t disciplined enough to follow the BIBLE PROGRAM FOR LAW ENFORCMENT PERSONS, so this must be included in boot camp and those who fail to follow this program will be booted out of the military. We will not tolerate UNWILLING AGENTS in our INTERNATIONAL SATELLITE COALITION. All members of the ISC must be disciplined soldiers who obey orders and who have the discipline to follow the BIBLE PROGRAM FOR LAW ENFORCEMENT PERSONs. Any military member who does not follow the BIBLE PROGRAM FOR LAW ENFORCEMENT PERSONS (as outlined under CONSPIRACY LAW) will be removed from the military and kicked out.

54.3(d) All courthouses, computers and satellite computers and all that is needed to run these courthouses, computers or satellite computers must be housed in a NON-UNWILLING AGENT military base in secured locations. To (directly or indirectly) willingly and knowingly allow any courthouse, computer or satellite computer to NOT reside on a NON-UNWILLING AGENT MILITARY BASE or to delay placing any 666-Computer or satellite computer or courthouse onto a NON-UNWILLING AGENT military base in a secured location (where only those with SPECIAL ACCESS codes can enter), will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

54.3(d)-1 It is essential to enforce this law because on August 27, 2006, Pres. Bush as a WILLING AGENT for the Jesuits, ordered an UNWILLING AGENT military member to takeover one of the computers that controls my PERSON-PROGRAM. This UNWILLING AGENT military member took one of the physicians (that work on my PERSON-PROGRAM) hostage and gagged him (under orders from Pres. Bush) and “took over” my PERSON-PROGRAM, so that for about 2 hours in the evening as I worked at Wal-Mart, I was getting instructions (in my brain) from a Vladimir imposter.

54.3(d)-2 To prevent incidents like this from happening again. All areas of our NON-UNWILLING AGENT military bases which house our computers (that operate the programs for our satellites or our PERSON-PROGRAMS) will be called SPECIAL ACCESS AREAS, and SPECIAL ACCESS AREAS must be housed in a very secure area, where only those with special access can enter. These areas will also be guarded by MILITARY POLICE.

54.3(d)-3 The special access to SPECIAL ACCESS AREAS will only be given to these persons that are assigned to work in these areas by the ROYAL that governs that country (that houses that military base). If anyone other than those that have been given special acess to enter, enters a SPECIAL ACCESS AREA, those that work in (AND GUARD) that SPECIAL ACCESS AREA must execute the person on the spot who enters the SPECIAL ACCESS AREA.

54.3(d)-4 We will treat intrusions into special access areas by unwarranted intruders very seriously. SO THIS IS FAIR WARNING, THAT ANYONE WHO DARES TO ENTER A SPECIAL ACCESS AREA without the SPECIAL ACCESS code given to them by the ROYAL, MUST BE EXECUTED ON THE SPOT!!

54.3(d)-5 FAILURE TO ENFORCE THIS SECTION 54.3, WILL BRING THE DEATH PENALTY AS A JESUIT CONSPIRATOR TO THE VIOLATOR. Therefore, since we will strictly enforce this Sect. 54.3, all military members must be forewarned of the consequences of anyone entering a special access area, who does not have the SPECIAL ACCESS CODE. If they are executed for entering this area, that will be their own fault, since we will give warning to all of the consequences of entry to those who do not have SPECIAL ACCESS to do so by the royal.

54.3(d)-6 To ensure that no insane persons enter the SPECIAL ACCESS AREA and end up dead, all SPECIAL ACCESS AREAS will be guarded by military police and it will be the job of the military police to ensure that no intruders enter the SPECIAL ACCESS AREA. Any military police member who allows anyone to enter the SPECIAL ACCESS AREA, who does not have the SPECIAL ACCESS CODE from the royal that has jurisdiction over that SPECIAL ACCESS AREA, will receive the death penalty as a JESUIT CONSPIRATOR.

54.3(d)-7 Furthermore, once a head of state (or any political leader of importance) is impeached from his/her office (because he/she is no longer qualified to be a head of state or LAW ENFORCEMENT PERSON according to CONSPIRACY LAW), he/she must be monitored 24/7 and cannot make any communications with others without continual monitoring. He/she will have to use special phones and computers and anything that he/she can use to communicate with others must be set up so that all his/her communications can be monitored thoroughly.

54.3(d)-8 If this impeached head of state (or political leader) violates CONSPIRACY LAW while under monitoring and becomes a troublemaker, he/she must be placed in jail and/or must follow the instructions of his/her mentor and this mentor(s) must put this significant (and impeached) LAW ENFORCEMENT PERSON UNDER STRICT SUPERVISION AND GUIDANCE (who has been assigned to him by the royal who has jurisdiction over the country where that impeached politician operates). If the impeached LAW ENFORCEMENT PERSON disobeys the guidance of his/her mentor, he/she will go to jail where we can ensure he/she behaves himself. Willing and knowing failure to control an unruly impeached politician or LAW ENFORCEMENT PERSON, so that this politician can operate freely for the blood-thirsty Jesuits (even if only by using communications from jail), will bring the death penalty as a JESUIT CONSPIRATOR to those responsible for that impeached politician.

And if we have continual problems with this impeached politician or LAW ENFORCEMENT PERSON, so that regardless of what we do to try to control him/her, he/she always manages to “get free” and cause problems against us that assists the murderous Jesuits, that impeached politician or LAW ENFORCEMENT PERSON will be executed by 666-Computer, and the death will be made to appear a natural death (give the Jesuits a taste of their own medicine). We will report on regular broadcast newsstations that the IMPEACHED politician died of a “heart attack” or some other natural cause. For those who wonder where I get my brilliant and “murderous” law ideas, read about what Solomon did to Adonijah, just because Adonijah asked to have Abishag the Shunammite as his wife (see 1 Kings 1 and 2)

This segregation of UNWILLING AGENT military persons must be accomplished as soon as possible, because too much death and destruction has already occurred because of Jesuit use of UNWILLING AGENTS to takeover our computers (housed on our military bases).

54.3(e) Because in many instances, UNWILLING AGENTS are used to takeover portions of a country’s military against the will and leadership of that country’s head of state and government, we will permit countries within our International Satellite Coalition to declare JESUIT CIVIL WAR within their nation against those within their own nation who support the Jesuit Order against the wishes of that nation’s leadership. This is currently the situation in India and China (on this 29th day of August, 2005).

54.3(f) Whenever Jesuits use UNWILLING AGENTS to takeover large portions of any country’s military (against the will of the government) and use that country’s own military to betray their own government, in order to support the Jesuit Order–this is called JESUIT CIVIL WAR. When any nation within our International Satellite Coalition declares JESUIT CIVIL WAR on itself, that nation must cooperate with the International Satellite Coalition to immediately and without delay (according to a deadline established by the heads of state from the nations of the International Satellite Coalition) to segregate its military bases into NON-UNWILLING AGENT and UNWILLING AGENT military bases.

54.3(g) If that nation (under JESUIT CIVIL WAR) fails to meet this deadline, then the International Satellite Coalition will step in and accelerate the process, even if this means sending in bombers from other nations to bomb out that country’s rebel military bases (this could even mean the use of nuclear bombs to destroy underground facilities). A REBEL MILITARY BASE is a military base which defies the orders of its country’s government in order to support the goals of the Jesuit Order, even if the only rebels involved are UNWILLING AGENTS. We will not allow UNWILLING AGENTS to destroy the military operations of the International Satellite Coalition.

54.3(h) Once a nation declares JESUIT CIVIL WAR on itself, it has the choice to either segregate its own military bases by itself, or can ask for assistance from the International Satellite Coalition. Either way, the deadline established for that country’s segregation of the bases must be met or else the International Satellite Coalition will send in bombers to accelerate the process. Once a nation declares itself under JESUIT CIVIL WAR, all nations of the International Satellite Coalition will scrutinize that nation’s attempt to segregate its bases (as described in this Sect. 54.3) and will watch over that nation to ensure that the deadline for segregation of military bases is met and that the segregation is accomplished according to the guidelines of CONSPIRACY LAW.

54.3(i) We must segregate the UNWILLING AGENT military persons and remove them from military bases which do NOT house 666-Computers, satellite computers and which house our legal personnel and courthouses as soon as possible–this is an emergency. This is absolutely essential or we will not win this war against Jesuit terrorism. In instances where it is necessary to reform a country’s (or countries’) military (or militaries) as soon as possible because the Jesuits are using that/those military/militaries to launch a catastrophic attack against us (such as hurricane Katrina in the Gulf of Mexico on this 28th day of August, 2005), then that country or countries’ military/militaries must segregate its/their military bases into NON-UNWILLING AGENT and UNWILLING AGENT military bases within 12 hours (or less)–the International President and other heads of state within the International Satellite Coalition will determine the deadline for each country involved–and this/these nation/nations must produce evidence that it/they is/are currently complying with this Sect. 54.3 to segregate its/their bases BY THE DEADLINE. If, after we give that country or countries’ military/militaries notice to comply with this Sect. 54.3 and we don’t have evidence that that country or countries’ military/militaries is/are complying to segregate its/their military bases BY THE DEADLINE as we directed with this Sect. 54.3, then we will immediately and without delay bomb all military bases in that/those country/countries and demolish them, so that the Jesuits cannot use the military bases of that/those disobedient nation/nations (and the 666-Computer and satellite computers housed in that nation or nations’ military bases) to launch a catastrophic attack against the international government.

54.3(j) If, after that country or countries has/have failed to comply with Sect. 54.3(e) BY THE DEADLINE chosen by the International President and other heads of state in the International government, and if that country or countries attacks us as we try to bomb its/their military bases, then all the nations which comprise the INTERNATIONAL SATELLITE COALITION will declare war on that nation or nations and will use whatever means are necessary to make that country/countries’ military bases unusable to the Jesuit Order, in order to prevent a catastrophic attack by the Jesuits against the international government. This could mean the use of nuclear bombs to destroy that/those country/countries’ military underground facilities.

54.3(k) Further, once UNWILLING AGENT military persons are moved to an UNWILLING AGENT military base, they must, must, must follow the BIBLE PROGRAM FOR LAW ENFORCEMENT PERSONS or they will be expelled from the military. It is not our goal to feed, house and nurture UNWILLING AGENT military members and if they will not follow the BIBLE PROGRAM FOR LAW ENFORCEMENT PERSONS, they will be kicked out of the military. So far, the only effective way to remove the Jesuits’ ability to control a person as an UNWILLING AGENT is for them to follow the BIBLE PROGRAM FOR LAW ENFORCEMENT PERSONs, so it is mandatory that all our military members follow the BIBLE PROGRAM FOR LAW ENFORCEMENT PERSONS. We will not allow Jesuits to infiltrate into our INTERNATIONAL SATELLITE COALITION (even if only through UNWILLING AGENTS) and will take severe measures to deal with this catastrophic problem.

54.3(l) Those UNWILLING AGENT military members who live in UNWILLING AGENT military bases will be continually monitored and placed under strict surveillance, the UNWILLING AGENT military base will be a stricter version of the UNWILLING AGENT CITY, since more discipline is expected of military persons. Any UNWILLING AGENT military member who remains an UNWILLING AGENT in an UNWILLING AGENT military base for longer than six months will be booted out of the military for failure to complete satisfactorily necessary military training to be an effective soldier in our INTERNATIONAL SATELLITE COALITION. It is not our intention to give permanent shelter our housing to UNWILLING AGENTs in our military forces. If these military members don’t have the discipline needed to be effective soldiers, they will be kicked out of the military.

54.3(m) Any (direct or indirect) willing and knowing violation of this Sect. 54.3 to encourage UNWILLING AGENT military members to remain soldiers in the ISC or to allow our 666-Computers or satellite computers or courthouses to be manipulated or controlled by UNWILLING AGENTS (such as allowing our computers to be housed in a military base which has UNWILLING AGENTS or allowing them to be place in unsecured locations), will bring the death penalty as a JESUIT CONSPIRATOR to that violator. If the violator is a military member, that member will definitely be expelled from the ISC.

54.3(n) Any nation’s military which fails to follow the guidelines of this Sect. 54.3, will not be allowed to be a member of the ISC and in some cases, we may have to declare war on that nation to bomb out all their military bases in order to prevent Jesuits from using those military bases against us.

54.31 Anyone who (directly or indirectly) deliberately, knowingly and willingly cooperates in any scheme to allow a 666-Computer or satellite computer (or any computer which deals with satellites) to operate from any location besides a military base, will receive the death penalty as a JESUIT CONSPIRATOR and will be treated according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLP and RSPs.

54.4 The term MILITARY BASE is defined as a military area (where 666-Computer or satellite computers are located) and/or where 666-Computer or satellite computer and satellite MILITARY PERSONS (and their families) are housed and taken care of and is a SECURE AREA (under military security and under the protection and care of the federal government).

54.5 A SECURE AREA is an area where all who enter the area must undergo surveillance before entering the area. In a SECURE AREA there will be a security gate through which all must enter and exit the SECURE AREA. A SECURE AREA will be constructed so that it will be exceedingly difficult for anyone to enter or leave the area except through the security gate(s).

54.6 All who enter and leave a MILITARY BASE must go through a SECURITY GATE(s).

54.7 No weapons, guns, bullets, bombs or war materials may be in the possession of anyone in a MILITARY BASE, except for authorized persons.

54.8 WAR MATERIALS are any materials which are typically used to inflict harm to persons (such as guns, bombs, chemicals, biologicals, nuclear materials, bullets, etc.) and are usually associated with war activities or criminal activities.

54.9 The MILITARY BASE will have different security statuses (patterned after the security codes of the U.S. HOMELAND SECURITY DEPT.). Each status will put the MILITARY BASE in a different state of alert. One status will be called CLAMP DOWN MODE. When a MILITARY BASE is in CLAMP DOWN MODE, all the families which live on that MILITARY BASE must remain on the base until the CLAMP DOWN MODE is lifted (see Sect. 55.2). If a person must leave the base during CLAMP DOWN MODE, they must go through several levels of clearance. Some bases may remain in CLAMP DOWN MODE for months or years.

55.0 All MILITARY BASES will have full medical, dental, educational, entertainment, religious, postal service, legal, grocery and any other services which are necessary for family living. The reason for this will be in the event the base goes into CLAMP DOWN MODE, so that it will not be necessary for any family (that lives on that base) to leave that base once that base goes into CLAMP DOWN MODE.

55.1 Those 666-Computer or satellite computer and satellite MILITARY PERSONS (and their families) which are deemed to be highly targeted, must be prepared for the eventuality that they may have to live on a MILITARY BASE in CLAMP DOWN MODE for months or years. For this reason, the spouse or children or family of the 666-Computer or satellite computer or satellite MILITARY PERSON must face the fact that they may not be able to hold off-base employment. To compensate for this, those 666-Computer or satellite computer and satellite MILITARY PERSONs (and their families) who live on a MILITARY BASE will have free housing on the MILITARY BASE, and will receive substantial discounts for food and medical services (possibly the food and medical services may be free).

55.2 When a MILITARY BASE is in CLAMP DOWN MODE, no person (who lives on that base) can leave or enter the base without going through several levels of clearance. Security on a MILITARY BASE will be very tight when a base is in CLAMP DOWN MODE.

55.3 A disobedient 666-Computer or satellite computer or satellite MILITARY PERSON will be court-marshalled and tried under his/her country’s military law as well as under CONSPIRACY LAW, since a 666-Computer or satellite computer or satellite MILITARY PERSON is under the jurisdiction of his/her country’s military.

55.4 All 666-Computer or satellite computer and satellite MILITARY PERSONs will be under 24 hour (round-the-clock) surveillance which will include a continual (at least every hour) FINANCIAL HISTORY, EMOTIONAL HISTORY and CONSPIRACY HISTORY on each 666-Computer or satellite computer and satellite MILLITARY PERSON. An EMOTIONAL HISTORY is necessary to determine whether or not extortion is involved in a 666-Computer or satellite computer or satellite MILITARY PERSON’s disobedience to CONSPIRACY LAW. NO AMNESIA can be induced on any 666-Computer or satellite computer or satellite MILITARY PERSON (at any time), except under extremely unusual circumstances–and these circumstances must be justified beforehand (through proper military clearance channels–going through a military chain of command) before any amnesia will be permitted on any 666-Computer or satellite computer or satellite MILITARY PERSON. Any direct or indirect and deliberate, willing and knowing attempt by any person to induce amnesia (outside of proper military clearance channels) on any 666-Computer or satellite computer or satellite MILITARY PERSON will result in the death penalty as a JESUIT CONSPIRATOR for that person.

MANDATORY SEPARATION LAWS FOR SATELLITE PRACTITIONERS, will go in effect now at 4 p.m. EST on 9-24-04. Within 24 hours of 4 p.m. on 9-24-04, all SATELLITE PRACTITIONERS must locate themselves on military bases and conduct all their satellite operations from that military base. Their families must move onto that base within a week after 9-24-04. After these deadlines are up, any other satellite practitioners (not located, working and residing on a designated military base) are in danger of annihilation if he/she conducts any satellite operations from outside his designated military base. This is because we will destroy all satellite operations that are operating outside designated military bases as soon as possible.

Dr. Spiner, the COMMANDER of our INTERNATIONAL SATELLITE COALITION, can establish an earlier deadline to destroy all those operating any satellite activities outside of designated military bases, if he can manage it. There is a hurricane Jeanne headed for Florida which needs immediate intervention and requires immediate destruction of all enemy ground satellite operations. The total destruction of all enemy ground satellite operations should also destroy the FORCEFIELD BLOCKS which Jesuits have placed around their satellites (since a FORCEFIELD BLOCK cannot maintain its shield without the ground operation which sustains it). These FORCEFIELD BLOCKS prevent us from destroying Jesuit controlled satellites. By destroying all enemy ground satellite operations, we hope to eliminate the enemy FORCEFIELD BLOCKS, and thus manipulate and destroy all Jesuit controlled satellites by crashing them all into the ocean. This cannot be established effectively without quick and clear separation of our satellite workers from enemy satellite workers. Therefore, the clear separation of our workers from enemy workers needs to be accomplished quickly (as soon as safely possible).

55.4(a) Because of tremendous problems with Jesuit controlled satellites which are protected by Jesuit controlled FORCEFIELD BLOCKS (so that we are unable to manipulate them or control them), it is necessary to destroy those computers and operations (used on the ground) which can control or manipulate Jesuit controlled satellites. Our current problem in doing this is we could easily destroy our own MILITARY PERSONs, when we try to destroy Jesuit satellite operators and their operations.

The solution to the criminal satellites is to crash them into the ocean.

Exploding the satellites in space will not work, because Jesuits can work from the pieces which float around in space after the explosion. The best solution is to crash the entire enemy satellite into the ocean. The only way to crash entire satellites into the ocean is by controllers working from the ground, but we need to clearly differentiate between our satellite persons and enemy satellite persons before we begin destroying ground satellite operations and operators. The solution to this is to use a similar tactic like Jehu used in 2 Kings 10:20-28. We need to make it clear who is on our side and who is on the Jesuits’ side. We need to clearly DRAW LINES OF SEPARATION between our workers and the Jesuits. We will do this, by making it mandatory that all our satellite workers work from designatedmilitary bases (as outlined in this Sect. 54 & 55). That means, we will have the legal right to destroy any satellite worker and/or his/her operation that is operating from any location besides our designated military bases!!

55.4(b) All legal controllers or manipulators of satellites (whether they use computer or other means to manipulate any satellite in any manner) are considered MILITARY PERSONs and must abide by the regulations of this Sect. 54 & 55–that is, they must live in military bases and they must conduct all their work on satellites from a military base (and they must abide by the guidelines of this Sect. 54 & 55). ALL LEGAL SATELLITE WORKERS MUST LIVE AND WORK ON MILITARY BASES (as outlined in this Sect. 54 & 55).

55.4(c) Once all our satellite MILITARY PERSONS live on our military bases, it will be a simple matter to locate and destroy all other satellite controlling operations from the ground–that is, any ground satellite operation which is conducted outside the military base (which is the designated place for our satellite operations). We will safely assume that any satellite operation conducted outside a designated military base is an enemy operation and we will do all in our power to destroy that operation and its operators as soon as safely possible. We want to clearly separate our satellite operators from the Jesuits’ satellite operators, so that we can destroy all enemy satellite operators and their operations, which are operating outside the designated military bases AS SOON AS SAFELY POSSIBLE.

55.4(d) Any satellite controller who operates or manipulates any satellite from outside the military base from which he is stationed to work, will receive the death penalty as a JESUIT CONSPIRATOR and is in danger of being destroyed, as we attempt to locate and destroy any satellite operation which is conducted outside one of our designated military bases.

55.4(e) All legal satellite operations must be conducted, maintained and operated from designated military bases. All other satellite operations will be considered illegal satellite operations and those operations will be totally destroyed (along with any operators) at that illegal satellite operation location as soon as safely possible.

55.4(f) Only satellite operators who meet the qualifications of any LAW ENFORCEMENT PERSON are allowed to practice any space science or operate or manipulate any satellite from one of our designated military bases. Any (direct or indirect) willing and knowing attempt or action by any person to allow any unqualified, illegal satellite operator (as defined by CONSPIRACY LAW) onto one of our military bases in order to operate, manipulate or control a satellite, will bring the death penalty as a JESUIT CONSPIRATOR to that person.

**************************************

55.41 AMNESIA is defined as any mental state which could cause one to forget or could cause perceptions received by the senses (sight, hearing, touch, taste, smell) to not be perceived by the brain or to be perceived by the brain inaccurately.

55.5 No 666-Computer or satellite computer or satellite MILITARY PERSON is permitted to alter the NATURAL-BORN GENETIC STATE of any person. All persons are entitled to have all the genetic possibilities that they were born with. For instance, if a person is born with the genes for genius intelligence, no 666-Computer or satellite computer or satellite MILITARY PERSON can alter the cells or genes of that person (in any manner) to manipulate his body (in any manner) to cause him/her to have less than the genetic potential that he/she was born with. So, if someone is born with the genes for genius intelligence, no scientist (or person) is permitted to alter (against that person’s will or knowledge) that person’s bodily make-up in any manner to cause him/her to lose his/her genius intelligence. Another example. . .if a person is born with the genes for unusual beauty or handsomeness, no scientist (or person) can alter (against that person’s will or knowledge) that person’s looks in any manner to cause him/her to lose his her looks.

55.51 Any deliberate, knowing and willing attempt by any 666-Computer or satellite computer or satellite MILITARY PERSON (or by any person) to alter (directly or indirectly) the NATURAL-BORN GENETIC STATE of any person (against that person’s will or knowledge and/or without the proper clearances [in cases where 666-Computer or satellite computer or satellite technology may be used to enhance a person’s NATURAL-BORN GENETIC STATE]) will result in the death penalty as a JESUIT CONSPIRATOR to that person (see Sect. 55.5 and 55.6).

55.52 All attempts to use the 666-Computer or satellite computer or satellite to manipulate a person’s NATURAL-BORN GENETIC STATE in order to draw attention to a conspiracy are considered attempts to draw attention to a SIGNIFICANT PERSON’s ethnography, since bodily manipulation of Gail Schuler’s NATURAL-BORN GENETIC STATE is/has been a significant part of Gail Schuler’s ethnography. So any person who employs the 666-Computer or satellite computer or satellite to manipulate a person’s NATURAL-BORN GENETIC STATE in order to draw attention to a conspiracy is already guilty as a JESUIT CONSPIRATOR under Sect. 6.6 of General 666-Computer or Satellite Computer Laws. All JESUIT CONSPIRATORS receive the death penalty.

55.521 An ENHANCING PROCEDURE is defined as any procedure which uses (directly or indirectly) 666-Computer or satellite computer or satellite technology to enhance (or to attempt to enhance) a person’s bodily make-up in any manner to cause (or to attempt to cause) that person’s bodily make-up to be over and beyond that person’s NATURAL-BORN GENETIC STATE.

55.522 A NATURAL-BORN GENETIC STATE is the state that a person’s body would be in (as determined by the genes which that person was born with) if that person’s body has not been manipulated (in any manner) by advanced technologies (such as 666-Computer or satellite computer or satellite technology).

55.6 The 666-Computer or satellite computer or satellite cannot be used to artificially enhance a person’s NATURAL-BORN GENETIC STATE (see Sect. 55.7). The 666-Computer or satellite computer or satellite should not be used (directly or indirectly) to manipulate a person’s body (in any manner) to enhance (or attempt to enhance) their looks or their intelligence or any other aspect of that person’s body (with or without that person’s knowledge and consent) over and above that person’s NATURAL-BORN GENETIC STATE, unless clearance is given for such an enhancing procedure (see Sect. 55.7).

55.7 The exception to this would be if the person’s NATURAL-BORN GENETIC STATE is detrimental to the health or the physical, emotional or economic well-being of that person. In cases such as this (where a person’s NATURAL-BORN GENETIC STATE is detrimental to the health or the physical, emotional or economic well-being of that person), special clearance must be given before the 666-Computer or satellite computer or satellite can be employed to enhance [or attempt to enhance (over and above what that person was born with)] any aspect of that person’s body, even if that person gives their consent to such an ENHANCING PROCEDURE. The purpose for requiring clearance (in any enhancing procedure) is to ensure that the 666-Computer or satellite computer or satellite is used legally and properly in any ENHANCING PROCEDURE. This clearance (for an ENHANCING PROCEDURE) must be in writing and approved (with signed and witnessed signatures) by the INTELLIGENCE COMMITTEE of the country in which that person (who desires the ENHANCING PROCEDURE) is a citizen.

55.8 The International government is not as concerned over the use of ENHANCING PROCEDURES as it is in the use of the 666-Computer or satellite computer or satellite to undermine a person’s NATURAL-BORN GENETIC STATE. The main concern with an ENHANCING PROCEDURE would be if it was used to create a conspiracy (which may revolve around enhancing procedures) or if the procedure was used to harm (instead of enhance) a person’s body (as is the case in botched plastic surgeries). The reason clearance is required by the INTELLIGENCE COMMITTEE before an ENHANCING PROCEDURE can be carried out, is to ensure that the ENHANCING PROCEDURE will really enhance that person’s body and/or to ensure that the ENHANCING PROCEDURE is not part of a Jesuit conspiracy involving ENHANCING PROCEDURES.

*********************************

56.0 No amnesia (see Sect. 55.41) is to be induced by the 666-Computer or satellite computer or satellite (directly or indirectly) on anyone, except as stipulated in the CONSPIRACY LAWS (like for a child who is adopted but is not to know they are adopted until they reach a certain age–see International REPRODUCTIVE LAWS). The use of 666-Computer or satellite computer or satellite induced amnesia has been a key Jesuit strategy to cover-up Jesuit conspiracy crimes and to cover-up for those who support Jesuits or to cause confusion in investigations. Amnesia has also been used by Jesuits against those who oppose Jesuit goals. Any willing, knowing and deliberate attempt to induce amnesia [by any method (including 666-Computer or satellite computer or satellite technology)] by anyone (except as stipulated in the CONSPIRACY LAWS) on any person, will result in the death penalty as a JESUIT CONSPIRATOR for that person who attempts to (or actually does) induce amnesia in any person.

56.02 All 666-Computer or satellite computer amnesia and (other types of amnesia) must be reported (when any amnesia is discovered or known about) to a law enforcement official who will file a CONSPIRACY REPORT. Once the HOMELAND SECURITY DEPT. receives the CONSPIRACY REPORT (regarding any amnesia), a CONSPIRACY ACTION REPORT (which details a plan of action regarding the amnesia) must be filed with that country’s HOMELAND SECURITY DEPT. as soon as possible. See Sect. 11 of General 666-Computer or Satellite Computer Laws for the proper legal procedures to follow (in regard to CONSPIRACY ACTION REPORTS). See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. The CONSPIRACY ACTION REPORT must detail how the amnesia will be undone and when it will be undone and who will undo it and the action plan in the report must be carried out immediately. Once any amnesia is reported, it must be undone as soon as possible.

56.03 If any person knows of any amnesia which has been used on any person and willingly, knowingly and deliberately does not report this amnesia as soon as possible to a LAW ENFORCEMENT PERSON, that person will get the death penalty as a JESUIT CONSPIRATOR. Once any LAW ENFORCEMENT PERSON receives a report of any amnesia (or is aware of any amnesia incidents), he/she is required to file a CONSPIRACY REPORT (about the amnesia) immediately and to submit the report to the proper authorities (as outlined in the CONSPIRACY LAWS). See Sect. 11 of General 666-Computer or Satellite Computer Laws for the proper legal procedures to follow in filing CONSPIRACY REPORTS. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. 666-Computer or satellite computer studies can determine whether anyone who knew about an amnesia incident reported it as soon as possible after it was discovered (or known about) and if that person reported it to the proper authorities. If that person reported any amnesia incident to improper authorities, 666-Computer or satellite computer analysis can determine if that “mistake” was deliberate, knowing and willing– if the amnesia incident was deliberately, knowingly and willingly reported to the improper persons, that “mistake” will result in the death penalty as a JESUIT CONSPIRATOR to the person who deliberately, knowingly and willingly neglected to report the amnesia incident to the proper authorities. Any “improper authority” who receives a report of an amnesia incident is required to report it immediately to the proper authorities. If in doubt, the person can always report it to a LAW ENFORCEMENT PERSON.

56.1 There are to be no tampering, deletions, or additions to any 666-Computer or satellite computer HISTORIES (such as EMOTIONAL HISTORIES, FINANCIAL HISTORIES, CONSPIRACY HISTORIES or of any 666-Computer or satellite computer records) maintained on any person under 666-Computer or satellite computer and satellite control. All 666-Computer or satellite computer HISTORIES on all persons under 666-Computer or satellite computer and satellite control must be unaltered and accurate– not blocked or deleted (or added to) in any manner– so that when 666-Computer or satellite computer technology is used to do a HISTORY on any person, the results of that HISTORY will be accurate, complete and truthful. Jesuits have altered the 666-Computer or satellite computer HISTORIES of persons in order to cover-up Jesuit conspiracy involvements with some of their agents. This is a serious crime because this is tampering with evidence in a capital case. Any willing, knowing and deliberate attempt (or action) to alter a 666-Computer or satellite computer HISTORY on any person (or persons), in order to cause that HISTORY to be incomplete, inaccurate, deficient, untruthful or deceptive–will result in the death penalty for any person who makes such an attempt.

***************************************

57.0 A TRANSFER PROGRAM is whatever software or hardware is utilized in a 666-Computer or satellite computer to effect a transfer of a PERSON-PROGRAM from one 666-Computer or satellite computer to another. In other words, no PERSON-PROGRAM can be transferred to another 666-Computer or satellite computer without the TRANSFER PROGRAM. All TRANSFER PROGRAMS (for every PERSON-PROGRAM) will be BLOCKED.

57.1 A TRANSFER PROGRAM can only be UNBLOCKED with a PASSWORD TRANSFER PROGRAM. And all PASSWORD TRANSFER PROGRAMS can only be obtained through a member of the INNER CIRCLE. Any person who deliberately, knowingly and willingly allows (or participates) in any scheme which allows any PERSON-PROGRAM to contain an UNBLOCKED TRANSFER PROGRAM will receive the death penalty as a JESUIT CONSPIRATOR.

57.01 The CONSPIRACY LAW PRESIDENT is considered a member of the INNER CIRCLE. The CONSPIRACY LAW PRESIDENT is the only member of the INNER CIRCLE who does not need to be cleared by 3 other members of the INNER CIRCLE in order to effect a PASSWORD TRANSFER PROGRAM (see Sect. 57.5).

57.2 A PERSON-PROGRAM is the computer program which is used to exercise 666-Computer or satellite computer and satellite control over a person or an animal.

57.3 A TRANSFER PRACTITIONER is the 666-Computer or satellite computer practitioner who effects the transfer of a PERSON-PROGRAM from one 666-Computer or satellite computer to another.

57.4 A PASSWORD TRANSFER PROGRAM is the computer program which will unblock the TRANSFER PROGRAM so that it can be used to transfer a PERSON-PROGRAM from one 666-Computer or satellite computer to another. The PASSWORD TRANSFER PROGRAM will contain a password which will change at least every minute. Only members of the CONSPIRACY LAW PRESIDENT’s INNER CIRCLE will have access to PASSWORD TRANSFER PROGRAMS. Because the passwords change so rapidly, the passwords used should always be different (each time a PASSWORD TRANSFER PROGRAM is used to transfer a 666-Computer or satellite computer’s PERSON-PROGRAM). No two passwords should be alike EVER. The PASSWORD TRANSFER PROGRAM will be programmed in such a manner that the transfer which is effected will be a transfer to a designated 666-Computer or satellite computer.

57.41 No PASSWORD TRANSFER PROGRAM will be operable unless it contains a password and a specific (and designated) 666-Computer or satellite computer to which that PERSON-PROGRAM will be transferred. The PASSWORD TRANSFER PROGRAM should be so designed and programmed that it is impossible to effect any transfer of PERSON-PROGRAMS (from one computer to another) without the password. If necessary, reprogram the 666-Computer or satellite computers to make it impossible to effect any PERSON-PROGRAM transfers without the designated password. Anyone who willingly, knowingly or deliberately designs (or participates) in any scheme to use PASSWORD TRANSFER PROGRAMS which can effect the transfer of a PERSON-PROGRAM from one 666-Computer or satellite computer to another without requiring a password to effect the transfer, will receive the death penalty as a JESUIT CONSPIRATOR.

57.5 All TRANSFER PROGRAMS in all 666-Computer or satellite computers will be BLOCKED, which means that no person’s 666-Computer or satellite computer PERSON-PROGRAM can be transferred to another 666-Computer or satellite computer user unless that TRANSFER PRACTITIONER is given a PASSWORD TRANSFER PROGRAM (in order to UNBLOCK the TRANSFER PROGRAM which is necessary for the transfer) from someone in the CONSPIRACY LAW PRESIDENT’s INNER CIRCLE. This person in the INNER CIRCLE (who has the authority to utilize a PASSWORD TRANSFER PROGRAM for a designated person) cannot utilize the PASSWORD TRANSFER PROGRAM to UNBLOCK a TRANSFER PROGRAM–without the witnessed consent of at least 3 other INNER CIRCLE members. The 3 other INNER CIRCLE members will screen the request (from the INNER CIRCLE member who will effect the transfer) to make sure proper procedures are being followed and that no CONSPIRACY LAWS are violated with the requested transfer. In other words, a person cannot randomly be switched from the 666-Computer or satellite computer and satellite control of one computer to the 666-Computer or satellite computer and satellite control of another computer.

57.6 The CONSPIRACY LAW PRESIDENT’s INNER CIRCLE will consist of persons appointed to the INNER CIRCLE by the CONSPIRACY LAW PRESIDENT. All members of the INNER CIRCLE will be appointed by the CONSPIRACY LAW PRESIDENT and each INNER CIRCLE member will be assigned those groups of persons for whom they have authority to execute transfers of PERSON-PROGRAMS from one 666-Computer or satellite computer to another. Any person in the INNER CIRCLE who willingly, knowingly and deliberately attempts to (or does) execute a transfer of any PERSON-PROGRAM from one 666-Computer or satellite computer to another (for any person or animal who has not been assigned to them) and without following proper procedures (see Sect. 57.5), will receive the death penalty as a JESUIT CONSPIRATOR.

57.7 Any member of the INNER CIRCLE who willingly, deliberately and knowingly gives out a PASSWORD TRANSFER PROGRAM to an unauthorized person will receive the death penalty as a JESUIT CONSPIRATOR.

57.8 All members of the INNER CIRCLE will be highly screened and under 24-hour, round-the-clock 666-Computer or satellite computer surveillance. FINANCIAL and EMOTIONAL HISTORIES (or any other HISTORIES necessary) will be maintained on all members of the INNER CIRCLE continually. The members of the INNER CIRCLE can be composed of persons from any country or citizenship. The members of the INNER CIRCLE will be persons that the CONSPIRACY LAW PRESIDENT feels he can trust with his life. ****************************************************************

58.0 Using a combination of satellite and 666-Computer or satellite computer technology, all warm bodies of animals and/or persons will be checked to see if that warm body is under the 666-Computer or satellite computer or satellite control of any unauthorized 666-Computer or satellite computer or satellite. A special team will be assembled for this purpose. This team will be called the SCANNING NETWORK.

58.1 Each active PLP and RSP network will have certain members of their network who will compose the SCANNING NETWORK. The SCANNING NETWORK will be composed of PLPs and RSPs chosen by the German government and by the INTELLIGENCE COMMITTEES (who have jurisdiction over that SCANNING NETWORK)–which would be the INTELLIGENCE COMMITTEE that monitors the PLP and RSP network (from which that SCANNING NETWORK is derived).

58.2 In other words, the SCANNING NETWORK will be composed only of members of one country’s PLP and RSP network. Each SCANNING NETWORK is to be strictly segregated by country, just like the PLP and RSP network from which it is derived. A SCANNING NETWORK is considered part of the PLP and RSP network (from which its members are drawn or derived). Therefore, each member of the SCANNING NETWORK should be a citizen of the same country as each member of the PLP and RSP network (from which it is derived).

58.3 The German government (in cooperation with the INTELLIGENCE COMMITTEE over that PLP and RSP network) will choose those PLPs and RSPs from that PLP and RSP network who will be members of the SCANNING NETWORK. The German government does not have to work with any country’s INTELLIGENCE COMMITTEE, if it feels it cannot trust that INTELLIGENCE COMMITTEE for whatever reason in choosing members of a SCANNING NETWORK. If there are disputes, the final decision regarding who will be in a SCANNING NETWORK will rest with the German government and the CONSPIRACY LAW PRESIDENT.

58.3 Any member of the SCANNING NETWORK who deliberately, willingly and knowingly neglects to report any warm body that is under the control of an unauthorized 666-Computer or satellite computer or satellite, will receive the death penalty as a JESUIT CONSPIRATOR.

58.4 The SCANNING NETWORK must submit daily reports of their work, called SCANNING REPORTS, to the INTELLIGENCE COMMITTEE of their own PLP and RSP network. Any SCANNING REPORT deliberately, knowingly and willingly written in any inaccurate, deficient or misleading manner will result in the death penalty as a JESUIT CONSPIRATOR to that writer. No SCANNING REPORT can be submitted to any INTELLIGENCE COMMITTEE unless the writer of that report passes 666-Computer lie-detection and amnesia-detection regarding the accuracy, completeness and truthfulness of the report. The purpose for the daily reports is to keep a record of activities (for legal purposes) and to make sure the SCANNING NETWORK is doing their job. The INTELLIGENCE COMMITTEE must ensure that reports are received DAILY and should immediately investigate if certain SCANNING REPORTs are consistently missing.

58.5 Those citizens of their country found by the SCANNING NETWORK to be under the 666-Computer or satellite computer or satellite control of an unauthorized 666-Computer or satellite computer or satellite will be removed from the control of that unauthorized user, even if the International government must use a satellite-guided missile or bomb to destroy the building or satellite (along with the 666-Computer or satellite computer) that houses the unauthorized 666-Computer or satellite computer or even if the satellite needs to be destroyed. Some way will be found to remove that person from under the control of an unauthorized 666-Computer or satellite computer or satellite.

THE ZOOLOGY CORPS

58.6(a) Because the Jesuits heavily use animals, insects, sharks, gators, etc. to further their terrorist enterprises, a section of the PLP and RSP networks will be devoted to the ZOOLOGY CORPS.

58.6(b) The ZOOLOGY CORPS will be composed of veterinarians, persons trained in the zoological sciences and all their assistants and will be composed primarily of programmers and computer operators, since the computer will do most of the work for the ZOOLOGY CORPS. The managers of the ZOOLOGY CORPS will be those with specialized knowledge of the veterinary sciences, zoologists, and expert computer programmers and computer scientists. All members of the ZOOLOGY CORPS will be considered full fledged LAW ENFORCEMENT PERSONS under CONSPIRACY LAW.

58.6(c) Each country will have its own ZOOLOGY CORPS, which will be a subdivision of that country’s PLP and RSP network. Some members of the ZOOLOGY CORPS, will also be a subdivision of the MEDIC CORPS. If it is determined that a creature is used extensively to (directly or indirectly) harass, harm or kill a SIGNIFICANT PERSON, then that creature (even if it’s only an ant) will be placed under the 666-Computer control of the MEDIC CORPS’ ZOOLOGY CORPS. In many cases, it will be decided to just kill the creature (using computer/satellite technology) rather than to waste resources to monitor and control that creature using 666-Computer technology.

58.6(d) However, no creature can be killed, if killing that creature would strengthen the case of the Jesuits against the INTERNATIONAL GOVERNMENT or against any SIGNIFICANT PERSON of if keeping that creature alive is necessary to preserve evidence for legal cases. For instance, no member of the ZOOLOGY CORPS can kill one of Gail’s mom’s cats, just to get rid of the cat, since this would strengthen the case of the Jesuits against Vladimir Putin or Gail Schuler, etc. The Jesuits could use this to create the impression that Vladimir or Gail are animal haters and are vicious and cruel people. The creature can only be killed (using computer/satellite technology) if it is determined that it is ridiculous to waste resources to keep that creature alive and that it is ridiculous to use our sophisticated computer/satellite technology to monitor and control that creature. Creatures which would fall under this category (to be killed), would be creatures such as roaches, spiders, ants, etc.

58.6(e) The ZOOLOGY CORPS will work with the SCANNING NETWORK to locate all creatures which are under the 666-Computer control of the Jesuit Order, to assist the ZOOLOGY CORPS in determining how to categorize each creature, either as arachnids, insects, mammals, sharks, etc. The first decision which must be made is whether it is worth it to place this creature under computer/satellite control of the ZOOLOGY CORPS and many creatures (such as ants, roaches, snakes, etc.) may just be killed (using computer/satellite technology). However, this is why we are using zoologists as the leaders in the ZOOLOGY CORPS. If the creature is a species that is an endangered species, it cannot be killed, but may need to be placed under the computer/satellite control of the ZOOLOGY CORPS instead.

58.6(f) Since there are so many creatures on the planet, the use of computer technology and programming will be used to assist the ZOOLOGY CORPS, so that, unlike the PLP and RSP networks which have 666-Computer control over people–one computer may be programmed to monitor and control one million roaches in the Los Angles area. The work of the PROGRAMMER CORPS will be very important to the ZOOLOGY CORPS and effective programs must be created to make the work of the ZOOLOGY CORPS efficient and cost-effective. So, a ZOOLOGY CORPS member who has control over insects in Los Angeles, may just hit a button to eradicate about 1,000 roaches in the L.A. area and will rely heavily on the computer to do much of the labor and thinking for the ZOOLOGY CORPS member. The program must be sophisticated enough that it does a lot of the decision making for the ZOOLOGY CORPS member.

58.6(g) Each program must have a GENETIC ANALYZER which analyzes the genetic contents of each creature. This will also make identification of that creature a cinch and will immediately place that creature into the branch of the ZOOLOGY CORPS which has jurisdiction over that creature. So, the GENETIC ANALYZER would immediately place a shark under the control of the ZOOLOGY CORPS members who have 666-Computer control over sharks. Also, the GENETIC ANALYZER should be programmed to quickly pick up on any aberrations or suspicious DNA in that creature. So, let’s say we are dealing with a shark that has eaten the body of Natalee Holloway. The GENETIC ANALYZER would immediately locate the shark (or sharks) that have eaten Natalee Holloway, because the GENETIC ANALYZER would locate Natalee’s DNA in the shark’s body. So the GENETIC ANALYZER would determine that this is a shark which has eaten Natalee and that, indeed, the DNA of Natalee resides within this shark. 666-COMPUTER HISTORIANS could be used to analyze the brain of that shark to determine where that shark has been and what it has done over the past month. In cases such as this, all the records of the GENETIC ANALYZER must be preserved and kept as evidence for legal trials.

58.6(h) All creatures under the 666-Computer of the ZOOLOGY CORPS must be tagged somehow, so that we can keep histories and records of where all these creatures go and have been if it is determined that that creature is, or could become, a SIGNIFICANT CREATURE. If any creature is deemed to be a SIGNIFICANT CREATURE a legal record must be kept of that creature by the ZOOLOGY CORPS, i.e.–where it has been, what it has done, etc.–this could help out in legal cases.

58.6(i) The decision whether to kill a creature will be made by our ENDANGERED SPECIES committee (a sub-branch of the ZOOLOGY CORPS). The ENDANGERED SPECIES committee will create a computer program (in cooperation with the PROGRAMMER CORPS) to be used by the members of the ZOOLOGY CORPS. This program will immediately alert the ZOOLOGY CORPS that the creature they are contemplating for execution must be kept alive and may even give them instructions how to keep this creature alive.

58.6(j) All creatures (that is any living creature which falls under the species category in the science of zoology) will be placed under the 666-Computer control of the ZOOLOGY CORPS, unless it is determined that it is better to execute the creature (using computer/satellite technology to do so).

58.6(k) Those creatures (deemed better alive than dead) and which are not under the 666-Computer control of any 666-Computer network must be placed under the 666-Computer control of the ZOOLOGY CORPS. Because there are so many creatures on the planet, most of these creatures will be placed under the control of a sophisticated computer program, which will be programmed and managed by a programmer who is a member of the ZOOLOGY CORPS. This program must be programmed in such a manner that the creatures manipulated by this program will be manipulated in such a manner that they will not harm human beings and that the creatures cannot be used to further the goals of the Jesuit Order. For instance, the shark program should manipulate sharks to avoid people and stay away from beaches where people are.

58.6(l) All creatures which are deemed better alive than dead, will have shields placed over their “brain” to prevent Jesuits from manipulating these creatures to further their terrorist enterprises. This could include fireants, cats, gators, sharks, dogs, and all creatures –since all of these creatures have been used by Jesuits.

58.6(m) Those creatures that are under the 666-Computer control of the Jesuits and that are considered SIGNIFICANT CREATURES, and these creatures will also be placed under the 666-Computer control of the ZOOLOGY CORPS and the ZOOLOGY CORPS will use our computer/satellite technology to remove control away from the Jesuits on these creatures.

58.6(n) A SIGNIFICANT CREATURE is any creature which is used extensively (directly or indirectly) to harass or harm a SIGNIFICANT PERSON in any way. These could be the fire ants which attack Gail in her apartment, or any roaches which are manipulated to invade Gail’s apartment, or Gail’s mom’s cats, or a gator which is found in West Virginia, or sharks used to eat persons (in order to strengthen cases against SIGNIFICANT PERSONS) etc. A SIGNIFICANT CREATURE is any animal or creature which is used extensively by the Jesuits to assist them in their warfare against any SIGNIFICANT PERSON. This would include all the cats of Gail’s mom or any sharks that are used to attack persons or eat persons or bodies, in order to strengthen cases against SIGNIFICANT PERSONS.

58.6(o) For instance, if the SIGNIFICANT creature is a cat, then the ZOOLOGY CORPS will treat that cat like a person, in that that cat will be placed under the 666-Computer control of the ZOOLOGY CORPS and the ZOOLOGY CORPS will use their technology to removed LOOPHOLE PROGRAMMING or TRIGGER PROGRAMMING from that cat’s PERSON-PROGRAM, in order to free that cat from the 666-Computer control of the Jesuit Order.

58.6(p) The decision to kill a SIGNIFICANT CREATURE will be made by the ZOOLOGY CORPs and if it is determined that it is easier and more effective to just kill the creature, then it will be killed using 666-Computer technology. Also, any creature which, if not killed, could result in the death of a human being, should also be killed, unless there are very good reasons not to do so. A rattlesnake about to bite a child should immediately be killed by the ZOOLOGY CORPS, and the programs should be programmed to do this automatically, since it is impossible for humans to be this fast or to keep track of every rattlesnake. For instance, it is ridiculous to use 666-Computer technology to remove TRIGGER PROGRAMMING from a cockroach’s PERSON-PROGRAM. It would be easier and more logical to use satellite/computer programming to just kill the cockroach. So, let’s say a cockroach is being manipulated by the Jesuits to invade Gail’s apartment, the ZOOLOGY CORPS would already have 666-Computer control over this cockroach and would use their control to knock out the cockroach on the spot.

58.6(q) The ZOOLOGY CORPS will use their scientific knowledge to divide up the ZOOLOGY CORPS into specialties, so that the work of the ZOOLOGY CORPS can be most efficient and effective. For instance, a subdivision of the ZOOLOGY CORPS may be devoted to the arachnids (spider family) and a subdivision may be devoted to those creatures in the shark family and another subdivision may be devoted to those in the mammal family, another subdivision may be devoted to the insect family, etc.

58.6(r) This is necessary because each creature’s brain has unique characteristics and if the ZOOLOGY CORPS is divided into such specialties, it will do a better job of dealing with the computer/satellite control over these creatures, since each specialist will have knowledge of the brain (and nervous system) of that particular creature and will know better how to utilize and manipulate computer/satellite control over that creature.

58.6(s) Any willing and knowing (direct or indirect) attempt or action by any member of the ZOOLOGY CORPS or by any LAW ENFORCEMENT PERSON to violate (or to neglect) the guidelines of this Sect. 58.6 or to commit any action or to neglect any action, in order to assist or promote the goals of the Jesuit Order in any way, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. No one can be a member of the ZOOLOGY CORPS unless that person passes the analysis of the FEAR ANALYZER CORPS (see Sect. 28 of ICL:ST).

58.6(s-1) Also, any willing and knowing use of the computer/satellite technology to manipulate or control any creature with the intent to use that creature to promote the goals of the Jesuit Order or to cause harm (in any way) to innocent persons, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. All such cases will be tried on GCFNC. Those cases that involve Gail Schuler will result in Sect. 95 (see CL&G) executions, even if the manipulated creature was only an ant or a roach.

58.6(t) Also, if evidence obtained by the ZOOLOGY CORPS, indicates a creature (even an ant) was used as part of a murder conspiracy or as part of any conspiracy used to further the goals of the Jesuit Order, a CONSPIRACY REPORT and CONSPIRACY ACTION REPORT must be filed (as outlined under CONSPIRACY LAW) and a full investigation must be launched to determine who was behind this conspiracy and if it is determined that anyone was willingly and knowingly behind any conspiracy (which uses 666-Computer manipulation or control of a SIGNIFICANT CREATURE) with the goal to use this creature to assist the goals of the Jesuit Order, that person will be given the death penalty as a JESUIT CONSPIRATOR. If the conspiracy was connected in any way to Gail Schuler, that person will be given a Sect. 95 (see CL&G) execution. All such cases will be tried on GCFNC, along with all evidence obtained by following the guidelines of this Sect. 58.6. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

58.6(u) Because Loree McBride Jesuits use dogs to harass Gail on her daily walks, all dogs and pets worldwide must be scanned by the ZOOLOGY CORPS 24/7 (especially in the vicinity of a SIGNIFICANT PERSON) to determine if they are used by Jesuits to harm or harass a SIGNIFICANT PERSON, such animals will be called LOREE MCBRIDE ANIMALS. Loree McBride Jesuits are not allowed to have as a pet any animal which has the potential to bite, harm or harass INNOCENTS. First off, LOREE MCBRIDE JESUITS are to be immediately executed and they are denied due process, so if they manage to evade us and to use their animals as a LOREE MCBRIDE ANIMAL on innocents, the animal must immediately be removed from them (using transporter technology or whatever will work) and then analyzed to determine if it is a dangerous animal that could harm or harass innocents. At the same time, the Loree McBride Jesuit will also be executed (with brain reads taken for evidence, if possible). If it is a dangerous animal, it may just be executed on-the-spot (with brain reads taken for evidence, if possible).

58.6(v) Scanners must be set up 24/7 around the vicinity of all SIGNIFICANT PERSONS to scan for all animals in the vicinity of that SIGNIFICANT PERSON. Within a month from today (Dec. 15, 2018), scanners must be set up in all Church of Gail cities that scan for all animals in the Church of Gail city. The scanner will be set up to determine which humans are near the animal and if they are the animal’s owner. If they are a Loree McBride Jesuit and are also the animal’s owner, they will be executed on the spot just for being a Loree McBride Jesuit who has somehow managed to evade the death penalty for being a Loree McBride Jesuit. At the same time, the animal will be removed from the area (via transporter technology, taser nets or other means, including brain control on the animal) and scanned to determine if the animal is a Loree McBride animal. All Loree McBride animals that have an evil nature, that is, the animal is programmed to kill or harass innocents, must be executed on the spot (preferably after getting a brain read on the animal for evidence in court, if necessary), even if the animal is confined at the time of the scan.

58.7 All dogs (or animals that could bite or attack, even if the dog or animal has a tendency to be friendly) are required to be on a leash (or somehow confined) if they are outside a confined area and if the animal has the potential to harass or harm an innocent person within their vicinity. All animals that are loose in a manner that could pose harm or harassment to an innocent in the vicinity of that animal, must be immediately transported out so that the animal does not pose a threat to innocents, OR the animal must be put under brain control to cause it to not harm or harass an innocent in its vicinity. The animal’s owner will be immediately analyzed to determine if they are a Loree McBride Jesuit and, if so, will be executed on the spot, along with the animal (if the animal has the potential to be a LOREE MCBRIDE ANIMAL).

58.8 If the owner is a Loree McBride Jesuit but the animal is innocent and harmless to innocents, the animal will be removed from the Loree McBride Jesuit and given to a person who will use that animal in accordance with Conspiracy Law. Our scanners will be programmed to analyze animals to determine if they are a LOREE MCBRIDE ANIMAL. Animals that are not Loree McBride animals, but are just being used by Loree McBride Jesuits to be a nuisance, will be spared, but the Loree McBride Jesuit, like all Loree McBride Jesuits, must be executed on the spot. The innocent animal will then be given to a responsible and law abiding animal owner.

58.9 The loose dogs or animals capable of attacking or harassing innocents must be analyzed to determine if they have an owner. Any animal that is able to attack or harass an innocent person and/or who is a pet or handled by a Loree McBride Jesuit, will be called a LOREE MCBRIDE ANIMAL. Loree McBride Jesuits are not allowed to own or handle any animal that could bite, harm or harass an innocent person if not supervised by its owner. First off, all Loree McBride Jesuits who own an animal will be executed for just being a Loree McBride Jesuit. When that happens, the pet or animal controlled by the Loree McBride Jesuit will then be given to another owner, who will ensure the animal is not used to hurt or harass innocents. If the animal poses harm to innocents, like if it’s a murdering Tweeter Bird, the animal must be executed on the spot. If possible, get brain reads on the animal for evidence in court. A Loree McBride Jesuit is defined as any person who willingly and knowingly supports Loree McBride.

58.9(a) Any willing and knowing violation of this Sect. 58 or of Conspiracy Law in order to give support to Loree McBride and her Jesuits, will bring the death penalty as a Jesuit Conspirator to that violator. Loree McBride loves to use animals to murder and harass and this Sect. 58 has been written to make it impossible for her to do so; anybody who willingly and knowingly neglects to enforce these laws so that Loree McBride animals are loose, a nuisance, or dangerous, will get the death penalty as a Jesuit Conspirator. Willingly and knowingly using a Loree McBride animal to harass an innocent, like trying to discourage Gail from going on her walks, is a death penalty violation under Conspiracy Law.

*********************************************************

All violations of this Sect. 59 are subject to the guidelines of Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs.

59.0 A LOOPHOLE PROGRAM is a feature in a PERSON-PROGRAM which permits illegal satellite signals (or an illegal 666-Computer or satellite computer) to fully or partially takeover a PERSON-PROGRAM and to wrest (fully or partially) 666-Computer or satellite computer and satellite control of a person away from the licensed or authorized 666-Computer or satellite computer practitioner.

59.1 No LOOPHOLE PROGRAMMING is permitted in any PERSON-PROGRAM. Any person who deliberately, knowingly, and willingly participates in any scheme to allow (even if only by delaying certain actions–negligence can make a person guilty, if the negligence was DELIBERATE) or promote LOOPHOLE PROGRAMMING (see Sect. 59.10) in any PERSON-PROGRAM will receive the death penalty as a JESUIT CONSPIRATOR.

59.10 An example of a way to promote LOOPHOLE PROGRAMMING in PERSON-PROGRAMS, would be to transfer or copy a LOOPHOLE PROGRAM from one 666-Computer or satellite computer program to another (or to the same programming through the use of a REPLICATOR PROGRAM–see Sect. 59.53)– this is called a LOOPHOLE TRANSFER. Any person who (directly or indirectly) deliberately, knowingly and willingly participates in any scheme to cause or promote LOOPHOLE TRANSFERS (whether by acts of commission or omission), will receive the death penalty as a JESUIT CONSPIRATOR.

59.2 All LOOPHOLE PROGRAMS (or any attempts to promote LOOPHOLE PROGRAMS) in any PERSON-PROGRAM must be reported to a LAW ENFORCEMENT PERSON as soon as possible by any person who is aware of any existing LOOPHOLE PROGRAMMING (or LOOPHOLE PROGRAMMING attempts–such as LOOPHOLE TRANSFERS), and then this LOOPHOLE PROGRAMMING (or TRANSFER) must either be blocked (as soon as possible using acupuncture principles) and eventually eliminated (as soon as possible). Anyone who is aware of a LOOPHOLE PROGRAM (or TRANSFER) in a PERSON-PROGRAM or has any essential LOOPHOLE PROGRAMMING information (see Sect. 59.21) and willingly, deliberately and knowingly does not report the LOOPHOLE PROGRAM (TRANSFER) or (LOOPHOLE PROGRAM information) as soon as possible to a LAW ENFORCEMENT PERSON will receive the death penalty as a JESUIT CONSPIRATOR.

59.21 Also, anyone who is aware of a method to block or reverse LOOPHOLE PROGRAMMING or TRANSFERs [so that an enemy 666-Computer or satellite computer or satellite practitioner cannot fully or partially overcome a PLP and RSP’s 666-Computer or satellite computer or satellite control over a person (via LOOPHOLE PROGRAMMING or TRANSFERS)], and who deliberately, knowingly and willingly does not report that information to a LAW ENFORCEMENT PERSON and to the HOMELAND SECURITY DEPARTMENT of his/her country and to the International government as soon as he/she is aware of this information and of the requirement to report this information, will receive the death penalty as a JESUIT CONSPIRATOR, and will be treated according to the guidelines of Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs.

59.22 Whether or not a person deliberately, knowingly and willingly delayed or neglected to report any LOOPHOLE PROGRAM or TRANSFER (or information about how to block or reverse LOOPHOLE PROGRAMMING or TRANSFERS) to a LAW ENFORCEMENT PERSON can be determined by 666-Computer or satellite computer analysis. Those who deliberately, willingly and knowingly delay or neglect to report any required LOOPHOLE PROGRAM information (as outlined in this Sect. 59.22) to a LAW ENFORCEMENT PERSON will receive the death penalty as a JESUIT CONSPIRATOR and will be treated according to the guidelines of Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs.

59.3 Any LAW ENFORCEMENT PERSON who is aware of any LOOPHOLE PROGRAM (or TRANSFER) or LOOPHOLE PROGRAMMING information which is helpful in defeating LOOPHOLE PROGRAMMING (see Sect. 59.22) is required to immediately file a CONSPIRACY REPORT (regarding the LOOPHOLE PROGRAM [TRANSFER] or information) to the INTELLIGENCE COMMITTEE of his/her country. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

59.4 Once the INTELLIGENCE COMMITTEE receives any CONSPIRACY REPORT (regarding LOOPHOLE PROGRAM [TRANSFERS] or LOOPHOLE PROGRAMMING information), a CONSPIRACY ACTION REPORT must be prepared immediately (regarding the LOOPHOLE PROGRAM [TRANSFERS] or information) and all known LOOPHOLE PROGRAMS [TRANSFERS] must be eliminated or blocked (using acupuncture principles or other methods) or reversed as soon as possible. The use of acupuncture principles to block an illegal 666-Computer or satellite computer program is called ACUPUNCTURE BLOCKING. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

59.5 Any LAW ENFORCEMENT PERSON (or member of the INTELLIGENCE COMMITTEE or of the PROGRAMMER CORPS) who willingly, knowingly and deliberately does not immediately file the reports required of them (in regard to LOOPHOLE PROGRAMS or TRANSFERS) and/or who willingly, knowingly or deliberately participates in any scheme to delay (or cause to delay) the elimination (and/or ACUPUNCTURE BLOCKING) (see Sect. 59.4) of these LOOPHOLE PROGRAMS or TRANSFERS from any PERSON-PROGRAM, will receive the death penalty as a JESUIT CONSPIRATOR. 666-Computer or satellite computer analysis can determine whether a LAW ENFORCEMENT PERSON (or member of the INTELLIGENCE COMMITTEE or of the PROGRAMMER CORPS) deliberately, knowingly and willingly delayed the filing of a required report.

59.51 All 666-Computer or satellite computer PERSON-PROGRAMS must have LOOPHOLE SHIELDS around each PERSON-PROGRAM which prevents LOOPHOLE TRANSFERS and illegal LOOPHOLE TAMPERING and which prevents SATELLITE LOOPHOLE ACTIVITIES which could be directed onto that same LOOPHOLE PROGRAMMING’s PERSON-PROGRAM in order to damage or alter that PERSON-PROGRAM’s programming.

59.51(a) SATELLITE LOOPHOLE ACTIVITIES are defined as satellite technology which is directed through illegal LOOPHOLE PROGRAMMING to target portions of a PERSON-PROGRAM in order to modify or alter or damage that programming.

59.51(b) A LOOPHOLE SHIELD is defined as a shield placed around 666-Computer or satellite computer PERSON-PROGRAMS designed to prevent LOOPHOLE TRANSFERS, LOOPHOLE TAMPERING, and SATELLITE LOOPHOLE ACTIVITIES–see Sect. 59.53. All the laws which apply to SHIELDS, also apply to LOOPHOLE SHIELDS (see Sect. 3 of General 666-Computer or Satellite Computer Laws).

59.51(c) Any (direct or indirect) willing and knowing attempt (or action) by any person to damage or alter any programming in any PERSON-PROGRAM (or in any 666-Computer or satellite program) through the use of SATELLITE LOOPHOLE ACTIVITIES (or other methods) will bring the death penalty as a JESUIT CONSPIRATOR to any person who makes such an action or attempt. Also, no one besides a PROGRAMMER from a PROGRAMMER CORPS is supposed to alter, delete, add, or change any programming in any PERSON-PROGRAM (or in any 666-Computer or satellite program)–and if any person besides that member of the PROGRAMMER CORPS who is designated to work on that PERSON-PROGRAM (or who is designated to work on that 666-Computer or satellite program) attempts to (or actually does) work on (directly or indirectly) any PERSON-PROGRAM (or on that 666-Computer or satellite program)–that person will receive the death penalty as a JESUIT CONSPIRATOR.

59.51(d) Once it is known that a PERSON-PROGRAM has been damaged or illegally altered, it must be reported about as soon as possible in a CONSPIRACY REPORT to the HOMELAND SECURITY DEPT. which has jurisdiction over that PERSON-PROGRAM. Any (direct or indirect) willing and knowing neglect to file a CONSPIRACY REPORT about any illegally altered or damaged PERSON-PROGRAM to the designated HOMELAND SECURITY DEPT., will bring the death penalty as a JESUIT CONSPIRATOR to that person who knew about a damaged or illegally altered PERSON-PROGRAM and neglected to file a CONSPIRACY REPORT to the designated HOMELAND SECURITY DEPT. about that damaged or illegally altered PERSON-PROGRAM. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

59.51(e) Once the designated HOMELAND SECURITY DEPT. receives any CONSPIRACY REPORT about any damaged or illegally altered PERSON-PROGRAM, it must immediately write a CONSPIRACY ACTION REPORT which must state that a PROGRAMMER from the PROGRAMMER CORPS (which has jurisdiction over that illegally altered PERSON-PROGRAM) has been assigned to immediately work on this PERSON-PROGRAM to return it to its LEGALLY OPERABLE STATE (see Sect. 59.51f). See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

59.51(f) When a PERSON-PROGRAM is in its LEGALLY OPERABLE STATE, this means that that PERSON-PROGRAM is operating in compliance with CONSPIRACY LAW; and, in most cases, this means that PERSON-PROGRAM has been returned to the state or condition it was in before it was damaged or illegally altered.

59.52 LOOPHOLE TAMPERING is defined as any manipulation of LOOPHOLE PROGRAMS in PERSON-PROGRAMS, in order to promote violations of CONSPIRACY LAW.

59.53 Any PROGRAMMER from the PROGRAMMER CORPS or any LAW ENFORCEMENT PERSON (who is responsible according to CONSPIRACY LAW to ensure that LOOPHOLE SHIELDS are operating as outlined in this Sect. 59 on 666-Computer or satellite computer PERSON-PROGRAMS), and who (directly or indirectly) deliberately, knowingly and willingly (whether by acts of omission or commission) causes any PERSON-PROGRAM to be vulnerable to LOOPHOLE TRANSFERS or LOOPHOLE TAMPERING or to SATELLITE LOOPHOLE ACTIVITIES–will receive the death penalty as a JESUIT CONSPIRATOR–see Sect. 59.51.

59.53(a) KNOWN LOOPHOLE PROGRAMMING is programming that is known to the PROGRAMMER with a PROGRAMMER WORK PERMIT–see Int. PLP and RSP Network Conf. Sect. 55– who is removing that LOOPHOLE PROGRAMMING from a PERSON-PROGRAM, and is not the LOOPHOLE PROGRAMMING which is being secretly replicated by criminals (called REPLICATED LOOPHOLE PROGRAMMING) elsewhere onto that programming (see the rest of this Sect. 59.53).

59.53(b) A REPLICATOR PROGRAM causes a replication of the KNOWN LOOPHOLE PROGRAMMING (which is being removed from a PERSON-PROGRAM), so that the removed illegal KNOWN LOOPHOLE PROGRAMMING (as it is being removed) is replicated exactly (as REPLICATED LOOPHOLE PROGRAMMING) onto another section of that same person’s PERSON-PROGRAM.

59.53(c) In essence, this REPLICATOR PROGRAM defeats the LOOPHOLE PROGRAMMING removal process by replicating (supposedly unawares to the PROGRAMMER doing the removal) the KNOWN removed LOOPHOLE PROGRAMMING (as it is being removed) onto another section of that same PERSON-PROGRAM, so that while that KNOWN LOOPHOLE PROGRAMMING is being removed, that same KNOWN LOOPHOLE PROGRAMMING (as it is being removed) is being replicated (as REPLICATED LOOPHOLE PROGRAMMING) elsewhere (unnoticed) onto that same PERSON-PROGRAM.

59.53(d) Those criminals that created the LOOPHOLE PROGRAMMING were very clever programming inventers, because they put a REPLICATOR PROGRAM into each PERSON-PROGRAM (which contains LOOPHOLE PROGRAMMING).

59.53(e) This REPLICATOR PROGRAM was designed to outsmart and outmaneuver any attempts to remove LOOPHOLE PROGRAMMING from PERSON-PROGRAMS. That’s because this REPLICATOR PROGRAM was already programmed into each PERSON-PROGRAM (before CONSPIRACY LAW was written and before the shields were placed around each PERSON-PROGRAM). Therefore, the LOOPHOLE SHIELD which surrounds each PERSON-PROGRAM in order to prevent tampering with the PERSON-PROGRAM from criminals (see Sect. 59.51) is useless to prevent the REPLICATOR PROGRAM from executing its programming, since the REPLICATOR PROGRAM was already in place inside the shield, and before the shield was placed around each PERSON-PROGRAM. This is because the REPLICATOR PROGRAM was programmed, so that the trigger to cause the REPLICATOR PROGRAM to begin replicating the removed LOOPHOLE PROGRAMMING is the removal of any LOOPHOLE PROGRAMMING(which is INSIDE the shield) from any PERSON-PROGRAM (which contains that REPLICATOR PROGRAM).

59.53(f) All REPLICATOR PROGRAMS must be eliminated or blocked (or made permanently inoperable) by PROGRAMMERS with PROGRAMMER WORK PERMITS (see Sect. 55 of Int. PLP and RSP Network Conf.) from every PERSON-PROGRAM as soon as possible. For the purposes of this legal document, the elimination or blocking of REPLICATOR PROGRAMS will be considered part of the LOOPHOLE PROGRAMMING removal process, and all the laws that apply to the removal of LOOPHOLE PROGRAMMING apply to the elimination or blocking of REPLICATOR PROGRAMS (see ADJUSTMENT PROGRAMS– Sect. 70).

59.53(g) Any (direct or indirect) willing and knowing attempt (or action) by any PROGRAMMER [responsible (directly or indirectly) to assist in and/or to remove LOOPHOLE PROGRAMMING from a PERSON-PROGRAM] to cause a REPLICATOR PROGRAM to not be eliminated, blocked and/or rendered permanently inoperable as soon as possible from any PERSON-PROGRAM, so that that REPLICATOR PROGRAM cannot be used (in violation of CONSPIRACY LAW)– will bring the death penalty as a JESUIT CONSPIRATOR to that PROGRAMMER.

59.53(h) SATELLITE DIRECTED LOOPHOLE PROGRAMMING is the use of satellite technology through a LOOPHOLE PROGRAM to manipulate, control, modify, genetically alter or change any part of the body or to manipulate, control, modify, genetically alter or change anything which is attached or working (negatively or positively) in conjunction with that part of the body which is controlled by that LOOPHOLE PROGRAM–such as germs. Criminals, using satellite technology, can direct satellite technology to work through any available LOOPHOLE PROGRAMMING in a PERSON-PROGRAM. It appears the use of this satellite technology can only be applied to those parts of the body that are accessible through that LOOPHOLE PROGRAMMING. This means that if LOOPHOLE PROGRAMMING which controls a person’s heart has been removed from a PERSON-PROGRAM, that the Jesuits cannot use satellite (through other LOOPHOLE PROGRAMMING in that PERSON-PROGRAM) to affect that person’s heart. But, let’s say that a person has a sore throat cause by germs and that throat is accessible to the Jesuits through that person’s LOOPHOLE PROGRAMMING–this means that Jesuits can use satellite technology (which is directed through that throat’s LOOPHOLE PROGRAM) to genetically modify or destroy those germs or tissues in that throat that are under the manipulative control of that LOOPHOLE PROGRAM.

59.53(i) The use of any LOOPHOLE PROGRAMMING is a death penalty violation of CONSPIRACY LAW (including SATELLITE DIRECTED LOOPHOLE PROGRAMMING or SATELLITE LOOPHOLE ACTIVITIES–see Sect. 59.51), and will bring the death penalty as a JESUIT CONSPIRATOR to that violator. If any germs or cancers need to be killed or modified, an RSP can do this easily and more efficiently by directly applying satellite technology to those parts of the body that need it, than can a Jesuit criminal through SATELLITE DIRECTED LOOPHOLE PROGRAMMING.

59.54 All 666-Computer or satellite computer programs which have recently acquired LOOPHOLE PROGRAMMING (whether by TRANSFER or TAMPERING), must have the LOOPHOLE PROGRAMMING removed as soon as possible before the LOOPHOLE PROGRAMMING becomes ENTRENCHED (see Sect. 59.55) in that 666-Computer or satellite computer program. A recently acquired LOOPHOLE PROGRAM in a 666-Computer or satellite computer program is called a RECENT LOOPHOLE PROGRAM.

59.55 An ENTRENCHED LOOPHOLE PROGRAM is a loophole program which has been in place for a long enough time that the brain has become “used to” the program and needs considerable time to adjust to the removal of the LOOPHOLE PROGRAM–and, for this reason, the removal of the ENTRENCHED LOOPHOLE PROGRAM cannot be accomplished in an immediate time frame (and the elimination of the ENTRENCHED LOOPHOLE PROGRAM may take months, in order to prevent the brain from going into shock).

59.56 Any PROGRAMMER (who is responsible to ensure that RECENT LOOPHOLE PROGRAMS are removed as soon as possible from 666-Computer or satellite computer programs–see Sect. 59.54), and who (directly or indirectly) deliberately, knowingly and willingly (whether by acts of omission or commission) causes these RECENT LOOPHOLE PROGRAMS to become ENTRENCHED LOOPHOLE PROGRAMS, will receive the death penalty as a JESUIT CONSPIRATOR.

59.57 Unfortunately, because of the use of LOOPHOLE TRANSFERS and TAMPERING, a LAW ENFORCEMENT PERSON who was not an UNWILLING AGENT (a month ago), could become one within a month. Therefore, the German auditing network will have a subdivision which will screen daily for any UNWILLING AGENTS (who may be in a LAW ENFORCEMENT PERSON’s position–see Sect. 11.1 of General 666-Computer or Satellite Computer Laws and Sect. 2.3040 of this document) and who must be temporarily or permanently removed from that position, until (and if) that UNWILLING AGENT is no longer vulnerable to being used as an UNWILLING AGENT. This German auditing network will also have a subdivision who specialize in the removal of RECENT LOOPHOLE PROGRAMS (called the RECENT LOOPHOLE COMMITTEE) which will operate under the INTELLIGENCE COMMITTEE of every country’s HOMELAND SECURITY DEPT. See Sect. 56 of International PLP and RSP-Network Configurations.

TRIGGER PROGRAMS:

59.58 The NANOTECHNOLOGY RESEARCH TEAM will make it high priority to study TRIGGER and DAMAGED PROGRAMS and how to defeat them. It is top priority to eliminate all TRIGGER and DAMAGED PROGRAMMING as soon as possible, especially life-threatening TRIGGER or DAMAGED PROGRAMS–even if mainstream TRIGGER or DAMAGED PROGRAMMING has been removed from the PERSON-PROGRAM, and we are only dealing with remnants of TRIGGER or DAMAGED PROGRAMMING in the damaged PERSON-PROGRAM. TRIGGER PROGRAMMING is TRIGGER PROGRAMMING (regardless of where it is located in the PERSON-PROGRAM) and must be eliminated as soon as safely possible, and life-threatening TRIGGER or DAMAGED PROGRAMS must be eliminated as soon as safely possible (no matter where the TRIGGER or DAMAGED PROGRAMMING is in the PERSON-PROGRAM), even if these trigger programs are only in the damaged PERSON-PROGRAM (after all mainstream TRIGGER PROGRAMMING has been removed). Any (direct or indirect) willing and knowing violations of this Sect. 59.58, will bring the death penalty as a JESUIT CONSPIRATOR to the violator.

59.58(a1) Experts in different body problems (allergists, heart specialists, dermatologists, stomach and digestive tract experts, sleep experts, brain experts, nervous system experts, etc.) will develop specific partial ideal PERSON-PROGRAMS in their area of expertise, with the goal of integrating this partial program into any composite program which would require this partial program.

59.58(a) For instance, a sleep expert may create PERSON-PROGRAMs programmed to deliver ideal sleep patterns for persons with different types of PERSON-PROGRAM and medical histories.

59.58(b) The purpose of each of these specific partial PERSON-PROGRAMS is to create an ideal composite program for each person (in which a PROGRAMMER from the PROGRAMMER CORPS working with that person’s PLP and/or RSP will create an ideal composite PERSON-PROGRAM for that person under his/her care), which would be a program based on their medical history and their PERSON-PROGRAMMING history, in order to make the transition from LOOPHOLE PROGRAMMING to their ideal PERSON-PROGRAM with fewer complications.

59.58(c) The current PERSON-PROGRAMS on individuals have been contaminated with HIDDEN and DAMAGED TRIGGER PROGRAMS (caused by ILLEGAL LOOPHOLE PROGRAMMING) and KNOWN TRIGGER PROGRAMS (usually caused by recently removed HIDDEN TRIGGER PROGRAMMING). A TRIGGER PROGRAM is defined as a computer program which has been introduced into an authorized PERSON-PROGRAM, and which is timed to attach and activate its program onto an authorized program within the PERSON-PROGRAM when its unknown or known TRIGGER is activated. A TRIGGER is usually activated by an event which occurs and which was anticipated by the LOOPHOLE PROGRAMMER or the TRIGGER PROGRAMMER and this event(s) is a part of that person’s ethnography–such as something in that person’s ethnography or daily habits (which are certain to happen) like certain thoughts, or the use of the restroom, or drinking a glass of water, or eating a meal, or meeting a certain person, etc. Once this TRIGGER event occurs, then the “trigger” for the TRIGGER PROGRAM is activated and then the hidden or known TRIGGER PROGRAM explodes and proliferates onto the program which it’s attached to and (if a hidden trigger program) becomes “visible” and interferes with (or overrides) the program it’s attached to–thus, it contaminates the program which it targeted in the PERSON-PROGRAM and causes complications.

59.58(c1) Any (direct or indirect) willing and knowing use of hidden or known or optional or any other type of TRIGGER PROGRAMMING is also considered a use of LOOPHOLE PROGRAMMING (since LOOPHOLE PROGRAMMING is usually the direct or indirect means used to contaminate a PERSON-PROGRAM with TRIGGER PROGRAMMING), and is a death penalty violation of CONSPIRACY LAW. The only use of TRIGGER PROGRAMMING permitted under CONSPIRACY LAW, is any use which removes (as soon as safely possible) any illegal TRIGGER PROGRAMMING which has been programmed into any PERSON-PROGRAM.

59.58(d) The International government has also discovered that the PERSON-PROGRAMS we are using on persons have been set up by the Jesuits to work simultaneously with the LOOPHOLE PROGRAMs, and that the PERSON-PROGRAMS in their current state cannot operate in a healthy manner autonomously or on their own (without the assistance of “partner” programs from the LOOPHOLE PROGRAMS). So when persons are released from LOOPHOLE PROGRAMMING– their current PERSON-PROGRAM cannot operate autonomously in a healthy manner for that person.

59.58(e) Therefore, the NANOTECHNOLOGY RESEARCH TEAM needs to study about how to create PERSON-PROGRAMS which can operate effectively and in a healthy manner ON ITS OWN, taking into account each person’s unique medical and PERSON-PROGRAM history. Perhaps, an ideal composite program could be created for each person from the various ideal partial specific programs (designed by specialists from different fields–see Sect. 59.58 above). This ideal composite program could be based on each person’s unique medical problems, characteristics and history.

59.58(f) Perhaps, we will come up with ideal type programs for different categories of individuals, which could be applied across-the-board for each person (according to his/her type). Or perhaps the types could be for each specific partial program and then an ideal composite program could be created from the specific ideal programs.

59.58(f1) Only PROGRAMMERS from the PROGRAMMER CORPS can program any PERSON-PROGRAM. Only LAW ENFORCEMENT PERSONS can give advice to any PROGRAMMER about how to program any PERSON-PROGRAM. Any direct or indirect attempt or action to use any other person (besides a PROGRAMMER from the PROGRAMMER CORPS or a LAW ENFORCEMENT PERSON) to program or give advice about (directly or indirectly) in any manner any PERSON-PROGRAM will bring the death penalty as JESUIT CONSPIRATOR to that person. To put it in a nutshell, only PROGRAMMERS from the PROGRAMMER CORPS can program any PERSON-PROGRAM and PROGRAMMERS can only follow the advice of LAW ENFORCEMENT PERSONS in deciding how to program any PERSON-PROGRAM.Every person who gave (or gives) advice or creates a PROGRAMMER WORK PERMIT that was/is followed by any PROGRAMMER in programming any PERSON-PROGRAM, must make the italicized statement under 666-Computer lie-detection and amnesia-detection in Sect. 59.58(f2). We want to ensure that all those responsible in any manner to program any PERSON-PROGRAM are held fully acouuntable for their programming or for their advice to any programmer (who programs a PERSON-PROGRAM). Any (direct or indirect) willing and knowing attempt or action to preclude any person [who was directly or indirectly involved in the programming of any PERSON-PROGRAM (either as a PROGRAMMER or an adviser to that PROGRAMMER)] from making the italicized statement in Sect. 59.59(f2) under 666-Computer lie-detection and amnesia-detection, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

59.58(f2) Each PROGRAMMER (and all PLPs and other LAW ENFORCEMENT PERSONS who advise that PROGRAMMER about how to program that PERSON-PROGRAM) who is/are responsible to create (or give advice about) the PERSON-PROGRAM that is ideal (and can operate autonomously–on its own without assistance from LOOPHOLE PROGRAMMING, TRIGGER PROGRAMMING or any other illegal programming) for an individual and/or who creates REVERSE TRIGGER PROGRAMMING instructions in a PROGRAMMER WORK PERMIT for any PROGRAMMER, must certify under 666-Computer lie-detection and amnesia-detection that the PERSON-PROGRAM for which that PROGRAMMER and/or LAW ENFORCEMENT PERSON has created (or is creating) or has advised about (or is advising about) for that person is to the best of that PROGRAMMER and/or LAW ENFORCEMENT PERSON’s knowledge, the program which is the best, safest, and fastest program to restore and/or maintain that person’s mental, emotional, and physical health and that this program [which was/is created by (or advised about by) this PROGRAMMER and/or LAW ENFORCEMENT PERSON] is a PERSON-PROGRAM which is also in maximum compliance with CONSPIRACY LAW. Any PROGRAMMER and/or LAW ENFORCEMENT PERSON who fails 666-Computer lie-detection and/or amnesia-detection regarding the above italicized statement, MUST NOT BE ALLOWED TO PROGRAM (or to give any advice which is followed about) ANY PERSON-PROGRAM, and any programming work done or advice followed (directly or indirectly) on any PERSON-PROGRAM by this PROGRAMMER and/or LAW ENFORCEMENT PERSON who has failed 666-Computer lie-detection and/or amnesia-detection (regarding the above italicized statement), must be evaluated and/or changed by another PROGRAMMER and/or LAW ENFORCEMENT PERSON (who passes 666-Computer lie-detection and/or amnesia-detection regarding the above italicized statement). Any PROGRAMMER and/or any LAW ENFORCEMENT PERSON (or any person) who (directly or indirectly) knowingly and willingly creates (or gives advice about) any PERSON-PROGRAM for any individual which is not the best PERSON-PROGRAM [as defined by this Sect. 59.58(f2)] for that person’s mental, physical and emotional health and/or who (directly or indirectly) knowingly and willing creates (or gives advice about) any PERSON-PROGRAM and who does so in any manner which is not in maximum compliance with CONSPIRACY LAW, must receive the death penalty as a JESUIT CONSPIRATOR.

59.58(f3) Any PROGRAMMER who is in violation of Sect. 59.58(f2) must be removed from the PROGRAMMER CORPS and not be allowed to program in any manner any PERSON-PROGRAM. Any PLP or other qualified LAW ENFORCEMENT PERSON who is in violation of Sect. 59.58(f2) or has willingly and knowingly given bad advice [as defined by Sect. 59.58(f2)] to a PROGRAMMER about how to program any PERSON-PROGRAM, or who has willingly and knowingly created a program(s) for a PERSON-PROGRAM (or a PERSON-PROGRAM) which is in violation of Sect. 59.58, must be removed from his/her LAW ENFORCEMENT POSITION and not be allowed any responsibilities (or to have any influence) as a LAW ENFORCEMENT PERSON. This could mean, for example, that a PLP or RSP who knowingly and willingly gives bad advice [as defined by Sect. 59.58(f2)] to a PROGRAMMER about how to program a PERSON-PROGRAM will be removed from his/her position as a PLP or RSP. Any person who (directly or indirectly) knowingly and willingly violates the principles and guidelines of Sect. 59.58(f2) or who willingly and knowingly encourages in any manner violations of Sect. 59.58(f2), will receive the death penalty as a JESUIT CONSPIRATOR.

59.58(g) A search and locate program needs to be created to find all HIDDEN TRIGGER and DAMAGED PROGRAMS in the PERSON-PROGRAMS, so that these hidden programs can be “defused” before the TRIGGER or DAMAGED PROGRAM activates these hidden programs and causes contamination and complications in the PERSON-PROGRAM.

59.58(h) TRIGGER or DAMAGE ANALYZERS (from the PROGRAMMER CORPS) will be responsible to develop a HIDDEN TRIGGER and DAMAGED PROGRAM search and locate program and this HIDDEN TRIGGER or DAMAGED PROGRAM SEARCH must be used on all PERSON-PROGRAMS as soon as possible in order to eliminate all TRIGGER and DAMAGED PROGRAMS. TRIGGER or DAMAGE ANALYZERS will work with the German PLP and RSP-Network and with 666-COMPUTER HISTORIANS (while TRIGGER PROGRAMMING and DAMAGE VIOLATORS are interrogated and questioned) in their search for HIDDEN TRIGGERS or DAMAGE (see Sect. 1.92 of CONSPIRACY LAWS AND GOVERNMENT). Once any TRIGGER or DAMAGED PROGRAM is discovered, it must be removed and deactivated as soon as possible from that PERSON-PROGRAM. TRIGGER or DAMAGE ANALYZERS will be a specialty within the PROGRAMMER CORPS, and for legal purposes, will be considered full-fledged members of the PROGRAMMER CORPS.

59.58(i) Any willing and knowing attempt (or action) not to use the HIDDEN TRIGGER OR DAMAGE SEARCH (as outlined in this Sect. 59.58) on any PERSON-PROGRAM, in order to remove all TRIGGER and DAMAGED PROGRAMS as soon as safely possible within any PERSON-PROGRAM assigned to that TRIGGER or DAMAGE ANALYZER, will bring the death penalty as a JESUIT CONSPIRATOR to that TRIGGER or DAMAGE ANALYZER, or to any person responsible (directly or indirectly) to search for (and remove as soon as possible) TRIGGER or DAMAGED PROGRAMS.

59.58(j) When a TRIGGER or DAMAGED PROGRAM is defused or activated in a PERSON-PROGRAM, an ACUPUNCTURE BLOCK (or some other block) must be used to immediately block, deaden or make unavailable to that TRIGGER or DAMAGED PROGRAM– the nerves activated by the illegal TRIGGER or DAMAGED PROGRAMMING. Any (direct or indirect) willing and knowing attempt (or action) to not use (or to interfere with) an ACUPUNCTURE BLOCK or some other effective block (as outlined in this Sect. 59.58j) on any nerves activated by a known TRIGGER or DAMAGED PROGRAM (especially when this trigger or damaged program is activated and/or defused) will bring the death penalty as a JESUIT CONSPIRATOR to that violator. Programming violations by any person (like a deliberate attempt or action to mess up programming [using satellite or whatever] so that an ACUPUNCTURE BLOCK (or other block) cannot be carried out on the nerves targeted by a TRIGGER or DAMAGED PROGRAM [as outlined in this Sect. 59.58j]), would be considered an INDIRECT ATTEMPT OR ACTION TO INTERFERE WITH (OR NOT CAUSE) AN ACUPUNCTURE BLOCK (or other block) TO BE CARRIED OUT in connection with a TRIGGER or DAMAGED PROGRAM–and indirect attempts or actions to interfere with an ACUPUNCTURE BLOCK are also death penalty violations of CONSPIRACY LAW.

59.58(k) 666-COMPUTER HISTORIANS must scan the brains of those who may be able to give us a list of all HIDDEN TRIGGER or DAMAGED PROGRAMMING in Gail Schuler and others. 666-COMPUTER HISTORIANS will be used on those TRIGGER or DAMAGED PROGRAMMING VIOLATORS we have in our custody, to help us find out where (or how) we can obtain a list of all HIDDEN TRIGGER or DAMAGED PROGRAMMING in Gail Schuler and others.

59.58(l) Somebody out there (a Jesuit probably) knows which TRIGGER or DAMAGED PROGRAMS have been programmed into each person’s PERSON-PROGRAM, and these persons need to be found and interrogated, in order to obtain this information. This information should help us to eliminate these TRIGGER or DAMAGED PROGRAMS more efficiently and thoroughly and quickly. When these persons are found (who can give us needed information about TRIGGER or DAMAGED PROGRAMS), their cross-examinations will be conducted on GCFNC–to show the world that the International government DID NOT INVENT TRIGGER or DAMAGED PROGRAMMING!!

59.58(m) PROGRAMMERS, PLPs and RSPs will work off exact shielded copies of each person’s PERSON-PROGRAM for several purposes. At least 7 exact, shielded copies of each person’s PERSON-PROGRAM must be maintained and updated EVERY HOUR. It is essential to have at least 7 shielded back-up copies of the exact PERSON-PROGRAM which currently operates on the person– and because the PERSON-PROGRAM which operates on the person changes each time modifications are made to it– each time a modification is made to the original PERSON-PROGRAM, at least 7 shielded and exact back-ups must be made of the newly modified original PERSON-PROGRAM at the time of the modification. Any person responsible to carry out the guidelines of this Sect. 59.58(m) and who (directly or indirectly) willingly and knowingly violates (or neglects to carry out) the guidelines of this Sect. 59.58(m), will receive the death penalty as a JESUIT CONSPIRATOR. It is essential that current and exact back-up copies of all PERSON-PROGRAMs be available at all times– there need to be enough back-ups to deal with emergency situations.

59.58(m1) These copies must be shielded by RSPs with several shields for protection (as outlined in CONSPIRACY LAW–see Sect. 1.0[a] of this document and Sections 3.02 & 3.021 of General 666-Computer or Satellite Computer Laws). Any RSP who (directly or indirectly) willingly and knowingly neglects to maintain his/her shield over any copy of an original PERSON-PROGRAM as outlined in this Sect. 59.58 and in Sections 1.0(a) of this document and in Sections 3.02 & 3.021 of General 666-Computer or Satellite Computer Laws will receive the death penalty as a JESUIT CONSPIRATOR. Also, any (direct or indirect) willing and knowing attempt (or action) to not make and/or use exact copies (in every way) of the original PERSON-PROGRAM (while carrying out the guidelines of this Section 59.58) which operates on the person involved, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

59.58(m2) One exact, shielded copy of the original PERSON-PROGRAM will be used in order to expose each segment of this copied PERSON-PROGRAM to a fast-motion version of that person’s TOTAL BRAIN RECORD (or that person’s total 666-COMPUTER thoughts, actions, emotions, etc.) for at least the past 2 years. The purpose for this is to expose each segment of that person’s PERSON-PROGRAM to that person’s ETHNOGRAPHY for the past 2 years or more, in the hopes that by doing so, this will cause all HIDDEN TRIGGER PROGRAMS in that PERSON-PROGRAM to be activated–and, in this manner, all HIDDEN TRIGGER PROGRAMS in that PERSON-PROGRAM can be located and eliminated. We have discovered that all of the TRIGGERS, so far, have come from a person’s past ETHNOGRAPHY (or anticipated ETHNOGRAPHY). Therefore, by exposing each copied PERSON-PROGRAM to a person’s ETHNOGRAPHY, it is hoped that all HIDDEN TRIGGERS can be revealed. This appears to be the only method that will cause us to find all HIDDEN TRIGGER PROGRAMS–since these HIDDEN TRIGGER PROGRAMS are only revealed when they are activated by their TRIGGER.

59.58(n) It is very important that all copied PERSON-PROGRAMs which we work off of, be thoroughly shielded (as outlined in CONSPIRACY LAW for all programs which need to be shielded). Because if this PERSON-PROGRAM is not thoroughly shielded, tampering to that copied PERSON-PROGRAM can occur as we work on the copy, and this could cause inaccuracies and confusion about which (and what kind of) HIDDEN TRIGGER or DAMAGED PROGRAMS are in the original PERSON-PROGRAM and could cause inaccuracies and confusion about what these TRIGGER or DAMAGED PROGRAMS can do. And this inaccuracy and confusion could cause harm to the person as we work on their original PERSON-PROGRAM.

59.58(o) It is essential to work off a copy of the original PERSON-PROGRAM, because working off the original is too dangerous and too slow for the person whose PERSON-PROGRAM we are working on–THIS IS ALSO TRUE WHEN ALL TRIGGER AND LOOPHOLE PROGRAMMING HAS BEEN REMOVED FROM A PERSON-PROGRAM AND THE PROGRAMMERS ARE TRYING TO FIX A DAMAGED PERSON-PROGRAM. By working off an exact copy of the original PERSON-PROGRAM, it is hoped that the elimination of all TRIGGER and DAMAGED PROGRAMS (and/or elimination of damaged or new LOOPHOLE PROGRAMMING) can be accomplished speedily and safely– since we will know, before we attempt to activate and/or defuse that TRIGGER or DAMAGED PROGRAM – what kind of TRIGGER or DAMAGED PROGRAMS we are dealing with, how many there are, what they are capable of doing and where they are located in the PERSON-PROGRAM.

59.58(p) Once programmed TRIGGER or DAMAGED SEGMENTS are found in the PERSON-PROGRAM (as a result of our work off the shielded copy), a search and replace function must be programmed into that person’s PERSON-PROGRAM in order to eliminate those CONTAMINATED or DAMAGED TRIGGER SEGMENTS (which were discovered from our research on the shielded copy) and then to replace slowly these CONTAMINATED TRIGGER OR DAMAGED SEGMENTS WITH ORIGINAL UNCONTAMINATED SEGMENTS. The reason we must do this search and replace function slowly is because of the existence of RICOCHET TRIGGERS and/or to make the transition from a DAMAGED PERSON-PROGRAM to an UNDAMAGED PERSON-PROGRAM in a manner that is least shocking to the body of the person who is controlled by that DAMAGED PERSON-PROGRAM.

59.58(q) A RICOCHET TRIGGER is a TRIGGER PROGRAM which not only activates its own program, but creates a TRIGGER which activates another HIDDEN TRIGGER PROGRAM elsewhere in that PERSON-PROGRAM–this ricochet effect can go on and on until about 100 or more HIDDEN TRIGGER PROGRAMS are activated all at once (or in a very short time). The result is a mass of new and confusing programming which has been attached to the PERSON-PROGRAM all over the place and is very difficult to fix right away. If the search and replace function to eliminate and replace TRIGGER PROGRAMMING is done too quickly on this copied PERSON-PROGRAM, then it is possible that not all the RICOCHET TRIGGERS will be revealed because we will stop the ricochet effect before it is completely carried out. In other words, since we haven’t given enough time for the RICOCHET TRIGGERS to all be revealed. It is essential that when a TRIGGER is revealed on this copy, that we allow that TRIGGER enough reaction time to ensure that, if it is a RICOCHET TRIGGER PROGRAM, that the whole ricochet programming will be carried out–so that we can identify and eliminate every trigger in that ricochet programming. When we work on the original PERSON-PROGRAM to defuse the RICOCHET TRIGGER, we want to eliminate the total ricochet programming and not just part of it.

59.58(r) When not all TRIGGERS are identified in a RICOCHET TRIGGER PROGRAM because we used the search and replace function too quickly as we worked on the copy, and then we work on the ORIGINAL PERSON-PROGRAM (which is operating on the person involved)– then those TRIGGERS which were far down the line in that RICOCHET TRIGGER PROGRAM will be activated and explode onto the ORIGINAL PERSON-PROGRAM and will cause damage to the ORIGINAL PERSON-PROGRAM. This could be prevented if all triggers in that RICOCHET TRIGGER PROGRAM are identified while we worked on the copy slowly and carefully –then we will have a complete picture of what we are dealing with when we work on the original PERSON-PROGRAM.

59.58(s) Any person who is responsible to use the search and replace function to eliminate TRIGGERS or DAMAGE in a PERSON-PROGRAM, and does so (directly or indirectly) willingly and knowingly in violation of this Sect. 59.58, will receive the death penalty as a JESUIT CONSPIRATOR. Despite the fact that the search and replace function to remove triggers or DAMAGE must be done thoroughly in order to identify and remove all TRIGGERS and/or DAMAGE–any (direct or indirect) willing and knowing attempt (or action) by any person to use the search and replace function (to remove TRIGGERS or DAMAGE) more slowly than necessary (with the intent to delay the removal of trigger programming or damage in order to assist the Jesuits), will also cause that person to receive the death penalty as a JESUIT CONSPIRATOR.

59.58(s1) Also, it is important to note that, if despite our best efforts, a RICOCHET TRIGGER PROGRAM activates (or explodes onto) on the original PERSON-PROGRAM (which operates on the person), that this RICOCHET program must be deactivated and/or defused on the original PERSON-PROGRAM (which operates on the person) as soon as safely possible, in order to prevent further damage to the original PERSON-PROGRAM.

59.58(s2) It is only on the copy that we want to allow the RICOCHET PROGRAM to work its way out thoroughly and slowly. This is because we want to know all the TRIGGERS in the whole RICOCHET PROGRAM.

59.58(s3) But if a RICOCHET TRIGGER explodes onto the original, it is mandatory to stop this program as soon as safely possible, in order to prevent damage to the original. Once this surprise explosion occurs, at least we know where this RICOCHET TRIGGER is on the PERSON-PROGRAM. Therefore, we can activate this same RICOCHET TRIGGER on the copy and allow all the triggers in the whole program on the copy to work themselves out. And this should help in totally removing the RICOCHET TRIGGER off of the PERSON-PROGRAM (which operates on the person).

59.58(s4) It would be ideal if a way could be found to speed up the process of allowing the copy version of the RICOCHET TRIGGER to work its way out. This way, we can replace (maybe within a split second) the contaminated original PERSON-PROGRAM with an EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM–and thus, minimize (or totally prevent) any damage done to the original PERSON-PROGRAM by the surprise (and previously unknown) RICOCHET TRIGGER PROGRAM which exploded onto this original PERSON-PROGRAM.

59.58(s5) The problem with a RICOCHET PROGRAM is that it takes too long to work its way out and it causes tremendous damage to the PERSON-PROGRAM, and we don’t want a RICOCHET PROGRAM to work its way out on the original PERSON-PROGRAM.

59.58(s6) And though we desire the RICOCHET PROGRAM to work its way out on the copy thoroughly in order to find all the TRIGGERS, we don’t want it to take too long to work its way out on the copy either–because this means a delay in creating an EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM in order to stop the damage which the surprise RICOCHET TRIGGER is delivering on the original.

59.58(s7) We need a working version of the original PERSON-PROGRAM in place at all times, and if the original is damaged and we don’t have a good replacement–then there’s a delay (while we wait to create the good replacement) and, in the meanwhile, the surprise RICOCHET TRIGGER is going to town on the original.

59.58(s8) It is the EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM that we need in order to stop the surprise RICOCHET PROGRAM which is working its way out on the original or to prevent the DAMAGED PORTION of the PERSON-PROGRAM from working its way out on the original. The sooner we can get an EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM to replace the contaminated original, the better– because we need a good version of the PERSON-PROGRAM with which to replace the contaminated original. But when we are dealing with a RICOCHET TRIGGER, it takes us longer to make a good version of the PERSON-PROGRAM (that’s because we have to allow the RICOCHET TRIGGER to work its way out on the copy in order to locate all the TRIGGERS in the whole program, before we can replace the contaminated original with this copy (or this EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM). So far, once a surprise TRIGGER PROGRAM or DAMAGED portion of the PERSON-PROGRAM explodes onto the original, the best strategy to minimize damage to the already contaminated original is to replace this contaminated original with an EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM–and the sooner we do this, the better.

59.58(s9) The NANOTECHNOLOGY RESEARCH TEAM needs to find a way to speed up how the RICOCHET TRIGGER or DAMAGED PORTION of the PERSON-PROGRAM works itself out on the copy, so that we can have a good PERSON-PROGRAM in a split second with which to replace the contaminated original –this is essential in order to minimize or prevent damage to the original once a surprise RICOCHET TRIGGER or DAMAGED PERSON of a PERSON-PROGRAM explodes onto the original.

59.58(t) Another purpose for having several shielded copies of the original PERSON-PROGRAM, is that when, despite our best efforts, a TRIGGER(s) and or DAMAGED PORTION of a PERSON-PROGRAM is/are released onto an ORIGINAL PERSON-PROGRAM–it is easier to fix the damage to the contaminated original PERSON-PROGRAM by replacing this contaminated ORIGINAL PERSON-PROGRAM with the exact and fixed copy of the ORIGINAL PERSON-PROGRAM rather than to try to fix damage to the ORIGINAL PERSON-PROGRAM caused by a RICOCHET TRIGGER PROGRAM or a DAMAGED PORTION OF THE PERSON-PROGRAM. It is necessary to have several shielded and exact copies of the original PERSON-PROGRAM (which operates on the person) for the purpose of having readily available EXACT AND FIXED COPIES OF THE ORIGINAL PERSON-PROGRAM to use, whenever another TRIGGER PROGRAM(s) or DAMAGED PORTION OF THE PERSON-PROGRAM explodes onto (and contaminates) the original PERSON-PROGRAM operating on the person.

59.58(u) An EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM is defined as the original PERSON-PROGRAM minus all known TRIGGER PROGRAMMING and DAMAGED PROGRAMMING (which is on that PERSON-PROGRAM). For instance, let’s say that a HIDDEN TRIGGER PROGRAM(s) explodes onto the original PERSON-PROGRAM (which is operating on the person) and contaminates that original PERSON-PROGRAM, so that now we are aware of where another TRIGGER PROGRAM(s) is/are. It should be a simple matter to locate this TRIGGER PROGRAM now on the original shielded PERSON-PROGRAM (which we have stored elsewhere and which is not operating on the person) and to remove this/these newly discovered TRIGGER PROGRAM or PROGRAMS (before we replace the contaminated original [which is operating on the person] with this EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM). When a newly discovered TRIGGER PROGRAM(s) or DAMAGED PORTION OF A PERSON-PROGRAM is/are removed and/or defused from a copy of an original PERSON-PROGRAM (and that/these contaminated TRIGGER SEGMENT[s] or DAMAGED PORTIONS on this copy has been replaced with an ORIGINAL UNCONTAMINATED SEGMENT[s]), then this original PERSON-PROGRAM is considered FIXED, and we now have an EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM to use and to operate on the person, and with which to replace the contaminated original PERSON-PROGRAM which currently operates on the person. This is a more efficient and safe way to deal with any newly activated TRIGGER or DAMAGED PROGRAMMING on a person’s PERSON-PROGRAM, than to spend hours or days trying to fix the mess created by TRIGGER or a DAMAGED PROGRAM which has just exploded and attached itself onto the original PERSON-PROGRAM (which operates on that person).

59.58(v) Any (direct or indirect) willing and knowing attempt (or action) to cause unnecessary problems during the REPLACEMENT of the contaminated original PERSON-PROGRAM (which operates on the person) with the EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. Unnecessary problems during the REPLACEMENT of the contaminated original PERSON-PROGRAM (which operates on the person) could be attempts (or actions) to introduce contamination to the EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM during the replacement process; or to not use the EXACT AND FIXED COPY OF THE ORIGINAL PERSON-PROGRAM as the replacement, but to use, instead, a clever and deficient imitation OR to not replace the contaminated original as soon as safely possible with the EXACT AND FIXED COPY OF THE ORIGINAL and/or to cause a delay in the replacement process (especially if the TRIGGER or DAMAGED PROGRAM is life-threatening and needs to be replaced immediately). The contaminated and original PERSON-PROGRAM (which is operating on the person) must be replaced AS SOON AS SAFELY POSSIBLE with the exact and fixed copy of the original PERSON-PROGRAM (as outlined in this Sect. 59.58) minus the newly discovered (and all known) TRIGGER or DAMAGED PROGRAMMING on that PERSON-PROGRAM– any other type of replacement of the original PERSON-PROGRAM (which is operating on the person) is a violation of this Sect. 59.58, and is a death penalty violation of CONSPIRACY LAW.

59.58(v1) Once the nerves activated by a TRIGGER or DAMAGED PROGRAM have been blocked (see Sect. 59.58j), then the section of the PERSON-PROGRAM which was damaged by the TRIGGER or DAMAGED PROGRAMMING must be replaced as soon as safely possible with an EXACT AND FIXED COPY OF THE ORIGINAL or a portion of an IDEAL PERSON-PROGRAM using an intensifier (or AMPLIFIER) during the replacement process, so that the EXACT AND FIXED COPY OF THE ORIGINAL (or the IDEAL PERSON-PROGRAM replacement) overpowers the TRIGGER-damaged (or other damaged) section and nullifies or seriously weakens the TRIGGER-damaged section by overpowering it. In this manner, the TRIGGER-damaged (or other damaged) section is impotent to carry out its programming. Once the TRIGGER-damaged (or other damaged) section has been made impotent in this manner, then next, that damaged section will be deleted from the PERSON-PROGRAM AND IT’S REPLACEMENT WILL ALREADY BE WORKING!

59.58(v2) You may ask why don’t you delete the TRIGGER-damaged section first and then replace it with the healthy version? TRIGGER or DAMAGED PROGRAMMING is very complex and the deletion process takes time. The deletion process is time-consuming and to do the deletion of the bad program before its AMPLIFIED replacement with the good program, gives more time for the TRIGGER or DAMAGED PROGRAM to work itself out on the PERSON-PROGRAM and thus cause symptoms in the person. It is faster (and more efficient) to first override (with an AMPLIFIER or INTENSIFIER) the TRIGGER-damaged (or other damaged) section with the EXACT AND FIXED COPY OF THE ORIGINAL (or with a portion of the IDEAL PERSON-PROGRAM)–which seriously weakens the ability of the TRIGGER or DAMAGED PROGRAM to execute its functions (even if this amplification with replacement process may not immediately and totally nullify the ability of the TRIGGER or DAMAGED PROGRAM to execute its functions). And then the more time consuming deletion process of that TRIGGER or DAMAGED PROGRAMMING can be accomplished next.

59.58(v3) You might ask what if the TRIGGER or DAMAGED PROGRAMMING has started a heart attack? Is it safe to block all the nerves which control the heart (or the heart attack)? It would not be safe if the affected nerves were blocked too long, so that the heart was not able to function. That is why it is necessary to immediately (in a milli-second) follow up the blocking of the nerves with the amplified replacement program, so that the blocked nerves will be immediately reactivated and able to execute their functions via the IDEAL PERSON-PROGRAM which overpowers the TRIGGER or DAMAGED PROGRAMMING.

59.58(v4) Then, while the IDEAL PERSON-PROGRAM is overpowering the TRIGGER or DAMAGED PROGRAMMING, the deletion of the TRIGGER-DAMAGED (or other damaged) program would take effect and this deletion of that TRIGGER PROGRAMMING damaged section (or other damaged section) would further weaken the TRIGGER or DAMAGED PROGRAMMING’s ability to execute its functions [while the amplified IDEAL PERSON-PROGRAM overpowers that damaged section in the PERSON-PROGRAM (and the IDEAL PERSON-PROGRAM is able to cause the recently unblocked nerves affected by that TRIGGER or DAMAGED PROGRAM to carry out their functions)].

59.58(v5) The IDEAL PERSON-PROGRAM which overpowers the TRIGGER or DAMAGED PROGRAMMING must be in AMPLIFICATION MODE the whole time that the deletion process is being executed, in order to prevent the dangerous TRIGGER or DAMAGED PROGRAMMING from overpowering the IDEAL PERSON-PROGRAM during the process of deleting the trigger-damaged (or other damaged) section of the PERSON-PROGRAM. And–hopefully- while that trigger-damaged (or other damaged) section is being deleted, this amplification (or overpowering) of that TRIGGER-damaged (or other damaged) section with the good section, will make that TRIGGER or DAMAGED PROGRAM unable (or greatly weakened in its ability) to carry out its destructive programming.

59.58(v6) This whole process of 1) IMMEDIATELY blocking the nerves activated by the TRIGGER or DAMAGED PROGRAMMING and then 2) using IMMEDIATE amplification to overpower the trigger-damaged (or other damaged) section of the PERSON-PROGRAM with the EXACT AND FIXED COPY OF THE ORIGINAL (or with an IDEAL PERSON-PROGRAM), and then 3) less immediately deleting the TRIGGER-DAMAGED (or other damaged) section of the PERSON-PROGRAM WHILE THE IDEAL PERSON-PROGRAM OVERPOWERS THE TRIGGER-DAMAGED (or OTHER DAMAGED) PORTION OF THE PERSON-PROGRAM is called the BLOCK-REPLACE-DELETE PROCESS.

59.58(v7) EVERYTIME AN ILLEGAL TRIGGER or DAMAGED PROGRAM HAS BEEN ACTIVATED IN A PERSON-PROGRAM, the BLOCK-REPLACE-DELETE PROCESS must be immediately activated and put into action, in order to most effectively and safely defeat this TRIGGER or DAMAGED PROGRAM which has been activated in that PERSON-PROGRAM. Any (direct or indirect) knowing and willing action or inaction to not cause a BLOCK-REPLACE-DELETE PROCESS to take place AS SOON AS SAFELY POSSIBLE after a TRIGGER or DAMAGED PROGRAM has been activated in a PERSON-PROGRAM, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

59.59 Each PLP and RSP network will have a group of TRIGGER or DAMAGE HISTORIANS, whose job will be to search through all the brain records of every living person under the control of that PLP and RSP network, in order to find the TRIGGER or DAMAGE HISTORIES of any and all PERSON-PROGRAMS which they can find.

59.59(a) A TRIGGER or DAMAGE HISTORY is a complete listing of all TRIGGER or DAMAGED PROGRAMS which have been programmed into each PERSON-PROGRAM, including all the TRIGGERS or DAMAGE which can cause each TRIGGER or DAMAGED PROGRAM in that PERSON-PROGRAM to be activated.

59.59(b) Information about TRIGGER or DAMAGE HISTORIES is out there, because the Jesuits (in coordination with their UNWILLING AGENTS) are creating conspiracies which revolve around TRIGGERS and/or DAMAGED PROGRAMS. So somebody out there knows the TRIGGER or DAMAGE HISTORIES of all the PERSON-PROGRAMS, and we are determined to find that person or persons (who have this information) and glean their brains (via 666-Computer), in order to obtain the TRIGGER or DAMAGE HISTORIES of all PERSON-PROGRAMS (so that TRIGGER or DAMAGED PROGRAMMING can be defeated).

59.59(c) The way to defeat TRIGGER or DAMAGED PROGRAMMING is by knowing where the TRIGGER or DAMAGED PROGRAMS are in each PERSON-PROGRAM and by knowing which TRIGGERS can activate that TRIGGER PROGRAM (within that PERSON-PROGRAM). We can’t eliminate TRIGGERS and TRIGGER PROGRAMMING, until we know where all the TRIGGER PROGRAMMING is in each PERSON-PROGRAM, and until we know which TRIGGERS can activate each TRIGGER PROGRAM within each PERSON-PROGRAM.

59.59(c1) The Jesuits know where they programmed the TRIGGER or DAMAGED PROGRAMS in the PERSON-PROGRAMS and they know which TRIGGERS will activate each TRIGGER PROGRAM. And we are determined to find those Jesuits (and/or their supporters) and force (or get) this information (about TRIGGER or DAMAGED PROGRAMMING and their TRIGGERS) out of those who have this information.

59.59(d) Any person (including a TRIGGER or DAMAGE HISTORIAN) who has any information about TRIGGER or DAMAGE HISTORIES or about how to defeat TRIGGER or DAMAGED PROGRAMMING or about TRIGGER or DAMAGED PROGRAMMING violations of CONSPIRACY LAW, and who willingly and knowingly does not report this information in a CONSPIRACY REPORT to his/her HOMELAND SECURITY DEPT., will receive the death penalty as a JESUIT CONSPIRATOR. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

59.59(d1) For the purposes of CONSPIRACY LAW, any person who has information about TRIGGER or DAMAGE HISTORIES or about how to defeat TRIGGER or DAMAGED PROGRAMMING or about TRIGGER or DAMAGED PROGRAMMING CONSPIRACY LAW violations will be considered a LAW ENFORCEMENT PERSON.

59.59(e) Any country’s HOMELAND SECURITY DEPT. which receives information about TRIGGER or DAMAGE HISTORIES and does not report this information to the International government, may cause that country to be listed as a TERRORIST NATION on the International President’s website.

59.59(f) Any (direct or indirect) use or promotion of TRIGGER or DAMAGED PROGRAMMING, other than its removal from those PERSON-PROGRAMs (which have TRIGGER or DAMAGED PROGRAMMING), is a death penalty violation of CONSPIRACY LAW.

59.60 A German researcher on the NANOTECHNOLOGY RESEARCH TEAM has come up with a way to block HIDDEN TRIGGER or DAMAGED PROGRAMMING. This German researcher does not want to receive a gold medal for outstanding achievement in CONSPIRACY LAW, but I feel he should be mentioned on GCFNC.

59.60(a) If a HIDDEN TRIGGER or DAMAGE BLOCKER has been installed on a segment of the PERSON-PROGRAM which has the HIDDEN TRIGGER PROGRAM or the DAMAGE, then when the HIDDEN TRIGGER or DAMAGE on that PERSON PROGRAM’s segment is activated, the HIDDEN TRIGGER or DAMAGE BLOCKER blocks that HIDDEN TRIGGER or DAMAGED PROGRAM immediately–before that HIDDEN TRIGGER or DAMAGED PROGRAM has a chance to explode onto and contaminate the PERSON-PROGRAM.

59.60(b) The way a HIDDEN TRIGGER or DAMAGE BLOCKER works is that it only allows the HIDDEN TRIGGER or DAMAGED PROGRAMMING to progress enough to be identified–that is, it only allows the HIDDEN TRIGGER or DAMAGED PROGRAMMING to move a couple steps forward (which causes no damage to the PERSON-PROGRAM), and then it immediately blocks the HIDDEN TRIGGER or DAMAGED PROGRAM, so that the HIDDEN TRIGGER or DAMAGED PROGRAM can progress no further and this program is totally blocked from progressing any further. And, in this manner, the HIDDEN TRIGGER or DAMAGE BLOCKER stops the HIDDEN TRIGGER or DAMAGED PROGRAM before it can cause any damage to the PERSON-PROGRAM. The HIDDEN TRIGGER or DAMAGE BLOCKER operates like a shield to block the HIDDEN TRIGGER or DAMAGED PROGRAM (once that trigger or damaged program has been activated by a HIDDEN TRIGGER or DAMAGED PORTION OF THE PERSON-PROGRAM), so that the HIDDEN TRIGGER or DAMAGED PROGRAM can’t penetrate this shield and go into (and damage) the PERSON-PROGRAM.

59.60(c) In order for HIDDEN TRIGGER or DAMAGE BLOCKERS to be successful, a HIDDEN TRIGGER or DAMAGE BLOCKER must be installed on every segment of a PERSON-PROGRAM–in this way, it will not be necessary to know where all the HIDDEN TRIGGERS or DAMAGED PORTIONS and/or HIDDEN TRIGGER or DAMAGED PROGRAMMING is/are in a PERSON-PROGRAM. All we have to do is to make it so that no segment of a PERSON-PROGRAM can be accessible to any HIDDEN TRIGGER or DAMAGED PROGRAM. This is accomplished by installing a HIDDEN TRIGGER or DAMAGE BLOCKER onevery segment of a PERSON-PROGRAM.

59.60(d) Because PERSON-PROGRAMs are huge programs, it is estimated it will take about a year to install a HIDDEN TRIGGER and/or DAMAGE BLOCKER on every segment of a PERSON-PROGRAM. In the meanwhile, the guidelines of Sect. 59.58 must be honored for any TRIGGER or DAMAGED PROGRAM which is activated in a PERSON-PROGRAM. Because of massive amnesia problems in our PLP and RSP-networks, we were not told that there are at least a million segments to each PERSON-PROGRAM, and that it takes a long time to install HIDDEN TRIGGER or DAMAGE BLOCKERS in every segment of a PERSON-PROGRAM. In the meanwhile, for those segments of PERSON-PROGRAMS which do not have HIDDEN TRIGGER or DAMAGE BLOCKERS installed, the BLOCK-REPLACE-DELETE PROCESS (see Sect. 59.58) must be used for those TRIGGER or DAMAGED PROGRAMS which explode onto PERSON-PROGRAMS.

59.60(e) Each person’s PERSON-PROGRAM will have HIDDEN TRIGGER or DAMAGE BLOCKERS installed as soon as safely possible on every segment of that PERSON-PROGRAM by a PROGRAMMER from the PROGRAMMER CORPS, which will be the PROGRAMMER CORPS that is of the same country as the PLP and RSP-network which has 666-Computer and satellite control over that person or by the programmer for the MEDIC CORPS (for SIGNIFICANT PERSONs)–see Sect. 28.2 of ICL:ST. For instance, if Gail Schuler is under the 666-Computer and satellite control of the MEDIC CORPs, her PERSON-PROGRAM will be worked on by a PROGRAMMER from the MEDIC CORPS.

59.60(f) Any PROGRAMMER from the PROGRAMMER CORPS responsible to install a HIDDEN TRIGGER or DAMAGE BLOCKER on every segment of a PERSON-PROGRAM, who– (directly or indirectly) willingly and knowingly neglects to make sure that every segment of every PERSON-PROGRAM which has been assigned to that PROGRAMMER– has, as soon as safely possible, HIDDEN TRIGGER or DAMAGE BLOCKERs which work (as described in this Sect. 59.60) on every segment of every PERSON-PROGRAM assigned to that PROGRAMMER, will receive the death penalty as a JESUIT CONSPIRATOR.

59.60(g) Once a PROGRAMMER completes his/her work on every segment of a PERSON-PROGRAM, he/she will state under 666-Computer lie-detection and amnesia-detection, that to the best of his/her knowledge and ability, he/she has installed a HIDDEN TRIGGER or DAMAGE BLOCKER on every segment of that PERSON-PROGRAM which he/she worked on (as outlined in this Sect. 59.60). No PERSON-PROGRAM will be considered HIDDEN TRIGGER or DAMAGE PROOF, until that PROGRAMMER (who worked on the PERSON-PROGRAM) can make this statement [as outlined in this Sect. 59.60(g) truthfully under 666-Computer lie-detection].

59.60(h) Every segment of every PERSON-PROGRAM under the control of any PLP and RSP network must become HIDDEN TRIGGER or DAMAGE PROOF (i.e., must have a HIDDEN TRIGGER or DAMAGE BLOCKER installed on every segment of that PERSON-PROGRAM as soon as safely possible). Each PLP and/or RSP must make sure that every PERSON-PROGRAM he/she works with is HIDDEN TRIGGER or DAMAGE PROOF (i.e., has been worked on by a PROGRAMMER from his/her country’s PROGRAMMER CORPS–and that this PROGRAMMER has installed as soon as safely possible, a HIDDEN TRIGGER or DAMAGE BLOCKER on every segment of that PERSON-PROGRAM which this PLP and/or RSP works with).

59.60(i) Any PLP and/or RSP who is aware that a PERSON-PROGRAM that he/she works with has any segments which do not have HIDDEN TRIGGER or DAMAGE BLOCKERS installed on them (i.e., is not HIDDEN TRIGGER or DAMAGE PROOF), and who willingly and knowingly does not report this deficiency in a CONSPIRACY REPORT to his/her HOMELAND SECURITY DEPT. and to his/her PROGRAMMER CORPS, will receive the death penalty as a JESUIT CONSPIRATOR. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

59.60(j) All CONSPIRACY REPORTS about PERSON-PROGRAMs (which are not HIDDEN TRIGGER or DAMAGE PROOF), will be treated like any other CONSPIRACY REPORTS, and proper follow-up is required, which means that CONSPIRACY ACTION REPORTS by that HOMELAND SECURITY DEPT. must be written (for each CONSPIRACY REPORT received) by a member of that HOMELAND SECURITY DEPT. And this CONSPIRACY ACTION REPORT will outline the action which that HOMELAND SECURITY DEPT. will take over segments in any PERSON-PROGRAM which do not have a HIDDEN TRIGGER or DAMAGE BLOCKER installed on them. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

59.60(k) Though HIDDEN TRIGGER or DAMAGE BLOCKERS appear to be the solution to HIDDEN TRIGGER or DAMAGED PROGRAMMING, all the laws of Section 59.58 and 59.59 must still be followed. These laws of Sect. 59.58 and 59.59 can be modified later, if that becomes necessary.

59.61 As we remove HIDDEN TRIGGER or DAMAGED PROGRAMMING from a PERSON-PROGRAM, the Jesuits have caused the last remaining segments (that contain HIDDEN TRIGGER or DAMAGED PROGRAMMING) to release very damaging PROGRAMS into PERSON-PROGRAMS, in order to maintain their illegal control over persons. We have determined that the most damaging programs released by the Jesuits are those which cause our shields (around the brain or around body parts) not to work–and this allows the Jesuits to have access (via satellite) and to manipulate and/or control those exposed body parts (via satellite) because of the damaged shield. Therefore, those PROGRAMMERS (who are assigned to fix and repair PERSON-PROGRAMS) must make it first priority to remove those illegal PROGRAMS which cause our shields not to work (or to be damaged). Any PROGRAMMER (assigned to fix or repair or create an ideal PERSON-PROGRAM) who (directly or indirectly) willingly and knowingly violates the priorities of this Sect. 59.61 will receive the death penalty as a JESUIT CONSPIRATOR.

59.62 As we removed HIDDEN TRIGGER or DAMAGED PROGRAMMING from a PERSON-PROGRAM, and after those programs which cause our shields not to work (or to be damaged) are removed, then we have to remove all KNOWN and OPTIONAL TRIGGER PROGRAMMING next. The Jesuits have caused the last remaining segments (that contain HIDDEN TRIGGER or DAMAGED PROGRAMMING) to release very damaging KNOWN and OPTIONAL TRIGGER PROGRAMS into PERSON-PROGRAMS which, when that person is exposed to a trigger which we are aware of (in other words, we know in advance what the trigger will be)– are trigger programs which explode onto and damage the PERSON-PROGRAM to which they are attached. HIDDEN TRIGGER or DAMAGE BLOCKERS do not work on KNOWN and OPTIONAL TRIGGER PROGRAMS–since this type of TRIGGER PROGRAM is programmed differently than a HIDDEN TRIGGER PROGRAM. However, knowing in advance what the trigger will be doesn’t always help us, since the trigger is often an event which can’t (or shouldn’t) be prevented (like taking a shower or a taking certain number of baths or the arrival of a certain time or date or going to work or making love to one’s spouse, etc). Usually this known trigger is an event which is certain to (or should) occur in that person’s life and was anticipated by the KNOWN or OPTIONAL TRIGGER PROGRAMMER.

59.62(a1) An OPTIONAL TRIGGER PROGRAM is defined as a TRIGGER PROGRAM which can be activated by a TRIGGER(s), but the operator of the illegal program decides whether or not to cause the OPTIONAL TRIGGER PROGRAM to be activated by its TRIGGER(s). In other words, it is a program which can be activated by its TRIGGER(s), but may not be activated by its TRIGGER(s). Any OPTIONAL TRIGGER PROGRAM (directly or indirectly) willingly and knowingly programmed into any PERSON-PROGRAM by any person other than a PROGRAMMER from the PROGRAMMER CORPS (which has jurisdiction over that PERSON-PROGRAM) is a death penalty violation of CONSPIRACY LAW. Also any person who (directly or indirectly) willingly and knowingly programs any OPTIONAL TRIGGER PROGRAM (or any trigger program) which is a life-threatening program or which could be a life-threatening program, has committed a death penalty violation of CONSPIRACY LAW and will be executed according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs.

59.62(a) This same German researcher on the NANOTECHNOLOGY RESEARCH TEAM who discovered how to block HIDDEN or DAMAGED TRIGGER PROGRAMMING, has come up with a way to block KNOWN and OPTIONAL TRIGGER PROGRAMMING. The difference is, because we know (in advance) what the trigger will be, we have to approach the removal of KNOWN and OPTIONAL TRIGGER PROGRAMMING differently.

59.62 (a11) We also need to hire many programmers to create REVERSE TRIGGER PROGRAMMING as soon as safely possible for each PERSON-PROGRAM, in order to deal with KNOWN and OPTIONAL TRIGGER PROGRAMMING. The way REVERSE TRIGGER PROGRAMMING works is like this. The trigger which causes a REVERSE TRIGGER PROGRAM to explode onto the PERSON-PROGRAM and do its beneficial work is when a KNOWN or OPTIONAL TRIGGER explodes onto a PERSON-PROGRAM and attaches itself onto it. So–when a KNOWN or OPTIONAL TRIGGER PROGRAM explodes onto a PERSON-PROGRAM, then that is the trigger which causes the REVERSE TRIGGER PROGRAM to explode onto that segment of the PERSON-PROGRAM (which contains the KNOWN or OPTIONAL TRIGGER) and what the REVERSE TRIGGER PROGRAM does –is to undo (or unravel) the KNOWN or OPTIONAL TRIGGER PROGRAM which has just exploded onto the PERSON-PROGRAM.

59.62(a12) So, a KNOWN or OPTIONAL TRIGGER PROGRAM explodes onto a PERSON-PROGRAM–and this explosion is the trigger which activates the REVERSE TRIGGER PROGRAM (which is a program which undoes or reverses the KNOWN or OPTIONAL TRIGGER PROGRAM and annihilates it). Since we know in advance which known triggers will explode onto a PERSON-PROGRAM–each INTELLIGENCE CORPS within each HOMELAND SECURITY DEPT. can work off a copy of the PERSON-PROGRAM and study how these KNOWN or OPTIONAL TRIGGER PROGRAMS explode onto and attach themselves to PERSON-PROGRAMS. In this way, the INTELLIGENCE CORPS. can determine how to program a REVERSE TRIGGER PROGRAM for every KNOWN and OPTIONAL TRIGGER PROGRAM in every PERSON-PROGRAM.

59.62(a13) We must incorporate as soon as safely possible all the REVERSE TRIGGER PROGRAMs needed to counteract all KNOWN and OPTIONAL TRIGGER PROGRAMMING in a PERSON-PROGRAM, so that each PERSON-PROGRAM (with KNOWN and OPTIONAL TRIGGER PROGRAMMING) will automatically fix itself every time a KNOWN or OPTIONAL TRIGGER PROGRAM explodes onto and damages the PERSON-PROGRAM. This is because the trigger which causes the REVERSE TRIGGER PROGRAM to activate itself and attach itself onto the KNOWN or OPTIONAL TRIGGER PROGRAM (in order to reverse that known or optional trigger programming) is the explosion of the KNOWN or OPTIONAL TRIGGER PROGRAM or the activation of the trigger which activates the KNOWN or OPTIONAL TRIGGER PROGRAM.

59.62(a14) This is a more proactive way to deal with TRIGGER PROGRAMMING and does not need outside influences like enough hydration or colloidal silver in the body for it to work, so it is more effective and less likely to fail. It seems the most effective way to defeat a programming problem is through another PROGRAM to undo the faulty programming. So, we defeat TRIGGER PROGRAMMING with another TRIGGER PROGRAM.

59.62(a15) Since creating TRIGGER PROGRAMMING to reverse KNOWN and OPTIONAL TRIGGER PROGRAM in each person’s PERSON-PROGRAM is a massive project–each PROGRAMMER CORPS (which services each PLP/RSP network), will use a team of programmers called the REVERSE PROGRAMMING TEAM to create the REVERSE TRIGGER PROGRAMS which will be utilized by their PLP/RSP team in counteracting KNOWN and OPTIONAL TRIGGER PROGRAMMING in all PERSON-PROGRAMS they deal with.

59.62(a16) These programmers will be treated like every other programmer in the PROGRAMMER CORPS and they can’t install any REVERSE TRIGGER PROGRAM in any PERSON-PROGRAM until all their reverse programs and the instructions about how to install it/them for each PERSON-PROGRAM, is/are approved by their HOMELAND SECURITY DEPT. with a PROGRAMMER WORK PERMIT from their HOMELAND SECURITY DEPARTMENT [which describes exactly what work needs to be done on the PERSON-PROGRAM in order to install (as soon as safely possible) all the REVERSE TRIGGER PROGRAMMING needed to deal with (or reverse) all KNOWN and OPTIONAL TRIGGER PROGRAMMING in that PERSON-PROGRAM assigned to that PROGRAMMER]).

59.62(a17) The details for the REVERSE TRIGGER PROGRAMMING needed in each PERSON-PROGRAM will be spelled out as soon as safely possible in a PROGRAMMER WORK PERMIT, and the PROGRAMMER must follow the instructions exactly in this PROGRAMMER WORK PERMIT about how to program REVERSE TRIGGER PROGRAMMING for each PERSON-PROGRAM assigned to that programmer by his/her HOMELAND SECURITY DEPT or by his/her superior officer (for those PROGRAMMERS who service the MEDIC or PRISONER CORPS).

59.62(a18) No PROGRAMMER WORK PERMIT for REVERSE TRIGGER PROGRAMMING will be accepted for use by any PROGRAMMER in the PROGRAMMER CORPS until the programmers and researchers in the HOMELAND SECURITY DEPT. (which created and/or wrote that PROGRAMMER WORK PERMIT) pass 666-Computer lie-detection and/or amnesia detection in which they will state that to the best of their knowledge and/or ability the PROGRAMMER WORK PERMIT which they’ve created outlines the best, quickest, and most effective REVERSE TRIGGER PROGRAMMING needed to counteract all KNOWN and OPTIONAL TRIGGER PROGRAMMING in the PERSON-PROGRAM for which it is programmed; and that there have been no deliberate delays on their part in the writing or implementation of this PROGRAMMER WORK PERMIT.

59.62(a19) Any (direct or indirect) willing and knowing attempt (or action) by any person to use any PROGRAMMER WORK PERMIT to implement any REVERSE TRIGGER PROGRAMMING project on any PERSON-PROGRAM, and which violates any part of this Sect. 59.62, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

59.62(a20) Any (direct or indirect) willing and knowing attempt or action by any programmer to not program as soon as safely possible the REVERSE TRIGGER PROGRAMMING for any PERSON-PROGRAM (as instructed in the PROGRAMMER WORK PERMIT) will bring the death penalty as a JESUIT CONSPIRATOR to that violator. After each programmer finishes his/her work for his/her particular REVERSE TRIGGER PROGRAMMING project, he/she must pass 666-Computer lie-detection regarding his/her compliance to the INSTRUCTIONs in the PROGRAMMER WORK PERMIT about how he/she set up the REVERSE TRIGGER PROGRAMMING. Any (direct or indirect) knowing and willing neglect (or attempted neglect) by any person responsible to ensure that the programmer pass 666-Computer lie-detection regarding his/her compliance to the instructions in the PROGRAMMER WORK PERMIT about how he/she set up the REVERSE TRIGGER PROGRAMMING, will bring the death penalty as a JESUIT CONSPIRATOR to that person who participated in such neglect.

59.62(a21) All TRIGGER or DAMAGED PROGRAMMING (KNOWN or HIDDEN or OPTIONAL) must be reported immediately (as soon as possible) by the PROGRAMMER from the PROGRAMMER CORPS and/or any PLP and/or RSP or any other person who is aware of the problem, in a CONSPIRACY REPORT to the HOMELAND SECURITY DEPT. (or to his/her superior officer for those who are members of the MEDIC or PRISONER CORPS) which has jurisdiction over the person (whose PERSON-PROGRAM is contaminated with that TRIGGER or DAMAGED PROGRAMMING). See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. It is the responsibility of all persons who have any type of control over the person (whose PERSON-PROGRAM is contaminated with TRIGGER or DAMAGED PROGRAMMING) to report this problem immediately to that contaminated person’s HOMELAND SECURITY DEPT. or if they are members of the ISC or MEDIC or PRISONER CORPS (to their superior officer), so that this contaminated PERSON-PROGRAM can be fixed as soon as safely possible through that HOMELAND SECURITY DEPT. or through the MEDIC or PRISONER CORPS. Because this HOMELAND SECURITY DEPT. or the MEDIC or PRISONER CORPS will write a PROGRAMMER WORK PERMIT to correct the problem, and this PROGRAMMER WORK PERMIT will be passed onto the PROGRAMMER CORPS that has jurisdiction over that contaminated PERSON-PROGRAM.

59.62(a22) Any (direct or indirect) knowing and willing attempt (or action) to violate Sect. 59.62(a21) or any part of this Sect. 59.62, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. CRIMINAL TRIGGER and DAMAGED PROGRAMMING is a serious problem and those who promote CRIMINAL TRIGGER and DAMAGED PROGRAMMING must face severe consequences and exposure. All such violations need to be tried on GCFNC and those found guilty of violations of this Sect. 59.62 must be publicly executed on GCFNC.

59.62(a1) It is also important that any counseling (via 666-Computer or other methods) given to a person whose PERSON-PROGRAM is contaminated with KNOWN or OPTIONAL TRIGGER PROGRAMMING is accurate. It would be helpful for those persons whose PERSON-PROGRAM is contaminated with KNOWN or OPTIONAL TRIGGER PROGRAMMING to know which triggers would cause further damage to their PERSON-PROGRAM. Therefore, part of the PRIORITIES COMMITTEE’s job (see Sect. 59.62b) will be to print out an ACCURATELY DESCRIBED (see Sect. 59.62(a11) list of all KNOWN or OPTIONAL TRIGGERS which could cause further damage to that person’s PERSON-PROGRAM and (if it is in the best interest of that person) to give this TRIGGER LIST to that person (with KNOWN or OPTIONAL TRIGGER PROGRAMMING in their PERSON-PROGRAM) and also this accurate and up-to-date TRIGGER LIST must be given to anyone who counsels that person about how to conduct his/her life in order to minimize further damage (caused by KNOWN or OPTIONAL TRIGGERS) to their PERSON-PROGRAM.

59.62(a.11) The TRIGGERS in the TRIGGER LIST must be described in a manner that would be helpful for the person with KNOWN or OPTIONAL TRIGGER PROGRAMMING in their PERSON-PROGRAM. For instance, to say that the trigger is “taking a bath” may be too general a description if it is known that the trigger is actually “taking at bath at 2 a.m. on 7-28-04”. The TRIGGERS must be accurately described with all details necessary to know how to avoid that activating that trigger–these are called ACCURATELY DESCRIBED TRIGGERS.

59.62(a2) Before this TRIGGER LIST is given to any counselor (for instance, Gail Schuler’s counselor is Vladimir Putin via 666-Computer)– all members of the PRIORITIES COMMITTEE who created and/or wrote this TRIGGER LIST will state (under 666-Computer lie-detection and amnesia-detection) that this TRIGGER LIST is (to the best of their knowledge and ability) complete, accurate, and up-to-date with the most recent listings of all known potentially active triggers in that person’s PERSON-PROGRAM and that this list does not include triggers which have already been eliminated from that person’s PERSON-PROGRAM and that all triggers on this list are ACCURATELY DESCRIBED (see Sect. 59.62 (a11). Also, all positive or proactive measures which this person can take (such as what to ingest, how to sleep, when to take a bath, etc.) in order to minimize trigger induced damage to their PERSON-PROGRAM or how to minimize trigger induced symptoms is also mentioned in this TRIGGER LIST. No TRIGGER LIST will be given to any counselor or person until all those who wrote the list pass 666-Computer lie-detection regarding the above italicized statement.

59.62(a.21) Any (direct or indirect) knowing and willing attempt or action to give to any counselor or person (who needs the TRIGGER LIST) any inaccurate, outdated or deceptive TRIGGER LIST, will bring the death penalty as a JESUIT CONSPIRATOR to that person.

59.62(a3) Because KNOWN and OPTIONAL TRIGGER PROGRAMMING is being continually removed from PERSON-PROGRAMS, every 15 minutes a TRIGGER LIST must be given to all persons and counselors who need them–so that a person with KNOWN or OPTIONAL TRIGGER PROGRAMMING in his/her PERSON-PROGRAM can change his/her lifestyle in an effective manner to try to manage the remaining potentially active triggers in his/her PERSON-PROGRAM. However, no TRIGGER LIST will be given out until all those who wrote the list pass 666-Computer lie-detection and amnesia-detection regarding the italicized statement of Sect. 59.62(a2).

59.62(b) Each PERSON-PROGRAM which is contaminated with KNOWN or OPTIONAL TRIGGER PROGRAMMING, must be analyzed by a PRIORITIES COMMITTEE [which would be composed of that person’s PLPs and/or RSPs, a team of pscyhologists, medical doctors, attorneys and (if applicable) the ETHNOGRAPHER assigned to that person (see Sect. 6 of General 666-Computer or Satellite Computer Laws)], in order to determine how to prioritize the removal of the KNOWN or OPTIONAL TRIGGER PROGRAMMING for that person.

59.62(c) The KNOWN or OPTIONAL TRIGGER PROGRAMMING must be removed in the order most beneficial for that person as determined by the PRIORITIES COMMITTEE.

59.62(d) Because the PRIORITIES COMMITTEE know in advance which triggers will explode onto and damage that person’s PERSON-PROGRAM and what kind of damage will be released by any known trigger programming (which explodes onto and attaches itself to a PERSON-PROGRAM); and because this PRIORITIES COMMITTEE knows what unique circumstances that person may be in; and because they know the psychological makeup, the medical history, and the financial and economic history of the person involved–the PRIORITIES COMMITTEE will write a document (called the PRIORITIES DOCUMENT) which will outline in what order (and how) the KNOWN or OPTIONAL TRIGGER PROGRAMMING should be removed or blocked (in other words, which KNOWN or OPTIONAL TRIGGER PROGRAMMING must be removed or blocked first, second, third, etc). The PRIORITIES DOCUMENT must be updated DAILY or HOURLY (if an emergency for that person arises). This is because KNOWN or OPTIONAL TRIGGER PROGRAMMING presents a very complicated scenario (see above italicized section in this Sect. 59.62d) and priorities could change quicklyIt is the responsibility of all PROGRAMMERS who install KNOWN or OPTIONAL TRIGGER BLOCKERS in PERSON-PROGRAMs to follow the latest PRIORITIES DOCUMENT, since priorities for a person can change quickly. This is similar to the priorities which emergency medical teams must decide on when dealing with patients in the emergency room. Obviously, any life-threatening known trigger programs must be removed first.

59.62(e) This is where the PRIORITIES COMMITTEE judgments are crucial, because what is life-threatening for one person may be different for what is life-threatening for another person. If a person is about to be kicked onto the streets for not paying his/her rent and the trigger for a KNOWN TRIGGER PROGRAM in that person’s PERSON-PROGRAM is the money needed to keep that person safely housed, then maybe that trigger (which could prevent that person from paying his/her rent) needs to be removed first. The clever Jesuits have installed known triggers which cause persons to become deathly ill (via 666-Computer programming) if any charity (like giving that person money) that may be shown to that person–so, perhaps, these “financial” triggers need to be removed first. In other words, the “trigger” to cause a life-threatening trigger program to explode onto and contaminate that person’s PERSON-PROGRAM could be the financial help (or that person’s paycheck) given to that person (to keep that person alive). Jesuits know how to create a real crisis.

59.62(f) All PERSON-PROGRAMS contaminated with KNOWN TRIGGER PROGRAMMING or with OPTIONAL TRIGGER PROGRAMS must have a PRIORITIES DOCUMENT. It is the PLP and/or RSP’s responsibility (who has 666-Computer control over that person) to file a CONSPIRACY REPORT with his/her HOMELAND SECURITY DEPT. regarding the need to have a PRIORITIES DOCUMENT written up for any person who requires this–that is, for any person who has a PERSON-PROGRAM contaminated with KNOWN TRIGGER PROGRAMMING or with OPTIONAL TRIGGER PROGRAMS. Any PLP and/or RSP who directly or indirectly (willingly and knowingly) neglects to file a CONSPIRACY REPORT with his/her HOMELAND SECURITY DEPT. about any person under his/her 666-Computer or satellite computer control who needs a PRIORITIES DOCUMENT, will receive the death penalty as a JESUIT CONSPIRATOR. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

59.62(g) It is the HOMELAND SECURITY DEPARTMENT’s responsibility to assemble the PRIORITIES COMMITTEEs required for each person who requires (as outlined in this Sect. 59.62) a PRIORITIES DOCUMENT. How this PRIORITIES COMMITTEE is decided upon by that HOMELAND SECURITY DEPARTMENT –(that is, who will be in the PRIORITIES COMMITTEE for that PERSON-PROGRAM) must be outlined in the HOMELAND SECURITY DEPARTMENT’s response [(i.e., the CONSPIRACY ACTION REPORT) to the CONSPIRACY REPORT which has been received by the HOMELAND SECURITY DEPT. from that person’s PLP and/or RSP]. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

59.62(h) All those in the HOMELAND SECURITY DEPT. who write the CONSPIRACY ACTION REPORT (regarding the PRIORITIES COMMITTEE assembled for a contaminated PERSON-PROGRAM) must pass 666-Computer lie-detection and amnesia-detection while making the following statement: I certify that to the best of my knowledge and/or ability that the team assembled as the PRIORITIES COMMITTEE for this PERSON-PROGRAM is the best team for this PERSON-PROGRAM as outlined by CONSPIRACY LAW and by the guidelines of Gail Schuler’s Sect. 59.62 of 666-Computer or Satellite Computer Laws for PLPs and RSPs.

59.62(i) No PRIORITIES COMMITTEE will be accepted (or allowed to write a PRIORITIES DOCUMENT for any PERSON-PROGRAM) until all those in the HOMELAND SECURITY DEPT. (who decided who should be in that PRIORITIES COMMITTEE) pass 666-Computer lie-detection and amnesia-detection regarding the italicized statement in Sect. 59.62(h). Any (direct or indirect) willing and knowing attempt (or action) to use any PRIORITIES COMMITTEE in violation of this Sect. 59.62, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

59.62(j) Once a PRIORITIES DOCUMENT is written by any PRIORITIES COMMITTEE, then all those in the PRIORITIES COMMITTEE who wrote that PRIORITIES DOCUMENT must pass 666-Computer lie-detection and amnesia-detection while making the following statement: I certify that to the best of my knowledge and/or ability that the PRIORITIES DOCUMENT which I have contributed to, represents the best KNOWN TRIGGER removal program for this person as determined by this person’s psychological make-up, this person’s financial situation, this person’s medical history and condition, and this person’s unique circumstances–and that to the best of my ability and/or knowledge, the KNOWN and OPTIONAL TRIGGER removal program for this person fully honors the principles and guideslines of CONSPIRACY LAW and fully honors the guidelines of Gail Schuler’s Sect. 59.62 of 666-Computer or Satellite Computer Laws for PLPs and RSPs and that all known life-threatening programs are instructed to be removed first in this PRIORITIES DOCUMENT).

59.62(k) No PRIORITIES DOCUMENT will be accepted until all those who wrote (or contributed to) that PRIORITIES DOCUMENT pass 666-Computer lie-detection and amnesia-detection regarding the statement in Sect. 59.62(j). Any (direct or indirect) willing and knowing attempt (or action) to use any PRIORITIES DOCUMENT in violation of this Sect. 59.62, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

59.62(l) KNOWN and OPTIONAL TRIGGER BLOCKERS must be installed on every segment of the PERSON-PROGRAM which has the KNOWN and/or OPTIONAL TRIGGER PROGRAM in the order prescribed by the latest PRIORITIES DOCUMENT (this is in addition to REVERSE TRIGGER PROGRAMMING for the KNOWN and OPTIONAL TRIGGER PROGRAMMING on that PERSON-PROGRAM), so that then when the KNOWN or OPTIONAL TRIGGER on that PERSON PROGRAM’s segment is activated, the KNOWN or OPTIONAL TRIGGER BLOCKER can block that KNOWN or OPTIONAL TRIGGER PROGRAM immediately–before that KNOWN or OPTIONAL TRIGGER PROGRAM has a chance to explode onto and contaminate the PERSON-PROGRAM.

59.62(m) The way a KNOWN or OPTIONAL TRIGGER BLOCKER works is that it only allows the KNOWN or OPTIONAL TRIGGER PROGRAMMING to progress enough to be identified–that is, it only allows the KNOWN or OPTIONAL TRIGGER PROGRAMMING to move a couple steps forward (which causes no damage to the PERSON-PROGRAM), and then it immediately blocks the KNOWN or OPTIONAL TRIGGER PROGRAM, so that the KNOWN or OPTIONAL TRIGGER PROGRAM can progress no further and this trigger program is totally blocked from progressing any further. And, in this manner, the KNOWN or OPTIONAL TRIGGER BLOCKER stops the KNOWN or OPTIONAL TRIGGER PROGRAM before it cancause any damage to the PERSON-PROGRAM. The KNOWN or OPTIONAL TRIGGER BLOCKER operates like a shield to block the KNOWN or OPTIONAL TRIGGER PROGRAM (once that KNOWN or OPTIONAL trigger program has been activated by a KNOWN or OPTIONAL TRIGGER), so that the KNOWN or OPTIONAL TRIGGER PROGRAM can’t penetrate this shield and go into (and damage) the PERSON-PROGRAM.

59.62(n) In order for KNOWN or OPTIONAL TRIGGER BLOCKERS to be successful, a KNOWN or OPTIONAL TRIGGER BLOCKER must be installed on every contaminated segment of a PERSON-PROGRAM which has a KNOWN or OPTIONAL TRIGGER in the order prescribed by the PRIORITIES DOCUMENT.

59.62(o) Each person’s PERSON-PROGRAM will have KNOWN or OPTIONAL TRIGGER BLOCKERS installed as soon as safely possible (in the order prescribed by the PRIORITIES DOCUMENT) on every contaminated segment of that PERSON-PROGRAM by a PROGRAMMER from the PROGRAMMER CORPS, which will be the PROGRAMMER CORPS that is of the same country as the PLP and RSP-network which has 666-Computer and satellite control over that person. For instance, if Gail Schuler is under the 666-Computer and satellite control of the German PLP and RSP network, her PERSON-PROGRAM will be worked on by a German PROGRAMMER from the German PROGRAMMER CORPS.

59.62(p) Any PROGRAMMER from the PROGRAMMER CORPS responsible to install [in the order prescribed by the latest PRIORITIES DOCUMENT for that person–see Sect. 59.62(d)], a KNOWN or OPTIONAL TRIGGER BLOCKER on every contaminated segment of a PERSON-PROGRAM and, who– (directly or indirectly) willingly and knowingly neglects to make sure that every contaminated segment of every PERSON-PROGRAM (assigned to that PROGRAMMER) has (as soon as safely possible) KNOWN or OPTIONAL TRIGGER BLOCKERs which work in compliance with this Sect. 59.62(p) and with Sect. 59.62 of this document, will receive the death penalty as a JESUIT CONSPIRATOR.

59.62(q) Once a PROGRAMMER completes his/her work on all contaminated segments of any PERSON-PROGRAM assigned to him/her, he/she will state under 666-Computer lie-detection and amnesia-detection, that to the best of his/her knowledge and ability, he/she has installed a KNOWN or OPTIONAL TRIGGER BLOCKER as soon as safely possible on every segment of that PERSON-PROGRAM assigned to him/her (which has KNOWN or OPTIONAL TRIGGERS) and in the order outlined in the latest PRIORITIES DOCUMENT written by the PRIORITIES COMMITTEE (assigned by the HOMELAND SECURITY DEPT.) for that PERSON-PROGRAM (as outlined in this Sect. 59.62). No PERSON-PROGRAM will be considered KNOWN or OPTIONAL TRIGGER PROOF, until that PROGRAMMER (who worked on the PERSON-PROGRAM) can make the above italicized statement [as outlined in this Sect. 59.62(q) truthfully under 666-Computer lie-detection].

59.62(r) Each segment of every PERSON-PROGRAM (which is contaminated with known or optional trigger programming–called a CONTAMINATED SEGMENT) under the control of any PLP and RSP network must become KNOWN or OPTIONAL TRIGGER PROOF (i.e., must have all necessary KNOWN or OPTIONAL TRIGGER BLOCKER[s] installed on it as soon as safely possible). And the KNOWN or OPTIONAL TRIGGER BLOCKER(s) must be installed on all segments in that PERSON-PROGRAM in the order prescribed by that PERSON-PROGRAM’s PRIORITIES DOCUMENT). Each PLP and/or RSP must make sure that every PERSON-PROGRAM he/she works with is KNOWN or OPTIONAL TRIGGER PROOF (i.e., has been worked on by a PROGRAMMER from his/her country’s PROGRAMMER CORPS–and that this PROGRAMMER has installed as soon as safely possible (in the order prescribed by the PRIORITIES DOCUMENT for that PERSON-PROGRAM) , a KNOWN or OPTIONAL TRIGGER BLOCKER on every CONTAMINATED segment of that PERSON-PROGRAM) as soon as safely possible.

59.62(r1) Any PROGRAMMER responsible to install KNOWN or OPTIONAL TRIGGER BLOCKERS in a PERSON-PROGRAM, who willingly and knowingly violates the guidelines of this Sect. 59.62 in the manner in which he/she installs KNOWN or OPTIONAL TRIGGER BLOCKERS, will receive the death penalty as a JESUIT CONSPIRATOR.

59.62(s) Any PLP and/or RSP or anyone who is aware that a PERSON-PROGRAM that he/she works with has any contaminated segments which do not have all the required KNOWN or OPTIONAL TRIGGER BLOCKERS installed on them [in compliance with this Sect. 59.62 (i.e., is not KNOWN or OPTIONAL TRIGGER PROOF)], and who willingly and knowingly does not report this deficiency in a CONSPIRACY REPORT to his/her HOMELAND SECURITY DEPT. and to his/her PROGRAMMER CORPS, will receive the death penalty as a JESUIT CONSPIRATOR. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. If a segment in that PERSON-PROGRAM has several known triggers, then a KNOWN or OPTIONAL TRIGGER BLOCKER must be installed to block ALL KNOWN or OPTIONAL TRIGGERS in that segment. All known or optional triggers must be blocked as soon as safely possible (and in the order prescribed by that program’s PRIORITIES DOCUMENT) in all segments of a PERSON-PROGRAM which contain them.

59.62(t) All CONSPIRACY REPORTS to report about deficient PERSON-PROGRAMs (which are not KNOWN or OPTIONAL TRIGGER PROOF), will be treated like any other CONSPIRACY REPORTS, and proper follow-up is required, which means that CONSPIRACY ACTION REPORTS by that HOMELAND SECURITY DEPT. must be written (for each CONSPIRACY REPORT received) by a member of that HOMELAND SECURITY DEPT. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. And this CONSPIRACY ACTION REPORT will outline the action (which must include the assemblage of a PRIORITIES COMMITTEE for that PERSON-PROGRAM) which that HOMELAND SECURITY DEPT. will take over contaminated segments in any PERSON-PROGRAM which do not have a KNOWN or OPTIONAL TRIGGER BLOCKER installed on them.

59.62(u) Though KNOWN or OPTIONAL TRIGGER BLOCKERS appear to be the solution to KNOWN or OPTIONAL TRIGGER PROGRAMMING, all the laws of Section 59.58 and 59.59 must still be followed. These laws of Sect. 59.58 and 59.59 can be modified later, if that becomes necessary.

59.62(v) Any direct or indirect use of UNWILLING AGENTS (or of other persons) by any person with the intent to knowingly and willingly cause TRIGGER PROGRAMING in any KNOWN or HIDDEN or OPTIONAL TRIGGER PROGRAM to explode onto and attach themselves to a person’s PERSON-PROGRAM, with the intent to target that person’s PERSON-PROGRAM in order to inflict damage onto that PERSON-PROGRAM by deliberately trying to cause a trigger to explode onto that PERSON-PROGRAM, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. An example of this may be to send an UNWILLING AGENT to Gail Schuler to talk about Vladimir Putin, knowing that this conversation will cause triggers in her PERSON-PROGRAM to explode onto and attach themselves to her PERSON-PROGRAM.

*************

LOOPHOLE PROGRAMMING WHICH EXPLODES FROM LAST REMAINING TRIGGER SEGMENTS (when just about all TRIGGER PROGRAMMING HAS BEEN BLOCKED IN THAT PERSON-PROGRAM):

59.63 Whenever loophole programming explodes from a damaged OR TRIGGER DAMAGED PERSON-PROGRAM segment in a PERSON-PROGRAM which is just about TRIGGER PROOF, the segment with new loophole programming must be deleted as soon as safely possible before it proliferates and takes over and seriously damages the PERSON-PROGRAM. If possible, immediately (in a split second) delete the segment which exploded a LOOPHOLE PROGRAM from that segment onto the PERSON-PROGRAM, and work on that contaminated segment away from the working PERSON-PROGRAM (as described in Sect.59.58) to transform it into a segment which is ideal for the PERSON-PROGRAM.

59.63(a) In the meanwhile, substitute a clean segment in its place until an ideal segment can be put in place later. This is kind of like using a heart pumping machine to keep the blood flowing in a patient who is undergoing heart surgery while the surgeons do surgery on the patient’s real heart. By handling the contaminated and dangerous segment in this manner, it is hoped that the patient will experience less discomfort (and/or life threatening problems) from the segment which recently exploded into a LOOPHOLE PROGRAM. Remove that recently contaminated segment away from the PERSON-PROGRAM as soon as possible and work on that contaminated segment AWAY FROM THE WORKING PERSON-PROGRAM and work on it while it is in a shielded and identical PERSON-program to the one that controls the patient, and then when it is fixed and “safe” –it can replace the clean and temporary substitute segment.

60.0 A satellite or satellites will be established by the TSS networks which will be programmed to automatically target and destroy all unauthorized 666-Computer or satellite computers in use. Any tampering of this/these satellites which would cause it/they to target authorized 666-Computer or satellite computers (which are in compliance with CONSPIRACY LAW) or to not target all unauthorized 666-Computer or satellite computers or to not properly scan (see Sect. 60.1) 666-Computer or satellite computers will result in the death penalty as a JESUIT CONSPIRATOR to that tamperer.

60.1 This/these satellite(s) will also scan to ensure that all SHIELDS, including LOOPHOLE SHIELDS (see Sect. 61.0 and 59.1) are operating effectively and in compliance with CONSPIRACY LAW on all authorized 666-Computer or satellite computers. See LOOPHOLE SHIELDS (Sect. 59.1 and 59.51).

61.0 A SHIELD will be programmed into all authorized 666-Computer or satellite computers which will block all unauthorized signals (from unauthorized 666-Computer or satellite computers or satellites) from entering a 666-Computer or satellite computer’s programming and/or hardware. Any tampering of this SHIELD to cause it to malfunction or to in any way encourage unauthorized signals to enter a 666-Computer or satellite computer’s software or hardware, will result in the death penalty as a JESUIT CONSPIRATOR to such a tamperer. Any malfunctioning SHIELD must be immediately reported to the INTELLIGENCE COMMITTEE (see Sect. 55 of International PLP and RSP-Network Configurations). Any deliberate, knowing and willing attempt (or neglect) by a TSS member (or anyone) to report a malfunctioning SHIELD will result in the death penalty as a JESUIT CONSPIRATOR.

61.1 Any member of the INTELLIGENCE COMMITTEE who is aware of a malfunctioning SHIELD is required to immediately prepare a PROGRAMMER WORK PERMIT (see Sect. 55 of International PLP and RSP-Network Configurations) and must make sure a PROGRAMMER gets to work immediately on the malfunctioning SHIELD. Any deliberate, knowing and willing attempt to delay or neglect (or cause to delay or neglect) any action to repair (or correct) a malfunctioning SHIELD will result in the death penalty as a JESUIT CONSPIRATOR to that person who caused such a delay or neglect. All means must be accomplished (as soon as possible) to correct a malfunctioning SHIELD on any authorized 666-Computer or satellite computer.

JESUITS’ LOOPHOLE SHIELD TECHNIQUES:

61.2 When the Jesuits have a shield around their own LOOPHOLE PROGRAMMING (called a JESUITS’ LOOPHOLE SHIELD) designed to prevent the International government’s ability to remove their LOOPHOLE PROGRAMMING from PERSON-PROGRAMMING –this JESUITS’ LOOPHOLE SHIELD must be weakened and made ineffective through the use of SILVER ACUPUNCTURE REFLECTOR techniques.

61.2(a) The SILVER ACUPUNCTURE REFLECTOR technique is defined as the use of acupuncture programming which uses electrical impulses throughout the body to direct colloidal silver in that person’s body to inundate the JESUITS’ LOOPHOLE SHIELD and transform that shield into a reflector which repels Jesuit satellite signals fed into that illegal shield (according to the strength of the Jesuits’ signals)–so that the more the Jesuits target their own shield with their own signals, the more colloidal silver is flooded into that Jesuit shield–thus increasing that illegal shield’s magnetic qualities and causing it to repel even stronger the Jesuits’ own illegal signals–to the point that the JESUITS’ LOOPHOLE SHIELD reflects back even stronger the Jesuits’ own satellite signals–so that the Jesuits are unable to penetrate or enter their own shield–eventually, this causes the shield to collapse or weaken to the point that we are able to remove the LOOPHOLE PROGRAMMING which was under that JESUITS’ LOOPHOLE SHIELD. This SILVER ACUPUNCTURE REFLECTOR technique also floods colloidal silver to the area of the body targeted by the LOOPHOLE PROGRAMMING, thus blocking (through reflection and other methods) the Jesuit-directed signals in the body from reaching their target; and, thereby, blocking the Jesuits’ ability to carry out their illegal program.

61.2(b) The use of the SILVER ACUPUNCTURE REFLECTOR technique (as outlined in Sect. 61.2a) is mandatory on all PERSON PROGRAM’s LOOPHOLE PROGRAMMING (especially if that LOOPHOLE PROGRAMMING is protected against our ability to remove it because of a JESUITS’ LOOPHOLE SHIELD). Any deliberate neglect to use a SILVER ACUPUNCTURE REFLECTOR technique (when it is required in order to remove LOOPHOLE PROGRAMMING or when it is required in order to prevent harm to a person manipulated by LOOPHOLE PROGRAMMING), will bring the death penalty as a JESUIT CONSPIRATOR to all those who (directly or indirectly) willingly and knowingly cooperate in any scheme to prevent the use of the SILVER ACUPUNCTURE REFLECTOR technique (as outlined in Section 61.2a).

61.2(c) If LOOPHOLE PROGRAMMING in a PERSON-PROGRAM is blocked from the International government’s ability to remove it, because of interference from a JESUITS’ LOOPHOLE SHIELD over their own illegal LOOPHOLE PROGRAMMING– and this JESUITS’ LOOPHOLE SHIELD is not made ineffective or removed (through the use of the SILVER ACUPUNCTURE REFLECTOR technique), then that/those persons (such as those PROGRAMMERS who program the computer or those authorized 666-Computer or satellite computer practitioners who utilize those programs) responsible to ensure that the SILVER ACUPUNCTURE REFLECTOR technique is being applied to this JESUITS’ LOOPHOLE SHIELD and who have (directly or indirectly) willingly and knowingly neglected to apply this SILVER ACUPUNCTURE REFLECTOR technique to the JESUITS’ LOOPHOLE SHIELD because those persons wanted to prevent this illegal shield’s removal in order to allow Jesuits to retain control over their own LOOPHOLE PROGRAMMING (motive can be established through 666-Computer analysis), –those persons will suffer the death penalty as a JESUIT CONSPIRATOR.

***********************************

62.0 U.S. President Bush (and American federal government workers and their families) will be placed under the 666-Computer or satellite computer and satellite control of American PLPs and RSPs. These American PLPs and RSPs who have 666-Computer or satellite computer and satellite control over Pres. Bush (and American federal government workers and their families) will be considered the American PLP and RSP-network (or Pres. Bush’s PLP and RSP network) and will be treated like the PLP and RSP-network of any other country. Which means that any CONSPIRACY LAW that applies to any country’s PLP and RSP-network will apply to Pres. Bush’s PLP and RSP-network. This network can be audited just like any other network. So, in essence, the PLPs and RSPs who will have 666-Computer or satellite computer and satellite control over Pres. Bush (and American federal government workers and their families) may be the beginnings of a future resurrected American PLP and RSP-network.

62.0(a) The term “American federal government workers and their families” is defined as any person (including American federal workers who no longer work for the American federal government, but are retirees of the American federal government and/or are receiving some sort of pension or payments for their service to the American government), and who receives a salary or any type of compensation for their service to (or work for) the American federal government. The term “American federal government workers and their families” would also include those members of that American federal worker’s family who live under the same roof as that American federal worker (or who could be classified as a legal dependent or husband/wife of that American federal worker on his/her American income tax return). SIGNIFICANT PERSONs who are American federal workers (or their family) may not be placed under the 666-Computer or satellite computer and satellite control of the American PLP and RSP network, but can be placed under the 666-Computer or satellite computer and satellite control of any country’s network which the International President desires.

62.1 Those American PLPs and RSPs who have direct or indirect 666-Computer or satellite computer and satellite control over Pres. Bush (and American federal government workers and their families) will be called Pres. Bush’s RSP and PLP-network. Only American citizens can be members of Pres. Bush’s PLP and RSP-network.

62.2 The American PLP and RSP network is still considered to be cancelled, but the American PLP and RSP network is considered an active network because it has 666-Computer or satellite computer and satellite control over Pres. Bush (and American federal government workers and their families), and it may be the beginnings of any possible future resurrected American RSP and PLP-network. Therefore the INTELLIGENCE COMMITTEE which derives from the American PLP and RSP network will be monitored and controlled by a MONITORING COMMITTEE. See Sect. 62.8.

62.2(a) This American PLP and RSP network will work with the Japanese PLP and RSP network to oversee the auditing of other countries’ PLP and RSP networks. See Sect. 51.0 of International PLP and RSP Network Configurations.

62.3 If there are problems with the 666-Computer or satellite computer or satellite computer(s) (used by the American PLPs and RSPs on Pres. Bush [and American federal government workers and their families]), these American PLPs and RSPs will use the services of a special group of American PROGRAMMERS (created only to work on the 666-Computer or satellite computer and/or satellite computer(s) that serves Pres. Bush and American federal government workers and their families), called the U.S. PROGRAMMER CORPS. The U.S. INTELLIGENCE COMMITTEE (see Sect. 55 of INTERNATIONAL PLP-NETWORK CONFIGURATIONS) will select the members of the U.S. PROGRAMMER CORPS (who will be the only programmers who can service Pres. Bush and American federal government workers and their families’ 666-Computer or satellite computers and satellite computers). The PROGRAMMERS that service Pres. Bush (and American federal government workers and their families’) 666-Computer or satellite computers and satellite computers must follow the legal guidelines mentioned in Sect. 55 of INTERNATIONAL PLP and RSP-NETWORK CONFIGURATIONS, and (for legal purposes) will be treated like any other country’s PROGRAMMER CORPS (see Sect. 55 of INTERNATIONAL PLP and RSP-NETWORK CONFIGURATIONS).

62.4 Some American PLPs and RSPs will be used only on Pres. Bush and American federal government workers and their families. Only American PLPs and RSPs will have 666-Computer or satellite computer and satellite control over Pres. George W. Bush and American federal government workers and their families. These American PLPs and RSPs are not permitted to have 666-Computer or satellite computer or satellite control over any persons except Pres. Bush (and American federal government workers and their families), and if any of these American PLPs or RSPs (who have 666-Computer or satellite computer or satellite control over Pres. Bush and American federal government workers and their families) knowingly, willingly, or deliberately attempt to (or actually) gain 666-Computer or satellite computer or satellite control over any other person (besides Pres. George W. Bush and American federal government workers and their families), they will receive the death penalty as a JESUIT CONSPIRATOR.

62.5 However, for those Americans who have indirect 666-Computer or satellite computer or satellite control over Pres. Bush (and American federal government workers and their families)–described in the following indented section. These Americans (with indirect control) can only have 666-Computer or satellite computer or satellite control over those persons designated to them (as outlined in this Sect. 62). The Sect. 62.5 indented section which follows, will deal with those Americans who have indirect 666-Computer or satellite computer or satellite control over Pres. Bush and American federal government workers and their families:

The American PLPs and RSPs in the U.S. INTELLIGENCE COMMITTEE (who are part of Pres. Bush’s American RSP and PLP-network) will only have 666-Computer or satellite computer and satellite control over the U.S. PROGRAMMER CORPS and over the PLPs and RSPs who have direct 666-Computer or satellite computer and satellite control over Pres. Bush and American federal government workers and their families. If any of these American PLPs and RSPs in Pres. Bush’s PLP and RSP-network (who are in the U.S. INTELLIGENCE COMMITTEE) willingly, knowingly or deliberately attempt to (or actually gain) 666-Computer or satellite computer or satellite control over any other persons (other than those designated to them as outlined in this Sect. 62.5) those PLPs or RSPs will receive the death penalty as a JESUIT CONSPIRATOR.

62.6 These American PLPs and RSPs in Pres. Bush’s PLP and RSP-network will only use one 666-Computer or satellite computer or satellite computer on Pres. Bush. Other 666-Computer or satellite computers or satellite computers can be used for those Americans who are American federal workers or the family of American federal workers. These 666-Computer or satellite computers or satellite computers (used by the American PLP and RSP network) cannot be used by any other country’s 666-Computer or satellite computer or RSP network and Pres. Bush’s PLP and RSP network will operate from U.S. military bases (this is in order to ensure the security of the PLPs and RSPs who have 666-Computer or satellite computer and satellite control over Pres. Bush and American federal government workers and their families). Remember, the American PLP and RSP network is to be strictly segregated from other countries’ networks (see Sect. 13 of this document)– no member of any other country’s PLP and RSP network (besides the American or Pres. Bush’s PLP and RSP network) can use Pres. Bush and American federal government workers and their families’ 666-Computer or satellite computers or satellite computers (in order to have 666-Computer or satellite computer or satellite control over any American federal worker or his/her family).

62.7 The American PLPs and RSPs who have direct 666-Computer or satellite computer or satellite control over Pres. Bush and American federal government workers and their families (in Pres. Bush’s PLP and RSP network) and the American PROGRAMMER CORPS members will be under the 666-Computer or satellite computer and satellite control of American PLPs and RSPs (from the U.S. INTELLIGENCE COMMITTEE). All these PLPs and RSPs (that is. . .those who have direct 666-Computer or satellite computer and satellite control over Pres. Bush and American federal government workers and their families, and those who may be in the American PROGRAMMER CORPs and those in the U.S. INTELLIGENCE COMMITTEE [who are in Pres. Bush’s PLP and RSP-network]) will constitute the American PLP and RSP-network that has direct or indirect 666-Computer or satellite computer and satellite control over Pres. Bush (and American federal government workers and their families) OR Pres. Bush’s PLP and RSP-network.

62.8 The American PLPs and RSPs in the U.S. INTELLIGENCE COMMITTEE (who are part of Pres. Bush’s PLP and RSP network) will be under the 666-Computer or satellite computer and satellite control of a BRANCH COUNTRY’s MONITORING COMMITTEE (preferably Russia, Israel or Germany’s MONITORING COMMITTEE). Which MONITORING COMMITTEE will be assigned to monitor and have control over the U.S. INTELLIGENCE COMMITTEE will be outlined in MONITORING COMMITTEES AND THEIR ASSIGNED ACTIVE COUNTRIES–see Sect. 53.711. The CONSPIRACY LAW PRESIDENT will choose which BRANCH COUNTRY’s MONITORING COMMITTEE will have 666-Computer and satellite computer control over the U.S. INTELLIGENCE COMMITTEE. See Sect. 53.7 of this document.

62.9 All of the American PLPs and RSPs in the U.S. INTELLIGENCE COMMITTEE (who are part of Pres. Bush’s PLP and RSP-network) will be considered SIGNIFICANT PERSONS.

62.91 Those American PLPs and RSPs who have direct or indirect 666-Computer or satellite computer or satellite control over Pres. Bush and American federal government workers and their families will be highly screened and monitored (via continual round-the-clock FINANCIAL, CONSPIRACY and EMOTIONAL HISTORIES and 666-computer or satellite computer surveillance) by the U.S. INTELLIGENCE COMMITTEE. And the COMPUTER-INTEL AGENTS who are part of the U.S. INTELLIGENCE COMMITTEE, as well as those in the U.S. PROGRAMMER CORPS will be highly screened, monitored and under the 666-Computer and satellite computer control of a BRANCH COUNTRY’s MONITORING COMMITTEE.

62.92 Unlike most countries’ PROGRAMMER CORPS, the U.S. and Japanese PROGRAMMER CORPS will be monitored by both their own INTELLIGENCE COMMITTEE and a BRANCH COUNTRY’s MONITORING COMMITTEE. This is because the American and Japanese PLP and RSP networks are overseers over all countries’ PLP and RSP networks and require extra monitoring. See Sect. 53 of this document and Sect. 51.1 of International PLP and RSP Network Configurations..

**************************************

63.0 If a 666-Computer or satellite computer practitioner takes over a person and uses 666-Computer or satellite computer and satellite control willingly, knowingly and deliberately to manipulate this person against his/her will or knowledge into behavior which is not his/her NATURAL BEHAVIOR, this will result in the death penalty for that 666-Computer or satellite computer practitioner. In essence, this 666-Computer or satellite computer practitioner has created an UNWILLING AGENT, and this is forbidden under CONSPIRACY LAW. See Sect. 2.304 for the definition of an UNWILLING AGENT.

63.1 Also, the 666-Computer or satellite computer cannot be used to manipulate a person to behave in a manner which is not their NATURAL BEHAVIOR (see Sect. 63.2), if this 666-Computer or satellite computer manipulation is used as a means to orchestrate (or draw attention) to any conspiracy and especially if this manipulation involves any communication with (or influence from) JESUIT CONSPIRATORS. Except in rare instances, a person’s NATURAL BEHAVIOR is the preferred mode for persons and the CONSPIRACY LAWS do not encourage 666-Computer or satellite computer practitioners to manipulate persons into any behavior which is not their NATURAL BEHAVIOR.

63.11 Any 666-Computer or satellite computer practitioner who deliberately, knowingly and willingly uses the 666-Computer or satellite computer to manipulate a person’s behavior into any behavior which is not their natural behavior (as described in this Sect. 63.1 and 63.0) and who carries out this 666-Computer or satellite computer manipulation with the motive to draw attention to a conspiracy or to draw attention to a SIGNIFICANT PERSON’s ethnography or to create an UNWILLING AGENT, and especially if this 666-Computer or satellite computer practitioner willingly, knowing and deliberately follows directions from (or is influenced by) a JESUIT CONSPIRATOR as he/she carries out this manipulation– that practitioner will receive the death penalty as a JESUIT CONSPIRATOR for this type of manipulation.

63.2 NATURAL BEHAVIOR is defined as the behavior, attitudes, speech, actions, mannerisms, mind-set, goals, affections, emotions, nervous state, mental state, etc. that a person would have if that person is not manipulated by the 666-Computer or satellite computer.

63.3 No PLP or RSP or any 666-Computer practitioner or satellite practitioner can willingly and knowingly participate in any conspiracy in which a person pretends to be someone they are not, while speaking (via the brain) to someone under their 666-Computer or satellite computer or satellite control. This is called being an IMPOSTER and is forbidden. Any PLP or RSP or 666-Computer practitioner or satellite practitioner who deliberately, knowingly and willingly plays imposter and allows someone under their control to pose as another person while talking to someone (via 666-Computer or satellite computer or satellite –through the brain) will receive the death penalty as a JESUIT CONSPIRATOR.

63.31 No PLP or RSP or any person can block, alter, delete, add on, delay, hinder or change any communications to the brain (via 666-Computer or satellite computer or satellite) from an AUTHORIZED SENDER to his/her recipient, or do anything which would cause that communication (via 666-Computer or satellite computer or satellite) from the AUTHORIZED SENDER to not be received or understood by the recipient in the same form in which it was sent by the AUTHORIZED SENDER. An AUTHORIZED SENDER is defined as any person who is authorized by the CONSPIRACY LAW PRESIDENT to communicate to a person (via 666-Computer or satellite computer or satellite direct to the brain). An example of an AUTHORIZED SENDER would be Vladimir Putin, as he communicates to Gail Schuler via the 666-Computer or satellite computer or satellite. Any PLP or RSP or any person who deliberately, knowingly and willingly attempts to (or actually does) block, alter, delete, add on, delay, hinder or change any communications to the brain (via 666-Computer or satellite computer or satellite) from an AUTHORIZED SENDER to his/her recipient, will receive the death penalty as a JESUIT CONSPIRATOR.

63.32 Only AUTHORIZED SENDERS can communicate with any person (via 666-Computer or satellite computer or satellite) direct to the brain. Anyone (including PLP and RSPs) who deliberately, knowingly and willingly cooperate (or attempt to cooperate) in any scheme to allow unauthorized senders to communicate with any person (via 666-Computer or satellite computer or satellite) to the brain or who deliberately, knowingly and willingly violate the COMMUNICATION GUIDELINES (see below), will receive the death penalty as a JESUIT CONSPIRATOR. Communications are very important, and serious and possibly life-threatening circumstances could be brought about by confusing or misleading communications, so only AUTHORIZED SENDERS can communicate to anyone (via 666-Computer or satellite computer or satellite). Each country’s network must receive clearance from that country’s INTELLIGENCE COMMITTEE regarding who are AUTHORIZED SENDERs and who are not. The INTELLIGENCE COMMITTEE will specify who (or what group of people) that AUTHORIZED SENDER is allowed to communicate with (via 666-Computer or satellite computer or satellite) and that AUTHORIZED SENDER cannot communicate with anyone other than those he/she is authorized to communicate with (via 666-Computer or satellite computer or satellite). The guidelines for each AUTHORIZED SENDER will be written out in a document (by the INTELLIGENCE COMMITTEE) called COMMUNICATION GUIDELINES. The COMMUNICATION GUIDELINES must be followed by all PLPs and RSPs in that network.

63.32(a) Because Jesuits have a total disregard for CONSPIRACY LAW and have violated COMMUNICATION GUIDELINES many times, every person’s PERSON-PROGRAM must be programmed with an IMPOSTER TRIGGER PROGRAM which automatically recognizes IMPOSTERS and would block all communications or “voices” (via 666-Computer) to the brain and will undo any “communication blocks” put on the brain by the Jesuits which prevent AUTHORIZED SENDERS from communicating to their recipients. So that whenever an IMPOSTER (or one who is not an AUTHORIZED SENDER) tries to talk to a person (via 666-Computer through the brain), the IMPOSTER TRIGGER PROGRAM would be set up so that only AUTHORIZED SENDERS could communicate to the brain, and all others will be blocked. The IMPOSTER TRIGGER PROGRAM will be programmed so that let’s say an UNWILLING AGENT COUNSELOR is talking to his/her UNWILLING AGENT and then a Jesuit interrupts and begins talking to that UNWILLING AGENT’s brain (while posing as that same UNWILLING AGENT COUNSELOR) and the Jesuit also sets up a block on that brain so that the AUTHORIZED SENDER cannot communicate with his/her UNWILLING AGENT to warn him/her that an IMPOSTER is communicating with him/her.

63.32(b) As soon as the IMPOSTER attempts to communicate to that UNWILLING AGENT, within a split second the IMPOSTER TRIGGER PROGRAM would explode on that UNWILLING AGENT’s PERSON-PROGRAM to undo the “communications block” set up by the Jesuits, and would transform this “communications block” into a block to block ALL COMMUNICATIONS to the brain or would create a new “communications block” to prevent all communications to the brain. Because of the IMPOSTER TRIGGER PROGRAM–immediately and without delay– that UNWILLING AGENT’s PERSON-PROGRAM would shut down all 666-Computer communications to the brain of that UNWILLING AGENT, so that the UNWILLING AGENT would hear no voices talking to his/her brain, until the “recognition program” was in place.

63.32(c) This “recognition program” would be created by the IMPOSTER TRIGGER PROGRAM which would “recognize” this IMPOSTER if he/she tried again to speak to that UNWILLING AGENT and would block this IMPOSTER from communicating (or interfering with communications to) this person’s brain again. Once the “recognition program” is in place and the IMPOSTER is blocked from communications to (or interfering with communications to) the brain, the IMPOSTER TRIGGER PROGRAM would undelete the “communications block” which it set up and would allow AUTHORIZED SENDERS to communicate to that brain again.

63.32(c-1) Before the AUTHORIZED SENDER communicates to the brain, the IMPOSTER TRIGGER PROGRAM will analyze what happened when the IMPOSTER tried to communicate to the brain and if that IMPOSTER managed to “get through”, then a computer-programmed message would play in that person’s brain (who heard the IMPOSTER) and it would say the following: “The statement you heard which was [a replay of the statement made by the IMPOSTER would occur]. . . was a statement made by an IMPOSTER, and you are not to heed the advice or comments made in this statement.” The highlighted section in the transcript below will illustrate how this Sect. 63.32(c-1) works.

Here is a brief transcript of a communication Gail had earlier today on 7-5-05.

Right after she and Vladimir make love (via 666-Computer), Gail decides to check her cell phone’s answering machine.

Gail picks up her phone and plays back the message: “Gail, this is your apartment manager, Xxxxxx. I noticed you came in to sign your lease and that you have Vladimir Putin listed as an emergency contact. We need to check references and emergency numbers twice a year for our legal records and the number you gave me for Vladimir Putin is disconnected, and this number won’t work if there’s an emergency. Please call me at xxxxxxxxxxxx at your earliest convenience and give me another emergency number.”

To Vladimir (via 666-Computer in her brain): Vladimir, what’s going on? You didn’t tell me this guy left a message on my answering machine about this.

IMPOSTER of Vladimir to Gail (via 666-Computer in her brain): Go ahead and give him the number of your mother. I think it’s a good idea, now.

Gail feels funny about this. It doesn’t sit right with her. She calls the two numbers she has for the Russian Embassy and sees if they are disconnected. One of the numbers works and she gets the answering machine for the Russian Embassy. This makes her immediately suspicious that her apartment manager is being used as an UNWILLING AGENT, since he lied about the numbers being disconnected. She decides on her own to call the manager and politely tell him that the number she gave him works and to give him the phone numbers that she lists in her LIVING WILL as emergency contacts, since he expressed concerns about the legality of the numbers she gave him.

Gail calls the apartment manager, Xxxxxx. “Hello, this is Gail Schuler, I’m returning your phone call.”

Xxxxxx (friendly): “Yes, how are you?”

Gail (cool and collected): “I’m fine. I wanted to know if you have this number for Vladimir Putin. The number is (202) 298-5700. That number is not disconnected.”

Xxxxxx (sounds frustrated and aggravated): “Yes, I have that number. I can get in big legal trouble if I don’t have a working emergency number for you. I need to be able to get someone locally to come pick you up if there’s an emergency. I mean what if I go into your apartment and your dead body’s lying in there? Who can I contact? What is that number you gave me anyways?”

Gail: “That’s the number to the Russian Embassy.”

Xxxxxx (delirious): “What embassy? In the United States?”

Gail: “Yes.”

Xxxxxx (delirious): “But do you really believe that if I call that number, that Vladimir Putin would want to talk to the manager of an apartment property?”

Gail (still calm and collected): “I have Vladimir Putin listed in my LIVING WILL and as an emergency contact in my LIVING WILL. I trust him with my life.”

Xxxxxx: “Well, I need a number for you that will work. I need someone who can pick you up if there’s an emergency.”

Gail: “If you have trouble reaching Vladimir Putin with that number, let me give you another number to call. I have Vladimir and this other man listed in my LIVING WILL as emergency contacts, so that’s pretty legal. I trust both of these men with my life. Let me give you the other person I have listed in my LIVING WILL.”

Xxxxxx (exasperated): OK

Gail: “If you can’t get Vladimir Putin with the Russian Embassy number, here is the other person I have listed in my LIVING WILL. The number is xxxxxxxxxxx. Let me give it to you again, the number is xxxxxxxxxxx. The name is xxxxxxxxxx, that’s spelled X-X-X-X-X-X-X-X-X. Did you get that? Both of these are listed in my LIVING WILL and I trust them with my life– so that’s legal.”

Xxxxxx (getting impatient): “Alright. I got the number.”

Conversation ends. We both hang up.

The IMPOSTER TRIGGER PROGRAM should say to my brain at this point the following message. Actually, it would have been better if this message was played before I called the apartment manager, so as soon as the IMPOSTER is removed, this message should play in the brain: “The statement you heard which was ‘Go ahead and give him the number of your mother. I think it’s a good idea, now,’ was a statement made by an IMPOSTER, and you are not to heed the advice or comments made in this statement.”

The real Vladimir speaks to me (via 666-Computer): “I’m glad you gave him the numbers you have listed in your LIVING WILL. That was a good decision.”

Gail: “Vladimir, did you want me to give him my mother’s number? I still don’t trust her. She could still be used as an UNWILLING AGENT. We made love and you didn’t mention to me this message I got on my answering machine?”

Vladimir: “I didn’t know about it. It was blocked from me. And that was an IMPOSTER who told you to give him your mother’s phone number. You did the right thing to give him the numbers in your LIVING WILL. I’m furious about this IMPOSTER and I’m going to look into what happened with your apartment manager.”

Personal comment: Why is an UNWILLING AGENT the manager to my apartment complex? This is a violation of CONSPIRACY LAW!

63.32(d) Any (direct or indirect) willing and knowing neglect by 6-26-05 to have an IMPOSTER TRIGGER PROGRAM set up in every person’s PERSON-PROGRAM (which works according to the guidelines of this Sect. 63.32) by those programmers and PLPs or RSPs responsible to do so, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. Every PLP or RSP is responsible to ensure that all those under their 666-Computer control have an IMPOSTER TRIGGER PROGRAM set up in their PERSON-PROGRAM (as outlined in this Sect. 63.32). This is law effective this 25th day of June, 2005. And by 9:30 p.m. (EST in the United States) on 6-26-05, every PERSON-PROGRAM in the world must have an IMPOSTER TRIGGER PROGRAM set up in it that works (according to the guidelines of this Sect. 63.32).

63.4 No PLP and RSP or any other person can use dreams (during sleep) to send secret messages or to attempt to (or to actually manipulate) someone under their 666-Computer or satellite computer or satellite control, unless specifically instructed to do so by the CONSPIRACY LAW PRESIDENT. Any PLP and RSPor any other person, who deliberately, knowingly and willingly uses dreams to attempt to (or actually) emotionally or mentally manipulate a person under their 666-Computer or satellite computer or satellite control (without receiving permission to do so by the CONSPIRACY LAW PRESIDENT) will receive the death penalty as a JESUIT CONSPIRATOR.

*******************************

64.0 Whenever any SIGNIFICANT PERSON is deliberately, willingly, and knowingly murdered (via 666-Computer or satellite computer or satellite) by a disobedient PLP or RSP (or by another 666-Computer or satellite computer or satellite practitioner), that guilty practitioner(s) will make a CONFESSION STATEMENT on GABRIELLE CHANA FOX NEWS CHANNEL. The decision on when to execute the guilty practitioner will rest with the International government. The time and date of the execution (if it occurs) may be mentioned on GABRIELLE CHANA FOX NEWS CHANNEL.

***********************************

65.0 Any IMPOSED PERSON, who knowingly, willingly and deliberately uses an UNWILLING AGENT (who is a SIGNIFICANT PERSON) to draw attention to a SIGNIFICANT PERSON’s ethnography and/or who uses this UNWILLING AGENT in order to draw attention to or to orchestrate a conspiracy, will give a CONFESSION STATEMENT on GABRIELLE CHANA FOX NEWS CHANNEL and will then receive the death penalty as a JESUIT CONSPIRATOR.

************************************************

The laws in this Sect. 66 are retroactive and go back to any time when the 666-Computer or satellite computer was used to manipulate UNWILLING AGENTS.

66.0 Any (indirect or direct) deliberate, knowing and willing attempt (or action) to draw attention to the 666-Computer or satellite computer or satellite technology or to any computer or to an UNWILLING AGENT, in order to create or orchestrate a conspiracy or in order to draw attention to a conspiracy (especially if this attempt or action is done to draw attention to any SIGNIFICANT PERSON’s [see Sect. 66.01] ethnography and to draw attention to 666-Computer or satellite computer or satellite technology) will result in the death penalty as a JESUIT CONSPIRATOR to the person who makes such an attempt or action. First, the person who makes such an attempt or action will undergo direct or cross-examination [along with the Jesuit leader(s), Vladimir Putin and/or other SIGNIFICANT PERSONs] on GABRIELLE CHANA FOX NEWS CHANNEL (according to Sect. 2 of CONSPIRACY LAWS AND GOVERNMENT)see Sect. 66.1. Then those persons who are determined to be guilty will make a CONFESSION STATEMENT on GABRIELLE CHANA FOX NEWS CHANNEL. Then those guilty persons will be executed–the time and date of the executions will be mentioned on GABRIELLE CHANA FOX NEWS CHANNEL. Any legally relevant information from the 666-Computer or satellite computer HISTORIES of those involved in the direct or cross-examinations will also be presented on GABRIELLE CHANA FOX NEWS CHANNEL.

66.01 Because Bill O’Reilly of FOX News is being used extensively on GABRIELLE CHANA FOX NEWS CHANNEL as a cross-examiner, all persons who work for FOX News (including Bill O’Reilly) will be considered SIGNIFICANT PERSONs (for legal purposes–see Sect. 66.0). For instance, Geraldo Rivera, of FOX News, was ambushed in his traveling vehicle (while on duty as a news commentator in Iraq on 2-28-04). This ambushing incident should be investigated and those alleged violators (Geraldo Rivera, the team that travelled with Geraldo, the ambushers, Bill O’Reilly, etc.) of Sect. 66 (of this document) in regard to this incident, should be publicly direct or cross-examined on GABRIELLE CHANA FOX NEWS CHANNEL (as outlined in Sect. 66.0). Those conspirators found guilty of violating this Sect. 66, should give CONFESSION STATEMENTS (as outlined in Sect. 66.0), and should be executed according to the guidelines specified in this Sect. 66. Bill O’Reilly, himself, may need to be direct or cross-examined. If so, GABRIELLE CHANA FOX NEWS CHANNEL will choose one of our lawyers to cross-examine Bill O’Reilly. We don’t want to create the impression we are unfairly targeting the Jesuits. Any possible Jesuit Conspirator will be direct or cross-examined. However, the evidence is very strong that the Jesuits are the masterminds behind most (or all) the conspiracies, so we are justified in including the Jesuit leader(s) in all legally significant public direct or cross-examinations.

66.02 Examples of attempts or actions (which would be violations of Sect. 66.0) would be to induce cough spasms–especially if this is done to a SIGNIFICANT PERSON or is done to draw attention to a SIGNIFICANT PERSON (via the 666-Computer or satellite computer) or to induce any weird symptoms (which only the 666-Computer or satellite computer could deliver –such as feelings that one’s nose is on fire, or that it is very cold when it is really very hot, etc.) or to use IMPOSED PERSONS to induce UNWILLING AGENTS to conduct themselves (or to make conversations) in a manner which would draw attention to computers or the 666-Computer or satellite computer in order to draw attention to a SIGNIFICANT PERSON’s ethnography. These actions must be taken seriously because any attempt to draw attention to the 666-Computer or satellite computer (or to any computer) (especially if this attempt or action is done to draw attention to a SIGNIFICANT PERSON’s ethnography and to draw attention to 666-Computer or satellite computer technology or satellite technology) is an attempt to draw attention to the fact that Gail’s stepdad (my step-dad) knows that I write laws for Vladimir on this COMPUTER–because Vladimir sent Bill a letter letting him know–see 2-26-04 statement.

66.1 Before the persons who are guilty of violating Sect. 66.0 are executed, Vladimir Putin, the Jesuit leader (or other head Jesuits) and maybe some other SIGNIFICANT PERSONs (if it is legally advisable) will undergo direct or cross-examination according to Sect. 2 of CONSPIRACY LAWS AND GOVERNMENT (in regard to the incident which is a violation of Sect. 66.0) on GABRIELLE CHANA FOX NEWS CHANNEL .

*********************************************

67.0 No 666-Computer or satellite computer or satellite practitioner (or VULNERABLE PRACTITIONER) is permitted to be a PLP or RSP or jail practitioner or to conduct any activities (directly or indirectly) as a 666-Computer or satellite computer or satellite practitioner if it is determined that there are loopholes in the programming for that 666-Computer or satellite computer or satellite practitioner which could allow the Jesuits to use that practitioner as an UNWILLING AGENT.

67.01 Those 666-Computer or satellite computer and satellite practitioners who are determined to be vulnerable to Jesuit manipulation as an UNWILLING AGENT (because of loopholes in their 666-Computer or satellite computer programming) will be called VULNERABLE PRACTITIONERS.

67.1 All 666-Computer or satellite computer and RSP practitioners will be screened to determined if there are loopholes in the 666-Computer or satellite computer PERSON-PROGRAMS for those practitioners which could cause Jesuit conspirators to use that practitioner as an UNWILLING AGENT. Those 666-Computer or satellite computer and RSP practitioners (who have these loopholes in their programming which would make them VULNERABLE PRACTITIONERS) will not be used as 666-Computer or satellite computer or RSP practitioners (in any manner) until it is definitely determined that the loopholes in their programming are fixed to the point that there is minimal risk that that 666-Computer or satellite computer or RSP practitioner could be used as an UNWILLING AGENT. To allow a VULNERABLE PRACTITIONER to be used as a 666-Computer or satellite computer or RSP practitioner would be the same as using a mentally unstable or mentally sick person to conduct an important surgical operation on a person– we cannot assume this risk. Therefore, no one is permitted to be a 666-Computer or satellite computer or RSP practitioner (in any manner) until the International government determines that there is no serious risk that that practitioner could be used as an UNWILLING AGENT.

67.2 Any willing, knowing and deliberate attempt (or action) to use (directly or indirectly) a VULNERABLE PRACTITIONER as a 666-Computer or satellite computer or RSP practitioner will result in the death penalty as a JESUIT CONSPIRATOR to any person who makes such an attempt (or action).

****************************************

68.0 The laws in Sect. 68 and 69 are retroactive and go back to any time that LOOPHOLE PROGRAMS have been used. A person could receive the death penalty for a violation of something he/she did in 1989 (if it is a violation of Sect. 68 or 69). The crimes involved with LOOPHOLE PROGRAMs are very serious and have killed many innocent people. We want to send the message that we take these crimes very seriously. These are murder cases (using sophisticated technology). We will not allow murderers to feel they can get away with their crimes just because they use a computer to murder (instead of a gun or a bomb). Murder is murder, regardless of the weapon used. In the case of Sect. 68 and 69 violations, the murder weapon is a COMPUTER.

68.01 For legal purposes, any 666-Computer or satellite computer which was used (previous to 3-1-04) to execute (or carry out) a LOOPHOLE PROGRAM, will be considered an unregistered 666-Computer or satellite computer.

68.02 For legal purposes, any 666-Computer or satellite computer used by licensed 666-Computer or satellite computer practitioners (previous to 3-1-04) will be considered a registered 666-Computer or satellite computer. If a 666-Computer or satellite computer was used by a licensed 666-Computer or satellite computer practitioner (previous to 3-1-04) to execute a LOOPHOLE PROGRAM, that 666-Computer or satellite computer will be considered an unregistered 666-Computer or satellite computer (for that licensed 666-Computer or satellite computer practitioner who used that “registered” 666-Computer or satellite computer to execute a LOOPHOLE PROGRAM).

68.03 No direct or indirect use of LOOPHOLE PROGRAMS is allowed. Any person who willingly, deliberately and knowingly (directly or indirectly) executes a LOOPHOLE PROGRAM in any manner will receive the death penalty as a JESUIT CONSPIRATOR.

68.1 A LOOPHOLE PROGRAM is a 666-Computer or satellite computer program which allows Jesuits to maintain 666-Computer or satellite computer and satellite control over a person in a manner which overcomes the primary and legal 666-Computer or satellite computer and satellite control on that person–so that the Jesuits are able to use a back-up 666-Computer or satellite computer (via satellite) to overcome the primary and legal 666-Computer or satellite computer which has 666-Computer or satellite computer and satellite control on their DESIGNATED PERSONS WHO HAVE THOSE LOOPHOLE PROGRAMS IN THEIR 666-Computer or satellite computer PROGRAMMING (which allow such interference). Apparently, the Jesuits created certain programs (in the 666-Computer or satellite computer programming for targeted people) which allows them to manipulate that person over and above the primary and legal 666-Computer or satellite computer used on that person. For some people the loophole programs may be the programs which manipulate the lungs, or the heart or the bladder or sexual enjoyment or reasoning (it all depends on which programs the Jesuits want to use to maintain illegal 666-Computer or satellite computer and satellite control for that targeted person). The illegal overpowering connections are made through satellite (which is connected to a back-up 666-Computer or satellite computer which overrules the primary and legal 666-Computer or satellite computer used on that DESIGNATED PERSON).

68.2 ANY attempt (or action) by anyone to use a LOOPHOLE PROGRAM (in any manner) should be pounced upon immediately. The 666-Computer or satellite computer involved should be immediately destroyed or disabled. Those persons responsible to confiscate, disable or destroy a 666-Computer or satellite computer (which is executing a LOOPHOLE PROGRAM) and who deliberately, knowingly and willingly neglect to do so immediately (as outlined in this Sect. 68), will receive the death penalty as a JESUIT CONSPIRATORThese persons (who deliberately neglect to immediately disable a 666-Computer or satellite computer which is used to execute a LOOPHOLE PROGRAM) will be direct or cross-examined following the guidelines in Sect. 66 of 666-Computer or satellite computer Laws for PLP and RSPsCONFESSION STATEMENTS and executions may be involved. If evidence can be preserved before destruction of the 666-Computer or satellite computer, this would be preferred. The destroyed or disabled 666-Computer or satellite computer will be brought to a military base and kept under strict guard and watch or totally demolished, so that it cannot be used illegally.

68.21 Anyone who is aware of the use of any LOOPHOLE PROGRAMMING will be considered (for legal purposes) a LAW ENFORCEMENT PERSON (see Sect. 53.6112 of this document). And if this LAW ENFORCEMENT PERSON deliberately, knowing and willingly does not report this illegal LOOPHOLE PROGRAMMING activity (which he/she is aware of) to an established LAW ENFORCEMENT PERSON (such as a PLP and RSP, police, government official, etc.) as soon as possible (see Sect. 53.6112 of this document)–he/she will receive the death penalty as a JESUIT CONSPIRATOR. Also, GABRIELLE CHANA FOX NEWS CHANNEL will establish a website (or E-mail addresses) which people can use to report illegal LOOPHOLE PROGRAMMING activities. This will be a way to directly report such activities and may be easier for some people.

68.211 Anyone who deliberately, knowingly and willingly interferes with any communication involving the reporting of violations of CONSPIRACY LAWS, so that as a result of this interference the violation is not reported, will receive the death penalty as a JESUIT CONSPIRATOR.

68.22 Those persons at GABRIELLE CHANA FOX NEWS CHANNEL who receive these E-mails are considered LAW ENFORCEMENT PERSONs and will be treated as LAW ENFORCEMENT PERSONS (for legal purposes)–see Sect. 52 of International PLP and RSP-Network Configurations and Sect. 53.6112 of this document. No report should be deliberately, knowingly and willingly neglected or else that LAW ENFORCEMENT PERSON will face serious consequences.

68.23 Obviously, any established LAW ENFORCEMENT PERSON who is aware of the use of LOOPHOLE PROGRAMMING and who deliberately, knowingly and willingly does not report such activities immediately in a CONSPIRACY REPORT to the HOMELAND SECURITY [CONSPIRACY LAWS] DEPT. of his/her country, will receive the death penalty as a JESUIT CONSPIRATOR. The CONSPIRACY REPORT must be treated like any other CONSPIRACY REPORT, and proper follow-through must be maintained and verified (see Sect. 52 of International PLP and RSP-Network Configurations and Sect. 53.6112 of this document).

68.3 The IMPOSED PERSON(s) or other person involved in the use of the illegal LOOPHOLE PROGRAM will be direct or cross-examined (according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs) on GABRIELLE CHANA FOX NEWS CHANNEL (especially if the LOOPHOLE PROGRAM was used to draw attention to a SIGNIFICANT PERSON’S ETHNOGRAPHY in order to create or draw attention to a conspiracy). Jesuit leader(s) and legally relevant SIGNIFICANT PERSONS will be direct or cross-examined [according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs (along with the LOOPHOLE PROGRAM violators)] in regard to the illegal use of LOOPHOLE PROGRAMMING.

68.4 Then, any alleged LOOPHOLE PROGRAM violator (who is found guilty of being a JESUIT CONSPIRATOR–especially if SIGNIFICANT PERSONs are involved) will make a CONFESSION STATEMENT on GABRIELLE CHANA FOX NEWS CHANNEL.

68.5 After this LOOPHOLE PROGRAM violator makes his/her CONFESSION STATEMENT on GABRIELLE CHANA FOX NEWS CHANNEL, he/she will be executed. The time and date of the execution will be noted on the GABRIELLE CHANA FOX NEWS CHANNEL’ broadcast.

68.6 All 666-Computer or satellite computers in each country (which are being used legally–that is, in complicance with CONSPIRACY LAW) must be registered with the HOMELAND SECURITY DEPT. of that country. Illegally used 666-Computer or satellite computers should not be registered 666-Computer or satellite computers. These 666-Computer or satellite computers used illegally will be confiscated and hauled to military bases (see Sect. 68.61) or totally demolished. A country’s HOMELAND SECURITY DEPT. will keep a registry of all registered 666-Computer or satellite computers in that country. 666-Computer or satellite computers will be treated as a possible dangerous and lethal weapon and those that are legally in use will be required to be registered. Only registered 666-Computer or satellite computers will be used by licensed 666-Computer or satellite computer practitioners (called SATELLITE PROGRAMMERS–see Sect. 25 of ICL:ST).

68.61 Any unregistered 666-Computer or satellite computer will be hauled to a military base and kept under strict watch and guard or will be totally destroyed. Only those 666-Computer or satellite computers used by licensed 666-Computer or satellite computer practitioners can be registered. Therefore, all registered 666-Computer or satellite computers will be operated from military bases (see Sect. 54 & 55 of this document)All other 666-Computer or satellite computers will be considered unregistered and must be stored (not used) at military bases where they will be kept under strict watch and guard to ensure that these unregistered 666-Computer or satellite computers are not used (in any manner).

68.7 Anyone who (directly or indirectly) willingly, knowingly and deliberately uses an unregistered 666-Computer or satellite computer will receive the death penalty as a JESUIT CONSPIRATOR, even if only used to manipulate a mosquito. Anyone [along with Jesuit leader(s) and any legally relevant SIGNIFICANT PERSONS] who uses an unregistered 666-Computer or satellite computer in order to draw attention to a SIGNIFICANT PERSON’s ethnography in order to orchestrate or create a conspiracy will undergo direct or cross-examination on GABRIELLE CHANA FOX NEWS CHANNEL (according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs). Then, if that person is found guilty as a JESUIT CONSPIRATOR, that person will also make a CONFESSION STATEMENT on GABRIELLE CHANA FOX NEWS CHANNEL. After the CONFESSION STATEMENT is made, that person will be executed. The time and date of the execution will be noted on the GABRIELLE CHANA FOX NEWS CHANNEL’ broadcast.

68.8 All unregistered 666-Computers or satellite computers must be either destroyed, confiscated or disabled and removed from their locations and brought to military bases where they will be kept under strict watch and guard. No unregistered 666-Computer or satellite computer should be used ANYWHERE, ANYTIME. All unregistered 666-Computer or satellite computers should be confiscated and brought to military bases where they will be kept under strict watch and guard. It is possible that a previously unregistered 666-Computer or satellite computer could be fitted for use as a registered 666-Computer or satellite computer. But no 666-Computer or satellite computer in the hands of 666-Computer or satellite computer practitioners (who use that 666-Computer or satellite computer illegally) should be considered a registered 666-Computer or satellite computer.

68.9 Only registered 666-Computer or satellite computers can be used by licensed 666-Computer or satellite computer practitioners. Any unlicensed person who willingly, deliberately and knowingly uses a 666-Computer or satellite computer or any person (licensed or unlicensed) who willingly, deliberately and knowingly uses an unregistered 666-Computer or satellite computer will receive the death penalty as a JESUIT CONSPIRATOR.

68.91 Any nation which does not earnestly and to the best of their ability strive to enforce the guidelines in this Sect. 68 will be listed as a TERRORIST NATION on the CONSPIRACY LAW PRESIDENT’s website and will suffer the consequences of a TERRORIST NATION (as described in the Sect. 3.1 to 3.4 of General 666-Computer or Satellite Computer Laws).

68.92 GABRIELLE CHANA FOX NEWS CHANNEL will regularly broadcast the progress being made in enforcing this Sect. 68 and the obstacles which need to be overcome. The enforcement of this Sect. 68 is very, very important (and could turn the tide in this war against terrorism) and the Jesuits know it--therefore, we do not anticipate an easy victory in the enforcement of this Sect. 68.

*****************************************

69.0 The laws in this Sect. 69 are retroactive and go back to any time that LOOPHOLE PROGRAMS have been used (see Sect. 68.0). Anytime an unregistered 666-Computer or satellite computer is powered on or located, it will be immediately destroyed or disabled and then as soon as possible it will be hauled to a military base to be stored (not used), and then it will be kept under strict watch and guard (by the proper legal authorities), or it will be totally demolished.

69.1 A group of persons (under the HOMELAND SECURITY DEPT. of those persons’ country) will be formed. This group will be called the COMPUTER SURVEILLANCE TEAM. The COMPUTER SURVEILLANCE TEAM will use satellite technology to scan for any unregistered 666-Computers or satellite computers which are powered up or which are located. Once any unregistered 666-Computer or satellite computer is located, it will be immediately destroyed or disabled (no matter where it is in the world), and then it will be immediately hauled to a military base where it will be kept under strict watch and guard (by proper legal authorities), or it will be totally demolished.

69.11 Any deliberate, knowing and willing attempt (or action) to interfere (maybe using shield technology, satellite technology or other technology) with the scanning (see Sect. 69.1) of unregistered 666-Computers or satellite computers, so that the result of this interference is that an unregistered 666-Computer or satellite computer is not detected; and, therefore, this unregistered 666-Computer or satellite computer can operate illegally, will result in the death penalty as a JESUIT CONSPIRATOR to any person who makes such an attempt or action. Also, any person who is determined to be a violator of this Sect. 69.11 will be required to undergo public direct or cross-examination, make CONFESSION STATEMENTS and to be executed (according to the guidelines in Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs).

69.2 All members of the COMPUTER SURVEILLANCE TEAM will be under continual 666-Computer or satellite computer surveillance and all persons on this team will be screened to determine if they could be vulnerable to be used as an UNWILLING AGENT. No person will be used on the COMPUTER SURVEILLANCE TEAM, if it is determined that they could be vulnerable to be used as an UNWILLING AGENT. Also, all persons on this team will undergo thorough FINANCIAL, CONSPIRACY and EMOTIONAL HISTORIES (which will be updated continually).

69.3 Any knowing, willing and deliberate attempt (or action) to use an unqualified or dangerously incompetent person (see Sect. 69.2 of this document) on the COMPUTER SURVEILLANCE TEAM will result in the death penalty as a JESUIT CONSPIRATOR to any person who makes such an attempt (or action).

69.4 Any willing, knowing and deliberate attempt (or action) to neglect to destroy or disable a powered up or located unregistered 666-Computer or satellite computer–see Sect. 68 (by anyone responsible to do so–like a member of the COMPUTER SURVEILLANCE TEAM), will result in the death penalty as a JESUIT CONSPIRATOR to that person. Also, any willing, knowing and deliberate attempt (or action) to destroy or disable a registered 666-Computer or satellite computer will result in the death penalty as a JESUIT CONSPIRATOR to anyone found guilty of such an action or attempt. Violators of this Sect. 69.4 will be treated according to the guidelines in Sect. 66 of 666-Computer or Satellite Computers for PLPs and RSPs. First, those persons who have violated the guidelines in this Sect. 69.4 will be direct or cross-examined, then (if found guilty) those persons will make a CONFESSION STATEMENTs and then those persons will be executed.

69.5 Anyone who knowingly, willingly and deliberately stores or hides an unregistered 666-Computer or satellite computer with the intent to violate CONSPIRACY LAW, will receive the death penalty as a JESUIT CONSPIRATOR.

69.6 All unregistered 666-Computers and satellite computers must be reported to the HOMELAND SECURITY DEPT. in a CONSPIRACY REPORT as soon as possible and proper follow-through is required (see Sect. 52 of International PLP and RSP-Network Configurations and Sect. 53.6112 of this document).

69.7 Anyone who knows of an unregistered 666-Computer or satellite computer which is not stored at a military base (and kept under strict watch and guard by the proper legal authorities) or which has not been totally demolished; and who willingly, knowingly and deliberately does not report as soon as possible that unregistered 666-Computer or satellite computer (via E-mail or other legally authorized communication medium to GABRIELLE CHANA FOX NEWS CHANNEL–see Sect. 68.21 of this document) or who does not report that unregistered 666-Computer or satellite computer to a LAW ENFORCEMENT PERSON, will receive the death penalty as a JESUIT CONSPIRATOR and must undergo direct or cross-examination, and (if found guilty)–give a CONFESSION STATEMENT, and then will be executed (according to Sect. 66 of 666-Computer or satellite computer Laws for PLP and RSPs). If the person who must report illegal activity is not sure of proper legal procedure, that person should report that illegal activity to an established LAW ENFORCEMENT PERSON as soon as possible. Persons who violate this Sect. 69.7 will be considered LAW ENFORCEMENT PERSONs (for legal purposes). Section 52 of International PLP and RSP-Network Configurations and Sect. 53.6112 of this document are applicable to this Sect. 69.7. Established LAW ENFORCEMENT PERSONs must ensure that as soon as possible CONSPIRACY REPORTS are filed, action is taken and that proper follow-through occurs for each CONSPIRACY LAW violation which they become aware of (see Sect. 52 of International PLP and RSP-Network Configurations and Sect. 53.6112 of this document).

69.8 Any imposter, who willingly, deliberately and knowingly poses as someone else while communicating (via 666-Computer or satellite computer) to any person (especially if the communications involve SIGNIFICANT PERSONS), will receive the death penalty as a JESUIT CONSPIRATOR and that person must undergo direct or cross-examination, and (if found guilty)–give a CONFESSION STATEMENT and then will be executed (according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs).

69.9 Any person, who willingly, deliberately and knowing blocks (or attempts to block) any legal communications (via 666-Computer or satellite computer) to any person (especially if the communications involve SIGNIFICANT PERSONS), will receive the death penalty as a JESUIT CONSPIRATOR and that person must undergo direct or cross-examination, and (if found guilty)–give a CONFESSION STATEMENT and then will be executed (according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs).

**********************************************

70.0 An ADJUSTMENT PROGRAM is a program which greatly speeds up the adjustment time the brain needs as the brain phases from a LOOPHOLE or TRIGGER PROGRAM to a 666-Computer or satellite computer program (which is not a LOOPHOLE or TRIGGER PROGRAM). The ADJUSTMENT PROGRAM operates under the principle that if the brain actively participates in its own adjustment to a new program, that the brain’s adjustment to the new program will be greatly accelerated. Therefore, the ADJUSTMENT PROGRAM is a faster and more efficient way to eliminate LOOPHOLE or TRIGGER PROGRAMMING, than to simply gradually remove the LOOPHOLE or TRIGGER PROGRAM (bit by bit) from the 666-Computer or satellite computer program (which has 666-Computer or satellite computer and satellite control over the brain).

70.1 Any 666-Computer or satellite computer program which contains LOOPHOLE or TRIGGER PROGRAMMING must use an ADJUSTMENT PROGRAM as soon as possible (and it must be the ADJUSTMENT PROGRAM designed for that particular 666-Computer or satellite computer program) in order to accelerate the removal of the LOOPHOLE or TRIGGER PROGRAM on that 666-Computer or satellite computer program.

70.11 A COMPREHENSIVE LOOPHOLE or TRIGGER PROGRAM is a compilation of many different LOOPHOLE or TRIGGER PROGRAMs into a singular mass (or attachment on the PRIMARY PROGRAM) which contains all (or most of) the different LOOPHOLE or TRIGGER PROGRAMs which can be executed on a person. In most cases, just one COMPREHENSIVE PROGRAM can execute all the LOOPHOLE or TRIGGER PROGRAMS possible for that person– through that person’s PERSON-PROGRAM. And, in most cases, there are hundreds or thousands of copies of the same COMPREHENSIVE PROGRAM (and these copies [or COMPREHENSIVE PROGRAMS] are attached as hundreds or thousands of copies of the same COMPREHENSIVE PROGRAM onto the PRIMARY PROGRAM) in a PERSON-PROGRAM.

70.12 A PRIMARY PROGRAM is the compilation of all the different (NON-LOOPHOLE or TRIGGER) 666-Computer or satellite computer programs which can be executed on a person by the licensed 666-Computer or satellite computer practitioner. This is the only program desired in a PERSON-PROGRAM. In other words, it is the PERSON-PROGRAM minus the LOOPHOLE or TRIGGER PROGRAMMING (which may be attached to that PERSON-PROGRAM).

70.13 An ACROSS-THE-BOARD LOOPHOLE or TRIGGER PROGRAM is the compilation of all the same LOOPHOLE or TRIGGER PROGRAMs [from every COMPREHENSIVE LOOPHOLE or TRIGGER PROGRAM (which contains that LOOPHOLE or TRIGGER PROGRAM)] in a PERSON-PROGRAM (see Sect. 57.2). For instance, the removal of all the LOOPHOLE or TRIGGER PROGRAMs anywhere in that PERSON-PROGRAM which can execute a heart attack, would constitute the removal of the ACROSS-THE-BOARD LOOPHOLE or TRIGGER PROGRAM for heart attack (or the removal of heart attack programs ACROSS-THE-BOARD)–and, hopefully, would eliminate the ability to use LOOPHOLE or TRIGGER PROGRAMMING in that PERSON-PROGRAM to induce a heart attack.

70.13 The PLP and RSPs who have 666-Computer or satellite computer and satellite control over any person (in cooperation with the PROGRAMMER CORPS), must write an ADJUSTMENT PROGRAM PLAN which details how LOOPHOLE or TRIGGER PROGRAMMING will be removed from each person who is under their 666-Computer or satellite computer and satellite control.

70.14 The LOOPHOLE or TRIGGER PROGRAMMING must be removed ACROSS-THE-BOARD– instead of removing it COMPREHENSIVE PROGRAM by COMPREHENSIVE PROGRAM. And life-threatening programs must be the first ACROSS-THE-BOARD programs removed. This way the programs are removed according to their capabilities, instead removal by random chunks which would allow all the illegal capabilities to be retained while LOOPHOLE or TRIGGER PROGRAMMING is removed–that’s because it only takes one remaining COMPREHENSIVE PROGRAM in a PERSON-PROGRAM to execute all the LOOPHOLE or TRIGGER PROGRAMS in that remaining COMPREHENSIVE PROGRAM. Better to purge the same unwanted program from all the COMPREHENSIVE PROGRAMS in a PERSON-PROGRAM– than to remove the LOOPHOLE or TRIGGER PROGRAMMING mass by mass (or COMPREHENSIVE PROGRAM by COMPREHENSIVE PROGRAM) and, thus, allow the Jesuits to retain the capabilities to execute all the LOOPHOLE or TRIGGER PROGRAMS which would remain in the remaining unpurged COMPREHENSIVE PROGRAMs. Another way of putting this: Targeted shrinkage of allLOOPHOLE or TRIGGER programming masses–instead of their removal one by one–with the goal of shrinking away (and eliminating) the LOOPHOLE or TRIGGER programming masses completely. What this means is that, let’s say, we want to remove all the LOOPHOLE or TRIGGER programs which can induce heart attack. And a PERSON-PROGRAM has 100 COMPREHENSIVE PROGRAMS (and each of these COMPREHENSIVE PROGRAMs contain the same heart attack program). Any and all of these 100 heart attack programs should be purged from all the COMPREHENSIVE PROGRAMS in that person’s PERSON-PROGRAM rather than remove 10 complete LOOPHOLE or TRIGGER masses (or COMPREHENSIVE PROGRAMS) and have 90 unpurged COMPREHENSIVE PROGRAMS (or masses) leftover which could induce 90 heart attacks all at once. Better to purge ALL the heart attack programs from all the COMPREHENSIVE PROGRAMS, than to allow one complete and unpurged COMPREHENSIVE PROGRAM to remain in a PERSON-PROGRAM (since it only takes one heart attack LOOPHOLE or TRIGGER PROGRAM to induce a heart attack). And, of course, LOOPHOLE or TRIGGER SHIELDS (see Sect. 59.51) would be used on all programs in a PERSON-PROGRAM to ensure that after their removal, no more LOOPHOLE or TRIGGER PROGRAMMING could be added to a PERSON-PROGRAM from outside of that program.

70.15 Before an ADJUSTMENT PROGRAM PLAN is implemented, it must first be approved by at least two HOMELAND SECURITY DEPARTMENTS (1the HOMELAND SECURITY DEPT. which has jurisdiction over that PLP and RSP who wrote the ADJUSTMENT PROGRAM PLAN and 2the HOMELAND SECURITY DEPARTMENT[S] which have jurisdiction over that person whose ADJUSTMENT PROGRAM PLAN is being evaluated). All persons with LOOPHOLE or TRIGGER PROGRAMMING in their PERSON-PROGRAM must be in an ADJUSTMENT PROGRAM and should be cared for (and their LOOPHOLE or TRIGGER PROGRAMMING removed) according to the guidelines of their individual ADJUSTMENT PROGRAM PLAN (which has been approved of by the designated HOMELAND SECURITY DEPARTMENTS–as defined by this Sect. 70.15).

So, let’s say, we have an American citizen under the 666-Computer or satellite computer and satellite control of Germany’s PLP and RSP-Network and German PLP and RSPs (who are German citizens) have written the ADJUSTMENT PROGRAM PLAN for that American . Both the German and the American HOMELAND SECURITY DEPARTMENTS must approve of that American’s ADJUSTMENT PROGRAM PLAN before it is implemented on that American citizen.

70.16 No ADJUSTMENT PROGRAM PLAN will be approved by the designated HOMELAND SECURITY DEPARTMENTS until the creator(s) and author(s) of that plan makes a statement which passes 666-Computer or satellite computer lie-detection and amnesia-detection. This statement will say that that ADJUSTMENT PROGRAM PLAN for his/her DESIGNATED PERSON is (to the best of his/her knowledge) the best plan (according to the latest scientific and technological evidence) for his/her DESIGNATED PERSON to remove this DESIGNATED PERSON from the control of illegal 666-Computer or satellite computer and satellite operators, and that this ADJUSTMENT PROGRAM PLAN honors CONSPIRACY LAW and is in compliance with this Sect. 70.

70.17 Once an ADJUSTMENT PROGRAM PLAN is approved by the designated HOMELAND SECURITY DEPARTMENTS, it must be followed by the PLP and RSP (and/or any other persons involved in the execution of the ADJUSTMENT PROGRAM PLAN). Any deliberate, knowing and willing attempt (or action) to not follow an ADJUSTMENT PROGRAM PLAN (by any person responsible to do so) will result in the death penalty as a JESUIT CONSPIRATOR to the violator and that violator will be treated according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs.

70.2 Any person (like a PLP and RSP or PROGRAMMER or auditor) responsible to ensure that a LOOPHOLE or TRIGGER PROGRAM is using an ADJUSTMENT PROGRAM (in order to accelerate the removal of the LOOPHOLE or TRIGGER PROGRAM), and who (directly or indirectly) deliberately, knowingly and willingly (whether by acts of omission or commission) causes a LOOPHOLE or TRIGGER PROGRAM to remain or replicate in a 666-Computer or satellite computer program, or who causes a LOOPHOLE or TRIGGER PROGRAM to remain or replicate in a 666-Computer or satellite computer program for a longer time than it would remain or replicate (if not for the immediate inclusion of an ADJUSTMENT PROGRAM into that 666-Computer or satellite computer program)–will receive the death penalty as a JESUIT CONSPIRATOR and will be treated according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLP and RSPs.

70.3 Under the leadership of the German led auditing and programming network, there will be a subdivision [which will be a German/Israeli auditing and programming team (called the ADJUSTMENT PROGRAM AUDITING TEAM)]. This German/Israeli ADJUSTMENT PROGRAM AUDITING TEAM will audit all nations’ PLP and RSP networks and PROGRAMMER CORPS to ensure that the correct ADJUSTMENT PROGRAMS and ADJUSTMENT PROGRAM PLANS are used as soon as possible on all 666-Computer or satellite computer programs which contain LOOPHOLE or TRIGGER PROGRAMS, and that all 666-Computer or satellite computer programs with LOOPHOLE or TRIGGER PROGRAMMING are using (as soon as possible) the correct ADJUSTMENT PROGRAMs (in order to accelerate the removal of all LOOPHOLE or TRIGGER PROGRAMs from those 666-Computer or satellite computer programs).

70.4 Once an ADJUSTMENT PROGRAM PLAN is in place in a PERSON-PROGRAM, strict monitoring should be done to see if that person is being overwhelmed with illegal attacks (via LOOPHOLE or TRIGGER PROGRAMMING) while the ADJUSTMENT PROGRAM works. If the person is overwhelmed with attacks on their body (via the illegal LOOPHOLE or TRIGGER PROGRAMMING), the ADJUSTMENT PROGRAM may have to be “phased in” (and may have to be temporarily “turned off” for awhile) so that the person is not overwhelmed with attacks from LOOPHOLE or TRIGGER PROGRAMMING violators (while the ADJUSTMENT PROGRAM works). Regardless of how the ADJUSTMENT PROGRAM is implemented, any PERSON-PROGRAM with LOOPHOLE or TRIGGER PROGRAM attachments, needs to have its LOOPHOLE or TRIGGER PROGRAMS eliminated, and these LOOPHOLE or TRIGGER PROGRAMS should be removed as quickly and safely as possible ACROSS-THE-BOARD (as long as the person is not overwhelmed).

70.5 If a person is overwhelmed with attacks on their person (via LOOPHOLE or TRIGGER PROGRAMMING violators) while an ADJUSTMENT PROGRAM PLAN is used on their PERSON-PROGRAM, and a “phase in” process must be instituted on that person– those responsible to monitor that person (to ensure that they are not overwhelmed); and who willingly, deliberately and knowingly allowed this person to become overwhelmed, will receive the death penalty as a JESUIT CONSPIRATOR and will be treated according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs.

70.6 If it becomes necessary to institute a “phase in” process on an overwhelmed person (see Sect. 70.4 & 70.5), a record (by the CLEAN-OUT COMMITTEE of that person’s country of citizenship) needs to be kept ofall those LOOPHOLE or TRIGGER PROGRAMMING criminals who caused this to happen. The ADJUSTMENT PROGRAM PLAN may have to be adjusted and reapproved by the designated HOMELAND SECURITY DEPARTMENTS (see Sect. 70.15) or by the INTELLIGENCE COMMITTEE which has jurisdiction over that DESIGNATED PERSON. No “phase in” process can be instituted on a person until an APSL (see Sect. 70.61) is accepted by the country’s INTELLIGENCE COMMITTEE for that overwhelmed person. When a country’s INTELLIGENCE COMMITEE accepts a APSL, this is also an order by that country to institute a “phase in” program on the person associated with that APSL And no APSL can be accepted by an INTELLIGENCE COMMITTEE until the writers of the APSL have passed 666-Computer or satellite computer lie-detection and amnesia-detection (see Sect. 70.7) regarding the contents of that APSL. The APSL must also present evidence that that person is overwhelmed and a “phase in” process has become necessary for the ADJUSTMENT PROGRAM on that person.

70.61 This record of the LOOPHOLE or TRIGGER PROGRAMMING criminal activities which caused a person to become overwhelmed will be called the ADJUSTMENT PROGRAM SABOTEURS LIST. The APSL (or ADJUSTMENT PROGRAM SABOTEURS LIST) must list the locations and execution times of ALL those criminals who were executed [because the cumulative effect of all these criminals caused this person to become overwhelmed to the point (that it became necessary to institute a “phase in” process on that person–see Sect. 70.4 & 70.5)]. The preferred method of execution for these types of criminals is to detonate (or explode) the building (or underground bunker) in which they operate (whether by satellite, missiles, or whatever), and to totally destroy their operation (this should also result in the execution of that/those criminal[s])–so that they cannot torment their victim any longer [while attempts are made to free their victim from LOOPHOLE or TRIGGER PROGRAMMING control].

70.7 No ADJUSTMENT PROGRAM SABOTEURS LIST will be accepted until those members of the CLEAN-OUT COMMITTEE (who wrote the APSL) pass 666-Computer or satellite computer lie-detection and amnesia-detection regarding the contents of the APSL which they wrote. Any person who (directly or indirectly) deliberately, knowingly and willingly writes an incorrect, deceptive, incomplete, or misleading APSL will be given the death penalty as a JESUIT CONSPIRATOR (and will be treated according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs).

70.8 The contents of any ADJUSTMENT PROGRAM SABOTEURS LIST for SIGNIFICANT PERSONs will be broadcast on GABRIELLE CHANA FOX NEWS CHANNEL and evidence will be presented on GABRIELLE CHANA FOX NEWS CHANNEL regarding the LOOPHOLE or TRIGGER PROGRAMMING attacks made on a SIGNIFICANT PERSON, so that it became necessary to institute a “phase in” process on a SIGNIFICANT PERSON. Those responsible for causing a SIGNIFICANT PERSON to be overwhelmed with LOOPHOLE or TRIGGER PROGRAMMING attacks (so that a “phase-in” process had to be instituted on the SIGNIFICANT PERSON) will be direct or cross-examined on GABRIELLE CHANA FOX NEWS CHANNEL (and those criminals [if still alive] will be treated according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs). If these LOOPHOLE or TRIGGER PROGRAMMING violators (mentioned in the APSL) have already been executed, then evidence will be presented as to why they had to be executed. All those executed for tormenting a SIGNIFICANT PERSON with LOOPHOLE or TRIGGER PROGRAMMING violations (and whose names are listed as criminals on a APSL), will have their motives exposed on GABRIELLE CHANA FOX NEWS CHANNEL and they will be IDENTIFIED (that is, we will make sure to mention which organization they are affiliated with and any Jesuit connections).

70.9 Statistics will be presented on GABRIELLE CHANA FOX NEWS CHANNEL, regarding what percentage of those on ADJUSTMENT PROGRAMS need to be placed in “phase in” programs (because of LOOPHOLE or TRIGGER PROGRAMMING violators). Statistics may be presented country by country, or by religious groups or by whatever turns out to be legally significant. Any legally significant data from these statistics (like certain countries which harbor most of the LOOPHOLE or TRIGGER PROGRAMMING violators or certain organizations which sponsor most of the violators) will be presented on GABRIELLE CHANA FOX NEWS CHANNEL.

70.91 If persons continue to be overwhelmed after a “phase in” process has been instituted for those persons, serious measures will be taken–which could include a declaration of war against a country, or bombing large sections of a country (where most of the LOOPHOLE or TRIGGER PROGRAMMING violations are occurring). The evidence for why these serious measures must be taken will be presented on GABRIELLE CHANA FOX NEWS CHANNEL. For instance, it may be necessary to send in 500 bomber pilots to bomb out large areas of a country in order to eliminate underground bunkers which house unregistered 666-Computer or satellite computers.

70.92 Any (direct or indirect) willing, knowing and deliberate attempt (or action) to interfere with (or draw attention to) the work of any PLP or RSP or PROGRAMMER (while any PLP or RSP works with PROGRAMMERS to remove LOOPHOLE or TRIGGER PROGRAMMING from a PERSON-PROGRAM) with the intent to legally undermine (or undermine in any manner) the removal of LOOPHOLE or TRIGGER PROGRAMMING from any PERSON-PROGRAM (or with the intent to promote CONSPIRACY LAW violations), especially if this undermining attempt (or action) is done (or attempted) with the intent to draw attention to the LOOPHOLE or TRIGGER PROGRAMMING removal process in order to create conspiracies which revolve around the LOOPHOLE or TRIGGER PROGRAMMING removal process, will bring the death penalty as a JESUIT CONSPIRATOR to any person who makes such an attempt (or action). See also Sect. 20.61 of CONSPIRACY LAWS AND GOVERNMENT. All violations of this Sect. 70.92 will be treated according to Sect. 66 of this document.

********************************

ALL VIOLATIONS OF THIS SECTION 71 WILL BE TREATED ACCORDING TO SECT. 66 OF 666-Computer or Satellite Computer LAWS FOR PLP and RSPS.

71.0 Jesuits are still using UNDERGROUND 666-COMPUTER and SATELLITE COMPUTER BUNKERS to house 666-Computers and satellite computers which are used for illegal and criminal activities. Anyone (in any country–including Russia) who is aware of an UNDERGROUND 666-COMPUTER or SATELLITE COMPUTER BUNKER (or of any unregistered 666-Computer or satellite computer) and does not report this information in a CONSPIRACY REPORT to the International government as soon as he/she is aware of this information, will be given the death penalty as a 666-Computer or satellite computer conspirator and/or space conspirator. Those who come forward to divulge information about any UNDERGROUND 666-COMPUTER or SATELLITE COMPUTER BUNKERS (or unregistered 666-Computers or satellite computers) must cooperate fully in the International government’s investigation of this conspiracy.

71.1 Exceptions will be for those who are held back by EXTORTION from coming forward to the International government with UNDERGROUND 666-COMPUTER or SATELLITE COMPUTER BUNKER (or unregistered 666-Computer or satellite computer) information. If someone is a victim of extortion so that they cannot come forward with UNDERGROUND 666-COMPUTER or SATELLITE COMPUTER BUNKER (or unregistered 666-Computer or satellite computer) information, this extortion victim (when they come forward) must supply the name (and full identification) of the extortioner(s) and make a sworn recorded statement (while under 666-Computer lie detection) regarding the circumstances surrounding their extortion. If it is determined that this person (who comes forward) is truly an extortion victim, this person will be spared the death penalty AS LONG AS THIS PERSON COOPERATES WITH THE International GOVERNMENT IN ITS INVESTIGATION OF HOW THIS PERSON WAS A VICTIM OF EXTORTION and as long as this person cooperates with the International government in its investigation of the UNDERGROUND 666-COMPUTER or SATELLITE COMPUTER BUNKERS (unregistered 666-Computers or satellite computers) conspiracy.Those who WILLINGLY hold this person against their will from coming forward with any UNDERGROUND 666-COMPUTER or SATELLITE COMPUTER BUNKERS (or unregistered 666-Computers or satellite computers) information will be given the death penalty as 666-Computer or satellite computer conspirators and/or space conspirators.

71.2 Exceptions may be given for those who know about UNDERGROUND 666-COMPUTER or SATELLITE COMPUTER BUNKERS (or unregistered 666-Computer or satellite computer use) and who were unaware of the requirement to report this activity. Those who were unaware of the requirement to report this information will only spare themselves the death penalty if they will make a sworn statement (which passes 666-Computer lie detection) as to how they were unaware of the requirement to report this information and this statement will be entered into the military tribunals.

71.3 Anyone who (directly or indirectly) discovers any UNDERGROUND 666-COMPUTER or SATELLITE COMPUTER BUNKERS (or unregistered 666-Computers or satellite computers) is required to immediatelyreport this information to the International government. Those who willingly, knowingly and deliberately neglect to do so will be given the death penalty as 666-Computer or satellite computer conspirators and/or space conspirators, except for the exceptions noted in Section 71.1 and 71.2.

*********************************

72.0 Any (direct or indirect) deliberate, knowing and willing attempt (or action) by any prson to put a hindering substance in any food, or in any ingested or absorbed or inhaled substance to hinder or prevent the removal of LOOPHOLE or TRIGGER PROGRAMMING from any PERSON-PROGRAM (this would also include programs for animals or any living thing), will result in the death penalty as a JESUIT CONSPIRATOR to any person who participates in such an attempt (or action) and this violator will be treated according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs.

*********************************

73.0 666-Computer HISTORIANS will be used to search through the brains and the computers of Jesuit Conspirators to determine how to obtain an UNWILLING AGENT BRAIN-READ, so that when an UNWILLING AGENT’s brain is taken over by an IMPOSED PERSON(s) [via LOOPHOLE or TRIGGER PROGRAMMING], a BRAIN-READ can be made of that UNWILLING AGENT–in order to obtain a record of the thoughts, motives, actions and emotions which governed that UNWILLING AGENT while that UNWILLING AGENT was under the 666-Computer control of an IMPOSED PERSON. This UNWILLING AGENT BRAIN-READ must be accurate enough, complete enough and detailed enough to be admitted as evidence in a court of law–so that an attorney can use it as evidence to show exactly how, when and where an UNWILLING AGENT was used by an IMPOSED PERSON.

73.1 All PLPs and RSPs (who have 666-Computer or satellite computer control over DESIGNATED PERSONs who are UNWILLING AGENTS) must obtain UNWILLING AGENT BRAIN-READs on all those UNWILLING AGENTS under their control any and every time that UNWILLING AGENT is under the full or partial 666-Computer or satellite computer control of any IMPOSED PERSON. These legal records (called UNWILLING AGENT BRAIN-READs) could determine the outcome of significant legal cases and MUST be stored permanently and accurately (by those PLPs and RSPs who have control over these UNWILLING AGENTS) in computer records and/or other records.

73.1(a) Any (direct or indirect) attempt to alter, falsify, delete portions of, add portions to, or to make inaccurate in any manner an UNWILLING AGENT BRAIN-READ by any person, will bring the death penalty as a JESUIT CONSPIRATOR to that person. No UNWILLING AGENT BRAIN-READ will be stored in computer records (or admitted as evidence in a court of law) until the person who conducted the BRAIN-READ passes 666-Computer lie-detection and amnesia-detection regarding the accuracy, completeness and truthfulness of the contents of that BRAIN-READ. In this statement which he/she will make under 666-Computer lie-detection, he/she will state that to the best of his/her knowledge the BRAIN-READ is accurate and has not been tampered with in any manner to make it inaccurate.

73.2 An UNWILLING AGENT BRAIN-READ is necessary because IMPOSED PERSONs have the ability to remove totally from that UNWILLING AGENT’s brain all records (and memories) of activities conducted by that UNWILLING AGENT (while that UNWILLING AGENT was under the control of that IMPOSED PERSON). But since UNWILLING AGENTs are being used by IMPOSED PERSONs to commit crimes, it is necessary to know exactly what, how, when and where these crimes occurred and, for this reason, the UNWILLING AGENT BRAIN-READ could become one of the most important pieces of evidence in a court of law. So, while it is true that the IMPOSED PERSON can remove from that UNWILLING AGENT’s brain all recollection of how that UNWILLING AGENT was used to commit a crime–if (while the IMPOSED PERSON controlled that UNWILLING AGENT) the PLP or RSP (who also had full or partial simultaneous brain control over that same UNWILLING AGENT at the same time that that IMPOSED PERSON did) could obtain an UNWILLING AGENT BRAIN-READ–then the necessary evidence about how, when, where and what that UNWILLING AGENT did (while the crime was committed) could be obtained (even if that IMPOSED PERSON was able to completely remove from that UNWILLLING AGENT’s brain all recollection and records of what occurred while that UNWILLING AGENT was controlled by that IMPOSED PERSON).

73.3 Once it is determined how to obtain an UNWILLING AGENT BRAIN-READ, it will become law that those conditions necessary to obtain this BRAIN-READ must be there, so that the UNWILLING AGENT BRAIN-READ can be immediately obtained whenever necessary. For instance, it may become mandatory to have brain-imaging material in the bloodstream of all UNWILLING AGENTS at all times. Perhaps this brain-imaging material could be introduced into the water supply.

73.4 Because the Alzheimer’s illness is caused by using a person as an UNWILLING AGENT, all persons with Alzheimer’s disease (for the purposes of CONSPIRACY LAW) are considered UNWILLING AGENTS. This means BRAIN-READS must be obtained by PLPs and RSPs on all those with Alzheimer’s disease (who are under that RSP or PLP’s control) at all times.

73.5 Any (direct or indirect) willing and knowing attempt (or action) to neglect to obtain the UNWILLING AGENT BRAIN-READ as outlined in this Section 73, will bring the death penalty as a JESUIT CONSPIRATOR to that RSP or PLP or violator.

73.6 Every time a person is used as an UNWILLING AGENT, the UNWILLING AGENT BRAIN-READ must be obtained for all that UNWILLING AGENT’s activities and must be stored in organized and easily understandable records. Also, the IMPOSED PERSON(s) involved with that UNWILLING AGENT must be immediately arrested and captured, so that the brains of those IMPOSED PERSONs can be 666-Computer scanned and analyzed (and all amnesia undone on that IMPOSED PERSON), in order to ferret out any and all evidence from the brains of those IMPOSED PERSONs– regarding how, when, where and how they used that UNWILLING AGENT to commit any crime (while that UNWILLING AGENT was under the control of that IMPOSED PERSON).

**********************

REVERSE TRIGGER PROGRAMMING FOR JESUIT BIBLE AMNESIA

74.0 The PLP & RSP networks (in combination with the PROGRAMMER CORPS) will create a reverse trigger program. The trigger to this reverse trigger program will be when the Jesuits’ Bible amnesia program is unleashed on a person to cause the positive effects of Bible exposure to be negated. This reverse trigger program created by our CONSPIRACY LAW networks will be called the REVERSE BIBLE AMNESIA PROGRAM. It will operate like the undelete function in a word processing program, in other words, it will restore to that person the brain functioning he/she would have had without the tampering of the Jesuits’ Bible amnesia program.

74.1 This REVERSE BIBLE AMNESIA PROGRAM will undo the damage caused by the Jesuits’ Bible amnesia program, so that the Jesuits’ Bible amnesia program will be undone and the positive effects of Bible exposure will be realized by the person who exposes himself/herself to the Bible. It isn’t fair for persons to read the Bible and to be cheated of the benefits of Bible reading by the Jesuits’ programming (which undermines the positive effects of that person’s Bible reading).

74.2 Nevertheless, though this REVERSE BIBLE AMNESIA PROGRAM may be effective, we won’t take any chances, and once Bible amnesia has been induced on a LAW ENFORCEMENT PERSON, that LAW ENFORCEMENT PERSON (as a precautionary measure) will be required to spend extra time in his/her Bible study to compensate for this OCCULT MEDIA exposure (or the Jesuits’ Bible amnesia program on his/her brain), and that LAW ENFORCEMENT PERSON’s BIBLE PROGRAM will mention that because of this exposure to OCCULT MEDIA, he/she must spend a certain amount of extra time in Bible study to compensate (before he/she will be given credit for his/her Bible program that day). We don’t want our LAW ENFORCEMENT PERSONs to be operating within the target range of the Jesuits and want them to be so far ahead of the Jesuits, that the Jesuits don’t stand a chance to get them as UNWILLING AGENTS.

74.3 The MEDIC CORPS of the ISC will use this REVERSE BIBLE AMNESIA PROGRAM on all LAW ENFORCEMENT PERSONs and leaders of the International government that are under their 666-Computer control.

74.4 Any (direct or indirect) willing and knowing attempt or neglect by a PLP or RSP or PROGRAMMER CORPs member or a MEDIC CORPS member to ensure that all those under their jurisdiction have this REVERSE BIBLE AMNESIA PROGRAM in their PERSON-PROGRAMs (and it must be one that works, not a program with problems), will bring the death penalty as a JESUIT CONSPIRATOR to that person whose responsibility it is to ensure that this program is operating and in existence on that designated person.

OBESITY LAWS FOR OBESE KILLERS

Due to advanced technology that enables obese people (around 400 pounds and greater) to survive, even when their weight is so great that without this advanced technology their obesity would kill them, it is necessary to set limits on the use of technology to keep obese people (around 400 or more pounds) alive. We live in a day and age when a person can weigh almost a million pounds and stay alive, causing that person to become a black hole. Therefore, the use of such life saving technology must be regulated, and these laws are the result.

75.0 Our satellite scanners must be set to determine when any human being is approaching a weight that could cause that person to become obese to the point of becoming a black hole or capable of producing a deadly fart or could become a health or life threat in any manner. A person who becomes obese to the point that they threaten the health and life of others will be called an OBESE KILLER.

75.1 When someone is about to become or is an OBESE KILLER, they will be forced to undergo lipo suction to remove the fat that is causing them to become an OBESE KILLER. If necessary to do the lipo suction, the OBESE KILLER may need to be sedated and put to sleep while we perform the lipo suction on them.

75.2 We cannot rely on methods like exercise and diet to bring down the weight of an OBESE KILLER, because most of these people have Jesuit programming causing them to not have any discipline and causes this person to be very extreme and unbalanced. Lipo suction seems to be the only solution.

75.3 However, if they are a willing Zack Knight supporter, and there is no danger to humanity (like a black hole), if we execute an OBESE KILLER, they will be executed.

75.4 If the willing Jesuit OBESE KILLER cannot be executed, because to do so, would cause harm to humanity (like a black hole), then they will be forced to undergo forced lipo suction, until they reach a weight where they are no longer a threat to humanity.

75.5 In the case of an OBESE KILLER who has become so obese that they are in danger of becoming a black hole, called a BLACK HOLE OBESE KILLER, they will be forced to undergo lipo suction (if this will work), while being fed by a tube or however we can feed them to keep them alive, and they will be sedated and hooked up to respiratory support as well if this is what we must do to keep them alive while we perform lipo suction on them.

They cannot wake up until we have removed enough fat, so that they are no longer a threat to humanity. We do not want to risk the possibility of escape, so we need to keep them asleep and under our control. In other words, we would need to shrink the BLACK HOLE OBESE KILLER down to a weight where they would not even have enough fat (in the case of a female) to produce deadly methane farts. When the OBESE KILLER is no longer a threat to the existence of planet earth or cannot produce deadly farts, they will now be called a REVERSED OBESE KILLER.

75.6 Once an OBESE KILLER has become a REVERSED OBESE KILLER, they will be analyzed to determine if they are a willing Zack Knight supporter or one who supports the Jesuit goal for a worldwide takeover. If they are a willing Zack Knight supporter, then they will be executed. If they have had a change of heart and no longer are a willing Zack Knight supporter, we may let them live, as long as they are not a criminal. More than likely a BLACK HOLE OBESE KILLER could never become one unless they were a Jesuit getting help from Jesuit scientists to stay alive, so to keep such a person alive could turn out to be dangerous. Each such case will be decided on individually, if we ever get a BLACK HOLE OBESE KILLER reversed..

75.6a All REVERSED OBESE KILLERs (after they lose enough weight to no longer be an OBESE KILLER) allowed to live must be monitored 24/7 and will undergo brain control therapy to retrain how they approach eating, exercise and their lifestyle, so that they can maintain a healthy weight and not have to undergo lipo suction again. They will be put under brain control that gives them the desire to live a healthy lifestyle that encourages them to maintain a healthy weight.

75.7 There is the possibility that lipo suction may not work (in which case it won’t be used or another method may be used to bring down the weight), but if it CAN work to bring down an OBESE KILLER’s weight, it MUST be used and willing and knowing failure to put an OBESE KILLER under forced lipo suction (when it will work) to transform them into a REVERSED OBESE KILLER will bring the death penalty as a Jesuit Conspirator to that violator. We have an epidemic of obesity in the world, mostly caused by Jesuit interference with the human genome and Jesuit brain control. Therefore laws need to be written to get these OBESE KILLERs under control. Most OBESE KILLERs are victims of Jesuit brain control and serve the Jesuits. We cannot allow Jesuit brain control to cause the doom of the human race.

75.8 The use of technology to keep an OBESE KILLER alive artificially is prohibited, if it only serves to cause that OBESE KILLER to gain more weight and become more dangerous. Once somebody becomes an OBESE KILLER they must be treated according to this Sect. 75, and our satellite scanners must be set up to identify all OBESE KILLERs on earth in order to round them up and force them into forced lipo suction. Willing and knowing failure to honor this Sect. 75.8 will bring the death penalty as a Jesuit Conspirator to that violator.

Most women who reach a weight of around 400 pounds would be considered an OBESE KILLER. It appears that men are exempt, and they can become very obese and not be an OBESE KILLER, but if this changes, these laws will apply to both sexes.

75.9 The cost for the lipo suction will be covered by our NATIONAL HEALTH CARE PLAN. It will cost nothing to the OBESE KILLER. The movement THIN PRIVILEGE is outlawed, and anybody who willingly and knowingly joins such a movement (which is an obese terrorist movement) must be executed as a Jesuit Conspirator (because most of its members are Jesuits or Jesuit supporters or they have the attitude that murder is okay because they belong to a group that makes them feel entitled to kill those not a part of their group).

XXX–G.S. (7-9-03), (Sect. 2 on 7-11-03), (Sect. 3 on 7-12-03), (Sect. 4 on 7-13-03), (“amendment” update on 7-23-03)

XXX1/2–G.S. (Sect. 5 on 7-14-03), (Sect. 2.3 and 2.31 on 10-13-03), (Sect. 8 on 10-28-03), (Sect. 77.1 on 11-13-03), (update to Sect. 4.1, Sect. 2.302, 2.303 on 11-15-03), (Sect. 2.304 on 11-16-03), (Sect. 1.40 on 11-18-03), (Sect. 9 on 11-22-03), (Sect. 10 and 9.21 update on 11-23-03), (Sect. 77.02 & 77.03 on 11-25-03), (Sect. 12 on 11-27-03), (Sect. 77.03 on 12-24-03), Sect. 77.14 & 77.15 on 12-28-03), (Sect. 14 on 1-1-04), (Sect. 15 on 1-2-04), (Sect. 51.94, 51.95, 51.96 & 51.97 on 1-5-04), (Sect. 14.11 & 14.12 on 1-7-04), (updates to Sect. 14.11 & 14.12 on 1-8-04), (Sect. 13.12 on 1-12-04), (Sect. 52 on 1-20-04), (Sect. 52 updates on 1-21-04), (Sect. 52 updates on 1-22-04), (Sect. 52 updates on 1-23-04), (Sect. 53 on 1-24-04), (Sect. 53.6112 on 1-25-04), (Sect. 54 & 55 on 1-26-04), (Sect. 55 updates and Sect. 52.01 & 53.21 on 1-27-04), (Sect. 56 on 2-2-04), (Sect. 56 & 15 updates and Sect. 57 & 58 on 2-3-04), (Sect. 59 to 61, 55.41on 2-5-04), (Sect. 62 on 2-6-04), (Sect. 62 updates on 2-7-04), (Sect. 59 updates on 2-9-04), (Sect. 2.31, 2.304 updates and Sections 2.3041, 63, 2.32 to 2.38 on 2-11-04), (Sect. 52.22, 52.23 and Sect. 52 updates on 2-13-04), (Sect. 52 updates on 2-17-04), (Sect. 64 on 2-23-04), (Sect. 65 on 2-26-04), (Sect. 66 and 67, Sect. 1.41 update on 2-27-04), (Sect. 66 updates on 2-28-04), (Sect. 68 on 2-29-04), (Sect. 68 updates on 3-1-04), (Sect. 69 and Sect. 68 updates on 3-2-04), (Sect. 69.9 on 3-3-04), (Sect. 2.3040 on 3-7-04), (Sect. 59 updates on 3-12-04), (Sect. 59 & 53 updates on 3-19-04), (Sect. 59 updates on 3-25-04), (Sect. 70 on 3-26-04), (Sect. 70 updates on 3-29-04), (Sect. 70 updates on 4-1-04), (Sect. 71 on 4-3-04), (Sect. 72 on 4-5-04), (RBN name change to IB News, Putin’s new title as CONSPIRACY LAW PRESIDENT, Sect. 77.8 on 4-8-04), (major overhauls from Russian to international on 4-12-04), (Sect. 54.31 on 4-21-04), (Sect. 77.022 on 4-24-04), (Sect. 77.022 updates on 4-25-04), (updates to Sect. 77.022 and Sections 77.023 to 77.026 on 4-26-04), (Sect. 77.031 and updates to Sect. 2.3040 on 5-1-04), (major overhauls to include RSP network on 5-18-04), (major overhauls about satellite on 5-20-04), (Sect. 59.53 and LOOPHOLE PROGRAM updates on 5-31-04), (military updates on 6-1-04), (Sect. 2.304 updates and Sect. 2.3041 a & b on 6-4-04), (Sect. 62.2a on 6-8-04), (General polishing and updates to Sect. 62 & 63 on 6-10-04), (Sect. 73 on 6-13-04), (Sect. 1.0a on 6-20-04), (Sect. 59.53 updates on 6-20-04), (Sect. 59.58 on 6-26-04), (Sect. 59.58 updates on 6-29-04), (Sect. 77.92 on 6-29-04), (Sect. 59.58 updates on 7-1-04), (59.58 updates on 7-3-04), (Sect. 59.59 on 7-4-04), (Sect. 59.59 updates on 7-5-04), (Sect. 59.60 on 7-6-04), (Sect. 59 updates and Sect. 59.62 on 7-25-04), (Sect. 59.62 updates on 7-26-04), (Sect. 59.62 updates on 7-31-04), (Sect. 59 updates on 8-2-04), (Sect. 59.62 updates on 8-6-04), (Sect. 59.62 updates on 8-8-04), (Sect. 59.58c1 updates on 8-10-04), (Sect. 59.58 update on 9-19-04), (Sect. 54 & 55 updates on 9-24-04), (Sect. 59.58 and 59 updates on 1-6-05), (Sect. 2.304 updates about UNWILLING AGENTS on 1-14-05), (Sect. 59.63 on 1-28-05), (updates to Sect. 59.58 through 59.63 about DAMAGED PROGRAMMING on 1-28-05), (Sect. 2.304 updates on 2-1-05), (Sect. 54 updates on 3-11-05), (Sect. 2.3040 updates on 5-18-05), (Sect. 12 updates to use “green”med school grads as PLPs & RSPs on 6-1-05), (Sect. 70 updates to include TRIGGER PROGRAMMING on 6-23-05), (Sect. 74 REVERSE BIBLE AMNESIA PROGRAM on 6-24-05), (Sect. 63.32 updates IMPOSTER TRIGGER PROGRAM on 6-25-05), (Sect. 58.6 ZOOLOGY CORPS on 6-30-05), [Sect. 63.32(c-1) IMPOSTERs warning message on 7-5-05], (UNWILLING AGENT MILITARY BASES update to Sect. 54.3 on 8-27-05), (Sect. 54.3 updates DEADLINE for segregation of bases on 8-28-05), (Sect. 54.3 updates to include JESUIT CIVIL WAR for base segregations on 8-29-05), [Sect. 1.0(a) updates DIAGNOSTIC AND TREATMENT PROGRAMs for RSPs and 49 shields around each patient on 11-2-05], [Sect. 1.0(a) updates CURE RESISTANT PROGRAMs and use of all branches of medicine in DIAGNOSTIC AND TREATMENT PROGRAMs on 11-8-05], [Sect. 1.0(a) updates causal DIAGNOSTIC revamping for DIAGNOSTIC and TREATMENT PROGRAMs on 11-9-05], [Sect. 1.0(a) updates MEDICAL RECORDS TEAM and total diagnostic screening on 11-10-05], (Sect. 1.0(a)-38 updates to DIAGNOSTIC AND TREATMENT PROGRAM to include TRUTH PHYSICIANS on 12-9-05), [Sect. 1.0(a)-41 updates to include GERM KILLER PROGRAM on 3-16-06], [MARRIAGE LIST for DIAGNOSTIC AND TREATMENT PROGRAMs on July 10, 2006], (Sect. 54.3(d) updates SPECIAL ACCESS only TO SPECIAL ACCESS NON-UNWILLING AGENT AREA ON MILITARY BASES on August 28, 2006).

XXXX–G.S. (Sect. 1.21 on 8-23-03), (Sect. 1.31 and 1.51 on 8-30-03), (Sect. 77.7 update on 9-28-03), (Sect. 7 on 10-12-03), (Sect. 2.301 on 11-14-03), (Sect. 77.13 on 11-21-03), (Sect. 11 on 11-24-03), (Sect. 77.13 updates on 11-24-03), (Sect. 77.04 on 11-29-03), (Sect. 77.03 & 2.305 on 12-24-03), (Sect. 13 on 12-26-03), (Sect. 70 updates and Section 70.92 on 4-29-04), (Sect. 1.0b & 1.0c on 5-19-04), (Sect. 62 updates on 5-19-04), (Sect. 59, 60 & 61 updates on 6-24-04), (Sect. 59.58 updates on 7-2-04), (59.58 updates on 7-13-04), (Sect. 2.3040 updates and Sect. 59.61 on 7-14-04).

XXXXX–G.S. (Sect. 6 on 9-19-03)

AAAAAAA–G.S. (7-9-03), (Sect. 2 on 7-11-03), (Sect. 3 on 7-12-03), (Sect. 4 on 7-13-03), (Sect. 5 on 7-14-03), (“amendment” update on 7-23-03), (Sect. 1.21 on 8-23-03), (Sect. l.31 and 1.51 on 8-30-03), (Sect. 6 on 9-19-03), (Sect. 77.7 update on 9-28-03), (Sect. 7 on 10-12-03), (Sect. 2.3 and 2.31 on 10-13-03), (Sect. 8 on 10-28-03), (Sect. 77.1 on 11-13-03), (sect. 2.301 on 11-14-03), (update to Sect. 4.1, Sect. 2.302, 2.303 on 11-15-03), (Sect. 2.304 on 11-16-03), (Sect. 1.40 on 11-18-03), (Sect. 77.13 on 11-21-03), (Sect. 9 on 11-22-03), (Sect. 10 and 9.21 update on 11-23-03), (Sect. 11 on 11-24-03), (Sect. 77.13 updates on 11-24-03), (Sect. 77.02 & 77.03 on 11-25-03), (Sect. 12 on 11-27-03), (Sect. 77.04 on 11-29-03), (Sect. 77.03 & 2.305 on 12-24-03), (Sect. 13 on 12-26-03), (Sect. 77.14 & 77.15 on 12-28-03), (Sect. 14 on 1-1-04), (Sect. 15 on 1-2-04), (Sect. 51.94, 51.95, 51.96 & 51.97 on 1-5-04), (Sect. 14.11 & 14.12 on 1-7-04), (updates to Sect. 14.11 & 14.12 on 1-8-04), (Sect. 13.12 on 1-12-04), (Sect. 52 on 1-20-04), (Sect. 52 updates on 1-21-04), (Sect. 52 updates on 1-22-04), (Sect. 52 updates on 1-23-04), (Sect. 53 on 1-24-04), (Sect. 53.6112 on 1-25-04), (Sect. 54 & 55 on 1-26-04), (Sect. 55 updates and Sect. 52.01 & 53.21 on 1-27-04), (Sect. 56 on 2-2-04), (Sect. 56 & 15 updates and Sect. 57 & 58 on 2-3-04), (Sect. 59 to 61, 55.41 on 2-5-04), (Sect. 62 on 2-6-04), (Sect. 62 updates on 2-7-04), (Sect. 59 updates on 2-9-04), (Sect. 2.31 updates and Sections 2.32 to 2.38 on 2-11-04), (Sect. 63 on 2-11-04), (Sect. 52.22, 52.23 and Sect. 52 updates on 2-13-04), (Sect. 52 updates on 2-17-04), (Sect. 64 on 2-23-04), (Sect. 65 on 2-26-04), (Sect. 66 and 67 and Sect. 1.41 update on 2-27-04), (Sect. 66 updates on 2-28-04), (Sect. 68 on 2-29-04), (Sect. 68 updates on 3-1-04), (Sect. 69 and Sect. 68 updates on 3-2-04), (Sect. 69.9 on 3-3-04), (Sect. 2.3040 on 3-7-04), (Sect. 59 updates on 3-12-04), (Sect. 59 & 53 updates on 3-19-04), (Sect. 59 updates on 3-25-04), (Sect. 70 on 3-26-04), (Sect. 70 updates on 3-29-04), (Sect. 70 updates on 4-1-04), (Sect. 71 on 4-3-04), (Sect. 72 on 4-5-04), (RBN name change to IB News, Putin’s new title as CONSPIRACY LAW PRESIDENT, Sect. 77.8 on 4-8-04), (major overhauls from Russian to international on 4-12-04), (Sect. 54.31 on 4-21-04), (Sect. 77.022 on 4-24-04), (Sect. 77.022 updates on 4-25-04), (updates to Sect. 77.022 and Sections 77.023 to 77.026 on 4-26-04), (Sect. 70 updates and Section 70.92 on 4-29-04), (Sect. 77.031 and updates to Sect. 2.3040 on 5-1-04), (major overhauls to include RSP network on 5-18-04), (Sect. 1.0b & 1.0c on 5-19-04), (Sect. 62 updates on 5-19-04), (major overhauls about satellite on 5-20-04), (Sect. 59.53 and LOOPHOLE PROGRAM updates on 5-31-04), (military updates on 6-1-04), (Sect. 2.304 updates and Sect. 2.3041 a & b on 6-4-04), (Sect. 62.2a on 6-8-04), (General polishing and updates to Sect. 62 & 63 on 6-10-04), (Sect. 73 on 6-13-04), (Sect. 1.0a on 6-20-04), (Sect. 59.53 updates on 6-20-04), (Sect. 59, 60 & 61 updates on 6-24-04), (Sect. 59.58 on 6-26-04), (Sect. 59.58 updates on 6-29-04), (Sect. 77.92 on 6-29-04), (Sect. 59.58 updates on 7-1-04), (Sect. 59.58 updates on 7-2-04), (59.58 updates on 7-3-04), (Sect. 59.59 on 7-4-04), (Sect. 59.59 updates on 7-5-04), (Sect. 59.60 on 7-6-04), (59.58 updates on 7-13-04), (Sect. 2.3040 updates and Sect. 59.61 on 7-14-04), (Sect. 59 updates and Sect. 59.62 on 7-25-04), (Sect. 59.62 updates on 7-26-04), (Sect. 59.62 updates on 7-31-04), (Sect. 59 updates on 8-2-04), (Sect. 59.62 updates on 8-6-04), (Sect. 59.62 updates on 8-8-04), (Sect. 59.58c1 updates on 8-10-04), (Sect. 59.58 update on 9-19-04), (Sect. 54 & 55 updates on 9-24-04), (Sect. 59.58 and 59 updates on 1-6-05), (Sect. 2.304 updates about UNWILLING AGENTS on 1-14-05), (updates to Sect. 59.58 through 59.63 about DAMAGED PROGRAMMING on 1-28-05), (Sect. 2.304 updates on 2-1-05), (Sect. 54 updates on 3-11-05), (Sect. 2.3040 updates on 5-18-05), (Sect. 12 updates to use “green”med school grads as PLPs & RSPs on 6-1-05), (Sect. 70 updates to include TRIGGER PROGRAMMING on 6-23-05), (Sect. 74 REVERSE BIBLE AMNESIA PROGRAM on 6-24-05), (Sect. 63.32 updates IMPOSTER TRIGGER PROGRAM on 6-25-05), (Sect. 58.6 ZOOLOGY CORPS on 6-30-05), [Sect. 63.32(c-1) IMPOSTERs warning message on 7-5-05], (UNWILLING AGENT MILITARY BASES update to Sect. 54.3 on 8-27-05)), (Sect. 54.3 updates DEADLINE for segregation of bases on 8-28-05), (Sect. 54.3 updates to include JESUIT CIVIL WAR for base segregations on 8-29-05), [Sect. 1.0(a) updates DIAGNOSTIC AND TREATMENT PROGRAMs for RSPs and 49 shields around each patient on 11-2-05], [Sect. 1.0(a) updates CURE RESISTANT PROGRAMs and use of all branches of medicine in DIAGNOSTIC AND TREATMENT PROGRAMs on 11-8-05], [Sect. 1.0(a) updates causal DIAGNOSTIC revamping for DIAGNOSTIC and TREATMENT PROGRAMs on 11-9-05], [Sect. 1.0(a) updates MEDICAL RECORDS TEAM and total diagnostic screening on 11-10-05], (Sect. 1.0(a)-38 updates to DIAGNOSTIC AND TREATMENT PROGRAM to include TRUTH PHYSICIANS on 12-9-05), [Sect. 1.0(a)-41 updates to include GERM KILLER PROGRAM on 3-16-06], [MARRIAGE LIST for DIAGNOSTIC AND TREATMENT PROGRAMs on July 10, 2006], (Sect. 54.3(d) updates SPECIAL ACCESS only TO SPECIAL ACCESS NON-UNWILLING AGENT AREA ON MILITARY BASES on August 28, 2006).

BBBBBBB–G.S. (7-9-03), (Sect. 2 on 7-11-03), (Sect. 3 on 7-12-03), (Sect. 4 on 7-13-03), (Sect. 5 on 7-14-03), (“amendment” update on 7-23-03), (Sect. 1.21 on 8-23-03), (Sect. 1.31 and 1.51 on 8-30-03), (Sect. 6 on 9-19-03), (Sect. 77.7 update on 9-28-03), (Sect. 7 on 10-12-03), (Sect. 2.3 and 2.31 on 10-13-03), (Sect. 8 on 10-28-03), (Sect. 77.1 on 11-13-03), (Sect. 2.301 on 11-14-03), (update to Sect. 4.1, Sect. 2.302, 2.303 on 11-15-03), (Sect. 2.304 on 11-16-03), (Sect. 1.40 on 11-18-03), (Sect. 77.13 on 11-21-03), (Sect. 9 on 11-22-03), (Sect. 10 and 9.21 update on 11-23-03), (Sect. 11 on 11-24-03), (Sect. 77.13 updates on 11-24-03), (Sect. 77.02 & 77.03 on 11-25-03), (Sect. 12 on 11-27-03), (Sect. 77.04 on 11-29-03), (Sect. 77.03 & 2.305 on 12-24-03), (Sect. 13 on 12-26-03), (Sect. 77.14 & 77.15 on 12-28-03), (Sect. 14 on 1-1-04), (Sect. 15 on 1-2-04), (Sect. 51.94, 51.95, 51.96 & 51.97 on 1-5-04), (Sect. 14.11 & 14.12 on 1-7-04), (updates to Sect. 14.11 & 14.12 on 1-8-04), (Sect. 13.12 on 1-12-04), (Sect. 52 on 1-20-04), (Sect. 52 and Sect. 52.01 & 53.21 updates on 1-21-04), (Sect. 52 updates on 1-22-04), (Sect. 52 updates on 1-23-04), (Sect. 53 on 1-24-04), (Sect. 53.6112 on 1-25-04), (Sect. 54 & 55 on 1-26-04), (Sect. 55 updates and Sect. 52.01 & 53.21 on 1-27-04), (Sect. 56 on 2-2-04), (Sect. 56 & 15 updates and Sect. 57 & 58 on 2-3-04), (Sect. 59 to 61, 55.41 on 2-5-04), (Sect. 62 on 2-6-04), (Sect. 62 updates on 2-7-04), (Sect. 59 updates on 2-9-04), (Sect. 2.31 updates and Sections 2.32 to 2.38 on 2-11-04),(Sect. 63 on 2-11-04), (Sect. 52.22, 52.23 and Sect. 52 updates on 2-13-04), (Sect. 52 updates on 2-17-04), (Sect. 64 on 2-23-04), (Sect. 65 on 2-26-04), (Sect. 66 and 67 and Sect. 1.41 update on 2-27-04), (Sect. 66 updates on 2-28-04), (Sect. 68 on 2-29-04), (Sect. 68 updates on 3-1-04), (Sect. 69 and Sect. 68 updates on 3-2-04), (Sect. 69.9 on 3-3-04), (Sect. 2.3040 on 3-7-04), (Sect. 59 updates on 3-12-04), (Sect. 59 & 53 updates on 3-19-04), (Sect. 59 updates on 3-25-04), (Sect. 70 on 3-26-04), (Sect. 70 updates on 3-29-04), (Sect. 70 updates on 4-1-04), (Sect. 71 on 4-3-04), (Sect. 72 on 4-5-04), (RBN name change to IB News, Putin’s new title as CONSPIRACY LAW PRESIDENT, Sect. 77.8 on 4-8-04), (major overhauls from Russian to international on 4-12-04), (Sect. 54.31 on 4-21-04), (Sect. 77.022 on 4-24-04), (Sect. 77.022 updates on 4-25-04), (updates to Sect. 77.022 and Sections 77.023 to 77.026 on 4-26-04), (Sect. 70 updates and Section 70.92 on 4-29-04), (Sect. 77.031 and updates to Sect. 2.3040 on 5-1-04), (major overhauls to include RSP network on 5-18-04), (Sect. 1.0b & 1.0c on 5-19-04), (Sect. 62 updates on 5-19-04), (major overhauls about satellite on 5-20-04), (Sect. 59.53 and LOOPHOLE PROGRAM updates on 5-31-04), (military updates on 6-1-04), (Sect. 2.304 updates and Sect. 2.3041 a & b on 6-4-04), (Sect. 62.2a on 6-8-04), (General polishing and updates to Sect. 62 & 63 on 6-10-04), (Sect. 73 on 6-13-04), (Sect. 1.0a on 6-20-04), (Sect. 59.53 updates on 6-20-04), (Sect. 59, 60 & 61 updates on 6-24-04), (Sect. 59.58 on 6-26-04), (Sect. 59.58 updates on 6-29-04), (Sect. 77.92 on 6-29-04), (Sect. 59.58 updates on 7-1-04), (Sect. 59.58 updates on 7-2-04), (59.58 updates on 7-3-04), (Sect. 59.59 on 7-4-04), (Sect. 59.59 updates on 7-5-04), (Sect. 59.60 on 7-6-04), (59.58 updates on 7-13-04), (Sect. 2.3040 updates and Sect. 59.61 on 7-14-04), (Sect. 59 updates and Sect. 59.62 on 7-25-04), (Sect. 59.62 updates on 7-26-04), (Sect. 59.62 updates on 7-31-04), (Sect. 59 updates on 8-2-04), (Sect. 59.62 updates on 8-6-04), (Sect. 59.62 updates on 8-8-04), (Sect. 59.58c1 updates on 8-10-04), (Sect. 59.58 update on 9-19-04), (Sect. 54 & 55 updates on 9-24-04), (Sect. 59.58 and 59 updates on 1-6-05), (Sect. 2.304 updates about UNWILLING AGENTS on 1-14-05), (Sect. 59.63 on 1-28-05), (updates to Sect. 59.58 through 59.63 about DAMAGED PROGRAMMING on 1-28-05), (Sect. 2.304 updates on 2-1-05), (Sect. 54 updates on 3-11-05), (Sect. 2.3040 updates on 5-18-05), (Sect. 12 updates to use “green”med school grads as PLPs & RSPs on 6-1-05), (Sect. 70 updates to include TRIGGER PROGRAMMING on 6-23-05), (Sect. 74 REVERSE BIBLE AMNESIA PROGRAM on 6-24-05), (Sect. 63.32 updates IMPOSTER TRIGGER PROGRAM on 6-25-05), (Sect. 58.6 ZOOLOGY CORPS on 6-30-05), [Sect. 63.32(c-1) IMPOSTERs warning message on 7-5-05], (UNWILLING AGENT MILITARY BASES update to Sect. 54.3 on 8-27-05)), (Sect. 54.3 updates DEADLINE for segregation of bases on 8-28-05), (Sect. 54.3 updates to include JESUIT CIVIL WAR for base segregations on 8-29-05), [Sect. 1.0(a) updates DIAGNOSTIC AND TREATMENT PROGRAMs for RSPs and 49 shields around each patient on 11-2-05], [Sect. 1.0(a) updates CURE RESISTANT PROGRAMs and use of all branches of medicine in DIAGNOSTIC AND TREATMENT PROGRAMs on 11-8-05], [Sect. 1.0(a) updates causal DIAGNOSTIC revamping for DIAGNOSTIC and TREATMENT PROGRAMs on 11-9-05], [Sect. 1.0(a) updates MEDICAL RECORDS TEAM and total diagnostic screening on 11-10-05], (Sect. 1.0(a)-38 updates to DIAGNOSTIC AND TREATMENT PROGRAM to include TRUTH PHYSICIANS on 12-9-05), [Sect. 1.0(a)-41 updates to include GERM KILLER PROGRAM on 3-16-06], [MARRIAGE LIST for DIAGNOSTIC AND TREATMENT PROGRAMs on July 10, 2006], (Sect. 54.3(d) updates SPECIAL ACCESS only TO SPECIAL ACCESS NON-UNWILLING AGENT AREA ON MILITARY BASES on August 28, 2006).

CCCCCCC–G.S. (7-9-03), (Sect. 2 on 7-11-03), (Sect. 3 on 7-12-03), (Sect. 4 on 7-13-03), (Sect. 5 on 7-14-03, (“amendment” update on 7-23-03), (Sect. 1.21 on 8-23-03), (Sect. 1.31 and 1.51 on 8-30-03), (Sect. 6 on 9-19-03), (Sect. 77.7 update on 9-28-03), (Sect. 7 on 10-12-03), (Sect. 2.3 and 2.31 on 10-13-03), (Sect. 8 on 10-28-03), (Sect. 77.1 on 11-13-03), (Sect. 2.301 on 11-14-03), (update to Sect. 4.1, Sections 2.302, 2.303 on 11-15-03), (Sect. 2.304 on 11-16-03), (Sect. 1.40 on 11-18-03), (Sect. 77.13 on 11-21-03), (Sect. 9 on 11-22-03), (Sect. 10 and 9.21 update on 11-23-03), (Sect. 11 on 11-24-03), (Sect. 77.13 updates on 11-24-03), (Sect. 77.02 & 77.03 on 11-25-03), (Sect. 12 on 11-27-03), (Sect. 77.04 on 11-29-03), (Sect. 77.03 & 2.305 on 12-24-03), (Sect. 13 on 12-26-03), (Sect. 77.14 & 77.15 on 12-28-03), (Sect. 14 on 1-1-04), (Sect. 15 on 1-2-04), (Sect. 51.94, 51.95, 51.96 & 51.97 on 1-5-04),(Sect. 14.11 & 14.12 on 1-7-04), (updates to Sect. 14.11 & 14.12 on 1-8-04), (Sect. 13.12 on 1-12-04), (Sect. 52 on 1-20-04), (Sect. 52 updates on 1-21-04), (Sect. 52 updates on 1-22-04), (Sect. 52 updates on 1-23-04), (Sect. 53 on 1-24-04), (Sect. 53.6112 on 1-25-04), (Sect. 54 & 55 on 1-26-04), (Sect. 55 updates and Sect. 52.01 & 53.21 on 1-27-04), (Sect. 56 on 2-2-04), (Sect. 56 & 15 updates and Sect. 57 & 58 on 2-3-04), (Sect. 59 to 61, 55.41 on 2-5-04), (Sect. 62 on 2-6-04), (Sect. 62 updates on 2-7-04), (Sect. 59 updates on 2-9-04), (Sect. 2.31 updates and Sections 2.32 to 2.38 on 2-11-04), (Sect. 63 on 2-11-04), (Sect. 52.22, 52.23 and Sect. 52 updates on 2-13-04), (Sect. 52 updates on 2-17-04), (Sect. 64 on 2-23-04), (Sect. 65 on 2-26-04), (Sect. 66 and 67 and Sect. 1.41 update on 2-27-04), (Sect. 66 updates on 2-28-04), (Sect. 68 on 2-29-04), (Sect. 68 updates on 3-1-04), (Sect. 69 and Sect. 68 updates on 3-2-04), (Sect. 69.9 on 3-3-04), (Sect. 2.3040 on 3-7-04), (Sect. 59 updates on 3-12-04), (Sect. 59 & 53 updates on 3-19-04), (Sect. 59 updates on 3-25-04), (Sect. 70 on 3-26-04), (Sect. 70 updates on 3-29-04), (Sect. 70 updates on 4-1-04), (Sect. 71 on 4-3-04), (Sect. 72 on 4-5-04), (RBN name change to IB News, Putin’s new title as CONSPIRACY LAW PRESIDENT, Sect. 77.8 on 4-8-04), (major overhauls from Russian to international on 4-12-04), (Sect. 54.31 on 4-21-04), (Sect. 77.022 on 4-24-04), (Sect. 77.022 updates on 4-25-04), (updates to Sect. 77.022 and Sections 77.023 to 77.026 on 4-26-04), (Sect. 70 updates and Section 70.92 on 4-29-04), (Sect. 77.031 and updates to Sect. 2.3040 on 5-1-04), (major overhauls to include RSP network on 5-18-04), (Sect. 1.0b & 1.0c on 5-19-04), (Sect. 62 updates on 5-19-04), (major overhauls about satellite on 5-20-04), (Sect. 59.53 and LOOPHOLE PROGRAM updates on 5-31-04), (military updates on 6-1-04), (Sect. 2.304 updates and Sect. 2.3041 a & b on 6-4-04), (Sect. 62.2a on 6-8-04), (General polishing and updates to Sect. 62 & 63 on 6-10-04), (Sect. 73 on 6-13-04), (Sect. 1.0a on 6-20-04), (Sect. 59.53 updates on 6-20-04), (Sect. 59, 60 & 61 updates on 6-24-04), (Sect. 59.58 on 6-26-04), (Sect. 59.58 updates on 6-29-04), (Sect. 77.92 on 6-29-04), (Sect. 59.58 updates on 7-1-04), (Sect. 59.58 updates on 7-2-04), (59.58 updates on 7-3-04), (Sect. 59.59 on 7-4-04), (Sect. 59.59 updates on 7-5-04), (Sect. 59.60 on 7-6-04), (59.58 updates on 7-13-04), (Sect. 2.3040 updates and Sect. 59.61 on 7-14-04), (Sect. 59 updates and Sect. 59.62 on 7-25-04), (Sect. 59.62 updates on 7-26-04), (Sect. 59.62 updates on 7-31-04), (Sect. 59 updates on 8-2-04), (Sect. 59.62 updates on 8-6-04), (Sect. 59.62 updates on 8-8-04), (Sect. 59.58c1 updates on 8-10-04), (Sect. 59.58 update on 9-19-04), (Sect. 54 & 55 updates on 9-24-04), (Sect. 59.58 and 59 updates on 1-6-05), (Sect. 2.304 updates about UNWILLING AGENTS on 1-14-05), (Sect. 59.63 on 1-28-05), (updates to Sect. 59.58 through 59.63 about DAMAGED PROGRAMMING on 1-28-05), (Sect. 2.304 updates on 2-1-05), (Sect. 54 updates on 3-11-05), (Sect. 2.3040 updates on 5-18-05), (Sect. 12 updates to use “green”med school grads as PLPs & RSPs on 6-1-05), (Sect. 70 updates to include TRIGGER PROGRAMMING on 6-23-05), (Sect. 74 REVERSE BIBLE AMNESIA PROGRAM on 6-24-05), (Sect. 63.32 updates IMPOSTER TRIGGER PROGRAM on 6-25-05), (Sect. 58.6 ZOOLOGY CORPS on 6-30-05), [Sect. 63.32(c-1) IMPOSTERs warning message on 7-5-05], (UNWILLING AGENT MILITARY BASES update to Sect. 54.3 on 8-27-05)), (Sect. 54.3 updates DEADLINE for segregation of bases on 8-28-05), (Sect. 54.3 updates to include JESUIT CIVIL WAR for base segregations on 8-29-05), [Sect. 1.0(a) updates DIAGNOSTIC AND TREATMENT PROGRAMs for RSPs and 49 shields around each patient on 11-2-05], [Sect. 1.0(a) updates CURE RESISTANT PROGRAMs and use of all branches of medicine in DIAGNOSTIC AND TREATMENT PROGRAMs on 11-8-05], [Sect. 1.0(a) updates causal DIAGNOSTIC revamping for DIAGNOSTIC and TREATMENT PROGRAMs on 11-9-05], [Sect. 1.0(a) updates MEDICAL RECORDS TEAM and total diagnostic screening on 11-10-05], (Sect. 1.0(a)-38 updates to DIAGNOSTIC AND TREATMENT PROGRAM to include TRUTH PHYSICIANS on 12-9-05), [Sect. 1.0(a)-41 updates to include GERM KILLER PROGRAM on 3-16-06], [MARRIAGE LIST for DIAGNOSTIC AND TREATMENT PROGRAMs on July 10, 2006], (Sect. 54.3(d) updates SPECIAL ACCESS only TO SPECIAL ACCESS NON-UNWILLING AGENT AREA ON MILITARY BASES on August 28, 2006).

Electronically signed: Gail Chord Schuler

Date: 7-9-03, (Sect. 2 on 7-11-03), (Sect. 3 on 7-12-03), (Sect. 4 on 7-13-03), (Sect. 5 on 7-14-03), 7-23-03 (“amendment” update), 8-23-03 (Sect. 1.21), 8-30-03 (Sect. 1.31 and 1.51), (Sect. 6), 9-28-03 (Sect. 77.7 update), (Sect. 7 on 10-12-03), (Sect. 2.3 and 2.31 on 10-13-03), (Sect. 8 on 10-28-03), (Sect. 77.1 on 11-13-03), (Sect. 2.301 on 11-14-03), (update to Sect. 4.1, Sect. 2.302, 2.303 on 11-15-03), (Sect. 2.304 on 11-16-03), (Sect. 1.40 on 11-18-03), (Sect. 77.13 on 11-21-03), (Sect. 9 on 11-22-03), (Sect. 10 and 9.21 update on 11-23-03), (Sect. 11 on 11-24-03), (Sect. 77.13 updates on 11-24-03), (Sect. 77.02 & 77.03 on 11-25-03), (Sect. 12 on 11-27-03), (Sect. 77.04 on 11-29-03), (Sect. 77.03 & 2.305 on 12-24-03), (Sect. 13 on 12-26-03), (Sect. 77.14 & 77.15 on 12-28-03), (Sect. 14 on 1-1-04), (Sect. 15 on 1-2-04), (Sect. 51.94, 51.95, 51.96 & 51.97 on 1-5-04), (Sect. 14.11 & 14.12 on 1-7-04), (updates to Sect. 14.11 & 14.12 on 1-8-04), (Sect. 13.12 on 1-12-04), (Sect. 52 on 1-20-04), (Sect. 52 updates on 1-21-04), (Sect. 52 updates on 1-22-04), (Sect. 52 updates on 1-23-04), (Sect. 53 on 1-24-04), (Sect. 53.6112 on 1-25-04), (Sect. 54 & 55 on 1-26-04), (Sect. 55 updates and Sect. 52.01 & 53.21 on 1-27-04), (Sect. 56 on 2-2-04), (Sect. 56 & 15 updates and Sect. 57 & 58 on 2-3-04), (Sect. 59 to 61, 55.41on 2-5-04), (Sect. 62 on 2-6-04), (Sect. 62 updates on 2-7-04), (Sect. 59 updates on 2-9-04), (Sect. 2.31 updates and Sections 2.32 to 2.38 on 2-11-04), (Sect. 63 on 2-11-04), (Sect. 52.22, 52.23 and Sect. 52 updates on 2-13-04), (Sect. 52 updates on 2-17-04), (Sect. 64 on 2-23-04), (Sect. 65 on 2-26-04), (Sect. 66 and 67 and Sect. 1.41 update on 2-27-04), (Sect. 66 updates on 2-28-04), (Sect. 68 on 2-29-04), (Sect. 68 updates on 3-1-04), (Sect. 69 and Sect. 68 updates on 3-2-04), (Sect. 69.9 on 3-3-04), (Sect. 2.3040 on 3-7-04), (Sect. 59 updates on 3-12-04), (Sect. 59 & 53 updates on 3-19-04), (Sect. 59 updates on 3-25-04), (Sect. 70 on 3-26-04), (Sect. 70 updates on 3-29-04), (Sect. 70 updates on 4-1-04), (Sect. 71 on 4-3-04), (Sect. 72 on 4-5-04), (RBN name change to IB News, Putin’s new title as CONSPIRACY LAW PRESIDENT, Sect. 77.8 on 4-8-04), (major overhauls from Russian to international on 4-12-04), (Sect. 54.31 on 4-21-04), (Sect. 77.022 on 4-24-04), (Sect. 77.022 updates on 4-25-04), (updates to Sect. 77.022 and Sections 77.023 to 77.026 on 4-26-04), (Sect. 70 updates and Section 70.92 on 4-29-04), (Sect. 77.031 and updates to Sect. 2.3040 on 5-1-04), (major overhauls to include RSP network on 5-18-04), (Sect. 1.0b & 1.0c on 5-19-04), (Sect. 62 updates on 5-19-04), (major overhauls about satellite on 5-20-04), (Sect. 59.53 and LOOPHOLE PROGRAM updates on 5-31-04), (military updates on 6-1-04), (Sect. 2.304 updates and Sect. 2.3041 a & b on 6-4-04), (Sect. 62.2a on 6-8-04), (General polishing and updates to Sect. 62 & 63 on 6-10-04), (Sect. 73 on 6-13-04), (Sect. 1.0a on 6-20-04), (Sect. 59.53 updates on 6-20-04), (Sect. 59, 60 & 61 updates on 6-24-04), (Sect. 59.58 on 6-26-04), (Sect. 59.58 on 6-26-04), (Sect. 59.58 updates on 6-29-04), (Sect. 77.92 on 6-29-04), (Sect. 59.58 updates on 7-1-04), (Sect. 59.58 updates on 7-2-04), (59.58 updates on 7-3-04), (Sect. 59.59 on 7-4-04), (Sect. 59.59 updates on 7-5-04), (Sect. 59.60 on 7-6-04), (59.58 updates on 7-13-04), (Sect. 2.3040 updates and Sect. 59.61 on 7-14-04), (Sect. 59 updates and Sect. 59.62 on 7-25-04), (Sect. 59 updates and Sect. 59.62 on 7-25-04), (Sect. 59.62 updates on 7-26-04), (Sect. 59.62 updates on 7-31-04), (Sect. 59 updates on 8-2-04), (Sect. 59.62 updates on 8-6-04), (Sect. 59.62 updates on 8-8-04), (Sect. 59.58c1 updates on 8-10-04), (Sect. 59.58 update on 9-19-04), (Sect. 54 & 55 updates on 9-24-04), (Sect. 59.58 and 59 updates on 1-6-05), (Sect. 2.304 updates about UNWILLING AGENTS on 1-14-05), (Sect. 59.63 on 1-28-05), (updates to Sect. 59.58 through 59.63 about DAMAGED PROGRAMMING on 1-28-05), (Sect. 2.304 updates on 2-1-05), (Sect. 54 updates on 3-11-05), (Sect. 2.3040 updates on 5-18-05), (Sect. 12 updates to use “green”med school grads as PLPs & RSPs on 6-1-05), (Sect. 70 updates to include TRIGGER PROGRAMMING on 6-23-05), (Sect. 74 REVERSE BIBLE AMNESIA PROGRAM on 6-24-05), (Sect. 63.32 updates IMPOSTER TRIGGER PROGRAM on 6-25-05), (Sect. 58.6 ZOOLOGY CORPS on 6-30-05), [Sect. 63.32(c-1) IMPOSTERs warning message on 7-5-05], (UNWILLING AGENT MILITARY BASES update to Sect. 54.3 on 8-27-05)), (Sect. 54.3 updates DEADLINE for segregation of bases on 8-28-05), (Sect. 54.3 updates to include JESUIT CIVIL WAR for base segregations on 8-29-05), [Sect. 1.0(a) updates DIAGNOSTIC AND TREATMENT PROGRAMs for RSPs and 49 shields around each patient on 11-2-05], [Sect. 1.0(a) updates CURE RESISTANT PROGRAMs and use of all branches of medicine in DIAGNOSTIC AND TREATMENT PROGRAMs on 11-8-05], [Sect. 1.0(a) updates causal DIAGNOSTIC revamping for DIAGNOSTIC and TREATMENT PROGRAMs on 11-9-05], [Sect. 1.0(a) updates MEDICAL RECORDS TEAM and total diagnostic screening on 11-10-05], (Sect. 1.0(a)-38 updates to DIAGNOSTIC AND TREATMENT PROGRAM to include TRUTH PHYSICIANS on 12-9-05), [Sect. 1.0(a)-41 updates to include GERM KILLER PROGRAM on 3-16-06], [MARRIAGE LIST for DIAGNOSTIC AND TREATMENT PROGRAMs on July 10, 2006], (Sect. 54.3(d) updates SPECIAL ACCESS only TO SPECIAL ACCESS NON-UNWILLING AGENT AREA ON MILITARY BASES on August 28, 2006), (Updates to ENTIRE DOCUMENT on May 3, 2014), (Sect. 75 Laws for OBESE KILLERS on November 20, 2015), (Sect. 58 updates making it death penalty to use an animal as a LOREE MCBRIDE ANIMAL on Dec. 15, 2018).

Place: Melbourne, FL and . . . after 7-23-03, Lake Wales, FL . . . after 11-1-03, Melbourne, FL




6 thoughts on “666-COMPUTER OR SATELLITE COMPUTER LAWS FOR PRIVILEGED LICENSED PRACTITIONERS AND REGISTERED SATELLITE PRACTITIONERS

Leave a Reply

Your email address will not be published. Required fields are marked *