Letters to Vladimir Putin About Conspiracy Law (6-27-2004)

6-27-04 Bemerkungen über 1-18-02 Tatbestand

I will integrate the following into CONSPIRACY LAW when I have time. In the meanwhile, go ahead and consider it integrated and enforce the following laws NOW:

It appears that no TRIGGER PROGRAMS were obviously activated until all the LOOPHOLES were removed from my PERSON-PROGRAM. The Jesuits, Vladimir Putin and SIGNIFICANT PERSONS need to be cross-examined to ask who was behind this secrecy and why–since it is obvious that all PERSON-PROGRAMS have been inundated with HIDDEN TRIGGER PROGRAMS. Apparently, the trigger which activated the first obvious TRIGGER PROGRAMS, was when all the LOOPHOLE PROGRAMMING was removed from my PERSON-PROGRAM. Maybe start with question #1 from Sect. 2 of CONSPIRACY LAWS AND GOVERNMENT.

Make it mandatory that an ACUPUNCTURE BLOCK be used on TRIGGER PROGRAMS when these programs are activated. Any (direct or indirect) willing and knowing attempt (or action) to not use an ACUPUNCTURE BLOCK on any known TRIGGER PROGRAM (especially when this program is activated) will bring the death penalty as a JESUIT CONSPIRATOR to that violator. This could include programming violations (like a deliberate attempt or action to mess up programming [using satellite or whatever] so that an ACUPUNCTURE BLOCK cannot be carried out)–it is ANY INDIRECT OR DIRECT ATTEMPT OR ACTION TO INTERFERE WITH (OR NOT CAUSE) AN ACUPUNCTURE BLOCK TO BE CARRIED OUT in connection with a TRIGGER PROGRAM.


Use 666-COMPUTER HISTORIANS to scan the brains of those who may be able to give us a list of all HIDDEN TRIGGER PROGRAMMING in myself and others. Or use 666-COMPUTER HISTORIANS on those criminals we have in our custody, to help us find out where we could obtain these lists. Somebody out there (a Jesuit probably) knows which TRIGGER PROGRAMS have been put into each person’s PERSON-PROGRAM, we need to find this/these persons and interrogate them to get this information. This information should help us to eliminate these TRIGGER PROGRAMS more efficiently and thoroughly and quickly. When these persons are found (who can give us needed information about TRIGGER PROGRAMS), conduct their cross-examinations on IBN–to show the world that WE DID NOT INVENT TRIGGER PROGRAMMING!!

When I have time, I will integrate the above statements into CONSPIRACY LAW. I don’t have time now. But go ahead and enforce this as if it was already integrated into CONSPIRACY LAW. Since we don’t want to give the terrorists extra time, we need to stomp them down NOW.

XXX1/2–G.S. (6-27-04), (6-28-04)

AAAAAAA–G.S. (6-27-04), (6-28-04)
BBBBBBB–G.S. (6-27-04), (6-28-04)
CCCCCCC–G.S. (6-27-04), (6-28-04)

Electronically signed: Gail Chord Schuler
Date: 6-27-04, 6-28-04
Place: Melbourne, FL