Monday, August 20, 2012

Prostutes as Weapons

In Galveston, Texas in the 1980's, a new group of people arose who were extremely dangerous to the public. These criminals are weapons. In many cases, prostitutes with A.I.D.S. were sent out by pimps to attack undesirable people; then kill them with A.I.D.S. The prostitutes transmitted many sexual diseases to the "enemy" people.

Slavery Induction Techniques

Many techniques are utilized for slavery induction. Firstly, the victim is stalked, isolated, attacked, then extracted, and tortured into submission. *The target is located, and followed by numerous gang members through instructions presented by the leader. After the victim's address and corelatives are known, the criminals go to the next step. *The target is approached by a suitable member who is "trustwporthy" by the gang members and leader. Introduction to the target may be from a direct or indirect methodology. A direct meeting may involve an introduction such as the gang member "saw" the target at a public and very active location. An indirect method is to introduce the criminal's self as a "friend", "relative", or other acquaintance of a target's intertested person to meet, or other non known; or, little known acquaintance. * after introduction, more gang members are introduced to the target as relatives or other well known and "trusted" persons. * The next step is to attack the target with drugs that are addictive. Crack is most prefereable to them due to its extreme flexibility. The target is causeed to become intoxicated by a "secondhand" high from people the gang members "attack" verbally. The drug addict is a member also who is "blackmailed" in acting by other members. When the target is addicted, more direct methods are used to make the target high by selling drugs directly to the target. * When the target is terminated by drugs, the crimnals utilize blackmail operations to further terminate the targht from society through photos, indirect communicative speech, and other methods. The target is terminated from friends, family, relatives, and government operatives. * The target is now readily attacked by gang member rapists and other criminals for completing the termination process. In many cases, the target is non cooperative; and tortured into submission through forced drug induced high by hypodermic syringes, beaten, raped, and other torture methods. In many cases, advanced criminals use similar gender operatives for their operations. This is pergormed directly or indirectly. For example, a criminal pretends to "know' a target by displaying a polite conversation with the target. The victim is made to think both are very good friends. After that, the target is asked if He or she desires to meet the person. If so, the target is brought to a secluded place for further attack. The target who is a "friend" imposter knows nothing of he criminal; or his/ her activity. The target is later blamed for the actual crime by the gang members as well as the target victim.

Prostitution: slavery

In this type of slavery practise, prostitution is most predominant. For a riminal to attack a target, the criminal firstly stalks the victim; then, obtains a photo. A group of coconspitators are called by cell phone, and are instructed to follow the target. The target is watched for a specific amount of time. Every contact with the target is located, determined whether the contact[s] is/ are criminal also; then, a direct or indirect contact is made with the target. The target is eighther obscurely hooked on drugs, blamed for something and placed in jail, blackmailed, attacked physically, threatened to the point of relying on the criminals for protection; or, otherwise trapped into the criminal circuit. Once performed, the termination of family and friend relationships begins. After termination from close relatives, the criminals remove the target and pkace thetarget into an isolated place wherre only the group is located predominantly. At this period of time, the target is video taped, audio recorded and recorded in other ways after being terminated with drugs. The target is then terminated by government operatives who think the target is an addict or other criminal. "government" operatives who impersonate the government terminate relationships with the real government operatives. This disallows information to be relayed to the real government operatives. The A.O.P.S. programmed operative techniques of the 1980's era have been reinstalled into activity in he newer groups. These echniques range anywhere from the dual personality attackers to forcible extractions. Forcible extractions involve deactuating locks at residences; then, entering, threatening the target, and the final extraction. The dual personality systems; as well as other techniques are located within he criminal techniques sections. Forcible rape, drug rapes, and other techniques are used to torture he target into submission through threats of pregnancy,threats to not feed the target until the target surrenfers to te attacker, or other technique.

Friday, August 3, 2012

F.B.I. file: semion Mogelivich

Print Version НА РУССКОМ Fraud by Wire; RICO Conspiracy; Mail Fraud; Money Laundering Conspiracy; Money Laundering; Aiding and Abetting; Securities Fraud; Filing False Registration With the SEC; False Filings With the SEC; Falsification of Books and Records SEMION MOGILEVICH Photograph taken in 2001 Photograph taken in 2001 Semion Mogilevich is wanted for his alleged participation in a multi-million dollar scheme to defraud thousands of investors in the stock of a public company incorporated in Canada, but headquartered in Newtown, Bucks County, Pennsylvania, between 1993 and 1998. The scheme to defraud collapsed in 1998, after thousands of investors lost in excess of 150 million U.S. dollars, and Mogilevich, thought to have allegedly funded and authorized the scheme, was indicted in April of 2003. Multimedia: Images Aliases: Seva Moguilevich, Semon Yudkovich Palagnyuk, Semen Yukovich Telesh, Simeon Mogilevitch, Semjon Mogilevcs, Shimon Makelwitsh, Shimon Makhelwitsch, Sergei Yurevich Schnaider, "Seva" DESCRIPTION Date(s) of Birth Used: June 30, 1946; July 5, 1946 Place of Birth: Kiev, Ukraine Height: 5'6" to 5'7" Weight: 290 pounds Build: Heavy Occupation: Businessman Hair: Gray (Balding) Eyes: Green Complexion: Light Sex: Male Race: White Nationality: Ukrainian Scars and Marks: Mogilevich has pockmarks on his face. Remarks: Mogilevich may wear facial hair to include a moustache. He is known to be a heavy smoker. Mogilevich has his primary residence in Moscow, Russia. He is known to utilize a Russian passport, but may also possess Israeli, Ukrainian, and Greek passports. CAUTION Semion Mogilevich is wanted for his alleged participation in a multi-million dollar scheme to defraud thousands of investors in the stock of a public company incorporated in Canada, but headquartered in Newtown, Bucks County, Pennsylvania, between 1993 and 1998. The scheme to defraud collapsed in 1998, after thousands of investors lost in excess of 150 million U.S. dollars, and Mogilevich, thought to have allegedly funded and authorized the scheme, was indicted in April of 2003. REWARD The FBI is offering a reward of up to $100,000 for information leading directly to the arrest of Semion Mogilevich. CONSIDERED ARMED AND EXTREMELY DANGEROUSIf you have any information concerning this person, please contact your local FBI office or the nearest American Embassy or Consulate. Field Office: Philadelphia October 2009 Semion Mogelevich was The main operative to collapse the world economy by taking $2 trillion from rthe bsiness world each year; in the years 1980- 1985. His actions may be viewed in the book "red Mafiya".

Future Terrorism Attack Areas

In the future, militant and terroristic organizations will form. Most of these organizations will attack similar areas of interest. These attack sites will be: [1] Food industries: these areas have been attacked before. Some instances are cyanide in tylenol, Sharp bones in foods, and other instances that occured since the 1970's [2] top government organizations: it is thought that if regulating agencies are gone, people may control public domains. [3] Water supply: water is necessary for life. Without it life cannot continue. Contaminated, public and governments are under control [4] Remote areas: thiese areas are usefull to establish hiding spaces for personnel These are some of the few sites for attack. It is vital to regulate, secure, and guard these areas.