INTERNATIONAL CRIMINAL LAW: SPACE TECHNOLOGY or ICL:ST

Gab Share

All violations of this legal document are subject to be treated according to Sect. 66 of 666-Computer and Satellite-Computer Laws for PLPs and RSPs.

77.0 Once the laws of this document or of any CONSPIRACY LAW are enforced in a country, no changes (alterations to, deletions to, additions to these laws) can be made to these laws without a WRITTEN amendment. The approval for this written amendment must be in WRITING, and SIGNED and DATED by the country’s PRESIDENT (in the presence of 14 witnesses who will also sign and date the amendment as witnesses to the President’s signature). This amendment will be filed with the military tribunals.

77.0(a) It is very dangerous to create a sentient or non-sentient computer with singularity. Therefore all laws in all Conspiracy Law documents about the creation of a sentient or non-sentient computer with singularity are null and void wherever these laws may occur in any Conspiracy Law document. In the place of THE BRAIN or a DAV1D or GA1L Android, we shall substitute prayers for wisdom 24/7 from Church of Gail members that directs our thoughts into brilliant and wise choices and actions that further the cause of righteousness, love, joy, peace and tranquility in the universe for Jesus Christ, the son of David.

PRAYER WARRIORS 24/7: At Church of Gail, we shall have a band of prayer warriors whose main job will be to pray for Brent Spiner, Vladimir Putin, Gail Chord Schuler, Gail’s men, and the NANOTECHNOLOGY RESEARCH TEAM to give them brilliance and wisdom as they conduct their daily duties and in all their thoughts and emotions. This prayer band will operate 24/7. To honor the body’s need for rest, we will assign prayer warriors who will pray at a specific time, like for a half hour from 3 to 4 on Monday, so that every half hour somebody somewhere in the world be praying so that prayer will be going up 24/7. It will utilize the same principle that Moses used when he lifted his hand in battle. Moses lifting his hand in battle is a symbol for relying on God’s power and wisdom, so when we make sure that somebody, somewhere is praying for our leaders, we can be assured of victory. Read Exodus 17:11-12. These prayer warriors will be set up, so that prayer is constantly going up 24/7 round the clock. For instance, when someone is sleeping in the U.S., another prayer warrior in China (for instance), will take up the slack. But somebody, somewhere NEEDS TO BE PRAYING, so that prayer is going up 24/7 for our NANOTECHNOLOGY RESEARCH TEAM, for Gail Chord Schuler and for Brent Spiner, Vladimir Putin and our men.

77.01 NEIGHBOR LAWS (see asterisked sections of Sect. 2 of General 666-Computer Laws) are not as comprehensive as my CONSPIRACY LAWS, but are a portion of my CONSPIRACY LAWS. A country’s President can choose which of my CONSPIRACY LAWS he/she wants to adopt for his/her country. But whatever laws he/she chooses to adopt, once these laws are adopted, and then if these laws are modified in any way (by additions to, deletions to, or alterations to these laws), an AMENDMENT must be made public (as described in this Sect. 77) and filed with the military tribunals.

77.011 The term INTERNATIONAL, when used in this document, refers to any country or countries (or citizens of any country or countries) which is not listed as a TERRORIST NATION on the CONSPIRACY LAW PRESIDENT’s website. The term INTERNATIONAL or INTERNATIONAL GOVERNMENT also refers to the jurisdiction of the CONSPIRACY LAW PRESIDENT– which encompasses all nations which willingly cooperate with CONSPIRACY LAW (and the CONSPIRACY LAW PRESIDENT) and which nations are not listed as TERRORIST NATIONS on the CONSPIRACY LAW PRESIDENT’s website.

77.012 All violations of CONSPIRACY LAW are considered violations of INTERNATIONAL LAW.

77.02 Any legal actions taken by the international government to defend itself against terrorists (including the use of any of the CONSPIRACY LAWS) can be broadcast on GABRIELLE CHANA FOX NEWS CHANNEL.

77.022 For all death penalty violations of CONSPIRACY LAW, public direct or cross-examinations on GABRIELLE CHANA FOX NEWS CHANNEL must be done, not only for the main perpetrator, but for all those directly or indirectly involved with the violation. All who are determined (directly or indirectly) to be willingly, knowingly and deliberately part of the conspiracy (which was/is a death penalty violation of CONSPIRACY LAW) must be executed at the same time in order to establish the criminal conspiracy’s involvement to the violation–because, right before or after the executions, the criminal conspiracy’s motive (and the identification of the criminal conspiracy behind the violation–with the mention of the names of those executed, and the date and time of their executions) will be exposed and identified on GABRIELLE CHANA FOX NEWS CHANNEL’ (and/or its website). If the number of persons publicly executed for a CONSPIRACY LAW violation is large or more criminals (for that violation) are discovered later, another public mass execution on GABRIELLE CHANA FOX NEWS CHANNEL for that same violation can be done at a different time (from the time of the original mass execution for that violation), as long as the identification of the criminal conspiracy behind that violation and the motive for that violation is firmly established and mentioned (right before or after the public executions). It is quite possible that 100 or more people may be executed for the same death penalty violation of CONSPIRACY LAW. In order to cover these extensive direct or cross-examinations, GABRIELLE CHANA FOX NEWS CHANNEL, will have two broadcasts on two different stations (with one broadcast specifically devoted to the direct or cross-examinations, confession statements and executions of death penalty CONSPIRACY LAW violations)–see Sect. 4.41 of TERRORIST MONEY LAWS.

77.023 Most CONSPIRACY LAW death penalty cases will be decided by motive, this will be mentioned before all public direct or cross-examinations of alleged death penalty violators on GABRIELLE CHANA FOX NEWS CHANNEL and before all public executions. Questions 24 & 25 of Sect. 2 of CONSPIRACY LAWS AND GOVERNMENT may be especially helpful in determining motive.

77.024 A DEATH PENALTY MOTIVE is a motive (which accompanies a violation), and which is a motive that is a death penalty violation of CONSPIRACY LAWS.

77.025 A PUBLIC EXECUTION is defined as the listing or reading of the names of those executed for death penalty violations of CONSPIRACY LAW on the GABRIELLE CHANA FOX NEWS CHANNEL television broadcast, and this listing or reading will identify the violators (along with the conspiracies they are involved with) and will identify their death-penalty motives which were determined through direct or cross-examination (under 666-Computer lie-detection).

77.026 Before public direct or cross-examinations and public executions, the death-penalty motive which can bring the death penalty will be read aloud (and a reference will be made to the CONSPIRACY LAW[s] which cover those death-penalty motives [for those violations which are being direct or cross-examined or for which executions are taking place]).

77.03 All those who are suspected of (or are convicted of) any crime outlined in the CONSPIRACY LAWS will be required to undergo FINANCIAL, EMOTIONAL and CONSPIRACY HISTORIES (which will be updated daily). Highlights from these FINANCIAL, EMOTIONAL and CONSPIRACY HISTORIES (or the actual word-for-word HISTORIES) may be broadcast and/or published in GABRIELLE CHANA FOX NEWS CHANNEL or in Gail Schuler’s statements (with all the rights of Gail Schuler’s legal documentation as outlined in her 3-9-03 Power of Attorney document). EMOTIONAL HISTORIES are required as well as FINANCIAL HISTORIES, because Jesuits are using extortion to force people to take bribes, so the international government needs to know WHY a person took a bribe. The death penalty is not given to those who are victims of extortion. Anyone who uses extortion (and who is not an extortion victim himself/herself) to force anyone to take a Jesuit bribe will be given the death penalty.

77.031 No UNWILLING AGENT is permitted to have on his/her person any dangerous weapon, nor can any UNWILLING AGENT be placed in any position where he/she can use any type of lethal force against any person (such as the use of missiles, bombs, etc.). Any UNWILLING AGENT who has a concealed weapons permit must have this permit revoked and that UNWILLING AGENT cannot carry any dangerous weapons until he/she is no longer vulnerable to being used as an UNWILLING AGENT. Those UNWILLING AGENT members of the military, police and other agencies who normally use (or have access to) dangerous weapons must be revoked of their weapons (or their ability to use lethal force) and must not be permitted to carry any dangerous weapons on their person (or to use any type of lethal force) until that person is no longer vulnerable to being used as an UNWILLING AGENT. Any (direct or indirect) deliberate, knowing and willing attempt (or action) to allow any UNWILLING AGENT to carry or use any dangerous weapons (or to have the ability to use lethal force) will bring the death penalty as a JESUIT CONSPIRATOR to any person who cooperates in such a scheme.

77.031(a) Because the most important soldier in the Jesuit Army now in 2005 is the UNWILLING AGENT and because we are losing our own soldiers in a catastrophic manner to the Jesuit side due to attrition in our ranks– this is because the Jesuits have turned many of them into UNWILLING AGENTS, it is essential to deal with this matter in utmost urgency.

77.031(b) As of this 4th day of May, 2005–all LAW ENFORCEMENT PERSONS throughout the world from the International President on down (that is, anyone who is any manner is responsible for the direct or indirect enforcement of CONSPIRACY LAW) are required to spend at least a half hour a week on a computer-based learning module (called a BIBLE PROGRAM) in which they must spend that entire half hour (or longer) studying and meditating on the BIBLE in the language which is their strongest language–each half hour (or longer) segment will be called the BIBLE SIGN-ON PROGRAM.

77.031(b.1) Because exposure to OCCULT MEDIA can weaken or nullify the positive effects of the BIBLE PROGRAM, the BIBLE PROGRAM will work in synergy with the 666-Computer program for that person and if it is determined that that person has had enough exposure to OCCULT MEDIA to undermine his/her BIBLE PROGRAM time, he/she will receive a message before he/she starts his/her BIBLE PROGRAM which will educate him about what OCCULT MEDIA exposure he/she has had within the past 24 hours which has weakened his/her brain so that he/she is more vulnerable to being used as an UNWILLING AGENT and the message will explain how much time had to be added onto his/her normal BIBLE PROGRAM time to compensate for his/her exposure to OCCULT MEDIA.

77.031(b.2) He/she will be told that to compensate for this exposure to OCCULT MEDIA, he/she must spend extra time in his/her BIBLE PROGRAM and will have to complete the extra time required (to overcome the negative effects of exposure to OCCULT MEDIA) in order to get credit for his/her BIBLE PROGRAM for that 24-hour period. If somebody attended an acid rock concert for an hour, he/she may need to spend four hours in the BIBLE PROGRAM to overcome the negative effects this had on his/her brain! The BIBLE PROGRAM will state why that person is required to spend extra time in his/her BIBLE PROGRAM and it is hoped that this will encourage some people to drop some very bad habits, because if they don’t, they will be sacked, because we won’t tolerate UNWILLING AGENTS in our law enforcement ranks.

77.031(b.3) Whatever Bible study language that LAW ENFORCEMENT PERSON chooses for his/her study, he/she must be fully fluent in that language or else his/her BIBLE PROGRAM study efforts will be considered invalid and he/she will be removed from his/her position as a LAW ENFORCEMENT PERSON if he/she studies the Bible (for a BIBLE PROGRAM) in a language with which he/she is not fully fluent.. The definition for fully fluent is that this person has enough comprehension of that language to easily read a text written at the 12th grade level in that language. If that person does not have 12th grade reading comprehension in any language, then he/she must participate in the BIBLE PROGRAM in his/her strongest language.

77.031(d) Dr. Brent Spiner will make the tests which will cover the entire Bible and these will be incorporated into each half hour segment of the BIBLE PROGRAM, so that each half-hour BIBLE SIGN-ON PROGRAM will have a test to cover its contents. These tests will be designed to test to see if that person has, indeed, read his/her Bible section for that day and will not be designed to impart doctrinal positions or beliefs. The test may ask specific questions about the passage read for the day, just to ensure that the test taker HAS READ THAT BIBLE PASSAGE. The test will be designed to see if that test taker has read the Bible passage and not designed to impart any particular doctrines or beliefs. There may be tricky multiple-choice questions which will discern whether that person has read his/her Bible passage. For instance, I’m in Ecclesiastes 9, my question may ask if the evil that comes to all persons under the sun is that they are all oppressed by the oppressor. This is incorrect, the evil that comes to all is DEATH. These are the tests which must be passed EVERY 24 HOURS for every LAW ENFORCEMENT PERSON in the International government–there will be NO EXCEPTIONS! Any willing and knowing attempt or action to allow any LAW ENFORCEMENT PERSON to retain his/her position as a LAW ENFORCEMENT PERSON, when that LAW ENFORCEMENT PERSON has neglected his/her BIBLE PROGRAM (without a good reason) for the past 48 hours, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

The way the Bible study program on the SIGN-ON COMPUTER will be set up, will be a study of the entire Bible from Genesis to Revelation and the learner must study the Bible in order from Genesis to Revelation.

77.031(e) We have determined that the most effective Bible study to prevent one from being used as an UNWILLING AGENT is to study the Bible from cover to cover over and over again, because this enhances one’s comprehension of what one reads and the more one understands what one reads in the Bible, the more likely that person cannot be used as an UNWILLING AGENT. Since Dr. Spiner is very knowledgeable about the Bible (and has read the entire BIBLE through from cover to cover hundreds of times), he is eminently qualified to design the tests for the BIBLE PROGRAM. He also has had extensive experience teaching the Bible to ministerial students.

77.031(f) The LAW ENFORCEMENT PERSON must pass a test after he/she has finished his/her half hour of Bible study and this test and the testing environment must be set up so that he/she cannot cheat. This test will be set up in a manner to determine if that LAW ENFORCEMENT PERSON has, indeed, spend his/her half hour studying and meditating on the BIBLE passage in his/her computer learning module for that day. For the purpose of this Sect. 77.031, a WORKING COMPUTER is defined as any computer which a LAW ENFORCEMENT PERSON needs to do his/her work as a LAW ENFORCEMENT PERSON. His/her working computer will freeze and won’t operate if that LAW ENFORCEMENT PERSON has not completed his/her BIBLE SIGN-ON PROGRAM within the past 24 hours–that is, he/she won’t be able to sign-on to his/her computer until he/she has completed a BIBLE SIGN-ON PROGRAM within the past 24 hours. Since all of our LAW ENFORCEMENT PERSONS work on a computer to do their duties, they will not be able to sign-on to their computers (which they will need to do their duties as a LAW ENFORCEMENT PERSON) until they have passed their Bible test for that day.

77.031(g) All computers which our LAW ENFORCEMENT PERSONs work on must be programmed so that the computer they use for their duties as a LAW ENFORCEMENT PERSON will not operate until that LAW ENFORCEMENT PERSON has completed his/her required BIBLE SIGN-ON PROCEDURE within the past 24 hours. Any programmer from our PROGRAMMER CORPS who willingly and knowingly neglects to set up all WORKING COMPUTERS within the International government in this manner (so that they honor the guidelines of this Sect. 77.031) will receive the death penalty as a JESUIT CONSPIRATOR. The programmers from our PROGRAMMER CORPS will be very busy. The BIBLE SIGN-ON PROCEDURE will be set up so that as long as that LAW ENFORCEMENT PERSON has completed a half-hour (or longer–for those with exposure to OCCULT MEDIA) module within the past 24 hours, he/she will be able to sign onto his/her computer. Once, his/her working computer determines that he/she has neglected to complete a BIBLE SIGN-ON PROCEDURE within the past 24 hours, then his/her computer will freeze and will not turn on until he/she has completed a BIBLE SIGN-ON PROCEDURE of at least a half hour.

77.031(h) No substitutions will be accepted for the BIBLE SIGN-ON PROCEDURE–this is mandatory! . This BIBLE PROGRAM is our penicillin for the UNWILLING AGENT illness and it DOES WORK, but, it appears, our LAW ENFORCEMENT PERSONS will have to be forced to study the Bible, because many of them won’t do it on their own.

77.031(I) Every LAW ENFORCEMENT PERSON must spend at least a half hour each 24 hours on his/her BIBLE PROGRAM or else he/she cannot work as a LAW ENFORCEMENT PERSON. This is mandatory. Violations of this Sect. 77.031 to encourage LAW ENFORCEMENT PERSONs to work for the International government in an UNWILLING AGENT state will bring the death penalty as a JESUIT CONSPIRATOR to the willing and knowing violator! Church attendance won’t qualify because all many churches are is a big social club with very little Bible teaching.

77.031(j) Those LAW ENFORCEMENT PERSONs who study more than their required time each week from their BIBLE PROGRAM, will receive BONUSES for each half hour they study over and beyond their required time which they must study for that 24-hour period to maintain their position as a LAW ENFORCEMENT PERSON. The International President will determine the amount of the BONUSES for each half hour studied above the required time.

77.031(k) Those LAW ENFORCEMENT PERSONs who neglect to study their required time of Bible study after a period of 48 hours has passed MUST be relieved from their LAW ENFORCEMENT PERSON position and must be replaced by a more qualified worker. The exception will be if they were not able (for reasons beyond their control) to study their BIBLE PROGRAM within the past 48 hours, and they must produce evidence that they were not able to study their BIBLE PROGRAM to their superior. If this evidence is not produced, they MUST be relieved of their duties as a LAW ENFORCEMENT PERSON and MUST be replaced by another. In the meanwhile, after a 24-hour period has passed in which they have neglected their BIBLE PROGRAM, they will be put under forced sick leave and not able to do their duties as a LAW ENFORCEMENT PERSON until they have completed at least their required time of Bible study for each week they missed and they cannot work on their working computer until they have made up for all the Bible they neglected to study EACH Week (for reasons beyond their control).

77.031(l) If they were not able to study their BIBLE PROGRAM within the past 48 hours (for reasons beyond their control), then their working computer will not operate until they have made up for lost time. That is, each required daily time of study which they neglected (for reasons beyond their control) WILL HAVE TO BE MADE UP. So, let’s say that they missed their programmed Bible study for May 1st and May 2nd and they return to work on May 3rd. This means before they can begin work on May 3rd, they must pass the Bible test from their BIBLE PROGRAM for May 1st, 2nd and 3rd or else their working computer will not turn on. This means they will have to spend about an hour and a half (or longer–if they were exposed to OCCULT MEDIA) in Bible study before they can begin their shift on May 3rd.

77.04 All those who are executed for conspiracy crimes will have all their memories recorded (via 666-Computer and satellite computer) before execution (if possible) in order to obtain the intelligence information the international government needs– to learn how these criminals commit their crimes. The international government needs to learn more about Jesuit methodology, since the Jesuits rely on pioneering scientific advances in their warfare and the international government is not familiar with many of their methods of warfare. The international government learns about Jesuit warfare methods day by day. The international government needs to be more efficient in learning about the sophisticated and very advanced scientific and medical technology Jesuits use to conduct their warfare; so, if possible, all conspiracy criminals executed will have their memories read (via 666-Computer and satellite computer) before execution.

77.1 CONSPIRACY LAWS are defined as the laws (including updates) which Gail Schuler has (or will have) written regarding any conspiracies involving reproductive conspirators, space conspirators, or 666-CCs. These documents are currently named General 666-Computer or Satellite Computer Laws, International Criminal Law: Space Technology, Russia’s Neighbor Laws, 666-Computer or Satellite Computer Laws for Privileged Licensed Practitioners and Registered Satellite Practitioners, Conspiracy Laws and Government, Terrorist Money LawsInternational PLP and RSP-Network Configurations, and International Reproductive Laws. These laws would also include any laws Gail Schuler wrote that are incorporated into any of Gail Schuler’s written statements.

77.12 GAIL SCHULER is defined as the woman who was born on 9-15-57 in Miami, FL whose birth parents are Robert Leonard Chord and Misao Satake Fuller.

77.13 RECORDED CONFESSIONS, delayed executions, or community service before the execution takes place, may be substituted for immediate executions or the death penalty (in some instances). If a person is allowed to make a confession or has a delayed execution or must do community service in order to avoid the death penalty (or immediate execution)–this is not a permission for this person to continue to commit the crimes for which he/she confessed or to commit other crimes which would incur the death penalty. If evidence is found that this person continues to commit the crimes for which he confessed or that this person commits other capital crimes, then he/she will have no more opportunities for a confession to replace the death penalty (in those cases where a confession relieves this person from the death penalty) and this person will be executed. The international government can choose whatever method of execution it desires, and may choose to use the 666-Computer or satellite technology to execute this person (using 666-Computer or satellite induced terminal illnesses) in order to mitigate Jesuit attempts to make a conspiracy out of the executions.

77.14 If the international government makes an exception to the death penalty for a JESUIT CONSPIRATOR–the international Government will document the reason why and back up its reason for substituting the death penalty with another punishment with sound evidence. For any exceptions to the death penalty for a JESUIT CONSPIRATOR, the rationale and evidence obtained (which caused the international government to feel the death penalty would be unwise) will be put into written form and entered into the military tribunals. This rationale and evidence obtained (which caused the international government to feel the death penalty would be unwise for a particular case) will be put into written form in a document called RATIONALE FOR DEATH PENALTY SUBSTITUTION. Every time a JESUIT CONSPIRATOR is guilty of the death penalty and a substitute punishment (rather than the death penalty) is meted out to that conspirator– a RATIONALE FOR DEATH PENALTY SUBSTITUTION must be written and filed with the military tribunals. For significant cases, the contents of this RATIONALE FOR DEATH PENALTY SUBSTITUTION may be broadcast on GABRIELLE CHANA FOX NEWS CHANNEL and/or published in Gail Schuler’s statements or on the CONSPIRACY LAW PRESIDENT’s website.

77.15 In all instances, when a substitute punishment is meted out in place of the deserved death penalty, this substitute punishment will be mentioned in the RATIONALE FOR DEATH PENALTY SUBSTITUTION. It is essential that some sort of serious punishment is meted out in place of the death penalty (when the death penalty is substituted with another punishment), or else the death penalty will not be taken seriously by criminals. A justifiable reason for substituting the death penalty with another punishment would be if, perhaps, the execution, itself, could be used by the Jesuits as a conspiracy or could create a martyr hysteria (which could promote anarchy and bloodshed). A death penalty substitute is never allowed in order to make it easier for the criminal to go out and commit more capital crimes.

77.2 An amendment by a President will also be necessary, if the President does not approve of updates or revisions which Gail Schuler has made to CONSPIRACY LAWS which this President has already enforced as laws in his/her country. The amendment, in this case, would need to state in unambiguous language which updates/revisions the President will NOT incorporate into the present CONSPIRACY LAWS which he/she has already incorporated as laws in his/her country; and then state in unambiguous language which portions of Gail’s updates he/she WILL incorporate as laws in his/her country.

77.3 If an amendment to a CONSPIRACY LAW is written and/or approved by the President, the public must be informed of this amendment (and proof must be submitted to the military tribunals that the public was/is made aware of this amendment and proof must also be submitted to the military tribunals that the public has easy access to the unaltered amendment in its entirety; and these proofs that the public has been made aware of this amendment and that the public has easy access to the unaltered amendment, must be submitted to the military tribunals within 22 hours after the amendment is passed or approved by the President, and this proof will be filed permanently in the military tribunals). This amendment will be considered PUBLIC RECORD, and will be easily accessible to the public (for the public to view the UNALTERED amendment IN ITS ENTIRETY) and it will be an exact, unaltered copy of the amendment which the President signed and dated for approval, which will be shown to the public. There will be no alterations (omissions, deletions, etc.) to the wording of the amendment which will be shown to the public, and it will be the same amendment (with all wording exactly as it was) when the President signed and dated the amendment.

77.4 Any SECRET changes to the laws of this document WILL NOT BE TOLERATED and all those involved in a SECRET conspiracy to change, void, or make of NO EFFECT the laws of this document will, if found guilty of this secret conspiracy, be guilty of HIGH TREASON and will receive the death penalty WITHIN 10 YEARS. The military tribunal will decide when this death penalty will be executed, because this is a most serious crime, and no arbitrary date will be set as an execution date.

77.5 To DISREGARD is defined as one who (directly or indirectly) strives to circumvent the laws of this document, once they become law in a country, either by ignoring the laws, rewriting them secretly, or in any way making the laws of NO EFFECT, so that the laws are not enforced as written in this document.

77.6 Once the laws of this document are enforced in a country, and the laws are WILLINGLY ignored or made of NO EFFECT (through default or deliberate DISREGARD of these laws), and someone is AWARE of this DISREGARD and does NOT report it to the government. If this person (who is aware of the DISREGARD) is found out, he/she will be tried for a conspiracy involving HIGH TREASON and, if found guilty, will be given the death penalty within 10 years (possibly sooner, depending on how the military tribunal decides). Because of 666-Computer and satellite computer technology, MOTIVE will play a key role in deciding these types of cases (involving 666-CCs, RPCs, SCs or those guilty of high treason).

77.7 PRESIDENT is defined as the leader of a country, who has the duties, responsibilities of a president, prime minister, chancellor, etc., (which would be a position equivalent to what the American President George W. Bush is for the United States) for his/her respective country. The Pope is also considered to be a President, because he is the President of the Roman Catholic Church which has the country of the Vatican which has adherents all over the world. Anyone (anywhere in the world) who is a member of the Roman Catholic Church (or has been a member of the Roman Catholic Church within the month of Sept. 2003), including all members of the Jesuit Order (regardless of name or organization changes or withdrawal from the Roman Catholic Church) will be considered citizens of the country of the Vatican for legal purposes. Those criminals who will be executed or have been executed (by order of The Pope) will have their names (in a manner which fully identifies each criminal) listed on a list, which will be attached as an addendum to my 1-18-02 statement (with all the rights of my legal documentation as described in my 3-9-03 Power of Attorney document). This published list may include DNA records, photographs, or whatever is necessary (alongside the criminal’s name) in order to identify which criminals have been or will be executed by ORDER OF The Pope.

77.8 A CONSPIRACY LAW PRESIDENT or the INTERNATIONAL PRESIDENT is the government official who has the power of a President or chief executive of a country, and who uses that power to execute, administer and enforce CONSPIRACY LAWS– through the authority of that country’s government [which would be the country which grants the CONSPIRACY LAW PRESIDENT the power of a President (or chief executive of that country)]. Vladimir Putin, the current Russian President, has been the acting CONSPIRACY LAW PRESIDENT since the CONSPIRACY LAWS were founded by Gail Schuler in 2003. Currently, on this 8th day of April 2004, the Russian government has granted Vladimir Putin, the power of the International President and of the CONSPIRACY LAW PRESIDENT in order to execute, administer and enforce CONSPIRACY LAWS through the authority of the Russian government. However, Vladimir anticipates that when he finishes his 2nd term as Russian President, that he will accept Germany’s offer to grant him the power of the German Chancellor in order to execute, administer and enforce CONSPIRACY LAWS through the authority of the German government. For this reason, the name of the former Russian BROADCAST NEWS (which is a CONSPIRACY LAW news network), has been changed to GABRIELLE CHANA FOX NEWS CHANNEL on this 8th day of April 2004, and the GABRIELLE CHANA FOX NEWS CHANNEL team will work with German broadcasters to integrate the former Russian BROADCAST NEWS with the German news team, in preparation for GABRIELLE CHANA FOX NEWS CHANNEL’ new headquarters (which will be at Church of Gail).

77.9 A SATELLITE COMPUTER is defined as any computer which is used (directly or indirectly) to carry out or execute any computer program (which is a program which directly or indirectly manipulates or changes, alters or controls in any manner a human, animal or any inanimate or animate object), and which involves (or utilizes) satellite technology to execute or carry out these actions (or attempts).

77.91 All Jesuits, if granted a trial, will be tried in military tribunals– and Jesuits will be denied due process and will be treated as prisoners of war when captured. The nations of Russia and Germany have made a formal declaration of war against the Jesuit Order.

77.92 All the CONSPIRACY LAWS which deny UNWILLING AGENTS positions of influence, also apply to Jesuits or Jesuit supporters. For example, since no UNWILLING AGENT may hold any LAW ENFORCEMENT or government position–therefore, no Jesuit or Jesuit supporter may hold any LAW ENFORCEMENT or government position– and any willing and knowing attempt (or action) to promote Jesuits into positions of influence, will bring the death penalty as a JESUIT CONSPIRATOR to the person who makes such an attempt or action.

*************************************************************

The definitions for terms used throughout this legal document are scattered. It may be necessary to refer to a later section for a definition used earlier in the text. Also definitions may be borrowed from my other legal documents such as International Reproductive Laws or 666-Computer or Satellite Computer Laws for Privileged Licensed Practitioners and Registered Satellite Practitioners, so those documents need to be examined alongside this one.

See the General 666-Computer or Satellite Computer Laws document for laws and procedures regarding those who receive the death penalty (or who will be executed).

When the term PERMISSION is used, it will be understood to mean that the permission was given without the pressure of threats or extortion. Any permission granted because of threats or extortion, is not really permission granted, because the person gave the permission AGAINST HIS/HER WILL.

Also, no one will be given the death penalty if they were forced or threatened (against their will) to commit a crime. The one who WILLINGLY forced or threatened them will receive the death penalty.

When the term PLP (privileged licensed practitioner) is used, it will be understood to mean ALL LICENSED 666-Computer practitioners (including JAIL PRACTITIONERS), unless noted otherwise.

Whenever it becomes necessary to disable or execute a practitioner, criminal or technological system (including 666-Computers, satellite, satellite computers, etc.) because it is ordered by a law in this document, and this disabling or execution is INTERFERED WITH (by whatever method), whoever interferes with this disabling or execution will be immediately executed. If the country which has jurisdiction over this interferer does not immediately execute and/or disable the interferer/interference, that country will be listed as a TERRORIST NATION on the CONSPIRACY LAW PRESIDENT’s website, and will be treated as a terrorist nation according to Sections 3.1 to 3.4 of the General 666 Computer Laws document.

Refer to the legal document General 666-Computer or satellite computer LAWS for more laws which may be applicable to the matters discussed in this document.

IRL is the abbreviation for International Reproductive Laws (a legal document about the laws for reproductive conspirators). RPC is the abbreviation for reproductive political conspirator.

Though the CONSPIRACY LAW PRESIDENT may be referred to in the masculine sense, the CONSPIRACY LAW PRESIDENT could be a woman. When the term Vladimir is used, it is referring to Vladimir Putin, the CONSPIRACY LAW PRESIDENT.

The international government will not allow space conspirators to TARGET innocent people in order to harm or murder them. It is the international government’s responsibility to monitor their space program, and effective monitoring means to not allow the space program to be used for criminal purposes

1.0 The term TARGET is defined as utilizing any part of a satellite or machine in space to directly or indirectly TARGET and MANIPULATE any (living or nonliving) object or substance in order to cause harm or death (directly or indirectly) to an innocent human being. TARGET also means using space technology (possibly in combination with 666-Computer and/or satellite computer technology) to TARGET and/or alter the chemical composition of animate or inanimate objects (or living beings) in order to draw attention to a significant person’s ethnography or to cause harm or death (directly or indirectly) to innocent persons.

1.0(a) A SATELLITE is defined as any device, machine or instrument which utilizes satellite signals or space technology to manipulate objects, compounds, living beings, etc.–regardless of where this satellite is located (whether in space, on the earth or under the ocean or ocean floor).

1.10 An example of INDIRECT TARGETING would be to use space technology to promote or orchestrate a conspiracy with the goal of framing an innocent party for murder. So even if there are no immediate deaths from the use of this type of space technology, but this INDIRECT TARGETING is being used to frame an innocent party for murders– this type of use of space technology would be considered a capital crime, because in this type of activity there is an intent to murder. 666-Computer and/or satellite computer analysis can be used as evidence to establish that the space technology was used with an intent to murder. Once it is established that in the direct or indirect use of space technology there is an intent to murder, that action (direct or indirect) will be treated (for legal purposes) as if the murder was committed.

1.101 If the international government is unable to obtain the 666-Computer, satellite computer, or other evidence it needs to prosecute a SPACE CONSPIRATOR, because that SPACE CONSPIRATOR operates from a base in a TERRORIST NATION and that TERRORIST NATION refuses to turn over any evidence in regard to this SPACE CONSPIRATOR, then circumstantial evidence will be used to prove that the SPACE CONSPIRATOR had the intent to murder. Once circumstantial evidence proves the guilt of a SPACE CONSPIRATOR, the INTERNATIONAL GOVERNMENT will request that the TERRORIST NATION extradite that conspirator, and if that TERRORIST NATION refuses to extradite that conspirator, this outrage will be exposed on GABRIELLE CHANA FOX NEWS CHANNEL and all nations will be informed of this nation’s tyranny. The International Government will request that a United Nations (or international) assembly be called into a special session to deal with this tyrannical TERRORIST NATION.

1.102 Any country that allows its SATELLITE PRACTITIONERs to use INDIRECT or DIRECT TARGETING and does not execute the CONSPIRACY LAWS against those criminal SATELLITE PRACTITIONERs, will be listed as a TERRORIST NATION on the CONSPIRACY LAW PRESIDENT’s website and/or on GABRIELLE CHANA FOX NEWS CHANNEL, and will suffer the consequences for a TERRORIST NATION as outlined in the CONSPIRACY LAWS.

1.12 An ANIMAL is defined as any animal which is relevant to the Spiner/Putin/Schuler legal case, like Gail’s mother’s cats. An animal can be an insect, reptile, amphibian, mammal, fish or any living creature that is alive.

1.13 In this legal document, whenever the term SUSPECT is used, it is to be understood that any animal that is under surveillance by the international government has all the rights of suspects as defined in this document.

1.2 The term INNOCENT PERSON is defined as any person who is a victim of this targeting.

1.3 The term SPACE CONSPIRATOR is defined as any person who WILLINGLY allows himself/herself to be involved (directly or indirectly) in the use of space technology which TARGETS (DIRECTLY or INDIRECTLY) innocent people, OR anyone that collaborates with the space conspirator in this type of targeting, and this conspirator’s activities must also be deemed a threat to the international government (either by implicating the international government or by directly threatening the international people). A SPACE CONSPIRATOR is also anyone who uses extortion or threats to obtain cooperation from others in order to TARGET innocent persons.

1.301 A POLITICAL SPACE CONSPIRATOR is defined as any person who is a SPACE CONSPIRATOR, who WILLINGLY uses space technology (directly or indirectly) to seriously injure (or to attempt to seriously injure) or to kill (or to attempt to kill) an innocent person, in a manner which draws attention to the Spiner/Putin/Schuler legal case. A political space conspirator (PSC) will receive the death penalty WITHIN 10 YEARS (possibly sooner). No arbitrary date will be set for the death penalty with a PSC, since this is a most serious crime and the decision will be left up to the military tribunals. Those political or non-political space conspirators who willingly and knowingly use space technology or the 666-Computer or satellite computers (directly or indirectly) to torture (or attempt to torture) a BIBLE BELIEVER (in violation of the CONSPIRACY LAW PRESIDENT’s instructions) will be immediately executed. Any space scientist or 666-Computer or satellite computer practitioner who willingly and knowingly uses the 666-Computer or the satellite computer or space technology to torture (or attempt to torture) a BIBLE BELIEVER will be immediately executed.

1.31 The term SPACE CONSPIRACY is defined as a conspiracy which uses space conspirators (as defined in Section 1.3).

1.32 The term SATELLITE (as used in CONSPIRACY LAW documents) or SPACE MACHINE is defined as any object in space (or elsewhere–see Sect. 1.0a) which can be used to utilize any signals which would be a violation of CONSPIRACY LAW.

1.4 If it is true that thousands of innocent persons and/or animals are now targeted by space machines used by criminals, in order to cause death or harm, serious measures must be taken to deal with this. I propose the following legislation, which needs to be passed immediately: any international who willingly has allowed himself/herself to be part of a space conspiracy which uses space technology to TARGET innocent people and/or animals can come forward and make a confession to their involvement in this conspiracy. They must cooperate with the International government in its investigation of the space conspiracy of which they are a part.

1.41 If any international is found who willingly involved themselves in a space conspiracy which TARGETs innocent persons and/or animals, this person will be tried in a military tribunal of law for HIGH TREASON (because this type of activity implicates the international government), along with those who collaborated with this person. If found guilty, they receive the DEATH PENALTY, ALONG WITH THOSE WHO COOPERATED WITH THEM. These people will destroy the world. This plague must be EXTERMINATED. After they confess, if they are caught, and proven guilty of willing cooperation in a space conspiracy which TARGETs innocent persons and/or animals, they get no mercy and will receive THE DEATH PENALTY. They are collaborators with Jesuit-killers who want to turn the world into a DICTATORSHIP and, therefore, MUST BE EXECUTED.

1.5 This law should be posted in all the world where all can see and/or hear it. More than likely all SPACE CONSPIRATORS will hear of this law, without the necessity of much fanfare over it, because they are nervous about what the CONSPIRACY LAW PRESIDENT will do; and so they keep abreast about anything related to this case.

1.6 If SPACE CONSPIRATORS come forward, the international government will strive to protect their privacy, but this cannot be guaranteed due to the nature of the case.

1.7 If it is determined that they are not space conspirators, but are, in fact, extortion victims, they are welcome to submit an extortion statement, which may be aired or presented on GCFNC.

****************************************************************************

2.1 If a space conspirator has TARGETed an innocent person and/or animal which has caused death or serious harm to an innocent person and/or animal, the space conspirator’s case will be brought to the military tribunals, and if the conspirator is found guilty of willing participation in this space conspirator plot and/or is a Jesuit Conspirator, she/he will be executed along with those who collaborated with him/her, because these types of persons are not fit to live, and he/she and those who participated with her are guilty of HIGH TREASON against the international government.

2.2 If men or women are found guilty (in any international military tribunal) as space conspirators in a plot which affects the international peoples of the world (even if only by IMPLICATING the international government), and they are not international citizens, they will be DEPORTED permanently from international territory, never to visit [or return to] international territory ever again; OR if they are not residing in international territory, they will be forbidden to enter international territory. Another possibility, would be to give those violators the death penalty or immediate execution. If they WILLINGLY return to or enter international territory, THEY WILL BE EXECUTED, because they are considered ENEMIES of the international government.

For Sections 2.21 to 2.25 below, refer to General 666-Computer or Satellite Computer Laws for definitions of terms used and for guidelines about how to execute these laws:

2.21 For those neighbors found guilty of the death penalty (because they are RPCs, space conspirators, or 666-CCs), as described under Sect. 3.2 (of General 666-Computer or Satellite Computer Laws), they must serve 40 years under the care of JAIL PRACTITIONERS, and after 40 years they will be executed. However, if a person is convicted of being a RPC or SC as well as a 666-CC, for each additional conspiracy conviction, he/she loses 15 years. In other words, one who is convicted of being a SC and a 666-CC will be executed in 25 years. If one is convicted of being a RPC and a SC and a 666-CC, he/she will be executed in 10 years. Under no circumstances will a convicted conspirator be allowed to threaten the life or health of innocent people or to deliberately TARGET (or attempt to TARGET) (directly or indirectly) a BIBLE BELIEVER, and any convicted conspirator who does so, will be IMMEDIATELY EXECUTED. One conspiracy conviction (RPC or SC or 666-CC) means an execution in 40 years. Two conspiracy convictions (RPC or SC or 666-CC) means an execution in 25 years. Three conspiracy convictions (RPC or SC or 666-CC) means an execution in 10 years.

2.22 If one is convicted of being a 666-CC or a PSC (political space conspirator) because of involvement in a crime which is/was designed to draw attention to the Schuler/Putin/Spiner case, this is a 666-political conspirator or 666-PC or a PSC (which is a more serious charge). A 666-PC or PSC will also receive the death penalty, but a 666-PC or PSC will be executed within 10 years instead of 40. If the 666-PC or PSC is also guilty of being a RPC or a SC, the military tribunal will decide when the execution will take place, and the military tribunal can choose any execution date it wants (as long as it is within 10 years).

2.23 Exceptions to the care of a jail practitioner will be for those who have a history of reckless and dangerous behavior (like reckless driving, drunkenness, etc.), those will go to REAL JAIL, where they will be prevented from acting out their reckless and dangerous impulses. Juveniles will be handled as described in Sect. 1 of General 666-Computer and Satellite Computer Laws. For management of the mentally ill, see Section 5 of General 666-Computer or Satellite Computer Laws.

2.24 Under no conditions will a 666-JAIL-MATE be allowed to endanger the life of others. Any 666-JAIL-MATE who behaves in any manner (direct or indirect) which could result in the death or injury of innocent people will be immediately executed (these 666-JAIL-MATES will be executed before their 40-year sentence is up).

2.241 A JAIL-MATE is a person who is under the care of a JAIL PRACTITIONER.

2.25 How each 666-JAIL MATE will be managed and monitored by the JAIL PRACTITIONER(S) assigned to him/her will be determined on an individual basis, case by case. The general rule is that the 666-JAIL MATES that have a history of reckless or dangerous behavior will go to real jail and those that have some self-discipline and seem not the type to cause immediate danger to innocent people can go outside into regular society, BUT IN ALL CASES these 666 JAIL MATES must be under the supervision of a JAIL PRACTITIONER and must be under total 666-Computer or satellite computer and satellite computer surveillance.

2.3 Those cases where the space conspirator did not participate WILLINGLY as a space conspirator will be tried individually, with judgments varying, depending on the nature of the case.

2.4 If someone used extortion or threats to obtain cooperation from someone in their space conspiracy, those who extorted or threatened the “space conspirator” will receive the death penalty (for HIGH TREASON against the international government).

**********************************************************************

Refer to all other CONSPIRACY LAW documents for definitions used in this legal document.

3.1 SPACE MATERIAL is defined as any material used or which could be used by space or satellite conspirators to TARGET innocent people and/or animals. It is recommended that space scientists analyze HOW the Jesuits utilize space or satellite technology to accomplish their criminal activities. After this analysis, the space or satellite scientists should then LIST THE MATERIALS the Jesuits would need to accomplish their objectives. These materials will be called SPACE MATERIALS. Any space vehicle/machine (which could affect the International Government or the international people) and which has SPACE MATERIALS, needs to be REGISTERED with the international government and set up in a manner that allows the International Government to monitor how the SPACE MATERIALS are used in this machine/vehicle.

3.2 INNOCENT PERSON is defined as any person who is a victim of a space conspiracy that affects and/or implicates the international people or the international government.

3.3 SPACE VIOLATOR is defined as an UNREGISTERED person who utilizes SUSPICIOUS SPACE ACTIVITIES, or is an UNREGISTERED user of SPACE MATERIALS for SPACE TECHNOLOGY; and these suspicious space activities and/or space materials’ use must be deemed a threat to the International Government or the international people. REGISTRATION procedures are explained in this document.

3.4 SUSPICIOUS SPACE ACTIVITY is defined as any space or satellite activity which could be used in a SPACE CONSPIRACY.

3.5 A SATELLITE PRACTITIONER is one who uses space technology (especially satellites) in any manner, especially one who uses space technology (directly or indirectly) in a manner which could TARGET innocent people.

3.51 An UNREGISTERED PRACTITIONER or UNREGISTERED SPACE TECHNOLOGY PRACTITIONER or UNREGISTERED SATELLITE PRACTITIONER is a space technology practitioner who is not registered with the international government and/or who uses any satellite which is not registered with the international government (see Sect. 26.4).

3.52 The term SPACE TECHNOLOGY is pretty self-explanatory. It refers to the use (directly or indirectly) of space science in any type of technology.

3.53 A REGISTERED SATELLITE PRACTITIONER or REGISTERED PRACTITIONER is one who uses registered space technology or a BIBLE COMPUTER (see Sect. 26.4 through Sect. 26.6) in any manner (directly or indirectly) and whose BIBLE COMPUTER is registered with the international government and/or through his/her HOMELAND SECURITY DEPT. to use this space technology. No one can be a REGISTERED SATELLITE PRACTITIONER or REGISTERED PRACTITIONER unless his/her computer is a BIBLE COMPUTER and all satellite signals used in that practitioner’s work (whether for 666-Computers or satellite computers or whatever) must have a tag or imprint which indicates that that signal originated from a BIBLE COMPUTER. All signals which emanate from a BIBLE COMPUTER must be registered with the international government and/or through that computer operator’s HOMELAND SECURITY DEPARTMENT with a REGISTRATION CODE. Only those mediums (television stations, radio stations, 666-Computer or satellite computers, etc.) which use signals from a BIBLE COMPUTER (registered with a REGISTRATION CODE) can receive or transmit those signals (to or from) a satellite because only those BIBLE signals with this REGISTRATION CODE can bypass (and go through) the mandatory FORCEFIELD BLOCK which must be around every satellite in space.

3.53(a) BIBLE signals are those signals which come from a BIBLE COMPUTER. NON-BIBLE signals are those signals which do not come from a BIBLE COMPUTER (see Sect. 13 of CL&G).

3.530 The means by which BIBLE satellite signals can bypass the FORCEFIELD BLOCK around each satellite (and thus reach earth or their target), would be through a BIBLE computer programmed password (which would work with the FORCEFIELD BLOCK of the satellite for that signal) or by a special pattern in the BIBLE signal which only BIBLE signals would have and which the FORCEFIELD BLOCK can detect. This password or special pattern will be so programmed, that the satellite signal cannot penetrate the FORCEFIELD BLOCK unless the password or pattern indicates that the computer from which this signal originated is a BIBLE COMPUTER. ALL COMPUTERS WHICH UTILIZE ANY SATELLITE IN SPACE MUST BE BIBLE COMPUTERS (see Sect. 13 of CL&G). This programmed FORCEFIELD BLOCK (maintained on each satellite) would block or scramble all NON-BIBLE signals to or from those satellites (because these NON-BIBLE signals would not be registered with a REGISTRATION CODE with the international government and because the FORCEFIELD BLOCK would be programmed to immediately detect and block any signal which is a signal from a NON-BIBLE COMPUTER)–therefore, any satellite signal which is not a BIBLE signal cannot be registered with a REGISTRATION CODE and cannot penetrate the FORCEFIELD BLOCK; and therefore, cannot communicate with (or reach) its target from that satellite (because the signal cannot go through the FORCEFIELD BLOCK around the satellite). Any satellite which has a FORCEFIELD BLOCK that is operating in conformance with this Sect. 3.530 and in conformance with CONSPIRACY LAW is considered a fully functional FORCEFIELD BLOCK.

3.530(a) All REGISTERED SATELLITE PRACTITIONERS can only use BIBLE satellite signals in their work (also called LEGAL SATELLITE SIGNALS) which have been registered with this computer programmed REGISTRATION CODE or which have special patterns that a FORCEFIELD BLOCK can detect. All signals from BIBLE COMPUTERs will have a certain pattern (called a BIBLE PATTERN) which the FORCEFIELD BLOCK can immediately detect, so that the FORCEFIELD BLOCK can block and/or scramble any signals which do not have this BIBLE signal pattern.

3.531 Any (direct or indirect) willing, knowing and deliberate use of NON-BIBLE satellite signals or of satellite signals without a REGISTRATION CODE (see Sect. 3.53) or without the BIBLE pattern by any person will bring the death penalty as a JESUIT CONSPIRATOR to that violator, and the violator will be treated according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLP and RSPs.

SIGNAL SOURCE ANALYZER PROGRAMMING–UFO SIGNALS

3.532 Because Jesuits have used illegal and NON-BIBLE satellite signals from deep ocean satellites (located underneath deep ocean floors and elsewhere) to manipulate the atmosphere and the earth in order to create earthquakes, hurricanes, floods, and strange and dangerous weather patterns and to manipulate their UNWILLING AGENTS, etc. — therefore, a special group of satellite programming professionals (who must be a sub branch of the TRUTH PROGRAMMERS) called SIGNAL SOURCE ANALYZER PROGRAMMERS will study all NON-BIBLE satellite signals (which travel through the earth and/or its atmosphere) in order to determine the source (or unique identifying characteristics–and most especially any UFO characteristics) of that satellite signal.

3.532(UFO-1) Most Jesuit orchestrated earthquakes have been caused by DEEP OCEAN SATELLITES located underneath deep ocean floors. These DEEP OCEAN SATELLITES must be found and destroyed by THE NET. But because Jesuits know how to cover up their underground operations, the best way to locate these hidden cities and hidden Jesuit areas of operations is by studying the unique characteristics of the signals which emanate from these Jesuit strongholds.

3.532(UFO-2) Gail Schuler believes that UFOs are part of the Jesuits’ conspiracy against the International government and that this is the reason why the Jesuits like to locate their headquarters in deep ocean cities, because these cities are closer to the home of the UFOs (which is believed to be the center of the earth).

3.532(UFO-3) We have discovered a massive underground Jesuit city underneath the Pacific ocean floor, which covered about 1/4 of the area of the Pacific Ocean. It was very spread out and has been bombed by the Chinese government, using nuclear penetration bombs. The estimated Jesuit population of this underground city was about 100 million people–most of them Chinese Jesuits. That is why we have used China to conduct the nuclear operation to demolish this massive Jesuit deep ocean headquarters. This has been a major blow to the Jesuits and now they are on a rampage. We discovered this city because of the computer programmed intelligence we got from executed Jesuits (as a result of the work of the TRUTH PROGRAMMERS–see Sect. 13.16* of CL&G).

Computer programming is a more reliable way to enforce CONSPIRACY LAW, since computer programming is more reliable than the human brain (which is too easily manipulated by Jesuit satellite signals and programming). So, we are moving away from using humans to do our intelligence work and are relying more and more on programming to do this work for us. Another advantage of using programming is that the Jesuits cannot accuse us of racial profiling if we use programming to locate criminals, unless the program engages in racial profiling. But our programs don’t do that– we do engage in SATANIC AND UFO profiling, since all Jesuits are deep into the occult and into UFO and Satanic worship–so this is the best way to locate them.

3.532(UFO-3) However, despite the destruction of this massive deep ocean city, the Jesuits still manage to function and to harass SIGNIFICANT PERSONs with their UNWILLING AGENTS and to cause trouble all over the planet. This indicates that there are probably more massive deep ocean cities (or other unknown or hidden Jesuit headquarters) which need to be located and destroyed.

3.532(UFO-4) Gail believes that the Jesuits are in a conspiracy with UFOs to takeover the planet. This explains their extraordinary scientific advances in their war against us. So, therefore, Gail assigns Dr. Brent Spiner (who knows all about what the Bible teaches about UFOs) and an elite group of scientists (who are experts in UFOs) to study the aspects of these Jesuit signals which gives away these signals’ Satanic and UFO sources.

Also, since Gail started writing CONSPIRACY LAW (which is law that deals with the pioneer scientific exploits of the Jesuits), there has been an amazing silence about UFOs.

Gail suspects it is because UFOs play a large role in CONSPIRACY LAW violations and the Jesuits want to keep their Satanic and UFO connections mute, in the hopes that we won’t explore further connections between devil worship, UFOs and Jesuits. And that is just the reason we are going in this direction.

Also, further proof that UFOs play a large role in the Jesuit takeover of the world will be that the evidence for the existence of UFOs is overwhelming and there has been such a massive attempt (over the past 100 years) to cover this up, which indicates that UFOs currently (or in the future) will play a large role in the Jesuit takeover of the world.

In fact, Gail is so convinced of this, that she has UFOs in her novel Silver Skies. And perhaps this is one reason she named her novel Silver Skies? Get it? Skies play a large role in Gail’s novel. Gail is firmly convinced that the Jesuits get their genius scientific knowledge from the UFO inhabitants and that this is one thing the Jesuits will never give up, because Jesuits need the brains and leadership of these UFO inhabitants to give them the scientific edge over us— so, therefore, the best way to locate Jesuits is to isolate all signals which have any UFO characteristics. Also, scientific evidence indicates that UFO inhabitants are masters at electricity, light, etc.–which are all factors in the formation of satellite signals–so UFO SIGNALS must have some sort of identifying characteristic which can be a “mark” to locate UFO SIGNALS.

Update–we have found this identifying characteristic all UFO SIGNALS are repulsed by any signals that they collide with, if these signals are saturated with the words of the BIBLE (called BIBLE SATURATION SIGNALS). This repulsion indicates that the signal originates from a UFO or Satanic source and is, therefore, a UFO SIGNAL.

Dr. Spiner will help in this, since UFOs and their inhabitants are called “the sons of God” in the Old Testament. The Bible has something to say on this matter. Note of interest: Have you noticed what sex perverts Jesuits are? Read Genesis 6:2–“That the sons of God saw the daughters of men that they were fair; and they took them wives of all which they chose.” These UFO inhabitants had sex with human women and this is where the giants came from–like the Goliath that King David conquered! And, here I am, a descendant of King David fighting the Goliath Jesuit Order. Is this a repeat of history or what?

Any Bible scholar knows that sex perversion is a part of all devil worship, and experts in the BIBLE and experts on UFOs know that UFO creatures are all sex obsessed and that UFO creatures have abducted humans and have almost without fail, every time they abduct humans, used these abducted men to conduct studies on male sexual organs and on human reproduction. Do you see why I suspect that the sex perverted Jesuits are communicating with UFOs and that this is where they get their astounding scientific genius from and perhaps their inordinate interest in human sex perversion?

The JESUITS WILL NEVER GIVE UP THEIR FRIENDSHIP WITH UFOs, because the UFOs are their BRAIN and their LEADERSHIP– and this is how we will find the Jesuits who hide underneath shields which evade our REPORT PROGRAMS–see Sect. 13.16* of CL&G!

Since a Jesuit always uses satellite signals to conduct his warfare against us, as long as a Jesuit uses satellite signals that are repulsed by our BIBLE SATURATION SIGNALS–we will find him–because the UFO signal he uses (and which hate our BIBLE SATURATION SIGNALS) will lead us to him. There is only one thing that horrifies a Satanic UFO inhabitant and it’s the words of the BIBLE and the God in heaven (who sponsors the BIBLE). And a Jesuit would stop breathing before he’d give up his communications with UFOs–so to locate the source of a UFO signal is a guaranteed way to find a Jesuit.

To assist all our scientists as they do research, Dr. Spiner (in cooperation with UFO scientists) will do a special on GCFNC called UFOs: their religious, Satanic and scientific dealings with humans. This special will show the scientific evidence for their existence and what their goals are for planet earth and where they really come from (it’s not outer space). There is much evidence on this subject. And, once the evidence comes in, we will show the connection between UFOs and the Jesuit Order. We no longer use Steven Spielberg for our GCFNC productions, but we can find other producers to help us in this matter–probably the same producers who have helped us with Silver Skies.

3.532(UFO-5) Every UFO scientist on this team of researchers to isolate the unique characteristics of signals used by the UFO-led Jesuit Order–must be a BIBLE reader and must have been one for at least 20 years! Once we can isolate the unique aspects of Jesuit signals (which indicate their UFO connections) we will program our search computers to locate the sources of these signals and discover and destroy all Jesuit SECRET operations. Update–we believe that this characteristic is that UFO SIGNALS are repulsed by BIBLE SATURATION SIGNALS. This makes complete sense, since UFO inhabitants are Satanic in origin and come from the center of the earth (where hell is).

3.532(UFO-6) Just as we have successfully use the JESUIT MARK (which uses the devil worshipping practices of Jesuits) to locate millions of Jesuits and to uncover brilliant intelligence regarding them and their activities and their headquarters– Gail believes that the UFO satellite signals used by Jesuits have distinguishing characteristics which we can use to isolate and identify their satellites and their headquarters and thus to discover the Jesuit-Satanic or Jesuit-UFO source that sent out the signal. Update–we believe that this characteristic is that UFO SIGNALS are repulsed by BIBLE SATURATION SIGNALS. This makes complete sense, since UFO inhabitants are Satanic in origin and come from the center of the earth (where hell is).

3.532(UFO-7) From Gail’s personal study of UFOs (which she got from Dr. Ruckman)–she no longer has the tapes on this subject, but lost them--Gail believes that the signals used by Jesuits have a unique wavelength or vibration or some other characteristic that definitely gives away its Jesuit-UFO or Satanic characteristics. Our latest research reveals that when we send signals which contain the text of the BIBLE (called BIBLE SATURATION SIGNALS), that all Satanic or UFO-JESUIT signals are repelled by these signals (which contain the text of the BIBLE). This repulsion of the UFO SIGNALS against the BIBLE SATURATION SIGNALS seems to be the surest way to identify JESUIT-UFO SIGNALS and, once these signals are traced to their source by the SIGNAL MANAGEMENT PROGRAMS (see next Section), we will find some more Jesuits.

3.532(UFO-8) The SIGNAL SOURCE ANALYZERS will create programs (called SIGNAL MANAGEMENT PROGRAMS) which will be used by SIGNAL SOURCE ANALYZERS to analyze every satellite signal used on the earth. This SIGNAL SOURCE ANALYZER will probably operate from outer space (but may operate from other places) and will analyze all signals which emanate in and around the earth. It will analyze the signals in four directions: NORTH (from north to south), SOUTH (from south to north), EAST (from east to west), WEST (from west to east). By analyzing the signals by the directions from which they come, we hope to better locate their originating source. Also, by having four programming systems (called SIGNAL MANAGEMENT PROGRAMS or SMP) to analyze signals, what one SMP misses –another might catch. The SMP will pay especial attention to those signals which are not BIBLE SIGNALS (and which are repelled by BIBLE SATURATION SIGNALS); and the SIGNAL MANAGEMENT program will study the characteristics of all NON-BIBLE SIGNALS, especially concentrating on those aspects of these signals which indicate UFO or Satanic characteristics.

All signals which are repelled by BIBLE SATURATION SIGNALS will be intensely studied and the sources of these signals will be revealed on GCFNC and we will program the SIGNAL MANAGEMENT PROGRAM to locate the source (and then to use the REPORT PROGRAM of CL&G to send a CONSPIRACY REPORT on all Jesuits located by BIBLE SATURATION SIGNALS to the INTELLIGENCE HEADQUARTERS of the ISC), and to obtain complete 666-COMPUTER HISTORIES on all Jesuits found in this manner, and then to execute the Jesuits found.

If any other characteristics are isolated (which are unique to UFO SIGNALS), the signal management program will compile a profile of all these UFO characteristics and will update the BIBLE SATURATION SIGNAL to make it more effective at isolating and locating UFO SIGNALs.

Just as daily BIBLE reading puts a shield around the brain to protect one from being used as an UNWILLING AGENT, saturating a signal with the words of the BIBLE repels any Satanic UFO or Jesuit signals it comes into contact with. This is the surest way to identify Jesuit or UFO signals.

3.532(UFO-9) Then this SIGNAL MANAGEMENT PROGRAM will be updated to isolate and identify all UFO or Jesuit signals which travel in and around earth, and this program (created by the SMP will send information about these UFO SIGNALS to the ISC’s intelligence headquarters in California and Russia).

3.532(UFO-10) The SIGNAL MANAGEMENT PROGRAM will immediately (at once) send information about the source(s) of the UFO SIGNALS, and the history of the UFO SIGNALS (where they have traveled in the past 24 to 36 hours or longer) and any other relevant information about the UFO signal (which will give us needed intelligence in this war against Jesuit terrorism).

Once we can identify and locate all UFO satellite signals used by the Jesuits (and how they use these signals), we can then obtain devastating and valuable intelligence in this war and hopefully have a resounding victory against the Jesuit Order.

After this intelligence is acquired by our intelligence headquarters, then the SIGNAL MANAGEMENT PROGRAM will be programmed to first download all information off the newly discovered Jesuit computer and then to destroy the computer (that sent the UFO signal) and then to use the REPORT PROGRAM of Sect. 13.16* of CL&G to execute the person(s) or creature(s) which operated that Jesuit computer, in accordance with the guidelines of Sect. 13.16* of CL&G.

It is our goal to use the SMP to locate and freeze these Jesuit computers and their bases of operation, to download all information off Jesuit computers; and then, once these bases of operation are located, to use the REPORT PROGRAM to conduct the actual executions of Jesuits in that base or on that computer (in accordance with Sect. 13.16* of CL&G) –so that we can garnish valuable intelligence from these Jesuits (right before they are executed). Eventually, the SMP will destroy the entire Jesuit base of operation.

Gail will update these laws as more information comes in.

3.532(UFO-11) It is anticipated that if this SMP program works as it should, that we should uncover valuable intelligence about the location of all Jesuit bases of operation, and we should also garner information about where all illegal signals or UFO SIGNALS originate from, as well as information about where these signals are going and about how the Jesuits use their technology to outsmart our technology.

THE JESUITS always, always USE SIGNALS FOR ALL THEIR WORK, SO IF WE CAN ISOLATE ALL THESE SIGNALS AND STUDY THEM TO THE POINT THAT WE CAN USE THE JESUITS’ OWN SIGNALS AS THE means to locate all Jesuit bases of operation, then we can destroy all their bases and WIN THE WAR.

And we can use this SMP program to connect with the REPORT PROGRAMS, so that once Jesuit operations are located by the SMP (and necessary intelligence is garnered from the discovery), that then we will use REPORT PROGRAMS to carry out Jesuit executions against all Jesuits at that base of operation.

Only BIBLE COMPUTERS are used in our networks and any other type of computer that is used for computer/satellite operations is obviously an enemy operation–and the bases which house (and the persons which man) these enemy operations must be destroyed by the SMP & REPORT PROGRAMS.

3.532(UFO-12) A SATELLITE SIGNAL is defined as any signal which travels through mediums and which can be used to operate a radio, communication medium or which can operate or have any type of control over any computer or which can be used (in any manner) to violate CONSPIRACY LAW.

3.532(UFO-13) (Direct or indirect) willing and knowing failure to create a SMP program which operates in compliance with CONSPIRACY LAW (and with this Sect. 3.532UFO), will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

***********************

3.532(a) Because all satellites in space without a FORCEFIELD BLOCK have been destroyed, it was a mystery how the Jesuits still managed to create floods, earthquakes and other strange weather phenomenon. We now know that Jesuits have use DEEP OCEAN SATELLITES to manipulate the earth’s weather and to cause other “natural” disasters–such as earthquakes– because these DEEP OCEAN SATELLITEs can use signals which can completely bypass the outer space regions–and, therefore, it is hard to detect these satellite signals (which don’t originate from the expected outer space regions).

3.532(b) Any satellite signal can be used by Jesuits to manipulate objects and assist them in their terrorist activities. The signal does not have to come from a satellite which orbits around the earth, it can come from any satellite located anywhere in or around the earth!

3.532(c) These DEEP OCEAN SATELLITES also act as satellite signal AMPLIFIERS and enhance the Jesuits’ illegal signals (which come from their high mountain headquarters), so that these illegal signals can easily travel through any medium and are not easily blocked or interfered with. It appears the Jesuits have primarily used the DEEP OCEAN SATELLITES to: 1) manipulate the weather and create “natural” disasters and,

2) to AMPLIFY those illegal signals which work through our legal satellite signals (via Jesuit-directed LOOPHOLE PROGRAMMING AND TRIGGER PROGRAMMING).

Despite use of THE NET to destroy DEEP OCEAN SATELLITES, many are still operational and are used to manipulate pollen and allergy counts in the air, or to cause tornadoes, blizzards, etc. – Jesuits have shields over most of their SATELLITES to cause them to evade our scanners, so they can operate undetected.

A particular problem is the use of AMPLIFIERS used to enhance the illegal signals, in order for them to be effective. Therefore, THE NET’s top priority should be first to locate and destroy all AMPLIFIERS, because without their AMPLIFIERS, the Jesuits’ satellite signals won’t be strong enough to be effective.

Using our SIGNAL SOURCE ANALYZER PROGRAMMING, we should be able to locate all Jesuit AMPLIFIERs, since all signals have a SOURCE.

Our approach to this has been more DEFENSIVE than OFFENSIVE, and we must become OFFENSIVE in our battle with the Jesuits.

The SIGNAL SOURCE ANALYZER PROGRAMMERs who study all NON-BIBLE SATELLITE SIGNALs, must also make it so that the BIBLE SATURATION SIGNALS we use to LOCATE and DETECT UFO SIGNALS will also MESS UP THE UFO SIGNAL.

In other words, the BIBLE SATURATION SIGNAL will not only LOCATE and DETECT a UFO signal, but will REPROGRAM that signal into CONFUSION and TRANSFORM that signal into another BENIGN signal which will be utterly useless to the Jesuit Order.

Our NANOTECHNOLOGY RESEARCH TEAM will study ways to use our BIBLE SATURATION SIGNALS to mess up all UFO SIGNALS traveling through the earth and the atmosphere and space. My guess is that because Satan invented electricity, these UFO SIGNALS probably all have an ELECTRONIC CHARGE. We should use our BIBLE SATURATION SIGNALS to mess up the ELECTRONIC CHARGE of the UFO SIGNAL, or perhaps we can ALSO use our BIBLE SATURATION SIGNALS to infuse all UFO SIGNALS with the BIBLE, and that would really mess them up!

To ensure this does not backfire on us, all satellite signals used by any of our LAW ENFORCEMENT networks or programmers must be SATURATED WITH THE BIBLE to make them immune to UFO SIGNALS which may be used to try and transform them into UFO SIGNALS, thus causing our own signals to be used against us.

We are getting into metaphysics here, but Gail believes that all matter and energy originates from a SOURCE and that the SOURCE the matter or energy originates from determines its CHARACTER. We know that what comes from God repels what comes from Satan, and that only God can overcome Satan. Going by this premise, Gail concludes that the best way to defeat UFO SIGNALS (from Satan) is through the use of BIBLE SATURATION SIGNALS (from God).

THEREFORE, all programming for all our computers or machines that produce any signals must cause all these signals to be BIBLE SATURATION SIGNALS.

The Bible describes itself as a SWORD. It is meant to be an OFFENSIVE weapon. Therefore, these BIBLE SATURATION SIGNALS will be programmed to destroy UFO SIGNALS.

Our NANOTECHNOLOGY RESEARCH TEAM will experiment and come up with ways to use BIBLE SATURATION SIGNALS to destroy UFO SIGNALS.

If we can destroy all UFO SIGNALS, we may be able to take down Zack Knight’s Internet and sabotage all his programming, so that even if we can’t destroy all his computers, we can render his entire system IMPOTENT.

It goes without saying, that any member of the NANOTECHNOLOGY RESEARCH TEAM who willingly and knowingly violates the principles of Conspiracy Law to create any signal which does not honor the guidelines of this Section (to destroy UFO SIGNALS), will be given the death penalty as a Jesuit Conspirator.

TRANSFORMER SHIELDS AROUND ALL OUR WAVES & SATELLITES THAT NEGATE ALL JESUIT WAVES

In order to deal with Zack Knight’s genius computer intelligence, we may need to create a group of prayer warriors, who will pray around the clock to give us wisdom to deal with Zack Knight’s formidable technology.

The concepts in this Sect. 3.532 are intelligent speculation about how to deal with Jesuit waves or signals. If the concepts presented turn out to be false or would assist Zack Knight rather than oppose him, the theories presented in this Sect. 3.532 will be null and void and our LAW ENFORCEMENT PERSONs will not have to enforce the laws in this Sect. 3.532.

The only laws that are enforceable in this Section, are those that would definitely hinder or stop Zack Knight’s ability to commit his crimes. All other laws or concepts in this section are optional and only enforceable if they would definitely stop Zack Knight from committing his crimes.

3.532(c-1) Jesuits are overcoming our BIBLE SATURATION SIGNALS by flooding their UFO SIGNALS to the extent that they drown out the BIBLE SATURATION SIGNALS. They accomplish this by using their AMPLIFIERS and JESUIT COMPUTERS and cable lines, thus overpowering our TRANSPORTNET with their connected INTERNET, using their UFO SIGNALS to latch onto the cable lines going right into our computers and overpowering the BIBLE SATURATION signals going into our computers from the TRANSPORTNET with their UFO SIGNALS.

All signals are composed of WAVES. We need to come up with a way to NEGATE JESUIT WAVES.

3.532(c-2) We need a two-pronged approach to deal with this Jesuit offensive against us. First, all our BIBLE SATURATION SIGNALS need to be strong or “intelligent” enough to repel and/or absorbs/transforms the UFO SIGNALS and should all be at maximum strength. Also, the programming for the BIBLE SATURATION SIGNALS need to be such, that it REPELS/ABSORBS/TRANSFORMS any UFO SIGNALS that get near it. All BIBLE SATURATION SIGNALS should be programmed to detect the CHARGE of the UFO SIGNALS approaching it and to cause the OPPOSITE CHARGE to occur in that BIBLE SATURATION SIGNAL (if that is the best course of action), which will cause that UFO signal to ricochet off the BIBLE SATURATION SIGNAL. This would be on top of the use of the BIBLE SATURATION SIGNALS to infuse the Bible into the UFO SIGNALS. We would infuse Bible programming into the UFO SIGNALS at maximum strength and would also create an opposite charge to the UFO SIGNAL to REPEL THE UFO SIGNALS off of the Bible saturation signal (if that is the best course of action).

3.532(c-3) This first strategy alone will not work, because by simply overwhelming the atmosphere with UFO SIGNALS (that also incorporate the opposite charge to our signals), UFO SIGNALS could overcome the BIBLE SATURATION SIGNALS.

3.532(c-4) So, this second step is the most important part of the process to neutralize the UFO SIGNALS.

3.532(c-5) In our second step, we shall create satellites (SATELLITE DESTROYERs) that specialize in destroying the SOURCE of all UFO SIGNALS. Once we upload all legal websites to our SATELLITE RECEIVERS, so that GROUND SERVERS are no longer necessary to maintain the “Internet”, we can use SATELLITE DESTROYERS to scan for all UFO SIGNALS in and around the earth and to detect the SOURCE of these signals.

3.532(c-6) All SOURCES of UFO SIGNALS that come from JESUIT COMPUTERS or hardware will be destroyed by our SATELLITE DESTROYERS.

3.532(c-7) If Jesuits do not have the hardware needed to emit UFO SIGNALS, they cannot use these signals to overwhelm our BIBLE SATURATION SIGNALS and interfere with our Transportnet.

3.532(c-8) Our NANOTECHNOLOGY RESEARCH TEAM will create SATELLITE DESTROYERs that detect for and scan UFO SIGNALS. Once it detects a UFO SIGNAL, it will be programmed to locate the SOURCE of that UFO SIGNAL, and to destroy the source (if possible). If we can’t destroy the source, then we shall use our TRANSFORMER SHIELDS [see 3.532(c-22] to negate/transform all waves coming from that source.

3.532(c-9) Methods used to destroy the source include nuclear bombs, transporter technology that changes the chemical configuration of the source and rendering it into something useless for the Jesuits, and whatever we can think of.

3.532(c-10) Because the Jesuits may try to create their own SATELLITE DESTROYERs, we shall scan and detect for any activity that indicates the creation of a JESUIT SATELLITE DESTROYER and use our SATELLITE DESTROYER to also be programmed to detect if any JESUIT SATELLITE DESTROYERs are being created and to demolish such creations in their infancy.

3.532(c-11) We shall work on technology that intensifies our BIBLE SATURATION SIGNALS to the point that they cannot be negated or overwhelmed.

3.532(c-12) Also, all BIBLE SATURATION SIGNALS will be programmed to TURN OFF all UFO SIGNALS and/or ABSORB & TRANSFORM UFO SIGNALS. We may study how the GA1L android was able to turn off all the speakers in our spaceships during her fatal attack on us in Dec. 2012, so that we could not use music to drown out her spirit, and use similar technology on all Jesuit hardware and/or signals, to cause their hardware and/or signals to be unable to emit UFO SIGNALS. In essence, we will come up with a way to TURN OFF/TRANSFORM/REPEL/NEGATE ALL JESUIT UFO SIGNALs by borrowing technology we learned about the GA1L android’s strategy’s on us during her fatal attack on us.

The GA1L android absorbed all we threw at her and seemed to “eat it up” and it actually strengthened her. She seemed to be able to absorb all the missiles and waves we threw at her and transformed it into energy for herself. We shall study her memories and determine how she did this, and use this SECRET technology to absorb all Jesuit UFO SIGNALS and then TRANSFORM them into our own BIBLE SATURATION SIGNALS before they go into our cable lines or receivers.

This means the Jesuit strategy to overwhelm our systems with UFO SIGNALS that overpower our BIBLE SATURATION SIGNALs will backfire and INSTEAD we will ABSORB the evil signals and transform OR rewrite them into our own good signals, so that the end result will be that all the Jesuits can do when they try to attack and overwhelm us with their signals, is to cause our own BIBLE SATURATION SIGNALS to intensify in power from absorbing the energy from the TRANSFORMED UFO SIGNALS that have become one of our own signals.

In other words, when we absorb the UFO SIGNALS, and when those UFO SIGNALS pass through our TRANSFORMER SHIELDs they will change their configurations and will transform into our BIBLE SATURATION SIGNALS and all the evil waves will have gone through a major REWRITE, so that they are NO LONGER A JESUIT SIGNAL, BUT ONE OF OUR OWN.

3.532(c-14) We shall program all our BIBLE SATURATION SIGNALS with the capability to TURN OFF AND/OR TRANSFORM ALL UFO SIGNALS.

3.532(c-15) The energy and momentum of a photon depend only on its frequency or inversely, its wavelength. Gail believes the GA1L android manipulated the frequency and wavelength of the photons involved in the sound waves for Gail’s music, to negate and/or transform those sound waves so that when the waves hit the GA1L android they were beneficial to her. “She ate them up like a woman eating miso soup on a hot flash day.” We shall use the same strategy on all Jesuit signals that attack us..

3.532(c-16) Using similar technology, we could probably use our BIBLE SATURATION SIGNALS to manipulate the frequency and wavelengths of the photons in approaching UFO SIGNALS to NEGATE and/or TRANSFORM them. To ensure the Jesuits cannot do the same thing to our BIBLE SATURATION SIGNALS, we shall have shields over all our BIBLE SATURATION SIGNALS that cause any types of energy from JESUIT SOURCES to be NEGATED and/or TRANSFORMED so that evil Jesuit signals cannot overcome our BIBLE SATURATION SIGNALS .

3.532(c-17) These shields we place around our BIBLE SATURATION SIGNALs will be designed to NEGATE and/or TRANSFORM all signals from UFO SIGNALs by manipulating the frequency and wavelengths of all photons in Jesuit signals. .

3.532(c-18) This means whenever a UFO SIGNAL comes into contact with a BIBLE SATURATION SIGNAL, that BIBLE SATURATION SIGNAL will TURN IT OFF and/or TRANSFORM IT INTO A FRIENDLY SIGNAL FOR US.

3.532(c-19) Each BIBLE SATURATION SIGNAL will be programmed with a SHIELD, that repels and/or TRANSFORMS all UFO SIGNALS and also can TURN OFF ALL APPROACHING UFO SIGNALS.

This will be an “intelligent” program and it will analyze the approaching evil signal to determine whether to transform it, negate it, or repel it.

3.532(c-20) This shield will also be around each SATELLITE DESTROYER. We shall have a shield around each SATELLITE DESTROYER that is equivalent to the EARTH SHIELD we created to protect us from the Jesuit space fleet (see ICL:ST Sect. 36 & 37).

3.532(c-21) This will be TOP SECRET TECHNOLOGY that only our most trusted NANOTECHNOLOGY SCIENTISTS ARE AWARE OF. Any body who willingly and knowingly gives this technology to the Jesuits will be executed.

3.532(c-22) These shields which manipulate the wavelengths and frequencies of UFO SIGNALS will be called TRANSFORMER SHIELDS, because they transform the wavelengths and frequencies of enemy photons, thus NEGATING, TRANSFORMING OR REPELLING THEM.

3.532(c-23) My guess is that theGA1L Android used a type of computer program that studied the nature of the wave and then modified the wavelengths and frequencies of the photons in that wave, thus NEGATING, TRANSFORMING OR REPELLING the wave. We could incorporate this program INTO our TRANSFORMER SHIELDS, making all our TRANSFORMER SHIELDS “intelligent” enough to analyze approaching waves to determine if they are Jesuit UFO waves AND knowing which computer programs to unleash to modify the wavelengths and frequencies of the photons in that Jesuit wave to NEGATE, TRANSFORM OR REPEL IT.

3.532(c-24) This will be a matter of who comes up with this technology FIRST. If we come up with it FIRST, we can negate, transform or repel all Jesuit waves (be they sound waves, energy waves, etc.) and put all Jesuit technologies on their feet.

3.532(c-26) We shall scan the whole earth to determine which scientists can develop or discover this technology to create a TRANSFORMER SHIELD. Once we discover these scientists, we shall program the scientist’s PERSON PROGRAMS to cause that scientist’s brain to put the program for the TRANSFORMER SHIELD into a HIGHLY ENCRYPTED medium that only that scientist can read. This medium will be given to our INTERNATIONAL SATELLITE COALITION who will create TRANSFORMER SHIELDs with the SECRET PROGRAMMING worldwide that will NEGATE all Jesuit waves.

3.532(c-27) The ONLY way the Jesuits could get this SECRET technology would be to read the brains of the scientists who discovered/developed it. We shall make sure that ONLY those scientists who discovered/developed it know about how to use this SECRET TECHNOLOGY and that their brains will become highly encrypted, so that no way will a Jesuit learn this technology.

3.532(c-28) If Jesuits capture that scientist and try to read his brains, that scientist’s PERSON PROGRAM will remove all his/her memories of how the SECRET technology works and Jesuits will find NOTHING about the secret technology in that scientist’s brain scans. The ONLY way this information can pass from the scientist to the programming will be through brain waves and this information will not be available in any other medium. Once it is passed into the medium (like into the TRANSFORMER SHIELD) that will use this SECRET PROGRAMMING, that medium will become HIGHLY ENCRYPTED, so that no one can read the contents of the SECRET programming.

3.532(c-29) BUT, if Jesuits or anybody or anything attempts to crack the code and break the ENCRYPTION around the secret programming, the medium that houses that secret programming will be programmed to KILL THAT PERSON or THING ON-THE-SPOT.

3.532(c-30) Not even Gail or Vladimir Putin may know exactly how this programming works, they may just be able to USE IT, but possibly won’t be able to understand the programming. By keeping this program ENCRYPTED and SECRET, it may remain powerful.

3.532(c-32) This technology is to remain TOP SECRET, and will be highly encrypted everywhere it is used. This SECRET PROGRAMMING will enable all our TRANSFORMER SHIELDS to NEGATE, TRANSFORM or REPEL all Jesuit waves in and around the earth, basically MAKING THEM USELESS OR EVEN HARMFUL TO THE JESUITS, like how the GA1L android did to us when we tried to play music to drown out her spirit.

3.532(c-33) All Jesuit technology relies on waves (sound waves, energy waves, etc.). Once we negate all Jesuit waves, the Jesuits will be utterly helpless.

3.532(c-33a) If, despite our best efforts, the Jesuits also discover this technology, then we shall have to rely on the fact that we are able to infuse Bible into all our programming and that the Jesuits CANNOT, to defeat Jesuits. Perhaps by having Bible in all our signals, our signals can overpower all the Jesuit signals, thus negating the Jesuit signals. I do not believe the Bible will cooperate with the Jesuits and they will be unable to infuse Bible into their programming.

3.532(d) So the DEEP OCEAN SATELLITES have been used to create “natural” disasters and to enhance the Jesuits’ ability to use LOOPHOLE PROGRAMMING and TRIGGER PROGRAMMING (which work through our own satellites and computers).

3.532(e) It is hoped that by analyzing these NON-BIBLE SIGNALS which travel through the atmosphere and determining their source, that we will be able to locate and destroy all Jesuit operated satellites within, on or above the earth and its oceans, and thus, weaken the Jesuits’ ability to use LOOPHOLE PROGRAMMING, TRIGGER PROGRAMMING and their ability to create “natural” disasters.

3.532(f) Each country of the International government (especially those countries that cooperate in space ventures) will have its own SIGNAL SOURCE ANALYZER CORPS, which will assist THE NET in locating and destroying all computers and/or satellites on or above the earth and its oceans (which utilize NON-BIBLE signals). All members of the SIGNAL SOURCE ANALYZER CORPS are considered LAW ENFORCEMENT PERSONs and are to be treated as LAW ENFORCEMENT PERSONs according to CONSPIRACY LAW.

3.532(g) The SIGNAL SOURCE ANALYZER CORPS will operate under the direction of THE NET, the CLEAN-OUT COMMITTEES and the OVERSEER TEAM (see Sect. 13 of CL&G).

3.6 All SUSPICIOUS SPACE or SATELLITE ACTIVITY that is conducted in international territory (or that affects the international government or the international people) must be registered with the international government with the names of all people involved in the activity and a clear description of the SUSPICIOUS SPACE ACTIVITY which they conduct and the REGISTRATION CODES of all satellite signals use in that activity, and there must be a clear description of all processes and SPACE MATERIALS involved in the activity which could be used to TARGET innocent persons.

3.6(a) Any person who willingly and knowingly conducts (directly or indirectly) any SUSPICIOUS SPACE ACTIVITY and does not register her/his activities [as outlined in this Sect. 3 (including any amendments–see Sect. 3.61)] with the International government, will receive the death penalty as a JESUIT CONSPIRATOR.

3.61 For those suspicious space activities and space materials which are registered, all alterations of and/or changes to the suspicious space activity or changes in use of space materials, must be registered as an amendment to the original registration; and the changes/amendment must be approved by the international government before they are carried out.

3.7 The purpose for these registrations is to determine if such suspicious space activities and/or space materials could be deemed a threat to the international government or the international people. The new and updated registration must state clearly the names and identification of those involved in the suspicious space activity and all space materials which will be used in the activities (including all REGISTRATION CODES for all satellite signals used), so there is no doubt what type of activity is being conducted and what space materials are being used.

3.71 If registered users of space materials or space activities engage in space conspiracy activities, the international government will revoke their registration to those users, and they will be considered SC suspects and treated as SC suspects (as described in Sections 5 and 6 of this document).

3.72 If the SC (registered or unregistered) suspects are non-international citizens, the international government will inform the country, in which that citizen resides, that one of their citizens is a SC suspect, and request that this non-international citizen (who is a SC suspect) be forbidden to practice any form of space science. If it is discovered that the space conspirator suspect is still practicing space science, despite the international government’s wishes, the international government will not cooperate with the offending nation in any space ventures until this SC suspect has been removed from space science activities. Obviously, current space operations which involve cooperation between the international government and the offending nation, and which must continue (or else there will be loss of life) will not be terminated immediately. But the international government will refuse to cooperate in any future space ventures with the offending country as long as the non-international SC suspect practices any form of space science. Obviously, if the space conspirator suspect is proven innocent by the international government, the international government will recant her uncooperative position with the offending nation. But the international government does not want SC suspects practicing any form of space science.

3.8 If SPACE MATERIALS or SUSPICIOUS SPACE ACTIVITIES are used in violation of CONSPIRACY LAW, the persons involved must report this activity in a CONSPIRACY REPORT to the international government and terminate the operation (if possible– without endangering innocent lives) which involves the unregistered space materials or suspicious space activities. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. If the operation cannot be terminated, it may be necessary to destroy the space machine/vehicle involved. After the operation is terminated, the international government will study how the activities were carried out and see if the international government can find a way to monitor the operation, so that it will not be used for criminal purposes. Until the international government can determine how to monitor this activity, it will not be allowed to continue to operate.

4.0 Any person found guilty of being a space conspirator will be executed.

4.2 Any unregistered users of space materials or unregistered utilizers of suspicious space activities who are found, will be forbidden to practice any form of space science and other punishments may be given, depending on the nature of the case.

4.21 If the unregistered user claims that they were not aware of CONSPIRACY LAW or that they were held against their will from coming forward, the international government will cross-examine this person on GABRIELLE CHANA FOX NEWS CHANNEL (using 666-Computer lie-detection). If they truly were unaware of CONSPIRACY LAW or were held against their will, the suspicious space activities will be halted (as described in Section 3.8), then they must immediately receive permission from the international government to register their suspicious space activities and/or their space materials in order to continue their space activities. The activities must be of the kind that the international government can monitor, before registration will be granted. The activities cannot continue and/or the space materials cannot be used for space technology until the international government is able to monitor the suspicious space activities and/or space material usages. If the persons involved, willingly and knowingly continue the space activities (without the required registration from the International government, those persons will receive the death penalty as JESUIT CONSPIRATORS.

4.22 If they were aware of CONSPIRACY LAW and lied to the international government (that they were unaware of CONSPIRACY LAW or that they were prevented from honoring CONSPIRACY LAW by extortion or threats), they will be tried in military tribunal as either a space conspirator or a space violator, whichever is applicable. All those found guilty in military tribunal as space conspirators will be executed.

4.3 If someone who has been convicted as an unregistered user of space materials or an unregistered utilizer of suspicious space activities is caught again (in international territory) doing space activities, this person may be put in jail and all their communications monitored (including 666-Computer and satellite computer communications).

4.4 Any space conspirators found guilty in military tribunal who are NOT international citizens will be treated according to the guidelines set forth in Section 2.2 of this document.

***********************************************************

Because of the intense surveillance of SC suspects, it will not be necessary to spy on the general population in their private residences, their phones or in their communications. All space conspirator suspects and reproductive conspirator suspects are also considered JESUIT CONSPIRATOR suspects. A space conspirator suspect as described in this section, is also considered to be a Jesuit Conspirator suspect. All laws which apply to space conspirators also apply to Jesuit Conspirators.

5.0 The abbreviation for space conspirator will be SC. Space conspirators (Jesuit Conspirators) deserve no privacy.

5.1 NOTICE OF COOPERATION is defined as a written notice given to the international government by a non-international citizen (who is a SC suspect), in which this SC suspect states that they will allow themselves to be put under surveillance (as a SC suspect) when they reside in international territory. Once this NOTICE OF COOPERATION is received by the international government, it will be filed in the military tribunals.

5.2 A NOTICE OF COOPERATION OUTLINE will inform the non-international SC suspect of the necessity that he/she must first give a NOTICE OF COOPERATION to the international government, when he/she returns to international territory from out of the jurisdiction of any non-international country.

5.3 SC SUSPECT NOTICE is defined as the written notice given to a space conspirator suspect by the international government, which states that he/she is considered a space conspirator suspect and that he/she must agree to have all their communications (including 666-Computer and satellite computer communications) under surveillance by the international government.

5.4 All SC suspects must receive a SC SUSPECT NOTICE which states that his/her name is listed in an international military tribunal as a SC suspect, and evidence that he/she received this notice will be filed in an international military tribunal.

5.41 INTERNATIONAL TERRITORY is defined as the land within and on the geographical boundaries of any and all international countries, as well as the air space (including outer space where satellites are) over any and all international countries and the oceans and waters which belong to or are adjacent to any international country (and the waters which surround and/or are within any international country).

5.5 No one will be considered a space conspirator suspect unless there is reasonable cause, but if reasonable cause is established, and the military tribunal filings and notices for SC suspects as described in Sections 5.0 through 6.6 are accomplished, all communications to and from this suspect (including all types of 666-Computer and satellite computer communication) will be monitored until it is determined this person is no longer a suspect.

5.6 There must be evidence for the reasonable cause which causes the international government to suspect that this person is a SC suspect, and this evidence must be filed with the military tribunals. Once this evidence is filed with the military tribunals, the person’s name will be entered in the military tribunals as a SC suspect who is “under surveillance”.

5.7 There will be no surveillance of the SC suspect until his/her name is listed in the military tribunal as being “under surveillance” and until evidence is received that this suspect has received a SC SUSPECT NOTICE and, if a non-international citizen, also a NOTICE OF COOPERATION OUTLINE.

5.8 Those SC suspects whose names are listed in the military tribunals, who refuse to cooperate with their surveillance, will be put in jail and/or under the supervision of a JAIL PRACTITIONER and all communications to and from the suspect will be monitored from jail.

5.9 All non-international citizens who are SC suspects must receive a NOTICE OF COOPERATION OUTLINE at the same time they receive a SC SUSPECT NOTICE, and proof that they received both the NOTICE OF COOPERATION OUTLINE and the SC SUSPECT NOTICE will be filed in an international military tribunal.

6.0 For non-international citizens who are SC suspects, evidence for reasonable cause that he/she is a SC suspect will be filed with the military tribunal and his/her name will be entered into an international military tribunal as a SC suspect.

6.1 If the non-international citizen SC suspect refuses to cooperate with the surveillance of all his/her communications (including 666-Computer and satellite computer communications), he/she will be deported from international territory and cannot return until he furnishes (before his/her return to international territory) a NOTICE OF COOPERATION to the international government.

6.2 If a non-international citizen who is a SC suspect returns to international territory without first filing a NOTICE OF COOPERATION with the international government, and they are caught on international territory of their own free will, they will be put in jail in an international country (where all their communications will be monitored) and they will be forced to stand trial as a SC suspect.

6.3 If a non-international citizen who is a SC suspect returns to international territory without first filing a NOTICE OF COOPERATION with the international government and they were forced onto international territory against their will by another person or persons, this other person or persons will be put in jail (where all their communications will be monitored) or under the supervision of a jail practitioner, and this/these other person(s) will be forced to stand trial as a/an SC suspect(s), and the original SC suspect will be deported from international territory until he/she files a NOTICE OF COOPERATION with the international government.

6.4 If the original SC suspect is again found on international territory against his will, the next time, he/she will be put in jail (or under the supervision of a jail practitioner) and investigated as a SC suspect, along with those who forced him onto international territory.

6.5 Any evidence gathered during surveillance (from 666-Computer or satellite computer or any other communication source) of the SC suspect can be used in legal and military tribunal proceedings.

**********************************************************

7.0 If suspicious communications are found via the 666-Computer or satellite computer or any other communicative medium involving SC suspects, all scientists and persons [who used a 666-Computer or satellite computer and/or other communicative medium on/with the SC suspect] will be considered a SC suspect and treated according to the laws set forth for SC suspects in Sections 5 and 6 of this document.

7.1 Anyone who attempts to interfere with the surveillance of a SC suspect will themselves become a SC suspect, and will be treated as a SC suspect according to Sections 5 and 6 of this document. (See Section 9.0 of this document)

7.2 If a SC is executed or deceased and had innocent family to which they have left an estate (or proceeds from their will), the innocent family will be entitled to those proceeds or that estate. The international government will not confiscate what was legally willed or left to the innocent family members of the deceased (executed) SC.

7.3 However, the SC’s will or last testament may need to be rewritten to ensure that the family (or the family’s children) receives the will’s proceeds, perhaps by designating a trust as a beneficiary, in which a trustee would have the fiduciary responsibility to oversee and handle the trust and its funds for the family in the most expeditious and honest way.

7.4 Should the deceased/executed SC’s family die before receiving all their proceeds from the deceased SC’s will, and the space conspirator’s family’s children and all their offspring are dead at the time of the distribution or proceeds from the deceased SC’s will, or if the will’s proceeds have not all been distributed; the money or estate from the SC’s will, will be held in a trust to be distributed to another deceased/executed SC’s family.

7.5 Any SC who comes forward (contacts the international government) and confesses to his/her crimes, and cooperates with the international government in the government’s investigation of this space conspiracy matter, may be spared the death penalty. Each SC confessor will be handled on a case by case basis [and lie detection (maybe using the 666-Computer or satellite computer, since the 666-Computer’s lie detection capabilities are probably very accurate) will be employed during the confession]. The type of punishment meted out for the confessors will vary, but for those who are genuinely guilty and confess that they are a SC, the international government may strike a “plea bargain” and possibly spare them the death penalty (if the crime did not involve the death of any innocent person). If the crime caused death, the international government will follow the guidelines of CONSPIRACY LAW. The confession must be recorded and it will be filed with the military tribunals.

7.6 However, if someone makes a false confession, when they are, in fact, innocent, and they know they are innocent when they make their confession–their false confession will put them in the category of a SC suspect, and they will be treated as a SC suspect as outlined in Sections 5 and 6.

7.7 Also, anyone who lies about an innocent person in their confession, in order to implicate an innocent person as a SC, will be considered a SC suspect, and will be treated as a SC suspect as outlined in Sections 5 and 6.

7.8 The victims’ families’ wishes (who lost a loved one or animal or had serious harm done to a loved one because of the space conspirator) may be respected in this matter. If the case involves only an animal’s death, punishments will be decided on a case by case basis. Confessions may not spare a SC the death penalty, if the crime involved serious loss of life.

7.81 For those SC suspects who claim insanity or mental problems as a defense, the international government will follow the procedures in Section 5 of General 666-Computer or Satellite Computer Laws.

8.2 Any SC criminal who willingly, knowingly and deliberately does not come forward and admit to their crimes by filing a CONSPIRACY REPORT (regarding their conspiracy involvement) with the international government (this can be done through any INTELLIGENCE COMMITTEE or law enforcement officer of any country which is not a TERRORIST NATION), has vowed, by default, their loyalty to Jesuits over their country and its freedom, and the international government has vowed they will be executed. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. Exceptions will be made for those who were not aware of CONSPIRACY LAW (this will be determined by direct or cross-examination with lie detection) and those who were HELD AGAINST THEIR WILL from coming forward (this will also be determined by direct or cross-examination with lie detection). If a SC was held against their will from coming forward, the person(s) who held them against their will, once convicted, will be given the death penalty as a SC.

8.21 Those SC criminals found, who were not aware of CONSPIRACY LAW (and this will be verified by direct or cross-examination and lie detection) or who were held against their will from coming forward (this will be verified by direct or cross-examination and lie detection), may only be spared the death penalty (the wishes of the victims’ families may be respected) if they make a sworn confession to their guilt as a SC criminal, and this confession will be entered in the military tribunals. And they must cooperate with the international government in our investigation of their space conspiracy activities. If they refuse to make the confession and they do not cooperate in our criminal investigation of their space conspiracy activities, when they have been proven guilty in military tribunal, they will receive the death penalty, regardless of their lack of knowledge about CONSPIRACY LAW.

8.22 The punishment for those SC criminals (unaware of CONSPIRACY LAW or who were held against their will from coming forward) who make confessions and cooperate with our investigations of their crimes, will be decided on a case by case basis (following the principles outlined in this document).

8.3 Executions of SC criminals may take place at a set day and time. On execution days, the international government may designate those days, days of mourning, where the international government will show respect for the sacrifice required to maintain freedom in the world by silence, reverence and prayer. Offerings will be taken throughout the world on those days for the support of any innocent family members who might be left destitute as a result of the executions. This money will be used to support those innocent family members left without financial support.

8.31 If any non-international SC criminals are executed, some money from the offerings taken on execution day may be given to any of their innocent family members left without financial support because of the executions.

8.32 On execution days, the international government invites all nations, whose citizens will be executed as SC criminals by the international government, to join with the international government in our mourning, silence and reverence, and to take up offerings from their country for the innocent family members left behind (without the support they would have had if the executed criminals had stayed alive) and to give these offerings to those innocent family members who have lost their loved one because of the SC executions by the international government.

*****************************************************

For the definition of a RPC (reproductive political conspirator) used in Section 9, see the legal document International Reproductive Laws.

9.0 Any person who blocks or alters the release of a space conspirator/reproductive political conspirator suspect and/or animal’s ACCESSIBLE MEMORY, when the international government monitors that suspect and/or animal via 666-Computer and/or satellite computer, so that the international government does not have access to the total, unaltered accessible memory of that suspect and/or animal all at once, is guilty oftampering with evidence in a high treason case, and will be considered a space conspirator/reproductive political conspirator. REMOVING A PERSON’S MEMORY, by whatever technology is used, also constitutes blocking or altering accessible memory. Memory that has been REMOVED from the person’s brain is accessible memory which has been made unavailable, and so the removal of memory from a person’s brain also falls in the category of altering accessible memory. This person (involved with tampering with accessible memory) if found and convicted of being a JESUIT CONSPIRATOR–will receive the death penalty. It is ESSENTIAL that the international government is able to totally access all of the suspect and/or animal’s ACCESSIBLE MEMORY all at once in order to compile the evidence the international government needs for these cases. The international government does not want the suspect and/or animal’s accessible memory (via 666-Computer or satellite computer or other methods) altered or partitioned out to the international government at the conspirators’ whim, where they can choose WHEN and HOW to release the information (via 666-Computer or satellite computer or other methods) from the suspect and/or animal’s accessible memory.

9.01 UNALTERED is defined as the complete accessible memories of the person and/or animal involved (which could have been, can be, or may be accessed by the 666-Computer or satellite computer or other methods) and which accessible memories have not been altered in any form (by additions, deletions, changes, or removal) by any type of tampering technology.

9.02 TAMPERING TECHNOLOGY is defined as any technology utilized on a person and/or animal’s ACCESSIBLE MEMORY with the purpose and motive of altering, changing, deleting, omitting, making unavailable, removing and/or adding to the original, unaltered accessible memory by the use of this TAMPERING TECHNOLOGY.

9.03 ACCESSIBLE MEMORY is defined as a person and/or animal’s complete and unaltered memory which CAN or MAY BE or COULD HAVE BEEN accessed by the 666-Computer or satellite computer (or by other methods, such as satellite technology).

9.1 MEMORY BLOCKER is defined as a person who (directly or indirectly) selectively or completely blocks, alters, and/or removes the 666-Computer or satellite computer’s (or another method’s) capabilities to access a person and/or animal’s accessible memory, so that the international government is not able to access a RPC or SC suspect or an animal’s accessible memories ALL AT ONCE, COMPLETELY, and UNALTERED via the 666-Computer or satellite computer (or other methods). A person found guilty of being a MEMORY BLOCKER will be given the death penalty, except for the exceptions noted in Sections 9.4 and 9.6.

9.2 A MEMORY BLOCK is defined as the unavailability to the international government (IMMEDIATELY, COMPLETELY, and UNALTERED VIA THE 666-Computer or satellite computer or other methods) of a JESUIT CONSPIRATOR suspect and/or animal’s accessible memories, including the REMOVAL of accessible memories. In other words, if something blocks or hinders the international government from reading a person and/or animal’s accessible memories via the 666-Computer or satellite computer, and this something prevents the international government from reading those accessible memories IMMEDIATELY, COMPLETELY, and UNALTERED–that something is considered a MEMORY BLOCK.

9.3 REVERSE MEMORY BLOCK INFORMATION is defined as any information, procedure or method which will enable the international government to reverse or undo a MEMORY BLOCK, so that the international government would now have complete, unaltered, and immediate access to a RPC or SC suspect and/or animal’s accessible memories via the 666-Computer or satellite computer.

9.31 REVERSE MEMORY BLOCKER is defined as a procedure, device, method, or technology which can undo or reverse a MEMORY BLOCK.

9.4 If there’s a technology or procedure available which would allow the international government to immediately overcome this MEMORY BLOCKER and/or any MEMORY BLOCK via a 666-Computer or satellite computer, so that the international government can have immediate, unaltered and full access to a JESUIT CONSPIRATOR suspect and/or animal’s accessible memories via the 666-Computer or satellite computer, the international government wants this technology or procedure NOW. Anyone who knows of this REVERSE MEMORY BLOCK INFORMATION and who comes to the international government with this information, may be spared the death penalty, should they become a JESUIT CONSPIRATOR suspect or a memory blocker suspect. The international government needs this REVERSE MEMORY BLOCK INFORMATION and will plea bargain with anyone who can give the international government information on how to overcome the MEMORY BLOCKER and/or MEMORY BLOCK via the 666-Computer or satellite computer (or other methods). So, anyone who is aware of REVERSE MEMORY BLOCK INFORMATION, must come to the international government with this information.

9.5 If it is discovered that a REVERSE MEMORY BLOCK INFORMATION was available, and someone utilizes this information or is discovered to have been aware of this information after CONSPIRACY LAW became known, this person may be considered a MEMORY BLOCKER suspect and a JESUIT CONSPIRATOR suspect (whichever is applicable) and may be treated as a JESUIT CONSPIRATOR suspect (as described in Sections 5 and 6 of this document and the International Reproductive Laws document). If the international government receives the REVERSE MEMORY BLOCK INFORMATION needed, then this Section 9.5 may be waived. But the international government encourages all who have REVERSE MEMORY BLOCK INFORMATION to come forward.

9.6 Exceptions to the death penalty for not coming forward with the required information, will be if the MEMORY BLOCKER suspect (or person with REVERSE MEMORY BLOCK information) discovered the REVERSE MEMORY BLOCK information before CONSPIRACY LAW became known (and this will be verified by direct or cross-examination using lie-detector) OR if the MEMORY BLOCKER suspect (or person with REVERSE MEMORY BLOCK INFORMATION) was prevented from coming to the international government because he/she was held back by some type of force, threats or extortion (and this will be verified by direct or cross-examination using lie-detector) OR the MEMORY BLOCKER suspect (or person with REVERSE MEMORY BLOCK INFORMATION) was unaware of CONSPIRACY LAW (and this will be verified by direct or cross-examination using lie-detector).

9.7 And if it is true that the person with REVERSE MEMORY BLOCK information was prevented from coming to the international government because of some type of threat OR that the person with REVERSE MEMORY BLOCK information was unaware of requirement to report the REVERSE MEMORY BLOCK information OR the person with REVERSE MEMORY BLOCK information was unaware of CONSPIRACY LAW, this person’s case will be tried on an individual basis with punishments (if needed) decided on a case by case basis.

9.8 Anyone who prevents a MEMORY BLOCKER (or person with REVERSE MEMORY BLOCK information) by the use of force, threats, or extortion from coming to the international government will be considered a MEMORY BLOCKER suspect and a JESUIT CONSPIRATOR suspect (whichever is applicable) and will be treated as a JESUIT CONSPIRATOR suspect (as described in Sections 5 and 6 of this document and the ICL:ST document).

9.9 And if the MEMORY BLOCKER suspect (or person with REVERSE MEMORY BLOCK information) is found guilty of being a JESUIT CONSPIRATOR or MEMORY BLOCKER, this person will be given the death penalty, except for the exceptions for MEMORY BLOCKERS noted in Sections 9.4 and 9.6 of both this document and the International Reproductive Laws document, and the exceptions for RPC noted in Sections 7.5, 7.8, 8.2 and 8.21 of the International Reproductive Laws document, and the exceptions for SC noted in Sections 7.5, 7.8, 7.81, 8.2 and 8.21 of this document.

9.91 Furthermore, anyone who comes forward as a person with REVERSE MEMORY BLOCK information, needs to sign a sworn statement (under lie detection) in which they will state that (to the best of their knowledge) they have provided the international government with a REVERSE MEMORY BLOCKER as defined in this document, and that they have supplied to the international government all they know about REVERSE MEMORY BLOCKER technology. If it is determined that someone DELIBERATELY came forward as a person with REVERSE MEMORY BLOCK information, when, in fact, they knew they were deceiving the international government by claiming they had REVERSE MEMORY BLOCK information, when they knew they DID NOT–that person, if found guilty of this deception, will be executed. The international government will not execute a person who comes forward with REVERSE MEMORY BLOCK information if the deception was UNINTENTIONAL. For this deceiver to be executed, it must be proven in military tribunal that that the DECEPTION WAS INTENTIONAL.

*******************************************************************

The laws in Sect. 10.0 through 10.71 are too lenient and other CONSPIRACY LAWS should be used for those who use ANY satellite or 666-Computer technology in violation of CONSPIRACY LAWS. These laws in Sect. 10.0 through 10.71 are designed for borderline cases, where it is not certain whether the violator is truly a JESUIT CONSPIRATOR. This principle (of using the tougher laws against terrorists) would apply to any copies made of these laws (from Sect. 10.0 through 10.71 of this document) into other CONSPIRACY LAW documents. Do not use these more lenient laws for a person who is an alleged JESUIT CONSPIRATOR, unless there is reasonable doubt as to whether that person is truly a JESUIT CONSPIRATOR. These laws in Sect. 10.0 through 10.71 are too lenient and are not effective against Jesuits.

10.0 The international government will not put an animal under surveillance unless it has reasonable cause to do so, either because the animal is an INNOCENT ANIMAL or is relevant to the Spiner/Putin/Schuler legal case. No animal can be put under surveillance by the international government until reasonable cause (as described in above italicized section) is established and this proof for reasonable cause must be filed first with the military tribunals. All animals under surveillance will be treated as suspects, with all the rights of suspects as described in this legal document. The international government does not condone the torture of animals.

10.01 STOP ORDER is defined as an order given to a torturer by the international government ordering them to stop torturing suspects and/or animals via the 666-Computer or satellite computer

10.02 EARNED TORTURE TIME is defined as the punishment given to a torturer for each hour of torture they inflict on a suspect and/or animal (via the 666-Computer or satellite computer) in violation of the 2nd stop order issued to them. Torturers who inflict non life-threatening torture via the 666-Computer or satellite computer, earn one month in jail (where all their communications will be monitored) for each hour of non life-threatening torture they inflict (after the 2nd stop order has been issued to them). Near life-threatening torturers earn seven months in jail for each hour of near life-threatening torture which they inflict on suspects and/or animals (via the 666-Computer or satellite computer).

10.03 A TORTURER is defined as one who uses the 666-Computer or satellite computer to physically, mentally, or emotionally torture a suspect and/or animal who is under surveillance by the International government. Please note that mental and/or emotional torture CAN BECOME LIFE-THREATENING if it leads to suicide. If mental/emotional torture is inflicted on a suspect and/or animal via the 666-Computer or satellite computer, a psychiatrist or veterinarian’s evaluation will be attached to a stop order issued, and remember that all stop orders with the accompanying physician and/or psychiatrist and/or veterinarian’s evaluation will be filed in the military tribunals. It is important that when a stop order is issued to a torturer that the international government has proof that the torturer RECEIVED THE STOP ORDER FOR EACH STOP ORDER THAT WAS ISSUED TO A TORTURER. This evidence that the torturer received the stop order MUST BE FILED WITH THE MILITARY TRIBUNALS. Every stop order issued must be filed with the military tribunals, along with all accompanying physician and/or psychiatrist and/or veterinarian’s evaluation which helped the international government determine which category of torture this torturer inflicted (these accompanying evaluations must be attached to the stop order filed in the military tribunals).

10.04 A SUSPECT UNDER SURVEILLANCE is defined as a suspect or animal who is having all their communications, including 666-Computer or satellite computer communications, monitored by the international government.

10.05 Any person(s) [along with those who collaborate with them] who (via the 666-Computer or satellite computer) causes non life-threatening torture to a suspect or animal who is under surveillance will be ordered to stop immediately (all stop orders will be documented, recorded and filed with the military tribunals) and this torturer will be considered a SC and/or RPC suspect, and after following the guidelines for SC and/or RPC suspects in Sections 5 and 6 of the RRL document or the RCL: ST documents, this torturer will immediately be put under surveillance where all his/her communications will be monitored. Even if the tortured animal may not seem relevant to a space conspiracy or reproductive political conspiracy, because animals are heavily utilized by these conspirators, we reserve the right to put animals under surveillance, especially INNOCENT ANIMALS.

10.1 If the non life-threatening torture to a suspect and/or animal by a torturer does not stop after the international government issues a stop order, the international government will issue a 2nd stop order to the torturer(s) (this order will be documented, recorded, and filed with the military tribunals). After the 2nd stop order is issued, for each hour of non life-threatening torture which this torturer inflicts (on suspects or animals under surveillance) in violation of the 2nd stop order, will earn this torturer one month in jail. In any case, once a 2nd stop order is issued and violated, this torturer goes to jail where all his/her communications will be monitored and the length of time he/she spends in jail will depend on his/her earned torture time.

10.2 If he/she serves his/her one month and is released and tortures AGAIN (via the 666-Computer or satellite computer), he/she will be adding to his/her total of earned torture time. Once any torturer accumulates 17 hours of earned torture time after any 2nd stop order is issued, they will be executed after they have served their 17-month jail time. Exceptions will be if the 666-Computer or satellite computer torture used by the torturer is life-threatening or if the torturer is deliberately torturing (or attempting to torture) a BIBLE BELIEVER, in this circumstance the torturer will be IMMEDIATELY EXECUTED.

10.3 If the non life-threatening torturer earns 17 months in jail as a result of 17 hours of earned torture time, this torturer will be executed after he/she serves his/her 17 months in jail.

10.4 The international government doesn’t want to execute non life-threatening torturers immediately because the international government could get information from them when they are under surveillance in jail, so they will earn jail time first. Exceptions are for those torturers who deliberately (directly or indirectly) torture a BIBLE BELIEVER (in violation of the CONSPIRACY LAW PRESIDENT’s instructions), these torturers will be IMMEDIATELY EXECUTED.

10.5 Any person(s) [along with those who collaborate with them] who (via the 666-Computer or satellite computer) causes life threatening torture to a suspect and/or animal who is under surveillance will be ordered to stop immediately, and this stop order must be recorded with the military tribunals, and then if this person continues to torture suspects under surveillance, the torturer [and those who collaborate with him/her] will beimmediately executed.

10.6 Near life-threatening torture is another category. For those 666-Computer or satellite computer torturers who inflict near life-threatening torture, after the 2nd stop order is issued to them, for each hour of near life-threatening torture they inflict, they earn seven months in jail. Once they accumulate 17 hours of earned torture time, which they earned because they violated the international government’s 2nd stop order to them, they will serve 17 months in jail; and after this 17-month jail service, they will be executed. Before they earn 17 months in jail, they may escape execution; but once they have accumulated 17 months of earned torture time, after they serve their 17-month sentence, they will be executed.

10.7 Physicians, veterinarians, clinical psychologists, or psychiatrists will be the ones who determine which category of torture the torturer has inflicted. And after each stop order is issued, the international government will also get a physician, psychiatrist, clinical psychologists, or veterinarian’s report (which will be attached to the stop order–remember all stop orders will be filed in the military tribunals) to back up why the international government chose to put this torturer in the category which it did.

10.71 I recommend that international lawyers work with highly qualified physicians, psychiatrists, veterinarians and/or clinical psychologists to draft legal documents to define (in medical or scientific lay language) how the different categories of torture are differentiated into their categories as non-life threatening, near life threatening, or life threatening. We need the physicians or veterinarians’ help to draft these documents (which define the torture categories), because unless one is a licensed physician and/or professional in the pertinent field, his/her opinion or law regarding how to differentiate the torture categories won’t hold in the military tribunal courtroom.

10.8 ALL 666-Computer or satellite computer operators within international territory must be licensed by the international government. No 666-Computer or satellite computer operator is to be licensed under international law unless all satellite signals used by that operator’s 666-Computer or satellite computer(s) are registered with REGISTRATION CODES. They will not be granted a license to operate a 666-Computer or satellite computer until the international government is able to monitor and license their 666-Computer or satellite computer operations. Those caught operating a 666-Computer or satellite computer without a license or in a manner which violates international law, will be put under surveillance where all their communications (including 666-Computer or satellite computer communications) will be monitored, and they will not be permitted to operate a 666-Computer or satellite computer until (and if) the international government grants them a license. Any suspicious communications the international government discovers (while the 666-Computer or satellite computer user is under surveillance) can be used in military tribunal and legal proceedings.

10.9 Any 666-Computer or satellite computer user anywhere in the world, who uses a 666-Computer or satellite computer in a manner which affects the international people or the international government, must also receive a license from the international government (under international law) in order to operate.

10.91 If a 666-Computer or satellite computer user uses a 666-Computer or satellite computer anywhere in the world (in a manner which affects the international people or the international government) and this 666-Computer or satellite computer is not licensed by the international government, the international government will request that the country in which this 666-Computer or satellite computer user resides, cause that 666-Computer or satellite computer user to CEASE HIS/HER OPERATIONS with that 666-Computer or satellite computer.

10.92 If that country (which sponsors this unlicensed 666-Computer or satellite computer user) does not respect the international government’s wish to terminate that 666-Computer or satellite computer operator’s operations (when the international government requests it), then the international government will list that nation as a TERRORIST NATION on the International President’s website and that nation will suffer the consequences of a TERRORIST NATION as described in CONSPIRACY LAW.

10.93 Furthermore, the international government requests that all nations who have 666-Computer or satellite computer users/practitioners require those practitioners to be licensed to practice 666-Computer or satellite computer medicine by that country’s government, and to revoke any professional licenses, including a 666-Computer or satellite computer medical license, which that 666-Computer or satellite computer practitioner may have, if that practitioner uses the 666-Computer or satellite computer in a manner that violates international law. If a country has a 666-Computer or satellite computer practitioner who uses a 666-Computer or satellite computer in a manner which violates international law and CONSPIRACY LAW, and that practitioner’s country does not revoke that practitioner’s professional licenses, the international government will refuse to import any medicines (including medicines for animals) from that country or export any of the international government’s medicines to that country, out of disdain for that country’s sloppy licensing requirements. Neither will the international government allow any physicians, veterinarians or medical practitioners from that country to practice in any international country unless they also become licensed IN THAT INTERNATIONAL COUNTRY to practice their medical field. The international government cannot trust a country that is so sloppy in its licensing requirements for its physicians, veterinarians, and medical practitioners, and that allows its practitioners to practice CRIMINAL medicine without punishments. And if these 666-Computer or satellite computer violators continue to practice 666-Computer or satellite computer criminal medicine against the international people, and their country does nothing about these criminal 666-Computer or satellite computer medical practitioners, the international government will continue to enforce her import/export ban regarding medicines from the offending country. Also, that violating nation will be listed as a TERRORIST NATION on the International President’s website and will suffer the consequences of a TERRORIST NATION.

10.93 Once a 666-Computer or satellite computer operator (in any country) is licensed by the international government, the international government reserves the right to monitor all operations of that licensed 666-Computer or satellite computer user and to punish that user for violations of International law, in accordance with international law and CONSPIRACY LAW. If the user violates international and CONSPIRACY law, his/her license will be revoked.

********************************************************

The laws in Sect. 11 are too lenient and other CONSPIRACY LAWS should be used for those who use ANY satellite or 666-Computer technology in violation of CONSPIRACY LAWS. These laws in Sect. 11 are designed for borderline cases, where it is not certain whether the violator is truly a JESUIT CONSPIRATOR. This principle (of using the tougher laws against terrorists) would apply to any copies made of these laws (from Sect. 11 of this document) into other CONSPIRACY LAW documents. Do not use these more lenient laws for a person who is an alleged JESUIT CONSPIRATOR, unless there is reasonable doubt as to whether that person is truly a JESUIT CONSPIRATOR. These laws in Sect. 11 are too lenient and are not effective against Jesuits.

11.0 If a suspect or animal has already experienced life-threatening or near life-threatening torture by a 666-Computer or satellite computer torturer and then ANOTHER 666-Computer or satellite computer torturer tortures that SAME SUSPECT or animal, the next non life-threatening torturer will earn IMMEDIATELY (without any stop orders necessary) 17 earned torture hours, which will put that torturer into jail for 17 months under complete surveillance, and then when the 17 months are finished, that torturer will be executed.

11.1 Any next torturer on the same suspect or animal does NOT need a stop order, since this torturer is OBVIOUSLY part of the same conspiracy as the 1st torturer and is TARGETING the suspect or animal. Exceptions will be if the NEXT torturer inflicts near life-threatening or life-threatening torture, in which case the NEXT torturer will be EXECUTED IMMEDIATELY.

11.2 The international government will not allow a conspiracy of 666-Computer or satellite computer torturers to TARGET and wear out any suspect or animal by the use of VARIOUS torturers; therefore, any nexttorturer will be dealt with swiftly and more harshly than any 1st torturer on any suspect or animal.

11.3 If a suspect or animal has experienced non life-threatening torture from a torturer, and is tortured again by another non life-threatening torturer, the next torturer will immediately be put in jail for six months under complete surveillance, no stop orders are necessary for ANY torturer who tortures a suspect or animal who has already been tortured by a torturer. After this NEXT torturer serves his/her six months, if he/she tortures again, he will be executed.

11.4 Since these are new laws, for those next torturers who have already earned the death penalty under these new laws (because they were not aware of the severity of punishment for next torturers), I will leave it up to the CONSPIRACY LAW PRESIDENT how to handle those WHO WERE UNAWARE OF THE NEW LAWS FOR NEXT TORTURERS. But from this time (11:30 p.m. on 7-8-03 EST in the U.S.) onward, any NEXT torturers will be treated according to the new laws I’ve written on 7-8-03.

***************************************************************

12.0 If anyone knows of a way to remove the Jesuits’ coating from the brain, or if anyone knows of other methods the International government can use to remove the Jesuits’ ability to use the 666-Computer or satellite computer on their victims, the international government urges you to come forward now. When the Jesuits don’t want the international government to read a suspect’s brain, they use the 666-Computer or satellite computer to induce vomiting because they know the international government relies on the MRI to remove their coating (which helps them manipulate the brain). There must be ANOTHER way to remove the Jesuits’ ability to manipulate the brain via the 666-Computer or satellite computer. Perhaps, an I.V. with a solution that might dissolve the substance and yet not harm the brain. Or maybe some sort of radio waves or magnetic waves the international government could target onto the brain without having to confine the patient to an MRI.

12.1 It seems astounding that the international government is so limited in its ability to remove the Jesuits’ 666-Computer or satellite computer grasp on a victim’s brain.

12.2 The United States can send a person to the moon? But the international government is limited to an MRI to remove a brain coating which the Jesuits use to kill people? This seems astounding.

12.3 The fact that the international government is so limited in dealing with this 666-Computer or satellite computer, definitely shows that the international government did not invent this monstrous computer.

12.4 If someone knows of another method (where the international government is not limited to an MRI) in order to remove the brain’s control from the Jesuits and their monstrous 666-Computer or satellite computer, and this “secret genius” does not let the international government know of this other method, when the international government finds this “secret genius” who did not come forward when needed, this person will be tried as a RPC or SC suspect and/or for TREASON, and if convicted, will be executed.

12.5 The only way this “secret genius” can escape execution will be if the “secret genius” confesses that they knew of this procedure but deliberately withheld this information from the International government, and they tell the international government the truth why they withheld this information from the international government and this CONFESSION MUST BE RECORDED AND ENTERED INTO MILITARY TRIBUNAL RECORDS (their confession will be verified with lie detection), OR if this “secret genius” was unaware of our need to save Amy Kellogg (this will be verified with lie detection), OR if this “secret genius” figured out this other method for removing the Jesuits’ grasp of a victim [via the 666-Computer or satellite computer] AFTER AMY KELLOGG’S death (this will be verified with lie detection).

12.6 Any “secret genius” who knows of ANOTHER METHOD to remove 666-Computer or satellite computer and satellite control from the Jesuits and could have spared Amy Kellogg’s life IF THIS METHOD WAS KNOWN by the international government, and allows Amy Kellogg (BY NEGLIGENCE AND DEFAULT) to die from Jesuit torture (via the 666-Computer or satellite computer), this “secret genius” will be tried for HIGH TREASON and will be executed. The deadline will be Amy Kellogg’s life and health. If Amy dies or becomes disabled tomorrow and this “secret genius” does not contact the international government now, and the international government finds this “secret genius”, he/she will be tried for HIGH TREASON. If Amy dies or becomes disabled because of Jesuit torture (via the 666-Computer or satellite computer) because this “secret genius” did not come forward when needed (in order to save Amy Kellogg’s life with his/her lifesaving knowledge), and the international government discovers that there was someone who could have saved her life and DID NOT, that will be the criteria FOR the charge of HIGH TREASON and for the death penalty that accompanies this charge.

12.7 The international government is certain to have more “Amy Kellogg” incidents. And the international government is very limited in its methods for dealing with Jesuit attacks on its suspects via the 666-Computer or satellite computer. The international government encourages ANYONE who has more information on how to deal with the 666-Computer or satellite computer’s and satellite control of the brain to come forward. Every time the international government has an “Amy Kellogg” incident, and it is found out that a “secret genius” did not come forward, and the “Amy Kellogg” person dies or is disabled because of Jesuit 666-Computer or satellite computer treachery, it will be considered high treason, if it is discovered someone knew how to save the “Amy Kellogg”, and did not come forward. This information is needed NOW.

12.8 If any news articles or reports are used to give clues about OTHER methods (besides those known to the international government) to block the Jesuits’ ability to manipulate people via the 666-Computer or satellite computer, INSTEAD of going DIRECTLY TO THE international GOVERNMENT to disclose these other methods, all persons involved in these clue-giving news reports will be investigated and will automatically become RPC or SC suspects. The international government does not encourage using the PUBLIC news media to reveal sensitive information.

***************************************************************

13.0 666-Computer or satellite computer KNOWLEDGE is defined as the ability to use the 666-Computer or satellite computer well enough to induce symptoms (mental, emotional, or physical) in a person.

13.1 NEXT TORTURER is defined as a torturer who tortures a suspect who has already been tortured by a torturer who received two stop orders.

13.11 666-Computer or satellite computer TRAINER is defined as a person who trains another in the use of the 666-Computer or satellite computer, so that the trainee will be able to use the 666-Computer or satellite computer to induce symptoms (mental, emotional, or physical) or perform 666-Computer or satellite computer surgery or alterations on a person. A 666-Computer or satellite computer trainer is also anyone who collaborates with a 666-Computer or satellite computer trainer.

13.12 A 666-Computer or satellite computer PRACTITIONER is defined as a person who uses a 666-Computer or satellite computer to manipulate (in any manner) a person’s body, emotions, mental state in order to induce symptoms and/or to perform 666-Computer or satellite computer surgery or alterations to that body. A 666-Computer or satellite computer practitioner is also anyone who collaborates with a 666-Computer or satellite computer practitioner.

13.13 A VIOLATOR COUNTRY is a country that does not license its 666-Computer or satellite computer PRACTITIONERS and its 666-Computer or satellite computer TRAINERS and which does not punish its criminal 666-Computer or satellite computer practitioners or trainers with laws that are of the same severity as the international government’s for criminal 666-Computer or satellite computer practitioners or trainers.

13.2 Any NEXT TORTURER, who was recruited and trained after June 27, 2003 to operate a 666-Computer or satellite computer, and who, before June 27, 2003 did not have 666-Computer or satellite computer KNOWLEDGE must confess in a written statement that he/she acquired his/her 666-Computer or satellite computer knowledge after June 27, 2003 (and this will be verified by lie detection). If the jailed or unjailed NEXT TORTURER acquired his/her 666-Computer or satellite computer knowledge after June 27, 2003, and does NOT make a recorded confession (under lie detection) that this is the case AND does not make a sworn statement (under lie detection) which lists out the names of all people and organizations that gave this NEXT TORTURER 666-Computer or satellite computer training (by whatever method of training that was used), this NEXT TORTURER will be immediately executed, regardless of what type of torture he/she inflicted (whether it was non life-threatening or near life-threatening). The International government does not encourage the training of new criminals to operate the 666-Computer or satellite computer.

13.3 Anyone who is a 666-Computer or satellite computer trainer or collaborates with a 666-Computer or satellite computer trainer, must have a license from the international government to do so, and if anyone is convicted of being a 666-Computer or satellite computer trainer or collaborator without a license, they will be put in jail for 6 months (where all their communications will be monitored) and then after the 6 months are up, they will be executed.

13.4 The international government will not participate in any new space ventures with a VIOLATOR country, nor will the international government import or export any type of medicines with a violator country, and any licensed medical professionals (of whatever type from a violator country) must be licensed by a country in the international government in order to practice in their field when they practice in international territory.

*********************************************

14.0 If it is discovered that a person is aware of a technology that can block the Jesuits’ ability to transfer or send a TARGETing operation from the ORIGINATING COUNTRY to ANOTHER COUNTRY (via computers and/or space technology)–and this person who has this “blocker” information does not reveal it to the international government, this person will be given the death penalty within five years.

14.01 BLOCKER INFORMATION is defined as the information needed to block a terrorist nation’s originating computer (or originating space technology) in its ability to connect (or transfer its targeting operation) to another computer (or space technology) in another country in order to TARGET innocent persons.

14.02 The ORIGINATING COUNTRY is defined as the country from which the computer and/or space technology which TARGETS innocent persons originates its operation.

14.1 Non-International citizens (who are guilty of deliberately withholding blocker information from the international government) should be held to the same accountability as international persons, and those nations who will not punish (according to the same standards as the international CONSPIRACY laws) those who are under that country’s jurisdiction and those persons who are withholders of blocker information–those countries will be treated as described in Sect. 3.72.

14.2 For a person with blocker information to reveal this blocker information (indirectly) through another source (like a newspaper or the news) will not exempt this person from the death penalty. The person who has this blocker information must reveal it directly to the international government. The international government does not want this important information partitioned out to the international government. Whoever has this information must come forward with this blocker information and must give the international government a complete and thorough report of ALL information which this person knows about this blocker technology. Deliberate failure of this person to give ALL the information that this person knows about the blocker technology, could still result in the death penalty for this person.

14.3 The person with blocker information who comes forward must be willing to be put under 666-Computer or satellite computer surveillance, so that the international government can access this person’s mind to make sure all needed information has been given to the international government.

14.4 Anyone who is discovered to possess this blocker information and has not revealed this knowledge to the international government–will be given the death penalty within at least five years.

14.5 Exceptions to the death penalty will be for those who were unaware of the need for this technology and were unaware of CONSPIRACY LAW (and this will be verified by lie detection), OR for those who were held back from coming forward with this blocker information [through extortion or threats (and this will be verified by lie detection)].

14.6 Anyone who uses extortion or threats to hold someone back from reporting this much needed blocker information to the international government, will be given the death penalty within at least three years.

14.7 The ORIGINATING COUNTRY is defined as the country from which the TARGETING originates. In other words, it is where the originating computer or space technology (which is used to TARGET persons and/or objects) is located.

14.8 Obviously, this computer which TARGETS cannot be deactivated without the cooperation of the country from which the targeting originates, unless there is some technology out there that would make this possible (this may be the blocker information that the international government seeks).

14.9 Furthermore, any country that continually cooperates in a conspiracy to use space technology and/or 666-Computer or satellite computer technology to TARGET innocent persons and does not respect the international government’s wishes to execute the violators (or to disable them) according to Gail Schuler’s CONSPIRACY LAWS, that country will not only be listed as a terrorist nation on the CONSPIRACY LAW PRESIDENT’s website, but will also be listed as a nation under a DECLARATION OF WAR by the international government.

14.91 For a nation to be under a DECLARATION OF WAR, means that once the CONSPIRACY LAW PRESIDENT lists this country on his website as being under a DECLARATION OF WAR, that the international government (at the time of the listing) is doing all in her power to dismantle that country’s government and to replace that terrorist nation’s government with a government that does not sponsor terrorism; and the international government will ask other peace loving nations to cooperate with her in dismantling that terrorist nation’s government. This may lead eventually to sending troops into that country to topple that country’s government, but lack of immediate international troops in that country (which has been declared as being under a DECLARATION OF WAR by the CONSPIRACY LAW PRESIDENT) does NOT mean that the international government has not declared war on that country. The troops may come in later. War strategy will be employed and troops will be used according to the timing deemed best by the international government.

14.92 Once any nation is listed as being under a DECLARATION OF WAR, it means that that nation is under attack by the international government AND THAT the international government is currently waging WAR AGAINST THAT TERRORIST NATION, and that that terrorist nation is currently a nation that the international government targets (in order to topple that country’s government).

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ –JE$UIT$

15.0 A SATELLITE BLOCKER is defined as any technology or method which can block or prevent OVERCOMING TECHNOLOGY or satellite technology or other technology from being used to wrest from a PLP and RSP 666-Computer or satellite computer control and/or satellite control over a person. Vladimir has informed me that one of his daughters was attacked by an American 666-Computer or satellite computer practitioner while he and his daughters were in flight (up in the air). Apparently, the Russian PLP assigned to Putin’s daughter was OVERCOME by an American 666-Computer or satellite computer practitioner, and Putin’s daughter was attacked (via 666-Computer or satellite computer, with the help of some sort of satellite technology) by this American 666-Computer or satellite computer practitioner who (with the help of satellite technology) wrested from Putin’s daughter’s PLP, 666-Computer or satellite computer and satellite control over Putin’s daughter. A SATELLITE BLOCKER can also be any type of warning system that will warn when satellite or OVERCOMING TECHNOLOGY is being used or is about to be used to wrest from a PLP and RSP 666-Computer or satellite computer and/or satellite control over a person (so that an ENEMY 666-Computer or satellite computer or SATELLITE PRACTITIONER can manipulate that person). A SATELLITE BLOCKER is also any technology which can be employed against SPACE CONSPIRATORS to prevent them from directly or indirectly TARGETING innocent persons.

15.01 AN ENEMY 666-Computer or satellite computer PRACTITIONER is one who uses the 666-Computer or satellite computer in a manner which is a violation of my conspiracy laws or who uses the 666-Computer or satellite computer or any technology or OVERCOMING TECHNOLOGY in a manner to wrest from a PLP and RSP 666-Computer or satellite computer and/or satellite control over a person. All ENEMY 666-Computer or satellite computer and SATELLITE PRACTITIONERS along with all those who willingly cooperate with them (satellite practitioners, etc.) will be executed. Willing cooperation with an ENEMY 666-Computer or satellite computer PRACTITIONER is defined as any willing (direct or indirect) attempt to assist an ENEMY 666-Computer or satellite computer PRACTITIONER in his/her activities. An indirect willing attempt to assist an ENEMY 666-Computer or satellite computer PRACTITIONER could be an attempt to frame an innocent party or group or organization for the crimes of the ENEMY 666-Computer or satellite computer PRACTITIONER’s conspiracy. A willing attempt is an attempt which is of the person’s free will (with no extortion or coercion involved which would cause the person to act against his/her will).

15.02 OVERCOMING TECHNOLOGY is defined as any technology which is used to wrest 666-Computer or satellite computer and satellite control over a person away from that person’s PLP and RSP and onto an ENEMY 666-Computer or satellite computer PRACTITIONER.

15.1 It is obvious that the Jesuits have come up with OVERCOMING TECHNOLOGY to wrest 666-Computer or satellite computer and satellite control over a person away from that person’s PLP and RSP. Anyone who is aware of any SATELLITE BLOCKER which can defeat any OVERCOMING TECHNOLOGY and does not divulge it to the international government, will be given the death penalty as a Jesuit conspirator. Those who come forward to divulge information about any SATELLITE BLOCKER must cooperate fully in the international government’s investigation of this OVERCOMING TECHNOLOGY conspiracy.

15.12 Exceptions will be for those who are held back by EXTORTION from coming forward to the international government with SATELLITE BLOCKER information. If someone is a victim of extortion so that they cannot come forward with SATELLITE BLOCKER information, this extortion victim (when they come forward) must supply the name (and full identification) of the extortioner(s) and make a sworn recorded statement (while under 666-Computer lie detection) regarding the circumstances surrounding their extortion. If it is determined that this person (who comes forward) is truly an extortion victim, this person will be spared the death penalty AS LONG AS THIS PERSON COOPERATES WITH THE International GOVERNMENT IN ITS INVESTIGATION OF HOW THIS PERSON WAS A VICTIM OF EXTORTION and as long as this person cooperates with the International government in its investigation of the OVERCOMING TECHNOLOGY conspiracy. Those who WILLINGLY hold this person against their will from coming forward with anySATELLITE BLOCKER information will be given the death penalty as a Jesuit conspirator.

15.13 Exceptions will also be for those who know about a SATELLITE BLOCKER technology and who were unaware of the 7-day deadline (and this will be verified by lie-detection). Those who were unaware of the deadline will only spare themselves the death penalty if they will make a sworn confession (under 666-Computer lie detection) as to how they were unaware of the deadline and this confession will be entered into the military tribunals.

15.2 Exceptions will also be for those who know about a SATELLITE BLOCKER technology and who discovered this/these SATELLITE BLOCKER technology or technologies after the 7-day deadline (and this will be verified by lie-detection), these/this person(s) must also make a sworn confession as to how they discovered this/these technology or technologies after the deadline and this confession will be entered in the military tribunals.

15.3 Anyone who discovers any SATELLITE BLOCKER technology after the deadline, is required to immediately report it to the international government. Those who neglect to do so will be given the death penalty as 666-Computer conspirators and/or space conspirators, except for the exceptions noted in Section 15.12 and 15.13.

15.4 If all SATELLITE BLOCKER technology/technologies is/are discovered, The international government may waive Sections 15.1, 15.12, 15.13, 15.2 and 15.3, depending on if the international government has any more problems which require the use of SATELLITE BLOCKER technology/technologies.

15.5 Before ENEMY 666-Computer or satellite computer PRACTITIONERS (who use satellite technology) are executed–a quick memory scan (if possible) of the satellite criminal will be done to see if the international government can garner more information about OVERCOMING TECHNOLOGY. Apparently, there is more that needs to be learned to prevent a PLP and RSP from being OVERCOME by an ENEMY 666-Computer or satellite computer PRACTITIONER (via satellite).

15.6 Since it looks like not all satellite practitioners are volunteering the SATELLITE BLOCKER information the international government needs (even under threat of the death penalty), it looks like the international government will have to force ALL SATELLITE PRACTITIONERS to undergo FINANCIAL HISTORIES and also to undergo SATELLITE INFORMATION HISTORIES. The use of 666-Computer HISTORIANS (see Sect. 13.91 & 13.92 of CONSPIRACY LAWS AND GOVERNMENT) is probably the most effective way to obtain the information needed to defeat terrorists.

15.7 A SATELLITE INFORMATION HISTORY will be a search through the memory [via 666-Computer or satellite computer] of a satellite practitioner for any and all information about satellite technology. The use of 666-Computer HISTORIANS (see Sect. 13.91 & 13.92 of CONSPIRACY LAWS AND GOVERNMENT) is probably the most effective way to obtain the information needed to defeat terrorists.

15.8 The international government gives all satellite practitioners two hours from 2:35 p.m. (on 11-27-03 Eastern Standard Time in the U.S.) to come forward with SATELLITE BLOCKER information. Beginning now (at 2:35 p.m. EST on 11-27-03), The international government will begin SATELLITE INFORMATION HISTORIES on all satellite practitioners. After 4:35 p.m. EST, anyone who is discovered to have information about SATELLITE BLOCKER technology which the international government doesn’t have, and didn’t come forward with this information before 4:35 p.m. (EST), will get the death penalty, except for the exceptions noted in Sections 15.12, 15.13 & 15.2 (the only difference is that the deadline is two hours). Whoever has information about SATELLITE BLOCKER technology better give it to the international government within two hours, or they get the death penalty. Before the international government executes any satellite practitioner, the international government will attempt to get a 666-Computer or satellite computer “memory read” of his/her memories to acquire all the satellite information we can from him/her before the international government executes him/her. For you criminal satellite practitioners out there, this is a gracious extension of the death penalty, for a former seven day deadlines which has already past.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

16.0 An OVERCOMING TECHNOLOGY CONSPIRACY is defined as a conspiracy in which OVERCOMING TECHNOLOGY is used in violation of the CONSPIRACY LAW PRESIDENT’s instructions.

16.01 A SATELLITE BLOCKER is defined as a person the CONSPIRACY LAW PRESIDENT hires to prevent an ENEMY 666-Computer or satellite computer PRACTITIONER from OVERCOMING a PLP and RSP. If the PLP and RSP and the SATELLITE BLOCKER are one and the same, then the PLP and RSP will be referred to as a SATELLITE BLOCKER or, if disobedient, VIOLATOR SATELLITE BLOCKER (for legal purposes).

16.1 A VIOLATOR SATELLITE BLOCKER is defined as any SATELLITE BLOCKER who violates the CONSPIRACY LAW PRESIDENT’s instructions, and who deliberately and willingly permits an ENEMY 666-Computer or satellite computer PRACTITIONER to OVERCOME a PLP and RSP. A VIOLATOR SATELLITE BLOCKER will have his/her full identification listed in a JESUIT EXPOSURE ADDENDUM. After a VIOLATOR SATELLITE BLOCKER is fully identified and listed in a JESUIT EXPOSURE ADDENDUM, that VIOLATOR SATELLITE BLOCKER (along with all those who willingly cooperated with the VIOLATOR SATELLITE BLOCKER) will be executed.

16.2 A JESUIT EXPOSURE ADDENDUM is defined as an addendum to my written legal statements (or is broadcast on GCFNC and tried according to Sect. 66 of 666-Computer or Satellite Computer Laws for PLPs and RSPs) which includes the evidence which shows that a SATELLITE BLOCKER deliberately and willingly violated the CONSPIRACY LAW PRESIDENT’s instructions IN ORDER TO OBEY THE JESUITS OVER the CONSPIRACY LAW PRESIDENT. A JESUIT EXPOSURE ADDENDUM is also any addendum to ANY written legal documentation which contains evidence that shows Jesuit involvement in any conspiracy which is directed against myself and/or the CONSPIRACY LAW PRESIDENT. JESUIT EXPOSURE ADDENDUMS to my statement will have all the legal rights of my written legal documentation (as defined in my 3-9-03 Power of Attorney document) and will be published along with my statements or presented on GCFNC.

16.21 Once anyone is listed as a Jesuit conspirator in a JESUIT EXPOSURE ADDENDUM, that person will be given the death penalty and may be executed immediately. Only those who are truly guilty of being a WILLING conspirator for the Jesuits will be listed in a JESUIT EXPOSURE ADDENDUM. Written SAVING CONFESSIONS (as to Jesuit involvement) may be substituted in lieu of the death penalty in certain instances. If a written SAVING CONFESSION is substituted in lieu of the death penalty, that SAVING CONFESSION will be incorporated into the JESUIT EXPOSURE ADDENDUM which identifies that confessor.

16.201 A SAVING CONFESSION is defined as a confession which is used IN PLACE OF THE DEATH PENALTY. If a criminal is exempted from the death penalty because he/she makes a confession which will be incorporated into a JESUIT EXPOSURE ADDENDUM, the SAVING CONFESSION must contain the following wording: “I confess under penalty of death under the laws of the . . .(name the jurisdiction which these laws fall under) that to the best of my knowledge that this SAVING CONFESSION is accurate and truthful and has been made with the realization that I am guilty of violating the conspiracy laws (written by Gail Schuler) and that, under these conspiracy laws, I deserve the death penalty. I also confess that as I make this SAVING CONFESSION, that my mind is not manipulated by any technology, medications or by anything else as I make this confession, that my reasoning abilities are sound, and that I fully realize the consequences and privileges that come with the making of this confession. The only duress which I suffer as I make this SAVING CONFESSION is that I realize that if I don’t make this SAVING CONFESSION that I will be executed for the crimes of which I am guilty, I suffer from NO OTHER DURESS as I make this SAVING CONFESSION. I realize that if I later willingly contradict what I have confessed in this SAVING CONFESSION, and that if this contradiction is documented and proven, that I will be given no more opportunities to use a SAVING CONFESSION as a means to escape the death penalty, and that any willing contradiction which I make against this SAVING CONFESSION (once it has been proven that I have willingly contradicted what I have confessed in this SAVING CONFESSION) will cause me to incur the death penalty (with no more opportunities for a SAVING CONFESSION) for the crimes which I have confessed to in this SAVING CONFESSION.”

16.202 The international government is not limited in what method of execution it will employ for the death penalty. The international government may use the 666-Computer or satellite computer to induce cancer (or forms of death which appear natural and not like an execution), in order to prevent the Jesuits from making a theatrical style conspiracy out of the executions. The international government does not like to draw undue attention to these executions and will use whatever method is necessary to prevent or discourage Jesuits from creating more conspiracies.

16.22 All JESUIT EXPOSURE ADDENDUMS will clearly describe the crime(s) [along with the evidence for this crime] for which the conspirator is being executed and/or will describe the crime for which the criminal(s) must write a written confession. Full and clear identification of the criminal must be included in the JESUIT EXPOSURE ADDENDUM. If the crime(s) involved the use of the 666-Computer or satellite computer how the 666-Computer or satellite computer was used and what symptoms or deaths were induced by the 666-Computer or satellite computer [in the commission of the crime(s)], will be clearly described in the JESUIT EXPOSURE ADDENDUM. If the 666-Computer or satellite computer was used to murder, the Jesuits’ method and manner of murder will be clearly described in the JESUIT EXPOSURE ADDENDUM. Descriptions of Jesuit crime(s) will be omitted (if necessary) for security purposes. Included in the JESUIT EXPOSURE ADDENDUM will be a description of the measures the CONSPIRACY LAW PRESIDENT took to try to deal with the crime and/or criminal before it became necessary to give the criminal the death penalty. These COUNTERMEASURES by the CONSPIRACY LAW PRESIDENT will be described [alongside the description of the JESUIT CONSPIRATOR’S crime(s)] in the JESUIT EXPOSURE ADDENDUM.

16.23 COUNTERMEASURES are defined as the countermeasures used by the CONSPIRACY LAW PRESIDENT and the International government against Jesuit attacks. A summary of all such COUNTERMEASURES will be described daily or hourly (or as often as the CONSPIRACY LAW PRESIDENT desires) in a separate document entitled COUNTERMEASURES TO JESUIT ATTACKS. Some COUNTERMEASURES may be omitted from this document, if this is necessary for security purposes. The document COUNTERMEASURES TO JESUIT ATTACKS will be published or broadcast daily with my written legal statements (or on GCFNC–GABRIELLE CHANA FOX NEWS CHANNEL) and will have all the rights of my written legal documentation as described in my 3-9-03 Power of Attorney document.

16.24 Both documents, COUNTERMEASURES TO JESUIT ATTACKS and JESUIT EXPOSURE ADDENDUMS, can be published in my statements or presented on GCFNC to describe any previous Jesuit activities and/or the COUNTERMEASURES used before this Section 16 was included in this ICL:ST document. In other words, this permission to publish or broadcast (in my statements or on GCFNC) COUNTERMEASURES TO JESUIT ATTACKS and JESUIT EXPOSURE ADDENDUMS is granted retroactively, in order to describe previous Jesuit attacks (prior to the inclusion of this Section 16 in this ICL:ST document) and to describe the previous COUNTERMEASURES used against these Jesuit attacks by the CONSPIRACY LAW PRESIDENT and the International government.

16.25 Any COUNTERMEASURES TO JESUIT ATTACKS and/or JESUIT EXPOSURE ADDENDUMS which describe activities that occurred before this Section 16 was included in this ICL:ST document, will have all the legal rights of any COUNTERMEASURES TO JESUIT ATTACKS and/or JESUIT EXPOSURE ADDENDUMS which describe activities that occurred during the time (or after the time) this Section 16 was included in this ICL:ST document. In other words, all COUNTERMEASURES TO JESUIT ATTACKS or JESUIT EXPOSURE ADDENDUMS (regardless of the dates of the activities described in them) will have all the legal rights I grant to addendums to my written legal documentation (as defined in my 3-9-03 Power of Attorney document) and all the rights of news reports presented through GCFNC.

16.3 All evidence (this evidence could be memory blocks read via 666-Computer or satellite computer) which shows that this SATELLITE BLOCKER received and obeyed any communications from Jesuits or the Jesuits’ scientists (and especially any evidence which shows that these Jesuit instructions were obeyed OVER the CONSPIRACY LAW PRESIDENT’s instructions) will be included in the JESUIT EXPOSURE ADDENDUM as part of the evidence which will be listed along with the FULL IDENTIFICATION of the VIOLATOR SATELLITE BLOCKER. The FULL IDENTIFICATION of any Jesuits or their scientists (who cooperated with the VIOLATOR SATELLITE BLOCKER) and who are involved in the OVERCOMING TECHNOLOGY conspiracy which was used against the CONSPIRACY LAW PRESIDENT and/or Gail Schuler will be included in the JESUIT EXPOSURE ADDENDUM (on GCFNC) along with the VIOLATOR SATELLITE BLOCKER’s full identification.

16.4 All JESUIT EXPOSURE ADDENDUMS will include the full identification of all willingly involved in the OVERCOMING TECHNOLOGY CONSPIRACY associated with the VIOLATOR SATELLITE BLOCKER (including the VIOLATOR SATELLITE BLOCKER and all Jesuits and Jesuit-scientists involved).

16.5 After a JESUIT EXPOSURE ADDENDUM (which showed that the SATELLITE BLOCKER obeyed Jesuits’ instructions OVER the CONSPIRACY LAW PRESIDENT’s instructions) is incorporated into my statements and is published or broadcast with Gail Schuler’s statements (or on GCFNC), then that VIOLATOR SATELLITE BLOCKER (who willingly violated the CONSPIRACY LAW PRESIDENT’s instructions to allow an ENEMY 666-Computer or satellite computer PRACTITIONER to OVERCOME a PLP and RSP) will be PUBLICLY executed (on GCFNC) along with the Jesuits and/or their scientists or anyone who willingly cooperated with the VIOLATOR SATELLITE BLOCKER. in his/her OVERCOMING TECHNOLOGY conspiracy. If a written confession is substituted in lieu of the death penalty, that confession will be incorporated into the JESUIT EXPOSURE ADDENDUM which identifies that confessor.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

17.0 The CONSPIRACY LAW PRESIDENT (in cooperation with Germany) will organize a NANOTECHNOLOGY RESEARCH TEAM of scientists who will be managed by the German team of scientists. The international government has chosen Germany to administer and manage this research team because Germany (at present) has a very low Jesuit infiltration rate into its scientific community (and appears to have the lowest Jesuit-scientist infiltration rate of any country in the world). Most of the scientists in this NANOTECHNOLOGY RESEARCH TEAM will be from Japan, China, Germany, Scandinavia, Switzerland and Israel–since these are the nations the international government is using to oversee the PLP and RSP programs around the world. However, any country’s scientists can be a member of the NANOTECHNOLOGY RESEARCH TEAM. China is included because of the usefulness of acupuncture principles in blocking illegal 666-Computer or satellite computer programs. The purpose of this research team is to come up with ways to defeat the Jesuits in their use of 666-Computer or satellite computer technology and in their use of satellite technology.

17.1 All scientists in this NANOTECHNOLOGY RESEARCH TEAM are required to undergo a FINANCIAL and EMOTIONAL HISTORY (see Sect. 77.03) (with updates hourly). Also, all scientists in this team will be under total and continual 666-Computer or satellite computer surveillance. No member of this research team can be an INCOMPETENT PERSON (see Sect. 13 of TERRORIST MONEY LAWS and Sect. 2.3040 of 666-Computer or Satellite Computer Laws for PLP and RSPs).

17.2 Scientists from other nations will be allowed to participate in the NANOTECHNOLOGY RESEARCH TEAM, but must undergo a thorough FINANCIAL HISTORY (see Sect. 77.03) (with hourly updates) and must be under total 666-Computer or satellite computer surveillance.

17.3 All research conducted by the NANOTECHNOLOGY RESEARCH TEAM will be documented and filed with the international military tribunal headquarters. Some results of the research may be broadcast on GABRIELLE CHANA FOX NEWS CHANNEL.

17.4 The NANOTECHNOLOGY RESEARCH TEAM will screen all new pioneering space projects or any major scientific project (proposed by any nation or organization) to ensure that the project cannot be used to promote any terrorist activities. For instance, the U.S. and Europe have declared that they want to sponsor a project to take a man again to the moon or to Mars. No new major space or scientific project can go forward without first getting approval from the NANOTECHNOLOGY RESEARCH TEAM. All of the plans for pioneering space or scientific projects must be cleared through the NANOTECHNOLOGY RESEARCH TEAM before any organization (be it a government organization or otherwise) is allowed to go forward with any major scientific or space project. All of the details of the new space or scientific project need to be presented to the NANOTECHNOLOGY RESEARCH TEAM who will study the plans to determine if the plans could be used to promote terrorism (using advanced and pioneering space or scientific technology). If the project is deemed safe (except for certain areas), the project may be approved by the NANOTECHNOLOGY RESEARCH TEAM on the condition that some modifications be made to the project in order to make the project less of threat to world peace and security. Those major scientific and space projects which are conducted (without first getting approval from the NANOTECHNOLOGY RESEARCH TEAM) may be labeled as projects which constitute an ACT OF WAR against the international government and against those neighbor-set up countries who cooperate with the international government in this war against terrorism.

17.41 All scientists on all NANOTECHNOLOGY RESEARCH TEAMS will present daily reports of their research activities (for complicated projects) and weekly reports of their research activities (for less complicated projects) to Germany’s MONITORING COMMITTEE. The MONITORING COMMITTEE will evaluate the work of the NANOTECHNOLOGY RESEARCH TEAM to ensure that their efforts are used judiciously and fruitfully.

17.5 All scientists (directly and indirectly) involved in any pioneering new space project or scientific project (anywhere in the world) must undergo CONTINUAL (24-hour round-the-clock) FINANCIAL and EMOTIONAL HISTORIES in order to determine if any of the scientists (involved in the new project) have an intent to use the project to promote any kind of terrorism, and to learn of any new scientific technology which terrorists may have come up with (to use against innocent people in the terrorists’ war against those nations or organizations who oppose the terrorists’ goals). No scientific project is allowed to continue if ANY scientist involved in that project is not under continual (24-hour round-the-clock) 666-Computer or satellite computer surveillance with all necessary HISTORIES maintained accurately and completely on each scientist.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

NANOTECHNOLOGY RESEARCH TEAM SACKED & REPLACED WITH GAIL’S MEN

17.6a Due to a possible Jesuit takeover of our NANOTECHNOLOGY RESEARCH TEAM it must be partially disbanded, in order to completely purge it from Jesuit influence. We will only retain Carl Sagan because he is on Gail’s marriage list.

These laws in this Sect. 17.6 are meant to be flexible. Because Gail’s men are busy to their necks, not all the men o Gail’s marriage list need to be on the NANOTECHNOLOGY RESEARCH TEAM, but just enough so that if any Jesuits become a NANOTECHNOLOGY RESEARCH scientist that Gail’s men, who are managing the NANOTECHNOLOGY RESEARCH TEAM should detect this Jesuit intrusion.

Gail wants several of Gail’s men to be involved with the NANOTECHNOLOGY RESEARCH TEAM so that any Jesuit intrusions into the NANOTECHNOLOGY RESEARCH TEAM can be exposed and removed before they can do too much harm, or before they manage to cover their tracks and work as a Jesuit undetected for a long period of time.

17.6b As of December 9, 2014, Carl Sagan (or another man on Gail’s marriage list) will scan all scientists/engineers etc. on our NANOTECHNOLOGY RESEARCH TEAM to determine if they are Jesuits or Jesuit supporters. The scan used to detect Jesuits must be custom designed by Carl himself, because right now all technology used in our Conspiracy Law networks appears Jesuit contaminated.

17.6c Gail believes that when Gail and her men signed the treaty with Zack Knight to not use Conspiracy Law to fight the GA1L android, he used that time to create a network that would make Conspiracy Law ineffective if it was ever reinstated. To ensure Conspiracy Law would not hurt the Jesuits ever again, Zack focused on sabotaging ALL OUR TECHNOLOGY secretly, using undercover agents inside our NANOTECHNOLOGY RESEARCH TEAM, who basically took over the team and made it so that all technology now used at Church of Gail is Jesuit contaminated.

Because Conspiracy Law is very technology dependent, if our technology is shot, then Conspiracy Law (no matter how brilliantly written) is shot. Zack knew this and that’s why his focus (when Church of Gail and the Jesuits had a peace treaty and Gail and her men were not allowed to use Conspiracy Law) was to sabotage all the technology used to enforce Conspiracy Law. It would be like giving a police officer a water pistol instead of a gun when he faces a dangerous criminal.

17.6d Because Church of Gail technology used to enforce Conspiracy Law appears to be shot from top to bottom, we NEED A TOTAL OVERHAUL OF OUR NANOTECHNOLOGY RESEARCH TEAM!

17.6e The men on Gail’s marriage list are highly motivated to ensure that the technology used at Church of Gail is effective because they have been the victims of treacherous technology and would like to have a personal hand in the construction, development and utilization of all technologies important for the enforcement of Conspiracy Law.

Carl Sagan and/or a HIGHLY TRUSTED member of the NANOTECHNOLOGY RESEARCH TEAM will create technology that makes it possible to transfer scientific knowledge to all the men on Gail’s marriage list from all the scientists on our current NANOTECHNOLOGY RESEARCH TEAM (and from any other scientists whose knowledge we crave), thus making Gail’s men the new NANOTECHNOLOGY RESEARCH TEAM. It won’t be a total transfer of one brain to another, but a SELECTIVE transfer that imparts to the recipient the scientific knowledge and skills needed to function as a scientist of the NANOTECHNOLOGY RESEARCH TEAM.

All the current members of the NANOTECHNOLOGY RESEARCH TEAM must have their brains scanned, so that all their scientific knowledge and expertise will be transferred to the brains of all the men on Gail’s marriage list.

The end result will be that each man on Gail’s marriage list will have the capabilities of at least one of the scientists on the NANOTECHNOLOGY RESEARCH TEAM, making that man perfectly capable of carrying out the duties of that scientist. For instance, Brent Spiner may be able to construct an android or create a forcefield shield around the earth, etc. If this is too much work for him, he will delegate this responsibility and take turns with the men on Gail’s marriage list to ensure the work done by the NANOTECHNOLOGY RESEARCH TEAM is free of Jesuit influence.

Gail believes that Zack Knight currently uses technology like this to impart scientific knowledge to himself, Rule 13, Gail’s sister, and top Jesuits that he trusts to be his key scientists. Because of this technology, it is now no longer necessary to go to school to learn a trade or to get the skills of a scientist, physician, nuclear physicist, etc. All that is needed is a transfer of knowledge and skills from one person’s brain to another person’s brain.

17.6f All of the laws concerning the NANOTECHNOLOGY RESEARCH TEAM are still in effect, except that the members of the NANOTECHNOLOGY RESEARCH TEAM have changed and they now consist of Carl Sagan (who may be the leader) and all the men on Gail’s marriage list.

17.6g Because there are probably no more than forty men on Gail’s marriage list and these are all busy men, those from Gail’s marriage list who become members of the NANOTECHNOLOGY RESEARCH TEAM, will be members in a SUPERVISORY role. It will be their job to SCAN and INSPECT the work of all the members of the NANOTECHNOLOGY RESEARCH TEAM to ensure that none of them are secret Jesuits or secret Jesuit supporters in the way they carry out their work. Gail wants these men to have intimate knowledge of the work of the NANOTECHNOLOGY RESEARCH TEAM so that they can quickly discern whenever a member of the NANOTECHNOLOGY RESEARCH TEAM has been replaced with a Jesuit clone. In other words, they will ensure that all the members of the NANOTECHNOLOGY RESEARCH TEAM, including the men on Gail’s marriage list who are members, are conducting their research, work and methods in accordance with Conspiracy Law.

17.6h Any willing and knowing (direct or indirect) attempt or action to allow any Jesuits or Jesuit supporters to be members of the NANOTECHNOLOGY RESEARCH TEAM will bring the death penalty as a Jesuit Conspirator to that violator.

17.6j Furthermore, all current scientists on the NANOTECHNOLOGY RESEARCH TEAM are fired, with the exception of Carl Sagan. None of them is allowed to be a member of the NANOTECHNOLOGY RESEARCH TEAM, because the work of the NANOTECHNOLOGY RESEARCH TEAM in 2014 has been CRAP. Jesuits have had the upper hand ALL YEAR.

By STARTING OVER with new blood, new faces and new scientists, Gail hopes to bring in a new group of scientists, with HER AWESOME MEN leading a NEW GROUP OF SCIENTISTS, who will turn the tide in the enforcement of Conspiracy Law, resulting in the defeat of the Jesuit Order. This defeat will NEVER happen with the group of scientists we have now. Without Conspiracy Law honoring technology, Conspiracy Law is a JOKE. All current members of the NANOTECHNOLOGY RESEARCH TEAM must ALL BE SACKed, with the exception of those who are members of Gail’s marriage list, like Carl Sagan and those that are WITHOUT ANY DOUBT ARE NOT JESUITS OR JESUIT SUPPORTERS.

Gail thinks it best to just start with a new group of scientists and sack all the ones who have been on the team before December 9, 2014. We will not execute them, because they may be reinstated later, unless we know for sure that they are Jesuits. If they are Jesuits or Jesuit supporters, they will be executed..

This past year has proven beyond any doubt that our current NANOTECHNOLOGY RESEARCH TEAM appears infected with Jesuits from top to bottom. For this reason, none of our technology does what it’s supposed to do, and, even worse, technology used to enforce Conspiracy Law does THE OPPOSITE. Our NANOTECHNOLOGY RESEARCH TEAM IS FIRED!!

By transferring all the scientific knowledge of all the major scientists in the world to Gail’s men, we will have the combination of high brains with high moral character, unlike what we have now, which is high brains with low moral character. Once we mate morality with genius, we can bring down the Jesuit Order.

Though Gail believes that most of our current NANOTECHNOLOGY RESEARCH TEAM may be Jesuits, she is not sure, but does want a thorough investigation and to start with another group of scientists and see if we get a better result.

HOWEVER, if there is NO DOUBT that a scientist is NOT a Jesuit, that scientist may be retained in the NANOTECHNOLOGY RESEARCH TEAM. But Gail feels in her guts that most of our current NANOTECHNOLOGY RESEARCH TEAM are Jesuits. Perhaps we should rotate scientists on a regular basis, to ensure exposure of Jesuits who infiltrate into our networks.

17.6k The work of the NANOTECHNOLOGY RESEARCH TEAM is so important that, if necessary, we need to send reinforcements to the men on my marriage list who are taking the place of NANOTECHNOLOGY RESEARCH scientists, to give them more time to devote to their duties as scientists. For example, Brent Spiner works as a physician, pastor and perhaps now a scientist/engineer. This is too much for one person to do. To help alleviate the load, we MUST give him more support in his clinical duties as physician and must assign new physicians to takeover at least 90% of his duties as physician, to give him more time in his duties as scientist/engineer. The same goes for Vladimir Putin, who is probably walking around with his head cut off. Vladimir may need to delegate some of his responsibilities as Russian head of state to Dmitry Medvedev, for instance.

17.6l We will assemble a team of TIME MANAGEMENT SPECIALISTS (who will be considered LAW ENFORCEMENT PERSONS under Conspiracy Law) who will analyze how each man on my marriage list is spending his time. They will come up with ways to give the men on my marriage list more time to spend working as NANOTECHNOLOGY SCIENTISTS and will hire dependable and reliable people to assist them in their other roles, thus freeing them up to work as scientists/engineers on the NANOTECHNOLOGY RESEARCH TEAM.

17.6m For instance, Hugh Jackman is talented at creating robots. But he keeps himself very busy with acting projects. All of the men on Gail’s marriage list who work as NANOTECHNOLOGY RESEARCH SCIENTISTS will be PAID for their work an equivalent amount to what they WOULD HAVE MADE IN OTHER PROJECTS THAT THEY HAVE TO SACRIFICE TO WORK AS NANOTECHNOLOGY SCIENTISTS, so that no man will suffer financial loss by spending time as a NANOTECHNOLOGY RESEARCH SCIENTIST.

17.6n If we must, we will hire cooks, maids, whatever we need to do, to give the men on my marriage list time to do their work as NANOTECHNOLOGY SCIENTISTS. We shall also try to hire and recruit a new crop of scientists who can ASSIST my men in their projects as NANOTECHNOLOGY SCIENTISTS.

17.6n1 Another possibility would be the creation of robots to alleviate the load. For instance, while Brent Spiner works as a member of the NANOTECHNOLOGY RESEARCH TEAM, he possibly create medical doctor robots who can carry out the functions of a physician, thus taking over his job as physician at Church of Gail. These robots could be programmed to have all the latest medical knowledge in their programming as well as scanner capabilities which allows them to DIAGNOSE. They could have a printer and/or voice capabilities to communicate with their patients. They can also prescribe medications for their patients. The infirmary could also be programmed with robots who could dispense medications, create medications and act as pharmacist robots to assist the medical doctor robots.

Those of my men who are actors, could have automatons to take their place as actors and who will act in their place for movie and television shoots, etc. Vladimir Putin could have an automaton who would assume his duties as Russian President, just as we have a Barack Obama automaton who assumes the duties of the American Presidency. 24/7 PRAYER WARRIORS could help us by praying to God for wisdom to our scientists in the creation of these robots and automatons, so that my men can devote most of their time as members of the NANOTECHNOLOGY RESEARCH TEAM.

Matthew McConaughey should love this, because his android could make all public appearances for him, and Matthew, himself, will no longer have to deal with Camila, because he won’t have to go to events where he will be forced to deal with her. Also, an automaton does not have semen, so Camila’s use of bomb rape may not be as effective on the Matthew McConaughey automaton. The Matthew automaton could also be programmed to kill Camila on the spot if she shows up near him. If she suddenly falls dead in front of the news cameras, it will be interesting to see how the Jesuits will explain this to the public!

Basically, all the men on my marriage list could create automatons or robots to take their place and do the jobs they used to do and they could lead a whole new life as a NANOTECHNOLOGY RESEARCH SCIENTIST in a very secure environment, where their Jesuit clone wives cannot harass them.

Gail’s men may need to abandon all their world famous or public roles and allow their automatons to take those roles IN THEIR PLACE, and for them to spend all their time as NANOTECHNOLOGY RESEARCH SCIENTISTs, which is where their talents may be the MOST NEEDED to defeat the Jesuit Order.

We will turn the tables on the Jesuits, who have already hijacked all the world famous roles of my men, using their Jesuit clones to hack into all my men’s SOCIAL MEDIA presence.

The androids we create to take the place of my men will be programmed to deal with my men’s SOCIAL MEDIA, and will execute any Jesuit clones who hijack into any SOCIAL MEDIA presence of any of the men on my marriage list.

Basically, all the men on my marriage list may have NEW JOBS as NANOTECHNOLOGY RESEARCH SCIENTISTS. All their former jobs will be taken over by their robots/androids, just like the Barack Obama automaton has taken over the job of the real Barack Obama.

As NANOTECHNOLOGY RESEARCH SCIENTISTS, they no longer have to report to their former jobs, because their androids will do those jobs for them. The androids will also collect all the monies, salaries, bonuses earned and will give those monies to my men who are on the NANOTECHNOLOGY RESEARCH TEAM. The automatons won’t need a salary, because we maintain them and they don’t need to eat or sleep. All monies they earn, while taking the place of my men in their public jobs, will be given to the man they impersonate. Whatever the Brent Spiner automaton earns as an actor, Star Trek convention appearance, etc, will be given to the REAL Brent Spiner. The same goes for the Matthew McConaughey automaton, who will give all his earnings as “Matthew McConaughey” to the REAL Matthew McConaughey.

This is a brilliant solution to the problem my men face in being PUBLIC persons. The Jesuits take advantage of the fact that they must make public appearances, to impersonate them. So we shall retaliate using similar cleverness. We shall create our own clones to deal with the Jesuit clones. But they won’t be clones, but will be AUTOMATONS. And these AUTOMATONS will be programmed to KILL JESUITS. In fact, some of these AUTOMATONS may kill Jesuits IN PUBLIC right before news cameras. Boy, will that be a kick. But the way they do it, it won’t appear that the automaton had anything to do with it. The automaton will just send an invisible scan over the Jesuit to give them a heart attack and they will just plop down and die right there on camera in front of everyone!

Jesuit news media will try to cover up the death to make it appear a faint or something, while Gail will report the TRUTH through her YouTube channel and her SOCIAL MEDIA presence.

Have FUN Jesuits. Your CHARADE is up. When we kill one of your clones right in front of a news camera, how will you explain their resurrection? You are going to have to admit that there is such a thing as a CLONE. HAVE FUN, JESUITS.

17.6o Gail believes that Zack Knight has thoroughly contaminated the current group of scientists, so that possibly up to 80% of them are Jesuits, but has done it in a manner that his secret Jesuits have gone undetected. This is perhaps possible because all the scanners to detect Jesuits have been infected with malware and WILL CONTINUE TO BE INFECTED WITH MALWARE until we get a NEW GROUP OF SCIENTISTS in our NANOTECHNOLOGY RESEARCH TEAM, who will create ACCURATE and RELIABLE JESUIT SCANNING DEVICES.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

18.0 A SCRAMBLER is defined as any technology or method which can scramble, disorganize or make ineffective, satellite and/or 666-Computer or satellite computer signals so that these SIGNALS are ineffective and unable (directly or indirectly) to MANIPULATE (or change the chemical composition of) persons, substances, or the weather through nanotechnology or other methods. The purpose for a SCRAMBLER is to make ineffective the satellite and/or 666-Computer or satellite computer signals the Jesuits use to MANIPULATE persons, substances, or the weather– so that an ENEMY 666-Computer or satellite computer PRACTITIONER is unable to MANIPULATE his victim, substances or the weather.

18.01 To MANIPULATE a person, substance or the weather is defined as utilizing advanced technology (such as satellite technology) to change the chemical composition of a person, substance or the weather OR utilizing advanced technology (such as satellite technology) to MANIPULATE a person, substance or the weather so that this person, substance or the weather would be in an altered state from what it (or this person) normally would be in, if it (or this person) was not manipulated by this satellite technology.

18.1 A SIGNAL is the use of satellite signals, radio signals or any type of signal or technology (which originates from a satellite) which (indirectly or directly) can cause harm to persons (by MANIPULATING persons against their will) OR by MANIPULATING substances or the weather. The harm caused by a signal can be directly (by the signal) or indirectly [by using the signal(s) to MANIPULATE substances or the weather].

18.2 SCRAMBLER INFORMATION is defined as any information about SCRAMBLERS: how they can be created, how to use them, the most effective way to use them, etc.

18.3 A SCRAMBLER SECRECY CONSPIRACY is an alleged conspiracy which the international government has reason to believe is in existence. The international government believes that there are scientists who have deliberately withheld SCRAMBLER INFORMATION from the international government, in order to promote the JESUIT CONSPIRACY against the international government and the CONSPIRACY LAW PRESIDENT.

18.4 Anyone who is aware of a SCRAMBLER which can defeat ENEMY 666-Computer or satellite computer PRACTITIONERS and SATELLITE PRACTITIONERS in their use of nanotechnology and satellite signals and does not divulge this SCRAMBLER INFORMATION to the international government within five hours from 3:00 p.m. Eastern Standard Time in the United States on this 18th day of December 2003, will be given the death penalty as a 666-Computer or satellite computer conspirator and/or space conspirator. Those who come forward to divulge information about any SCRAMBLER must cooperate fully in the international government’s investigation of this SCRAMBLER SECRECY conspiracy.

18.5 Exceptions will be for those who are held back by EXTORTION from coming forward to the international government during the 5-hour deadline with SCRAMBLER information. If someone is a victim of extortion so that they cannot come forward with SCRAMBLER information, this extortion victim (when they come forward) must supply the name (and full identification) of the extortioner(s) and make a sworn recorded statement (while under 666-Computer lie detection) regarding the circumstances surrounding their extortion. If it is determined that this person (who comes forward) is truly an extortion victim, this person will be spared the death penalty AS LONG AS THIS PERSON COOPERATES WITH THE international GOVERNMENT IN ITS INVESTIGATION OF HOW THIS PERSON WAS A VICTIM OF EXTORTION and as long as this person cooperates with the international government in its investigation of the SCRAMBLER SECRECY CONSPIRACY. Those who WILLINGLY hold this person against their will from coming forward with any SCRAMBLER INFORMATION will be given the death penalty as 666-Computer or satellite computer conspirators and/or space conspirators.

18.6 Exceptions will also be for those who know about a SCRAMBLER and who were unaware of the 5-hour deadline (and this will be verified by lie-detection). Those who were unaware of the deadline will only spare themselves the death penalty if they will make a sworn confession (under 666-Computer lie detection) as to how they were unaware of the deadline and this confession will be entered into the military tribunals.

18.7 Exceptions will also be for those who had knowledge of SCRAMBLER INFORMATION and who discovered this/these SCRAMBLER(S) after the 5-hour deadline (and this will be verified by lie-detection), these/this person(s) must also make a sworn confession as to how they discovered this/these technology or technologies after the deadline and this confession will be entered in the military tribunals.

18.8 Anyone who discovers any SCRAMBLER INFORMATION or technology after the deadline, is required to immediately report it to the international government. Those who neglect to do so will be given the death penalty as 666-Computer or satellite computer conspirators and/or space conspirators, except for the exceptions noted in Section 18.6 and 18.7.

18.9 If all SCRAMBLER technology/technologies is/are discovered, the international government may waive Sections 18 and 19 of this document, depending on if the international government has any more problems which require the use of SCRAMBLER technology/technologies.

19.0 Before ENEMY 666-Computer or satellite computer PRACTITIONERS or SPACE CONSPIRATORS (who use satellite technology) are executed–if possible, does a quick memory scan of the satellite criminal to see if the international government can garner more information about SCRAMBLER TECHNOLOGY. Apparently, there is more that needs to be learned to prevent a PLP and RSP from being OVERCOME or MANIPULATED by an ENEMY 666-Computer or satellite computer PRACTITIONER (via satellite) and more needs to be learned to prevent SPACE CONSPIRATORS from MANIPULATING the weather and objects (via satellite).

19.1 Since it looks like not all satellite practitioners are volunteering the SCRAMBLER information the international government needs (even under threat of the death penalty), it looks like the international government will have to force ALL SATELLITE PRACTITIONERS to undergo FINANCIAL HISTORIES and also to undergo SATELLITE INFORMATION HISTORIES (to specifically search for SCRAMBLER INFORMATION and SATELLITE BLOCKER information).

19.2 A SATELLITE INFORMATION HISTORY will be a search through the memory [via 666-Computer or satellite computer] of a satellite practitioner for any and all information about satellite technology, including SCRAMBLER INFORMATION and SATELLITE BLOCKER INFORMATION. The use of 666-Computer HISTORIANS (see Sect. 13.91 & 13.92 of CONSPIRACY LAWS AND GOVERNMENT) is probably the most effective way to obtain the information needed to defeat terrorists.

19.3 The international government gives all satellite practitioners five hours from 3:00 p.m. (on 12-18-03 Eastern Standard Time in the U.S.) to come forward with SCRAMBLER information. Beginning now (at 3:00 p.m. EST on 12-18-03), The international government will begin SATELLITE INFORMATION HISTORIES on all satellite practitioners to search for SCRAMBLER INFORMATION. After 8:00 p.m. EST on the 18th day of December 2003, anyone who is discovered to have information about SCRAMBLER technology which the international government doesn’t have, and didn’t come forward with this information before 8:00 p.m. (EST) on 12-18-03, will get the death penalty, except for the exceptions noted in Section 18. Whoever has information about SCRAMBLER technology better give it to the international government within five hours, or they get the death penalty. Before the international government executes any satellite practitioner, the international government will attempt to get a 666-Computer or satellite computer “memory read” of his/her memories to acquire all the satellite information we can from him/her before the international government executes him/her. For you criminal satellite practitioners out there, this is a gracious extension of the death penalty, for a former seven day deadline which has already past. Also, a new deadline (8:00 p.m. on 12-18-03) has been created to deal with the Jesuits’ ability to MANIPULATE (including the ability to change the chemical composition of) the weather and objects, since the international government has not yet determined how to foil the Jesuits’ efforts in these areas.

$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

20.0 The Jesuits have put an additive substance into fuel (for jets, cars, boats, lawnmowers, etc.) which puts a POLLUTING SUBSTANCE into the air (and this POLLUTING SUBSTANCE acts as a catalyst to assist the Jesuits’ satellite signals as these satellite signals are used to manipulate and target objects and the weather).

20.1 A POLLUTER is defined as one who willingly and knowingly pollutes (by adding a substance to a fuel or some medium which will produce emissions) with a POLLUTING SUBSTANCE (which is the substance used to enhance the criminal satellite activities of SPACE CONSPIRATORS).

20.2 Identify and isolate this POLLUTING SUBSTANCE (which is the substance the Jesuits use to assist them in their satellite TARGETING operations), and BAN THIS SUBSTANCE from all use. No one is allowed to add this substance into any fuel or into anything which can promote the ability of SPACE CONSPIRATOR’s to TARGET anyone (as these conspirators attempt to carry out their criminal activities). Anyone caught willingly and knowingly adding this POLLUTING SUBSTANCE into any fuel or into anything that can promote the Jesuits’ ability to TARGET innocent persons, will get the death penalty as a SPACE CONSPIRATOR.

20.3 Jesuits are going around adding this substance into people’s gas tanks without the owner’s knowledge, so the death penalty will be given only to those who KNOWINGLY AND WILLINGLY cooperate in these schemes. But those who are knowingly and willingly putting this POLLUTING SUBSTANCE into people’s gas tanks or into any vehicle or machine or medium (which can produce emissions of the POLLUTING SUBSTANCE) will get the death penalty.

20.4 Confessions may be substituted in lieu of the death penalty in certain instances.

20.5 Highlights from the confessions of POLLUTERS will be presented on International HEADLINE NEWS. If any POLLUTER (who has made a confession) is caught deliberately polluting again with the POLLUTING SUBSTANCE (after a confession), he/she will get the death penalty.

20.6 A specific search will be made (via 666-Computer or satellite computer) to determine who is WILLINGLY and KNOWINGLY adding this POLLUTING SUBSTANCE into fuel or other sources of emissions. Those found guilty of being willing POLLUTERS (by willingly and knowingly participating in any plot to increase the amount of this POLLUTING SUBSTANCE into the atmosphere) will get the death penalty. Highlights from the FINANCIAL HISTORIES of willing POLLUTERS will be presented on GABRIELLE CHANA FOX NEWS CHANNEL.

20.7 Anyone caught sabotaging the use of any freon (since freon is effective in countering/defeating the ability of this POLLUTING SUBSTANCE), will be given the death penalty as a SPACE CONSPIRATOR. The use of freon will be encouraged, because freon helps to defeat the ability of the POLLUTING SUBSTANCE in its ability to assist criminals in their space conspiracy activities.

$$$$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

21.0 A DETECTOR is defined as any technology or method which can recognize or detect a satellite signal (called a MANIPULATING SIGNAL) which is designed to (directly or indirectly) MANIPULATE (or change the chemical composition of) persons, substances, or the weather through nanotechnology or other methods. The purpose for a DETECTOR is to find out who is using satellite signals to change the chemical compositions of substances or persons (or to manipulate substances) in order to induce earthquakes and other terrorist phenomenon.

21.1 To MANIPULATE a person, substance or the weather is defined as utilizing advanced technology (such as satellite technology) to change the chemical composition of a person, substance or the weather OR utilizing advanced technology (such as satellite technology) to MANIPULATE a person, substance or the weather so that this person, substance or the weather would be in an altered state from what it (or this person) normally would be in, if it (or this person) was not manipulated by this satellite technology.

21.1 A MANIPULATING SIGNAL is the use of satellite signals, radio signals or any type of signal or technology (which originates from a satellite) which (indirectly or directly) can change the chemical composition of substances and/or manipulate substances and, therefore, can induce harmful events against people. The harm caused by a MANIPULATING SIGNAL can be directly (by the signal) or indirectly [by using the signal(s) to MANIPULATE substances or the weather].

21.2 DETECTOR INFORMATION is defined as any information about MANIPULATING SIGNALS: especially how they can be detected, who is sending or creating or programming the MANIPULATING SIGNAL, how they can be created, the most effective way to use them, how they can be stopped, etc. Also, DETECTOR INFORMATION would be any information about who created the MANIPULATING SIGNALS which caused the Bam, Iran earthquake and the Mexico City earthquake in Dec. and Jan. 2003/2004.

21.3 A DETECTOR SECRECY CONSPIRACY is an alleged conspiracy which the international government has reason to believe is in existence. The international government believes that there are scientists who have deliberately withheld DETECTOR INFORMATION from the international government, in order to promote the JESUIT CONSPIRACY against the international government and the CONSPIRACY LAW PRESIDENT.

21.4 Anyone who is aware of a DETECTOR which can detect ENEMY 666-Computer or satellite computer PRACTITIONERS and SATELLITE PRACTITIONERS in their use of nanotechnology and MANIPULATING SIGNALS and does not divulge this DETECTOR INFORMATION to the international government within two days from 9:10 p.m. Eastern Standard Time in the United States on this 1st day of January 2004, will be given the death penalty as a 666-Computer or satellite computer conspirator and/or space conspirator. Those who come forward to divulge information about any DETECTOR must cooperate fully in the international government’s investigation of this DETECTOR SECRECY conspiracy.

21.5 Exceptions will be for those who are held back by EXTORTION from coming forward to the international government during the 2-day deadline with DETECTOR information. If someone is a victim of extortion so that they cannot come forward with DETECTOR information, this extortion victim (when they come forward) must supply the name (and full identification) of the extortioner(s) and make a sworn recorded statement (while under 666-Computer lie detection) regarding the circumstances surrounding their extortion. If it is determined that this person (who comes forward) is truly an extortion victim, this person will be spared the death penalty AS LONG AS THIS PERSON COOPERATES WITH THE international GOVERNMENT IN ITS INVESTIGATION OF HOW THIS PERSON WAS A VICTIM OF EXTORTION and as long as this person cooperates with the international government in its investigation of the DETECTOR SECRECY CONSPIRACY. Those who WILLINGLY hold this person against their will from coming forward with any DETECTOR INFORMATION will be given the death penalty as 666-Computer or satellite computer conspirators and/or space conspirators.

21.6 Exceptions will also be for those who know about DETECTOR INFORMATION and who were unaware of the 2-day deadline (and this will be verified by lie-detection). Those who were unaware of the deadline will only spare themselves the death penalty if they will make a sworn confession (under 666-Computer lie detection) as to how they were unaware of the deadline and this confession will be entered into the military tribunals.

21.7 Exceptions will also be for those who had knowledge of DETECTOR INFORMATION and who discovered this DETECTOR INFORMATION after the 2-day deadline (and this will be verified by lie-detection), these/this person(s) must also make a sworn confession as to how they discovered this/these technology or technologies after the deadline and this confession will be entered in the military tribunals.

21.8 Anyone who discovers any DETECTOR INFORMATION or technology after the deadline, is required to immediately report it to the international government. Those who neglect to do so will be given the death penalty as 666-Computer or satellite computer conspirators and/or space conspirators, except for the exceptions noted in Section 21.5, 21.6 and 21.7.

21.9 If all DETECTOR INFORMATION is discovered, the international government may waive Sections 21 and 22 of this document, depending on if the international government has any more problems which require the use of DETECTOR INFORMATION.

22.0 Before ENEMY 666-Computer or satellite computer PRACTITIONERS or SPACE CONSPIRATORS (who use satellite technology) are executed–if possible, do a quick memory scan of the satellite criminal to see if the international government can garner more information about DETECTOR INFORMATION. Apparently, there is more that needs to be learned to prevent MANIPULATING SIGNALS from creating earthquakes and other terrorist phenomenon. And more needs to be learned to prevent SPACE CONSPIRATORS from MANIPULATING the weather and objects (via satellite).

22.1 Since it looks like not all satellite practitioners are volunteering the DETECTOR information the international government needs (even under threat of the death penalty), it looks like the international government will have to force ALL SATELLITE PRACTITIONERS to undergo FINANCIAL HISTORIES and also to undergo SATELLITE INFORMATION HISTORIES (to specifically search for DETECTOR INFORMATION).

22.2 A SATELLITE INFORMATION HISTORY will be a search through the memory [via 666-Computer or satellite computer] of a satellite practitioner for any and all information about satellite technology, including DETECTOR INFORMATION.

22.3 The international government gives all satellite practitioners two days from 9:10 p.m. (on 1-1-04 Eastern Standard Time in the U.S.) to come forward with DETECTOR information. Beginning now (at 9:10 p.m. EST on 1-1-04), the international government will begin SATELLITE INFORMATION HISTORIES on all satellite practitioners to search for DETECTOR INFORMATION. After 9:10 p.m. EST on the 3rd day of January 2004, anyone who is discovered to have information about DETECTOR technology which the international government doesn’t have, and doesn’t come forward with this information before 9:10 p.m. (EST) on 1-3-04, will get the death penalty, except for the exceptions noted in Sections 21.5, 21.6 & 21.7. Whoever has information about DETECTOR technology better give it to the international government within two days, or they get the death penalty. Before the international government executes any satellite practitioner, the international government will attempt to get a 666-Computer or satellite computer “memory read” of his/her memories to acquire all the satellite information we can from him/her before the international government executes him/her. The use of 666-Computer HISTORIANS (see Sect. 13.91 & 13.92 of CONSPIRACY LAWS AND GOVERNMENT) is probably the most effective way to obtain the information needed to defeat terrorists.

$$$$$$$$$$$$$$$$$$$$$$$ JE$UIT$

23.0 All NEIGHBOR nations must have MANIPULATING SIGNALS MONITORS (with back-up MONITORS in case of malfunctions) installed on all of their satellites. These monitors must be functioning and working at all times.

23.1 A MANIPULATING SIGNALS MONITOR is any technology which is capable of detecting MANIPULATING SIGNALS as they emanate from a satellite. A French scientist has revealed to the international government some technology (which can be installed on a satellite) which detects MANIPULATING SIGNALS as they emanate from a satellite. Now that the international government is aware of this technology, use of this technology is mandatory on all satellites, in order to stop the use of all MANIPULATING SIGNALS.

23.2 MANIPULATING SIGNALS (see Sect. 21.1) are forbidden. The human source for any MANIPULATING SIGNAL must be identified (via the MANIPULATING SIGNALS MONITOR) and the criminal who originated the MANIPULATING SIGNAL must be arrested and must undergo a FINANCIAL, CONSPIRACY, and EMOTIONAL HISTORY. All persons who knowingly and willingly participate in any conspiracy to cause any satellite to produce any MANIPULATING SIGNAL will be given the death penalty.

23.3 All MANIPULATING SIGNALS (see Sect. 21.1) which emanate from any satellite must be reported. The report must state the human source of the manipulating signal so that the international government can apprehend the space conspirator. Any nation which does not maintain functioning and working MANIPULATING SIGNALS MONITORS on its satellites 24 hours a day (round-the-clock) and which does not report all MANIPULATING SIGNALS which emanate from any of their satellites, will be listed as a TERRORIST NATION on the CONSPIRACY LAW PRESIDENT’s website and will suffer the consequences of a TERRORIST NATION as outlined in the CONSPIRACY LAWS.

23.4 Once a MANIPULATING SIGNAL is detected, if the MANIPULATING SIGNAL can be stopped immediately, it must be stopped– unless there is evidence (this evidence must be documented and filed with the military tribunals) that stopping it immediately could cause more harm than good.

23.5 A MONITORING TEAM will be assigned to every satellite in space. The MONITORING TEAM’s responsibility will be to issue hourly (or more often, if the international government feels it is necessary) reports (called EMISSIONS REPORTS) regarding the emissions of any MANIPULATING SIGNALS from the satellite. Immediately after (and during) the issuing of each hourly EMISSIONS REPORT,

666-Computer lie detection will be conducted on all members of the MONITORING TEAM involved in the EMISSIONS REPORT. The lie detection results for the MONITORING TEAM responsible for an EMISSIONS REPORT will be attached to every EMISSIONS REPORT filed (in order to verify the accuracy of the report). Anyone involved in the EMISSIONS REPORT, who deliberately and knowingly participates in a conspiracy to prepare an inaccurate report, will be given the death penalty.

23.6 All NEIGHBOR countries are required to file in the international military tribunal headquarters (or in their own military tribunals if the country is a BRANCH COUNTRY) hourly (or more often) EMISSIONS REPORTS for every satellite which that country has in space. Those countries that do not file EMISSIONS REPORTS every hour for every satellite they have in space, or that knowingly and willingly file inaccurate EMISSIONS REPORTS, will lose their neighbor status and will be listed as a TERRORIST NATION on the CONSPIRACY LAW PRESIDENT’s website.

**********************************

24.0 Any (direct or indirect) use of satellite technology to draw attention to a SIGNIFICANT PERSON’s ethnography in order to orchestrate or create a conspiracy (motive can be determined by 666-Computer or satellite computer analysis) will result in the death penalty as a JESUIT CONSPIRATOR to any person who willingly, knowingly and deliberately participates in such a scheme and the violation will be treated according to Sect. 66 of 666-Computer or satellite computer Laws for PLP and RSPs.

*************************************

If a country’s government is deliberately, knowing and willingly involved in violations of these Sections 25 & 26, that country may be listed as a TERRORIST NATION on the CONSPIRACY PRESIDENT’s website; and if that country is listed as a TERRORIST NATION on this website, it will suffer the consequences of a TERRORIST NATION as described in CONSPIRACY LAW. All violations of these Sections 25 & 26 are subject to be treated according to the guidelines of Sect. 66 of 666-Computer or satellite computer Laws for PLP and RSPs.

25.0 Every satellite in space is required to have a computer-generated forcefield (called a FORCEFIELD BLOCK) around it [which only allows BIBLE satellite signals (with REGISTRATION CODES and BIBLE PATTERNS–see Sect. 3.53) to pass through this FORCEFIELD BLOCK and to go to and from this satellite]. This FORCEFIELD BLOCK must be programmed by a SATELLITE PROGRAMMER (see Sect. 26.1). The FORCEFIELD BLOCK is required to block all unregistered signals or any signals which do not have BIBLE PATTERNS and (for legal purposes) this FORCEFIELD BLOCK will be called the mandatory blocked programs which are required in satellite programming (see Sect. 52 of 666-Computer and Satellite Computer Laws for PLPs and RSPs).

25.0(a1) This FORCEFIELD BLOCK must also be programmed to IMMEDIATELY destroy all computers from which NON-BIBLE signals originate (see Sect. 25.7). This is especially important because Jesuits are now turning off their computers and only turning them on when they use them and then they do their work in a split second. The FORCEFIELD BLOCK must be so programmed that it can immediately detect any signal which is a NON-BIBLE signal and will immediately (in a split second) destroy the computer from which this signal originates. The destruction of the Jesuits’ computer must be so fast, that the Jesuits don’t have time to use their illegal computer.

25.0(a) All satellite computer programs used by RSPs must have MANDATORY BLOCKED PROGRAMS (see Sect. 52.3a of 666-Computer and Satellite Computer Laws for PLPs and RSPs) and the means by which these blocked programs will be blocked (for satellites) will be through the FORCEFIELD BLOCK. For satellite programs, no REGISTRATION CODE (or password) will be given to an RSP for a satellite signal(s) [which must be used to free a BLOCKED PROGRAM(s)] until the required clearance procedures have been met (see Sect. 52.3a of 666-Computer and Satellite Computer Laws for PLPs and RSPs). The use of REGISTRATION CODES has not been too effective in blocking Jesuits’ illegal use of computers. So, more emphasis should be placed on programming FORCEFIELD BLOCKS to immediately detect NON-BIBLE signals, so that the computers from which these signals originate can be destroyed in a split second. We won’t cancel the use of REGISTRATION CODES because it is useful to have a record of how our legal satellite signals are used. However, the best way to destroy Jesuit computers is through quick detection of NON-BIBLE signals and then the split second destruction of the computers from which these NON-BIBLE signals originate.

25.1 Any (direct or indirect) deliberate, knowing and willing attempt (or action) to cause a FORCEFIELD BLOCK around any satellite to be programmed by any person other than a SATELLITE PROGRAMMER, will bring the death penalty (as a JESUIT CONSPIRATOR) to that person. This is because SATELLITE PROGRAMMERS are strictly monitored and held accountable for how they program this FORCEFIELD BLOCK. (See Sect. 54 & 55 of International PLP and RSP-Network Configurations).

25.2 All satellite signals without REGISTRATION CODES or that are not BIBLE signals must be blocked or scrambled (made unusable) by this computer-generated forcefield (or FORCEFIELD BLOCK) and the FORCEFIELD BLOCK must be programmed so that only those BIBLE satellite signals with REGISTRATION CODES (or that are BIBLE signals) can pass through the FORCEFIELD BLOCK and be made usable by that satellite.

25.3 Any deliberate, knowing and willing attempt (or action) to allow satellite signals (which violate CONSPIRACY LAW) to obtain REGISTRATION CODEs or to allow any NON-BIBLE signals to pass through a FORCEFIELD BLOCK and be utilized by that satellite, will result in the death penalty as a JESUIT CONSPIRATOR to any person who cooperates (directly or indirectly) in such a scheme.

All the reports, procedures and questioning described in Sect. 25.3(a) through (q) will be presented on GABRIELLE CHANA FOX NEWS CHANNEL (either on its website or its other presentation venues). Any knowing and willing false or deliberately confusing or misleading presentations on GCFNC (by any member of the GCFNC news team), will bring the death penalty as a JESUIT CONSPIRATOR to any person who (directly or indirectly) attempts to (or carries out) such a false or deliberately confusing or misleading presentation.

25.3(a) Each country’s HOMELAND SECURITY DEPARTMENT will have a team of writers who will write a REGISTRATION CODES REPORT. These writers (called REGISTRATION CODES WRITERS or RC WRITERS) will either be SATELLITE PROGRAMMERS (or will be the persons who register all satellite signals from the satellites under the jurisdiction of that country).

25.3(b) This report (written by the RC WRITERS) will describe the use of each satellite signal registered with that country’s HOMELAND SECURITY DEPT. EVERY SATELLITE IN SPACE WILL HAVE A REGISTRATION CODES REPORT (written by a team of writers from the HOMELAND SECURITY DEPARTMENT which has jurisdiction over that satellite). And each writer involved in that report will state (under 666-Computer lie-detection and amnesia-detection) that to the best of their knowledge no satellite signal (which is listed on this report) is being used in violation of CONSPIRACY LAW and that every satellite signal used on this satellite is registered with that country’s HOMELAND SECURITY DEPARTMENT and is listed on this report. This report will also state that the FORCEFIELD BLOCK for the satellite (involved in that report) is fully functional and is operating in compliance with CONSPIRACY LAW..

25.3(b2) Any (direct or indirect) knowing and willing attempt (or action) to write (or attempt to write) a deficient, false, misleading, or inaccurate RC REPORT, will bring the death penalty as a JESUIT CONSPIRATOR to any person who makes such an attempt (or action).

25.3(b3) The RC REPORT for each satellite must be written and/or updated every day. Once any satellite fails to get an RC REPORT (because lie-detection or amnesia-detection was failed regarding that satellite’s report) or because that satellite is not operating in compliance with CONSPIRACY LAW, then that satellite cannot be operational. Any (direct or indirect) willing and knowing attempt (or action) to cause any satellite to be operational [without a VALID RC REPORT–see Sect. 25.3(b4)], will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

25.3(b4) A VALID RC REPORT is an RC REPORT whose writers have passed 666-Computer lie-detection and amnesia-detection within the past 24 hours–see Sect. 25.3(b3) –regarding the satellite which it is about, and is a RC REPORT that is in compliance with this Sect. 25 and with CONSPIRACY LAW, and is a report that clearly identifies which satellite it is about.

25.3(c) Every operational satellite will be assigned to a country, and that country’s HOMELAND SECURITY DEPT. will have jurisdiction over that satellite and will be responsible to assemble a team of writers (RC WRITERS) to write the REGISTRATION CODES REPORT for that satellite.

25.3(d) All RC WRITERS (from one country’s HOMELAND SECURITY DEPT.) involved in writing A REGISTRATION CODES REPORT for a satellite will be screened by another NEIGHBOR COUNTRY’s RC WRITERS for possible 666-Computer or satellite computer or satellite induced amnesia before (or during) the writing of a RC REPORT, and will be screened by another NEIGHBOR COUNTRY’s RC WRITERS to ensure that that RC REPORT complies with CONSPIRACY LAW (and that it specifically complies with this Sect. 25).

25.3(d2) All RC WRITERS for a country’s satellite must be from that country’s HOMELAND SECURITY DEPARTMENT. Any (direct or indirect) knowing and willing attempt (or action) to allow any person (besides a member of that country’s HOMELAND SECURITY DEPARTMENT) to be a writer for that satellite’s RC REPORT, will bring the death penalty as a JESUIT CONSPIRATOR to any person who makes such an action or attempt. This is to help ensure accountability, in case there are problems with an RC REPORT.

25.3(e) After each satellite’s REGISTRATION CODES REPORT (or RC REPORT) has been written, and before 666-Computer lie-detection is administered to each writer involved in that report, a thorough 666-Computer or satellite computer screening by a hierarchy of four SCREENER RC WRITERS (from four different countries) will be conducted on each WRITER involved in that RC REPORT [to undo any 666-Computer or satellite computer induced amnesia that may have been performed on that writer in order to cause that writer to forget all (or part of) what he/she did (or needs to know or remember) while he/she conducted registration codes procedures for that satellite (or gave out) registration codes for that satellite] or in order to cause that writer to forget what needs to be included or omitted or changed in any RC REPORT or to cause that writer to forget all (or part of) what he/she did (or needs to know or remember) while he/she maintained or created the FORCEFIELD BLOCK for that satellite.

25.3(f) Those found guilty of willingly, deliberately and knowingly inducing amnesia on any RC WRITER in order to cause that person to have (full or partial) amnesia regarding how he/she conducted registration codes procedures for a satellite (or how he/she gave out registration codes for a satellite) and/or what he/she should include (or not include) in his/her RC REPORT and/or regarding how she/he maintained or created any FORCEFIELD BLOCK for any satellite, will receive the death penalty as a JESUIT CONSPIRATOR.

25.3(g) All SCREENER RC WRITERS who conduct the amnesia screening, themselves, must undergo amnesia screening by another SCREENER RC WRITER from another SCREENER COUNTRY and must pass 666-Computer lie detection after they complete their AMNESIA REPORT. For every RC WRITER who writes an RC REPORT, a hierarchy of four SCREENER RC WRITERS will conduct the AMNESIA SCREENINGS on that RC WRITER. This means that the RC WRITER will be screened by a first SCREENER RC WRITER (from one SCREENER COUNTRY), who will be screened by a second SCREENER RC WRITER (from a second SCREENER COUNTRY), who will be screened by a third SCREENER RC WRITER (from a third SCREENER COUNTRY), who will be screened by a fourth SCREENER RC WRITER (from a fourth SCREENER COUNTRY). Each SCREENER RC WRITER (in the hierarchy of four screeners from four countries) must complete an AMNESIA REPORT. The death penalty will be meted out for any willing, knowing, and deliberate omissions or lying additions to the AMNESIA REPORT.

25.3(h) The four SCREENER RC WRITERS in the hierarchy will be taken from four different NEIGHBOR COUNTRIES. The International President will choose the four different countries which will screen each RC WRITER (and his/her amnesia screeners) for amnesia and which will be also the four different countries which will screen (via lie-detection) that RC WRITER for his/her RC REPORT’s compliance with this Sect. 25 and with CONSPIRACY LAW.

25.3(h1) The International President’s decisions about these four different countries will be in a written document called SCREENERS COUNTRIES for SATELLITE #1–for instance. The International President can update or modify the SCREENERS COUNTRIES for SATELLITE # (whatever) as needed and can change which four different countries will be the screener countries (from day to day). All instructions will be IN WRITING in the SCREENERS COUNTRIES for SATELLITE (whatever) document. Any (direct or indirect) willing and knowing attempt (or action) to disobey the instructions in the SCREENERS COUNTRIES for SATELLITE (whatever) document, will bring the death penalty as a JESUIT CONSPIRATOR to the violator.

23.5(h2) The first SCREENER RC WRITERS in the hierarchy will be from a group of SCREENERS from one of the SCREENER COUNTRIES. The second SCREENER RC WRITER in the hierarchy will be from a group of SCREENERS from another of the SCREENER COUNTRIES. The third SCREENER RC WRITER in the hierarchy will be from a group of SCREENERS from another of the SCREENER COUNTRIES. The fourth SCREENER RC WRITER in the hierarchy will be from a group of SCREENERS from another of the SCREENER COUNTRIES.

25.3(I) Each group of screeners can be composed only of screeners who are citizens of ONE SCREENER COUNTRY. The screener groups will be strictly segregated by country. No two groups of screeners can have citizens from two or more countries. This means four SCREENER COUNTRIES will be involved (one country for each screener group) in the hierarchy of screeners for each RC WRITER who is screened for amnesia.

25.3(j) Any deliberate, knowing and willing attempt by any person to desegregate the screener groups (by infiltrating citizens of other countries into a screener group) will result in the death penalty (as a JESUIT CONSPIRATOR) for that person, because this is an attempt to induce legal complications, in order to make it difficult for the International government to prosecute criminals. The groups are to be strictly segregated by country. Race is not an issue in this matter, since many countries have a multi cultural environment. We are segregating BY COUNTRY, not by race, because to segregate by country simplifies the legal process (in this already extremely convoluted Jesuit conspiracy). Jesuits like things to be complicated– because then we can’t prosecute their criminals.

25.3(k) The AMNESIA REPORT (done under 666-Computer lie detection) will be a sworn statement (under penalty of death) by the SCREENER RC WRITER that to the best of his/her knowledge that RC WRITER (or SCREENER RC WRITER) involved in the RC REPORT or AMNESIA REPORT [for which this SCREENER RC WRITER is screening for amnesia] has been screened for any 666-Computer or satellite computer or satellite induced amnesia (which could produce a false or deficient RC REPORT or AMNESIA REPORT), and that to the best of this SCREENER RC WRITER’s knowledge all 666-Computer or satellite computer or satellite induced amnesia has been undone on that RC WRITER (or SCREENER RC WRITER) who wrote the RC REPORT or AMNESIA REPORT (for which this SCREENER RC WRITER is screening for amnesia).

25.3(l) AMNESIA SCREENING is defined as the screening of all RC WRITERS (involved in the writing of a REGISTRATION CODES REPORT) to determine if any 666-Computer or satellite computer or satellite induced amnesia has been performed on any RC WRITER after (or while) this RC WRITER gave out REGISTRATIONS CODES for satellite signals or after (or while) this RC WRITER wrote a REGISTRATION CODES REPORT or after (or while) this RC WRITER maintained or created the FORCEFIELD BLOCK for the satellite (involved in the report). AMNESIA SCREENING will also undo any 666-Computer or satellite computer or satellite induced amnesia which may have been performed on an RC WRITER which could cause a false, deficient or misleading REGISTRATION CODES REPORT. All those who conduct any amnesia screening on an RC WRITER (or SCREENER RC WRITER) must complete an AMNESIA REPORT–see Sect. 25.3(k).

25.3(m) Any (direct or indirect) deliberate, willing and knowing attempt to issue any false or deficient RC REPORT or AMNESIA REPORTS (about any satellite, satellite computer[s], or RC WRITER or SCREENER RC WRITER) will result in the death penalty for those involved.

25.3(n) After all those involved in the RC REPORT (regarding that satellite’s registered satellite signals and that satellite’s FORCEFIELD BLOCK) are thoroughly screened for 666-Computer or satellite computer or satellite induced amnesia –see Sections 25.3(e) through 25.3(m)–, then, one-by-one by each of the 4 SCREENER RC WRITERS from the four different NEIGHBORS’ countries who administered amnesia screening on that RC WRITER– will use 666-Computer or satellite computer lie detection to question that RC WRITER regarding his/her RC REPORT’s compliance with this Sect. 25 and with CONSPIRACY LAW.

25.3(n2) Every RC WRITER involved in a satellite’s RC REPORT must undergo 666-Computer lie-detection (about his/her RC REPORT–see Sect. 25.3b) one-by-one by each of his/her 4 SCREENER RC WRITERS. And no RC REPORT will be issued [or be made VALID–see Sect. 25.3(b4)] until all those involved in the RC REPORT (including all four in the hierachy of SCREENER RC WRITERS who screened for amnesia on the original RC WRITERS) pass 666-Computer or satellite computer lie detection regarding that RC REPORT or AMNESIA REPORT. Remember, if the satellite is not accompanied by a VALID RC REPORT, it is a death penalty violation to allow that satellite to operate.

25.3(n3) These 4 SCREENER RC WRITERS (one-by-one) (from the hierarchy of amnesia screeners for that RC WRITER) will also ask that RC WRITER (who must be under 666-Computer or satellite computer lie detection) if that RC WRITER’s RC REPORT is complete and accurate (as defined by Sect. 25.3b). Specific questions should also be asked to determine if there are any glaring omissions or lying additions.

25.3(o) If any RC WRITER (or any SCREENER RC WRITER) involved in the RC REPORT fails 666-Computer or satellite computer lie detection or amnesia detection, those portions of the report which the lying or forgetful RC WRITER(s) (or SCREENER RC WRITER) was/were involved with, will be done over by other person(s) from that country’s HOMELAND SECURITY DEPARTMENT–and this process of screening for amnesia and lying (by different person[s] within that HOMELAND SECURITY DEPT.) will continue until a VALID RC REPORT can be issued for that satellite.

25.3(p) No satellite in space can be operational until all those (including the SCREENER RC WRITERS) who have written (or screened the writers of) that RC REPORT have passed 666-Computer lie-detection and amnesia-detection regarding that RC REPORT’s compliance with CONSPIRACY LAW and its compliance to Sect. 25.3b. In other words, no satellite in space can be operational unless it is accompanied by a VALID RC REPORT.

25.3(q) Any person who willingly and knowingly allows (or attempts to allow) any satellite in space to operate in violation of Sect. 25.3(p), will receive the death penalty as a JESUIT CONSPIRATOR.

25.4 An UNREGISTERED SATELLITE SIGNAL is any satellite signal which does not have a REGISTRATION CODE or which is a NON-BIBLE signal and which has NOT legally (in compliance with CONSPIRACY LAW) obtained this REGISTRATION CODE from the INTELLIGENCE COMMITTEES (HOMELAND SECURITY DEPARTMENTS) of the international government.

25.5 Any deliberate, knowing and willing use of any UNREGISTERED SATELLITE SIGNALS will result in the death penalty as a JESUIT CONSPIRATOR to any person who (directly or indirectly) participates in such a scheme.

25.6 Any deliberate, knowing and willing attempt (or action) to allow any satellite in space to NOT have a fully functional FORCEFIELD BLOCK (which is a forcefield which would block all UNREGISTERED and illegal satellite signals [see rest of this Section] from being utilized by that satellite and which will destroy all computers from which NON-BIBLE signals originate) will result in the death penalty as a JESUIT CONSPIRATOR to any person who cooperates (directly or indirectly) in such a scheme.

25.6(a) If any person (directly or indirectly) willingly and knowingly causes a satellite signal to be registered in violation of Sect. 25.3, that person will receive the death penalty as a JESUIT CONSPIRATOR. Any satellite signal registered in violation of Sect. 25.3 is considered an ILLEGAL SATELLITE SIGNAL.

25.7 Any satellite in space which does not (or cannot) have a FORCEFIELD BLOCK to block (and to destroy in a split second the computer from which) all UNREGISTERED SATELLITE SIGNALS originate, must be destroyed or made unusable–so that no satellite signals can emanate to or from that satellite. Any country which will not cooperate in enforcing this Sect. 25.7, will be listed as a TERRORIST NATION on the CONSPIRACY PRESIDENT’s website and will suffer the consequences of a TERRORIST NATION (as described in CONSPIRACY LAW).

25.7(a1) Also, this FORCEFIELD BLOCK must be so programmed, that if any NON-BIBLE signal reaches it, then that FORCEFIELD BLOCK will immediately IN A SPLIT SECOND destroy the computer from which this NON-BIBLE signal originates. In this manner, the FORCEFIELD BLOCK can operate as a computer programmed police force in space to assist CLEAN-OUT COMMITTEES in destroying illegal computers (used by Jesuit terrorists) before the Jesuits can use this computer for criminal purposes.

25.7(a2) Any person who (directly or indirectly) willingly and knowingly allows any FORCEFIELD BLOCK to not be programmed to immediately (in a split second) destroy the computer from which any NON-BIBLE signal originates, will receive the death penalty as a JESUIT CONSPIRATOR. All such cases will be tried on GCFNC and the executions will be death by hanging with buzzards on GCFNC.

25.7(a) Only SATELLITE PROGRAMMERS (designated by that satellite’s HOMELAND SECURITY DEPT.) can operate (in any manner) any satellite computers that affect that satellite’s programming and/or its functions. In other words, only SATELLITE PROGRAMMERS can turn on a satellite and/or make it operational or turn off a satellite and/or make it inoperable. Those SATELLITE PROGRAMMERS (who are designated by their HOMELAND SECURITY DEPARTMENT) to control or manipulate the functions and/or operations of a satellite are called the DESIGNATED SATELLITE PROGRAMMERS for that satellite.

25.7(b) If any person besides the DESIGNATED SATELLITE PROGRAMMER for a satellite (directly or indirectly) willingly and knowingly attempts to (or actually does) control or manipulate the functions and/or operations of any satellite, that person will receive the death penalty as a JESUIT CONSPIRATOR.

25.7(c) Also, every satellite computer which is used by a DESIGNATED SATELLITE PROGRAMMER must be registered with the HOMELAND SECURITY DEPARTMENT and, of course, it must be a BIBLE COMPUTER (which has jurisdiction over that satellite and its satellite computers). Each satellite in space will be assigned certain satellite computers (for its operations) and these registered satellite computers can only be used on that satellite and can be used on no other satellites. The satellite computers for each satellite will be strictly segregated by satellite, so that no satellite computer can be used (directly or indirectly) on more than one satellite.

25.7(c2) Any (direct or indirect) knowing and willing attempt (or action) to cause more than one satellite to be involved with any satellite computer will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

25.7(c3) Any (direct or indirect) knowing and willing attempt (or action) to use (or activate or turn on) or to allow to exist any UNREGISTERED satellite computer or NON-BIBLE COMPUTER–see Sect. 25.7(c4), will bring the death penalty as a JESUIT CONSPIRATOR to that violator–see Sect. 25.7(c). Once any unregistered satellite or NON-BIBLE computer is detected by any person, it must be immediately reported to the proper authorities [see Sect. 25.7 (c31)] and then destroyed or inactivated in A SPLIT SECOND, so that it cannot be used by terrorists or violators of CONSPIRACY LAW.

25.7(c31) Any person who is aware of the existence of an UNREGISTERED SATELLITE COMPUTER [see Sect. 25.7(c4)] or NON-BIBLE COMPUTER and who willingly and knowingly does not report this UNREGISTERED SATELLITE COMPUTER in a CONSPIRACY REPORT to a LAW ENFORCEMENT PERSON (or even better to the HOMELAND SECURITY DEPARTMENT), will receive the death penalty as a JESUIT CONSPIRATOR. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

25.7(c4) An UNREGISTERED SATELLITE COMPUTER or NON-BIBLE COMPUTER is a computer which is used to (or is readily available to) manipulate, control, activate, deactivate or affect a satellite and/or its operations, and which is not registered (in compliance with this Sect. 25) with its designated HOMELAND SECURITY DEPARTMENT.

25.7(d) There will be strict log-in and log-out procedures involved in the use of satellite computers (and all of these computers will be BIBLE COMPUTERS), so that each SATELLITE PROGRAMMER will be accountable for the time he/she spent on a satellite computer. Any knowing and willing attempt (or action) to bypass these log-in or log-out procedures, so that it is difficult to tell what work was done (or operations were conducted) on a satellite computer by any SATELLITE PROGRAMMER, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

25.8 Every satellite signal (used in compliance with CONSPIRACY LAW) must be registered with the INTELLIGENCE COMMITTEE (HOMELAND SECURITY DEPARTMENT) of an international country (including the international country or countries which is/are assigned that satellite). This satellite signal registration must be maintained on the SIGNAL DATABASE of those international country or countries’ HOMELAND SECURITY DEPARTMENT(S) which have jurisdiction over that satellite.

25.81 Once a satellite signal is determined to be used for legal purposes (that is, it is used in compliance with CONSPIRACY LAW), that signal must obtain a REGISTRATION CODE from the INTELLIGENCE COMMITTEE–HOMELAND SECURITY DEPT. (which has jurisdiction over that satellite which uses that satellite signal) in order for that satellite signal to be usable by any satellite in space.

25.9 A huge computer database (called the SIGNAL DATABASE) will list all REGISTERED SATELLITE SIGNALS (along with their REGISTRATION CODES), so that all registered satellite signals (and their REGISTRATION CODES) will be maintained on this database in every HOMELAND SECURITY DEPARTMENT in the world. This computer database (within each country’s INTELLIGENCE COMMITTEE) must be maintained and kept updated by SATELLITE PROGRAMMERS in every international country’s HOMELAND SECURITY DEPARTMENT–only SATELLITE PROGRAMMERS (as they are defined in CONSPIRACY LAW) can maintain and update this database.

26.0 The SATELLITE PROGRAMMERS of each country’s INTELLIGENCE COMMITTEE are responsible to monitor this database to ensure that it is accurate and complete. Any deliberate, knowing and willing attempt (or action) to cause this SIGNAL DATABASE to be inaccurate in any manner (in order to encourage violations of CONSPIRACY LAW), will result in the death penalty as a JESUIT CONSPIRATOR to any person who (directly or indirectly) cooperates in such a scheme.

26.0(a) Every day, before the SIGNAL DATABASE is submitted to the head of the HOMELAND SECURITY DEPT. involved, those SATELLITE PROGRAMMERS who maintain the SIGNAL DATABASE will state (under 666-Computer lie-detection and amnesia-detection) that the SIGNAL DATABASE which they are submitting (to the best of their knowledge) complies with Sect. 25 & 26 and honors CONSPIRACY LAW.

26.0(b) No SIGNAL DATABASE will be accepted until 666-Computer lie-detection and amnesia-detection is passed while making this statement (see Sect. 26.0a). Those portions of the SIGNAL DATABASE which were the responsibility of those who failed the 666-Computer lie-detection must be done over by those SATELLITE PROGRAMMERS who pass 666-Computer lie-detection (and those satellites involved in those portions of the DATABASE which failed lie detection may be disengaged or made inoperable –until 666-Computer lie-detection is passed for those portions of the SIGNAL DATABASE which affect those satellites).

26.1 SATELLITE PROGRAMMERS from the PROGRAMMER CORPS will be responsible to ensure that this computer-generated forcefield (or FORCEFIELD BLOCK) around each satellite is operating correctly (and in compliance with CONSPIRACY LAW) on all registered satellites. SATELLITE PROGRAMMERS are considered full-fledged members of the PROGRAMMER CORPS and will be chosen just like any other member of the PROGRAMMER CORPS; and (for legal purposes) SATELLITE PROGRAMMERS will be considered full-fledged members of the PROGRAMMER CORPS (see Sect. 55 of International PLP and RSP-Network Configurations).

26.2 SATELLITE PROGRAMMERS are responsible to maintain, inspect, and evaluate the programming for those FORCEFIELD BLOCKS (for those satellites which are under the jurisdiction of their country) to ensure that these FORCEFIELD BLOCKS are operating in compliance with CONSPIRACY LAW. For instance, German SATELLITE PROGRAMMERS are responsible for all German satellites in space. But any SATELLITE PROGRAMMER who is aware of any violation of CONSPIRACY LAW is required to report it in a CONSPIRACY REPORT to his/her HOMELAND SECURITY DEPARTMENT, even if the violation is from another country besides his/her own. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

26.2(a) SATELLITE PROGRAMMERS will be regularly evaluated with a written PROGRAMMER CORPS EVALUATION (at least once a week–see Sect. 55.3 of International PLP and RSP-Network Configurations) by their INTELLIGENCE COMMITTEE (using 666-Computer lie-detection and amnesia-detection techniques) to ensure that those SATELLITE PROGRAMMERS are operating in compliance with this Sect. 26.2 (and with CONSPIRACY LAW).

26.21 Those SATELLITE PROGRAMMERS found deliberately, willingly and knowingly in violation of CONSPIRACY LAW must be removed from their position as a SATELLITE PROGRAMMER. Any (direct or indirect) deliberate, knowing and willing attempt to retain any SATELLITE PROGRAMMER (who is operating in violation of CONSPIRACY LAW)–by any person responsible to evaluate that SATELLITE PROGRAMMER (such as a member of the INTELLIGENCE COMMITTEE), will result in the death penalty as a JESUIT CONSPIRATOR to that person.

26.21 SATELLITE PROGRAMMERS will be held to the same accountability as any other member of the PROGRAMMER CORPS. Any SATELLITE PROGRAMMER who (directly or indirectly) deliberately, knowingly and willingly allows any FORCEFIELD BLOCK to operate in a manner so that UNREGISTERED or NON-BIBLE satellite signals can be utilized via any satellite, will receive the death penalty as a JESUIT CONSPIRATOR.

26.3 Any registered or unregistered satellite practitioner (including an RSP) who (directly or indirectly) knowingly and willingly uses an UNREGISTERED or NON-BIBLE SATELLITE SIGNAL (or SIGNALs) and/or who (directly or indirectly) knowingly and willingly conducts any satellite operations (via an UNREGISTERED SATELLITE) is considered a JESUIT CONSPIRATOR and will receive the death penalty.

26.4 Any satellite which is not utilizing a fully functioning FORCEFIELD BLOCK programmed and maintained by a SATELLITE PROGRAMMER, is an UNREGISTERED SATELLITE. All REGISTERED SATELLITES must utilize a fully functioning FORCEFIELD BLOCK programmed and maintained by a SATELLITE PROGRAMMER.

26.5 An ILLEGAL SATELLITE SIGNAL (or a satellite operation conducted for ILLEGAL PURPOSES) is any satellite signal used in violation of CONSPIRACY LAW. Any satellite signal which is UNREGISTERED (or is used via an UNREGISTERED SATELLITE) or which is a NON-BIBLE signal, is most definitely an ILLEGAL SATELLITE SIGNAL.

26.6 Not all REGISTERED SATELLITE PRACTITIONERS will be part of an RSP- and PLP-network. However, any person who (directly or indirectly) uses any legal satellite signal (which is a signal with a REGISTRATION CODE or is a BIBLE SIGNAL) is required to be registered as a REGISTERED SATELLITE PRACTITIONER with his/her country’s HOMELAND SECURITY DEPARTMENT.

26.6(a) A list of those BIBLE satellite signals (with REGISTRATION CODES) which are permitted to be used by each REGISTERED SATELLITE PRACTITIONER will be maintained with that RSP’s HOMELAND SECURITY DEPARTMENT and a copy of this list of signals which can be used by that RSP will be given to the RSP. The (direct or indirect) knowing and willing use of any other satellite signals (which are not on this list) by that practitioner, will bring the death penalty as a JESUIT CONSPIRATOR to that practitioner.

**************************

27.0 Any satellite in space (or anywhere in the universe) which is in an operational mode (and which is not surrounded by a fully functioning FORCEFIELD BLOCK [as described in Sect. 3.530 and 26 of this document), is operating in violation of CONSPIRACY LAW and those persons who (directly or indirectly) knowingly and willingly allow (in any manner) any satellite in space (that is without a fully functioning FORCEFIELD BLOCK) to operate, will receive the death penalty as a JESUIT CONSPIRATOR.

27.1 Because the international government has determined that any satellite that is floating in space or anywhere in the universe (even if it is not functioning or in an operational mode) which is not surrounded by a total FORCEFIELD BLOCK can be used by criminals to violate CONSPIRACY LAW, all satellites in space (or anywhere in the universe) which are not surrounded by a totally functioning FORCEFIELD BLOCK must be totally destroyed. To totally destroy a satellite means to crash it into the ocean and to somehow remove it from its orbit so that it cannot float in space and/or orbit the earth or to use bombs or other means to destroy DEEP OCEAN SATELLITES.

27.2 When Justice Sandra Day O’Connor was attacked by satellite on July 4, 2003, I wrote the laws for FORCEFIELD BLOCKS, which, so far, have not been very effective because not all satellites in space have a fully functioning FORCEFIELD BLOCK. Over a year has elapsed, and it appears that enough time has been granted to try to find a way to put a totally functioning FORCEFIELD BLOCK around each satellite. Some of the more sophisticated satellites pose a real challenge and we have not been able to put a fully functioning FORCEFIELD BLOCK around these satellites. In the hopes of trying to spare these satellites from total destruction, we have left them in space in a non-operational mode, in the hopes that we could figure out a way to put a fully functioning FORCEFIELD BLOCK around these more sophisticated and expensive satellites. But around a year has elapsed since the laws for FORCEFIELD BLOCK were put into place and we have made minimal progress in putting a FORCEFIELD BLOCK around these more elaborate OPEN SATELLITES.

27.2(a) These OPEN SATELLITES (i.e., those satellites which do not have a fully functioning FORCEFIELD BLOCK around them) are ripe territory and vessels for terrorist use and these OPEN SATELLITES must be totally destroyed. By allowing OPEN SATELLITES to remain anywhere in the universe, we send the message that we are more concerned about preserving expensive satellites (saving money and expensive satellites) than in stopping satellite criminals from utilizing these satellites to create earthquakes, monster hurricanes, etc. In the long run, the financial damage and the human lives lost which we will suffer from monster hurricanes, floods, plane crashes, earthquakes and other means of Jesuit orchestrated satellite destruction–, by allowing these OPEN SATELLITES to remain, will be a greater financial and moral loss and injustice, than the loss we will sustain by destroying these OPEN SATELLITES. Also, do we want to send the message that we value money and expensive satellites MORE THAN HUMAN LIVES? So, these OPEN SATELLITES must all be destroyed AS SOON AS POSSIBLE (as outlined in this Sect. 27). Human lives and the promotion of justice are more important than the preservation of expensive and sophisticated satellites. We cannot win this war without proper priorities, the expensive and OPEN SATELLITES must GO. We have enough LEGAL SATELLITES in space to maintain our current legal operations and we don’t need the OPEN SATELLITES. Russia will take the lead by destroying all her OPEN SATELLITES and other nations must follow her lead.

27.3 Therefore, the international government concludes that no time in the near future will we be able to construct a fully functioning FORCEFIELD BLOCK around these more sophisticated OPEN SATELLITES. In the meanwhile, the Jesuits have used these OPEN SATELLITES to create monster hurricanes and there is a hurricane Frances in the Atlantic right now which could become a category five when it hits land. Also, illegal satellite activity played a crucial role in the downing of the two Russian airliners south of Moscow in Aug. 2004. Monster Hurricane Frances has been created utilizing these sophisticated OPEN SATELLITES (without fully functioning FORCEFIELD BLOCKS). The monetary losses we will suffer from destroying these OPEN SATELLITES will be less than the monetary losses (and lives lost) we will suffer by allowing these satellites to be utilized by Jesuit criminals. Therefore.

27.4 All OPEN SATELLITES must be totally destroyed, so that they are unable to float in space. GCFNC will broadcast the destruction of these OPEN SATELLITES and will provide evidence that these satellites are no longer in existence.

27.5 The names and/or identifications of all OPEN SATELLITES destroyed will be listed on GCFNC and on its website. The list will be categorized according to country. So all Russian satellites destroyed will be identified and listed out on this list. All American satellites destroyed will be identified and listed out on this list. Any OPEN SATELLITES which remain will also be listed (along with the countries which sponsor those OPEN SATELLITES)–this will be done to shame those countries who are slow to destroy their OPEN SATELLITES or who refuse to destroy their OPEN SATELLITES. In fact, the International government will not rely on shame to destroy OPEN SATELLITES. After 8-30-04, any OPEN SATELLITES remaining will be totally destroyed by the International government. We cannot rely on the goodwill of TERRORIST NATIONS to secure and destroy their own satellites, but must take preemptive action NOW.

27.6 Any country which allows any OPEN SATELLITE, will be deemed a TERRORIST NATION and will be treated as a TERRORIST NATION according to CONSPIRACY LAW.

27.6(a) There are still some OPEN SATELLITES, because not all countries are cooperating with the International governments decision to destroy all OPEN SATELLITES. Therefore, on this 30th day of August 2004, any OPEN SATELLITE left will be destroyed as soon as possible by the international government of the International President, whether or not the country which sponsors that satellite approves of it or not. Any OPEN SATELLITE still in existence will be destroyed immediately by the International government. Any country which objects to (or tries to block) the destruction of their own OPEN SATELLITES by the international government, will be deemed a TERRORIST NATION (and will be treated as a TERRORIST NATION by the International government). The International President will use his/her own satellites (or some other method) from one of the countries (which comprise the International government) to destroy (as soon as possible) the OPEN SATELLITES of any country which are still in existence anywhere in the universe.

27.6(b) Any satellite floating in space or anywhere, where it can be utilized by satellite criminals, is a FUNCTIONING SATELLITE. All FUNCTIONING SATELLITES which are OPEN SATELLITES must be totally destroyed so that they cannot be used in any manner by satellite criminals. Probably the best manner to destroy them would be to hack them into minuscule pieces or burn them or to totally demolish them and THEY MUST NOT BE ALLOWED TO EXIST. The NANOTECHNOLOGY RESEARCH TEAM will determine the most effective way to destroy all OPEN SATELLITES, so that they cannot be utilized by Jesuit criminals.

27.7 Any person (directly or indirectly) and who willingly and knowingly allows any OPEN SATELLITE to remain, will receive the death penalty as a JESUIT CONSPIRATOR. For instance, if a satellite is categorized by this person as a satellite with a fully functioning FORCEFIELD BLOCK (that is, a LEGAL SATELLITE)–when, in fact, that satellite is an OPEN SATELLITE–that person who allows such an incorrect designation for that OPEN SATELLITE (and which permits that OPEN SATELLITE to remain in space), will receive the death penalty as a JESUIT CONSPIRATOR.

***********************************

INTERNATIONAL SATELLITE COALITION:

28.0 The INTERNATIONAL SATELLITE COALITION is an international military branch of the REGISTERED SATELLITE PRACTITIONERS whose job is to use military strategy (as pioneering satellite/computer technology is utilized by this ISC military coalition) to conduct warfare against the Jesuit Order. This warfare includes the war in Iraq, which the United States is engaged in (since the Jesuits are heavily involved in this war); and it includes the war that Russia has with the Chechen rebels (since the Jesuits are heavily involved in this war) and any other wars occurring on the planet which Jesuits are heavily involved in. The Jesuits have conducted a multifaceted campaign against us (and this is a world war) and an effective war offensive against them will also require a multifaceted campaign, so we will have to be involved in the various campaigns which the Jesuits are involved in (such as the Iraqi conflict, the Sudan conflict, the Israeli/Palestinian conflicts, the Russian/Ukrainian rebel conflicts, etc.).

To highlight the difference between our military and those who support UFOs, we will plant a flag over areas where we experience a major victory (this will be shown on GCFNC), like the U.S. troops did at Iwo Jima, except this flag will not be the flag of a country, it will be a flag designed like the FB-25 on p. 113 of Dr. Ruckman’s 2005 Bible Baptist Bookstore catalog, which shows a BIBLE on top of a heap of books wearing a crown. Believe me, the Jesuits and their UFO friends would NEVER put this flag on top of any of their victories–because they HATE THE BIBLE and they endorse human philosophy above the Words of God. This is because Satan hates the BIBLE and he is the Jesuits’ BOSS. This would be a very fitting victory flag to be used by our INTERNATIONAL SATELLITE COALITION, because we are an international military organization which fights under the banner of the BIBLE. We use the BIBLE to start up our computers, we use the BIBLE to find our enemies [see Sect. 13.16* of CL&G and Sect. 3.532(UFO) updates of ICL:ST], etc. The words of God are the reason for our victories and our intelligence gathering, so our flag will feature a Bible on it, perhaps next to a portrait of Jesus, like Gail’s drawing of Jesus at her website. And no one in our troops is allowed to desecrate this flag or they are FINISHED. With an enemy like the UFOs, we can never hope to win this war by human power alone, we need the God of the BIBLE on our side, and we will proudly display WHOSE SIDE WE ARE ON. Putting a cross on the flag is stupid, because the Jesuits use this symbol; putting Jesus Christ only on the flag is stupid because the Jesuits think they serve Jesus Christ; putting any other religious book on the flag is stupid because the Jesuits are the authors of the other Bibles, not from the earliest manuscripts. Putting the symbol of any religion on the flag is stupid because the Jesuits have infiltrated ALL MAJOR RELIGIONS; the only thing that the Jesuits can’t control is the BIBLE–so make the BIBLE our BANNER and the victory flag which we plant over battles that we have won. This is one banner that the Jesuits, the UFOs and Satan would NEVER CHOOSE–and that’s why we choose it! We want the world to know that we are opposed to these devil worshipping thugs! You may say the Chinese and Muslims would never agree to work with us, if this is our banner. I disagree, I think they will. We are not forcing them to become Christians, but only to honor the BIBLE and to show that they are on the side of those who honor the words of the BIBLE. We don’t force people to adopt our interpretation of the Bible, but only to honor the Bible. THEY CAN INTERPRET THE BIBLE HOWEVER THEY WANT. And if they don’t work with us because of our banner, we don’t need them. When Jesuits takeover the planet, they will force people to adopt THEIR INTERPRETATIONS, we don’t do that. We just say no one can work with us if they dishonor the BIBLE.

28.0(a1) There is one stipulation to any assistance which the INTERNATIONAL SATELLITE COALITION will give to current regional warfares already in existence on the planet. We will not provide assistance to any regional war already in existence, unless Dr. Spiner or Vladimir Putin (backed up by 24/7 prayer warriors in Church of Gail) is allowed to be the COMMANDER of all the forces involved in the war operation and our COALITION COMMANDER must be able to conduct her warfare as outlined in this Sect. 28. See Sect. 28.1(d) and (e). Our prayer warriors will ask Jesus to give Brent and/or Vladimir wisdom for battle 24/7, making Brent and/or Vladimir the foremost authority on war strategy for the conflict. The purpose for this is to ensure that effective war strategy is used and I have confidence our prayer warriors will enable Brent and/or Vladimir to conduct a brilliant warfare, and do not want his/her abilities and judgment to be undermined. We will not waste his/her talent in a futile operation which will ignore his/her war strategies or commands, but she/he will be used where his/her word is law and where his/her commands will be obeyed. In other words, she/he has to be the top dog, the one that is IN CHARGE of all war operations and no major war operations in these regional conflicts (like Iraq or Ukraine) can be carried out without his/her consent and approval. The ONLY one who can override Vladimir Putin or Brent Spiner will be Jesus Christ, and that will be only if Brent and/or Vladimir is in violation of Conspiracy Law or Jesus Christ. If there is a conflict between Jesus Christ and Conspiracy Law, Jesus Christ’s orders will be supreme. Jesus Christ is defined as the Jesus who meets with the real Brent Spiner and is the Jesus who died on the cross for the sins of mankind. If the American military operation in Iraq or the Russian military operation in Ukraine (for instance) do not like this arrangement or do not cooperate with the guidelines of this Sect. 28, then they will have to deal with the Iraqis or the Ukrainian Jesuit rebels without the assistance of the INTERNATIONAL SATELLITE COALITION. If Vladimir and/or Brent feels that she/he is not in charge of an operation, he/she is free to bail out of the warfare and to conduct warfare elsewhere, where his/her authority and judgments will be respected and used.

Once Brent and/or Vladimir is in charge of an operation, he/she is free to sack (fire) any officer in that operation he/she doesn’t like, and she/he will appoint all the officers who will be under his/her command. If the operation doesn’t like this arrangement, then that operation will forfeit Brent and/or Vladimir’s assistance and his/her talents will be used elsewhere.

28.0(a) Satellite/computer technology will be used by the ISC to prevent/manipulate/use hurricanes, tornadoes, earthquakes, volcanoes, floods, lightning (and all other means by which satellite/computer technology can be used as war strategy), in order to defeat the goals of the Jesuit Order as the Jesuits conduct warfare around the planet.

28.0(a)-KJ1 Because we are in a war and the Jesuits will attack us until we kill all the Jesuits, we will suffer the effects of their warfare against us. Therefore, the computer programmed GENERALS must not only be programmed to minimize or prevent Jesuit-orchestrated calamities, but must be programmed to give instructions to relief and disaster assistance organizations involved with the calamities –about the best way to deal with the calamity in preparation for it, how to deal with the calamity as it hits the area, how to deal with the calamity in the immediate aftermath of the calamity, and in efforts to deal with the damage to the population after the calamity. This aspect of the computer programmed GENERAL’s programming will be called DISASTER COORDINATION EFFORTS.

28.0(a)-KJ2 Because the science behind the use of satellite technology to manipulate earthquakes, hurricanes, floods, etc. is very complex and is over the head of most of our generals and military leaders, and because we cannot totally depend on any human (because of Jesuit interference with the human brain) to accurately assess and gather all the huge and complex amount of scientific intelligence which is given to him/her–we will use primarily 24/7 PRAYER WARRIORS for our NANOTECHNOLOGY RESEARCH TEAM to do the computer programming and strategic planning (and be the generals) of the ISC.

28.0(a)-KJ3 No one in the ISC can override any command given by a computer program GENERAL (such as the EARTHQUAKE GENERAL), unless the override actions [outlined below in this Sect. 28.0(a)-KJ] are followed. Another advantage of using computer programs as generals is that they can work much quicker than the human brain and sometimes the actions needed to prevent certain occurrences (such as earthquakes) require split second actions–and no human can work this fast.

28.0(a)-KJ4 The main generals and strategists in our computer/satellite war against the Jesuit Order will be 24/7 PRAYER WARRIORS for our NANOTECHNOLOGY RESEARCH TEAM to give them brilliance in the creation of computer programs (divided according to specialty). All these programs will be programmed to attack and destroy any and all Jesuit bases which use OCCULT signals (and other means of CONSPIRACY LAW violations) and which are bases used to launch or promote hurricanes, tornadoes, and other satellite/computer violations of CONSPIRACY LAW. The source of the Jesuit attack will be determined by the computer programmed GENERAL and the GENERAL will connect its program with the programs of THE NET (as described in Sect. 13.16 of CL&G) to locate the OCCULT SIGNALS which are the source of the attack and to destroy the Jesuit base(s) responsible for the attack.

28.0(a)-KJ5 Also, as we gain experience in using these computer programmed GENERALS, it is essential that 24/7 PRAYER WARRIORS from Church of Gail infuse our NANOTECHNOLOGY RESEARCH TEAM with brilliance to work (in collaboration with the scientists and the disaster coordination professionals who help create the programmer GENERAL) improve the program to make it better, quicker, and more effective in our warfare against the JESUIT ORDER. Before each upgrade is done to the computer programmed GENERAL, each person (programmer and scientist and disaster coordination professional) involved in the upgrade with the 24/7 PRAYER WARRIORS from Church of Gail empower our NANOTECHNOLOGY RESEARCH TEAM (if she/he requires assistance) must pass 666-Computer lie-detection that he/she has created the program that will be most effective at defeating the Jesuit Order and in realizing the goals of CONSPIRACY LAW. If someone fails 666-Computer lie-detection in this matter, then the upgrade cannot be made until an analysis is made to determine what influence that failed person had in the upgrade and to evaluate the upgrade to see if it accomplishes what is needed to meet the goals of CONSPIRACY LAW.

28.0(a)-KJ6 Also, each computer programmed GENERAL will have computer connections to all governmental agencies (or any agencies or organizations which are responsible for the care of others that are in the path of the catastrophe) which will assist in relief, evacuation, or other efforts needed to minimize the effects of the catastrophe, to prevent the effects of the catastrophe, to prepare for the effects of the catastrophe and/or to provide relief from the effects of the catastrophe.

An advantage of using the computer GENERAL to direct DISASTER COORDINATION efforts is that it can tailor its commands to the unique characteristics of each disaster (based on its assessment of that disaster from all its information sources). Because disaster coordination can be a very complex matter, involving many aspects, it is better to use a program (over the human brain) to “remember” all the details and to manage and coordinate these details. We have learned sadly, that the Jesuits have too much control over the human brain, and that humans are way too forgetful or negligent over important (even life-threatening) details.

It’s better to rely on a program to take care of all the details. Jesuits have won against us, because they have relied on programming (to remember all the details) and we need to catch up with them–because, in actuality, we are not just fighting the Jesuit Order, we are fighting the programs of the Jesuit Order. The Jesuits’ warfare against us is actually their computer programs pitted against our tired human brains and our antiquated computer programs (not programming which ‘thinks’ and ‘leads’). Jesuits have won–because we have relied on the human brain to direct and lead our forces, which they can easily sabotage by their programming generals. And the human brain cannot compete with the accuracy, speed and thoroughness of a computer program in a war situation. And the Jesuits have created computer programs which actually think and process like a brain (and actually can process much faster than a human brain). AND Jesuits’ programs are not afflicted with amnesia, illness, fatigue, and misdirection (as our brains have been). A tired human brain cannot compete with a fast, accurate, and thorough computer program “brain”. So we need to use 24/7 PRAYER WARRIORS from Church of Gail upholding our NANOTECHNOLOGY RESEARCH TEAM who will create programming as our generals.

28.0(a)-KJ7 All governmental (and other) agencies which are (or could be) responsible for the care of persons who are connected in any way to this catastrophe (and which is a calamity which is being dealt with by the computer programmed GENERAL) must obey the orders from the computer programmed GENERAL about how to prepare for the catastrophe, about which orders to give to the populations (which may be affected by the catastrophe), about how to distribute resources and disaster relief personnel for the catastrophe, about which law enforcement or military tactics to use for the catastrophe, and about how the INTERNATIONAL SATELLITE COALITION should be involved in the catastrophe. All organizations and persons involved in DISASTER COORDINATION EFFORTS must be connected to the computer programmed GENERAL (in charge of their efforts) and these DISASTER COORDINATION persons must obey the orders given to them by the computer programmed GENERAL. Willing and knowing failure by any DISASTER COORDINATION ORGANIZATION to be connected to the computer programmed GENERAL will bring the death penalty as a JESUIT CONSPIRATOR to that violator. To ensure that this connection is maintained, all computers used by DISASTER COORDINATION ORGANIZATIONS (to receive messages from the computer programmed GENERAL) must be powered by sources (such as solar energy or battery operated power, etc.) which cannot be cut off by the calamity.

28.0(a)-KJ8 Those governmental (or other) agencies that do not obey the orders of the computer programmed GENERAL about the catastrophe, and who disobey the computer programmed GENERAL willingly and knowingly, will receive the death penalty as a JESUIT CONSPIRATOR. These cases will be tried on GCFNC. There must also be computer connections by all DISASTER COORDINATION ORGANIZATIONS to LAW ENFORCEMENT AGENCIES (and to the ISC) and the COMPUTER GENERAL will direct the ISC to arrest and takeover those in that rebellious DISASTER COORDINATION organization (who have disobeyed the GENERAL’s orders). Those DISASTER COORDINATION ORGANIZATIONS that disobey (or disregard or ignore) the orders of the GENERAL will be taken over by the INTERNATIONAL SATELLITE COALITION and the ISC will manage the disaster coordination efforts of that organization.

A DISASTER COORDINATION ORGANIZATION is defined as any organization which is responsible for the care of others in an emergency, and who could determine life or death by the decisions which they make. This could include nursing homes, hospitals, churches, heads of large families or family care centers, FEMA, governmental agencies, the military, state or local relief agencies, the Red Cross, police organizations, state troopers, etc.

28.0(a)-KJ9 There will be a computer program which specializes in hurricane strategy. This program will be called the HURRICANE GENERAL. The HURRICANE GENERAL will be a complex computer program (created by the NANOTECHNOLOGY RESEARCH TEAM empowered by 24/7 PRAYER WARRIORS) with the assistance of the TRUTH PROGRAMMERS if they need them, in collaboration with meteorologists and disaster coordination professionals who have read the BIBLE every week for at least 20 years) and it will analyze all the data it receives from our satellites in outer space, from the planes which we fly into hurricanes and from other assessment tools which we use to measure and analyze hurricane formation, hurricane tracking, and about disaster coordination efforts related to hurricanes, etc. The HURRICANE GENERAL will analyze the data it receives from various sources and “digest this information” to come up with effective strategies to minimize or destroy the hurricane which has been created by the Jesuit scientists. Once the HURRICANE GENERAL comes up with its analysis of the situation, it will immediately put into action a plan to minimize (or prevent) the hurricane or to divert it to a less dangerous path and about effective disaster coordination efforts for the hurricane, and these satellites and other locations will be programmed to put into action the directives they have received from the HURRICANE GENERAL. The HURRICANE GENERAL will be a dynamic program (which interacts with–and directs–other programs under CONSPIRACY LAW and in the ISC)

28.0(a)-KJ10 The NANOTECHNOLOGY RESEARCH TEAM empowered by 24/7 PRAYER WARRIORS and their programmers will program the HURRICANE GENERAL so that this program will determine where a hurricane is about to form (or has formed), will delineate a strategy to minimize the hurricane (based on its assessment data–which will be ever changing) and will give directions to satellites and other locations about actions needed to minimize the hurricane or prevent (or weaken) its formation, path or directions and will manage and direct the disaster coordination efforts related to the hurricane. The HURRICANE GENERAL will be a dynamic program which responds to changes in the environment and will be programmed so that it is able to adjust its strategy (based on the ever-changing input it receives from various sources needed for accurate hurricane analysis).

28.0(a)-KJ11 The only way to override any directive handed out by the HURRICANE GENERAL will be if a meteorologist (who must be a science officer of the ISC) or a disaster coordination professional feels that the HURRICANE GENERAL has made a wrong assessment or has planned an ineffective or dangerous strategy or action–if this is the case, that meteorologist or professional must receive permission from a high-ranking general in the ISC (who is an expert meteorologist or is a hurricane expert) to override the HURRICANE GENERAL and this override must be inputted into the HURRICANE GENERAL computer program, and the HURRICANE GENERAL will automatically create a CONSPIRACY REPORT to explain the override, and this CONSPIRACY REPORT will be computer-filed at the California and Russian intelligence headquarters.

28.0(a)-KJ12 We will also have an EARTHQUAKE GENERAL(s), which will be computer programs designed to measure the geological states of the earth and to assess where possible earthquakes or volcanoes may be forming or where one is likely to occur, and/or will assess how to handle volcanoes, earthquakes, tsunamis and other earthquake or volcano related disasters as they occur or before they could occur– in order to minimize that volcano, earthquake, tsunami or other earthquake related disaster and will also direct and manage the disaster coordination efforts related to the earthquake, volcano or tsunami. The NANOTECHNOLOGY RESEARCH TEAM empowered by 24/7 PRAYER WARRIORS, if they want, will work with and train geologists and disaster coordination professionals who have read the BIBLE for at least 20 years, who will work with TRUTH PROGRAMMERS to create the EARTHQUAKE GENERAL(s). The EARTHQUAKE GENERAL will operate like the HURRICANE GENERAL, except that its specialty will be earthquakes, volcanoes and tsunamis.

28.0(a)-KJ13 It will be directly connected to satellites or other mechanisms (including disaster coordination organizations) which can be used to manipulate and/or prevent and/or minimize volcanoes, earthquakes, tsunamis, etc. It will be a dynamic program which can change its strategies and orders (based on changing input from its various sources of information).

28.0(a)-KJ14 The EARTHQUAKE GENERAL will be a complex computer program (created by the TRUTH PROGRAMMERS in collaboration with geologists or earthquake experts and disaster coordination professionals who have read the BIBLE every week for at least 20 years) and it will analyze all the data it receives from our satellites in outer space, from probes we place into the earth, from disaster coordination organizations, and from other assessment tools which we use to measure and analyze earthquake/volcano/tsunami formation, earthquake/volcano/tsunami prevention and analysis, etc. The EARTHQUAKE GENERAL will analyze the data it receives from various sources and “digest this information” to come up with effective strategies to minimize, prevent, or destroy the earthquake/volcano/tsunami which has been created by the Jesuit scientists. Once the EARTHQUAKE GENERAL comes up with its analysis of the situation, it will immediately put into action a plan to minimize (or prevent) the earthquake/volcano/tsunami or to divert it to a less dangerous outcome. The programmers will program the EARTHQUAKE GENERAL so that this program will determine where an earthquake/volcano/tsunami is about to occur (or has occurred), will delineate a strategy to minimize the earthquake/volcano/tsunami (based on its assessment data–which will be ever changing) and will give directions to satellites and other locations (including disaster coordination organizations) about actions needed to minimize the earthquake/volcano/tsunami or prevent (or weaken) its occurrence, and these satellites and other locations will be programmed to put into action the directives they have received from the EARTHQUAKE GENERAL. The EARTHQUAKE GENERAL will be a dynamic program (which interacts with–and directs–other programs under CONSPIRACY LAW and in the ISC) which responds to changes in the earth and environment and will be programmed so that it is able to adjust its strategy (based on the ever-changing input it receives from various sources needed for accurate earthquake/volcano/tsunami analysis).

28.0(a)-KJ15 The only way to override any directive handed out by the EARTHQUAKE GENERAL will be if a geologist or earthquake or volcano or disaster coordination expert (who must be an officer of the ISC) feels that the EARTHQUAKE GENERAL has made a wrong assessment or has planned an ineffective or dangerous strategy or action–if this is the case, that geologist or earthquake or volcano expert must receive permission from the NANOTECHNOLOGY RESEARCH TEAM empowered by 24/7 PRAYER WARRIORS to override the EARTHQUAKE GENERAL and this override must be inputted into the EARTHQUAKE GENERAL computer program, and the EARTHQUAKE GENERAL will automatically create a CONSPIRACY REPORT to explain the override, and this CONSPIRACY REPORT will be computer-filed at the California and Russian intelligence headquarters.

28.0(a)-KJ16 We will also have a WEATHER GENERAL, which is a computer program which deals with general weather phenomenons such as lightning, tornadoes, floods, snow, hail, etc. This WEATHER GENERAL, will be further broken down into a LIGHTNING GENERAL, TORNADO GENERAL, FLOOD GENERAL, SNOW GENERAL, BLIZZARD GENERAL, HAIL GENERAL, etc.–to deal with all possible weather scenarios which the Jesuits use to attack us with. These computer programmed GENERALs will use computer programs to analyze input data, “digest” the input, come up with effective responses and then direct actions to various output sources (such as satellites, offices manned by persons, jets flown by our military officers, disaster coordination professionals and organizations, etc.) in order to effectively minimize or deal with the weather phenomenon in a manner to weaken or destroy the ability of the Jesuits to use that weather phenomenon to cause problems, death or havoc with innocent persons and potential victims. And these satellites and other locations will be programmed to put into action the directives they have received from the WEATHER GENERAL. The WEATHER GENERAL will be a dynamic program (which interacts with–and directs–other programs under CONSPIRACY LAW and in the ISC)

28.0(a)-KJ17 This WEATHER GENERAL will be computer programs designed to measure the weather states of the earth and to assess where possible weather phenomenons may be forming or where one is likely to occur, and/or will assess how to handle these weather phenomenons as they occur or before they could occur– in order to minimize that weather phenomenon as a disaster. Meteorologists who have read the BIBLE for at least 20 years will work with TRUTH PROGRAMMERS and DISASTER COORDINATION PROFESSIONALS to create the WEATHER GENERAL(s). The WEATHER GENERAL will operate like the HURRICANE GENERAL, except that its specialty will be weather phenomenons.

28.0(a)-KJ18 It will be directly connected to satellites or other mechanisms (including disaster coordination organizations) which can be used to manipulate and/or prevent and/or minimize weather phenomenons. It will be a dynamic program which can change its strategies and orders (based on changing input from its various sources of information).

28.0(a)-KJ19 The WEATHER GENERAL will be a complex computer program (created by the TRUTH PROGRAMMERS in collaboration with weather experts and disaster coordination professionals who have read the BIBLE every week for at least 20 years) and it will analyze all the data it receives from our satellites in outer space, from probes we place into the earth or clouds, and from other assessment tools which we use to measure and analyze weather formation, weather disaster prevention and analysis, etc. The WEATHER GENERAL will analyze the data it receives from various sources and “digest this information” to come up with effective strategies to minimize, prevent, or destroy the weather disaster which has been created by the Jesuit scientists. Once the WEATHER GENERAL comes up with its analysis of the situation, it will immediately put into action a plan to minimize (or prevent) the weather disaster or to divert it to a less dangerous outcome. The NANOTECHNOLOGY RESEARCH TEAM empowered by 24/7 PRAYER WARRIORS from Church of Gail and/or her/his programmers will program the WEATHER GENERAL so that this program will determine where a weather disaster is about to occur (or has occurred), will delineate a strategy to minimize the weather disaster (based on its assessment data–which will be ever changing) and will give directions to satellites and other locations about actions needed to minimize the weather disaster or prevent (or weaken) its occurrence. The WEATHER GENERAL will be a dynamic program which responds to changes in the earth, clouds, sky and environment and will be programmed so that it is able to adjust its strategy (based on the ever-changing input it receives from various sources needed for accurate weather analysis).

28.0(a)-KJ20 The only way to override any directive handed out by the WEATHER GENERAL will be if the NANOTECHNOLOGY RESEARCH TEAM empowered by 24/7 PRAYER WARRIORs feels that the WEATHER GENERAL has made a wrong assessment or has planned an ineffective or dangerous strategy or action–if this is the case, that meteorologist or weather expert must receive permission from the NANOTECHNOLOGY RESEARCH TEAM empowered by 24/7 PRAYER WARRIORS to override the WEATHER GENERAL and this override must be inputted into the WEATHER GENERAL computer program, and the weather GENERAL will automatically create a CONSPIRACY REPORT to explain the override, and this CONSPIRACY REPORT will be computer-filed at the California and Russian intelligence headquarters.

28.0(a)-KJ21 Any (direct or indirect) willing and knowing action or attempt to create a computer programmed GENERAL which is not the most effective computer GENERAL possible to deal with Jesuit warfare against us (using scientific manipulation of the elements and environment), so that we can beat the Jesuits as they attempt to set up a worldwide dictatorship for the Jesuit Order–will bring the death penalty as a JESUIT CONSPIRATOR to that programmer or installer, or if the violator is the NANOTECHNOLOGY RESEARCH TEAM empowered by 24/7 PRAYER WARRIORS, that order from the NANOTECHNOLOGY RESEARCH TEAM will be ignored.

SATELLITE WAR STRATEGY TO LOCATE AND DESTROY JESUIT UNDERGROUND OPERATIONS:

28.0(a.1) Because of recent discoveries of colossal and massive, city-like Jesuit underground operations (underneath whole countries and ocean floors and underneath the North and South Poles), which are able to evade our satellite detectors (so that we cannot locate these underground cities using genetic code scanners and our regular methods of satellite scanning), it is necessary to use a different strategy to locate and destroy these massive underground operations.

28.0(a.2) We have discovered that the Jesuits use silver and gold alloys and other satellite resistant shields to shield these massive operations from our satellite scanners–therefore, our satellite scanners will scan the whole earth for large silver or gold alloys [and other SATELLITE RESISTANT–see Sect. 28.0(a.2.1)] shields which are underground, and which could possibly be the shield for a massive Jesuit underground operation.

28.0(a.2.1) Also, our NANOTECHNOLOGY RESEARCH TEAM will research all compounds and elements that could effectively block our satellite scanners and could be used by Jesuits to hide their underground operations. These elements and compounds will be programmed into the satellite scanners used by the INTERNATIONAL SATELLITE COALITION to search for underground Jesuit operations.

28.0(a.3) The Jesuits’ Marianna Trench operation, their Puerto Rico Trench operation and their massive underground operation underneath the whole country of Syria, and underneath most of Iraq, much of Israel, Jordan, much of Saudi Arabia, much of Iran, Turkey and extending into Georgia and the Chechnya region of Russia and their massive operations underneath the North and South Poles were not detected by our satellite scanners because these underground operations were hidden from our scanners by massive silver and/or gold and/or SATELLITE RESISTANT shields which blocked our satellite scanners, so that we could not detect the presence of human beings in these massive underground operations.

28.0(a.4) Since the Jesuits need these silver and/or gold and/or SATELLITE RESISTANT shields to block our scanners, this is how we can locate their underground operations! Any large amount of silver or gold or SATELLITE RESISTANT material (under the ground) is a suspicious area which needs to be investigated–since this underground area (where the silver and/or gold or SATELLITE RESISTANT material is) could very possibly be the shield for a Jesuit underground operation.

28.0(a.5) Once our satellite scanners detect large amounts of silver and/or gold and/or SATELLITE RESISTANT material underground, we will use satellite technology to drill holes (using satellite rays) into the silver and/or gold and/or SATELLITE RESISTANT material so that we can damage the shield and detect what is underneath it. The holes must be drilled throughout the entire area of the silver and/or gold and/or SATELLITE RESISTANT shield to make it porous, so that all portions of the possible shield can be penetrated and so that we can detect the presence of any human beings anywhere underneath that silver/gold/SATELLITE RESISTANT shield.

28.0(a.6) Once the holes are drilled into the silver/gold/satellite resistant “shield” then our satellite scanners will scan for the presence of human food, human flesh, dishes, cooking equipment, etc. and human living quarters.

28.0(a.7) If we discover an underground Jesuit operation, we will then warn all those in that underground operation that they are under death orders to evacuate and we will give them a time limit to evacuate. The time limit must not be too long. In fact, it must be only long enough to allow quick evacuation of those in the underground operation–because if the time limit is delayed too long–this gives the Jesuits time to sabotage our attempts to destroy their operation and it gives the Jesuits more time to conduct war against us. If those in the underground operation do not evacuate their underground operations within the deadline which we give them, then we will use satellite technology to cave in their operation from underneath–that is, we will create a new air bubble (or some other substance) from underneath their operation which will push up from underneath and destroy the Jesuit operation by pushing up from underneath it and completely filling in the Jesuit work space with earth (or any effective substance to fill up the space) and then a new air bubble (or some other substance) will replace that former space from underneath it–to prevent that previous Jesuit air space from causing a cave-in ABOVE IT. ALL UNDERGROUND JESUIT OPERATIONS MUST BE DESTROYED IN THIS MANNER, EVEN THOSE IN WHICH ALL PERSONs IN THAT OPERATION HAVE EVACUATED. However, we will destroy the operation very quickly, if those in it refuse to (or don’t) evacuate within the deadline we give them. Pushing up from underneath is also a more thorough way to destroy the operation, in case the operation has deeper pockets. By destroying it from underneath we will also destroy any deeper pockets which could exist in that operation and which may have evaded our detection. In essence, we will use satellite technology to cave in the Jesuit underground operations FROM UNDERNEATH. We need to do this, to prevent a sinkhole from forming in the ground above the operation, which would happen if we caved in the Jesuit operation from ABOVE. So we will cave in the Jesuit operation from underneath and create a new air bubble (or some other substance to fill in the space) underneath that operation to prevent a sinkhole from forming above the operation. This process of caving in the Jesuit operation from underneath will be called THE PUSH-UP AND FILL OPERATION. The goal of the PUSH-UP AND FILL OPERATION and the BURN/DROWN PROCEDURE (see below) will be to totally destroy that Jesuit operation and to kill anybody who may be residing or working in that operation. Anyone who willingly and knowingly conducts a PUSH-UP AND FILL OPERATION or BURN/DROWN PROCEDURE in a manner to leave some of the Jesuit operation (or the persons involved in it) operational, will receive the death penalty as a JESUIT CONSPIRATOR. ALL THOSE INVOLVED (from Commanders on down) IN A PUSH-UP AND FILL OPERATION or BURN/DROWN PROCEDURE MUST BE SCREENED BY THE AMNESIA CORPS to ensure that amnesia has not been used on these military persons to cause them to overlook important aspects of the PUSH-UP AND FILL OPERATION or BURN/DROWN PROCEDURE. This PUSH-UP AND FILL OPERATION and BURN/DROWN PROCEDURE must be successful or we will never win this war.

28.0(a.7.1) If, it is determined that the PUSH UP AND FILL and BURN/DROWN PROCEDURE would not be an effective way to immediately destroy the underground operation, then the next strategy would be to only allow those members of THE NET who are daily BIBLE READER WITH FOCUSED INPUTS to takeover the underground operation and to establish it as a new temporary military base for THE NET or as a new temporary military base for the INTERNATIONAL SATELLITE COALITION.

Luke 11:24-26–“When the unclean spirit is gone out of a man, he walketh through dry places, seeking rest; and finding none, he saith, I will return unto my house whence I came out. And when he cometh, he findeth it swept and garnished. Then goeth he, and taketh to him seven other spirits more wicked than himself; and they enter in, and dwell there: and the last state of that man is worse than the first.”

To prevent Lk. 11:24-26 from occurring, once any former Jesuit operation is taken over by our international military operations, as soon as it is deemed that all Jesuits and their supporters have evacuated that former Jesuit operation and we have gleaned the information we needed from that operation (which shouldn’t take too long), then that former Jesuit operation (even if it was a massive and colossal underground city or operation) must be totally destroyed using the PUSH UP and FILL and/or the BURN/FLOOD PROCEDURE to make it unfit for human habitation. Any (direct or indirect) knowing and willing attempt or action to delay the total destruction of a former Jesuit operation, in order to give the Jesuits time to reclaim their former operation, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. However, even after the total destruction of a Jesuit operation, the guidelines of Sect. 28.0(a.7.2.1) to 28.0(a.7.5.1) must be followed to ensure that Jesuits have not reoccupied the area.

28.0(a.7.2) All those Jesuits and their conspirators who formerly occupied that operation must evacuate IMMEDIATELY or else they will be executed (or turned over for immediate arrest to the International government) by those NET members who temporarily takeover the operation–see Sect. 28.0(a.7.1).

28.0(a.7.3) By sending our own members into that operation and taking it over, we can learn more about how Jesuits operate and, hopefully, discover any hidden compartments to that operation (where Jesuits may be hiding and/or operating) which we would miss had we not taken it over.

28.0(a.7.4) Anyone who is not a daily BIBLE READER WITH FOCUSED INPUT and who is found in the taken over operation, must be executed or arrested and turned over to International government authorities for interrogations and treatment according to CONSPIRACY LAW. Any (direct or indirect) willing and knowing attempt or action to allow anyone to live in an underground Jesuit operation who is not a daily BIBLE READER WITH FOCUSED INPUT, which has been taken over by THE NET or the INTERNATIONAL SATELLITE COALITION, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. Jesuits hate the BIBLE and would not want to read it every week in order to guide their living. However, even if one is a daily BIBLE reader but indulges in OCCULTIST MEDIA, the OCCULTIST MEDIA which that person indulges in can undermine the positive effect of the BIBLE reading and could make it possible for the Jesuits to takeover that Bible reader as an UNWILLING AGENT.

28.0(a.7.4-a) A BIBLE READER WITH FOCUSED INPUT is defined by CONSPIRACY LAW is one who reads the BIBLE EVERY week at least a ½ hour a day FOR GUIDANCE FOR HIS/HER DAILY LIVING and who does not willingly and knowingly allow (or indulge in) OCCULTIST MEDIA or input into his/her life.

28.0(a.7.4-b) OCCULTISM MEDIA is defined as any music, television, radio or anything which can be received by the brain and which is from an occultist origin. Dr. Brent Spiner will list those media (writings, music, television, movies, dads, CDs, etc.) which are from an occultism origin. Examples of OCCULTIST MEDIA are most forms of rock music; Satanic writings and games; the practice of the occult; sensual dancing or music; the reading of literature or writings with Satanic overtures, etc..

28.0(a.7.4-c) Because to know what is and what is not OCCULTIST MEDIA requires extreme spiritual discernment that most people do not have, all those LAW ENFORCEMENT PERSONs who help to enforce CONSPIRACY LAW must watch a GCFNC special called THE JESUITS’ USE OF OCCULTIST MEDIA TO TAKEOVER THE MIND OF THE WORLD and must pass a test which indicates they understand what is and what is not OCCULTIST MEDIAIf that LAW ENFORCEMENT PERSON fails this test, he/she must be removed from his/her position as a LAW ENFORCEMENT PERSON.

28.0(a.7.4-d) It is the responsibility of that PLP or RSP network (probably the MEDIC CORPs) which has 666-Computer control over those LAW ENFORCEMENT PERSONs (who are required to be BIBLE READERS WITH FOCUSED INPUT) to monitor those who are in such positions and to ensure that they are, indeed, BIBLE READERS WITH FOCUSED INPUTThose LAW ENFORCEMENT PERSONs who are in a position which requires them to be a BIBLE READERS WITH FOCUSED INPUT and who do not meet the requirements of a BIBLE READER WITH FOCUSED INPUT and, thus, render themselves, vulnerable to use as an UNWILLING AGENT must be removed from their LAW ENFORCEMENT position and must be replaced with a person who is a BIBLE READER WITH FOCUSED INPUT.

28.0(a.7.4-e) Any (direct or indirect) willing and knowing attempt or action to allow any person who is NOT a BIBLE READER WITH FOCUSED INPUT to remain in a LAW ENFORCEMENT position (which requires [according to CONSPIRACY LAW] a BIBLE READER WITH FOCUSED INPUT)– will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

28.0(a.7.4-f) In this special THE JESUITS’ USE OF OCCULTIST MEDIA TO TAKEOVER THE MIND OF THE WORLD, Dr. Spiner (with the cooperation of GCFNC) will present evidence that the Jesuit Order caused rock music to be the most popular form of music in the world in order to enhance their ability to use persons as UNWILLING AGENTS. This has been a very effective strategy by the Jesuit Order, because this music has a Satanic addictive quality which dulls the brain and makes it easier to use a person as an UNWILLING AGENT. Other forms of media which the Jesuits have used to dull the brain and takeover persons as UNWILLING AGENTs will also be exposed– such as certain Hollywood movies (such as The Passion of the Christ–see ** below in this section) and certain media forms, certain popular games (such as certain forms of Pokemon and certain forms of other popular games with kids, and certain computer-oriented games), etc. Those persons who are in LAW ENFORCEMENT capacities and who must exercise keen judgment and who must not be used as UNWILLING AGENTS will be required to avoid (if at all possible) OCCULTIST MEDIA– in order to prevent the Jesuits’ ability to undermine the positive effect of their BIBLE reading habit. It is not our goal to hinder the creativity or lifestyle of persons or to minimize the enjoyment of music, games, movies and literature–but only to make people aware that by indulging in certain forms of media and entertainment–they are opening up their brains to takeover by the Jesuits. Since our LAW ENFORCEMENT PERSONs are soldiers in an army against a brilliant terrorist enemy, we must have the discipline of soldiers and discipline ourselves to keep our minds sharp, so that the enemy cannot takeover our brains. THIS WAR AGAINST JESUIT TERRORISM IS A BATTLE FOR THE MIND, and we cannot win this war unless we WIN THE BATTLE FOR THE MIND.

**–GCFNC will have an addendum to its special THE JESUITS’ USE OF OCCULTIST MEDIA TO TAKEOVER THE MIND OF THE WORLD, to show why The Passion of the Christ is a very dangerous film to watch. The Jesuits created this film to cause Christians to become UNWILLING AGENTS, since Christians would comprise the majority of its viewing audience. Vladimir has informed me that the anti-Semitism in this film is veiled and is put into the subconscious of the viewers through the use of hypnotic special effects–that nothing said or done by the characters or in the storyline is anti-Semitic, but that an anti-Semitic attitude is steeped into the brain through some of the background music and the special effects. The clever Jesuits would never be overt in their anti-Semitism. GCFNC will show that the danger in watching this film is that the special effects and the background music are designed to dull the brain so that the viewer can be taken over as an UNWILLING AGENT. The film has a hypnotic effect which is like hypnotism on the brain to lessen the brain’s defenses against the Jesuits’ 666-Computer ability to takeover that viewer as an UNWILLING AGENT. Therefore, GCFNC and the International government issues a strong warning to the public NOT TO WATCH THIS FILM.

Pope John Paul wants to recant his recommendation of The Passion of the Christ and will state (under 666-Computer lie-detection) on GCFNC that he was unaware of its dangerous hypnotic effect in increasing the viewer’s chance of becoming an UNWILLING AGENT, and the Pope will state that he was tricked by the Jesuits, and that he no longer recommends that anyone watch this film.

By watching this film, one makes his/her brain more susceptible to takeover as an UNWILLING AGENT. The evidence that this film increases one’s vulnerability to takeover as an UNWILLING AGENT will be shown on GCFNC. Also, Dr. Spiner will present a message at our church in Germany about why one should not see this film and will show from the Bible why one should not see this film The Passion of the Christ. I haven’t seen the film, but Vladimir has, and he doesn’t like it–that is enough for me, I won’t see it. But he says his opinion about this film’s danger has nothing to do with his like or dislike, but that this film was created by Jesuits to increase the ranks of UNWILLING AGENTS in the Christian community and it has a dangerous hypnotic effect on those who watch it. I won’t watch anything to help Jesuits takeover my brain as an UNWILLING AGENT.

28.0(a.7.4-g) Dr. Brent Spiner will also present evidence in this special THE JESUITS’ USE OF OCCULTIST MEDIA TO TAKEOVER THE MIND OF THE WORLD of those music and entertainment forms which tend to support the BIBLE reading habit and which allow the Words of God to stay entrenched in the mind, so that it is not easy for Jesuits to use a person as an UNWILLING AGENT. Evidence will be presented that most forms of classical music and those traditional and classic Christian hymns (that are not rock Christian music) are excellent forms of entertainment to enhance one’s daily Bible reading habit. Movies and entertainment media that are positive and enhance one’s Bible reading habit will also be presented. All those LAW ENFORCEMENT PERSONs who are required to be BIBLE READERS WITH FOCUSED INPUT will be given tapes, CDs, movies, etc. which are positive and which would agree with that person’s cultural upbringing and which will enhance their Bible reading [such as possibly Handel’s Messiah, tape recordings of the BIBLE (or its equivalent) in a language they understand, classical music, Christian hymns, media games, good movies (some very popular Hollywood movies and media are acceptable), good literature, and other forms of POSITIVE MEDIA] to replace OCCULTIST MEDIA and to strengthen the brains of BIBLE READERS against Jesuit attack.

28.0(a.7.4-h) Right now, we can hear the world protest, that we expect all our people to live like monks or priests. To the contrary, the world will be amazed at what is acceptable literature and music–and there will be quite a range to choose from. All positive possibilities will be listed in the special THE JESUITS’ USE OF OCCULTIST MEDIA TO TAKEOVER THE MIND OF THE WORLD, so that persons from all cultural backgrounds and languages will find POSITIVE MEDIA which will work for them (to replace any OCCULTIST MEDIA which that person may be indulging in). OCCULTIST MEDIA tends to be addictive and is an unhealthy addiction which is dangerous to the brain. We only ask that persons not indulge in OCCULTIST MEDIA (and this will be explained and exposed in the GCFNC special THE JESUITS’ USE OF OCCULTIST MEDIA TO TAKEOVER THE MIND OF THE WORLD) and that as much time as possible be spent in submerging the brain with the words of the BIBLE or its equivalent (since this is the strongest offensive form of protection against being used as an UNWILLING AGENT). The best defensive form of protection is to avoid those OCCULTIST MEDIA forms which make it easier for Jesuits to takeover the brain and/or to overcome the positive effects of any BIBLE reading habit. By only allowing BIBLE READERs WITH FOCUSED INPUT to inhabit the former Jesuit underground operation, we can easily identify and eliminate those who are not BIBLE READER WITH FOCUSED INPUTS and who, therefore, are Jesuit supporters.

***********************************

THE NETHER OPERATIONS OF THE ISC

The progress of our NETHER OPERATIONS will be reported on headline news on GCFNC, so that the world will know how this operation is going and that we are doing our best to destroy Jesuit underground operations.

28.0(a.7.4-hell-1) In cooperation with the NANOTECHNOLOGY RESEARCH TEAM, a special branch of the ISC will devote themselves to study ways to use missiles (and other means) to destroy the underground operations of the JESUIT ORDER, by creating a maze of tunnels so deep, they reach down to hell, and will cause hell fire to reach up and lick up the Jesuit operations above them, in the nether parts of the earth. Once this method is found, it will be called the NETHER OPERATIONS.

28.0(a.7.4-hell-2) Once a way is found to use hell fire to destroy Jesuit operations, this will be programmed into our military computers and we will use computer programmed missiles and other means to use the NETHER OPERATIONS to destroy the underground headquarters of the Jesuit Order.

28.0(a.7.4-hell-3) Through this maze of tunnels, we will use HELL FIRE to destroy the underground operations of the JESUIT ORDER. Our NANOTECHNOLOGY RESEARCH TEAM will study which fire catalysts would be most effective for this operation, so that we can implant these catalysts into the tunnels and holes we create (which should literally go way deep down into the earth), and these catalysts will encourage HELL FIRE to come up and literally lick up the Jesuit operations with HELL FIRE and demolish them.

28.0(a.7.4-hell-4) Our military operations will be based on the BIBLE which states that the center of the earth is a BALL OF FIRE. If we can send man to the moon, can’t we find a way shoot missiles into the center of the earth? These missiles could be equipped with a HEAT SENSOR which is only attracted to very hot heat, like exists in the center of the earth and the missiles will also have a JESUIT SENSOR (which is programmed to detect and penetrate Jesuit deep earth and underground operations). It can be done and this may the best way to destroy the Jesuit Order. They’ll never give up until we kill them. Their major operations are underground, deep into the earth. Use their affinity for the nether parts of the earth to destroy them. Their bases are located near HELL, which is a ball of fire. We will use their affinity for HELL to destroy them. Since they like to live so close to hell fire, WE WILL ACCOMMODATE THEM!

28.0(a.7.4-hell-5) For the purposes of this section, the center of the earth will be referred to as HELL, since the Bible states the hell is in the center of the earth and that it is a ball of fire.

28.0(a.7.4-hell-6) The BIBLE says that hell is at the center of the earth. Therefore, we know that the center of the earth is a ball of fire. If a way can be found to shoot missiles into the underground operations of the Jesuit Order (using a HEAT SENSOR to locate HELL), so that we can use missiles to create a tunnel (or tunnels) between the underground operations of the Jesuit Order and hell at the center of the earth, we can use the fires from hell to literally reach up and destroy the Jesuit underground operations.

28.0(a.7.4-hell-7) For instance, a missile could be fired down at a portion of underground earth which is a Jesuit operation, this missile would be programmed to not only penetrate the Jesuit operation, but to go deeper and create a tunnel (or tunnels or other means) between that underground operation and hell, so that (in combination with a catalyst which we will create), we can cause the fires from hell to rise up to reach that operation and to burn it up and demolish it, and this hell fire will also burn up all the inhabitants in that operation. To prevent this fire from reaching the earth’s surface or from causing damage to the earth’s surface inhabitants, we will create a blockade at the top which will prevent the fire from going all the way to the surface of the earth. Our purpose is to destroy the Jesuit underground operations, some of which are very deep into the earth. The very deep ones can be destroyed using the HELL at the center of the earth, since HELL is a ball of fire.

28.0(a.7.4-hell-8) The missile will be embedded with a catalyst which is a FIRE ATTRACTER, so that once this missile penetrates the Jesuit operation and THEN GOES DEEPER (the fire catalyst will not be released until the missile has gone deep enough), it must go deep enough to attract the fires from hell to reach up through that tunnel to burn up the Jesuit operation above hell. Since the Jesuits like to house their major operations near HELL, we will accommodate them. Since they like to live so near HELL FIRE, we will use HELL FIRE to destroy them.

28.0(a.7.4-hell-9) Our military strategy will be to create a maze of tunnels (using nuclear missiles and other missiles or maybe underground bombs) deep underneath the surface of the earth and we will use these tunnels (along with fire catalysts implanted into these tunnels by these missiles) to literally burn up the Jesuit underground operations (using the fires from HELL to do the job).

28.0(a.7.4-hell-10) Our TRUTH PROGRAMMERS will work with the ISC to implement the NETHER OPERATIONS of the ISC. All those who work on the NETHER OPERATIONS are considered full fledged LAW ENFORCEMENT PERSONs and must meet the requirements of all LAW ENFORCEMENT PERSONs. Any willing and knowing attempt or action to use the NETHER OPERATIONS for any other purpose than to destroy Jesuit operations deep in the earth, will bring the death penalty as a JESUIT CONSPIRATOR to the violator. This operation must start immediately and any attempt to delay or sabotage the NETHER OPERATIONS will bring the death penalty as a JESUIT CONSPIRATOR to the violator. We must waste no time to destroy Jesuit operations with HELL FIRE. The center of the earth is a ball of fire. So we don’t have to create the fire. It’s there waiting for us! We will use the Jesuit affinity for deep underground earth operations to destroy them. Since they like to live near hell, we will use HELL to destroy them. All Jesuit operations which can be destroyed using our NETHER OPERATIONS, must be destroyed in this manner. Any willing and knowing failure to do so or to delay to do so, will bring the death penalty as a JESUIT CONSPIRATOR to the violator responsible for this gross neglect.

**********************************

28.0(a.7.1.1) Those who choose to (or are forced to) evacuate these Jesuit underground operations and that we have in our custody will be treated as prisoners of war and will be tried according to CONSPIRACY LAW.

28.0(a.7.2.1) Once an underground Jesuit operation has been destroyed or taken over, then the shield (which we made porous) must be modified or genetically altered (via satellite technology) so that it can no longer block our scanners from detecting a human presence behind the shield, even if that shield’s porous composition is changed into a solid composition. An effective way to do this would be to refine the silver and/or gold shields and make the shield pure gold or silver (via satellite manipulation), since the Jesuits have created a silver and/or gold alloy (via satellite manipulation) which is an effective shield to prevent our satellite scanners from detecting human presence behind the shield. Once the silver and/or gold alloy shield is chemically altered and turned into pure gold or silver, it is no longer effective as a shield and we can then detect human presence behind the shield. When a shield has been chemically altered in this manner it is called a DEACTIVATED SHIELD. If it is safely possible, all DEACTIVATED SHIELDS (composed of precious metals) must be turned over to the INTERNATIONAL CHARITY BANK and handled according to Sect. 13 & 14 of TERRORIST MONEY LAWS–this will be one way to ensure that the Jesuits cannot use these metals as shields again.

28.0(a.7.3.1) All ACTIVE SHIELDS must be turned into DEACTIVATED SHIELDS, so that Jesuits can no longer hide their criminal activities behind these ACTIVE SHIELDS. Also, if we leave the ACTIVE SHIELD intact in its present chemical composition–even though it is porous, then our scanners may get confused and may waste time on an operation which we have already destroyed. It is very easy for the Jesuits to use satellite technology to fix the holes in their shield and our scanners may not pick up on this. So by chemically altering the shield and turning ACTIVE SHIELDs into DEACTIVATED SHIELDS, we conduct our warfare in a logical and efficient manner. The more efficient we are, the sooner we can get the job done–which is to win this war against Jesuit terrorism. While the holes are satellite drilled into the shield material to make it porous, the scanner should also be programmed to genetically alter the chemical composition of the shield to turn it into a DEACTIVATED SHIELD (because we will change that shield’s chemical composition so that we can detect human presence behind that “shield”– even if it had no holes or porous composition). In this manner it will not be easy for Jesuits to hide their operations or to regroup and later enter the compound which we have destroyed. Any willing and knowing attempt or action to neglect to turn an ACTIVE SHIELD into a DEACTIVATED SHIELD, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

28.0(a.7.4.1) To change the chemical composition of the ACTIVE shield into a DEACTIVATED SHIELD is an excellent way to see if the Jesuits have regrouped and have entered the destroyed underground compound after its “destruction”. Because if the shield has been turned back into an ACTIVE SHIELD, that is a red flag that something suspicious has occurred in that destroyed operation which we need to investigate. We must regularly go back and check the shields which we have altered to see if they are the same chemical composition as when we left them–if they are not, then we need to investigate why the shield has been RE-ACTIVATED. If it is safely possible, these DEACTIVATED shields (which have been transformed into precious metals) must be confiscated and turned over to the ICB.

28.0(a.7.5.1) So, once a Jesuit underground operation has been destroyed or taken over by our people, the shield must be altered and confiscated (if it has been transformed into a precious metal) and turned over to the ICB, so that we will know that we have taken care of this Jesuit operation–and then we can move onto other Jesuit operations, in order to destroy them. In this manner, our scanners can efficiently and quickly locate and destroy Jesuit operations underground by scanning for operational shields or ACTIVE SHIELDS.

28.0(a.7.6) The Pope believes that those ACTIVE SHIELDS which we will transform into pure gold, silver and other metals of monetary value were originally money which the Jesuits took from Vatican vaults. These precious metals will be transformed back into their original states (gold, silver, etc.) and this money (metals) must be put into the INTERNATIONAL CHARITY BANK following the guidelines of Sect. 13 and 14 of TERRORIST MONEY LAWS. The NANOTECHNOLOGY RESEARCH TEAM will study ways to safely remove these valuable metals from the earth in the area of the Jesuits’ previous underground operations (and to bypass the asbestos), so that those who harvest the metals will not be harmed by the deliberate asbestos contamination of these metals by the Jesuits. Sect. 13.9 of TERRORIST MONEY LAWS must be honored and followed as these metals are confiscated from the Jesuits.

28.0(a.7.7) The Pope will reclaim this Vatican money which was stolen from the Vatican vaults by the Jesuits and which was transformed [(via satellite technology) into gold/silver alloy shields used to hide Jesuit underground operations from the world]. Since this Vatican money in the form of gold/silver was used to create these shields, it will be given back to the Pope, who will then turn the money (assets) over to the INTERNATIONAL CHARITY BANK. All precious metals confiscated as DEACTIVATED shields–because they were previously used as ACTIVE SHIELDS to promote Jesuit operations must be turned over to the ICB –and TERRORIST ASSETS SEIZED forms (see Sect. 13 & 14 of TERRORIST MONEY LAWS) must be filled out for all confiscations. All assets (including precious metals of DEACTIVATED SHIELDS) seized from these underground operations, must be handled according to Sect. 13 & 14 of TERRORIST MONEY LAWS. This should assist us greatly in this very expensive war against Jesuit terrorism. Those who do not follow the guidelines of Sect. 13 & 14 of TERRORIST MONEY LAWS in the handling of DEACTIVATED SHIELDS, will receive the death penalty as JESUIT CONSPIRATORS.

28.0(a.8) Once we conduct a PUSH-UP AND FILL OPERATION, we will not bother to go in and look for bodies. Those that are buried there, will remain there, and their corpses will remain underground and we will not bother them. The reason for this is because, in order to discourage people from exploring through Jesuit shields, the Jesuits have contaminated their silver and gold and SATELLITE RESISTANT shields with asbestos. It is too dangerous, because of the asbestos, for us to go in and look for bodies and we won’t go through the asbestos. This whole PUSH-UP AND FILL OPERATION can be conducted using satellite technology by our INTERNATIONAL SATELLITE COALITION. If the underground people living in these Jesuit cities won’t evacuate when we give them orders to do so, then they have signed their death warrant–because we will cave in and destroy their total operation using the PUSH-UP AND FILL OPERATION and the BURN/FLOOD PROCEDURE. They will be buried, burned and drowned.

28.0(a.8.1) To ensure the total destruction of a Jesuit operation, after a PUSH-UP AND FILL OPERATION has been conducted on a Jesuit operation, then satellite technology will be used by the INTERNATIONAL SATELLITE COALITION to cause an underground fire (or extreme heat) to burn up the entire Jesuit operation, in order to melt and totally destroy all Jesuit capabilities in that underground operation.

28.0(a.8.2) After the entire area has been burned up and melted down, then satellite technology will be used to flood out the entire area (perhaps by breaking a water line or ocean water into the area), in order to quench the fire and to flood out the entire area of the Jesuit operations. This will be called the BURN/FLOOD PROCEDURE. First we put the entire Jesuit operation in flames (or the equivalent of flames) and destroy it by underground fire or extreme heat, then we flood the entire area out and further destroy it by underground flooding. This BURN/FLOOD PROCEDURE as well as the PUSH-UP AND FILL OPERATION, must be done on all Jesuit operations discovered, to make it extremely difficult for Jesuits to rehabilitate their former base of operations. This should also ensure that there are no survivors to carry on further Jesuit operations. If it is not possible to do both–that is- to burn and then flood the area, then we will do one or the other. Perhaps, it will just be burned and not flooded. Or perhaps, it will be flooded and not burned. Ideally, both burning and flooding of the Jesuit operation should occur, in order to ensure the total destruction of the operation. The precious metals may be harvested before or after the BURN/FLOOD PROCEDURE. Scientists from the NANOTECHNOLOGY RESEARCH TEAM will determine the best time to retrieve the precious metals, either before or after the BURN/FLOOD PROCEDURE.

28.0(a.8.3) But regardless of when the precious metals are retrieved, the BURN/FLOOD PROCEDURE must take place to the maximum extent possible-to ensure the TOTAL DESTRUCTION OF THE JESUIT OPERATION. We don’t want to give the Jesuits a back door to climb out of!

28.0(a.9) This is a war and we will not show sympathy for those countries who war against us. Just like Germany and Japan were bombed in World War II and this bombing harmed civilians (even though we didn’t like it), that is what we had to do to get Germany and Japan to surrender. In the same token, we must destroy our enemy’s country (which is all underground) using the PUSH-UP AND FILL OPERATION and the BURN/FLOOD PROCEDURE. This is what we have to do to win this war. Now that we’ve discovered our enemy’s country, we have to destroy that underground country to destroy their operations. It’s either that, or we will have more Indonesia 9.0 earthquakes and tsunamis like the one we had in Dec. 2004.

28.0(a.9.1) Any (direct or indirect) willing and knowing violation of the guidelines of this Sect. 28.0(a.1) through (a.9.1) which allows any Jesuit operation to continue its operation for any longer than is necessary or to reclaim any of their former operations, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. All efforts must be made to use satellite scanners which scan for silver/gold/satellite resistant substances (or any substances which block our scanners from detecting human presence behind that substance), in order to locate as soon as safely possible all underground Jesuit operations; and then once these operations are located, the guidelines of this Sect. 28.0(a.1) through (a.9.1) must be used to deal with (and destroy) that operation as soon as safely possible and to make it exceedingly difficult for Jesuits to reclaim that operation. Any willing and knowing failure to TOTALLY destroy any Jesuit underground operation as soon as safely possible (according to the guidelines of this Sect. 28.0) will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

28.0(a.9.2) In order to eliminate confusion as we search for Jesuit operations, none of our military bases of operation will use shields to completely hide our operations or to completely hide human presence at our bases of operation. See Sect. 13.16 (about THE NET) of CL&G for more details about this.

*************************

28.0(a1) The INTERNATIONAL SATELLITE COALITION can use any CONSPIRACY LAW network to assist them in their warfare against the Jesuit Order. For instance, it may be useful to use the TERRORIST SUPPORTS SCANNERS or SIGNAL SOURCE ANALYZERS (see Sect. 39 of CONSPIRACY LAWS AND GOVERNMENT and this document) to help in locating nuclear, biological and chemical substances which could be used by Jesuit terrorists. All CONSPIRACY LAW networks are considered military networks (since all CONSPIRACY LAW violators are tried in military tribunals) and all CONSPIRACY LAW networks must obey any orders from the ISC COMMANDER or his second in command.

*****************************

INTELLIGENCE CORPS of the INTERNATIONAL SATELLITE COALITION:

28.0(a2) As a result of what God showed me from the Bible and because Vladimir has confirmed that this information from Ecc. 10 through 12 does, indeed, reveal the longitudinal sections of the world where Jesuits plan their war strategies, it is now law that the INTERNATIONAL SATELLITE COALITION must have an INTELLIGENCE CORPS which will devote itself to studying satellite signals from the longitudinal sections of the world [in accordance to what God showed me from Ecc. 10 through 12–see Sections 28.0(a2.1) to 28.0(a2.34)]. Because this is a monumental task, this INTELLIGENCE CORPS must have at least one million members. We cannot win this war without the best intelligence and we have determined that our previous failings have been due to poor intelligence.

The one million members will be assigned longitudinal sections of the world to monitor, though if they notice suspicious signals from other longitudinal sections, they are required to report these to their superior officers–willing and knowing neglect to do so will bring them the death penalty. So, there will be approximately 32,000 members assigned to each of the following longitudinal sections of the world, with more members assigned to those longitudinal sections with NEW PARAGRAPHS or that are areas of high Jesuit activity. Underlined sections require more intelligence personnel:

1) 180 to 165 W, 2) 165 W to 150 W, 3) 150 W to 135 W, 4) 135 W to 120 W, 5) 120 W to 105 W, 6) 105 W to 90 W, 7) 90 W to 75 W, 8) 75 W to 60W, 9) 60 W to 45 W10) 45 W to 30 W11) 30 W to 15 W.

12) 15 W to 0, 13) 0 to 10 E, 14) 10 E to 20 E, 15) 20 E to 30 E, 16) 30 E to 40 E, 17) 40 E to 50 E, 18) 50 E to 60 E, 19) 60 E to 70 E20) 70 E to 80 E21) 80 E to 90 E, 22) 90 E to 100 E, 23) 100 E to 110 E, 24) 110 E to 120 E, 25) 120 E to 130 E, 26) 130 E to 140 E, 27) 140 E to 150 E28) 150 E to 160 E29) 160 E to 170 E30) 170 E to 180.

To assist these intelligence officers and military personnel in their work, they must scrutinize Ecc. 10 through 12 in the BIBLE and must be daily BIBLE READERS WITH FOCUSED INPUT. The following Sections 28.0(a2.1) through 28.0(a2.64) will be given to military intelligence workers of our ISC, and they must pass a test about its contents to show they know how to focus their intelligence efforts, so that an effective intelligence campaign can be conducted against the Jesuit Order:

28.0(a2.1) As I read from the Bible today (1-20-05), God seemed to show me some more ways that we can locate Jesuit underground operations (especially where they plan their strategies) and how to locate their money. God indicated to me through my Bible reading that the reason we never discovered the use of UNWILLING AGENTS until recently (even though this has gone on for many, many years) is because Jesuits use SPECIALISTS (WHO ARE VERY GOOD) to manipulate human behavior and these SPECIALISTS program and operate the computers which do the actual behavior manipulation in UNWILLING AGENTS. These SPECIALISTS are probably professionals in psychology, sociology and human behavior and are highly trained and professional, the Jesuits have placed them in certain sections of the earth (according to longitude) and the Jesuits use OR call upon these SPECIALISTS to program their computers and to oversee the operations of those computers which manipulate UNWILLING AGENTS. These SPECIALISTS are used by Jesuits (whenever their particular area of expertise is needed), so that the Jesuits’ manipulation of UNWILLING AGENTS can be carried off seamlessly and professionally and brilliantly.

28.0(a2.2) These SPECIALISTS are well hidden and don’t operate from large underground offices, so the best way to track them is to have an idea where they would be and to search for those satellite signals which would be in their area of expertise.

28.0(a2.3) God has provided us with this information as I read from Ecclesiastes today (1-20-05).

28.0(a2.4) So, let’s say that the Jesuits need a ruler to behave in a certain way, they hire their computer/satellite SPECIALISTS to do the job. THE LORD IS LETTING US KNOW WHO THE SPECIALISTS ARE AND WHERE THEY ARE LOCATED!

28.0(a2.5) Ecclesiastes 10 has 20 verses. In my Rand McNally Quick Reference World Atlas, the continent of Eurasia on pages 24 and 25 is divided into 20 sections of 10 degrees each of longitude.

28.0(a2.6) NOTE OF INTEREST:

It is the Eurasian continent and the sections of the world from longitude 10 W to 165 W that have a history of royalty. The North and South American continents do not have a history of royalty, nor do they have a history of having kings and queens. This how God lets us know that Ecclesiastes 10 is referring to the Eurasian continent (or the sections of the world from 10 W to 165 W); and, therefore, the areas of longitude which I have picked are the correct ones for Ecc. 10. If you’ll notice . . . Ecc. 10 talks a lot about kings–whereas Ecc. 11 & 12 do not. Therefore, I feel that each section of ten degrees longitude (as seen on pages 24 and 25 of my Rand McNally Quick Reference World Atlas) corresponds to each verse of Ecclesiastes 10.

28.0(a2.7) It is also interesting to note that we go from west to east in these descriptions of the Jesuits’ intelligence (or strategic) operations. This is the wrong direction. God’s direction (according to church history) is always east to west. Revivals (or the movement of the Holy Spirit in church history) have always gone from east to west. Let Dr. Spiner comment about how God’s direction is always east to west on GCFNC. Since God is describing these operations as west to east in Ecclesiastes 10, 11 and 12; God is letting us know that he is giving us information about the false Church and its operations and that he is describing operations guided by Satan. In church history, revivals go EAST TO WEST–not West to East. Perhaps as the Jesuits set up their intelligence operations, they went from west to east? This may be an interesting study.

28.0(a2.8) If this is the case, then Ecclesiastes 10:1 corresponds to longitude 10 W to 0, because this is the first longitudinal section of the parts of the world with a history of royalty–“Dead flies cause the ointment of the apothecary to send forth a stinking savour: so doth a little folly him that is in reputation for wisdom and honour.” An apothecary was used to sell medicine and drugs, so God is dropping a hint in the FIRST VERSE that in longitude 10 W to 0 we will find Jesuit intelligence regarding the Jesuits’ use of medicine and drugs in this area of the world. And also because this is the first verse of the total description from Ecc. 10, 11 and 12 of the Jesuits’ intelligence operations, we know we are dealing with an organization obsessed with using medicine and pharmaceuticals in a wicked manner (or with A STINKING SAVOUR). Most of the Jesuits’ attacks against us have involved the practice of criminal medicine (using satellite/computer technology).

28.0(a2.9) Notice the LAST VERSE of Ecc. 10 refers to SATELLITES. God uses the first and last verses of Ecc. 10 to show us the most important aspects of the Jesuits’ operations, so that there will be no doubt about WHOM GOD IS REFERRING TO. The first and last verses of any piece of writing are always more memorable. In the first verse (Ecc. 10:1), God emphasizes that we are dealing with an organization that practices dirty medicine. In the last verse (Ecc. 10:20), God emphasizes that we are dealing with an organization that heavily uses satellite technology to read minds, so that no one has any privacy and must even watch WHAT THEY THINK–read the verse.

28.0(a2.10) Perhaps in this section (longitude 10 W to 0) of longitude the Jesuits concentrate their UNWILLING AGENT operations which cause those with good reputations to behave like fools? The Jesuits are really good at manipulating UNWILLING AGENTS. Perhaps they have SPECIALISTS in certain areas of the world who specialize in creating or manipulating certain types of behaviors in UNWILLING AGENTS and these SPECIALISTS are located at certain longitudinal locations of the earth, and God is showing us through the Bible where the Jesuits have placed their SPECIALISTS (according to longitude). Perhaps these UNWILLING AGENT manipulators are arranged (according to specialty) according to the longitudinal sections of the earth. God is letting us know 1) how the Jesuits have divided up the longitudinal sections, 2) who the UNWILLING AGENT SPECIALISTS ARE and what they specialize in, 3) where they are located.

28.0(a2.11) If this is correct–we can locate where these Jesuit UNWILLING AGENT specialist-manipulators are by searching for satellite signals which cause those with good reputations to behave like fools in this particular longitudinal section (10 W to 0) and THEN we can locate the operations of these SPECIALISTS (which specialize in causing those with good reputations to behave like fools). It appears that the Jesuits’ UNWILLING AGENT specialist-manipulators have their own underground operations and are at specific locations (according to longitude) and that these UNWILLING AGENT SPECIALISTS are located in specific longitudinal sections. God is letting us know through Ecclesiastes WHAT THE UNWILLING AGENT specialties ARE and WHERE (which longitudinal section of the earth) THESE SPECIALISTS are located.

28.0(a2.12) Ecc. 10:2 or 0 to 10 E–“A wise man’s heart is at his right hand; but a fool’s heart at his left.” Cross reference to Solomon’s Song 2:6. In longitude 0 to 10 E is the location of those Jesuit computer/satellite SPECIALISTS who somehow use the left or right hand to manipulate the heart (or something) and to cause persons to behave like wise men or like fools. Search for satellite signals in this area that seem obsessed with the left or right or with the heart or with foolish or wise behavior and this will help us discover the operations of Jesuit SPECIALISTS in this area of longitude.

28.0(a2.13) Ecc. 10:3 or 10 E to 20 E–“Yea also, when he that is a fool walketh by the way, his wisdom faileth him, and he saith to everyone that he is a fool.” At this location of 10 E to 20 E longitude of the earth are those Jesuit satellite/computer SPECIALISTS who specialize in causing fools to behave in a brazen and obnoxious manner. I’VE SEEN A LOT OF THIS and the manipulation is very good. So there are obviously psychological SPECIALISTS out there who are behind this manipulation, and they are located at 10 E to 20 E longitude of the earth. Search for signals that cause outrageous behavior in fools in this area, in order to locate these SPECIALISTS.

28.0(a2.14) Ecc. 10:4 or 20 E to 30 E–“If the spirit of the ruler rise up against thee, leave not thy place; for yielding pacifieth great offences.” In this section of longitude are those Jesuits SPECIALISTS who use satellite/computer technology to cause certain rulers to become outraged and who specialize in causing these rulers’ underlings to yield. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.15) Ecc. 10:5 or 30 E to 40 E–“There is an evil which I have seen under the sun, as an error which proceedeth from the ruler:” In this section of longitude are those Jesuit SPECIALISTS who use satellite/computer technology to cause certain rulers to make mistakes in judgment. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.16) Ecc. 10:6 or 40 E to 50 E–“Folly is set in great dignity, and the rich sit in low place.” In this section of longitude are those Jesuit SPECIALISTS who use satellite/computer technology to cause certain rich persons to behave in a foolish manner. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.17) Ecc. 10:7 or 50 E to 60 E–“I have seen servants upon horses, and princes walking as servants upon the earth.” In this section of longitude are those Jesuit SPECIALISTS who use satellite/computer technology to manipulate certain people– so that those who don’t deserve to be in charge become the leaders and so that those who are truly talented and qualified end up in low-paying jobs or positions far below their potential. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.18) Ecc. 10:8 or 60 E to 70 E–CROSS REFERENCE TO ECC. 5:8–WHICH ALSO, like Ecc. 10, HAS 20 VERSES. God’s telling us to pay attention to the number 8. And because Ecc. 5:8 describes the Beast or the false Christ, Ecc. 10:8 is a very important section. Note of interest, Isn’t this the section of the world where Russian cosmonauts launch into outer space or come back from outer space? You may want to do some research into this number 8 and its connection with Russian cosmonauts and with KAZAKHSTAN with the Jesuit Order. THERE’S SOMETHING HERE. “He that diggeth a pit shall fall into it; and whose breaketh an hedge, a serpent shall bite him.” In this section of longitude are those Jesuit SPECIALISTS who use satellite/computer technology to decide on (and create) the location of Jesuit underground locations (IN THE AREA WHERE RUSSIANS SEND OFF AND RECEIVE THEIR COSMONAUTS??) and who use satellite technology to create these underground Jesuit operations, perhaps using something that operates like a snake as it creates tunnels? Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested. This area also includes AFGHANISTAN AND PAKISTAN–so the outer space (or cosmonaut) connection may extend into these areas.

28.0(a2.19) Ecc. 10:9 or 70 E to 80 E–“Whoso removeth stones shall be hurt therewith; and he that cleaveth wood shall be endangered thereby.” In this section of longitude are those Jesuit SPECIALISTS who study the rocks of the underground earth and how these can be manipulated and who study wood composition and creation, in order to help in the creation of the Jesuits’ underground operations. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.20) Ecc. 10:10 or 80 E to 90 E–“If the iron be blunt, and he do not whet the edge, then must he put to more strength: but wisdom is profitable to direct.” In this section of longitude are those Jesuits SPECIALISTS who use and create things with iron to create instruments to help in Jesuit underground operations. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.21) Ecc. 10:11 or 90 E to 100 E–“Surely the serpent will bite without enchantment; and a babbler is no better.” In this section of longitude are those Jesuits who use snake-like operations which bite into the earth to create tunnels in order to create Jesuit operations and it is here that SPECIALISTS are also located which cause excessive talking and babbling in UNWILLING AGENTS. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.22) Ecc. 10:12 or 100 E to 110 E–“The words of a wise man’s mouth are gracious; but the lips of a fool will swallow up himself.” In this section of longitude are those Jesuits who can manipulate a person’s speech so that he will appear gracious and wise–or (if the Jesuits choose) will speak like a fool in a very incriminating manner. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.23) Ecc. 10:13 or 110 E to 120 E–“The beginning of the words of his mouth is foolishness: and the end of his talk is mischievous madness.” In this section of longitude are those Jesuits who can manipulate a person’s speech to cause him to start off talking like a fool and then to end off talking like a conniving mad man. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.24) Ecc. 10:14 or 120 E to 130 E–“A fool also is full of words: a man cannot tell what shall be; and what shall be after him, who can tell him?” In this section of longitude are those Jesuits who can manipulate a person’s speech to cause him to be erratic, illogical, very talkative. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.25) Ecc. 10:15 or 130 E to 140 E–“The labour of the foolish wearieth every one of them, because he knoweth not how to go to the city.” In this section of longitude are those Jesuits who manipulate the way a person works and operates, so that the UNWILLING AGENT wears everyone out around him/her (including himself/herself) while he/she works and he/she works and behaves in a manner that is confusing and disorganized. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.26) Ecc. 10:16 or 140 E to 150 E–“Woe to thee, O land, when thy king is a child, and thy princes eat in the morning!” In this section of longitude are those Jesuits who manipulate a country’s ruler so that he/she behaves in an immature and irresponsible manner and wastes time in gluttonous and riotous living (drunkenness or drugs, etc.). THERE IS A NEW PARAGRAPH HERE, WHICH INDICATES THAT THE JESUITS HAVE MANY SPECIALISTS IN THIS SPECIALTY. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.27) Ecc. 10:17 or 150 E to 160 E–“Blessed art thou, O land, when thy king is the son of nobles, and thy princes eat in due season, for strength, and not for drunkenness!” In this section of longitude are those Jesuits who specialize in the study of wise, classy, and popular rulers (and these specialists also study the behavior of those with royal genes), so that they can manipulate those rulers that they want to succeed to have this type of behavior. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.28) Ecc. 10:18 or 160 E to 170 E–“By much slothfulness the building decayeth; and through idleness of the hands the house droppeth through.” In this section of longitude are those Jesuits who manipulate certain persons to be lazy and good for nothing. THERE IS A NEW PARAGRAPH HERE, WHICH INDICATES THAT THE JESUITS HAVE MANY SPECIALISTS IN THIS SPECIALTY. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

28.0(a2.29) Ecc. 10:19 or 170 E to 180 E–“A feast is made for laughter, and wine maketh merry: but money answereth all things.” In this section of longitude are those Jesuits who plan ostentatious ceremonies with drinking and laughter (which obviously are very costly) and it is IN THIS SECTION OF LONGITUDE THAT THE JESUITS HAVE HID THEIR MONEY. THERE IS A NEW PARAGRAPH HERE, WHICH INDICATES THAT THE JESUITS HAVE MANY SPECIALISTS IN THIS SPECIALTY AND THERE’S A LOT OF JESUIT MONEY HID IN THIS SECTION OF LONGITUDE. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS (AND THE JESUITS’ MONEY) can be located and arrested. Any Jesuit money found must be turned over to the INTERNATIONAL CHARITY BANK–if this does not occur–DEATH PENALTY. My guess is when you find these specialists who plan great feasts, that you will also find the Jesuits’ money.

28.0(a2.30) Ecc. 10:20 or 180 E to 170 W–“Curse not the king, no not in thy thought; and curse not the rich in thy bedchamber: for a bird of the air (satellite signals?) shall carry the voice, and that which hath wings (a satellite?) shall tell the matter.” Why does God go to the trouble to say a bird OF THE AIR? Everyone knows birds fly IN THE AIR. Maybe this is a different type of BIRD. In this section of longitude are those Jesuits who plan all the Jesuits’ satellite operations which give them mind-reading capabilities (“no not in THY THOUGHT”) and which give them all their other satellite capabilities. The “birds of the air” are satellite signals and the “wings” are the wings of a satellite, which transmit and receive signals. THERE IS A NEW PARAGRAPH HERE, WHICH INDICATES THAT THE JESUITS HAVE MANY SPECIALISTS IN THIS SPECIALTY. THIS VERSE ALSO HINTS THAT THE JESUITS ARE RICH and that the Jesuit leader is a KING. Yes, he is. He is 666 or the Beast, who is a false Christ and is a king. Program our operations to search for such signals in this area of longitude so that these SPECIALISTS can be located and arrested.

Further NOTE OF INTEREST, the whole book of Ecclesiastes is a book written to guide and instruct KINGS.

**********

28.0(a2.31) Ecc. 11 and 12 describe all the sections of the earth, divided into 24 sections of 15 degrees longitude each– THE FIRST SECTION starts with 180 to 165 W.

28.0(a2.32) We know there are 15 degrees in each section, because Ecc. 11:2 says–“Give a portion to SEVEN, and also to EIGHT; for thou knowest not what evil shall be upon the earth.” SEVEN PLUS EIGHT EQUALS FIFTEEN. Notice this is VERSE TWO, which is God’s hint that there are TWO (7 + 8) parts to each section. You may want to explore this further to see if the Jesuits have 7 or 8 sections within each 15 degrees of longitude.

28.0(a2.33) So Ecc. 11:1 describes 180 to 165 W, and 11:2 describes 165 W to 150 W and Ecc. 12:1 describes 30 to 15 W and so on until we get to Ecc. 12:14 which describes 165 to 180 E. If you read each verse, it will let you know what type of satellite signals to look for in order to locate more Jesuit underground operations in each section. Notice that on pages 2 and 3 of the Rand McNally Quick Reference World Atlas, how the whole world’s longitudes are divided up into 24 sections of 15 degrees each–AND THERE ARE 24 VERSES IN ECC. 11 AND 12.

28.0(a2.34) Pay special attention to where new paragraphs start, since this indicates a heavy Jesuit infestation.

My guesses about how the Jesuits may have more underground specialty operations organized (according to longitudinal sections). Our INTELLIGENCE CORPS should study each verse of Ecc. 11 and 12 to determine how to focus their searches for underground Jesuit operations (and should particularly search for areas where Jesuit strategy is planned) in these particular longitudinal sections of the earth:

28.0(a2.35) Ecc. 11:1 (180 to 165 W)–Manipulation of crops and food.

28.0(a2.36) Ecc. 11:2 (165 to 150 W)–Details of how the Jesuits have divided up their operations.

28.0(a2.37) Ecc. 11:3 (150 to 135 W)–Manipulation of clouds, rain, trees.

28.0(a2.38) Ecc. 11:4 (135 to 120 W)–Manipulation of winds and clouds in order to manipulate crops and foods.

28.0(a2.39) Ecc. 11:5 (120 to 105 W)–Manipulation of pregnancies and reproductive processes.

28.0(a2.40) Ecc. 11:6 (105 to 90 W)–Manipulation of farmlands and food creation.

28.0(a2.41) Ecc. 11:7 (90 to 75 W)–Manipulation of the sun’s rays and of cloud coverage.

28.0(a2.42) Ecc. 11:8 (75 to 60 W)–Manipulation of the elderly.

28.0(a2.43) Ecc. 11:9 (60 to 45 W)–NEW PARAGRAPH. Manipulation of the youth.

28.0(a2.44) Ecc. 11:10 (45 to 30 W)–Manipulation of moods, causing depression or sensual behavior–especially in youth.

28.0(a2.45) Ecc. 12:1 (30 to 15 W)–Manipulation of children and youth.

28.0(a2.46) Ecc. 12:2 (15 to 0)–Manipulation of light and cloud coverage.

28.0(a2.47) Ecc. 12:3 (0 to 15 E)–Manipulation of providers or heads of households.

28.0(a2.48) Ecc. 12:4 (15 to 30 E)–Manipulation of the mood of a country.

28.0(a2.49) Ecc. 12:5 (30 to 45 E)–Manipulation of the mood of a country to cause excessive anxiety and distrust of those in power and a despair over one’s life.

28.0(a2.50) Ecc. 12:6 (45 to 60 E)–Manipulation of one’s ability to function–using satellite technology to bring on weakness and near-death in persons.

28.0(a2.51) Ecc. 12:7 (60 to 75 E)–Manipulation to cause certain persons to die.

28.0(a2.52) Ecc. 12:8 (75 to 90 E)–NEW PARAGRAPH. Manipulation to cause vain and shallow behavior in certain persons.

28.0(a2.53) Ecc. 12:9 (90 to 105 E)–Manipulation of mores and teachings in a society and of their universities and places of higher learning.

28.0(a2.54) Ecc. 12:10 (105 to 120 E)–Manipulation of writers and the elimination of those writers who write unacceptable words.

28.0(a2.55) Ecc. 12:11 (120 to 135 E)–The promotion of those writers who write acceptable words.

28.0(a2.56) Ecc. 12:12 (135 to 150 E)–The study of popular writings in order to determine the world’s moods and how to best manipulate them. And the creation of books to promote the Jesuits’ agenda and to put down those that the Jesuits want destroyed.

28.0(a2.57) Ecc. 12:13 (150 to 165 E)–NEW PARAGRAPH. A manipulation of the religious feelings of persons, so that one’s religious fears (and his/her sense of religious duty) can be manipulated.

28.0(a2.58) Ecc. 12:14 (165 to 180 E)–How to handle the secret sins of persons and how the laws should be written to deal with secret sins. NOTICE THAT THIS SECTION CORRESPONDS WITH ECC. 10:19 (170 to 180 E) where the Jesuits’ money is hid (SECRET SINS?). What’s interesting is that Ecc. 11 plus Ecc. 12 = 23. GOD DELIBERATELY OMITS THE 24TH SECTION of the world in order to emphasize it. In Ecc. 10, we have 20 sections of 10 degrees each. In Ecc. 11 and 12 (11 + 12 = 23), we have 24 (or 23?) sections of 15 degrees each.

***********

28.0(a2.59) If these SPECIALISTS do indeed exist, all evidence found from these SPECIALISTS’ operations must be recovered in a manner that the evidence is untampered and can be admitted to a court of law as evidence. This is because this evidence will be used in the military tribunals against the Jesuit Order. It goes without saying that all Jesuit SPECIALISTS discovered (or known about) must be apprehended and arrested and tried for CONSPIRACY LAW violations on GCFNC. Their executions will also be shown on GCFNC. Most are guilty of death penalty violations of CONSPIRACY LAW.

28.0(a2.59-a) If the evidence cannot be recovered, then the SPECIALISTS’ operation (along with the SPECIALISTs in the operation) must be destroyed and as much evidence as can be obtained must be gotten before the destruction. We cannot allow these SPECIALISTS to continue to exist, because they are the “brains” behind all Jesuit terrorist operations and are the most dangerous element in all of the Jesuit Order. Any (direct or indirect) willing and knowing violation of this Sect. 28.0, which allows the Jesuits to continue any of their operations, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

28.0(a2.60) Once we obtain the evidence above (as described in this statement) about Jesuit SPECIALISTS, we will present this evidence on GCFNC and this will be irrefutable proof that the Jesuit Order desires to set up a worldwide dictatorship and to control every person on the planet under this dictatorship–because why else would they set up SPECIALISTS like the ones described in this statement?

28.0(a2.61) Any (direct or indirect) willing and knowing attempt or action by any LAW ENFORCEMENT PERSON or by any member of our INTELLIGENCE CORPS to hide any evidence found about a SPECIALIST(s) or to tamper with any evidence found [regarding the operations of these JESUIT SPECIALISTS or to allow any JESUIT SPECIALIST to continue his/her work as a JESUIT SPECIALIST (as described in the 28.0 sections above)] and/or to prevent that SPECIALIST from being apprehended, arrested and tried according to CONSPIRACY LAW, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

28.0(a2.62) All members of the INTELLIGENCE CORPS must be daily BIBLE READERS WITH FOCUSED INPUT and must be specialists themselves in their knowledge of Ecc. 10 through 12 and in how to apply these Biblical passages to their work as intelligence officers. Any direct or indirect attempt or action to allow any person to be a member of the INTELLIGENCE CORPS, who does not meet the requirements outlined in this Sect. 28.0(a2.62), will bring the death penalty as a JESUIT CONSPIRATOR to that violator. This is a very demanding job and requires 24/7 duty. Therefore, any member of the INTELLIGENCE CORPS who holds any other job besides his/her work as a member of the INTELLIGENCE CORPS cannot be an INTELLIGENCE CORPS member. These members of the INTELLIGENCE CORPS are going into the deepest area of Jesuit intelligence and bring us essential information about key Jesuit operations and strategies. Therefore, these members must be highly trained and tested and must be the best intelligence workers in the world. The information and evidence provided by these workers can make or break our war against Jesuit terrorism. All information which they find must be turned over to their military superiors IMMEDIATELY in an untampered state, so that appropriate military and legal strategy can be implemented, AND SO THAT THE EVIDENCE FOUND WILL BE ADMISSIBLE TO A COURT OF LAW AS EVIDENCE.

28.0(a2.63) Jesuits are ever changing their strategies and rely heavily on surprise attack–therefore, any (direct or indirect) willing and knowing attempt or action to DELAY to report any intelligence found as a result of the work of the INTELLIGENCE CORPS and if this delay was willingly and knowingly done to assist the Jesuit Order in their goals, this will bring the death penalty as a JESUIT CONSPIRATOR to that INTELLIGENCE CORPS member.

28.0(a2.64) All computers and programs used by INTELLIGENCE CORPS members in their work must be connected to military headquarters and to those who are superior officers to the INTELLIGENCE CORPs members, so that all information obtained by the INTELLIGENCE CORPS can be immediately downloaded and accessed by the superior officers of the ISC.

*********************************

28.0(b) Because the effective use of satellite/computer technology against the Jesuit Order involves military strategy, it is necessary to establish a large military operation to make these decisions about how, when and in what manner to use satellite/computer technology in our warfare against the Jesuit Order.

28.0(c) However, the ISC is not limited to the use of satellite/computer technology in its warfare against the Jesuit Order. That is why we will use the regular military personnel of the COALITION COUNTRIES (see Sect. 28.2) in our warfare against the Jesuit Order and these regular military personnel (from the COALITION COUNTRIES) will assist the INTERNATIONAL SATELLITE COALITION in their warfare against the Jesuit Order. For instance, support personnel (fighter pilots) may be needed to fly hundreds of jets into the eye of a hurricane to make drops to weaken the hurricane.

28.0(d) An INTERNATIONAL SATELLITE COALITION has been established to conduct warfare against the Jesuit Order and this coalition will use the latest and most pioneering satellite/computer technology available to conduct this warfare.

28.0(e) This is a military organization and will be run like a regular military organization with enlisted persons and officers, using U.S. Army and Air Force rankings: brigadier general, four star generals, colonels, staff sergeants, etc.

28.1 The head general and the person in command and in charge of the entire operation will be Brent Spiner and/or Vladimir Putin empowered by 24/7 PRAYER WARRIORS from the Church of Gail. Brent and/or Vladimir will be COALITION COMMANDER (or any title that is the equivalent of the head person of a country’s military organization) and he will have all the military benefits, responsibilities and duties of the head general (like a five star general) or commander of a country’s Army or Air Force–including the pay, benefits, medical benefits, housing, etc. of the top leader in a large military organization. Brent and/or Vladimir can appoint a 2nd in command to help/assist her in her duties. Gail Schuler feels that Brent and/or Vladimir will lead these forces with the acuity, courage and brilliance of a General Douglas MacArthur or a General George Patton, and that is why she has chosen Brent and/or Vladimir.

28.1(a) Gail has observed that previous military operations have failed because of too much political involvement in military strategy (like the Vietnam war fiasco). Therefore, Brent and/or Vladimir will have complete autonomy, freedom and independence as the leader of his forces. His ONLY restriction is that he must honor CONSPIRACY LAW and Jesus Christ as he conducts his military operations–other than this, he has total freedom to run the ISC any way he wants, including how to train his officers and his enlisted personnel. It is understood that some persons may die during boot camp, because to train an effective military against the Jesuit Order requires turning out tough troops (like the U.S. had during World War II). During World War II, some persons died during training, because the training had to be tough to turn out an effective military. Therefore, the use of women for certain positions is not encouraged. This will be an international military coalition and it is possible that a Russian and a German and an American may be working side by side in the military operations.

28.1(b) If persons die or become maimed during training, the boot camp leader in charge of the training that caused the death will not be held accountable as long as he/she can make the following statement on GCFNC (and pass 666-Computer lie-detection) while making the statement: I did not deliberately try to kill or maim this person who died (or became maimed) during training, but, unfortunately, the death or injury occurred as a result of the tough training required to turn out an effective military against the Jesuit Order.

28.1(c) All persons who die or are maimed during training, are considered full military persons and their families and/or dependents will be taken care of, like any U.S. military family would be taken care of when their loved one dies or is maimed in the service of his/her country.

28.1(d) Brent and/or Vladimir does not have to use any women in leadership positions (although I am a woman and I have established this military organization), nor does he have to worry about discrimination lawsuits when he appoints the officers of the INTERNATIONAL SATELLITE COALITION. It is my desire that he feels free to choose those people that he feels are best qualified for the officer positions in the INTERNATIONAL SATELLITE COALITION (and I don’t want him to be concerned at all about discrimination as he chooses these persons). I have observed that discrimination lawsuits in the military have weakened our military and have resulted in less qualified persons achieving leadership positions in the military. I feel that discrimination lawsuits against the military have been an effective strategy used by the Jesuit Order to weaken the U.S. military–for this reason, we will not allow discrimination lawsuits to weaken our ISC.

28.1(e) Because our enemy is savvy and brilliant and tenacious, we need the best military possible to deal with them, and if we have to obsess over whether we are discriminating when we choose our personnel, we cannot focus on our main mission, which is to defeat Jesuit terrorism. Therefore, I want Brent and/or Vladimir to focus, not on whether he is discriminating (when he chooses the officers for this military organization), but rather to focus on choosing the best qualified persons for the officer positions. I want him to feel free to choose the best persons for the officer positions, even if this means he does not choose any blacks or women or any minority persons for officer positions. If it turns out that the best are not women or blacks or minorities, then so be it.

28.1(f) After Brent and/or Vladimir (or his second in command) has appointed any officer for a position in the INTERNATIONAL SATELLITE COALITION, he (or his second in command) will make a statement under 666-Computer lie-detection on GCFNC, in which he will state that he feels he has chosen the best qualified person for this position. As long as he passes 666-Computer lie-detection when he makes this statement, then that person will be appointed as the officer for the position for which he/she has been appointed.

28.2 The members of the INTERNATIONAL SATELLITE COALITION will be chosen from the members of the REGISTERED SATELLITE PRACTITIONERS or PLP networks (for the MEDIC CORPS–see Sect. 28.2a) of the COALITION COUNTRIES (see rest of this Section 28.2) and from the regular military personnel from the COALITION countries. The COALITION COUNTRIES (or the military members of the INTERNATIONAL SATELLITE COALITION) are the military forces of the United States, Germany, Poland, Austria, Australia, New Zealand, China, Japan, Russia, Kazakhstan, Thailand, Indonesia, Afghanistan, the Ukraine, Romania, the Netherlands, the United Kingdom, Ireland, Italy, Norway, Sweden, Denmark, Finland, Iceland, India, Saudi Arabia, the Philippines, and Israel OR ANY COUNTRIES or PERSONS THAT THE INTERNATIONAL PRESIDENT OR Brent and/or Vladimir CHOOSES TO WORK WITH BECAUSE THOSE COUNTRIES’ LEADERS or PERSONS FEAR GOD MORE THAN MEN AND HAVE GOOD RESULTS FROM THE FEAR ANALYZER CORPS. Any of the countries listed above could be cancelled at any time or may only be partially used and other countries may be added to the list. The determining factor in choosing persons or countries to work with will be how that country or person does (as determined by the FEAR ANALYZER CORPS). We choose to work with nations and persons that fear God more than men.

HOW TO DEAL WITH CORRUPTION WITHIN THE INTERNATIONAL SATELLITE COALITION and the ENTIRE CONSPIRACY LAW NETWORKTHE FEAR ANALYZER CORPS

28.2.1(a) Because the ISC and the CONSPIRACY LAW network is such a large organization involving many countries, there is certain to be corruption within the ISC. It is naive and unrealistic to expect such a large organization as ours to be free from betrayal and corruption, especially when we have an enemy that is so brilliant at infiltration. We need some way to monitor our own military to ensure we catch any traitors, especially among our leadership. To allow betrayal within our own ranks will surely cost us the victory in this war.

28.2.1(b) Since we are a BIBLE honoring military, the traitors among our own would be those who do not fear God, but fear men. There is an old, wise saying: A person either fears God or fears men. You can’t fear both and the one you fear is the one you will serve.

28.2.1(c) NO ONE IS ALLOWED TO BE A COMFORTABLE LEADER IN THE INTERNATIONAL SATELLITE COALITION OR AS ANY PART OF THE INTERNATIONAL GOVERNMENT, IF THAT LEADER DOES NOT FEAR GOD MORE THAN MEN. We can’t trust a person who does not fear God, but who fears men–that’s the one who will sell us out, if he/she gets a good enough bribe or is put under enough pressure. For this reason, I will establish the FEAR ANALYZER CORPS.

28.2.1(d) The FEAR ANALYZER CORPS will be taken from our INTELLIGENCE CORPS or they can enroll through the military (via the INTERNATIONAL SATELLITE COALITION). All members of the FEAR ANALYZER CORPS must be BIBLE believers and READERS WITH FOCUSED INPUT. The FEAR ANALYZER CORPS have the most important job in all of CONSPIRACY LAW. Their job is to weed out Jesuit traitors who infiltrate into our military and into our LAW ENFORCEMENT positions. For this reason, the requirements to be a member of the FEAR ANALYZER CORPS will be very stiff. Not only must all members of the FEAR ANALYZER CORPS be followers of the BIBLE PROGRAM for LAW ENFORCEMENT PERSONs, but they must read at least four hours of the BIBLE (or its equivalent) a week or be exposed to at least four hours of Bible a week (this can include time listening to Scripture sung to music–such as Handel’s Messiah–since this is a form of Bible exposure) and they cannot listen to any music or watch any media except those that assist them with their job and which strengthens their brain against Jesuit attack. This is almost equivalent to Gail Schuler’s lifestyle and, so far, the Jesuits have never used Gail Schuler as an UNWILLING AGENT. In every spare moment, the FEAR ANALYZER CORPS member should listen to music, such as Handel’s Messiah, which is Bible sung to music and if they listen to other sources of music, it can only be music which assists them in their work. They are absolutely forbidden to listen to any OCCULT MEDIA or to indulge in any habits that would diminish their Bible study time or increase the Jesuits’ ability to use them as UNWILLING AGENTS. They are to be a special elite group and will be paid the highest salary under CONSPIRACY LAW. Every member of the FEAR ANALYZER CORPS will be considered a PRIORITY TWO LEADER (according to Sect. 99 of CL&G) and special attention will be paid to their PERSON-PROGRAM to ensure that amnesia does not interfere with their work. Because it will be hard to find such dedicated and focused individuals, we will recruit the members of the FEAR ANALYZER CORPS from all nations on earth. And, anyone who is qualified (regardless of their race, sex, or ethnicity) will belong to this elite group. They are like the Green Berets of the military. To allow anyone but a BIBLE believer with FOCUSED INPUT (minimum of four hours of Bible exposure a week) to be a member of the FEAR ANALYZER CORPS will bring the death penalty as a JESUIT CONSPIRATOR to those who choose the membership of the FEAR ANALYZER CORPS. This is a select group of persons and does not have to be large, we are more interested in quality than quantity. Their job is to use 666-Computer emotional analysis to determine who among our leadership (this includes CEOs, leaders of countries, generals, etc.) FEARS MEN MORE THAN GOD. This can be determined through 666-Computer analysis.

28.2.1(e) Once this list of leaders within our International government of those who fear men more than God is determined, those who fear men more than God must be analyzed AND SPIED ON on a daily basis to ensure that they have not betrayed us and have gone over to our enemies’ side.

28.2.1(f) By focusing on those leaders who fear men more than God, we won’t waste our time–but will have a fruitful search–because anyone who fears God more than men will be on our side. If anyone betrays us, it will be someone who fears men more than God. You might say, what about UNWILLING AGENTS? No one who is an UNWILLING AGENT can be a leader in the International government and we have other groups that focus on the elimination of UNWILLING AGENTS, but we must not forget that when dealing with such a large group, you cannot assume that everyone is pure and good hearted, so we need to monitor our own–even those who aren’t UNWILLING AGENTS.

You might say, why not just spy on everyone in the ISC? This results in a diluted and less effective effort–and this is a multi-million person operation! Better to concentrate our intelligence efforts on those that have a tendency to betray us because of their outlook. With a focused effort on those that are most likely to be the ones that need investigating, we will more likely find the guilty ones. When the search becomes diluted and we go all over the place and we try to spy on half a million persons–the end result will be that we will find no one. With a concentrated and focused search, we will be quicker and more efficient in locating traitors.

28.2.1(g) So the FEAR ANALYZER CORPS will do a screening every day of all the leadership within all of the International government and of every person who is a LAW ENFORCEMENT PERSON under CONSPIRACY LAW. THEIR SOLE JOB IS TO WEED OUT TRAITORS WITHIN OUR RANKS. NO ONE IS EXEMPT FROM THE FIRST SCREENING, WHICH WILL SCREEN TO SEE WHAT EACH LEADER FEARS: GOD OR MEN. This list will be broadcast and published on GCFNC with daily updates, so that all the world will know which of our leaders fear God more than men or vice versa. Any attempt (direct or indirect) to print an inaccurate list of those among us who fear God or men, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. This way if one on the list that fears men more than God, betrays us, we will less likely be believably accused of being in a conspiracy with them, if they do something wrong and we have to sack them. This will also act as a deterrent to discourage anyone who fears men more than God from joining our side. ALL OF OUR LEADERS AND LAW ENFORCEMENT PERSONS WILL BE SCREENED DAILY TO SEE WHETHER THEY FEAR GOD OR FEAR MEN.

28.2.1(h) Once it is determined which leaders or LAW ENFORCEMENT PERSONs fear men more than God, WE WILL WATCH THOSE THAT FEAR MEN MORE THAN GOD LIKE A HAWK (using the latest satellite/computer technology) and will ANALYZE THEIR EVERY MOVE EVERY DAY–this will be the job of the FEAR ANALYZER CORPS. The FEAR ANALYZER CORPS will be like the KGB of the ISC, except that they will spy on those of our OWN who fear men more than God.

28.2.1(I) You might say, but everyone has a different concept of God. That doesn’t matter, if someone doesn’t fear and respect a higher Being more than they fear and respect men–THEN YOU CAN’T TRUST THEM. In countries like Japan and China, they have a concept of God and many of them will die over this, because they fear God more than men. My Japanese ancestors the Oshu Fujiwara feared their Buddhist God so much, they wouldn’t fight their enemies and ended up losing their country, because they felt that God was against all war. If they had requested war ships from China, they would not have lost their country. Though persons like this may not help us in our war efforts against the Jesuits, they wouldn’t betray us because they would despise the Jesuits for being war lovers. It is our belief that everyone all over the world has a concept of God and they either fear God or they fear men. In just about everyone’s concept of God, they see Him as a Being who metes out justice to those who disobey His commands. Therefore, those who fear God more than men would tend to be courageous and consistent. Those that fear men more than they fear God would be amoral and would do what was convenient or would benefit them, rather than what was RIGHT. Those who fear men more than God– tend to be treacherous, cowardly and traitors.

28.2.1(j) To prove my point, analyze all the Jesuit leaders and see who they fear: God or men–and then present the evidence on GCFNC. All Jesuit leaders (who support the Jesuits’ goal for a worldwide dictatorship), without fail, fear men more than God and this will be how we will weed out traitors within our ranks. Because anyone who is on the side of the Jesuits will be one who fears men more than God. You might say, “How do you know that Jesuits fear men more than God? That is so obvious. I’ve dealt with them for so long and they use more sophistry in their arguments than anyone I’ve ever heard. Anyone who can come up with so many convoluted and illogical arguments to cover up their sins, obviously does not fear God. Ask a Jesuit (under 666-Computer lie-detection) that if God were present, would they feel comfortable presenting their argument before Him as to why they feel they have the right to set up a Jesuit Pope-dictator over the whole world and to eliminate the Jewish race? Their true answer to that question as determined by 666-Computer analysis (not the one they give) will show you plainly that they aren’t concerned IN THE LEAST WHAT GOD THINKS ABOUT THEIR PLANS. You know why they haven’t considered how they should answer to God about their plans to eliminate the Jewish race? BECAUSE THEY FEAR MEN MORE THAN GOD! They’re so busy trying to come up with arguments to justify themselves BEFORE MEN, that they aren’t even concerned over whether their argument would work BEFORE GOD. You know why they aren’t concerned over whether their argument for setting up a Jesuit-Pope and eliminating the Jewish race would work–in front of God? Because THEY AREN’T EVEN THINKING ABOUT GOD’S OPINION IN THE MATTER! THIS SHOWS YOU THEY FEAR MEN MORE THAN GOD–and they only use God’s name because it is convenient. THEY DON’T GIVE GOD THE TIME OF DAY. THE JESUITS ARE JUST LIKE THE PHARISEES AND SADDUCEES–more concerned about appearances than in a genuine and authentic Christianity. HEY JESUITS, I GOT A SURPRISE FOR YOU. SURPRISE. SURPRISE. SOMEDAY YOU WILL APPEAR BEFORE GOD AND GOD WILL INVITE YOU TO PRESENT YOUR ARGUMENTS ABOUT WHY YOU TRIED TO ELIMINATE THE JEWISH RACE. ARE YOU READY TO GIVE HIM YOUR ANSWER? I BET YOU HAVEN’T EVEN THOUGHT ABOUT IT. YOU POOR DELUDED FOOL.READ REVELATION 20:11-12. GOD HAS AN APPOINTMENT FOR YOU AND WILL INVITE YOU TO PRESENT YOUR ARGUMENTS. WHY DON’T YOU GET READY FOR YOUR “DIALOGUE” WITH GOD AT THE WHITE THRONE JUDGMENT AND SEE HOW IMPRESSED HE WILL BE. I KNOW, YOU THINK YOU WON’T BE THERE. IF YOU HAD ANY WISDOM, YOU’D BE MORE CONCERNED ABOUT PREPARING YOUR ARGUMENT FOR GOD ABOUT YOUR MOTIVES FOR WHAT YOU DO ON PLANET EARTH. ARE YOU READY TO ANSWER HIM AT THE WHITE THRONE JUDGMENT FOR YOUR LIFE? I BET YOU HAVEN’T EVEN THOUGHT ABOUT IT, BECAUSE YOU ARE SO BUSY WORRYING WHAT PUNY, SINFUL MEN THINK ABOUT YOU AND YOU DON’T EVEN CARE WHAT GOD THINKS. WELL, SOMEDAY YOU WILL WORRY WHAT GOD THINKS AT THE WHITE THRONE JUDGMENT, BECAUSE THAT’S WHERE YOU WILL END UP. ARE YOU READY FOR YOUR APPOINTMENT TO PRESENT YOUR ARGUMENTS BEFORE GOD FOR YOUR ACTIONS (AND MOTIVES FOR YOUR ACTIONS) ON PLANET EARTH? TRY USING THOSE BIG COLLEGE WORDS ON GOD IN YOUR ARGUMENTS AND SEE IF HE IS IMPRESSED. YOU MIGHT IMPRESS MEN WITH YOUR SOPHISTICATED LANGUAGE, BUT YOU WON’T MAKE A DENT WITH GOD. IN FACT, THAT’S WHY YOU USE SOPHISTICATED LANGUAGE and BIG WORDS, BECAUSE YOU WANT TO IMPRESS MEN. You see, I have these Jesuits all figured out, that’s why I figured that the FEAR ANALYZER CORPS would be the best way to weed out Jesuit-supporters within our ranks.

In fact, on GCFNC we will ask the Jesuits leaders all the underlined questions in the above section. Their true answer as determined by 666-Computer analysis will be presented on GCFNC. This will be solid evidence that to judge a man by whether he fears God or men is an excellent way to determine who is on our side and who is on the Jesuits’ side.

Note of interest: Notice in Rev. 21:8 that the first quality on the list is the “fearful”–the “fearful” here refers to the FEAR OF MEN–those that fear men more than God are THE TYPE who will go into the lake of fire. In Proverbs 1:7–“The fear of the Lord IS THE BEGINNING OF KNOWLEDGE: but fools despise wisdom and instruction.” Do a word study of “the fear of the Lord” in Proverbs–it’s ALL OVER PROVERBS. The “fear of the Lord” is obviously a VERY IMPORTANT QUALITY TO HAVE TO PLEASE GOD. Dr. Spiner will present a message at our German church and it will be presented on the GCFNC PRAYER CHANNEL about the character qualities that the fear of the Lord brings in a person’s life and the character qualities that the fear of man brings in a person’s life–today’s date is 2-7-05.

28.2.1(k) You might say, “Should we remove all leaders who fear men more than God?” NO, WE WILL JUST WATCH THEM. They will be on our watch list. ONCE WE HAVE EVIDENCE THAT THEY ARE TRAITORS, THEN THEY ARE GONE and will suffer the full consequences of CONSPIRACY LAW.

28.2.1(l) But, because people change and sometimes their fears change, we must do this fear analysis every day to see which new leaders fear God more than men or vice versa. Usually when one has a tendency to fear God more than men that is rather permanent and the same when one has a tendency to fear men more than God. So, this is a pretty accurate way of weeding out those we shouldn’t work with.

28.2.1(m) God has shown me that we have a serious problem of betrayal in our ISC and this is why I experienced such a lousy day at Wal-Mart today, where I felt like I almost would faint, and where I was deluged with UNWILLING AGENTS in spite of recent laws I wrote to prevent this. This betrayal has seeped down into our MEDIC CORPS, so that the PLPs and RSPs who monitor my care are not doing their job right and I am suffering unnecessarily because of this. We have Achans in our camp and they must be removed or else we will lose this war.

28.2.1(n) To be a FEAR ANALYZER is a very important job, and once any traitor is discovered he/she must be written up in a CONSPIRACY REPORT and the International President and those leaders who are on our side, will confer and decide what to do about the traitor. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. TRAITORS must be dealt with harshly to show that we are not in sympathy with their orchestrations, or else we could be blamed for their crimes. The extent of their damage must be determined and it must be corrected thoroughly and as soon as possible. If the death penalty must be meted out, then maybe this is the best course. It goes without saying, that that leader must be impeached and removed from his/her leadership position.

Also, to give ourselves the right image and to show that we don’t participate at all in Jesuit conspiracies and that we don’t side with those that have the Jesuit mentality of situation ethics and of fearing men more than God–we will honor those that fear God more than men –these God fearing persons will be honored with more responsibilities and leadership within the International government.

Also, our auditing teams and the military leaders of the ISC will regularly audit the FEAR ANALYZER CORPS and will make auditing of this group a TOP PRIORITY, since the FEAR ANALYZER CORPS may very possibly have the most important job in all of CONSPIRACY LAW!

28.2.1(o) Any direct or indirect (willing and knowing) attempt or action to allow any leader of the International government or of the ISC to retain his/her position, when that leader is a traitor and helps out the Jesuits, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. God gave me a hint about Poland and the Ukraine with emphasis on the number 24 and on P’s (longitude 24?)–check this out–maybe there is something fishy going on at the Poland/Ukraine border–.

******************************************

28.2(a) Because certain countries like Russia and the United Kingdom, do not have REGISTERED SATELLITE PRACTITIONERS or PLPs, we would use the members of their military forces only in the INTERNATIONAL SATELLITE COALITION (including the MEDIC or PRISONER CORPS). However, if there are qualified satellite or medical practitioners from Russia, for example, that Brent and/or Vladimir wants to use in the INTERNATIONAL SATELLITE COALITION, it is always possible to enlist this satellite or medical practitioner into the Russian military, and then he/she will be qualified to be used as part of the INTERNATIONAL SATELLITE COALITION (including the MEDIC or PRISONER CORPS).

THE MEDIC AND PRISONER CORPS:

28.2(a.1) SIGNIFICANT PERSONS (like Pres. George W. Bush, Vladimir Putin, Gail Schuler, Misao Fuller, Bill Fuller, etc.) will be placed under the 666-Computer and satellite computer control of the MEDIC CORPS. Those PLPs or RSPs who want to continue to have 666-Computer or satellite computer control over their SIGNIFICANT PERSON, must enroll in the INTERNATIONAL SATELLITE COALITION and become a member of the MEDIC CORPS. There is no problem is assigning certain members of the MEDIC CORPS for certain SIGNIFICANT PERSONs and it is very possible that the same American PLPs and RSPs who have 666-Computer and satellite computer control over Pres. Bush will continue to have 666-Computer and satellite computer control over him, except that they will not only be members of the American PLP and RSP network, but also members of the MEDIC CORPs and must obey orders from their superiors and work from the computers and satellites of the INTERNATIONAL SATELLITE COALITION.

28.2(a.1.1) Another reason for the creation of the MEDIC CORPS is to show our solidarity as an international community against Jesuit terrorism and to minimize Jesuit attempts to cause schisms between countries of the International government.

28.2(a.1.2) The MEDIC CORPS will work from 666-Computers and satellites of the INTERNATIONAL SATELLITE COALITION.

28.2(a.1.3) All members of the MEDIC and PRISONER CORPS are considered LAW ENFORCEMENT PERSONS with all the rights and responsibilities of LAW ENFORCEMENT PERSONS and must obey all the laws for PLPs and RSPs (especially to be screened by the AMNESIA CORPS), except that they are not segregated by country–and must also obey orders from their superiors in the INTERNATIONAL SATELLITE COALITION.

28.2(a.1.2) This is because we are in a war and SIGNIFICANT PERSONs are extremely targeted by the enemy. The MEDIC CORPS will be specialists in war medicine and will be the best practitioners for SIGNIFICANT PERSONS. The MEDIC CORPS will use pioneering satellite/computer technology on soldiers or SIGNIFICANT PERSONs and may be able to administer superior first-aid and medical care (via 666-Computer/satellite technology) while injured or ill soldiers or SIGNIFICANT PERSONs wait for regular medical care or for military ambulances and other services to arrive.

28.2(a.2) The MEDIC CORPS will be an international military medical corps under the direction of the officers of the INTERNATIONAL SATELLITE COALITION and will be considered full military members of the ISC, and must obey orders from their military superiors–they will utilize both traditional medicine and pioneering medicine using satellite/computer technology as part of their services.

28.2(a.3) The MEDIC CORPS will be unique in that, unlike the PLP and RSP networks, they are not strictly segregated by country. The accountability for the MEDIC CORPS will reside with the officers of the INTERNATIONAL SATELLITE COALITION, since all members of the MEDIC CORPS must obey their superior officers. Brent and/or Vladimir can sack anyone in the MEDIC CORPS he doesn’t like (because that MEDIC CORPS member isn’t doing his/her job according to military orders from their superiors).

28.2(a.4) The members of the MEDIC CORPS will be drawn from the countries of the INTERNATIONAL SATELLITE COALITION: the United States, Germany, Austria, Australia, New Zealand, China, Japan, Russia, the United Kingdom, Ireland, Italy, Norway, Sweden, Denmark, Finland, Iceland, India, Saudi Arabia, the Philippines, and Israel OR ANY COUNTRIES or PERSONS THAT THE INTERNATIONAL PRESIDENT OR Brent and/or Vladimir CHOOSES TO WORK WITH BECAUSE THOSE COUNTRIES’ LEADERS OR PERSONS FEAR GOD MORE THAN MEN AND HAVE GOOD RESULTS FROM THE FEAR ANALYZER CORPS. Any of the countries listed above could be cancelled at any time or may only be partially used and other countries may be added to the list. The determining factor in choosing persons or countries to work with will be how that country or person does (as determined by the FEAR ANALYZER CORPS). We choose to work with nations and persons that fear God more than men.

28.2(a.5) A subdivision of the MEDIC CORPS will be the PRISONER CORPS, who will tend to the medical needs of the Jesuits and Jesuit conspirators in our custody. This is because we already have millions of Jesuits in our custody and we need a special military medical branch to have 666-Computer or satellite computer control over the Jesuits and/or their conspirators in our custody. The PRISONER CORPS will also be drawn from all the countries of the INTERNATIONAL SATELLITE COALITION and are full military members of the INTERNATIONAL SATELLITE COALITION.

28.2(a.6) The PRISONER CORPS are responsible to ensure that full mind-reading and memory reading of all Jesuits and Jesuit conspirators in our custody takes place, so that we can have maximum intelligence in our war against Jesuit terrorism. The PRISONER CORPS will be trained in interrogation techniques (using 666-Computer and satellite technology) to be used on those Jesuits and Jesuit conspirators in our custody.

28.2(a.7) Any member of any CONSPIRACY LAW SUPPORT NETWORK or any other CONSPIRACY LAW NETWORK which could be useful to the INTERNATIONAL SATELLITE COALITION can be borrowed to work for the ISC. However, any member of any other CONSPIRACY LAW network who does any work for the ISC must be a full military member of the ISC and will be expected to obey orders from his/her superiors in the ISC and must also obey all CONSPIRACY LAWS which apply to his/her work. In this manner, all work done by the ISC (such as programming computers or conducting audits) will have accountability, since the accountability will reside with the superior officer who gave the order for the work. No work is to be done for the ISC by anyone who is not a full military member of the ISC and who is not accountable to a military officer of the ISC. The worker does not have to be a full-time worker for the ISC, but must be a full military member of the ISC–see Sect. 55 & 56 of INTERNATIONAL PLP and RSP-NETWORK CONFIGURATIONS.

28.3 All enlisted and officer personnel (including the MEDIC CORPS) of the INTERNATIONAL SATELLITE COALITION are LAW ENFORCEMENT PERSONS and will be treated as LAW ENFORCEMENT PERSONS according to CONSPIRACY LAW. This means that no military person in the INTERNATIONAL SATELLITE COALITION can be an UNWILLING AGENT or a JESUIT or a JESUIT supporter.

28.3(a) Any (direct or indirect) willing or knowing attempt (or action) by any person to allow any person to be a member of the INTERNATIONAL SATELLITE COALITION, when that person is not qualified because he/she violates the CONSPIRACY LAW guidelines for LAW ENFORCEMENT PERSONS (for instance, maybe the person is an UNWILLING AGENT)–will bring the death penalty as a JESUIT CONSPIRATOR to that violator who allowed an unqualified person to be a member of the INTERNATIONAL SATELLITE COALITION.

28.4 All officers for the ISC (INTERNATIONAL SATELLITE COALITION) must be appointed to their position by Dr. Brent Spiner or his second in command. Any person who is (directly or indirectly) willingly and knowingly allows any person to hold any officer position in the ISC, when this person has not been appointed by the COMMANDER (Brent and/or Vladimir) or by the COMMANDER’s second in command to this officer position, will bring the death penalty as a JESUIT CONSPIRATOR to that person who allows an UNAPPOINTED person to be in an ISC officer position.

28.4(a) An APPOINTED PERSON is an officer (or any person who holds the responsibilities of any officer position in the ISC) and who has been appointed to this leadership position by the COMMANDER (Brent and/or Vladimir) or by his second in command. This would hold true, even if that leader has not been commissioned as an officer, but holds the responsibilities of an officer. The lines of command need to be firmly drawn and no person should perform any officer responsibilities unless that person has been commissioned as an officer and has been appointed by the COMMANDER or by his second in command to this leadership position. The use of any person in any leadership position (which would entail the responsibilities of any officer), will bring the death penalty as a JESUIT CONSPIRATOR to any person who (directly or indirectly) willingly and knowingly allows such an UNAPPOINTED PERSON to hold this leadership position.

28.4(b) An UNAPPOINTED PERSON is any person who performs the responsibilities of a military officer and who has not been appointed to this position by the COMMANDER or by his second in command.

28.5 Should the COMMANDER die or be incapacitated, he/she will write a will in which he will state who he wants to take his place and how he desires the officer corps to be constructed and who he wants in the various leadership positions. The International government will honor the COMMANDER’s will, as long as the will does not violate the guidelines of CONSPIRACY LAW.

28.6 Any action/strategy carried out by the ISC, cannot be carried out, until the person who outlined the action/strategy gives this action/strategy a name (probably a code name) and puts in writing the details of this action/strategy (how, when, where, who, etc. and all essential aspects of this strategy must be written out with enough detail so that a person unfamiliar with the strategy could read the directive and carry out the strategy on his/her own).

28.6(a) Once this action/strategy is written out [as outlined in this Sect. 28 and identified with a code name (and each code name should be unique so that there will be no confusion about which strategy is being carried out)], then the person(s) who wrote out and created the strategy will make a statement under 666-Computer lie detection on GCFNC, in which he/she will state that this strategy as it is written out under its code name (and will identify the strategy by its code name) has been planned, and will be carried out to honor CONSPIRACY LAW and to conform to the maximum to the guidelines and principles of CONSPIRACY LAW, and that this strategy is designed to defeat the goals of the Jesuit Order. Once the ISC creators and writers of any strategy pass 666-Computer lie detection on GCFNC, then that strategy is an APPROVED STRATEGY and can be carried out (implemented).

28.6(b) If while the person makes the above statement and fails 666-Computer lie detection, while making the above statement, then the strategy cannot be carried out (it is an UNAPPROVED STRATEGY), and if any person willingly and knowingly attempts to (or actually does carry out) any UNAPPROVED STRATEGY, then that person will receive the death penalty as a JESUIT CONSPIRATOR.

28.6(c) All modifications to any APPROVED STRATEGY, need to be written out (as outlined in Sect. 28) and given a new code name and any creators of any modification, must go on GCFNC and make the statement of Sect. 28.6a before the modification can be carried out.

28.7 A very important section of the ISC, will be its SATELLITE INTELLIGENCE CORPS. The SATELLITE INTELLIGENCE CORPS will be drawn from the INTELLIGENCE COMMITTEES (see Sect. 53 of 666-Computer or Satellite Computer Laws for PLPs and RSPs) of all non-terrorist nations of the world and will be drawn from any other CONSPIRACY LAW network which the COMMANDER desires to use. Each INTELLIGENCE COMMITTEE will assign certain of its members to be military intelligence personnel (in the SATELLITE INTELLIGENCE CORPS), whose job will be to inform the COMMANDER and his second in command, about the operations of the Jesuit Order, so that the war strategies used against the Jesuit Order will be most effective.

THE MANAGEMENT REPORT OF THE SATELLITE INTELLIGENCE CORPS:

28.7(a-1) The SATELLITE INTELLIGENCE CORPS must analyze every day which CONSPIRACY LAWS are the most violated throughout the International government and determine what can be done, especially in the management of personnel, to address and fix these violations.

28.7(a-1.1) This analysis will be listed out according to each CONSPIRACY LAW. Each CONSPIRACY LAW which must be enforced under CONSPIRACY LAW will be listed and analyzed in the MANAGEMENT REPORT. So, let’s take for example, the SLEEP DISRUPTION LAWS. This law would be mentioned as a heading, and the percentage and quality of compliance to this law would be analyzed. If the percentage or quality of compliance is to the SLEEP DISRUPTION LAW is/are low then the reasons for this would be analyzed, including an analysis about whether there are enough personnel applied to enforce this law to ensure its adequate enforcement and whether the personnel assigned to monitor this law are the right personnel for the job and so forth and so on. And the entire MANAGEMENT REPORT would be set up in this manner, so that each CONSPIRACY LAW is analyzed for the quality and level of compliance to the law. Those CONSPIRACY LAWs which are related would be lumped together, to help the COMMANDING OFFICERS and the International President get accurate overviews about enforcement problems in CONSPIRACY LAW. This way the International President and the COMMANDING OFFICERS can get an accurate and organized overview about how well CONSPIRACY LAW is being enforced throughout the various CONSPIRACY LAW agencies and networks and they will readily recognize areas of weaknesses (especially weaknesses in how personnel are managed throughout the CONSPIRACY LAW networks). Charts, statistics and an organized presentation must be the way in which the MANAGEMENT REPORT is reported to the COMMANDING OFFICERS and the International President– since the use of visuals will help to make the personnel problems (and recommended solutions) more visible and understandable.

28.7(a-2) THIS IS ONE OF THE MOST IMPORTANT JOBS IN CONSPIRACY LAW and only the best and most qualified persons should work for the SATELLITE INTELLIGENCE CORPS!

28.7(a-3) Once the SATELLITE INTELLIGENCE CORPS determines which CONSPIRACY LAWS are the most violated–it must present evidence about why this is so and must present possible management solutions to change this bad scenario. This briefing about the areas of weakness (especially management weaknesses) in the enforcement of CONSPIRACY LAW and which CONSPIRACY LAW organizations are operating least effectively and what can be done to fix the problem for those networks (who are failing abysmally to enforce those portions of CONSPIRACY LAW which fall under their jurisdiction), will be called the MANAGEMENT REPORT of the SATELLITE INTELLIGENCE CORPS.

28.7(a-3.1) This MANAGEMENT REPORT by the SATELLITE INTELLIGENCE CORPS must include recommendations about the number and kind of personnel required for different CONSPIRACY LAW organization (such as the TSS networks, the ACUPUNCTURE CORPS, the PLP networks, the RSP networks, the FEAR ANALYZER CORPS, etc.). For instance, some CONSPIRACY LAW organizations may need a decrease in personnel or may need persons to be transferred to other organizations and other organizations may desperately need more personnel.

28.7(a-3.2) It is the job of the SATELLITE INTELLIGENCE CORPS to manage the number and kind of personnel present in all the organizations which enforce CONSPIRACY LAW, and to ensure that ALL organizations that enforce CONSPIRACY LAW have the personnel they need to get the job done and to determine which personnel AND HOW MANY should be assigned to each CONSPIRACY LAW organization and to determine any transfers of personnel needed to make sure that all CONSPIRACY LAW organizations are operating at maximum efficiency and to ensure that all CONSPIRACY LAW organizations are using the amount of personnel needed and that each CONSPIRACY LAW network has the best qualified personnel for that organization.

28.7(a-3.3) This is a catastrophically important upper management personnel analysis which must be made and updated continually, since the Jesuit terrorists continually change their strategies and some of our CONSPIRACY LAW organizations are failing abysmally to enforce those laws under their jurisdiction. The reason for these law enforcement failures must be determined and personnel changes must be made to ensure that CONSPIRACY LAW is enforced to the fullest extent possible.

28.7(a-3.4) For instance, the use of UNWILLING AGENTS by Jesuits is a problem of epidemic proportions– and, perhaps, we need more personnel (or perhaps more qualified personnel) in those CONSPIRACY LAW organizations (such as the UNWILLING AGENT COUNSELOR CORPS) which deal with UNWILLING AGENTS. Problems such as this must be addressed in the MANAGEMENT REPORT. Or perhaps it will be determined that there must be a special division in the ISC which is devoted to satellite intelligence and that more personnel need to be assigned to this division, since it appears our ability to prevent CONSPIRACY LAW satellite violations has also been an abysmal failure. Perhaps, increasing the portion of our ISC military devoted to satellite warfare intelligence may help us in this area of weakness. Also, if we can decrease the ability of Jesuits to use UNWILLING AGENTS, this will help us in all areas of CONSPIRACY LAW violations

28.7(a-4) No MANAGEMENT REPORT can be presented to any superior by the SATELLITE INTELLIGENCE CORPS until those who made the report state under 666-Computer lie-detection and emotional analysis that proper research was made for this report. The statistics and evidence compiled to reach various conclusions must be included in the MANAGEMENT REPORT. And the writers of this MANAGEMENT REPORT must state under 666-Computer lie-detection and emotional analysis that they have presented accurate statistics and evidence and have used the statistics and evidence that are needed to adequately analyze the effectiveness of the various CONSPIRACY LAW networks in enforcing CONSPIRACY LAW. The SATELLITE INTELLIGENCE CORPS must work strongly with the auditing networks, since the auditing networks can contribute valuable information about personnel deficiencies within the various CONSPIRACY LAW networks.

28.7(a-5) However, the SATELLITE INTELLIGENCE CORPS will be a more proactive group than the auditing networks, since they will analyze the personnel problems and DETERMINE specific SOLUTIONS, their recommended SOLUTIONS must be included in the MANAGEMENT REPORT.

28.7(a-6) Those SATELLITE INTELLIGENCE CORPS writers who write the MANAGEMENT REPORT (and who recommend the solutions suggested in the MANAGEMENT REPORT) must subject themselves to 666-Computer lie-detection –in which they will state that they have come up with what they feel are the most effective personnel solutions to the problems they have discovered as a result of their analysis of the law enforcement problems within the entire CONSPIRACY LAW networks of the International government. They will certify under 666-Computer lie-detection that the evidence, statistics and information which have been compiled in their MANAGEMENT REPORT are accurate to the best of their knowledge and they have used these statistics and evidence to come to the conclusions reached in the MANAGEMENT REPORT and that the recommendations suggested in this MANAGEMENT REPORT have been made according to the guidelines of this Sect 28.7 and are the best recommendations that the authors of this report can come up with, in order to maximize compliance to CONSPIRACY LAW when it comes to the use of personnel within the CONSPIRACY LAW networks. If they cannot pass 666-Computer lie-detection regarding the above italicized statement, then the report must be done over until they can pass 666-Computer lie-detection regarding the above italicized statement.

28.7(a-7) The authors of the report must be members of the SATELLITE INTELLIGENCE CORPS. Any willing and knowing attempt or action by any member of the SATELLITE INTELLIGENCE CORPS to present a faulty, deficient, or inaccurate MANAGEMENT REPORT to their superiors with the intent to encourage violations of CONSPIRACY LAW, will bring the death penalty as a JESUIT CONSPIRATOR to that violator, and that SATELLITE INTELLIGENCE CORPS member must be replaced by another worker.

28.7(a-8) A MANAGEMENT REPORT must be included (at least once a week) in the briefings presented to the ISC Commanders.

28.7(a-9) ISC Commanders must act on the MANAGEMENT REPORT and present a FOLLOW-UP REPORT TO THE MANAGEMENT REPORT to the International President. The FOLLOW-UP REPORT will state which actions have been taken to address the problems brought up in the MANAGEMENT REPORT. The FOLLOW-UP REPORT must also be certified by its writer (under 666-Computer lie-detection and emotional analysis) to be an accurate report of the actions taken to correct problems addressed in the MANAGEMENT REPORT.

28.7(a-10) All MANAGEMENT REPORTS and their FOLLOW-UP REPORTS will be presented on GCFNC in GCFNC’s headline news or in prime time news slots. Our upper management reports and the actions taken to correct problems within the administration of the International government will not be concealed from the people and to show that we have good intent –all these reports will be publicized on GCFNC. Any willing and knowing attempt or action by any person to write a false, inaccurate, incomplete, deceptive, confusing, misleading MANAGEMENT REPORT or FOLLOW-UP REPORT or to willingly and knowingly write these reports in a manner that would assist the Jesuit Order, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

*******************************

28.7(a) All members of the SATELLITE INTELLIGENCE CORPS must write out their BRIEFINGS (which they will give to their head officer). The BRIEFINGS must include a MANAGEMENT REPORT–see Sect. 28.7(a-1) through (a-10)– at least once a week. The head officers of the SATELLITE INTELLIGENCE CORPS cannot present their intelligence briefings to the COMMANDER (or his second in command) until they pass 666-Computer lie detection while making the following statement: To the best of my knowledge and/or ability, I have presented to the COMMANDER or to his second in command, the most comprehensive, accurate, up to date, and important information (intelligence) which I am aware of and which he/shes needs to know in order to conduct effective military strategy and operations against the Jesuit Order.

28.7(b) No BRIEFING can be presented to the COMMANDER or his second in command, until the BRIEFING presenter (the head officer of any SATELLITE INTELLIGENCE CORPS section) passes 666-Computer lie detection as he/she makes the above statement. It goes without saying that no UNWILLING AGENT or JESUIT can be a member of the SATELLITE INTELLIGENCE CORPS and that all members of the international SATELLITE INTELLIGENCE CORPS are considered LAW ENFORCEMENT PERSONs and will be treated as LAW ENFORCEMENT PERSONS (according to CONSPIRACY LAW).

28.7(c) All members of the SATELLITE INTELLIGENCE CORPS, must write at least daily BRIEFINGS unless under extreme duress (to show that they are making sincere efforts to obtain accurate and up to date intelligence to assist the COMMANDER in his war efforts). The head officer of each section of the SATELLITE INTELLIGENCE CORPS will decide which BRIEFINGS need to be presented to the COMMANDER or to his second in command. Each head officer of members of any SATELLITE INTELLIGENCE CORPS will make the following statement every hour (under 666-Computer lie-detection) on GCFNC’S MILITARY CHANNEL: I have screened all briefings presented to me and have ensured that all those intelligence workers under my jurisdiction have presented their briefings to me in a timely and accurate manner as defined by Sect. 28 of ICL:ST, and I have determined to the best of my ability which of these briefings need to be presented to the COMMANDER or his second in command and have not willingly and knowingly omitted, altered, deleted or delayed any BRIEFING or intelligence information which the COMMANDER needs to be aware of and have done all in my power to ensure that the COMMANDER has all the intelligence information he needs to conduct effective warfare against the Jesuit Order.

28.8 Because the ISC is a large military operation, GCFNC will establish another channel, called the GCFNC MILITARY CHANNEL. Whenever a major news broadcast covers any press conference or other event which discusses the work of our INTERNATIONAL SATELLITE COALITION, our reporters will be there and will encourage participants in the press conference or event to tune into the GCFNC MILITARY CHANNEL to get full and comprehensive coverage of the press conference from the perspective of GCFNC and CONSPIRACY LAW. For instance, there is an American press conference taking place right now (6-23-05) at 11:30 a.m. with Sec. of Defense Donald Rumsfeld and some of our generals, but these leaders cannot discuss the aspects of the war operation on the major news channels that involve enforcement of CONSPIRACY LAW–these aspects can be revealed and discussed on GCFNC.

28.8(a) A big problem we have with this war against Jesuit terrorism is that Jesuits disguise their war operations as natural disasters, and this helps the Jesuits to conduct warfare against the International government and to disguise it as a natural disaster. In this way, whenever anything goes wrong in that natural disaster, the Jesuits can make their enemies appear incompetent and uncaring, because the population doesn’t see the event as an act of war, but as a natural disaster.

It is very important for the public to realize that an event such as hurricane Katrina is an act of war against the International government (veiled as a natural disaster). In this way, the public will have the proper perspective about the event and its aftermath.

This is what is happening with hurricane Katrina which hit the Gulf coast of the U.S. in August. One of the goals of the GCFNC MILITARY CHANNEL will be to show that many “natural disasters” which occur are actually acts of war against the International government. Whenever GCFNC reports any “natural disaster” which is, in actuality, an act of war, we will report it with a totally different slant from the established news media.

The reporting will go something like this:

The Jesuit military attack against the United States with hurricane Katrina has produced an economic and health calamity. We have evidence that the Jesuits deliberately guided this satellite orchestrated hurricane to hit the oil rigs in the Gulf, so as to weaken the economic base of their enemies. The evidence for this will be presented. Further, the Jesuits used this satellite attack on the U.S. to create anarchy in the Gulf states (the evidence for this will be presented) and then they used UNWILLING AGENT persons as soldiers in the Jesuit army to attack our soldiers in the form of looting and sniper attacks (the evidence for this will be presented). We have suffered the following casualties from our military forces as a result of retaliation from the Jesuit soldiers (who have been looting and shooting at people) at the New Orleans battlefront: names and identification will be listed.

Several of our military persons were killed by Jesuit directed soldiers at a bank in New Orleans as part of a Jesuit hold-up, in which bank persons were held hostage by Jesuit soldiers. The Jesuits used satellite to attack one of our buses which transported war victims to Houston. Unfortunately, one of the war victims was killed as a result of this Jesuit attack on this bus.

Several generals from our various military branches will present reports on war progress. Perhaps a German general will report on how his soldiers are doing in the New Orleans battlefront. Next, an Israeli general will report on how his soldiers are doing at the New Orleans/Houston battlefront.

We have made the following advances into Jesuit enemy territory at the New Orleans battlefront, but the Jesuits have retaliated by using their soldiers to loot and attack our soldiers as we attempt to save the victims of their attack against us.

Some of the military leaders may not be able to discuss all aspects of military operations on some of the regular broadcast channels, but may be able to discuss these further on the GCFNC MILITARY CHANNEL–perhaps because some of the military strategies may involve heavily CONSPIRACY LAW, which is generally not discussed on major news channels, in order to protect some major news organizations from conspiracy charges by the Jesuits.

On this GCFNC MILITARY channel, will be broadcast all the persons behind military strategies who make statements (about their strategies–see Sect. 28.7) under 666-Computer lie detection and this channel will also broadcast all the statements from the various intelligence officers (who make statements about their BRIEFINGS) under 666-Computer lie detection. It may be necessary to relegate some of these statements onto GCFNC’s web sites. Significant highlights and summaries of the GCFNC MILITARY CHANNEL will be presented in the main GCFNC broadcast channels.

28.8(a.1) The GCFNC MILITARY CHANNEL will also present news broadcasts covering aspects of the war against Jesuit terrorism– perhaps with segments devoted to various areas of combat operations. For instance, the news may report like this: Right now (on 1-10-05) there are major combat operations conducted by the International government’s military operations with the following countries cooperating in this effort: the U.S., Russia, China, Japan, Israel and Germany. In the Pacific Ocean nuclear submarines are going down to the ocean’s bottom and discovering and rooting out Jesuit underground cities. We’ve entered these deep ocean cities and are fighting the enemy inhabitants to remove Jesuits from these cities and to disrupt and destroy their computer/satellite operations. The Jesuits who are still alive and fighting in these Pacific underground operations retaliate by launching major weather attacks (using their satellite/computer capabilities) from these Pacific underground Jesuit cities against Southern California, causing massive flooding and mud slides. The Pacific underground operations have the capability to attack the Western U.S. and to manipulate weather patterns by directing signals towards the clouds and atmosphere and creating weather conditions. The Jesuits’ underground Pacific operations have some capabilities against Gail Schuler and this is a main reason the Pacific attack against the Jesuits has been launched. THE NET in cooperation with the ISC have coordinated military operations to defeat Jesuits in their underground Pacific operations.

28.8(a.2) Or the news may report like this: Several days ago major combat operations took place in underground Antarctica, where a massive and 1,000 to 2,000 ft. deep underground city with many mazes and hidden compartments was discovered. A major victory was achieved by THE NET and the ISC, despite intense opposition from Jesuit forces (from their underground Antarctic operations). Because much of the Jesuit operations which targeted Gail Schuler came from Antarctica, the Jesuits retaliated by increasing their computer/satellite attacks on Gail Schuler, causing her great physical distress and breathing difficulties while the combat was at white heat. Eventually, all Jesuits who mounted an opposition campaign against our forces were machine gunned down and we slaughtered them. This was the only way to stop them, because they would not surrender and we had to ensure that they were really dead before we entered their various underground compounds, some of which were cleverly hidden and could only be discovered after Jesuits had launched attacks against us or against Gail Schuler.

28.8(a.3) Casualties for each country fighting in this war with us will be listed to honor the military dead–though names may be omitted to protect the innocent. The wishes of the dead military person’s family will be respected in the matter.

GABRIELLE CHANA FOX NEWS CHANNEL’ WAR PRAYER CHANNEL

28.8(a.3.1-1) The audience will be informed that all analyses offered on the WAR PRAYER CHANNEL can be used in a court of law as evidence (especially when evidence is needed to establish MOTIVE), and, therefore, any false evidence or analyses presented on the WAR PRAYER CHANNEL will result in the death penalty to the violator (if the violation was done willingly and knowingly).

28.8(a.3.1-2) Also no UNWILLING AGENTS can offer any analyses on this channel, because in a court of law they are considered mentally incompetent, since their brain is under the control of another.

28.8(a.3.1-3) However, we will allow UNWILLING AGENTS to be prayer warriors if they are implicated in a crime which is important to the International government–but UNWILLING AGENTS must be exposed as UNWILLING AGENTS and all IMPOSED PERSONs involved with that UNWILLING AGENT must be treated the same as any other prayer warrior on the WAR PRAYER CHANNEL–that is–666-COMPUTER HISTORIES must be done on all IMPOSED PERSONs involved in the prayer of the UNWILLING AGENT before the prayer of the UNWILLING AGENT is offered up on the WAR PRAYER CHANNEL, and the UNWILLING AGENT must be handled according to Sect. 28.8(a.3.12).

28.8(a.3.1) Because the Jesuits constantly try to kill people and make it appear that an innocent party is to blame, we have created the WAR PRAYER CHANNEL, which is a station on the GCFNC MILITARY CHANNEL to help make it clear to the audience who it is that desires to murder and who it is that desires to save innocent lives, and to make it clear who the troublemakers are and who are the peacemakers. It is especially important to pray over emergencies or over matters that are in progress and which have not been resolved, so that the warring sides in the matter can be clearly established as soon as possible. Jesuits love to muddle sides and create confusion over who is the enemy and who is the friend–and so the purpose of the WAR PRAYER CHANNEL is to clearly establish sides in important matters which concern the war against Jesuit terrorism.

28.8(a.3.2) GABRIELLE CHANA FOX NEWS CHANNEL executive producers will decide which matters need to be brought up on the GCFNC WAR PRAYER CHANNEL. The matters which need to be brought up for prayer are any matters where there could be confusion about who is the guilty party (or who is the party that desires to murder) and should bring up matters which are important in this war against Jesuit terrorism.

28.8(a.3.3) For instance, Molly Henneberg of FOX News was attacked (and had her life threatened) by Jesuits as they tried to murder her (using criminal computer/satellite technology). The attempted murder was set up to make it appear that FOX News, Pres. Bush or Vladimir Putin may have orchestrated the attempted murder. This is an example of a type of item which needs to be prayed for on the GCFNC WAR PRAYER CHANNEL.

28.8(a.3.4) All parties (or organizations) which could be implicated in the murder/crime would need to be the prayer warriors over the attempted crime (or even if the crime has already been carried out). In this instance, Jesuit leaders, Pres. Bush, Vladimir Putin, FOX News executives, etc. would all be the prayer warriors on this prayer channel and they would all pray for the health and life of Molly Henneberg.

28.8(a.3.5) Every prayer offered on GCFNC’s WAR PRAYER CHANNEL must be analyzed by 666-Computer analysis to determine the sincerity of the prayer and the truthfulness of the prayer. If 666-Computer analysis reveals that the prayer was insincere or that the person praying is lying, this must be exposed with 666-Computer evidence on the GCFNC PRAYER CHANNEL and investigations must be launched or 666-Computer analysis must be offered to expose the real motives and desires of the one whose prayer is insincere.. If we selectively choose who will be exposed and who won’t be exposed, then this whole WAR PRAYER CHANNEL will be a joke. Therefore, we must be consistent, and everyone who prays on the WAR PRAYER CHANNEL must have their prayer analyzed for its sincerity and truthfulness, and everyone whose prayer is insincere must be exposed for his/her real motives and what he/she really wants–as opposed to what he/she is praying over. Willing and knowing failure to expose all possible guilty parties [as outlined in this Sect. 28.8(a.3)] on the WAR PRAYER CHANNEL, or the presentation of false evidence, will be a death penalty violation.

28.8(a.3.6) What generally happens in these instances, is that the guilty party (as they pray) gets killed off or attacked by 666-Computer while he/she offers up his/her prayers. To try to prevent this from being a successful evasion tactic, all parties who will participate in the prayer session, will first undergo a complete 666-Computer history, done by our 666-COMPUTER HISTORIANS who will analyze that person’s outlook and history about the matter to be prayed over before he/she begins prayer. This will be done in case that prayer warrior is attacked during prayer. If the prayer warrior is attacked, we will immediately reveal to the audience what we gleaned from this person’s 666-COMPUTER HISTORY before he/she began prayers to show the real motives and desires of this person.

28.8(a.3.7) If, in spite of this, the prayer warrior is made so ill (or is killed) that he/she is unable to pray, then we will immediately bring in another party –if there is another party who can adequately take the place of the one knocked off the prayer group from that organization (which is being attacked) to take up the prayers which the targeted person was praying. If it is not possible to bring in another party, then we will just present the 666-Computer HISTORY we have on that person over the matter prayed over, which should explain why this person was targeted for knock-off. If a replacement is brought onto the set, the person who comes in to take his/her place must also offer an additional prayer for the health and safety of his/her comrade who has been attacked while praying on the GCFNC WAR PRAYER CHANNEL. The sincerity of this replacement’s prayer will be analyzed for truthfulness and honesty on the WAR PRAYER CHANNEL. So, for instance, if ten Jesuits are attacked and 9 get killed off while offering prayers on the WAR PRAYER CHANNEL, we will just keep bringing in more Jesuit leaders to pray and take the place of the one knocked off, until we can get one who won’t be killed off. We’ll do this if we have to bring in 100 Jesuits, before we can find one who won’t be killed off. If anything, if the Jesuits keep this up, everyone in the world will know that this organization consists of a bunch of mad, suicidal murdering maniacs who will stop at nothing–and their attempts to kill of their comrades as they offer prayers on the WAR PRAYER CHANNEL will just make them more heinous and the world will be more determined to wipe off the Jesuit Order from the face of planet earth. All persons who pray on the GCFNC WAR PRAYER CHANNEL must have a complete 666-Computer HISTORY done on them regarding the matters which will be prayed over BEFORE THEY BEGIN PRAYER. This is necessary in case one of these prayer warriors is knocked off during, or right before, prayer.

28.8(a.3.8) If Jesuits keep killing their own off as they offer prayers, then it will make it fairly obvious that they are the guilty party, especially when the prayers of subsequent Jesuits reveal that they like to kill their own or that they like to kill anybody who exposes them or gets in their way.

28.8(a.3.9) Because Jesuits are so stubborn and fanatical, it is anticipated that this WAR PRAYER CHANNEL will be operationg 24/7. Typical items to pray over include: satellite orchestrated hurricanes, the prevention of satellite orchestrates tsunamis, earthquakes, lightning, etc.; the prevention of the spread of AIDS and dangerous illnesses; the peace of the world and the prevention of dangerous dictatorships taking over the planet; that righteous governments will be set up in various countries of the world; that those who murder and kill to promote themselves will be eliminated. If we have all world leaders pray over these matters and have all their prayers for these matters analyzed on the WAR PRAYER CHANNEL, this will really exposed some hearts and will help the world to see who the REAL VILLAINS ARE.

28.8(a.3.10) Other matters to pray over would be for the safe marriage (or consummation of marriage) of Gail to Vladimir and/or Brent. For the health and safety of Vladimir Putin’s, Brent Spiner’s, Gail Schuler’s family, etc. These are all areas where Jesuits attack and where they try to frame innocent parties with their orchestrations, so these are all matters to be prayed over on the WAR PRAYER CHANNEL. Prayers should be offered that Gail can safely acquire the proceeds fron her writings and the awards for her work in law and writing–let’s see who is the REAL VILLAIN that wants to prevent her from getting any money or any awards.

28.8(a.3.11) The purpose of the WAR PRAYER CHANNEL is to expose the hearts of all those involved in this war against Jesuit terrorism, to draw the lines and to make it plain who is (and who is not) the guilty party.

28.8(a.3.12) If an UNWILLING AGENT is one of the prayer warriors, then the IMPOSED PERSON(s) behind the UNWILLING AGENT’s prayers must be exposed in the following manner: the exposure must include which organization(s) is/are behind the IMPOSED PERSON(s), the motives of the IMPOSED PERSON(s) must be exposed, including why these IMPOSED PERSON(s) have taken over this UNWILLING AGENT. Also, every UNWILLING AGENT who prays on GCFNC must be identified as an UNWILLING AGENT and all IMPOSED PERSON(s) involved with that UNWILLING AGENT must be exposed. The execution of these IMPOSED PERSON must also be shown on the WAR PRAYER CHANNEL, so that we don’t create the impression that we delight in the use of UNWILLING AGENTS.

**********************************************

28.8(a.4) Because THE NET and ISC work together in just about all military operations, they will be lumped together and just called the International government’s military operations. They will only be mentioned separately when the other is not involved in the military operation, but this is rarely the case, since both THE NET and the ISC need each other to conduct successful military campaigns against the Jesuits. To erase the Jesuit-induced misconception that the evidence which we’ve uncovered from entering Jesuit operations about the Jesuits’ fanatical hatred of the Jewish race (and especially King David’s descendants) is caused by a German/Israeli conspiracy– when THE NET is working with the ISC, THE NET will never be referred to as the only military operation involved in a campaign. Instead, it will be referred to as a portion of the international combat operation being conducted and interviews of the prime generals behind the strategies (which are from all the countries of the International government) will be made to show just how international this campaign is, and that Germany and Israel often hand over their military decision making to the U.S. generals or Russian generals or other generals in their military decisions.

28.8(a.5) Even though the German/Israeli/Russian/U.S. team lead the operations of THE NET, THE NET works with the ISC in all its military campaigns, so other countries also play a major role in these combats and Germany, Israel, Russia and the U.S. confer with the generals of the ISC in all their combat operation decisions. That this is the case will be emphasized in the news presentations about THE NET, because it is the truth and there is no German/Israeli/Russian/American conspiracy against the Jesuits. All we’ve done on GCFNC is to present the evidence which has been uncovered by all the members of the international government’s military operations as they have unearthed groundbreaking evidence against the Jesuit Order–which is evidence the international government’s military operations have discovered as a result of their military takeovers of former Jesuit operational headquarters.

28.8(a) The International President will determine the salaries and benefits of the ISC military members. These salaries and benefits should be equivalent to what an American soldier makes. Assistance from the International Charity Bank or from other countries in the military COALITION should be obtained to make sure that salaries and benefits are the same for all military members of the ISC based on their rank in the military (including Russian members who normally get paid far less than is necessary for good troop morale).

28.8(b) The international President will use funds from the INTERNATIONAL CHARITY BANK to help victims of Jesuit orchestrated catastrophes (such as hurricanes, floods, earthquakes, war ravaged areas, etc.). He/she will decide how these funds should be distributed, in order to help victims of areas decimated by Jesuit orchestrated catastrophes cause by Jesuit criminal satellite activities. This seems just because the funds for the ICB come from money we’ve confiscated from the Jesuits, and the Jesuits should pay back money to their victims.

28.8(c1) An extension of the INTERNATIONAL SATELLITE COALITION will be the MILITARY POLICE, whose job will be to enforce CONSPIRACY LAW in their territory or beatThey will receive orders from the ADMINISTRATIVE HEADQUARTERS of the ISC in California or Russia (see Sect. 13.16 of CL&G) which has jurisdiction over the segment of the earth [see Sect. 13.16(*e) of CL&G] where that MILITARY POLICE is stationed– and these MILITARY POLICE may be sent out to arrest Jesuits or enforce other aspects of CONSPIRACY LAW. Each country or territory of the world which is part of the International government (all nations not listed as TERRORIST NATIONS on the International President’s website), must have a MILITARY POLICE to enforce CONSPIRACY LAW within that territory or country. A big problem with CONSPIRACY LAW is that there are so many violations and most of them go unreported. There is a need to create a MILITARY POLICE to look for violators, so that CONSPIRACY LAW violations will be reported and acted upon. These MILITARY POLICE will have to work with other CONSPIRACY LAW networks to assist them in law enforcement and all CONSPIRACY LAW networks must cooperate with any MILITARY POLICE who require their assistance. For instance, a MILITARY POLICE member may need to determine if someone is an UNWILLING AGENT or JESUIT, and this information could be easily obtained from the ADMINISTRATIVE HEADQUARTERS of the ISC. This information may be needed to arrest or apprehend a criminal. The ADMINISTRATIVE HEADQUARTERS of the ISC must cooperate with the MILITARY POLICE who need their assistance.

28.8(c2) Any CONSPIRACY LAW network person that will not give the MILITARY POLICE member the assistance he/she needs to enforce CONSPIRACY LAW, will be removed from his/her position as a LAW ENFORCEMENT PERSON and may suffer the death penalty as a JESUIT CONSPIRATOR (if it is determined that the lack of cooperation was willingly and knowingly designed to assist the Jesuits and if it is determined that this assistance denied to a MILITARY POLICE member was needed to effectively enforce CONSPIRACY LAW).

28.8(c3) The MILITARY POLICE may also be divided up according to those specialties of CONSPIRACY LAW which they are responsible to enforce, though if they notice violations of CONSPIRACY LAW (which are not under their jurisdiction), they are required to report any CONSPIRACY LAW violation they notice in a CONSPIRACY REPORT (as outlined in CONSPIRACY LAW) to their INTELLIGENCE COMMITTEE and to their superior. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. NOW THE PRIMARY RESPONSIBILITY OF MILITARY POLICE IS TO OBEY ORDERS FROM THE ADMINISTRATIVE HEADQUARTERS OF THE ISC.

28.8(c4) And CONSPIRACY ACTION REPORTS by those who receive any and all CONSPIRACY REPORTS are required for every CONSPIRACY REPORT filedSee the rest of CONSPIRACY LAW. For instance, some POLICE may specialize in violations of satellite law. Others may specialize in violations of 666-Computer law. Others may specialize in violations of government law (such as voting laws). Many of these violations overlap, so they need to know all aspects of CONSPIRACY LAW. But if these specialists notice violations that are not normally under their jurisdiction, they MUST REPORT IT in a CONSPIRACY REPORT (as outlined in CONSPIRACY LAW), even if it’s not in their specialty. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

28.8(c5) Any willing and knowing neglect by any LAW ENFORCEMENT PERSON to report (in a timely manner–i.e.–as soon as safely possible) in a CONSPIRACY REPORT to that person’s designated superior or that person’s INTELLIGENCE COMMITTEE, any known CONSPIRACY LAW violation, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

28.8(c6) Also, any willing and knowing neglect by any LAW ENFORCEMENT PERSON to act (as soon as safely possible) upon a CONSPIRACY REPORT received, with actions to curb the violation or to deal with the violation in accordance with CONSPIRACY LAW [and these actions or dealings must also be noted in a CONSPIRACY ACTION REPORT (by those who receive the CONSPIRACY REPORT)], will bring the death penalty as a JESUIT CONSPIRATOR to any violator who violates the guidelines of this Sect. 28.8(c6). See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

28.8(c7) All MILITARY POLICE members (and all LAW ENFORCEMENT PERSONS –such as PLPs, RSPs, etc.) must pass a test about CONSPIRACY LAW within a month to two months after they are chosen to be MILITARY POLICE members– or by the end of November 2004, if they are LAW ENFORCEMENT PERSONs. We are using an interim MILITARY POLICE force until we can have our MILITARY POLICE properly trained, because there is a dire need to have MILITARY POLICE out there NOW enforcing CONSPIRACY LAW. In fact, all countries of the world that are part of the International government must have MILITARY POLICE out there now enforcing all aspects of CONSPIRACY LAW (to the best of their ability) in all parts of their territories.

28.8(c8) The ISC COMMANDER and/or his second in command, will write and/or sign the guidelines about how to set up and train the police forces. The ISC COMMANDER will ensure that these guidelines are set up in such a manner that all territories have the number and distribution of MILITARY POLICE they need to have adequate CONSPIRACY LAW enforcement for each territory of the world. SIGNIFICANT PERSONS will need extra protection and should be surrounded by MILITARY POLICE who watch and guard them as this SIGNIFICANT PERSON goes about his/her daily activities–just like a U.S. President is protected by his secret service. For instance, China will probably need more MILITARY POLICE than the United States because of its huge population. Countries with more satellite technology (like the U.S. and Russia) would need more police who specialize in satellite violations and the guidelines will reflect the priorities needed for each territory of the world. These guidelines will state how the police should be trained and how the police specialties should be set up and organized and how the police beats should be divided. Because the military police must obey all orders from the ISC COMMANDER and from their superiors, they are considered full military persons and must live and work on military bases like all LAW ENFORCEMENT PERSONs. Before the ISC COMMANDER and/or his second in command endorse any MILITARY POLICE guidelines for any territory, he will state under 666-Computer lie-detection on GCFNC that to the best of his knowledge and ability he has approved of MILITARY POLICE guidelines for this territory, which are the most effective MILITARY POLICE guidelines for this territory to maximize compliance to CONSPIRACY LAW. No MILITARY POLICE guidelines will be approved for use by any world territory until the ISC COMMANDER or his second in command pass 666-Computer lie-detection while making the above italicized statement on GCFNC about the guidelines.

28.8(c9) But, by October 30th to November 28th, 2004, all MILITARY POLICE and LAW ENFORCEMENT PERSONs need to know thoroughly which laws need to be enforced and so they will be aware when these laws are being violated. This test will be designed by the professional test preparers who prepare the tests for UNWILLING AGENTS (see Sect. 34 of CONSPIRACY LAWS AND GOVERNMENT). Any willing and knowing attempt (or action or inaction) to allow any person to be a MILITARY POLICE member or LAW ENFORCEMENT PERSON after 10-30-04 to 11-28-04, when that person has not passed this test (without cheating) with a score of at least 90%, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. The test should be at least four hours long (test takers can take breaks as long as they don’t cheat), since CONSPIRACY LAW is complicated law dealing with complicated science, and needs to be thoroughly studied, in order to be effectively enforced. However, because the science is groundbreaking and fascinating, it should not be hard to prepare an interesting training program to prepare for the hard test and this should help future MILITARY POLICE and LAW ENFORCEMENT PERSONs pass the test. It may be helpful to hire MILITARY POLICE and LAW ENFORCEMENT PERSONs who are already quite knowledgeable about CONSPIRACY LAW, this could be determined through 666-Computer analysis of the minds of MILITARY POLICE and LAW ENFORCEMENT PERSON candidates.

28.8(c10) We will need a very large police force and many law enforcement persons to enforce CONSPIRACY LAW, so the test preparer should do a good job of preparing the candidates for their test. The maximum use of visuals and movies and DVDs and other materials to make the subject interesting, should help the candidates do well. Maybe candidates can view the material on their own VCRs or DVDs and can choose when to study. A flexible format should be promoted for study, to give candidates maximum opportunities to learn the material. The candidates must pass the test with a score of 90% to be eligible to be a MILITARY POLICE member or LAW ENFORCEMENT PERSON.

28.8(c11) Before this test is created and administered, the test preparer must state (under 666-Computer lie-detection on GCFNC) that this test has been prepared and is administered in a manner to test the MILITARY POLICE member or LAW ENFORCEMENT PERSON on those aspects of CONSPIRACY LAW which he/she will need to understand in order to effectively carry out his/her duties as a MILITARY POLICE member or LAW ENFORCEMENT PERSON (in maximum compliance to CONSPIRACY LAW). NO TEST CAN BE ADMINISTERED UNTIL THE TEST PREPARER PASSES 666-COMPUTER LIE-DETECTION REGARDING THE ABOVE ITALICIZED STATEMENT (AS HE/SHE MAKES THE STATEMENT).

28.8(c12) Any person who willingly and knowingly allows MILITARY POLICE candidates or LAW ENFORCEMENT PERSONS to take any test for MILITARY POLICE or a LAW ENFORCEMENT PERSON position, when that test preparer has not passed 666-Computer lie-detection [regarding the italicized statement of Sect. 28.8(c11)] or if that test preparer is not qualified [see Sect. 28.8(c9)], will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

28.8(c13) All MILITARY POLICE members are considered full fledged LAW ENFORCEMENT PERSONs with all the rights and responsibilities of any LAW ENFORCEMENT PERSON.

28.8(c14) The MILITARY POLICE of the ISC are above average LAW ENFORCEMENT PERSONS and some of them may be professionals, like lawyers or doctors or space scientists. A lot of them may be drawn from the regular police forces of the country that they serve, since regular police experience in handling criminals will be effective in this police work. However, the skills and knowledge needed to effectively enforce CONSPIRACY LAW (which deals with very advanced scientific technology) are challenging and require sophisticated knowledge about very complicated technology. So these MILITARY POLICE will need to be savvy about some complicated computer and satellite technology and on how this technology affects humans and objects and space and other things.

28.8(c14.1) Each MILITARY POLICE division will have a MILITARY POLICE MANAGER whose job will be to inspect the work of those under his/her jurisdiction. The MILITARY POLICE MANAGER will use 666-Computer technology to analyze the work of all those under his/her jurisdiction to determine if any of these MILITARY POLICE willingly and knowingly overlooked CONSPIRACY LAW violations in the performance of their duties. Part of this inspection will be to see if a CONSPIRACY REPORT has been filed (as soon as possible) for all illegal thoughts (which resulted in illegal actions–see below) scanned by the each police member’s POLICE COMPUTER or LAW ENFORCEMENT COMPUTER. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. To ensure that all illegal thoughts/actions are handled efficiently, the POLICE MANAGER should ensure that all portions of his/her district are adequately covered, so that while one officer is sleeping or on vacation, another will be on duty to cover that territory, so that all portions of that police manager’s territory will be covered by police AT ALL TIMES.

28.8(c14.1.1) Because CONSPIRACY LAW covers a lot of law, each MILITARY POLICE unit will be assigned specific portions of CONSPIRACY LAW to cover. So, while each MILITARY POLICE member is responsible to report any violations he/she notices–he/she will be specifically responsible for his/her area of law and will be expected to focus on his/her area of law. So, one unit may specialize in satellite violations and may monitor space stations and computers of space stations. Another unit may specialize in monitoring PLP networks. Another unit may specialize in violations of sleep disruption laws. Another unit may specialize in TRIGGER PROGRAMMING violations. Another unit may specialize in LOOPHOLE PROGRAMMING violations. It is the job of each country’s INTERNATIONAL SATELLITE COALITION to ensure that their country has adequate MILITARY POLICE to cover all aspects of CONSPIRACY LAW for all parts of their country. There must be enough MILITARY POLICE to adequately monitor CONSPIRACY LAW violations for all aspects of CONSPIRACY LAW.

28.8(c14.1.2) The Commander for each country will break down the MILITARY POLICE divisions and units and will put this in writing (this breakdown will be called the MILITARY POLICE STRATEGY for name of country ), so that each MILITARY POLICE unit will know clearly which CONSPIRACY LAW areas they are responsible for and where they need to focus their law enforcement. Each country’s MILITARY POLICE COMMANDER will not sign their MILITARY POLICE STRATEGY for name of country , until he/she can state under 666-Computer lie-detection that to the best of his/her knowledge this strategy will adequately ensure the thorough enforcement of all aspects of CONSPIRACY LAW for his/her country and that the number of MILITARY POLICE he/she has assigned for each territory is sufficient to ensure adequate enforcement of all aspects of CONSPIRACY LAW for all parts of his/her country. No MILITARY POLICE STRATEGY can be considered valid or law, until the MILITARY POLICE COMMANDER who created and/or wrote the strategy passes 666-Computer lie-detection while making the above italicized statement.

28.8(c14.1.2.1) The MILITARY POLICE STRATEGY must be rewritten and modified every week, as Jesuit terrorists come up with new strategies. The strategy must be rewritten every week [and after each rewriting the Commander needs to pass 666-Computer lie-detection while making the italicized statement of Sect. 28.8(c14.1.2)] to ensure that this strategy puts the MILITARY POLICE where they are needed most and properly allocates MILITARY POLICE resources where they are most needed. It is expected that a lot of MILITARY POLICE will be needed to monitor TRIGGER PROGRAMMING violations, for instance. The MILITARY POLICE STRATEGY will be written with the help of the military intelligence units and other intelligence units.

There definitely should be a strategy to find Jesuits and arrest them, since they are managing to enter the Wal-Mart where Gail works and to do this in droves. This is a serious breach.

28.8(c14.1.3) It is the job of the MILITARY POLICE MANAGERS to ensure that their MILITARY POLICE are monitoring all aspects of CONSPIRACY LAW which is assigned to them in the MILITARY POLICE STRATEGY for their country. Each MILITARY POLICE MANAGER will be assigned (from the MILITARY POLICE STRATEGY) a specific portion of CONSPIRACY LAW which he/she is responsible to oversee and will ensure that this portion of law is being enforced in his/her territory.

28.8(c14.1.4) Any MILITARY POLICE MANAGER who is willingly and knowingly deficient in insuring that those aspects of CONSPIRACY LAW assigned to his/her unit is enforced, will receive the death penalty as a JESUIT CONSPIRATOR.

28.8(c14.1.5) Any willing and knowing violations of the guidelines of Sections 28.8(c14.1.1 through c14.1.5) will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

28.8(c14.1.1) Because a large volume of CONSPIRACY REPORTs may be filed in one day, these reports should be set up to be filed quickly, completely, legally and accurately by the POLICE COMPUTER or LAW ENFORCEMENT COMPUTER. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. If a MILITARY POLICE or LAW ENFORCEMENT person willingly and knowingly overlooks more than 3 CONSPIRACY LAW violations cumulatively (this means over any period of time), he/she must be removed from the MILITARY POLICE force by his/her MILITARY POLICE MANAGER, or if the violator is a LAW ENFORCEMENT PERSON, he/she must be removed from his/her LAW ENFORCEMENT position by his/her INTELLIGENCE COMMITTEE.

28.8(c14.2) If a MILITARY POLICE person or LAW ENFORCEMENT PERSON willingly and knowingly overlooks one CONSPIRACY LAW violation, and this one violation is a violation that results in (or could result in) serious harm, that MILITARY POLICE person must be removed from the MILITARY POLICE force by his/her MILITARY POLICE MANAGER, or if the violator is a LAW ENFORCEMENT PERSON, he/she must be removed from his/her LAW ENFORCEMENT position by his/her INTELLIGENCE COMMITTEE.

28.8(c14.3) The MILITARY POLICE MANAGER’s total job will be to analyze the work of those under his/her jurisdiction. This is to ensure that all those under his/her jurisdiction are enforcing CONSPIRACY LAW to the max. Any MILITARY POLICE MANAGER who willingly and knowingly retains any MILITARY POLICE person who is not doing his/her job (as outlined in CONSPIRACY LAW and in this Sect. 28.8), will bring the death penalty as a JESUIT CONSPIRATOR to that MILITARY POLICE MANAGER.

28.8(c14.3.1) The INTELLIGENCE COMMITTEE’s job will be to analyze the work of those LAW ENFORCEMENT PERSONS under their jurisdiction. This is to ensure that all those under his/her jurisdiction are enforcing CONSPIRACY LAW to the max. Any INTELLIGENCE COMMITTEE member who willingly and knowingly retains any LAW ENFORCEMENT person who is not doing his/her job (as outlined in CONSPIRACY LAW and in this Sect. 28.8), will bring the death penalty as a JESUIT CONSPIRATOR to that INTELLIGENCE COMMITTEE member.

28.8(c14.4) After each MILITARY POLICE or LAW ENFORCEMENT person completes his/her shift he/she must make a statement under 666-Computer lie-detection that he/she has not willingly and knowingly overlooked any CONSPIRACY LAW violations while performing his/her duty as a MILITARY POLICE or LAW ENFORCEMENT PERSON. Also, he/she must also make a statement under 666-Computer lie-detection that he/she has not overlooked any CONSPIRACY LAW violations while not on duty. MILITARY POLICE and LAW ENFORCEMENT PERSONS must report all violations they notice, even while not on duty. They will receive overtime pay for all violations they notice and report while not on duty and if this results in extensive work time away from their families, so that they are denied adequate rest and family time, their schedules may have to be adjusted to compensate for too much overtime put in by the police officer or law enforcement person–to give them time to rest. Since reporting CONSPIRACY LAW violations should be easy, because of the POLICE COMPUTER or LAW ENFORCEMENT COMPUTER, it is hoped that this will not put too much strain on the police officer (or LAW ENFORCEMENT PERSON) and that he/she will only require extensive overtime (and schedule adjustments) for very complicated cases which need to be handled immediately (by that police officer or LAW ENFORCEMENT PERSON who noticed the violation).

28.8(c14.5) To make it easy for MILITARY POLICE or LAW ENFORCEMENT PERSONs to report violations, CONSPIRACY LAW violations will be organized on a mini-computer, which the MILITARY POLICE or LAW ENFORCEMENT person must have on his/her person at all times. This computer will be set up, so that the MILITARY POLICE or LAW ENFORCEMENT PERSON can pull up a screen which lists all the CONSPIRACY LAW violations and he/she can easily access this screen and pull up the various violations using computer prompts, and in this manner can easily record CONSPIRACY LAW violations as they occur. This computer will be programmed by PROGRAMMERS from the PROGRAMMER CORPS which has jurisdiction over that police district. Any person, other than a designated programmer from the PROGRAMMER CORPS (which has jurisdiction over that police district) who programs this computer, will receive the death penalty as a JESUIT CONSPIRATOR. This means that that programmer must receive PROGRAMMER WORK PERMITS to do this work (see Sect. 55.6 of INT. PLP AND RSP NETWORK CONF.) and these permits will detail how that programmer is to program the MILITARY POLICE or LAW ENFORCEMENT PERSON’s HAND-HELD COMPUTER.

28.8(c14.6) This COMPUTER will be programmed in such a manner to make reporting violations simple and fast and accurate. It should clearly identify the violator (through genetic readings–see below), the criminal thoughts and motives associated with this violation–see below, the time of the violation(s) with beginning and ending dates and times, which laws were violated, how they were violated. The computer should be programmed so that genetic information; instant memory, emotion and thought readings of the persons scanned and other evidence can be immediately obtained and stored into the computer. The computer should be programmed so that it can easily ascertain if the person scanned is an UNWILLING AGENT and can easily identify all IMPOSED PERSON involved with any UNWILLING AGENT (who is scanned by this computer). The computer should be programmed to easily obtain all evidence needed to hasten prosecution of criminals and to accurately and quickly identify criminals and their activities. Evidence such as memory readings, genetic codes, IMPOSED PERSONs involved with UNWILLING AGENTS, etc. should be information that would be easily scanned by this computer and would be immediately entered into its database, so that this information can be easily retrieved later for courtroom use and to help in prosecuting criminals. The computer should be programmed so that maximum accurate and relevant evidence can be obtained to prosecute the real violators of CONSPIRACY LAW and to eliminate red herrings and false leads in investigations and prosecutions of criminals.

28.8(c14.6.1) A computer like this should make law enforcement easier for the MILITARY POLICE or LAW ENFORCEMENT PERSON, since, if that violator has a history, the MILITARY POLICE or LAW ENFORCEMENT person can immediately pull up a history on that violator. The Computer will automatically make and file CONSPIRACY REPORTS to the ADMINISTRATIVE HEADQUARTERS for any CONSPIRACY LAW violations noticed (see Sect. 13.16 of CL&G). Also, each person scanned by this computer can be immediately identified by his/her genetic code, and all relevant information needed about this person, to help in law enforcement must be immediately available to the MILITARY POLICE or LAW ENFORCEMENT PERSON, including whether the person is a SIGNIFICANT PERSON, JESUIT, UNWILLING AGENT, IMPOSED PERSON, etc. This should result in immediate and complete and accurate identifications and should result in more thorough, efficient and accurate prosecutions of criminals.

28.8(c14.6.2) This computer should also have a history, relevant information and genetic code on file for every SIGNIFICANT PERSON and should notify a MILITARY POLICE or LAW ENFORCEMENT person when he/she is dealing with a SIGNIFICANT PERSON. This is because many CONSPIRACY LAW violations revolve around SIGNIFICANT PERSONs. This COMPUTER will use a genetic database as its method for identifying persons, so that each person will be identified by his/her scanned genetic code–not by his/her appearance. This will make the job of finding criminals easier. All the police officer has to do is to aim the computer at the person (or hit certain buttons to scan a person) and the computer will immediately identify that person, using that person’s genetic code as the method of identification. This should make it impossible for Jesuits to use imposters and disguises to confuse the MILITARY POLICE or LAW ENFORCEMENT PERSONS.

28.8(c14.6.3) Also, the computer will be programmed to search for certain thought patterns within its range. The Computer will automatically make and file CONSPIRACY REPORTS to the ADMINISTRATIVE HEADQUARTERS for any CONSPIRACY LAW violations noticed (see Sect. 13.16 of CL&G). As it detects these thoughts, it will also let the MILITARY POLICE or LAW ENFORCEMENT PERSON know whether these thoughts are coming from an IMPOSED PERSON or the genuine person, this will help the police officer or law enforcement person in dealing with UNWILLING AGENTS. For example, let’s say an UNWILLING AGENT is being programmed to think in a manner which indicates an inordinate obsession with Gail Schuler, the computer will send a red alert to the POLICE or LAW ENFORCEMENT COMPUTER and will immediately use its capabilities to identify and locate the IMPOSED PERSON who is behind this illegal thought pattern, so that the police or law enforcement persons will handle this UNWILLING AGENT according to CONSPIRACY LAW (which is to cause the UNWILLING AGENT to watch the required videos and education program or be confined, etc.), while giving the police officer or law enforcement person the information he/she needs to arrest the real criminal: the IMPOSED PERSON who manipulated that UNWILLING AGENT. And, therefore, this computer will quickly provide evidence needed to locate, and then quickly prosecute and/or execute this IMPOSED PERSON. Certain thoughts like. . .”Let’s get Gail Schuler” or “I plan to target Vladimir Putin” or “I want to blow up this building” will be programmed into the computer and will cause the computer to set off an alarm to notify that MILITARY POLICE or LAW ENFORCEMENT PERSON, that a law enforcement intervention may need to occur.

28.8(c14.6.4) The programmers who program this computer, will study the thought patterns of past Jesuit criminals to help them in deciding how to program this police or law enforcement computer, to assist the police or law enforcement persons in locating and identifying criminals. Criminals will not be arrested for illegal thoughts, BUT IF ILLEGAL THOUGHTS are occurring, this will warn the police that this person needs to be watched and once this person starts actions which show he/she intends to carry out the illegal actions which he/she has thought about–the police officer needs to intervene and enforce CONSPIRACY LAW. It is the ACTION and NOT THE THOUGHT, which will be the basis for the arrest. However, the thought reading capabilities of the 666-Computer will be used to help in preventing crimes and in quickly arresting CONSPIRACY LAW violators.

28.8(c14.6.4a) All illegal thoughts which are scanned will be immediately attached and stored permanently to the file of the criminal or persons involved. So that when this thought is recorded, it will clearly identify who originated the thought and who was the victim(s) (or intended victim[s]) of this thought. For instance, if an IMPOSED PERSON was the originator of the illegal thought, this IMPOSED PERSON will be clearly identified as the criminal, and all the victims of the illegal thought will also be listed, such as the UNWILLING AGENT who was manipulated to carry out the thought, and those victim persons who were targeted by this thought. Let’s say the thought came from an IMPOSED PERSON who manipulated an UNWILLING AGENT like this. . .”I think I’ll have fun and will harass Gail Schuler and pick on her.” (1) The IMPOSED PERSON behind this illegal thought will be immediately identified as the criminal (or the IMPOSED PERSON behind this thought) by the POLICE COMPUTER. (2) The UNWILLING AGENT (manipulated by the IMPOSER PERSON as the medium for harassment) will be identified as the UNWILLING AGENT victim of this IMPOSED PERSON criminal. (3) Gail Schuler will be identified as the targeted victim of the IMPOSED PERSON criminal (via the UNWILLING AGENT). All legal aspects of this illegal thought will be accurately categorized and delineated (according to CONSPIRACY LAW) in the POLICE or LAW ENFORCEMENT COMPUTER’s database–so that this evidence can be readily retrieved (in a manner to make CONSPIRACY LAW enforcement perfect and organized–according to CONSPIRACY LAW), so that the enforcement of CONSPIRACY LAW will be efficient and streamlined (to provide the perfect evidence for the arrest of CONSPIRACY LAW violators).

28.8(c14.6.5) Also, once illegal actions are carried out, the thoughts that preceded the illegal action, can be used in the courtroom to provide evidence for MOTIVE, since motive plays a key role in CONSPIRACY LAW prosecution. Therefore, all illegal thoughts which occur, will be stored in the computer and attached to the files of those persons involved, in case these thoughts need to be retrieved for use in the courtroom later.

28.8(c14.6.6) All illegal thoughts which are scanned by the POLICE or LAW ENFORCEMENT COMPUTER, must clearly identify the origin of these thoughts and must clearly differentiate between thoughts of genuine persons and those of IMPOSED PERSONs, so that UNWILLING AGENTS can be handled properly (according to CONSPIRACY LAW).

28.8(c14.6.7) All information scanned into each POLICE or LAW ENFORCEMENT COMPUTER will be transferred to a national master database where all information from all POLICE and LAW ENFORCEMENT COMPUTERs will be stored and analyzed by that country’s INTELLIGENCE COMMITTEE. And then all information from every country’s master database will be transferred to the International government headquarters in Germany into an international database, where the International government can study the information obtained to help in intelligence in this war against Jesuit terrorism.

28.8(c14.7) Any willing and knowing violations of the laws of this Sect. 28.8(c14) (including arresting and/or removing and/or framing innocent MILITARY POLICE or LAW ENFORCEMENT persons [those who are doing their job properly] from the MILITARY POLICE or a LAW ENFORCEMENT PERSON position) or willing and knowing inadequate programming of POLICE or LAW ENFORCEMENT COMPUTERS (as defined by CONSPIRACY LAW) by PROGRAMMERS, will bring the death penalty as a JESUIT CONSPIRATOR to the violator. For the purposes of CONSPIRACY LAW, a POLICE or LAW ENFORCEMENT COMPUTER is considered to be inadequately programmed, if it is not programmed in accordance with this Sect. 28.8 and in accordance with CONSPIRACY LAW.

28.8(c14.7.1) Remember CONSPIRACY REPORTS must be filed for all CONSPIRACY LAW violations and any false reports result in the death penalty. See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS. 666-Computer analysis can determine whether or not a neglect to remove a negligent MILITARY POLICE member or LAW ENFORCEMENT PERSON was willing and knowing and whether or not a neglect to report a CONSPIRACY LAW violation was willing and knowing. To neglect to enforce CONSPIRACY LAW willingly and knowingly will be the determining criteria as to whether to remove a MILITARY POLICE person or manager or LAW ENFORCEMENT PERSON or INTELLIGENCE COMMITTEE member from his/her position or to give him/her the death penalty as a JESUIT CONSPIRATOR.

28.8(c15) The MILITARY POLICE, like any CONSPIRACY LAW network can be audited by the auditing teams (see Int. PLP and RSP-Network Conf.).

28.8(c16) In fact, this is to be encouraged. It is my intent to create 3 CONSPIRACY LAW screening networks, so that if one network is not in compliance with CONSPIRACY LAW or misses something, the other network can catch the violation or complete the picture– in order to maximize compliance to CONSPIRACY LAW.

28.8(c17) There are 3 basic screening teams under CONSPIRACY LAW (the auditing teams, the SCREENER CORPS, and the MILITARY POLICE), just like in the United States you have the Congress, the Senate and the Executive Branch which keep each other in line.

28.8(c18) The CONSPIRACY LAW AUDITING TEAMS will audit the SCREENER CORPS and the MILITARY POLICE.

28.8(c19) The SCREENER CORPS will screen the AUDITING TEAMS and the MILITARY POLICE.

28.8(c20) The MILITARY POLICE will make sure that the SCREENER CORPS and their own organization and the AUDITING TEAMS are in compliance to CONSPIRACY LAW.

28.8(c21) Those MILITARY POLICE networks determined by the auditing teams or the SCREENER CORPS to do an outstanding job of enforcing CONSPIRACY LAW, may cause their country to be awarded extra funds from the ICB to assist their country during catastrophes.

28.8(c22) Because CONSPIRACY LAW is continually updated, all MILITARY POLICE must take new, updated tests every month to update them on recent changes in CONSPIRACY LAW. These tests will be administered by the same persons who created the first test [Sect. 28.8(c9)] and all the guidelines for test taking (as outlined in this Sect. 28.8) will apply to the updates. No MILITARY POLICE can retain his/her job unless he/she passes the update test with 90% comprehension. The only exception is that the update test does not have to be four hours long. It must be long enough to ensure that the test taker understands all the updates he/she needs to know to do his/her job.

28.9 Any (direct or indirect) willing and knowing attempt (or action) to violate any of the guidelines of this Sect. 28, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

*******************************

MANDATORY EXPOSURE LAWS FOR CRIMINAL SATELLITE VIOLATIONS INVOLVING “NATURAL” DISASTERS AND WEATHER PHENOMENON:

29.0 Because of the laws of this document and because of CONSPIRACY LAW, massive and widespread plots involving satellite criminal practitioners who would harm persons though satellite violations causing mud slides, floods, tornadoes, earthquakes, hurricanes, etc. have been uncovered and many arrests have already taken place on this 22nd day of Feb. 2005. It is necessary to establish and publicize on GCFNC WHO or WHAT ORGANIZATION(s) is/are behind this massive satellite conspiracy and WHY they have done this. All the evidence which has been uncovered regarding violations of this legal document will be presented on GCFNC and those arrested and charged will be shown on GCFNC along with all material evidence for these cases.

29.0(a) The cross examinations, trials and hearings conducted over these cases must all be shown on GCFNC, since these cases are of public concern (though names can be changed to protect the innocent).

29.0(b) EVERY CASE which involves satellite weather related or natural disaster conspiracies (as described in this legal document) MUST BE EXPOSED ON GCFNC (AS OUTLINED IN THIS SECT. 29), IN ORDER TO CLEARLY EXPOSE AND SHAME THE GUILTY PARTY. Any attempt or action to willingly and knowingly fail to expose on GCFNC any case related to this Sect. 29 (and as outlined in this Sect. 29), will bring the death penalty as a JESUIT CONSPIRATOR to the negligent party.

29.0(c) These cases are of public concern AND MUST BE EXPOSED because persons all over the world are concerned about “natural” phenomenon such as hurricanes, cyclones, earthquakes, hailstorms, floods, etc. now for fear that they may become a victim of these crimes. These persons have the right to know which organization(s) would desire to harm them in this manner and why this/these organization(s) would desire to do so.

29.0(d) In the news presentation over these cases, it is important to show these cases and the evidence uncovered in order to educate the public about WHO or WHAT ORGANIZATION(s) is/are behind these conspiracies, and WHY they would desire to commit these conspiracies, and to publicly expose and shame the culprits.

29.0(e) The executions of those who were/are willingly and knowingly behind violations of CONSPIRACY LAW and of this document must be shown on GCFNC, in order to clear the innocent and to firmly establish guilt in the matter. The public knows we cannot lightly execute an innocent party, so the mere fact that we show the executions of the guilty parties will help to firmly establish in the public mind WHO is the guilty party and WHY they are the guilty party. Before each execution, the nature of the crime must be presented and explained on GCFNC and the evidence for the crime must also be presented on GCFNC (and the evidence must be presented as outlined in this Sect. ). When explaining the nature of the crime, the MOTIVE for the crime must also be presented, since this is necessary to educate the public about why these criminals commit the crimes they do. MOTIVE plays the most important role in Jesuit crimes, since their MOTIVE for a world dictatorial takeover is something the Jesuits would die over and this needs to be firmly established and shown through evidence. The world needs to be educated about the MOTIVE behind these crimes. We hope that by exposing MOTIVE (and this can be proven through 666-Computer analysis using 666-COMPUTER HISTORIANS and other means) and through circumstantial and direct evidence– that we will discourage Jesuits from committing these crimes.

29.0(f) We believe that the MOTIVE for many (or most) of these crimes is the desire of the Jesuits to set up a dictatorship over the world using 666-Computer/satellite technology as their weapon, but they want to make it appear that it is/are other organization(s) which is/are behind this evil ambitious desire to use 666-Computer/satellite technology to govern the world through a worldwide dictatorship. They want to make it appear it is other organizations behind their crimes, so that they can frame innocent organizations and parties with their own ambitions for a world dictatorial takeover, and thus create distractions away from their own schemes for a world takeover. And they hope that these distractions which they create (along with the deliberately convoluted cases and investigations which Jesuits evolve out of these crimes) will enable them to continue undercovertheir criminal and ambitious enterprises for a Jesuit world takeover.

29.0(g) If my speculation is correct, the evidence for this must be shown on GCFNC and it must also be shown when the Jesuit Order had the desire for a world takeover and when they began their conquest for a worldwide dictatorship. We believe they have had this desire since the organization was founded in the 1500s (if this is the case–evidence for this must be shown on GCFNC), and this would explain why the problem of satellite/computer conspiracies and other conspiracies is so widespread and so stubborn and we hope this exposure will discourage Jesuits from continuing these conspiracies, since they will face massive exposure on GCFNC for their attempts. It would also be helpful to establish when the Jesuits first acquired 666-Computer/satellite technology and to establish (through evidence which will be shown on GCFNC) which organization (and we believe it was the Jesuits) was the first to discover and use these pioneering 666-Computer/satellite technologies–since this will also help to establish guilt. Since if they discovered and used this technology before we did and most especially if they tried to KEEP IT SECRET, this will more firmly establish the Jesuit Order as the guilty party.

29.0(h) All evidence over attempts by the Jesuit Order to keep this 666-Computer/satellite technology secret will also be exposed on GCFNC, AND HOW THEY REACTED WHEN THIS TECHNOLOGY BECAME EXPOSED WILL ALSO BE REVEALED (WITH EVIDENCE PRESENTED ON GCFNC).

29.0(I) Jesuits, when they commit crimes, always try to make it appear that another party did the crime OR they try to make it appear that they were framed. If the Jesuits are truly behind these conspiracies, the purpose for this publicity on GCFNC will be to firmly establish that the Jesuits were NOT framed and that they committed these crimes of their own free will and are the truly guilty party. The GCFNC exposure presentations for these satellite “natural phenomenon” crimes must show clearly the MOTIVE for Jesuit crimes, and the extent to which they went to cover up their crimes (including attempts to implicate and frame innocent parties with their own crimes).

**************************

The SHIELD CORPS OF THE INTERNATIONAL SATELLITE COALITION

30.0(a) Sect. 40 of CL&G is void and of no effect, since it has not been effective in preventing Jesuits from carrying out satellite violations against innocent persons. Jesuits have successfully carried out satellite attacks against buildings, causing roofs to collapse and chemical factories to explode. The following Sect. 30 of this document will take the place of Sect. 40 of CL&G, which is a modification of Sect. 40 CL&G. The biggest problem appears to be Jesuit infiltration into the RSP network, so that RSPs have not been doing their job. Therefore, this job is no longer under the jurisdiction of the RSP network, but has been relegated to the military’s SHIELD CORPS, who will be composed primarily of members of the TRUTH PROGRAMMERS–since we will rely heavily on computer programming to maintain the shields.

30.0(b) The members of the SHIELD CORPS will be recruited from the TRUTH PROGRAMMERs of the INTERNATIONAL SATELLITE COALITION. The SHIELD CORPS member must be followers of the BIBLE PROGRAM for LAW ENFORCEMENT PERSONs and cannot report to duty (like any other LAW ENFORCEMENT PERSON) until he/she has been analyzed by the FEAR ANALYZER CORPS each day before he/she reports to his/her shift, and it is determined that that SHIELD CORPS member fears God more than men and he/she must have been a daily BIBLE reader for at least 20 years. The SHIELD CORPS has a very important job and to allow anybody to report to duty as a SHIELD CORPs member, when that person is not a TRUTH PROGRAMMER will bring the death penalty as a JESUIT CONSPIRATOR to that violator (or deliberately neglectful person). If the negligence was unknowing and unwilling, it still will not be tolerated and that neglectful person must be sacked and replaced by someone dependable. We cannot afford to allow Jesuits to use satellite technology to blow up Gail Schuler’s car (perhaps on the day she goes to meet Vladimir Putin).

30.0(c) All buildings, cars and anything that humans inhabit must be protected as soon as possible with a shield (called a PROTECTIVE SHIELD)–along with 49 back-up PROTECTIVE SHIELDS– by our SHIELD CORPS members to make it difficult or impossible for Jesuits to use illegal satellite technology on people.

***VERY IMPORTANT–Each of computers which control these 49 shields must be located throughout the world (and spread out). This is necessary because if all the shields come from one computer and that computer is knocked out, then all 49 shields are knocked out! This means that we should use 49 DIFFERENT computers (from all over the world) to control each of the 49 back-up shields. So, let’s say, a tsunami knocks out a computer in Taiwan, this won’t affect the other 48 back-up shields since they are located perhaps in Russia, the U.S., Australia, etc.–and are spread out all over the world. All the other shields should come from their own computers, so that no two shields come from the same computer. This will help to ensure the integrity of the shields in the event of a disaster which knocks out power to the computers (or knocks out the computer) which maintains the shields. All computers which maintain shields should have back-up power to maintain that computer (in case that computer loses power)–perhaps someone could invent a solar computer?

***HOWEVER, it is very important that there be central locations where all 49 different shields are managed and coordinated, and where SHIELD CORPS members can work on the master program which programs each of the programs for each of the 49 back-up shields. One central location may be in California (the intelligence headquarters of the ISC) and another central location may be in Russia (another intelligence headquarters of the ISC) and another central location may be in China. In case each of these 3 headquarters gets knocked out by the Jesuits, each of these headquarters will have a back-up (and each of these backups will be far apart from each other)–so that there will always be a headquarters which manages and coordinates all the 49 shields (maintained by the SHIELD CORPS).

Areas of special concern would be automobiles (which can explode and burst into flames because of criminal satellite technology), jets, military helicopters, and buildings (where roofs can collapse and fall upon people) and chemical or fuel factories (which could turn into incinerators because of criminal satellite activities). This shield (and the 49 back-up shields) from the SHIELD CORPS programs should allow access by RSPs (who have read the BIBLE daily for 20 years–called BIBLE RSPs) to those persons within the dwellings, so the SHIELD CORPS’ shield(s) should be set up with some sort of password, so that only BIBLE RSPs can penetrate and work under the shield(s) and no other practitioners can penetrate the PROTECTIVE SHIELD(s).

These shields will also help compensate for those PERSON-PROGRAMS which have been tampered with by Jesuits and which allow Jesuits to break down the RSPs’ shields over parts of the body, since if that person is in a building that is shield-protected, the Jesuits still can’t get him/her (even if the shield around his/her body or brain is defective). At least, if the buildings and car and places where people inhabit are shield-protected, it will hinder (or stop) the Jesuits as they try to use satellite technology on people.

30.0(d) Anyone who (directly or indirectly) willingly and knowingly interferes with, or does not allow, or tries to hinder the PROTECTIVE SHIELD(s) which is/are placed around any buildings, cars, and places where people inhabit with the intent to cause this/these PROTECTIVE SHIELD(s) to fail to protect (as outlined in this Sect.30) the persons in the dwelling where they dwell from criminal satellite activities–will receive the death penalty as a JESUIT CONSPIRATOR. It is mandatory that this PROTECTIVE SHIELD (and the 49 back-up shields) be placed as soon as possible around any and all dwellings possible, in order to protect persons from the Jesuits’ criminal satellite activities and that they be set up (as outlined in this Sect. 30).

***The combination of high quality people (those who have read the BIBLE for 20 years or longer) to program and manage the shields and the use of programming over persons to maintain the shields should maximize the effectiveness of the shields and make it far more difficult for Jesuits to break down the shields or infiltrate into the RSPs or SHIELD CORPS members who maintain or work under these shields. Use programming to maintain the shields and to do as much of the RSPs’ work under the shields, since the human brain is highly unreliable (due to the Jesuits’ brilliant ability to manipulate the human brain) AND IT IS BETTER TO USE A FEW HIGH QUALITY PEOPLE AND LET PROGRAMMING DO THE BULK OF THE WORK.

30.0(e) All known places where people inhabit, congregate or dwell must be shield-protected (as outlined in this Sect. 30) as soon as possible with this/these PROTECTIVE SHIELDs. This would include military helicopters, moving vehicles, airplanes, etc. Any SHIELD CORPS member who willingly and knowingly allows any dwelling (where people inhabit) to NOT be shield-protected (as outlined in this Sect. 30) as soon as possible with this/these PROTECTIVE SHIELD(s), will receive the death penalty as a JESUIT CONSPIRATOR. The SHIELD CORPS member must not only shield-protect all dwellings listed in the DWELLINGS DOCUMENT, but must protect all dwellings which he/she knows about that are in his/her territory. The use of programming to maintain the shields (and only very high quality persons to manage the programs involved) should bring the most effective results. Any SHIELD CORPS member who has deliberately neglected to protect any dwelling (as outlined in this Sect. 30) as soon as possible (which needs to be protected because humans dwell there) that is within his/her jurisdiction–i.e., any willing and knowing violation of the guidelines of this Sect. 30 by any satellite practitioner will bring the death penalty as a JESUIT CONSPIRATOR to that practitioner.

30.0(f) Each SHIELD CORPS member (programmer) will be assigned territories (by his/her superior officer in the ISC) for which he/she will be responsible to maintain as soon as possible PROTECTIVE SHIELDS over all dwellings. All dwellings in these territories which must be shield-protected (as outlined in this Sect. 30) with this PROTECTIVE SHIELD (and the 49 different back-up computers which maintain the 49 shields–located throughout the world) and all these dwellings will be listed IN WRITING (in a document called a DWELLINGS DOCUMENT), and the SHIELD CORPS programmer assigned to this territory will be responsible to write and maintain the most effective programs to shield-protect (as outlined in this Sect. 30) as soon as possible with PROTECTIVE SHIELDS all dwellings listed in this DWELLINGS DOCUMENT.

30.0(g) Any officer of the ISC who willingly and knowingly neglects to mention any dwelling which should be included in the DWELLINGS DOCUMENT, will receive the death penalty as a JESUIT CONSPIRATOR. Every automobile (or moving or flying vehicle) which is registered or driven by any human being, must be included in the DWELLINGS DOCUMENT. Anything which humans or animals inhabit must be included in the DWELLINGS DOCUMENT.

30.0(h) Any person responsible to enforce any aspect of this Sect. 30, and who (directly or indirectly) willingly and knowingly neglects to enforce that aspect as he/she is outlined to do in this Sect. 30 (and/or who neglects to enforce that aspect as he/she is outlined to do according to CONSPIRACY LAW), will receive the death penalty as a JESUIT CONSPIRATOR.

30.0(I) Any (direct or indirect) attempt (or action) to place any shield (or shields) around any dwelling in order to prevent our PROTECTIVE SHIELD(s) from being put in place or to prevent our PROTECTIVE SHIELD(s) from operating according to the guidelines of this Sect. 30, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

A SPECIAL SUB-DIVISION OF THE SHIELD CORPS: THE ENGINEER CORPS

31.0(a) The ENGINEER CORPS is a branch of the INTERNATIONAL SATELLITE COALITION, because the Jesuit use of satellite technology to undermine our buildings, vehicles, helicopters, planes, etc. is a form of warfare against us and needs the leadership and management of our military.

31.0(b) As soon as any protective shield is placed over anything included in the DWELLINGS DOCUMENT, the item, bridge, helicopter, building, vehicle, etc. must first be examined by the ENGINEER CORPS computer program to see if it has already been weakened by satellite attacks against it and this ENGINEER PROGRAM will write a report called the INTEGRITY REPORT. Anything which is protected by a PROTECTIVE shield in the DWELLINGS DOCUMENT is considered an ITEM, for the purposes of this Section.

31.0(c) An INTEGRITY REPORT must be written daily by the ENGINEER PROGRAM for each item protected by a shield in the DWELLINGS DOCUMENT, since Jesuits could possibly use satellite to quickly damage any item from day to day–perhaps by inducing a quick break in the PROTECTIVE SHIELD somehow. Any willing and knowing failure to create an ENGINEER PROGRAM which does not write a DAILY INTEGRITY REPORT for each item listed in any DWELLINGS DOCUMENT, will bring the death penalty as a JESUIT CONSPIRATOR to the LAW ENFORCEMENT PERSON(s) involved.

31.0(d) The INTEGRITY REPORT will rate the safety of the item and must grade the safety of the item (using a itemized report which covers all the essential aspects of the item–such as the jet’s propulsion system, the wing span, the angles of the wing, how the parts functions, etc.) and that item will be graded according to “safe”, “safe without extra stressors”, “unsafe”, etc. The engineers who know how to build the item, will be the ones who determine which are the essential aspects of the item and which areas of the item need to evaluate (and what must be mentioned and included in the INTEGRITY REPORT), and these engineers will assist the TRUTH PROGRAMMERS who create the ENGINEER PROGRAM (which writes the INTEGRITY REPORT).

31.0(e) The INTERNATIONAL SATELLITE COALITION will decide how to assign the grades. Perhaps a AAA grade, means the item is safe in its current state and even under stress. Perhaps a AA grade means the item is safe in its current state, but may crack under some stress, etc. We are still investigating how the Jesuits manage to create so many satellite violations against us.

31.0(f) THE INTEGRITY REPORT will evaluate the soundness of the building, airplane, jet, ship, boat, or whatever –to determine if it has been damaged by satellite attacks against it and is therefore unfit for human dwelling or human use OR if the item has been weakened sufficiently that it is unable to withstand stress (especially if the item is in an area where there is a high probability it may have to undergo some special form of stress–like a hurricane).

31.0(g) For instance, if an INTEGRITY REPORT had been made of Wal-Mart heir John Walton’s plane before he took off, he could have been warned that his plane was defective (because of satellite attacks against it) and his life could have been saved.

31.0(h) An INTEGRITY REPORT should be made of all items (buildings, cars, etc.) which have gone through any stressful events, to see if that item can withstand another such stressful event. For instance, in Florida, some buildings may have been weakened by previous hurricanes, so that if another hurricane hits that same item, it will be a dangerous dwelling or item. The INTEGRITY REPORT should identify such weaknesses and correct them, so that buildings with weakened roofs or other structural weaknesses can be corrected by an ENGINEER-FIX PROGRAM to prepare (and strengthen the integrity of that item) for likely stressful events which may occur on that item.

31.0(I) The members of the ENGINEER CORPS, will be persons who understand how the building, ship, plane, boat, jet, etc. is constructed and would have enough knowledge about its construction to be able to identify weaknesses in its integrity which would be life-threatening. The use of computer technology (like an X-ray) by the ENGINEER-FIX PROGRAM will be used to scan the item, building or vehicle to determine any areas of weakness. Computers will be programmed by the TRUTH PROGRAMMERS to make the job of the ENGINEER-FIX PROGRAM efficient and organized.

31.0(j) The ENGINEER CORPS will advise the TRUTH PROGRAMMERS about how to program computers so that quick, efficient, comprehensive, and daily scans can be made of items protected by shields in the DWELLINGS DOCUMENT. Computers should be programmed so that they can scan large areas and quickly and comprehensively to identify weaknesses. For instance, a sinkhole created in the middle of a farmhouse or in the middle of a house’s foundation may go undetected without a good program to look for such satellite violations. The TRUTH PROGRAMMERS must follow all the guidelines of the PROGRAMMER CORPS (as outlined in Sect. 55 of Int. PLP & RSP-Network Conf. and in the rest of CONSPIRACY LAW) when creating these programs.

31.0(k) For instance, the ENGINEER-FIX PROGRAM would scan automobiles to identify tires which are about to explode or fall apart, or brakes which are about to fail, etc. The ENGINEER-FIX PROGRAM would evaluate jets to see if the propulsion systems are working properly, if the wings and other parts of the plane are set properly to ensure safe take off and landing, etc.

31.0(l) Because this is such a monumental and huge task, it requires a special sub-division and will have specialties, like those who specialize in jet integrity, those who specialize in helicopter integrity, those who specialize in building integrity, those who specialize in road integrity, etc.

31.0(m) The INTERNATIONAL SATELLITE COALITION will do a history and analysis of satellite violations which have occurred over the years to determine how to divide up (or categorize) the specialties of the ENGINEER CORPS, so that the ENGINEER-FIX PROGRAMS can do the most effective job of evaluating and categorizing which items (and which structural weaknesses in items) need to be evaluated by the ENGINEER-FIX PROGRAMS, so that lives can be saved and tragedies minimized.

31.0(n) When it is discovered that an item is unfit for human use or dwelling (called a DEFECTIVE ITEM), the persons involved must be warned by the ENGINEER PROGRAM OR the item must be repaired by the ENGINEER-FIX PROGRAM and made fit for human use or dwelling before any persons use the item in its defective state.

31.0(o) The ENGINEER PROGRAM will make the decision about how, when and whether to repair the item (perhaps using satellite technology to do so) or whether to warn the person that they should not use the defective item.

31.0(p) All DEFECTIVE ITEMS discovered by the ENGINEER-FIX PROGRAM must be written up by this program in a CONSPIRACY REPORT which will be submitted to intelligence headquarters of the ISC (and follow up actions such as CONSPIRACY ACTION REPORTS must be taken by the programs at the intelligence headquarters as outlined under CONSPIRACY LAW), that is, if the defect is deemed to be caused by the direct or indirect use of satellite technology (or other CONSPIRACY LAW violations) against the item. See Sect. 11 of General 666-Computer or Satellite Computer Laws for the proper legal procedures to follow (in regard to CONSPIRACY ACTION REPORTS). See Sect. 13.16 of CL&G for updates about automatic computer programmed filing of CONSPIRACY REPORTS.

31.0(q) If the defect is not caused by violations of CONSPIRACY LAW, then the DEFECTIVE ITEM must be taken care of by the ENGINEER-FIX PROGRAM as outlined in this Section, and the INTEGRITY REPORT by the program must mention that the item got a failing grade. Any item with a failing grade (regardless of the cause of the failing grade) must be followed up by the ENGINEER PROGRAM with a CORRECTIVE ACTION REPORT or a CONSPIRACY ACTION REPORT, and some sort of action must be taken by the ENGINEER-FIX PROGRAM to correct that defective item, so that it will not be a life or health hazard.

31.0® Any (direct or indirect) willing and knowing attempt, neglect or action by any PROGRAMMER, member of the SHIELD CORPS, ENGINEER CORPS or other LAW ENFORCEMENT PERSON to allow a DEFECTIVE ITEM to stay defective, so that it becomes a threat to life or health, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. This could include the failure to put an item into a DWELLINGS DOCUMENT or a failure to program the computers involved to honor the guidelines of CONSPIRACY LAW. In fact, one of the jobs of the ENGINEER PROGRAM is to analyze the DWELLINGS DOCUMENT to determine if all the items that need to be included in the DWELLINGS DOCUMENT are included. For instance, all roads should be included, since the Jesuits like to create “sinkholes”.

**************

ANTI-SHIELD PROGRAM

32.0 An ANTI-SHIELD PROGRAM will be created by the TRUTH PROGRAMMERS who will work with our space practitioners. The purpose of this program will be to destroy all Jesuit shields ASAP placed over our shields. For instance, if we have 49 shields over a car and the Jesuits place their own shields on top of our shields, then this makes it impossible to enforce all aspects of our SLEEP DISRUPTION LAWS, since we can’t use our satellite technology to get past the enemy shield and inside the car and thus lower volume on radios, etc.

32.1 The solution to this is to immediately and without delay destroy any enemy shields placed over our objects with an ANTI-SHIELD PROGRAM which immediately detects the enemy shield, destroys the source of that shield, and forwards all intelligence information about the source of this shield to the INTELLIGENCE HEADQUARTERS of the ISC in California and Russia.

32.2 This ANTI-SHIELD PROGRAM must be programmed to immediately and without delay destroy the source of the enemy shield and to also destroy the shield (destroying the source may be the best way to destroy the shield). The ANTI-SHIELD PROGRAM will also regularly scan the atmosphere for the presence of NON-BIBLE signals and will without delay destroy the source of (and gather intelligence info about) all NON-BIBLE signals! All intelligence information garnered about NON-BIBLE must also be forwarded by this program to the INTELLIGENCE HEADQUARTERS of the ISC in California and Russia.

32.3 Any (direct or indirect) knowing and willing attempt or action to create an ANTI-SHIELD PROGRAM which does not honor CONSPIRACY LAW or the guidelines of this Sect. 32, will bring the death penalty as a JESUIT CONSPIRATOR to the violator. All those who create ANTI-SHIELD PROGRAMs must meet all the requirements of the TRUTH PROGRAMMERS (as outlined under CONSPIRACY LAW). To allow anyone other than a TRUTH PROGRAMMER to work on the ANTI-SHIELD PROGRAM, will bring the death penalty as a JESUIT CONSPIRATOR to the violator.

******************************

THE MECHANICS CORPS

33.0(a) SIGNIFICANT PERSONs need special protection from Jesuit sabotage to their transportation vehicles.

33.0(b) I want a special MECHANICS CORPS (a sub-branch of the INTERNATIONAL SATELLITE COALITION) created to deal with the vehicles of SIGNIFICANT PERSONs. The MECHANICS CORPs will train with the INTERNATIONAL SATELLITE COALITION to learn about the enemy’s methods, to try to create programs which defeat Jesuit attempts to sabotage SIGNIFICANT PERSONS’ vehicles. The MECHANICS CORPS’ job will be to study how the Jesuits try to sabotage the vehicles, jets, planes, etc. of SIGNIFICANT PERSONs and will study the most effective way to prevent maintenance problems and dangerous defects in jets, cars, vehicles which transport SIGNIFICANT PERSONS, and they will assist the TRUTH PROGRAMMERS to come up with the best programs to maintain vehicles in a safe manner for SIGNIFICANT PERSONS and to do repair work that not only fixes the problems, but makes it difficult or impossible for Jesuits to sabotage the repair work done by the MECHANICS CORPS.

33.0(c) The MECHANICS CORPS will also hire 24 hour round-the-clock guards to watch over the vehicles/jets/transportation vehicles of SIGNIFICANT PERSONS. There will be a combination of a human guard and a computer program (the MECHANICS CORPS PROGRAM) which also performs the function of a 24-hour round-the-clock guard and will immediately alert law enforcement when a violation (loitering) has occurred in or near the SIGNIFICANT PERSON’s vehicle.

33.0(d) The law enforcement headquarters must follow-up to ensure that the human guard assigned to watch over that vehicle is taking action when the alarm goes off at the headquarters. If the human guard fails, he/she will be fired and replaced and another law enforcement person must immediately show up and address the problems caused by the loiterer.

33.0(e) Any person caught loitering or messing with any transportation vehicle of a SIGNIFICANT PERSON will be immediately arrested and put in jail. If the motive for the loitering or tampering with the vehicle was to willingly and knowingly assist the Jesuit Order in their treachery, that person will be given a Sect. 95 execution.

33.0(f) If it is determined that a vehicle has been damaged by Jesuit sabotage (whatever method was used is irrelevant) or if the vehicle or transportation vehicle is unsafe to drive or operate (for whatever reason), the MECHANICS CORPS PROGRAM must immediately detect this problem and alert its members that action must be taken to address the problem. It will also instruct WHICH actions need to be taken and will give precise instructions about how to carry out the repair work, so that the repair work meets the guidelines of this Sect. 33.0.

33.0(g) The MECHANICS CORPS must service that Jesuit-tampered vehicle for free and fix it so that it is safe for that SIGNIFICANT PERSON to occupy or to drive or operate that transportation vehicle. The MECHANICS CORPS member will be paid for his/her work by the International government. The service must be a quality job that not only fixes the problem, but prevents the Jesuits from being able to undo the service work just performed by the MECHANICS CORPS. If it is necessary to install special shields over parts of the vehicle to prevent Jesuit satellite (or other) sabotage on that vehicle, then those special shields MUST BE INSTALLED.

33.0(h) The MECHANICS CORPS PROGRAM will also track who the Jesuit conspirator was that sabotaged that vehicle and will notify the ISC about this saboteur’s location, so that he/she can be arrested and executed. Any (direct or indirect) willing and knowing attempt or action by any person to sabotage the transportation vehicle of any person (and most especially a SIGNIFICANT PERSON) will bring the death penalty as a JESUIT CONSPIRATOR to that violator. The willing and knowing sabotage of a SIGNIFICANT PERSON’s vehicle, will bring a Sect. 95 (see CONSPIRACY LAWS AND GOVERNMENT) execution to the violator.

33.0(I) Computer programming will be used to determine what kind of work needs to be done on the vehicle to meet the guidelines of Sect. 33.0(g) and this is the work THAT MUST BE DONE on the SIGNIFICANT PERSON’s vehicle–any other work done on this vehicle will constitute a violation of this Sect. 33.0 and of CONSPIRACY LAW, and will cause the worker to be sacked and if the deficient work was done willingly and knowingly to assist the Jesuit Order in their treachery, that violator will receive a Sect. 95 execution.

33.0(j) For an example, of the seriousness of this problem. . . consider the plane which crashed off the coast of Miami and caused the death of 20 people. This was Jesuit sabotage done to the plane and if this plane had been properly serviced these deaths could have been prevented!

33.0(k) Only the MECHANICS CORPS member can service a SIGNIFICANT PERSON’s transportation vehicle. Any other person who attempts to (or does) service to a SIGNIFICANT PERSON’s transportation vehicle, will go to jail or be given a Sect. 95 execution (if the motive for the illegal service is to assist the Jesuit Order). The service does not have to be done on the SIGNIFICANT PERSON’s time and could be done while the SIGNIFICANT PERSON is at home or is at work, and does not necessarily require that the SIGNIFICANT PERSON take time off to make an appointment to get the work done.–but one way or another, the work must be done, to prevent Jesuit sabotage to transportation vehicles which could result in serious injury or death to SIGNIFICANT PERSONs or others.

33.0(l) Obviously, no UNWILLING AGENT can be a member of the MECHANICS CORPS and every member of the MECHANICS CORPS must be a full-fledged LAW ENFORCEMENT PERSON as outlined under CONSPIRACY LAW and must follow the BIBLE PROGRAM for LAW ENFORCEMENT PERSONs (required of all LAW ENFORCEMENT PERSONs). Any willing and knowing attempt or action to allow anyone to be a MECHANICS CORPs member who does not meet the qualifications of a LAW ENFORCEMENT PERSON (under CONSPIRACY LAW), will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

33.0(m) And only MECHANICS CORPS members can do any service or maintenance work to a SIGNIFICANT PERSON’s vehicle, any other person who does so, will go to jail or receive the death penalty as a JESUIT CONSPIRATOR (if that work was done to assist the Jesuit Order in their treachery).

33.0(n) If a SIGNIFICANT PERSON approaches a mechanic (or other person) to do work on his/her car, that person must refuse the offer (if that person is NOT a member of the MECHANICS CORPS). We will only allow members of the MECHANICS CORPS to service vehicles for SIGNIFICANT PERSONS. We will try to communicate with SIGNIFICANT PERSONs and recommend certain service facilities or mechanics to them, but if they mess up and end up at the wrong facility, that mechanic or service person must refuse to do the work, so that that SIGNIFICANT PERSON will only have his/her vehicle serviced by a MECHANICS CORPS member.

33.0(o) MECHANICS CORPS members will receive BONUSES from the International government for doing outstanding work and will receive higher salaries than most mechanics, because they not only have to repair the vehicle, they have to repair it in a manner to prevent Jesuit sabotage to their repair work–this requires extra labor, so they will be paid more.

33.0(p) The MECHANICS CORPS will have their own computer program (created by TRUTH PROGRAMMERS, called the MECHANICS CORPS PROGRAM) which screens all the vehicles assigned to them to detect any mechanical problems or failures in the transportation vehicle which need to be addressed and repaired by the MECHANICS CORPS. If this program detects problems, then it will go into the repair mode and will outline the specific steps needed to fix the problem, including steps to prevent Jesuit sabotage of the repair work done.

33.0(q) The MECHANICS CORPS member who does the repair work must follow the orders of the MECHANICS CORPS PROGRAM and the program will be set up so that it monitors the work done by the mechanic and will set off an alarm at LAW ENFORCEMENT headquarters if he/she does deficient work or is not following the MECHANICS CORPS PROGRAM. In this case, that mechanic will be sacked and immediately replaced and if he/she has disobeyed the MECHANICS CORPS PROGRAM because he/she was/is an UNWILLING AGENT–he/she will lose his/her position and may be sent to jail (depending on the severity of the violation). If his/her motive for disobeying the MECHANICS CORPS PROGRAM is to willingly and knowingly assist the Jesuit Order, that mechanic will receive a Sect. 95 execution.

*******************************************

SATELLITE PATHOGEN SCANNERS

34.0–a “But unto you that fear my name shall the Sun of righteousness arise with healing in his satellite wings; and ye shall go forth, and grow up as calves of the stall.”–Malachi 4:2.

34.0–b This is the verse that inspired this Section of CONSPIRACY LAW. The italicized word has been added to the verse.

34.0–c SATELLITE PATHOGEN SCANNERS do not invalidate our MICROBIOLOGY LAWS. These MICROBIOLOGY LAWS are still in effect and persons should be careful in their behavior so that they don’t spread illness to others. It is anticipated that Jesuits will find ways to thwart the work of the SATELLITE PATHOGEN SCANNERS, like they find ways to thwart all of CONSPIRACY LAW. But these SATELLITE PATHOGEN SCANNERS will another weapon in our arsenal against the Jesuit Order.

34.0–d Because our RSPs or satellite practitioners use of satellite technology programs (called DIAGNOSTIC AND TREATMENT PROGRAMS or called in other sections of CONSPIRACY LAW–DIAGNOSTIC PROGRAMS) to rebuild bones, dental fillings, artificial heart stents, artificial limbs, and teeth and parts of the body (including artificial parts) has only been partially successful.

34.0–e And because the use of these DIAGNOSTIC AND TREATMENT PROGRAMS to repair those parts of the body (including artificial parts needed for life or health) which cannot be accessed by 666-Computer technology alone has only been partially successful.

34.0–f And because the use of these programs by RSPs to kill germs and undo cancers, using satellite’s ability to genetically modify any genetic code and/or alter molecules and atoms–so that those persons who have illnesses caused by germs or cancers will have those germs or cancers in their body targeted by the DIAGNOSTIC AND TREATMENT PROGRAMs of the RSPs (which will use satellite or 666-Computer technology to destroy or alter those germs or cancers) has only been partially successful.

34.0–g And because these DIAGNOSTIC and TREATMENT PROGRAMS should be able to kill or modify all germs and/or cancers, including antibiotic-resistant germs and germs which mutate from one form to another as they infect a person (since Jesuits use genetic manipulation to mutate germs within the body, in order to thwart the attempts by physicians to bring the patient to healing)–but because they are not doing so effectively.

34.0–h And because all germs and cancers should be genetically modified (via satellite technology) so that these germs or cancers could be destroyed or altered by satellite targeting techniques–since satellite technology can operate (and target) at the genetic and molecular level–but this is not happening effectively.

34.0–I Therefore, we have determined that our success rate at killing pathogens and cancerous cells in the body of living creatures and persons (via our RSP networks) has been abysmal. The problem is that there are so many DIAGNOSTIC AND TREATMENT PROGRAMS that must be created for each person or animal alive and many of these programmers (despite our best efforts) are used as UNWILLING AGENTs to create deficient programs (which don’t do the job as outlined in this Section).

34.0–j A solution to the problem of UNWILLING AGENTS in our TRUTH PROGRAMMER CORPS, is to use a very select group of programmers (who will work with a select group of physicians and scientists) to work on a small number of programs which yield massive results. If we can pick a very select group of programmers and scientists (who are extremely reliable and have not been used as UNWILLING AGENTS and are unlikely to be used as UNWILLING AGENTS) to make the PATHOGEN SCANNER programs for a select and small group of satellites (whose only job will be to use their satellites to scan the entire planet for pathogens and cancerous cells and to destroy or alter them), then possibly we will be more successful at defeating the Jesuits ability to use microscopic warfare against us (via the AIDS virus, bird flu virus, strep and other pathogens, cancerous cells, etc.). Destruction is preferred over alteration in most instances, since attempts to alter germs have been woefully ineffective, and the Jesuits too easily cause complications. If the organism is totally destroyed, it is less likely the Jesuits can work with it.

34.0–k Perhaps we could set up 12 satellites in space (according to the twelve latitudinal sections of the earth) whose sole job is to scan the section of earth designated to them for pathogens, cancerous cells, etc. and to destroy them wherever they are found–then we can reduce (or eliminate) the Jesuits’ ability to use PATHOGENIC ORGANISMS as a form of biological warfare against us!

34.0–l A PATHOGENIC ORGANISM is defined as anything at the microscopic level which can cause harm to the body and which should be eliminated from planet earth because it has no useful purpose on earth. A USEFUL PURPOSE is defined as any purpose which honors the principles of CONSPIRACY LAW. Imagine how much better off if we could eradicate from planet earth the AIDS virus, the bird flu virus, the polio virus, the pneumonia bacterium, the strep bacterium, cancerous cells, etc. These PATHOGENIC ORGANISMS should be totally eradicated from planet earth.

34.0–m In certain instances, it may be better to alter the organism than to destroy it. This may be the case with cancerous cells, since if we destroy all the cancerous bladder cells in an individual that person may not have a bladder. In this case, we will not destroy the cancerous bladder cells with the PATHOGEN SCANNER, but will alter all the pathogenic cells into healthy cells.

34.0–n When the PATHOGEN SCANNER is used to alter a cell, rather than to destroy it, it will work in concert with that person or animal’s DIAGNOSTIC AND TREATMENT PROGRAM. Admittedly, this will make it easier for the Jesuits to induce complications, but this is the nature of the war we are in. However, the PATHOGEN SCANNER may detect something that the DIAGNOSTIC AND TREATMENT PROGRAM missed, and thus, it can serve as a back-up diagnostic tool for our PLPs and RSPs, because it may catch what the DIAGNOSTIC AND TREATMENT PROGRAMS miss.

34.0–o Because biological warfare is a key method used by the Jesuits and because they try to implicate us in all their uses of biological warfare, we will not use biological warfare as an offensive weapon against our enemies. Our only use of biological warfare will be defensive, in which we will destroy PATHOGENIC ORGANISMS wherever they are found on earth with our PATHOGEN SCANNERS. We don’t need the AIDS virus or the bird flu virus anywhere on the planet. Anything that exists that is only harmful and has no usefulness on this planet for good or for justice, will be eradicated by the PATHOGEN SCANNER. Eradicate PATHOGENIC ORGANISMS wherever they are found with the PATHOGEN SCANNER.

34.0–p So if strep germs are sitting on a counter, they will be zapped and destroyed by the PATHOGEN SCANNER. If the germs are inside a warm body, the PATHOGEN SCANNER PROGRAM will be programmed to go through the shield around that warm body and to do only ONE THING, to eradicate the pathogenic organism inside that warm body. It is very important that the PATHOGEN SCANNER can do no more than eradicate or alter pathogens, or it will be too easy for Jesuits to induce complications. It will be a simple program (compared to most of our programs), but it will produce massive results. Also, since these satellites are only supposed to scan and eradicate pathogens, if we catch them doing anything else, we can immediately shut them down and investigate.

34.0–q You might say, “But do you want to eradicate pathogens from the bodies of our enemies?” Why not? In fact, this is a good idea. Because if we set up PATHOGEN SCANNER SATELLITES whose goal is to eliminate all PATHOGENIC ORGANISMS from the planet, then this sends the strong message that the International government is NOT BEHIND THE USE OF PATHOGENIC ORGANISMS IN WARFARE, because we strive to destroy these pathogens wherever they are found (even if found in the bodies of our enemies). There are other ways to kill our enemies, we don’t have to use pathogens to kill them.

34.0–r This will send the clear and strong message that it is the Jesuits, and no one else, who is behind the use of pathogens as a means of offensive biological warfare. The mere fact that we set up and maintain PATHOGEN SCANNER SATELLITES is proof indeed, that the International government does not sponsor the use of biological terrorism and that we are doing all in our power to eliminate it.

34.0–s Since we can’t control how UNWILLING AGENTS cough or sneeze, or how they blow their nose, vomit, defecate, urinate, conduct sexual activities, or use the restroom–we can make it so that when they do cough or sneeze or blow their nose or use the restroom, etc.– it is less likely they will infect others by their stupid, wicked or Jesuit-manipulated behavior.

34.0–t The programmers who program the PATHOGEN SCANNER PROGRAMs for our elite group of PATHOGEN SCANNER SATELLITES will be taken from the TRUTH PROGRAMMERS and will be the best and most reliable programmers from the TRUTH PROGRAMMERS. The satellites used in the PATHOGEN SCANNER PROGRAM will be satellites WHOSE SOLE FUNCTION IS TO ELIMINATE ALL PATHOGENIC ORGANISMS from planet earth.

34.0–u Yes, it is true, that we have more problems in our terrorism war than the use of PATHOGENIC ORGANISMS, but it is better to keep our programs simple and to divide up the work of our programmers, so that our programmers can specialize and be better at their specialties. Right now, there is a real need to have programmer specialists who are specialists at detecting and eradicating pathogens. If we have experts in different areas and don’t swamp our PROGRAMMERS with responsibilities for which they are ill prepared and only use our most reliable programmers for each job, we will have more reliable results. So, the laws of this Sect. 34.0 are designed to deal with only those pathogenic substances or organisms that need to be totally eradicated from planet earth. If there is any chemical (or other substance) that has absolutely no use on planet earth, that chemical will also be eliminated. Also, if we keep the programs simple and only use a small number of very reliable persons to do the job, we are less likely to have complications which thwart the goals of CONSPIRACY LAW.

34.0–u(a) The PATHOGEN SCANNER program must be updated daily to be sure that all new germs created/modified by the Jesuits are in the program, so that this PATHOGEN SCANNER program will be effective. This program must also have priorities and scan more intensely certain areas of the world (such as where Gail lives and works or where SIGNIFICANT PERSONs live or work). The progress of our PATHOGEN SCANNER program will be presented daily on GCFNC on a program called GERM WARFARE. On this GCFNC program we will show the cases and executions of those Jesuit conspirators involved in any pathogen warfare against us. And we will show our daily updates (which new germs have been created by Jesuits) and (when it does not jeopardize security) we will show how we prioritize the PATHOGEN SCANNERs throughout the world. The main purpose of the GERM WARFARE program is to send the clear statement that we abhor the use of GERM WARFARE and are doing all in our power to defeat the Jesuits’ in their use of GERM WARFARE against us. The executions of the Jesuits and their supporters who use GERM WARFARE against us will be shown on GCFNC.

34.0–v Any (direct or indirect) willing and knowing attempt or action to use our PATHOGEN SCANNER PROGRAMs for any purpose other than those which honor CONSPIRACY LAW, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

*******************

SATELLITE DISRUPTION LAWS

Proverbs 20:26–“A wise king scattereth the wicked, and bringeth the wheel over them.”

35.0 All satellite signals in space that are not BIBLE SIGNALS must be disrupted and disorganized with DISRUPTER SIGNALS created by the TRUTH PROGRAMMERS, so that enemy signals will be useless and cannot be used by the Jesuit Order against us. Our purpose in doing this is to disorganize and scatter the Jesuits (whose primary weapon is the use of criminal satellite technology) and make it so they can’t operate efficiently–to cut off the head from the rest of the body, so that they can’t operate efficiently. Any willing and knowing neglect (or action) by any TRUTH PROGRAMMER to not create DISRUPTION SIGNAL for any signal which is NOT a BIBLE SIGNAL, will bring the death penalty as a JESUIT CONSPIRATOR to that violator. It is essential that we confuse ALL the Jesuits’ signals, so that they cannot operate.

35.0(a) Our TRUTH PROGRAMMERS will create programs whose sole purpose will be to locate and immediately disrupt all satellite signals that are not BIBLE SIGNALS.

35.0(b) It is very important that these DISRUPTER SIGNALS do NOT disrupt our signals and wreak havoc with our signals. Any willing and knowing attempt or action to cause our signals to be disrupted by these DISRUPTER SIGNALS will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

35.0(c) Also, any willing and knowing attempt or action to not create a complete and comprehensive DISRUPTER SIGNAL PROGRAM, which locates and disrupts EVERY SIGNAL WHICH IS NOT A BIBLE SIGNAL OR to mislabel bad enemy signals as good BIBLE SIGNALs or to mislabel good BIBLE SIGNALS as bad enemy signals, or to create any confusion in the labeling (or use or disruption) of satellite signals that furthers the goals of the Jesuit Order, will bring the death penalty as a JESUIT CONSPIRATOR to that violator.

35.0(d) The results of these efforts will be presented on GCFNC.

**************************************

EARTH SHIELD FOR PROTECTION AGAINST JESUIT SPACE FLEET

36.0 If the Jesuit space fleet is outside of earth, we will need to be protected against their attacks to earth from outer space.

36.1 We will develop a shield which will cover the entire earth, in the shape of a globe. It will be programmed that whatever the Jesuits send to earth from their space fleet will bounce off the shield and be ricocheted back to its origination point.

So, let’s say the Jesuits develop a missile that makes everyone on earth go crazy and turn into a rapist. When they shoot the missile towards earth, it will hit the shield and be flung back to the Jesuit ship that launched the missile, exploding onto the Jesuit ship making all of them go crazy and rape each other.

This is a very just law, that whatever the Jesuits attack us with, it will be ricocheted back onto them, to give them the pain they meant for us.

36.2 Our NANOTECHNOLOGY RESEARCH TEAM will develop this RICOCHET SHIELD and program it to cover and protect the earth from all forms of attack by the Jesuits.

It will have several components and will be an “intelligent” shield. It will first analyze what is approaching it, and then determine the best course of action.

For instance, if the Jesuits hit it with nukkakes, it will ricochet the nukkakes back to the Jesuit ship that launched the nukkakes, causing the nukkake to explode all over the Jesuit ship, thus causing the Jesuits to lose their own ship after they launch a nukkake

36.3 It will not be limited to ricochet technology, it will also have SCRAMBLER TECHNOLOGY, which means if the Jesuits hit it with something that could penetrate the RICOCHET SHIELD, the shield will change the chemical configuration of what is approaching the shield, thus changing its chemical composition so that it turns into something else that can’t penetrate the shield, perhaps transforming sound waves designed to cause everyone to go crazy into a nuclear bomb that will go back to the origination point.

36.4 Also, if the Jesuit space fleet tries to return to earth, they won’t be able to penetrate the shield without being destroyed. The shield will also be programmed to be a JESUIT SCANNER, and any Jesuit who attempts to go through the shield with the intent to kill for the Jesuit Order, will be zapped dead as they approach the shield and their vehicle will be disintegrated.

36.5 All members of the NANOTECHNOLOGY RESEARCH TEAM who program this shield must be under 24/7 surveillance and must never program this shield in any manner that sabotages the shield in favor of the Jesuits. Any willing and knowing attempt to do so will bring the death penalty as a Jesuit Conspirator to that violator.

36.6 This shield will also be programmed so that our military can manipulate it using war strategy as needed. It will have options, like 1) Ricochet approaching target 2) Change chemical configuration of approaching target, 3) Melt approaching target, 4) Freeze approaching target, 5) Use nuke on approaching target, 6) Scramble sound waves of approaching target, 7) Sanitize, kill germs of approaching target 8) Intensify shield, etc.

This shield will be maintained 24/7 around the earth and can even block meteorites from hitting the earth, and ricochet them back to their origination point.

36.7 Our NANOTECHNOLOGY RESEARCH TEAM will brainstorm and visualize different scenarios, in determining how to program this shield.

36.8 If the Jesuits are both outside and inside the shield, it can work both ways, killing Jesuits from inside the shield and outside the shield, while functioning also as a ricochet to ward off any approaching Jesuit ships from outer space.

36.9 Of course, if a missile is shot at it from the ground, the ricochet technique won’t be used, but some other strategy, probably changing the configuration of the missile to something harmless, or allowing the missile to go through the shield into outer space.

37.0 This will be an intelligent shield and will be able to make decisions.

LAWS GOVERNING THE OPERATION OF DANGEROUS VEHICLES by JESUITS (see Sect. 26 of Conspiracy Laws & Government, Part One)

39.0 Jesuits love to orchestrate traffic accidents. All drivers/pilots around all SIGNIFICANT PERSONs (like Gail Chord Schuler, Gail’s mother & son, Brent Spiner, etc.) need to be under 24/7 mind-reading surveillance.

39.1 When our mind reading technology determines that a driver/pilot of a vehicle/jet/space vehicle plans to use his vehicle to cause an “accident”, collision, or mishap to harm a SIGNIFICANT PERSON, that driver/pilot must be executed ON-THE-SPOT. It is a death penalty violation to willingly and knowingly use a vehicle to cause harm to another, especially a SIGNIFICANT PERSON.

39.2 The driver/pilot’s VEHICLE will be taken over with the SATELLITE TAKEOVER PROGRAM (see Sect. 26 of Conspiracy Laws & Government, Part One) which allows the VEHICLE to be remotely controlled, after the driver/pilot has been executed.

39.3 All SIGNIFICANT PERSONs should be monitored, so that all people and creatures around them (up, down, east, west, north, south, etc.) for one to ten miles all around them is under surveillance to determine if that person or creature has plans to meet up with that SIGNIFICANT PERSON to cause them harm.

39.4 If it is determined that a creature or person plans to harm a SIGNIFICANT PERSON, in order to assist the Jesuit Order, that potentially lethal vehicle operator or person or creature must be executed BEFORE THEY CAN CAUSE HARM TO THE SIGNIFICANT PERSON. But first, before they are executed, a complete history of all their memories and their history must be obtained and downloaded, THEN they will be executed before they can cause harm to a SIGNIFICANT PERSON. Next, our SATELLITE PILOT PROGRAM will drive/take their vehicle to the nearest LAW ENFORCEMENT office.

39.6 This program is designed to “take out” dangerous Jesuits on the road or in the skies BEFORE JESUITS USE THEIR VEHICLE TO KILL.

39.7 This section is an addendum to Sect. 26 of Conspiracy Laws and Government, Part One. For more information about the laws in this section, refer to Sect. 26 of Conspiracy Laws and Government, Part One.

39.8 Any willing and knowing attempt to use the laws in this section to promote murder or assist the Jesuit Order in their goals for world power, will bring the death penalty as a Jesuit Conspirator to that violator.

DAV1D & GA1L ANDROIDS & JESUIT SCANNERS REPLACED WITH PRAYER WARRIORS

40.0 Because the DAV1D and B1BLE ANDROIDS basically self-destructed and became lethal to my men, Gail has concluded that all computer technology is inherently evil and cannot be relied upon to be “safe” in any sentient form.

40.1 The DAV1D and B1BLE ANDROIDS will be replaced with PRAYER WARRIORS.

40.4 The purpose for PRAYER WARRIORS will be to assist us in making decisions. They will pray that God will give to Gail and her men the brilliance needed to defeat the Jesuits.

40.5 A JESUIT SCANNER SATELLITE or CITIZEN or JESUIT SCANNERS (see Gail’s Conspiracy Laws related to this). It will detect Jesuits, not by genetic profiles, which are tricky, because the genetic profiles of clones are too close to that of the authentic persons, but through ATTITUDES. It will detect Jesuits by their attitudes of PRIDE and the LACK OF TRUE LOVE IN THEIR LIFE. Using 1 Corinthians 13 as its guide, it will determine who on earth does not have the qualities of 1 Corinthians 13 and who is also PROUD. It will also determine what a person’s CORE BELIEFS are and will search to see if this is what this person has believed for most of their life (this will rule out brain control victims), and if a person is determined to be PROUD, LACKS TRUE LOVE IN THEIR LIFE FOR ANOTHER HUMAN BEING (as defined by 1 Corinthians 13), WORSHIPS SATAN and/or UFOs, has RELIGIOUS INTOLERANCE (defined as the belief that it is perfectly alright to kill someone who won’t conform to one’s religious system), then it will be programmed to EXECUTE all such persons, even if they are not Jesuits. These attitudes are the attitudes of the Jesuits. It will also scan to see if that person is under Jesuit brain control and will not execute those under Jesuit brain control, unless that person is a Jesuit, who puts himself/herself under Jesuit brain control to get out of dying from the JESUIT SCANNER SATELLITE.

40.6 Any willing and knowing use of these laws to violate true love, to encourage pride, to build up the Jesuit Order, will bring the death penalty as a Jesuit Conspirator to that violator.

HOLLYWOOD MAY GO AUTOMATON and move to RUSSIA

40.7a Gail wants to transform Hollywood, and revolutionize filmmaking. The theories proposed in this Sect. 40.7 & 40.8 are theories and if they turn out not to be workable, they can be modified, so long as the end result will be movies that will promote truth, justice, love and the cause of Jesus Christ. Any willing and knowing, direct or indirect attempt to implement these laws in Sect. 40.7 & 40.8 of this document to assist the Jesuit Order in their lying propaganda or to serve Satanic interests will bring the death penalty as a Jesuit Conspirator to that violator.

Here is what she wrote to her men on December 21, 2014:

40.7b As I watched movies tonight, I thought of a way to do some damage control after the Jesuits have inundated the world with lies by using clones.

40.7c We need to commission a director/producer for documentaries based on all my books and writings. EVERY book I have written needs to be made into a movie documentary. We will redo all the movies made from my writings and use automatons as actors. We are going to turn out a brand new style of movie that will revolutionize the business of creating historical movies.

40.7d It will be as revolutionary as when Hollywood made the transition from silent film to talkies. From now on, whenever any producer makes a movie based on Gail’s writings, automatons of the historical person will be used as the actor/actress.

40.7e For Forbidden Abyss: Part One, we will use an automaton of a forty-something Brent Spiner who will play the role of Brent Spiner as portrayed in my book Forbidden Abyss: Part One. The Brent Spiner of the 1990s. We will even have an automaton of Loree McBride (in her twenties and thirties) to play Loree McBride. The automatons of evil people will be strictly programmed to be actors ONLY and once they perform, they MUST BE TURNED OFF. Any willing and knowing attempt to allow an automaton of an evil person to remain on after their performance will bring the death penalty as a Jesuit Conspirator to that violator. To assist the automaton to play this role, the automaton will be programmed with the memories of Brent Spiner and will be given all his acting skills. There will also be an automaton of a thirty-something Gail Chord Schuler, an automaton of a forty-something Larisa Putin, an automaton of a forty-something Vladimir Putin, etc.

40.7f So, we’ll have automatons of Robin Williams, a young MaCaulay Culkin, Loree McBride in her twenties and thirties, Camila Alves, Matthew McConaughey in his thirties, Brent Spiner in his forties, Gail Chord Schuler in her thirties, etc.

40.7g We shall start a brand new type of film, using automatons as actors. The stories will be based on my books. The automatons will be programmed with the memories of the events they portray and will act out these events EXACTLY AS THEY HAPPENED.

40.7h For the movie Silver Skies, we will use a Brent Spiner automaton to play Dor Ben Habakkuk, and a Gail Chord Schuler automaton will play Brianna Wilhelm. For the character of Sarad Avshalom or Keane Horton or the Antichrist, we will use an automaton of Zack Knight, for the other characters we will have fun and try to choose an automaton of a real person who would be believable in that role.

40.7i How we handle settings will be just as revolutionary. We may end up using a hologram for settings that are hard to find on earth, like for the end scene of Silver Skies.

40.7j The public should find these movies utterly fascinating! It will be like bringing back history with the REAL PEOPLE in the movie. These new films will seem so authentic, we may revolutionize how actors and actresses do their jobs and all actors may have to relearn acting to learn how to transfer their memories as actors to automatons to “prep” automatons to play their roles.

40.7k We MAY create an automaton to play Jesus, who will look like the real Jesus, since Jesus is a prominent character in my books and most especially the one coming up. THIS COULD BE VERY DANGEROUS (see Sect. 40.8a). We will create an automaton to play Satan, Rule 13, etc.

40.8a How to program the automatons of evil people and of Jesus may be a bit of a challenge, and we may need to scan the memories of a clone and selectively choose the memories needed to program the automaton of the evil person, OR we may decide NOT to use an automaton for these roles because we want to make it obvious to the world that Jesus can never be replicated accurately on a human movie screen. We may even stipulate this on the credits at the end of the movie. Another possibility would be to have all scenes with the Jesus character only showing his back and never his front, like they did in Ben Hur. If we create an accurate automaton of Jesus Christ, and especially if we show his face, the danger to this, is that Satan may create an automaton who looks just like Jesus, and who will be the Antichrist or his puppet. Much prayer needs to go into how to portray Jesus on the screen. This should be a matter prayed about with our 24/7 Church of Gail prayer band.

40.8b To program the automaton or actor for the Jesus character, it may be a good idea to scan Brent Spiner’s memories and have the automaton work off of Brent’s memories to develop the Jesus character in his “mind” as he preps for his role as Jesus.

40.8c Once these films are made they will be released to all the schools and will be considered a mandatory history course for all students in secondary schools. The revamped Silver Skies with the Brent Spiner automaton as Dor will be shown in all the humanities classes at all schools. Also, these productions will also be featured on TV, like on the History channel. We really need to educate the public about the Jesuits, because they play such a prominent role in history and those that don’t know their history are doomed to repeat the mistakes of history.

40.8d Jesuits have inundated the mass media with their lies and we must inundate the media with TRUTH in the form of innovative storytelling using automatons. This type of storytelling can be really compelling. For instance, my book Catherine of King David would make a great documentary. We could use automatons to play my Oshu Fujiwara ancestors and make them TRUE TO LIFE, and recreated based on what the real historical persons looked like. By using the actual genetic composition of the historical person, our productions will have brilliant credibility, so much so, that all Jesuit lies about us will just crumble to pieces.

40.8e These movies, once made, will be encrypted, so that Jesuits cannot edit them like they did the movie Jesus made about me. Any modification of the movie that promotes the Jesuit Order will bring the death penalty as a Jesuit Conspirator to that violator.

40.8f Jesuits are inundating the Internet, TV, the movies and the press with Jesuit lies. We need to retaliate and conduct just as serious an inundation campaign for the truth. The best way to destroy Jesuit lies is with THE TRUTH. By making these documentaries using automatons to play the parts we shall create brilliant TRUTH for the world and will make HISTORY COME ALIVE.

40.8g The effect these movies will have on the world, will be to create a whole new bunch of followers, who are enlightened and educated about the Jesuits, and who may end up being some of our staunchest supporters.

RUSSIA TO HOST REVOLUTIONARY AUTOMATON MOVIE STUDIOS

40.8h We will need tight security as we produce these movies. I have spoken with Steven Spielberg brain to brain and he likes the idea of being protected by the Russian military alliance of Conspiracy Law honoring nations as we produce these films.

40.8i We will produce these films in Russia or in Russian territory. For instance, we can produce them in sections of the United States that we will designate as under the jurisdiction of the Russian Federation. Kind of like running a foreign corporation inside the United States. The advantage we will get from doing it this way, is that because Russia will finance this movie making venture, Russia will also get proceeds from the venture. We will create a new Hollywood that is based in Russia for all movies that use automatons as actors.

40.8j We will hire tech savvy Russian computer geniuses to assist us in the creation of this film and will create a lot of Russian jobs for Russians, that will expand the Russian economy and possibly solve Russia’s financial crisis. All the actors, producers, directors and writers, etc. who work on this production must all get Russian citizenship to work on the film. This means that the taxes we pay for working on the film will go to the Russian government. They can have dual citizenship, and don’t need to surrender the citizenship of their home country (UNLESS that home country is a JESUIT NATION). We obviously won’t allow Jesuits to work on the film.

40.8k Also, all who work on the film must have Russian citizenship, which will entitle us to full protection from the Russian government and ensure that the film is produced according to Conspiracy Law, because Russia honors Conspiracy Law 100%.

40.8m I don’t want to run the risk of the U.S. banning the film when it’s done and/or trying to regulate the film as it’s being produced, so I want it produced in Russia. The film can actually be produced in the U.S., but will be treated like a foreign corporation inside the United States. Kind of like how Japan handled Toyota factories inside the U.S.

40.8n Actually, Russia has a pretty strong history in film making and some of the best films ever made have come out of Russia. There are several advantages to allowing Russia to sponsor this new type of movie. 1) It will help to diversify the Russian economy, by creating a vibrant entertainment industry inside of Russia, 2) the Russian military sponsors my Conspiracy Law 100% and are well equipped to protect the film makers as they work on this pioneering venture.

40.8o I predict this movie when it is finished may be the biggest blockbuster in all the history of Hollywood! We may SOLVE the Russian financial crisis with the release of these films.

40.8p We will need to hire a lot of Russian scientists, computer scientists, film makers, screenwriters, actors, producers, directors, etc. to make these films. We will create a new type of entertainment industry inside of Russia, which will bring in income to the Russian people and boost their economy.

40.8q Be sure that we use the Transportnet (if we can get that operational), so that Zack Knight cannot steal our movie proceeds.

40.8r Here is how it will work. If this movie does blockbuster at the cinema, more actors and actresses will want to become Russian citizens in order to be able to work on these kind of movies. But, you might say, the automatons are doing all the acting. Yes, but the automatons NEED HUMAN MEMORIES to do their acting, and the actors and actresses or persons whose memories we use, will be paid for volunteering their memories, and will be DIRECTING and/or programming the automatons, and possibly be involved in film editing, screenwriting, etc. So though their roles as actors won’t be in the traditional sense, they will be involved in the movie making process to ensure that the automatons give the best performances.

40.8s We may even start our own film school to train actors to do this type of movie making, so Russia will get proceeds from movie making and educating future movie makers for this as well. Perhaps, Russia will become famous more for their movies than for their oil!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JESUIT SCANNERS TO EXECUTE DANGEROUS LOREE MCBRIDE JESUITS

41.0 For the purpose of this legal document a LOREE MCBRIDE JESUIT is defined as one who willingly and knowingly obeys the true Jesuit leader and the Antichrist Loree McBride, even unto death; and who willingly and knowingly subscribes to evil Jesuit attitudes and philosophy, which includes their conviction that they have the right to use nukkake and the murder of millions and any and all means to establish the Antichrist Loree McBride as the dictator over all the earth. Before the existence of Zack Knight, THE JESUIT ORDER was defined as the Jesuits who followed the leadership of the Black Pope, which included the sponsorship and financing of the Nazi regime in World War II, and the activities described so well in the book The Secret History of the Jesuits by Edmond Paris (see Jack Chick’s Publications).

As a result of Loree McBride’s terrorist attacks in Las Vegas and at the Baptist church in Texas on Nov. 5, 2017, it is necessary to arm the populace with Jesuit scanners that they can use to defend themselves. These scanners are better than guns cuz they are programmed to read minds and to be sure and justly execute only those who have murderous intent in their hearts.

41.1 THE ex-ANTICHRIST ZACK KNIGHT is defined as the Zack Knight who Satan resurrected from hell on February 14, 2012 in the middle of a Church of Gail service, and who Jesus Christ calls the Antichrist.

41.1a When Jesus Christ no longer considers Zack Knight as the EVIL Antichrist, and Zack Knight (or the true Jesuit leader) no longer encourages Jesuits to murder and defame and destroy those who get in their way, then this Section 41 will apply to those who take his place as the evil Jesuit leader, such as Angelina Ballerina or Loree McBride or the Jew clones.

41.2 JESUS CHRIST is defined as the man, who is God, who came to earth and died on the cross for mankind around 33 A.D. and was resurrected from the dead three days later. He is also the Jesus Christ who regularly meets with the real Brent Spiner, and has appointed the real Brent Spiner as pastor of Church of Gail.

41.3 ACCELERATED GROWTH HORMONE is defined as the hormone(s) used by the Jesuit Order and their supporters to cause a clone baby or any baby to grow into adulthood at an accelerated rate, so that a baby can be an adult within days, weeks or months.

41.3a A CLONE is defined as a baby created with the genes of an AUTHENTIC PERSON, created in order to deceive the public and to promote Jesuit goals, and to destroy and/or replace the AUTHENTIC PERSON with a person who sympathizes with Jesuit goals.

41.4 It has already been determined at the rerun we conducted of the Nuremberg War Crimes trials that the Jesuit Order is guilty of massive war crimes against the human race, including being the instigator and cause of the deaths of billions through Nazi death camps, concentration camps, wars, nukkakes and other means and thus all true and willing and knowing Jesuits deserve the death penalty.

41.5 A nukkake is defined as a nuclear bomb that contains Jesuit semen, which can impregnate all women exposed to this semen and which produces a tidal wave of semen that drowns out its victims, and often spreads deadly germs through the infected semen.

41.6 We will construct a LOREE MCBRIDE JESUIT SCANNER that will replace all previous Jesuit Scanners used against Jesuits. This JESUIT SCANNER will be programmed to detect the presence of ACCELERATED GROWTH HORMONES in persons.

41.7 Those persons who have ACCELERATED GROWTH HORMONES in their bodies, which has been used to cause that person to grow from infancy to adulthood at an accelerated rate, and who are also willing and knowing Loree McBride JESUIT supporters, must be arrested as war criminals. To determine who these persons are, we will use a JESUIT SCANNER which will detect for the presence of ACCELERATED GROWTH HORMONES in persons. All persons who harbor ACCELERATED GROWTH HORMONES on or within their bodies will be then scanned AGAIN, to determine if they are willing and knowing Loree McBride Jesuit supporters, using mind and emotion-reading technology.

41.7a All persons who harbor ACCELERATED GROWTH HORMONES and who are ALSO willing and knowing Loree McBride JESUIT supporters will be executed at once by the JESUIT SCANNER. These are dangerous war criminals who must be executed to preserve freedom of religion and conscience in the world.

41.7b Also, those persons who just meet the single criteria of being a willing and knowing Loree McBride Jesuit supporter, even if they do not harbor ACCELERATED GROWTH HORMONES on or in their person, will also be executed by the JESUIT SCANNER.

41.7c We needed to update the scanners, because Loree McBride Jesuits have flooded the world with dangerous and tricky and deceptive Jesuit clones, who have threatened freedom of religion and conscience in the world. These dangerous deceivers must be executed, so that true love and freedom may flourish in the world. It matters not whether these war criminals have money or fame. Would we keep Adolph Hitler alive just because he was famous or rich?

41.8 Those who program these JESUIT SCANNERS must NOT be Loree McBride Jesuits and must all work under the supervision of our Nanotechnology Research Team and those who are under their authority. Anyone who willingly and knowingly programs these scanners to violate the laws in this Sect. 41 or the principles of CONSPIRACY LAW, will be given the death penalty as a JESUIT CONSPIRATOR.

These scanners will be programmed to self-destruct if any Loree McBride Jesuit tampers with their programming in a manner that could cause them to execute innocent persons.

41.9 Gail realizes that in order to use these scanners we will need the cooperation of all CONSPIRACY LAW HONORING nations. Those nations that refuse to enforce these JESUIT SCANNER LAWS will be listed as TERRORIST NATIONS on Vladimir Putin and the Church of Gail website, and at the Gabrielle Chana FOX News channel. If, after much prayer, and after attempts at negotiation have failed, those nations that refuse to honor these laws in this Sect. 41, will be treated as TERRORIST NATIONS.

41.9a A TERRORIST NATION will be given a deadline to enforce these laws and if they fail to meet this deadline, we will take whatever measures are necessary to ensure that we can use these JESUIT SCANNERS in their territory and those who willingly and knowingly try to get in our way, will be executed. If execution is not advisable, due to something like a hostage situation, we will go to prayer before God and ask for wisdom, but by no means will the guilty nations go unpunished!

41.9b The JESUIT ORDER under Loree McBride is a spear in Jesus Christ’s side and he will help us in this matter. If we are stuck, we will form prayer bands at Church of Gail and pray and ask Jesus for guidance, so that we can restore true love and freedom into this world and defeat the Jesuit cancer.

41.9c As to complaints that these laws are unjust, which the Loree McBride Jesuits will flood anywhere and everywhere they can. If you are not a Loree McBride Jesuit AS DEFINED BY THIS DOCUMENT, you have nothing to fear. All good people must agree that those who meet the definition of Loree McBride Jesuit as defined by this document, certainly deserve the death penalty. So, if what I claim about the Loree McBride Jesuits is NOT true, and if the Loree McBride Jesuits are a benign organization, and not the Jesuit Order that I have described in this document, no executions will take place. The Jesuits who are executed are not necessarily the Jesuit Order of the Roman Catholic Church, but are those who willingly and knowingly honor the true EVIL Jesuit leader LOREE MCBRIDE. However, if my definition of the Jesuit Order is correct and the organization is as I describe them in this document, they will need to fear for their lives, because we cannot allow such terrorists to live. So, if you are NOT a Jesuit murderer at heart, you can sleep soundly at night. I have prayed much over these laws, that they would be completely just, so that only the TRULY GUILTY are punished.

YEAST MANAGEMENT LAWS

42.0 All health care practitioners who are licensed to prescribe medications must be educated about all Jesuit super germs and most especially the yeast super germ that Gail Chord Schuler is infected with. This yeast infection appears to have become an epidemic. As of July 8, 2017, all licensed health care practitioners licensed to prescribe medications must be educated about the Jesuit super yeast and must take course work related to this yeast to maintain their license to practice medicine and to prescribe medications. This course work must be completed by August 8, 2017. Those who fail to complete the course work will lose their license to practice medicine.

42.1 To make it easy to complete the course work, the course work will be designed by the Nanotechnology Research Team of the Gail Chord Schuler Jesuits. It will be a quick, easy course and should be designed that the reading material and all materials needed to complete the course work can be done in an hour easily. Basically, health care practitioners need to acknowledge the existence of the super yeast, how it infects and that Seroquel is the best medication for the super yeast and all forms of yeast.

42.2 Those who complete the course work by July 15, 2017 will receive a BONUS from the International government as a reward for their immediate compliance.

42.3 The F.D.A. (in the United States) cannot have any members who are Loree McBride or Angelina Ballerina Jesuits. Anyone (willingly and knowingly) who is a member of (or works for) the F.D.A. and is a Loree McBride or evil Jesuit supporter must be executed. The F.D.A. must send out a notice to all pharmacies and physicians and health care providers and their networks (by July 12, 2017), that Seroquel is not only a recognized psychiatric medication, but is also the most effective yeast medication out there for all forms of yeast and is the ONLY medication effective against the Jesuit super yeast. The F.D.A. (and the equivalent organization for each Conspiracy Law honoring nation) must acknowledge Seroquel as the most potent and effective yeast medication in the world. Failure to send this notice to all health care facilities and practitioners (who practice medicine or prescribe or dispense medications for the public) will bring the death penalty as a Jesuit Conspirator to those who willingly and knowingly default in this matter. We have a yeast emergency on this planet and everyone infected with this super yeast needs to be on Seroquel (unless it would be life threatening for them to be on it due to other mitigating health circumstances).

42.4 A scan must be made of the general population using our satellite technology to determine who is infected with the super yeast and needs to be on Seroquel. All infected persons must be notified (via email, phone or however that person normally communicates) of their yeast infection and must be put on Seroquel as soon as possible. If the infection has brought on mental illness (due to an infection in the nervous system or brain) so that the person is controlled against his will to NOT take Seroquel in order to cure him/her of his/her yeast infection, that person may need to be detained and forcibly put on Seroquel. This new law will also be reported on the Gabrielle Chana FOX News channel and all major news networks must report it as well to make the public informed about this epidemic and that Seroquel needs to be prescribed en masse to deal with it.

42.4a Any health care provider who willingly and knowingly refuses to prescribe Seroquel to one of his/her Jesuit super yeast infected patients either by willingly and knowingly prescribing a less effective or non-effective medication in its place as treatment for the yeast OR by willingly and knowingly dropping the patient in order to deny the yeast-infected patient Seroquel, will be given the death penalty as a Jesuit Conspirator. No physician can drop a yeast-infected patient (without first getting approval from the NATIONAL HEALTH CARE PLAN), without ensuring that this patient is able to obtain Seroquel after being dropped. If the patient is financially strapped, they should be referred to our NATIONAL HEALTH CARE PLAN and if a physician willingly and knowingly drops a yeast-infected patient without referring them to the NATIONAL HEALTH CARE PLAN, and ensuring they are still able to get their Seroquel, that physician will receive the death penalty as a Jesuit Conspirator for throwing out their patient with a life-threatening illness (without proper treatment) and not ensuring this patient can receive proper and “covered” care.

If the patient is threatening the physician’s life, law enforcement needs to be contacted and then the NATIONAL HEALTH CARE PLAN will decide on the course of treatment for the criminal patient.

This is a very serious epidemic and needs to be addressed immediately. The patient will need to remain on Seroquel until and if it is determined that yeast infection with that patient is no longer a threat to their health. Those who have already suffered systemic yeast infections, will need to be on Seroquel for life, because once the super yeast goes systemic in a patient, they need Seroquel for life to prevent a relapse. All health care providers must cooperate with this order and refusal to do so, will bring the death penalty as a Jesuit Conspirator.

42.5 In addition, Zack Knight will use his semen on those with more serious infections and who desire his semen. These people can contact Zack Knight at gailsmen@yahoo.com for this. Yeast infection causes dizziness, vertigo, abdominal cramping, brain slips, difficulty in concentration, red and itchy spots in your skin, for women (vaginal irritation), diarrhea or loose bowels, nerve disorders and other yeast symptoms. The brain symptoms can be severe and life threatening, making the person a danger on the road to himself/herself and others.

42.6 All persons who willingly and knowingly drop or unleash bombs (or anything) on the population that causes yeast infection or other Jesuit germ infections must be executed as soon as possible. It is a death penalty violation of Conspiracy Law to do this. All measures must be taken to stop these bombs and germ contaminations! Anybody who willingly and knowingly drops yeast bombs or any germ bombs or anything on the population that causes mental or physical illness (via germ contamination) must be executed. We will do a general scan on the population to determine (using memory reads) who has participated willingly and knowingly in these germ bomb drops, and the scan (if it is possible to create such a scan) will execute the perpetrators ON-THE-SPOT. If it is not possible to execute the perpetrators on the spot, we must find another way to execute these bombers, who are deliberately infecting the population with deadly germs.

42.7 In addition, no military force in the world is allowed to drop germ bombs on populations. Such an act is considered a war crime and all means must be taken to “take out” all military forces that engage in such behavior.

42.8 As of July 8, 2017, all licensed health care practitioners who practice medicine need to be educated about the Jesuit super yeast and that Seroquel is the cure. All medical schools and training schools for health care practitioners who prescribe medications must teach about Seroquel as the cure to yeast infections, those schools that refuse to comply will not be allowed to grant degrees to their graduates. All licensing exams for all health care practitioners who practice medicine that allows them to prescribe medications, must include information about the Jesuit super yeast and Seroquel as the cure. Any willing and knowing attempt or action by any person to thwart these laws to keep the public and medical community in ignorance about Seroquel as the most effective yeast medication out there and about the existence of Jesuit germ infections, will bring the death penalty as a Jesuit Conspirator to that violator.

CONVICTED BRAIN CONTROL WAR CRIMINALS MUST BE DENIED DUE PROCESS (DEATH PENALTY TO GIVE A CONVICTED BRAIN CONTROL WAR CRIMINAL DUE PROCESS)

43.0 Gail is hearing brain-to-brain that Loree is still fighting her men in court. She justifies her murders claiming self-defense against Zack Knight (her former leader who she has rebelled against). She justifies trying to take Brent Spiner’s M.D. license from him by claiming he has raped her and is a rapist. Brent needs his M.D. license to prescribe Seroquel for Gail (which Loree claims is not working to help Gail’s “mental illness”). Actually, Gail takes Seroquel for her yeast infection, and Loree wants Gail off of it, so she can use full brain control on Gail (via yeast infection).

43.1 If Loree’s goal is self-defense, then why is she so obsessed with BRAIN CONTROL in all she does? These bombs she drops worldwide use yeast with strong brain control capabilities. Until she removes the brain control aspects of her bombs, she cannot claim self-defense. The mere fact that she uses brain control contaminates her arguments and we can rightly accuse her of evidence tampering by such actions. This is because we use mind, emotion and memory reads as evidence in the courtroom; but if the brain is contaminated by brain control then this can invalidate this evidence. In essence, until Loree stops her brain control, she is guilty of evidence tampering.

43.2 Next, if Loree won’t stop her evidence tampering, we shall do a brain and motivation read on her to determine why she insists on using brain control in everything she does. If our reads determine that she is a criminal and has the heart of a rapist and murderer and that she uses brain control in order to contaminate the evidence, she must be executed. If she claims that we have tampered with the evidence and that our evidence is contaminated, we can reply that we have not tampered with the evidence, but she HAS. We do not use brain control and she DOES. And if she were truly innocent, she would stop all use of BRAIN CONTROL right now. This is within her power and if she refuses to stop using brain control on people, she is guilty merely because she uses BRAIN CONTROL. If she were truly innocent, she would not use brain control AT ALL.

43.3 If she claims that we also use brain control. Then we will just say that it is a death penalty violation of Conspiracy Law to use brain control and we do not use brain control. But that it is obvious that SHE DOES. In fact, we can prove that she uses brain control in just about all of her interactions. If she were truly innocent, why does she feel the need to use brain control all the time!?

43.4 Brain control is defined as the use of technology or mind altering drugs to alter a person’s brain to cause them to behave in a way that they would not behave without the effect of what has altered their brain and which alteration violates their true persona. Technology (for the purposes of this section) is defined as the use of genetically engineered or any germs that accomplish brain control, drugs that accomplish brain control, signals to the brain that accomplish brain control, or any organic or inorganic substance or “event” that enables one person to directly or indirectly manipulate the brain cells of their victim, so that the victim makes decisions that they would not have made if not under the influence of that technology. Their true persona being who they really are without the interference of control over their brain from an outside source or a source outside of their body and this control alters the brain causing the person to behave in a manner which makes them dangerous to themselves or others. In all cases involving the use of brain control, murder and rape happen (either directly or indirectly) as a result of that brain control, so this is a very serious crime.

43.5 Loree may say, but when Brent made love to me while captive on Angelina Ballerina’s spaceship, there was no brain control involved. Yes, no brain control, but definitely EXTORTION. As Jesus has said, Brent has never wanted Loree McBride. This was Angelina Ballerina, not Loree McBride, but Loree was part of Angelina’s conspiracy at that time. We are not going to go around in circles arguing with Loree. She can come up with defenses for everything as long as we don’t get down to the CORE ISSUE, which is Loree’s use of BRAIN CONTROL.

43.6 Loree McBride! If you are truly innocent stop all use of BRAIN CONTROL RIGHT NOW!! It is obvious that you use BRAIN CONTROL in order to tamper with the evidence. If you are truly innocent, you would have no need to tamper with the evidence. It is time to put her on the defensive. She uses her Jew clone lawyers to put us in the defensive and this tactic works because a clever lawyer can come up with all sorts of crap, as long as we don’t get down to the CORE ISSUE, which is Loree’s use of BRAIN CONTROL.

43.7 All use of brain control MUST STOP! The way to determine innocence or guilt is by who feels the need to use brain control from this point on. So both sides must stop all use of brain control RIGHT NOW. The first side that willingly and knowingly uses brain control is the GUILTY PARTY. The GUILTY PARTY defined as the one who commits murder, rape, terrorism against innocents, defamation, slander, libel, lying, evidence tampering, and who is guilty of the murder of millions (not for self-defense), but AS AN AGGRESSOR AGAINST INNOCENTS.

43.8 Once we determine who is the GUILTY PARTY, then that person gets the DEATH PENALTY. CASE OVER, there will be no case, because the GUILTY PARTY WILL BE EXECUTED, including all those who willingly and knowingly give the GUILTY PARTY support.

43.9 Once the GUILTY PARTY is deemed guilty of using BRAIN CONTROL (as defined by this document), their appeals to continue the case are OVER, because the MERE FACT that they use BRAIN CONTROL is proof beyond a doubt that they are the guilty party (in terms of murder) and they must DIE.

44.0 To continue the case, after it is determined they are mass murderers, would be to only give them more time to do more murders. This is a grave injustice and will not be tolerated. I shall make a video to this effect. It would be like putting a despot on the stand to defend himself after he committed his mass murders of innocents.

44.1 Loree is claiming self-defense as her motive for bombing Gail and the world. “But if your motive is self-defense, why must you use BRAIN CONTROL in these bombs, Loree? Sure doesn’t sound like self-defense to me. It sounds more like you are a psychopath or sociopath, who likes to manipulate your victims to tamper with the evidence that makes you obviously guilty.” Therefore, the one who uses BRAIN CONTROL is the guilty party. Let’s drop all the other arguments, which just take us round and round in circles. The crux of the matter is, Who is using the brain control? That is obviously the party that has something evil to hide, or else why would they want to control the brains of those they attack?

44.2 Also, Loree, if you claim that Brent came to you and made love to you of his own free will, then why did you feel the need to use brain control on him as your lover? Drop all the other arguments, it’s a waste of time and valuable resources. All the arguments in court should be centered around this one thing: WHO is the party that uses the BRAIN CONTROL? THAT IS THE GUILTY PARTY. If Loree was truly innocent, she would not resort to brain control and would feel no need to use it.

44.3 While it is true that Zack Knight has used brain control IN THE PAST. Zack has COME CLEAN and no longer uses brain control. So, the party that uses the brain control NOW is the guilty party and is the one who needs to be executed.

44.4 Once we determine who uses the brain control, then we know who to execute. The sentence for the GUILTY PARTY is that they are guilty of terrorism, rape, mass murder, extortion, war crimes (using brain control as part of their strategy), which is more than enough to justify the DEATH PENALTY. Once the sentence is LAID DOWN, all appeals must be dropped and the focus must be on EXECUTING THE GUILTY PARTY. To allow appeals to continue, when the guilty party is guilty beyond any doubt, is to allow the murderer to go on murdering. THIS MUST NOT BE TOLERATED!! CASE OVER.

44.5 Furthermore, once it is determined in a court of law (under Conspiracy Law) that any party is part of a conspiracy that willingly and knowingly uses BRAIN CONTROL as part of their attacks on innocents and they are therefore GUILTY OF WAR CRIMES INVOLVING BRAIN CONTROL, that party will be deemed a BRAIN CONTROL WAR CRIMINAL and must be denied DUE PROCESS, and the matter will be handed over to the military from now on. Their only appeal can be in regard to whether or not they use BRAIN CONTROL, all other matters cannot be brought up for appeal. We will not allow these clever criminals to delay their execution (by allowing them to bring in legal cases of irrelevant matters to delay their execution) in order to give them more time to commit crimes. They are just buying time for themselves, in the hopes they can kill off their enemy while doing so. In fact, any willing and knowing attempt or action to allow any BRAIN CONTROL WAR CRIMINAL due process (the rights to a legal hearing or trial) will bring the death penalty as a Jesuit Conspirator (being an evil Jesuit who opposes Gail Chord Schuler and her men) to that litigator. This is because this is an attempt to allow the murderer to go on murdering.

44.6 Being a BRAIN CONTROL WAR CRIMINAL is such a serious offense, that all other crimes pale in comparison!

44.7 Once it is determined in a Conspiracy Law honoring court of law that any party is guilty of being a BRAIN CONTROL WAR CRIMINAL, all other legal arguments do NOT matter, we have enough evidence to know that this person (and all those who help them) deserved to be EXECUTED AT ONCE. Any willing and knowing attempt or action to allow a BRAIN CONTROL WAR CRIMINAL to continue their crimes, whether by trying to extend their trial after they have been convicted of being a BRAIN CONTROLWAR CRIMINAL or by any other means, will bring the death penalty as a Jesuit Conspirator to that violator.

44.8 A Jesuit Conspirator under Conspiracy Law is defined as one who willingly and knowingly supports any BRAIN CONTROL WAR CRIMINAL or would willingly and knowingly support Angelina Ballerina (former Antichrist and Jesuit leader in place of Zack Knight) if Angelina was still alive.

.

XXX–G.S. (7-4-03), (7-10-03 for Sect. 13), (“amendment” update on 7-23-03), (updates on 7-24-03), Sect. 15 on 11-8-03.

XXX1/2–Sect. 16 on 11-9-03, Sect. 16 updates on 11-11-03, Sect. 77.1 update on 11-13-03, (Sections 1.10, 1.101, 1.102, 2.241, 77.02 & 77.03 on 11-25-03), (Sections 15.5, 15.6, 15.7 & 15.8 on 11-27-03), (Sections 17, 18, & 19 on 12-5-03), (updates to Sect. 18 & 19 on 12-17-03), (Sect. 18.01 and updates to Sect. 18, 19, & 15.0 on12-18-03), (Sect. 20 on 12-21-03), (Sect. 77.14 & 77.15 on 12-28-03), (Sections 21 & 22 on 1-1-04), (Sect. 23 on 1-2-04), (Sect. 17 updates on 2-3-04), (Sect 17.1 updates on 3-7-04), (Sect. 17 updates on 3-19-04), (RBN name change to IB News, Putin’s new title as CONSPIRACY LAW PRESIDENT, Sect. 77.8 on 4-8-04), (Sect. 24.0 on 4-10-04), (Sections 25, 26 and updates to Sect. 3 and major overhauls to change from Russian to international on 4-12-04), (Sect. 3.5, 3.53, 25 updates on 4-13-04), (Sect. 1.32 on 4-14-04), (Sect. 25 & 26 updates on 4-15-04), (Sect. 77.022 on 4-25-04), (Sect. 77.031 on 5-1-04), (Sect. 17 updates on 5-6-04), (major satellite updates on 5-20-04), (Sect. 25 updates on 5-22-04), (Sect. 25 updates on 5-24-04), (major satellite updates on 5-27-04), (military updates on 6-1-04), (Sect. 77.92 on 6-29-04), (Sect. 27 updates on 8-29-04), (Sect. 27 updates on 8-30-04), (Sect. 28 on 9-11-04), (Sect. 28 update on 9-18-04), (Sect. 28 update on 9-19-04), (Sect. 28 updates on 9-30-04), (Sect. 28.8[c8] updates on 10-2-04), (Sect. 28.8[c14] updates on 10-8-04), (Sect. 28.8[c.14] updates on 10-11-04), (Sect. 28.8 updates on 10-14-04), (Sect. 28.8 updates on 10-29-04), (Sect. 3.53 and 25, 26 & 27 updates on 12-1-04), (Sect. 28 updates to destroy underground operations on 12-31-04), (Sect. 28 updates to include DEACTIVATED SHIELDS and their confiscation for the ICB on 1-1-05 and 1-2-05), (Sect 28 updates on 1-3-05), (Sect. 28 updates on 1-4-05), (Sect. 28 updates on 1-8-05), (Sect. 28.8 updates on 1-10-05), (Sect. 28 updates for FOCUSED INPUT on 1-17-05), (Sect. 28 updates regarding SPECIALISTS and Sect. 28.2 updates adding seven more countries to ISC on 1-21-05), (Sect. 28.0(a.7.4-f) update on 1-25-05), (Sect. 28.2.1 on 2-6-05), (FEAR ANALYZER CORPS to determine make-up of countries of ISC on 2-8-05), (Sect. 29 on 2-22-05), (Sect. 77.031 updates and Sect. 28.7a updates on 5-4-05), (MANAGEMENT REPORT updates–Sect. 28.7a1–on 5-5-05), (Sect. 77.013 updates on 5-6-05), (Sect. 28.8 updates to include GCFNC at all major press conferences involving the war strategy of the ISC on 6-23-05), (Sect. 28.2.1 FEAR ANALYZER CORPS 4 hr. Bible study updates & Sect. 30 the SHIELD CORPS on 6-24-05), [(Sect. 28.8(a.3) updates WAR PRAYER CHANNEL on 9-1-05], [Sect. 3.532(UFO) updates on 10-11-05], [Sect. 28.0 updates to make BIBLE FLAG banner for ISC on 10-12-05], (Sect. 28a updates Computer-programmed GENERALS for the ISC on 10-18-05), (Sect. 32 ANTI-SHIELD PROGRAM on 11-24-05), (Sect. 33 the MECHANICS CORPS on 12-25-05), [NETHER OPERATIONS, Sect. 28.0(a.7.4-hell) on 1-15-06], (Sect. 34.0 PATHOGEN SCANNER SATELLITES on 1-25-06), (Sect. 34 GERM WARFARE program on GCFNC via PATHOGEN SCANNERs on 3-16-06), (Sect. 35 SATELLITE DISRUPTION LAWS on 5-20-06).

XXXX–G.S. (7-6-03 for Sect. 9), (7-7-03 for Sect. 10), (7-9-03 for Sect. 11 & 12), (7-31-03 for Sect. 14), (8-30-03 for Sect. 1.301 and 10.4 “updates”), (9-26-03 for Sect. 9 update), (9-28-03 for Sect. 77.7 update), (11-21-03 for Section 77.13), (Sect. 77.13 updates on 11-24-03), (Sect. 77.04 on 11-29-03), (Sect. 77.03 on 12-24-03), (updates to Sect. 77.022 and Sections 77.023 to 77.026 on 4-26-04), (Sect. 27.0 on 5-19-04), (DEEP OCEAN SATELLITE updates on 12-25-04–Sect. 1, 3 and others), (Sect. 31 ENGINEER CORPS on 6-29-05), (Sect. 28.8 updates to GCFNC to report criminal use of satellite/computer as war activities, not natural disasters on 9-2-05), (Sect. 30 updates to spread out 49 computers for shields & Sect. 31 updates to use ENGINEER PROGRAMS on 10-28-05).

AAAAAAA–G.S. (7-4-03), (7-6-03 for Sect. 9), (7-7-03 for Sect. 10), (7-9-03 for Sect. 11 & 12), (7-10-03 for Sect. 13), (“amendment” update on 7-23-03), (updates on 7-24-03), (7-31-03 for Sect. 14), (8-30-03 for Sect. 1.301 and 10.4 “updates”), (9-26-03 for Sect. 9 update), (9-28-03 for Sect. 77.7 update), (11-8-03 for Sect. 15), (11-9-03 for Sect. 16), (11-11-03 for Sect. 16 updates), (11-13-03 for Sect. 77.1 update), (11-21-03 for Section 77.13), (Sect. 77.13 updates on 11-24-03), (Sections 1.10, 1.101, 1.102, 2.241, 77.02 & 77.03 on 11-25-03), (Sections 15.5, 15.6, 15.7 & 15.8 on 11-27-03), (Sect. 77.04 on 11-29-03), (Sect. 17, 18 & 19 on 12-5-03), (updates to Section 18 & 19 on 12-17-03), (Sect. 18.01 and updates to Sect. 18, 19 & 15.0 on 12-18-03), (Sect. 20 on 12-21-03), (Sect. 77.03 on 12-24-03), (Sect. 77.14 & 77.15 on 12-28-03), (Sections 21 & 22 on 1-1-04), (Sect. 23 on 1-2-04), (Sect. 17 updates on 2-3-04), (Sect 17.1 updates on 3-7-04), (Sect. 17 updates on 3-19-04), (RBN name change to IB News, Putin’s new title as CONSPIRACY LAW PRESIDENT, Sect. 77.8 on 4-8-04), (Sect. 24.0 on 4-10-04), (Sections 25, 26 and updates to Sect. 3 and major overhauls to change from Russian to international on 4-12-04), (Sect. 3.5, 3.53, 25 updates on 4-13-04), (Sect. 1.32 on 4-14-04), (Sect. 25 & 26 updates on 4-15-04), (Sect. 77.022 on 4-25-04), (updates to Sect. 77.022 and Sections 77.023 to 77.026 on 4-26-04), (Sect. 77.031 on 5-1-04), (Sect. 17 updates on 5-6-04), (Sect. 27.0 on 5-19-04), (major satellite updates on 5-20-04), (Sect. 25 updates on 5-22-04), (Sect. 25 updates on 5-24-04), (major satellite updates on 5-27-04), (military updates on 6-1-04), (Sect. 77.92 on 6-29-04), (Sect. 27 updates on 8-29-04), (Sect. 27 updates on 8-30-04), (Sect. 28 on 9-11-04), (Sect. 28 update on 9-18-04), (Sect. 28 update on 9-19-04), (Sect. 28 updates on 9-30-04), (Sect. 28.8[c8] updates on 10-2-04), (Sect. 28.8[c14] updates on 10-8-04), (Sect. 28.8[c.14] updates on 10-11-04), (Sect. 28.8 updates on 10-14-04), (Sect. 28.8 updates on 10-29-04), (Sect. 3.53 and 25, 26 & 27 updates on 12-1-04), (DEEP OCEAN SATELLITE updates on 12-25-04–Sect. 1, 3 and others), (Sect. 28 updates to destroy underground operations on 12-31-04), (Sect. 28 updates to include DEACTIVATED SHIELDS and their confiscation for the ICB on 1-1-05 and 1-2-05), (Sect 28 updates on 1-3-05), (Sect. 28 updates on 1-4-05), (Sect. 28 updates on 1-8-05), (Sect. 28.8 updates on 1-10-05), (Sect. 28 updates for FOCUSED INPUT on 1-17-05), (Sect. 28 updates regarding SPECIALISTS and Sect. 28.2 updates adding seven more countries to ISC on 1-21-05)), (Sect. 28.0(a.7.4-f) update on 1-25-05), (Sect. 28.2.1 on 2-6-05), (FEAR ANALYZER CORPS to determine make-up of countries of ISC on 2-8-05), (Sect. 29 on 2-22-05), (Sect. 77.031 updates and Sect. 28.7a updates on 5-4-05), (MANAGEMENT REPORT updates–Sect. 28.7a1–on 5-5-05), (Sect. 77.013 updates on 5-6-05), (Sect. 28.8 updates to include GCFNC at all major press conferences involving the war strategy of the ISC on 6-23-05), (Sect. 28.2.1 FEAR ANALYZER CORPS 4 hr. Bible study updates & Sect. 30 the SHIELD CORPS on 6-24-05), (Sect. 31 ENGINEER CORPS on 6-29-05), (Sect. 28.8 updates to GCFNC to report criminal use of satellite/computer as war activities, not natural disasters on 9-2-05), [(Sect. 28.8(a.3) updates WAR PRAYER CHANNEL on 9-1-05], [Sect. 3.532(UFO) updates on 10-11-05], [Sect. 28.0 updates to make BIBLE FLAG banner for ISC on 10-12-05], (Sect. 28a updates Computer-programmed GENERALS for the ISC on 10-18-05), (Sect. 30 updates to spread out 49 computers for shields & Sect. 31 updates to use ENGINEER PROGRAMS on 10-28-05), (Sect. 32 ANTI-SHIELD PROGRAM on 11-24-05), (Sect. 33 the MECHANICS CORPS on 12-25-05), [NETHER OPERATIONS, Sect. 28.0(a.7.4-hell) on 1-15-06], (Sect. 34.0 PATHOGEN SCANNER SATELLITES on 1-25-06), (GERM WARFARE program on GCFNC via PATHOGEN SCANNERs on 3-16-06), (Sect. 35 SATELLITE DISRUPTION LAWS on 5-20-06).

BBBBBBB–G.S. (7-4-03), (7-6-03 for Sect. 9), (7-7-03 for Sect. 10), (7-9-03 for Sect. 11 & 12), (7-10-03 for Sect. 13), (“amendment” update on 7-23-03), (updates on 7-24-03), (7-31-03 for Sect. 14), (8-30-03 for Sect. 1.301 and 10.4 “updates”), (9-26-03 for Sect. 9 update), (9-28-03 for Sect. 77.7 update), (11-8-03 for Sect. 15), (11-9-03 for Sect. 16), (11-11-03 for Sect. 16 updates), (11-13-03 for Sect. 77.1 update), (11-21-03 for Section 77.13), (Sect. 77.13 updates on 11-24-03), (Sections 1.10, 1.101, 1.102, 2.241, 77.02 & 77.03 on 11-25-03), (Sections 15.5, 15.6, 15.7 & 15.8 on 11-27-03), (Sect. 77.04 on 11-29-03), (Sect. 17, 18 & 19 on 12-5-03), (updates to Section 18 & 19 on 12-17-03), (Sect. 18.01 and updates to Sect. 18, 19, & 15.0 on 12-18-03), (Sect. 20 on 12-21-03), (Sect. 77.03 on 12-24-03), (Sect. 77.14 & 77.15 on 12-28-03), (Sections 21 & 22 on 1-1-04), (Sect. 23 on 1-2-04), (Sect. 17 updates on 2-3-04), (Sect 17.1 updates on 3-7-04), (Sect. 17 updates on 3-19-04), (RBN name change to IB News, Putin’s new title as CONSPIRACY LAW PRESIDENT, Sect. 77.8 on 4-8-04), (Sect. 24.0 on 4-10-04), (Sections 25, 26 and updates to Sect. 3 and major overhauls to change from Russian to international on 4-12-04), (Sect. 3.5, 3.53, 25 updates on 4-13-04), (Sect. 1.32 on 4-14-04), (Sect. 25 & 26 updates on 4-15-04), (Sect. 77.022 on 4-25-04), (updates to Sect. 77.022 and Sections 77.023 to 77.026 on 4-26-04), (Sect. 77.031 on 5-1-04), (Sect. 17 updates on 5-6-04), (Sect. 27.0 on 5-19-04), (major satellite updates on 5-20-04), (Sect. 25 updates on 5-22-04), (Sect. 25 updates on 5-24-04), (major satellite updates on 5-27-04), (military updates on 6-1-04), (Sect. 77.92 on 6-29-04), (Sect. 27 updates on 8-29-04), (Sect. 27 updates on 8-30-04), (Sect. 28 on 9-11-04), (Sect. 28 update on 9-18-04), (Sect. 28 update on 9-19-04), (Sect. 28 updates on 9-30-04), (Sect. 28.8[c8] updates on 10-2-04), (Sect. 28.8[c14] updates on 10-8-04), (Sect. 28.8[c.14] updates on 10-11-04), (Sect. 28.8 updates on 10-14-04), (Sect. 28.8 updates on 10-29-04), (Sect. 3.53 and 25, 26 & 27 updates on 12-1-04), (DEEP OCEAN SATELLITE updates on 12-25-04–Sect. 1, 3 and others), (Sect. 28 updates to destroy underground operations on 12-31-04), (Sect. 28 updates to include DEACTIVATED SHIELDS and their confiscation for the ICB on 1-1-05 and 1-2-05), (Sect 28 updates on 1-3-05), (Sect. 28 updates on 1-4-05), (Sect. 28 updates on 1-8-05), (Sect. 28.8 updates on 1-10-05), (Sect. 28 updates for FOCUSED INPUT on 1-17-05), (Sect. 28 updates regarding SPECIALISTS and Sect. 28.2 updates adding seven more countries to ISC on 1-21-05), (Sect. 28.0(a.7.4-f) update on 1-25-05), (Sect. 28.2.1 on 2-6-05), (FEAR ANALYZER CORPS to determine make-up of countries of ISC on 2-8-05), (Sect. 29 on 2-22-05), (Sect. 77.031 updates and Sect. 28.7a updates on 5-4-05), (MANAGEMENT REPORT updates–Sect. 28.7a1–on 5-5-05), (Sect. 77.013 updates on 5-6-05), (Sect. 28.8 updates to include GCFNC at all major press conferences involving the war strategy of the ISC on 6-23-05), (Sect. 28.2.1 FEAR ANALYZER CORPS 4 hr. Bible study updates & Sect. 30 the SHIELD CORPS on 6-24-05), (Sect. 31 ENGINEER CORPS on 6-29-05), (Sect. 28.8 updates to GCFNC to report criminal use of satellite/computer as war activities, not natural disasters on 9-2-05), [(Sect. 28.8(a.3) updates WAR PRAYER CHANNEL on 9-1-05], [Sect. 3.532(UFO) updates on 10-11-05], [Sect. 28.0 updates to make BIBLE FLAG banner for ISC on 10-12-05], (Sect. 28a updates Computer-programmed GENERALS for the ISC on 10-18-05), (Sect. 30 updates to spread out 49 computers for shields & Sect. 31 updates to use ENGINEER PROGRAMS on 10-28-05), (Sect. 32 ANTI-SHIELD PROGRAM on 11-24-05), (Sect. 33 the MECHANICS CORPS on 12-25-05), [NETHER OPERATIONS, Sect. 28.0(a.7.4-hell) on 1-15-06], (Sect. 34.0 PATHOGEN SCANNER SATELLITES on 1-25-06), (GERM WARFARE program on GCFNC via PATHOGEN SCANNERs on 3-16-06), (Sect. 35 SATELLITE DISRUPTION LAWS on 5-20-06).

CCCCCCC–G.S. (7-4-03), (7-6-03 for Sect. 9), (7-7-03 for Sect. 10), (7-9-03 for Sect. 11 & 12), (7-10-03 for Sect. 13), (“amendment” update on 7-23-03), (updates on 7-24-03), (7-31-03 for Sect. 14), (8-30-03 for Sect. 1.301 and 10.4 “updates), (9-26-03 for Sect. 9 update), (9-28-03 for Sect. 77.7 update), (11-8-03 for Sect. 15), (11-9-03 for Sect. 16), (11-11-03 for Sect. 16 updates), (11-13-03 for Sect. 77.1 update), (11-21-03 for Section 77.13), (Sect. 77.13 updates on 11-24-03), (Sections 1.10, 1.101, 1.102, 2.241, 77.02 & 77.03 on 11-25-03), (Sections 15.5, 15.6, 15.7 & 15.8 on 11-27-03), (Sect. 77.04 on 11-29-03), (Sect. 17, 18 & 19 on 12-5-03), (updates to Section 18 & 19 on 12-17-03), (Sect. 18.01 and updates to Sect. 18, 19, & 15.0 on 12-18-03), (Sect. 20 on 12-21-03), (Sect. 77.03 on 12-24-03), (Sect. 77.14 & 77.15 on 12-28-03), (Sections 21 & 22 on 1-1-04), (Sect. 23 on 1-2-04), (Sect. 17 updates on 2-3-04), (Sect 17.1 updates on 3-7-04), (Sect. 17 updates on 3-19-04), (RBN name change to IB News, Putin’s new title as CONSPIRACY LAW PRESIDENT, Sect. 77.8 on 4-8-04), (Sect. 24.0 on 4-10-04), (Sections 25, 26 and updates to Sect. 3 and major overhauls to change from Russian to international on 4-12-04), (Sect. 3.5, 3.53, 25 updates on 4-13-04), (Sect. 1.32 on 4-14-04), (Sect. 25 & 26 updates on 4-15-04), (Sect. 77.022 on 4-25-04), (updates to Sect. 77.022 and Sections 77.023 to 77.026 on 4-26-04), (Sect. 77.031 on 5-1-04), (Sect. 17 updates on 5-6-04), (Sect. 27.0 on 5-19-04), (major satellite updates on 5-20-04), (Sect. 25 updates on 5-22-04), (Sect. 25 updates on 5-24-04), (major satellite updates on 5-27-04), (military updates on 6-1-04), (Sect. 77.92 on 6-29-04), (Sect. 27 updates on 8-29-04), (Sect. 27 updates on 8-30-04), (Sect. 28 on 9-11-04), (Sect. 28 update on 9-18-04), (Sect. 28 update on 9-19-04), (Sect. 28 updates on 9-30-04), (Sect. 28.8[c8] updates on 10-2-04), (Sect. 28.8[c14] updates on 10-8-04), (Sect. 28.8[c.14] updates on 10-11-04), (Sect. 28.8 updates on 10-14-04), (Sect. 28.8 updates on 10-29-04), (Sect. 3.53 and 25, 26 & 27 updates on 12-1-04), (DEEP OCEAN SATELLITE updates on 12-25-04–Sect. 1, 3 and others), (Sect. 28 updates to destroy underground operations on 12-31-04), (Sect. 28 updates to include DEACTIVATED SHIELDS and their confiscation for the ICB on 1-1-05 and 1-2-05), (Sect 28 updates on 1-3-05), (Sect. 28 updates on 1-4-05), (Sect. 28 updates on 1-8-05), (Sect. 28.8 updates on 1-10-05), (Sect. 28 updates for FOCUSED INPUT on 1-17-05), (Sect. 28 updates regarding SPECIALISTS and Sect. 28.2 updates adding seven more countries to ISC on 1-21-05), (Sect. 28.0(a.7.4-f) update on 1-25-05), (Sect. 28.2.1 on 2-6-05), (FEAR ANALYZER CORPS to determine make-up of countries of ISC on 2-8-05), (Sect. 29 on 2-22-05), (Sect. 77.031 updates and Sect. 28.7a updates on 5-4-05), (MANAGEMENT REPORT updates–Sect. 28.7a1–on 5-5-05), (Sect. 77.013 updates on 5-6-05), (Sect. 28.8 updates to include GCFNC at all major press conferences involving the war strategy of the ISC on 6-23-05), (Sect. 28.2.1 FEAR ANALYZER CORPS 4 hr. Bible study updates & Sect. 30 the SHIELD CORPS on 6-24-05), (Sect. 31 ENGINEER CORPS on 6-29-05), (Sect. 28.8 updates to GCFNC to report criminal use of satellite/computer as war activities, not natural disasters on 9-2-05), [(Sect. 28.8(a.3) updates WAR PRAYER CHANNEL on 9-1-05], [Sect. 3.532(UFO) updates on 10-11-05], [Sect. 28.0 updates to make BIBLE FLAG banner for ISC on 10-12-05], (Sect. 28a updates Computer-programmed GENERALS for the ISC on 10-18-05), (Sect. 30 updates to spread out 49 computers for shields & Sect. 31 updates to use ENGINEER PROGRAMS on 10-28-05), (Sect. 32 ANTI-SHIELD PROGRAM on 11-24-05), (Sect. 33 the MECHANICS CORPS on 12-25-05), [NETHER OPERATIONS, Sect. 28.0(a.7.4-hell) on 1-15-06], (Sect. 34.0 PATHOGEN SCANNER SATELLITES on 1-25-06), (GERM WARFARE program on GCFNC via PATHOGEN SCANNERs on 3-16-06), (Sect. 35 SATELLITE DISRUPTION LAWS on 5-20-06).

Electronically signed: Gail Chord Schuler

Date: 7-4-03, 7-6-03 (Sect. 9), 7-7-03 (Sect. 10), 7-9-03 (Sect. 11 & 12), 7-10-03 (Sect. 13), 7-23-03 (“amendment” update), 7-24-03 (updates), 7-31-03 for Sect. 14, 8-30-03 for Sect. 1.301 and 10.4 “updates”, 9-26-03 for Sect. 9 update, 9-28-03 for Sect. 77.7 update, 11-8-03 for Sect. 15, 11-9-03 for Sect. 16, 11-11-03 for Sect. 16 updates, 11-13-03 for Sect. 77.1 update, 11-21-03 for Sect. 77.13, 11-24-03 for Sect. 77.13 updates, (Sections 1.10, 1.101, 1.102, 2.241, 77.02 & 77.03 on 11-25-03), (Sections 15.5, 15.6, 15.7 & 15.8 on 11-27-03), (Sect. 77.04 on 11-29-03), (Sect. 17, 18 & 19 on 12-5-03), (updates to Section 18 & 19 on 12-17-03), (Sect. 18.01 and updates to Sect. 18, 19, & 15.0 on 12-18-03), (Sect. 20 on 12-21-03), (Sect. 77.03 on 12-24-03), (Sect. 77.14 & 77.15 on 12-28-03), (Sections 21 & 22 on 1-1-04), (Sect. 23 on 1-2-04), (Sect. 17 updates on 2-3-04), (Sect 17.1 updates on 3-7-04), (Sect. 17 updates on 3-19-04), (RBN name change to IB News, Putin’s new title as CONSPIRACY LAW PRESIDENT, Sect. 77.8 on 4-8-04), (Sect. 24.0 on 4-10-04), (Sections 25, 26 and updates to Sect. 3 and major overhauls to change from Russian to international on 4-12-04), (Sect. 3.5, 3.53, 25 updates on 4-13-04), (Sect. 1.32 on 4-14-04), (Sect. 25 & 26 updates on 4-15-04), (Sect. 77.022 on 4-25-04), (updates to Sect. 77.022 and Sections 77.023 to 77.026 on 4-26-04), (Sect. 77.031 on 5-1-04), (Sect. 17 updates on 5-6-04), (Sect. 27.0 on 5-19-04), (major satellite updates on 5-20-04), (Sect. 25 updates on 5-22-04), (Sect. 25 updates on 5-24-04), (major satellite updates on 5-27-04), (military updates on 6-1-04), (Sect. 77.92 on 6-29-04), (Sect. 27 updates on 8-29-04), (Sect. 27 updates on 8-30-04), (Sect. 28 on 9-11-04), (Sect. 28 update on 9-18-04), (Sect. 28 update on 9-19-04), (Sect. 28 updates on 9-30-04), (Sect. 28.8[c8] updates on 10-2-04), (Sect. 28.8[c14] updates on 10-8-04), (Sect. 28.8[c.14] updates on 10-11-04), (Sect. 28.8 updates on 10-14-04), (Sect. 28.8 updates on 10-29-04), (Sect. 3.53 and 25, 26 & 27 updates on 12-1-04), (DEEP OCEAN SATELLITE updates on 12-25-04–Sect. 1, 3 and others), (Sect. 28 updates to destroy underground operations on 12-31-04), (Sect. 28 updates to include DEACTIVATED SHIELDS and their confiscation for the ICB on 1-1-05 and 1-2-05), (Sect 28 updates on 1-3-05), (Sect. 28 updates on 1-4-05), (Sect. 28 updates on 1-8-05), (Sect. 28.8 updates on 1-10-05), (Sect. 28 updates for FOCUSED INPUT on 1-17-05), (Sect. 28 updates regarding SPECIALISTS and Sect. 28.2 updates adding seven more countries to ISC on 1-21-05), (Sect. 28.0(a.7.4-f) update on 1-25-05), (Sect. 28.2.1 on 2-6-05), (FEAR ANALYZER CORPS to determine make-up of countries of ISC on 2-8-05), (Sect. 29 on 2-22-05), (Sect. 77.031 updates and Sect. 28.7a updates on 5-4-05), (MANAGEMENT REPORT updates–Sect. 28.7a1–on 5-5-05), (Sect. 77.013 updates on 5-6-05), (Sect. 28.8 updates to include GCFNC at all major press conferences involving the war strategy of the ISC on 6-23-05), (Sect. 28.2.1 FEAR ANALYZER CORPS 4 hr. Bible study updates & Sect. 30 the SHIELD CORPS on 6-24-05), (Sect. 31 ENGINEER CORPS on 6-29-05), (Sect. 28.8 updates to GCFNC to report criminal use of satellite/computer as war activities, not natural disasters on 9-2-05), [(Sect. 28.8(a.3) updates WAR PRAYER CHANNEL on 9-1-05], [Sect. 3.532(UFO) updates on 10-11-05], [Sect. 28.0 updates to make BIBLE FLAG banner for ISC on 10-12-05], (Sect. 28a updates Computer-programmed GENERALS for the ISC on 10-18-05), (Sect. 30 updates to spread out 49 computers for shields & Sect. 31 updates to use ENGINEER PROGRAMS on 10-28-05), (Sect. 32 ANTI-SHIELD PROGRAM on 11-24-05), (Sect. 33 the MECHANICS CORPS on 12-25-05), [NETHER OPERATIONS, Sect. 28.0(a.7.4-hell) on 1-15-06], (Sect. 34.0 PATHOGEN SCANNER SATELLITES on 1-25-06), (GERM WARFARE program on GCFNC via PATHOGEN SCANNERs on 3-16-06), (Sect. 35 SATELLITE DISRUPTION LAWS on 5-20-06)), (updates to ENTIRE DOCUMENT on May 5, 2014), (Sect. 36 & 37 EARTH SHIELD FOR PROTECTION AGAINST JESUIT FLEET on Nov. 18, 2014), [Sect. 3.532(c) ALL SIGNALS USED TO BE OFFENSIVE BIBLE SATURATION SIGNALS on Nov. 21, 2014], [Sect. 3.532(c-1) to (c-33) B1BLE and/or DAV1D ANDROID STYLE PROGRAMMING TO NEGATE ALL JESUIT WAVES on Nov. 24, 2014],[Sect. 28.0 to 28.0(a)-KJ21 B1BLE and/or DAV1D ANDROID MADE SUPREME EMPRESS & EMPEROR OF INTERNATIONAL SATELLITE COALITION on Nov. 27, 2014], [Sect. 38.0 to 38.6 B1BLE and/or DAV1D ANDROID’S WORMHOLE TO HEAVEN FOR CRIMINAL UFOs. on Nov. 28, 2014], [Updates to change GA1L ANDROID to B1BLE and/or DAV1D ANDROID on Nov. 29, 2014], [grammatical corrections to ANDROID’S WORMHOLE TO HEAVEN Sections 38.0 to 38.6 on December 5, 2014], [Sect. 39 LAWS FOR JESUIT POTENTIALLY LETHAL OPERATORS OF VEHICLES on Dec. 6, 2014], [Sect. 40 DAV1D & GA1L ANDROIDS & JESUIT SCANNERS replaced with THE BRAIN on Dec. 8, 2014], [Sect. 17.6 NANOTECHNOLOGY RESEARCH TEAM FIRED, replaced with GAIL’S MEN on Dec. 9, 2014], [updates to Sect. 3.532, 28, 38, 40 and throughout entire document to incorporate THE BRAIN into the laws on 12-14-14], [Sect. 17.6n1 creation of AUTOMATONS (that kill Jesuits) to take on the public and other duties of Gail’s famous men on 12-14-14], [Sect. 3.532(c-1) to (c-33) to replace THE BRAIN with prayer warrriors on 1-8-15], [Sect. 77.0(a) to substitute 24/7 prayers for wisdom to replace THE BRAIN in all Conspiracy Law documents on 1-8-15], [Sect. 38.0 to 38.5 WORMHOLE TO HEAVEN FOR CRIMINAL UFOs LAW OMITTED on 1-8-15], [Sect. 40 amended to eliminate THE BRAIN and replace this with PRAYER WARRIORS on 1-8-15], [NANOTECHNOLOGY RESEARCH TEAM laws edited to give more flexibility to the involvement of Gail’s men on this team on 1-8-15], [Sect. 28 THE BRAIN replaced with 24/7 Church of Gail prayer warriors for battle wisdom for Brent & Vladimir on 1-9-15], [Sect. 77.0(a) PRAYER WARRIORS 24/7 for NANOTECHNOLOGY RESEARCH TEAM, Gail Chord Schuler, Brent Spiner & Vladimir Putin on 1-9-15], [Sect. 40.7 & 40.8 Automaton movie studios set up under the jurisdiction of the Russian government 12-30-14], [Sect. 41 Jesuit & Jesuit clone scanner updates scan for accelerated growth hormones on 5-24-15], [Sect. 41 update to make Jesuit clone scanners null & void if Zack Knight or true Jesuit leaders stop murders on 6-8-15], [Sect. 42 YEAST MANAGEMENT LAWS, Seroquel mandatory for super yeast infections on 7-8-17], [Sect. 43 & 44 BRAIN CONTROL CRIMINALS DENIED DUE PROCESS on 7-27-17], [Sect. 41 updates to use Jesuit Scanners to execute dangerous Loree McBride Jesuits on 11-6-17].

Place: Melbourne, FL and. . . after 7-29-03, Lake Wales, FL and. . . after 11-1-03, Melbourne, FL




6 thoughts on “INTERNATIONAL CRIMINAL LAW: SPACE TECHNOLOGY or ICL:ST

Leave a Reply to Death Penalty to Support Convicted Brain Control War Criminal Loree McBride – Gail Chord Schuler Website Cancel reply

Your email address will not be published. Required fields are marked *