[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Toad has encouraged publication of any other subpoenas
in the Toto-assassination case, and we've asked for info on
any other solicitations by the MIBs to list subscribers, or others,
such as that to Alan Greenspan posted here.
It's understandable that anyone served or solicited might
want to keep that private, upon legal advice, or for self-protection.
However, it'd be a help to those of us awaiting the slug, or wanting
to aid and abet the MIB-fed fictional conspiracy, to know what is
happening. For example, the dates of contact, when the documents
were served and the means used, what was asked for, or anything
that might be shared without necessarily identifying who was
contacted. Anon to the list or to jya if preferred.
For example, Alcatraz's subpoena was dated October 9, for a
GJ session on November 10. We don't know when the subpoena
was served or how. And how those dates and compare to those
of Huntsville's, though in latter case we've been told the subpoena
came with two MIBs.
JYA'd like to be in Tacoma when the WWA GJ is MIB imaginary
totostimony, either in response to character-assassinatory
subpoena or by idly hanging out with attention-seeking gov
assassination-groupies, so some times and dates would be
helpful if different from November 10.
Bee in the bonnet: A few days before CJ's arrest warrant was issued
the DoJ put out a study on the "Shared Traits of Potential Assassins:"
* To achieve notoriety or fame.
* To bring attention to a personal or public problem.
* To avenge a perceived wrong; to retaliate for a perceived injury.
* To end personal pain; to be removed from society; to be killed.
* To save the country or the world; to fix a world problem.
* To develop a special relationship with the target.
* To make money.
* To bring about political change.
What? The ambitious MIB job description mirrors the Cypherpunk agenda?
The PR on the report goes on:
The report outlines how law enforcement agencies can establish programs
and systems to identify and prevent persons with the means and interest to
attack a protected person. The guide may also assist law enforcement and
security agencies responsible for investigating and preventing other
targeted violence, such as stalking, domestic violence or workplace
The report takes law enforcement agencies through the entire threat
process, from designing a protective intelligence program to investigating
suspicious persons to closing a case.
Protective intelligence programs are based on the idea that the risk of
violence is minimized if persons with the interest, capacity and willingness
to mount an attack can be identified and rendered harmless before they
approach a protected person.
To obtain a copy of "Protective Intelligence and Threat Assessment
Investigations" (NCJ 170612, 59 pp.), contact the National Criminal Justice
Reference Service at 800-851-3420.
Amazing coincidence, this matching of Justice with the Cypherpunk
missions. MIB aiding and abetting MIB.