Вы находитесь на странице: 1из 27

CAN YOU PLEASE FAX

FRENCH CONSULATE PONDICHERRY - CONSULAR GENERAL PIERRE


FOURNIER
US EMBASSY DELHI - AMBASSADOR STEPHENS
UN WOMEN - DR. TAVARES
US CONSULATE MUMBAI - CONSULAR GENERAL THOMAS VAJDA
US CONSULATE CHENNAI - CONSULAR GENERAL PHILLIP MIN
UNODC BANGKOK - MR. GARY LEWIS
US EMBASSY BANGKOK
CANADIAN HIGH COMMISSIONER DELHI - CANADIAN HIGH
COMMISSIONER STEWART BECK
+91- 413-223-1001 - FRENCH CONSULATE PONDICHERRY (I BELIEVE THIS
IS THE CURRENT ONE)
+91 -114-045-2333 - UN WOMEN
+91-112-419-0017 - US EMBASSY DELHI
+66 228-12129 - UNODC BANGKOK
+91 44-2811-2020 - US CONSULATE CHENNAI
+91 226-749-4454 - CANADIAN CONSULATE MUMBAI (I CANT FIND A FAX
FOR THE US CONSULATE MUMBAI)
+91 114-178-2020 CANADIAN HIGH COMMISSION DELHI
+91 80 4924 7005 CANADIAN CONSULATE BANGALORE
+91-80-45 300 148 GERMAN CONSULATE BANGALORE

HOW THEY DIVERT


PHONE AND
INTERNET TRAFFIC EXPLANATION
This is my understanding. As Ive stated, these crimes have been
committed before, just not all-in-one.

HOW TO ESTABLISH COMMUNICATION


SO IN HAVING PROOF OF DENIAL OF SERVICE ATTACKS ON EVERY
NETWORK, MALWARE VIRUSES, KEY-LOGGERS, PHONE CRIMES, DONT
MAKE ANY CALLS AND SEND EMAILS. FAX. PHYSICAL TRAVEL. FOREIGN
OFFICIALS ONLY.
FAX AND FORM ALL AUTHORITIES TO ADOPT THIS METHOD OF
COMMUNICATION AROUND THE COUNTRY.
TO REPEAT SENDING ALL INFORMATION AT INTERVALS WITH UPDATES
TO ENSURE SAFETY.
PLEASE POST THIS ADDITIONAL TO ALL MY PREVIOUS INFORMATION
AND ALL RECORDS.
TO KEEP ALL THINGS ON PAPER.
FORMS MORE RELIABLE THAN FAX.
THESE WILL WORK FOR COMMUNICATION, FOR DELHI, MUMBAI,
CHENNAI
ASK THEM TO SEND ALL HARDCOPY INFORMATION TO THE UN AND US
AND CANADIAN ESTABLISHMENTS.
https://india.diplo.de/Vertretung/indien/en/Kontakt.html
ADDITIONALLY, THE FRENCH CONSULATE PONDICHERRY CONTACT
FORM, BUT THEY'VE BLOCKED ME FROM ACCESSING IT.
THEY CAN INTERCEPT AND BLOCK BETWEEN POINT A AND POINT B,
THEREFORE, A CONTACT FORM DOESNT HAVE A POINT B. IT IS A
FORWARDING EMAIL ADDRESS.

http://www.bbc.com/news/technology-29817644
ITS NOT THE COMPUTERS OF THE WHITE HOUSE THAT ARE
HACKED
ITS THE PHONE LINES WHICH FEED INTO THE COMPUTER

THE VIRUS IS IN PHONE LINES


MOST ANTI VIRUS PROGRAMS WILL NOT PICK IT UP
I WOULD NOT BE SURPRISED IF ITS PERMANENT DENIAL OF
SERVICE ATTACKS WHICH MEANS YOU NEED TO REPLACE ALL
YOUR IT INFRASTRUCTURE
THATS WHAT I BELIEVE THE CASE IN CANADA IS

I BELIEVE ALL YOU SHOULD GET FROM ALL THE AUTHORITIES IN


INDIA TO CANADA IS RINGING WHEN EVERYONE IS JAIL
ENDLESS RINGING LIKE I GET TO INDIA TO AUTHORITIES IF NOT
PEOPLE WHO MAKE EXCUSES
MEANING IM QUITE CERTAIN YOU NEED TO REPLACE THE IT
INFRASTRUCTURE IN CANADA FOR AUTHORITIES
PERMANENT DENIAL OF SERVICE ATTACKS AND DENIAL OF
SERVICE ATTACKS ARE DIFFERENT BECAUSE THE FIRST
REQUIRES IT INFRASTRUCTURE TO BE REPLACED
MEANING YOURE LOOKING AT A SHITLOAD OF MONEY IN
DAMAGES WORLDWIDE
THERES SOMETHING CALLED DENIAL OF SERVICE ATTACKS AND
PERMANENT DENIAL OF SERVICE ATTACKS ON COMPUTER
HARDWARE
THAN THERE IS TELEPHONY DENIAL OF SERVICE ATTACKS

Global firewalls.
Okay so this explains how all contacted authorities are infected. The virus
blocks specific ports on all authorities.
http://www.derkeiler.com/Newsgroups/comp.security.firewalls/200602/msg00796.html
These are the list of ports.
http://www.answersthatwork.com/Download_Area/ATW_Library/Networkin
g/Network__2-List_of_Common_TCPIP_port_numbers.pdf
One-way Traffic Engineering
One-way traffic is a form of traffic engineering. For example, in
corporations, they block access to websites like facebook so people work
in the office. They block access to instant messaging services. This
explains that.
http://oreilly.com/catalog/bgp/chapter/ch06.html
This should explain to you where my screenshots show no replies from
any contacted authority in the world, be it the un secretary general of un
headquarters new york, white-house, interpol, seattle fbi headquarters,
security council for counter-terrorism.
Call Monitoring
The last thing, the malware virus, has another virus that has call mirroring.
They have a display that allows call monitoring. Knowing who calls who.
That is how they impersonate. This document explains that.
http://www.talkdesk.com/call-center-software/call-monitoring/
That. Malicious GPS Spoofing Attack. That may be why if you trace your
calls they come to Canada, but don't actually go there.
Call Mirroring
Send the call from one person to another, based on circumstance.
http://www.miarec.com/documentation/port-mirroring-different-call-

scenarios
Officers have impersonated as individuals.
Individuals as false relatives.
GPS Spoofing
A GPS spoofing attack attempts to deceive a GPS receiver by
broadcasting counterfeit GPS signals, structured to resemble a set of
normal GPS signals, or by rebroadcasting genuine signals captured
elsewhere or at a different time. These spoofed signals may be modified in
such a way as to cause the receiver to estimate its position to be
somewhere other than where it actually is, or to be located where it is but
at a different time, as determined by the attacker. One common form of a
GPS spoofing attack, commonly termed a carry-off attack begins by
broadcasting signals synchronized with the genuine signals observed by
the target receiver. The power of the counterfeit signals is then gradually
increased and drawn away from the genuine signals. It has been
suggested that the capture of a Lockheed RQ-170 drone aircraft in
northeastern Iran in December, 2011, was the result of such an attack.[3]
GPS spoofing attacks had been predicted and discussed in the GPS
community previously, but no known example of a malicious spoofing
attack has yet been confirmed.[4][5][6]A "proof-of-concept" attack was
successfully performed in June, 2013, when the luxury yacht "White Rose"
was misdirected with spoofed GPS signals from Monaco to the island of
Rhodes by a group of mechanical engineering students from the Cockrell
School of Engineering at the University of Texas in Austin. The students
were aboard the yacht, allowing their spoofing equipment to gradually
overpower the signal strengths of the actual GPS constellation satellites,
altering the course of the yacht.[7]
Caller ID spoofing
Public telephone networks often provide Caller ID information, which
includes the caller's name and number, with each call. However, some
technologies (especially in Voice over IP (VoIP) networks) allow callers to
forge Caller ID information and present false names and numbers.
Gateways between networks that allow such spoofing and other public
networks then forward that false information. Since spoofed calls can
originate from other countries, the laws in the receiver's country may not
apply to the caller. This limit's laws' effectiveness against the use of
spoofed Caller ID information to further a scam.[1]
FAX SPOOFING.

http://www.spooftel.com/FAQ/index.php
As they are able to intercept faxes, there is a possibility they have been
sending fake Canadian authority faxes from spoofed fax numbers.
THERE HAVE BEEN NO REPORTED CRIMES TO CANADIAN
AUTHORITIES IN REGARDS TO THIS CASE FOR 11 MONTHS 26
DAYS. I GET NO RESPONSE ELECTRONIC COMMUNICATION FROM
WORLD AUTHORITIES. FROM ANYWHERE. NEW ACCOUNTS. NEW
PLACES. GPS SPOOFING ATTACKS ON TOP OF THOSE OTHER
CYBER CRIMES. MY FAXES HAVE FAILED FROM EVERYWHERE
WHICH IVE GIVEN PROOF OF.
EVEN AS CLOSE AS NEW YORK. BY PHONE FAX EMAIL CONTACT
FORMS. IVE ASKED WORLD AUTHORITIES TO TRY EVERYTHING.
GPS Spoofing attack
In the context of network security, a spoofing attack is a situation in which
one person or program successfully masquerades as another by falsifying
data and thereby gaining an illegitimate advantage.
Even I had one of their numbers trace in the middle of the forest in Alberta
somewhere.
Do they call from numbers that appear as mine!!!! And other people?!?!!?
Caller ID service, however, is susceptible to fraud. Using a practice known
as caller ID spoofing, callers can deliberately falsify the telephone
number and/or name relayed as the Caller ID information to disguise the
identity of the calling party. For example, identity thieves who want to
collect sensitive information such as your bank account or other financial
account numbers, your social security number, your date of birth or your
mothers maiden name, sometimes use caller ID spoofing to make it
appear as though they are calling from your bank, credit card company, or
even a government agency.
http://www.fcc.gov/guides/caller-id-and-spoofing
VIRUS PHONE NETWORK - CANADA ONLY
http://onlineathens.com/stories/060700/tec_phonevirus.shtml

Because I spent months testing out ways to get communication working, I


have individuals state, that they are businessmen when I even call from
payphones (called STDs in India) when I call law enforcement in India, the
only deductive possibility that is if they've lodged a virus on the phone line
infrastructure. Which has also been done before.
CYBERWEAPON
Because a malware virus is lodged onto every contacted network. They
are able to control that institutions communication. Be it phone or sending
email and fax. Fax obviously being the only reliable method (for everything
except Canada). Instead of stealing money, they have stolen
communication. However, the virus gives them ability for industrial and
corporate espionage, military and paramilitary advantage, as is the
definition of cyber weapon.
They are able to get the login and password information for officers of
every contacted network. Malware viruses establish key-loggers on every
network. Send false emails. Similar to wire-fraud, same concept.
This is what they've done from global communication. divert internet traffic.
Nothing goes through to canada. From all contacted networks. They have
access to all because Ive contacted all of them, and it is a malware virus a cyber weapon.
Not phone calls, not emails, not faxes.
http://www.wired.co.uk/news/archive/2014-08/08/bitcoin-isp-heist
With mass surveillance you can do it to any computer.
Now the world is infected. Canada no phone and electronic communication
inbound. From all contacted authorities.
DOS Attacks
The sub-cyber-crime for this feature is DOS attacks. Such as Telephony
Denial of Service Attacks, which block calls. Which also allows them to
IMPERSONATE ANYONE INCLUDING VULNERABLE TARGETS SUCH
AS MY FAMILY AND OTHER OFFICIALS, SENIOR OFFICERS.
http://postimg.org/gallery/2dh4kyeqm/c3f89ce5/

The situation in Canada being PERMANENT DENIAL OF SERVICE


ATTACKS. THEREFORE, REQUIRING REPLACEMENT OF HARDWARE
IN ORDER FOR COMMUNICATION TO WORK.
Example,
http://postimg.org/gallery/x8wtji3u/8b0a1294/
http://postimg.org/gallery/i8k8m8bw/c0cd20e3/
http://postimg.org/gallery/2wpkclku0/
http://postimg.org/gallery/1kyzanrr0/
Revere Spoofing Attack
There is the potential that all these cyber crimes trace to my location,
therefore the victim being false implicated in the crimes. My address is
2518 Rugby Rd Mississauga Ontario Canada, L5B1T2, as Ive shown you.
This is a rental house. I don't believe its registered for tax reasons,
therefore they have not been able to sell it to us either, it was meant to be
temporary for us. The neighbour lives next door, her last name is Torchia.

WHY FAX IS THE ONLY RELIABLE METHOD TO INDIA ***


IMPORTANT
THE COMMUNICATION IS BARRED FROM CONTACT NETWORKS
AND TO INDIA, BECAUSE IT IS SPECIFIC TO THE COUNTRY'S
DIALLING CODE, +91.
http://en.wikipedia.org/wiki/Telephone_numbering_plan

FAX TO CANADIAN
AUTHORITIES WILL NOT
WORK.
CRIME OF AGGRESSION

Under the Statute, the definition of "crime of aggression" is stated


as follows:
Article 8 bis[edit]
1. For the purpose of this Statute, crime of aggression means the
planning, preparation, initiation or execution, by a person in a position
effectively to exercise control over or to direct the political or military
action of a State, of an act of aggression which, by its character,
gravity and scale, constitutes a manifest violation of the Charter of the
United Nations.
2. For the purpose of paragraph 1, act of aggression means the use
of armed force by a State against the sovereignty, territorial integrity
or political independence of another State, or in any other manner
inconsistent with the Charter of the United Nations. Any of the
following acts, regardless of a declaration of war, shall, in accordance
with United Nations General Assembly resolution 3314 (XXIX) of 14
December 1974, qualify as an act of aggression:
(a) The invasion or attack by the armed forces of a State of the
territory of another State, or any military occupation, however
temporary, resulting from such invasion or attack, or any annexation
by the use of force of the territory of another State or part thereof;
(b) Bombardment by the armed forces of a State against the
territory of another State or the use of any weapons by a State
against the territory of another State;
(c) The blockade of the ports or coasts of a State by the armed forces
of another State;
(d) An attack by the armed forces of a State on the land, sea or air
forces, or marine and air fleets of another State;
(e) The use of armed forces of one State which are within the territory

of another State with the agreement of the receiving State, in


contravention of the conditions provided for in the agreement or any
extension of their presence in such territory beyond the termination of
the agreement;
(f) The action of a State in allowing its territory, which it has placed at
the disposal of another State, to be used by that other State for
perpetrating an act of aggression against a third State;
(g) The sending by or on behalf of a State of armed bands, groups,
irregulars or mercenaries, which carry out acts of armed force against
another State of such gravity as to amount to the acts listed above, or
its substantial involvement therein.
A weapon, arm, or armament is any device used in order to inflict
damage or harm to living beings, structures, or systems. Weapons
are used to increase the efficacy and efficiency of activities such as
hunting, crime, law enforcement, self-defense, and warfare. In a
broader context, weapons may be construed to include anything used
to gain a strategic, material or mental advantage over an adversary.
While just about any ordinary objects such as sticks, stones, cars, or
pencils can be used as weapons, many are expressly designed for
the purpose ranging from simple implements such as clubs, swords
and guns, and to complicated modern intercontinental ballistic
missiles, biological and cyberweapons.
A cyberweapon is a malware agent employed for military,
paramilitary, or intelligence objectives.
http://en.wikipedia.org/wiki/Crime_of_aggression
http://en.wikipedia.org/wiki/Weapon

http://en.wikipedia.org/wiki/Cyberweapon
ACTING HEADS OF STATE IMMUNITY
IN WHICH NO ONE IS FREE FROM PROSECUTION

Recent developments in international law suggest that this type of


immunity, whilst it may be available as a defence to prosecution for
local or domestic crimes or civil liability, is not a defence to an
international crime. (International crimes include crimes against
humanity, war crimes, and genocide). This has developed in the
jurisprudence of the International Criminal Tribunal for the Former
Yugoslavia, particularly in the Karadzic, Milosevic, and Furundzija
cases (though care should be taken when considering ICTY
jurisprudence due to its Ad-hoc nature). This was also the agreed
position as between the parties in their pleadings in the International
Court of Justice Case Concerning the Arrest Warrant of 11 April 2000
(Democratic Republic of the Congo v. Belgium). The reasons
commonly given for why this immunity is not available as a defence to
international crimes is straight forward: (1) that is genocide, war
crimes and crimes against humanity are not acts of state. Criminal
acts of the type in question are committed by human actors, not
states; and (2) we cannot allow the jus cogens nature of international
crimes, i.e. the fact that they are non-derogable norms, to be eroded
by immunities.
http://en.wikipedia.org/wiki/Immunity_from_prosecution_(international_law)
STATE-SPONSORED TERRORISM

State-sponsored terrorism is government support of paramilitary

organizations engaged in terrorism.[1] The identifications of particular


examples are usually subject to political dispute.
http://en.wikipedia.org/wiki/State-sponsored_terrorism
THEREFORE, UNDER THE CURRENT CIRCUMSTANCES, THIS IS AN
INTERNATIONAL CRIME FORMALLY CONSIDERED STATESPONSORED TERRORISM
MOTIVES
THE PURPOSES COMMUNICATED FOR WHY THE FEDERAL
GOVERNMENT OF INDIA IS USING IT, AND HAS USED IT SINCE
BEFORE 2012, IS FOR
ECONOMIC ESPIONAGE - SPYING ON CORPORATIONS
GOVERNMENTS OF FOREIGN COUNTRIES AND WITHIN THE
COUNTRY - REASON WHY THE INDUSTRIALISTS HAVE IT TOO.
MILITARY AND PARAMILITARY ADVANTAGE.
THEREFORE, IT HAS ALSO BEEN COMMUNICATED THAT SINCE
MANU KAPOOR WORKED AT VODAPHONE INDIA, WHERE HE WAS
DIRECTOR OF EXTERNAL AFFAIRS IN CHARGE OF EXTERNAL
INTERFACE AND STRATEGY IN LIEU OF INDIAN GOVERNMENT, AS
HIS JOB TITLE WAS NAMED, THERE HAS BEEN A DRAMATIC
INCREASE IN SCAMS THROUGHOUT THE NATION, OF WHICH HE
HIMSELF WAS INVOLVED IN THE LARGEST SCAM IN INDIA'S
HISTORY, THE INDIAN COAL ALLOCATION SCAM, WHILST HE
WORKED AT JINDAL STEEL AND POWER AS DIRECTOR OF
EXTERNAL AFFAIRS THERE FOLLOWING HIS JOB AT VODAPHONE
INDIA.

http://s10.postimg.org/in6owpyzd/Screen_Shot_2014_01_18_at_18_
08_01.png
One thing to further note, is that CBI has been investigating federal
government and scams throughout the nation, and there has always been

a lack of evidence. This software gives them the ability to delete, edit, and
add records to any network they want. Even use accounts of any officers.
Take their calls.
CONFIRMATION.
http://postimg.org/gallery/2wpkclku0/
SOME LOCATIONS ATTEMPTED FOR COMMUNICATION
FAILED FAXES.

http://postimg.org/gallery/1o601l8kg/
PHONE CALLS

Fake officer 1 - cbi - from a payphone inside square one mall


http://audiour.com/ungjqdzs.mp3
Size of Square One Mall
http://www.shopsquareone.com/system/site_images/photos/000/002/
637/original/SQ1_Directory_April_16_2014_72485.pdf?1400167176
Fake officer 2
http://audiour.com/jtd45vc0.mp3
Fake officer 3 - cbi - tells me its early morning, to call back later, on a
24 hour human trafficking line for CBI, from my family's previously
VOIP line with VONAGE.
http://audiour.com/zsk21nbo.mp3
Fake officer 4 - dig tirrupur
http://audiour.com/jsoibe1o.mp3

HERE ARE SOME EXAMPLES.


The UPS Store

Cooksville Colonnade
5 - 3024 Huron St
Mississauga, ON L5B 4M4, Canada

The UPS Store


3415 Dixie Rd
Mississauga, ON L4Y 4J6
Canada

Walmart Mississauga (Dixie) Supercentre (payphone)


1500 Dundas St E
Mississauga, ON L4Y 1L4
Canada

Walmart Erin Mills Supercentre (payphone)


2160 Burnhamthorpe Road West
Mississauga, ON L5L 5Z5
Canada

Yongsan Computer
3033 Palstan Rd

Mississauga, ON L4Y 1R6


Canada

Net Zone Internet Cafe


3415 Dixie Rd
Mississauga, ON L4Y 2B1
Canada

Docuserve Etc.
20 Dundas St. East Unit2
Mississauga, ON L5A 1W2
Canada

Battle Station
4955 Dundas W
Etobicoke, ON M9A 1B6
Canada

Mississauga Public Library

1030 McBride Ave


Mississauga, ON L5C 1L6
Canada

Mississauga Valley Public Library


Mississauga, ON
Canada

Burnhamthorpe Branch Library


3650 Dixie Rd
Mississauga, ON L4Y 3V9
Canada

Square One Shopping Centre (payphone)


100 City Centre Drive
Mississauga, ON L5B 2C9
Canada

Apple Store, Square One (computers)

100 City Centre Dr


Mississauga, ON L5B 2C9
Canada

ACTS OF AGGRESSION WHICH ARE IN BREACH OF


INTERNATIONAL PEACE AND SECURITY
You guys are not even understanding an international security breach.
Article 42, Chapter 7, UN Charter.
CHAPTER VII: ACTION WITH RESPECT TO THREATS TO THE PEACE,
BREACHES OF THE PEACE, AND ACTS OF AGGRESSION
Article 39
The Security Council shall determine the existence of any threat to the
peace, breach of the peace, or act of aggression and shall make
recommendations, or decide what measures shall be taken in accordance
with Articles 41 and 42, to maintain or restore international peace and
security.
Article 40
In order to prevent an aggravation of the situation, the Security Council
may, before making the recommendations or deciding upon the measures
provided for in Article 39, call upon the parties concerned to comply with
such provisional measures as it deems necessary or desirable. Such
provisional measures shall be without prejudice to the rights, claims, or
position of the parties concerned. The Security Council shall duly take
account of failure to comply with such provisional measures.
Article 41
The Security Council may decide what measures not involving the use of
armed force are to be employed to give effect to its decisions, and it may
call upon the Members of the United Nations to apply such measures.
These may include complete or partial interruption of economic relations
and of rail, sea, air, postal, telegraphic, radio, and other means of

communication, and the severance of diplomatic relations.


Article 42
Should the Security Council consider that measures provided for in Article
41 would be inadequate or have proved to be inadequate, it may take such
action by air, sea, or land forces as may be necessary to maintain or
restore international peace and security. Such action may include
demonstrations, blockade, and other operations by air, sea, or land forces
of Members of the United Nations.
Article 43
All Members of the United Nations, in order to contribute to the
maintenance of international peace and security, undertake to make
available to the Security Council, on its call and in accordance with a
special agreement or agreements, armed forces, assistance, and facilities,
including rights of passage, necessary for the purpose of maintaining
international peace and security.
Such agreement or agreements shall govern the numbers and types of
forces, their degree of readiness and general location, and the nature of
the facilities and assistance to be provided.
The agreement or agreements shall be negotiated as soon as possible on
the initiative of the Security Council. They shall be concluded between the
Security Council and Members or between the Security Council and
groups of Members and shall be subject to ratification by the signatory
states in accordance with their respective constitutional processes.
REAL RISHI GULATI
THEREFORE, UNDER THESE CIRCUMSTANCES, AND
CONSTITUTIONAL CRISIS OF THE FEDERAL GOVERNMENT OF
INDIA, I WOULD LIKE MY FAMILY IN CANADA NOW AND LIKELY
PERMANENTLY, UNLESS THEY CHOOSE TO LIVE IN ANOTHER
STATE CHOSEN BY THEM AND APPROVED BY UN HEADQUARTERS
NEW YORK WHERE THEY WILL STAY. AS THE RESIDUAL THREAT
OF VIOLENCE TO VULNERABLE TARGETS, THEM BLOCKING
COMMUNICATION TO THEM, FALSE DOCUMENTATION, BLOCKING
COMMUNICATION TO AUTHORITIES WORLDWIDE, ABILITY TO
BLOCK COMMUNICATION TO ALL CONTACTED AUTHORITIES INTERCITY, INTER-STATE, NATIONALLY, AND INTERNATIONALLY, ACCESS
TO GOVERNMENT NETWORKS INTERNATIONALLY, ABILITY TO

FALSELY ELECTRONICALLY PLACE CHARGES ON VULNERABLE


TARGETS, AND THE FULL-SPECTRUM OF INDIAN FEDERAL
GOVERNMENT INVOLVED, BEING ABLE TO COMMIT THESE CRIMES
FROM INTERNATIONAL LOCATIONS, MAKES IT NECESSARY FOR
THEM TO BE OUT OF INDIA. WITH FULL REDRESSAL OF
COMPENSATION AS OUTLINED.
DUE TO INDIAN FEDERAL GOVERNMENT BEING INVOLVED, AND IN
ACTING STAND OF DEFENCE FOR THE WORLD COMMUNITY, HOW
INDIAN GOVERNMENT HAS REFRAINED FROM UNTHREATENED
PROTECTION, AND NON-COMPLIANCE FOR THE CORRECT
INDIVIDUALS TO STAY WITH DR. TAVARES, US AND CANADIAN
OFFICIALS, IN A SECURED ENVIRONMENT, OVER THE COURSE OF
NEARLY A YEAR, THEIR CORRUPTION OF INVESTIGATION, AND
THEIR CRIMINALITY, MAKE IT A GOOD MEASURABLE ACTION TO
GIVE THEM CANADIAN PASSPORTS FOR THOSE THAT DO NOT
HAVE IT, AND CANADIAN VISAS FOR THOSE THAT HAVE INDIAN
PASSPORTS. HOWEVER, IN THE CURRENT CIRCUMSTANCES, THE
ONE IVE BEEN TRYING TO FIND, RASHI, I WANT HER AND HER
FRIEND TO HAVE CANADIAN PASSPORTS. THAT IS MY DECISION
FOR HER.
http://postimg.org/gallery/2qtq25llu/
http://postimg.org/image/y2pzhl0lv/
HER NAME ALONE PROVES IM GENUINE. THAT IM IN CANADA. THAT
I HAVE PHONE NUMBERS YOU CANT CALL.
http://postimg.org/gallery/31zpd5etc/7524867c/
MY VOICE (ENGLISH ONLY):
http://vocaroo.com/i/s1WtLx4cu5Ks
NEW PASSPORT COPY
http://s29.postimg.org/46vgyd0x3/new_passport_copy.jpg
SOCIAL INSURANCE NUMBER, DRIVER'S LICENSE, AND BANK
CARD. PLEASE PRINT ALL MY IDENTIFICATIONS.
http://postimg.org/image/rptsn58s3/
PHONE BILL: CURRENT ADDRESS:
http://postimg.org/image/5h6aeupp9/

GOVERNOR GENERAL'S AWARD, ONTARIO SCHOLAR, AECL


RESEARCH
http://postimg.org/gallery/kecsx9ry/
You cant even get me on the phone, and Im not the one the Federal
Government of India is claiming I am.
Than what Canadian authorities are you speaking to? What false faxes are
you receiving? Fake emails maybe? The crimes have been unreported to
Canadian authorities in over 11 months 26 days.
LOOK, PACHOULI DELHI.
http://postimg.org/gallery/1qjrcyxku/efb33085/
Now you should know Im in Canada and you have never spoken to
Canadian authorities, contacted or been contacted by them. You'll never
be able to get me on the phone to a Canadian officer. Sitting at home. That
should be your proof. You will than understand why I want all actions
completed.

Look at who's involved - dissolution of Parliament. In India. That costs


industrialists to lose a few billion dollars. Violence, terror threats ensue.
I cant have my entire family in captivity in India. I would like them with UN
Headquarters New York, with the requested officials.

The entire spectrum of Indian Government is absconding. From


international terrorism and national corruption. Controlling the modes of
communication. Blocking communication to anyone at their discretion.
Therefore, my action is measurable and completely justified.
FAKE RISHI GULATI

ARJUN KAPOOR
http://s27.postimg.org/612701sgj/Screen_Shot_2014_01_18_at_18_
12_41.png

http://speedy.sh/t4q63/20140327-181127.m4a

They use my name for two reasons:


1) to prevent knowing no ones
communication to canadian authorities
is working directly by electronic means,
and they've substituted it. That it is not
working by phone.
2) to prevent protection by the un of
vulnerable targets
FALSE GOVERNMENT ISSUED DOCUMENTATION BY THE HIGHEST
LEVELS OF GOVERNMENT, POLITICAL PARTIES IS NEVER A
PROBLEM
http://indiatoday.intoday.in/story/ajit-jogis-constituency-mahasamund-11candidates-with-same-name-bjp-sniffs-conspiracy/1/352568.html
CORRUPTION IS MAINSTREAM IN INDIA.
FATHER, MOTHER, BROTHER

http://postimg.org/gallery/19zak8d0q/
DUAL IDENTITIES.
FOR A LONG TIME BEFORE, THE COMMUNICATION WAS STATING
THEY WERE USING TWO IDENTITIES AND HAD TWO PHONES.
THEY HAVE DONE IT BEFORE IN COURT CASES WHICH IVE SHOWN
YOU. SOME OF THEM HAVE DUAL IDENTITIES. DUAL REGISTERED
ADDRESSEES.
SURESH AGARWAL AND SURESH KUMAR AGARWAL SAME THING.

http://indiankanoon.org/doc/52650862/
RAVI KHEMKA DECEASED FATHER IN LAW, FATHER TO HIS WIFE,
MEENAKSHI AGARWAL
JUST AN EXAMPLE. THEREFORE TO HAVE IDENTIFICATION ON THE
NAMES OF VULNERABLE TARGETS IS AN UNDERSTANDABLE
ACTION.
THERE'S NO GREATER EXTREME PERSECUTION OF A
GOVERNMENT.
FAMILY
http://postimg.org/gallery/2qbyyzpp0/
DELHI - PUSA ROAD, LEFT AT THE TELEPHONE EXCHANGE, 2ND
RIGHT, 1ST HOUSE ON THE RIGHT WITH TREE WITH BRANCHES
CUT OFF. THERE IS A DOCTOR/DENTISTS OFFICE AT THE CORNER.
HEAD MALE, ARUN AHUJA
KURUKSHETRA - SECTOR 13, HOUSE 394. SANJAY AND AJAY
MADAN
FARIDABAD - ASHOK GULATI (IM UNAWARE OF HIS ADDRESS, BUT
YOU CAN FIND IT BECAUSE HE'S A RETIRED INDIAN AIR FORCE
WING COMMANDER)
THEY ARE SIMPLY TARGETING ALL MY FAMILY. LIKELY WHY NO
ONE IS ABLE TO REACH HER. I DONT KNOW WHERE SHE'S GONE.
WHY THEY HAVE PUT SIGNIFICANT TARGET ON HER, AS SHE
DOESNT NORMALLY LIVE WITH ANY FAMILY. SO THEY'VE
ISOLATED HER AS A TARGET.
CONSTITUTIONAL CRISIS
YOU CAN SEE WHY THE ENTIRE SCOPE OF INDIAN FEDERAL
GOVERNMENT DID NOT INVESTIGATE, NOR EXERCISE ACTION
NOW. THEREFORE, SUPERVISED ACTION ONLY BY UN US AND
CANADIAN OFFICIALS, REQUIRING PHYSICAL TRAVEL.
FURTHERMORE, AS I HAVE CONTACTED MOST AUTHORITIES IN
CANADA, THERE CERTAIN ONES I HAVE NOT TRIED THAT MAY
WORK FOR YOU.

SUCH AS THE CANADIAN ARMY.


http://www.army-armee.forces.gc.ca/en/contact-us.page
WHICH YOU WILL HAVE TO CONTACT FROM OUTSIDE YOUR
INSTITUTION.
ALTERNATIVELY, CALL A FRIEND IN TORONTO TO REPORT THE
CRIMES - SOMEONE WHO'S VOICE YOU RECOGNIZE. I WOULD NOT
BE SURPRISED IF YOU HEAR RINGING, LIKE ME, AS VIRUSES OF
THIS NATURE ARE ALSO WIRELESSLY TRANSMITTED THROUGH
THINGS SUCH AS BLUETOOTH, AS DESCRIBED BY THE UNITED
NATIONS OFFICE OF DRUGS AND CRIME ON COUNTERING THE USE
OF THE INTERNET FOR TERRORIST PURPOSES. THEREFORE, YOU
MIGHT ALSO FACE DIFFICULT CALLING FROM YOUR MOBILES AS I
DO, YOUR HOME LANDLINES, YOUR PERSONAL COMPUTERS. THAT
IS WHAT A PLAGUE IS. ITS A VIRUS-PANDEMIC.
http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_
Purposes.pdf
EVEN AFTER ASKING AUTHORITIES TO FAX AND HAVING FILLED IN
FORMS, EVEN THOSE WHO ARE NOT HEAD OF STATE ARE NOT
GOING INTO CUSTODY.
TOTALITARIAN GOVERNMENT

a totalitarian system has the following six, mutually supportive,


defining characteristics:
1.

Elaborate guiding ideology.

2.

Single mass party, typically led by a dictator.

3.

System of terror, using such instruments as violence and secret


police.

4.

Monopoly on weapons.

5.

Monopoly on the means of communication.

6.

Central direction and control of the economy through state

planning.
http://en.wikipedia.org/wiki/Totalitarianism
OVER THE COURSE OF WEEKS IVE BEEN SENDING YOU EVIDENCE
OF THE ACTIONS OF FEDERAL GOVERNMENT THAT DICTATE THEY
EXERCISE TOTALITARIANISM
THAT THEY ARE CONTROLLING THE MEANS OF COMMUNICATION
USING A SYSTEM OF TERRORISM WHICH INSTRUMENTS SUCH AS
VIOLENCE
THAT THEY HAVE REFUSED ACTION FROM ALL THE INDIVIDUALS
THEY HAVE INSTITUTED IN ALL THE DEFENCE FORCES AND
INTERNAL SECURITY. THEY HAVE SHOWN, OVER THE COURSE OF
MONTHS, WIDESPREAD PRACTICE OF ACTING
UNCONSTITUTIONALLY.
SYSTEMATIC CORRUPTION AND INFLICTING HUMAN ABUSES,
FROM CENTRALIZED GOVERNMENT, IS WIDESPREAD PRACTICE IN
INDIA.
THEREFORE, IT IS OF TWO OPTIONS. EITHER YOU FAX THE UN US
AND CANADIAN OFFICIALS TO GET THE FAMILIES THEMSELVES,
PICK THEIR OWN HAND-SELECTED SECURITY, OR YOU SEND
FORCES TO INDIA FOR SUPPORT.
OBSTRUCTION OF JUSTICE
The crime of obstruction of justice, in United States jurisdictions, refers
to the crime of interfering with the work of police, investigators, regulatory
agencies, prosecutors, or other (usually government) officials. Common
law jurisdictions other than the United States tend to use the wider offense
of perverting the course of justice.
Generally, obstruction charges are laid when it is discovered that a person
questioned in an investigation, other than a suspect, has lied to the
investigating officers. However, in most common law jurisdictions, the right
to remain silent used to allow any person questioned by police merely to
refuse to answer questions posed by an investigator without giving any
reason for doing so. (In such a case, the investigators may subpoena the
witness to give testimony under oath in court, though the witness may then
exercise their rights, for example in the Fifth Amendment, if they believe
their answer may serve to incriminate themselves.) If the person tried to

protect a suspect (such as by providing a false alibi, even if the suspect is


in fact innocent) or to hide from investigation of their own activities (such
as to hide their involvement in another crime), this may leave them liable to
prosecution. Obstruction charges can also be laid if a person alters,
destroys, or conceals physical evidence, even if he was under no
compulsion at any time to produce such evidence. Often, no actual
investigation or substantiated suspicion of a specific incident need exist to
support a charge of obstruction of justice.
Obstruction can include crimes committed
by judges, prosecutors, attorneys general, and elected officials in general.
It is misfeasance, malfeasance or nonfeasance in the conduct of the
office.
Notable examples[edit]
President Richard Nixon was being investigated for obstruction of
justice for his alleged role in the cover-up of the break-in at
the Watergate hotel during his 1972 re-election campaign. Although
it is unknown whether Nixon had foreknowledge of his re-election
committee's "dirty tricks" campaign against Democraticpresidential
candidates that led to the break-in, he was aware of it after the fact
and paid money to keep the participants quiet.
Former Vice-Presidential adviser I. Lewis "Scooter" Libby was convicted
of obstruction of justice in March 2007 for his role in the investigation
of a leak to reporters that named a CIA agent, Valerie Plame. His
prison sentence was commuted by President George W. Bush in
July 2007, so that Libby was no longer required to serve a two and a
half year prison sentence, but still required to pay a $250,000 fine,
be recorded as a convicted felon, and obey probation terms.
PERVERTING THE COURSE OF JUSTICE
Perverting the course of justice in English, Canadian, Hong Kong,
and Irish law, is a criminal offence in which a person
prevents justice from being served on him/herself or on another
party. It is a common law offence carrying a maximum sentence of life
imprisonment.
Perverting the course of justice can be any of three acts:
Fabricating or disposing of evidence
Intimidating or threatening a witness or juror
Intimidating or threatening a judge
Also criminal are:

1.conspiring with another to pervert the course of justice, and


2.intending to pervert the course of justice.
Statutory versions of the offence exist in Australia, Canada, and New
Zealand. See, for example, Section 319 of the Crimes Act 1900
(NSW),[1] where the maximum penalty is 14 years' imprisonment.

ABETMENT
THATS CALLED ABETMENT.
107. ABETMENT of a thing.A person abets the doing of a thing,
who
(First) Instigates any person to do that thing; or
(Secondly) Engages with one or more other person or persons
in any conspiracy for the doing of that thing, if an act or illegal
omission takes place in pursuance of that conspiracy, and in
order to the doing of that thing; or
(Thirdly) Intentionally aids, by any act or illegal omission,
the doing of that thing. Explanation 1.A person who, by wilful
misrepresentation, or by wilful concealment of a material fact
which he is bound to dis-close, voluntarily causes or procures, or
attempts to cause or procure, a thing to be done, is said to
instigate the doing of that thing. Illustration A, a public officer, is
authorized by a warrant from a Court of Justice to apprehend Z.
B, knowing that fact and also that C is not Z, wilfully represents
to A that C is Z, and thereby intentionally causes A to apprehend
C. Here B abets by instigation the apprehension of C.
Explanation 2.Whoever, either prior to or at the time of the
commission of an act, does anything in order to facilitate the
commission of that act, and thereby facilitate the commission
thereof, is said to aid the doing of that act.
IF YOU DIDNT ARREST SOMEONE BECAUSE THE
PRESIDENT OR PRIME MINISTER TOLD YOU NOT TO, YOU
WILL END UP BEING CHARGED FOR CORRUPTION ON
INTERNATIONAL LAW.
THE PRESIDENT OF INDIA DOES NOT HAVE AUTHORITY

TO ABSCOND FOR ANYONE ON THESE CRIMES. IF HE


DOES, HE WILL BE ARRESTED.
SCREENSHOTS.
http://postimg.org/gallery/5mvb00pi/

Вам также может понравиться