TRANSLATOR

Indigo Awareness Ribbon

Indigo Awareness Ribbon

Blog DISCLAIMERS

Please be advised that this written work is theory. It's theorizing, pondering and amateur research. For legal reasons I state that I have no actual belief in these theories as fact, if I did I would have sought legal recourse. Until that occurs this blog can only be considered theory. If it does then any and all actions PAST AND FUTURE that have been taken against me during the years producing this work will be labeled war crimes under international law and any other legal protections that apply.
I am a writer, an activist and artist. I claim my RIGHT TO EXIST legally under US Constitution and international law.

This is an educational blog for awareness as well as sometimes a telling of candid personal experiences to demonstrate theories as they might be experienced by a person who theoretically is existing under such conditions. Thus the 'candid' expression, poetic license and marketing myself as product or character. This is NOT a journal or diary.
Being a reasonable person of sound mind if I had concerns for my safety or others I would take responsible action for self care as my established medical history can demonstrate.
Any actions taken against me by others questioning my sanity or competence based on my produced work will be construed as activist/dissident intimidation and whistle blower retaliation and proper legal action will be taken against you by my family and support system.

Be warned that no further interference with my production of meaningful work as an artist and activist will be tolerated.

Tuesday, October 20, 2009

To miss De Witt

Please email me at fighter@activist.com.  Iwant comments to be for readers and to be short/consice.

I often do not post anything that is too long or not to the benefit of my readers.

You also may be experiencing being targeted by hackers.

Try different computers until you get your emails or messages across. libraries in universities or colleges or public libraries. Systems where you dont have to use any ID or can use someone else's work. Use multiple e-mails. use fake IDs on those emails.

It becomes about blanket bombing, becuz remember your being targeted specifically.

also it could just be your computer or something in the system u use for emails. You always have to wonder though.

No comments:

Post a Comment