Αγορά Πολιτών

Τρόπος Συμμετοχής

Χορηγίες

Πολίτες στην Αγορά

Έχουμε 759 επισκέπτες συνδεδεμένους

Επικοινωνία

Γερμανία 0041762833777

Gang-stalking Greeks

 

Byzantine Atrocities

 

European Dissidents ALARM

 

Human Rights' Court

 

The used up men

 

Dissidents - USG RICO crimes

 

Open Letter to Theresa May

 

Open Letter to António Guterres UN's SG

 

Triangulation - Zersetzen

 

Open Letter to Andrew Parker, MI5

  

Πράξεις ποταπές - Despicable choices

 

 

My father's death

 

Cavitation damage

 

Burglary and vandalism

 

Dry mini submarine

 

Message to Bundeswehr 2

 

Message to Bundeswehr 1

 

“Tough” guys and TOUGH guys

 

Μοναδική λύση, το Χόλιγουντ

 

Charlatans

 

Zeppelin: Beyond Gravity

 

Foreign intervention in Greece?

 

Η ανελεύθερη Ελλάδα

 

Η Ελλάδα καταγώγιο;

 

Αν.Επ. Π. Παυλόπουλο

  

Intangible prisons

 

Plausible deniability

 

Images of German w & s

 

Crimes against Humanity

 

"Chimera" - "Bellerophon"

 

pr. Donald Trump

 

  

Legal Notice 87

 

Βδέλλες, αποικιοκρατικές

 

Being a German

 

Legal Notice 84

 

Dirty colonial methods

 

Georgi Markov, BG - KGB

 

Samples of Barbarity

 

Ελλάδα - αποκόλληση

 

Έλληνες, στο έλεος...

 

Harvester's log 16/3/17

 

 

Legal Notice 66

 

Execrable

 

Legal Notice 62

 

  

My story

 

  

Aggression?

 

  

Η Εστία μου

 

  

Why so untidy?

 

  

Αποικιοκρατία

 

  

Εξόντωση Ελλήνων αντιφρονούντων;

 

  

Ζήτημα εμπιστοσύνης

 

  

Μεθοδικότητα

 

  

Ανοικτή Επιστολή πρέσβη ΗΠΑ

Αφορμή, U2RIT vs Ελλάδα;

Βιοηθική

A request to U2RIT

Colonial aggression - 2

Open Letter to UN S.G.

Open Letter to p.C. & p. O.

Δήλωση πρόθεσης επαναπατρισμού

 

Ο "εφιάλτης" της Νυρεμβέργης

Συλλογή Φωτογραφιών

Αίτημα προστασίας, προς Ιταλία

Chroma key, background removal

Science and Ethics

Να συμβάλει και η U2RIT

Θα ξαναφτιάξουν πολλές φορές Άουσβιτς και Zyclon B

 

Split-Screen effect

Η Ζωή είναι Ωραία.

Βόρεια Κορέα

Λευτεριά στους Έλληνες, εξανα- γκαστικά "Εξαφανισμένους"

 

Μυστικές δίκες;

Trustworthiness

Πολιτισμό, ή, απληστία;

Ακραία Στυγνότητα

Η Τέχνη της Επιβίωσης

Political Asylum 3

Επιστροφή στις ρίζες

The Human Cost of Torture

An urgent appeal for solidarity

More obvious than the Sun

Western "culture"

Political Asylum

Έννομη Προστασία

Μια μήνυση που εγείρει ερωτηματικά

 

 

 

Honor your father...

Noise

Creative Greeks

A pair of Dictatorships

Actio personalis moritur cum persona - Colonial domination (upd!) PDF Εκτύπωση E-mail
Αξιολόγηση Χρήστη: / 0
ΧείριστοΆριστο 
Συνεννόηση για Δράση - Απόψεις
Συντάχθηκε απο τον/την Χρήστος Μπούμπουλης (Christos Boumpoulis)   
Κυριακή, 08 Απρίλιος 2018 01:31
Actio personalis moritur cum persona - Colonial domination
Actio personalis moritur cum persona
Actio personalis moritur cum persona is a Latin expression meaning "a personal right of action dies with the person".
Source: en.wikipedia.org/wiki/Actio_personalis_moritur_cum_persona
 
If the death occurs before the close of pleadings or before the occurrence of litis contestatio and the claim is for pain and suffering and that is that. This is expressed in the Latin maxim "actio personalis moritur cum persona" which simply means "a personal action dies with the person".
Source: www.blcattorneys.co.za/articles/death-of-plaintiff
 
Definition: Triangulation.
The general rule is to triangulate by emphasizing something similar to the domestic problem except that it is not quite so bad or is committed by bad criminals the government is chasing or by foreign groups or governments. It masks the most serious abuses (people can only concentrate so many things). Someone not familiar with the idea of masking by triangulationmight even think someone in the press may trying to help but, gosh, here at least is a watered-down something.
Source: www.geeldon.wordpress.com/2010/11/16/part-ii-resisting-the-mind-control-state/
 
Reports suggest other suspects may have fled from the van.
Münster "van attack": Two dead and 20 injured after vehicle ploughs into crowd in Germany.
The driver, whose identity is not yet known, shot and killed himself. Police spokesman Peter Nuessmeyer said he could not confirm reports that he was a middle-aged German man with psychological issues.
Source: www.standard.co.uk/news/world/muenster-attack-several-dead-after-car-drives-into-crowd-in-germany-a3808266.html
     
Dr John Hall Interview: Gangstalking, Surveillance, Targeted Individuals, Crimes
www.youtube.com/watch?v=cmNOuRKINJ4
 
British Royal Couple in First Official Visit to Greece
British royals Prince Charles and his wife Camilla have accepted an invitation by the president of the Hellenic republic Prokopis Pavlopoulos hor an official visit to Greece in May.
It will be the first time in modern Greek history that members of the British royal family are official guests in the country.
Source: www.greece.greekreporter.com/2018/03/11/british-royal-couple-in-first-official-visit-to-greece
 
On March 6th, 2018 I submited a lawsuit against Greece, at the European Court of Human Rights, in Strasbourg.
The reason is that, Greece's legislation (law 2472/1997, art. 12, par. 2, art. 24, par. 5.) forbids the Greek citizens from gaining access to the complete, dynamic content of both, their own criminal record, as well as, their own judicial files.
It is expected that, the European Court of Human Rights, most probably, is going to accept the complain and order Greece to declassify the contents of Greece's State Archives in order for the Greek citizens to become able to inspect their corresponding personal information.
According to my present knowledge, these criminal records and these judicial files include detailed information and evidence of the massive colonial crimes which have been committed, during the past, approximately, sixty years, by the colonialists', "Stay Behind" and others, covert and non-uniformed, armies, against innocent and legitimate Greek citizens.
Those crimes are related, to colonial domination; to involuntary human experimentation; to involuntary human harvesting; to illegitimate secret trials; to gang-stalking; to the war crime of illegitimate restling; to illegitimate front organizations; and to many other kinds of colonial criminality.
If and when, the Greek citizens gain access to the contents of Greek State's official archives I, definitely, expect the followings to happen:
 
1. The international community is going to become overwhelmed by shorrow and horror.
2. Both, the NATO, as well as, the European Union' present organizational form, are going to, instantly, "evaporate".
3. The international community is going to, immediately, isolate, in every aspect, the member States of the informal colonial federation U2RIT.
4. The international community is going to bow before the horendus and prolonged suffering of the Greek Nation.
5. The international relationships shall, most probably, become reorganized in such a way that, Germany and Greece, may become burdened by the responsibility of guiding the rest of the non-colonial Nations towards, Peace, Freedom, Cooperation and frugal Prosperity.
 
For the above reasons, the U2RIT's member States, are, definitely, motivated to use all the means they possess in order to avoid, Greek State archives' declassification.
I am not shure about, when and how, all this mesh is going to develope, though, I am almost certain that, sooner or later, the entire international community is going to become totally desgusted by the colonial Nations' atrocities which have been committed against the Greek Nation's, innocent and kind, members.
Existing overt and legitimate international treaties, like those which are related to NATO and to E.U. together with, covert and illegitimate, others they have offered to the colonial Nations the opportunity to missuse, meaning to betray, the good will and the trust of the other Nations. And now, the lives of innocent civilians (the eye witnesses and the legitimate political dissidents) are being severely threatend because of the colonial Nations' struggle to avoid the public exposure of their crimes.
The democratic citizens of the non-colonial Nations, meaning, the citizens which embody the democratic principles, how did they allowed all this tragedy to unfold?
   
Christos Boumpoulis
economist

 

P.S.: Multiple missunderstandings seemingly exist. My beloved Germans should be treated with respect and love and not otherwise. And the, innocent and legitimate, political dissidents should be safeguarded by the members of their corresponding Nations.

 

Appendix

 

Levels of MONARCH Programming

DELTA. This is known as "killer" programming, originally developed for training special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, Mossad, etc.) in covert operations. Optimal adrenal output and controlled aggression is evident. Subjects are devoid of fear; very systematic in carrying out their assignment. Self-destruct or suicide instructions are layered in at this level.

OMEGA. A "self-destruct" form of programming also known as "Code-Green". The corresponding behaviors include suicidal tendencies and/or self-mutilation. This program is generally activated when the victim/survivor begins therapy or interrogation and too much memory is being recovered. Source: www.monarchprogramming.wordpress.com/category/alters-and-triggers/

 

Plausible Deniability

Plausible deniability is the  ability of people (typically senior officials in a formal or informal chain of command) to deny knowledge of or responsibility for any damnable actions committed by others in an organizational hierarchy because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions. In the case that illegal or otherwise disreputable and unpopular activities become public, high-ranking officials may deny any awareness of such acts to insulate themselves and shift blame onto the agents who carried out the acts, as they are confident that their doubters will be unable to prove otherwise. The lack of evidence to the contrary ostensibly makes the denial plausible, that is, credible, although sometimes it merely makes it unactionable. The term typically implies forethought, such as intentionally setting up the conditions to plausibly avoid responsibility for one's (future) actions or knowledge. In some organizations, legal doctrines such as command responsibility exist to hold major parties responsible for the actions of subordinates involved in heinous acts and nullify any legal protection that their denial of involvement would carry. Plausible deniability is primarily a more typically Western cultural construct,[citation needed] as high-ranking officials in more typically Eastern cultures, such as Japan or Korea, are often expected to take full responsibly for improper actions by their subordinates. As an example, Japanese CEOs have made dramatic public apologies and even committed suicide when their companies have been dishonored in some way. In politics and espionage, deniability refers to the ability of a powerful player or intelligence agency to pass the buck and avoid blowback by secretly arranging for an action to be taken on their behalf by a third party ostensibly unconnected with the major player. In political campaigns, plausible deniability enables candidates to stay clean and denounce third-party advertisements that use unethical approaches or potentially libellous innuendo. In the US, plausible deniability is also a legal concept. It refers to lack of evidence proving an allegation. Standards of proof vary in civil and criminal cases. In civil cases, the standard of proof is "preponderance of the evidence" whereas in a criminal matter, the standard is "beyond a reasonable doubt". If an opponent cannot provide evidence for his allegation, one can plausibly deny the allegation even though it may be true. Although plausible deniability has existed throughout history, that name for it was coined by the CIA in the early 1960s to describe the withholding of information from senior officials in order to protect them from repercussions in the event that illegal or unpopular activities by the CIA became public knowledge. The roots of the name go back to Harry Truman's national security council paper 10/2 of June 18, 1948, which defined "covert operations" as "...all activities (except as noted herein) which are conducted or sponsored by this Government against hostile foreign states or groups or in support of friendly foreign states or groups but which are so planned and executed that any US Government responsibility for them is not evident to unauthorized persons and that if uncovered the US Government can plausibly disclaim any responsibility for them."[1] During Eisenhower's administration, NSC 10/2 was incorporated into more specific NSC 5412/2 "Covert Operations."[2] NSC 5412 was de-classified in 1977, and is located at the National Archives.

[Wiki - Plausible_deniability]

 

Email hacking

Email hacking is the unauthorized access to, or manipulation of, an email account or email correspondence.

Overview Email is a widely used communication mechanism that can be categorized into two basic types of web-based service: open and closed. Open web-based services provide email accounts to anyone, either for free or for a fee. Closed web-based services are managed by organizations who provide email accounts only to their members. Email is used by commercial and social websites because of its security. Email is an increasingly common tool used to communicate. The main reason email accounts are hacked is to access the personal, sensitive, or confidential information that they might contain. This is very harmful for the user and could cause damage to profiles on certain websites, bank accounts, and personal life.

Attacks

There are a number of ways in which a hacker can illegally gain access to an email account, and the majority of them rely on the behavior of the account's user.

Spam Spam is created by attackers who send unsolicited commercial or bulk email. Spammers continuously attempt to find new ways around the increased legislation and policies governing unsolicited emails. Attackers often send massive email broadcasts with a hidden or misleading incoming IP address and a hidden or misleading email address. If the spammers were to gain access to a company’s email and IP address, the impact on the company's business could be devastating. The company’s Internet connection would be terminated by its Internet Service Provider (ISP) if its email and IP address are added to the blacklist of known spamming addresses. Effectively, this would shut down the company’s online business because none of the emails would reach their destination.

Virus A virus incorporates email as a means of transportation. This type of virus is often called a worm - the Sobig virus is an example. This virus creates a spamming framework by taking over unwilling participants’ PCs. This is a major threat to email security because the spam will continue to spread, triggering dangerous viruses with malicious intent. See ransomware.

Phishing Phishing is a type of cyber attack that involves emails that appear to be from legitimate businesses that the user may be associated with. As these phishing emails are scams they are designed to look as though they come from the claimed entity. These messages ask for verification of personal information, such as an account number, a password, or a date of birth. Twenty percent of unsuspecting victims respond, which may result in stolen accounts, financial loss, or even identity theft. It is best not to respond to unsolicited emails as they may be attacks of this kind. If one deems it necessary to respond to an unsolicited email, they should be sure to check it for misspellings or odd phrasings as these can be a giveaway of illicit activity. It is also not a good idea to open email attachments from senders one does not trust.

Preventing email hacking

Email on the internet is commonly sent by the Simple Mail Transfer Protocol (SMTP). SMTP does not encrypt the text of emails, so intercepted mail can be read easily unless encryption is used. The identity of the sender or addressee of an email is not authenticated, and this allows opportunities for abuse, such as spoofing. It is important to guard all gateways of a network. Having a firewall and anti-virus software are adequate for personal use; however, this is often not enough for a corporate business. Security measures such as a sniffer and an intrusion detection system (IDS) determine if someone is accessing the network without permission, detecting any network intrusion attempts. In order to spot any weaknesses in a company's network, security specialists will perform an audit on the company. They may also hire a Certified Ethical Hacker to perform a simulated attack in order to find any gaps in existing network security. Although companies may secure its internal networks, vulnerabilities can also occur through home networking. Email may be protected by methods, such as, creating a strong password, encrypting its contents, or using a digital signature. An email disclaimer may be used to warn unauthorized readers, but these are thought to be ineffective.[by whom?] Other ways that one can secure personal email accounts include enabling 2-factor authentication in settings and use of an encrypted email service such as Protonmail or Mailfence.

Cases of email hacking

Email is increasingly replacing letter mail for important correspondence, and the increase of email usage has led to several notable cases in which emails were intercepted by other people for illegal purposes. For example, email archives from the Climatic Research Unit were leaked to create the scandal popularly known as Climategate. News of the World journalists employed by News International have in the past hacked email accounts for their stories. Individuals such as Rowenna Davis have had their accounts taken over and held ransom by criminals who tried to extort payment for their returned use. The email accounts of politicians such as Sarah Palin have been hacked in order to find embarrassing or incriminating correspondence. On February 8, 2013, the media reported another incident of compromised email, this time from the former United States president, George H.W. Bush. It was reported that the hacker stole photographs and personal emails, including addresses and personal details of several members of the Bush family. Hillary Clinton has also had recent[when?] controversy regarding her use of a private unsecured email server. There are even some who speculate that the email server could have been breached by the Russian or Chinese governments. All of this has resulted in an as of yet unresolved FBI investigation.

Source: wikipedia

 

It is thought that as many as 100,000 Germans have had issues with the law purely for daring to speak their minds about the second world war or the National Socialist period of their history. They have been sacked from jobs, had their assets seized and their families broken apart, all in the name of "protecting the constitution" of the so called Bundesrepublik.

Source: www.defendevropa.org/exclusive/modern-germany-illegal-state/

 

Gang Stalking is experienced by the Targeted Individual as psychological attack, that is capable of immobilizing and destroying them over time. The covert methods used to harass, persecute, and falsely defame the targets often leave no evidence to incriminate the civilian spies. It’s similar to workplace mobbing, but takes place outside in the community. It called Gang Stalking, because groups of organized community members stalk and monitor the targets 24/7. Many Targeted Individuals are flagged, harassed and placed under surveillance in this way for months or even years before they realize that they are being targeted by an organized protocol of harassment. What happens during this monitoring and surveillance is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in Russia. Many innocent people in the former East Germany would be targeted by the state, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. The same persecutions and harassment’s are now happening in democratic countries. Once a person is flagged or has a warning marker placed on their file, the community becomes hypervigilant, and within this structure there is a targeted and illegal protocol of harassment that happens. Electronic means are used to monitor, harass and torture the target. When the target tries to describe what is happening to them, it sounds as if they have had a mental breakdown. The reality is electronic means are being used to make it appear as if the target has had a breakdown.

Source: www.gangstalking.wordpress.com/faq/

 

Nomadic empires, sometimes also called steppe empires, Central or Inner Asian empires, are the empires erected by the bow-wielding, horse-riding, nomadic peoples in the Eurasian steppe, from classical antiquity (Scythia) to the early modern era (Dzungars). Nomadic empires typically operated by establishing a capital city inside a conquered sedentary state, and then by exploiting the existing bureaucrats and commercial resources of that non-nomadic society. As the pattern is repeated, the originally nomadic dynasty becomes culturally assimilated to the culture of the occupied nation before its ultimate overthrow. A term used for these polities in the early medieval period is khanate (after khan, the title of their rulers), and after the Mongol conquests also as orda (horde) as in Golden Horde. [wiki].

 

Τελευταία Ενημέρωση στις Δευτέρα, 09 Απρίλιος 2018 14:51