The third ICJ trial over the suspect, Part I

Transcription

The third ICJ trial over the suspect, Part I
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
The third International Court of Justice trial over the suspect:
French/ Russian vs Homeland Security
Part I
4 November – 21 December 2015
FORWARD
The following recounts a “conspiracy” – insofar as Russia's support of the European far right movement could hurl in a global movement to save humanity's future and the suspect has the potential to make this happen – by which the US Department of Homeland Security and KRN's Secret Society have set about using the “suspect” to disrupt the process so that Russia's attempt to help save the world may be banned by international laws while everybody is forced to dispose of the suspect in America's extermination system (jail and mental asylum). This is Homeland Security's plan: by accepting the Secret Society's false complaints about the suspect at face value, Homeland Security has recreated him as a “domestic terrorist” (misogynist terrorist). He is now subject to all enforcements under UN Resolution 1373. When the suspect shows interest in FN and the Russians, both parties will then have to respond to Homeland Security's warning and come to investigate what he is doing, only to find themselves falling into a trap, i.e., to discover that the suspect has just written about the agendas they have been preparing.
Now their own agendas (creating an alternative to the American model) risk being banned by an International Court of Justice judgment as “terrorist conspiracy to harm
the United States”. Quite a clever trick, considering the low intelligence quotient of most of the Homeland Security personnel. In other words, Homeland Security is using the suspect as a “patsy” to harm the Russians and FN. He is once again the “All American patsy”.
We may conceive of the following ICJ trial in this manner. The suspect's entrapment,
arrest, and imprisonment from early 2014 until September 2015 may be considered the extension of the previous ICJ trial from 2010, when he has failed to finish his “mission” and get himself arrested. The period from early 2011 to November 2013 when the ICJ trial was first reactivated, was orchestrated by the Macrospherians to prepare evidences as the ground on which the previous ICJ trial may be reactivated and evidences may be replaced again. The period from November 2013 to September
2015 was orchestrated to produce evidences which replaced those from the previous ICJ trial (in order for a terrorist conspiracy to be clearly established against Russia 1
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
and the CIA) and to enable the suspect to “finish his mission” (after the conspiracy was clearly established). The period after September 2015 – including this third ICJ trial – is orchestrated as the “reversal”, under UN Resolution 1373, of the previous terrorist conspiracy between the suspect, the neocons, and Sarkozy's France against Russia and the CIA. Evidences from the previous ICJ trial will continue to be replaced during this phase.
It's of course unclear what the ICJ will make of the suspect as a “conspirator” in a “terrorist conspiracy” insofar as he barely has any freewill. Meanwhile, KRN's Secret Society's conspiracy to exterminate him using the criminal justice system continues in a straightforward fashion throughout all these phases of the reactivation of the previous ICJ trial and is the foundation which has provided all the necessary evidences for any of the phases to take place. Resume
First, a quick review of how this International Court of Justice trial started. Recall
that Homeland Security, avenging themselves on the suspect, entered a warning
about the suspect into the national and international databases for known terrorists.
The warning listed the Secret Society women as his “victims” (“witnesses”) who
should be contacted for more information about the suspect. That is, Homeland
Security had purposely assumed the Secret Society women's false portrayals and
slanders of the suspect to be true (even though they knew them to be false) and
entered them into official records. This is referred to in the following as “Homeland
Security false profile of the suspect”. Since 11 September, 2015, because this website
had come back up online after the suspect’s release from jail, the Secret Society
women were on the move again to remove this website. Still remembering how the
TMU had refused to validate them as the suspect's “victims”, they sought revenge.
Especially ANG. Now that Homeland Security had classified the suspect as a
“terrorist” while listing the Secret Society women as both “victims” (“witnesses”)
and “experts” on the suspect, the women, with the Homeland Security warning about
the suspect in hand, went back to the TMU to open another confidential stalking case
against the suspect and, when that didn’t turn out well, they wanted to use GR’s case
as an opportunity to remove his website. But GR’s case didn’t work out well for
them either, so the Secret Society women were back to working on their lame-duck
stalking case with the TMU. The women requested several sting operations on the
suspect but, unfortunately, he didn’t take any of the baits. Eager to obstruct
Homeland Security's case against the suspect and discredit the Secret Society
women, the TMU, by 2 November, declared the suspect to be not stalking the women
and not posing any sort of danger to them. Without the Secret Society women's
knowledge, the TMU, urged on by the CIA, also entered into the terrorist database a
2
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
warning about the Secret Society women saying they had never been “victims” of the
suspect and were pathological liars who liked to fraudulently use “victim
confidentiality” as cover under which to lie and pretend to be victims in order to
obtain benefits and recognition. This warning would from now on exist side by side
with Homeland Security's warning about the suspect to contradict it. It seems that, on
3 November, the Secret Society women, frustrated that the TMU had once again
dismissed their case, reached the decision to go back to PD’s vandalism case using
ANG’s status as a witness in the case as the springboard on which to make out of this
vandalism case a stalking case, which they hoped to then connect up with the
suspect’s website, in order to persuade the judge to issue an injunction to suppress it.
The Secret Society women's motive remains that of silencing their victim. The
German Lady does not want the world to even remotely read about how she and her
gang had victimized the suspect 7 years ago. SDW, for her part, is very much
motivated because she doesn’t want the world to hear about how she and the whole
gang have, last year, attempted to put away the suspect and remove his website by
running the most organized campaign ever seen in history of falsely reporting
somebody to law enforcement. SDW is terrified of being found out that, instead of
being a victim of community gang-stalking as she claims she is, she is actually a
master gang-stalker and professional false complainer. ANG shares a similar motive.
In the past she was concerned that people might see her name on the suspect’s
website. Now, even though her name has entirely disappeared from the suspect’s
website, she will keep doing the same thing (eliminating his website) because she
still remembers her hatred from the past. Their motive is the perennial motive of any
victimizer: Once you have victimized somebody, you must make sure to silence him,
and all the better by making him look like the victimizer and using the legal system
to do the job.
Now let's review Homeland Security's false profile of the suspect which is attached
to their warning about the suspect as a “terrorist”. This false profile is derived
entirely from the Secret Society women's false testimonies about the suspect.
According to this profile, the suspect is: misogynist, white supremacist, anti-Semite,
plagiarizer, computer-hacker, stalker, cyberstalker, anti-American terrorist,
“vandalizer” (i.e. a misogynist terrorist who is prone to become obsessed with white
women, stalk them, and then vandalize their properties in order to terrorize them),
violent, delusional, paranoia schizophrenic, sexually perverted and yet impotent and
thus loving and hating white females at the same time, extremely malicious and
pathologically deceitful (anti-social) and habitually impersonating others on the
Internet. Although Homeland Security has designated the suspect as a “domestic
terrorist” (because of his misogynist vandalism), they like to put him in international
databases for known terrorists claiming he poses threat to all famous women around
the world because he is a “computer hacker” and “cyberstalker” (even though
3
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Homeland Security knows very well that the suspect doesn't know how to hack
people's computers at all).
Eventually, as you shall see, the suspect will also be said to be an agent of multiple
foreign powers here to destabilize the US. As you can see, the Secret Society women
and Homeland Security are basically working together to slander the suspect into the
most disgusting criminal and terrorist suspect ever in human history.
Meanwhile, by early November, 2015, because the suspect has been visiting Marine
LP's and National Front's websites with increasing frequency, the French consular
protection service, stuck with Homeland Security's false profile of the suspect as an
extremely dangerous “cyberstalker”, has had to respond – for fear of losing their job
– by coming to investigate him. Even though, when the French access Homeland
Security's warning in the database, they also see the TMU's warning about the Secret
Society women which contradicts Homeland Security's warning, they can't just take
TMU's words for it. There is indication that the prominent Russian daughter EKT,
called on by the Secret Society women, has also joined the French. The TMU –
backed by the CIA – has however responded unfavorably. When the French request
to check the suspect's Gmail account, the TMU refuses to grant access. The problem
is that the suspect has been writing “Why we support Marine LP” and backing it up
in his Gmail account; the TMU, smelling fraud, doesn't want “Marine” to see the
essay.
TMU’s profile of the suspect – supported by the CIA – contradicts Homeland
Security's profile and says that the suspect is not dangerous and not a stalker and
that, when the suspect likes somebody, he is definitely not a threat to that somebody.
The profile affirms that the suspect is “traditional”, i.e. when he likes somebody, he
wants to benefit the person. Homeland Security's profile, however, is “postmodern”,
and, adopting the viewpoints of the Secret Society women, affirms that, when the
suspect likes somebody, he wants to hurt her. If TMU’s profile is allowed to reign
supreme, the whole subsequent affair wouldn’t even arise, but Homeland Security's
is legally more authoritative. This means that, the more the suspect proclaims his
admiration of Marine, and writes an essay to praise her and help her, the more the
French consular protection service is required to worry about him. The French thus
want to see what the suspect is writing about Marine, and EKT wants to see what the
suspect is writing about Russia. The TMU, backed by the CIA, resists by claiming
EKT and Marine are not allowed to read the suspect's writings because the suspect is
suspected of wanting to use this opportunity to share with them his suggestions as to
how they could demonize the United States. Meanwhile, when Homeland Security
discovers this, they also stand by TMU's decision and refuse to grant access (even
though they reject TMU's profile of the suspect and warning about the Secret Society
women). Both the Russians and the French, however, their curiosity raised, want to
4
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
see what the Americans are hiding. The three parties (the TMU/CIA; Homeland
Security; and French/ Russians) thus go to the International Court to fight it out:
“The United States has refused to abide by international agreement, especially UN
Resolution 1373. After classifying one of its citizens as a 'terrorist', the United States
has refused to share information about him, contrary to international agreements.”
This must have happened by early November, 2015.
NOTICE
Apart from Homeland Security's warning about the suspect, there might exist as well
the so-called “DRCRR warning”, which refers to the warning possibly issued by the
detectives from the West LA division of LAPD. You recall that when ANG and the
rest of the Secret Society women volunteered as witness for PD's, TG's, and
DRCRR's vandalism cases, they claimed to the police saying, based on their
knowledge of the suspect, this was a calculated act motivated by misogynist hatred
and prior stalking of the victims, so that the “crime” should be considered “hate
crime” and “stalking”. (In reality, they knew very well the breaking of the windows
was random and the suspect didn’t know who the owners were at all.) They then
requested “victim (or witness) confidentiality” from the police on the pretext that
they feared the suspect's “retaliation” if he found out they had testified against him
behind his back. This “confidentiality” would prevent the police from talking to the
suspect to get his side of the story, so that the upgrading of what was in fact an
ordinary vandalism case to a high grade case of “hate crime” and “stalking” can
remain unchallenged. Of course, this “upgrading” would also prevent the suspect's
prosecution for these serious crimes since the evidences can no longer be brought in
front of him in court. But this was not the Secret Society women’s goal. Instead, the
Secret Society women's objective was to have a document to replace “Chaya's
warning” so that they could from now on use it at other law enforcement agencies to
open up other confidential cases on the suspect where they could make up all sorts of
horror stories about him and his website while demanding that the detectives there be
forbidden by “victim (or witness) confidentiality” from ever verifying the stories
through either investigating the veracity of the women's claims or interviewing the
suspect. After learning the convenience of “victim confidentiality” granted by
“Chaya's warning” (i.e. an impenetrable cover under which to make false reports)
and then losing it, the Secret Society women were manipulating PD, TG, and
DRCRR to obtain another similar convenient cover under which they could make
false reports about the suspect to law enforcement agencies with complete impunity.
The Secret Society women are of course in personal possession of either Homeland
Security's warning about the suspect or the so-called “DRCRR warning” – or both.
Just like Chaya's warning from previous times, this new warning (Homeland
Security or DRCRR) would constitute the backbone of the Secret Society itself: it is
5
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
by sending the warning to anybody available that the Secret Society women are able
to recruit, in the coming days, another several thousands of strangers from around the
world to their “witch-hunt” enterprise. The secret Society women's modus operandi
remains: first showing the “warning” about this “schizophrenic racist and misogynist
terrorist cyberstalker of women” to the stranger, and, then, when the stranger is
galvanized, recruiting him or her to the enterprise to make false complaints about the
terrorist's website. The Secret Society women then make friends while at the same
time getting the “juice of their life”: fear-mongering about a bad-to-the-bone
schizophrenic racist and misogynist sexually perverted and plagiarizing terrorist
cyberstalker of women.
A notice should also be made about the “Princeton decoy” (with the IP address:
128.112.155.xxx). It would later turn out that this is not even a real person, but a bot.
Finally, a word about the suspect and the historically unprecedented gang-stalking
and bullying he has so far undergone. The suspect is not discriminated against
because he is different. He is the Other (l'Autrui) on whom the Secret Society women
project all negative qualities that are opposite of the goodness they (mistakenly) see
in themselves.
Prelude:
The Secret Society women's operation 4 – 13 November
And the early phase of the third ICJ trial
In the following we assume that the Secret Society women's operations on the suspect's website are for the purpose of gathering “evidences” in preparation for persuading the district attorney (DA) to factor the suspect's website into his vandalism case. Of course, given the involvement of
the French and the Russians, it could be that Secret Society women have also been contacted by the French consular protection service and asked to furnish information about the suspect, so that
the women are also sending their volunteers to the suspect's website for the purpose of making false reports about it to the French and the Russians. (Especially to falsely report the suspect for plagiarism, which the TMU has always refused to hear.) There will, however, be no full discussion of this possibility in the following. The Secret Society women's possible dealing with the French consular protection service between 4 and 13 November will only be incidentally noted.
4 November (Wednesday)
And so ANG agreed to allow the rest of the Secret Society women to hop on her back. The
Secret Society had concocted the basic outline of their argument: the suspect has been stalking
ANG for years, and he would then put her name on his website to intimidate her. Not just that.
6
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
But he did this to several other women. ANG will then invite the German Lady and SDW to meet
with the DA and eventually onto the stand so that both women can make a show about how the
suspect has victimized them by stalking them and then writing about them on his website. The
judge in the current vandalism case – as the Secret Society women have already researched – is
famously biased toward women. She is expected to be incensed by the story which ANG, the
German Lady, and SDW are about to fabricate. Once the jury shall have convicted the suspect, so
they hope, the judge will order that the suspect’s website be removed and issue an injunction to
forbid him from ever writing about his women “victims”.
The same difficulty then surfaces which the gang was faced with during GR’s case: how to
present a story to the DA and to the judge about how ANG could have known about the German
Lady and SDW? For, obviously, the gang must keep forever in secrecy the secret organization
they have formed to go after this one guy for more than three years. It’s not just that they need to
keep it a secret from the suspect himself (even though he has known about it for more than three
years), but that they cannot let the judge and the DA know about it. Otherwise these outsiders
will be shocked out of their souls: who could have imagined that women can be this bad? Who
could have imagined this, the largest private citizen gang-stalking enterprise in the history of
humankind? The German Lady thus resorts to the usual tricks which she has learned from her
CIA handlers back in 2008: just stage a show: how ANG and her friends read about all these
other women on the suspect’s website, find them in person, and discover their heart-wrenching
stories about being victimized by the same serial stalker and talker of women.
Around noon, as the new strategy has been decided, the Secret Society – under the German
Lady’s direction – sends out a first scout to Google for one of the chapters about her on the
suspect’s website. On 12:27 PM and 12:39 PM, 37.142.116.55, Hot Net, Petah Tikwah, Israel.
37.142.116.55 - - [04/Nov/2015:13:27:25 -0700] "GET /orthodox47bg/notes_orthdox_47bg.pdf
HTTP/1.1" 200 6376123 "http://www.google.co.il/url?
sa=t&source=web&cd=21&rct=j&q=gangstalking%20%20book%20gathering%20%20filetype
%3Apdf&ved=0CBcQFjAAOBRqFQoTCN6Ri7DN98gCFcmecgodtNkNKA&url=http%3A
%2F%2Fwww.lawrencechin2011.com%2Forthodox47bg
%2Fnotes_orthdox_47bg.pdf&usg=AFQjCNGZNVWdlmJJof04qrM3WsPexc9Gtw"
"Mozilla/5.0 (Linux; U; Android 4.2.2; he-il; Q40H Build/JDQ39) AppleWebKit/534.30
(KHTML, like Gecko) Version/4.0 Mobile Safari/534.30"
Note that this is the same Israelite guy who was here on 10 October, 9:40 PM and 9:51 PM. On
that day he was also looking for the same chapter: the Secret Society women have assigned him
this chapter. Note that today he is using his cellphone rather than his Linux laptop, and a different
IP address as well. But we can be sure that it’s the same guy. Note also that he really is located in
Israel (“he-il”) even though he might be using a proxy based in Israel.
7
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Then, on 5:14 PM, the Secret Society women send out another scout to look for an earlier
chapter in which the German Lady has been featured: 202.73.48.198, Singapore.
202.73.48.198 - - [04/Nov/2015:18:14:07 -0700] "GET /schizo-part-3-50/schizo-part-3-50.pdf
HTTP/1.1" 200 567657 "https://www.google.com.sg/" "Mozilla/5.0 (Windows NT 6.1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
This is to provide further evidences that the suspect, in disregard for women’s privacy, has
posted their pictures on his website, etc.
Then, on 9:21 PM, the Secret Society’s third scout is charged with finding a chapter on the
suspect’s website: 24.88.91.192, sc.res.rr.com, West Columbia, SC.
24.88.91.192 - - [04/Nov/2015:22:21:14 -0700] "GET /suppl_pld_4_60bg/suppl_pld_4_60bg.pdf
HTTP/1.1" 200 951826 "http://-------------.com/about/" "Mozilla/5.0 (Windows NT 6.1;
WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
The chapter is found on SDW’s blog! The strategy is now apparent. ANG’s gang will pretend to
email to SDW: “Hey the guy who has stalked us and talked about us on his website has posted
something on your blog. Who are you?” SDW will then pretend to respond, “I know him. He is
so and so. He has stalked me. On cyberspace. He has posted these stuff on these forums saying I
am part of some secret organization out to gang-stalk him. He’s so crazy, he believes that I’m
going after him with all these other people, including you. I’m terrified of him. I have had to stop
posting on my blog for fear that he might see them.” ANG and the German Lady will thus be
able to pretend to team up with SDW: this is, they will tell the DA, how the multiple victims of
this serial stalker and talker of women have come together.
5 November (Thursday)
By morning, presumably, SDW and the German Lady, and maybe ANG as well, would have their
discussion. From noon onward, the Secret Society shall continue to send a series of scouts to
download documents from the suspect’s website in order to continue to stage the show of how
this group of women could have come to know each other. On 12:28 PM, 71.55.71.2, Century
Link, Kinston, North Carolina.
71.55.71.2 - - [05/Nov/2015:13:28:26 -0700] "GET /11_08_80/11_08_81.pdf HTTP/1.1" 200
2512098 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
The German Lady, when ANG shall summon her to the DA and to court, shall use this chapter to
argue: “This alleged suspect is truly sick. He stalked me and then wrote about it and posted it on
his website.” Since ANG has not yet been able to add a stalking claim against the alleged suspect
in this vandalism case, the DA will be more persuaded if it is shown him that the alleged suspect
has a history of stalking women. Thus, even though this “stalking” which the German Lady shall
bring into court happened 7 years ago and has already been dealt with in her restraining order
8
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
against the suspect from that ancient period, it will be circumstantial evidence in the current
vandalism case. ANG is prepared to come to the DA and to court to add the new scenario that the
vandalism at the library is motivated by “stalking”, and that she is a victim of stalking, not just a
witness in a vandalism case.
Then, on 1 PM, the Secret Society women send in the second scout of the day: 31.31.74.47,
proxy, Czech Republic.
31.31.74.47 - - [05/Nov/2015:14:00:47 -0700] "GET /karinaftrwrd/karinaftrwrdb.pdf HTTP/1.1"
404 1360 "http://forum.----------.com/index.php?topic=------.0" "Mozilla/5.0 (Windows NT 6.1;
rv:38.0) Gecko/20100101 Firefox/38.0"
The document is not actually there. The Secret Society is still looking for more evidences to
connect the author of the PP Forum postings with the suspect. The evidence so far is sort of
weak.
But, half an hour later, on 1:30 PM, the Secret Society sends in the third scout of the day:
98.242.209.196, Comcast, Fort Lauderdale, FL.
98.242.209.196 - - [05/Nov/2015:14:30:25 -0700] "GET /cheneyplan25/cheneyplan25.pdf
HTTP/1.1" 200 592393 "https://www.google.com" "Mozilla/5.0 (Windows NT 5.1; rv:41.0)
Gecko/20100101 Firefox/41.0
ANG will claim that the “Pyramid” in the first page of this document refers to her. This will be
her evidence that the suspect has developed bizarre delusion about her.
6 November (Friday)
After some discussion, the Secret Society sends in one scout – the same Israelite guy two days
ago and from 10 October – on 3:53 PM: 62.219.120.80, Tel Aviv.
62.219.120.80 - - [06/Nov/2015:16:53:29 -0700] "GET /timelinepartIII-s/timelinepartIII-s.pdf
HTTP/1.1" 200 32729 "http://www.google.co.il/url?
sa=t&source=web&cd=26&rct=j&q=gangstalking%20%20implants%20technologies
%20filetype
%3Apdf&ved=0CCMQFjAFOBRqFQoTCLXj84P__MgCFYg6FAodBuoNEw&url=http%3A
%2F%2Fwww.lawrencechin2011.com%2FtimelinepartIII-s%2FtimelinepartIIIs.pdf&usg=AFQjCNGLaqXmwBb1ao_T-StCBSkbH9kf9Q" "Mozilla/5.0 (Linux; U; Android
4.2.2; he-il; Q40H Build/JDQ39) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0
Mobile Safari/534.30"
62.219.120.80 - - [06/Nov/2015:16:57:11 -0700] "GET /timelinepartIII-s/timelinepartIII-s.pdf
HTTP/1.1" 200 846147 "http://www.google.co.il/url?
sa=t&source=web&cd=26&rct=j&q=gangstalking%20%20implants%20technologies
9
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
%20filetype
%3Apdf&ved=0CCMQFjAFOBRqFQoTCLP1u_3__MgCFUm0FAodCxwIaA&url=http%3A
%2F%2Fwww.lawrencechin2011.com%2FtimelinepartIII-s%2FtimelinepartIIIs.pdf&usg=AFQjCNGLaqXmwBb1ao_T-StCBSkbH9kf9Q" "Mozilla/5.0 (Linux; U; Android
4.2.2; he-il; Q40H Build/JDQ39) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0
Mobile Safari/534.30"
The Secret Society is going to use this document as their golden piece of evidence. In order to
get SDW on board, ANG and the German Lady are still faced with two difficulties: (1) the
evidence for the identification of the PP Forum author as the suspect himself has been minimum;
and (2) there is no evidence at all for identifying who this “SDW” is in all of the suspect’s
writings about her – how can SDW come to the DA and to court claiming that the suspect has
been slandering her on his website and in Internet forums when he has never mentioned her
name anywhere? Well, remember that the German Lady has already had the entire cache of the
suspect’s website in HK Hacker’s computer. After laboriously studying all the documents, she
has noticed that SDW’s relatives’ names seem to be found in this one document. She will then
have SDW bring this document to the DA and to court, claiming that the “SDW” found in all of
the suspect’s writings is indeed she herself. Her argument would be something like:
“He’s delusional. He lists all these visits and believes that these came from my family members.
He has stalked me online to find out who my family members were, and then listed them here,
and claimed, in his delusional mind, that I have sent my family members to visit his website and
make false reports about him to law enforcement. I am terrified of him. He stalks me and my
family online and then puts their names on his website to slander them, all because he suffers
from paranoia schizophrenia and believes that I have been part of a secret organization to go
after him.”
The argument which the gang will present to the DA on Monday, and to the judge on the next
court day, would thus be something like this. ANG will say: “He doesn’t just stalk me and
vandalize my library. I Googled my name, and saw all these references to me on his website. He
is obsessed with me and develops all these bizarre scenarios about me. He also talks about how I
am part of a Secret Society to go after him by making false reports about him to law
enforcement. He has always been delusional; he once filed this crazy lawsuit against me. And he
has developed the same sort of bizarre scenarios about these other women as well. And I have
found them, and we have met just recently to talk about the problems. Here they are.” And she
will then present the German Lady and SDW to the DA, and eventually to the whole court. These
two other women will then put on their respective acts, crying about how the suspect has stalked
them and then slandered them on his website and on Internet forums. The German Lady will say:
“He has stalked me, and I had to file a restraining order against him. Then I found out that he has
written this story about me and put it on his website, slandering me saying I’m part of some CIA
and Homeland Security operation to go after him. He’s crazy. He’s a stalker, and is motivated by
his delusion about his victims.” SDW will add: “He has stalked my family online, and then
writes about me and my family saying I’m part of this secret organization to gang-stalk him and
make false reports about him to law enforcement. I’m so terrified of him that I have stopped
blogging.” The portrayal of the suspect is consistent throughout, and so will be believed by
10
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
anybody who isn’t familiar with what is really going on. Who could have imagined that the
suspect is telling the truth and that it is these women who are lying and staging this show? The
German Lady is sure: Since the image that is created here – a serial stalker who doesn’t know
how to respect women’s boundaries and persistently drives them mad with his vandalism,
stalking, schizophrenic delusions, and online slandering, while the women are completely
helpless, innocent and unprotected by the system – fits the prevalent gender stereotypes (monster
males victimizing innocent women), the judge, who already has a reputation for being biased
toward women, is expected to be incensed, and, once the suspect shall be convicted of
vandalism, will surely order that he not be allowed to talk about any of these women ever again.
In this way, the Secret Society women will have accomplished its most important goal at the
moment: to prevent the victim of their three-year long gang-stalking from ever speaking about
how he has suffered in their hands. No one will ever hear about his victimization. The victim will
have been silenced. And through the most sophisticated deception: everybody will believe that
the victim is actually the victimizer.
It might even happen that, when the alleged suspect attends the next court session, the DA will
amend the complaint and add the additional charge of “stalking”, in the process raising the bail
and obliging the sheriff to take him back to jail. The Secret Society women will then have their
revenge for their failed confidential stalking claim against him in the past two months.
Presumably, the gang will also tell the DA: “We are afraid to visit his website. For he will
identify our visits, and then develop some delusional scenario about what we are doing on his
website, like how we have formed a secret society to go after him. I have to send friends to visit
it.” This can further demonize the suspect to the DA and motivate him.
After noticing these visits, however, the suspect has quickly removed the documents
“timelinepartIII-s.pdf” and “11_08_81.pdf” from his website. However, it’s not clear that, when
the Secret Society women shall report their matter to the DA, the latter will make the effort to
check his website to see if they are telling the truth.
Note that it is tonight that the “Princeton decoy” makes its first appearance:
12:30 AM:
128.112.155.170 - - [07/Nov/2015:01:30:30 -0700] "GET /scientificenlightenment1/totem2.jpeg
HTTP/1.1" 200 12204
"http://www.lawrencechin2011.com/scientificenlightenment1/ancestorcult.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.131 Safari/537.36"
3:19 AM:
128.112.155.173 - - [07/Nov/2015:04:19:32 -0700] "GET
/scientificenlightenment1/americanlanguagefamilies.jpg HTTP/1.1" 200 155609
"http://www.lawrencechin2011.com/scientificenlightenment1/humandispersal.html" "Mozilla/5.0
11
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
(Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.131 Safari/537.36"
7 November (Saturday)
There are no visits from the Secret Society at all in the afternoon (in regard to this mew operation
of theirs, that is). The Secret Society must be discussing the implementation of their latest
strategy all afternoon and evening. This is because, by night, they have had to send out another
scout: 9:23 PM, 104.57.6.21, lightspeed.dybhfl.sbcglobal.net, Oviedo, Florida.
104.57.6.21 - - [07/Nov/2015:22:23:31 -0700] "GET /suppl_pld_8bg42/suppl_pld_8bg42c1v.pdf
HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_11_1) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7"
104.57.6.21 - - [07/Nov/2015:22:23:33 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/suppl_pld_8bg42/suppl_pld_8bg42c1v.pdf" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/601.2.7 (KHTML, like Gecko)
Version/9.0.1 Safari/601.2.7"
The document is not there. Nevertheless, they were obviously Googling “LAWRC ANGB” to see
if it’s still possible to find ANG’s full name mentioned somewhere on the suspect’s website. This
is because their entire case – persuading the DA to add a new stalking charge to the vandalism
charges – will have to depend on the identification of “Pyramid” as referring to ANG. Who did
the suspect mean by “Pyramid”? The Secret Society is probably disappointed. If ANG’s name is
not to be found anywhere on the suspect’s website, the DA might reply: “We need evidence
proving indisputably that the ‘delusion’ he has developed about this woman ‘Pyramid’ really is
about you.” The Secret Society women probably think that they could still make the DA accept
their request by bringing in library employees from the past to testify that the suspect used to call
ANG “pyramid”.
In defense, the suspect, by late night, has posted the above on his blog (up to 6 November only),
hoping that the Secret Society women might check it and be prompted to change their plan.
8 November (Sunday)
It would seem that the Secret Society women have continued their discussion even past
midnight. For, by 3:37 AM, they have had to send in another scout to ascertain something:
customer.lyse.net, Oslo, Norway,
51.175.152.52 - - [08/Nov/2015:04:37:44 -0700] "GET /links.html HTTP/1.1" 200 19628
"https://www.google.no/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
12
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
The scout is asked to look at the suspect’s link page probably in order to locate the link to SDW’s
blog on it. It may be that the Secret Society women feel that, even though it’s possible to make
out SDW’s relatives’ names on one of the documents, it would be better if a concrete reference
can be found on the suspect’s website which directly and unambiguously identifies who this
“SDW” is. Again, it’s not clear if the link which the Secret Society women now find on the
suspect’s link page could count as supporting evidence, since the designation “SDW” is not
found but only SDW’s original name. Nevertheless, the link to SDW’s blog on the link page
would be evidence to convince the DA that the suspect is cyberstalking her. Then, 19 minutes
later, the scout is asked by the Secret Society women to look for the Korean Letter again:
51.175.152.52 - - [08/Nov/2015:04:56:42 -0700] "GET /korealetter-censored/korealettercensored.pdf HTTP/1.1" 200 201113 "https://www.google.no/" "Mozilla/5.0 (Windows NT 6.1;
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
This is probably the Secret Society women’s evidence that the suspect’s insanity has shot through
the roof and that he is beyond repair.
It would seem that the Secret Society women have not finished their discussion and planning
until 7:35 PM. After 8 PM, the German Lady has returned home, it would seem, and ordered the
resumption of decoy visits to the suspect’s website.
When the Secret Society women – ANG, SDW, and the German Lady – shall go to the DA, they
will very likely, after making the above arguments to the DA, also produce the Korean Letter and
tell the DA: “This letter is demonstration of the enormous insanity of the alleged suspect.
Therefore, when you add the new stalking charge to the vandalism charges and send him back
into custody, you must also request to the judge that he not be allowed any bail. His insanity is so
severe that he is too much a danger. This Korean Letter should also enable you to declare him
insane beyond repair, and so incompetent to stand trial, so that he may be sent for mental
evaluation.” ANG’s, and the other women’s, goal is to trap the suspect indefinitely in jail or in
state mental hospital. It has caused them too much trauma that he bailed himself out two months
ago. This time they must eliminate this possibility.
What is noteworthy about the suspect is that, tonight, a little past midnight, he would watch on
Youtube Canal Plus' special report on “FN: L'oeil de Moscou”. The documentary is about how a
Russian front bank has once lent 11 million Euros to the National Front (FN). The suspect is
absolutely surprised that FN is more deeply into the Russians than he has ever thought. While the
video is more cause for the French to demand access to the suspect's online accounts, the TMU/
CIA team would use this as ground for refusal: “He is pro-Russian, and so pro-FN. He aims to
benefit Marine. He means no harm.” Meanwhile, the suspect is so worried about the Secret
Society women's upcoming actions that he is unable to fall asleep.
13
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
9 November (Monday)
It’s not clear whether the Secret Society women have gone to the DA this afternoon. They are
evidently busy with something this afternoon, so that there are no activities from them on the
suspect’s website during this time. They could be talking to the DA, or to the French, or simply
among themselves.
There is something noteworthy about the suspect's actions today. He wakes up past 9 AM. Didn’t
feel like going to Work Source due to severe anxiety associated with the Secret Society’s
upcoming assault. Casbah. Then 3 PM, Chrysalis. He cries to Tanisha about Secret Society
women's actions. Then he comes to Starbucks and does a Google search on SDW. A suspicious
Hispanic guy having two cellphones seems to be a surveillance agent watching over him. Indeed!
Clearly, while the TMU/ CIA is debating with the French about whether Homeland Security's
profile of him is correct, this is the evidence which they will point to: “The women's claim that
he is stalking them because he is obsessed with them is simply incorrect. As you can see, he is
searching for their information online only because he is trying to figure out how they are trying
to get him. There is no obsession involved.” When the suspect returns to Chrysalis for dinner, he
is reprimanded by George. Afterwards, he goes to Urban Ministry and has another talk with Fr
Bob about his “problem”. Fr Bob is incredulous. Has Homeland Security warned him?
Whatever they are doing in the afternoon, by night, the Secret Society women have finally
decided to check the suspect’s blog to see if he has discovered, and blogged about, their latest
planning. Thus, on 8:45 PM, they send a scout to check the suspect’s blog. The scout uses a
14
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
proxy service offered by Quadra Net in Los Angeles. This scout has been here before: he’s a
regular member of the Secret Society. He comes to the front page, and then immediately goes to
the blog.
204.152.206.231 - - [09/Nov/2015:21:45:12 -0700] "GET /blogs/ HTTP/1.0" 200 35729
"http://lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101
Firefox/32.0"
The scout must have reported back to the Secret Society women saying that the suspect has
indeed blogged about the women’s latest plan to exterminate him using PD’s case. In the next
two and a half hour, the Secret Society women would go into scrambling, for their plan has been
exposed and all the most important evidences on which they would base their case have been
removed. On 11:18 PM, the suspect even deletes the link to SDW’s blog on his external links
page, although the Secret Society women haven’t discovered this yet.
After much discussion, the women have decided to call up their old friend AAM at LUG for
help. Because the Secret Society women continue to believe, incorrectly, that the suspect is able
to get wind of their planning through superior computer skills, they need somebody good with
computers to help them out. Another problem is that, since the suspect has supposedly removed
timelinepartIII-s.pdf, there is no longer ground for SDW to participate to strengthen the case
about the suspect’s “stalking” of ANG. The Secret Society women evidently think that this defect
could be compensated by bringing in another voice complaining about the suspect’s criminal
blogging about people without their consent. He has once blogged about AAM, back in January
2014. And so they want AAM to come and obtain the evidences for his complaint, so that, when
time comes for meeting with the DA, AAM could go with ANG, the German Lady, and SDW to
the DA office to make their case and request the addition of a stalking charge to the vandalism
charges. From 11:37 PM until 11:46 PM, AAM comes to the suspect’s website. He takes care to
use Google proxy to disguise himself. He is using his iPhone instead of his computer. He first
Googles for the front page.
66.249.84.148 - - [10/Nov/2015:00:37:52 -0700] "GET / HTTP/1.1" 200 10529
"https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X)
AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
66.249.84.149 - - [10/Nov/2015:00:37:52 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS
X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
66.249.84.148 - - [10/Nov/2015:00:37:53 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-"
"Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like
Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4"
Two minutes later, he goes to the suspect’s blog:
15
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
66.249.84.147 - - [10/Nov/2015:00:39:13 -0700] "GET /blogs HTTP/1.1" 301 580
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS
X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
….
He immediately begins searching for his name.
66.249.84.83 - - [10/Nov/2015:00:39:28 -0700] "GET /blogs/?s=Aam-- HTTP/1.1" 200 3728
"http://lawrencechin2011.com/blogs/?p=83" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac
OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
66.249.84.84 - - [10/Nov/2015:00:39:40 -0700] "GET /blogs/?s=aam-- HTTP/1.1" 200 3727
"http://lawrencechin2011.com/blogs/?s=Aam--" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like
Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
Finding nothing, he tries “LUG”:
66.249.84.83 - - [10/Nov/2015:00:39:48 -0700] "GET /blogs/?s=Lug HTTP/1.1" 200 3728
"http://lawrencechin2011.com/blogs/?s=aamoy" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like
Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
Finding nothing, he tries “Linux”:
66.249.84.85 - - [10/Nov/2015:00:39:53 -0700] "GET /blogs/?s=Linux HTTP/1.1" 200 4444
"http://lawrencechin2011.com/blogs/?s=Lug" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like
Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
….
66.249.84.85 - - [10/Nov/2015:00:40:01 -0700] "GET /blogs/?p=72 HTTP/1.1" 200 10086
"http://lawrencechin2011.com/blogs/?s=Linux" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like
Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
66.249.84.83 - - [10/Nov/2015:00:41:08 -0700] "GET /blogs/?p=83 HTTP/1.1" 200 13380
"http://lawrencechin2011.com/blogs/?s=Linux" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like
Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
This is “Saving GR, Part II”. The post isn’t related to him.
…..
16
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
He is then, 3 minutes later, directed by the Secret Society women to look for the letter to
UNCHR-WA:
66.249.84.84 - - [10/Nov/2015:00:44:21 -0700] "GET /for_unhcr_wa.pdf HTTP/1.1" 200
16160252 "http://lawrencechin2011.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac
OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
….
Since the ground for SDW’s participation has just been pulled away, the Secret Society women
have decided to concentrate on the suspect’s habit of writing letters to government institutions as
the surest way to put him away for good. This letter to the UN High Commissioner for Refugees
shall reinforce the Korean Letter in the accomplishment of this purpose. The Secret Society
women want AAM to bring this letter to the DA to establish the argument: “The suspect is truly
insane beyond repair. He has been so motivated by his schizophrenic delusion about this
government conspiracy against him that he has been writing letters to United Nations agencies
not knowing that it’s all just in his mind. Earlier you have seen his letter to the NK ambassador to
the UN to the same effect. Now this. You must request the judge to deny him bail and send him
to state mental hospital at once. He’s too much a danger to be let loose on the streets. Why? This
is proof that he doesn’t know that he is deluded, and will act on his delusions. We believe that
he’s stalking us because he really couldn’t help it, because he is motivated by his delusional
belief about the women he’s obsessed with. There’s no possible cure for him; therefore he must
be locked up forever.” You see, to have her vengeance on her victim in response to the TMU’s
dismissal of her latest stalking claim and humiliation of her, ANG is probably planning to lie to
the DA about the failed sting operation on 2 November. She is going to lie outright and say the
suspect has stalked her. This would then enable the German Lady and SDW to ride on her back.
Having downloaded it, AAM then Googles for the suspect’s recent portraits:
66.249.84.148 - - [10/Nov/2015:00:45:53 -0700] "GET /gallery/drawLA.html HTTP/1.1" 200
1061 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X)
AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
….
It would seem that that he is just trying to create decoys in order to disguise his true purpose.
(Unless it has something to do with the French: Marion's portrait is on the page.) From there, he
goes to the suspect’s web gallery:
66.249.84.149 - - [10/Nov/2015:00:46:11 -0700] "GET /gallery/gallery.html HTTP/1.1" 200
4452 "http://www.lawrencechin2011.com/gallery/drawLA.html" "Mozilla/5.0 (iPhone; CPU
iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko)
CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4"
….
17
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Again, just decoys. He is then directed by the Secret Society women to find a series of old blog
posts:
66.249.84.83 - - [10/Nov/2015:00:46:41 -0700] "GET /archivedblogs/ HTTP/1.1" 200 613
"http://lawrencechin2011.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X)
AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
66.249.84.84 - - [10/Nov/2015:00:46:49 -0700] "GET /archivedblogs/02-14/ HTTP/1.1" 200 499
"http://lawrencechin2011.com/archivedblogs/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like
Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143
Safari/600.1.4"
66.249.84.84 - - [10/Nov/2015:00:46:52 -0700] "GET /archivedblogs/02-14/myblog3714.pdf
HTTP/1.1" 200 210977 "http://lawrencechin2011.com/archivedblogs/02-14/" "Mozilla/5.0
(iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko)
CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4"
The blog posts not only include a post about SDW, but also some posts about how AAM was
helping KRN to go after the suspect in January 2014. Evidently, although the identification of
SDW on the suspect’s website is no longer on the table, SDW is still going to try her chance with
the DA. To compensate the lack of identification, she wants AAM to bring in this blog series as
additional evidence to support her claim that she is terribly afraid because the suspect is obsessed
with her (in March 2014, that is). Then, AAM would also be instructed to add his own complaint
in the same vein about the suspect: “He’s delusional. He believed I was helping this unknown
woman named ‘Kiersten’ to go after him. I’m terrified of him. And he blogged about his
paranoid delusions to embarrass me. Please remove him and his website and don’t ever let him
out.” He would of course prefer to find his name on the suspect’s new blog instead of having to
dig into the archive of old materials from almost two years ago.
Then, on 12:52 AM, the suspect adds the entries for 7 and 8 November to the latest blog post.
However, it seems that, within an hour, the Secret Society women have discovered the latest
entries. For, on 2:01 AM, they seem to have sent in another scout to check the suspect’s website
again: Telefonica de Peru, proxy:
200.48.4.153 - - [10/Nov/2015:03:01:45 -0700] "GET /blogs/ HTTP/1.1" 301 375
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101
Firefox/32.0"
200.48.4.153 - - [10/Nov/2015:03:01:48 -0700] "GET /blogs/ HTTP/1.1" 200 37884
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101
Firefox/32.0"
The Secret Society women must be even more disappointed. The suspect even knows about their
plan to request the denial of bail on ground of his grave insanity.
10 November (Tuesday)
18
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
The Secret Society women are probably nervous about the insufficiency of their evidences in
support of their case. So early in the morning – a sign that they didn’t sleep much being too
preoccupied with their “life goal” to exterminate the suspect – on 6:50 AM, they send in another
scout to check if the single most important document concerning SDW has indeed been
removed: 66.97.29.2, Belleville, Ontario.
66.97.29.2 - - [10/Nov/2015:07:50:38 -0700] "GET /timelinepartIII-s/timelinepartIII-s.pdf
HTTP/1.1" 404 1360 "https://www.google.ca/" "Mozilla/5.0 (Windows NT 6.1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
It is indeed removed: bad news. Then, on 8:16 AM, SDW directs another scout to the suspect’s
website: 68.37.6.53, Comcast, Ann Arbor, Michigan.
68.37.6.53 - - [10/Nov/2015:09:16:17 -0700] "GET /blogs/wpcontent/uploads/2014/07/faassen3.png HTTP/1.1" 404 1360
"http://www.bing.com/images/search?
q=maria+faassen+putin&view=detailv2&&id=07DA88F85410FE2AD4C921E992DB20072906
2259&selectedIndex=148&ccid=azthEKIt&simid=608054506749627628&thid=OIP.M6b3b611
0a22d2d9aa6a4ede4f2da7168o0&mode=overlay" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_9_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/537.86.2"
SDW is hoping that it’s still possible to find EKT’s pictures on the suspect’s website. Why? She
could be looking for ways to strengthen the argument that the suspect must be denied bail due to
his severe obsession with everything connected with governments, not only writing insane letters
to government agencies but also constantly obsessing over the daughters of political figures. But
she could also be thinking about summoning EKT to participate in the complaint. In fact, she
could be doing this under Homeland Security's instruction (to confirm their false profile of the
suspect). Unfortunately, there are no pictures. As SDW ponders on the problem of the weakness
of the Secret Society’s case – specifically the lack of her identification on the suspect’s website –
she sends in another scout to verify that the document which the suspect has supposedly linked
from his comments on her blog is still there. Thus, on 9:25 AM, 95.134.16.184, JSC Ukrtelecom,
Ukraine.
95.134.16.184 - - [10/Nov/2015:10:25:06 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/suppl_pld-------/suppl_pld-------.pdf" "Mozilla/5.0
(Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.80 Safari/537.36"
95.134.16.184 - - [10/Nov/2015:10:25:05 -0700] "GET
/suppl_pld_4_60bg/suppl_pld_4_60bg.pdf HTTP/1.1" 200 951826
"https://www.google.com.ua/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
19
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
At least this document isn’t removed. After some discussion, the Secret Society women decide
that the best way to compensate the current insufficiency of evidence (lack of identification of
both ANG and SDW on the alleged suspect’s website) is to gather more evidences in support of
their claim that the suspect must be put away without bail because he couldn’t be dissuaded from
his severe paranoid delusion and would act on it, such as writing crazy letters to government
agencies. On 10:49 AM, the Secret Society send in this scout: 120.56.135.176, Google IN,
vol1appendix.pdf, Delhi.
120.56.135.176 - - [10/Nov/2015:11:49:50 -0700] "GET /vol1appendix/vol1appendixg.pdf
HTTP/1.1" 200 159538 "https://www.google.co.in/" "Mozilla/5.0 (Windows NT 5.1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
This document should provide the DA with a little more details about the severity of the
suspect’s schizophrenic delusions: all that CIA, MSS, ICJ business; imagining himself to be at
one time mistaken for a terrorist suspect, etc.
Two hours later, the Secret Society sends in another scout to fish for more materials along this
line. On 1:18 PM, 108.247.125.33, Campbell, CA.
108.247.125.33 - - [10/Nov/2015:14:18:15 -0700] "GET /blogs/tag/cia/ HTTP/1.1" 404 1360
"https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
They want more evidences about the suspect’s rambling about the CIA. Unfortunately, what they
are looking for isn’t there. Then, on 1:55 PM, 131.107.192.99, Microsoft Corporation.
131.107.192.99 - - [10/Nov/2015:14:55:52 -0700] "GET
/karins_meetup_8bg2/kurtsblog0408.pdf HTTP/1.1" 200 55313 "https://www.google.com/"
"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/42.0.2311.135 Safari/537.36 Edge/12.10240"
Here is indication that the Secret Society women have a recruit within Microsoft. This is a blog
post from 7 years ago where the suspect expressed his fondness for the German Lady. It should
serve as support for the Secret Society women’s claim: “This guy has the habit of obsessing over
women and then, because of his paranoia schizophrenia, imagining them to be involved in a
government conspiracy against him. He has done that not only with ANG, but also with the
German Lady and SDW.” This blog post should serve as a companion to the one about SDW
which AAM has downloaded last night.
There are no activities from the Secret Society between 2 PM and 6 PM. It’s not clear whether
they have gone to the DA today. Probably not, for their appointment seems to be for Friday.
By 6 PM, the Secret Society women either are worried that the document may be gone as well on
which this “Pyramid” is mentioned in what they would claim to be the suspect’s bizarre delusion
20
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
about ANG (how a whole nation goes down because of her), or have to pretend to find it again in
order to re-stage the show “how ANG, the German Lady, SDW, and AAM could have come to
know each other”. Thus, on 6:25 PM, they send this scout to download the same document again:
95.88.233.232, Neunkirchen, Saarland, Germany.
95.88.233.232 - - [10/Nov/2015:19:25:07 -0700] "GET /cheneyplan25/cheneyplan25.pdf
HTTP/1.1" 200 592393 "http://www.google.de/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=19&ved=0CFwQFjAIOApqFQoTCNuroLSoh8kCFc
SADwoddFgKbg&url=http%3A%2F%2Fwww.lawrencechin2011.com
%2Fcheneyplan25%2Fcheneyplan25.pdf&usg=AFQjCNF-OnNpEEHj9nii0YiNXVebJkPDPg"
"Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko"
Thank God the suspect has never removed this chapter. Then the Secret Society women want
more evidences to support their claim that the suspect’s mind is beyond repair, with all his
schizophrenic delusion about the CIA, the MSS, and the International Court of Justice. Thus, on
6:54 PM, another scout: 136.0.16.207, EGI Hosting, San Francisco.
136.0.16.207 - - [10/Nov/2015:19:54:41 -0700] "GET /vol2appendix/vol2appendixd.pdf
HTTP/1.1" 200 158709 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.2; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.85 Safari/537.36"
No more collection of evidences tonight until after midnight. What follows must be further
discussion.
Then, on 1:32 AM, the Secret Society send in another scout to check the other document which
the suspect has once linked from his comments on SDW’s blog: myvzw.com, Verizon Wireless,
Kansas City, Missouri. Is this PD’s friend in Kansas City seen for the first time on 6 May?
70.195.12.253 - - [11/Nov/2015:02:32:39 -0700] "GET /suppl_pld_9_139/suppl_pld_9_139b.pdf
HTTP/1.1" 200 5127870 "http://------gangstalking.com/-----/" "Mozilla/5.0 (iPhone; CPU iPhone
OS 7_1_1 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0
Mobile/11D201 Safari/9537.53"
The Secret Society women are, again, trying to compensate the lack of identification of SDW on
the suspect’s website by collecting more circumstantial evidences indicating who this “SDW”
most likely is. What’s very important to note is the fact that, on this document, “Pyramid” is used
to refer to a woman with a slightly different name than ANG.
Today is a very important day for the alleged suspect in another connection. Past midnight,
before going to bed, he finally uploads his “Why we support Marine LP” to his website.
Knowing that he is in grave danger, he must finish it as fast as possible. Coincidentally, he
introduces his essay with the warning, “Endorsement from the Most Detestable might very well
be the kiss of death.” Then, after he wakes up, it would be a busy afternoon for him as well.
11 November (Wednesday)
21
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Since very early on this morning, the Secret Society women begin collecting more evidences to
strengthen their case. Again, evidences in support of their claim that the suspect must be denied
bail because he would act on his delusions and cannot be dissuaded therefrom. Thus, on 6:03
AM, 178.62.249.115, Digital Ocean, proxy, Amsterdam.
178.62.249.115 - - [11/Nov/2015:07:03:54 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/petition/c0901379jl/CMC_c091379jl.pdf" "Mozilla/5.0
(Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Dragon/45.6.11.383
Chrome/45.0.2454.93 Safari/537.36"
178.62.249.115 - - [11/Nov/2015:07:03:53 -0700] "GET
/petition/c0901379jl/CMC_c091379jl.pdf HTTP/1.1" 200 2426010 "https://www.google.nl/"
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Dragon/45.6.11.383 Chrome/45.0.2454.93 Safari/537.36"
This is judge’s order for case management conference in the suspect’s lawsuit against Mr Frakov
in 2009. More evidence to bring to the DA: the suspect has not only written letters to NK
ambassador to the UN and the UN High Commissioner for Refugees, but has also filed a lawsuit
against a foreign government official. This document would serve as a companion to the crazy
lawsuit which the suspect has filed against ANG in 2010.
Then, on 8:15 AM, the Secret Society women want to check again that the document on which
“Pyramid” is mentioned has not been removed – since this would be the “entry point” (along
with the false claim about “stalking”) of their case for the addition of a stalking charge:
105.158.65.214, Maroc Telecom, Meknes, Morocco.
105.158.65.214 - - [11/Nov/2015:09:15:54 -0700] "GET /cheneyplan25/cheneyplan25.pdf
HTTP/1.1" 200 17057 "http://www.google.fr/url?sa=t&source=web&cd=49&rct=j&q=zwack
%20einige%20originalschriften%20en
%20pdf&ved=0CDAQFjAIOChqFQoTCKTOrIfiiMkCFQMDGgodq-UKhQ&url=http%3A%2F
%2Fwww.lawrencechin2011.com%2Fcheneyplan25%2Fcheneyplan25.pdf&usg=AFQjCNFOnNpEEHj9nii0YiNXVebJkPDPg" "Mozilla/5.0 (Linux; U; Android 4.2.2; fr-fr; GT-S7580
Build/JDQ39) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30"
He comes again on 8:29 AM,
105.158.65.214 - - [11/Nov/2015:09:29:21 -0700] "GET /cheneyplan25/cheneyplan25.pdf
HTTP/1.1" 200 17057 "http://www.google.fr/url?sa=t&source=web&cd=87&rct=j&q=einige
%20originalschriften%20en
%20pdf&ved=0CCgQFjAGOFBqFQoTCJuCmJLliMkCFUS2GgodFcMCwQ&url=http%3A
%2F%2Fwww.lawrencechin2011.com
%2Fcheneyplan25%2Fcheneyplan25.pdf&usg=AFQjCNF-OnNpEEHj9nii0YiNXVebJkPDPg"
22
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
"Mozilla/5.0 (Linux; U; Android 4.2.2; fr-fr; GT-S7580 Build/JDQ39) AppleWebKit/534.30
(KHTML, like Gecko) Version/4.0 Mobile Safari/534.30"
Luckily for the Secret Society women, the suspect has refused to remove this chapter, despite his
knowledge about its importance to the Secret Society women’s case.
The Secret Society women wouldn’t send any more scouts to the suspect’s website throughout
the rest of the day until midnight. Did they go to the DA? Probably not. Again, it seems that their
appointment with the DA is for Friday. They might just be waiting, having collected all the
evidences, and discussed things occasionally, nervous about Friday. Note that the German Lady
is so involved in this business that she has even canceled the meetup (Any Language and
Culture) she has originally scheduled for tonight.
It's difficult to avoid the impression that the Secret Society women might be busy answering
questions from the French all day. For this, we need to examine the suspect. By early afternoon,
the suspect has arrived in Casbah. For the whole afternoon he is wondering what TMU detectives
might think about Marion, etc., and has difficulty concentrating on writing the summary which
he has been preparing of the Secret Society's operations against him. (This is “Being gangstalked by a group of women...”) Then, when he sits outside Casbah, this “Emily”, a PhD student
studying Chinese at UCLA, comes to sit with him. The suspect has seen this before: this “Emily”
is clearly a CIA operative. She skillfully leads the suspect to confess his admiration for the
Chinese president Xi. Meanwhile, another operative is standing in front of them taking pictures
of them both. Evidently, the TMU/ CIA is debating with the French in the ICJ about Homeland
Security's false profile of the suspect. Even when the suspect has put up his “Marine essay” on
his website, the TMU/ CIA team is still preventing the French from reading it. The French find it
bizarre, because the suspect has noted in regard to the essay, “Endorsement from the Most
Detestable...”, which sounds like a threat. The Agency is thus compelled to test the suspect this
afternoon. From his confession emerges clearly the fact that the suspect has nothing but
admiration for everyone on Russia's side – which thus includes “Marine” – and that Homeland
Security's, and the Secret Society women's, claim that the suspect poses danger to her is all but
nonsense. The CIA would point out to the ICJ judges that the suspect's admiration for “Marine”
is motivated by geopolitical considerations and has nothing to do with heterosexual obsession.
The Secret Society women's claim that the suspect would get obsessed with women out of sexual
perversion and then stalk them and hurt them not only is false, but doesn't even apply here. When
the suspect goes back inside, he begins looking for online forums for FN discussions. A group of
Swiss Germans then comes in – they seem to be testing the suspect again. (More CIA op, that is.)
Then, the suspect notices this strange visit to his website:
5:41 PM, 50.54.72.219, Frontier Communications, Marion, Ohio.
50.54.72.219 - - [11/Nov/2015:18:41:17 -0700] "GET /1/epilogue225.html HTTP/1.1" 200
83648 "https://www.bing.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
23
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
50.54.72.219 - - [11/Nov/2015:18:41:23 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-"
"Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
This looks so much like a signal from the “Macrospherians”: that they plan to have “Marion”
(namely, the rising star of FN and the niece of “Marine”) implement his program for “New
Feminism”. In fact, this is a trick which the CIA has directed the TMU to play on the suspect.
Then, half intentionally and half accidentally, the suspect watches Marina’s “Run” on Youtube
(where she is riding the bus in front of Kremlin). The CIA has obtained the evidence they have
desired. They would argue in the ICJ that the suspect has mistaken their “fake message” for a
real message from the Russians, evidenced by the fact that he has attempted to return a
“message” (going to Kremlin). Thus, evidence to support their claim that the suspect is
attempting to use his status as a “terrorist cyberstalker of women” as a cover under which to
share information with “Marine”. It's “conspiracy”. It's noteworthy that, 7 PM, when the suspect
goes to Draw Anything LA meetup, he would meet “Christine”, another PhD student in English
at UCLA.
Then, after midnight, after so much nervousness and worrying that they might not succeed in
persuading the DA on Friday, the Secret Society women send out a scout – somebody in Los
Angeles, close to the suspect and everybody – to check once again the links on the PP Forum,
hoping that, just per chance, a link might still be active allowing for the identification of SDW.
Thus, on 12:09 AM, 70.211.147.84, Verizon Wireless, Los Angeles.
70.211.147.84 - - [12/Nov/2015:01:09:39 -0700] "GET /blogs/2014/--/--/last-word-on-my-pasttwo-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1360
"http://forum.------------.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 4.4.4;
XT1080 Build/SU6-7.3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.76
Mobile Safari/537.36"
No. The blog post is gone forever. The absence of evidences for direct identification of SDW
must have gnawed at the Secret Society women, so that, on 2:11 AM, SDW, out of desperation,
decides to collect the other document which narrates her first stalking claim against the suspect
back in April 2014: prtc.net, San Juan, Puerto Rico.
72.50.46.73 - - [12/Nov/2015:03:11:27 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/timelinepartII-o/timelinepartII-o.pdf" "Mozilla/5.0
(Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.71 Safari/537.36"
72.50.46.73 - - [12/Nov/2015:03:11:27 -0700] "GET /timelinepartII-o/timelinepartII-o.pdf
HTTP/1.1" 200 2165418 "https://www.google.com.pr/" "Mozilla/5.0 (Windows NT 10.0;
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36"
It’s not clear to her and ANG and the German Lady whether this document would help at all,
since not a single name is mentioned on it. Within 10 minutes, they ask another scout of theirs –
24
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
somebody in China – to check if the bad blog posts could perhaps be seen in China (perhaps it’s
still cached in Baidu). Thus, on 2:22 AM, Nanchang:
182.106.212.139 - - [12/Nov/2015:03:32:41 -0700] "GET /blogs/2015/03/ HTTP/1.1" 404 1360
"http://www.baidu.com/link?
url=wf0GPK2hODvWZyv0ERexWzDejnrWSqp4p8LUdkV2KeUX7_jaLknUQ5RDJ23TMd8fu
080os4HZPqFKw6Zo8Vcpq&wd=&eqid=feca00420002c9db0000000356446abc" "Mozilla/5.0
(Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89
Safari/537.1"
182.106.212.139 - - [12/Nov/2015:03:32:44 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-"
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko)
Chrome/21.0.1180.89 Safari/537.1"
No. Gone forever.
12 November (Thursday)
The only significant thing which the Secret Society women have done today is to send a scout to
check once again to make sure that the suspect hasn’t removed the one single document on
which “Pyramid” is mentioned. Without this document, there would be no claim about the
suspect’s website at all. (AAM’s claim was rather weak.) Thus, on 10:53 AM, 178.220.103.208,
dynamic.isp.telekom.rs, Nis, Serbia.
178.220.103.208 - - [12/Nov/2015:11:53:26 -0700] "GET /cheneyplan25/cheneyplan25.pdf
HTTP/1.1" 200 592393 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; rv:42.0)
Gecko/20100101 Firefox/42.0"
This scout is probably using a proxy. Thanks God, the document is still there. Tomorrow is DDay.
We should examine the suspect as well. He wakes up 10:30 AM. On bus toward SM to drop off a
Thank You card at Goodwill. He notices that he has come under heavy surveillance. After dropoff, SM library, checked log, from 3 to 3:40 PM. Then, on bus coming back to Chrysalis.
Couldn’t make it on time. He goes to Casbah instead. Severe headache all night. Then, a boy and
a girl falsely accuses the suspect of recording them with his computer. What? The suspect has
also begun requesting entry to Partisans Marine online forum and Facebook. He then notices
more surveillance on bus 4 while going back to downtown.
Clearly, what has happened is that CIA's test yesterday has done wonder. Homeland Security
vehemently rejects the claim that their cartoonish portrayal of the suspect as a sexually perverted
cyberstalker is incorrect and is afraid that the Agency might bring to the ICJ suspect's recordings
of his conversations (taken from his website) as evidences. (The recordings might prove that the
suspect is an intellectual motivated by rational concerns rather than by sexual perversions.) They
thus send two operatives to pretend to be strangers and to falsely accuse the suspect while he is
under surveillance. They will then bring the surveillance to ICJ as evidence and argue that these
25
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
two strangers' expressions indicate that the suspect is a “criminal recorder” so that his recordings
should be banned from court as evidences. Meanwhile, these Homeland Security thugs would
adhere to the Agency's claim that the suspect desires to “conspire” with the Russian/ French
team, and they express this by putting him under heavy surveillance in case he might “link up
with Russian secret agents”, etc.
It should be noted that, tonight, the so-called “Korean scout” has appeared for the first time.
12:48 AM,
221.145.183.167 - - [13/Nov/2015:01:48:12 -0700] "GET / HTTP/1.1" 200 25666
"http://www.bloggang.com/event/membernew.html" "Mozilla/5.0 (compatible; MSIE 9.0;
Windows NT 6.1)"
221.145.183.167 - - [13/Nov/2015:01:48:13 -0700] "GET / HTTP/1.1" 200 10636
"https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)"
221.145.183.167 - - [13/Nov/2015:01:48:14 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360
"https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)"
13 November (Friday, meeting with the DA)
It seems that the Secret Society women are so nervous about their meeting with the DA today
that they are up all night. Around 4:14 AM, feeling that their case about the suspect’s insanity
still needs to be strengthened, they send another scout to collect more evidence: 90.171.47.221,
Orange Espana, Barcelona, Spain.
90.171.47.221 - - [13/Nov/2015:05:14:38 -0700] "GET /karinaftrwrd11/karinaftrwrd11.pdf
HTTP/1.1" 200 421045 "http://www.google.es/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEsQFjAHahUKEwifyLK7pI3JAhXCtBQ
KHU6GDpQ&url=http%3A%2F%2Fwww.lawrencechin2011.com
%2Fkarinaftrwrd11%2Fkarinaftrwrd11.pdf&usg=AFQjCNGus7IMibWIDay_Jp0LIFwfby5Yhg
&sig2=81iOhX1vlp_tsNqomCtNzg" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0;
rv:11.0) like Gecko"
This is further illustration of the suspect’s bizarre schizophrenic delusion about some
International Court trial which involves the CIA, MSS, and all those women he is obsessed with.
The women’s appointment with the DA is probably around 11 AM. Again, since it’s very likely
that ANG has decided to lie about the sting operation which the TMU has instructed her to run
on the suspect on 2 November, she would thus begin:
“He stalks me…” There is no evidence for that, since the sting operation has failed. However,
ANG hopes to persuade the DA with her heart-wrenching story: “He stalks me because he’s
obsessed with me. And, when he gets obsessed with a woman, he would develop, out of his
paranoia schizophrenia, this delusion about her being part of some government conspiracy
against him in some International Court trial. Look, he once even files this bizarre lawsuit
26
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
against me. He would then write about this ‘conspiracy’ and put it on his website to slander me
and embarrass me.” She would then produce the document “The Cheney Plan”. But there is no
evidence that the “Pyramid” on it refers to her. ANG would then produce all her colleagues from
the law library, such as Ana, who would testify that the suspect used to call ANG “pyramid”.
(ANG of course would have to carefully advise the DA not to look at the suspect’s blog, where
he confesses just lately that “Pyramid” does not refer to her.) ANG would then continue to claim
how terrified she is of the alleged suspect because he, when he notices strange visits that might
or might not have come from her and her friends, would develop, due to his paranoid
schizophrenia and persecution mania, this second delusional belief that ANG has formed a Secret
Society with some other women to make false reports about him to law enforcement. She wants
the DA to not only add a stalking charge, but also put the suspect away without bail and send him
to mental hospital. He is just too much a danger to her, with his habit of stalking her, obsessing
over her, and believing her to be part of some government conspiracy against him.
ANG then describes how she has found the other women who are also described in the suspect’s
voluminous writings on the government conspiracy against him, and presents the German Lady,
KRN, and SDW to the DA. They all describe the same thing: how the suspect becomes obsessed
with them, then stalks them (in the case of SDW, cyberstalks her and her family members), then
believes that they are part of some government conspiracy against him (part of some CIA and
Homeland Security operations with the involvement of the Russian and Chinese intelligence
services, etc.), then writes about it online to slander and embarrass them, and now believes that
they have formed a secret organization to make false reports about him to law enforcement. The
German Lady would produce her 2008 restraining order against the suspect to prove that the he
is so delusional that he believes she and her meetup friends were under government direction to
file false reports about him to law enforcement. They all ask for the same thing: on the next court
day, to lock up the suspect and never let him out on bail but send him deep into the state mental
hospital, and then remove his website.
AAM would then add that he also feels threatened by the suspect, since he has developed this
weird delusional belief that he is helping this woman named “Kiersten” (KRN) to go after him.
The women produce their evidences: several chapters describing a bizarre CIA, MSS, SVR, and
ICJ business; several blog posts about obsessions with the German Lady and SDW; and several
documents narrating these women and AAM and many others forming a secret gang to go after
him (visiting his website and making false reports about him.) They then also produce the letters
which the suspect has once written to NK ambassador to the UN, the lawsuit he has filed against
Mr Frakov, and the letter he has written to the UN High Commissioner on Refugees. They add:
“He wrote all these crazy letters and filed this crazy lawsuit, like the ones he filed against us,
because he so believes in his schizophrenic delusions that he can’t possibly be dissuaded
therefrom. And he would act on it.” Then ANG would lie: “I believe he is currently stalking me
because he is acting out his delusional belief about me. Please, I am in danger. Please tell the
judge and put him behind bars without the possibility of getting out.”
27
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Given such persuasive argument, however, it seems that the DA feels that evidences are
insufficient. Desperate, the German Lady directs the DA to look at the suspect’s website for
himself. The German Lady, the only person among the Secret Society women who has studied
the suspect’s writings and recordings from HK Hacker’s cache, knows exactly where to direct the
DA: to the webpage hosting the lawsuit the suspect has once filed against Mr Frakov. Thus, from
11:27 AM until 11:35 AM or so, visits to the suspect’s website from the DA office:
159.83.252.230, City of Los Angeles, Internal Service Division.
159.83.252.230 - - [13/Nov/2015:12:27:14 -0700] "GET / HTTP/1.1" 200 10636 "-"
"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)"
159.83.252.230 - - [13/Nov/2015:12:27:15 -0700] "GET / HTTP/1.1" 200 10636 "-"
"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)"
159.83.252.230 - - [13/Nov/2015:12:27:16 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1;
Trident/6.0)"
159.83.252.230 - - [13/Nov/2015:12:28:14 -0700] "GET /lawsuit.html HTTP/1.1" 200 9781
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1;
Trident/6.0)"
159.83.252.230 - - [13/Nov/2015:12:29:18 -0700] "GET
/petition/attachment15/jennifer_yoh_06_31_PM_Saturday_23_August_2008.mp3 HTTP/1.1"
200 1109624 "http://www.lawrencechin2011.com/lawsuit.html" "Mozilla/5.0 (compatible; MSIE
10.0; Windows NT 6.1; Trident/6.0)"
159.83.252.230 - - [13/Nov/2015:12:31:02 -0700] "GET
/petition/attachment15/jennifer_yoh_06_33_PM_Saturday_23_August_2008.mp3 HTTP/1.1"
200 759415 "http://www.lawrencechin2011.com/lawsuit.html" "Mozilla/5.0 (compatible; MSIE
10.0; Windows NT 6.1; Trident/6.0)"
159.83.252.230 - - [13/Nov/2015:12:28:41 -0700] "GET
/petition/attachment9/at_mex_restau_olive_venice_(computer)_12_03_08_ca_1254PM.WMA
HTTP/1.1" 200 9989442 "http://www.lawrencechin2011.com/lawsuit.html" "Mozilla/5.0
(compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)"
159.83.252.230 - - [13/Nov/2015:12:31:11 -0700] "GET
/petition/attachment16/with_wes_2008_09_04.mp3 HTTP/1.1" 200 6002936
"http://www.lawrencechin2011.com/lawsuit.html" "Mozilla/5.0 (compatible; MSIE 10.0;
Windows NT 6.1; Trident/6.0)"
159.83.252.230 - - [13/Nov/2015:12:34:30 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1;
Trident/6.0)"
159.83.252.230 - - [13/Nov/2015:12:34:41 -0700] "GET /newsummaryweb.html HTTP/1.1" 200
68269 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT
6.1; Trident/6.0)"
There are simply nothing incriminating at all in the first three recordings. But, in the last
recording, the DA could hear that even the suspect’s best friend was accusing him of falsely
28
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
suspecting him of making false reports to law enforcement. Note that, after listening for the
recording for three minutes, the DA then returns to the front page to look at “The story
behind…”. The women also want to remind him of the suspect’s bizarre schizophrenic delusion
about his implantation of brain chips. The fact that the women have not visited this webpage and
listened to the recordings here in the past week – have not rehearsed the discovery of this section
– is indication that the German Lady has come up with this on the spur of the moment, because
the DA is not inclined to accept the three women’s claims. The situation is very bad for the
suspect, of course, because the DA is not familiar with the circumstances under which the
conversations took place. The German Lady has purposely selected fragments from the suspect’s
website and taken them out of context so that they could become completely unintelligible and
look like evidences for the suspect’s grave insanity. While there was no false reporting back in
2008, there was false reporting in 2013 and 2014. The German Lady have understood well that
people can only understand black-and-white pictures: that they would assume that, if somebody
was wrong at one time, he must be wrong all the time. In reality, right now, the three women are
making false reports to the DA. It’s not clear, however, whether the DA has accepted the
argument. Within 30 minutes, the three women would instruct another scout to check out the
suspect’s website: 12:17 PM, 143.207.49.203, techb.andrews.edu, Andrews University, Berrien
Springs, Michigan.
143.207.49.203 - - [13/Nov/2015:13:17:15 -0700] "GET /petition/E/ HTTP/1.1" 200 2949
"https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
143.207.49.203 - - [13/Nov/2015:13:17:15 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/petition/E/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
143.207.49.203 - - [13/Nov/2015:13:18:05 -0700] "GET /petition/ HTTP/1.1" 200 852
"http://www.lawrencechin2011.com/petition/E/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
143.207.49.203 - - [13/Nov/2015:13:18:09 -0700] "GET /petition/attachment13/ HTTP/1.1" 200
517 "http://www.lawrencechin2011.com/petition/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
143.207.49.203 - - [13/Nov/2015:13:18:11 -0700] "GET /petition/attachment13/310-8235760.jpg HTTP/1.1" 200 123611 "http://www.lawrencechin2011.com/petition/attachment13/"
"Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.86 Safari/537.36"
143.207.49.203 - - [13/Nov/2015:13:18:18 -0700] "GET /petition/attachment24/ HTTP/1.1" 200
533 "http://www.lawrencechin2011.com/petition/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
143.207.49.203 - - [13/Nov/2015:13:18:24 -0700] "GET /petition/S/ HTTP/1.1" 200 506
"http://www.lawrencechin2011.com/petition/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
143.207.49.203 - - [13/Nov/2015:13:18:30 -0700] "GET /petition/attachment44/ HTTP/1.1" 200
482 "http://www.lawrencechin2011.com/petition/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
29
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
143.207.49.203 - - [13/Nov/2015:13:17:33 -0700] "GET
/petition/E/lawrence_drawing_karin_and_gabi_part_3.wmv HTTP/1.1" 200 200670106
"http://www.lawrencechin2011.com/petition/E/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
It’s the video showing the suspect drawing the German Lady. What’s so harmful about that? The
women are probably telling the DA that he shouldn’t look at the suspect’s website himself, since
the suspect would then notice it, and concoct, out of his schizophrenic delusion, some weird
scenario as to why these women and their friends are looking at his website. Thus, the women
persuad the DA to allow them to call in this scout to visit the website for him and tell him what
else is on the suspect’s grotesque website. This scout from Andrews University is probably lying,
making up horror stories about what she has seen. Since she is a university student, the four
women have probably thought her to be a credible witness to the DA.
While the Secret Society women are busy with the DA, the suspect has been permitted entry to
Partisans, and is posting his first comment to introduce himself:
Un admirateur de Marine à étranger se présente :
Salut tous les frontistes!
Je me suis inscrit hier, tout nouveau, et donc, je me vous présente.
Je n’habite pas en France, mais en Californie. Je suis ici parce que, depuis je
commence à étudier les pensées et la politique de Marine il y a quelques mois, et
surtout depuis j’ai lu le nouveau livre de Marine, Pour que vive la France, le mois
dernier, elle m’a complètement inspiré.
J’ai une fois étudié en Belgique et en Québec, et donc Je parle français.
Pourquoi toute cette admiration. Moi, ici, aux États-Unis, je pense, depuis long
temps, à recréer un mouvement de gauche combattant la mondialisation. Il était
surprenant de trouver les convergences idéologiques avec quelqu’une qu’on
considère ‘l’extrême droite’. Effectivement, je suis, à ce moment, en train d’étudier
tous les mouvements d’extrême droite en Europe, pour comprendre la lutte
européenne contre la mondialisation et le projet de l’Union Européenne.
Inutile d’expliquer toutes les raisons qui m’apportent ici. J’ai écrit un petit essai pour
expliquer les convergences idéologiques entre les réformations que je souhaite un
jour faire réaliser dans tous les mouvements de gauches partout dans le monde, et les
programmes que Marine a adoptés pour le mouvement de droite de FN :
http://www.xxxxxxxxxxxx2011.com/lepen3/lepen3l.pdf. (Désolé : cette pièce, écrit
en anglais dans la plus part, semble parfois fonctionner comme une lettre ouverte à
Marine, avec les suggestions qu’on souhaite faire adopter un jour par le FN.)
30
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Je suis, donc, pour me présenter à vous les frontistes, un étudiant étranger parmi
vous, qui souhaite apprendre de l’étoile montant en la politique française. On admire
Marine surtout parce qu’on souffre beaucoup ici, en Californie, de la ‘politiquement
correct’.
On admire Marine de l’étranger aussi parce qu’on est convaincu que Marine, si élue
le Présidente en 2017, va complètement changer le monde, à cause de la position
spécifique et importante de la France. Marine va sauver le monde, on ose le dire. On
n’en est convaincu. Marine ne donc concerne pas seulement la France, mais le
monde entière.
Je suis ici pour connaître les discours, les discussions, les pensées, et les luttes des
frontistes en France.
J’espère être bienvenu parmi vous, même si je ne peux pas voter dans les prochaines
élections pour Marine.
The Third ICJ Trial
In full swing, after the Paris attacks
13 November (Friday, continued)
It appears that the DA didn’t grant ANG her request to add a stalking charge. The reasons seem
to be: (1) there is no evidence that “stalking” has occurred; (2) the evidences about the suspect’s
bizarre paranoia and schizophrenic delusion are too old (the women have to prove that the
suspect is still currently engrossed in the same schizophrenic delusion); and (3) evidences are
insufficient for demonstrating that “SDW” and “Pyramid” refer to ANG and her “new friend”.
It appears that, by now, the story about the Secret Society women is becoming one of “false flag
online harassment”. Year after year, as the suspect’s stories about the German Lady and the
“Pyramid” (and SDW and KRN as well) stand on his website, nobody every pays attention to
them, let alone wanting to identify who these “Pyramid”, “SDW”, and “KRN” are. Nobody
really visits the suspect’s website except for the Secret Society women themselves. This fact has
severely obstructed the women’s attempt to add a new stalking charge to PD’s case. Solution:
simply instruct their friends and online friends to pretend to be strangers surfing onto the
suspect’s website, getting freaked out by his bizarre delusions about his women victims,
identifying who they are, and contacting them to express concern about their safety. The Secret
Society women will stage their own victimization if none has occurred.
What the suspect has not yet known is that, while the women are meeting with the DA – and
while he is making his introduction at Partisans – massive terrorist attacks are in progress in
Paris. Because of the seriousness of the matter, the French and the Russians now demand access
to the suspect’s Marine essay and his Russian soft-power document and everything else: the
French have every right to look into every lead at a time like this. But everybody on the US side
still refuses. The debate between the US parties on one side and the French and the Russians on
31
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
the other thus intensifies after the Paris attacks. The US' argument remains: EKT is using this
opportunity to read the suspect’s writings, and the suspect is using this opportunity to share his
“Marine document” with Marine. Conspiracy, violation of the spirit of the law. The debate
intensifies whether the suspect has conspired with EKT and FN. The man leading the French
team will most likely be Nicolas Bay, the Secretary General of FN.
Now, note this visit. On 8:28 PM, 124.178.169.125, wel.bigpond.net.au, Thornlie, Australia.
124.178.169.125 - - [13/Nov/2015:21:28:34 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200
60041 "http://r.duckduckgo.com/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36
Edge/12.10240"
Did this have anything to do with the current debate at ICJ? Highly likely. It might be that, 8
hours after the Paris attacks, the Americans still haven't turned over those writings of the suspect
which they are hiding. The French, now sure that, given the circumstances, they would not
violate international agreement by obtaining the suspect's writings, have asked the Secret Society
women to instruct one of their associates in Australia to obtain the document for them. (Thornlie
is very near Perth; this might be the same person from Perth seen on 26 May 2014, 6:08 AM. At
the very least related to the group of people from Perth seen in late May and early June, 2014.)
The suspect of course knows right away that this is the work of the Secret Society women: the
document was uploaded less than three days ago, and couldn’t even yet be found through Google
searches. He assumes that the Secret Society wants this document because they believe that a
single statement in the document about the ICJ (that FN will come to power thanks to an ICJ
judgment, given his arrest) could serve as proof that the suspect’s schizophrenic delusion about
the “government conspiracy against him” is an ongoing affair and has never subsided.
10:52 PM, the suspect posts the “latest warning, Part II” on his blog. This includes all his
reconstruction of the Secret Society women's operations up to their meeting with the DA today.
14 November (Saturday)
The Secret Society women didn’t send anybody to the suspect’s website today. It seems – this is
really vague information here – that they have contacted the suspect’s best friend W again in
order to recruit him to give false testimony about the current state of mental insanity of the
suspect. This is seemly because the DA has just heard the recording, from 2008, of the
conversation between the suspect and his best friend yesterday. The contact might have occurred
yesterday night or earlier today. This is why, on 3:06 PM, when the suspect calls up his best
friend, the latter actually answers the phone. He hasn’t spoken to his best friend ever since his
release from jail. The latter has never responded to any of his calls for two months – most likely,
again, due to blackmailing by the Secret Society women. It appears that his best friend is
instructed by the Secret Society women to answer his calls and to confirm that he is still
currently engrossed in the same schizophrenic delusion about nation-states, intelligence agencies,
and the ICJ trial. And of course his best friend did obtain evidences to this effect.
32
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
However, W is now answering the suspect's calls probably also because the CIA, the TMU, and
Homeland Security all want him to. The CIA/ TMU, Homeland Security, the French, and the
Russians are having a hot debate about the suspect in the ICJ right now. What the suspect has
said will be evidences in the debate. And so, let's review what the suspect has said (from
2:01:00): (1) W has refused to talk to avoid being recorded and posted. W is terribly confused. Or
pretends to be confused. W is clearly carrying out an operation for Homeland Security. The
suspect insists that the recording of the conversation is not going on his website. W is suggesting
that everybody is confused because everybody is drunk, while the suspect is regarded as insane
and is frustrated because he is the only person not drunk. This is a perfect example to illustrate
America as the “Opposite Land”. (2) About the women's meeting with the DA yesterday. (3)
Why the Social Security Administration continued to deposit money in the suspect's bank
account. (4) Bias in the justice system: everyone automatically assumes the guy is the bad one
and the victimizer and the girl the innocent snow white victim. The suspect feels endangered:
about to be exterminated. (5) The women need evidence for the suspect's current engrossment in
his schizophrenic delusion. That's why they need the “Marine document” (2:18:00). (6) How the
suspect's “paranoia schizophrenic delusion” has developed: the current shape of the ICJ trial. FN
will come to power per an ICJ judgment. “Regime change”. But the CIA is co-victim with the
Russians. There is a conflict of interest among the victims about whether FN should come to
power. “Regime change” in Poland last week. Not sure whether it is related to the (previous) ICJ
trial at all. (7) About Marine's book. Marine, a “half-way” philosopher. Her theory is very similar
to the suspect's, very similar to the critical theories. (8) Massive terrorist attacks just before the
suspect posted on Partisans. Why is FN going to win the first round but not the second? (9) FN's
connection with the Russians. The suspect fears being “blacklisted”.
The single most important statement in this conversation is W's exclamation that the Paris attacks
will help FN, to which the suspect makes no reply. We will come back to this a little later.
By night, the suspect would suspect that the Secret Society women have instructed his best friend
to record the phone call and then leave the recording somewhere online, pretending to defend
himself against the suspect’s (imaginary) framing. The Secret Society women will then send their
online friends to pretend to find the recording by accident, and then to find the women by
accident. The Secret Society women will then bring the recording to the DA as evidence proving
that the suspect is still currently engrossed in his schizophrenic delusion. The women might want
to do this for other reasons as well. In the conversation, as you have heard, W has also pretended
to react very negatively to his once putting up the recordings of their conversation online. If the
DA swallows the show, he will put into his complaint that the suspect likes to criminally record
people’s conversation and then put it online. This will further motivate the judge to order that all
the materials the alleged suspect has ever put online be removed when he should be taken back
into custody. If the suspect ever comes to trial in the future with the Secret Society women, it
will also be problematic for him to bring to the court as evidences the recordings of his past
conversation with them. KRN is especially concerned about this. Since KRN has made up this
story about how the suspect has stalked her and harassed her, she’s terrified that the recordings of
the past conversation between her and the suspect might prove just the opposite. She’s terrified
33
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
of being found out that the suspect is actually the opposite of how she has described him and that
it is she who has stalked him. The women are traumatized by their failure in GR’s case: how the
recording of the assault has contradicted the demonic portrayal which the women have prepared
of the suspect in GR’s defense.
In reality, W has pretended to react negatively to the suspect's recording habit certainly under
Homeland Security instruction. Homeland Security wants the suspect to appear as a “criminal
recorder” in the intercept of this conversation because they are still trying to exclude the
suspect's recordings as evidences in the ICJ.
The question is of course: why would W want to help the Secret Society women? Well, because
Homeland Security has ordered him to!
Now the CIA/ TMU would then instruct W to pretend to help the Secret Society women,
because, in any case, they want W to talk to the suspect in order to obtain evidences for the
upcoming debate in the ICJ.
The trick is that, during the end of the call, the suspect asks W to not help the Secret Society
women secure the needed evidence about the current state of his insane mind. If the Secret
Society women have planned to stage a show of “accidentally finding the recording of the
conversation” without having to summon W to the DA, this would be golden evidence that the
suspect is still suffering grave paranoia believing that even his best friend will harm him. But he
has said something about the “needed evidence about the current state of his insane mind”! The
women can’t let the DA hear that the suspect is actually aware of the contours of their argument.
How to overcome this difficulty?
In any case, there is no visit to the suspect's website today evidently because everybody is busy.
Busy being interviewed about the Paris attacks, that is. Now let's examine what must have
happened on the side of government affairs.
As noted, all the parties – French, Russians, TMU/ CIA, and Homeland Security – are debating
hotly in the ICJ in consequence of the Paris attacks. Both the CIA/ TMU and Homeland Security
would be accusing the Russians and the French of “conspiracy” with the suspect. This, in
response to the fact that the Russians (perhaps representing EKT) and their French allies have
just obtained the suspect's Marine document. All parties on the American side therefore ask the
ICJ to forbid EKT and her French partners from implementing any ideas found on the document.
The ground is this. The profile of the suspect as a violent and delusional “cyberstalker” and
“misogynist terrorist” which Homeland Security has passed to EKT and the French cannot be
used by her and her allies to fulfill the suspect’s wish to harm the United States. The original
intent of the American law and international agreement in question is to protect EKT and Marine
from harm by the suspect; it is not to enable them to fulfill the suspect's wish by using his ideas
to harm the United States. Such is the meaning of “conspiracy”. Furthermore, insofar as the
suspect, as a “misogynist terrorist”, is subject to enforcements under UN Resolution 1373,
implementing any ideas similar to suspect's own is considered “terrorist attacks against American
liberal women” and thus banned under international agreement. Both the Russians and the
34
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
French therefore cannot implement the ideas contained in the suspect’s writings by expanding on
FN’s anti-American agendas.
Although the CIA/ TMU are united with Homeland Security on this, the two parties sharply
disagree on other matters since their respective profiles of the suspect are completely
incompatible. According to CIA/ TMU's profile, there shouldn't even be any warning about the
suspect in international databases for known terrorists, so that Homeland Security is in fact
advertising the suspect's ideas to the French and the Russians and is only accusing them of
conspiring with the suspect because they have got caught. Homeland Security's defense can only
be to affirm that its profile of the suspect is correct – which would enable EKT and the French to
implement the suspect's ideas – but then to accuse the suspect of having prior knowledge about
EKT's and French's coming – “He knows what's going to happen, that you will use Paris attacks
as an excuse to obtain his writings!” – so that EKT and her French friends can then be legally
prohibited from implementing the suspect's ideas.
When Homeland Security insists that the suspect has prior knowledge and is conspiring with the
Russians and the French so that his writings should not be shared, however, they are defeating
their own argument. Both the French and the Russians would then ask: “You mean he knows in
advance that terrorist attacks will happen in Paris, which will provide us with the legal pretext to
look into his writings despite your refusal?” Homeland Security is speechless. On top of
conspiracy charges, everybody now has also to investigate whether the suspect has anything to
do with the Paris attacks. (Well, it is bizarrely coincidental that he begins posting on Partisans
just when Paris attacks are in progress.) This, again, is Homeland Security's fault. But the suspect
will have to pay the price. On top of being a “domestic terrorist”, he is now also under
investigation as an “international terrorist”.
The French, Russians, TMU, and Homeland Security thus spend the whole day interviewing all
the women of the Secret Society asking them whether the suspect has ever given out any hint
about the Paris attacks beforehand. Presumably, the Secret Society women, while having learned
that making false reports about terrorism might get them into trouble even though they are
women, have nonetheless utilized the opportunity to report something vague enough which,
while it wouldn't qualify as “false report”, might still provide the investigative agencies with
reasons to regard the suspect with suspicion. The various agencies must have also interviewed
other people whom the suspect has met in other contexts, such as Johanna, as you shall see. This
must mean, however, that they must have also interviewed the suspect's public defender (Ms
Warren). At least Homeland Security did. The terrible consequence of this for the suspect you
will see later on.
15 November (Sunday)
Since early morning, the Secret Society women sends in another scout: 5:13 AM, 86.98.220.184,
alshamil.net.ae, Dubai.
35
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
86.98.220.184 - - [15/Nov/2015:06:13:54 -0700] "GET /vol2appendix/vol2appendixd.pdf
HTTP/1.1" 200 158709 "http://www.google.ae/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=95&cad=rja&uact=8&ved=0CD8QFjAEOFpqFQoT
CLyU8eHAkskCFYeJGgodSswBQw&url=http%3A%2F%2Fwww.lawrencechin2011.com
%2Fvol2appendix
%2Fvol2appendixd.pdf&usg=AFQjCNEmf0CwzRLjOY5rUo7cKLPl328JcQ&bvm=bv.1074675
06,d.d2s" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:19.0) Gecko/20100101 Firefox/19.0"
This is sign that the Secret Society might have secured the help of Khalezov: he would email a
notice to people he knew who would eventually pretend to find the Secret Society women saying
the suspect is slandering their friend on his website, which notice the women will bring to the
DA as well. This is merely circumstantial evidence, but it’s better than nothing: it can help
establish that the suspect has had the habit of slandering people online with his schizophrenic
delusion about them.
Then, on 8:47 AM, a very significant search for the suspect’s latest “Marine essay”:
204.79.180.56. Note that there is no information on this IP address. It seems to belong to either
Microsoft or Drake Holding. It seems to be somebody working inside Microsoft, in fact.
204.79.180.56 - - [15/Nov/2015:09:47:26 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200
704757 "http://www.bing.com/search?q=marine+le+pen&form=MSNH14&sc=8-4&sp=1&qs=n&sk=" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; Trident/5.0)"
There are two possible explanations for this visit, in light of what has happened yesterday. The
first is this. Finding itself in trouble, Homeland Security has thus mobilized all the “volunteers”,
i.e., the members of the Secret Society’s online group around the world who are supposed to help
the women stage “false-flag online harassment”. These people are now charged with the task of
visiting the suspect’s website and then rumoring over communication channels about the suspect
and his website in conformity to Homeland Security’s false profile of him, so that the rumors can
be intercepted into the ICJ as evidences in support of Homeland Security’s case. The volunteers
will pretend to show interest in the “suspect’s” insanity and track down every trace he has left
behind before and then rumor about how “crazy” he is, etc. They will also pretend to discover the
suspect’s big theory on line and then rumor falsely saying the suspect seems to have plagiarized
all his writings.
The second, and more likely, explanation is this – especially if this visit indeed comes from the
interior of Microsoft. FN, in order to avoid charges of “conspiracy” with the suspect, has decided
to do things by the book, honor Homeland Security's warning about the suspect as a “terrorist
stalker of women”, and respond accordingly. They thus contact all search engines, including
Microsoft's Bing, saying that the suspect's “Marine essay” constitutes cyber-harassment of their
president (since it causes his name and her name to be associated together when people search
for her name) and asking them to eliminate the document from search results when people search
for Marine's name. Before taking action, the Bing personnel does a search for Marine's name to
ascertain that the suspect's document will indeed come up among search results.
36
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
In the following, volunteers' visits to the suspect's academic writings (for the purpose of
rumoring about his plagiarism) will not always be noted. Visits to the images embedded on his
webpages (for the same purpose) will virtually never be noted – to save space. Only enough
visits of such sort (plus decoys) shall be noted to convey a sense of the “cyber-bullying” and
“cyber gang-stalking” to which the suspect is being subjected.
Since the French and the Russians have obtained the suspect's latest Marine document Friday
night, the TMU/ CIA team now goes in front of the ICJ judge and argue: “This writing is
obviously done by a clear-headed intellectual. How can Homeland Security's profile be true? It's
not like the French and the Russians have never heard of this guy before. They both know what
bullshit Homeland Security's profile is. That document is evidence that neither the French nor the
Russians have any reason to act on Homeland Security's warning. Our profile of the suspect is
correct. The French and the Russians should therefore be forbidden from utilizing any ideas
contained in the document. Furthermore, Homeland Security should be convicted of intentionally
passing out false information to diplomatic services around the world and forbidden from doing
so in the future.” The judges can clearly see that this is the case. Homeland Security, in order to
defend themselves, would have to first of all prevent any of the suspect's recordings of his
conversation with others (found on his website) from entering into evidence – for these prove
that he is a high functioning intellectual. Hence W's fuss about the suspect's recordings yesterday.
Homeland Security secondly would have to appeal to “victim confidentiality” – forbidding the
Court from looking at anything the suspect has written but asking the court to rely solely on
witnesses' testimonies about the content of the suspect's writings to make its judgment – and then
instruct the Secret Society's volunteer group to pretend to search for the suspect's Marine
document and then rumor among themselves in order to get themselves intercepted. This is what
is going on 8:47 AM this morning. The Secret Society members must be saying: “This guy has
copied all his paragraphs from Marine's own book.” “He expresses herein all this hatred toward
women.” “He is a racist and a bigot.” And so on. Homeland Security will then take the intercepts
of these rumors to the ICJ as “evidence”: “We did not willfully provide false profiles to foreign
actors. We have legally collected all our evidences. We do not violate women's 'victim
confidentiality' by taking a direct look at what the suspect has written. The Court should do the
same in order to respect women's 'privacy'.”
Meanwhile, the ICJ judges can also see that the French consular protection has had to follow
every lead in order to not be charged with negligence. It's all Homeland Security's fault.
Furthermore, the Russians are in a bind, for they have in fact come up with ideas similar to those
contained in the “Marine document” and are about to share them with FN. It's most likely the
case, however, that the suspect has expressed a much better, and more comprehensive, version of
these same ideas. Nevertheless, the Russians, thanks to Homeland Security's feat, now risk being
forbidden from implementing their own ideas unless they can clear up the matter.
As the debate shall continue about whether the suspect fits Homeland Security's or TMU's profile
and whether he has had any prior knowledge of EKT's and French's coming, and as everybody
begins to investigate whether the suspect has anything to do with the Paris attacks, both the
Russians and the French must take care to avoid charges of conspiracy with him. This, also in
37
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
order to protect their own similar ideas. The easiest way to do so is to harm him – to not fulfill
his wish to get the Secret Society women arrested and made bad examples of but to help the
Secret Society women harm him. To this end, EKT’s team sends a Russian intelligence officer
(from here on, the “professional”) to help the women discredit the suspect. The women are
complaining: “He knows what we are doing behind his back by looking at his visitors’ log. What
to do?” This professional knows what to do. “You haven’t staged the decoys well enough. I’ll
show you how to stage decoys so well that he will believe these mean false reports to law
enforcement like it was the case before, and then you will open a case on him at law
enforcement, so that, as he comes under law enforcement surveillance, his continual belief that
you guys are making false reports about him to law enforcement will be witnessed by law
enforcement officers, who will then be forced to believe that he suffers severe paranoia and has
imagined up all the past stalking claims which you have filed against him at TMU.” Note that,
while harming the suspect by driving up his paranoia, both the Russians and the French are not
necessarily helping defend Homeland Security. While Homeland Security's profile says that the
suspect is a paranoia schizophrenic (hallucinating, that is), when the “professional” shall have
prompted the suspect to develop all sorts of wrong scenarios by causing him to mistake the
decoys, the Russians and the French will demonstrate to the ICJ judges that these wrong
scenarios, while sounding crazy, are not the kind of “delusions” which a schizophrenic suffers,
but are simply the product of wrong inferences (completely rational). Also, while the Russians
and the French must work hard to avoid conspiracy charges, if they can succeed, they shall be
entitled to use the suspect's superior, although similar, ideas to enrich their own ideas.
The suspect is at St Sophia in the morning. Coffee time, he is sitting with Johanna. She seems to
be passing secret messages to the suspect: Sartre’s play (“Huis clos”) and Mary O’s poem.
Yesterday, the TMU, when they have gone to Johanna to interview her, must have asked her to
produce these two metaphors today in order to test the suspect, to see whether he indeed has
prior knowledge of the whole affair that is going on right now. The result of the test is negative:
the suspect doesn't appear to know that he is once again the subject of debate at the International
Court of Justice.
No visits until late afternoon. It appears that the Secret Society women have got wind of the fact
that the suspect is aware of the basic contour of the arguments which they have made to the DA
on Friday – although he isn’t yet aware that the Secret Society women are doing “false flag
online harassment”. If so, they could only have heard it from the suspect’s best friend. How did
this happen? Have they found the recording “by accident”? The reality is most likely that EKT,
because she is one of foreign dignitaries, has ordered Homeland Security to share the intercept of
the suspect's phone conversation with the women. This, as an additional proof that she is
harming the suspect (severely violating his privacy) and so not conspiring with him. The Secret
Society women are now sufficiently concerned that they send one of their scouts to check the
38
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
suspect’s blog to see if he has already blogged about their latest attempt to exterminate him. On
4:55 PM, 204.69.190.254, butch.sjc.edu, St John’s College, Santa Fe.1
204.69.190.254 - - [15/Nov/2015:17:55:15 -0700] "GET /gallery/gallery.html HTTP/1.1" 200
4452 "https://www.google.com" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
….
204.69.190.254 - - [15/Nov/2015:17:55:30 -0700] "GET /blogs/ HTTP/1.1" 200 51481
"https://www.google.com" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:42.0) Gecko/20100101
Firefox/42.0"
This person has been here before many times, of course, and so, without doubt, a Secret Society
scout. She first comes to the web gallery, simply as a decoy. In 15 seconds, she comes to the
blog, which reveals that she is really here to look at the blog. She would have passed back to the
Secret Society women the copy of the suspect’s latest blog post documenting the events leading
up to their meeting with the DA on Friday. Even if the details are only 60 to 70 percent correct, it
is sufficiently disconcerting to the women because he has indeed understood the basic contours
of the arguments they have made.
The suspect has gone to Casbah after church. He is afraid to even go home, wondering
something about the Paris attacks. Difficulty in signing up AVFM. He emails the administrator,
but the email is immediately deleted from Inbox. Since the suspect is now a “terrorist suspect”,
it's expected that forum administrators at these men's rights websites would also have been
notified and interviewed by Homeland Security. At a loss, on 5:37 PM, the suspect posts his new
summary of the Secret Society women’s past history with him on LB forum, located in UK.
From 6 PM until 8 PM, he would be checking his new post there regularly. An ugly white female
soon comes in to sit next to him. Given the strange fact that the Secret Society women would
immediately afterwards notice this new posting, it’s very likely that the female who is sitting
next to the suspect is actually a member of the Secret Society here to spy on him. It might be
that, around 4:45 PM or so, as the Secret Society women have already reviewed the intercept,
they are wondering how the suspect could have so well guessed the contours of the arguments
they have made to the DA, so that, knowing from their constant tracking of him that he is at
Casbah again, they have decided to send a female member to spy on him to see what he is doing
on his computer. They have wanted to know how it is possible to decipher their arguments by
looking simply at the patterns of their visits to his website. They probably want to make sure that
he really isn't hacking their computers. Not finding him doing anything strange on his computer,
they have instead found him posting a new summary on an online forum. This would have
further caused them more worries. Amazingly, the owner of the LB forum (“LB Admin”) is
located near Sheffield, UK, where one of the past members of the Secret Society is located. (See
the entry for 29 June 2014). They immediately ask the Sheffield person to contact LB Admin and
explain the matter to her.
1 This person is very likely KNR's friend Kira Z­i­e­l­i­n­s­k­y, who is also an alumni of St John's College. Kira is currently the president of Dr Java Coffee Co. 39
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
After much discussion between 6 PM and 9:30 PM, the Secret Society women – evidently under
the leadership of the German Lady – have decided to continue to stage their show (“online
harassment”). And so, their online friends continue to pretend to be strangers who have
accidentally surfed onto the suspect’s website to discover all the personal information about the
Secret Society women and then to pretend to contact them, one by one, pretending to let them
know that some unknown guy, who seems to be severely delusional, is slandering them and
spilling out their information on his website. At which point, the Secret Society women will then
pretend to be embarrassed by the fact that they have been identified on the suspect’s website.
They can then go to either the DA or the police to present the strangers’ testimonies, saying that
strangers have identified them and contacted them saying they have seen their names and
personal information appearing on the suspect’s website.
Thus, on 9:43 PM, the Secret Society sends somebody very nearby to pretend to be strangers
accidentally surfing onto SDW’s blog: 76.219.74.181, lightspeed.irvnca.sbcglobal.net, Rialto,
CA. (Near San Bernardino.)
76.219.74.181 - - [15/Nov/2015:22:43:14 -0700] "GET /suppl----_-_1-9/suppl----_-_1-9b.pdf
HTTP/1.1" 200 5127870 "http://---------stalking.com/about/" "Mozilla/5.0 (compatible; MSIE
10.0; Windows NT 6.2; WOW64; Trident/6.0; MATBJS)"
We have to suppose that the Secret Society women are seriously wrestling with the problem,
after they have read on the suspect’s latest post that this document is proof that “Pyramid” does
not refer to ANG, of somehow connecting up ANG with the nickname “Pyramid” nonetheless.
This Rialto person – who might even have known about ANG by having gone to the library – is
certainly instructed by the Secret Society women to pretend to accidentally surf onto SDW’s blog
and find the suspect’s document. She will then pretend to contact SDW expressing concern over
the bizarre delusion of the author of the document and the safety of the woman he is talking
about. Even though “Pyramid” is barely talked about in this second chapter at all, it would not
matter: nobody will bother to read it to see how much the girl has been talked about. Most
importantly, she, together with SDW, will then pretend to be able to identify this girl nicknamed
“Pyramid” even though in the story “Pyramid” is identified as a woman whose name is not the
same as ANG’s. The reality is that, under normal circumstances, nobody can possibly identify the
“Pyramid” in the story as ANG, but, here, the Secret Society women will simply instruct an
actress to pretend to be able to identify who this “Pyramid” is. SDW will then pretend to inform
this actress about the monstrous criminality of the author of the document and their difficult case
with the DA, and set up the actress with ANG. ANG will then carry the actress’ testimony about
being able to identify “Pyramid” as ANG to the next authority, who, because he wouldn’t know
that the stranger is an actress and the identification is staged, would believe that the suspect has
indeed violated ANG’s privacy by talking on his website about a “Pyramid” whom many
strangers are able to identify as ANG – even though the suspect has specifically noted on his
website that “Pyramid” doesn’t refer to ANG.
Three hours later, the Secret Society women are prepared to stage another show – when their
Sheffield friend has located the LB Admin. LB Admin, after hearing all the slander of the suspect
which the Secret Society women have prepared to galvanize her and recruit her, agrees to
40
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
cooperate. The following operation is quite sophisticated. We may surmise that both the
Homeland Security and EKT's “professional” might have been involved in the planning.
The staged show runs like this. The LB Admin shall pretend, after seeing the suspect's summary
posted on her forum, to get very concerned about the mental state of the poster, Google his email
address (as found on his registration for the forum), identify his website and the women referred
to in the summary, and contact the women. The women shall pretend to respond saying they have
been, for a while, very frightened by this guy’s paranoia delusion that they have been going after
him making false reports about him to law enforcement. They must have admitted that they have
failed to convince the DA, but, now, with the LB Admin’s communication and the other people's
“testimonies”, they could go to the police department to open a case on their suspect for “online
harassment”, etc. The new story will then be that this guy, when he sees visits to his website from
strange places, has wrongly assumed that they are responsible for it, all because he suffers
incurable paranoia schizophrenia. But, yet, when the DA visits his website, he is able to
conclude, correctly, that it’s because these women have gone to the DA to show them his website
in an attempt to report him. So the official story line shall be that this guy is mostly insane,
although sometimes he is correct, because he spends a lot of time on his log and because,
perhaps, he is hacking the women's computers.
Thus, on 12:54 AM, 1:08 AM, 1:14 AM, 1:17 AM, dyn.plus.net, Sheffield, UK. This is the LB
Admin:
146.200.162.191 - - [16/Nov/2015:01:54:43 -0700] "GET /blogs/?author=1 HTTP/1.1" 200
51575 "http://www.google.co.uk/url?url=http://lawrencechin2011.com/blogs/%3Fauthor
%3D1&rct=j&q=&esrc=s&sa=U&ved=0CBQQFjAAahUKEwig4P32yJTJAhWCUhoKHTscBV
k&sig2=vgTR351XXj31pcOJwbByLQ&usg=AFQjCNGvultm4bYWm5l08RhW6LNi5AX4bw"
"Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16"
41
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
When she is instructed to Google for the suspect's email address, this “/blogs/?=author=1” is the
first search result. There is a match. She has identified the suspect's blog. Less than 1 minute
later, she clicks on all the email correspondences between the suspect and the various persons
whom the suspect has presumably talked about in his stories – these documents, which are
existent on the suspect's website as appendixes, are the other search results returned by Google:
146.200.162.191 - - [16/Nov/2015:01:55:28 -0700] "GET /2008docs/Gmail112408.pdf
HTTP/1.1" 200 583104 "http://www.google.co.uk/url?
url=http://www.lawrencechin2011.com/2008docs/Gmail112408.pdf&rct=j&q=&esrc=s&sa=U&
ved=0CBoQFjABahUKEwig4P32yJTJAhWCUhoKHTscBVk&sig2=bbCJbgXsbBgqvaoq3XKig&usg=AFQjCNEA5GCMYhGoYnpgjCfB-do9cWhYEQ"
"Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16"
This is the email between the German Lady and the suspect in November 2008. Then, 2 minutes
later:
146.200.162.191 - - [16/Nov/2015:01:57:38 -0700] "GET /AK/4-25-12/kgmail_4_25_12.pdf
HTTP/1.1" 200 1046074 "http://www.google.co.uk/url?
url=http://www.lawrencechin2011.com/AK/4-2512/kgmail_4_25_12.pdf&rct=j&q=&esrc=s&sa=U&ved=0CB8QFjACahUKEwig4P32yJTJAh
WCUhoKHTscBVk&sig2=ijHtJppo1PeFhAZSNc_RhA&usg=AFQjCNEY93s52lE_9rtRtS9B6H5jiOpAw" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388
Version/12.16"
42
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
This is the email correspondence between KRN and the suspect in April 2012. Then 11 minutes
later:
146.200.162.191 - - [16/Nov/2015:02:08:15 -0700] "GET /blogs/?p=83 HTTP/1.1" 200 15712
"http://lawrencechin2011.com/blogs/?author=1" "Opera/9.80 (X11; Linux x86_64; Edition Linux
Mint) Presto/2.12.388 Version/12.16"
This is the blog post, “The latest warning”. Since the women didn’t actually go to the DA on 9
November, and have had to slightly change their plans after seeing this blog post, the Secret
Society women could now deny that this blog post describes anything like reality – since nobody
outside the Society has witnessed how the women have planned their operation – and could in
fact use it as evidence to prove that “the suspect is still currently engrossed in his schizophrenic
delusion about the group of women going after him and continually mistaking strangers’
visitation to his website for these women’s orchestration”. At the same time,
146.200.162.191 - - [16/Nov/2015:02:08:36 -0700] "GET /vol-6/8_18_10/towes81810.pdf
HTTP/1.1" 200 118511 "http://www.google.co.uk/url?
url=http://www.lawrencechin2011.com/vol6/8_18_10/towes81810.pdf&rct=j&q=&esrc=s&sa=U&ved=0CCUQFjADahUKEwig4P32yJTJ
AhWCUhoKHTscBVk&sig2=uJNVaito3Z9DazErcBA7QQ&usg=AFQjCNEOY_uLsXXrXjbyV
o42eFHrcKuw6Q" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388
Version/12.16"
This is the correspondence between the suspect and his best friend W in August 2010.
Presumably, because of the difficulty noted, the Secret Society women have decided not to
“accidentally” discover the suspect’s best friend’s recording. LB Admin will instead contact him
via email pretending to be concerned over his safety, at which point the best friend can offer
testimony about the current state of the suspect’s mental insanity (for believing that a group of
women are going after him as part of some ICJ trial, etc.). LB Admin can then supply the
testimony to the Secret Society women, who will then take it to their next authority. Then, 6
minutes later,
146.200.162.191 - - [16/Nov/2015:02:14:57 -0700] "GET /petition/c0901379jl/ecf_request.doc
HTTP/1.1" 200 10297 "http://www.google.co.uk/url?
url=http://www.lawrencechin2011.com/petition/c0901379jl/ecf_request.doc&rct=j&q=&esrc=s
&sa=U&ved=0CC0QFjAFahUKEwig4P32yJTJAhWCUhoKHTscBVk&sig2=iGbEYqJZEOUexHuNjg3Uw&usg=AFQjCNENptlesH2hrdDmyq_m4sUz1d-QSA" "Opera/9.80 (X11; Linux
x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16"
A short ECF Request form. This is of course completely innocuous. But the LB Admin is
instructed to download it probably because the contact information listed on it matches that
showing up on /blogs/?=author1. Then, 3 minutes later,
146.200.162.191 - - [16/Nov/2015:02:17:16 -0700] "GET /ponomarev.pdf HTTP/1.1" 200 46024
"http://www.google.co.uk/url?
43
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
url=http://www.lawrencechin2011.com/ponomarev.pdf&rct=j&q=&esrc=s&sa=U&ved=0CCcQ
FjAEahUKEwig4P32yJTJAhWCUhoKHTscBVk&sig2=syst5cQo7N6sbez8REcZ4w&usg=AFQ
jCNE6MtJ7EzqKt1ZjqrYO8UkXQU5Wqw" "Opera/9.80 (X11; Linux x86_64; Edition Linux
Mint) Presto/2.12.388 Version/12.16"
While this 2009 email could be used to illustrate the suspect’s gross insanity, it’s too old. But LB
Admin has downloaded it because it has come up on Google searches. LB Admin will then
pretend to contact KRN and the German Lady to inform them that she has found their private
information on the suspect’s website, is able to identify who they are in the suspect’s stories by
matching them up with these email correspondences, and is terribly concerned about their safety
given the bizarre delusion which the suspect has developed about them. This will be the women's
evidence for their next law enforcement authority.
16 November (Monday; the suspect's birthday)
From early morning on, there are visits that are part of the Secret Society's important operations:
First of all, 7:59 AM, 90.62.98.236, Neuilly-sur-Seine, France.
90.62.98.236 - - [16/Nov/2015:08:59:55 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692
"http://www.google.fr/url? sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved=
0CC8QFjACahUKEwjaxLT6p5XJAhVCjw8KHd5SAUE&url=http%3A%2F%
2Fwww.lawrencechin2011.com%2F1%
2Fthermhch2.html&usg=AFQjCNGANqQKQL8CkdLm5tmo0aFZXbBTyQ&bvm=bv.10
7467506,d.d2s" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko"
It's not clear what this is about. If it's a visit from the Secret Society, then the person would
rumor saying this guy seems to be plagiarizing. If it's from the French side (FN), then the person
might be verifying whether the suspect has indeed plagiarized. Then, 8:11 AM, 5.70.98.175,
skybroadband, Ipswich, UK. (Note the person from Ipswich on 5:39 AM, 28 June 2014.)
5.70.98.175 - - [16/Nov/2015:09:11:39 -0700] "GET /blogs/?p=83 HTTP/1.1" 200 15711
"http://www.legalbeagles.info/forums/private.php?do=showpm&pmid=246079" "Mozilla/5.0
(Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/42.0.2311.135 Safari/537.36 Edge/12.10240"
This Ipswich person is presumably a friend of the Sheffield person, and is now introduced to LB
Admin through the latter. What has happened is presumably this. After LB Admin has Googled
the suspect’s email address, the “professional” instructs her to send the link to the Ipswich
person's inbox so that the Ipswich friend could then click on it. In this way, when the suspect
shall see this on his visitors’ log, he will believe that a warning has been broadcast to all users on
the forum to discredit him (for at least one of them has clicked on the link contained in the
warning). Then he will look very paranoid to others, and cause others to believe that the
preceding summary is all but the product of his paranoia imagination.
44
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
10:28 AM, Dina Bergman wishes the suspect happy birthday on Facebook. Well, she is still
trying to be friendly in order to hide her membership in the Secret Society.
12:58 PM, the suspect has arrived in Casbah. He is checking his log, and discovers the Ipswich
person's activity. Terrified, he does believe that a warning has been broadcast over LB Forum. He
immediately also deletes “pleading paper 2.doc”.
The suspect is terrified all day long today about his possible extermination on the next court day
(being dragged into custody without bail for the made-up stalking charge). He has located a
certain “Marc Angelucci” (men's rights) and calls him and leaves a message with him. He then
rides the bus to Chrysalis, crying to Tanisha, and is asked to leave. He settles down in the public
library and continues to check his log. On 4:22 PM, his best friend calls him. He tells his best
friend that he has just discovered that the Secret Society women have sent somebody to pretend
to discover the latter’s contact information on his website. Since it’s possible that the Secret
Society would soon gain access to this conversation, he immediately mentions it to W, so that the
women might be prompted to change their plan, at least by excluding the suspect’s best friend
from supplying testimonies, directly or indirectly, to the DA, or to the next law enforcement
authority they are about to appeal to.
The details of the suspect's conversation with his best friend W are as follows (from 47:00
onward in the recording). About the visitors’ log: the women's UK associate's search for W’s
email address. (He doesn't yet know that it is LB Admin.) “They need evidence that I’m currently
engrossed in the same schizophrenic delusion about the ICJ.” The strange thing about Saturday’s
conversation, i.e. he has forgotten about the old recordings in the other folders, so that it would
look like he was lying on Saturday when he insisted that he had deleted all recordings. W: “I
thought a court-appointed doctor has declared you not insane…” W: “What if there really is a
chip inside your brain?” W is testing the suspect: at least the TMU/ CIA wants evidence to
demonstrate that the suspect is not insane, and that his belief about brain chips is a rational
belief, even if it might be wrong. The suspect: “They’ll try to get you involved…” W: “How do
you know the DA has visited your website?” The suspect: “When the police visits your site, it’s
not even going to show up on your log…” The suspect is wrong here, but this incorrect
admission will save half of his life, as you shall see. W emphasizes that the women haven't
contacted him. Then about the Secret Society's downloading of W’s email address. W: “You keep
giving them ammunition…” The suspect: “There is a different force which has come into the
picture… Has the French consulate responded? Because Homeland Security has never
withdrawn the false profile, and so TMU has had to re-investigate me…” More: “Has the essay
something to do with it? The French would be obliged to respond, but the essay isn’t so
wonderful… Has the Paris attack an impact on this…” Then the suspect begins to talk about the
incident involving the French consular protection service back in February. “Because of my
visits to FN website.” These admissions would be evidences in favor of the French and the
Russians, however: if the suspect is intending to conspire with them, he should pretend to not
understand what is going on, rather than spelling out a correct, although vague, picture of the
controversy that is now surrounding him. The suspect then recounts Johanna’s “secret message”
45
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
from Sunday morning. This is again evidence in favor of the French, Russians, and the TMU/
CIA team.
The suspect continues: “These women are such a waste.” W: “You shouldn’t have broken all
these windows.” The suspect: “They see me not as making good use of my time, but worse, as
spending my time making anti-American diatribe. But there is nothing wrong with what I say!”
W: “What you say is offensive precisely because it’s true.” The suspect: “Those detectives’
primary job is to protect themselves. They are not thinking about the safety of the suspect.” W:
The Platonic cave: the suspect needs to cloak his truth with Noble Lies in order to avoid being
called “crazy”. W continues: “If you want to influence the world, you shouldn’t write
philosophy, but novels.” The suspect: “These FN people really think like me.” The suspect
expresses his wish to be in France to “join the club.” “Up to 70% of my former scenarios are
incorrect.” The suspect laments that he has taken too seriously W’s words. W denies that people
might be pulling shit behind the suspect's back. So far, all that the suspect has said – from
Saturday onward – indicates that he has had no prior knowledge and that he doesn't fit Homeland
Security's false profile in anyway whatsoever. The current crisis seems to be entirely the fault of
Homeland Security.
During the call, Cindy comes into the library with a few other people. It's not clear whether this
is orchestrated, or whether she will afterward rumor about having seen the suspect in the library.
Note that W actually warns the suspect that somebody – i.e. the “professional” – is dropping “red
herrings” on him to make him believe that something is going on behind his back when nothing
is. Apparently, it is the Invisible Hand and the TMU who have instructed W to warn the suspect.
They know that the Russians are being forced by Homeland Security's mistake to make him
conform to the women’s and Homeland Security’s false profile of him – paranoid and
misinterpreting the meaning and origins of the visits to his website – in which case, their own,
correct, profile of the suspect would be invalidated. Hence they want to drop him a hint.
4:59 PM, 221.145.183.167, the Korean scout.
221.145.183.167 - - [16/Nov/2015:17:59:39 -0700] "GET / HTTP/1.1" 200 25738
"https://cellsciencesystems.com/" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1)"
221.145.183.167 - - [16/Nov/2015:17:59:39 -0700] "GET / HTTP/1.1" 200 10670
"https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)"
Then, by 6:33 PM, the suspect has removed /AK and /vol-6/.
By 8:29 PM, he has gone to Starbucks and sends his new “summary” to Mr Angelucci.
Meanwhile, the Secret Society women have decided to continue staging their show “strangers
accidentally surfing onto the suspect’s website and being able to identify the women he is talking
about and contacting the women to express concern for their safety”. Thus, on 9:43 PM and 9:54
PM, 76.219.220.166, lightspeed.irvnca.sbcglobal.net, Los Angeles.
46
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
76.219.220.166 - - [16/Nov/2015:22:43:44 -0700] "GET /newsummaryweb.html HTTP/1.1" 200
68269 "https://www.google.com" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0)
Gecko/20100101 Firefox/41.0"
76.219.220.166 - - [16/Nov/2015:22:43:51 -0700] "GET / HTTP/1.1" 200 10670 "-"
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0"
76.219.220.166 - - [16/Nov/2015:22:53:19 -0700] "GET /timeline9/timeline9d.pdf HTTP/1.1"
404 1360 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
rv:41.0) Gecko/20100101 Firefox/41.0"
76.219.220.166 - - [16/Nov/2015:22:53:27 -0700] "GET /timelinepartVII-13/timelinepartVII13c.pdf HTTP/1.1" 404 1360 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Macintosh;
Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0"
76.219.220.166 - - [16/Nov/2015:22:54:04 -0700] "GET /diaryreview2013-1239/conclusionrev10-2.pdf HTTP/1.1" 200 520003 "https://www.google.com" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0"
This person is very close by. Obviously a close friend of KRN or the German Lady, in response
to LB Admin's expression of concern for their safety. Even though most of the “stories” had
disappeared, she is able to find “Conclusion”, which is her goal. The central problem remains
that “Pyramid” has to be tied to ANG despite the suspect’s indication that “Pyramid” doesn’t
refer to ANG. Otherwise there is no reason for the German Lady, SDW, and KRN to ever be
involved. They apparently believe that a clue exists on this document which might serve as proof
that “Pyramid” refers to ANG. As long as the women can hide from their next law enforcement
authority the suspect’s statement that “Pyramid” doesn’t refer to ANG, the authority presumably
will accept the clue as evidence since he would be unlikely to have the time and inclination to
check whether the women’s stories are correct.
Then, 10:14 PM, 67.55.84.212, Google, /, Webair.
67.55.84.212 - - [16/Nov/2015:23:14:45 -0700] "HEAD / HTTP/1.1" 200 211
"http://www.google.com" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/43.0.2357.124 Safari/537.36"
This strange visit will be very frequent from now on. Unclear what it is about. Then, on 3:49
AM, Jamia Millia Islamia University, New Delhi, India,
14.139.62.114 - - [17/Nov/2015:04:49:26 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/cheneyplan25/cheneyplan25.pdf" "Mozilla/5.0 (Windows
NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
14.139.62.114 - - [17/Nov/2015:04:49:25 -0700] "GET /cheneyplan25/cheneyplan25.pdf
HTTP/1.1" 200 592393 "https://www.google.co.in/" "Mozilla/5.0 (Windows NT 6.1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
47
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
The location is so bizarre – even when it is just a proxy – that it has to be part of the show which
the Secret Society is staging currently (or which Homeland Security and the “professional” are
helping the women to stage): how strangers have come together with the Secret Society women
due to their concern for them because some guy has developed horrifying bizarre delusion about
them.
17 November (Tuesday)
With some evidences – staged – for the suspect’s online harassment ready, the Secret Society
women (or Homeland Security), in the morning, first sends another “volunteer” to pretend to
discover the suspect's crazy website: 9:36 AM, 99.52.178.214, lightspeed.ocnmwi.sbcglobal.net,
Green Bay, Wisconsin.
99.52.178.214 - - [17/Nov/2015:10:36:01 -0700] "GET / HTTP/1.1" 200 10670
"https://www.google.com/" "Mozilla/5.0 (X11; CrOS x86_64 7390.68.0) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.82 Safari/537.36"
99.52.178.214 - - [17/Nov/2015:10:36:02 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360
The word about this crazy person bad-mouthing about the innocent women is spreading over the
Internet. 1 hour and 30 minutes later, another one of their actresses in Richmond Hill, Ontario,
pretends to stumble upon the suspect’s new “Marine essay”: 11:07 AM, 99.238.175.189,
cpe.net.cable.rogers.com, Richmond Hill.
99.238.175.189 - - [17/Nov/2015:12:07:52 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200
701933
"http://r.search.yahoo.com/_ylt=A0LEVvXZektWLRoA.i4XFwx.;_ylu=X3oDMTBzZTdrbmk3
BHNlYwNzcgRwb3MDMTQEY29sbwNiZjEEdnRpZAM-/RV=2/RE=1447816025/RO=10/RU
=http%3a%2f%2fwww.lawrencechin2011.com
%2flepen3%2flepen3l.pdf/RK=0/RS=W2nSiW8heiGDQbzIMNviwB5aBpY-" "Mozilla/5.0
(Windows NT 10.0; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
This is clearly related to the debate surrounding the quality of the suspect's “Marine essay”. Is it
full of plagiarized materials or is it the work of a high functioning intellectual? Homeland
Security might have ordered the Richmond person to produce another piece of evidence to
demonstrate the former. Then, the Secret Society’s Korean scout: 1:27 PM, 221.145.183.167. He
is here yesterday on 4:59 PM. Same thing. And here on 14 November, 1:04 AM, and 13
November, 12:48 AM, if you recall.
The Secret Society women have produced no activities on the suspect's website for the rest of the
day. They are evidently planning for their meeting with their next law enforcement authority
tomorrow, putting together the “testimonies” they have collected (i.e. messages from the LB
Admin and the rest of the “volunteers”).
Past midnight, on 12:26 AM, “Momasita” posts a negative reply to the suspect’s post on LB
forum. This Momasita is part of the Secret Society cyber gang-stalking crew.
48
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
On 12:30 AM and 12:41 AM, the suspect, while in Starbucks, Westwood, has posted the latest
post, “Part III”. He, absolutely terrified about tomorrow, has been busy with preparing this post
all afternoon and all night.
It seems that, early morning, 18 November, ANG wants to do a final check to see if her name
could still be found on the suspect’s site. Only if it could. Thus, on 3:32 AM, office-fw1tg.fullrate.dk, Glostrup, Denmark,
89.150.129.196 - - [18/Nov/2015:04:32:17 -0700] "GET /log-wpd-2/septlog3.pdf HTTP/1.1" 404
1360 "https://www.google.dk/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_3)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
The scout has verified that her name couldn’t even be found on visitors’ logs, which have all
been removed. The case of “online harassment” couldn’t be strengthened further.
18 November (Wednesday; D-Day)
Still early in the morning, the Secret Society stages another operation: 5:49 AM, 54.243.53.148,
amazonaws.com.
54.243.53.148 - - [18/Nov/2015:06:49:34 -0700] "GET / HTTP/1.1" 200 10670
"http://www.google.com/" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2)
Gecko/20100115 Firefox/3.6"
54.243.53.148 - - [18/Nov/2015:06:49:49 -0700] "GET /howihave70bg/how_i_have_70bg2.pdf
HTTP/1.1" 200 54449 "http://www.google.com/" "Mozilla/5.0 (Windows; U; Windows NT 6.1;
en-GB; rv:1.9.2) Gecko/20100115 Firefox/3.6"
54.243.53.148 - - [18/Nov/2015:06:50:18 -0700] "GET /newlinks.html HTTP/1.1" 200 9402
"http://www.google.com/" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2)
Gecko/20100115 Firefox/3.6"
Although the “volunteer” is using Amazon proxy, we know that he’s located in the UK (“enGB”). It must be part of the show where “strangers are able to identify the author of the LB
posting by discovering his website”. This UK “stranger” (friend of the Secret Society) would
then contact the Secret Society women about the matter. It's another piece of testimony which the
Secret Society women will bring to their new law enforcement authority today.
By noon, while the suspect is in the courthouse, the Secret Society women (ANG, SDW, the
German Lady, and KRN), together with PD, TG, and JW, have gone to the Manhattan Beach
Police Department – the “next law enforcement authority – with all the evidences for “online
harassment” ready, including the suspect’s posting on LB, of which they say a bunch of strangers
have identified the true author, the same guy who has been spilling out their private information
and slandering them online. They first show the Manhattan Beach Police Department detective
either the “DRCRR warning” issued by the West LA division, or Homeland Security's warning
about the suspect as a “misogynist cyberstalker terrorist”, which, they hope, can immediately
biases him against the suspect and toward the women: “This guy is a suspect of misogynist hate
crimes and domestic terrorism”. The women then proceed to demonstrate to him the devilish
character of the suspect by showing him the suspect's website – believing the suspect's words
49
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
that visits from law enforcement to his website will not show up on his log. Thus: 12:35 PM,
64.95.198.68, Internap Network Services Corporation, City of Manhattan Beach. The women
first show the detective the blog in question:
64.95.198.68 - - [18/Nov/2015:13:35:35 -0700] "GET /blogs/ HTTP/1.1" 200 65193
"https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101
Firefox/42.0"
Then, 6 minutes later, the blog post from September, “What PD was told 4 and 5 May”:
64.95.198.68 - - [18/Nov/2015:13:41:30 -0700] "GET /blogs/?m=201509 HTTP/1.1" 200 11301
"http://lawrencechin2011.com/blogs/" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101
Firefox/42.0"
The women must be explaining to the detective that the suspect has violated the women’s
privacy. How could he have known what PD was told? It could only be that he has electronically
penetrated the women’s conversation. Then, the women show the detective the suspect’s Peace
Pink page, to demonstrate both how crazy he is and how he must be the person in PD’s and TG's
surveillance video. The detective then comes to the front page of the suspect’s website. It is
merely 4 minutes afterwards.
64.95.198.68 - - [18/Nov/2015:13:45:58 -0700] "GET / HTTP/1.1" 200 10670
"http://peacepink.ning.com/profile/lawrencechin?xg_source=activity" "Mozilla/5.0 (Windows
NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0"
At the front page, the German Lady then shows the detective the first chapter of “K’s meetups”,
to demonstrate to him that the suspect is suffering from bizarre paranoia delusion believing that
the German Lady has been part of some government (CIA’s) operation against him:
64.95.198.68 - - [18/Nov/2015:13:46:41 -0700] "GET
/karins_meetup_2bg2/karin's_meetup_2bg2d.pdf HTTP/1.1" 200 959742
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101
Firefox/42.0"
That is it. Within 15 minutes, the women have finished their demonstration: the suspect has
violated the women’s privacy, and yet harbors bizarre paranoia delusion about them and is
slandering them on the Internet, causing all these strangers to contact them to express concern for
their safety. The discussion has lasted almost 1 hour and 30 minutes. At the end of which, the
women would have already persuaded the detective to grant them “victim confidentiality” in
order to forbid him from ever looking at the suspect’s website himself. The women then want to
demonstrate to the detective that the suspect is motivated by his severe misogynist hatred. Now
that “victim confidentiality” has been granted, they could call up their friend in Montreal to
present to the detective “evidences” for the suspect’s “misogynist rambling”. Thus: 2:19 PM,
74.14.208.192, Bell Canada, dsl.bell.ca, Montreal.
50
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
74.14.208.192 - - [18/Nov/2015:15:19:19 -0700] "GET /sci/sci.pdf HTTP/1.1" 200 54329
"https://www.google.ca/" "Mozilla/5.0 (Linux; Android 4.4.2; en-ca; SM-G386W
Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.6 Chrome/28.0.1500.94
Mobile Safari/537.36"
74.14.208.192 - - [18/Nov/2015:15:19:25 -0700] "GET /sci/sci.pdf HTTP/1.1" 200 533007
"https://www.google.ca/" "Mozilla/5.0 (Linux; Android 4.4.2; en-ca; SM-G386W
Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.6 Chrome/28.0.1500.94
Mobile Safari/537.36"
This is the suspect’s scientific writing on the relationship between neoteny and the functioning of
Anglo-American justice system. Hardly anything like “misogynist rambling”. But, since the
detective is not allowed to look at the suspect’s writing himself, he couldn’t find out that the
Montreal woman’s horror story about the suspect’s “misogynist rambling” is all but bullshit.2
And so the women’s story about the suspect is: he is a computer-hacker who has stalked the poor
women online and penetrated their electronic communications to obtain information about them,
and then posted it on his website. He suffers from paranoia delusion about the women and
believes that they are part of some government conspiracy to go after him and have been filing
false stalking claims against him at the Threat Management Unit. He is motivated by his severe
misogynist hatred and rambles his hatred for women on his website. Last but not least, the
women say he is also a plagiarizer and has plagiarized scholarly works on his website and stolen
other people’s contents and put them on his website. The meeting has ended between 2:30 PM
and 3 PM, and the detective, horrified and angered by the demonizing portrayal, has agreed to
open an investigation on the suspect.
The women probably did not mention anything about the suspect's being under suspicion for
relationship with the Paris attacks, however. The women are not just doing this for their own
sake. Homeland Security has also wanted the women to persuade another law enforcement
agency to open up a case on the suspect. They are counting on the fact that the new law
enforcement agency, the detective from a tiny city without crimes and blinded by “victim
confidentiality”, will end up producing results that are completely wrong but which will confirm
Homeland Security's false profile of the suspect. Homeland Security needs to intercept this
wrong result into the ICJ as evidence in support of their case.
This point is very important, as the women must have learned from their experience with the
TMU. Because the TMU detectives are more experienced and sophisticated, and, on top of that,
are working with federal agencies – even the CIA – these ordinary women, dumb although full
of aggression, cannot expect to deceive them. They thus should target detectives from small
city's departments who are invariably inexperienced and unsophisticated and so easily deceived.
(Perhaps the “professional” has taught them so.) However, they have made one mistake here.
The women – having accessed the intercept of the suspect's conversation with W on 16
November – must have bought into his admission that law enforcement visits to his website are
2 KRN has a Facebook friend in Montreal who is an artist, a certain “Ara O s t e r w e i l”. This might be she.
51
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
not logged. In fact, the suspect was wrong. Thus the women are comfortable with the detective
visiting the suspect's website on the department's own computers – leaving behind traces all over.
Meanwhile, the suspect, after spending the whole night in Westwood without sleep – he is at
Kinkos and then comes back to Starbucks – comes to court, frightened to death, especially when
Ms Warren, his public defender, tells him to leave her his doctors’ info. Mike and Angela soon
show up to comfort him. (The suspect doesn't yet know that Angela is a Homeland Security
informant against him.) Then it turns out that the DA just wants restitution. The women have
clearly made a very bad impression on the DA last Friday, with all their irrelevant complaints
and stories. With Ms Warren and Angela in Ms Warren’s office. Ms Warren would not hear the
suspect's story about ANG’s victimization of him. Ms Warren portrays the suspect as a bad-tothe-bone male aggressor who, motivated by lust, just doesn’t know how to respect women’s
boundaries while ANG is portrayed as a poor victim of his disrespect and aggression, the
innocent prey of male lust who just wants to be left in peace. The exact opposite of reality. Ms
Warren is getting increasingly hostile to the suspect evidently because of Homeland Security
interview of her about the Paris attacks on 14 November. Homeland Security of course would
inform her the false story that the suspect is a paranoia schizophrenic of the worst sort – who has
imagined up ANG's gang's going after him – and, whether or not connected to the Paris attacks,
is exactly what ANG his poor victim has portrayed. Meanwhile, Homeland Security would say
nothing about ANG's true character. Already convinced that the suspect is incurably mentally ill,
Ms Warren of course will not hear anything he has to say. Instead, she wants him evaluated by
the doctor she has brought in. Also, convinced that ANG is the angelic victim, Ms Warren warns
the suspect that he faces prison time (“You are going to jail!”) if he doesn't remove his website.
Of course people don't go to jail for a website, but Ms Warren believes, in her mind, that it's her
duty to prevent this male monster from tormenting the poor ANG. And so she bluffs. Homeland
Security has successfully turned Ms Warren into the suspect's worst enemy by feeding to her
ANG's bizarre slanders about him. Furthermore, Ms Warren has become worried that the suspect
might become “obsessed with her” – which is another reason why she wants him evaluated by a
psychiatrist. Homeland Security's warning to Ms Warren on 14 November apparently also
includes ANG's false story that the suspect is prone to become obsessed with any female figure
and then stalk her and wouldn't let her go. The suspect can only be further offended by such nonunderstanding of his psychology: not only has he already completely shed his tendency to suffer
obsession with women – it will never happen again after SDW – but even the women he has
obsessed over in the past were all good-looking women – whereas Ms Warren looks like a
gorilla. Apparently, Ms Warren is so dumb as to not even understand that men usually only
pursue attractive women and ignore fat, unattractive ones. Frustrated, the suspect goes to lunch,
and Angela leaves. Then, the suspect goes to the psychiatric evaluation. Then, he comes back to
court. The judge is clearly biased against him: the same stereotype about males as “trouble
makers”. The suspect then rides the bus back to Westwood. Starbucks by early evening. That's
when he discovers, and is absolutely frightened by, the visits from the Manhattan Beach Police
Department. He calls up Mike about the matter. Afterwards, he begins changing his website.
By 7 PM, the detective has taken the first step of investigation. First, to collect evidences about
the suspect’s “plagiarism”. On 7:15 PM, 64.79.100.19: massive webcrawer.link activities
indexing the front page links just as the suspect has begun changing them.
52
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
64.79.100.19 - - [18/Nov/2015:20:14:58 -0700] "GET /robots.txt HTTP/1.1" 200 650
"http://www.lawrencechin2011.com/robots.txt" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:14:58 -0700] "GET / HTTP/1.1" 200 10632
"http://www.lawrencechin2011.com" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:14:59 -0700] "GET / HTTP/1.1" 200 10670 "-" "Mozilla"
64.79.100.19 - - [18/Nov/2015:20:14:59 -0700] "GET /blogs HTTP/1.1" 301 542
"http://www.lawrencechin2011.com/blogs" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:14:59 -0700] "GET /newsummaryweb.html HTTP/1.1" 200
68257 "http://www.lawrencechin2011.com/newsummaryweb.html" "Mozilla/5.0 (Windows NT
6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:15:00 -0700] "GET /archivedblogs HTTP/1.1" 301 558
"http://www.lawrencechin2011.com/archivedblogs" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:15:00 -0700] "GET /newsummaryweb.html HTTP/1.1" 200
68269 "-" "Mozilla"
64.79.100.19 - - [18/Nov/2015:20:15:00 -0700] "GET /archivedblogs2 HTTP/1.1" 404 1322
"http://www.lawrencechin2011.com/archivedblogs2" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:15:01 -0700] "GET /preface27rev5.html HTTP/1.1" 200
22319 "http://www.lawrencechin2011.com/preface27rev5.html" "Mozilla/5.0 (Windows NT 6.1;
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:15:01 -0700] "GET /preface27rev5.html HTTP/1.1" 200
22357 "-" "Mozilla"
64.79.100.19 - - [18/Nov/2015:20:14:59 -0700] "GET /blogs/ HTTP/1.1" 301 337
"http://www.lawrencechin2011.com/blogs" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:15:01 -0700] "GET /vol1appendixcont.html HTTP/1.1" 404
1322 "http://www.lawrencechin2011.com/vol1appendixcont.html" "Mozilla/5.0 (Windows NT
6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:15:01 -0700] "GET /karinsemail07/ HTTP/1.1" 200 459
"http://www.lawrencechin2011.com/karinsemail07/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:15:02 -0700] "GET /karinsemail07/ HTTP/1.1" 200 497 "-"
"Mozilla"
64.79.100.19 - - [18/Nov/2015:20:15:02 -0700] "GET /story_docu HTTP/1.1" 301 552
"http://www.lawrencechin2011.com/story_docu" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
64.79.100.19 - - [18/Nov/2015:20:15:02 -0700] "GET /vol1appendixcont.html HTTP/1.1" 404
1360 "-" "Mozilla"
….
64.79.100.19 - - [18/Nov/2015:20:15:08 -0700] "GET /petition/attachment12/ HTTP/1.1" 200
569 "-" "Mozilla"
53
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
64.79.100.19 - - [18/Nov/2015:20:15:08 -0700] "GET /lawsuit.html HTTP/1.1" 200 9781 "-"
"Mozilla"
But webcrawler.link would certainly show that the suspect’s website contains no plagiarized
materials.
Meanwhile, the suspect is in Starbucks continuing the work of removing his “Secret History”. By
7:45 PM, he has deleted his whole blog.
Around 8:20 PM, Blue Host's server suddenly goes down. By 8:57 PM, Blue Host server has
come back online. Our Manhattan Beach detective must have ordered Blue Host to pull out the
suspect’s whole website for examination offline. No hacking software would have been found
either, however.
Around this time, SDW posts a new blog post for the first time since 10 October. She has been
refraining from posting in order to pretend that she fears the suspect's cyberstalking. Now she
starts again – evidently to set a trap. On 1:15 AM, Scott S posts a comment on SDW’s latest blog
post. This should situate SDW’s blog post to some time tonight. It’s evident that SDW’s post and
Scott's comment are intended as a sting operation on the suspect. Scott, in his comment, provides
his location (Amherst, NY) and information about his talk show at Talk Shoe (Saturday, 4 PM).
Apparently, the gang has decided that, now that the detectives have accepted their case, they
should find ways to enable law enforcement to intercept the suspect’s “electronic penetration of
their communication” since they know quite well that the suspect has never hacked their
communications in any way. Thus SDW and Scott put up the sting posts hoping that the suspect
would see them and then clandestinely join in on the talk show, hear something, and then blog
about it, all under police surveillance, which would then enable the detective to obtain evidence
for the suspect’s “cyberstalking”.
19 November (Thursday)
It appears that, early morning, the Secret Society’s friends in the UK continue to stage the show
of “concerned strangers trying to track down who the author of the LB posting is”. The
“stranger” has now discovered the academic writings of the suspect: 8:23 AM, 81.104.208.22,
cable.virginm.net, Scunthorpe, UK.
81.104.208.22 - - [19/Nov/2015:09:23:35 -0700] "GET
/scientificenlightenment1/representation.html HTTP/1.1" 200 24645 "https://www.google.co.uk"
"Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0"
…
By 8:35 AM, she has come to the Table of Contents:
81.104.208.22 - - [19/Nov/2015:09:35:21 -0700] "GET /thermex2.html HTTP/1.1" 200 568
"http://www.lawrencechin2011.com/scientificenlightenment1/representation.html" "Mozilla/5.0
(Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0"
54
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
It’s evident that she will then pretend to contact the Secret Society women and broadcast the
news to everyone saying that she has identified the suspect’s academic writing, and that it
appears that he is merely plagiarizing scholarly works. The Secret Society women will then turn
this stranger’s communication to the detectives. Meanwhile, Homeland Security would have
intercepted another piece of evidence in support of their false profile of the suspect in the ICJ.
By 8:49 AM, the suspect's friend in Egypt, Robin, has sent the suspect a private message: to
verify his email address? Most likely. Since Robin is most likely TMU's (or FBI's) mole inside
the Secret Society, this is in effect a TMU/ CIA's agent here to collect evidences proving the
fraudulent nature of the evidences which Homeland Security is collecting in support of their
case.
Homeland Security is thus at the same time stuck with the problem of domestic feud with other
US agencies. We have seen that the moles inside the Secret Society (such as AAM) must have
played the function of disrupting Secret Society operations by encouraging the women to
discredit themselves, such as to the DA on 13 November. Homeland Security knows this, but
can't do anything about it. They can't just warn the Secret Society women, “Hey, don't trust so
and so, he's a mole from the FBI/ TMU”, for it's a violation of federal laws to knowingly reveal
the identities of federal agents or informants.
The Secret Society women have not yet known that the suspect has, by morning, completely
removed his “Secret History”. This is indication that Homeland Security is not in constant
communication with the women – in order to not “taint” the evidences they need. The women
have to do most of the work on their own in order not to leave behind traces showing that they
are only staging a show under Homeland Security direction (that Homeland Security is cheating
in the ICJ). “Witness coaching”. The women continue to instruct the group of “strangers”
(“volunteers”) originating from the LB forum to pretend to track down the suspect’s website and
identify him. After studying the suspect’s cache, the German Lady has noticed that the suspect
has inserted a lot of his own personal information in the Preface to “K’s meetups”. She thus
instructs one of the volunteers in Brooklyn to pretend to discover the Preface by accident and
match it up with the identification made so far of the author of the LB posting. Thus, on 5:50
PM, 67.81.30.224, dyn.optonline.net, Brooklyn, NY.
67.81.30.224 - - [19/Nov/2015:18:50:59 -0700] "GET /kmupreface15/kmupreface15d.pdf
HTTP/1.1" 404 1360 "http://www.google.com/search?
q=patriotism+honor+and+power+elites+relate+C.
+Wright+Mills&hl=en&gbv=2&prmd=ivns&ei=d3xOVtLLFIPTQGis4OgDw&start=10&sa=N" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8)
AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3"
When the Brooklyn friend reports to the German Lady saying that the chapter is not actually
online anymore, she must have been shocked. 30 minutes later, she asks the same South Korean
scout (who has been here four times already) to check on the suspect’s website: 6:29 PM,
221.145.183.167. It is then that the Secret Society women have at last discovered that the
suspect’s website has gone offline.
55
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
221.145.183.167 - - [19/Nov/2015:19:29:01 -0700] "GET / HTTP/1.1" 200 4527
"http://www.birthdayexpress.com/" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1)"
221.145.183.167 - - [19/Nov/2015:19:29:03 -0700] "GET / HTTP/1.1" 200 2268
"https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)"
221.145.183.167 - - [19/Nov/2015:19:29:03 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360
"https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)"
Meanwhile, on 7:24 PM, while in Starbucks (Little Tokyo), the suspect changes his profile
picture at Peace Pink.
Then, around 8:20 PM, the suspect surfs onto SDW’s blog. When he clicks on the latest post,
however, the page is first blocked, and then connected. It’s law enforcement’s collection of
evidence for his “cyberstalking” of SDW.
The women must be discussing all night long about what to do: now that the suspect’s “Secret
History” has disappeared, it’s no longer possible to stage the show “concerned strangers, freaked
out by the LB posting, tracks down its author and discovers his grave insanity and harassment
and stalking of the Secret Society women”.
On 12:05 AM, Robin (Egypt) sends the suspect another private message.
Probably because the Secret Society women are discussing new strategies, there are very few
visits tonight. A noteworthy activity occurs on 3:27 AM,
173.252.102.116 - - [20/Nov/2015:04:27:23 -0700] "GET /blogs/2012/04/28/the-difficult-searchfor-a-microchip-inside-my-head-part-iii HTTP/1.1" 404 1322 "-" "facebookexternalhit/1.1"
173.252.102.115 - - [20/Nov/2015:04:27:28 -0700] "GET /blogs/2012/04/28/about:blank
HTTP/1.1" 404 1322 "-" "facebookexternalhit/1.1"
31.13.112.120 - - [20/Nov/2015:04:27:35 -0700] "GET /blogs/2012/04/28/the-difficult-searchfor-a-microchip-inside-my-head-part-iii HTTP/1.1" 404 1322 "-" "facebookexternalhit/1.1"
31.13.112.119 - - [20/Nov/2015:04:27:39 -0700] "GET /blogs/2012/04/28/about:blank
HTTP/1.1" 404 1322 "-" "facebookexternalhit/1.1"
This means that a Facebook page on which the suspect's old blog post on brain-chip is linked is
being examined. Is this one of the Secret Society's Secret Facebook Groups? Perhaps, while
brainstorming, the women have gone back to the Secret Facebook Groups and reviewed some of
the old ideas that have been posted there, in the process calling up the suspect's old blog post
which has already been removed.
20 November (Friday)
The Secret Society’s operation: 6:09 AM, 168.235.200.95, Quantil, confirmed proxy server,
Pasadena. This person seems to be an Indian girl residing in the United States (“en-us”: in fact in
the Los Angeles area) since the IP address shows up on the log of aeparc.org:
56
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
168.235.200.95 - - [20/Nov/2015:07:09:15 -0700] "GET
/petition/c0901379jl/sf_c0901379jl_redo.pdf HTTP/1.1" 404 1360
"http://www.google.co.in/search?ie=ISO-8859-1&q=www.blaeleed.com&btnG=Search"
"Mozilla/5.0 (Linux; U; Android 4.4.2; en-US; Aqua Star II Build/KOT49H)
AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/10.7.5.658 U3/0.8.0
Mobile Safari/534.30"
57
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
The search is supposed to look like this:
It thus seems that this is part of the staged show “another concerned netizen accidentally
discovers the true identity of the author of the LB posting and relates it to the Secret Society
women and then law enforcement”. However, the document is not there anymore. The Secret
Society women must be frustrated.
58
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Then, less than 30 minutes later, the Secret Society’s friend in Thailand continues to pretend to
track down the suspect: 6:36 AM, 49.228.96.168, Fixed Broadband Network, Thailand (no more
information available). Immediately he goes to the gallery.
49.228.96.168 - - [20/Nov/2015:07:36:05 -0700] "GET /gallery/perspective2.jpg HTTP/1.1" 200
45626 "https://www.google.co.th/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
49.228.96.168 - - [20/Nov/2015:07:36:54 -0700] "GET /gallery/gallery.html HTTP/1.1" 200
4395 "http://www.lawrencechin2011.com/gallery/perspective.html" "Mozilla/5.0 (Windows NT
6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
Yes, he has discovered the suspect. But the materials are harmless. It seems that he is simply to
rumor, “Look, I think he has plagiarized his theory on linear perspective”. “Concerned citizens”
continue to discover that the author of the LB posting is a plagiarizer. Homeland Security
continues to bring the intercepts of these staged rumors into the ICJ as evidence in support of
their false profile of the suspect. Then, on 2:47 PM, 128.197.173.248, Boston University,
Massachusetts.
128.197.173.248 - - [20/Nov/2015:15:47:03 -0700] "GET
/readings/Audacity_kompakt_Leseprobe.pdf HTTP/1.1" 200 3141377 "https://www.google.com"
"Mozilla/5.0 (X11; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
The same thing. “Concerned citizens” have discovered that the suspect has stolen other people’s
contents and put them on his website. This “concerned netizen's” testimony carries special
weight since he is a student from a prestigious university. This is important since webcrawler.link
has not discovered any plagiarized materials on the suspect’s website. More evidence in favor of
Homeland Security in the ICJ.
In response, on 3:28 PM, the suspect, in Starbucks, Westwood, at the time, has even changed the
URL of /roach and /readings. He then logs into Couch Surfing – he hasn't done it for a long time
– and offers his service to a Russian woman who is a flight attendant (“Marina”) and a Chinese
girl who is coming from New Zealand.
Around 6:47 PM, the suspect has a phone conversation with his best friend W (from 53:00
onward in the recording). The details of the conversation are as follows: (1) the women have
discredited themselves on 13 November, and the DA no longer wants any trial. (2) About the
women's new complaint against the suspect at another city's police department. W: “It's illegal.”
(3) The suspect believes the women are slandering him online (staged “online harassment”). (4)
The suspect's suspicion that the women have access to what he says to W. (5) Alexandra might
take W to Concord, Massachusetts. (6) W assures the suspect that he has never recorded him and
left the recording somewhere online for the women to find. (7) Worried about FN. The new
alliance France-US-Russia against ISIS might be related to the ICJ judgment (previous). The
conversation tonight is not very long.
59
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Then, on 8:35 PM, the St. John’s College person from 15 November, 4:55 PM, comes to do some
scouting for the Secret Society: 204.69.190.254, St John’s College, Santa Fe.
204.69.190.254 - - [20/Nov/2015:21:35:42 -0700] "GET /newsummaryweb.html HTTP/1.1" 404
1360 "https://www.google.com" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
204.69.190.254 - - [20/Nov/2015:21:35:46 -0700] "GET /timelinepartIII-s/timelinepartIII-s.pdf
HTTP/1.1" 404 1360 "https://www.google.com" "Mozilla/5.0 (Windows NT 10.0; WOW64;
rv:42.0) Gecko/20100101 Firefox/42.0"
Bad news. All the materials are gone. As the story about “crazy guy who suffers schizophrenic
delusion believing that these poor women are going after him” is going viral online (all a staged
show), more and more netizens volunteer to search for his traces only to have to rumor that he
has removed many of his crazy materials. Nevertheless, the St John's College person will
probably now pretend to be somebody “who remembers”: “Yes, I have been onto his website
before. I know this guy. He used to post all this crazy stuff about having an electronic chip stuck
inside his brain and a group of women going after him as part of some government conspiracy
against him. Even though he has removed the materials, I can testify that I have seen it.” Thus,
both the detective and Homeland Security will have their evidences nonetheless.
On 11:41 PM, the Secret Society tries again: 76.254.66.115, dsl.pltn13.sbcglobal.net, Oakland,
CA.
76.254.66.115 - - [21/Nov/2015:00:41:57 -0700] "GET /cheneyplan25/cheneyplan25.pdf
HTTP/1.1" 404 1360 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; WOW64;
rv:42.0) Gecko/20100101 Firefox/42.0"
The Oakland person also couldn’t pretend to have discovered, after tracking down the author of
the LB posting, that he suffers grave insanity (for believing in all the government conspiracies
and being chipped in the brain). We can therefore safely assume that this Oakland person will be
another one “who remembers”, supplying the same testimony as the previous St John's College
person.
21 November (Saturday)
Without many volunteers' pretending to remember seeing the suspect's website before, the Secret
Society women’s project would have been in jeopardy. And with it, Homeland Security's case in
the ICJ. They would be missing a huge chunk of evidences for the suspect's incurable
schizophrenia. It would be better, of course, if “strangers” could still pretend to discover the
suspect’s personal information and find evidences for his grave insanity. The German Lady must
have, in the past seven days, read through his essay on Le Pen. There are several characteristics
about this essay which must have caught her eyes: (1) The name “KRN” is mentioned one time,
although without a last name; and (2) at the end of the essay the suspect mentions something
about being gang-stalked by a group of women for three years. (3) Furthermore, the criticism of
60
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
American feminism in the essay, though all reasonable, can be used to convince most people that
the suspect is a misogynist since most people do not have the time to read anything and do not
have the capacity for reasoning.
Given the controversy which would surround this “Marine document” in the ICJ, i.e. that it is
proof that the suspect is a high functioning intellectual, we can imagine that Homeland Security
is still desperate to discredit his genius. We have seen how the Secret Society women have once
instructed their members (like Francesca in Switzerland) to plagiarize the suspect in order to
accuse the suspect of plagiarism at law enforcement. Seeing that the suspect, in the second half
of the essay, is mostly recycling his old writings on his blog from 2014 and that he has been
compelled to remove his blog from his website, Homeland Security must have decided to use the
Secret Society women again to discredit the suspect. That is, the Secret Society women shall
have somebody plagiarize the suspect again so that, while they accuse the suspect of plagiarism
behind his back at law enforcement, Homeland Security might intercept more evidences into the
ICJ showing the suspect to have plagiarized all his good ideas from somebody else and to be
therefore nothing like a high functioning intellectual.
On 6:56 AM, the Secret Society sends another agent pretending to be a stranger who has been
caught up in the viral created by the suspect's LB posting and who also joins in on the
investigation: 50.178.107.23, hsd1.il.comcast.net, Chicago. She pretends to Google for the
suspect whom everybody has already identified and to arrive at the suspect’s web gallery:
50.178.107.23 - - [21/Nov/2015:07:56:52 -0700] "GET /gallery/gallery.html HTTP/1.1" 200
4452 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5)
AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7"
…
Within one minute she comes to the external links page:
50.178.107.23 - - [21/Nov/2015:07:57:00 -0700] "GET /gallery/linkex.html HTTP/1.1" 200
10198 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5)
AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7"
…
Within two minutes she comes to the front page:
50.178.107.23 - - [21/Nov/2015:07:59:17 -0700] "GET / HTTP/1.1" 200 2266
"http://www.lawrencechin2011.com/gallery/linkex.html" "Mozilla/5.0 (Macintosh; Intel Mac OS
X 10_10_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7"
…
And she immediately – because she is following the instruction (the “script”) given her – comes
to the essay on Le Pen:
50.178.107.23 - - [21/Nov/2015:07:59:39 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200
701933 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_10_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7"
61
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
She would rumor back to the crowd that the author of this essay seems indeed to be the author of
the LB posting because he mentions at the end of the essay something about being gang-stalked
by a group of women for three years. He also mentions a woman named “KRN”. Moreover, the
essay is “full of misogynist rambling”. As instructed by the Secret Society women, she would
pretend to contact the Secret Society women themselves to tell them about this. Then, all of a
sudden, it would be discovered that many of the suspect's ideas in the document are found
elsewhere. Meanwhile, since the debate is still raging over the content of the suspect's “Marine
document”, Homeland Security is able to bring in another piece of evidence to the ICJ showing
that this document is in fact full of plagiarized crap and misogynist rambling and slandering
about the women.
Then, as the rumor about the further identification of the author of the LB posting spreads, the
same Richmond Hill person who was here on 17 November, 11:07 AM, comes also. It is only
two hours later: 9:11 AM, 99.238.175.189, net.cable.rogers.com, Richmond Hill, Ontario.
99.238.175.189 - - [21/Nov/2015:10:11:36 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200
701933
"http://r.search.yahoo.com/_ylt=A0LEVvXZektWLRoA.i4XFwx.;_ylu=X3oDMTBzZTdrbmk3
BHNlYwNzcgRwb3MDMTQEY29sbwNiZjEEdnRpZAM-/RV=2/RE=1447816025/RO=10/RU
=http%3a%2f%2fwww.lawrencechin2011.com
%2flepen3%2flepen3l.pdf/RK=0/RS=W2nSiW8heiGDQbzIMNviwB5aBpY-" "Mozilla/5.0
(Windows NT 10.0; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
Why is she here again looking at the same document? It must be because the news that the
suspect has plagiarized in this document has reached her too so that she is coming to peek into
the matter for herself. And, of course, she confirms it. Homeland Security needs even more
testimonies to strengthen their case that the suspect's “Marine document” is an evil piece of shit
and full of plagiarized crap.
Meanwhile, the group of “concerned netizens” continues to pretend to track down the author of
the LB posting – only to discover that he is a plagiarizer, so the “script” goes. On 9:53 AM,
75.118.170.143, wideopenwest.com, Columbus, Ohio.
75.118.170.143 - - [21/Nov/2015:10:53:47 -0700] "GET
/scientificenlightenment1/daodejin222.html HTTP/1.1" 200 17844
"http://r.search.yahoo.com/_ylt=A0LEVj6nr1BWD2IAoQMnnIlQ;_ylu=X3oDMTE0MGhyOW
FlBGNvbG8DYmYxBHBvcwMxBHZ0aWQDUFJEQkNLMV8xBHNlYwNzcg--/RV=2/RE=14
48157224/RO=10/RU=http%3a%2f%2flawrencechin2011.com
%2fscientificenlightenment1%2fdaodejin222.html/RK=0/RS=nbQ8ZuN3GXLhiD3qrFVwrsYb0
PM-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0"
After he has discovered the suspect’s chapter on Daoism, he looks at the previous chapter, and
then the Table of Contents, all within two minutes. (Since he is just “acting”, he doesn't linger
very long to actually read anything. Normally, of course, it takes more than two minutes to
discover that a book is entirely plagiarized.)
62
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
75.118.170.143 - - [21/Nov/2015:10:55:18 -0700] "GET /scientificenlightenment1/daodejin.html
HTTP/1.1" 200 23037
"http://lawrencechin2011.com/scientificenlightenment1/daodejin222.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0"
75.118.170.143 - - [21/Nov/2015:10:55:22 -0700] "GET /thermfr2.html HTTP/1.1" 200 907
"http://www.lawrencechin2011.com/thermex2.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10.10; rv:41.0) Gecko/20100101 Firefox/41.0"
And so on. We shall not list the other attempts here. Although the Secret Society women have
suffered a major defeat because the suspect’s “Secret History” has disappeared, they are still
betting that he would clandestinely call in on Scott’s Talk Shoe episode on 4 PM, thus producing
concrete evidence, for law enforcement, for his electronic stalking of the Secret Society women.
The suspect, in Casbah at the time, is continually tipped off. On 3:28 PM, he goes to his AVFM
posting from his website’s links page, and is at first blocked. He is now aware that law
enforcement has isolated his posting on AVFM as well, so that the Secret Society women would
know about it too.
Then, the suspect posts a note on AVFM expressing his wish for men's rights movement in the
US to connect up with the European far right parties. While the suspect posts this because he is
worrying about having uttered too many anti-American statements, this would be evidence in
favor of the Russians and the French, and against Homeland Security. Then, on 4 PM, the
suspect never calls in on Scott’s Talk Shoe show. Instead, he is applying for a job online.
On 7:25 PM, when the suspect goes to the LB posting from his website’s links page, he is again
blocked. The detective is collecting evidence about the suspect's being the author of this posting
as well.
The Secret Society women must feel like they have suffered another horrible defeat. Their
prediction to law enforcement detective that the suspect would be spying on them has never
materialized. Their case against the suspect is quickly falling apart. All they could do at the
moment is to concentrate on the suspect’s supposed plagiarism and misogyny. Thus, under the
German Lady’s direction, the rumor about the suspect’s plagiarism keeps on spreading. Another
Vancouver person has pretended to get wind of it, and, on 10:23 PM, comes for a look. Again,
the chapter on Daoism, to confirm the testimony made on 9:53 AM.
50.67.29.61 - - [21/Nov/2015:23:23:15 -0700] "GET /scientificenlightenment1/daodejin.html
HTTP/1.1" 200 23037 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101
Firefox/42.0"
50.67.29.61 - - [21/Nov/2015:23:23:16 -0700] "GET /scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12120 "http://lawrencechin2011.com/scientificenlightenment1/daodejin.html"
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
63
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
50.67.29.61 - - [21/Nov/2015:23:23:16 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-"
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
Now there is another person to bear (false) witness to the suspect’s plagiarism. And more
evidence for Homeland Security as well. Late night, home. The suspect posts the first indication
of his awareness of the new law enforcement investigation of him.
“It appears that, four days ago, the gang of women, G, J, K, and M, were able to get two of their
friends to help them file a case of online harassment and cyberstalking against me (using the
method “false flag online harassment” noted above) at another city’s police department after
their case against me at my own city (at the TMU) was dismissed.”
This is supposed to have gravely upset the Secret Society women: the suspect is able to keep up
with their secret activities after all – the story that law enforcement visits to his website do not
show up on his log is all but a lie. The Secret Society women are now prompted to close their
new case at the Manhattan Beach Police Department and open a new one at another city's police
department. As usual, they would instruct the Manhattan Beach Police Department detective to
abide by the confidentiality agreement and to never reveal the existence of the case to anybody,
even to detectives from other departments.
Then, on 1:29 AM, Hutchison Global Communications, Hong Kong,
221.127.28.137 - - [22/Nov/2015:02:29:10 -0700] "GET /1/layereduniverse.html HTTP/1.1" 200
34939 "https://www.google.com.hk/" "Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
This Hong Kong person is also an actor pretending to be a stranger joining in on the campaign to
identify the suspect only to discover that he is a plagiarizer. Then, on 3:34 AM, hkcable.com.hk,
Hong Kong,
218.252.57.12 - - [22/Nov/2015:04:34:26 -0700] "GET /1/epilogue330.html HTTP/1.1" 200
25916 "https://www.google.com.hk/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
218.252.57.12 - - [22/Nov/2015:04:34:26 -0700] "GET /1/athd2.jpg HTTP/1.1" 200 12120
"http://www.lawrencechin2011.com/1/epilogue330.html" "Mozilla/5.0 (Windows NT 6.1;
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
218.252.57.12 - - [22/Nov/2015:04:34:27 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/1/epilogue330.html" "Mozilla/5.0 (Windows NT 6.1;
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
This second Hong Kong person is here to bear false witness both to the suspect’s misogyny and
to his plagiarism.
22 November (Sunday; Orphism)
64
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Today, because the Secret Society women no longer have any case about the suspect’s “grave
insanity” and “online harassment”, and because their case has been exposed to the suspect in any
case, they are going to focus their entire efforts on artificially producing evidences for his
“plagiarism” and “misogyny” for Homeland Security's case in the ICJ. Meanwhile they would be
looking for a new police department elsewhere, where the detectives would also be too dumb and
uneducated to be ever able to distinguish that all these testimonies they will supply him are
complete bullshit.
5:31 AM, 81.154.39.11, BT, Mold, UK.
81.154.39.11 - - [22/Nov/2015:06:31:49 -0700] "GET /1/chinesepatriarchy220.htm HTTP/1.1"
200 32775 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
More chatter about the suspect’s misogynist rambling and plagiarism.
6:42 AM, 64.233.172.175, orphism.html, Google IN, Google proxy, Android 4.2.1, en-us. More
chatter about the suspect's plagiarism. This chapter on Orphism is about to go viral. Stay tuned.
7:20 AM, 142.134.104.2, highspeed.nl.bellaliant.net, Gander, Newfound Land, Canada.
142.134.104.2 - - [22/Nov/2015:08:20:14 -0700] "GET /1/epilogue225.html HTTP/1.1" 200
83648 "https://www.google.ca/" "Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X)
AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1"
More chatter about the suspect’s misogynist rambling (although this chapter, a severe criticism of
“victim feminism”, is indeed derogatory about American feminism).
8:57 AM, 141.0.11.216, Opera Mini.
141.0.11.216 - - [22/Nov/2015:09:57:51 -0700] "GET /1/appendix.html HTTP/1.1" 200 76624
"http://www.google.com.bd/search?
q=English+as+a+fusional,agglutinating+and+Isolating+language&client=ms-opera-miniandroid&channel=new&hl=bn&prmd=ivns&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjl0
Jj4v6TJAhUHKYgKHRR2APoQ_AUIBigB" "Opera/9.80 (Android; Opera
Mini/7.5.35199/37.7148; U; en) Presto/2.12.423 Version/12.16"
This person in Bangladesh shall also bear witness to the suspect’s plagiarism. As you can see, the
German Lady is employing the same method she has promoted last year: if the suspect quotes
from other authors in his writings, then just say he has plagiarized.
Now the Secret Society women still wish to produce, for Homeland Security's case in the ICJ,
evidences for the suspect’s “grave insanity” (such as belief in brain chips). On 9:32 AM, the
women have another Wisconsin person search for them: 72.135.123.16, new.res.rr.com,
Appleton, Wisconsin.
65
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
72.135.123.16 - - [22/Nov/2015:10:32:24 -0700] "GET /cheneyplan25/cheneyplan25.pdf
HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS
X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1"
This is probably another person who has “remembered”. Then another Belgian pretends to
stumble upon the suspect’s website’s front page: 10:50 AM, 81.240.51.101, isp.belgacom.be,
Antwerp.
81.240.51.101 - - [22/Nov/2015:11:50:03 -0700] "GET / HTTP/1.1" 200 2266
"https://www.google.be/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
Then, another testimony about the suspect's plagiarism. 1:04 PM, 141.114.238.211, emilygagne.wireless.um.maine.edu, Gorham, Maine. University of Maine.
141.114.238.211 - - [22/Nov/2015:14:04:41 -0700] "GET
/scientificenlightenment1/presocratics.html HTTP/1.1" 200 20438 "https://www.google.com/"
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/601.2.7 (KHTML, like
Gecko) Version/9.0.1 Safari/601.2.7"
The Secret Society women have found another university student to do the “chatter” in order to
enhance its credibility. Meanwhile, the suspect arrives at St Sophia late, past noon: goodbye
luncheon for Fr Alan. Scolded by Mike. (“The conversation about the Secret Society women
can't go on anymore.”) He talks with Angela and Johanna. Johanna gives him her email address.
Then, another testimony about the suspect's misogyny: 1:52 PM, 176.9.7.169, clients.yourserver.de.
176.9.7.169 - - [22/Nov/2015:14:52:17 -0700] "GET /1/culturalfeminism.html HTTP/1.1" 200
147025 "http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=content" "Mozilla/5.0
(compatible; Konqueror/3.2; Linux 2.6.2)"
Another testimony about the suspect's plagiarism: 3:31 PM, 75.118.170.143,
try.wideopenwest.com, Columbus, Ohio.
75.118.170.143 - - [22/Nov/2015:16:31:38 -0700] "GET /HTcontribution1-philosophy.htm
HTTP/1.1" 200 13966 "http://www.lawrencechin2011.com/thermfr2.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0"
Then, 3:34 PM, 92.2.39.155, orphism.html, Google UK, Talk Talk, Porth, UK.
92.2.39.155 - - [22/Nov/2015:16:34:56 -0700] "GET /scientificenlightenment1/orphism.html
HTTP/1.1" 200 39990 "https://www.google.co.uk/" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_9_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/537.86.2"
3:39 PM, 92.2.39.155, orphism.html is linked from Facebook. Somehow the 6:42 AM person –
evidently an Indian girl living in Los Angeles – has suggested to the German Lady that stronger
66
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
evidences can be produced for Homeland Security's case in the ICJ using the suspect's chapter on
Orphism. They have found somebody who runs a Facebook group, “Bacchic Orphism”, where
there are plenty of “experts” on the topic. This “somebody” is this Porth person. After 9 hours,
this Porth person has responded and agreed to help. He thus links the suspect’s chapter on
Orphism from his Facebook group “Bacchic Orphism”.
The linking is “open” (for the suspect to discover) because it is also a decoy operation. The
“professional” has taught the women that they need to get volunteers to link the suspect’s
writings from their Facebook pages in order to create the appearance that the past linking of the
suspect’s chapters from Facebook did not necessarily point to the existence of a “Secret
Facebook Group” devoted to his website but might just be somebody showing interest in his
work and linking it from his or her Facebook page. Furthermore, by doing this, the volunteers
hope to deceive the suspect – perhaps in order to “keep the women safe” – into the impression
that, as his website is going viral, this is due to people loving his writings rather than to more and
more people becoming concerned with this mental health. This of course wouldn’t really fool the
suspect for long, since, in the entire past 17 years of his website’s existence, such attention to his
website has virtually never happened: that’s how apathetic people are nowadays.
3:43 PM, 174.55.176.147, orphism.html, direct visit, hsd1.pa.comcast.net, Lewistown,
Pennsylvania. The suspect's chapter on Orphism begins going viral, as more “volunteers” are
discovering it to be plagiarized and passing the link to it from person to person.
Then, another testimony that the suspect's writing on Daoism is plagiarized: 5:15 PM,
172.56.28.64, daodejin222.html, direct visit, T-Mobile USA, Philadelphia.
67
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
172.56.28.64 - - [22/Nov/2015:18:15:29 -0700] "GET /scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12120 "-" "Mozilla/5.0 (Linux; Android 5.0.1; SM-N910T Build/LRX22C)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.76 Mobile Safari/537.36"
172.56.28.64 - - [22/Nov/2015:18:15:34 -0700] "GET
/scientificenlightenment1/daodejin222.html HTTP/1.1" 200 17806 "-" "Mozilla/5.0 (Linux;
Android 5.0.1; SM-N910T Build/LRX22C) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.76 Mobile Safari/537.36"
172.56.28.64 - - [22/Nov/2015:18:15:36 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://lawrencechin2011.com/scientificenlightenment1/daodejin222.html" "Mozilla/5.0 (Linux;
Android 5.0.1; SM-N910T Build/LRX22C) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.76 Mobile Safari/537.36"
5:52 PM, 206.45.38.58, orphism.html, from Facebook, dynamic.mtsallstream.net, Winnipeg,
Manitoba.
6:30 PM, 173.48.174.85, orphism.html, from /m.facebook.com, iPhone, bstnma.fios.verizon.net,
Arlington, Massachusetts.
7:39 PM, 207.140.33.203, orphism.html, from /m.facebook.com, iPhone. AT&T, Kennett,
Missouri. Many volunteers are clicking on the suspect's chapter from “Bacchic Orphism” and are
pretend to rumor, “Hey, it looks like this guy is just plagiarizing. And I think I have heard of him
elsewhere. It's the guy who believes he is being gone after by a bunch of women and has a
microchip implanted in his brain!”
9:40 PM, 186.54.171.245, anteldata.net.uy, Montevideo, Uruguay.
186.54.171.245 - - [22/Nov/2015:22:40:58 -0700] "GET /blogs/ HTTP/1.1" 301 375
"http://mind-control-torture.blogspot.com.uy/2014/04/the-nonsense-about-gang-stalking.html"
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
The person seems to be the author of the very blog from which the visit has come. This visit is
particularly damaging – and a very special piece of evidence which Homeland Security needs.
The suspect has, more than an year ago, left a note on this guy's blog saying that the microchip in
his brain is programing him to become especially paranoid and to misinterpret accidental
environmental details as intentionally orchestrated, and that much of the gang-stalking
phenomenon may have originated in this way. Now, the women want this admission from the
suspect himself to present to their next detective proving that the suspect has indeed imagined up
their gang-stalking of him and false reporting about him, and Homeland Security needs this piece
of evidence to confirm their false profile of the suspect as mentally insane (in that he has
imagined up both the women's gang-stalking and false prosecution of him and the implantation
of a chip inside his brain).
68
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Note that, on 10:57 PM, Marina logs into Couch Surfing, but still has not declined the suspect's
offer. Perhaps she has already been contacted by Homeland Security: “This guy is a psychopath
pervert and maybe a secret agent of your government. Do not accept his offer. But do not decline
it either, for he might retaliate.”
23 November (Monday)
69
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Today, Putin will meet with the Iranian president to sign a 5 billion dollar trade agreement and to
provid Iran with SA-300 ground-to-air missiles. This act might have provoked the Republicans
to perform the stunt which you will see on 16 December.
12:19 AM, the suspect, at home, deletes his comment at mind-conrol-torture.blogspot.com.uy.
Meanwhile, the chatter about the suspect's chapter on Orphism (“He has plagiarized”) continues.
12:32 AM, Bell Canada, London, Ontario,
64.229.122.17 - - [23/Nov/2015:01:32:12 -0700] "GET /scientificenlightenment1/orphism.html
HTTP/1.1" 200 39990 "https://www.facebook.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
The person will definitely rumor, “It looks like this guy is just copying contents from books.”
Then, 1:22 AM, Free FAS, Toulouse, France,
82.236.120.201 - - [23/Nov/2015:02:22:08 -0700] "GET
/scientificenlightenment1/magicsquare.html HTTP/1.1" 200 10309 "https://www.google.fr"
"Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0"
More rumoring about the suspect's plagiarism. Etc.
5:39 AM, 73.167.49.133, orphism.html, from Facebook, vt.comcast.net, Montpelier, Vermont.
Another volunteer has discovered the suspect's plagiarism.
6:18 AM, 81.82.251.56, presocratics.html, Google BE, static.telenet.be, Bruges. Another chatter
about the suspect's plagiarism.
7:26 AM, 54.169.158.246, from interpreteeg007.blog.163.com.
54.169.158.246 - - [23/Nov/2015:08:26:27 -0700] "GET /2012/92012-8.png HTTP/1.0" 200
831587 "http://interpreteeg007.blog.163.com/blog/static/2060561642013628801821/"
"Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N; wv) AppleWebKit/537.36
(KHTML, like Gecko) Version/4.0 Chrome/FreeBrowser Mobile Safari/537.36 FreeBrowser/23"
70
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
This guy in China has copied the suspect's entire blog post onto his own site. Thank God, the
Secret Society women must have thought, for the volunteers are now able to track down this
“cache” which proves that the suspect has once blogged about having microchips stuck inside his
brain. He is truly insane! And Homeland Security is happy to intercept another piece of evidence
in support of their false profile of the suspect.
71
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Since this Chinese guy was copying the suspect, it's not clear whether the Secret Society women
have also made out of this episode another round of chatter about how the suspect has copied
other people's web content.
10 AM, 69.71.0.1, perspective.html, Google Images, Monett, Missouri, Total Highspeed LLC.
More chatter about how the suspect has plagiarized his theory on linear perspective.
10:39 AM, 5.169.143.196, orphism.html, Google IT, Telecom Italia Mobile, Italy. More chatter.
12:47 PM, 187.189.169.212, orphism.html, from Facebook, iusacell.net, Guadalajara. More
chatter.
1:27 PM, 69.171.231.225, 2012/04/28 (brain chip III), from Facebook, Linux. (Facebook IP
address)
69.171.231.225 - - [23/Nov/2015:14:27:30 -0700] "GET /blogs/2012/04/28/the-difficult-searchfor-a-microchip-inside-my-head-part-iii HTTP/1.1" 404 1360 "http://l.facebook.com/lsr.php?
u=http%3A%2F%2Fwww.lawrencechin2011.com%2Fblogs%2F2012%2F04%2F28%2Fthedifficult-search-for-a-microchip-inside-my-head-part-iii&ext=1448314350&hash=Acm5jkvEntJmNu5DmKwUV4PAAGv4vtJIDqjz9BwD_88Og" "Mozilla/5.0 (X11; Linux x86_64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.101 Safari/537.36"
69.171.231.226 - - [23/Nov/2015:14:27:31 -0700] "GET /blogs/2012/04/28/about:blank
HTTP/1.1" 404 1360 "http://l.facebook.com/lsr.php?u=http%3A%2F%2Flawrencechin2011.com
%2Fblogs%2F2012%2F04%2F28%2Fabout
%3Ablank&ext=1448314350&hash=AclJBzU7fVKsdCNHfbZf8sqz5FRyixH7we-Id4r6JjhjOA"
"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/45.0.2454.101 Safari/537.36"
It must be that the Secret Society women's associates have in the past, as instructed, linked the
blog post from their own Facebook pages, and are now pretending to be re-checking it: “Oh, I
think I remember this guy who talks about electronic chips being implanted inside his brain. I
have even linked it from my Facebook, because it was just so funny! Let me see...” He then does
not find the post anymore, but at least what he says gets intercepted into the ICJ to support
Homeland Security's case.
1:40 PM, 108.185.115.15, socal.res.rr.com, Studio City.
108.185.115.15 - - [23/Nov/2015:14:40:43 -0700] "GET /scientificenlightenment1/aztec.html
HTTP/1.1" 304 162 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
It would seem to be chatter about how the suspect has feigned artistic talent (poorly drawn
diagram) and plagiarized (a large bloc of quotation in the chapter). But, given the fact that this
volunteer would return repeatedly looking at this chapter, it's most likely a decoy.
2:03 PM, athd2.jpg called up from Facebook. What's this about? The portion of the Secret
Facebook Group in which this image is linked is being accessed.
72
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Meanwhile, the suspect has awakened late and so missed his planned trip to Work Source. He
buys a pair of new pants at Goodwill, 11:30 AM, left home. Interview at Ross, 2 PM. Didn’t go
well. Hatred for Americans. He then comes back to downtown.
2:42 PM, 99.237.228.191, cable.rogers.com, Richmond Hill, Ontario.
99.237.228.191 - - [23/Nov/2015:15:42:49 -0700] "GET /gallery/perspective.html HTTP/1.1"
200 2659 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:40.0)
Gecko/20100101 IceDragon/40.1.1.18 Firefox/40.0.2"
This person is probably related to the Richmond Hill person looking for “Le Pen” on 17 and 21
November. On minutes later,
99.237.228.191 - - [23/Nov/2015:15:43:03 -0700] "GET /gallery/newgoddessA.html HTTP/1.1"
200 838 "http://www.lawrencechin2011.com/gallery/perspective.html" "Mozilla/5.0 (Windows
NT 6.3; WOW64; rv:40.0) Gecko/20100101 IceDragon/40.1.1.18 Firefox/40.0.2"
99.237.228.191 - - [23/Nov/2015:15:43:18 -0700] "GET /gallery/xper.html HTTP/1.1" 200 1079
"http://www.lawrencechin2011.com/gallery/perspective.html" "Mozilla/5.0 (Windows NT 6.3;
WOW64; rv:40.0) Gecko/20100101 IceDragon/40.1.1.18 Firefox/40.0.2"
More rumor about how the suspect has plagiarized his theory on linear perspective.
Meanwhile, 4 PM, the suspect is at the public library, downtown. Internet connection blocked.
Connection soon restored. 4:32 PM, access to Facebook blocked. Connection then restored. Then
Internet shut down again. It doesn’t seem to be police actions, however. Chrysalis, Tanisha,
Men’s Groups. There is a group discussion about brain-death through digital technology and
brain chips. Then, Starbucks, Westwood. The suspect would stay there all night, until 2 AM. On
7:20 PM, he changes his profile picture at Facebook. 9:54 PM, he sends a private message to
“Bacchic Orphism” on Facebook (using his other Facebook page to hide his identity). He wants
to investigate whether this “Bacchic Orphism” is related to the Secret Society's operation.
12:10 AM, 8.37.233.45, Android (en-US), Quantil, Pasadena.
8.37.233.45 - - [24/Nov/2015:01:10:58 -0700] "GET /gallery/perspective2A.html HTTP/1.1" 200
1841 "-" "Mozilla/5.0 (Linux; U; Android 4.4.3; en-US; D5322 Build/19.1.1.C.0.56)
AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/10.7.5.658 U3/0.8.0
Mobile Safari/534.30"
It's more rumoring about how the suspect has plagiarized his theory on linear perspective. This
person seems to be related to the 6:09 AM person on 20 November (possibly a girl of Indian
descent) who was using the same proxy (the phone is different). The strange thing is that the
theory on perspective2A.html is clearly the suspect's most original contribution. Either the Secret
Society is making the claim about the suspect's plagiarism out of complete ignorance or this
person is a TMU mole inside the Secret Society here to disrupt the women's case at law
enforcement or Homeland Security operation.
73
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
12:24 AM, the guy at “Bacchic Orphism” replies the suspect. The Secret Society must have
taught him: “Just say you linked it because you have an interest in his work. In this way he might
think that he has wrongly suspected us for linking his webpages on our Secret Facebook Group.
We must also not raise his suspicion that we are discovering him to be a plagiarizer; otherwise he
might retaliate.” The Bacchic person does likewise. He also invites the suspect to come to his
closed group on Orphism and Hellenistic religions. This, because the suspect is using his fake
Facebook identity. The Secret Society women hope that the suspect might accept the invitation,
in which wise the next detective can be given a piece of evidence showing the suspect doing
something like “electronic penetration” and “cyberstalking”. But of course the suspect never
takes the bait.
12:54 AM, 208.103.245.241, orphism.html, eastlink.ca, Sydney, Nova Scotia, Canada. More
rumoring about the suspect's plagiarism.
4:08 AM, Packet Exchange, Quantil, Los Angeles,
70.39.185.105 - - [24/Nov/2015:05:08:51 -0700] "GET /gallery/bensonathena.jpg HTTP/1.1"
200 146537 "http://images.google.co.in/imgres?
imgurl=http://www.lawrencechin2011.com/gallery/bensonathena.jpg&imgrefurl=http://www.law
rencechin2011.com/gallery/redathena.htm&usg=__UB8WKbOkT1PQcuoPZzyKgoOFN4%3D&h=495&w=600&hl=en&start=793&tbnid=vqViCm7
UzTt-QM:&tbnh=111&tbnw=135&ei=H09UVr6rJYG4jAOqhbLgCw&sa=X&ved=0ahUKEwjttCi_6jJAhUBHGMKHaqCDLw4mAYQrQMIHTAA&ptbm=isch&q=hd+paintings+of+athena"
"UCWEB/2.0 (MIDP-2.0; U; Adr 4.4.2; en-US; SM-T231) U2/1.0.0 UCBrowser/10.4.2.659
U2/1.0.0 Mobile"
Compare it with the Indian person from 20 November, 6:09 AM: (Linux; U; Android 4.4.2; enUS; Aqua Star II Build/KOT49H) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0
UCBrowser/10.7.5.658 U3/0.8.0 Mobile Safari/534.30
Somehow this person is related to the 12:10 AM person and the 6:09 AM person from 20
November. Again, more rumoring about how the suspect is a “fake artist” since he has merely
put other people's artworks on his site claiming them as his own.
24 November (Tuesday)
Today, Turkey’s F-16s would shoot down a Russian SU-24 over Syria. The shoot-down is clearly
planned since the F-16s have been circling in the area for two hours waiting for the Russian jet to
appear. It is said that the US has wanted Turkey to do this in order to disrupt the formation of
US-France-Russia anti-ISIS alliance. Since the current ICJ trial has contributed to the
strengthening of the Franco-Russian alliance formed since the Paris attacks, NUL (at the
Eurasian bureau of the State Department, who must have taken part in this US plan with Turkey
while, at the same time, being heavily involved in the current ICJ trial over the suspect) is
presumably also seeking ways to alienate the French from the Russians in the current ICJ trial.
74
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Note that it is primarily the neocon wing in the US who has wanted this hardline position toward
Russia. The CIA's wing probably wants to play soft, such as in the previous US-Iran agreement
over the nuclear question (“win-win”, “cooperation for mutual benefits”) to which the
Republicans, under neocon influence, have objected.
Meanwhile, the Secret Society women's operation on the suspect continues throughout the
morning. 5:20 AM, 80.245.147.81, Cheney Plan, direct visit, lxproxy4.bfinv.de, Bundesamt fuer
Finanzen (proxy).
80.245.147.81 - - [24/Nov/2015:06:20:38 -0700] "GET /cheneyplan25/cheneyplan25.pdf
HTTP/1.1" 404 1360 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
It appears that this is a past member of the Secret Society here to serve as a volunteer. He will
rumor – after receiving a notice from other volunteers about the discovery of a paranoid
schizophrenic who has so frightened a group of poor American women with his paranoia
delusion about their persecuting him through law enforcement mechanism – : “Hey, I remember
this guy. I have once surfed onto his writings, something about Dick Cheney's 'master plan'. I
thought he was completely nuts.” And so he pretends to want to find it again, but the document is
already removed. No matter, for his chatter will be additional testimony which the Secret Society
women will turn over to their next detective and which Homeland Security will intercept into the
ICJ as evidence in support of their case.
8:44 AM, 94.134.254.160, Versatel Deutschland, Horst, Germany.
94.134.254.160 - - [24/Nov/2015:09:44:50 -0700] "GET /scientificenlightenment1/capra.html
HTTP/1.1" 200 11888 "http://images.google.de/imgres?
imgurl=http://www.lawrencechin2011.com/scientificenlightenment1/cosmicdance2.jpg&imgrefu
rl=http://www.lawrencechin2011.com/scientificenlightenment1/capra.html&h=274&w=400&tbn
id=GuiEFLDFlOS73M: &tbnh=95&tbnw=138&usg=__pbDSS5EXiGwbq13-LP92Wm1yP5M
%3D&docid= 7FmrBabauZJZFM&client=ubuntu&sa=X&ved=0ahUKEwjU6
_b5wKnJAhWBkw8KHQ2lDJMQ9QEIHzAA" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64;
rv:42.0) Gecko/20100101 Firefox/42.0"
More rumor about the suspect's plagiarism. 10:32 AM, 94.248.212.237, kabelnet.hu, Kaposvar,
Hungary.
94.248.212.237 - - [24/Nov/2015:11:25:01 -0700] "GET /1/chemoton.jpg HTTP/1.1" 200 86500
"https://www.google.hu/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
94.248.212.237 - - [24/Nov/2015:11:32:23 -0700] "GET /1/thermhch6d222.html HTTP/1.1" 200
29197 "https://www.google.hu/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
75
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
More rumor about the suspect's plagiarism. 10:57 AM, 108.20.205.216, bstnma.fios.verizon.net,
Belmont, Massachusetts.
108.20.205.216 - - [24/Nov/2015:11:57:06 -0700] "GET /scientificenlightenment1/capra.html
HTTP/1.1" 200 11888 "http://www.google.com/search?
q=images+for+first+generation+of+leptons+and+quarks&hl=en&gbv=2
&tbm=isch&prmd=ivns&ei=6LJUVsDXOYrb-QGLirmoCw&start=60&sa=N" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko)
Version/5.1.9 Safari/534.59.10"
More rumor about the suspect's plagiarism. As you can and will see, capra.html and
thermhch6d222.html are both favorite targets of the Secret Society women (in the domain of
false reporting or false rumoring about the suspect's plagiarism). 11:23 AM, 107.72.164.47,
daodejin222.html, AT&T Wireless, Fort Lauderdale.
107.72.164.47 - - [24/Nov/2015:12:23:03 -0700] "GET
/scientificenlightenment1/daodejin222.html HTTP/1.1" 200 17844
"http://www.bing.com/search?q=Heraclitus%2c+John%2c+%26
+Logic+and+Inquiry+&qs=n&pq=heraclitus%2c+john%2c+%26 +logic+and+inquiry+&sc=00&sp=-1 &sk=&cvid=EAAF4AB72BBD406B9E7BFD9446A0B662&first=15&FORM=PERE"
"Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko"
The search terms clearly indicate that they are supplied to the volunteer by the German Lady: in
the past 11 years of the webpage's existence, there has never been a single person who has put
together Heraclitus and John, searched for the two, and found the suspect's chapter. But, of
course, only educated person would have noticed this, and the German Lady is not one. Hence,
another piece of chatter about the suspect's plagiarism has been intercepted into the ICJ as
evidence.
Meanwhile, the suspect rests in Westwood Village until 5:15 AM. Then, on the bus toward
LAMP. He waits there from 6 AM until past 8 AM, only to be told (Serena Pawl) that they do not
have advocates to help clients with legal matters. Already 9 AM. Somebody then steals the
suspect's shoes. Tremendously angered. Ate breakfast, public library, 10:10 AM. Checked log.
Then, the suspect reads the story about “Teardrop Rapist” in LA Times. Downloaded SPOE’s
Parteiprogramme. Then nap.
12:43 PM, 83.44.186.175, dynamicip.rima-tde.net, Illescas, Spain.
83.44.186.175 - - [24/Nov/2015:13:43:11 -0700] "GET
/suppl_pld_4_60bg/suppl_pld_4_60bg.pdf HTTP/1.1" 404 1360 "-" "Mozilla/5.0 (Windows NT
10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86
Safari/537.36"
83.44.186.175 - - [24/Nov/2015:13:43:12 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/suppl_pld_4_60bg/suppl_pld_4_60bg.pdf" "Mozilla/5.0
(Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.86 Safari/537.36"
76
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Clearly, more volunteers are saying: “Hey, I remember this guy. Give me the link. Yes, he is the
guy with this bizarre delusion about some ICJ trial. Oh, the document is not there anymore.”
Same thing: the chatter is enough testimony for the next detective and evidence for Homeland
Security. Then, 1:37 PM, 173.196.204.18, holywh.html, then gallery, west.biz.rr.com, Los
Angeles. This looks so much like ANG from House Z.
173.196.204.18 - - [24/Nov/2015:14:37:51 -0700] "GET /gallery/gallery.html HTTP/1.1" 200
4452 "http://www.lawrencechin2011.com/gallery/holywh.html" "Mozilla/5.0 (Windows NT 6.1;
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
….
On 1:59 PM,, she's here again:
173.196.204.18 - - [24/Nov/2015:14:59:27 -0700] "GET /gallery/gallery.html HTTP/1.1" 200
4452 "http://www.lawrencechin2011.com/gallery/holywh.html" "Mozilla/5.0 (Windows NT 6.1;
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
What's particularly noteworthy is that there is no log entry for her visit to holywh.html. How
then has she got to the web gallery from the link on holywh.html? You have to suspect that,
because she is so afraid that the suspect might know she is visiting his website again – and yet
she wants to participate in the rumoring as well in order to produce testimonies for the next
detective and evidence for Homeland Security – she decides to look at the suspect's painting of
“Holy Whore” from the HK Hacker's cache of the suspect's website. To make sure that the
suspect's web gallery is actually still existent, however, she eventually would have to come to the
suspect's site itself, thus getting herself detected nonetheless. Now, why is she wanting to see the
painting “Holy Whore”? Probably just as the suspect would later suspect: she wants to make
false testimony saying that the suspect has painted her nude thus embarrassing her and violating
her privacy. Not only is this golden (though false) evidence for the next detective, but golden
evidence for Homeland Security in support, in the ICJ, of their false profile of the suspect as a
“misogynist” and “constantly violating women's space and privacy”.
2:03 PM, 71.94.58.80, Foucault on bio-power, dhcp.snlo.ca.charter.com, Los Osos, CA.
71.94.58.80 - - [24/Nov/2015:15:03:06 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692
"https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
More false rumoring about the suspect's plagiarism. 2:17 PM, 125.128.226.172, Seoul, Korea.
125.128.226.172 - - [24/Nov/2015:15:17:23 -0700] "GET /shizukadetail.jpg HTTP/1.1" 200
380066 "http://www.lawrencechin2011.com/fising2.html" "Mozilla/5.0 (Windows NT 6.1;
WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/22.0.1207.1 Safari/537.1"
More false rumoring about how the suspect has violated Ms Kudo's privacy by putting her
photograph on his website and claiming that it is his drawing (!).
77
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Meanwhile, 2:50 PM, the suspect sets out for Chrysalis. Waited for Tanisha until 4 PM. 5 PM,
out. With Derrick. Bail Hotline. Starbucks, Normandie. Terrified by ANG’s visit to “Holy
Whore”. Forum, like a zombie. Slightly recovered toward the end. Home.
Meanwhile, the Secret Society's operation continues. 6:35 PM, 6:37 PM, 190.113.164.2,
supercanal.com.ar, Villa Mercedes, Argentina.
190.113.164.2 - - [24/Nov/2015:19:35:17 -0700] "GET
/suppl_pld_4_113b/suppl_pld_4_113b.pdf HTTP/1.1" 404 1360 "https://www.google.com.ar/"
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.86 Safari/537.36"
190.113.164.2 - - [24/Nov/2015:19:35:28 -0700] "GET
/suppl_pld_4_113b/suppl_pld_4_113b.pdf HTTP/1.1" 404 1360 "https://www.google.com.ar/"
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.86 Safari/537.36"
Presumably, same as the earlier ones: “Hey, I remember this guy,” etc. 2:22 AM,
173.252.112.100 - - [25/Nov/2015:03:22:15 -0700] "GET /scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12120 "-" "facebookexternalhit/1.1
(+http://www.facebook.com/externalhit_uatext.php)"
The portion of the Secret Facebook Group in which the image athd2.jpg is linked is being
accessed.
25 November (Wednesday; fewer actions from the Secret Society)
The Secret Society's operation: 5:03 AM, 161.139.222.37, quantum mechanics, Universiti
Teknologi Malaysia, Taman Bukit Skudai.
161.139.222.37 - - [25/Nov/2015:06:03:07 -0700] "GET
/scientificenlightenment1/quantummechanics.htm HTTP/1.1" 200 28558
"https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2471.2 Safari/537.36".
5:04 AM, he looks also at the PDF version. Clearly, the Secret Society needs somebody with
academic credentials to join in on the rumoring about the suspect's plagiarism in order to
enhance the credibility of their ridiculous portrayal of the suspect. More testimony for the next
detective and more evidence for Homeland Security.
6 AM, 64.233.172.159, Google Web Light.
64.233.172.159 - - [25/Nov/2015:07:00:57 -0700] "GET /thermh1.html HTTP/1.1" 200 24055
"http://www.google.co.in/search?hl=en-GB&redir_esc=&client=ms- androidsamsung&source=android-launcher-widget&v=133247963 &qsubts=1448460164933
&action=devloc&q=is+antropic+carbo+mill+effects+on+women&v= 133247963" "Mozilla/5.0
78
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
(Linux; Android 4.2.1; en-us; Nexus 5 Build/JOP40D) AppleWebKit/535.19 (KHTML, like
Gecko; googleweblight) Chrome/38.0.1025.166 Mobile Safari/535.19"
Note that this guy is in the UK (“en-GB”). More bad rumors about the suspect's plagiarism.
6:03 AM, 93.172.39.29, Google IL, Greek religion, netvsion.net.il. More bad rumors about the
suspect's plagiarism.
7:50 AM, 77.99.54.50, layereduniverse.html, direct visit, aztw.cable.virginm.net, Bath, UK.
(Note the visitor from Bath, 26 June, 2014, 1:10 AM.) 7:51 AM, he went to the Table of
Contents. This is evidently another volunteer “who has heard of the suspect before” and given
the link by another volunteer.
9:32 AM, 180.177.104.151, allegoryofcave.html, direct visit, dynamic.kbronet.com.tw, Hsinchu,
Taiwan. Another volunteer. Surely, there must be “volunteers” whose job it is not to rumor about
the suspect's plagiarism but to simply visit his site for no reason whatsoever, in order to generate
“decoys”.
6:15 PM, 103.231.241.108, capra7777.html, proxy7.dlsu.edu.ph, de la Salle University, Manila,
Philippines. Another volunteer. “Plagiarism”.
There is nothing particular about the suspect today. He leaves home around 12:30 PM. Storage.
Casbah, almost immobilized: not sure what to do. Tony there. Left almost 8 PM. To home.
Of note is that (1) Mr Crouch has replied the suspect on 6:25 PM (forwarded by Mr Angelucci);
and (2) Marina still hasn’t declined the suspect's offer. Both Mr Crouch and Mr Angelucci must
have already been warned by Homeland Security that the suspect is suspected of connection with
the Paris attacks and that he suffers severe schizophrenic delusion about a group of women going
after him, upon which Mr Angelucci would have noted that he has indeed received a narrative
from the suspect about “women's affairs”. They have probably also been contacted by the
Manhattan Beach Police Department detective around 19 November. In this way they would
have been in contact with the Secret Society women. Unless both have also been recruited by the
TMU/ CIA, they would not know the truth. It's evident here that they are contacting the suspect
solely in order to verify the suspect's email account and lure him to give out his debit card
information. For two purposes. First, the next detective would need the information to conduct
his investigation. Second, Homeland Security is planning to create confusion in the interception
of the financial transaction in order to end up with a piece of (false) evidence seemingly
indicating the suspect receiving money from the Russians. Homeland Security is now changing
its plan. Since there is no possible way to suspect the suspect of having prior knowledge of Paris
attacks – given his complete social isolation, this is a ridiculous charge – Homeland Security is
creating a new scenario where it is the Russians and the French who have prior knowledge of the
attacks and who have decided to “let them happen” for political purposes. The French and the
Russians – so the story goes – then secretly instruct the suspect to put up his essays just days
before the attacks so that both parties can look at them on the pretext of emergency situation and,
getting amazed by his talents, make him a star and denounce Homeland Security's profile as
79
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
“false”. In this new scenario, the suspect does not have to have prior knowledge. He is said to
follow instruction and receive payment for his work without understanding why.
2:07 AM, RM Education Plc, London. (This is a company providing network services to
schools.) Another volunteer to rumor about the suspect's “plagiarism”.
217.179.202.2 - - [26/Nov/2015:03:07:51 -0700] "GET
/scientificenlightenment1/cosmicdance2.jpg HTTP/1.1" 200 40022 "https://www.google.co.uk/"
"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/43.0.2357.132 Safari/537.36"
2:57 AM, Primelink Telecom, Moscow,
95.131.179.202 - - [26/Nov/2015:03:57:14 -0700] "GET /scientificenlightenment1/nostratic2.jpg
HTTP/1.1" 200 42640 "https://www.google.ru/" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_10_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
Probably a Russian informant inside the Secret Society. Pretending to join in on the rumoring but
secretly collecting evidences.
26 November (Thursday, Thanksgiving)
The Secret Society's operation continues. 6:23 AM, 177.182.55.57, plato.html, Google BR,
virtua.com.br, Belo Horizonte. Another volunteer to rumor about the suspect's “plagiarism”.
6:58 AM, 97.44.66.132, myvzw.com, Verizon Wireless, Arizona.
97.44.66.132 - - [26/Nov/2015:07:58:56 -0700] "GET /blogs/2014/04/14/last-word-on-my-pasttwo-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1360
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 4.4.2;
VS415PP Build/KOT49I.VS415PP2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.76 Mobile Safari/537.36"
This volunteer pretends to surf onto the suspect's past Prison Planet forum posting to get freaked
out: this guy's delusion about the women he's obsessed with is incredible! No wonder that the
women are so scared! He would then pretend to contact the women to express his concern for
their safety. Another testimony for the next detective and another piece of evidence for
Homeland Security.
7:01 AM, 78.193.54.96, Free SAS, Paris.
78.193.54.96 - - [26/Nov/2015:08:01:40 -0700] "GET/scientificenlightenment1/plato333.html
HTTP/1.1" 200 5286 "https://www.google.com" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6;
rv:42.0) Gecko/20100101 Firefox/42.0"
Another volunteer. Some volunteers, of course, must be TMU informants. Some might even be
Interpol's informants.
80
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
7:02 AM, the 6:58 AM Arizona person came back:
97.44.66.132 - - [26/Nov/2015:08:02:31 -0700] "GET /blogs/2014/07/02/my-perps-and-whythey-are-currently-targeting-me-part-ii/ HTTP/1.1" 404 1360
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 4.4.2;
VS415PP Build/KOT49I.VS415PP2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.76 Mobile Safari/537.36"
This actress continues to pretend to have tracked down the identity of the crazy poster; probably
even to pretend to have shown interest in suspect's LB posting and thereby discovered the
identities of the women referred to in the summary there.
10:21 AM, 87.164.116.164, capra.html, Google DE Images, t-ipconnect.de, Hamburg. Another
volunteer: “This guy is stupid. He wants to pretend to be an intellectual, and so copies all this
stuff from Fritjof Capra's famous book and puts it on his website to fool people. What a jerk.”
Excellent testimony for the next detective and excellent evidence for Homeland Security in the
ICJ.
10:59 AM, 131.247.226.153, laptops.usf.edu, University of South Florida, Tampa, Florida.
131.247.226.153 - - [26/Nov/2015:11:59:58 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200
27754 "https://www.google.com/" "Mozilla/5.0 (Windows NT 10.0; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
This person was here before. Another volunteer. Not sure whether it is a decoy or another bad
rumor.
1:05 PM, 192.55.54.38, fmdmzpr03-ext.fm.intel.com, Intel Corporation, Santa Clara.
192.55.54.38 - - [26/Nov/2015:14:05:55 -0700] "GET /scientificenlightenment1/fermat.html
HTTP/1.0" 200 36447 "-" "AHC/1.0"
A direct visit. Given the link. Another volunteer. Rumor about the suspect's “plagiarism”.
1:39 PM, 221.145.183.167, /, Google KR. The same Korean scout.
4:59 PM, 92.236.133.178, quantum mechanics, direct visit, cable.virginm.net, Birmingham, UK.
Another volunteer.
Meanwhile, the suspect. Woke up late. Came directly to downtown. Got free food. 1:36 PM,
Starbucks, downtown, Internet connection cut off. Then, SM Beach. 4 PM, found Erik. Then,
Starbucks at the Promenade. Paid to become a member of NCFM. The suspect has fallen into
Homeland Security's trap. 6 PM, at Googies, French Language Friends. Simone there (German).
There is this “Noah” who wants to establish contact with the suspect. He is a Homeland Security
informant here to frame the suspect. Earlier, when the suspect pays for his NCFM membership
fee, Homeland Security has already produced a piece of evidence for his financial dealing with
the French and the Russians (by confusing NCFM's Paypal account with the suspect's own tiny
81
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
bank account). Unaware of Noah's evil intent, the suspect shows him his web gallery. 7:10 PM,
the suspect uses Noah's phone to look at his web gallery: 166.137.246.46, mycingular.net,
Rancho Cucamonga. The suspect leaves the meetup on 7:30 PM.
7:52 PM, 24.217.89.32, justiceinrepublic.html, Google, Ballwin, Missouri. Another bad rumor
about the suspect's plagiarism.
10:26 PM, 73.32.209.249, yunqing.pdf, Comcast, Sugar Land, Texas. This person seems to have
been here before. 10:51 PM, she’s here again looking for the same chapter. (Note the visit from
Sugar Land on 2 November, 3:07 PM: biopower2.html.) Certainly a volunteer: “I remember this
guy. He is the one who has grabbed off other people's contents and put them on his website to
pretend to be knowledgeable.”
3:49 AM, wsip-68-15-198-222.ok.ok.cox.net, Tulsa, Oklahoma,
68.15.198.222 - - [27/Nov/2015:04:49:53 -0700] "GET /scientificenlightenment1/orphism.html
HTTP/1.1" 200 39990 "-" "Mozilla/5.0 (Windows NT 6.2; WOW64; rv:30.0) Gecko/20100101
Firefox/30.0"
This volunteer is simply sent the link in order to join in on the rumoring about the suspect's
plagiarizing habit.
27 November (Friday)
4:58 AM, 42.2.83.225, yunqing.pdf, static.netvigator.com, Hong Kong. Another volunteer has
pretended to remember that the suspect repeatedly violates other people's copyrights by putting
their content on his website. Again, the document is not there anymore, and this is only the PDF
printout of somebody else's blog post: it's just something which everybody does from time to
time. Hardly a case of violation of others' copyright.
8:13 AM, 66.87.121.178, the female brain, pools.spcsdns.net, Houston. Another volunteer
looking for signs of plagiarism on the suspect's website. Even though the material is long gone,
chatter nevertheless.
10:07 AM, 171.33.193.111, humandispersal.html, Google FR Images, London Grid for Learning
Trust, London. Chatter about the suspect's plagiarism because of a large bloc of quotation on the
chapter.
11:12 AM, schuld.html. Chatter (“plagiarism”).
11:24 AM, 74.102.228.62, newsummaryweb.html (not there), nwrknj.fios.verizon.net, Short
Hills, New Jersey. Again, even though the material is gone, the volunteer “remembers seeing it”.
Chatter about the suspect's bizarre insanity for believing in a secret ICJ trial and being implanted
with brain chips.
11:57 AM, 68.196.138.169, 1/appendix.html, dyn.optonline.net, Bergenfield, New Jersey.
Chatter about the suspect's plagiarism.
82
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
12:18 PM, the Princeton decoy,
128.112.155.172 - - [27/Nov/2015:13:18:17 -0700] "GET /scientificenlightenment1/coatlicue.jpg
HTTP/1.1" 200 75741
"http://www.lawrencechin2011.com/scientificenlightenment1/ancestorcult.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.131 Safari/537.36"
As always, this frequent visitor from Princeton University is doing decoy, most likely.
3:49 PM, 86.168.231.108, familyphoto4.jpg, BT, Toddington, UK. Chatter about how the suspect
violates his family members' privacy.
3:56 PM, 70.215.135.107, presocratics.html, myvzw.com, Sherwood, Arkansas. Chatter about
the suspect's plagiarism.
5:34 PM, 49.207.191.234, xper3.html, Google IN, ras.beamtele.net, Chennai, India. Chatter
about how the suspect has put other people's artworks on his website and claimed them as his
own. (Recall that, in 2008, this large drawing of the suspect's was stolen from his home by
Homeland Security and given to somebody else as if it belonged to that someone else, so that the
suspect can be falsely accused of putting somebody else's drawing on his website.)
Meanwhile, the suspect: Woke up 11 AM. Lunch at the Vietnamese restaurant. Home. MST.
(MILF.) 12:30 PM, out. Casbah, directly. Tony there. Past 6 PM, the suspect goes to AVFM
forum posting from his links page. Blocked on Google Chrome. Tried it on Firefox, still blocked.
Then, the suspect posts Summary II (Sequel) at the AVFM forum (recounting the Secret Society's
operation from 13 November up till the present moment). Then he tries to go to the posting again
from his links page on Internet Explorer, allowed. Began talking to “Ren” (girl). Left a message
with W. Later, RT Deutsch from links page also blocked. These are the evidences which a new
law enforcement authority has begun collecting for the suspect's possible anti-American activity
in collusion with foreign powers, which would also be golden evidence for Homeland Security in
the ICJ.
6:28 PM, 108.199.226.79, lightspeed.irvnca.sbcglobal.net, Glendale, CA.
63.250.204.24 - - [27/Nov/2015:19:28:40 -0700] "GET
/imp_documents_5/fr_jennifer_day_nov_2006.jpg HTTP/1.1" 200 441483
"https://search.yahoo.com" "YahooCacheSystem; YahooWebServiceClient"
108.199.226.79 - - [27/Nov/2015:19:28:53 -0700] "GET
/imp_documents_5/fr_jennifer_day_nov_2006.jpg HTTP/1.1" 200 436767
"https://search.yahoo.com" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101
Firefox/42.0"
Presumably JD has been contacted again by both the Secret Society women and the volunteers.
JD of course also serves also as a law enforcement informant inside the Secret Society. (This is
83
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
not necessarily JD herself, but somebody doing the search for her, maybe her friend.) “He is
violating women's privacy”: both “chatter” and “evidence”.
7:48 PM,
173.252.88.185 - - [27/Nov/2015:20:48:22 -0700] "GET
/scientificenlightenment1/cosmicdance1.jpg HTTP/1.1" 206 9302 "http://alfaimg.com/show/antiprotons-diagram.html" "facebookexternalhit/1.1
(+http://www.facebook.com/externalhit_uatext.php)"
173.252.90.80 - - [27/Nov/2015:20:48:22 -0700] "GET
/scientificenlightenment1/cosmicdance2.jpg HTTP/1.1" 206 9302 "http://alfaimg.com/show/antiprotons-diagram.html" "facebookexternalhit/1.1
(+http://www.facebook.com/externalhit_uatext.php)"
Apparently, the Secret Society women have linked alfa-img.com search results from the Secret
Facebook Group. The Secret Society is brainstorming.
8:35 PM, 108.184.15.237, Yunqing (not there), socal.res.rr.com, Garden Grove.
108.184.15.237 - - [27/Nov/2015:21:35:45 -0700] "GET /miscellaneous/yunqing.pdf HTTP/1.1"
404 1360 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 _1 like Mac OS
X) AppleWebKit/600.1.4 (KHTML, like Gecko) GSA/10.0.63022 Mobile/12H321
Safari/600.1.4"
More chatter about the suspect's putting other people's contents on his website without consent
(violation of other people's copyrights).
Meanwhile, past 8 PM, the suspect has left Casbah. 9:01 PM, Noah from last night text-messages
the suspect. He is going to further frame the suspect for conspiracy with the French (FN) and the
Russians.
10:41 PM, 174.57.216.202, hackbb forum, Bing, “Deep Web Murder”, nj.comcast.net,
Wildwood, New Jersey. This is evidently more chatter: “Look, if I search for 'Deep Web Murder',
references to his website will show up. This guy is truly scary! His website is scary!”
Other visits of note (chatter) afterwards include: 11:12 PM, dsl.sndg02.pacbell.net, Escondido,
California,
69.109.158.247 - - [28/Nov/2015:00:12:51 -0700] "GET /1/elementarystructures.htm HTTP/1.1"
200 18877 "https://www.google.com/" "Mozilla/5.0 (Windows NT 10.0; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
Chatter about the suspect's “misogyny”. 11:59 PM, hsi6.kabel-badenwuerttemberg.de,
Reutlingen, Germany,
109.192.195.101 - - [28/Nov/2015:00:59:53 -0700] "GET /gallery/himiko.html HTTP/1.0" 200
2873 "http://images.google.de/imgres?
84
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
imgurl=http://www.lawrencechin2011.com/gallery/himiko.jpg&imgrefurl=http://www.lawrencec
hin2011.com/gallery/himiko.html&h=738&w=550&tbnid=SN9eqxHIBGoC1M:&docid=fIxlUI3
_J9yy_M&ei=glxZVrWxH4epUfOajugO&tbm=isch&iact=rc&uact=3&page=3&start=76&ved=
0ahUKEwi1-tne0LLJAhWHVBQKHXONA-0QrQMIqwIwWA" "Mozilla/5.0 (Windows NT
6.1; WOW64; Trident/7.0; rv:11.0) like Gecko"
109.192.195.101 - - [28/Nov/2015:00:59:53 -0700] "GET /gallery/himiko.jpg HTTP/1.0" 200
492538 "http://images.google.de/imgres?
imgurl=http://www.lawrencechin2011.com/gallery/himiko.jpg&imgrefurl=http://www.lawrencec
hin2011.com/gallery/himiko.html&h=738&w=550&tbnid=SN9eqxHIBGoC1M:&docid=fIxlUI3
_J9yy_M&ei=glxZVrWxH4epUfOajugO&tbm=isch&iact=rc&uact=3&page=3&start=76&ved=
0ahUKEwi1-tne0LLJAhWHVBQKHXONA-0QrQMIqwIwWA" "Mozilla/5.0 (Windows NT
6.1; WOW64; Trident/7.0; rv:11.0) like Gecko"
This is what the search looks like:
Again, chatter about how the suspect has copied someone else's painting. (You recall that
somebody else, around 2008, has copied this 2001 painting of the suspect). 3:49 AM, Kenya
Education Network, Ruiru, Kenya, suspected network sharing device:
41.89.10.241 - - [28/Nov/2015:04:49:37 -0700] "GET
/scientificenlightenment1/quantummechanics.htm HTTP/1.1" 200 28558
"http://www.bing.com/search?
q=relationship+between+zeeman+effect+and+quantum+atomic&qs=n&form=QBRE&scope=we
b&pq=relationship+between+zeeman+effect+and+quantum+atomic&sc=0-24&sp=-
85
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
1&sk=&cvid=e3abbb0640ce4d9da3655ca6f2f4dafe" "Mozilla/5.0 (Windows NT 6.1;
Trident/7.0; rv:11.0) like Gecko"
3:50 AM, Non-state educational institution Educational Science, Moscow,
93.175.7.158 - - [28/Nov/2015:04:50:38 -0700] "GET /scientificenlightenment1/higgsfield.jpg
HTTP/1.1" 200 44655 "https://www.google.ru/" "Mozilla/5.0 (Windows NT 10.0; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
Both indicate “chatter” about the suspect's plagiarism.
28 November (Saturday; W)
6:53 AM, 74.109.34.137, Genealogy of Morals, Bing, “Walter Kaufmann translation of…” He
immediately goes to acad.html, phlapa.fios.verizon.net, Morrisville, PA. This may be just a
“decoy” rather than “chatter” (plagiarism).
7:55 AM, 136.179.21.64, switchnap.com, California.
136.179.21.64 - - [28/Nov/2015:08:55:35 -0700] "GET
/pleading_papers/opposition_to_demurrer.doc HTTP/1.1" 404 1360 "https://www.google.com/"
"Mozilla/5.0 (iPad; CPU OS 8_4_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like
Gecko) Version/8.0 Mobile/12H321 Safari/600.1.4"
This is evidently another “volunteer” (perhaps somebody related to the suspect's cousin Evelyn)
who “remembers” how the suspect has violated his own family members' privacy. Luckily, the
suspect has already removed the document, so that only the “chatter” could be used as evidence
against him at the next law enforcement authority. Nonetheless, it is evidence for Homeland
Security in the ICJ.
8:49 AM, 70.169.133.38, American Civil Religion, Google, Norfolk, Virginia, wsip-70-169-13338.hr.hr.cox.net. “Decoy”?
9:18 AM, retail.telecomitalia.it, Crecchio, Italy,
95.252.229.185 - - [28/Nov/2015:10:18:10 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
315020 "https://www.google.it" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
The same chatter about how the suspect has copied somebody else's painting.
12:02 PM, 221.145.183.167, /, Google KR. It’s the Korean scout. Last time here, 1:39 PM, 26
November.
Around 12 PM, the suspect is still at home. His Windows Defender warns of “Trojan” inside his
computer. Then, for the rest of the day, icons on Windows Explorer would flash every minute or
so. The suspect begins to wonder whether the police might have installed malware on his
computer. It might in fact be either Homeland Security or the Russians.
86
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
1:58 PM, 86.18.119.34, himiko.jpg, London. The same chatter as on 9:18 AM?
2:30 PM, Evgeny – a Russian journalist to whom the suspect has also made offer on Couch
Surfing – logs onto Couch Surfing, but does not respond to the suspect's offer. He must have
been warned by the Russian authority not to respond, lest there be more suspicion about the
suspect's conspiracy with the Russians.
3:11 PM, 92.151.113.23, schuld.html, abo.wanadoo.fr, Paris.
3:21 PM, the suspect is now at Casbah, and he calls W. W answers it. As usual, all the parties to
the ICJ trial are listening in attentively on the suspect's words looking for evidences in their
respective favor. The details of the conversation are as follows (from 59:00): (1) About W's
public policy online course. (2) His answering machine is still on. How did the women gain
access to their conversation? (3) Worried that law enforcement, unaware of the situation, is
taking the Secret Society's case all very seriously. A trojan horse in his computer? (4) The women
depend on other people being stupid in order to succeed, whereas the suspect depends on other
people being intelligent in order to survive. Since stupid people outnumber smart people by
hundreds to one, the suspect is greatly disadvantaged and always in danger. Hence the women
have gone to a small city's police department, where the detectives are inexperienced and
unsophisticated. (5) Why was ANG looking at the suspect's painting “Goddess Athena rewarding
the scientist”? (6) How the volunteers pretend to discover that the suspect's writings are
plagiarized. This might be evidence in favor of Russia and France: the suspicion that the
intercepts which Homeland Security has brought into the court house might be fake. (7) W:
“Why don't you move to a different state?” The suspect: They are accusing him of cyberstalking
in order to avoid the difficulty that the suspect doesn't actually stalk them at all (1:10:00).
Furthermore: “It depends on where the victims live, not where the suspect lives.” W: “But if it's
crossing state line, then they can't do anything...” (8) The suspect: “Unfair, somebody was
hurting me back in April and May, and now I couldn't move anywhere because of the trial and
the upcoming probation, and I don't even know what the point is of it all, is it to let FN win? I'm
only guessing....” W: “You've got to move on...”. Then, when a car honks nearby, W asks:
“What's that?” “Cars honking” (1:16:00). W: “What does that mean?” The suspect: “Nothing.”
W is trying to lure the suspect to say, as he used to say, that, when cars honk, it's because the
control center is signaling that he has said something right. This then would make the suspect
look crazy to anyone who is listening on the suspect's conversation. It would thus be evidence for
Homeland Security to confirm their false profile of the suspect in the ICJ. And so W must have
been instructed by both the Secret Society women and Homeland Security beforehand to play
tricks whenever possible to make the suspect look crazy. In fact, even the suggestion for the
suspect to move out of the state seems like a trick to lure the suspect to become a fugitive. (9)
How the cyberstalking case is established. The “scientific method” which the women and the
detectives cannot imagine because their brain has significantly shrunken. The example of how
the scientists have come to the conclusion that there is this thing called “Dark Matter”. “Their
brain has lost the inferential thinking function...” The suspect: “My problem is caused by the fact
that most people's brain is crushed... This is a good way to demonize Americans, because
87
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
American culture has become so degenerate that the human brain which grows up in it is crushed
under its weight.” W: “Capitalism turns people into sheep, in today's consumerist culture there is
no longer any preoccupation with ideals.... That's why Donald Trump can say what he says and
be liked, just because he is honest... All the social media and so on exist to preoccupy people's
time, thus giving corporations the power and opportunity to manipulate people... By now nobody
studies philosophy.. .” The suspect, “This is precisely what Marine has said, but she hasn't quite
pinpointed the problem; other than naming the 'robotic consumer', she didn't recognize the issue
about brain deterioration.” Then the suspect expresses his wish to convince Marine to add the
issue about brain development to her agenda. And, he notes, Russia can also build up its
reputation by endorsing the agenda of saving the human brain from American corporate assault.
W: “The corporate consumer culture easily brainwashes consumers... Selling products as a way
of life...” (1:27:00). The suspect: “When Russia does so, it must emphasize it's the US which
wants this globalized commerce and consumer culture...” W: “It doesn't matter... to prevent
people from becoming free thinker...” The suspect: “But Marine says just this...” About the
Frankfurt school. About the Una-Bomber. The suspect disagrees that the Una-Bomber has the
same agenda against consumerism. W: “How you can dumb down people... Make them become
dependent on machines...” The suspect: “Terrorism is not a big issue... Protecting the human
brain is a bigger issue...” (1:31:00). W: “Corporations are making you into robots... Everything
controlled and manipulated by corporations...” The suspect: “FN is saving the world from
corporations...” W: “FN does not have a good reputation... The common impression of FN is that
they are bigots...” About how the guy with a good idea is wasted because he is under Nazi's
banner. W is here hinting to the suspect that all his philosophies to debunk American political
correctness are now considered “terrorist plans” and, along with Russians' similar ideas,
potentially banned under UN Resolution 1373 because of his status as a “misogynist terrorist”,
and yet the suspect is not quite aware of it. It will be very hard for him to grasp everybody's
enormous demonization of him as a “dangerous terrorist” because, stuck in his traditional
mindset, he finds it hard to imagine how breaking people's windows could be considered
“terrorism” under international laws. The suspect: About the variety of far right parties in
Europe. About Geert Wilders. How Russia can make a good reputation for itself by demonizing
American global commerce as destroying the human brain. Then the suspect shouts: “I hope they
can hear me, but I don't want to get into troubles... But somebody has to do something about this
American digital culture, as people are becoming so dumb that they can only understand
stereotypes.” This is certainly evidence in Russia's favor, i.e., that the suspect doesn't have prior
knowledge of Russia's involvement. He doesn't even know that the Russians, as well as the
French, are listening in on his conversation. W: “What I like about the French is precisely how
they have imposed an intellectual culture... The French have got America wrong, and then got it
right...” “The stereotype of Americans are becoming true...” (1:42:00). Then the suspect
expresses his wish to be part of the FN movement.” W: “Be that in LA...” The suspect doesn't
think it possible because he has no following. W: “It's possible to do it without established
institutions...” W: “People nowadays are all about living a materialist life, they are braincrushed...” W: “Average people are becoming more intelligent... But this impression is all due to
'standard deviation'...” (1:49:00). The suspect: “Among Women there are fewer idiots, but also
88
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
fewer geniuses...” W then suddenly mentions he will call the suspect back (1:52:00). The suspect
notices that, 3:38 PM, Noah has called while the suspect was talking to W (323-573-2717).
When the suspect hangs up, he looks at Noah's message to him, and then calls him to tell him
that he will call him back shortly.
Why did W go into all this rambling about capitalism and corporations in the manner of a (vulgar
version of) critical theory critique? Insofar as Homeland Security has insisted on the terrorist
suspect status of the suspect, both the Russians and the French must have pointed out that the
Marine document, as well as other writings of the suspect, simply doesn't fit the typical image of
a “terrorist”, who is a Muslim, or at least religious. Homeland Security recalls that the UnaBomber Ted Kaczynski is something like an anti-capitalist, Marxist type, a vulgar version of
Marcus and Adorno, and he is classified as a “terrorist”. And so they must have instructed W to
steer the suspect onto this line of thought. Insofar as his anti-feminism stance derives from his
staunch opposition to corporate profits, his (supposed) “misogynist vandalism” can help classify
him as a “terrorist” along the line of the Una-Bomber.
Then W calls back on 2:08:30. About why women, on average, do better than men in college. W:
“Why are there more male idiots than female idiots?” W's answer: males are more likely to be
addicted to video games. The suspect's answer: “testosterone”. This is evidence in favor of
TMU/CIA and, indirectly, of the Russians and the French, i.e. evidence that Homeland Security's
profile of the suspect as a misogynist cannot be correct. The suspect's view on gender differences
is entirely objective and based on scientific researches. He has not expressed anything close to
“hatred toward women”. The suspect then expresses his wish again to be part of FN so as to
persuade FN to make this “digital dementia” into part of the party's agenda. W: Naomi Klein's
view. Then, about how digital technology has changed people's brain. “There are other forces
which are also making people increasingly stupid.” W seems to be repeating the viewpoints
which the suspect himself has expressed in his “Subhman meets poisonous friends”. It would
thus seem that W is again carrying out his order from Homeland Security, i.e. to express the
suspect's viewpoints as if it were his own so that others can suspect the suspect of plagiarizing
his best friend! This is thus evidence in favor of Homeland Security, that the suspect is indeed a
plagiarizer. W continues: “Unless you write the Great American Novel, where everything is your
own ideas...” It would seem that W is passing along a “secret message” from the Invisible Hand,
since the “Great American Novel”, i.e. Moby Dick, will later make its appearance as well. W:
“Whereas in academic studies, you find many people's ideas, so that people are tuned to others,
Facebook has turned everyone's attention onto himself or herself... Everybody has turned from
the 'third person' to the 'first person'... Nowadays, being egocentric is the norm rather than the
deviation from the norm...” W thus continues to repeat the suspect's ideas in his “Subhuman
meets” and “Syrian scandal, conclusion”. Then, the suspect complains about having to spend
most of his time dealing with gang-stalking instead of studying philosophy. “Only if the scenario
about BOL were correct...” then both the suspect and W would be saved. The suspect then brings
up something very important: “Marion, 'victim feminism'” (2:22:00). The suspect concludes:
“Maybe just a coincidence.” This of course has completely saved the French and the Russians,
since, at the time, 11 November, if you recall, it is really the TMU which has instructed one of
89
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
their moles inside the Secret Society to make this visit, the purpose being to create a piece of
evidence that they might need precisely in the present situation in which they have found
themselves. The suspect: “Sad that every far right party in Europe is focused on terrorism, this is
a waste, they should focus on the problem of brain development, these ISIS terrorists are just a
bunch of losers... Nations shouldn't have to change their policy just because of a bunch of
nobodies”. (2:26:00) He continues: “The Paris attacks look more like mass murder than
terrorism...” This is of course more evidence in favor of the TMU/ CIA and the French and the
Russians. The suspect is neither a violently-oriented and hate-filled “terrorist” like Homeland
Security has imagined nor a hater of Muslims, a “bigot” which is the stereotypical supporter of
FN. He continues: “These women are the embodiment of evil, trying to prevent me from saving
the world... Women are really bad, people don't know that... And law enforcement tries to protect
them... America is upside down, what a fucking country....” Homeland Security might enter this
last confession of the suspect as evidence to support their false profile of the suspect as a
misogynist; but the French, Russians, and TMU/ CIA might respond that the suspect's negative
assessment of womankind is completely reactionary, a response to his being gang-stalked by a
group of women.
The operations which occur while the suspect is talking to W include: 3:38 PM,
130.113.109.216, allegoryofcave.html, ipreg.mcmaster.ca, McMaster University, Hamilton,
Ontario. More chatter about the suspect's plagiarism by a credible source, a university student.
4:18 PM, the suspect calls Noah back. He gives the suspect a link. There must be something
wrong with the link. Should the suspect ever click on the link, Homeland Security would have
obtained another piece of evidence demonstrating the suspect's conspiracy with the French and
the Russians. But he is already suspecting that something is up, and so will never even look at
the link. However, he is, at this time, suspecting that it is law enforcement detective who wants
to insert malware into his computer.
4:26 PM, the suspect calls Noah back.
4:30 PM, W calls back.
6:27 PM, Marina logs into Couch Surfing but still does not respond to the suspect's offer.
7:21 PM, Noah texts the suspect again. He continues to ignore Noah.
7:34 PM, the suspect, still at Casbah, posts on Partisans (Les américaines qui sont contre la
[mondialisation] et qui soutiennent Marine de loin). This posting, along with the suspect's cry on
the phone, “I wish the Russians could hear me”, is evidence in support of the Russian/ French
claim that the suspect is not conspiring with them and has no prior knowledge of what is going
on right now.
7:57 PM, the suspect calls Angela.
8:07 PM, 75.1.146.106, layereduniverse.html, Google, sbcglobal.net, San Antonio. More chatter
about the suspect's plagiarism.
90
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
8:55 PM, 70.124.197.5, germaninvasion.html, Google, Brownsville, Texas. (Note the
Brownsville person from 2:53 AM, 27 June 2014.) Another volunteer is chitchatting about the
suspect's plagiarism.
9:27 PM, 37.188.133.49, Greek Religion, Yahoo, Prague, Czech Republic. Either a decoy or
chatter.
12:24 AM, the suspect, already home, posts on LB:
Now the gang of women who are gang-stalking me are sending their online friends
to pretend to be concerned strangers and to track down my true identity and the
identities of women designated as “J”, “K”, “G”, and “M” above, so that they can
pretend to be concerned netizens warning everybody here that the above story is
bullshit and contacting the women about the matter and enabling them to go to law
enforcement to falsely accuse me of “online harassment” and “online slandering” –
all this I have narrated in another Internet forum. It’s a massive staged show to
discredit me. I shall not, however, bother to direct any of you over there. Presumably
you can find it yourself.
Of course, under normal circumstances, nobody will give a crap. But the women’s
online friends will pretend to be so interested in the matter that they will direct you
over there in order to discredit me.
As soon as the suspect has posted this, the Secret Society goes into operation in response. 1:12
AM, cable.virginm.net, Mansfield, UK,
86.2.89.123 - - [29/Nov/2015:02:12:27 -0700] "GET /blogs/?author=1 HTTP/1.1" 200 3385
"https://www.google.co.uk" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101
Firefox/42.0"
86.2.89.123 - - [29/Nov/2015:02:12:48 -0700] "GET /blogs/wpcontent/plugins/jetpack/_inc/genericons/genericons/genericons.css?ver=3.1 HTTP/1.1" 304 162
"http://webcache.googleusercontent.com/search?
q=cache:hpFjW6xn5cwJ:lawrencechin2011.com/blogs/%3Fauthor
%3D1+&cd=1&hl=en&ct=clnk&gl=uk" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
Evidently, the LB Admin has pretended to get freaked out by the suspect's latest posting, and
contacted this Mansfield person and provided him with the suspect's email address. The
Mansfield person then, having heard about this “crazy blog” of the suspect, then Googles for it,
pretending to show interest and be concerned about the Secret Society women's safety and
producing the evidences which Homeland Security needs. In the following you will be
witnessing “cyber gang-stalking” and “cyber-street theater” at its best. One after another “gangstalker” would post something to create the impression for bystanders that the suspect is
completely insane and totally paranoid over nothing.
91
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
1:53 AM, nemesis45 posts the first reply on LB. (Total posts: 7994; per day: 20.43; joined: 3
November 2014): “I just can't see what you are hoping to achieve. English Civil and/or Criminal
Law is not going to help you seek advice from US based lawyers and/or law forums.”
2:21 AM, Kati LB Team Member posts a second reply. (Total posts: 7162; per day: 13.41, joined:
13 June 2014): “I can guarantee that no one has joined LB with the intention of PM-ing our users
to discredit you. If that had been the case, the whole site team would have quickly known about
(and put an end to) it straight away.
2:29 AM, nemesis45 posts a third reply: “Has anyone reported such a PM Kati? I get a fair
number of PM's daily and I've not seen one.”
2:33 AM, Kati LB Team Member posts a fourth reply: “Nope. As you know, we're pretty strict
about such things on here too.”
3:04 AM, nemesis45 posts a fifth reply: “I thought as much! Very strange posts indeed. It seems
it's done the rounds elsewhere!”
3:15 AM, nemesis45 posts a sixth reply: “Looking back to post #1 again one of my initial
thought[s] [sic] was brought to mind, i.e. that this [is] rather a strange spam”.
These members at LB have been instructed by both the “professional” and Homeland Security to
stage this show in order to make the suspect look crazy and paranoid. Of course, there have in
fact not been any bulk emails to LB members warning everybody about the suspect, so that
nobody is here lying, per se. Nevertheless it's all a staged show. The Russians need all this done
in order to avoid the charge of “conspiracy” with the suspect, while Homeland Security wants all
this in order to have more evidences in the ICJ to demonstrate that their false profile of the
suspect (a paranoia schizophrenic) is correct.
29 November (Sunday)
4:32 AM, 107.77.75.21, AT&T Wireless, Sacramento, CA.
107.77.75.21 - - [29/Nov/2015:05:32:12 -0700] "GET /scientificenlightenment1/capra7777.html
HTTP/1.1" 200 21637 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1
like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143
Safari/601.1"
More volunteers' chatter: “This guy plagiarizes.”
4:38 AM, Amethyst (Site Owner; LB Admin) posts a seventh reply: “If it needs confirming, there
have been no messages at all [sent] to the OP of this thread except for the initial welcome
message from Celesinte.” And so the staged show continues. While everybody at LB is doing
92
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
this in order to make the suspect look crazy to bystanders, everybody is also trying to deceive the
suspect into the impression that nobody is pulling shit behind his back, just as the Bacchic
Orphism guy has done. But of course the suspect will never be so duped.
4:49 AM, 80.189.8.35, dyn.plus.net. This is the LB Admin. 11 minutes after she has posted the
seventh reply, she is Googling the suspect's email address the second time..
80.189.8.35 - - [29/Nov/2015:05:49:19 -0700] "GET /blogs/?author= 1 HTTP/1.1" 200 3385
"http://www.google.co.uk/url?url=http://lawrencechin2011.com/blogs/%3Fauthor%3D1
&rct=j&q=&esrc=s&sa=U&ved=
0ahUKEwjw1uHO1bXJAhVGWRQKHXQmAtoQFggUMAA&sig2
=VU7iAltWMPcKORSx2ESZhw&usg=AFQjCNGvultm4bYWm5l08RhW6LNi5AX4bw"
"Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16"
80.189.8.35 - - [29/Nov/2015:05:49:41 -0700] "GET /vol-6/8_18_ 10/towes81810.pdf
HTTP/1.1" 404 1360 "http://www.google.co.uk/url? url=http://www.lawrencechin2011.com/vol6/8_18_ 10/towes81810.pdf&rct=j&q=&esrc=s&sa=U&ved=
0ahUKEwjw1uHO1bXJAhVGWRQKHXQmAtoQFggeMAI&sig2=BoIxJ4zTNj8Q7iFbad0Gw&usg=AFQjCNEOY_uLsXXrXjbyVo42eFHrcKuw6Q" "Opera/9.80
(X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16"
At the same time, 4:49 AM, the Sacramento person is still looking at capra7777.html. The LB
Admin continues:
93
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
80.189.8.35 - - [29/Nov/2015:05:49:47 -0700] "GET /2008docs/Gmail112408.pdf HTTP/1.1"
404 1360 "http://www.google.co.uk/url?
url=http://www.lawrencechin2011.com/2008docs/Gmail112408.pdf&rct=
j&q=&esrc=s&sa=U&ved= 0ahUKEwjw1uHO1bXJAhVGWRQKHXQmAtoQFggZMAE&sig2
=tXuKi7acRrcYOLpNCgloMg&usg=AFQjCNEA5GCMYhGoYnpgjCfB-do9cWhYEQ"
"Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16"
Again, this is the email correspondence between the suspect and the German Lady in November
2008. 4:50 AM, the LB Admin looks at blogs/?author=1 again, petition/ecf_request.doc, 4:51
PM, blogs/?p=61.
80.189.8.35 - - [29/Nov/2015:05:50:45 -0700] "GET /blogs/?author= 1 HTTP/1.1" 200 3385
"http://www.google.co.uk/url? url=http://lawrencechin2011.com/blogs/%3Fauthor%3D1
&rct=j&q=&esrc=s&sa=U&ved=
0ahUKEwj48ID61bXJAhUHPhQKHVr3DmAQFggUMAA&sig2=MuBQR1
_kYk0STCmUmyCm0w&usg=AFQjCNGvultm4bYWm5l08RhW6LNi5AX4bw" "Opera/9.80
(X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16"
80.189.8.35 - - [29/Nov/2015:05:50:54 -0700] "GET /petition/c0901379jl/ecf_request.doc
HTTP/1.1" 404 1360 "http://www.google.co.uk/url?
url=http://www.lawrencechin2011.com/petition/c0901379jl/ecf_request.doc&rct=j&q=&esrc=s
&sa=U&ved=
0ahUKEwj48ID61bXJAhUHPhQKHVr3DmAQFgggMAM&sig2=KNbl2MU1ryDOw2czxbPD
aQ&usg=AFQjCNENptlesH2hrdDmyq_m4sUz1d-QSA" "Opera/9.80 (X11; Linux x86_64;
Edition Linux Mint) Presto/2.12.388 Version/12.16"
80.189.8.35 - - [29/Nov/2015:05:51:00 -0700] "GET /blogs/?p=61 HTTP/1.1" 404 3475
"http://www.google.co.uk/url? url=http://lawrencechin2011.com/blogs/%3Fp%3D61
&rct=j&q=&esrc=s&sa=U&ved=
0ahUKEwj48ID61bXJAhUHPhQKHVr3DmAQFgglMAQ&sig2
=zAH9m_w5VB9IRGRhr0IzfQ&usg=AFQjCNHQhO90mtJVz4VCXRr6VCpAPlc_wQ"
"Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16"
4:52 AM, because the entire blog and all the email correspondences have already been removed,
the LB Admin goes to the Way Back Machine to look for his blog: 207.241.226.215 (wwwbapp19.us.archive.org, Internet Archive, San Francisco).
207.241.226.215 - - [29/Nov/2015:05:52:56 -0700] "GET /blogs/wp- includes/js/wp-emojirelease.min.js?ver=4.3.1 HTTP/1.1" 200 16166 "http://lawrencechin2011.com/blogs/"
"Opera/9.80 (X11; Linux x86_ 64; Edition Linux Mint) Presto/2.12.388 Version/12.16 (via
Wayback Save Page)"
207.241.225.235 - - [29/Nov/2015:05:54:08 -0700] "GET /petition/c0901379jl/ecf_request.doc
HTTP/1.1" 404 2664 "-" "Mozilla/5.0 (compatible; archive.org_bot; Wayback Machine Live
Record; +http://archive.org/details/archive.org_bot)"
94
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
4:55 AM, the LB Admin is looking for the Korean Letter. Not there either.
80.189.8.35 - - [29/Nov/2015:05:55:16 -0700] "GET /korealetter- censored/korealettercensored.pdf HTTP/1.1" 404 1360 "http://www.google.co.uk/url?
url=http://www.lawrencechin2011.com/korealetter- censored/korealettercensored.pdf&rct=j&q=&esrc=s&sa=U&ved=
0ahUKEwjJjoT21rXJAhXD1RQKHXKlC1YQFggxMAc&sig2=g4_
9KT046zjXW_ZJR_Nmvw&usg=AFQjCNGiX8mBURWhI8yNV90rJ5L7X69c6A" "Opera/9.80
(X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16"
Evidently, the LB Admin is trying the same trick again. After everybody has staged a show
entrapping the suspect into the appearance that he is suffering severe paranoia delusion, the LB
Admin pretends to show concern and Googles his email address trying to track down the identity
of this “NDC”. Now, the question is: why is the LB Admin looking for the same email
correspondences again, when she has already found them 13 days ago? She must have already
been informed by Homeland Security that these documents have been removed. Hence: she is
first of all trying to obtain proofs that documents once found on the suspect's website have the
habit of disappearing. Secondly, because the suspect has become aware of the case which the
Secret Society women have opened on him at the Manhattan Beach police department, the
women have decided to close the case – so that the suspect's continual utterance on the matter
can work against him as evidence for his paranoia delusion, that he always imagines that the
women he's obsessed with are filing false reports about him to law enforcement – and open a
new one, using the same document (hatred crime vandalism) and the same argument (that the
suspect is always believing, due to severe paranoia schizophrenia, that the women he's obsessed
with him are going after him by falsely reporting him to law enforcement). And, not to forget, the
women are still looking for an opportunity to involve W in this staged show (or “cyber street
theater”). It can be assumed that, this afternoon, the Secret Society women will go to another law
enforcement agency to open up another case on the suspect – bringing all the volunteers'
testimonies with them – as if all the previous cases, the case at Manhattan Beach police
department as well as those at the TMU, had never existed. Which police department will be
chosen this time? The Hermosa Beach Police Department? Or the Pasadena Police Department?
6:23 AM, 93.91.151.36, static.grapesc.cz, Louny, Czech Republic.
93.91.151.36 - - [29/Nov/2015:07:23:58 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
491814 "https://www.google.cz/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36
OPR/33.0.1990.115"
More chatter about how the suspect has copied other people's painting.
7:29 AM, 86.61.85.11, dynamic.siol.net, Slovenia.
95
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
86.61.85.11 - - [29/Nov/2015:08:29:20 -0700] "GET
/scientificenlightenment1/representation222.html HTTP/1.1" 200 6299 "https://www.google.si"
"Mozilla/5.0 (Windows NT 6.1; WOW64; v:42.0) Gecko/20100101 Firefox/42.0"
More chatter about the suspect's supposed plagiarism.
8:32 AM, 221.145.183.167, the Korean scout,
221.145.183.167 - - [29/Nov/2015:09:30:20 -0700] "GET / HTTP/1.1" 200 4834
"http://iristech.net" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1)"
221.145.183.167 - - [29/Nov/2015:09:32:24 -0700] "GET / HTTP/1.1" 200 2430
"https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)"
8:49 AM, access.telenet.be, Maldegem, Belgium,
178.117.155.163 - - [29/Nov/2015:09:49:54 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
491814 "https://www.google.be/" "Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
More chatter.
Around 11 AM, the suspect, going to his church, has arrived at Normandie station. There is a
piece of paper left on the escalator: “katheryna.edu” then “usc.edu: jobs on the bottom”. At first
the suspect takes it, but then throws it away. He finds it very strange. Eternal recurrence of the
same. As if the “suit team” were still trying to produce evidence showing him conspiring with
the Russians. But that's back in 2008. Indeed, because the suspect never bothers with Noah's link,
Homeland Security is trying it again, sending an agent to place this piece of paper inside the
Metro station, knowing, from the control center's simulation, that the suspect will walk past this
point. And now Homeland Security has failed again, and is still unable to prove in the ICJ that
the suspect is conspiring with the Russians and the French. Thus the suspect's phobia, inherited
from the past, has once again saved the Russians and the French.
11:19 AM, sloane82 has posted the eighth reply on LB (Total posts: 244. Per day: 0.59. Joined: 9
October 2014.): “Can you move from where you are living? Do you have loads of mates at all?
It's a sorry state of affair as we are not legally trained with US rules. Keep in touch and put up as
much info [and] written letters sent up here. And we'll have a look.” This is clearly a trap. Again,
both the Secret Society women and Homeland Security have been trying to persuade the suspect
to go out of California so that he could become a fugitive. Furthermore, they want the suspect to
post more pronouncements about how he is being gang-stalked by a group of women so that they
could have more “evidences” on the basis of which to report him for suffering severe paranoia
delusion about the women he's supposedly obsessed with.
1:38 PM, 221.145.183.178, the Korean scout, /.
The suspect is at St Sophia. Fr Alan’s last sermon. Saw Angela. Then the long debate with Dan
and Johanna about neoliberalism. Starbucks, Normandie.
96
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
1:55 PM, 24.157.210.58, videotron.ca, Saint Jerome, Quebec.
24.157.210.58 - - [29/Nov/2015:14:55:04 -0700] "GET /kudoshizuka1988.jpg HTTP/1.1" 200
218090 "https://www.google.ca/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
24.157.210.58 - - [29/Nov/2015:14:55:05 -0700] "GET /shizukadetail.jpg HTTP/1.1" 200
296836 "https://www.google.ca/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
More chatter about how the suspect is feigning artistic talent.
4:15 PM, the suspect is now in Starbucks, Culver City, checking his visitors' log. His own search
for his blog on the Way Back Machine after discovering LB Admin's actions. Upset for a while
after discovering the operations on LB. He has now realized that Homeland Security is involved
in the gang-stalking.
6:22 PM, 74.37.55.244, Genealogy of Morals, Google, mond.mn.frontiernet.net, Delano,
Minnesota. Either decoy or more chatter.
Dinner at the Sushi place, 5 PM. 6:20 PM, Miguel comes over to inform the suspect that French
in Mind is canceled.
6:33 PM, allegoryofcave.html, Bing Preview.
7:03 PM, cpe.metrocast.net, Lexington Park, Maryland,
72.9.0.139 - - [29/Nov/2015:20:03:34 -0700] "GET /shizukadetail.jpg HTTP/1.1" 200 380104
"-" "Mozilla/5.0 (iPad; CPU OS 8_4_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like
Gecko) GSA/8.0.57838 Mobile/12H321 Safari/600.1.4"
64.233.172.175 - - [29/Nov/2015:20:03:36 -0700] "GET /fising2.html HTTP/1.1" 200 881
"http://www.google.com/search" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36
(KHTML, like Gecko; Google Web Preview) Chrome/27.0.1453 Safari/537.36"
(This is the portrait of Ms Kudo Shizuka.) More chatter about how the suspect is feigning artistic
talent.
7:04 PM, athd2.jpg refreshed on Facebook. The Secret Facebook Group is being accessed.
7:18 PM, Noah calls again. The suspect does not answer the call. Homeland Security could never
obtain the evidence they need for the suspect's conspiracy with France. The suspect rides the bus
to Westwood. Starbucks.
8:09 PM, teksavvy.com, Brampton, Ontario.
192.0.196.199 - - [29/Nov/2015:21:09:29 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
491814 "https://www.google.ca/" "Mozilla/5.0 (iPad; CPU OS 7_1_1 like Mac OS X)
AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D201 Safari/9537.53"
97
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
More chatter about how the suspect has copied somebody else's painting.
9:33 PM, the suspect is now in Starbucks. He has realized what has happened in the early
morning of 16 November. His reconstruction on the matter – which he has posted on AVFM
forum – is not quite correct. Now, he changes his email address on LB.
9:57 PM, the suspect begins posting the latest on LB:
Great acting, you guys!
I knew there were some PMs on 16 November about the identification of the
“poster” of the above narrative and “his website” because I got a notification from
somebody.
But obviously I’m not producing that.
The guy who is the “friend” of the women referred to in the story and who has
pretended to be able to track down the true identity of the poster seems to be from
Sheffield, UK, with an original IP address 146.200.162.191. He uses a Linux
computer (X11; Linux x86_64; Edition Linux Mint). He seems to be an
administrator of this forum, having access to the email addresses of the members.
And, so, on 16 November, he was told to Google for my email address to track down
my website and identify the women referred to in the story and then contact them.
The women then took the information to the local police to open up a case of “online
harassment” on me, alleging that I was slandering them in this forum because I
suffered from paranoia delusion believing they have been going after me. Well,
police’s case on me then got stuck because the investigation so far doesn’t show me
to be completely crazy.
But thanks to your guys’ acting, this Sheffield guy Googled for my email address
again this morning (which would be afternoon yesterday in your time zone) and,
upon finding no website any more, he has actually gone to the Way Back Machine to
get the cache of the old website. Since you guys’ acting (“Oh no, there is no PM at
all, nobody has received anything!”) has made it look like I was being paranoid,
these women were able to go to the police again to use you guys’ posting as
“evidences” that I am indeed crazy and am slandering them online. But the Way
Back Machine’s cache might not be sufficient evidence for actions to be taken.
And so, the question is: who told this Sheffield guy to Google for my email address?
These women are able to pull all these stunts so far – many of them illegal, like
presenting forged evidences to law enforcement – because there are some people in
the US Department of Homeland Security who are helping them and covering for
them. Well, that’s fine. There are also informants in their online group from other law
enforcement agencies who will occasionally tip me off about the danger that is
coming to me. I don’t know why they do that, and I don’t even know for which
98
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
agencies they work. I don’t know why the several law enforcement agencies which
are working on this gang-stalking case I’m talking about are working against each
other.
I’m spilling out all this because, in case I should get arrested for “online slandering”
and “online harassment”, this posting might be counter-evidence against the charges
against me. The fact that I don’t use any names in the narrative above, and don’t
place any links, clearly proves that I don’t intend for the women referred to in the
above summary to be identified. And I don’t intend for myself to be identified either.
And so what this Sheffield guy did is very much not appreciated. Members’ email
addresses on this forum should have remained private.
And now I have even changed the email address, and so don’t bother me anymore.
I consider that this thread is closed. Please leave it alone.
10:15 PM, the suspect has finished with editing his latest posting on LB.
10:30 – 10:33 PM, the suspect has posted the latest on AVFM. (“The Sheffield person.”)
10:48 PM, the suspect begins researching “Sharon Coleman”: he has now discovered the true
identity of LB Admin (the “Sheffield person”).
The new master “gang-stalker” Sharon Coleman (LB Admin)
10:50 PM, Marina has logged into Couchsurfing, she still hasn’t declined the suspect's offer.
99
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
11:31 PM, it appears that Amethyst (LB Admin) has made a last reply before deleting the thread.
She has posted the reply in order to enable law enforcement and Homeland Security to intercept
the posting as evidence and yet quickly deleted it before the suspect gets to see it. This, because
the Secret Society women don't want the suspect to know what exactly he has been accused of.
What remaining evidence which Homeland Security still needs to justify their false profile of the
suspect in the ICJ? We must thus assume that the LB Admin has pretended to get freaked out by
the suspect's insider knowledge so that Homeland Security might obtain evidences showing the
suspect to be a computer hacker.
12:48 AM, 140.137.20.70, dividedline.html, Google TW, was.pccu.edu.tw, Taiwan Academic
Network Information Center, Taipei. More chatter about the suspect's plagiarism.
By 1:10 AM, the entire posting “Being gang-stalked” has been deleted.
1:13 AM, bot.net.in, Delhi. More chatter about the suspect's plagiarism or misogyny or
pedophilia:
59.177.234.90 - - [30/Nov/2015:02:13:08 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692
"https://www.google.co.in" "Mozilla/5.0 (Windows NT 6.0; rv:38.0) Gecko/20100101
Firefox/38.0"
2:29 AM, lightspeed.turga.sbcglobal.net, Conyers, Georgia.
107.197.83.17 - - [30/Nov/2015:03:29:14 -0700] "GET
/scientificenlightenment1/greekreligion.html HTTP/1.1" 200 44324 "https://www.google.com/"
"Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.86 Safari/537.36"
More chatter about the suspect's plagiarism.
30 November (Monday; a new law enforcement case on the suspect)
And so today the Secret Society women have opened a new case on the suspect, at a undefined
police department, probably at the anti-terrorism unit of some local police department like the
Hermosa Beach police department or Pasadena police department, on the same “domestic
terrorism” charge. This is their 13th attempt to exterminate the suspect. (Counting all the previous
attempts: TMU: 7; LAPD Hate Crime Unit: 1; French: 1; UN: 1; West LA division: 1; DA: 1;
Manhattan Beach Police Department: 1. The Secret Society women are estimated to have thus far
filed around 20,000 false reports about the suspect, having mobilized around 10,000 people for
the enterprise.) The profile which they would construct of the suspect for the new detectives is
the same false profile which Homeland Security has established, as has been defined above.
Yesterday the case was opened on the premise that the Secret Society women are frightened
because the suspect has the tendency to develop, about the women he's obsessed with, paranoia
delusion that they are going after him by falsely reporting him to law enforcement. This, in
100
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
addition to the claim contained in the confidential “DRCRR warning” or Homeland Security
warning that the suspect commits hate crime against white females out of misogynist ideology
and hatred. Then, last night, LB Admin has supplied a hint about the suspect's computer hacking.
And so now the Secret Society women need to establish the rest of the characteristics through the
volunteers' efforts:
Misogynist, white supremacist, plagiarizer, computer-hacker, stalker, cyberstalker,
anti-American terrorist, vandalizer (i.e. a misogynist terrorist who is prone to
become obsessed with women, stalk them, and then vandalize their properties in
order to terrorize them), violent, delusional, paranoia schizophrenic, sexually
perverted and yet impotent thus loving and hating white females at the same time,
extremely malicious and pathologically deceitful (anti-social).
The volunteers will visit the suspect's website, and falsely rumor about what they have seen in
accordance with the above characteristics. The rumors will then be submitted to the detectives in
charge of the new case. As usual, because the suspect is apparently a computer-hacker violating
the women's privacy, the detectives are prohibited by “victim confidentiality” from running
surveillance directly on the suspect or looking at his website, and, while being required to never
reveal the existence of the case to the suspect or anyone else, also from verifying the veracity of
the “victims'” reports about the suspect and his website. Note that this is, at bottom, a Homeland
Security operation. The evidences submitted to the new law enforcement detectives will be
intercepted into the ICJ to support Homeland Security's case against the French and the
Russians.3
The suspect passes the night in Westwood Village. He wakes up on 5 AM, due to the cold. He
goes to Starbucks. 6:40 AM, the suspect posts the below notice on AVFM:
It appears that the Sheffield person is just the site owner of LB herself. It’s actually a
woman. Why is she running a “men’s rights forum”?
Within 6 hours of my posting the above summary on 15 November, she has agreed to
cooperate with the gang of women and to pretend to show concern about the post and
Google my account activation email address to track down my website and the
identities of the gang of women referred to in the story. This is clearly a violation of
forum members’ privacy in order to help the gang of women to get me arrested.
3 If the latest case is opened at the Hermosa Beach police department, we shall note that, according to its website, the Hermosa Beach police department has six detectives on duty, one Detective Sergeant, and one Terrorism Liaison Officer, Jonathan Cruz, who works with the local Anti­Terrorism Information Center. If the latest case is opened at the Pasadena police department, we shall note that, according to its website, there are nine detectives assigned to the Special Investigation Unit (Vice/ Narcotics), and that the
Criminal Investigation Division is comprised of four sections staffed with 77 people in total. The Pasadena police department is much larger, and so less fitting for the Secret Society women's purposes.
101
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Once again, I have no intention for anybody mentioned in the summary account to be
identified. It’s usually impossible for people designated by “J”, “K”, “G”, “M” to be
identified in any case.
The Sheffield person has deleted the thread over there at LB within three hours of the
posting of the above reply. She probably will then see the replicate here and
complain to the UK police about slandering. We’ll then just have to argue whether
the IP address noted above is actually hers. But then she can always just deny that
she has in fact contacted the gang of women.
Alternative:
While we can argue whether the IP address noted above is actually hers, she can
always just deny that she has in fact contacted the gang of women.
7:51 AM, 188.71.255.213, Wataniya Telecom, Kuwait City.
188.71.255.213 - - [30/Nov/2015:08:51:42 -0700] "GET /1/layereduniverse.html HTTP/1.1" 200
34939 "https://www.google.com.kw/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
More chatter about the suspect's plagiarism.
7:56 AM, 82.211.202.71, dynamic-ip.k-net.dk, Kongens Lyngby, Denmark.
82.211.202.71 - - [30/Nov/2015:08:56:47 -0700] "GET /sci/sci.pdf HTTP/1.1" 200 480167
"https://www.google.dk" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101
Firefox/42.0"
A testimony about the suspect's misogyny.
8:28 AM, 107.167.108.61, Opera Mini, San Mateo, California.
107.167.108.61 - - [30/Nov/2015:09:28:35 -0700] "GET /1/chinesepatriarchy220.htm HTTP/1.1"
200 32718 "https://www.google.co.in/" "Mozilla/5.0 (Linux; Android 4.4.2; SM-G355H
Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.78 Mobile
Safari/537.36 OPR/32.0.1953.96473"
Another testimony about the suspect's misogyny.
10:16 AM, 94.29.208.101, Qualitynet, Kuwait City.
94.29.208.101 - - [30/Nov/2015:11:16:17 -0700] "GET /1/layereduniverse.html HTTP/1.1" 200
34939 "https://www.google.com.kw/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
Another testimony about the suspect's plagiarism.
102
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
10:22 AM, 108.185.115.15, socal.res.rr.com, Studio City, California. This person was here
before, 1:40 PM, 23 November, and 9:02 PM, 11 November, always looking at the same chapter.
108.185.115.15 - - [30/Nov/2015:11:22:55 -0700] "GET /scientificenlightenment1/aztec.html
HTTP/1.1" 200 12505 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
It's not clear whether he is here to provide more testimony about the suspect's plagiarism or just
to generate decoy. Given the fact that he will come again on 6 December, he is most likely doing
decoy.
12:05 PM, 54.169.158.246, ap-southeast-1.compute.amazonaws.com, Singapore. The Secret
Society women still want to produce more testimony for the suspect's delusion mind (“brain
chips”) for their new law enforcement case.
54.169.158.246 - - [23/Nov/2015:08:26:27 -0700] "GET /2012/92012-8.png HTTP/1.0" 200
831587 "http://interpreteeg007.blog.163.com/blog/static/2060561642013628 801821/"
"Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N; wv) AppleWebKit/537.36
(KHTML, like Gecko) Version/4.0 Chrome/FreeBrowser Mobile Safari/537.36 FreeBrowser/23"
Meanwhile, the suspect has gone to Work Source, 7 AM. Orientation. He is barely able to
concentrate: frightened about being falsely arrested as a computer-hacker. Thinking only about
how to escape. He is there until 1 PM. Afterwards, he comes back to the public library. While on
the bus, he has deleted Metasploit (which he has never used) from his computer for fear of being
misunderstood. (Not completely, however.) Law enforcement surveillance might very well have
picked this up. (There is a black man wearing earphones sitting behind the suspect on the bus.)
This episode indicates that Homeland Security has got inside the control center and has asked the
supercomputer inside to program the suspect to fit their false profile of the suspect.
1:46 PM, athd2.jpg refreshed on Facebook.
173.252.90.249 - - [30/Nov/2015:14:46:32 -0700] "GET /scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12120 "-" "facebookexternalhit/1.1
(+http://www.facebook.com/externalhit_uatext.php)"
The Secret Facebook Group is being accessed.
3:27 PM, it's the Princeton “decoy”: 128.112.155.171, wash.cs.princeton.edu.
128.112.155.171 - - [30/Nov/2015:16:27:37 -0700] "GET
/scientificenlightenment1/asmatpoles.jpg HTTP/1.1" 200 37829
"http://www.lawrencechin2011.com/scientificenlightenment1/ancesto rcult.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.131 Safari/537.36"
Angela left a message for the suspect around 4:38 PM.
103
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
5:47 PM, 64.233.172.159, Blue Host Forum, “strange visits”, Google Web Preview. About being
hacked. The Secret Society is producing more testimonies for the suspect's being a computer
hacker. (Namely, according to the women, when the suspect reports, in 2012, his suspicion of
being hacked, he is bragging about hacking other people's computers.)
6:21 PM, 205.197.242.153,
205.197.242.153 - - [30/Nov/2015:19:21:46 -0700] "GET /karinaftrwrd/karinaftrwrdb.pdf
HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=184178.0" "Mozilla/5.0
(Linux; Android 4.4.4; ZTE-Z755 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko)
Version/4.0 Chrome/33.0.0.0 Mobile Safari/537.36"
The volunteers have again tracked down the suspect's past posting on “electronic chips” inside
his brain. Although the posting is more than three years old, the volunteers would presumably
intentionally overlook the date on the posting and submit testimony to the police to the effect that
the suspect is currently engrossed in the same schizophrenic delusion. This is also in response to
the suspect's admission about “BCI” on “Sequel” in his AVFM posting. Homeland Security has
obtained more evidence in support of their false profile, in the ICJ, of the suspect as suffering
schizophrenic delusion.
Note that this IP address is either a proxy or belongs to a computer geek. In both cases this
person is a computer geek: perhaps a Wikia contributor at valkyriecrusade.com.
104
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Meanwhile, the suspect is at Chrysalis, 3 PM. Tanisha. He gets new shoes. Starbucks, he then
comes back to Chrysalis, dinner and Men’s Group. George makes fun of him.
7:54 PM, hsd1.ca.comcast.net, Santa Cruz, California,
24.6.95.230 - - [30/Nov/2015:20:54:07 -0700] "GET /gallery/perspective.html HTTP/1.1" 200
2659 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X)
AppleWebKit/600.1.4 (KHTML, like Gecko) GSA/6.0.51363 Mobile/13B143 Safari/600.1.4"
More chatters about how the suspect has plagiarized his theory on linear perspective. From 8:10
PM onward, there are 17 visits to images, and no visit to web pages until 12:08 AM. Are the
Secret Society women conferring with the detectives?
Meanwhile, the suspect: after Chrysalis, he is at Starbucks, Little Tokyo, and goes home around
9 PM.
The Secret Society women's operation continues after midnight. 12:43 AM:
193.255.91.153 - - [01/Dec/2015:01:43:03 -0700] "GET /owl.JPG HTTP/1.1" 200 11579
"https://www.google.com.tr/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
1:09 AM,
212.219.191.137 - - [01/Dec/2015:02:09:08 -0700] "GET
/scientificenlightenment1/standardmodeldrell.gif HTTP/1.1" 200 9790
105
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
"https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
Two more chatters about how the suspect has massively copied images from books and other
website without their consent.
1:55 AM, ua.batelco.jo, Amman, Jordan,
212.35.66.30 - - [01/Dec/2015:02:55:17 -0700] "GET
/scientificenlightenment1/standardmodeldrell.gif HTTP/1.1" 200 9790
"https://www.google.com" "Mozilla/5.0 (Windows NT 5.1; rv:41.0) Gecko/20100101
Firefox/41.0"
One more chatter to such effect. 2:37 AM, the same Princeton guy, decoy:
128.112.155.173 - - [01/Dec/2015:03:37:25 -0700] "GET
/scientificenlightenment1/foodcycle.jpg HTTP/1.1" 200 44316
"http://www.lawrencechin2011.com/scientificenlightenment1/ancestorcult.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.131 Safari/537.36"
2:41 AM, 48-150.cablevision.qc.ca, Val d’Or.
24.212.48.150 - - [01/Dec/2015:03:41:52 -0700] "GET /timeline9/timeline9d.pdf HTTP/1.1" 404
1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Windows NT
6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
Another volunteer: “I remember this guy. He suffers paranoia delusion imagining a group of
women is going after him. He wrote it down. I read it somewhere. Here. Oh, it's gone.” But the
chatter has done enough damage, both with the detectives and with Homeland Security in the
ICJ.
1 December (Tuesday)
4:07 AM, himiko.jpg, Google ID, Google proxy (“en-us”). More chatter: “Oh, the guy who has
copied someone else's painting...”
5:08 AM, 176.2.101.9, E-Plus Mobilfunk, Germany.
176.2.101.9 - - [01/Dec/2015:06:08:38 -0700] "GET /blogs/2014/04/14/last-word-on-my-pasttwo-month-targeting-and- gang-stalking/ HTTP/1.1" 404 1360
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 4.4.4;
C6603 Build/10.5.1.A.0.292) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.76
Mobile Safari/537.36"
106
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
The news about how a paranoia schizophrenic's paranoia delusion about a group of women going
after him has now reached another guy in Germany, who comes to the Prison Planet Forum to
take a look.
5:08 AM, MRI machine, Baidu.
5:10 AM, MRI machine, Baidu, proxy. It looks like these two China persons were
communicating while looking at the image. The “news” keeps on spreading.
5:17 AM, 128.112.155.172, the Princeton “decoy”.
128.112.155.172 - - [01/Dec/2015:06:17:16 -0700] "GET /1/secularization.jpg HTTP/1.1" 200
91889 "http://www.lawrencechin2011.com/1/amcivilreligion.htm" "Mozilla/5.0 (Macintosh;
Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131
Safari/537.36"
5:18 AM, classificationofindia.html. More chatter about the suspect's dilettantism and plagiarism.
6:08 AM, the Princeton University “decoy” looks at the images on humandispersal.html. It
would seem that he is accessing it from some sort of cache, perhaps the cache in his own
browser, for there is no trace of his accessing the webpage itself.
128.112.155.171 - - [01/Dec/2015:07:08:12 -0700] "GET
/scientificenlightenment1/afroasiaticmap.jpg HTTP/1.1" 200 49245
"http://www.lawrencechin2011.com/scientificenlightenment1/humandispersal.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.131 Safari/537.36"
6:15 AM, the Princeton University “decoy” looks at ancestorcult.html. Again, it appears that he
is accessing it from some sort of cache.
128.112.155.171 - - [01/Dec/2015:07:15:38 -0700] "GET
/scientificenlightenment1/haidapoles.jpg HTTP/1.1" 200 40774
"http://www.lawrencechin2011.com/scientificenlightenment1/ancestorcult.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.131 Safari/537.36"
It's just “decoy”, presumably.
6:25 AM, 193.49.225.25, cacheserv3.univ-lille1.fr, Commissariat à l’Energie Atomique,
Université de Lille, Sciences et Technologiques. Noted as a proxy.
193.49.225.25 - - [01/Dec/2015:07:25:51 -0700] "GET /1/thermhch6d222.html HTTP/1.0" 200
29197 "http://images.google.fr/imgres?imgurl=http%3A%2F%2Fwww.lawrencechin2011.com
%2F1%2Fchemoton.jpg&imgrefurl=http%3A%2F%2Fwww.lawrencechin2011.com
%2F1%2Fthermhch6d222.html&h=577&w=521&tbnid=LVI6uQxXz6zVEM
%3A&docid=9B6KU0G77WbTkM&ei=4q1dVpJew7dp107
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
7a28AQ&tbm=isch&iact=rc&uact=3&dur=236&page=1&start=0&ndsp=13&ved=0ahUKEwiS
1_fz7rrJAhXDWxoKHXubDU4QrQMIITAA" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
Just yesterday, Marine Le Pen was in Lille. This visit might be related to that. Perhaps a FN's
mole (who is a student at the University of Lille). Namely, while joining the Secret Society's
operation to exterminate the suspect in order to avoid charges of conspiracy with him, the mole is
also secretly gathering evidence showing that the suspect hasn't really plagiarized and that he
isn't like what the Secret Society women have claimed him to be.
7:20 AM, sci/appendix.html. More chatter about the suspect's plagiarism.
9:05 AM, 83.135.41.109, capra.html, versanet.de, Uetersen, Germany. More chatter (plagiarism).
11:25 AM, 86.179.139.238, UK.
86.179.139.238 - - [01/Dec/2015:12:25:37 -0700] "GET
/readings/David_Jacobs_The_Threat.pdf HTTP/1.1" 404 1360 "https://scholar.google.co.uk/"
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.86 Safari/537.36"
As the news continues to spread, another person joins in on the “hunt”. “Oh, he has once put up
other people's book on his website without obtaining consent.”
11:35 AM, Benson’s Goddess. “Oh, he puts up other people's painting on his website as if it were
his own.”
12:57 PM, 41.206.1.4, mtnnigeria.net, Nigeria. Note that this IP address has appeared in Project
Honey Pot for association with spam harvesting and dictionary attacks. It's a proxy.
41.206.1.4 - - [01/Dec/2015:13:57:54 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1"
404 1360 "https://www.google.com.ng/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
This volunteer either “remembers” or has joined in on the “hunt”.
1:12 PM, the Princeton “decoy”,
128.112.155.173 - - [01/Dec/2015:13:12:46 -0700] "GET /scientificenlightenment1/totem1.jpeg
HTTP/1.1" 200 17576
"http://www.lawrencechin2011.com/scientificenlightenment1/ancestorcult.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.131 Safari/537.36"
The same thing. 1:14 PM, 76.64.226.252, Fermat, Google CA, dsl.bell.ca, Oakville, Ontario. The
“hunters” even suspect the suspect's original contribution (that Fermat's principle of least time is
at bottom an instance of the principle of conservation of energy) to be “plagiarized”.
108
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
3:34 PM, 191.184.33.92, Foucault on biopower, Google BR, virtua.com.br, Maceio, Brazil.
Chatter (plagiarism).
3:35 PM, 174.66.163.236, ip174-66-163-236.sd.sd.cox.net, Chula Vista. (South of San Diego.)
174.66.163.236 - - [01/Dec/2015:16:35:36 -0700] "GET /blogs/2013/11/11/four-women-try-toknock-down-my-website- part-16/ HTTP/1.1" 404 1360 "-" "Mozilla/5.0 (Macintosh; Intel Mac
OS X 10.9; rv:42.0) Gecko/20100101 Firefox/42.0"
This might be either Dina B or a friend of hers. He is evidently sent the link by somebody who
pretends to “remember”: “Yeah, the guy suffers from this paranoia delusion, that a group of
women are filing false stalking claims against him at the TMU. He wrote it down on this blog. I
have seen it. It's removed. It used to be at this URL.” And so he sends the link to this San Diego
person.
4:05 PM, 65.208.151.114, Verizon Business, US (no information given), massive indexing of
everything on the front page. 4:10 PM, gallery. 4:15 PM, Table of Contents and everything on
acad.html. 4:19 PM, everything on the links page. 4:22 PM, every gallery page. 4:26 PM,
everything on the Old Gallery page.
65.208.151.114 - - [01/Dec/2015:17:05:51 -0700] "GET / HTTP/1.1" 200 2392 "-" "Mozilla/4.0
(compatible; MSIE 6.0; Windows NT 5.1; SV1)"
See the warning about this IP address: https://www.paulstechtalk.com/2009/02/being-a-bad-bot/.
See also this warning: http://hostile-ip-addresses.blogspot.com/2011/02/denial-of-service-attackfrom.html. It is said that this IP address belongs to Homeland Security.
109
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
It seems that this is what has happened. Now that the Secret Society women have spent the
previous two days conferring with the detectives, they are telling the latter that they are afraid to
visit his website looking for what delusional slander he might have blasted about them, all
because the suspect, due to suffering paranoia schizophrenic, is wont to mistake the purpose of
their visits and construct, on the basis of these visits, further delusional scenarios about how they
are going after him by falsely reporting him to law enforcement behind his back, etc. And so the
detectives ask Homeland Security to cache the suspect's entire website in order to enable the
“victims” to look through it offline without tipping off the suspect. This incident might also help
cover up the fact that the Secret Society women have already instructed the HK Hacker to cache
the suspect's entire website many times. Evidently, the HK Hacker has been instructed to destroy
that cache to eliminate evidences, now that the entire story has changed: the women have never
filed any stalking or hate crime claims against the suspect at any law enforcement agency in the
past. The suspect has imagined all this up by mistaking the meaning of the visits to his website.
The women only have visited it out of concern for his paranoia delusion about them.
Meanwhile, 4:33 PM, Dina B or her friend continues: 174.66.163.236, ip174-66-163236.sd.sd.cox.net.
174.66.163.236 - - [01/Dec/2015:17:33:34 -0700] "GET /suppl_pld_
58bg/suppl_pld_drft_58bgg.pdf HTTP/1.1" 404 1322 "https://www.google.com" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10.9; rv:42.0) Gecko/20100101 Firefox/42.0"
He is probably explaining to the detective how the suspect has requested Dina's friendship on
Facebook, and how she is shocked to discover that the suspect is so frightening because of his
tendency to become obsessed with women and then develop bizarre persecution mania about
being persecuted by them.
174.66.163.236 - - [01/Dec/2015:17:34:11 -0700] "GET /petition/n4b-17/n4b-17.pdf HTTP/1.1"
404 1360 "https://www.google.com" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:42.0)
Gecko/20100101 Firefox/42.0"
174.66.163.236 - - [01/Dec/2015:17:37:33 -0700] "GET /01_09_47/01 _29_47.pdf HTTP/1.1"
404 1360 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:42.0) Gecko/20100101
Firefox/42.0"
As he continues to Google for the suspect, however, he finds nothing. Everything is removed.
But the “chatter” would have already done the damage (both with the police and at the ICJ).
4:37 PM, the indexing continues, Table of Contents. 4:53 PM, translations of Christian
Dogmatics.
4:54 PM, 24.214.216.96, chinesepatriarchy.html, knology.net, North Charleston, South Carolina.
24.214.216.96 - - [01/Dec/2015:17:54:01 -0700] "GET /1/chinesepatriarchy.htm HTTP/1.1" 200
15792 "https://www.google.com/" "Mozilla/5.0 (iPad; CPU OS 8_1_1 like Mac OS X)
AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12B435 Safari/600.1.4"
110
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Just more chatter (misogyny, plagiarism). 4:56 PM, the indexing has finished. The whole process
has lasted 50 minutes.
5:56 PM, 71.204.26.159, daly.html, hsd1.ga.comcast.net, Decatur, Georgia. More “chatter” about
the suspect's “misogyny”.
Meanwhile, the suspect. He wakes up late. Father Bob calls! It's about his volunteering at Urban
Ministry. Why does Father Bob suddenly call the suspect when he has never done this before?
We can only assume that Homeland Security has already interviewed Father Bob and has falsely
warned him that the suspect is a paranoia schizophrenic who is imagining being gone after by a
group of women, who have thus become frightened of him. Masturbation has caused the suspect
to miss the bus. He leaves home only after 1:30 PM. No time for Social Security. Bail Hotline.
Urban Ministry. Then, instead of Forum, he has gone to German language lesson meetup, West
LA. He talks to Angela while on the bus, and then discovers the indexing. He is shocked. 6:26
PM, the suspect, arriving in Westwood, begins removing his ancient (20 year-old) Manga “Limit
of Love,” etc., from Old Gallery. Also the portrait “Monkey Pyramid”.
9:24 PM, 177.242.8.90, customer-leon-8-90.megared.net.mx, Leon, Mexico.
177.242.8.90 - - [01/Dec/2015:22:24:33 -0700] "GET /scientificenlightenment1/capra.html
HTTP/1.1" 200 11888 "https://www.google.com.mx/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
More chatter (“plagiarism”).
9:38 PM, the suspect returns to Vermont from his German language lesson meetup. At Starbucks,
he removes mycousinsfamily.htm. (The old portraits of the German Lady are on there.)
9:54 PM, 170.148.69.141, JP Morgan Chase APTI, New York, New York.
170.148.69.141 - - [01/Dec/2015:22:54:48 -0700] "GET /scientificenlightenment1/schuld.html
HTTP/1.1" 200 25700 "http://www.google.com.hk/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=
1&ved=0ahUKEwjcmvPIvrzJAhWBpJQKHYAOD60QFgghMAA&url=http%3A%2F%
2Fwww.lawrencechin2011.com%2Fscientificenlightenment1%
2Fschuld.html&usg=AFQjCNGYtvVUlBMdcFSjHKDlfaas7LBjnQ" "Mozilla/5.0 (Windows NT
6.1; WOW64; Trident/7.0; rv:11.0) like Gecko"
Another visit from the most bizarre place. This volunteer, working at a financial center, has the
time to receive a “notice” about the new rumor, and to Google for the suspect. Is this guy
Chinese? (Note that this person might not actually be in New York, where it's already past
midnight.)
Then, 10:32 PM, 50.92.192.33, bchsia.telus.net, Burnaby, British Columbia.
50.92.192.33 - - [01/Dec/2015:23:32:42 -0700] "GET
/scientificenlightenment1/presocratics222.html HTTP/1.1" 200 9907 "https://www.google.ca/"
111
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
"Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.86 Safari/537.36"
More chatter.
1:16 AM, 41.77.14.131, Globe Internet Limited, Blantyre, Malawi (east of Mozambique).
41.77.14.131 - - [02/Dec/2015:02:16:55 -0700] "GET
/correlate_revised_no_summary_126/correlate_revised_no_summary%20126_(secure).pdf
HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
41.77.14.131 - - [02/Dec/2015:02:17:16 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/correlate_revised_no_summary_126/correlate_revised_no_s
ummary%20126_(secure).pdf" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/46.0.2490.86 Safari/537.36"
This is evidently a proxy. Somebody has “remembered”: “Oh, this crazy guy has once written
about his relationship with the FBI, CIA, and DHS. That nuthead!” And this “volunteer” receives
the notice from that “somebody”, and so Googles for the matter.
Meanwhile, the suspect is at home, and spends two hours getting frightened by the bad news
about the indexing IP address.
3:44 AM, 71-217-215-37.cdrr.qwest.net, Iowa City: another bad rumor (“plagiarism).
71.217.215.37 - - [02/Dec/2015:04:44:37 -0700] "GET /scientificenlightenment1/capra7777.html
HTTP/1.1" 200 21637 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
3:54 AM:
66.220.158.107 - - [02/Dec/2015:04:54:13 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
56998 "http://alfa-img.com/show/yamatai-kingdom.html" "facebookexternalhit/1.1
(+http://www.facebook.com/externalhit_uatext.php)"
69.171.228.123 - - [02/Dec/2015:04:54:15 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
491814 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)"
What is this about? It seems that the Secret Society women have linked up the suspect's painting
of Goodess Athena and Queen Himiko from the Secret Facebook Group.
2 December (Wednesday)
And so the Secret Society operation continues. 4:54 AM, 143.117.240.114,
representation222.html, y0114.fin.qub.ac.uk, Queens University Belfast, UK. (In Northern
Ireland.) More chatter about the suspect's “plagiarism” in order to produce evidence in the ICJ
showing him to be a plagiarizer.
5:58 AM, thermhch6d222.html, Google IN, Opera Mini (en). The same chatter.
112
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
6:12 AM, 150.199.179.92, himiko.jpg, Google, Central Methodist University, mail.fz.k12.mo.us,
Columbia, Missouri.
150.199.179.92 - - [02/Dec/2015:07:12:46 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
491814 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
More chatter about how the suspect has copied somebody else' painting. Then, 8:07 AM,
24.114.80.60, Rogers Cable, Montreal.
24.114.80.60 - - [02/Dec/2015:09:07:47 -0700] "GET
/scientificenlightenment1/standardmodeldrell.gif HTTP/1.1" 200 9790 "https://www.google.ca/"
"Mozilla/5.0 (iPhone; CPU iPhone OS 9_0_2 like Mac OS X) AppleWebKit/601.1.46 (KHTML,
like Gecko) Version/9.0 Mobile/13A452 Safari/601.1"
More chatter about how the suspect has copied other people's content onto his own website.
Then, 9:35 AM, 106.221.133.56, representation222.html, Google IN, Bharti Airtel, Pune, India.
106.221.133.56 - - [02/Dec/2015:10:35:55 -0700] "GET
/scientificenlightenment1/representation222.html HTTP/1.1" 200 6299
"https://www.google.co.in" "Mozilla/5.0 (Windows NT 5.1; rv:42.0) Gecko/20100101
Firefox/42.0"
9:41 AM, he comes again:
106.221.133.56 - - [02/Dec/2015:10:41:20 -0700] "GET
/scientificenlightenment1/representation222.pdf HTTP/1.1" 200 2382156
"http://www.lawrencechin2011.com/scientificenlightenment1/representation222.html"
"Mozilla/5.0 (Windows NT 5.1; rv:42.0) Gecko/20100101 Firefox/42.0"
More chatter (plagiarism). 10:37 AM, dukesm2.jpg linked up from the Secret Facebook Group.
173.252.120.116 - - [02/Dec/2015:11:37:09 -0700] "GET /gallery/dukesm2.jpg HTTP/1.1" 200
5252 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)"
The Secret Society is brainstorming how to falsely report the suspect for playing fraud with his
artworks. 10:49 AM, reverse.completel.net.
89.224.15.27 - - [02/Dec/2015:11:40:04 -0700] "GET /1/chinesepatriarchy220.htm HTTP/1.1"
200 32775 "http://images.google.fr/imgres?imgurl=http%3A%2F%
2Fwww.lawrencechin2011.com%2F1% 2Fyangshaototalview.jpg&imgrefurl=http%3A%2F%
2Fwww.lawrencechin2011.com%2F1%2Fchinesepatriarchy220.htm&h=444
&w=650&tbnid=uuBPKv09rTmkzM%
3A&docid=Z0dYMR2kd4JUUM&hl=fr&ei=xDpfVorFPMi6atKaqqAH&tbm=isch&ia
ct=rc&uact=3&dur=374&page=2&start=48&ndsp=57&ved=0ahUKEwiKt4G06b3JAhVInRoK
HVKNCnQQrQMIrgIwWQ" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; WOW64;
Trident/5.0)"
113
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
More chatter about the suspect's plagiarism. 11 AM, 62.178.95.140, vie.surfer.at, Vienna.
62.178.95.140 - - [02/Dec/2015:12:00:19 -0700] "GET
/readings/Audacity_kompakt_Leseprobe.pdf HTTP/1.1" 404 1360 "http://www.google.at/search?
q=virtualbox+kompakt+reibold+filetype%3Apdf&btnG=Suche&hl=deAT&biw=&bih=&gbv=1" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:42.0) Gecko/20100101
Firefox/42.0"
Another volunteer has discovered that the suspect once has put other people's content on his
website.
11:02 AM, descartes202.html, Opera Mini. More chatter about the suspect's plagiarism.
Meanwhile, the suspect. He wakes up 10 AM, leaving home 10:30 AM. Social Security
Administration, 11:46 AM. Obtained the letter needed for Work Source. Library, checked log.
Then, he sets out for Westwood, to catch his appointment at Edelman.
Until 4 PM, there were 24 visits to the images on his website!
4:14 PM, 66.87.133.61, pools.cgn.spcsdns.net, Wingate, North Carolina.
66.87.133.61 - - [02/Dec/2015:17:14:06 -0700] "GET /1/chinesepatriarchy.htm HTTP/1.1" 200
15792 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X)
AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1"
More chatter about the suspect's misogynist rambling and plagiarism.
Meanwhile, the suspect: he is with Dr Burns on 2:30 PM. After that, he comes back to
Westwood. Starbucks. Checked log. He is getting worried over Secret Society’s renewed actions.
5:30 PM, he leaves for Draw Anything LA.
5:48 PM, 37.221.161.72, Romania. This is evidently a proxy.
37.221.161.72 - - [02/Dec/2015:18:48:53 -0700] "GET /cheneyplan25/cheneyplan25.pdf
HTTP/1.0" 404 2613 "http://www.lawrencechin2011.com/cheneyplan25/cheneyplan25.pdf"
"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/37.0.2062.124 YaBrowser/14.10.2062.12521 Safari/537.36"
37.221.161.72 - - [02/Dec/2015:18:48:53 -0700] "GET / HTTP/1.0" 200 4834
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/37.0.2062.124 YaBrowser/14.10.2062.12521 Safari/537.36"
Another volunteer has “remembered” (even though the “crazy material” has been removed).
Then, 7:31 PM, 99.74.242.211, presocratics.html, lightspeed.irvnca.sbcglobal.net, Orange.
99.74.242.211 - - [02/Dec/2015:20:31:33 -0700] "GET
/scientificenlightenment1/presocratics.html HTTP/1.1" 200 20438 "http://www.google.com/"
114
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
"Mozilla/5.0 (Linux; U; Android 4.3; en- us; MT2L03 Build/HuaweiMT2L03)
AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30"
More chatter (plagiarism). 7:52 PM, 81.231.190.105, secularization.jpg, from
amcivilreligion.html, tbcn.telia.com, Nora, Sweden, Webcollage 1.65. What is this about? Most
likely, to create the impression in Homeland Security's surveillance that the suspect has put
together his webpages by copying from other websites and collaging them together. More
evidence in support of Homeland Security's case in the ICJ.
8:27 PM, 70.24.206.240, dsl.bell.ca, Vaudreuil-Dorion, Quebec.
70.24.206.240 - - [02/Dec/2015:21:27:23 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692
"https://www.google.ca/" "Mozilla/5.0 (iPhone; CPU iPhone OS 7_1_2 like Mac OS X)
AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D257 Safari/9537.53"
More chatter (plagiarism). 8:32 PM, upanishad.html, Google IN. More chatter (plagiarism).
Then 9 visits to images. Two hits to perspective.jpg (1 and 2) in a row. More false chatter about
how the suspect has plagiarized his theory on linear perspective.
10:50 PM, 72.130.131.55, hawaii.res.rr.com, Waipahu, Hawaii.
72.130.131.55 - - [02/Dec/2015:23:50:51 -0700] "GET
/scientificenlightenment1/ancestorcult.html HTTP/1.1" 200 56018 "-" "Mozilla/5.0 (Windows
NT 6.3; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0"
A direct visit. The person is simply sent the link by other volunteers. This volunteer has verified
again that the suspect has plagiarized.
1:03 AM, TM Net, Subang Jaya, Malaysia,
124.13.27.215 - - [03/Dec/2015:02:03:13 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
177180 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101
Firefox/42.0"
More chatter (how the suspect has copied somebody else's painting).
1:37 AM, is somebody looking for the cache of the suspect's blog at Bing? Likely. So many
volunteers are pretending to show interest in him, the paranoia schizophrenic who believes that a
group of women is going after him.
199.30.25.216 - - [03/Dec/2015:02:37:26 -0700] "GET /blogs/wpcontent/themes/twentyfifteen/style.css?ver=4.3.1 HTTP/1.1" 200 20206
"http://lawrencechin2011.com/blogs/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/534+ (KHTML, like Gecko) BingPreview/1.0b"
199.30.25.216 - - [03/Dec/2015:02:37:26 -0700] "GET /blogs/wpcontent/themes/twentyfifteen/js/skip-link-focus-fix.js?ver=20141010 HTTP/1.1" 200 690
115
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
"http://lawrencechin2011.com/blogs/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/534+ (KHTML, like Gecko) BingPreview/1.0b"
Meanwhile, the suspect is at Draw Anything LA until 9:15 PM. He is very worried about Secret
Society’s actions (alert?). Talked to Angela on the phone. He then comes back to Westwood,
Starbucks. He is depressed because he has to post on AVFM again in view of the indexing from
yesterday. All this is draining his time and energy away. He works on the post past 2 AM. He has
to finish it and post it while outside Starbucks (around 2:50 AM) because the coffeehouse closes
already. The suspect then sleeps in Westwood Village.
3:50 AM, anvianet.fi, Seinajoki, Finland,
85.157.197.190 - - [03/Dec/2015:04:50:16 -0700] "GET /2013-9-15/91413-19.png HTTP/1.1"
200 73778 "https://www.google.fi/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
This visit might be important. Namely, the volunteer is to chatter: “I find all these images on his
website, they seem to have something to do with computer hacking...” Thus is more evidence to
support Homeland Security's case in the ICJ.
3 December (Thursday)
Less than two hours after the suspect has posted on AVFM, on 4:31 AM, Flightless Bird has
posted a reply – he is giving the suspect a very good advice.
116
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
The suspect cannot escape the impression that this Flightless Bird was instructed by the TMU/
CIA team to post this to warn him. As you can see, since the latest law enforcement case is
opened on the ground that the suspect is dangerous to the women because he suffers, due to his
obsession with them, this delusion that they have been attempting to falsely prosecute him, his
continual pronouncement about their past attempt to “get him” – when all this has already been
ruled the “product of his schizophrenic delusion” – puts him in increasing danger (looks like a
confirmation of the women's claim about him, that he's obsessed with them). The TMU/ CIA,
with their true profile of the suspect at stake in the ICJ, thus wants him to desist, for fear not only
that he might produce more evidences in support of Homeland Security's case but also that he
might really get arrested by law enforcement, thus screwing up the Agency's whole plan.
5:07 AM, 75.150.140.11, Comcast Business, Havertown, Pennsylvania.
75.150.140.11 - - [03/Dec/2015:06:07:58 -0700] "GET /scientificenlightenment1/schuld.html
HTTP/1.1" 200 25700 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_10_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7"
Either another decoy or more chatter (plagiarism).
5:41 AM, somebody from the Secret Society is looking at the suspect's chapter on Lavoisier on
Bing Preview:
199.30.24.191 - - [03/Dec/2015:06:41:40 -0700] "GET /scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12063
"http://www.lawrencechin2011.com/scientificenlightenment1/lavoisier.html" "Mozilla/5.0
(Windows NT 6.1; WOW64) AppleWebKit/534+ (KHTML, like Gecko) BingPreview/1.0b"
117
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
What's this about? More chatter about how the suspect has stolen other people's work? (Since
this is the suspect's homework for a class at UC Berkeley 15 years ago.)
6:30 AM, 71.83.12.138, static.aldi.mi.charter.com, Traverse City, Michigan.
71.83.12.138 - - [03/Dec/2015:07:30:48 -0700] "GET /suppl_pld_9_ 139/suppl_pld_9_139b.pdf
HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS
X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1"
It appears that another volunteer has “remembered” something and/or is Googling for the
suspect's online pronouncements about ANG after hearing ANG's complaint. (Of course the
pronouncement is no longer there.)
6:41 AM and 6:42 AM, Sri Lanka Telecom, Piliyandala, Sri Lanka,
112.134.65.130 - - [03/Dec/2015:07:41:27 -0700] "GET
/scientificenlightenment1/cosmicdance2.jpg HTTP/1.1" 200 40022 "https://www.google.com"
"Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
112.134.65.130 - - [03/Dec/2015:07:42:15 -0700] "GET
/scientificenlightenment1/cosmicdance1.jpg HTTP/1.1" 200 45431 "https://www.google.com"
"Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
More chatter (how the suspect has copied images from books without regard for others'
copyrights).
6:48 AM, 91.82.70.144, invitel.hu, Hungary.
91.82.70.144 - - [03/Dec/2015:07:48:00 -0700] "GET /scientificenlightenment1/nonbeing.html
HTTP/1.1" 200 13719 "http://r.search.yahoo.com/_ylt=A0LEVzAHVmBW4kMAw19XNyoA;
_ylu=X3oDMTExZWZubmMzBGNvbG8DYmYxBHBvcwM3BHZ0aWQDVUlDMl8xBHNlY
wNz cg--/RV=2/RE=1449182856/RO=10/RU=http%3a%2f% 2fwww.lawrencechin2011.com
%2fscientificenlightenment1%
2fnonbeing.html/RK=0/RS=Tr_jzRuVDkn7vkOnU_zy6O6NaEU-" "Mozilla/5.0 (Windows NT
6.3; rv:42.0) Gecko/20100101 Firefox/42.0"
More chatter.
8:03 AM, 80.89.192.49, himiko.jpg, Google RU, nat49.academ.org, Novosibirsk. Is this
Russians' mole inside the Secret Society? To secretly gather evidence while going along with the
Secret Society women's operation?
Meanwhile, the suspect wakes up 7 AM in Westwood Village. Starbucks. He then discovers
Flightless Bird’s response. He posts a reply on 9:12 AM. 9:42 AM, the suspect deletes the links
to all the forum postings from the links page on his website. He then walks to Ackerman. 10:29
AM, he checks his website from the computers inside Ackerman bookstore.
10:44 AM, 23.121.20.21, lightspeed.miamfl.sbcglobal.net, Hialeah, Florida.
118
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
23.121.20.21 - - [03/Dec/2015:11:44:46 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
491814 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
More chatter?
Then, after eating (with his Spanish lesson again), the suspect comes back to the Village. As he is
waiting for buses, he suddenly realizes the nature of the game. He hurries back to Starbucks to
post his realization on AVFM. He is done by 12:46 PM:
“On 16 November, the LB Admin, after seeing the above summary posted on her
forum, got very concerned about the mental state of the poster, Googled his email
address, identified his website and the women referred to in the summary, and
contacted the women. The women responded saying they have been, for a while,
very frightened by this guy’s paranoia delusion that they have been going after him
by making false reports about him to law enforcement. They must have admitted that
they have failed to convince the DA, but, now, with the LB Admin’s communication,
they could go to the small city’s police department to open a case on their suspect for
“online harassment”, etc. The women’s story must be that this guy, when he sees
visits to his website from strange places, has wrongly assumed that they are
responsible for it, all because he suffers incurable paranoia schizophrenia. But, yet,
when the DA and the police visit his website, he is able to conclude, correctly, that
it’s because these women have gone to the DA and the police to show them his
website in an attempt to report him. So the official story line is that this guy is mostly
insane, although sometimes he is correct, because he spends a lot of time on his log.
He has therefore correctly identified LB Admin’s actions behind his back despite his
mental insanity and disconnect with reality, and both the LB Admin and the group of
women, being so frightened to visit his website fearing that he might misunderstand
the purposes, asked law enforcement to look at his website instead. And so law
enforcement, on 1 December, sent a robot to cache the suspect’s entire website so
that the “victims” (the group of women and their associates) can look through the
website offline without the suspect’s noticing.”
This is much closer to the truth than his previous speculations. The question is whether the
detective (either from the Pasadena department or Hermosa Beach department) is allowed to see
it.
After posting, the suspect is feeling much safer. He proceeds to go to Work Source to turn in the
SSA letter. After which, he comes back to downtown.
3:22 PM, 221.145.183.167, /, the Korean scout again.
3:48 PM, at downtown, the suspect goes inside this cybercafe to check his website and his
posting on AVFM just to make sure that the new law enforcement case has not resulted in
blockage or other tricks about his online activities. Everything is fine. Then the suspect comes to
119
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Starbucks. Can’t connect to Wi-Fi in Starbucks. Then, storage. By then, the mouse pad on his
Asus laptop has stopped functioning definitively. It's not clear whether this is “natural” or
whether Homeland Security and the Russians have done something because of their case in the
ICJ. The suspect then comes back to downtown. Public library.
Meanwhile, 5:45 PM, the German Lady begins her meetup at La Fiesta Grande (Pasadena).
6:12 PM, 66.87.82.48, himiko.jpg, pools.spcsdns.net, Hyattsville, Maryland. More volunteer's
“chatter”? Unless it's a “decoy”.
7:26 PM, 98.103.147.11, capra.html, Google, Kent, Ohio, central.biz.rr.com. More chatter
(plagiarism).
8:23 PM, dynamic.hinet.net, Taiwan,
61.228.153.238 - - [03/Dec/2015:21:23:16 -0700] "GET
/scientificenlightenment1/aztecaxismundi.jpg HTTP/1.1" 200 102595
"https://www.google.com.tw/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
More chatter (“He copies from books and draws these shitty diagrams because he doesn't know
how to draw”). Homeland Security's evidence in the ICJ.
Meanwhile, the suspect attends Chrysalis’ Empowerment Writing show. He sits with Tanisha.
8:30 PM, left, Starbucks. Checked log. Rode the bus home.
Near home. The suspect gets angry because he realizes that, at some point after 21 November,
his reconstruction must have gone askew. (He is quite right.) Hatred toward this American
system of secrecy in order to exacerbate the problem for everybody. Between 11 PM and 11:40
PM, his Asus laptop continues to malfunction. All browsers have crashed, Sony Voice Editor
crashes, Windows Explorer crashes. France 24 crashes. In combination with the society's
“conspiracy” to make him look crazy: severe hatred toward Americans. He believes that the
authority has placed malware in his computer. Even this diary freezes repeatedly. The suspect
might not be too far from the truth: both the Russians and Homeland Security would have an
interest in bugging his computer.
1:47 AM, Quantil, Pasadena,
168.235.206.207 - - [04/Dec/2015:02:47:01 -0700] "GET /miscellaneous/openlettertosibel6.pdf
HTTP/1.1" 404 1360 "http://www.google.co.in/search?q=classified+womanthe+sibel+edmonds+story+pdf&hl=en&ie=UTF8&prmd=ivns&ei=rmBhVr6KE5GfugTOvbS4Bg&start=80&sa=N" "Mozilla/5.0 (Linux; U;
Android 4.4.2; en-US; InFocus M2_3G Build/KOT49H) AppleWebKit/534.30 (KHTML, like
Gecko) Version/4.0 UCBrowser/10.1.0.527 U3/0.8.0 Mobile Safari/534.30"
120
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
This person again seems to be related to the girl of Indian descent seen on 6 AM, 20 November.
Another volunteer seems to have pretended to track down more traces of insanity which the
suspect has left behind online, even though the document has been removed.
4 December (Friday; W; more chatters than usual)
8:09 AM, 213.147.128.130, himiko.jpg, Google, pasargadnet.ir, Tiran, Iran. More chatter.
10:38 AM, Benson’s Athena. More chatter about how the suspect has placed other people's
painting on his website in order to pretend to be an artist.
1:26 PM, 108.204.29.1, presocratics.html, lightspeed.anami.sbcglobal.net, Ann Arbor, Michigan.
More chatter about the suspect's plagiarism?
3:39 PM, Readings on Secret Societies, mc.videotron.ca, Saint Lazare de Bellechasse.
4:54 PM, 82.102.214.192, himiko.jpg, Hadara, Ramallah, Palestine. More chatter about how the
suspect has copied other people's painting.
Meanwhile, the suspect. MST (with saved videos). The suspect then leaves home on 12:30 PM.
On the bus toward Westwood. He rereads his writing on how to develop Russia’s soft-power. He
has realized something. In Starbucks, he searches “State Department, EU far rights” – Internet
connection is very slow, and he can’t download any PDF documents. His computer has
completely malfunctioned. Evidently, it’s Homeland Security which is obstructing his Internet
connections. They don’t want him to write anything more which might contradict their false
profile of him as uneducated and a plagiarizer. Most importantly, they don't want him to write
anything which is pro-US, since that would definitely contradict their argument that he is
conspiring with the Russians and the French – for which the anti-American tones of his “Marine
document”, at the very least, is evidence.
5:10 PM, the suspect calls W while in Starbucks (from 3:17:00 onward). Here is the detail of the
conversation: (1) “Everything which has happened before November the women will deny; but
not their trip to the DA and the Manhattan Beach Police Department.” The suspect is in fact
mistaken here. The women will deny everything except the current law enforcement
investigation. Then the “official story line”. (2) About Homeland Security indexing and caching
of the suspect’s website. This is evidence in the ICJ in favor of TMU/ CIA's case, and, indirectly,
in favor of the Russians and the French. The suspect's thinking is completely rational. When he
has inferred things incorrectly, people call him “crazy” because most people are not educated
enough to be able to distinguish between “wrong inference” and “delusion”. (3) Then, the US'
possible strategy for dealing with the rise of far right parties in Europe: projecting a conservative,
Christian image. This is very bad evidence for Homeland Security; the suspect is about to
produce evidences which would disprove that he's thoroughly anti-American and so must be
conspiring with the Russians and FN. Then the suspect notes that there might be “light” for him
121
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
in this direction. This admission will be evidence in favor of the Russians and the French later on
(non-conspiracy). (3) How to use the log as evidence to prove gang-stalking on cyberspace. W
suggests that the suspect not use the computer at all. This “advice” evidently comes from
Homeland Security: again, they don’t want the suspect to do anything that might jeopardize their
case. W discounts the Republican defense of gun rights. W discourages the suspect from putting
things online and paying attention to the IP addresses on his log. Again, he is speaking for
Homeland Security and the Secret Society women. “Don’t complain; you are being
unreasonable”. The suspect’s retort: Women have a right to dress sexy. W continues to argue with
the suspect using the “rape example”. This demonstrates that W is quite aware of what the
authority (TMU/ CIA) wants, i.e. evidence as to the suspect’s real attitude toward women. The
suspect’s response is evidence in favor of the TMU/ CIA – and indirectly of the Russians and the
French later on, i.e. that Homeland Security’s profile of the suspect as a misogynist terrorist –
loving and hating white women at the same time due to an inability to get laid with them – is
completely false, in violation of international agreement. W’s final warning (speaking for
Homeland Security): “If you want to write about the European far right movement, then face the
consequences….” Again, it's quite in the suspect's interest to write about it. It's Homeland
Security which will be in trouble if the suspect demonstrates his genius and shows sign of proAmericanism in front of everybody.
Note also the suspect's comment: “Everybody farts, but, when I fart, I'll be arrested, while
nothing happens to other people who fart, all because there are people who don't like me and
who are looking for every little fault on my part.” A perfect description. He is being accused of
plagiarizing for more than 8,000 times by the Secret Society women – and yet he has never
plagiarized. He has always given references when he cites others. But the Secret Society women
claim he plagiarizes because he often cites an entire paragraph or an entire page without asking
for publishers' permission – even though he has given references. Everybody does that on the
Internet, of course, and nobody really cares – as long as you give references. But the Secret
Society women will report the suspect – for they are looking for any dirt they can possibly find
on the suspect.
Meanwhile the Secret Society's operation continues. 7:30 PM, 213.1.13.237, dividedline.html,
Google UK, btcentralplus.com, Consett, UK. Immediately, she goes to allegoryofcave.html. 7:34
PM, she goes to the gallery. 7:35 PM, she goes to heidegger.html from dividedline.html. She then
goes from heidegger.html to politea.html. 7:37 PM, she goes from politea.html to
socrates335.html. 7:39 PM, she goes to the Table of Contents. 7:39 PM, he goes to the first
chapter (The Material Meaning of History) from Table of Contents. 7:40 PM, she goes from the
first chapter to “Foucault on biopower”. While this person – behaving so abnormally – is without
doubt a member of the Secret Society (related to LB Admin, perhaps), it's not clear whether she
is here to produce more testimonies about the suspect's plagiarism or whether she is simply doing
“decoys” – randomly visiting the suspect's webpages for no reasons whatsoever in order to drive
up the suspect's paranoia in regard to the reasons of her visits (as W has warned, “Red
Herrings”).
122
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
8:07 PM, scripted.com: the 3rd time.
8:28 PM, 99.105.12.166, FOIA (synthetic telepathy; not there), lightspeed.oshkwi.sbcglobal.net,
Neenah, Wisconsin. Another volunteer has discovered that the suspect used to put other people's
content on his website. (Bullshit.)
8:30 PM, 72.192.146.1, 1/appendix.html, sd.sd.cox.net, El Cajon, CA.
72.192.146.1 - - [04/Dec/2015:21:30:38 -0700] "GET /1/appendix.html HTTP/1.1" 200 76624
"https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101
Firefox/42.0"
Decoy or chatter (plagiarism)? Is this person a friend of Dina B?
8:50 PM, a black guy, very vulgar, with tattoos, comes to sit next to the suspect in Starbucks, just
when he is about to begin writing “Russian-supported far right parties in Europe”. The suspect
rightly suspects him of being a Homeland Security surveillance agent. He moves to a different
table.
The surveillance, however, is probably not just there because Homeland Security wants to know
what threat the suspect is posing to the nation next, but also because the TMU/ CIA, as well as
the Russians and the French, want to collect their own evidence showing Homeland Security’s
profile of the suspect to be false (that the suspect is a plagiarizer).
From today onward, the suspect’s Asus laptop begins to malfunction until its keyboard shall
completely break down.
9:05 PM, 41.244.234.238, presocratics222.html, Viettel Cameroun Sarl, Cameroon. Decoy or
chatter?
11:12 PM, 11:18 PM, two visits from Google PH to raisininpudding.png. Evidently more chatter
about how the suspect has merely copied contents from other people without regard for their
copyright.
2:25 AM, home.otenet.gr, Athens, Greece,
85.72.212.77 - - [05/Dec/2015:03:25:33 -0700] "GET /1/feministethics.html HTTP/1.1" 200
32450 "https://www.google.gr/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
85.72.212.77 - - [05/Dec/2015:03:25:33 -0700] "GET /1/athd2.jpg HTTP/1.1" 200 12120
"http://www.lawrencechin2011.com/1/feministethics.html" "Mozilla/5.0 (Macintosh; Intel Mac
OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
123
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
85.72.212.77 - - [05/Dec/2015:03:25:34 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/1/feministethics.html" "Mozilla/5.0 (Macintosh; Intel Mac
OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
Within 1 minute, she comes to the Table of Contents,
85.72.212.77 - - [05/Dec/2015:03:26:02 -0700] "GET /thermex2.html HTTP/1.1" 200 568
"http://www.lawrencechin2011.com/1/feministethics.html" "Mozilla/5.0 (Macintosh; Intel Mac
OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
85.72.212.77 - - [05/Dec/2015:03:26:03 -0700] "GET /thermfr2.html HTTP/1.1" 200 907
"http://www.lawrencechin2011.com/thermex2.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
85.72.212.77 - - [05/Dec/2015:03:26:03 -0700] "GET /thermh1.html HTTP/1.1" 200 24055
"http://www.lawrencechin2011.com/thermex2.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
85.72.212.77 - - [05/Dec/2015:03:26:03 -0700] "GET /athd2.jpg HTTP/1.1" 200 12120
"http://www.lawrencechin2011.com/thermfr2.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
This person is just like the Consett person from 7:30 PM, and it can't be determined whether she
is doing decoy or producing rumors (about the suspect's plagiarism and misogynist rambling).
2:36 AM, Universiti Malaysia Sabah, Kota Kinabalu,
103.26.196.158 - - [05/Dec/2015:03:36:12 -0700] "GET /shizukadetail.jpg HTTP/1.1" 200
380104 "https://www.google.dk/" "Mozilla/5.0 (iPhone; CPU iPhone OS 7_1_2 like Mac OS X)
AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D257 Safari/9537.53"
This is evidently a proxy. More chatter (how the suspect is feigning artistic talent)? 2:53 AM,
141.0.14.222 - - [05/Dec/2015:03:53:07 -0700] "GET
/scientificenlightenment1/ancestorcult.html HTTP/1.1" 200 56056
"http://www.google.com.ng/search?q=what+are+the+taboo+of+animism&client=ms-opera-miniandroid&channel=new&prmd=ivns&ei=M8FiVo_5NsLiPfedr5AE&start=10&sa=N"
"Opera/9.80 (Android; Opera Mini/9.0.1829/37.7327; U; en) Presto/2.12.423 Version/12.16"
More chatter (plagiarism)? 4:04 AM, cinci.res.rr.com, Oxford, Ohio.
24.33.75.168 - - [05/Dec/2015:05:04:52 -0700] "GET /scientificenlightenment1/socrates335.html
HTTP/1.1" 200 33272 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5)
AppleWebKit/600.8.9 (KHTML, like Gecko) Version/8.0.8 Safari/600.8.9"
24.33.75.168 - - [05/Dec/2015:05:04:52 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/scientificenlightenment1/socrates335.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/600.8.9 (KHTML, like Gecko)
Version/8.0.8 Safari/600.8.9"
124
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
24.33.75.168 - - [05/Dec/2015:05:04:53 -0700] "GET /scientificenlightenment1/socrates335.html
HTTP/1.1" 200 33272 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 8_1 like Mac OS X)
AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12B410 Safari/600.1.4"
24.33.75.168 - - [05/Dec/2015:05:04:53 -0700] "GET /apple-touch-icon-precomposed.png
HTTP/1.1" 404 1360 "-" "com.apple.WebKit.WebContent/10600.8.9 CFNetwork/720.5.7
Darwin/14.5.0 (x86_64)"
24.33.75.168 - - [05/Dec/2015:05:04:53 -0700] "GET /apple-touch-icon.png HTTP/1.1" 404
1360 "-" "com.apple.WebKit.WebContent/10600.8.9 CFNetwork/720.5.7 Darwin/14.5.0
(x86_64)"
More chatter? (Plagiarism.) There seem to be more chatters than usual tonight.
5 December (Saturday; the Secret Society women's conferring with the detective tonight)
Today is the last time this month that the German Lady would upload pictures of her meetups to
the Meetup website (3 December meetup). She would not post anything for the rest of the month,
probably in order to pretend to be scared of the suspect. (“He suffers incurable delusion believing
that we are going after him, and would act on his delusional belief by cyber-stalking us in
return.”)
5:58 AM, 36.8.36.43, himiko.jpg, Bing, ppp-bb.dion.ne.jp, Koriyama, Japan. More chatter (how
the suspect has copied somebody else's painting)?
7:04 AM, 70.109.57.77, quantummechanics.html, fios.verizon.net, Leesburg, Virginia. More
chatter (plagiarism).
7:22 AM, 70.215.134.157, /, direct visit, myvzw.com, Southaven, Mississippi. What is this
about?
Meanwhile, the suspect, after resting in Westwood Village all night, wakes up past 9 AM!
Starbucks, Westwood. Checked log.
10 AM, Benson’s Athena, Google NO. More chatter about how the suspect, to pretend to be an
artist, puts up somebody else's painting on his website.
10 AM to 10:04 AM, massive indexing, 188.165.234.68, crawl03.lp.007ac9.net, OVH, France.
It's not clear whether this is related to the FN.
10:54 AM, 95.106.50.239, Rostelecom, Ryazan, Russia.
95.106.50.239 - - [05/Dec/2015:11:54:42 -0700] "GET /1/thermhch6d222.html HTTP/1.1" 200
29197 "http://go.mail.ru/search?q=illustration%20of%20evolution%20of% 20life%20on%20the
125
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
%20earth%20steps&sf=20" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:30.0) Gecko/20100101
Firefox/30.0"
The fact that the search was done from mail.ru indicates that he is sent the instruction “Search
with these search terms, find the webpage, and then rumor: wow, he is just copying from books!”
and does as instructed.
10:57 AM, 117.218.165.51, capra.html, BSNL, Pune, India, Ubuntu. More chatter (plagiarism).
12:38 PM, 198.210.116.105, layereduniverse.html, Google, ruraltel.net, Hays, Kansas. More
chatter (plagiarism).
12:54 PM, classificationofindia.html. More chatter (plagiarism).
Meanwhile, the suspect. By 1 PM, new hypothesis. He then posts on AVFM: “Lynn on gangstalking”.4 Then, he goes to buy blank discs in Ackerman. After that he goes upstairs to take a
nap.
The Secret Society's operation continues. 1:24 PM, himiko.jpg. More chatter (how the suspect
has copied other people's painting).
1:43 PM, himiko.jpg, Google ES. Same chatter.
4 This is what the suspect has posted: “I have received the following in email from somebody; it’s a short commentary on 'gang­stalking' along with advices to help victims of gang­stalking. I thought I shall post it here, in case anybody in MRM also suffers this problem. It might be of some help. The following, as indicated in the email notification, is taken from 'Are You Really Crazy, or Are You Being Gang­
Stalked?' by Lynn Stuter, January 10, 2006, NewsWithViews.com. I include here only the commentary, since the advices she offers I don’t consider to be good at all. But if you want to see the advices, I guess you can just go to the original source. 'The intent of gang­stalking is to (1) render the target, the victim, psychologically demoralized even to the point of committing suicide; (2) make the target appear to the larger community to be mentally unstable in order to discredit and psychologically demoralize the target and ensure that no one will believe the targets when they claim they are being targeted; (3) alienate and marginalize the target from the larger community, even family, making it easier to psychologically demoralize and discredit the target. Gang­stalking relies heavily on (1) the target becoming so psychologically demoralized that he/she believes there must be something wrong with him/her and is, therefore, afraid to say anything for fear others will think him/her crazy; (2) the target will have no evidence beyond his/her word that the gang­stalking is happening; (3) the target will have no detailed records or documentation showing what, when, where, and to what extent; (4) the target will not be able to find out who the perpetrators are or those involved in the gang­stalking.'” The suspect then adds an additional note: “propaganda in the mirror” as the favorite tactics by the gang­stalkers.
126
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Between 5:30 PM and 12 AM, fewer visits, only 9 visits to images. As you shall see, it's because
the Secret Society women are busy conferring with the detective.
Meanwhile, the suspect. Past 4 PM, he is awakened by the police in Ackerman. The officer
checks the suspect's ID. Then he lets him go. Starbucks, Westwood. Burning DVD 497B. 5 PM,
the keyboard of his Asus laptop malfunctions continually. Paint malfunctions. 6:30 PM, he
checks the date and time where the Korean scout first appears, and his Microsoft Word crashes.
10:20 PM, when the suspect is at El Monte Station, the Windows Explorer on his Asus laptop
freezes for 5 minutes. Very angered.
8:49 PM, Blue Host sends a notice to the suspect: system maintenance to take place on 8
December, 8:30 PM. 15 to 20 minute downtown expected. In reality, this must be the detective's
work. There are few visits tonight probably because the Secret Society women are busy
conferring with the detective, who is asked to pull out the entire content of the suspect's website
to look for malware and the women's private information and other illegal materials. In order to
not raise the suspect's suspicion, this should be disguised as a routine upgrade by the hosting
company, hence the email notification.
12:07 AM, mycingular.net, Louisiana (no more info)
166.137.118.34 - - [06/Dec/2015:01:07:07 -0700] "GET /timelinepartII-o/timelinepartII-o.pdf
HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 6_1_6
like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10B500
Safari/8536.25"
It seems that, while the Secret Society women are conferring with the detective, SDW, fearing to
be left out of the crowd of “victims” (since she doesn't actually live in Los Angeles and so has
difficulty in making a “stalking” case out of the suspect), is asking somebody related to the
Secret Society women to Google for that document in which the suspect accuses her of filing a
stalking claim against him behind his back. The volunteer testifies: “In this document, the
suspect narrates his delusional, imaginary scenario – believing it's real – that the German Lady
has asked SDW to file a confidential stalking claim against him at the TMU. It's all because he
has misunderstood the meaning of the visits to his website on 3 April, 2014.” Here we see signs
that SDW, in order to be involved, has also mobilized a detective from the San Diego Police
Department (or somewhere around there) and filed a separate case with him. To open her
separate case, SDW must have fed the San Diego detective with a whole pile of the “testimonies”
from volunteers around the world. The San Diego detective is convinced, not knowing that all
these “testimonies” were coached by SDW and her gang-members themselves, and is asked to
work with the Pasadena/ Hermosa Beach detective on the current case on the suspect.
1:57 AM, gifu.gifu.ocn.ne.jp, Hashima, Japan,
114.174.126.159 - - [06/Dec/2015:02:57:02 -0700] "GET
/scientificenlightenment1/capra7777.html HTTP/1.1" 200 21637 "https://www.bing.com/"
127
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/601.2.7 (KHTML, like
Gecko) Version/9.0.1 Safari/601.2.7"
More chatter (“plagiarism”). 2:49 AM, Olsztyn.mm.pl, Olsztyn, Poland,
66.102.9.121 - - [06/Dec/2015:03:49:58 -0700] "GET /scientificenlightenment1/capra.html
HTTP/1.1" 200 11888 "https://translate.googleusercontent.com/translate_p?
hl=pl&prev=search&sl=en&u=http://www.lawrencechin2011.com/scientificenlightenment1/capr
a.html&depth=1&rurl=translate.google.pl&usg=ALkJrhgAAAAAVmQUAX32eeyzA_AchuDr_
npWNq_AKGxt" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/47.0.2526.73 Safari/537.36,gzip(gfe)"
89.228.253.13 - - [06/Dec/2015:03:49:59 -0700] "GET /scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12120 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
89.228.253.13 - - [06/Dec/2015:03:54:04 -0700] "GET /scientificenlightenment1/capra.html
HTTP/1.1" 200 11888 "https://www.google.pl/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
More chatter (“plagiarism”).
6 December (Sunday; election in France; the involvement of the San Diego Police
Department detective)
5:10 AM, 90.41.81.72, layereduniverse.html, abo.wanadoo.fr, Pers-Jussy, France. (Near Lyon.) Is
this person related to FN?
6:06 AM, 108.79.42.173, presocratics.html, lightspeed.livnmi.sbcglobal.net, Birmingham,
Michigan. Two more instances of chatter (“decoy” and “plagiarism”).
8:09 AM, another volunteer has come to take a peek to understand the severe paranoia delusion
he has developed about the women: 107.77.173.12, AT&T Wireless, US. No more information.
107.77.173.12 - - [06/Dec/2015:09:09:13 -0700] "GET /blogs/2013/04/ HTTP/1.1" 404 1303
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 5.0.1;
LGL33L Build/LRX21Y) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.76
Mobile Safari/537.36"
Meanwhile, the suspect: 8:30 AM, awakened, corrected grammar mistakes in “Le Pen”. On the
bus, 9:30 AM. 11 AM, at St. Sophia.
11:20 AM, Evgeny has replied the suspect. (“What do you like about Russian culture?”) The fact
must have been entered into evidence at the ICJ by Homeland Security that the suspect has been
128
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
everyday listening to Russian disco music. And, in his previous communication to Evgeny, he
mentioned how he liked Russian culture. It must be the Russian authority who has instructed
Evgeny to ask this question as a way to test the suspect's response.
11:36 AM, 130.203.74.168, Pennsylvania State University, State College.
130.203.74.168 - - [06/Dec/2015:12:36:28 -0700] "GET /1/consumerization.htm HTTP/1.1" 200
44671 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_2)
AppleWebKit/600.3.18 (KHTML, like Gecko) Version/8.0.3 Safari/600.3.18"
Is this “decoy” or “chatter”?
11:59 AM, 221.145.183.167, the Korean scout, scores.nbcsports.com.
12 PM, the suspect is engaged in a philosophical discussion with Dan. Johanna not there.
Afterward, the suspect is alarmed: is there an “Operation Le Pen”? (Namely, is the CIA utilizing
this opportunity to influence the Le Pen family, looking for chances to melt their heart, so as to
soften their anti-Americanism?) In the sermon, Father John just has to say, “We are all bored
with our culture....” After the discussion, the suspect professes to Dan that he is at bottom a
German Romanticist. The suspect's weekly conversation with Dan and Johanna, demonstrating
himself to be a high functioning intellectual, continues to be counter-evidence against Homeland
Security's case in the ICJ.
The suspect then goes to Starbucks, Normandie. 3 PM, unable to log into Blue Host. He looks up
information on NULND, beginning to be aware of her involvement in the current affair. Checked
FN election results. Around 3 PM, left a message for W, “FN has won the first round”. This
Homeland Security would use as evidence for the suspect's possible conspiracy with FN.
3:43 PM, 108.185.115.15, socal.res.rr.com, Studio City.
108.185.115.15 - - [06/Dec/2015:16:43:06 -0700] "GET /scientificenlightenment1/aztec.html
HTTP/1.1" 200 12505 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
This Studio City person was last here on 30 November, 10:22 AM, if you recall. He will be here
again on 13 December, 7:59 AM, always looking at the same chapter. Given his repeated visits,
he is most likely just creating decoys.
5:43 PM, dividedline.jpg, Google, 5:45 PM, dividedline.html, dsl-user.acndigital.net, Toronto.
More chatter (“plagiarism”).
129
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
By now, the suspect has arrived in Culver City, checking his log and online messages before
attending French in Mind. 6:15 PM, he replies Evgeny: “I don’t know why. I like a lot of
different cultures.” Then he is at French in Mind. There is a French guy who has been in China
for a long time, working in the film industry. He might be another Homeland Security informant.
Homeland Security is most likely wishing that the suspect would want to connect up with him.
But, once again, he will never do that.
6:15 PM, 65.95.106.9, capra7777.html, Bell Canada, Pickering, Ontario. More chatter
(“plagiarism”).
8:12 PM, classificationofindia.html. Chatter (“plagiarism”).
8:36 PM, when the suspect is already going home: 76.167.90.235, natsow.res.rr.com, San Diego,
CA.
76.167.90.235 - - [06/Dec/2015:21:36:39 -0700] "GET /suppl_pld_9_139/suppl_pld_9_139b.pdf
HTTP/1.1" 404 1360 "http://stoporgangstalking.com/about/" "Mozilla/5.0 (iPhone; CPU iPhone
OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0
Mobile/13B143 Safari/601.1"
This is certainly somebody related to SDW, either she herself or one of her TI friends or Dina B
or Dina's friend. SDW is probably discussing the suspect again with the San Diego Police
Department detective, who is asked to connect up with the detective up here in charge of the
suspect's case (the detective from either the Pasadena Police Department or Hermosa Beach
Police Department). SDW is saying: “Yes, he has developed this paranoia delusion about how I
have teamed up with Ms ANG to falsely report him to law enforcement. And he has left this
document about Ms ANG on my blog, but, look, he has removed it.” Tonight must be another
busy night for the Secret Society women, who are discussing both among themselves and with
the detectives both down there in San Diego and up here in Los Angeles.
10:38 PM, 58.174.204.12, relativity.html, bigpond.net.au, Salisbury, Australia. Another chatter or
decoy.
12:11 AM, Interoute Communications Limited, UK,
213.39.103.9 - - [07/Dec/2015:01:11:48 -0700] "GET
/readings/Audacity_kompakt_Leseprobe.pdf HTTP/1.1" 404 1360 "https://www.google.co.uk"
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
This volunteer might be submitting testimony to the San Diego detective who is now also
involved: “Yes, and he puts a lot of other people's materials on his website without regard for
their copyright. Look, this Audacity manual. But he has removed it.”
130
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Meanwhile, at home, the suspect is busy working to impress NULND. Past midnight, he has
uploaded the summary of “American response”. While this is evidence in the ICJ that the suspect
is not conspiring with the Russians and the French, it looks like a piece of evidence that he is
orchestrating a huge scandal in order to achieve a revolutionary purpose (reindustrialization of
the US and the US giving up of US dollar as world's principal medium of exchange).
Note also that, today, the oppositional party in Venezuela has won a major victory in
parliamentary election.
7 December (Monday; Donald Trump’s remark about Muslims)
4:22 AM, DTAC, Bangkok,
1.46.42.120 - - [07/Dec/2015:05:22:08 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 121068
"https://www.google.co.th/" "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
More chatter. 5:17 AM, 126.207.253.186, chinesepatriarchy220.html, bbtec.net, Japan. What?
Chatter? Decoy?
8:03 AM, 195.242.80.40, meta.ua/?q=lawrencechin2011.com. What?
10:59 AM, 134.126.170.225, representation222.html, Google, James Madison University,
Harrisonburg, Virginia. This is chatter about the suspect's plagiarism. (The credibility of the
testimony enhanced by the volunteer's status as a university student.)
11:21 PM, 71.201.170.34, Normal, Illinois.
71.201.170.34 - - [07/Dec/2015:12:21:06 -0700] "GET
/scientificenlightenment1/whyshouldwebejust.html HTTP/1.1" 200 68711
"https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X)
AppleWebKit/601.1 (KHTML, like Gecko) CriOS/47.0.2526.70 Mobile/13B143
Safari/601.1.46"
More chatter (plagiarism).
Meanwhile, the suspect awakes past 9 AM. MacDonald. Checked France 24 News: FN victory.
Home, showered, left home 11:30 AM. 11:40 AM, on the bus. Suddenly, what looks like a
Homeland Security surveillance agent gets on the bus, sits in front of the suspect, and, then, just
as the suspect is reviewing a June 2010 recording in which he recounts a Homeland Security
agent moving about him on the bus, moves in synchrony with the happening in the recording.
What is going on? Clearly, even while Homeland Security and the Russians are engaged in a life131
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
and-death struggle in the ICJ, Homeland Security, by law, has to permit EKT's team to meet with
the Homeland Security team inside the control center charged with neutralizing the suspect by
controlling his mind. The Russians must have pointed out to Homeland Security that one way to
make the suspect look crazy is to orchestrate such synchrony between his external environment
and the happening in the recording he is reviewing at the moment so that, as the suspect
continues to review those recordings from June 2010, he will come to believe that whatever is
happening in the recording will also happen in his present day real life, thus looking superstitious
and crazy. Meanwhile, Homeland Security, being impressed by this idea, doesn't know that the
Russians are playing tricks on them: Homeland Security is duped into replacing evidences from
the previous ICJ trial without knowing.
11:56 AM, SK Broadband, Seoul,
218.38.44.139 - - [07/Dec/2015:12:56:15 -0700] "GET /kudoshizuka1988.jpg HTTP/1.1" 200
218090 "https://www.google.co.kr/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9 _1 like Mac OS X)
AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1"
218.38.44.139 - - [07/Dec/2015:12:56:45 -0700] "GET /shizukadetail.jpg HTTP/1.1" 200
380104 "https://www.google.co.kr/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9 _1 like Mac OS X)
AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1"
12:11 PM, bad visits, from Blue Host forum (32041), Opera Mini, Europe (en). More chatter
about the suspect's “computer-hacking”. (In reality, the suspect was complaining about his
website's possibly being hacked.)
2:33 PM, 130.43.129.41, Fermat, London. More chatter (plagiarism).
3:55 PM, ancestorcult.html, Apizaco. More chatter (plagiarism).
Meanwhile, the supsect. 12:56 PM, he is on the Metro train, his keyboard is half-broken, and
can’t be used. He is very saddened and angered. Then it is suddenly functioning again. Casbah.
The suspect would stay there until 4:30 PM. He looks retarded while staring at pretty AWFs. He
continues to work on “Far right”.
4:23 PM, 153.106.80.247, calvin.edu, Calvin College, Grand Rapids, Michigan.
153.106.80.247 - - [07/Dec/2015:17:23:09 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200
27754 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10) AppleWebKit/600.1.25 (KHTML,
like Gecko) Version/8.0 Safari/600.1.25"
5:19 PM, he comes again. 6:06 PM, he comes again. He will be here again two days later, which
means that he is most likely doing “decoy”.
132
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Meanwhile, the suspect. After Casbah, he comes to Chrysalis. Outside, he looks retarded while
saying Bye to Ariane. Dinner. Men’s group. The suspect makes a statement about the overrepresentation of blacks in jail. While at the Metro station (Little Tokyo), the suspect produces a
(incorrect) outline of what might be going on right now. He is now going home.
8:36 PM, ath2d.jpg is called up on Facebook.
173.252.88.186 - - [07/Dec/2015:21:36:16 -0700] "GET 734/scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12120 "-" "facebookexternalhit/1.1
(+http://www.facebook.com/externalhit_uatext.php)"
The Secret Facebook Group is being accessed.
9:01 PM, static.pichincha.andinanet.net, Quito, Ecuador,
181.112.82.24 - - [07/Dec/2015:22:01:09 -0700] "GET /kudoshizuka1988.jpg HTTP/1.1" 200
15412 "https://www.google.com.ec/" "Mozilla/5.0 (Linux; Android 5.1.1; D5316
Build/19.4.A.0.182) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.76 Mobile
Safari/537.36"
More chatter. 10:29 PM, Korea Telecom, Seoul,
175.223.18.11 - - [07/Dec/2015:23:29:50 -0700] "GET /scientificenlightenment1/capra7777.html
HTTP/1.1" 200 21637 "http://www.google.co.kr/url?sa=t&source=web&cd=85
&rct=j&q=principle%20of%20noncontradiction%20quantum&ved=
0ahUKEwiimKnF0cvJAhUkiKYKHdOiA9A4UBAWCCcwBA&url=http%3A%2F%
2Fwww.lawrencechin2011.com%2Fscientificenlightenment1%
2Fcapra7777.html&usg=AFQjCNGxRH3rOYHWFbq7taVc_0pfSVgS8Q&sig2
=IZ2D8VV28Pr2syVjs6-SIw&cad=rjt" "Mozilla/5.0 (Linux; U; Android 4.4.2; ko-kr; LGF320K/22h Build/KOT49I.F320K22h) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.2
Chrome/30.0.1599.103 Mobile Safari/537.36"
More chatter. Presumably, plagiarism and: “Ha, he believes that he might have solved the origin
of the universe! Ha ha ha!” Then KRN would analyze: “He suffers grandiosity because of his
narcissistic tendency”, thus projecting herself onto the suspect.
Near home, the suspect reads in the newspapers the story about the radicalization of the San
Bernardino shooters on the Internet. He becomes very scared. He fears being labeled such a case
in official records. He goes home, and, on 11:05 PM, posts a reply on Partisans to his own
previous anti-American posting, something to the effect that the struggle against political
133
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
correctness should not be a struggle between nation-states. This, in order to tone down his earlier
anti-American tone.
2:08 AM, Angelson posts a reply to the suspect's new posting on Partisans. The posting is
unintelligible. But clearly, by disavowing his anti-Americanism – more evidence in France's and
Russia's favor – the suspect has set going a new round of operations on the part of FN.
3:25 AM, dynamicip.rima-tde.net, Toledo, Spain,
83.53.203.95 - - [08/Dec/2015:04:25:20 -0700] "GET
/scientificenlightenment1/germaninvasion.html HTTP/1.1" 200 33105 "https://www.google.es/"
"Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/47.0.2526.73 Safari/537.36"
More chatter or decoy.
8 December (Tuesday; torture resumed)
6:12 AM, grincheux posts a reply on partisansmarine.com. (She has a daughter who is going to
Los Angeles.) Now that the suspect has produced a testimony showing him to not intend to
conspire with the Russians and the French, the Russians and the French have devised this test: “if
he intends to conspire with us, he would want to meet our 'contact'.” Of course the Russians have
known the suspect well enough to know that the suspect is not as stupid as would believe that the
other side is so dumb as to want to send a contact to him while the whole matter is being debated
in the ICJ. (The suspet understands all about “conspiracy”.)
6:30 AM, schuld.html, Salisbury, Maryland. Either chatter or decoy.
7:39 AM, 137.54.1.97, Foucault on biopower, University of Virginia, Charlottesville, Virginia.
More chatter (plagiarism).
7:43 AM, capra.html. More chatter.
8:37 AM, 89.36.137.248, Google RO, Le Pen, static.linuxship.ro, Romania. Presumably a proxy.
89.36.137.248 - - [08/Dec/2015:09:37:52 -0700] "GET /favicon.ico HTTP/1.1" 200 446
"http://www.lawrencechin2011.com/lepen3/lepen3l.pdf" "Mozilla/5.0 (X11; Linux i686)
AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/45.0.2454.101
Chrome/45.0.2454.101 Safari/537.36"
What is this about? Has the suspect's evidence for non-conspiracy at last enabled the FN
members of Partisans to look at the “Marine document” for themselves without violating
international laws?
134
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
9:04 AM, himiko.jpg. More chatter (how the suspect has copied other people's painting).
11:24 AM, himiko.jpg. More chatter.
Meanwhile, the suspect. Woke up almost 10 AM. Breakfast at MacDonald. Discovered the
replies at Partisans. Left home 11:30 AM. Severely disturbed by the replies: more Homeland
Security operations. He then leaves home, 11:30 AM. Because the keyboard on his Asus laptop
no longer functions (type “l” and “6” will appear on the screen, and so on), he can only read on
the bus. And yet, unable to concentrate. Severe anger. Then, on Silver Line, nervous breakdown.
Because the suspect is under surveillance on the bus, Homeland Security, with the Russians by
their side, is controlling the suspect to suffer nervous breakdown, in order to cause surveillance
showing the suspect fitting their false profile of him to enter into the ICJ as evidence. The
suspect gets to downtown without having been able to do any work at all. He thus gives up the
plan to go to Work Source.
1:43 PM, junk call: 408-610-7145. Is Homeland Security, seeing that the suspect didn't take the
bait at Partisans, trying to produce more faulty evidence showing the suspect receiving secret
instructions from the Russians?
2:17 PM, 105.153.190.246, perspective.html (the first visit since it was changed), Maroc
Telecom, Morocco (no more info). Rabat? 2:20 PM, he is checking out the artwork pages linked
from perspective.html. This is more chatter (how the suspect has plagiarized his theory on linear
perspective).
Meanwhile, the suspect has arrived at Casbah. More nervousness as the suspect comes to suspect
that ANG and SDW are trying to file TRO against him. 3:40 PM, the girl sitting next to the
suspect leaves. A vulgar white guy then comes in, looking like a Homeland Security guy. The
suspect is very upset by him. Then he reviews the wrong recording, then Renee Chappell gives
him the wrong phone number for the Department of Rehabilitation. He calls the Department of
Rehabilitation again, but they would not make any appointment with him. He calls Renee back.
Severely angered and frustrated by all the nonsense. Forget about looking for a job. Started
writing. Gradually calmed down. The guy sitting next to the suspect turns out to have a German
accent. Not DHS? Well, it's evident that both the Russians and Homeland Security are
controlling the suspect to be especially agitated, and then send a guy in for him to misidentify
him as a Homeland Security surveillance agent, all in order to confirm Homeland Security's false
profile of the suspect as violent and suffering from paranoia schizophrenia (falsely believing that
government agency is putting him under surveillance).
At Casbah, the suspect has written down:
135
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Realized since last night: Homeland Security doesn’t want me to write because
they have been continuing to insist in diplomatic channels that their false profile
of me is correct and foreign governments have once again questioned the
accuracy of their depiction of me (insane, violent, racist, misogynist, plagiarizing,
unintellectual, computer-hacking, vicious and antisocial).
This is more evidence that he isn’t conspiring with the Russians and the French.
5:01 PM, 71.170.120.217, santtx.dsl-w.verizon.net, Johnson City, Texas.
71.170.120.217 - - [08/Dec/2015:18:01:50 -0700] "GET /diaryreview2013-1233/diaryreview2013-12-33Wc.pdf HTTP/1.1" 404 1360
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Windows NT 6.1;
WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
It appears that another volunteer has joined in on the chatter about the suspect (“He's insane,
believing that a group of women is going after him). This is testimony for the detectives and
evidence in the ICJ.
5:05 PM, 131.247.226.170, American Civil Religion, laptops.usf.edu, University of South
Florida, Tampa, Florida. He was here: 26 November 10:59 AM, the same chapter. Given this, he
is most likely doing “decoy”.
7:32 PM, 141.209.238.15, Victim Feminism, Central Michigan University, Mount Pleasant,
Michigan. 7:33 PM, she comes to the Table of Contents. She's here to “chatter” (misogyny and
plagiarism).
7:40 PM, classificationofindia.html, Google IN. He immediately goes to upanishad.html. Either
decoy or chatter (plagiarism).
8:05 PM, 70.209.193.118, Corona, CA. (East of Orange County.)
70.209.193.118 - - [08/Dec/2015:21:05:29 -0700] "GET /blogs/2014/04/14/last-word-on-mypast-two-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1360
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 5.1.1;
VS880 Build/LMY47V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.94
Mobile Safari/537.36"
Another volunteer has pretended to show concern and joined in on the “hunt”. Along with the
5:01 PM Johnson City person, he is probably supplying testimonies to the San Diego Police
Department detective since the latter is forbidden by “victim confidentiality” from actually
looking at the posting itself. The testimony would for sure consist in something like: “He is
136
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
terrifying. He really believes, out of his paranoia delusion, that the poor SDW is teaming up with
KRN and others to falsely report him to law enforcement. He slanders them, and spills out their
private information to embarrass them.”
8:06 PM, 178.239.59.82, “Subhuman meets”, Netrouting Shared IP Spaces, Amsterdam.
178.239.59.82 - - [08/Dec/2015:21:06:15 -0700] "GET /diaryreview2013-1239/diaryreview2013-12-39W.pdf HTTP/1.1" 404 1360 "https://www.google.nl" "Mozilla/5.0
(X11; Ubuntu; Linux x86 _64; rv:42.0) Gecko/20100101 Firefox/42.0"
Another volunteer is trying to track down the suspect's chapter linked from the Prison Planet
forum posting hoping to supply more or less the same testimony to San Diego Police Department
detective to strengthen SDW's case.
Meanwhile, the suspect has left Casbah around 6:30 PM. Russian church, Forum. In very bad
mood, working on “Far right”, and not participating very much. He leaves the church around
9:15 PM.
Note that, 8:30 PM, Blue Host is doing its scheduled maintenance. Again, the detectives are
shutting down the suspect's website for 20 minutes in order to pull all content out of the server
for examination. While the detectives would not find any malware or pornography or things like
that, the “victims” are expected to be given access to all the contents and thus to know that the
contents which the suspect has supposedly removed – all the suspect's reconstruction of the
Secret Society women's illegal conducts against him in the past – are still hidden somewhere on
his website. The entire content of the suspect's website will also be intercepted into the ICJ as
evidence – as evidence against Homeland Security.
8:39 PM, chinesepatriarchy.html, Astoria, NY. More chatter. (Misogynist rambling and
plagiarism.)
11:13 PM, capra.html, Google IN. More chatter. (Plagiarism.)
Meanwhile, the suspect. Very difficult time reading on the computer because of the broken
keyboard. Home, past 11:40 PM. Gripped by severe fear about the women’s TRO. Called
Angela, yelling at her (“The women will prohibit me from using the Internet”). Calmed down
soon afterward. Both the Russians and Homeland Security are programming the suspect to
experience extreme paranoia fear in order to enable the detectives to intercept more evidences in
favor of the women's case.
2:57 AM, st-andrews.ac.uk, the University of St. Andrews,
137
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
138.251.252.82 - - [09/Dec/2015:03:57:07 -0700] "GET /scientificenlightenment1/capra.html
HTTP/1.1" 200 11888 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
This visit is unusual. Perhaps a verification on behalf of the TMU/ CIA team. Especially since
this webpage is one of the Secret Society women's favorites (for falsely reporting the suspect for
plagiarism), they would want an university professor or student to read through it to judge
whether it is really plagiarized. (Note that it's almost noon in the UK.)
Overall, there are a lot fewer visits this night. The Secret Society women are busy with the
detectives for the third night.
9 December (Wednesday; the Secret Society women are busy with something afternoon and
night)
5:03 AM, 58.97.241.248, /, Google, banglalionwimax.com, Dhaka, Bangladesh. What is this
about?
5:24 AM, /1/appendix.html, Google proxy. More chatter (plagiarism).
6:01 AM, 180.190.91.185, thermh1.html, Google, Globe Telecom, Pasig, Philippines. 6:02 AM,
oppressionofwomen1.htm. 6:03 AM, Table of Contents. Either decoy or more chatter about the
suspect's plagiarism.
9:11 AM, Youtube notifies the suspect of the removal of “War Lords”. Apparently, in order to
support Homeland Security's profile of the suspect as a plagiarizer, the Secret Society wants to
produce more instances where the suspect is accused of violating other people's copyright.
Seeing that the suspect has this movie on his Youtube channel, the Society instructed somebody
to report the suspect to Youtube. Of course, hosting a movie on one's Youtube channel is what
everybody else does from time to time, but, when the suspect does it, it would be evidence that
he is a habitual plagiarizer who constantly steals other people's contents without regard for this
thing called “copyright”.
Meanwhile, the suspect wakes up past 9 AM. Breakfast at MacDonald. Found abandoned
pancake. Wanted to eat it, but a woman claimed it. She then lets the suspect have it and wants to
pay for his food. It's not clear whether this is all staged by Homeland Security in order to deceive
the ICJ judges into the impression that the suspect is not being gang-stalked and victimized by
American people. When he goes home he discovers the warning from Youtube. He is quite
distraught. He farts just like everyone else does, but, while nothing happens to everyone else, he
will be persecuted for farting. Then he discovers the video “Flirten auf russisch”. (Perhaps
Homeland Security has obtained another piece of circumstantial evidence for the suspect's
conspiracy with the Russians as he constantly shows interests in videos about Russia or Russian
disco music.) He leaves home, 11:30 AM. This time, he has to bring not only his external
138
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
keyboard, but also his Toshiba. On the bus he calls Angela to apologize for his behavior last
night.
12:38 PM, 153.106.89.156, American Civil Religion, direct visit, Calvin College, Grand Rapids,
Michigan.
153.106.89.156 - - [09/Dec/2015:13:38:10 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200
27754 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10) AppleWebKit/600.1.25 (KHTML,
like Gecko) Version/8.0 Safari/600.1.25"
This person was here on 4:23 PM, 7 December, or two days ago. Again, he is decoying the
suspect.
12:38 PM, sci/appendix.html. More chatter (plagiarism).
12:46 PM, 77.147.110.206, germaninvasion.html, Google FR, rev.sfr.net, Vitré, France.
77.147.110.206 - - [09/Dec/2015:13:46:23 -0700] "GET
/scientificenlightenment1/germaninvasion.html HTTP/1.1" 200 33105
"http://images.google.fr/imgres?imgurl=http%3A%2F% 2Fwww.lawrencechin2011.com
%2Fscientificenlightenment1% 2Fsaxonwarrior.jpg&imgrefurl=http%3A%2F%
2Fwww.lawrencechin2011.com%2Fscientificenlightenment1%
2Fgermaninvasion.html&h=512&w=638&tbnid=pFTtBXZ0snuMXM%
3A&docid=GnTFiZdAHeVUWM&ei=EZNoVqC1LcGQaL_ZuNAK&tbm=isch&iact=rc&
uact=3&dur=698&page=1&start=0&ndsp=20&ved=0ahUKEwjggebw0s_JAhVBCBoKHb8sDq
oQrQMIKTAD" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/47.0.2526.73 Safari/537.36"
1:10 PM, the Vitre person comes again.
77.147.110.206 - - [09/Dec/2015:14:10:09 -0700] "GET
/scientificenlightenment1/germaninvasion.html HTTP/1.1" 200 33105
"http://images.google.fr/imgres?imgurl=http%3A%2F% 2Fwww.lawrencechin2011.com
%2Fscientificenlightenment1% 2Fsaxonwarrior.jpg&imgrefurl=http%3A%2F%
2Fwww.lawrencechin2011.com%2Fscientificenlightenment1%
2Fgermaninvasion.html&h=512&w=638&tbnid=pFTtBXZ0snuMXM%
3A&docid=GnTFiZdAHeVUWM&ei=H5RoVr6KDIS4ac3Kn6AK&tbm=isch&iact=rc&
uact=3&dur=710&page=1&start=0&ndsp=18&ved=0ahUKEwjlaTx08_JAhUEXBoKHU3lB6QQrQMIMjAG" "Mozilla/5.0 (Windows NT 6.1; Win64;
x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
139
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
This French person is either doing chatter (plagiarism) to support Homeland Security's case or
secretly gathering evidence against Homeland Security and in favor of TMU/ CIA's case.
Around this time, the suspect is in Bail Hotline. Quite excited for a while. He then goes to the
public library in downtown. He meets with Tanisha at Chrysalis, 3:30 PM. He leaves there by 4
PM, and comes to Starbucks, Prospect.
4:38 PM, 73.137.181.245, representation222.html, Cartersville, Georgia. More chatter about the
suspect's plagiarism.
6:19 PM, Google MX, Synthetic Telepathy FOIA. Another volunteer has tracked down an
instance of the suspect's putting other people's content on his website without regard for their
copyrights. The chatter has become testimony for the detectives and evidence in the ICJ, even
though the document has been removed. (In reality, this is the FOIA release in regard to US
military's synthetic telepathy technology, and several people have obtained it and put it on their
website, including FFCHS. Again, everybody does it, but, when the suspect does it, he gets
persecuted.)
There would be very few visits to the suspect's website for the rest of the day. The Secret Society
women must be busy with something. It's the fourth night that a San Diego detective is involved.
Perhaps it has something to do with that.
After checking his log and checking up on the German Lady’s meetups and KRN’s Twitter, he
leaves 6:30 PM. (The detective has intercepted the suspect “cyberstalking” the German Lady.)
Draw Anything LA. Grace there. The suspect draws the Chinese president tonight. He leaves a
little bit past 9 PM. El Monte station. Can’t transfer June 2014 log to Toshiba: the file corrupted.
Very strange. Home, past midnight. The suspect becomes frightened by the possibility of a TRO
again. 12:40 AM, he posts on AVFM:
“I need some serious help here. There is some posting on another online forum, very
old, which these women have probably wanted to use against me. However, it’s
impossible to delete the posting. I don’t know if any users there have been
cooperating with the group of women, pretending to notify them that somebody is
suffering paranoia delusion about their going after him and pretending to track down
my website. I suppose these women will, if they can, want to use that old posting as
evidence and go to the police and the judge in order to get a restraining order against
me, which will stipulate that I shall not be allowed to use the Internet or have my
website or something like that. (I don’t think the order will simply say I’m not
allowed to write about them online, since I have already stopped writing about them,
and the goal of these women is to prevent me from getting online altogether, not to
prevent me from writing about them.) What shall I do? I even tried to delete the
140
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
account there, but still it needs approval from the forum admin. And there is never
any response to my requests.
“Sorry. But if anyone has any suggestion about what to do, please share it with me.
Or PM me even.”
The suspect is referring to the Prison Planet forum posting. He has posted there numerous times asking the moderator to delete the post “Some comments on targeted individuals”, from which all the visits have come to his website. But the moderator has never responded. This is what has driven him paranoid in the past two days. 1:06 AM, P.T. Wireless Indonesia, Bulupitu, Indonesia,
114.79.29.113 - - [10/Dec/2015:02:06:32 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
83100 "https://www.google.co.id" "Mozilla/5.0 (Windows NT 5.1; rv:43.0) Gecko/20100101
Firefox/43.0"
Evidently more chatter (how the suspect has copied other people's painting).
1:22 AM, Berne has posted a reply on AVFM:
“Personally, I think you should just get off the Internet for a whole while. Go on a
vacation, or take a break or whatever, somewhere in nature, rent a cabin and start
realizing that living your life on the internet is not living a life at all. Go breathe
some fresh air, take a hike, go for a swim, get out of your head, stop thinking and just
breathe. You're driving yourself insane.”
It's almost as if he were talking to KRN and her gang-members instead, who are on the computer
all their waking hours coordinating cyberstalking of the suspect and his website.
3:25 AM, Chonbuk National University, Korea,
210.117.131.140 - - [10/Dec/2015:04:25:34 -0700] "GET
/scientificenlightenment1/capra7777.html HTTP/1.1" 200 21637 "http://www.google.co.kr/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=17&ved=0ahUKEwjgpKal9HJAhUoeaYKHe_vCywQFghrMBA&url=http%3A%2F%2Fwww.lawrencechin2011.com
%2Fscientificenlightenment1%2Fcapra7777.html&usg=AFQjCNGxRH3rOYHWFbq7taVc_0pf
SVgS8Q&bvm=bv.109395566,d.dGY&cad=rjt" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0;
rv:11.0) like Gecko"
Is this guy here doing more chatter (plagiarism and “Ha! The solution to the origin of the
universe?”)?
3:52 AM, Beour3rd posted a second reply
141
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
“you want help but you don't want help. i gave you the best advice you're going to
get. Leave. Move. Get into a different head space.
“All your actions and your interactions with those girls... make them continue doing
this,
“You're like the kid that keeps responding to the guy who's teasing you. They have
proven they are evil to you. They hold ALL the cards , ALL the power and you stay
in their power. Get the fuck out.”
It would seem that Beour3rd is getting instruction from the Secret Society or Homeland Security
to give the suspect another wrong advice. Once again, everybody is encouraging the suspect to
flee so that he would become a fugitive.
10 December (Thursday; the German Lady’s meetups)
4:49 AM, aztec.html, Google DE, Dusseldorf. More chatter (plagiarism).
5:45 PM, languagechangecycle.jpg, Google BG. More chatter (copying contents from books).
5:55 AM, languagechangecycle.jpg, Google PL. More chatter (copying contents from books).
6:15 AM, 125.239.165.215, oppressionofwomen1.html, Google NZ, Jetstream.xtra.co.nz,
Wellington, New Zealand. More chatter (misogynist rambling and/or plagiarism).
6:26 AM, 95.5.34.185, Samsun, Turkey.
95.5.34.185 - - [10/Dec/2015:07:26:33 -0700] "GET /drawLA/drawLA_
01_15/drawanythingLA/anja.jpg HTTP/1.1" 200 466330 "https://www.google.com.tr/"
"Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/46.0.2490.86 Safari/537.36"
95.5.34.185 - - [10/Dec/2015:07:26:33 -0700] "GET /drawLA/drawla2/eva.jpg HTTP/1.1" 200
1247445 "https://www.google.com.tr/" "Mozilla/5.0 (Windows NT 6.2; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
Why is this Turkish guy looking for the portraits the suspect has done of the lead singers in Flunk
and Julie? Are the Secret Society women planning to contact, and recruit, Anja and Eva?
6:45 AM, 131.247.244.20, University of South Florida, laptops.usf.edu, Tampa, Florida.
142
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
131.247.244.20 - - [10/Dec/2015:07:45:18 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200
27754 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.85 Safari/537.36"
Compare this with the visit on 5:05 PM, 8 December, also from the University of South Florida.
131.247.226.170 - - [08/Dec/2015:18:05:38 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200
27754 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36"
It's not the same person, but the two persons are presumably related. Presumably more chatter
about the suspect's plagiarism. (Namely, the earlier USF student has found another student at the
same college to chatter about the suspect.)
7:19 AM, 24.10.109.161, hsd1.ca.comcast.net, Rancho Cordova, California. (East of
Sacramento.)
24.10.109.161 - - [10/Dec/2015:08:19:59 -0700] "GET /1/epilogue2.html HTTP/1.1" 200 35067
"https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5)
AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3"
This person will come again on 16 December, 9:52 PM, looking at the front page. Either chatter
(misogynist rambling, plagiarism) or decoy.
8:29 AM, representation222.html. (More chatter?)
Meanwhile, the suspect. He wakes up almost 8 AM. He has an orientation at Work Source today.
Forgot to bring his external keyboard while running for the bus, and so missed the 8 AM bus.
Upset. Then the suspect loses his hat. Had to go to Work Source late. Very upset. However, 10:30
AM, he has arrived at Work Source, and everything is just getting started. Lunch: continued
watching “Flirten auf Russich”. The suspect leaves Work Source around noon.
12:28 PM, 219.56.26.18, Utsunomiya, Japan,
219.56.26.18 - - [10/Dec/2015:13:28:44 -0700] "GET /fising2.html HTTP/1.1" 200 881
"http://www.google.com/search?
q=shizuka+kudo&client=safari&rls=en&tbm=isch&prmd=ivns&ei=QuBpVu3
zKYS2mAWto4yYBQ&start=80&sa=N" "Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_8)
AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3"
Is this chatter or decoy?. 12:32 PM, 209.82.118.250, Calgary, Alberta.
143
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
209.82.118.250 - - [10/Dec/2015:13:31:57 -0700] "GET /cheneyplan19/cheneyplan19d.pdf
HTTP/1.1" 404 1360 "https://www.google.ca" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10.6; rv:42.0) Gecko/20100101 Firefox/42.0"
It looks like another volunteer is looking for the suspect's traces online (his insanity).
Then, from 12:32 PM to 12:34 PM, the Utsunomiya person is exploring other drawings of the
suspect's on his Old Gallery. Again, unclear whether s/he is doing decoy or the “real thing”
(chatter, testimony).
3:11 PM, 50.169.18.44, Comcast, Stoughton, MA.
50.169.18.44 - - [10/Dec/2015:16:11:36 -0700] "GET
/scientificenlightenment1/descartes202.html HTTP/1.1" 200 11660 "https://www.google.com/"
"Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/47.0.2526.80 Safari/537.36"
This person seems to have been here before. Given the same visit later, it's most likely chatter
(“plagiarism”).
Meanwhile, the suspect has spent time in the public library in downtown. Read a little
“Hoelderlin”. He posts on AVFM again.5 He then goes to his storage facility – he needs to get the
DVD containing the log for June 2014. Discovered while there that his scanner has disappeared.
Very worried.
3:52 PM, dianliwenmi.com (Shizuka). This visit is very strange, and will appear again later.
4:12 PM, descartes222.html, a different person than the 3:11 PM person. Just more chatter to
reinforce the earlier chatter (“plagiarism”).
5 This is what the suspect has posted: “Brd, I can’t just leave because I want to. Financial and legal reasons. You don’t know how bizarre Internet has become for me. There seems to be some professional involved to make sure that I conform to the profile of suffering severe paranoia always falsely believing that somebody is going after me when nobody is. This professional gets all these people to visit my website for no reason whatsoever and to behave so abnormally, in order to drive me to paranoia thinking that they are sent here to collect evidences again. Then, when I simply posted something completely boring and meaningless on Internet forums, the posting will go viral and break all records for number of views, scaring the hell out of me. I have an interesting theory, though. I hope it’s at least entertaining. It seems that some authority is involved so that I’m required to behave like a paranoid insane computer­
geek who constantly blames what is my own faults on others, etc. Presumably, I am supposed to behave badly in order to make a bad example out of myself, so that the authority can use me as a reason to pass new laws, etc., in order to prevent something like me from happening again. And so, right now, I’m helping to make the world a better place.” 144
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
4:36 PM, Beour3rd has posted another reply urging the suspect to go away. It seems that both
Homeland Security and the Secret Society women just can't wait for the suspect to become a
fugitive.
Meanwhile the suspect has come back to Chrysalis. During men's group, George is talking about
“outsourcing”.
7:09 PM, 170.140.105.10, nat.emory.edu, Emory University, Atlanta, Georgia. Is this decoy or
chatter?
170.140.105.10 - - [10/Dec/2015:20:09:49 -0700] "GET /thermhchapter5.html HTTP/1.1" 200
35705 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36"
Very few visits afterwards. There are 8 visits to images until 12:15 AM.
Meanwhile, the suspect, after men's group, is at Starbucks, Little Tokyo. He checks over all the
videos he has shot of his storage unit, and concludes that he has forgotten to bring in the scanner
the last time he was using it. Went home. Began working on “Suffering Woman”.
12:52 AM, phnx.qwest.net, Phoenix, Arizona,
75.171.5.58 - - [11/Dec/2015:01:52:31 -0700] "GET /scientificenlightenment1/menard.htm
HTTP/1.1" 200 24310 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64;
rv:42.0) Gecko/20100101 Firefox/42.0"
More chatter about the suspect's plagiarism?
3:38 AM, the “Princeton decoy”, spin.cs.princeton.edu,
128.112.155.173 - - [11/Dec/2015:04:38:33 -0700] "GET
/scientificenlightenment1/americanlanguagefamilies.jpg HTTP/1.1" 200 155609
"http://www.lawrencechin2011.com/scientificenlightenment1/humandispersal.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.131 Safari/537.36"
11 December (Friday; “Suffering Woman”)
7:46 AM, orphism.html, direct visit, Budapest. More chatter (plagiarism).
11:42 AM, 199.217.32.2, Academy School District 20, Colorado Springs.
145
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
199.217.32.2 - - [11/Dec/2015:12:42:13 -0700] "GET
/scientificenlightenment1/creationmythnotes.html HTTP/1.1" 200 13099
"https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/47.0.2526.80 Safari/537.36"
Another chatter about the suspect's plagiarism (by a school teacher in order enhance the
credibility of the false evidence to be used with the detectives and in the ICJ).
Meanwhile, the suspect wakes up 9 AM. MacDonald. Home. MST. Didn’t come. Wanted to do it
again. Thus missed the 11:30 AM bus. MST the second time, came. (Japanese.) Left home 12:30
PM.
1:19 PM, descartes222.html. Chatter? (“Plagiarism”, following upon the two testimonies from
yesterday.)
1:34 PM, 134.39.153.20, fermat.pdf, Google, Washington State Board for Community and
Technical Company, Wenatchee, Washington. Another chatter by somebody from a “respectable
institution” in order to enhance the credibility of the Secret Society women's case.
2:47 PM, Nostratic, Google BG. Chatter (how the suspect is feigning artistic talent).
When the suspect arrives in downtown, he first goes to the barber shop. Haircut. Then, he is
going to Starbucks, Westwood. While on the bus, he works on “Russian-supported…”
Fewer visits after 4 PM.
Soon, the suspect is in Starbucks, Westwood. He checks his log, eats, then, W calls back:
IMPstrbkwstwdWes_12_11_15_608PM.MP3 (from 38:00 onward). The suspect notes that he has
more crazy things to say. (1) The new hypothesis about how the previous ICJ trial judgment
really works: only a few important people (the conspirators in France) are “chipped” and are
required to do certain things to cause certain reactions from the rest of the people, the totality of
which reactions would then add up the state of affair ordained by the ICJ judgment. Did the
Russians once not want to activate the ICJ trial? (2) What has happened: the French came, and
there was a conflict between TMU’s profile of the suspect and Homeland Security’s. The suspect
has got this correctly, and it is more evidence that the suspect has had no prior knowledge and
has not conspired with the Russians and the French. (3) Could the “Marine essay” have stirred up
any controversy? How good was it, really? It has no meaning for the French except as an antiAmerican propaganda tool. (4) W: can the FN begin to like Americans? Donald Trump: perhaps
he said those offensive things in order to influence FN toward a favorable perception of the
Americans. Only if there is an ideologue in FN who is looking for an anti-American propaganda.
The suspect notes that Homeland Security would charge the FN ideologue with “conspiracy”
with him if the ideologue wants to use his ideas. (5) The suspect notes his motive for writing
146
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
“American response”. The suspect: “Maybe the Russians and the French then said to the US: You
can’t use his ideas, it would be 'conspiracy' too.” This is not actually what has happened.
“American response” has merely been used by the French and the Russians as evidence for the
suspect's non-conspiracy with them. (6) The cause for the United States' conflict with the
European far right: free trade. “It looks more like British Old Lady's program” (honking: 55:30).
(7) The suspect then confesses what he has figured out yesterday: his ideas on Russia’s
development of soft-power were prefaced with crazy-sounding comments which became an
excuse for EKT to file stalking claims against him, and yet the ideas themselves were ingenious.
It thus looked like he was pretending to be crazy in order to pass onto her suggestions which she
could use to rebuild her nation. Thus, it was suspected of fraud with EKT in October 2014.
“Hence, all my ideas are banned, per Homeland Security’s trick (bad profile).” This might be
evidence against Homeland Security in the ICJ. (8) W: The best way to get a person’s ideas to
circulate widely is to call him “crazy” and then ban them. (9) The suspect predicts: FN will come
to power, but their anti-Americanism will be toned down (1:05:00). More evidence against
Homeland Security's case in the ICJ. (10) The suspect notes that his “delusions” are so complex
that it requires a special upper-division course in order for people to understand them. About
John Nash. The suspect confesses that he is doing to his best friend what John Nash has done to
his friends. W goes on about numbers. About the Straussians' looking for patterns (esoteric
messages) in text. The suspect might be accidentally correct, and affirms that many of the things
he has said about the Secret Society women are true. (11) His job in this society is to be crazy, if
he is found not to be crazy, people will get angry. W: this is the “functional theory”: even thieves
and crooks perform functions indispensable for the functioning of a society. It all depends on the
goal which a society has set for itself. Indeed, if a society is striving to become a “security state”,
criminals perform the indispensable catalytic function by providing the society with justification
for expanding its security apparatus. The suspect: there are some people who have no function in
society other than slowing down other people's function. He is specifically referring to the Secret
Society women, who waste everybody's time, foremost his own. This function is not valid unless
the society has decided that it is moving too fast with its objectives – when it has set for itself the
goal of wasting itself away. (12) The congruence between the suspect and ANG: both are fond of
a certain image of the suspect as mentally retarded. But ANG wants him to be dangerous as well.
ANG and her gang-members, if they can't exterminate him, will make a TV show out of him.
Kinda cool. ANG is the only person who likes his Nicaragua video diaries. His wish for the
“British Old Lady” to be involved, for she will defend him.
It would appear that, after this round of conversation, Homeland Security's charge of a
“conspiracy” between the Russian camp and the suspect no longer has any substance. The
suspect has only realized what has happened afterwards and is not hiding his realization of it.
The Russians are about to make a definitive move to exonerate themselves and the French.
After the conversation, the suspect returns to work. The suspect finishes “Suffering Woman” and
uploads it to his website. What he has done is further exonerating the Russians and French, for,
in it, the suspect speaks about wanting to sell the idea to any party who is willing to purchase it –
147
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
be it the Russians, the European far right, or the Republicans. This is evidence that the suspect is
not trying to conspire with any foreign power whatsoever to harm the US, but is simply looking
for opportunities for himself. The suspect then goes home, 8:30 PM, giving up the idea of
passing the night in Westwood.
Meanwhile, the Secret Society's operation continues. 7:29 PM, upanishad.html. More chatter
(“plagiarism”).
9:55 PM, 8.37.233.17, classificationofindia.html, Quantil, Indonesia.
8.37.233.17 - - [11/Dec/2015:22:55:38 -0700] "GET
/scientificenlightenment1/classificationindia.html HTTP/1.1" 200 2885
"http://www.google.co.in/search?
site=webhp&oq=classification+of+Indian+philosophy&aqs=mobile-gwslite..&q=classification+of+Indian+philosophy" "Mozilla/5.0 (Linux; U; Android 4.4.4; en-US;
2014818 Build/KTU84P) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0
UCBrowser/10.7.0.636 U3/0.8.0 Mobile Safari/534.30"
Since this is obviously a proxy (“en-US”), it's from the Secret Society. Maybe the same Indian
girl from 20 November. More testimony about the suspect's plagiarism.
10:08 PM, 117.244.98.124, classificationofindia.html, Varanasi, India.
117.244.98.124 - - [11/Dec/2015:23:07:59 -0700] "GET
/scientificenlightenment1/classificationindia.html HTTP/1.1" 200 2885 "-" "Mozilla/5.0 (Linux;
U; Android 4.4.4; en-US; 2014818 Build/KTU84P) AppleWebKit/534.30 (KHTML, like Gecko)
Version/4.0 UCBrowser/10.7.0.636 U3/0.8.0 Mobile Safari/534.30"
This is evidently the same person – the same Indian girl – from 9:55 PM. It would seem that she
is visiting the chapter continually because she is actually on the phone with the detective (from
either Pasadena or Hermosa Beach) supplying verbal testimony about the suspect's plagiarism.
Then, the suspect. On bus 20 going back to downtown, the suspect is very turned on by the
woman wearing stocking sitting next to him. Home, MST: the so-called “teenage model”. It's not
clear whether Homeland Security's false profile of him includes “pedophile”.
Then, the Secret Society's actions. 1:46 AM, netvisao.pt, Almada, Portugal,
84.90.98.210 - - [12/Dec/2015:02:46:10 -0700] "GET
/drawLA/drawLA_01_15/drawanythingLA/anja.jpg HTTP/1.1" 200 466330
"https://www.google.pt" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:42.0)
Gecko/20100101 Firefox/42.0"
148
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Are the Secret Society women really wanting to recruit Anja?
2:46 AM, Quantil, Pasadena, proxy,
168.235.206.86 - - [12/Dec/2015:03:46:13 -0700] "GET
/scientificenlightenment1/classificationindia.html HTTP/1.1" 200 2885
"https://www.google.co.in/search?hl=en&ie=ISO-88591&q=classification+of+indian+philosophy+" "Mozilla/5.0 (Linux; U; Android 4.4.4; en-US;
D2212 Build/18.5.B.0.26) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0
UCBrowser/10.5.2.582 U3/0.8.0 Mobile Safari/534.30"
The same proxy. Compare it with the user-agent of the “Los Angeles Indian girl” from earlier
tonight and from 20 November:
"Mozilla/5.0 (Linux; U; Android 4.4.4; en-US; 2014818 Build/KTU84P) AppleWebKit/534.30
(KHTML, like Gecko) Version/4.0 UCBrowser/10.7.0.636 U3/0.8.0 Mobile Safari/534.30"
It's a different phone. But this person seems to be related to her. This person is therefore most
likely also supplying false testimony about the suspect's plagiarism to the detectives. It would
appear that the detectives might actually be skeptical of all these testimonies from complete
strangers.
12 December (Saturday)
4:41 AM, 132.199.182.129, biopower2.html, Universitaet Regensburg. More chatter about the
suspect's plagiarism. The credibility of the testimony enhanced by the chatterer's status as a
university student.
8:51 AM, 94.251.143.229, Ying and Yang I, from kurzwelai.net, dynamic.mm.pl, Chrzanow,
Poland.
94.251.143.229 - - [12/Dec/2015:09:51:32 -0700] "GET
/suppl_pld_8bg42/suppl_pld_8bg42c.pdf HTTP/1.1" 404 1360
"http://www.kurzweilai.net/forums/topic/the-reversal-of-brain-computer-interface-in-a-usmilitary-project-darpa" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
149
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
It would appear that more “volunteers” have pretended to track down the “crazy poster” online.
He has left traces everywhere complaining about the electronic chips implanted inside his brain.
This testimony about the suspect's insanity is “golden evidence” which the Secret Society
women are instructing the volunteer to pass onto the detectives and which Homeland Security
has intercepted into the ICJ to support their case.
12:01 PM, athd2.jpg, from sacrifice.html.
199.30.25.230 - - [12/Dec/2015:13:01:52 -0700] "GET /scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12063 "http://lawrencechin2011.com/scientificenlightenment1/sacrifice.html"
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534+ (KHTML, like Gecko)
BingPreview/1.0b"
Meanwhile, the suspect leaves home, 10:50 AM. He comes to the storage facility. Somewhat
upset because there is no longer Wi-fi in the food mall. Desperate to make changes in “Suffering
Woman” in order to avoid misunderstanding. Storage, put in DVD 498. Counted discs. He comes
back to food mall. He runs into Angela. He greets her happily, unaware that Angela has been
recruited by Homeland Security as an informant against him and has believed wholeheartedly the
lies that he suffers paranoia schizophrenia and that the group of women has never gone after him
using law enforcement. Then, suddenly, W calls the suspect wanting to borrow money from him.
The suspect immediately suspects this to be a Homeland Security operation, and is half-correct:
because evidences have been found last night that the suspect’s has no intention to conspire with
the Russians and the French, the Russians have, in front of the ICJ judges, called into question
the evidence which Homeland Security has submitted on 26 November to prove that the suspect
150
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
has received payment from the Russians. Homeland Security, you recall, used “protecting
women victims' confidentiality” as a pretext under which to censor out the names and other vital
information from the intercept of the transaction and then intentionally misinterpreted NCFM's
bank account as the suspect's. The Russians point this out to the judges, and request that the
Court authorize a test to verify it. The judges thus authorize this operation, and both the Russians
and Homeland Security have instructed W to ask the suspect to transfer money to him in order to
ascertain the suspect's banking information in the intercept of the transaction. (Somehow the
Russians are not allowed to simply check with the suspect's bank directly.) Homeland Security
knows that they are in troubles.
1:03 PM, 176.219.152.66, bad visit, from Blue Host forum, Vodafone, Turkey.
176.219.152.66 - - [12/Dec/2015:14:03:39 -0700] "GET /badvisits/5712-43.png HTTP/1.1" 200
108985 "http://www.bluehostforum.com/showthread.php?32041-strange-visits-are-they-stealingcontent-of-my-site" "Dalvik/1.4.0 (Linux; U; Android 2.3.6; GT-S5830i
Build/GINGERBREAD)"
Again, another volunteer is looking at the “crazy guy’s” past postings at Blue Host Forums and
reporting to the detectives that “he was talking about hacking websites”. The German Lady must
have taught the volunteer that, when the suspect was talking about his website's being hacked,
the volunteer should be vague and just report “He is talking about hacking websites”, so that the
detectives would mistakenly believe that the suspect was talking about hacking other people's
websites rather than about being hacked himself. Again, how to make false reports to law
enforcement (to use the “system” to assassinate the target) and then completely get away with it.
3:43 PM, 189.5.57.233, virtua.com.br, Sorocaba, Brazil.
189.5.57.233 - - [12/Dec/2015:16:43:30 -0700] "GET / HTTP/1.1" 200 2878
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Macintosh; Intel Mac
OS X 10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3"
Another “volunteer” is here supplying testimonies to the detectives (how the suspect suffers
bizarre delusion about the women going after him and spills out his delusion online to threaten
them and slander them).
4:09 PM, 24.7.39.129, Comcast, Redwood City, CA.
24.7.39.129 - - [12/Dec/2015:17:09:37 -0700] "GET /scientificenlightenment1/capra7777.html
HTTP/1.1" 200 21637 "-" "Mozilla/5.0 (iPad; CPU OS 9_0 like Mac OS X)
AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13A344 Safari/601.1"
This person is not too far away. He will come repeatedly performing the same visits; hence he is
a “decoy”: the “Redwood City decoy”.
151
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Meanwhile, the suspect is at Casbah. He has made the necessary changes to “Suffering Woman”
in order to avoid misunderstanding. (Eliminating a “secret message” for European audience.)
4:43 PM, the suspect calls W back (from 5:37:00 onward). The suspect is already suspecting that
this is a Homeland Security trick. W wants the suspect’s bank account number. The suspect then
confesses his hypothesis about the enforcement of the (previous) ICJ judgment: that it would be
the DGSE chief who is going to provide the US with a chance to influence FN, but that the
suspect will have a different explanation (that the DGSE chief has only done so because he was
forced to and was chipped). W: a certain crazy person who has really good anti-government
ideas. The suspect confesses that he likes to look crazy while producing world-saving ideas, but
that looking crazy is dangerous. About “Jean-Paul Sartre”: because he was so famous, the French
authority couldn't do anything to him when he caused problems during the Algerian War; and yet
in the end he does more good to France than harm. Snowden is in a similar league. The is more
evidence for the suspect’s true motivation for posting “American response”: fear. Is Snowden a
traitor? How to get rid of somebody: call him “crazy” as a way to make oneself feel good about
oneself, as if one were the “protector”. W is describing the Secret Society women. About
harming under the disguise of helping.
Soon two Homeland Security looking guys came in sitting next to the suspect. Homeland
Security needs more instances where the suspect mistakes ugly people for being Homeland
Security surveillance agents in order to obtain more evidences confirming that the current false
profile of the suspect as suffering paranoia schizophrenia is correct.
6:08 PM,
173.252.90.104 - - [12/Dec/2015:19:08:51 -0700] "GET
/scientificenlightenment1/cosmicdance1.jpg HTTP/1.1" 206 9302 "http://alfaimg.com/show/antiprotons-diagram.html" "facebookexternalhit/1.1
(+http://www.facebook.com/externalhit_uatext.php)"
173.252.90.109 - - [12/Dec/2015:19:08:51 -0700] "GET
/scientificenlightenment1/cosmicdance2.jpg HTTP/1.1" 206 9302 "http://alfaimg.com/show/antiprotons-diagram.html" "facebookexternalhit/1.1
(+http://www.facebook.com/externalhit_uatext.php)"
The last time we saw this is 27 November. This usually means that the Secret Society is
accessing the 27 November portion of the Secret Facebook Group.
152
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
6:10 PM, the suspect emails W his checking account number.6 This is the first piece of evidence
to enter the ICJ confirming that 26 November evidence showing the suspect receiving payment
from the Russians is faulty.
6:42 PM, the suspect posts on AVFM. (“All his postings are going viral”.)7 The suspect leaves
Casbah, 8:30 PM. Ren gives the suspect a can of drink. It's not clear whether Ren has also been
instructed by Homeland Security to be especially nice to the suspect in order to deceive the ICJ
judges.
8:38 PM, Beour3rd posts a reply on AVFM. (“Move”.) Both Homeland Security and the Secret
Society women are desperate for the suspect to become a fugitive.
10:13 PM, 70.211.10.207, myvzw.com, Murrieta, California.
70.211.10.207 - - [12/Dec/2015:23:13:48 -0700] "GET /sci/sci.pdf HTTP/1.1" 200 480167
"https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 8_0 like Mac OS X)
AppleWebKit/600.1.4 (KHTML, like Gecko) GSA/11.0.65374 Mobile/12A365 Safari/600.1.4"
6 The suspect's email contains a long note: “W, another thing: My log clearly indicates that my old postings on Internet forums are going viral all suddenly lately. It’s unavoidable to conclude that a whole group of people from around the world are suddenly noticing that there is this guy who is completely insane posting everywhere saying a group of women are going after him, and are helping the women track down all his other crazy posts everywhere on the Internet. They have discovered, chiefly, that this guy is so insane that he believes there is a chip implanted in his brain. Presumably, the goal of the operation is to put me in the mental hospital, so that our KRN, the leader of the women, can come out and
say to me: 'Lawrence, you have so much talent, but you suffer incurable schizophrenic paranoia, believing
that we are going after you. Let us help you, please!' But I just don’t see how all this discovery that I’m insane can possibly lead to forced hospitalization, even though this is clearly what the group of women wants. Should I worry? Or are they just trying to discredit me to as many people as possible? Maybe getting Homeland Security to broadcast an alert about me warning everybody that I’m insane? Don’t show this email to anybody, okay?”
7 The suspect's post in entirety: “I’m getting worried. My log clearly indicates that my old postings on Internet forums are going viral all suddenly lately. It’s unavoidable to conclude that more and more people from around the world are suddenly noticing that there is this guy who is completely insane posting everywhere saying a group of women are going after him, and are helping the women track down all his other crazy posts everywhere on the Internet. A huge rumor has probably started online around the group of women about how insane this guy is. Presumably, the goal of the operation is to put me in the mental hospital eventually, but I just don’t see how all this discovery that I’m insane can possibly lead to forced hospitalization, even though this is clearly what the group of women would like to happen. Should I worry? Or are they just trying to discredit me to as many people as possible? Maybe getting some government agency to broadcast an alert about me warning everybody that I’m insane?”
153
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Another volunteer – quite nearby – has been instructed by the Secret Society women to offer
false testimony to the detectives saying the suspect is engaged in misogynist ranting against
American white women on his website.
10:53 PM, it’s the “Princeton decoy” again.
128.112.155.171 - - [12/Dec/2015:23:53:00 -0700] "GET
/scientificenlightenment1/afroasiaticmap.jpg HTTP/1.1" 200 49245
"http://www.lawrencechin2011.com/scientificenlightenment1/humandispersal.html" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.131 Safari/537.36"
11:04 PM, humandispersal.html, Google MY. More chatter, or testimony for the detectives
(“plagiarism”).
11:15 PM, christiandogmatics02e.html, Hong Kong. This is sign that the Secret Society women
have submitted the “David Chin” document to the detectives. The suspect's translation of
Christian Dogmatics is always used by the Secret Society women as proof that the “David Chin”
document originates with the suspect.
12:06 PM, while at home, the suspect posts a rely on AVFM:
If I’m paranoid, then I have nothing to worry about, then I don’t have to move.
If I should move, then I have something to worry about, then I’m not paranoid.
So there is a contradiction here, it seems.
But I have already said it, I have no money to move away. Everything costs money.
This posting by the suspect will be used by the TMU/ CIA to counter Homeland Security in the
ICJ: the suspect only looks insane. His paranoia displays a rational structure which means that
the evidences for his paranoia schizophrenia are really proofs of his wrong inferences. But, on
12:57 AM, Beour3rd replies to the suspect: “No contradiction. Move!”
1:44 AM, dynamic.ziggo.nl, Wijk bij Duurstede, Netherlands,
83.83.219.150 - - [13/Dec/2015:02:44:36 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
491814 "https://www.google.nl/" "Mozilla/5.0 (Windows NT 10.0; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36"
Another volunteer's testimony (how the suspect has copied other people's painting). Then, on
1:48 AM, hsd1.co.comcast.net, Littleton, Colorado,
154
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
67.177.251.224 - - [13/Dec/2015:02:48:34 -0700] "GET /gallery/bensongoddesscloseup.jpg
HTTP/1.1" 200 344816 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64;
rv:42.0) Gecko/20100101 Firefox/42.0"
Another testimony for the detectives that the suspect has put other people's paintings on his
website without regard for their intellectual property rights.
Then, 2:58 AM, another volunteer has joined in on the hunt: cable.rogers.com, Ottawa, Canada,
174.115.254.240 - - [13/Dec/2015:03:58:22 -0700] "GET /scientlitfr.html HTTP/1.1" 200 10747
"http://www.google.ca/search?q=scientific+enlightenment+by+lawrence+chan&hl=enCA&biw=&bih=&gbv=2&oq=scientific+enlightenment+by+lawrence+chan&gs_l=heirloomserp.3...414568.426707.0.427122.41.22.0.19.5.0.158.2306.10j12.22.0....0...1ac.1.34.heirloomserp..15.26.2239.m3kjl1VgvXs" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8)
AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10"
1 minute later, she clicks on the first chapter:
174.115.254.240 - - [13/Dec/2015:03:59:09 -0700] "GET
/scientificenlightenment1/synopsis.html HTTP/1.1" 200 28181
"http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10"
6 minutes later, she re-searches for the suspect's theory, this time getting the suspect's name
correctly:
174.115.254.240 - - [13/Dec/2015:04:05:26 -0700] "GET /thermex2.html HTTP/1.1" 200 568
"http://www.google.ca/search?
client=safari&rls=en&q=Lawrence+Chin+Scietific+enlightenment&ie=UTF-8&oe=UTF8&gfe_rd=cr&ei=8lBtVvzYGsuC8QfJsZnYDw" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10"
Is this a decoy or more testimony for the detectives that the suspect is a plagiarizer? Then, 3:33
AM, Banaras Hindu University Medical Sciences, Varanasi, India,
14.139.225.180 - - [13/Dec/2015:04:33:05 -0700] "GET
/scientificenlightenment1/classificationindia.html HTTP/1.0" 200 2847
"https://www.google.co.in/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/44.0.2403.155 Safari/537.36"
Given the strange location, this is certainly related to the Secret Society. More testimony that the
suspect is a plagiarizer.
155
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
13 December (Sunday; W)
4:32 AM, greekreligion.html. More chatter or testimony (plagiarism).
7:54 AM, W emails the suspect his routing number and account number. He also asks for the
suspect's routing number. W is evidently instructed by Homeland Security and the Russians to do
this, for the ICJ is trying to verify whether the 26 November intercept is correct.
Now in his email W says something quite interesting:
In addition, I do not think people around the world really care about your metal
health. To them KRN looks a bit paranoid, and perhaps crazy. A paranoid
schizophrenic (KRN) can be paranoid about another being a schizophrenic.
Is W giving hints about the current condition reigning in the Secret Society’s online group? That
many volunteers, as TMU's moles inside the Secret Society, were able to see the true side of the
Secret Society women while pretending to go along with the operation? W continues:
As far as how your site has gone viral, there is much research on contagion. Most
argue that there are few but powerful carriers that once a disease, idea, belief, lie,
crosses their path, they spread it rapidly. Airplane pilots, journalists, professors at
prestigious universities, and popular websites are all powerful carriers. Marketing
experts, political consultants, propagandists, and the CDC are all interested in
contagion. One explanation to why your site went viral is simply it passed the
path of a powerful carrier, perhaps there is a link to your site.
Is W giving out hint that the suspect’s writings are now being considered by many bureaucrats in
the US, Europe, and Russia because of Homeland Security’s stunt and the current ICJ trial? More
likely, however, it is just somebody in the Secret Society, like Dr P or SDW, who has instructed
W to try to deceive the suspect into the impression that the sudden increase of visits to his
website since late 2013 is not due to the Secret Society's operations but to somebody (a
contagion) who has “discovered” the suspect.
I read a lot of papers and these days students do 99% of their research on Google.
I have noticed that the exact bad ideas show up in their papers from the same sites
time and time again and from year to year. Often these sites are high school senior
projects that are completely wrong. The teachers probably do not know basic Pol
Sci 101 to detect the mistakes (or maybe they do).
Is W giving out another hint that the debate in ICJ is fueled by the fact that the Russians have
developed similar ideas to the suspect’s?
Perhaps you should add to your site a more accessible summary of your ideas.
Like many philosophers, sometimes you have unconventional definitions of terms
which are important to the understanding of your arguments. David Hume wrote
156
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
his magnum opus only to have it rejected by most. He rewrote it, and it was well
received. Now scholars look at his first version and understand it in light of the
second version. John Rawls did the same; Justice as Fairness is an accessible
version of A Theory of Justice. Honestly, most academics do not understand A
Theory of Justice, they think and teach the veil of ignorance which is not his
argument, but a simple illustration.
Is W giving out hint that the Invisible Hand has finally persuaded the Republicans to make use of
the “Kiersten Affair”, all because of the “Suffering Woman” document which the suspect has
uploaded on Friday night? No. It's more likely that W is trying to hint at something else, i.e., that
the most valuable idea which the Invisible Hand has found in the suspect's work – the one idea
which can save the world – is “victimology”, insofar as the suspect means by the term
“sacralization of the victim” whereas the term is normally used to refer to a particular academic
discipline devoted to the study of the impact of crimes on their victims.8 It would also seem that
W is hinting that the suspect is doomed to lose to the Secret Society women during this round
and will only win during the next round, i.e., it's during the next round that bystanders will be
convinced of the perniciousness in the women's persistent desire to be recognized as his
“victims”.
Then, the Secret Society's operation continues: 9:46 AM, 87.113.18.133, dyn.plus.net, UK.
87.113.18.133 - - [13/Dec/2015:10:46:50 -0700] "GET /scientificenlightenment1/capra.html
HTTP/1.1" 200 11850 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80
Safari/537.36"
This person seems to be related to LB Admin, but it’s a Windows NT 6.3. It appears that he
wants to use a proxy to carry out the Secret Society's operation (to offer more false testimonies to
the detective that the suspect has plagiarized) and that LB Admin refers him to the proxy she has
always been using.
Meanwhile, the suspect, leaving home on 9:30 AM, is at St Sophia from 11 AM onward. He
meets up with Stephanie, Angela, and Johanna. Chatted randomly with Angela and Johanna.
After church, Angela drops off the suspect, Normandie and Wilshire. Checked news. The suspect
is stunned by the complete loss of FN in regional election. Mood dampened, for it means
probably that the ICJ trial will continue for a long time to come while everything will seem as if
nothing had never happened. (The black hole of ignorance.) Panicked.
1:12 PM, 221.145.183.157, /, Korean scout? (It’s usually 167).
8 See John P. J. Dussich's “Victimology: Past, Present, and Future”, at: http://www.unafei.or.jp/english/pdf/RS_No70/No70_12VE_Dussich.pdf. 157
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
The suspect comes to Westwood. 4:43 PM, the suspect talks to W while in Starbucks, Westwood
(from 5:24:00). Here are the details of the conversation. (1) Why did W need the routing
number? Apparently, without the routing number, Homeland Security and the Russians cannot
decide in the ICJ whether the 26 November evidence showing the suspect receiving money from
the Russians was flawed. (2) Then, that FN has lost. Who has played this trick? (3) The suspect
is correct again: the French/ Russians and Homeland Security have gone to court to argue
whether Homeland Security's profile of him as “crazy” is correct. This is further evidence that
the suspect has not conspired with the Russians: Homeland Security must be very desperate. (4)
The suspect asks: Has he been in a TV show? Everybody is much nicer to him lately. He
wouldn't have guessed that it isn't NULND, but Homeland Security who might have instructed
everybody to be extra kind to the suspect. (5) Is Donald Trump trying to influence the French
election with his offensive statements? (6) The most probable US response: simply to strengthen
the opposition. The loss of FN is a “crime” in order for them to win the 2017 election through an
ICJ judgment. (7) The suspect is worried about his writing when it comes to the ICJ trial. Once
again, while the suspect is talking about the previous ICJ trial, another current ICJ trial is going
on. Anybody new to this current trial will be utterly confused. (8) About NULND. Could she
have made the suspect or SDW into a TV show to broadcast in France to influence the election?
Complete nonsense. (9) The suspect concludes that NULND is not going to harm him. (10) The
suspect requests that, if he be made a bad example, it has to be totally bad. (11) What about his
writing about the ICJ trial? The German Lady has found somebody in Germany (the “Berlin
plagiarizer”) to copy his work several times already. W: not to worry about it. (12) Russia is
going to get rid of the part of the previous ICJ trial where it shares the victim status with the
United States. People don’t want to get along. This is incorrect. The CIA, as it seems, will remain
co-victim with the Russians in the previous ICJ trial. (13) Finally, the suspect and W have a
discussion about why certain US bureaucrats can never live without going after Russia. W:
“They have made a career out of there being always an evil enemy to the US.”
It should be noted that this is all very bad evidence for Homeland Security. Since the suspect's
attitude toward NULND is positive, it would seem that he has written “American response” to
please her, which is thus evidence that he doesn't intend to conspire with Russia or FN.
6:10 PM, the suspect emails W his routing number.
6:37 PM, schuld.html. More chatter/ testimony (plagiarism).
8:07 PM, 93.229.246.87, orphism.html from Facebook, Iserlohn, Germany. More chatter/
testimony (plagiarism).
Meanwhile, the suspect works in Starbucks until 8:30 PM. Went home in sadness. A Brazilian
girl talks to him in Vermont station. 12:45 AM, the suspect gets nervous again and writes this
email to W:
158
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
W, there are two possibilities: (1) it’s possible that there is an operation behind your
borrowing money from me. It could be this: the women have already talked to the
DA, or are going to talk to the DA, so that something is going to happen to me if I
transfer the money to you on Monday. Maybe the DA has already agreed that my
online postings have constituted violation of my bonds. If I transfer the money to you
tomorrow, then I might be arrested and sent to jail by Tuesday. Then, the group of
women will provide my bank account and routing number to the DA so that Social
Security can be notified that I have been arrested and stop depositing money into my
account. In this way, since there is zero dollar left in my bank account, my storage
unit’s rent will not be paid by New Year, so that all my stuff will be gone by March.
Then, by the time I finish mental evaluation in jail and come to court, I will have no
more things left. All the reconstructions and logs will be gone too. This does seem
like an operation which the women would want, helped by Homeland Security.
(2) I’m just being paranoid, as required. Lately there seems to be a requirement that I
be paranoid every night before sleep about being arrested, etc. It appears that I’m just
required to produce evidences showing me to be extremely paranoid and crazy. And
so there is probably no trick in your needing to borrow money from me. I’m just
required to be paranoid and afraid that a group of women are going after me when
they are not, in order to confirm their claim that I suffer schizophrenic paranoia
believing that they are going after me when they are not. The evidence can then be
used in some court battle between Homeland Security and foreign governments or
broadcast to people to discredit me (especially in regard to my claim about their
filing false reports about me last year).
But, since (1) is possible, I shouldn’t have provided you with my bank account
number, etc., and I’m not sure about clearing up my bank account to give you the
money until I can get assurance that (1) is absolutely not going to happen. Can you
think of a way to assure me of that?
In fact, unless I can get such assurance, I shouldn’t even be talking to you, since
there is always the possibility that you are required to help the women to go after me.
1:09 AM, live.vodafone.in, West Bengal,
112.79.38.184 - - [14/Dec/2015:02:09:10 -0700] "GET
/scientificenlightenment1/classificationindia.html HTTP/1.1" 200 2885
"https://www.google.co.in/" "Mozilla/5.0 (Linux; Android 4.4.4; SM-A500G Build/KTU84P)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.93 Mobile Safari/537.36"
You have seen continual visits to this (incomplete) chapter from the Secret Society. The easiest
chapter to target, since it is incomplete. More testimony for the detectives that the suspect is a
plagiarizer.
159
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
There are only visits to images for the rest of the night.
14 December (Monday; the “Berlin plagiarizer”)
5:35 AM, classificationofindia.html. The same chapter again. More chatter/ testimony
(plagiarism).
7:29 AM, 80.239.194.50, Cambridge, UK.
80.239.194.50 - - [14/Dec/2015:08:29:17 -0700] "GET
/scientificenlightenment1/quantummechanics.htm HTTP/1.1" 200 28558
"https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36"
What's this visit about? There are now three possibilities. (1) A volunteer to bear false witness
that the suspect has plagiarized or is just repeating things he has read from books; (2) a decoy;
and (3) the TMU having found another university professor to assess whether the suspect has
really plagiarized.
7:56 AM, 129.97.246.240, University of Waterloo, Ontario.
129.97.246.240 - - [14/Dec/2015:08:56:46 -0700] "GET
/scientificenlightenment1/whyshouldwebejust.html HTTP/1.1" 200 68711
"https://www.google.ca/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36"
The same three possibilities for this visit too.
8:04 AM, 173.79.173.230, washdc.fios.verizon.net, Sterling, Virginia.
173.79.173.203 - - [14/Dec/2015:09:04:27 -0700] "GET /blogs/2014/04/14/last-word-on-mypast-two-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1360
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (iPhone; CPU iPhone
OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0
Mobile/13B143 Safari/601.1"
Another volunteer has got wind of the situation and comes to join in on the rumoring. More
damaging testimonies to supply to the detectives. (“He's crazy. He says these women are going
after him.”)
8:36 AM, 50.204.57.98, comcastbusiness.net, Oak Park, Illinois.
160
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
50.204.57.98 - - [14/Dec/2015:09:36:23 -0700] "GET
/scientificenlightenment1/quantummechanics.htm HTTP/1.1" 200 28558
"https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36"
If the visit from an hour ago is indeed requested by the TMU/ CIA, then this visit would be
Homeland Security's response to the earlier positive review (the suspect didn't plagiarize), i.e.
that the suspect has indeed plagiarized (or does nothing more than summarize what he has read).
9:25 AM, 87.205.236.135, ancestorcult.html, adsl.inetia.pl, Warsaw, Poland. Another volunteer
(plagiarism).
12:01 PM, junk call – it seems to be from the Social Security Administration on Vermont and
Catalina. Did Homeland Security instruct somebody in that SSA branch to call the suspect for no
reason whatsoever, only in order that they might have a chance to scramble up the interception to
end up with another piece of evidence seemingly showing the Russians trying to contact the
suspect?
Meanwhile, the suspect. He has left home 11:30 AM. (On the bus: a guy who looks like a DHS
agent is reading the Bible.) He comes to Bail Hotline first. Then he is at the Wells Fargo bank,
Vermont/ Wilshire. He is now ready to proceed with the transfer of money.
1:25 PM, he first emails W saying he retracts his worries from last night.
1:30 PM, W replies. The suspect is then walking to the nearest Bank of America.
2:10 PM, the suspect leaves a message with W: the transfer of funds completed at Bank of
America. The intercept of the transaction is immediately examined in the ICJ: it proves that the
26 November evidence is faulty: the account which has received a large sum of money belongs
to NCFM, not to the suspect.
2:25 PM, W calls to thank the suspect. Note that the suspect has however come up with a wrong,
but not entirely wrong, theory: “Homeland Security is trying to produce evidence showing me
conspiring with the Russians by receiving money from them. This, because, while Homeland
Security is trying to prove that I'm insane, Russians have evidences proving otherwise.
Homeland Security is trying to suppress Russians' evidences on ground of conspiracy.”
2:29 PM, 81.7.230.119, orphism.html, Google, static.cablecom.ch, Switzerland. More chatter/
testimony (plagiarism).
3:57 PM, 66.191.86.141, Zhuangzi.html, wi.charter.com, Eau Claire, Wisconsin.
161
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
66.191.86.141 - - [14/Dec/2015:16:57:12 -0700] "GET /scientificenlightenment1/zhuanzi.html
HTTP/1.1" 200 20514 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_10_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36"
Note the persons from Eau Claire on 11 October (3:57 PM) and on 21 June 2014 (7:48 PM). This
person is probably related to the previous two persons. More chatter (plagiarism).
7:39 PM, 64.7.147.163, capra.html, Cambridge, Ontario. More chatter (plagiarism).
Meanwhile, after being done with the money business, the suspect comes back to Starbucks,
Vermont. Called the strange number. No answer. Then, Chrysalis, around 5 PM. Dinner. Fell
asleep in Men’s group. Then, 7 PM, going to Starbucks, Westwood. Even though he doesn’t quite
believe that he would be arrested, for safety’s sake…
Fewer visits from 8:40 PM until 12:40 AM. Only images. 2 or 3 visits to dividedline.jpg.
1:50 AM, Birdie Smoot posts a reply to SDW’s 18/11/15 post.
As for the suspect, he continues to work on “Far right”, and then uploads it to his Gmail account
for backup. 2 AM, he goes to sleep in Westwood Village.
2:18 AM, NTE Bredband, Norway, Levanger, Norway,
217.168.83.42 - - [15/Dec/2015:03:18:58 -0700] "GET /blogs/wpcontent/uploads/2013/09/91313-58.png HTTP/1.1" 200 225418 "https://www.google.com/"
"Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/34.0.1847.116 Safari/537.36"
Another volunteer: “This guy has got all these hacking materials on his website.” More
testimony for the detectives and more evidence in the ICJ to support Homeland Security's case.
2:19 AM, EHIHosting, San Jose, CA. This is proxy,
50.118.197.65 - - [15/Dec/2015:03:19:14 -0700] "GET /scientificenlightenment1/schuld.html
HTTP/1.1" 200 25662 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36"
50.118.197.65 - - [15/Dec/2015:03:19:15 -0700] "GET /scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12082
"http://www.lawrencechin2011.com/scientificenlightenment1/schuld.html" "Mozilla/5.0
(Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80
Safari/537.36"
50.118.197.65 - - [15/Dec/2015:03:19:17 -0700] "GET /favicon.ico HTTP/1.1" 200 408
"http://www.lawrencechin2011.com/scientificenlightenment1/schuld.html" "Mozilla/5.0
162
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
(Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80
Safari/537.36"
Another testimony (plagiarism). 3:07 AM, the most important feat, it's the “Berlin plagiarizer”,
his third time here: pd9f74be9.dip0.t-ipconnect.de, Berlin,
217.247.75.233 - - [15/Dec/2015:04:07:50 -0700] "GET /thermh1.html HTTP/1.1" 200 24055
"https://www.google.de" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101
Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:07:51 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-"
"Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:08 AM, he looks at the first chapter,
217.247.75.233 - - [15/Dec/2015:04:08:24 -0700] "GET /1/thermhch1.html HTTP/1.1" 200
20693 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:08:25 -0700] "GET /1/athd2.jpg HTTP/1.1" 200 12082
"http://www.lawrencechin2011.com/1/thermhch1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:09 AM, he looks at the second chapter,
217.247.75.233 - - [15/Dec/2015:04:09:32 -0700] "GET /1/thermhch2.html HTTP/1.1" 200
38692 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:09:32 -0700] "GET /1/sexdispositive.jpg HTTP/1.1" 200
31827 "http://www.lawrencechin2011.com/1/thermhch2.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:09:32 -0700] "GET /1/biopower2.jpg HTTP/1.1" 200 8906
"http://www.lawrencechin2011.com/1/thermhch2.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:10 AM, he began copying the second chapter and pasting it on his Libre Office:
217.247.75.233 - - [15/Dec/2015:04:10:23 -0700] "GET /1/sexdispositive.jpg HTTP/1.1" 200
31827 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:10:23 -0700] "PROPFIND /1/sexdispositive.jpg HTTP/1.1"
404 864 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:10:24 -0700] "GET /1/biopower2.jpg HTTP/1.1" 200 8906
"-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:10:24 -0700] "PROPFIND /1/biopower2.jpg HTTP/1.1" 404
859 "-" "LibreOffice"
3:10 AM, he looked at the third chapter:
163
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
217.247.75.233 - - [15/Dec/2015:04:10:37 -0700] "GET /1/thereasonofstate.htm HTTP/1.1" 200
23602 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:11 AM, he looked at the fourth chapter:
217.247.75.233 - - [15/Dec/2015:04:11:44 -0700] "GET /1/thermh10.html HTTP/1.1" 200 14761
"http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64;
rv:41.0) Gecko/20100101 Firefox/41.0"
3:12 AM, he looked at fourth chapter B:
217.247.75.233 - - [15/Dec/2015:04:12:56 -0700] "GET /1/culturalfeminism.html HTTP/1.1"
200 64653 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu;
Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:13 AM, he looked at the fifth chapter:
217.247.75.233 - - [15/Dec/2015:04:13:54 -0700] "GET /thermhchapter5.html HTTP/1.1" 200
35705 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:13:54 -0700] "GET /athd2.jpg HTTP/1.1" 200 12120
"http://www.lawrencechin2011.com/thermhchapter5.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:13:54 -0700] "GET /patches.jpg HTTP/1.1" 200 143017
"http://www.lawrencechin2011.com/thermhchapter5.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:14 AM, he began copying the fifth chapter and pasting it onto his Libre Office:
217.247.75.233 - - [15/Dec/2015:04:14:41 -0700] "GET /patches.jpg HTTP/1.1" 200 143017 "-"
"LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:14:42 -0700] "PROPFIND /patches.jpg HTTP/1.1" 404 855
"-" "LibreOffice"
3:14 AM, he looked at the fifth chapter B:
217.247.75.233 - - [15/Dec/2015:04:14:55 -0700] "GET /1/democracy2.html HTTP/1.1" 200
6999 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:15 AM, he looked at the fifth chapter C:
164
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
217.247.75.233 - - [15/Dec/2015:04:15:39 -0700] "GET /1/originofnationstate.htm HTTP/1.1"
200 20528 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu;
Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:16 AM, he began copying the fifth chapter C and pasting it onto his Libre Office:
217.247.75.233 - - [15/Dec/2015:04:16:23 -0700] "GET /1/athd2.jpg HTTP/1.1" 200 12120 "-"
"LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:16:23 -0700] "PROPFIND /1/athd2.jpg HTTP/1.1" 404 855
"-" "LibreOffice"
3:16 AM, he looked at the sixth chapter:
217.247.75.233 - - [15/Dec/2015:04:16:53 -0700] "GET /1/oppressionofwomen1.htm HTTP/1.1"
200 25322 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu;
Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:16:54 -0700] "GET /1/higherprimateevolution.jpg
HTTP/1.1" 200 68767 "http://www.lawrencechin2011.com/1/oppressionofwomen1.htm"
"Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:16:54 -0700] "GET /1/primateevolution.jpg HTTP/1.1" 200
70071 "http://www.lawrencechin2011.com/1/oppressionofwomen1.htm" "Mozilla/5.0 (X11;
Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:16:54 -0700] "GET /1/hominoidsociality.jpg HTTP/1.1" 200
227020 "http://www.lawrencechin2011.com/1/oppressionofwomen1.htm" "Mozilla/5.0 (X11;
Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:17 AM, he began copying the sixth chapter and pasting it onto his Libre Office:
217.247.75.233 - - [15/Dec/2015:04:17:24 -0700] "GET /1/higherprimateevolution.jpg
HTTP/1.1" 200 68767 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:17:24 -0700] "PROPFIND /1/higherprimateevolution.jpg
HTTP/1.1" 404 872 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:17:25 -0700] "GET /1/hominoidsociality.jpg HTTP/1.1" 200
227020 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:17:26 -0700] "PROPFIND /1/hominoidsociality.jpg
HTTP/1.1" 404 867 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:17:26 -0700] "GET /1/primateevolution.jpg HTTP/1.1" 200
70071 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:17:27 -0700] "PROPFIND /1/primateevolution.jpg
HTTP/1.1" 404 866 "-" "LibreOffice"
3:17 AM, he looked at the sixth chapter B:
165
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
217.247.75.233 - - [15/Dec/2015:04:17:42 -0700] "GET /1/oppressionofwomen20.htm
HTTP/1.1" 200 39490 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11;
Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:17:43 -0700] "GET /1/lunarperiodicity.gif HTTP/1.1" 200
4699 "http://www.lawrencechin2011.com/1/oppressionofwomen20.htm" "Mozilla/5.0 (X11;
Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:17:43 -0700] "GET /1/pottery.jpg HTTP/1.1" 200 60375
"http://www.lawrencechin2011.com/1/oppressionofwomen20.htm" "Mozilla/5.0 (X11; Ubuntu;
Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:18:27 -0700] "GET /1/lunarperiodicity.gif HTTP/1.1" 200
4699 "-" "LibreOffice"
3:18 AM, he began copying the sixth chapter B and pasting it onto his Libre Office:
217.247.75.233 - - [15/Dec/2015:04:18:27 -0700] "PROPFIND /1/lunarperiodicity.gif
HTTP/1.1" 404 866 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:18:28 -0700] "GET /1/pottery.jpg HTTP/1.1" 200 60375 "-"
"LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:18:29 -0700] "PROPFIND /1/pottery.jpg HTTP/1.1" 404
857 "-" "LibreOffice"
3:19 AM, he looked at chapter 9:
217.247.75.233 - - [15/Dec/2015:04:19:05 -0700] "GET /1/originofmonogamy.pdf HTTP/1.1"
200 1596781 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu;
Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:19 AM, he looked at chapter 10:
217.247.75.233 - - [15/Dec/2015:04:19:40 -0700] "GET /1/thermhch6d.html HTTP/1.1" 200
19021 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:20 AM, he looked at chapter 10 B:
217.247.75.233 - - [15/Dec/2015:04:20:40 -0700] "GET /1/thermhch6d222.html HTTP/1.1" 200
29197 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/trnaribozyme.jpg HTTP/1.1" 200
30172 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu;
Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/oilpatch.jpg HTTP/1.1" 200 29169
"http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
166
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/obcell1.jpg HTTP/1.1" 200 38319
"http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/chemoton.jpg HTTP/1.1" 200 86500
"http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/abstriction2.jpg HTTP/1.1" 200
71943 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu;
Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/obcell2.jpg HTTP/1.1" 200 88291
"http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/treeoflife1.jpg HTTP/1.1" 200
286406 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu;
Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/treeoflife2.jpg HTTP/1.1" 200
337490 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu;
Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:21 AM, he began copying chapter 10 B and pasting it onto his Libre Office:
217.247.75.233 - - [15/Dec/2015:04:21:18 -0700] "GET /1/trnaribozyme.jpg HTTP/1.1" 200
30172 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:19 -0700] "PROPFIND /1/trnaribozyme.jpg HTTP/1.1"
404 862 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:19 -0700] "GET /1/oilpatch.jpg HTTP/1.1" 200 29169
"-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:20 -0700] "PROPFIND /1/oilpatch.jpg HTTP/1.1" 404
858 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:20 -0700] "GET /1/chemoton.jpg HTTP/1.1" 200 86500
"-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:21 -0700] "PROPFIND /1/chemoton.jpg HTTP/1.1" 404
858 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:22 -0700] "GET /1/abstriction2.jpg HTTP/1.1" 200
71943 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:23 -0700] "PROPFIND /1/abstriction2.jpg HTTP/1.1"
404 862 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:24 -0700] "GET /1/obcell1.jpg HTTP/1.1" 200 38319 "-"
"LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:25 -0700] "PROPFIND /1/obcell1.jpg HTTP/1.1" 404
857 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:26 -0700] "GET /1/obcell2.jpg HTTP/1.1" 200 88329 "-"
"LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:27 -0700] "PROPFIND /1/obcell2.jpg HTTP/1.1" 404
857 "-" "LibreOffice"
167
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
217.247.75.233 - - [15/Dec/2015:04:21:27 -0700] "GET /1/treeoflife1.jpg HTTP/1.1" 200
286406 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:30 -0700] "PROPFIND /1/treeoflife1.jpg HTTP/1.1" 404
861 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:31 -0700] "GET /1/treeoflife2.jpg HTTP/1.1" 200
337490 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:21:33 -0700] "PROPFIND /1/treeoflife2.jpg HTTP/1.1" 404
861 "-" "LibreOffice"
3:22 AM, he looked at Epilogue 1:
217.247.75.233 - - [15/Dec/2015:04:22:52 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200
27754 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:22:53 -0700] "GET /1/secularization.jpg HTTP/1.1" 200
87535 "http://www.lawrencechin2011.com/1/amcivilreligion.htm" "Mozilla/5.0 (X11; Ubuntu;
Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:23 AM, he began copying Epilogue 1 and pasting it onto his Libre Office:
217.247.75.233 - - [15/Dec/2015:04:23:21 -0700] "GET /1/secularization.jpg HTTP/1.1" 200
87535 "-" "LibreOffice"
217.247.75.233 - - [15/Dec/2015:04:23:22 -0700] "PROPFIND /1/secularization.jpg HTTP/1.1"
404 864 "-" "LibreOffice"
3:23 AM, he looked at chapter 12:
217.247.75.233 - - [15/Dec/2015:04:23:44 -0700] "GET /1/epilogue330.html HTTP/1.1" 200
25916 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:24 AM, he looked at Epilogue 1 B:
217.247.75.233 - - [15/Dec/2015:04:24:37 -0700] "GET /1/consumerization.htm HTTP/1.1" 200
44671 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux
x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:26 AM, he looked at Introductory Summary B:
217.247.75.233 - - [15/Dec/2015:04:26:57 -0700] "GET /thermh2.html HTTP/1.1" 200 45320
"http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64;
rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:27:50 -0700] "GET /scientlitfr.html HTTP/1.1" 200 10747
"http://www.lawrencechin2011.com/thermh2.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64;
rv:41.0) Gecko/20100101 Firefox/41.0"
168
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
At the same time, somebody else has come: 3:34 AM, Brandeis University, Waltham,
Massachusetts,
129.64.151.154 - - [15/Dec/2015:04:34:28 -0700] "GET /1/thermhch2.html HTTP/1.1" 200
38692 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
129.64.151.154 - - [15/Dec/2015:04:34:28 -0700] "GET /1/athd2.jpg HTTP/1.1" 200 12120
"http://www.lawrencechin2011.com/1/thermhch2.html" "Mozilla/5.0 (Windows NT 6.3;
WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
129.64.151.154 - - [15/Dec/2015:04:34:28 -0700] "GET /1/biopower2.jpg HTTP/1.1" 200 8906
"http://www.lawrencechin2011.com/1/thermhch2.html" "Mozilla/5.0 (Windows NT 6.3;
WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
129.64.151.154 - - [15/Dec/2015:04:34:28 -0700] "GET /1/sexdispositive.jpg HTTP/1.1" 200
31827 "http://www.lawrencechin2011.com/1/thermhch2.html" "Mozilla/5.0 (Windows NT 6.3;
WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
129.64.151.154 - - [15/Dec/2015:04:34:29 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-"
"Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
Since it's 6:34 AM in the morning over there, it's presumably a student in the dormitory. Either a
decoy or another testimony for the detective (plagiarism).
3:45 AM, the Berlin guy looked at the first chapter of “Genealogy of Testamental Religions”:
217.247.75.233 - - [15/Dec/2015:04:45:20 -0700] "GET
/scientificenlightenment1/geneaology222.htm HTTP/1.1" 200 20187
"http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64;
rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:45:21 -0700] "GET /scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12120
"http://www.lawrencechin2011.com/scientificenlightenment1/geneaology222.htm" "Mozilla/5.0
(X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:46 AM, he looked at chapter 4 of “Testamental Religions”:
217.247.75.233 - - [15/Dec/2015:04:46:10 -0700] "GET /scientificenlightenment1/schuld.html
HTTP/1.1" 200 25700 "http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11;
Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
At the same time, he looked at chapter 5 of “Testamental Religions”:
217.247.75.233 - - [15/Dec/2015:04:46:49 -0700] "GET
/scientificenlightenment1/christianity.htm HTTP/1.1" 200 29139
"http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64;
rv:41.0) Gecko/20100101 Firefox/41.0"
169
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
3:47 AM, he looked at the first chapter of “Philosophical Enlightenment in Ancient India”:
217.247.75.233 - - [15/Dec/2015:04:47:50 -0700] "GET
/scientificenlightenment1/classificationindia.html HTTP/1.1" 200 2885
"http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64;
rv:41.0) Gecko/20100101 Firefox/41.0"
3:50 AM, he looked at the second chapter of “Ancient India”:
217.247.75.233 - - [15/Dec/2015:04:50:30 -0700] "GET
/scientificenlightenment1/earlyindia.html HTTP/1.1" 200 33678
"http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64;
rv:41.0) Gecko/20100101 Firefox/41.0"
3:51 AM, he looked at the third chapter of “Ancient India”:
217.247.75.233 - - [15/Dec/2015:04:51:13 -0700] "GET
/scientificenlightenment1/upanishad.html HTTP/1.1" 200 15118
"http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64;
rv:41.0) Gecko/20100101 Firefox/41.0"
3:51 AM, he looked at the fourth chapter of “Ancient India”:
217.247.75.233 - - [15/Dec/2015:04:51:59 -0700] "GET /scientificenlightenment1/buddha1.html
HTTP/1.1" 200 7211
"http://www.lawrencechin2011.com/scientificenlightenment1/upanishad.html" "Mozilla/5.0
(X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
3:53 AM, he returned to the Table of Contents:
217.247.75.233 - - [15/Dec/2015:04:53:08 -0700] "GET /thermex2.html HTTP/1.1" 200 568
"http://www.lawrencechin2011.com/scientificenlightenment1/buddha1.html" "Mozilla/5.0 (X11;
Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0"
217.247.75.233 - - [15/Dec/2015:04:53:09 -0700] "GET /thermfr2.html HTTP/1.1" 200 907
"http://www.lawrencechin2011.com/thermex2.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64;
rv:41.0) Gecko/20100101 Firefox/41.0"
The “Berlin plagiarizer” is on the suspect's website for about 50 minutes. He is here to copy the
entire “A Thermodynamic Interpretation of History” except the following chapters: (0) Summary
B. (1) The Material Meaning of History. (3) The Truth of Nation-State. (4A) The Liberation of
Women. (4B) The Problem of Cultural Feminism. (5A) The Origin of Democracy of
Totalitarianism (A). (5B) The Origin of Totalitarianism (B). (7A) The Elementary Structures of
Kinship (A). (7B) The Elementary Structures of Kinship (B). (B); (8A) The Origin of Classical
Patriarchy (A). (8B) The Origin of Classical Patriarchy (B). (8C) The Origin of Classical
170
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Patriarchy (C). (9.2 A) The Progressive Bildung (A). (10.2 A) Foucault and Feminism. (10.2 C)
The Origin of Good and Evil in the Human Experience of Thermodynamics. (11A) A Genealogy
of Feminism (A). (11B) The Origin of Liberal Feminism in the Differentiation of Subjectivity.
(11C) Cultural Feminism's Transition to Victim Feminism. (11D) On Mary Daly. (12) The
Problem of Feminist “Liberation”. (13) The Feminist Ethic and the Spirit of Consumerism in the
Case of Betty Friedan.
It seems to be EKT who has instructed the Secret Society women to ask the “Berlin plagiarizer”
to copy almost the entirety of the suspect’s theory. The Berlin plagiarizer is supposed to play the
old trick of deleting all the references in the suspect's chapters and then turn it in to the detectives
to prove that the suspect is a plagiarizer. EKT must have told the Secret Society women that this
will also be golden evidence in the ICJ to support Homeland Security's false profile of the
suspect since, in the “Marine document”, the suspect has extensively quoted from his past blogs
without giving references, so that, when all the references to quotations are deleted from the
suspect's thermodynamic interpretation of history, it could fool the ICJ judges into the impression
that the old theory without references is indeed the original form of the suspect's theory.
Meanwhile, the Russians, now that they have proven to the ICJ judges' satisfaction that the 26
November evidence is erroneous, are making an additional argument to seal their victory once
and for all: “We will prove that the suspect has no prior knowledge of the current ICJ trial. He
has figured things out on his own, by observing actions and reactions. You just watch. EKT has
persuaded the Secret Society women to instruct their Berlin guy to copy all his work again. In the
afternoon, when the suspect shall check his log, he’ll discover this and realize that the women
have access to his phone conversation through Homeland Security, which proves to him that
EKT is involved. He’ll think like this because he’ll remember he has mentioned the ‘Berlin guy’
just on Sunday night, and the women have responded on Tuesday morning by ordering the Berlin
guy to do it again, which can only mean that the women have heard his conversation on Monday
afternoon.”
15 December (Tuesday)
The Secret Society's operation continues. 7:19 AM, 14.139.225.180, classificationofindia.html,
Yahoo, Banaras Hindu University Medical Sciences, “confirmed proxy server”, Varanasi, India.
14.139.225.180 - - [15/Dec/2015:08:19:25 -0700] "GET
/scientificenlightenment1/classificationindia.html HTTP/1.0" 200 2847
"http://in.search.yahoo.com/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/44.0.2403.155 Safari/537.36"
This guy was just here on 3:33 AM, 13 December. 7:26 AM, he comes again, using Google IN
instead.
14.139.225.180 - - [15/Dec/2015:08:26:05 -0700] "GET
/scientificenlightenment1/classificationindia.html HTTP/1.0" 200 2847
171
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
"https://www.google.co.in/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/44.0.2403.155 1273Safari/537.36"
Repeated visits to the same chapter usually means “decoy”. However, we still suspect that he is
offering repeated testimonies to the detectives because the latter, with TMU detectives by their
side to “tutor” them, are getting skeptical of the volunteers' testimonies. (Although the TMU
detectives couldn't reveal the truth, they could train the Pasadena or Hermosa beach detective to
look for inconsistencies in the testimonies.)
Meanwhile, the suspect wakes up in Westwood Village, 6 AM. Too cold. Starbucks. After
checking his log, he becomes very concerned with the Berlin plagiarizer’s actions. He begins
looking for an Internet forum to report him. He has by now realized that both EKT and
Homeland Security have wanted him to look crazy. He has also thought about the US strategy for
dealing with the rise of European far right: pursuing three avenues at the same time, (1)
maintaining the status quo, (2) getting ready to project an image of itself as a conservative
Christian nation, and (3) getting ready to establish a new form of liberals based on a
thermodynamic interpretation of history. This has got the suspect excited for a while, and he is
quite turned on by all the pretty AWFs in Starbucks.
While the suspect is getting all excited for nothing (not knowing that everybody is against him),
the Secret Society continues its operation. 11:27 AM, 123.195.62.194, quantum mechanics,
Google TW, kbronet.com.tw, Hsinchu, TW. More testimony (plagiarism)
12:05 PM, 96.92.147.181, Eva, Comcast Business, Groveland, MA. Again, not clear whether the
Secret Society women are trying to recruit Eva.
12:18 PM, 50.143.225.117, Comcast, Modesto, California.
50.143.225.117 - - [15/Dec/2015:13:18:49 -0700] "GET
/pleading_papers/opposition_to_demurrer.doc HTTP/1.1" 404 1360 "https://www.google.com"
"Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0"
Another volunteer is trying to find evidence for the suspect's violation of his family members'
privacy. But, unfortunately, the suspect has removed the document.
3:58 PM, the Brandeis University person from 3:34 AM has come looking at the same chapter:
it’s already cached in his browser.
129.64.154.114 - - [15/Dec/2015:16:58:57 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-"
"Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
Again, while repeated visits to the same chapter means “decoy”, it is possible that the detectives
are getting suspicious about whether the huge chuck of evidences which the Secret Society
172
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
women have turned in – especially the pile which the “Berlin plagiarizer” has just turned in
today – is really genuine, and that the Brandeis person is trying to persuade them that, indeed, it
is, that the suspect has really cited all these materials from others without giving references.
Meanwhile, the suspect, still in Westwood, calls Father Bob to tell him that he will come to
volunteer on 3:30 PM. He has left Westwood by 1:30 PM. Slept on the bus. Passed Vermont
station. Went back. He has called Ms Warren two times today, but, as usual, she has never called
back. Then, while going to Urban Ministry on bus 204, he calls up W, and W answers it. Here are
the details of the conversation (from 22:00 onward): (1) The suspect has figured out that the
women have access to his phone conversation through Homeland Security, which means that
EKT is involved, since only EKT has the kind of authority to command Homeland Security to
violate the suspect's privacy in such a blatant manner. The suspect then gives the summary of his
scenario so far: the conflict between Homeland Security's profile and TMU's profile. EKT also
has an interest in confirming Homeland Security's profile. But EKT has to disprove Homeland
Security's claim that the suspect is conspiring with her. Only the US government has to disprove
both claims. EKT wants to monopolize the idea of making the women a bad example. But US
government doesn't want this. As you can see, the suspect is only about 50 percent correct. (2)
About the French regional election: FN didn't quite lose, since their base has considerably
enlarged, and, insofar as the opposition must have played tricks, FN will definitely come to
power in 2017 via an ICJ judgment, so that US' only option is to contain the influence of FN in
Europe. Thus the US will need the suspect, just as the US will need a backup plan, which will be
the suspect's “American response”. “Thus the US should pursue all three avenues at the same
time.” Then, to respond to Russia, the US can claim the suspect's theory as part of America's
“brand-name”. (3) About the “Berlin plagiarizer”. Plagiarism vs “simultaneous development of
the same idea” (41:00). W: His brother, when publishing his ideas, skewed part of his
conclusions and left out a few essential variables on purpose, so that, when somebody else copies
them, he couldn't work out the conclusions. The suspect laments that he couldn't convince the
government to rack up these women. (4) W’s colleagues are ignoring each other because of
some online posting about affirmative actions. The suspect wishes he can escape to a third
country. (5) The suspect: this country is like shit in your mouth, you just have to vomit.
Criminals are in control of this country. W complains about how the suspect has put up his idea
about Rousseau on his website. W’s friend has once published in Vanity Press. (6) The Secret
Society women have visited the suspect's website so much that they have single-handedly
changed the site’s Google ranking status. Around 4:30 PM, the suspect has finished his
conversation with W.
After this conversation, the Russians will have obtained definitive evidence to prove that the
suspect has no prior knowledge of their, and French’s, involvement and so has never conspired
with them. The Russians are correct: the suspect knows things especially by observing actions
and reactions. It now appears that Homeland Security is all but doomed. It would appear that the
Russians (or the CIA) have also instructed W to provide hints to the suspect as to what the debate
in the ICJ is about, i.e. the Russians have already developed similar ideas to those found, and to
be found, in the suspect’s writings on Russia’s soft-power, Marine LP, and Russia's support of
European far right movements, and now they risk being banned by an ICJ order from
implementing their own ideas because of this “conspiracy” charge. The Russians probably think
173
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
that, if the suspect can comprehend the situation given the hint, then Homeland Security can be
convicted of conspiring with the suspect to harm Russia (to prevent Russia from implementing
its own ideas). It would also appear that the CIA and the Russians have also instructed W to
provide the additional hint that the suspect’s ideas are superior to the Russians' because they are
based on a thermodynamic interpretation of history – i.e. have a philosophical foundation – and
include a magnificent analysis of the world historical function of American feminism.
5:21 PM, 129.64.154.114, Foucault on biopower, the Brandeis University person.
129.64.154.114 - - [15/Dec/2015:18:21:19 -0700] "GET /1/thermhch2.html HTTP/1.1" 200
38692 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
Why is he here again? Again, while repeated visits of the same page usually mean that the person
is here to do decoy, we suspect in this case that it is because the detectives are getting skeptical
of the Secret Society women's case.
From 6:04 PM onward until 11:52 PM, only visits to images. The Secret Society women are
again busy at night.
7:06 PM, Andre M. Pietroschek (Essen) posts a comment on SDW’s 18/11/15 post. This guy
soon deletes all his blog content. Note that it’s 4 AM in Germany. One wonders if this guy has
anything to do with the “Berlin plagiarizer”.
174
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
After talking with W, the suspect comes to Starbucks, Sunset. Calmed down. Decided that the
“Berlin plagiarizer” is not really plagiarizing for the Secret Society’s sake, since they already
have a cache of all his writings. In the coffeehouse, the suspect runs into a professor from the
east coast writing a book on Hannah Arendt’s letters. After this, the suspect goes to the Forum.
Then home. Got very scared again. He fears that the women could get him arrested with another
vandalism charge.
2:47 AM, arrownet.dk, Copenhagen,
62.61.130.225 - - [16/Dec/2015:03:47:59 -0700] "GET /familyphotos/familyphoto4.jpg
HTTP/1.1" 200 135584 "https://www.google.dk" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6;
rv:38.0) Gecko/20100101 Firefox/38.0"
This is for sure the Secret Society's. What is it about? Testimony that the suspect has violated his
family members' privacy?
16 December (Wednesday; the German Lady cancels her meetup)
6:22 AM, somebody is accessing the older portions of the Secret Facebook Group:
173.252.74.118 - - [16/Dec/2015:07:22:18 -0700] "GET /scientificenlightenment1/catalysis.jpg
HTTP/1.1" 206 9302 "http://alfa-img.com/show/endergonic-biosynthesis.html"
"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)"
69.171.228.118 - - [16/Dec/2015:07:22:18 -0700] "GET /scientificenlightenment1/catalysis.jpg
HTTP/1.1" 200 33200 "-" "facebookexternalhit/1.1
(+http://www.facebook.com/externalhit_uatext.php)"
9:34 AM, 93.163.188.22, Roskilde, Denmark.
93.163.188.22 - - [16/Dec/2015:10:34:35 -0700] "GET /scientificenlightenment1/schuld.html
HTTP/1.1" 200 25700 "https://www.google.dk/" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36"
Presumably chatter/ false testimony (plagiarism).
Next comes a very important visit. 11:43 AM, 37.254.16.248, Esfahan Telecommunication
Company, Isfahan.
37.254.16.248 - - [16/Dec/2015:12:42:57 -0700] "GET /soft/soft.pdf HTTP/1.1" 206 33035
"http://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=52&cad=rja&uact=8&ved=0ahUKEwi6n6O1keHJA
hVngXIKHaNwARA4MhAWCCIwAQ&url=http%3A%2F%2Fwww.lawrencechin2011.com
175
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
%2Fsoft%2Fsoft.pdf&usg=AFQjCNHaG3Y8rlIHECcaQpZczYB4kqo2g&sig2=e3sabAgNio6OzFptFtEm9w&bvm=bv.110151844,d.bGQ" "Mozilla/5.0
(Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko"
One has to wonder whether this is a proxy. The check on ip2location.com comes up negative.
The person is really in Iran, it seems. Why then is the person using Google COM?
It appears that the US has deceived the Secret Society women into getting one of their Iranian
associates to visit the suspect’s document on Russia's development of soft-power in order to
enable Iran to intercept it. Why is this visit so important?
The ICJ has probably issued its order last night exonerating the Russians and the French. It
appears that, because NULND and the Republicans are currently working on a certain issue
about Iran (probably related to their dissatisfaction with Obama’s deal with Iran), they have
decided to cut in. Since they can no longer convict the Russians for conspiring with terrorist
suspects to harm the US, they are going to use the women to get Iran. At least they can get Iran,
if not the Russians and the French. Now, two days later, on Friday, Obama would sign a new law
stipulating that people who enjoy visa-free travel to the United States may be barred from such
privilege if they have visited Iran before. Clearly, either today or tomorrow, Iran will have been
convicted in the ICJ of conspiring with terrorist suspects in the US to destabilize the US and
conduct espionage for US' enemy states. This conviction comes despite Iran’s lack of such
intention: the US has legally used the Secret Society women as patsies to harm its competitor
nations. Meanwhile, since the suspect's document is intercepted in a “terrorist conspiracy”, the
176
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Russians, even though not convicted, will still be forbidden to implement any ideas similar to
those found in the document to reform itself.
This of course means that the women are doomed, since the United States has decided to
continue to maintain them as “terrorist suspects”. (They have been such since the Syrian
scandal.) It’s unlikely that the US would have said to SDW: “Visit his writings so that all of them
can be banned”, for the US would then be conspiring with the Secret Society women to harm
Russia and Iran. The women would now be labeled “terrorists” and “spies for foreign powers”
per an ICJ judgment.
But the ICJ judgment would also mean that Homeland Security is now convicted of conspiring
with the women to harm Russia. Or rather using the suspect to entrap Russia in order to get its
plans banned as “terrorist plan”. What's worse, the fact that NULND has particularly chosen the
suspect's document on Russia's possible development of soft-power to pull this stunt indicates
that she is developing good intention toward the suspect. She must have found the suspect's
analysis of Russia's failure (Russians' failure to develop a parental attitude toward minorities, for
example) superb and wanted to make the method “To sell Pepsi by showing that there is poison
in Coca-Cola” (which the Russians must have themselves thought of doing) into the women's
terrorist conspiracy to harm the United States. In this stunt she has pretty much prevented Russia
from ever effectively competing with the United States in the domain of soft-power – since any
discrediting of America's soft-power will now be considered “terrorist attack upon the US”. She
must be developing plans, while damning the women, to free up the suspect and make good use
of him after preventing the Russians from benefiting from his ideas. (If you read anything about
how she takes good care of her husband, a prominent neoconservative thinker, you will know
that she's a woman who values talented men, unlike the Secret Society women.) This must have
tremendously offended the thugs inside Homeland Security, who see the suspect as their worst
enemy. Homeland Security has therefore decided to fight back. Since they have already broken
into the control center, they know from the computers there that the suspect is about to give out
the evidences they need to exonerate themselves.
12:33 PM, 71.190.230.156, fios.verizon.net, Syosset, New York.
71.190.230.156 - - [16/Dec/2015:13:33:49 -0700] "GET
/scientificenlightenment1/plancklength.gif HTTP/1.1" 200 1414 "https://www.google.com/"
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/47.0.2526.106 Safari/537.36"
This is more chatter/ testimony for the detectives, presumably (plagiarism).
As for the suspect: he wakes up late, almost 11:18 AM. Ran to bus stop, but missed the bus.
Returned home, called Christine (Work Source), Fr Bob, and left a message with Ms Warren.
Took the 12:30 PM bus. Stopped in Starbucks, Vermont, to open up the log. Then, Urban
177
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Ministry. Read “Essenes” in Ederscheim’s The Life and Time of Jesus the Messiah. Signals. Met
with Fr Bob briefly.
5:10 PM, 86.9.133.112, cable.virginm.net, Coatbridge, UK. (In the north.)
86.9.133.112 - - [16/Dec/2015:18:10:04 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200
27754 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
More chatter/ testimony (plagiarism), presumably.
Meanwhile, after Urban Ministry, the suspect comes to Starbucks, Sunset. 6:06 PM, as the
suspect accesses his hidden site, a DHS agent, it seems, comes in to sit nearby. Then, W calls.
Homeland Security has certainly instructed W to call the suspect because they already know
from the control center's simulation that the suspect is about to give out important evidences to
enable Homeland Security to continue fighting. It is because they have already known what the
suspect has wanted to say from the control center's simulation that they have sent in a
surveillance agent at just the right time to conduct surveillance on the suspect while they have
instructed the suspect's best friend to call him. (Both the intercept of the conversation and the
surveillance over the suspect will soon be submitted into the ICJ as evidences to continue
Homeland Security's fight against the Russians and the French.) The details of the conversation
are as follows (from 1:40:00 onwards): (1) The suspect repeats US' possible strategy: pursuing
all three avenues at the same time. But this means, the suspect notes, that he will be able to
accomplish all his own objectives at the same time: (a) getting out of the vandalism case; (b)
getting rid of his adversaries; (c) getting a small following for his theory; and (d) getting laid. (2)
He couldn't find a job. W then recounts how he has obtained his current job at the Assembly. (3)
“Fitting into KRN’s false profile solely because of the generality of the profile.” (4) TMU’s old
fashion profiling of the suspect (“Philip K Dick”). “American bureaucracy”.
Why would W, so busy, calls the suspect? His hesitation in the beginning of the conversation is
sign that he has been instructed to call and, using “Thank you” as a pretext, to wait for the
suspect to say the things which Homeland Security knows the suspect has wanted to say. “Three
Avenues” (status quo plus two backup plans) and “I can accomplish all four objectives at the
same time”. Then: “If EKT is doing what I thinks she is doing, then I’ll have a light in the
tunnel.” These two admissions are what Homeland Security is waiting for the suspect to make.
Their new argument: EKT is conspiring with the suspect to harm the women and Homeland
Security because her intervention has enabled the suspect to find opportunities among US
agendas to damn the women and Homeland Security and make himself a star at the same time.
Afterwards, the suspect goes to Astro Burger to attend Draw Anything LA meetup. Grace not
there. Drew Marion. Left, a little past 9 PM. Caught up with bus 282 just in time.
178
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Meanwhile, the Secret Society's op: 9:34 PM, 110.164.80.250, perspective.html, static.3bb.co.th,
Bangkok. Just another chatter/ testimony about how the suspect has plagiarized his theory on
linear perspective. Then, 9:52 PM:
24.10.109.161 - - [16/Dec/2015:22:52:51 -0700] "GET / HTTP/1.1" 200 2878 "-" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2
Safari/537.86.3"
24.10.109.161 - - [16/Dec/2015:22:52:52 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5)
AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3"
We have seen this person on 10 December, 7:19 AM. Here the visit doesn't even look like a real
visit because favicon.ico is not called up. S/he is then here again on 10:13 PM, about 20 minutes
later:
24.10.109.161 - - [16/Dec/2015:23:13:35 -0700] "GET / HTTP/1.1" 200 2878 "-" "Mozilla/5.0
(Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2
Safari/537.86.3"
24.10.109.161 - - [16/Dec/2015:23:13:35 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5)
AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3"
We thus have to conclude that this is a decoy. All the other visits between 6 PM and 12 AM are
to images.
Home, past midnight, the suspect suddenly has the desire to sign up VK to check if his site has
been talked about there. He then, 1:55 AM, discovers that SDW has signed up VK, August 2013.
It's Homeland Security who has programmed the suspect to do this. You shall see why. Past 2
AM, MST (blond). Insomnia. Couldn’t sleep until 4 AM.
Meanwhile the Secret Society's operation continues. 12:12 AM, access.hol.gr, Athens,
46.177.117.53 - - [17/Dec/2015:01:12:50 -0700] "GET /thermh2.html HTTP/1.1" 200 45320
"https://www.google.gr/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
46.177.117.53 - - [17/Dec/2015:01:12:56 -0700] "GET /thermh1.html HTTP/1.1" 200 24055
"http://www.lawrencechin2011.com/thermh2.html" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
179
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
This is either decoy or chatter/ testimony (plagiarism, misogynist rambling). Then, after a few
more visits to images, 2:39 AM, Sofia University St. Kliment Ohridski, Sofia, Bulgaria
62.44.98.22 - - [17/Dec/2015:03:39:02 -0700] "GET
/scientificenlightenment1/standardmodeldrell.gif HTTP/1.1" 200 9790 "https://www.google.bg"
"Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0"
Just more chatter about how the suspect has violated other people's intellectual property rights by
putting their images on his website without asking prior permission. The status of the chatterer as
a university student is supposed to enhance its credibility. We have usually skipped all the visits
to images which correspond to such type of “testimonies” because we wish to save space, but
this one should definitely be mentioned because it comes from another unusual place. Then, 2:51
AM, Noordwijkse School, Netherlands. This is an elementary school.
77.61.64.33 - - [17/Dec/2015:03:51:28 -0700] "GET /scientificenlightenment1/dividedline.jpg
HTTP/1.1" 200 35072 "http://www.bing.com/images/search?
q=plato+for+dummies&view=detailv2&&id=DC0478AF6ADA15B25529F3B6FAAD838F72A
BD066&selectedIndex=15&ccid=7Vxfdulq&simid=608049382897877898&thid=OIP.Med5c5f7
6e96a1628fe733cae348b4cdbo0&mode=overlay" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0;
rv:11.0) like Gecko"
The same testimony about the suspet's violation of other people's intellectual property rights.
Again, we note this one because it comes from such a unusual place. Then, 3:35 AM,
stu9d01.kent.ac.uk, University of Kent, Canterbury,
129.12.157.1 - - [17/Dec/2015:04:35:22 -0700] "GET /scientificenlightenment1/capra.html
HTTP/1.1" 200 11850 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.1; Win64; x64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
Another eye witness to the suspect's “plagiarism”. (False testimony.)
Note that the German Lady has canceled her meetup tonight. Homeland Security might have
shared with them the news that they have got themselves labeled “terrorist suspects conspiring
with enemy states” and the new plan which Homeland Security is devising to exonerate them.
The women are therefore very upset and busy at the same time, so that the German Lady has
decided to skip tonight’s meetup.
17 December (Thursday; Homeland Security’s new case)
Homeland Security shall continue to use the control center to control the suspect to fulfill their
plan. Their strategy: (1) controlling the suspect to fit their modified false profile of him; (2)
dissuade NULND from any good intention toward the suspect; and (3) framing the suspect for
conspiracy with the Russians, so that the Secret Society women and they themselves can be
made into “victims” of his conspiracy with the Russians and their allies. Homeland Security has
thus reopened the ICJ debate by this morning saying: New evidences found (i.e. the suspect’s
180
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
conversation with W last night), the previous judgment that the women have conspired with Iran
to harm the US should be reconsidered. Homeland Security is here to prove that the suspect has
conspired with the Russians and the French to harm the United States, Homeland Security, and
the Secret Society women. Homeland Security will create numerous identities (parallels,
semblances) between the women and the suspect in order to transfer (in the case of the Syrian
scandal) the women’s terrorist suspect status entirely onto the suspect and exonerate them.
Homeland Security will in fact add an additional disgusting characteristic to their false profile of
the suspect: not just imagining up the women's going after him using law enforcement, but also
imagining up scenarios about being persecuted every single day and worrying over nothing, and
then unjustly hating United States for being persecuted, not knowing that the perceived
persecution is all but in his mind.
Homeland Security immediately sets itself to work. 5:20 AM, 31.53.77.15, “Namely, there is a
story behind Khalezov’s story”, btcentralplus.com, Saxmundham, UK. Note that the place is very
close to Ipswich, about 25 miles away. The person is thus very likely related to LB Admin.
31.53.77.15 - - [17/Dec/2015:06:20:36 -0700] "GET /vol2appendix/vol2appendixd.pdf
%20namely,%20there%20is%20a%20story%20behind%20Khalezov'%20story HTTP/1.1" 404
1360 "-" "Mozilla/5.0 (Linux; Android 5.0.2; SM-A500FU Build/LRX22G)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.83 Mobile Safari/537.36"
Presumably, Homeland Security has instructed a member of the Secret Society to pretend to be
EKT’s messenger and leave a message on the suspect’s log, hoping that, this time, the suspect
will believe that it’s the Russians who have messaged him. If so, then conspiracy will be
established between the Russians and the suspect. However, the suspect will not be so dumb.
6:46 AM, 66.87.78.156, pools.spcsdns.net, Chicago, Illinois.
66.87.78.156 - - [17/Dec/2015:07:46:57 -0700] "GET /blogs/2014/01/13/kiersten-meetsangelica-february-8-march-1-2013-the-beginning-of-a-beautiful-woman-to-woman-relationship/
HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0
(Linux; Android 5.0.2; HTCONE Build/LRX22G) AppleWebKit/537.36 (KHTML, like Gecko)
Version/4.0 Chrome/33.0.0.0 Mobile Safari/537.36"
It seems that another volunteer has joined in on the “hunt” and is here checking out the situation
(“how the suspect has imagined up ANG teaming up with KRN and the German Lady to go after
him”). Although the blog post has been removed, the chatter can still be testimony for the
detectives and intercepted into the ICJ as evidence.
Then, 9:01 AM, 24.7.39.129, capra7777.html, direct visit, Comcast, Redwood City.
181
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
24.7.39.129 - - [17/Dec/2015:10:01:41 -0700] "GET /scientificenlightenment1/capra7777.html
HTTP/1.1" 200 21637 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1)
AppleWebKit/601.2.7 (KHTML, like Gecko)"
Again, it is the “Redwood City decoy”.
9:57 AM, somebody is looking at quantummechanics.htm on Bing Preview. Just more chatter
(plagiarism).
11:13 AM, 86.150.187.204, schuld.html, Google UK, btcentralplus.com, Malvern, UK. More
chatter (plagiarism).
11:37 AM, 68.110.174.121, orphism.html, Google, ph.ph.cox.net, Chandler, Arizona. More
chatter (plagiarism).
12:11 PM, sci/appendix.html, Google preview. More chatter (plagiarism).
1:03 PM, 80.109.103.145, Eva, Google AT, univie.teleweb.at, Vienna, Austria. Again, does this
mean that the Secret Society women are trying to recruit Eva?
Meanwhile, the suspect. He wakes up almost 11:30 AM. Caught the bus for 12 PM. Arrived in
downtown, headed toward the storage facility first. DVD put in: 499. 2 PM. On Metro. There is a
new announcement about “sexual harassment on Metro”. The suspect finds it strange. While the
suspect is walking to the public library, an ugly Hispanic male walks past him wearing earphones
and carrying nothing. Homeland Security surveillance agent? The suspect calls him “ugly”. This
is most likely a Homeland Security trap. From reading the mind-reading computer those
Homeland Security thugs know that, if they send one of their ugly agents to the suspect, he will
call him “ugly”, meaning “Hispanics are ugly”. Homeland Security has just intercepted another
piece of evidence showing the suspect to be a bigot and racist against Hispanics. Thus,
confirmation of their false profile of the suspect.
Back to the Secret Society. 3:42 PM, 174.16.65.190, hlm.qwest.net, Denver, Colorado.
174.16.65.190 - - [17/Dec/2015:16:42:05 -0700] "GET /timeline9/timeline9d.pdf HTTP/1.1" 404
1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (iPhone; CPU
iPhone OS 9_2 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0
Mobile/13C75 Safari/601.1"
Another volunteer has joined in on the “hunt”. The women (pretend to) complain to him (in order
to be intercepted into the ICJ as evidence): “He is insane. He believes that we were arrested, that
we are all involved in some government conspiracy against him”, etc. More evidence in the ICJ
that the women have been severely victimized by the suspect because of the delusional state of
his mind.
182
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
3:49 PM, 76.98.39.218, Comcast, Glenside, Pennsylvania.
76.98.39.218 - - [17/Dec/2015:16:49:02 -0700] "GET /blogs/2014/04/14/last-word-on-my-pasttwo-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1360
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Windows NT 10.0;
Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2595.0 Safari/537.36"
Another netizen has joined in to discover that there is this insane paranoid schizophrenic who is
slandering the poor women in online forums. Now it's SDW's turn to complain to the volunteer
how she is frightened by this paranoid schizophrenic who is obsessed with her and then develops
this delusion that she is going after him with ANG, KRN, and the German Lady.
Meanwhile, the suspect is in the public library checking his log. He has discovered the message
about Khalezov. He reads a little. (Letters of de Gaulle, etc.) Almost 5 PM. Left. Starbucks. He
writes down the following on his diary:
Since bed time last night, began contemplating this scenario:
EKT came in early November: (1) to monopolize my theory of thermodynamic
interpretation of history and “New Feminism” (not my writing on how to improve
Russia’s soft-power) under victim confidentiality on the basis of Homeland
Security’s false profile of me; (2) to make bad examples of the Secret Society
women and broadcast this in Russia in order to obtain a concrete example to
illustrate the validity of New Feminism and the thermodynamic interpretation of
history.
TMU’s profile contradicts DHS’ profile, but DHS’ is legally more authoritative. Paris
attacks on 13 November have allowed the French and the Russians to obtain my
essay on Marine Le Pen. DHS, US, the French, and the Russians all went to court.
US denies the validity of Homeland Security’s profile in order to deny EKT her
request to monopolize my theory and to make bad examples of the women.
Homeland Security wants to play both ways, affirming the validity of its profile
while denying EKT her right to monopolize, etc., by arguing that I’m conspiring with
the Russians and the French. EKT affirms the validity of Homeland Security’s
profile but denies conspiracy with me. The debate is on whether I fit Homeland
Security’s profile.
EKT and Homeland Security are losing. I don’t fit the profile and don’t seem to
conspire with EKT.
Past midnight, December 15, US deceives the Secret Society women into copying
my thermodynamic interpretation of history and giving it to EKT to monopolize.
183
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Afternoon, December 15, conversation with W. US establishes that the women are
helping EKT to steal my theory.
11:43 AM, December 16, US deceives the Secret Society women into visiting my
document on Russia’s soft-power through a proxy in Iran in order to enable Iran to
intercept it. US further establishes that the women are helping EKT to steal my
theory.
6 PM, conversation with W. US now establishes that the women and Homeland
Security are conspiring with EKT to help her monopolize my theory and their bad
examples. The court rules that US now shall have the right to monopolize my theory
and the bad examples.
EKT’s team walk out in anger. Homeland Security’s profile is legally valid, which
allows EKT to monopolize my theory and the bad examples. But the US not only
tries to disprove this profile, but also deprives Russia of the right to use the theory
and advertise the bad examples through a sting operation on the women and by
causing me to understand the situation. Since both sides’ actions are legal, the
Russians will plagiarize me and broadcast the bad examples in defiance of court’s
order.
The US will argue that causing me to understand the situation does not constitute
“conspiracy” because its citizens have a duty to defend their government. (This
episode will be taken backward in time to eliminate the episode of my conspiracy
with the CIA to harm France in the previous ICJ trial. Thus the CIA is no longer covictim with the Russians in my conspiracy with France.)
17 December, US deceives the women into framing me for conspiring with the
Russians (5:20 AM visit) and then into making false reports about me (Prison
Planet). They must have reported to some other division in Homeland Security
saying I do espionage for the Russians. After conspiring with the Russians, they will
blame me for doing so. And then make false reports to use the legal system to
dispose of me.
The US is also using this episode to erase the previous ICJ trial altogether. Not clear
whether this has become a “crime” in another secret ICJ where the previous ICJ trial
is now reinstalled.
The suspect finishes writing by 5:31 PM. As you can see, while the suspect has originally come
to a vague comprehension of what is going on, he is now building up, on its basis, a completely
incorrect scenario. What is important about this confession is that he has prevented Homeland
184
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Security from framing him for conspiracy with the Russians, since he has noted that he does not
believe the “Khazlezov” message came from the Russians. Homeland Security shall try again.
Then, the suspect attends Chrysalis’ Christmas party. Ariane there. Around 8 PM, the suspect
rides the bus to Westwood. He has decided not to go home tonight because of Secret Society’s
and Homeland Security’s plan to exterminate him.
Like on many nights, there will be no volunteers' visits to the suspect's webpages. Only to
images. But we know that SDW is at home. 8:11 PM, SDW posts a random message on her
Facebook Group. This is her first time posting since 31 October. She is following the instruction
given by Homeland Security.
While the suspect is in Starbucks, Westwood, and there comes in an eastern European woman. It
might be Russia’s test, the suspect thinks. In reality, Homeland Security is just trying again to
frame the suspect. Homeland Security is wishing that the suspect will talk to the woman
believing that she's a Russian agent. However, the suspect has made no move at all.
Meanwhile, 11:23 PM, SDW has posted a second message on her Facebook Group, hoping that
the suspect will look it. From now on, every time when SDW posts on her Facebook Group, the
suspect will get an immediate notification. And he did look at the two new messages as soon as
he was notified.
SDW is instructed to post on her Facebook Group hoping that the suspect would believe, and
declare on AVFM, that this is a law enforcement sting operation to enable the women to establish
their stalking claim against him. SDW would tell the detectives: “He is so paranoid that he
believes we are secretly filing stalking claims against him behind his back. It’s all because he has
misunderstood the meaning of my online postings. And, not knowing that he is only imagining
up the whole thing, he would stalk us on cyberspace in response.” However, the suspect has not
yet responded on AVFM.
1:41 AM, XO Communications, El Paso City Limits, Texas,
216.4.56.143 - - [18/Dec/2015:02:41:09 -0700] "GET /badvisits/5712-43.png HTTP/1.1" 200
108985 "http://www.google.com/blank.html" "Mozilla/5.0 (Linux; U; Android 4.1.2; en-us;
ZTE-Z995 Build/JZO54K) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile
Safari/534.30"
This IP address is listed as a proxy or network sharing service. Another testimony that the
suspect is engaged in “hacking websites”.
3:31 AM, China Education and Research Network Center, Changchun,
185
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
59.72.84.70 - - [18/Dec/2015:04:31:43 -0700] "GET /scientificenlightenment1/glycolysis.jpg
HTTP/1.1" 200 190436 "http://cn.bing.com/images/search?
q=glycolysis&view=detailv2&&id=D36571A6B6236A2F97489B387B00811F3FB862D3&selec
tedIndex=78&ccid=zOaCN8ov&simid=608047286947545437&thid=OIP.Mcce68237ca2fe6e6f0
ad2a4d766c966do0&mode=overlay" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
This is more chatter that the suspect has plagiarized. The chatter made by an academic to
enhance its credibility.
4:11 AM, Jawaharlal Nehru University, New Delhi, India,
202.41.10.3 - - [18/Dec/2015:05:11:52 -0700] "GET
/scientificenlightenment1/standardmodeldrell.gif HTTP/1.1" 200 9790
"https://www.google.co.in/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
Another very credible testimony about the suspect's plagiarism by an academic. Unless it's a
decoy.
18 December (Friday)
Today Obama will sign a new law, as noted: people who enjoy visa-free travel to the United
States may be barred from such privilege if they have visited Iran before.9 Iran is convicted of
conspiring with terrorist suspects in violation of UN Resolution 1373 because of the Secret
Society's stunt on Wednesday.
The suspect has stayed in Westwood Village all night, and wakes up on the street corner by 6
AM. Starbucks. Posted “Notice” on “Far Right”. Then uploaded it onto his Gmail account for
backup. This is presumably Russia’s first piece of evidence showing that the suspect's primary
concern is with the reform of the United States rather than with conspiring with Russia to harm
the United States, and that, in fact, the suspect is caught in a conspiracy with Homeland Security
to entrap Russia.
The Secret Society's operation continues: 8:44 AM, 208.105.135.18, layereduniverse.html,
Google, nys.biz.rr.com, Schenectady, New York. More chatter (plagiarism).
8:58 AM, 177.19.224.224, static.gvt.net.br, Curitiba, Brazil,
177.19.224.224 - - [18/Dec/2015:09:58:42 -0700] "GET /scientificenlightenment1/capra.html
HTTP/1.0" 200 11888 "https://www.google.com.br" "Mozilla/5.0 (X11; Ubuntu; Linux x86_
9 See Rick Gladstone, “Tensions with Iran rise over US visa measure”, The New York Times, 24 December 2015.
186
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
64; rv:43.0) Gecko/20100101 Firefox/43.0"
9 AM, he comes to the Table of Contents. 9:01 AM, he comes to capra222.html. 9:02 AM, he
comes to capra.html again from Google. 9:03 AM, he comes to yixuai455.html. At the same
time, capra7777.html. 9:04 AM, capra1.html. 9:07 AM, he comes to capra.html again from
Google.
It would appear that he is not doing decoy, but is really here to offer testimony about the
suspect's plagiarism. His behavior is more sign that the detectives are getting skeptical about the
women's and volunteers' testimonies and evidences.
9:13 AM, Google proxy: perspective.html. More testimony about how the suspect has
plagiarized his theory on linear perspective.
By 10 AM, the suspect has revised the scenario which he has constructed last night.
10:23 AM, SDW posts on her Facebook Group again. She is clearly getting impatient over the
fact that the suspect has not yet reacted.
There would be Fewer visits afterward to the suspect's website. From now on the Secret Society
women would be very sparing about sending volunteers to the suspect's website. They have
heard the intercept of the suspect's conversation with W on Tuesday, and are terribly distraught
over the fact that they have helped drive up the suspect's website's ranking on Google and other
search engines. They vow to not make the same mistakes again. They will from now on visit the
suspect's websites as infrequently as possible, just the minimum to achieve the purpose at hand.
Meanwhile, the suspect continues working inside Starbucks. A pregnant AWF is doing interview
nearby. Another UCLA student is reading a book by a Dutch author next to him, and the suspect
wonders whether that's a “secret message” from the Invisible Hand. (That Mr Wilders would like
his ideas very much.) Past 11 AM, he goes to eat, then naps outside UCLA.
The Secret Society continues. 1:19 PM, 109.255.25.78, Dublin.
109.255.25.78 - - [18/Dec/2015:14:19:28 -0700] "GET /scientificenlightenment1/schuld.html
HTTP/1.1" 200 25700 "https://www.google.ie/" "Mozilla/5.0 (iPad; CPU OS 7_0_4 like Mac OS
X) AppleWebKit/537.51.1 (KHTML, like Gecko) Version/7.0 Mobile/11B554a Safari/9537.53"
Probably more chatter about the suspect's plagiarism. This IP address shows up on a Debian IRC
chat log. Is this person related to LB Admin?
187
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Almost 3 PM, the suspect has come back to Starbucks. The pregnant AWF is still doing
interview. The homeless man is keeping his cat inside his luggage. The suspect says something to
him, wanting to make sure that the cat is not being tortured. As he checks his log, he notices that
whatismyipaddress.com is disabled. It no longer provides information on the geographical
locations of IP addresses. The suspect is terribly alarmed. He assumes it's because the Secret
Society women have persuaded detectives to order the website owner to refrain from providing
information on IP addresses on the ground that the suspect's identification of visitors to his
website is considered “cyberstalking”. The suspect is terribly enraged: he has so little legal status
that, even when people knock on his door, he is considered stalking the visitors if he wants to
find out who it is that is knocking! Just then, 3:55 PM, the eastern European woman who was
here last night comes over to the suspect to ask him a simple question and then immediately
leaves. Obviously, Homeland Security has decided that, if the suspect refuses to believe that the
Russians could be communicating with him, they will stuff the idea down his throat. Homeland
Security will present the surveillance of this simple encounter to the ICJ as “evidence” that the
suspect believes that this woman is a Russian agent and intends to conspire with the Russians.
4:13 PM, 24.7.39.129: it's the “Redwood City decoy”.
24.7.39.129 - - [18/Dec/2015:17:13:39 -0700] "GET /scientificenlightenment1/zeno.gif
HTTP/1.1" 200 2416 "http://www.lawrencechin2011.com/scientificenlightenment1/capra77
77.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/601.2.7 (KHTML,
like Gecko)"
188
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
By 5:39 PM, the suspect has at last posted on AVFM. He writes that the women have established
their 10th stalking claim against him. This is what SDW has been waiting for. They have
confirmed for the detectives that the suspect is prone to imagine up the women filing stalking
claims against him behind his back just because they put up a new posting and he sees it.
The suspect is now experiencing severe anger. He doesn't yet know that he has fallen into a trap.
Namely, there is no law enforcement order to whatismyipaddress.com instructing the website to
refrain from supplying information on the geographical locations of IP addresses. Homeland
Security must have known from the control center's simulation that, if they remotely control the
website to malfunction, the suspect will misinterpret it as an action by law enforcement under the
women's request and go into a rage over the blatant unfairness in American criminal justice
system. He is being mind-controlled to experience a most severe episode of anti-American
hatred. He goes on the street, throwing trash around. Called Angela, asked to stay with her.
Angela agrees to meet him on Normandie and Wilshire. Then, still in Westwood Village, the
suspect calls a woman “Fuck you American”. She ignores him. Past Wilshire, the suspect calls a
second woman, “Fuck you American”. She is slightly startled, but walks away. The suspect is not
sure whether she would go report him, since this is obviously a Homeland Security op
(controlling him to shout anti-American slogans and then showing the surveillance to
somebody). The suspect eats noodle at 711. Then, he takes the bus to go to Normandie and
Wilshire. He would stay in the Coffee Bean there until 8:30 PM.
In the preceding episode Homeland Security has accomplished their objective three-fold: (1) to
confirm their false profile of the suspect that he is constantly imagining up persecution by the US
system not knowing that it’s all his own paranoia imagination and then unjustly blaming America
for it. This, you should note, it's actually the most essential characteristic of SDW; Homeland
Security is mind-controlling the suspect to acquire the women's bad characteristics, as always;
(2) to show the intercept of the suspect's anti-American angry outburst in order to dissuade
NULND from her plan to make use of the suspect; (3) to use the suspect's anti-American angry
outburst as circumstantial evidence for the claim that he is prone to conspire with America's
enemy to harm America. This piece of evidence shall supplement the evidence showing him
interacting with the Russian woman supposedly believing her to be a Russian agent.
Meanwhile, the Secret Society continues its operation online. 8:19 PM, Kuwait City,
188.71.192.156 - - [18/Dec/2015:21:19:23 -0700] "GET /badvisits/5712-43.png HTTP/1.1" 200
108985 "https://www.google.fr/" "Mozilla/5.0 (iPhone; CPU iPhone OS 8_1_1 like Mac OS X)
AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12B435 Safari/600.1.4"
More false testimony about how the suspect is a computer hacker?
189
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
By 9 PM, the suspect has met up with Angela, who drives the suspect to one of her houses,
where he would spend the night there. He would be falling asleep by 10 PM, watching a lecture
by Barbara Rosenkranz. He could barely concentrate, however.
9:05 PM, strange massive indexing from France, crawl06.lp.007ac9.net, OVH SAS, Champignysur-Mame (next to Paris). Note that Melissa Data gives: Roubaix, Nord-Pas-de-Calais. (Most
give the former. The last time OVH indexing has occurred is 5 December :
37.59.55.128 - - [18/Dec/2015:22:05:31 -0700] "GET / HTTP/1.1" 206 6282 "-" "Mozilla/5.0
(Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.17 (KHTML, like Gecko)
Chrome/10.0.649.0 Safari/534.17"
….
37.59.55.128 - - [18/Dec/2015:22:05:33 -0700] "GET /acad.html HTTP/1.1" 206 10976 "-"
"Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.17 (KHTML, like
Gecko) Chrome/10.0.649.0 Safari/534.17"
….
It's of course quite possible that, now that more and more evidences show the suspect not
intending to conspire with the Russians and FN, FN is free to examine the content of the
suspect's website in its entirety. This OVH robot indexing may be especially devised to enable
Marine and Marion to examine the suspect's website offline, just as the Homeland Security robot
indexing has once done for the Secret Society women.
9:32 PM, strange massive indexing from Kiev, Ukraine:
178.94.172.184 - - [18/Dec/2015:22:32:19 -0700] "GET / HTTP/1.1" 200 2929 "-" "Mozilla/5.0
(Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/30.0.1599.101 Safari/537.36"
….
It's not clear whether this is related, or in response, to the previous OVH indexing for FN's sake.
10:41 PM, BSNL, Gulbarga, India,
59.88.201.159 - - [18/Dec/2015:23:41:20 -0700] "GET
/scientificenlightenment1/bohrelementtable.jpg HTTP/1.1" 200 83572
"https://www.google.co.in" "Mozilla/5.0 (Windows NT 5.1; rv:42.0) Gecko/20100101
Firefox/42.0"
More chatter about the suspect's plagiarism? 11:31 PM, abo.wanadoo.fr, Geveze, France,
190
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
90.32.124.99 - - [19/Dec/2015:00:31:03 -0700] "GET /scientificenlightenment1/nostratic2.jpg
HTTP/1.1" 200 42640 "http://www.junglekey.in/search.php?
query=Austric+languages&type=image&lang=en&region=in&img=1&adv=1" "Mozilla/5.0
(Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
It is probably a proxy. This is what the search looks like (17/02/16):
The search engine has called up the image from the web server to display among the search
results. Another testimony about the suspect's plagiarism.
1:44 AM, the Secret Society is accessing older portions of the Secret Facebook Group.
66.220.146.22 - - [19/Dec/2015:02:44:57 -0700] "GET /scientificenlightenment1/athd2.jpg
HTTP/1.1" 200 12120 "-" "facebookexternalhit/1.1
(+http://www.facebook.com/externalhit_uatext.php)"
19 December (Saturday)
First, the Secret Society's operation. 4:49 AM, 198.55.96.81, quadranet.com, proxy,
191
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
198.55.96.81 - - [19/Dec/2015:05:49:47 -0700] "GET /1/epilogue225.html HTTP/1.1" 200
183069 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.36"
Note that ath2d.jpg is not called up. Is this a decoy? We should however consider the possibility
that Homeland Security would try to make this superb criticism of “victim feminism” also into
part of the suspect's “terrorist conspiracy” against American women, and so it might have
something to do with that. Homeland Security has by now established itself as the best friend of
the most radical of American feminists. They now want to obtain an ICJ judgment promoting
Radical Feminism and victim feminism: women are always the victims of male aggression, no
matter what they do and what talents they may or may not have. Then, 7:39 AM, 172.56.5.51, TMobile, Ft Lauderdale, Florida.10
172.56.5.51 - - [19/Dec/2015:08:39:43 -0700] "GET /blogs/2013/04/ HTTP/1.1" 404 1360
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 5.1.1;
LGMS345 Build/LMY47V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.111
Mobile Safari/537.36"
Another volunteer – who might be related to the Pompano Beach person from before – has
offered testimony about how the suspect is suffering paranoia delusion about the Secret Society
women going after him and spilling his delusion online to embarrass them. More evidence in
support of Homeland Security's new case in the ICJ.
Meanwhile, the suspect wakes up early in Angela’s home and comes to Starbucks, Normandie.
9:41 AM, 41.222.237.54, Mundo Startel SA, Cocole, Angloa.
41.222.237.54 - - [19/Dec/2015:10:41:15 -0700] "GET
/scientificenlightenment1/allegoryofcave.html HTTP/1.1" 200 29134 "https://www.google.com/"
"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/47.0.2526.106 Safari/537.36"
It's not clear whether the person really is in Angola or whether he is simply using a proxy.
Presumably another false testimony about how the suspect has plagiarized. He would be back
again tonight around midnight.
Meanwhile, the suspect is working hard in Starbucks. Checked log. What looks like a Homeland
Security surveillance agent sitting in the distance. The surveillance is most likely called up by the
detectives. Outside, the security guard says to the suspect: “Why are you acting to be crazy? Are
you on crack?” She stares at the suspect angrily. The suspect develops the impression that the
10 As is traced on Melissa Data, not on What is My IP Address, which didn't provide the geographical location. 192
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
security guard has been alerted about him (the “anti-American, misogynist terrorist”), but it's not
clear whether his impression is correct. Then, what looks like another Homeland Security
surveillance agent comes sitting down next to him. Told him the seat is reserved. No, he won’t
leave. Told him: “Keep watching me, you are falling into my trap.” He makes no sound.
12:41 PM, the suspect modifies the post at AVFM (eliminating “God damns”) while under
surveillance.
1:09 PM, the suspect posts more on AVFM.
Unless, of course, I get arrested or hospitalized because the great and sympathetic
people on this forum decide to show grave concern for my mental well being after
seeing me spilling out my paranoia delusion on this forum and to report it to the
authority, like it has happened on the other forums.
And so I shall include this scenario as well among my paranoia delusions. Hopefully,
the great people here will not allow this to come true and prevent me from
discrediting myself.
Hopefully, we all still uphold the traditional definition of "paranoia delusion", i.e.
belief in something that is not true, right? Otherwise, what's the point in calling
people "insane", "paranoid," etc?
2:07 PM, the suspect, spurred on by the security guard's comment, posts more on AVFM.
Update:
Currently law enforcement is still investigating me, of course, but the investigation
might have changed my status from “being insane” to “pretending to be insane”, in
which case I'm still eligible for arrest for “intentionally slandering the women online
motivated by misogynist hatred” and other minor crimes.
When the great and sympathetic people on this forum and elsewhere report me to
authority out of grave concern for my mental well being, this is presumably the new
response.
2:33 PM, Flightless Bird posts a reply on AVFM that is highly critical of the suspect:
No one's reporting you dude, and to imply the forum is uncaring is disingenuous.
You came here asking for advice and you've had a heap of it, yet you've ignored it
all. Perhaps next time tell us exactly what you want us to say so we can copy and
paste it.
193
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Everyone is sympathetic to your plight, that much is obvious from the replies, but
peoples sympathy tends to wear off when you show no willingness to do something
to help yourself.
Good luck to you.
2:52 PM, Berne also posts a reply critical of the suspect.
As your posting has progressed what I gather is that you love attention and you love
to play the victim.
You by any chance also go by the name of dmschlom?
Berne is clearly describing the suspect as if he were describing the Secret Society women,
especially KRN. Clearly, both of them are making these replies under Homeland Security's
instruction. KRN, as you know, has been projecting all her bad characteristics onto the suspect –
including her tendency to project herself onto her scapegoat – whenever she talks to law
enforcement about the suspect. She must have been telling the detectives that, when the suspect
describes the Secret Society women, especially their yearning to become his victims, he is just
describing himself, especially his own yearning to become the Secret Society women's victims.
Whenever KRN analyzes the suspect to law enforcement detectives, she is just describing
herself, and so she would also describe the suspect as describing himself when he describes the
Secret Society women. In other words, not only has KRN projected her desire to become a
victim of male sexual aggression onto the suspect, but also her very projection onto the suspect
onto the suspect! Propagande en miroir practiced to the utmost perfection! Those Homeland
Security thugs would then want this false portrayal of the suspect (as KRN) to enter into the ICJ
as evidence in support of their new case, while the women would want law enforcement
detectives to believe them on this. Homeland Security thus helps the women out by instructing
Berne to falsely accuse the suspect of “wanting to be a victim” so that KRN”s false portrayal of
the suspect (when she is really just describing herself), which is already part of the evidentiary
record in the ICJ, may be further confirmed over there by a third party. Meanwhile, seeing the
posting, the detectives may also be further convinced of the truthfulness of the lies with which
KRN has been feeding them about the suspect. Finally, the suspect of course has nothing to do
with this “dmschlom”. This “dmschlom” appears to be a frivolous character, as seen on his
Wordpress blog and Twitter. Homeland Security has probably instructed Berne to ask this
question in order for more evidences to enter into the ICJ showing the suspect to be a frivolous
character habitually impersonating others on the Internet while seeking attention and wanting to
be a victim (i.e. just like KRN and just as KRN has described the suspect). Law enforcement
detectives presumably wouldn't be fooled to believe that the suspect has created a false profile
“dmschlom” since they are supposedly monitoring the suspect's Internet connections.
194
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
6:09 PM, cosmicdance1.jpg, cosmicdance2.jpg, alfa-img.com/show/antiprotons-diagram.html,
Facebook.
There are very few volunteer actions from 12 PM until 6:21 PM, only four visits to images. Are
the Secret Society women conferring with the detectives over the incidents since last night?
Meanwhile, the suspect. He calls up Angela and leaves a message with W (“He might be arrested
soon”). The suspect then decides to go home first to get his things. Arrived home, past 5 PM. His
new passport has arrived. MST (Japanese, Teen Beth). Did Homeland Security also claim he is a
pedophile? The suspect then posts his “Far Right: Preliminary Version” on his website. He has
finally finished the main text of the essay. The text is basically the same as the final version you
see today but minus the footnotes. The suspect however notices that the PDF printout of the
essay is damaged (“gooutputstream”). He assumes it’s Homeland Security: to damage the file in
order to suppress it as evidence in the ICJ or to frame him for conspiracy with the Russians. Left
home, 6:30 PM. There are two Hispanics by the bus stop. The suspect's thought about all the
injustice he has suffered enables Homeland Security to program him to go into a rage all of a
sudden. He calls one of the Hispanic male as he walks away, “Fuck you Mexican.” The other
Hispanic male then walks away too. It appears that the suspect has fallen into another trap by
Homeland Security. Homeland Security has sent in one of their ugly Hispanic males on
skateboard to the bus stop to serve as “bait”. They then let KRN be the psychic and psychologist.
After Homeland Security has communicated to her the control center's simulation as to where the
suspect will be and what they are planning to control the suspect to do, she tells the detectives
where he will be, and predicts that the suspect will shout anti-Hispanic racist comments. The
195
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
detectives have the surveillance agent ready at the bus stop (the Hispanic male who has walked
away). Then Homeland Security remotely controls the suspect to shout anti-Hispanic racist
comment at their bait (the ugly Hispanic male on skateboard). The detectives cannot then fail to
be impressed by KRN's psychic ability and expertise in the suspect's psychology, not knowing
that the whole thing is staged. (You should never underestimate the evil inherent in KRN's heart.
The woman is truly a psychopath.)
The suspect then leaves the bus stop too. He eats noodle at the Vietnamese pho shop. Bus stop
again. On bus 282, he leaves another message with W, “More crazy things to say in case the
previous three messages weren’t crazy enough.” W calls back two minutes later (from 1:31:00
onward). The details of the conversation are as follows: (1) The suspect confesses he is supposed
to be paranoid and develop insane scenarios out of the patterns of visits to his website: such is
the women's claim to law enforcement. He then recounts his latest scenario about what is going
on in the ICJ. (2) He confesses he has fallen into a Homeland Security trap by being provoked
and remotely controlled to shout anti-American slogans last night. Homeland Security is going to
show the intercept to somebody hight up in the government to persuade her to give up
monopolizing his website. (As you have seen, something like this is actually the case. However,
NULND, unlike the detectives, does know that the suspect is under remote control. But she
would also know that, with brain-chip technology, it's only possible to remotely control someone
to do the things s/he already has the potential to do.) The suspect then confesses that he is not
sure if the scenario he has developed is correct because nobody ever says anything to him. That's
itself ground for shouting anti-American slogans. (3) The suspect is not sure whether SDW was
instructed to post on her Facebook Group in the past two days because she is going to be his
“stalking victim” or just in order to scare him. The suspect concludes that, if he should ever get
arrested, it would be for vandalism again. (4) The suspect then confesses that people are not quite
clear whether he is really insane or just pretending to be insane to cover his ass. Then: It's not in
United States' interest to make a bad example of the Secret Society women. Right on the mark,
considering what NULND has just done. The suspect however suggests “diversification of
images” as a possible US strategy, but it's not necessary for the US to adopt such strategy. “These
women are so protected by the state, from local level to the middle level to the upper level...
Don't know if the fact that I got my new passport today means that I will have to run away...” (5)
The suspect then confesses that Homeland Security is incapable of understanding TMU's profile
of the suspect just as a dog can never understand why a human being does what s/he does. “It's
like trying to explain human life to a dog or quantum mechanics to a cat...” (1:52:00). “The
problem is that the brain inside the Homeland Security people's head is a new kind of brain, like
a dog's brain.... My brain is different from most people's, most people's brain is too simple, like a
dog's brain.... So when they see a traditional human being, they can't figure out whether he's
insane or not insane, they try to fit him into either of these two categories, but he never quite fits
either.” The suspect uses the example of “blue”, “red”, and “purple”, which is the same example
you will find in one of the footnotes in “Far right”. The suspect is basically portraying himself as
a genius over and above the rest of the American population who is portrayed as animals. While
this has always been the suspect's point of view, Homeland Security has of course known, from
196
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
the control center's simulation, that the suspect is about to make such a confession. They would
have informed KRN about this too. KRN would then analyze the suspect to the detectives: “This
is grandiosity thinking typical of Narcissistic Personality Disorder...” While KRN, who suffers
NPD with its grandiosity thinking, has again projected herself onto the suspect, she would have
also greatly impressed the detectives with her supposed expertise in human psychology. (6) The
suspect complains about vandalism being too vague a charge, how he didn't break the window at
the law library. (9) About masturbation. (10) “My original contribution is my old theory. In
International Relation, the ceiling is not very high, hence it's easier for people to come up with
similar ideas....” Policy level ideas, that is. This might be something which NULND has wanted
to hear. She might have been startled by the fact that, never having studied European far right
politics before, the suspect, within a few weeks, is able to come up with ideas superior to the
professional think tank products she has commissioned.
There appears to be another volunteer action in the meantime. 7:49 PM, 45.46.7.185,
schuld.html, Google, maine.res.rr.com, Orono, Maine. Chatter or testimony about the suspect's
“plagiarism”?
4 more visits to images until 10 PM.
10 PM, 98.127.129.150, bresnan.net, Helena, Montana.
98.127.129.150 - - [19/Dec/2015:23:00:04 -0700] "GET /blogs/2014/04/14/last-word-on-mypast-two-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1303
"http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; U; Android
2.3.5; en-us; DROID X2 Build/4.5.1A-DTN-200-18) AppleWebKit/533.1 (KHTML, like Gecko)
Version/4.0 Mobile Safari/533.1"
Here is another volunteer who has joined in on the hunt. When a new volunteer has joined the
chatter, like this one, SDW would probably be happily explaining to him or her how this
paranoid schizophrenic misogynist “terrorist”, who is prone to become obsessed with women,
stalk them, and vandalize their properties, has become obsessed with her and, due to his mental
illness, has developed this delusional belief that she has teamed with the other women he's
obsessed with to go after him filing false complaints about him to law enforcement behind his
back. How she is terrified, etc. The volunteer, then, not knowing that it is all a made-up story and
that SDW is herself quite insane, would be so indignant as to volunteer to offer testimony to the
detectives.
10:05 PM, himiko.jpg. Is this another testimony about how the suspect has copied other people's
painting?
12:04 AM, the Angola person from 9:41 AM this morning came again:
197
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
41.222.237.54 - - [20/Dec/2015:01:04:25 -0700] "GET
/scientificenlightenment1/merging_forces.gif HTTP/1.1" 200 6761 "https://www.google.com/"
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/45.0.2454.101 Safari/537.36"
Perhaps it is not a decoy. Perhaps he is here to refine his earlier false report to the detectives
about how the suspect is a plagiarizer. This is another sign that the detectives are in fact skeptical
of all the testimonies which have been turned in to them about the suspect and his website.
Meanwhile, the suepct is at Cafe Mak all night. He continues to revise his latest (mostly
erroneous) understanding of what is going on in the ICJ. 2:48 AM, he posts on AVFM once
again:
The point is this: I’m supposed to suffer paranoia schizophrenia and, thus, constantly
get severely paranoid after seeing strange patterns on my visitors’ log, and then, out
of severe fear, write down crazy things on Internet forums. This, so that I can get
myself into troubles soon. But realistically speaking, it’s probably just a restraining
order, either from the presiding judge in my current vandalism case, or from another
judge, forbidding me from ever writing about these women online, or ever having a
website, or ever using the Internet. (This last one is improbable, however.) Sorry, I
can’t be exactly sure what sort of troubles I’m supposed to get myself into, I just
know that it has to be something along this line. Presumably, this will be in
combination with further vandalism charges when I go to court the next time, which
might result in my being imprisoned and sent for mental evaluation, so that the
prohibition should come after I shall be released, perhaps a year later.
It's not clear what the detectives are going to make of the first line of the confession, since this is
precisely the Secret Society women's charge. Are the Secret Society women going to say: “He
knows he is crazy, he knows he suffers paranoia schizophrenia and is imagining things out of his
own head”?
3:59 AM, Telstra Internet, Cannon Hill, Queensland, Australia,
101.165.35.159 - - [20/Dec/2015:04:59:55 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200
491814 "https://www.google.com.au/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5)
AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/537.86.2"
The location indicates that this is another volunteer. More chatter about how the suspect has
copied other people's painting?
20 December (Sunday; domain change)
198
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
After Cafe Mak closes (3 AM), the suspect rides the bus to Westwood. Fearing arrest, he would
not even stay in Angela's home. He is at Starbucks there early in the morning. 4:45 AM, he has
discovered that a certain Elena Brobonea has added him to her Google circle. Is Homeland
Security still trying to manufacture evidence showing him having numerous contacts with
Russian secret agents?
5 AM, help chat with Blue Host. Due to all the visits to his website from Prison Planet, the
suspect thinks that he had better get rid of his old domain and move to his entire website to a new
domain. While he believes that this is best for safety's sake, it might actually be what Homeland
Security has wanted him to do for the sake of their new case in the ICJ. Could it be that
Homeland Security wants it (is programming him to do this) in order to produce new evidences
to erase the original evidences about the suspect’s website (which contradict Homeland
Security’s original false profile of the suspect as uneducated and a plagiarizer).
By 7 AM, the suspect has finished revising his scenario one more time. Here is the result:
EKT came in early November called on by the Secret Society. EKT responded to the
women’s cry – on the basis of Homeland Security’s false profile of me. She has
responded probably really because of the previous ICJ trial and the coming election
in France.
TMU’s profile contradicts DHS’ profile, and, if TMU’s profile is allowed to reign
supreme, the whole problem wouldn’t even arise, but DHS’ is legally more
authoritative. At first, the US resisted by claiming EKT was not allowed to respond
to the Secret Society’s invitation because I wanted to use this opportunity to show
her my new writing on Le Pen. The Russians however wanted to see what the
Americans were hiding. But no. Paris attacks on 13 November have however
changed things: both the French and the Russians were able to obtain my essay on
Marine Le Pen. The US and the Russians went to court (ICJ). US: EKT is using this
opportunity to read my writings. Conspiracy. The debate is on whether I have
conspired with EKT. Homeland Security is in charge of “collecting evidences” from
me.
So far correct. But then the suspect begins to err.
By the end of November, no evidences for conspiracy. EKT began developing new
plans because the Russians have concurred with me that they could make bad
examples of the Secret Society women and broadcast this in Russia in order to obtain
a concrete example to (1) expand their ideological support for the European far right
movement and (2) persuade their own liberal women (like Pussy Riots) not to be
attracted to Western feminist culture. To do this, Russia claimed it suspected that the
DHS profile was false and that the Secret Society cried false alarm. United States
199
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
resisted the Russian plan. The United States did not want its liberal image to be
damaged in Russia.
But the US could only do so by affirming the DHS profile is correct (that I am the
stalker and the women my victims). EKT then: Okay, then, I have the right to
monopolize this guy’s thermodynamic interpretation of history. If so, EKT can found
a New Feminism; although, without bad examples to back it up, she can still
establish it entirely as “Russian brand” without America being able to respond.
I began developing, independently, ideas on how Russia can expand its ideological
justification for supporting the European far right. December 7 to December 9, I
wrote “US response”. EKT: okay, I shall monopolize this as well. You are not
allowed to implement his ideas, neither defend yourself, nor destabilize the far right,
nor influence the far right. Now you can’t respond in any way to European far right
since he has considered all possibilities.
US changed plan. US shall deny DHS’ profile as correct and affirm TMU’s profile
instead. Evidences are now collected to show that I don’t fit DHS’ profile.
Past midnight, December 15, US deceives the Secret Society women into copying
my thermodynamic interpretation of history and giving it to EKT to monopolize.
Afternoon, December 15, conversation with W. (“EKT is here, wants to make a bad
example of the women.”) US establishes that I wasn’t conspiring with EKT and that
the women were helping EKT to steal my theory.
11:43 AM, December 16, the US deceives the Secret Society women into visiting my
document on Russia’s soft-power through a proxy in Iran in order to enable Iran to
intercept it. The US now returned EKT’s favor: Okay, these women are helping you
to monopolize his writings. Now, by court order, you are not allowed to implement
his idea about how to reform your country.
Everything is wrong except this last paragraph.
The Russian soft-power document is especially damaging to Russia, since Russia is
now forbidden by court order to implement my ideas to reform their own liberals.
Unfair, since Russia can come up with similar ideas on its own; it has merely been
unable to implement them because their people are so underdeveloped. Unfair,
because, although the US can’t find me conspiring with EKT, it can easily persuade
SDW to conspire with EKT. Unfair, because the US is trying to cause me to
understand the situation. But, then, the US did that in order to demonstrate how I
came to a comprehension of the situation. Thus, I wasn’t conspiring with anybody.
200
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
As you have seen, it's in fact the Russians who are trying to demonstrate how the suspect
has come to a comprehension of the situation.
EKT’s team walks out in anger. EKT is unlikely to obey court order because it’s
unfair – it’s all Homeland Security’s fault, and so US fault, in any case – and because
reforming her country is more important than obeying court order. She’ll implement
all my ideas whether the Russians have developed the ideas independently or
whether they have learned them from me.
EKT’s determination will result in: (1) the US being forced to respond by making a
bad example of the Secret Society women – this is where EKT’s victory lies; at least
she can have a bad example to illustrate her point, although at the cost of looking bad
for disobeying court order; (2) the beginning breakup of the international legal
system.
There is in fact no plan, on both the US side and the Russian side, to make a bad example
of the Secret Society women. The suspect is overly optimistic to his own detriment.
6 PM, conversation with W. It may be that US wants to erase the previous ICJ trial,
or prevent the Russians from getting rid of the “American co-victim” part. The US,
per the requirement embedded in the previous ICJ trial, is only allowed to do so if
it’s good for the world. The US is thus forced to implement my idea about the
diversification of its image, since its liberal image is bad for the world and my New
Liberal is good for the world. Homeland Security, not understanding the reason for
US decision, decides to obstruct it. This conversation is their evidence that I have
orchestrated the whole thing – pretending to be crazy to deceive them, and to cause
EKT to come to the women’s aid – so that they can label me the terrorist mastermind
in the ICJ record. Is the US planning to bust Homeland Security?
The only thing that is correct here is the fact that Homeland Security has started another
round of ICJ trial.
Homeland Security has by now broken into the control center and is controlling me
to fulfill their plan. Homeland Security is determined to defend their false profile of
me and to protect the women from being made into a bad example. They will argue
that they are doing good for US by defending the status quo. Their strategy: (1)
controlling me to fit their false profile of me and using faulty surveillance to
fraudulently create evidences showing my conformity to that profile; (2) framing me
for conspiracy with the Russians, so that the women can be made into “victims” of
my conspiracy with EKT. Homeland Security has thus reopened the ICJ debate by 17
201
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
December saying: New evidences found, previous judgment that the women have
conspired with the Russians should be reconsidered.
This part is more or less correct.
Homeland Security begins its operation. 17 December, past midnight, Homeland
Security controls me to sign up VK and search for SDW’s profile. 5:20 AM,
Homeland Security instructs a member of the Secret Society to pretend to be EKT’s
messenger and leave a message on my visitors’ log, framing me for conspiracy with
EKT. Homeland Security then tells the women that they will help them get me
labeled legally their “stalker” and suppress my right to use the Internet, maybe even
help them get me arrested, so that, between 6:30 AM and 7 AM, and between 3:30
PM and 4 PM, the Secret Society women make false reports to law enforcement
(Prison Planet). Homeland Security instructs law enforcement to establish me as
cyberstalking SDW (VK). Past 8 PM, and past 11:30 PM, Homeland Security
instructs SDW to post on her Facebook Group so that I can see them. Cyberstalking
established. SDW is euphoric. Homeland Security has so far established me in ICJ
records as: espionage for the Russians, cyberstalking women, pretending to be crazy
to hurt United States (DHS) and benefit myself. Homeland Security’s purpose is to
maintain their false profile of me as an insane, violent, and anti-American
cyberstalker while denying anti-American foreign dignitaries from having the right
to file stalking claim against me at the same time, and then to dispose of me so that I
won’t ever do things to contradict their false profile of me.
The only good part about the suspect's confession here is that it will have pretty much
prevented Homeland Security from ever establishing conspiracy between him and the
Russians. He is, given his awareness of what Homeland Security is trying to do, unlikely to
ever believe that any Russian secret agent will come to make contact with him. The
Russians will point this out in the ICJ.
18 December, Homeland Security plan’s continues. Yesterday and today, more false
reporting to law enforcement about my plagiarizing. Past 11 AM, SDW posts more
on her Facebook Group. More evidence for my cyberstalking. Past 5 PM, severe
anti-American hatred. Shouted anti-American profanity on the street. This is
evidence in the ICJ (my anti-American hatred is evidence for my conspiracy with the
Russians), and maybe even to persuade US officials to give up their plan to make bad
examples of the women and create a new liberal.
19 December, with W past 7 PM. About this revised scenario. Evidence that I label
myself insane in order to cover myself.
202
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Homeland Security is now planning, at worst, for my imprisonment for further
vandalism and paranoia schizophrenia (or pretending to be insane), and, at the very
least, for my permanent excommunication from the Internet. This is in the real world.
Meanwhile, in the ICJ records, it will be established about me: community terrorism,
espionage for, and conspiracy with, foreign powers, cyberstalking, and computerhacking. The profile, established through an ICJ judgment and which Homeland
Security will pass around the world, will portray me additionally as a plagiarizer,
misogynist, and racist (white supremacist).
The totality of Homeland Security’s profile of me, justified through an ICJ judgment
and known only to diplomatic services around the world and not to the general
public, is thus: misogynist, white supremacist, plagiarizer, computer-hacker, stalker,
cyberstalker, anti-American terrorist, spy for enemy states, vandalizer, violent,
delusional, extremely clever at labeling himself insane in order to cover his paranoia
schizophrenia, sexually perverted, extremely malicious and pathologically deceitful
(anti-social). Most importantly, many of his writings are not his works, but given to
him by the Russians so that he can pretend to be academic. Meanwhile, those women
who have intended to work with Russia to harm the United States will be established,
through an ICJ judgment, as innocent victims of the conspiratorial malice between
the Russians and the suspect and of the sexist American system. Homeland Security
is thus trying to use the ICJ system to justify the opposite of reality as reality.
Now, back to the Secret Society's operation. 4:52 AM, 31.24.11.123, Iway AG,
humandispersal.html, Google CH, Bern, Switzerland. More testimony/ chatter (plagiarism).
5:39 AM, massive indexing, “spbot”, Digital Ocean, New York.
6:14 AM, dynamic.hinet.net, Kao-Sung,
125.230.210.93 - - [20/Dec/2015:07:14:55 -0700] "GET /scientificenlightenment1/higgsfield.jpg
HTTP/1.1" 200 44655 "https://www.google.com.tw/" "Mozilla/5.0 (Windows NT 5.1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
More chatter (plagiarism). 10:44 AM, 24.163.83.42, nc.res.rr.com, Durham, North Carolina.
24.163.83.42 - - [20/Dec/2015:11:44:44 -0700] "GET /scientificenlightenment1/schuld.html
HTTP/1.1" 200 25700 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3"
More chatter (plagiarism). 11:05 AM, 86.179.205.4, socrates335.html, btcentralplus.com,
Manchester, UK.
203
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
86.179.205.4 - - [20/Dec/2015:12:05:59 -0700] "GET /scientificenlightenment1/socrates335.html
HTTP/1.1" 200 33272 "https://www.google.co.uk" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10.10; rv:43.0) Gecko/20100101 Firefox/43.0"
More chatter (plagiarism). 12:50 PM, 204.13.200.200, trustwave.com, proxy, Chicago.
204.13.200.200 - - [20/Dec/2015:13:50:20 -0700] "GET / HTTP/1.1" 200 6312
"http://www.bing.com" "Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0;
.NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET CLR 1.0.3705; .NET
CLR 1.1.4322)"
What is this about? 1:34 PM, 1.186.48.67, christiandogmaticsB1.html, from TranslatorCV.htm,
dvois.com, network sharing device, Mangalore, India. Yet, the visit to TranslatorCV.htm is
nowhere found on the log!
1.186.48.67 - - [20/Dec/2015:14:34:53 -0700] "GET
/christian_dogmatics/christiandogmaticsB1.html HTTP/1.1" 404 638
"http://www.enlightenment1998.com/TranslatorCV.htm" "Mozilla/5.0 (Windows NT 6.3;
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36"
1.186.48.67 - - [20/Dec/2015:14:34:53 -0700] "GET /favicon.ico HTTP/1.1" 404 604
"http://www.lawrencechin2011.com/christian_dogmatics/christiandog maticsB1.html"
"Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/47.0.2526.80 Safari/537.36"
This could mean that the person is accessing the Secret Society's cache of the suspect's website
and then visits the suspect's actual website from there. However, the IP address will show up
later, on 1:52 PM, 1:54 PM, and 1:59 PM, which seems to indicate that it's a robot.
1.186.48.67 - - [20/Dec/2015:14:52:50 -0700] "GET / HTTP/1.1" 200 554 "-" "Mozilla/5.0
(Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
1.186.48.67 - - [20/Dec/2015:14:52:50 -0700] "GET /favicon.ico HTTP/1.1" 200 359 "-"
"Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
1.186.48.67 - - [20/Dec/2015:14:54:04 -0700] "GET / HTTP/1.1" 200 2981 "-" "Mozilla/5.0
(Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
1.186.48.67 - - [20/Dec/2015:14:54:04 -0700] "GET /dot_clear.gif HTTP/1.1" 404 606
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
204
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
1.186.48.67 - - [20/Dec/2015:14:54:16 -0700] "GET /dot_clear.gif HTTP/1.1" 404 606
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
1.186.48.67 - - [20/Dec/2015:14:59:13 -0700] "GET /dot_clear.gif 1601HTTP/1.1" 404 606
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0)
Gecko/20100101 Firefox/42.0"
1.186.48.67 - - [20/Dec/2015:14:59:15 -0700] "GET /favicon.ico HTTP/1.1" 304 162 "-"
"Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
1.186.48.67 - - [20/Dec/2015:14:59:34 -0700] "GET / HTTP/1.1" 200 425 "-" "Mozilla/5.0
(Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/44.0.2403.130 Safari/537.36"
1.186.48.67 - - [20/Dec/2015:14:59:34 -0700] "GET /favicon.ico HTTP/1.1" 200 359
"http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36"
We shall dismiss this IP address. However, if it's a real visit from the Secret Society, the
implication would be enormous.
Meanwhile, the suspect. He is in Starbucks all early morning working while listening to Carolin
Kebekus, whom he has discovered for the first time. When he is done, past 9 AM or so, he jokes
to himself by saying, in German, he is a “Ninja Terrorist out to xxxx Americans.” He jokes it to a
stranger as well. This has presumably become Homeland Security's evidence to support their
case: that the suspect is prone to support America's enemy, which is at least circumstantial
evidence for the suspect's conspiracy with the Russians and FN. The suspect then rides the bus to
church. Because he is carrying a lot of things (having his jeans with him), he wants to wait for
the coffee hour. Suddenly, severe panicking, severe fear. (Programmed.) Convinced that he has to
escape. Almost broke down. Left the church. He gets on the bus, shaking and trembling while
under surveillance. This is presumably the whole reason why Homeland Security is currently
controlling him to go into severe panicking: they will submit the surveillance showing him
shaking and trembling to the ICJ to support their false profile of him as suffering paranoia
schizophrenia. The suspect comes to Starbucks, Normandie, and proceeds with domain change.
Calmed down. By 1:40 PM, enlightenment1998.com is pointed to public_html. By 2:11 PM, the
front page of the suspect’s original website is gone. His website has at last disappeared.
But the Secret Society will not stop visiting his old website, however. 2:17 PM, 192.95.47.204,
descartes202.html, Google, OVH, Montreal. This is proxy.
205
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
192.95.47.204 - - [20/Dec/2015:15:17:42 -0700] "GET
/scientificenlightenment1/descartes202.html HTTP/1.1" 404 635 "https://www.google.com/"
"Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/47.0.2526.106 Safari/537.36"
This volunteer is supposed to offer false testimony about the suspect's plagiarism. But the
chapter has already disappeared.
Meanwhile, the suspect spends the whole afternoon in Starbucks working on his new domain.
5:01 PM, the suspect posts his new scenario on AVFM. He prefaces it with this:
I have spent several days refining the latest delusions I have developed. However, the
following delusion is quite exciting to me, I’m compelled to share it (just in case…),
and hopefully it can serve to further discredit me, if there is still any need for that.
What’s most important is that the following is probably not even intelligible to
everybody, let alone striking anyone as crazy and ridiculous.
The delusions concern what has happened behind the suspect’s back from late
November until now. I don’t claim complete confidence in the correctness of the
delusion at all. It’s rather tentative. Upon any discovery of new evidences, the
scenario will be subjected to revision.
It's not clear whether law enforcement detectives would be allowed to see the posting for
themselves. Presumably, the Secret Society women will have the right to censor parts of the
whole posting before turning it over to the detectives, who thus are permitted to see only a
distorted version of the suspect's posting. After partial censoring, the posting will look more like
evidences in support of the Secret Society's false profile of the suspect. The women will tell the
detectives that this is evidence that the suspect, as he is supposedly obsessed with the Secret
Society women, is prone to develop bizarre delusion about how they are involved in a
government conspiracy to go after him.
Past 6 PM, the suspect talks to W in front of Angela’s house (from 2:16:45 onward). Here are the
details: (1) W's answering machine is still on. (2) The suspect: “Nervous breakdown this
morning. The vandalism case is their only way to get me, the women will be going to the judge,
who is very sexist.” W: “Homeland Security is not worried about a few broken windows.”
“That's not what I was talking about.” “They are going to focus on the vandalism case.”
“Homeland Security does care whether I get on the Internet. For I could disprove their false
profile of me that way.” (3) The suspect then complains about how he can't escape the country,
not having money. (4) He expresses fear for being plagiarized. But who is going to plagiarize
him? The Russians? That's not something to worry about. But if it's KRN, then he has to worry
about it. W: “I wouldn't worry about it... It wouldn't have any external effect...” KRN will
presumably analyze the intercept of this conversation for the detectives in such wise: “He
206
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
plagiarizes others but then worries about being plagiarized by others. That's how he projects
himself onto others.” Thus will have KRN projected her own tendency to project herself onto
others onto the suspect. (4) The suspect then expresses awareness that his cousin Evelyn is still
involved with the Secret Society. (5) The suspect then expresses doubt whether the US is trying
to erase or activate the previous ICJ trial. W: “You worry too much because you have too much
free time...” That's hardly the case. The suspect has to worry about it because his fate hinges on
this ICJ trial. (6) The suspect: “Everybody is telling me to run away only in order to encourage
me to get myself into troubles... The same with what you have said about 'Red Herring'”.
Then Angela suddenly cuts in (2:30:00). The suspect hangs up with W early. Angela leads the
suspect into her house. He burns DVD 500 CP while sleeping. It is merely past 7 PM.
Meanwhile, visits continue to come to the suspect's old website even though it has already
disappeared. We can be certain that the majority of the visits are volunteers for the Secret
Society's project. Here are the more notable among them.
6:29 PM, abhsia.telus.net, Calgary, Alberta,
204.191.93.116 - - [20/Dec/2015:19:29:34 -0700] "GET /scientificenlightenment1/injuredleg.jpg
HTTP/1.1" 404 632 "https://www.google.ca/" "Mozilla/5.0 (X11; Linux x86_64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.81 Safari/537.36"
204.191.93.116 - - [20/Dec/2015:19:29:41 -0700] "GET
/scientificenlightenment1/descartes202.html HTTP/1.1" 404 635 "https://www.google.ca/"
"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/43.0.2357.81 Safari/537.36"
This one is notable because it looks like a follow up on the 2:17 PM visit.
6:38 PM, bbtec.net, Soft Bank, Japan,
126.207.253.186 - - [20/Dec/2015:19:38:20 -0700] "GET /1/chinesepatriarchy220.htm
HTTP/1.1" 404 619 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X
10_10_4) AppleWebKit/600.7.12 (KHTML, like Gecko) Version/8.0.7 Safari/600.7.12"
7:10 PM, codetel.net.do, Santo Domingo, Dominican Republic,
200.88.158.104 - - [20/Dec/2015:20:10:00 -0700] "GET
/scientificenlightenment1/saxonwarrior.jpg HTTP/1.1" 404 634 "https://www.google.com.do/"
"Mozilla/5.0 (Linux; Android 5.0.1; SGH-I337M Build/LRX22C; wv) AppleWebKit/537.36
(KHTML, like Gecko) Version/4.0 Chrome/46.0.2490.76 Mobile Safari/537.36
GSA/5.7.14.19.arm"
8:39 PM, preklad39.elsatnet.cz, Ceske Budejovice, Czech Republic,
207
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
81.90.168.39 - - [20/Dec/2015:21:39:14 -0700] "GET
/scientificenlightenment1/germaninvasion.html HTTP/1.1" 404 637 "https://www.google.cz"
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0"
11:58 PM, ww.hibikino.ne.jp, Softbank BB, Kitakyushu, Fukuoka, Japan,
118.103.54.80 - - [21/Dec/2015:00:58:04 -0700] "GET /1/yangshaototalview.jpg HTTP/1.1" 404
616 "https://www.google.co.jp/" "Mozilla/5.0 (Windows NT 10.0; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
This one is notable because it looks like a follow up on the 6:38 PM visit from Japan.
12:28 AM, austin.res.rr.com, Austin, Texas,
70.114.198.125 - - [21/Dec/2015:01:28:46 -0700] "GET
/scientificenlightenment1/genealogy_of_morals.htm HTTP/1.1" 404 641
"https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36"
1:18 AM, telecomitalia.it, Fragagnano, Italy,
80.19.125.154 - - [21/Dec/2015:02:18:16 -0700] "GET /scientificenlightenment1/capra222.html
HTTP/1.1" 404 631 "https://www.google.it/" "Mozilla/5.0 (Windows NT 5.1)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
1:30 AM, tukw.qwest.net, Seattle, Washington,
174.21.195.146 - - [21/Dec/2015:02:30:17 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 404 611
"http://www.bing.com/images/search?
q=Himiko+Yamatai&view=detailv2&&id=721AC7A6884C534DC7D42760C634F5D0FFA7E8
EB&selectedIndex=11&ccid=n0owTdGj&simid=608036424982004689&thid=OIP.M9f4a304dd
1a378f4a73d8cd15ccc6e4fo0&mode=overlay" "Mozilla/5.0 (Windows NT 6.1; WOW64;
Trident/7.0; rv:11.0) like Gecko"
3:23 AM, wlan.uni-bonn.de, Rheinische Friedrich-Wilhelms-Universitaet Bonn, North RhineWestphalia, Germany
131.220.199.165 - - [21/Dec/2015:04:23:08 -0700] "GET /scientificenlightenment1/capra.html
HTTP/1.1" 404 628 "http://images.google.de/imgres?
imgurl=http://www.lawrencechin2011.com/scientificenlightenment1/cosmicdance2.jpg&imgrefu
rl=http://www.lawrencechin2011.com/scientificenlightenment1/capra.html&h=274&w=400&tbn
id=GuiEFLDFlOS73M:&q=pion+proton+collision&tbnh=144&tbnw=210&docid=7FmrBabauZ
208
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
JZFM&usg=__mi0WKhD-u21eAc2_x1iBu1mxLkQ=&sa=X&ved=0ahUKEwic-L-w6zJAhXIiywKHUCPAHgQ9QEIHzAA" "Mozilla/5.0 (Linux; Android 5.1.1; SAMSUNG SMJ500FN Build/LMY48B) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/3.3
Chrome/38.0.2125.102 Mobile Safari/537.36"
All these volunteers are supposed to produce testimonies for the suspect's plagiarism,
presumably. But now that the site is not there anymore, what?
21 December (Monday)
The suspect wakes up 2:30 AM or so in Angela's house. He is unable to sleep further. Began
writing. After 6 AM, left the house. Ate in the Korean restaurant near his former home. Then,
Starbucks, Vermont. The suspect suddenly discovers that the index page of his website at the new
domain is removed. He is shocked. Somebody has actually hacked into his website to remove it.
Suspected it is the work of the Secret Society women. But why? Very upset. Changed password.
There always seem to be surveillance agents nearby. Concerned, because he believes that SDW
might have obtained his password from Homeland Security surveillance. By 10:25 AM, the
suspect has restored the index page. He finds an international relation discussion forum (World
Affairs Board), and, there, in order to advertise his new domain, posts a short message with links
to his two essays the “Marine document” and the brand new “Far right”: “Rumor has it that court
ruling has banned certain far right parties in Europe from implementing the ideas contained in
these two essays.” As you can see, the suspect is somewhat correct here. He then posts on
AVFM.
One of the things that really drive you crazy is strange coincidence. Get this. This
morning, on the street, I saw this crazy homeless man shouting how society has
wronged him by making him crazy and homeless. He vowed revenge, and shouted
how he will one day create a “worldwide ‘Super Ninja Terrorist Group’ to find and
capture Americans around the world to dig their eye balls out and market them in
Mongolia”. It was kind of funny. There were several people on the sidewalks and
everybody just ignored him. So I too. I just thought it kind of strange: for I have been
thinking all day long yesterday and today about how angry I am for having to be
either mentally insane or disposed of “in the system” or both, just because there is
that God-damned thing dangling in between my legs which this society doesn’t
approve. But there can’t be any pranks here, and the homeless man really does look
real. But I thought: maybe the homeless man is really prophesizing, a prophet. For
now, it looks like he is just blaming what is his own fault on society, but maybe he
really is a great prophet. I mean, this is a joke in today’s world, but history books are
filled with prophets who look like junks.
In any case, like what I have said, strange coincidence.
209
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Although I’m happy that the great people here are beginning to ignore my delusional
rambling, for the following I do need somebody’s input. A certain logical paradox
has emerged during my delusional episode today, which causes me to be stuck in
thinking.
Delusional content: I’m a dutiful citizen working hard (doing my citizen duty) to
protect the clandestine op special division of the Department of Homeland Security
from suffering harm (i.e. criminal prosecution, punishment for negligence of duty, or
political struggle with rival federal agencies), but I can only do so if I hate them and
hate this America country. But only if unconsciously. As soon as I become conscious
that, by hating DHS and America, I’m benefiting DHS and America, then I will no
longer benefit them both by hating them both. But as soon as I am conscious of this
consequence as well, then I’m benefiting them both again, and by being conscious of
this further consequence, I’m not benefiting them again, ad infinitum. So, do I
benefit them or not, at this moment? That’s the question.
Basically, my delusional mind is trying to work out this delusional scenario:
Homeland Security is benefiting from me because I have (according to them)
intended to conspire with others to harm them. I therefore must hate them in order
for them to get legally compensated. But if I intend to hate them in order to help
them get compensated, then they can’t get compensated because then they will be
conspiring with me. But if I know this consequence? Ad infinitum.
My delusional mind tells me that, in this delusional episode, DHS is likely to go to
court to appeal to “original intent”. What is his “original intent”? Does this guy wish
us dead or not? But then I wonder what the judge would think: given how ugly the
people inside Homeland Security are, how can any human being not wish them
dead? Human beings are not born with the capacity to stuff dog shit into his mouth
and truly, truly, enjoy the taste.
That’s the paradox.
It is clearly Homeland Security which has remotely controlled the suspect to post this in order to
boost the Secret Society women's new case at law enforcement and their own case at the ICJ.
How? The Secret Society women must be showing the detectives TG's surveillance video
showing a man, face covered, breaking her windows. With the “DRCRR warning” or Homeland
Security warning in hands, they want to convince the detectives not only that this man is the
suspect, but also that the suspect's motivation is to target particular white females and terrorize
them. The women are trying to solidify their case against the suspect into “domestic terrorism”
and “hate crime against white women”. This is why Homeland Security has been using the
control center to program the suspect to come up with this joke “Ninja Terrorist”. And so the
detectives would read the above posting and take in the Secret Society women's analysis that the
210
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
suspect has had the habit of sneaking around at night with his face covered like a ninja and
vandalizing the properties of the white women with whom he has been obsessed and whom he is
stalking in order to terrorize them.
The suspect leaves Starbucks, past 1:30 PM.
The suspect will days later discover that a small text file has been inserted into the folder /gallery
on his website. The text file reads:
Objective Concept
Objective Concept. OBJECTIVE CONCEPT registered [company], number: 500 790 910, 13/15 rue de Chevreul 94700 Maison Alfort ­ European Union ­ State of France Our fax: 09 59 11 52 26 . Email Box : contact@office­copyright.com. To leave us a message, please fill out the form below, an e­mail will be sent to us automatically and we will contact you as soon as possible.
The file is dated 9 September 2015, 8:09 AM, like the rest of his files, but he has never seen it
there before. This Objective Concept (officecopyright.com) is an intellectual property company
in Paris. Did Homeland Security instruct the Secret Society women to find somebody to hack
into the suspect's website to insert this file in order to frame him for conspiracy with FN and the
Russians? Perhaps the file is inserted into his website right after the suspect has, last night,
expressed fear over being plagiarized: it looks like something which he would want given his
fear. Given the suspicion of “conspiracy”, both the suspect's website and his copyright records at
the Library of Congress would be suppressed as evidence in the ICJ so that these could no longer
contradict Homeland Security's false profile of him and jeopardize their case. (Homeland
Security might have legally justified their actions with the suspect's admission last night
“Homeland Security doesn't want me to get online and contradict their profile of me”. Homeland
Security would argue in the ICJ that the suspect's attempt to contradict their false profile of him
should be considered “terrorist harm” against them – yes, if you lie about a terrorist suspect and
the suspect tries to prove you wrong, he is considered to have conducted terrorist attack on you!
– so that, per UN Resolution 1373, they are legally entitled to neutralize the suspect by doing
something to prevent his Internet activities from entering into the ICJ as evidence to contradict
their case.) To this day, the mystery of who has hacked into his website and why and where this
text file comes from has never been solved.
211
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Meanwhile, the Secret Society continued their operation. Here is the time line together with the
suspect's actions.
8:10 AM, 204.13.200.200, trustwave.com, Chicago, Illinois.
204.13.200.200 - - [21/Dec/2015:09:10:22 -0700] "GET / HTTP/1.1" 200 6069
"http://www.bing.com" "Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0;
.NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET CLR 1.0.3705; .NET
CLR 1.1.4322)"
The same robot was here yesterday, you recall. Note the HTTP code “200”: this robot is able to
access the index page. This means that the index page is removed shortly before the suspect has
arrived in Starbucks, maybe between 8:10 AM and 9 AM. It would appear that Homeland
Security has instructed the Secret Society women to not only insert the text file in the suspect's
website to frame him but also to remove the index page. Why, though? What is certain is that,
from now on, there would be no evidence in the ICJ from the suspect's website to contradict
Homeland Security's false profile of the suspect as uneducated and a plagiarizer.
10:25 AM, the suspect has restored the index page.
11:31 AM, the suspect has posted on World Affairs Board.
1:28 PM, he has posted on AVFM (“Ninja Terrorist”)
212
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
After the suspect has left Starbucks, he first comes to Bail Hot Line. He needs to ask questions
about how to obtain permissions to leave town. He then goes to the superior court, to check
whether there is any TRO filed against him. No. Chrysalis. The suspect checks his website from
the computer there. Checked his document’s hash value, in case it has been swapped. Then, the
public library. He posts more on AVFM.11
The suspect notices that, on 3:28 PM, somebody has posted “Losing my grip” on AVFM.12 The
person's description of himself looks so much like a description of the suspect, with just one
difference: the person describes himself as “lazy”, while the suspect is never “lazy”. It would
11 This is what he has posted, a follow­up on his “scenario”: “Revision/ refining of the latest delusional episode: 'But the US could only do so by affirming the DHS profile is correct (that the suspect is the stalker and the women his victims). PRD then: Okay, then, I have the right to monopolize this guy’s theory. If so, PRD can found a N­
FEM; although without bad examples to back it up, she can still establish it entirely as “Russian brand” without America being able to respond.' 'The suspect began developing, independently, ideas on how Russia can expand its ideological justification for supporting the European FRM. December 7 to December 9, he wrote “US response to European FRM”. PRD: okay, I shall monopolize this as well. You are not allowed to implement his ideas, neither defend yourself, nor destabilize FRM, nor influence FRM. Now you can’t respond in any way to European FRM since he has considered all possibilities.'
“Refined: 'But the US could only do so by affirming the DHS profile is correct (that the suspect is the stalker and the
women his victims). PRD then: Okay, then, I have the right to monopolize this guy’s theory plus the illustrating examples, i.e. the life­stories of these bad women. Under “victim confidentiality”, that is: since PRD is also “victim”, she will have the right to tell her compatriots about this case if she likes, but the US will have to observe her, and other victims’, confidentiality and not advertise the matter without their consent. If so, PRD can found an N­FEM without America being able to respond.' 'The suspect began developing, independently, ideas on how Russia
can expand its ideological justification for supporting the European FRM. December 7 to December 9, he wrote ‘US
response to European FRM’. PRD: okay, I shall monopolize this as well. You are not allowed to implement his ideas, neither defend yourself, nor destabilize FRM, nor influence FRM. Now you can’t respond in any way to European FRM since he has considered all possibilities. Meanwhile, I can justify our ideological support for European FRM with further illustrating examples.'
“So the conclusion of this delusional episode is that the US has now obtained exclusive 'patent' or 'copyright' over the suspect’s analysis plus the illustrating examples, i.e. it has somehow, through the application of international laws, “patented” the life­stories of some of its citizens, like the way a company can patent the genetically mutated species it has designed and created. Any other country which shall broadcast the story without US consent will be violating international laws governing intellectual property, in a way. Bizarre delusion, huh? So what happens, then, when Homeland Security comes to rescue the women from this plan? Are they and the women going to make a bad example of the suspect in retaliation? But there is nothing to patent there. Everybody already knows that bad people are always those with that thing in between their leg. The story is hardly worth 'patenting'. “Enough, back to reality.” 12 This is what the guy has posted: “I'm 31, broke, deeply in debt and have no life skills other than being good at poker (but not good enough yet to make a living). I'm injured and can't do a lot of jobs. I'm incredibly lazy. My parents are unsupportive of my poker ambitions, and they live in a different state so I can't easily move back home. They make life very difficult for me if I ask them for any small favors (they always have). This made me highly 213
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
seem that law enforcement has put this up waiting for the suspect to respond. They want to verify
that their profile of the suspect is correct. This is sign that law enforcement is conducting their
own investigation of the suspect independent of the women’s reports about him, for the profile is
quite realistic. It seems also to indicate that law enforcement has ignored the Secret Society
women’s request for “victim confidentiality” and is investigating them as well. It seems to
indicate that the TMU detectives are training the detectives (namely, the Hermosa Beach/
Pasadena and San Diego detectives plus the Manhattan Beach detective from the previous case
already closed per the women's request) on how to properly conduct criminal profiling and
investigate the supposed “victims”. This scenario is indicated by the fact that, although the
description seems like an attempt to accurately describe the suspect (rather than falling prey to
the women's “simple stereotyping”, i.e., demonizing), there is a certain shallowness to it, which
indicates that it is devised by somebody not well-educated and not versed in human psychology,
who is therefore probably one of the detectives that are being trained. Unversed in human
psychology, the detectives are also inclined to conclude that the suspect is “lazy” when they see
him only interested in doing what interests him (writing and reading) but having little desire to
do “what he ought to do” (i.e. get a job). If you read Ortega y Gasset's La rebellion de las masas,
of course, you will recognize that the suspect would actually be considered a “nobility” by the
philosopher, someone who is always making strenuous demands on himself in order to transcend
his current self and current situation. But the detectives, being uneducated common people
(“Mass Men”), have little comprehension of what “transcendence” means. For them, life is just
about “making a living”, and not much more. The trainer from the TMU, however, knows better
about the suspect, and so has probably instructed the detectives, “If you disagree, why don't you
ask him. He's pretty honest, as you see. If he is really lazy, he'll admit it.” Hence the posting.
4:41 PM, the suspect has posted a reply to “Losing my grip”. “Not lazy, but just distracted.”
Feedback to law enforcement’s profiling.
4:33 PM, the suspect posts on AVFM again.13 The Secret Society women would present this
posting to the detectives as another piece of evidence showing the suspect to be in the habit of
imagining the women he’s obsessed with to be involved in some strange government conspiracy.
From 6 PM onward, several people begin clicking on the suspect’s links on the World Affairs
Board. Apparently, now that Homeland Security has succeeded in barring the suspect's website
from entering into evidence in the ICJ, they can mobilize the Secret Society women to falsely
report on his writings without worrying that the other parties – the TMU/ CIA team, the
Russians, and the FN – might debunk the false portrayal of the suspect (as a plagiarizer and as
highly independent but I have a tough time being social with people. They largely ignored me or teased me when I was a small boy so I have a deep fear and distrust of authority figures. That's probably why I can't keep a job. “I don't really know where to turn. I have a high IQ, I'm incredibly honest and moral, but I'm just not good at living life. I'm inches away from going to a mental institution or overdosing on drugs and just ending it all. I hate to take the coward's way out, but I'm losing faith in my ability to survive in this world. Thank you for any supportive words.”
214
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
stupid and uneducated) by showing his writings to the judges. The Secret Society women, thus,
getting wind of their new mission, and informed by Homeland Security that the suspect has now
a new domain and has just placed links to his latest essays (the “Marine document” and
“Russian-supported European far right”) on an Internet forum, instructed their volunteers to go
pretend to find the essays over there. Thus, 6:43 PM, wa.comcast.net, Sammamish, Washington,
76.121.188.161 - - [21/Dec/2015:19:43:06 -0700] "GET /farrights/farright5_noftntb.pdf
HTTP/1.1" 200 501700 "http://www.worldaffairsboard.com/showthread.php?
t=65401&page=2&p=1000962" "Mozilla/5.0 (Windows NT 10.0; WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
This is “Far right”, its first ever visit! Then, 6:51 PM, Talk Talk, Maidstone, UK,
2.97.174.116 - - [21/Dec/2015:19:51:44 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200
714742 "http://www.worldaffairsboard.com/showthread.php?t=65401&page=2&p=1000958"
"Mozilla/5.0 (Windows NT 5.1; rv:43.0) Gecko/20100101 Firefox/43.0"
The “Marine document”. Then, 8:23 PM, dynamic.rev.eftel.com, Trinity Gardens, Australia,
202.61.229.11 - - [21/Dec/2015:21:23:36 -0700] "GET /farrights/farright5_noftntb.pdf
HTTP/1.1" 200 501700 "http://www.worldaffairsboard.com/showthread.php?t=65401&page=2"
"Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/47.0.2526.106 Safari/537.36"
You can be sure that they are here to offer their testimonies to the detectives saying that the
suspect has plagiarized and rambled racist and misogynist garbage in these essays, and probably
demonstrated his intellectual ineptitude and uneducation. The testimonies will then be
intercepted into the ICJ as evidences in support of Homeland Security's case.
Meanwhile, the suspect has gone to Chrysalis, and, after men’s group, he comes to Starbucks,
Vermont. He calls Angela. Suddenly, he begins imagining – evidently per Homeland Security's
remote programming – that the German Lady might have a plan to plagiarize him. He
immediately writes an email to W. It is 8:24 PM:
13 This is what he has posted: “Now, back to delusion: The logic of the delusion would certainly lead you to think that the Homeland Security plan to rescue the women indeed includes a plan to allow the government to make a bad example of the suspect. Since the suspect is an immigrant from Eurasia, he would be a bad example to prove that not
all multiculturalist acceptance of immigrants is good idea; some immigrants are touted as good but in fact bad, like those from a certain part of the Eurasia continent. (This will be used as part of US response to European FRM.) Since the suspect hints at anti­American hatred on a men’s right’s forum, his bad example will also make a bad example of MRM, giving feminists more ammunition to denounce MRM as not just bad for women, but also bad for
society and nation. Then, when you stand back, you see that the point of the whole exercise is to establish the suspect as being overly engrossed in bizarre scenarios about government conspiracy and not having time to do other productive things, etc. Like John Nash during his delusional periods. Ah so! Mission accomplished.” 215
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
W, I'm getting very worried. As I reflected on the matter, it's quite clear that the
German Lady's crowd has run out of option for exterminating me. Their only
solution is to plagiarize me, i.e. to create many different versions of my
“International Court story” so that everybody will get quite confused about whether
anybody has really written it.
The thing is that the last time I tried to copyright my story was August last year, and
the application was rejected, for the first time in my life, most likely because of the
German Lady's meddling.
I'm just letting you know this, because I'm gonna have to spend more time
copyrighting my work, and more money on this. I have gradually fallen into their
trap, by changing the domain name of my website, by distancing my other Internet
forums, and by hiding my international court story. It's the German Lady's idea. She
will plagiarize my international court story. I simply don't know why she is so
concerned with this. At least she, among all the women in her group, has somewhat
of a functional brain. Why doesn't she understand that she is the only person who has
ever bothered to read the story about her?
Her crowd is obviously getting information from Homeland Security about the
current course of the International court trial. Otherwise she will never dare to do
this. She must have been told that what she is doing is authorized by ICJ judgment.
Ha!
As you can see, only the last sentence is correct; the rest is all wrong speculation. It would
appear that Homeland Security is simply controlling the suspect to say things which might end
up confirming the Secret Society women's false profile of him with law enforcement, and so
supporting their own case in the ICJ. KRN will certainly analyze the email to the detectives:
“You see, he is always suffering paranoia delusion about the women he's obsessed with. He
actually believes we will plagiarize him! Furthermore, you see that, after he has plagiarized
others, he projects his own bad characteristics onto others and fears that others might plagiarize
him.” 9 PM, the suspect has decided to work on the copyright of all his writings. His fear has
finally motivated him to do so. (He has not copyrighted his works for a year and a half due to
lack of funds.) But he can’t get into his account at the Copyright Office. Startled. He writes
another email to W. It is 9:13 PM,
W, this looks like their tactic. They are thinking of filing a restraining order against
me on the basis of my postings on Internet forums. Then I will have to deny that this
is my posting. At which point, instead of pursuing it, they'll just forget it. Then, they
will have many people write stories similar to mine. But they'll make sure that I don't
see these anywhere, that I won't not even be aware of it all. Then one day, in case I
pull out my story about the German Lady again, everybody will have already seen
something like it before. That's how they are going to discredit me!
It looks like an ingenious plan, huh?
216
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
Obviously, they got professionals helping them.
By “professionals”, the suspect means the SVR officer whom EKT has sent to the Secret Society
women. The suspect is all wrong, including this one. After the stunt on 16 December, the Secret
Society women will certainly not have any more contacts with EKT's crew, now knowing that
they have been considered by somebody in the US government as conspiring with hostile foreign
agents to harm the US. In fact, angry about this, they are eager to make the suspect a conspirator
with foreign powers to harm the US: in their mind, they are the righteous party and they have
suffered injustice by being conceived of otherwise. But, since they can't retaliate against
NULND, they will, as usual, retaliate against the suspect instead. Just when the suspect finishes
his email, a pretty white female, who would turn out to be European, comes in to sit next to the
suspect. She is carrying a fashion magazine. Immediately, another black man comes in to sit in
front of the suspect. As the suspect marvels at the white female's beauty, she notices it and makes
a gesture, “What?” The suspect is quick to avoid embarrassment, pretending that he was staring
at her because he thought she was the model on the cover of the fashion magazine which she was
carrying. It would appear that he has deceived her, for she retracts her gesture and replies that she
isn't the model. She then leaves. The black man sitting in front of the suspect sneers at him and
comments on his cleverness, obviously having seen through his trick (pretending to be a retarded
person curious about every little thing so as to completely get away with harassing pretty
women). It would however appear that the black man is here doing surveillance for law
enforcement (the detectives currently being trained by the TMU detectives) and so is already
quite aware that the suspect has the habit of pretending to be retarded while approaching pretty
white females. The suspect then calls Angela again. He has decided to go home instead of going
to Angela's house. It's all because he has to use the Internet.
Five hours after their last operation, the Secret Society women are at it again. 1:30 AM,
amazonaws.com, Ashburn, Virginia,
54.159.140.131 - - [22/Dec/2015:02:30:24 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360
"http://enlightenment1998.com/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/534.34
(KHTML, like Gecko) Qt/4.8.1 Safari/534.34"
54.159.140.131 - - [22/Dec/2015:02:31:23 -0700] "GET /sufferingwoman/sufferingwomand.pdf
HTTP/1.1" 200 304958 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/534.34 (KHTML,
like Gecko) Qt/4.8.1 Safari/534.34"
This is most likely LB Admin. Since it takes her merely one minute to find the document she is
looking for, she has obviously been instructed by Homeland Security as to which document to
fish out. LB Admin is here to offer her testimony as to what the suspect has written about SDW –
this, however, might be the only document which the Secret Society will turn over to the
detectives in entirety without much censoring – in order to consolidate the Secret Society
women's false profile of him, and Homeland Security has to coordinate the process because the
evidences which the detective has collected will be intercepted into the ICJ to support Homeland
Security's case.
217
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
You can easily guess how KRN is going to analyze the document to the detectives. On the
document, the suspect has listed all the personality characteristics of SDW, a core member of the
Secret Society, although without identifying her. KRN would presumably psychoanalyze the
suspect to the detective in accordance with the previously established procedure (projecting her
own personality disorder onto the suspect, including her love of such projection), saying that the
suspect, out of his narcissistic personality, has the habit of projecting himself onto the women
he’s obsessed with. They would say to the detective: “You will see how he exhibits all these very
characteristics which he describes this woman among us as possessing.” Homeland Security will
then remotely control the suspect to behave just like SDW while the latter is under law
enforcement surveillance so that the detective will definitely believe the Secret Society women's
claim that, when the suspect describes any of them, he is just describing himself. This is possible,
furthermore, because the detective is forbidden by “victim confidentiality” from looking at
SDW's blog, otherwise he would discover just how accurately the suspect has described her, and
not himself.
The most important thing here is that, on the document, the suspect has described the woman as
“dangerous” because “she is like somebody who suffers paranoia schizophrenia” and “will harm
others believing that she is defending herself from harm, not knowing that the harm she believes
others are inflicting on her is all but imaginary.” The women would thereby persuade the
detective to regard the suspect as “potentially dangerous” since he “will harm others, especially
the Secret Society women, believing that he is defending himself against harm by them, not
knowing that the harm which he believes has been inflicted upon him is all but imaginary, the
product of his paranoia imagination.”
The Secret Society's operation continues throughout the morning: 2:25 AM, Vodafone, Italy,
5.90.137.145 - - [22/Dec/2015:03:25:18 -0700] "GET /badvisits/5712-43.png HTTP/1.1" 404
614 "https://www.google.it/" "Mozilla/5.0 (Linux; Android 5.1.1; SM-G361F Build/LMY48B;
wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/42.0.2311.137 Mobile
Safari/537.36 GSA/4.4.10.16.arm"
This is testimony about the suspect being a computer hacker. 2:40 AM, ipconnect.de, Munich,
87.177.199.47 - - [22/Dec/2015:03:40:55 -0700] "GET
/scientificenlightenment1/representation222.html HTTP/1.1" 404 640
"http://images.google.de/imgres?imgurl=http%3A%2F%2Fwww.lawrencechin2011.com
%2Fscientificenlightenment1%2Fballistic.jpg&imgrefurl=http%3A%2F
%2Fwww.lawrencechin2011.com
%2Fscientificenlightenment1%2Frepresentation222.html&h=440&w=400&tbnid=maoCclUwS1
SEvM
%3A&docid=EXCGhu0Emf7iDM&ei=Uih5VsXhLcHBsgGlvrDwCg&tbm=isch&iact=rc&uact
=3&dur=7062&page=24&start=766&ndsp=31&ved=0ahUKEwjF0qK8o-
218
The third ICJ trial over the suspect
Lawrence C Chin November 2015 – February 2016; revised, August ­ September 2016
_JAhXBoCwKHSUfDK44vAUQrQMI8QEwTw" "Mozilla/5.0 (Windows NT 6.1; rv:41.0)
Gecko/20100101 Firefox/41.0"
This is testimony that the suspect has plagiarized.
3:34 AM, hsd1.pa.comcast.net, Lancaster, Pennsylvania,
174.54.171.168 - - [22/Dec/2015:04:34:15 -0700] "GET
/scientificenlightenment1/cellularrespiration.jpg HTTP/1.1" 404 641 "https://www.google.com/"
"Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML,
like Gecko) Version/9.0 Mobile/13B143 Safari/601.1"
Testimony that the suspect is a plagiarizer.
3:56 AM, dynamic.hinet.net, Hsinchu, Taiwan,
1.171.5.59 - - [22/Dec/2015:04:56:02 -0700] "GET /blogs/wp-content/uploads/2013/09/9131358.png HTTP/1.1" 404 638 "https://www.google.com.tw/" "Mozilla/5.0 (Windows NT 6.1;
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36"
Testimony that the suspect is a computer hacker. Note the “404” in all these visits. These are
visits to the suspect's old domain. Since the detective is forbidden from looking at the suspect's
website himself, he would not know – unless his trainer has enlightened him – that the
testimonies are not just false, but actually baseless, insofar as the website being reported about
isn't even there anymore. For a long time to come, the Secret Society women will continue to
make false reports about the suspect's old domain rather than about the new domain, even though
the new domain is identical to the old domain. This is because all of the suspect's old postings on
the Prison Planet forum have links to pages on the old domain, and these postings constitute the
very substance of the claim of “cyber harassment” which the women are making against the
suspect. The Secret Society women's goal remains to suppress the suspect's website on ground of
criminal harassment of women, and they can only make such claim against the old domain, not
against the new domain. They are going to use the old domain as the pretext for suppressing the
new domain, and so they must pretend that the old domain still exists.
219