The third ICJ trial over the suspect, Part I
Transcription
The third ICJ trial over the suspect, Part I
The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 The third International Court of Justice trial over the suspect: French/ Russian vs Homeland Security Part I 4 November – 21 December 2015 FORWARD The following recounts a “conspiracy” – insofar as Russia's support of the European far right movement could hurl in a global movement to save humanity's future and the suspect has the potential to make this happen – by which the US Department of Homeland Security and KRN's Secret Society have set about using the “suspect” to disrupt the process so that Russia's attempt to help save the world may be banned by international laws while everybody is forced to dispose of the suspect in America's extermination system (jail and mental asylum). This is Homeland Security's plan: by accepting the Secret Society's false complaints about the suspect at face value, Homeland Security has recreated him as a “domestic terrorist” (misogynist terrorist). He is now subject to all enforcements under UN Resolution 1373. When the suspect shows interest in FN and the Russians, both parties will then have to respond to Homeland Security's warning and come to investigate what he is doing, only to find themselves falling into a trap, i.e., to discover that the suspect has just written about the agendas they have been preparing. Now their own agendas (creating an alternative to the American model) risk being banned by an International Court of Justice judgment as “terrorist conspiracy to harm the United States”. Quite a clever trick, considering the low intelligence quotient of most of the Homeland Security personnel. In other words, Homeland Security is using the suspect as a “patsy” to harm the Russians and FN. He is once again the “All American patsy”. We may conceive of the following ICJ trial in this manner. The suspect's entrapment, arrest, and imprisonment from early 2014 until September 2015 may be considered the extension of the previous ICJ trial from 2010, when he has failed to finish his “mission” and get himself arrested. The period from early 2011 to November 2013 when the ICJ trial was first reactivated, was orchestrated by the Macrospherians to prepare evidences as the ground on which the previous ICJ trial may be reactivated and evidences may be replaced again. The period from November 2013 to September 2015 was orchestrated to produce evidences which replaced those from the previous ICJ trial (in order for a terrorist conspiracy to be clearly established against Russia 1 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 and the CIA) and to enable the suspect to “finish his mission” (after the conspiracy was clearly established). The period after September 2015 – including this third ICJ trial – is orchestrated as the “reversal”, under UN Resolution 1373, of the previous terrorist conspiracy between the suspect, the neocons, and Sarkozy's France against Russia and the CIA. Evidences from the previous ICJ trial will continue to be replaced during this phase. It's of course unclear what the ICJ will make of the suspect as a “conspirator” in a “terrorist conspiracy” insofar as he barely has any freewill. Meanwhile, KRN's Secret Society's conspiracy to exterminate him using the criminal justice system continues in a straightforward fashion throughout all these phases of the reactivation of the previous ICJ trial and is the foundation which has provided all the necessary evidences for any of the phases to take place. Resume First, a quick review of how this International Court of Justice trial started. Recall that Homeland Security, avenging themselves on the suspect, entered a warning about the suspect into the national and international databases for known terrorists. The warning listed the Secret Society women as his “victims” (“witnesses”) who should be contacted for more information about the suspect. That is, Homeland Security had purposely assumed the Secret Society women's false portrayals and slanders of the suspect to be true (even though they knew them to be false) and entered them into official records. This is referred to in the following as “Homeland Security false profile of the suspect”. Since 11 September, 2015, because this website had come back up online after the suspect’s release from jail, the Secret Society women were on the move again to remove this website. Still remembering how the TMU had refused to validate them as the suspect's “victims”, they sought revenge. Especially ANG. Now that Homeland Security had classified the suspect as a “terrorist” while listing the Secret Society women as both “victims” (“witnesses”) and “experts” on the suspect, the women, with the Homeland Security warning about the suspect in hand, went back to the TMU to open another confidential stalking case against the suspect and, when that didn’t turn out well, they wanted to use GR’s case as an opportunity to remove his website. But GR’s case didn’t work out well for them either, so the Secret Society women were back to working on their lame-duck stalking case with the TMU. The women requested several sting operations on the suspect but, unfortunately, he didn’t take any of the baits. Eager to obstruct Homeland Security's case against the suspect and discredit the Secret Society women, the TMU, by 2 November, declared the suspect to be not stalking the women and not posing any sort of danger to them. Without the Secret Society women's knowledge, the TMU, urged on by the CIA, also entered into the terrorist database a 2 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 warning about the Secret Society women saying they had never been “victims” of the suspect and were pathological liars who liked to fraudulently use “victim confidentiality” as cover under which to lie and pretend to be victims in order to obtain benefits and recognition. This warning would from now on exist side by side with Homeland Security's warning about the suspect to contradict it. It seems that, on 3 November, the Secret Society women, frustrated that the TMU had once again dismissed their case, reached the decision to go back to PD’s vandalism case using ANG’s status as a witness in the case as the springboard on which to make out of this vandalism case a stalking case, which they hoped to then connect up with the suspect’s website, in order to persuade the judge to issue an injunction to suppress it. The Secret Society women's motive remains that of silencing their victim. The German Lady does not want the world to even remotely read about how she and her gang had victimized the suspect 7 years ago. SDW, for her part, is very much motivated because she doesn’t want the world to hear about how she and the whole gang have, last year, attempted to put away the suspect and remove his website by running the most organized campaign ever seen in history of falsely reporting somebody to law enforcement. SDW is terrified of being found out that, instead of being a victim of community gang-stalking as she claims she is, she is actually a master gang-stalker and professional false complainer. ANG shares a similar motive. In the past she was concerned that people might see her name on the suspect’s website. Now, even though her name has entirely disappeared from the suspect’s website, she will keep doing the same thing (eliminating his website) because she still remembers her hatred from the past. Their motive is the perennial motive of any victimizer: Once you have victimized somebody, you must make sure to silence him, and all the better by making him look like the victimizer and using the legal system to do the job. Now let's review Homeland Security's false profile of the suspect which is attached to their warning about the suspect as a “terrorist”. This false profile is derived entirely from the Secret Society women's false testimonies about the suspect. According to this profile, the suspect is: misogynist, white supremacist, anti-Semite, plagiarizer, computer-hacker, stalker, cyberstalker, anti-American terrorist, “vandalizer” (i.e. a misogynist terrorist who is prone to become obsessed with white women, stalk them, and then vandalize their properties in order to terrorize them), violent, delusional, paranoia schizophrenic, sexually perverted and yet impotent and thus loving and hating white females at the same time, extremely malicious and pathologically deceitful (anti-social) and habitually impersonating others on the Internet. Although Homeland Security has designated the suspect as a “domestic terrorist” (because of his misogynist vandalism), they like to put him in international databases for known terrorists claiming he poses threat to all famous women around the world because he is a “computer hacker” and “cyberstalker” (even though 3 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Homeland Security knows very well that the suspect doesn't know how to hack people's computers at all). Eventually, as you shall see, the suspect will also be said to be an agent of multiple foreign powers here to destabilize the US. As you can see, the Secret Society women and Homeland Security are basically working together to slander the suspect into the most disgusting criminal and terrorist suspect ever in human history. Meanwhile, by early November, 2015, because the suspect has been visiting Marine LP's and National Front's websites with increasing frequency, the French consular protection service, stuck with Homeland Security's false profile of the suspect as an extremely dangerous “cyberstalker”, has had to respond – for fear of losing their job – by coming to investigate him. Even though, when the French access Homeland Security's warning in the database, they also see the TMU's warning about the Secret Society women which contradicts Homeland Security's warning, they can't just take TMU's words for it. There is indication that the prominent Russian daughter EKT, called on by the Secret Society women, has also joined the French. The TMU – backed by the CIA – has however responded unfavorably. When the French request to check the suspect's Gmail account, the TMU refuses to grant access. The problem is that the suspect has been writing “Why we support Marine LP” and backing it up in his Gmail account; the TMU, smelling fraud, doesn't want “Marine” to see the essay. TMU’s profile of the suspect – supported by the CIA – contradicts Homeland Security's profile and says that the suspect is not dangerous and not a stalker and that, when the suspect likes somebody, he is definitely not a threat to that somebody. The profile affirms that the suspect is “traditional”, i.e. when he likes somebody, he wants to benefit the person. Homeland Security's profile, however, is “postmodern”, and, adopting the viewpoints of the Secret Society women, affirms that, when the suspect likes somebody, he wants to hurt her. If TMU’s profile is allowed to reign supreme, the whole subsequent affair wouldn’t even arise, but Homeland Security's is legally more authoritative. This means that, the more the suspect proclaims his admiration of Marine, and writes an essay to praise her and help her, the more the French consular protection service is required to worry about him. The French thus want to see what the suspect is writing about Marine, and EKT wants to see what the suspect is writing about Russia. The TMU, backed by the CIA, resists by claiming EKT and Marine are not allowed to read the suspect's writings because the suspect is suspected of wanting to use this opportunity to share with them his suggestions as to how they could demonize the United States. Meanwhile, when Homeland Security discovers this, they also stand by TMU's decision and refuse to grant access (even though they reject TMU's profile of the suspect and warning about the Secret Society women). Both the Russians and the French, however, their curiosity raised, want to 4 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 see what the Americans are hiding. The three parties (the TMU/CIA; Homeland Security; and French/ Russians) thus go to the International Court to fight it out: “The United States has refused to abide by international agreement, especially UN Resolution 1373. After classifying one of its citizens as a 'terrorist', the United States has refused to share information about him, contrary to international agreements.” This must have happened by early November, 2015. NOTICE Apart from Homeland Security's warning about the suspect, there might exist as well the so-called “DRCRR warning”, which refers to the warning possibly issued by the detectives from the West LA division of LAPD. You recall that when ANG and the rest of the Secret Society women volunteered as witness for PD's, TG's, and DRCRR's vandalism cases, they claimed to the police saying, based on their knowledge of the suspect, this was a calculated act motivated by misogynist hatred and prior stalking of the victims, so that the “crime” should be considered “hate crime” and “stalking”. (In reality, they knew very well the breaking of the windows was random and the suspect didn’t know who the owners were at all.) They then requested “victim (or witness) confidentiality” from the police on the pretext that they feared the suspect's “retaliation” if he found out they had testified against him behind his back. This “confidentiality” would prevent the police from talking to the suspect to get his side of the story, so that the upgrading of what was in fact an ordinary vandalism case to a high grade case of “hate crime” and “stalking” can remain unchallenged. Of course, this “upgrading” would also prevent the suspect's prosecution for these serious crimes since the evidences can no longer be brought in front of him in court. But this was not the Secret Society women’s goal. Instead, the Secret Society women's objective was to have a document to replace “Chaya's warning” so that they could from now on use it at other law enforcement agencies to open up other confidential cases on the suspect where they could make up all sorts of horror stories about him and his website while demanding that the detectives there be forbidden by “victim (or witness) confidentiality” from ever verifying the stories through either investigating the veracity of the women's claims or interviewing the suspect. After learning the convenience of “victim confidentiality” granted by “Chaya's warning” (i.e. an impenetrable cover under which to make false reports) and then losing it, the Secret Society women were manipulating PD, TG, and DRCRR to obtain another similar convenient cover under which they could make false reports about the suspect to law enforcement agencies with complete impunity. The Secret Society women are of course in personal possession of either Homeland Security's warning about the suspect or the so-called “DRCRR warning” – or both. Just like Chaya's warning from previous times, this new warning (Homeland Security or DRCRR) would constitute the backbone of the Secret Society itself: it is 5 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 by sending the warning to anybody available that the Secret Society women are able to recruit, in the coming days, another several thousands of strangers from around the world to their “witch-hunt” enterprise. The secret Society women's modus operandi remains: first showing the “warning” about this “schizophrenic racist and misogynist terrorist cyberstalker of women” to the stranger, and, then, when the stranger is galvanized, recruiting him or her to the enterprise to make false complaints about the terrorist's website. The Secret Society women then make friends while at the same time getting the “juice of their life”: fear-mongering about a bad-to-the-bone schizophrenic racist and misogynist sexually perverted and plagiarizing terrorist cyberstalker of women. A notice should also be made about the “Princeton decoy” (with the IP address: 128.112.155.xxx). It would later turn out that this is not even a real person, but a bot. Finally, a word about the suspect and the historically unprecedented gang-stalking and bullying he has so far undergone. The suspect is not discriminated against because he is different. He is the Other (l'Autrui) on whom the Secret Society women project all negative qualities that are opposite of the goodness they (mistakenly) see in themselves. Prelude: The Secret Society women's operation 4 – 13 November And the early phase of the third ICJ trial In the following we assume that the Secret Society women's operations on the suspect's website are for the purpose of gathering “evidences” in preparation for persuading the district attorney (DA) to factor the suspect's website into his vandalism case. Of course, given the involvement of the French and the Russians, it could be that Secret Society women have also been contacted by the French consular protection service and asked to furnish information about the suspect, so that the women are also sending their volunteers to the suspect's website for the purpose of making false reports about it to the French and the Russians. (Especially to falsely report the suspect for plagiarism, which the TMU has always refused to hear.) There will, however, be no full discussion of this possibility in the following. The Secret Society women's possible dealing with the French consular protection service between 4 and 13 November will only be incidentally noted. 4 November (Wednesday) And so ANG agreed to allow the rest of the Secret Society women to hop on her back. The Secret Society had concocted the basic outline of their argument: the suspect has been stalking ANG for years, and he would then put her name on his website to intimidate her. Not just that. 6 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 But he did this to several other women. ANG will then invite the German Lady and SDW to meet with the DA and eventually onto the stand so that both women can make a show about how the suspect has victimized them by stalking them and then writing about them on his website. The judge in the current vandalism case – as the Secret Society women have already researched – is famously biased toward women. She is expected to be incensed by the story which ANG, the German Lady, and SDW are about to fabricate. Once the jury shall have convicted the suspect, so they hope, the judge will order that the suspect’s website be removed and issue an injunction to forbid him from ever writing about his women “victims”. The same difficulty then surfaces which the gang was faced with during GR’s case: how to present a story to the DA and to the judge about how ANG could have known about the German Lady and SDW? For, obviously, the gang must keep forever in secrecy the secret organization they have formed to go after this one guy for more than three years. It’s not just that they need to keep it a secret from the suspect himself (even though he has known about it for more than three years), but that they cannot let the judge and the DA know about it. Otherwise these outsiders will be shocked out of their souls: who could have imagined that women can be this bad? Who could have imagined this, the largest private citizen gang-stalking enterprise in the history of humankind? The German Lady thus resorts to the usual tricks which she has learned from her CIA handlers back in 2008: just stage a show: how ANG and her friends read about all these other women on the suspect’s website, find them in person, and discover their heart-wrenching stories about being victimized by the same serial stalker and talker of women. Around noon, as the new strategy has been decided, the Secret Society – under the German Lady’s direction – sends out a first scout to Google for one of the chapters about her on the suspect’s website. On 12:27 PM and 12:39 PM, 37.142.116.55, Hot Net, Petah Tikwah, Israel. 37.142.116.55 - - [04/Nov/2015:13:27:25 -0700] "GET /orthodox47bg/notes_orthdox_47bg.pdf HTTP/1.1" 200 6376123 "http://www.google.co.il/url? sa=t&source=web&cd=21&rct=j&q=gangstalking%20%20book%20gathering%20%20filetype %3Apdf&ved=0CBcQFjAAOBRqFQoTCN6Ri7DN98gCFcmecgodtNkNKA&url=http%3A %2F%2Fwww.lawrencechin2011.com%2Forthodox47bg %2Fnotes_orthdox_47bg.pdf&usg=AFQjCNGZNVWdlmJJof04qrM3WsPexc9Gtw" "Mozilla/5.0 (Linux; U; Android 4.2.2; he-il; Q40H Build/JDQ39) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30" Note that this is the same Israelite guy who was here on 10 October, 9:40 PM and 9:51 PM. On that day he was also looking for the same chapter: the Secret Society women have assigned him this chapter. Note that today he is using his cellphone rather than his Linux laptop, and a different IP address as well. But we can be sure that it’s the same guy. Note also that he really is located in Israel (“he-il”) even though he might be using a proxy based in Israel. 7 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Then, on 5:14 PM, the Secret Society women send out another scout to look for an earlier chapter in which the German Lady has been featured: 202.73.48.198, Singapore. 202.73.48.198 - - [04/Nov/2015:18:14:07 -0700] "GET /schizo-part-3-50/schizo-part-3-50.pdf HTTP/1.1" 200 567657 "https://www.google.com.sg/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" This is to provide further evidences that the suspect, in disregard for women’s privacy, has posted their pictures on his website, etc. Then, on 9:21 PM, the Secret Society’s third scout is charged with finding a chapter on the suspect’s website: 24.88.91.192, sc.res.rr.com, West Columbia, SC. 24.88.91.192 - - [04/Nov/2015:22:21:14 -0700] "GET /suppl_pld_4_60bg/suppl_pld_4_60bg.pdf HTTP/1.1" 200 951826 "http://-------------.com/about/" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" The chapter is found on SDW’s blog! The strategy is now apparent. ANG’s gang will pretend to email to SDW: “Hey the guy who has stalked us and talked about us on his website has posted something on your blog. Who are you?” SDW will then pretend to respond, “I know him. He is so and so. He has stalked me. On cyberspace. He has posted these stuff on these forums saying I am part of some secret organization out to gang-stalk him. He’s so crazy, he believes that I’m going after him with all these other people, including you. I’m terrified of him. I have had to stop posting on my blog for fear that he might see them.” ANG and the German Lady will thus be able to pretend to team up with SDW: this is, they will tell the DA, how the multiple victims of this serial stalker and talker of women have come together. 5 November (Thursday) By morning, presumably, SDW and the German Lady, and maybe ANG as well, would have their discussion. From noon onward, the Secret Society shall continue to send a series of scouts to download documents from the suspect’s website in order to continue to stage the show of how this group of women could have come to know each other. On 12:28 PM, 71.55.71.2, Century Link, Kinston, North Carolina. 71.55.71.2 - - [05/Nov/2015:13:28:26 -0700] "GET /11_08_80/11_08_81.pdf HTTP/1.1" 200 2512098 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" The German Lady, when ANG shall summon her to the DA and to court, shall use this chapter to argue: “This alleged suspect is truly sick. He stalked me and then wrote about it and posted it on his website.” Since ANG has not yet been able to add a stalking claim against the alleged suspect in this vandalism case, the DA will be more persuaded if it is shown him that the alleged suspect has a history of stalking women. Thus, even though this “stalking” which the German Lady shall bring into court happened 7 years ago and has already been dealt with in her restraining order 8 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 against the suspect from that ancient period, it will be circumstantial evidence in the current vandalism case. ANG is prepared to come to the DA and to court to add the new scenario that the vandalism at the library is motivated by “stalking”, and that she is a victim of stalking, not just a witness in a vandalism case. Then, on 1 PM, the Secret Society women send in the second scout of the day: 31.31.74.47, proxy, Czech Republic. 31.31.74.47 - - [05/Nov/2015:14:00:47 -0700] "GET /karinaftrwrd/karinaftrwrdb.pdf HTTP/1.1" 404 1360 "http://forum.----------.com/index.php?topic=------.0" "Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0" The document is not actually there. The Secret Society is still looking for more evidences to connect the author of the PP Forum postings with the suspect. The evidence so far is sort of weak. But, half an hour later, on 1:30 PM, the Secret Society sends in the third scout of the day: 98.242.209.196, Comcast, Fort Lauderdale, FL. 98.242.209.196 - - [05/Nov/2015:14:30:25 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1" 200 592393 "https://www.google.com" "Mozilla/5.0 (Windows NT 5.1; rv:41.0) Gecko/20100101 Firefox/41.0 ANG will claim that the “Pyramid” in the first page of this document refers to her. This will be her evidence that the suspect has developed bizarre delusion about her. 6 November (Friday) After some discussion, the Secret Society sends in one scout – the same Israelite guy two days ago and from 10 October – on 3:53 PM: 62.219.120.80, Tel Aviv. 62.219.120.80 - - [06/Nov/2015:16:53:29 -0700] "GET /timelinepartIII-s/timelinepartIII-s.pdf HTTP/1.1" 200 32729 "http://www.google.co.il/url? sa=t&source=web&cd=26&rct=j&q=gangstalking%20%20implants%20technologies %20filetype %3Apdf&ved=0CCMQFjAFOBRqFQoTCLXj84P__MgCFYg6FAodBuoNEw&url=http%3A %2F%2Fwww.lawrencechin2011.com%2FtimelinepartIII-s%2FtimelinepartIIIs.pdf&usg=AFQjCNGLaqXmwBb1ao_T-StCBSkbH9kf9Q" "Mozilla/5.0 (Linux; U; Android 4.2.2; he-il; Q40H Build/JDQ39) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30" 62.219.120.80 - - [06/Nov/2015:16:57:11 -0700] "GET /timelinepartIII-s/timelinepartIII-s.pdf HTTP/1.1" 200 846147 "http://www.google.co.il/url? sa=t&source=web&cd=26&rct=j&q=gangstalking%20%20implants%20technologies 9 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 %20filetype %3Apdf&ved=0CCMQFjAFOBRqFQoTCLP1u_3__MgCFUm0FAodCxwIaA&url=http%3A %2F%2Fwww.lawrencechin2011.com%2FtimelinepartIII-s%2FtimelinepartIIIs.pdf&usg=AFQjCNGLaqXmwBb1ao_T-StCBSkbH9kf9Q" "Mozilla/5.0 (Linux; U; Android 4.2.2; he-il; Q40H Build/JDQ39) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30" The Secret Society is going to use this document as their golden piece of evidence. In order to get SDW on board, ANG and the German Lady are still faced with two difficulties: (1) the evidence for the identification of the PP Forum author as the suspect himself has been minimum; and (2) there is no evidence at all for identifying who this “SDW” is in all of the suspect’s writings about her – how can SDW come to the DA and to court claiming that the suspect has been slandering her on his website and in Internet forums when he has never mentioned her name anywhere? Well, remember that the German Lady has already had the entire cache of the suspect’s website in HK Hacker’s computer. After laboriously studying all the documents, she has noticed that SDW’s relatives’ names seem to be found in this one document. She will then have SDW bring this document to the DA and to court, claiming that the “SDW” found in all of the suspect’s writings is indeed she herself. Her argument would be something like: “He’s delusional. He lists all these visits and believes that these came from my family members. He has stalked me online to find out who my family members were, and then listed them here, and claimed, in his delusional mind, that I have sent my family members to visit his website and make false reports about him to law enforcement. I am terrified of him. He stalks me and my family online and then puts their names on his website to slander them, all because he suffers from paranoia schizophrenia and believes that I have been part of a secret organization to go after him.” The argument which the gang will present to the DA on Monday, and to the judge on the next court day, would thus be something like this. ANG will say: “He doesn’t just stalk me and vandalize my library. I Googled my name, and saw all these references to me on his website. He is obsessed with me and develops all these bizarre scenarios about me. He also talks about how I am part of a Secret Society to go after him by making false reports about him to law enforcement. He has always been delusional; he once filed this crazy lawsuit against me. And he has developed the same sort of bizarre scenarios about these other women as well. And I have found them, and we have met just recently to talk about the problems. Here they are.” And she will then present the German Lady and SDW to the DA, and eventually to the whole court. These two other women will then put on their respective acts, crying about how the suspect has stalked them and then slandered them on his website and on Internet forums. The German Lady will say: “He has stalked me, and I had to file a restraining order against him. Then I found out that he has written this story about me and put it on his website, slandering me saying I’m part of some CIA and Homeland Security operation to go after him. He’s crazy. He’s a stalker, and is motivated by his delusion about his victims.” SDW will add: “He has stalked my family online, and then writes about me and my family saying I’m part of this secret organization to gang-stalk him and make false reports about him to law enforcement. I’m so terrified of him that I have stopped blogging.” The portrayal of the suspect is consistent throughout, and so will be believed by 10 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 anybody who isn’t familiar with what is really going on. Who could have imagined that the suspect is telling the truth and that it is these women who are lying and staging this show? The German Lady is sure: Since the image that is created here – a serial stalker who doesn’t know how to respect women’s boundaries and persistently drives them mad with his vandalism, stalking, schizophrenic delusions, and online slandering, while the women are completely helpless, innocent and unprotected by the system – fits the prevalent gender stereotypes (monster males victimizing innocent women), the judge, who already has a reputation for being biased toward women, is expected to be incensed, and, once the suspect shall be convicted of vandalism, will surely order that he not be allowed to talk about any of these women ever again. In this way, the Secret Society women will have accomplished its most important goal at the moment: to prevent the victim of their three-year long gang-stalking from ever speaking about how he has suffered in their hands. No one will ever hear about his victimization. The victim will have been silenced. And through the most sophisticated deception: everybody will believe that the victim is actually the victimizer. It might even happen that, when the alleged suspect attends the next court session, the DA will amend the complaint and add the additional charge of “stalking”, in the process raising the bail and obliging the sheriff to take him back to jail. The Secret Society women will then have their revenge for their failed confidential stalking claim against him in the past two months. Presumably, the gang will also tell the DA: “We are afraid to visit his website. For he will identify our visits, and then develop some delusional scenario about what we are doing on his website, like how we have formed a secret society to go after him. I have to send friends to visit it.” This can further demonize the suspect to the DA and motivate him. After noticing these visits, however, the suspect has quickly removed the documents “timelinepartIII-s.pdf” and “11_08_81.pdf” from his website. However, it’s not clear that, when the Secret Society women shall report their matter to the DA, the latter will make the effort to check his website to see if they are telling the truth. Note that it is tonight that the “Princeton decoy” makes its first appearance: 12:30 AM: 128.112.155.170 - - [07/Nov/2015:01:30:30 -0700] "GET /scientificenlightenment1/totem2.jpeg HTTP/1.1" 200 12204 "http://www.lawrencechin2011.com/scientificenlightenment1/ancestorcult.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" 3:19 AM: 128.112.155.173 - - [07/Nov/2015:04:19:32 -0700] "GET /scientificenlightenment1/americanlanguagefamilies.jpg HTTP/1.1" 200 155609 "http://www.lawrencechin2011.com/scientificenlightenment1/humandispersal.html" "Mozilla/5.0 11 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" 7 November (Saturday) There are no visits from the Secret Society at all in the afternoon (in regard to this mew operation of theirs, that is). The Secret Society must be discussing the implementation of their latest strategy all afternoon and evening. This is because, by night, they have had to send out another scout: 9:23 PM, 104.57.6.21, lightspeed.dybhfl.sbcglobal.net, Oviedo, Florida. 104.57.6.21 - - [07/Nov/2015:22:23:31 -0700] "GET /suppl_pld_8bg42/suppl_pld_8bg42c1v.pdf HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7" 104.57.6.21 - - [07/Nov/2015:22:23:33 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/suppl_pld_8bg42/suppl_pld_8bg42c1v.pdf" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7" The document is not there. Nevertheless, they were obviously Googling “LAWRC ANGB” to see if it’s still possible to find ANG’s full name mentioned somewhere on the suspect’s website. This is because their entire case – persuading the DA to add a new stalking charge to the vandalism charges – will have to depend on the identification of “Pyramid” as referring to ANG. Who did the suspect mean by “Pyramid”? The Secret Society is probably disappointed. If ANG’s name is not to be found anywhere on the suspect’s website, the DA might reply: “We need evidence proving indisputably that the ‘delusion’ he has developed about this woman ‘Pyramid’ really is about you.” The Secret Society women probably think that they could still make the DA accept their request by bringing in library employees from the past to testify that the suspect used to call ANG “pyramid”. In defense, the suspect, by late night, has posted the above on his blog (up to 6 November only), hoping that the Secret Society women might check it and be prompted to change their plan. 8 November (Sunday) It would seem that the Secret Society women have continued their discussion even past midnight. For, by 3:37 AM, they have had to send in another scout to ascertain something: customer.lyse.net, Oslo, Norway, 51.175.152.52 - - [08/Nov/2015:04:37:44 -0700] "GET /links.html HTTP/1.1" 200 19628 "https://www.google.no/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 12 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 The scout is asked to look at the suspect’s link page probably in order to locate the link to SDW’s blog on it. It may be that the Secret Society women feel that, even though it’s possible to make out SDW’s relatives’ names on one of the documents, it would be better if a concrete reference can be found on the suspect’s website which directly and unambiguously identifies who this “SDW” is. Again, it’s not clear if the link which the Secret Society women now find on the suspect’s link page could count as supporting evidence, since the designation “SDW” is not found but only SDW’s original name. Nevertheless, the link to SDW’s blog on the link page would be evidence to convince the DA that the suspect is cyberstalking her. Then, 19 minutes later, the scout is asked by the Secret Society women to look for the Korean Letter again: 51.175.152.52 - - [08/Nov/2015:04:56:42 -0700] "GET /korealetter-censored/korealettercensored.pdf HTTP/1.1" 200 201113 "https://www.google.no/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" This is probably the Secret Society women’s evidence that the suspect’s insanity has shot through the roof and that he is beyond repair. It would seem that the Secret Society women have not finished their discussion and planning until 7:35 PM. After 8 PM, the German Lady has returned home, it would seem, and ordered the resumption of decoy visits to the suspect’s website. When the Secret Society women – ANG, SDW, and the German Lady – shall go to the DA, they will very likely, after making the above arguments to the DA, also produce the Korean Letter and tell the DA: “This letter is demonstration of the enormous insanity of the alleged suspect. Therefore, when you add the new stalking charge to the vandalism charges and send him back into custody, you must also request to the judge that he not be allowed any bail. His insanity is so severe that he is too much a danger. This Korean Letter should also enable you to declare him insane beyond repair, and so incompetent to stand trial, so that he may be sent for mental evaluation.” ANG’s, and the other women’s, goal is to trap the suspect indefinitely in jail or in state mental hospital. It has caused them too much trauma that he bailed himself out two months ago. This time they must eliminate this possibility. What is noteworthy about the suspect is that, tonight, a little past midnight, he would watch on Youtube Canal Plus' special report on “FN: L'oeil de Moscou”. The documentary is about how a Russian front bank has once lent 11 million Euros to the National Front (FN). The suspect is absolutely surprised that FN is more deeply into the Russians than he has ever thought. While the video is more cause for the French to demand access to the suspect's online accounts, the TMU/ CIA team would use this as ground for refusal: “He is pro-Russian, and so pro-FN. He aims to benefit Marine. He means no harm.” Meanwhile, the suspect is so worried about the Secret Society women's upcoming actions that he is unable to fall asleep. 13 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 9 November (Monday) It’s not clear whether the Secret Society women have gone to the DA this afternoon. They are evidently busy with something this afternoon, so that there are no activities from them on the suspect’s website during this time. They could be talking to the DA, or to the French, or simply among themselves. There is something noteworthy about the suspect's actions today. He wakes up past 9 AM. Didn’t feel like going to Work Source due to severe anxiety associated with the Secret Society’s upcoming assault. Casbah. Then 3 PM, Chrysalis. He cries to Tanisha about Secret Society women's actions. Then he comes to Starbucks and does a Google search on SDW. A suspicious Hispanic guy having two cellphones seems to be a surveillance agent watching over him. Indeed! Clearly, while the TMU/ CIA is debating with the French about whether Homeland Security's profile of him is correct, this is the evidence which they will point to: “The women's claim that he is stalking them because he is obsessed with them is simply incorrect. As you can see, he is searching for their information online only because he is trying to figure out how they are trying to get him. There is no obsession involved.” When the suspect returns to Chrysalis for dinner, he is reprimanded by George. Afterwards, he goes to Urban Ministry and has another talk with Fr Bob about his “problem”. Fr Bob is incredulous. Has Homeland Security warned him? Whatever they are doing in the afternoon, by night, the Secret Society women have finally decided to check the suspect’s blog to see if he has discovered, and blogged about, their latest planning. Thus, on 8:45 PM, they send a scout to check the suspect’s blog. The scout uses a 14 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 proxy service offered by Quadra Net in Los Angeles. This scout has been here before: he’s a regular member of the Secret Society. He comes to the front page, and then immediately goes to the blog. 204.152.206.231 - - [09/Nov/2015:21:45:12 -0700] "GET /blogs/ HTTP/1.0" 200 35729 "http://lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0" The scout must have reported back to the Secret Society women saying that the suspect has indeed blogged about the women’s latest plan to exterminate him using PD’s case. In the next two and a half hour, the Secret Society women would go into scrambling, for their plan has been exposed and all the most important evidences on which they would base their case have been removed. On 11:18 PM, the suspect even deletes the link to SDW’s blog on his external links page, although the Secret Society women haven’t discovered this yet. After much discussion, the women have decided to call up their old friend AAM at LUG for help. Because the Secret Society women continue to believe, incorrectly, that the suspect is able to get wind of their planning through superior computer skills, they need somebody good with computers to help them out. Another problem is that, since the suspect has supposedly removed timelinepartIII-s.pdf, there is no longer ground for SDW to participate to strengthen the case about the suspect’s “stalking” of ANG. The Secret Society women evidently think that this defect could be compensated by bringing in another voice complaining about the suspect’s criminal blogging about people without their consent. He has once blogged about AAM, back in January 2014. And so they want AAM to come and obtain the evidences for his complaint, so that, when time comes for meeting with the DA, AAM could go with ANG, the German Lady, and SDW to the DA office to make their case and request the addition of a stalking charge to the vandalism charges. From 11:37 PM until 11:46 PM, AAM comes to the suspect’s website. He takes care to use Google proxy to disguise himself. He is using his iPhone instead of his computer. He first Googles for the front page. 66.249.84.148 - - [10/Nov/2015:00:37:52 -0700] "GET / HTTP/1.1" 200 10529 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" 66.249.84.149 - - [10/Nov/2015:00:37:52 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" 66.249.84.148 - - [10/Nov/2015:00:37:53 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" Two minutes later, he goes to the suspect’s blog: 15 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 66.249.84.147 - - [10/Nov/2015:00:39:13 -0700] "GET /blogs HTTP/1.1" 301 580 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" …. He immediately begins searching for his name. 66.249.84.83 - - [10/Nov/2015:00:39:28 -0700] "GET /blogs/?s=Aam-- HTTP/1.1" 200 3728 "http://lawrencechin2011.com/blogs/?p=83" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" 66.249.84.84 - - [10/Nov/2015:00:39:40 -0700] "GET /blogs/?s=aam-- HTTP/1.1" 200 3727 "http://lawrencechin2011.com/blogs/?s=Aam--" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" Finding nothing, he tries “LUG”: 66.249.84.83 - - [10/Nov/2015:00:39:48 -0700] "GET /blogs/?s=Lug HTTP/1.1" 200 3728 "http://lawrencechin2011.com/blogs/?s=aamoy" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" Finding nothing, he tries “Linux”: 66.249.84.85 - - [10/Nov/2015:00:39:53 -0700] "GET /blogs/?s=Linux HTTP/1.1" 200 4444 "http://lawrencechin2011.com/blogs/?s=Lug" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" …. 66.249.84.85 - - [10/Nov/2015:00:40:01 -0700] "GET /blogs/?p=72 HTTP/1.1" 200 10086 "http://lawrencechin2011.com/blogs/?s=Linux" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" 66.249.84.83 - - [10/Nov/2015:00:41:08 -0700] "GET /blogs/?p=83 HTTP/1.1" 200 13380 "http://lawrencechin2011.com/blogs/?s=Linux" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" This is “Saving GR, Part II”. The post isn’t related to him. ….. 16 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 He is then, 3 minutes later, directed by the Secret Society women to look for the letter to UNCHR-WA: 66.249.84.84 - - [10/Nov/2015:00:44:21 -0700] "GET /for_unhcr_wa.pdf HTTP/1.1" 200 16160252 "http://lawrencechin2011.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" …. Since the ground for SDW’s participation has just been pulled away, the Secret Society women have decided to concentrate on the suspect’s habit of writing letters to government institutions as the surest way to put him away for good. This letter to the UN High Commissioner for Refugees shall reinforce the Korean Letter in the accomplishment of this purpose. The Secret Society women want AAM to bring this letter to the DA to establish the argument: “The suspect is truly insane beyond repair. He has been so motivated by his schizophrenic delusion about this government conspiracy against him that he has been writing letters to United Nations agencies not knowing that it’s all just in his mind. Earlier you have seen his letter to the NK ambassador to the UN to the same effect. Now this. You must request the judge to deny him bail and send him to state mental hospital at once. He’s too much a danger to be let loose on the streets. Why? This is proof that he doesn’t know that he is deluded, and will act on his delusions. We believe that he’s stalking us because he really couldn’t help it, because he is motivated by his delusional belief about the women he’s obsessed with. There’s no possible cure for him; therefore he must be locked up forever.” You see, to have her vengeance on her victim in response to the TMU’s dismissal of her latest stalking claim and humiliation of her, ANG is probably planning to lie to the DA about the failed sting operation on 2 November. She is going to lie outright and say the suspect has stalked her. This would then enable the German Lady and SDW to ride on her back. Having downloaded it, AAM then Googles for the suspect’s recent portraits: 66.249.84.148 - - [10/Nov/2015:00:45:53 -0700] "GET /gallery/drawLA.html HTTP/1.1" 200 1061 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" …. It would seem that that he is just trying to create decoys in order to disguise his true purpose. (Unless it has something to do with the French: Marion's portrait is on the page.) From there, he goes to the suspect’s web gallery: 66.249.84.149 - - [10/Nov/2015:00:46:11 -0700] "GET /gallery/gallery.html HTTP/1.1" 200 4452 "http://www.lawrencechin2011.com/gallery/drawLA.html" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" …. 17 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Again, just decoys. He is then directed by the Secret Society women to find a series of old blog posts: 66.249.84.83 - - [10/Nov/2015:00:46:41 -0700] "GET /archivedblogs/ HTTP/1.1" 200 613 "http://lawrencechin2011.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" 66.249.84.84 - - [10/Nov/2015:00:46:49 -0700] "GET /archivedblogs/02-14/ HTTP/1.1" 200 499 "http://lawrencechin2011.com/archivedblogs/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" 66.249.84.84 - - [10/Nov/2015:00:46:52 -0700] "GET /archivedblogs/02-14/myblog3714.pdf HTTP/1.1" 200 210977 "http://lawrencechin2011.com/archivedblogs/02-14/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/46.0.2490.73 Mobile/13B143 Safari/600.1.4" The blog posts not only include a post about SDW, but also some posts about how AAM was helping KRN to go after the suspect in January 2014. Evidently, although the identification of SDW on the suspect’s website is no longer on the table, SDW is still going to try her chance with the DA. To compensate the lack of identification, she wants AAM to bring in this blog series as additional evidence to support her claim that she is terribly afraid because the suspect is obsessed with her (in March 2014, that is). Then, AAM would also be instructed to add his own complaint in the same vein about the suspect: “He’s delusional. He believed I was helping this unknown woman named ‘Kiersten’ to go after him. I’m terrified of him. And he blogged about his paranoid delusions to embarrass me. Please remove him and his website and don’t ever let him out.” He would of course prefer to find his name on the suspect’s new blog instead of having to dig into the archive of old materials from almost two years ago. Then, on 12:52 AM, the suspect adds the entries for 7 and 8 November to the latest blog post. However, it seems that, within an hour, the Secret Society women have discovered the latest entries. For, on 2:01 AM, they seem to have sent in another scout to check the suspect’s website again: Telefonica de Peru, proxy: 200.48.4.153 - - [10/Nov/2015:03:01:45 -0700] "GET /blogs/ HTTP/1.1" 301 375 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0" 200.48.4.153 - - [10/Nov/2015:03:01:48 -0700] "GET /blogs/ HTTP/1.1" 200 37884 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0" The Secret Society women must be even more disappointed. The suspect even knows about their plan to request the denial of bail on ground of his grave insanity. 10 November (Tuesday) 18 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 The Secret Society women are probably nervous about the insufficiency of their evidences in support of their case. So early in the morning – a sign that they didn’t sleep much being too preoccupied with their “life goal” to exterminate the suspect – on 6:50 AM, they send in another scout to check if the single most important document concerning SDW has indeed been removed: 66.97.29.2, Belleville, Ontario. 66.97.29.2 - - [10/Nov/2015:07:50:38 -0700] "GET /timelinepartIII-s/timelinepartIII-s.pdf HTTP/1.1" 404 1360 "https://www.google.ca/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" It is indeed removed: bad news. Then, on 8:16 AM, SDW directs another scout to the suspect’s website: 68.37.6.53, Comcast, Ann Arbor, Michigan. 68.37.6.53 - - [10/Nov/2015:09:16:17 -0700] "GET /blogs/wpcontent/uploads/2014/07/faassen3.png HTTP/1.1" 404 1360 "http://www.bing.com/images/search? q=maria+faassen+putin&view=detailv2&&id=07DA88F85410FE2AD4C921E992DB20072906 2259&selectedIndex=148&ccid=azthEKIt&simid=608054506749627628&thid=OIP.M6b3b611 0a22d2d9aa6a4ede4f2da7168o0&mode=overlay" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/537.86.2" SDW is hoping that it’s still possible to find EKT’s pictures on the suspect’s website. Why? She could be looking for ways to strengthen the argument that the suspect must be denied bail due to his severe obsession with everything connected with governments, not only writing insane letters to government agencies but also constantly obsessing over the daughters of political figures. But she could also be thinking about summoning EKT to participate in the complaint. In fact, she could be doing this under Homeland Security's instruction (to confirm their false profile of the suspect). Unfortunately, there are no pictures. As SDW ponders on the problem of the weakness of the Secret Society’s case – specifically the lack of her identification on the suspect’s website – she sends in another scout to verify that the document which the suspect has supposedly linked from his comments on her blog is still there. Thus, on 9:25 AM, 95.134.16.184, JSC Ukrtelecom, Ukraine. 95.134.16.184 - - [10/Nov/2015:10:25:06 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/suppl_pld-------/suppl_pld-------.pdf" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 95.134.16.184 - - [10/Nov/2015:10:25:05 -0700] "GET /suppl_pld_4_60bg/suppl_pld_4_60bg.pdf HTTP/1.1" 200 951826 "https://www.google.com.ua/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 19 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 At least this document isn’t removed. After some discussion, the Secret Society women decide that the best way to compensate the current insufficiency of evidence (lack of identification of both ANG and SDW on the alleged suspect’s website) is to gather more evidences in support of their claim that the suspect must be put away without bail because he couldn’t be dissuaded from his severe paranoid delusion and would act on it, such as writing crazy letters to government agencies. On 10:49 AM, the Secret Society send in this scout: 120.56.135.176, Google IN, vol1appendix.pdf, Delhi. 120.56.135.176 - - [10/Nov/2015:11:49:50 -0700] "GET /vol1appendix/vol1appendixg.pdf HTTP/1.1" 200 159538 "https://www.google.co.in/" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" This document should provide the DA with a little more details about the severity of the suspect’s schizophrenic delusions: all that CIA, MSS, ICJ business; imagining himself to be at one time mistaken for a terrorist suspect, etc. Two hours later, the Secret Society sends in another scout to fish for more materials along this line. On 1:18 PM, 108.247.125.33, Campbell, CA. 108.247.125.33 - - [10/Nov/2015:14:18:15 -0700] "GET /blogs/tag/cia/ HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" They want more evidences about the suspect’s rambling about the CIA. Unfortunately, what they are looking for isn’t there. Then, on 1:55 PM, 131.107.192.99, Microsoft Corporation. 131.107.192.99 - - [10/Nov/2015:14:55:52 -0700] "GET /karins_meetup_8bg2/kurtsblog0408.pdf HTTP/1.1" 200 55313 "https://www.google.com/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.10240" Here is indication that the Secret Society women have a recruit within Microsoft. This is a blog post from 7 years ago where the suspect expressed his fondness for the German Lady. It should serve as support for the Secret Society women’s claim: “This guy has the habit of obsessing over women and then, because of his paranoia schizophrenia, imagining them to be involved in a government conspiracy against him. He has done that not only with ANG, but also with the German Lady and SDW.” This blog post should serve as a companion to the one about SDW which AAM has downloaded last night. There are no activities from the Secret Society between 2 PM and 6 PM. It’s not clear whether they have gone to the DA today. Probably not, for their appointment seems to be for Friday. By 6 PM, the Secret Society women either are worried that the document may be gone as well on which this “Pyramid” is mentioned in what they would claim to be the suspect’s bizarre delusion 20 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 about ANG (how a whole nation goes down because of her), or have to pretend to find it again in order to re-stage the show “how ANG, the German Lady, SDW, and AAM could have come to know each other”. Thus, on 6:25 PM, they send this scout to download the same document again: 95.88.233.232, Neunkirchen, Saarland, Germany. 95.88.233.232 - - [10/Nov/2015:19:25:07 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1" 200 592393 "http://www.google.de/url? sa=t&rct=j&q=&esrc=s&source=web&cd=19&ved=0CFwQFjAIOApqFQoTCNuroLSoh8kCFc SADwoddFgKbg&url=http%3A%2F%2Fwww.lawrencechin2011.com %2Fcheneyplan25%2Fcheneyplan25.pdf&usg=AFQjCNF-OnNpEEHj9nii0YiNXVebJkPDPg" "Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko" Thank God the suspect has never removed this chapter. Then the Secret Society women want more evidences to support their claim that the suspect’s mind is beyond repair, with all his schizophrenic delusion about the CIA, the MSS, and the International Court of Justice. Thus, on 6:54 PM, another scout: 136.0.16.207, EGI Hosting, San Francisco. 136.0.16.207 - - [10/Nov/2015:19:54:41 -0700] "GET /vol2appendix/vol2appendixd.pdf HTTP/1.1" 200 158709 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.85 Safari/537.36" No more collection of evidences tonight until after midnight. What follows must be further discussion. Then, on 1:32 AM, the Secret Society send in another scout to check the other document which the suspect has once linked from his comments on SDW’s blog: myvzw.com, Verizon Wireless, Kansas City, Missouri. Is this PD’s friend in Kansas City seen for the first time on 6 May? 70.195.12.253 - - [11/Nov/2015:02:32:39 -0700] "GET /suppl_pld_9_139/suppl_pld_9_139b.pdf HTTP/1.1" 200 5127870 "http://------gangstalking.com/-----/" "Mozilla/5.0 (iPhone; CPU iPhone OS 7_1_1 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D201 Safari/9537.53" The Secret Society women are, again, trying to compensate the lack of identification of SDW on the suspect’s website by collecting more circumstantial evidences indicating who this “SDW” most likely is. What’s very important to note is the fact that, on this document, “Pyramid” is used to refer to a woman with a slightly different name than ANG. Today is a very important day for the alleged suspect in another connection. Past midnight, before going to bed, he finally uploads his “Why we support Marine LP” to his website. Knowing that he is in grave danger, he must finish it as fast as possible. Coincidentally, he introduces his essay with the warning, “Endorsement from the Most Detestable might very well be the kiss of death.” Then, after he wakes up, it would be a busy afternoon for him as well. 11 November (Wednesday) 21 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Since very early on this morning, the Secret Society women begin collecting more evidences to strengthen their case. Again, evidences in support of their claim that the suspect must be denied bail because he would act on his delusions and cannot be dissuaded therefrom. Thus, on 6:03 AM, 178.62.249.115, Digital Ocean, proxy, Amsterdam. 178.62.249.115 - - [11/Nov/2015:07:03:54 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/petition/c0901379jl/CMC_c091379jl.pdf" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Dragon/45.6.11.383 Chrome/45.0.2454.93 Safari/537.36" 178.62.249.115 - - [11/Nov/2015:07:03:53 -0700] "GET /petition/c0901379jl/CMC_c091379jl.pdf HTTP/1.1" 200 2426010 "https://www.google.nl/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Dragon/45.6.11.383 Chrome/45.0.2454.93 Safari/537.36" This is judge’s order for case management conference in the suspect’s lawsuit against Mr Frakov in 2009. More evidence to bring to the DA: the suspect has not only written letters to NK ambassador to the UN and the UN High Commissioner for Refugees, but has also filed a lawsuit against a foreign government official. This document would serve as a companion to the crazy lawsuit which the suspect has filed against ANG in 2010. Then, on 8:15 AM, the Secret Society women want to check again that the document on which “Pyramid” is mentioned has not been removed – since this would be the “entry point” (along with the false claim about “stalking”) of their case for the addition of a stalking charge: 105.158.65.214, Maroc Telecom, Meknes, Morocco. 105.158.65.214 - - [11/Nov/2015:09:15:54 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1" 200 17057 "http://www.google.fr/url?sa=t&source=web&cd=49&rct=j&q=zwack %20einige%20originalschriften%20en %20pdf&ved=0CDAQFjAIOChqFQoTCKTOrIfiiMkCFQMDGgodq-UKhQ&url=http%3A%2F %2Fwww.lawrencechin2011.com%2Fcheneyplan25%2Fcheneyplan25.pdf&usg=AFQjCNFOnNpEEHj9nii0YiNXVebJkPDPg" "Mozilla/5.0 (Linux; U; Android 4.2.2; fr-fr; GT-S7580 Build/JDQ39) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30" He comes again on 8:29 AM, 105.158.65.214 - - [11/Nov/2015:09:29:21 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1" 200 17057 "http://www.google.fr/url?sa=t&source=web&cd=87&rct=j&q=einige %20originalschriften%20en %20pdf&ved=0CCgQFjAGOFBqFQoTCJuCmJLliMkCFUS2GgodFcMCwQ&url=http%3A %2F%2Fwww.lawrencechin2011.com %2Fcheneyplan25%2Fcheneyplan25.pdf&usg=AFQjCNF-OnNpEEHj9nii0YiNXVebJkPDPg" 22 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 "Mozilla/5.0 (Linux; U; Android 4.2.2; fr-fr; GT-S7580 Build/JDQ39) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30" Luckily for the Secret Society women, the suspect has refused to remove this chapter, despite his knowledge about its importance to the Secret Society women’s case. The Secret Society women wouldn’t send any more scouts to the suspect’s website throughout the rest of the day until midnight. Did they go to the DA? Probably not. Again, it seems that their appointment with the DA is for Friday. They might just be waiting, having collected all the evidences, and discussed things occasionally, nervous about Friday. Note that the German Lady is so involved in this business that she has even canceled the meetup (Any Language and Culture) she has originally scheduled for tonight. It's difficult to avoid the impression that the Secret Society women might be busy answering questions from the French all day. For this, we need to examine the suspect. By early afternoon, the suspect has arrived in Casbah. For the whole afternoon he is wondering what TMU detectives might think about Marion, etc., and has difficulty concentrating on writing the summary which he has been preparing of the Secret Society's operations against him. (This is “Being gangstalked by a group of women...”) Then, when he sits outside Casbah, this “Emily”, a PhD student studying Chinese at UCLA, comes to sit with him. The suspect has seen this before: this “Emily” is clearly a CIA operative. She skillfully leads the suspect to confess his admiration for the Chinese president Xi. Meanwhile, another operative is standing in front of them taking pictures of them both. Evidently, the TMU/ CIA is debating with the French in the ICJ about Homeland Security's false profile of the suspect. Even when the suspect has put up his “Marine essay” on his website, the TMU/ CIA team is still preventing the French from reading it. The French find it bizarre, because the suspect has noted in regard to the essay, “Endorsement from the Most Detestable...”, which sounds like a threat. The Agency is thus compelled to test the suspect this afternoon. From his confession emerges clearly the fact that the suspect has nothing but admiration for everyone on Russia's side – which thus includes “Marine” – and that Homeland Security's, and the Secret Society women's, claim that the suspect poses danger to her is all but nonsense. The CIA would point out to the ICJ judges that the suspect's admiration for “Marine” is motivated by geopolitical considerations and has nothing to do with heterosexual obsession. The Secret Society women's claim that the suspect would get obsessed with women out of sexual perversion and then stalk them and hurt them not only is false, but doesn't even apply here. When the suspect goes back inside, he begins looking for online forums for FN discussions. A group of Swiss Germans then comes in – they seem to be testing the suspect again. (More CIA op, that is.) Then, the suspect notices this strange visit to his website: 5:41 PM, 50.54.72.219, Frontier Communications, Marion, Ohio. 50.54.72.219 - - [11/Nov/2015:18:41:17 -0700] "GET /1/epilogue225.html HTTP/1.1" 200 83648 "https://www.bing.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 23 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 50.54.72.219 - - [11/Nov/2015:18:41:23 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" This looks so much like a signal from the “Macrospherians”: that they plan to have “Marion” (namely, the rising star of FN and the niece of “Marine”) implement his program for “New Feminism”. In fact, this is a trick which the CIA has directed the TMU to play on the suspect. Then, half intentionally and half accidentally, the suspect watches Marina’s “Run” on Youtube (where she is riding the bus in front of Kremlin). The CIA has obtained the evidence they have desired. They would argue in the ICJ that the suspect has mistaken their “fake message” for a real message from the Russians, evidenced by the fact that he has attempted to return a “message” (going to Kremlin). Thus, evidence to support their claim that the suspect is attempting to use his status as a “terrorist cyberstalker of women” as a cover under which to share information with “Marine”. It's “conspiracy”. It's noteworthy that, 7 PM, when the suspect goes to Draw Anything LA meetup, he would meet “Christine”, another PhD student in English at UCLA. Then, after midnight, after so much nervousness and worrying that they might not succeed in persuading the DA on Friday, the Secret Society women send out a scout – somebody in Los Angeles, close to the suspect and everybody – to check once again the links on the PP Forum, hoping that, just per chance, a link might still be active allowing for the identification of SDW. Thus, on 12:09 AM, 70.211.147.84, Verizon Wireless, Los Angeles. 70.211.147.84 - - [12/Nov/2015:01:09:39 -0700] "GET /blogs/2014/--/--/last-word-on-my-pasttwo-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1360 "http://forum.------------.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 4.4.4; XT1080 Build/SU6-7.3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.76 Mobile Safari/537.36" No. The blog post is gone forever. The absence of evidences for direct identification of SDW must have gnawed at the Secret Society women, so that, on 2:11 AM, SDW, out of desperation, decides to collect the other document which narrates her first stalking claim against the suspect back in April 2014: prtc.net, San Juan, Puerto Rico. 72.50.46.73 - - [12/Nov/2015:03:11:27 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/timelinepartII-o/timelinepartII-o.pdf" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36" 72.50.46.73 - - [12/Nov/2015:03:11:27 -0700] "GET /timelinepartII-o/timelinepartII-o.pdf HTTP/1.1" 200 2165418 "https://www.google.com.pr/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36" It’s not clear to her and ANG and the German Lady whether this document would help at all, since not a single name is mentioned on it. Within 10 minutes, they ask another scout of theirs – 24 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 somebody in China – to check if the bad blog posts could perhaps be seen in China (perhaps it’s still cached in Baidu). Thus, on 2:22 AM, Nanchang: 182.106.212.139 - - [12/Nov/2015:03:32:41 -0700] "GET /blogs/2015/03/ HTTP/1.1" 404 1360 "http://www.baidu.com/link? url=wf0GPK2hODvWZyv0ERexWzDejnrWSqp4p8LUdkV2KeUX7_jaLknUQ5RDJ23TMd8fu 080os4HZPqFKw6Zo8Vcpq&wd=&eqid=feca00420002c9db0000000356446abc" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1" 182.106.212.139 - - [12/Nov/2015:03:32:44 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1" No. Gone forever. 12 November (Thursday) The only significant thing which the Secret Society women have done today is to send a scout to check once again to make sure that the suspect hasn’t removed the one single document on which “Pyramid” is mentioned. Without this document, there would be no claim about the suspect’s website at all. (AAM’s claim was rather weak.) Thus, on 10:53 AM, 178.220.103.208, dynamic.isp.telekom.rs, Nis, Serbia. 178.220.103.208 - - [12/Nov/2015:11:53:26 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1" 200 592393 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" This scout is probably using a proxy. Thanks God, the document is still there. Tomorrow is DDay. We should examine the suspect as well. He wakes up 10:30 AM. On bus toward SM to drop off a Thank You card at Goodwill. He notices that he has come under heavy surveillance. After dropoff, SM library, checked log, from 3 to 3:40 PM. Then, on bus coming back to Chrysalis. Couldn’t make it on time. He goes to Casbah instead. Severe headache all night. Then, a boy and a girl falsely accuses the suspect of recording them with his computer. What? The suspect has also begun requesting entry to Partisans Marine online forum and Facebook. He then notices more surveillance on bus 4 while going back to downtown. Clearly, what has happened is that CIA's test yesterday has done wonder. Homeland Security vehemently rejects the claim that their cartoonish portrayal of the suspect as a sexually perverted cyberstalker is incorrect and is afraid that the Agency might bring to the ICJ suspect's recordings of his conversations (taken from his website) as evidences. (The recordings might prove that the suspect is an intellectual motivated by rational concerns rather than by sexual perversions.) They thus send two operatives to pretend to be strangers and to falsely accuse the suspect while he is under surveillance. They will then bring the surveillance to ICJ as evidence and argue that these 25 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 two strangers' expressions indicate that the suspect is a “criminal recorder” so that his recordings should be banned from court as evidences. Meanwhile, these Homeland Security thugs would adhere to the Agency's claim that the suspect desires to “conspire” with the Russian/ French team, and they express this by putting him under heavy surveillance in case he might “link up with Russian secret agents”, etc. It should be noted that, tonight, the so-called “Korean scout” has appeared for the first time. 12:48 AM, 221.145.183.167 - - [13/Nov/2015:01:48:12 -0700] "GET / HTTP/1.1" 200 25666 "http://www.bloggang.com/event/membernew.html" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1)" 221.145.183.167 - - [13/Nov/2015:01:48:13 -0700] "GET / HTTP/1.1" 200 10636 "https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)" 221.145.183.167 - - [13/Nov/2015:01:48:14 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360 "https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)" 13 November (Friday, meeting with the DA) It seems that the Secret Society women are so nervous about their meeting with the DA today that they are up all night. Around 4:14 AM, feeling that their case about the suspect’s insanity still needs to be strengthened, they send another scout to collect more evidence: 90.171.47.221, Orange Espana, Barcelona, Spain. 90.171.47.221 - - [13/Nov/2015:05:14:38 -0700] "GET /karinaftrwrd11/karinaftrwrd11.pdf HTTP/1.1" 200 421045 "http://www.google.es/url? sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEsQFjAHahUKEwifyLK7pI3JAhXCtBQ KHU6GDpQ&url=http%3A%2F%2Fwww.lawrencechin2011.com %2Fkarinaftrwrd11%2Fkarinaftrwrd11.pdf&usg=AFQjCNGus7IMibWIDay_Jp0LIFwfby5Yhg &sig2=81iOhX1vlp_tsNqomCtNzg" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko" This is further illustration of the suspect’s bizarre schizophrenic delusion about some International Court trial which involves the CIA, MSS, and all those women he is obsessed with. The women’s appointment with the DA is probably around 11 AM. Again, since it’s very likely that ANG has decided to lie about the sting operation which the TMU has instructed her to run on the suspect on 2 November, she would thus begin: “He stalks me…” There is no evidence for that, since the sting operation has failed. However, ANG hopes to persuade the DA with her heart-wrenching story: “He stalks me because he’s obsessed with me. And, when he gets obsessed with a woman, he would develop, out of his paranoia schizophrenia, this delusion about her being part of some government conspiracy against him in some International Court trial. Look, he once even files this bizarre lawsuit 26 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 against me. He would then write about this ‘conspiracy’ and put it on his website to slander me and embarrass me.” She would then produce the document “The Cheney Plan”. But there is no evidence that the “Pyramid” on it refers to her. ANG would then produce all her colleagues from the law library, such as Ana, who would testify that the suspect used to call ANG “pyramid”. (ANG of course would have to carefully advise the DA not to look at the suspect’s blog, where he confesses just lately that “Pyramid” does not refer to her.) ANG would then continue to claim how terrified she is of the alleged suspect because he, when he notices strange visits that might or might not have come from her and her friends, would develop, due to his paranoid schizophrenia and persecution mania, this second delusional belief that ANG has formed a Secret Society with some other women to make false reports about him to law enforcement. She wants the DA to not only add a stalking charge, but also put the suspect away without bail and send him to mental hospital. He is just too much a danger to her, with his habit of stalking her, obsessing over her, and believing her to be part of some government conspiracy against him. ANG then describes how she has found the other women who are also described in the suspect’s voluminous writings on the government conspiracy against him, and presents the German Lady, KRN, and SDW to the DA. They all describe the same thing: how the suspect becomes obsessed with them, then stalks them (in the case of SDW, cyberstalks her and her family members), then believes that they are part of some government conspiracy against him (part of some CIA and Homeland Security operations with the involvement of the Russian and Chinese intelligence services, etc.), then writes about it online to slander and embarrass them, and now believes that they have formed a secret organization to make false reports about him to law enforcement. The German Lady would produce her 2008 restraining order against the suspect to prove that the he is so delusional that he believes she and her meetup friends were under government direction to file false reports about him to law enforcement. They all ask for the same thing: on the next court day, to lock up the suspect and never let him out on bail but send him deep into the state mental hospital, and then remove his website. AAM would then add that he also feels threatened by the suspect, since he has developed this weird delusional belief that he is helping this woman named “Kiersten” (KRN) to go after him. The women produce their evidences: several chapters describing a bizarre CIA, MSS, SVR, and ICJ business; several blog posts about obsessions with the German Lady and SDW; and several documents narrating these women and AAM and many others forming a secret gang to go after him (visiting his website and making false reports about him.) They then also produce the letters which the suspect has once written to NK ambassador to the UN, the lawsuit he has filed against Mr Frakov, and the letter he has written to the UN High Commissioner on Refugees. They add: “He wrote all these crazy letters and filed this crazy lawsuit, like the ones he filed against us, because he so believes in his schizophrenic delusions that he can’t possibly be dissuaded therefrom. And he would act on it.” Then ANG would lie: “I believe he is currently stalking me because he is acting out his delusional belief about me. Please, I am in danger. Please tell the judge and put him behind bars without the possibility of getting out.” 27 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Given such persuasive argument, however, it seems that the DA feels that evidences are insufficient. Desperate, the German Lady directs the DA to look at the suspect’s website for himself. The German Lady, the only person among the Secret Society women who has studied the suspect’s writings and recordings from HK Hacker’s cache, knows exactly where to direct the DA: to the webpage hosting the lawsuit the suspect has once filed against Mr Frakov. Thus, from 11:27 AM until 11:35 AM or so, visits to the suspect’s website from the DA office: 159.83.252.230, City of Los Angeles, Internal Service Division. 159.83.252.230 - - [13/Nov/2015:12:27:14 -0700] "GET / HTTP/1.1" 200 10636 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)" 159.83.252.230 - - [13/Nov/2015:12:27:15 -0700] "GET / HTTP/1.1" 200 10636 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)" 159.83.252.230 - - [13/Nov/2015:12:27:16 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)" 159.83.252.230 - - [13/Nov/2015:12:28:14 -0700] "GET /lawsuit.html HTTP/1.1" 200 9781 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)" 159.83.252.230 - - [13/Nov/2015:12:29:18 -0700] "GET /petition/attachment15/jennifer_yoh_06_31_PM_Saturday_23_August_2008.mp3 HTTP/1.1" 200 1109624 "http://www.lawrencechin2011.com/lawsuit.html" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)" 159.83.252.230 - - [13/Nov/2015:12:31:02 -0700] "GET /petition/attachment15/jennifer_yoh_06_33_PM_Saturday_23_August_2008.mp3 HTTP/1.1" 200 759415 "http://www.lawrencechin2011.com/lawsuit.html" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)" 159.83.252.230 - - [13/Nov/2015:12:28:41 -0700] "GET /petition/attachment9/at_mex_restau_olive_venice_(computer)_12_03_08_ca_1254PM.WMA HTTP/1.1" 200 9989442 "http://www.lawrencechin2011.com/lawsuit.html" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)" 159.83.252.230 - - [13/Nov/2015:12:31:11 -0700] "GET /petition/attachment16/with_wes_2008_09_04.mp3 HTTP/1.1" 200 6002936 "http://www.lawrencechin2011.com/lawsuit.html" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)" 159.83.252.230 - - [13/Nov/2015:12:34:30 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)" 159.83.252.230 - - [13/Nov/2015:12:34:41 -0700] "GET /newsummaryweb.html HTTP/1.1" 200 68269 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)" There are simply nothing incriminating at all in the first three recordings. But, in the last recording, the DA could hear that even the suspect’s best friend was accusing him of falsely 28 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 suspecting him of making false reports to law enforcement. Note that, after listening for the recording for three minutes, the DA then returns to the front page to look at “The story behind…”. The women also want to remind him of the suspect’s bizarre schizophrenic delusion about his implantation of brain chips. The fact that the women have not visited this webpage and listened to the recordings here in the past week – have not rehearsed the discovery of this section – is indication that the German Lady has come up with this on the spur of the moment, because the DA is not inclined to accept the three women’s claims. The situation is very bad for the suspect, of course, because the DA is not familiar with the circumstances under which the conversations took place. The German Lady has purposely selected fragments from the suspect’s website and taken them out of context so that they could become completely unintelligible and look like evidences for the suspect’s grave insanity. While there was no false reporting back in 2008, there was false reporting in 2013 and 2014. The German Lady have understood well that people can only understand black-and-white pictures: that they would assume that, if somebody was wrong at one time, he must be wrong all the time. In reality, right now, the three women are making false reports to the DA. It’s not clear, however, whether the DA has accepted the argument. Within 30 minutes, the three women would instruct another scout to check out the suspect’s website: 12:17 PM, 143.207.49.203, techb.andrews.edu, Andrews University, Berrien Springs, Michigan. 143.207.49.203 - - [13/Nov/2015:13:17:15 -0700] "GET /petition/E/ HTTP/1.1" 200 2949 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 143.207.49.203 - - [13/Nov/2015:13:17:15 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/petition/E/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 143.207.49.203 - - [13/Nov/2015:13:18:05 -0700] "GET /petition/ HTTP/1.1" 200 852 "http://www.lawrencechin2011.com/petition/E/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 143.207.49.203 - - [13/Nov/2015:13:18:09 -0700] "GET /petition/attachment13/ HTTP/1.1" 200 517 "http://www.lawrencechin2011.com/petition/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 143.207.49.203 - - [13/Nov/2015:13:18:11 -0700] "GET /petition/attachment13/310-8235760.jpg HTTP/1.1" 200 123611 "http://www.lawrencechin2011.com/petition/attachment13/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 143.207.49.203 - - [13/Nov/2015:13:18:18 -0700] "GET /petition/attachment24/ HTTP/1.1" 200 533 "http://www.lawrencechin2011.com/petition/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 143.207.49.203 - - [13/Nov/2015:13:18:24 -0700] "GET /petition/S/ HTTP/1.1" 200 506 "http://www.lawrencechin2011.com/petition/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 143.207.49.203 - - [13/Nov/2015:13:18:30 -0700] "GET /petition/attachment44/ HTTP/1.1" 200 482 "http://www.lawrencechin2011.com/petition/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 29 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 143.207.49.203 - - [13/Nov/2015:13:17:33 -0700] "GET /petition/E/lawrence_drawing_karin_and_gabi_part_3.wmv HTTP/1.1" 200 200670106 "http://www.lawrencechin2011.com/petition/E/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" It’s the video showing the suspect drawing the German Lady. What’s so harmful about that? The women are probably telling the DA that he shouldn’t look at the suspect’s website himself, since the suspect would then notice it, and concoct, out of his schizophrenic delusion, some weird scenario as to why these women and their friends are looking at his website. Thus, the women persuad the DA to allow them to call in this scout to visit the website for him and tell him what else is on the suspect’s grotesque website. This scout from Andrews University is probably lying, making up horror stories about what she has seen. Since she is a university student, the four women have probably thought her to be a credible witness to the DA. While the Secret Society women are busy with the DA, the suspect has been permitted entry to Partisans, and is posting his first comment to introduce himself: Un admirateur de Marine à étranger se présente : Salut tous les frontistes! Je me suis inscrit hier, tout nouveau, et donc, je me vous présente. Je n’habite pas en France, mais en Californie. Je suis ici parce que, depuis je commence à étudier les pensées et la politique de Marine il y a quelques mois, et surtout depuis j’ai lu le nouveau livre de Marine, Pour que vive la France, le mois dernier, elle m’a complètement inspiré. J’ai une fois étudié en Belgique et en Québec, et donc Je parle français. Pourquoi toute cette admiration. Moi, ici, aux États-Unis, je pense, depuis long temps, à recréer un mouvement de gauche combattant la mondialisation. Il était surprenant de trouver les convergences idéologiques avec quelqu’une qu’on considère ‘l’extrême droite’. Effectivement, je suis, à ce moment, en train d’étudier tous les mouvements d’extrême droite en Europe, pour comprendre la lutte européenne contre la mondialisation et le projet de l’Union Européenne. Inutile d’expliquer toutes les raisons qui m’apportent ici. J’ai écrit un petit essai pour expliquer les convergences idéologiques entre les réformations que je souhaite un jour faire réaliser dans tous les mouvements de gauches partout dans le monde, et les programmes que Marine a adoptés pour le mouvement de droite de FN : http://www.xxxxxxxxxxxx2011.com/lepen3/lepen3l.pdf. (Désolé : cette pièce, écrit en anglais dans la plus part, semble parfois fonctionner comme une lettre ouverte à Marine, avec les suggestions qu’on souhaite faire adopter un jour par le FN.) 30 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Je suis, donc, pour me présenter à vous les frontistes, un étudiant étranger parmi vous, qui souhaite apprendre de l’étoile montant en la politique française. On admire Marine surtout parce qu’on souffre beaucoup ici, en Californie, de la ‘politiquement correct’. On admire Marine de l’étranger aussi parce qu’on est convaincu que Marine, si élue le Présidente en 2017, va complètement changer le monde, à cause de la position spécifique et importante de la France. Marine va sauver le monde, on ose le dire. On n’en est convaincu. Marine ne donc concerne pas seulement la France, mais le monde entière. Je suis ici pour connaître les discours, les discussions, les pensées, et les luttes des frontistes en France. J’espère être bienvenu parmi vous, même si je ne peux pas voter dans les prochaines élections pour Marine. The Third ICJ Trial In full swing, after the Paris attacks 13 November (Friday, continued) It appears that the DA didn’t grant ANG her request to add a stalking charge. The reasons seem to be: (1) there is no evidence that “stalking” has occurred; (2) the evidences about the suspect’s bizarre paranoia and schizophrenic delusion are too old (the women have to prove that the suspect is still currently engrossed in the same schizophrenic delusion); and (3) evidences are insufficient for demonstrating that “SDW” and “Pyramid” refer to ANG and her “new friend”. It appears that, by now, the story about the Secret Society women is becoming one of “false flag online harassment”. Year after year, as the suspect’s stories about the German Lady and the “Pyramid” (and SDW and KRN as well) stand on his website, nobody every pays attention to them, let alone wanting to identify who these “Pyramid”, “SDW”, and “KRN” are. Nobody really visits the suspect’s website except for the Secret Society women themselves. This fact has severely obstructed the women’s attempt to add a new stalking charge to PD’s case. Solution: simply instruct their friends and online friends to pretend to be strangers surfing onto the suspect’s website, getting freaked out by his bizarre delusions about his women victims, identifying who they are, and contacting them to express concern about their safety. The Secret Society women will stage their own victimization if none has occurred. What the suspect has not yet known is that, while the women are meeting with the DA – and while he is making his introduction at Partisans – massive terrorist attacks are in progress in Paris. Because of the seriousness of the matter, the French and the Russians now demand access to the suspect’s Marine essay and his Russian soft-power document and everything else: the French have every right to look into every lead at a time like this. But everybody on the US side still refuses. The debate between the US parties on one side and the French and the Russians on 31 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 the other thus intensifies after the Paris attacks. The US' argument remains: EKT is using this opportunity to read the suspect’s writings, and the suspect is using this opportunity to share his “Marine document” with Marine. Conspiracy, violation of the spirit of the law. The debate intensifies whether the suspect has conspired with EKT and FN. The man leading the French team will most likely be Nicolas Bay, the Secretary General of FN. Now, note this visit. On 8:28 PM, 124.178.169.125, wel.bigpond.net.au, Thornlie, Australia. 124.178.169.125 - - [13/Nov/2015:21:28:34 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200 60041 "http://r.duckduckgo.com/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.10240" Did this have anything to do with the current debate at ICJ? Highly likely. It might be that, 8 hours after the Paris attacks, the Americans still haven't turned over those writings of the suspect which they are hiding. The French, now sure that, given the circumstances, they would not violate international agreement by obtaining the suspect's writings, have asked the Secret Society women to instruct one of their associates in Australia to obtain the document for them. (Thornlie is very near Perth; this might be the same person from Perth seen on 26 May 2014, 6:08 AM. At the very least related to the group of people from Perth seen in late May and early June, 2014.) The suspect of course knows right away that this is the work of the Secret Society women: the document was uploaded less than three days ago, and couldn’t even yet be found through Google searches. He assumes that the Secret Society wants this document because they believe that a single statement in the document about the ICJ (that FN will come to power thanks to an ICJ judgment, given his arrest) could serve as proof that the suspect’s schizophrenic delusion about the “government conspiracy against him” is an ongoing affair and has never subsided. 10:52 PM, the suspect posts the “latest warning, Part II” on his blog. This includes all his reconstruction of the Secret Society women's operations up to their meeting with the DA today. 14 November (Saturday) The Secret Society women didn’t send anybody to the suspect’s website today. It seems – this is really vague information here – that they have contacted the suspect’s best friend W again in order to recruit him to give false testimony about the current state of mental insanity of the suspect. This is seemly because the DA has just heard the recording, from 2008, of the conversation between the suspect and his best friend yesterday. The contact might have occurred yesterday night or earlier today. This is why, on 3:06 PM, when the suspect calls up his best friend, the latter actually answers the phone. He hasn’t spoken to his best friend ever since his release from jail. The latter has never responded to any of his calls for two months – most likely, again, due to blackmailing by the Secret Society women. It appears that his best friend is instructed by the Secret Society women to answer his calls and to confirm that he is still currently engrossed in the same schizophrenic delusion about nation-states, intelligence agencies, and the ICJ trial. And of course his best friend did obtain evidences to this effect. 32 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 However, W is now answering the suspect's calls probably also because the CIA, the TMU, and Homeland Security all want him to. The CIA/ TMU, Homeland Security, the French, and the Russians are having a hot debate about the suspect in the ICJ right now. What the suspect has said will be evidences in the debate. And so, let's review what the suspect has said (from 2:01:00): (1) W has refused to talk to avoid being recorded and posted. W is terribly confused. Or pretends to be confused. W is clearly carrying out an operation for Homeland Security. The suspect insists that the recording of the conversation is not going on his website. W is suggesting that everybody is confused because everybody is drunk, while the suspect is regarded as insane and is frustrated because he is the only person not drunk. This is a perfect example to illustrate America as the “Opposite Land”. (2) About the women's meeting with the DA yesterday. (3) Why the Social Security Administration continued to deposit money in the suspect's bank account. (4) Bias in the justice system: everyone automatically assumes the guy is the bad one and the victimizer and the girl the innocent snow white victim. The suspect feels endangered: about to be exterminated. (5) The women need evidence for the suspect's current engrossment in his schizophrenic delusion. That's why they need the “Marine document” (2:18:00). (6) How the suspect's “paranoia schizophrenic delusion” has developed: the current shape of the ICJ trial. FN will come to power per an ICJ judgment. “Regime change”. But the CIA is co-victim with the Russians. There is a conflict of interest among the victims about whether FN should come to power. “Regime change” in Poland last week. Not sure whether it is related to the (previous) ICJ trial at all. (7) About Marine's book. Marine, a “half-way” philosopher. Her theory is very similar to the suspect's, very similar to the critical theories. (8) Massive terrorist attacks just before the suspect posted on Partisans. Why is FN going to win the first round but not the second? (9) FN's connection with the Russians. The suspect fears being “blacklisted”. The single most important statement in this conversation is W's exclamation that the Paris attacks will help FN, to which the suspect makes no reply. We will come back to this a little later. By night, the suspect would suspect that the Secret Society women have instructed his best friend to record the phone call and then leave the recording somewhere online, pretending to defend himself against the suspect’s (imaginary) framing. The Secret Society women will then send their online friends to pretend to find the recording by accident, and then to find the women by accident. The Secret Society women will then bring the recording to the DA as evidence proving that the suspect is still currently engrossed in his schizophrenic delusion. The women might want to do this for other reasons as well. In the conversation, as you have heard, W has also pretended to react very negatively to his once putting up the recordings of their conversation online. If the DA swallows the show, he will put into his complaint that the suspect likes to criminally record people’s conversation and then put it online. This will further motivate the judge to order that all the materials the alleged suspect has ever put online be removed when he should be taken back into custody. If the suspect ever comes to trial in the future with the Secret Society women, it will also be problematic for him to bring to the court as evidences the recordings of his past conversation with them. KRN is especially concerned about this. Since KRN has made up this story about how the suspect has stalked her and harassed her, she’s terrified that the recordings of the past conversation between her and the suspect might prove just the opposite. She’s terrified 33 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 of being found out that the suspect is actually the opposite of how she has described him and that it is she who has stalked him. The women are traumatized by their failure in GR’s case: how the recording of the assault has contradicted the demonic portrayal which the women have prepared of the suspect in GR’s defense. In reality, W has pretended to react negatively to the suspect's recording habit certainly under Homeland Security instruction. Homeland Security wants the suspect to appear as a “criminal recorder” in the intercept of this conversation because they are still trying to exclude the suspect's recordings as evidences in the ICJ. The question is of course: why would W want to help the Secret Society women? Well, because Homeland Security has ordered him to! Now the CIA/ TMU would then instruct W to pretend to help the Secret Society women, because, in any case, they want W to talk to the suspect in order to obtain evidences for the upcoming debate in the ICJ. The trick is that, during the end of the call, the suspect asks W to not help the Secret Society women secure the needed evidence about the current state of his insane mind. If the Secret Society women have planned to stage a show of “accidentally finding the recording of the conversation” without having to summon W to the DA, this would be golden evidence that the suspect is still suffering grave paranoia believing that even his best friend will harm him. But he has said something about the “needed evidence about the current state of his insane mind”! The women can’t let the DA hear that the suspect is actually aware of the contours of their argument. How to overcome this difficulty? In any case, there is no visit to the suspect's website today evidently because everybody is busy. Busy being interviewed about the Paris attacks, that is. Now let's examine what must have happened on the side of government affairs. As noted, all the parties – French, Russians, TMU/ CIA, and Homeland Security – are debating hotly in the ICJ in consequence of the Paris attacks. Both the CIA/ TMU and Homeland Security would be accusing the Russians and the French of “conspiracy” with the suspect. This, in response to the fact that the Russians (perhaps representing EKT) and their French allies have just obtained the suspect's Marine document. All parties on the American side therefore ask the ICJ to forbid EKT and her French partners from implementing any ideas found on the document. The ground is this. The profile of the suspect as a violent and delusional “cyberstalker” and “misogynist terrorist” which Homeland Security has passed to EKT and the French cannot be used by her and her allies to fulfill the suspect’s wish to harm the United States. The original intent of the American law and international agreement in question is to protect EKT and Marine from harm by the suspect; it is not to enable them to fulfill the suspect's wish by using his ideas to harm the United States. Such is the meaning of “conspiracy”. Furthermore, insofar as the suspect, as a “misogynist terrorist”, is subject to enforcements under UN Resolution 1373, implementing any ideas similar to suspect's own is considered “terrorist attacks against American liberal women” and thus banned under international agreement. Both the Russians and the 34 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 French therefore cannot implement the ideas contained in the suspect’s writings by expanding on FN’s anti-American agendas. Although the CIA/ TMU are united with Homeland Security on this, the two parties sharply disagree on other matters since their respective profiles of the suspect are completely incompatible. According to CIA/ TMU's profile, there shouldn't even be any warning about the suspect in international databases for known terrorists, so that Homeland Security is in fact advertising the suspect's ideas to the French and the Russians and is only accusing them of conspiring with the suspect because they have got caught. Homeland Security's defense can only be to affirm that its profile of the suspect is correct – which would enable EKT and the French to implement the suspect's ideas – but then to accuse the suspect of having prior knowledge about EKT's and French's coming – “He knows what's going to happen, that you will use Paris attacks as an excuse to obtain his writings!” – so that EKT and her French friends can then be legally prohibited from implementing the suspect's ideas. When Homeland Security insists that the suspect has prior knowledge and is conspiring with the Russians and the French so that his writings should not be shared, however, they are defeating their own argument. Both the French and the Russians would then ask: “You mean he knows in advance that terrorist attacks will happen in Paris, which will provide us with the legal pretext to look into his writings despite your refusal?” Homeland Security is speechless. On top of conspiracy charges, everybody now has also to investigate whether the suspect has anything to do with the Paris attacks. (Well, it is bizarrely coincidental that he begins posting on Partisans just when Paris attacks are in progress.) This, again, is Homeland Security's fault. But the suspect will have to pay the price. On top of being a “domestic terrorist”, he is now also under investigation as an “international terrorist”. The French, Russians, TMU, and Homeland Security thus spend the whole day interviewing all the women of the Secret Society asking them whether the suspect has ever given out any hint about the Paris attacks beforehand. Presumably, the Secret Society women, while having learned that making false reports about terrorism might get them into trouble even though they are women, have nonetheless utilized the opportunity to report something vague enough which, while it wouldn't qualify as “false report”, might still provide the investigative agencies with reasons to regard the suspect with suspicion. The various agencies must have also interviewed other people whom the suspect has met in other contexts, such as Johanna, as you shall see. This must mean, however, that they must have also interviewed the suspect's public defender (Ms Warren). At least Homeland Security did. The terrible consequence of this for the suspect you will see later on. 15 November (Sunday) Since early morning, the Secret Society women sends in another scout: 5:13 AM, 86.98.220.184, alshamil.net.ae, Dubai. 35 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 86.98.220.184 - - [15/Nov/2015:06:13:54 -0700] "GET /vol2appendix/vol2appendixd.pdf HTTP/1.1" 200 158709 "http://www.google.ae/url? sa=t&rct=j&q=&esrc=s&source=web&cd=95&cad=rja&uact=8&ved=0CD8QFjAEOFpqFQoT CLyU8eHAkskCFYeJGgodSswBQw&url=http%3A%2F%2Fwww.lawrencechin2011.com %2Fvol2appendix %2Fvol2appendixd.pdf&usg=AFQjCNEmf0CwzRLjOY5rUo7cKLPl328JcQ&bvm=bv.1074675 06,d.d2s" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:19.0) Gecko/20100101 Firefox/19.0" This is sign that the Secret Society might have secured the help of Khalezov: he would email a notice to people he knew who would eventually pretend to find the Secret Society women saying the suspect is slandering their friend on his website, which notice the women will bring to the DA as well. This is merely circumstantial evidence, but it’s better than nothing: it can help establish that the suspect has had the habit of slandering people online with his schizophrenic delusion about them. Then, on 8:47 AM, a very significant search for the suspect’s latest “Marine essay”: 204.79.180.56. Note that there is no information on this IP address. It seems to belong to either Microsoft or Drake Holding. It seems to be somebody working inside Microsoft, in fact. 204.79.180.56 - - [15/Nov/2015:09:47:26 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200 704757 "http://www.bing.com/search?q=marine+le+pen&form=MSNH14&sc=8-4&sp=1&qs=n&sk=" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; Trident/5.0)" There are two possible explanations for this visit, in light of what has happened yesterday. The first is this. Finding itself in trouble, Homeland Security has thus mobilized all the “volunteers”, i.e., the members of the Secret Society’s online group around the world who are supposed to help the women stage “false-flag online harassment”. These people are now charged with the task of visiting the suspect’s website and then rumoring over communication channels about the suspect and his website in conformity to Homeland Security’s false profile of him, so that the rumors can be intercepted into the ICJ as evidences in support of Homeland Security’s case. The volunteers will pretend to show interest in the “suspect’s” insanity and track down every trace he has left behind before and then rumor about how “crazy” he is, etc. They will also pretend to discover the suspect’s big theory on line and then rumor falsely saying the suspect seems to have plagiarized all his writings. The second, and more likely, explanation is this – especially if this visit indeed comes from the interior of Microsoft. FN, in order to avoid charges of “conspiracy” with the suspect, has decided to do things by the book, honor Homeland Security's warning about the suspect as a “terrorist stalker of women”, and respond accordingly. They thus contact all search engines, including Microsoft's Bing, saying that the suspect's “Marine essay” constitutes cyber-harassment of their president (since it causes his name and her name to be associated together when people search for her name) and asking them to eliminate the document from search results when people search for Marine's name. Before taking action, the Bing personnel does a search for Marine's name to ascertain that the suspect's document will indeed come up among search results. 36 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 In the following, volunteers' visits to the suspect's academic writings (for the purpose of rumoring about his plagiarism) will not always be noted. Visits to the images embedded on his webpages (for the same purpose) will virtually never be noted – to save space. Only enough visits of such sort (plus decoys) shall be noted to convey a sense of the “cyber-bullying” and “cyber gang-stalking” to which the suspect is being subjected. Since the French and the Russians have obtained the suspect's latest Marine document Friday night, the TMU/ CIA team now goes in front of the ICJ judge and argue: “This writing is obviously done by a clear-headed intellectual. How can Homeland Security's profile be true? It's not like the French and the Russians have never heard of this guy before. They both know what bullshit Homeland Security's profile is. That document is evidence that neither the French nor the Russians have any reason to act on Homeland Security's warning. Our profile of the suspect is correct. The French and the Russians should therefore be forbidden from utilizing any ideas contained in the document. Furthermore, Homeland Security should be convicted of intentionally passing out false information to diplomatic services around the world and forbidden from doing so in the future.” The judges can clearly see that this is the case. Homeland Security, in order to defend themselves, would have to first of all prevent any of the suspect's recordings of his conversation with others (found on his website) from entering into evidence – for these prove that he is a high functioning intellectual. Hence W's fuss about the suspect's recordings yesterday. Homeland Security secondly would have to appeal to “victim confidentiality” – forbidding the Court from looking at anything the suspect has written but asking the court to rely solely on witnesses' testimonies about the content of the suspect's writings to make its judgment – and then instruct the Secret Society's volunteer group to pretend to search for the suspect's Marine document and then rumor among themselves in order to get themselves intercepted. This is what is going on 8:47 AM this morning. The Secret Society members must be saying: “This guy has copied all his paragraphs from Marine's own book.” “He expresses herein all this hatred toward women.” “He is a racist and a bigot.” And so on. Homeland Security will then take the intercepts of these rumors to the ICJ as “evidence”: “We did not willfully provide false profiles to foreign actors. We have legally collected all our evidences. We do not violate women's 'victim confidentiality' by taking a direct look at what the suspect has written. The Court should do the same in order to respect women's 'privacy'.” Meanwhile, the ICJ judges can also see that the French consular protection has had to follow every lead in order to not be charged with negligence. It's all Homeland Security's fault. Furthermore, the Russians are in a bind, for they have in fact come up with ideas similar to those contained in the “Marine document” and are about to share them with FN. It's most likely the case, however, that the suspect has expressed a much better, and more comprehensive, version of these same ideas. Nevertheless, the Russians, thanks to Homeland Security's feat, now risk being forbidden from implementing their own ideas unless they can clear up the matter. As the debate shall continue about whether the suspect fits Homeland Security's or TMU's profile and whether he has had any prior knowledge of EKT's and French's coming, and as everybody begins to investigate whether the suspect has anything to do with the Paris attacks, both the Russians and the French must take care to avoid charges of conspiracy with him. This, also in 37 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 order to protect their own similar ideas. The easiest way to do so is to harm him – to not fulfill his wish to get the Secret Society women arrested and made bad examples of but to help the Secret Society women harm him. To this end, EKT’s team sends a Russian intelligence officer (from here on, the “professional”) to help the women discredit the suspect. The women are complaining: “He knows what we are doing behind his back by looking at his visitors’ log. What to do?” This professional knows what to do. “You haven’t staged the decoys well enough. I’ll show you how to stage decoys so well that he will believe these mean false reports to law enforcement like it was the case before, and then you will open a case on him at law enforcement, so that, as he comes under law enforcement surveillance, his continual belief that you guys are making false reports about him to law enforcement will be witnessed by law enforcement officers, who will then be forced to believe that he suffers severe paranoia and has imagined up all the past stalking claims which you have filed against him at TMU.” Note that, while harming the suspect by driving up his paranoia, both the Russians and the French are not necessarily helping defend Homeland Security. While Homeland Security's profile says that the suspect is a paranoia schizophrenic (hallucinating, that is), when the “professional” shall have prompted the suspect to develop all sorts of wrong scenarios by causing him to mistake the decoys, the Russians and the French will demonstrate to the ICJ judges that these wrong scenarios, while sounding crazy, are not the kind of “delusions” which a schizophrenic suffers, but are simply the product of wrong inferences (completely rational). Also, while the Russians and the French must work hard to avoid conspiracy charges, if they can succeed, they shall be entitled to use the suspect's superior, although similar, ideas to enrich their own ideas. The suspect is at St Sophia in the morning. Coffee time, he is sitting with Johanna. She seems to be passing secret messages to the suspect: Sartre’s play (“Huis clos”) and Mary O’s poem. Yesterday, the TMU, when they have gone to Johanna to interview her, must have asked her to produce these two metaphors today in order to test the suspect, to see whether he indeed has prior knowledge of the whole affair that is going on right now. The result of the test is negative: the suspect doesn't appear to know that he is once again the subject of debate at the International Court of Justice. No visits until late afternoon. It appears that the Secret Society women have got wind of the fact that the suspect is aware of the basic contour of the arguments which they have made to the DA on Friday – although he isn’t yet aware that the Secret Society women are doing “false flag online harassment”. If so, they could only have heard it from the suspect’s best friend. How did this happen? Have they found the recording “by accident”? The reality is most likely that EKT, because she is one of foreign dignitaries, has ordered Homeland Security to share the intercept of the suspect's phone conversation with the women. This, as an additional proof that she is harming the suspect (severely violating his privacy) and so not conspiring with him. The Secret Society women are now sufficiently concerned that they send one of their scouts to check the 38 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 suspect’s blog to see if he has already blogged about their latest attempt to exterminate him. On 4:55 PM, 204.69.190.254, butch.sjc.edu, St John’s College, Santa Fe.1 204.69.190.254 - - [15/Nov/2015:17:55:15 -0700] "GET /gallery/gallery.html HTTP/1.1" 200 4452 "https://www.google.com" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" …. 204.69.190.254 - - [15/Nov/2015:17:55:30 -0700] "GET /blogs/ HTTP/1.1" 200 51481 "https://www.google.com" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" This person has been here before many times, of course, and so, without doubt, a Secret Society scout. She first comes to the web gallery, simply as a decoy. In 15 seconds, she comes to the blog, which reveals that she is really here to look at the blog. She would have passed back to the Secret Society women the copy of the suspect’s latest blog post documenting the events leading up to their meeting with the DA on Friday. Even if the details are only 60 to 70 percent correct, it is sufficiently disconcerting to the women because he has indeed understood the basic contours of the arguments they have made. The suspect has gone to Casbah after church. He is afraid to even go home, wondering something about the Paris attacks. Difficulty in signing up AVFM. He emails the administrator, but the email is immediately deleted from Inbox. Since the suspect is now a “terrorist suspect”, it's expected that forum administrators at these men's rights websites would also have been notified and interviewed by Homeland Security. At a loss, on 5:37 PM, the suspect posts his new summary of the Secret Society women’s past history with him on LB forum, located in UK. From 6 PM until 8 PM, he would be checking his new post there regularly. An ugly white female soon comes in to sit next to him. Given the strange fact that the Secret Society women would immediately afterwards notice this new posting, it’s very likely that the female who is sitting next to the suspect is actually a member of the Secret Society here to spy on him. It might be that, around 4:45 PM or so, as the Secret Society women have already reviewed the intercept, they are wondering how the suspect could have so well guessed the contours of the arguments they have made to the DA, so that, knowing from their constant tracking of him that he is at Casbah again, they have decided to send a female member to spy on him to see what he is doing on his computer. They have wanted to know how it is possible to decipher their arguments by looking simply at the patterns of their visits to his website. They probably want to make sure that he really isn't hacking their computers. Not finding him doing anything strange on his computer, they have instead found him posting a new summary on an online forum. This would have further caused them more worries. Amazingly, the owner of the LB forum (“LB Admin”) is located near Sheffield, UK, where one of the past members of the Secret Society is located. (See the entry for 29 June 2014). They immediately ask the Sheffield person to contact LB Admin and explain the matter to her. 1 This person is very likely KNR's friend Kira Zielinsky, who is also an alumni of St John's College. Kira is currently the president of Dr Java Coffee Co. 39 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 After much discussion between 6 PM and 9:30 PM, the Secret Society women – evidently under the leadership of the German Lady – have decided to continue to stage their show (“online harassment”). And so, their online friends continue to pretend to be strangers who have accidentally surfed onto the suspect’s website to discover all the personal information about the Secret Society women and then to pretend to contact them, one by one, pretending to let them know that some unknown guy, who seems to be severely delusional, is slandering them and spilling out their information on his website. At which point, the Secret Society women will then pretend to be embarrassed by the fact that they have been identified on the suspect’s website. They can then go to either the DA or the police to present the strangers’ testimonies, saying that strangers have identified them and contacted them saying they have seen their names and personal information appearing on the suspect’s website. Thus, on 9:43 PM, the Secret Society sends somebody very nearby to pretend to be strangers accidentally surfing onto SDW’s blog: 76.219.74.181, lightspeed.irvnca.sbcglobal.net, Rialto, CA. (Near San Bernardino.) 76.219.74.181 - - [15/Nov/2015:22:43:14 -0700] "GET /suppl----_-_1-9/suppl----_-_1-9b.pdf HTTP/1.1" 200 5127870 "http://---------stalking.com/about/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; MATBJS)" We have to suppose that the Secret Society women are seriously wrestling with the problem, after they have read on the suspect’s latest post that this document is proof that “Pyramid” does not refer to ANG, of somehow connecting up ANG with the nickname “Pyramid” nonetheless. This Rialto person – who might even have known about ANG by having gone to the library – is certainly instructed by the Secret Society women to pretend to accidentally surf onto SDW’s blog and find the suspect’s document. She will then pretend to contact SDW expressing concern over the bizarre delusion of the author of the document and the safety of the woman he is talking about. Even though “Pyramid” is barely talked about in this second chapter at all, it would not matter: nobody will bother to read it to see how much the girl has been talked about. Most importantly, she, together with SDW, will then pretend to be able to identify this girl nicknamed “Pyramid” even though in the story “Pyramid” is identified as a woman whose name is not the same as ANG’s. The reality is that, under normal circumstances, nobody can possibly identify the “Pyramid” in the story as ANG, but, here, the Secret Society women will simply instruct an actress to pretend to be able to identify who this “Pyramid” is. SDW will then pretend to inform this actress about the monstrous criminality of the author of the document and their difficult case with the DA, and set up the actress with ANG. ANG will then carry the actress’ testimony about being able to identify “Pyramid” as ANG to the next authority, who, because he wouldn’t know that the stranger is an actress and the identification is staged, would believe that the suspect has indeed violated ANG’s privacy by talking on his website about a “Pyramid” whom many strangers are able to identify as ANG – even though the suspect has specifically noted on his website that “Pyramid” doesn’t refer to ANG. Three hours later, the Secret Society women are prepared to stage another show – when their Sheffield friend has located the LB Admin. LB Admin, after hearing all the slander of the suspect which the Secret Society women have prepared to galvanize her and recruit her, agrees to 40 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 cooperate. The following operation is quite sophisticated. We may surmise that both the Homeland Security and EKT's “professional” might have been involved in the planning. The staged show runs like this. The LB Admin shall pretend, after seeing the suspect's summary posted on her forum, to get very concerned about the mental state of the poster, Google his email address (as found on his registration for the forum), identify his website and the women referred to in the summary, and contact the women. The women shall pretend to respond saying they have been, for a while, very frightened by this guy’s paranoia delusion that they have been going after him making false reports about him to law enforcement. They must have admitted that they have failed to convince the DA, but, now, with the LB Admin’s communication and the other people's “testimonies”, they could go to the police department to open a case on their suspect for “online harassment”, etc. The new story will then be that this guy, when he sees visits to his website from strange places, has wrongly assumed that they are responsible for it, all because he suffers incurable paranoia schizophrenia. But, yet, when the DA visits his website, he is able to conclude, correctly, that it’s because these women have gone to the DA to show them his website in an attempt to report him. So the official story line shall be that this guy is mostly insane, although sometimes he is correct, because he spends a lot of time on his log and because, perhaps, he is hacking the women's computers. Thus, on 12:54 AM, 1:08 AM, 1:14 AM, 1:17 AM, dyn.plus.net, Sheffield, UK. This is the LB Admin: 146.200.162.191 - - [16/Nov/2015:01:54:43 -0700] "GET /blogs/?author=1 HTTP/1.1" 200 51575 "http://www.google.co.uk/url?url=http://lawrencechin2011.com/blogs/%3Fauthor %3D1&rct=j&q=&esrc=s&sa=U&ved=0CBQQFjAAahUKEwig4P32yJTJAhWCUhoKHTscBV k&sig2=vgTR351XXj31pcOJwbByLQ&usg=AFQjCNGvultm4bYWm5l08RhW6LNi5AX4bw" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" 41 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 When she is instructed to Google for the suspect's email address, this “/blogs/?=author=1” is the first search result. There is a match. She has identified the suspect's blog. Less than 1 minute later, she clicks on all the email correspondences between the suspect and the various persons whom the suspect has presumably talked about in his stories – these documents, which are existent on the suspect's website as appendixes, are the other search results returned by Google: 146.200.162.191 - - [16/Nov/2015:01:55:28 -0700] "GET /2008docs/Gmail112408.pdf HTTP/1.1" 200 583104 "http://www.google.co.uk/url? url=http://www.lawrencechin2011.com/2008docs/Gmail112408.pdf&rct=j&q=&esrc=s&sa=U& ved=0CBoQFjABahUKEwig4P32yJTJAhWCUhoKHTscBVk&sig2=bbCJbgXsbBgqvaoq3XKig&usg=AFQjCNEA5GCMYhGoYnpgjCfB-do9cWhYEQ" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" This is the email between the German Lady and the suspect in November 2008. Then, 2 minutes later: 146.200.162.191 - - [16/Nov/2015:01:57:38 -0700] "GET /AK/4-25-12/kgmail_4_25_12.pdf HTTP/1.1" 200 1046074 "http://www.google.co.uk/url? url=http://www.lawrencechin2011.com/AK/4-2512/kgmail_4_25_12.pdf&rct=j&q=&esrc=s&sa=U&ved=0CB8QFjACahUKEwig4P32yJTJAh WCUhoKHTscBVk&sig2=ijHtJppo1PeFhAZSNc_RhA&usg=AFQjCNEY93s52lE_9rtRtS9B6H5jiOpAw" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" 42 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 This is the email correspondence between KRN and the suspect in April 2012. Then 11 minutes later: 146.200.162.191 - - [16/Nov/2015:02:08:15 -0700] "GET /blogs/?p=83 HTTP/1.1" 200 15712 "http://lawrencechin2011.com/blogs/?author=1" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" This is the blog post, “The latest warning”. Since the women didn’t actually go to the DA on 9 November, and have had to slightly change their plans after seeing this blog post, the Secret Society women could now deny that this blog post describes anything like reality – since nobody outside the Society has witnessed how the women have planned their operation – and could in fact use it as evidence to prove that “the suspect is still currently engrossed in his schizophrenic delusion about the group of women going after him and continually mistaking strangers’ visitation to his website for these women’s orchestration”. At the same time, 146.200.162.191 - - [16/Nov/2015:02:08:36 -0700] "GET /vol-6/8_18_10/towes81810.pdf HTTP/1.1" 200 118511 "http://www.google.co.uk/url? url=http://www.lawrencechin2011.com/vol6/8_18_10/towes81810.pdf&rct=j&q=&esrc=s&sa=U&ved=0CCUQFjADahUKEwig4P32yJTJ AhWCUhoKHTscBVk&sig2=uJNVaito3Z9DazErcBA7QQ&usg=AFQjCNEOY_uLsXXrXjbyV o42eFHrcKuw6Q" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" This is the correspondence between the suspect and his best friend W in August 2010. Presumably, because of the difficulty noted, the Secret Society women have decided not to “accidentally” discover the suspect’s best friend’s recording. LB Admin will instead contact him via email pretending to be concerned over his safety, at which point the best friend can offer testimony about the current state of the suspect’s mental insanity (for believing that a group of women are going after him as part of some ICJ trial, etc.). LB Admin can then supply the testimony to the Secret Society women, who will then take it to their next authority. Then, 6 minutes later, 146.200.162.191 - - [16/Nov/2015:02:14:57 -0700] "GET /petition/c0901379jl/ecf_request.doc HTTP/1.1" 200 10297 "http://www.google.co.uk/url? url=http://www.lawrencechin2011.com/petition/c0901379jl/ecf_request.doc&rct=j&q=&esrc=s &sa=U&ved=0CC0QFjAFahUKEwig4P32yJTJAhWCUhoKHTscBVk&sig2=iGbEYqJZEOUexHuNjg3Uw&usg=AFQjCNENptlesH2hrdDmyq_m4sUz1d-QSA" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" A short ECF Request form. This is of course completely innocuous. But the LB Admin is instructed to download it probably because the contact information listed on it matches that showing up on /blogs/?=author1. Then, 3 minutes later, 146.200.162.191 - - [16/Nov/2015:02:17:16 -0700] "GET /ponomarev.pdf HTTP/1.1" 200 46024 "http://www.google.co.uk/url? 43 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 url=http://www.lawrencechin2011.com/ponomarev.pdf&rct=j&q=&esrc=s&sa=U&ved=0CCcQ FjAEahUKEwig4P32yJTJAhWCUhoKHTscBVk&sig2=syst5cQo7N6sbez8REcZ4w&usg=AFQ jCNE6MtJ7EzqKt1ZjqrYO8UkXQU5Wqw" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" While this 2009 email could be used to illustrate the suspect’s gross insanity, it’s too old. But LB Admin has downloaded it because it has come up on Google searches. LB Admin will then pretend to contact KRN and the German Lady to inform them that she has found their private information on the suspect’s website, is able to identify who they are in the suspect’s stories by matching them up with these email correspondences, and is terribly concerned about their safety given the bizarre delusion which the suspect has developed about them. This will be the women's evidence for their next law enforcement authority. 16 November (Monday; the suspect's birthday) From early morning on, there are visits that are part of the Secret Society's important operations: First of all, 7:59 AM, 90.62.98.236, Neuilly-sur-Seine, France. 90.62.98.236 - - [16/Nov/2015:08:59:55 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692 "http://www.google.fr/url? sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved= 0CC8QFjACahUKEwjaxLT6p5XJAhVCjw8KHd5SAUE&url=http%3A%2F% 2Fwww.lawrencechin2011.com%2F1% 2Fthermhch2.html&usg=AFQjCNGANqQKQL8CkdLm5tmo0aFZXbBTyQ&bvm=bv.10 7467506,d.d2s" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko" It's not clear what this is about. If it's a visit from the Secret Society, then the person would rumor saying this guy seems to be plagiarizing. If it's from the French side (FN), then the person might be verifying whether the suspect has indeed plagiarized. Then, 8:11 AM, 5.70.98.175, skybroadband, Ipswich, UK. (Note the person from Ipswich on 5:39 AM, 28 June 2014.) 5.70.98.175 - - [16/Nov/2015:09:11:39 -0700] "GET /blogs/?p=83 HTTP/1.1" 200 15711 "http://www.legalbeagles.info/forums/private.php?do=showpm&pmid=246079" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.10240" This Ipswich person is presumably a friend of the Sheffield person, and is now introduced to LB Admin through the latter. What has happened is presumably this. After LB Admin has Googled the suspect’s email address, the “professional” instructs her to send the link to the Ipswich person's inbox so that the Ipswich friend could then click on it. In this way, when the suspect shall see this on his visitors’ log, he will believe that a warning has been broadcast to all users on the forum to discredit him (for at least one of them has clicked on the link contained in the warning). Then he will look very paranoid to others, and cause others to believe that the preceding summary is all but the product of his paranoia imagination. 44 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 10:28 AM, Dina Bergman wishes the suspect happy birthday on Facebook. Well, she is still trying to be friendly in order to hide her membership in the Secret Society. 12:58 PM, the suspect has arrived in Casbah. He is checking his log, and discovers the Ipswich person's activity. Terrified, he does believe that a warning has been broadcast over LB Forum. He immediately also deletes “pleading paper 2.doc”. The suspect is terrified all day long today about his possible extermination on the next court day (being dragged into custody without bail for the made-up stalking charge). He has located a certain “Marc Angelucci” (men's rights) and calls him and leaves a message with him. He then rides the bus to Chrysalis, crying to Tanisha, and is asked to leave. He settles down in the public library and continues to check his log. On 4:22 PM, his best friend calls him. He tells his best friend that he has just discovered that the Secret Society women have sent somebody to pretend to discover the latter’s contact information on his website. Since it’s possible that the Secret Society would soon gain access to this conversation, he immediately mentions it to W, so that the women might be prompted to change their plan, at least by excluding the suspect’s best friend from supplying testimonies, directly or indirectly, to the DA, or to the next law enforcement authority they are about to appeal to. The details of the suspect's conversation with his best friend W are as follows (from 47:00 onward in the recording). About the visitors’ log: the women's UK associate's search for W’s email address. (He doesn't yet know that it is LB Admin.) “They need evidence that I’m currently engrossed in the same schizophrenic delusion about the ICJ.” The strange thing about Saturday’s conversation, i.e. he has forgotten about the old recordings in the other folders, so that it would look like he was lying on Saturday when he insisted that he had deleted all recordings. W: “I thought a court-appointed doctor has declared you not insane…” W: “What if there really is a chip inside your brain?” W is testing the suspect: at least the TMU/ CIA wants evidence to demonstrate that the suspect is not insane, and that his belief about brain chips is a rational belief, even if it might be wrong. The suspect: “They’ll try to get you involved…” W: “How do you know the DA has visited your website?” The suspect: “When the police visits your site, it’s not even going to show up on your log…” The suspect is wrong here, but this incorrect admission will save half of his life, as you shall see. W emphasizes that the women haven't contacted him. Then about the Secret Society's downloading of W’s email address. W: “You keep giving them ammunition…” The suspect: “There is a different force which has come into the picture… Has the French consulate responded? Because Homeland Security has never withdrawn the false profile, and so TMU has had to re-investigate me…” More: “Has the essay something to do with it? The French would be obliged to respond, but the essay isn’t so wonderful… Has the Paris attack an impact on this…” Then the suspect begins to talk about the incident involving the French consular protection service back in February. “Because of my visits to FN website.” These admissions would be evidences in favor of the French and the Russians, however: if the suspect is intending to conspire with them, he should pretend to not understand what is going on, rather than spelling out a correct, although vague, picture of the controversy that is now surrounding him. The suspect then recounts Johanna’s “secret message” 45 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 from Sunday morning. This is again evidence in favor of the French, Russians, and the TMU/ CIA team. The suspect continues: “These women are such a waste.” W: “You shouldn’t have broken all these windows.” The suspect: “They see me not as making good use of my time, but worse, as spending my time making anti-American diatribe. But there is nothing wrong with what I say!” W: “What you say is offensive precisely because it’s true.” The suspect: “Those detectives’ primary job is to protect themselves. They are not thinking about the safety of the suspect.” W: The Platonic cave: the suspect needs to cloak his truth with Noble Lies in order to avoid being called “crazy”. W continues: “If you want to influence the world, you shouldn’t write philosophy, but novels.” The suspect: “These FN people really think like me.” The suspect expresses his wish to be in France to “join the club.” “Up to 70% of my former scenarios are incorrect.” The suspect laments that he has taken too seriously W’s words. W denies that people might be pulling shit behind the suspect's back. So far, all that the suspect has said – from Saturday onward – indicates that he has had no prior knowledge and that he doesn't fit Homeland Security's false profile in anyway whatsoever. The current crisis seems to be entirely the fault of Homeland Security. During the call, Cindy comes into the library with a few other people. It's not clear whether this is orchestrated, or whether she will afterward rumor about having seen the suspect in the library. Note that W actually warns the suspect that somebody – i.e. the “professional” – is dropping “red herrings” on him to make him believe that something is going on behind his back when nothing is. Apparently, it is the Invisible Hand and the TMU who have instructed W to warn the suspect. They know that the Russians are being forced by Homeland Security's mistake to make him conform to the women’s and Homeland Security’s false profile of him – paranoid and misinterpreting the meaning and origins of the visits to his website – in which case, their own, correct, profile of the suspect would be invalidated. Hence they want to drop him a hint. 4:59 PM, 221.145.183.167, the Korean scout. 221.145.183.167 - - [16/Nov/2015:17:59:39 -0700] "GET / HTTP/1.1" 200 25738 "https://cellsciencesystems.com/" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1)" 221.145.183.167 - - [16/Nov/2015:17:59:39 -0700] "GET / HTTP/1.1" 200 10670 "https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)" Then, by 6:33 PM, the suspect has removed /AK and /vol-6/. By 8:29 PM, he has gone to Starbucks and sends his new “summary” to Mr Angelucci. Meanwhile, the Secret Society women have decided to continue staging their show “strangers accidentally surfing onto the suspect’s website and being able to identify the women he is talking about and contacting the women to express concern for their safety”. Thus, on 9:43 PM and 9:54 PM, 76.219.220.166, lightspeed.irvnca.sbcglobal.net, Los Angeles. 46 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 76.219.220.166 - - [16/Nov/2015:22:43:44 -0700] "GET /newsummaryweb.html HTTP/1.1" 200 68269 "https://www.google.com" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0" 76.219.220.166 - - [16/Nov/2015:22:43:51 -0700] "GET / HTTP/1.1" 200 10670 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0" 76.219.220.166 - - [16/Nov/2015:22:53:19 -0700] "GET /timeline9/timeline9d.pdf HTTP/1.1" 404 1360 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0" 76.219.220.166 - - [16/Nov/2015:22:53:27 -0700] "GET /timelinepartVII-13/timelinepartVII13c.pdf HTTP/1.1" 404 1360 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0" 76.219.220.166 - - [16/Nov/2015:22:54:04 -0700] "GET /diaryreview2013-1239/conclusionrev10-2.pdf HTTP/1.1" 200 520003 "https://www.google.com" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0" This person is very close by. Obviously a close friend of KRN or the German Lady, in response to LB Admin's expression of concern for their safety. Even though most of the “stories” had disappeared, she is able to find “Conclusion”, which is her goal. The central problem remains that “Pyramid” has to be tied to ANG despite the suspect’s indication that “Pyramid” doesn’t refer to ANG. Otherwise there is no reason for the German Lady, SDW, and KRN to ever be involved. They apparently believe that a clue exists on this document which might serve as proof that “Pyramid” refers to ANG. As long as the women can hide from their next law enforcement authority the suspect’s statement that “Pyramid” doesn’t refer to ANG, the authority presumably will accept the clue as evidence since he would be unlikely to have the time and inclination to check whether the women’s stories are correct. Then, 10:14 PM, 67.55.84.212, Google, /, Webair. 67.55.84.212 - - [16/Nov/2015:23:14:45 -0700] "HEAD / HTTP/1.1" 200 211 "http://www.google.com" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.124 Safari/537.36" This strange visit will be very frequent from now on. Unclear what it is about. Then, on 3:49 AM, Jamia Millia Islamia University, New Delhi, India, 14.139.62.114 - - [17/Nov/2015:04:49:26 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/cheneyplan25/cheneyplan25.pdf" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 14.139.62.114 - - [17/Nov/2015:04:49:25 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1" 200 592393 "https://www.google.co.in/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 47 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 The location is so bizarre – even when it is just a proxy – that it has to be part of the show which the Secret Society is staging currently (or which Homeland Security and the “professional” are helping the women to stage): how strangers have come together with the Secret Society women due to their concern for them because some guy has developed horrifying bizarre delusion about them. 17 November (Tuesday) With some evidences – staged – for the suspect’s online harassment ready, the Secret Society women (or Homeland Security), in the morning, first sends another “volunteer” to pretend to discover the suspect's crazy website: 9:36 AM, 99.52.178.214, lightspeed.ocnmwi.sbcglobal.net, Green Bay, Wisconsin. 99.52.178.214 - - [17/Nov/2015:10:36:01 -0700] "GET / HTTP/1.1" 200 10670 "https://www.google.com/" "Mozilla/5.0 (X11; CrOS x86_64 7390.68.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.82 Safari/537.36" 99.52.178.214 - - [17/Nov/2015:10:36:02 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360 The word about this crazy person bad-mouthing about the innocent women is spreading over the Internet. 1 hour and 30 minutes later, another one of their actresses in Richmond Hill, Ontario, pretends to stumble upon the suspect’s new “Marine essay”: 11:07 AM, 99.238.175.189, cpe.net.cable.rogers.com, Richmond Hill. 99.238.175.189 - - [17/Nov/2015:12:07:52 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200 701933 "http://r.search.yahoo.com/_ylt=A0LEVvXZektWLRoA.i4XFwx.;_ylu=X3oDMTBzZTdrbmk3 BHNlYwNzcgRwb3MDMTQEY29sbwNiZjEEdnRpZAM-/RV=2/RE=1447816025/RO=10/RU =http%3a%2f%2fwww.lawrencechin2011.com %2flepen3%2flepen3l.pdf/RK=0/RS=W2nSiW8heiGDQbzIMNviwB5aBpY-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" This is clearly related to the debate surrounding the quality of the suspect's “Marine essay”. Is it full of plagiarized materials or is it the work of a high functioning intellectual? Homeland Security might have ordered the Richmond person to produce another piece of evidence to demonstrate the former. Then, the Secret Society’s Korean scout: 1:27 PM, 221.145.183.167. He is here yesterday on 4:59 PM. Same thing. And here on 14 November, 1:04 AM, and 13 November, 12:48 AM, if you recall. The Secret Society women have produced no activities on the suspect's website for the rest of the day. They are evidently planning for their meeting with their next law enforcement authority tomorrow, putting together the “testimonies” they have collected (i.e. messages from the LB Admin and the rest of the “volunteers”). Past midnight, on 12:26 AM, “Momasita” posts a negative reply to the suspect’s post on LB forum. This Momasita is part of the Secret Society cyber gang-stalking crew. 48 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 On 12:30 AM and 12:41 AM, the suspect, while in Starbucks, Westwood, has posted the latest post, “Part III”. He, absolutely terrified about tomorrow, has been busy with preparing this post all afternoon and all night. It seems that, early morning, 18 November, ANG wants to do a final check to see if her name could still be found on the suspect’s site. Only if it could. Thus, on 3:32 AM, office-fw1tg.fullrate.dk, Glostrup, Denmark, 89.150.129.196 - - [18/Nov/2015:04:32:17 -0700] "GET /log-wpd-2/septlog3.pdf HTTP/1.1" 404 1360 "https://www.google.dk/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" The scout has verified that her name couldn’t even be found on visitors’ logs, which have all been removed. The case of “online harassment” couldn’t be strengthened further. 18 November (Wednesday; D-Day) Still early in the morning, the Secret Society stages another operation: 5:49 AM, 54.243.53.148, amazonaws.com. 54.243.53.148 - - [18/Nov/2015:06:49:34 -0700] "GET / HTTP/1.1" 200 10670 "http://www.google.com/" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2) Gecko/20100115 Firefox/3.6" 54.243.53.148 - - [18/Nov/2015:06:49:49 -0700] "GET /howihave70bg/how_i_have_70bg2.pdf HTTP/1.1" 200 54449 "http://www.google.com/" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2) Gecko/20100115 Firefox/3.6" 54.243.53.148 - - [18/Nov/2015:06:50:18 -0700] "GET /newlinks.html HTTP/1.1" 200 9402 "http://www.google.com/" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2) Gecko/20100115 Firefox/3.6" Although the “volunteer” is using Amazon proxy, we know that he’s located in the UK (“enGB”). It must be part of the show where “strangers are able to identify the author of the LB posting by discovering his website”. This UK “stranger” (friend of the Secret Society) would then contact the Secret Society women about the matter. It's another piece of testimony which the Secret Society women will bring to their new law enforcement authority today. By noon, while the suspect is in the courthouse, the Secret Society women (ANG, SDW, the German Lady, and KRN), together with PD, TG, and JW, have gone to the Manhattan Beach Police Department – the “next law enforcement authority – with all the evidences for “online harassment” ready, including the suspect’s posting on LB, of which they say a bunch of strangers have identified the true author, the same guy who has been spilling out their private information and slandering them online. They first show the Manhattan Beach Police Department detective either the “DRCRR warning” issued by the West LA division, or Homeland Security's warning about the suspect as a “misogynist cyberstalker terrorist”, which, they hope, can immediately biases him against the suspect and toward the women: “This guy is a suspect of misogynist hate crimes and domestic terrorism”. The women then proceed to demonstrate to him the devilish character of the suspect by showing him the suspect's website – believing the suspect's words 49 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 that visits from law enforcement to his website will not show up on his log. Thus: 12:35 PM, 64.95.198.68, Internap Network Services Corporation, City of Manhattan Beach. The women first show the detective the blog in question: 64.95.198.68 - - [18/Nov/2015:13:35:35 -0700] "GET /blogs/ HTTP/1.1" 200 65193 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" Then, 6 minutes later, the blog post from September, “What PD was told 4 and 5 May”: 64.95.198.68 - - [18/Nov/2015:13:41:30 -0700] "GET /blogs/?m=201509 HTTP/1.1" 200 11301 "http://lawrencechin2011.com/blogs/" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" The women must be explaining to the detective that the suspect has violated the women’s privacy. How could he have known what PD was told? It could only be that he has electronically penetrated the women’s conversation. Then, the women show the detective the suspect’s Peace Pink page, to demonstrate both how crazy he is and how he must be the person in PD’s and TG's surveillance video. The detective then comes to the front page of the suspect’s website. It is merely 4 minutes afterwards. 64.95.198.68 - - [18/Nov/2015:13:45:58 -0700] "GET / HTTP/1.1" 200 10670 "http://peacepink.ning.com/profile/lawrencechin?xg_source=activity" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" At the front page, the German Lady then shows the detective the first chapter of “K’s meetups”, to demonstrate to him that the suspect is suffering from bizarre paranoia delusion believing that the German Lady has been part of some government (CIA’s) operation against him: 64.95.198.68 - - [18/Nov/2015:13:46:41 -0700] "GET /karins_meetup_2bg2/karin's_meetup_2bg2d.pdf HTTP/1.1" 200 959742 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" That is it. Within 15 minutes, the women have finished their demonstration: the suspect has violated the women’s privacy, and yet harbors bizarre paranoia delusion about them and is slandering them on the Internet, causing all these strangers to contact them to express concern for their safety. The discussion has lasted almost 1 hour and 30 minutes. At the end of which, the women would have already persuaded the detective to grant them “victim confidentiality” in order to forbid him from ever looking at the suspect’s website himself. The women then want to demonstrate to the detective that the suspect is motivated by his severe misogynist hatred. Now that “victim confidentiality” has been granted, they could call up their friend in Montreal to present to the detective “evidences” for the suspect’s “misogynist rambling”. Thus: 2:19 PM, 74.14.208.192, Bell Canada, dsl.bell.ca, Montreal. 50 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 74.14.208.192 - - [18/Nov/2015:15:19:19 -0700] "GET /sci/sci.pdf HTTP/1.1" 200 54329 "https://www.google.ca/" "Mozilla/5.0 (Linux; Android 4.4.2; en-ca; SM-G386W Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.6 Chrome/28.0.1500.94 Mobile Safari/537.36" 74.14.208.192 - - [18/Nov/2015:15:19:25 -0700] "GET /sci/sci.pdf HTTP/1.1" 200 533007 "https://www.google.ca/" "Mozilla/5.0 (Linux; Android 4.4.2; en-ca; SM-G386W Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.6 Chrome/28.0.1500.94 Mobile Safari/537.36" This is the suspect’s scientific writing on the relationship between neoteny and the functioning of Anglo-American justice system. Hardly anything like “misogynist rambling”. But, since the detective is not allowed to look at the suspect’s writing himself, he couldn’t find out that the Montreal woman’s horror story about the suspect’s “misogynist rambling” is all but bullshit.2 And so the women’s story about the suspect is: he is a computer-hacker who has stalked the poor women online and penetrated their electronic communications to obtain information about them, and then posted it on his website. He suffers from paranoia delusion about the women and believes that they are part of some government conspiracy to go after him and have been filing false stalking claims against him at the Threat Management Unit. He is motivated by his severe misogynist hatred and rambles his hatred for women on his website. Last but not least, the women say he is also a plagiarizer and has plagiarized scholarly works on his website and stolen other people’s contents and put them on his website. The meeting has ended between 2:30 PM and 3 PM, and the detective, horrified and angered by the demonizing portrayal, has agreed to open an investigation on the suspect. The women probably did not mention anything about the suspect's being under suspicion for relationship with the Paris attacks, however. The women are not just doing this for their own sake. Homeland Security has also wanted the women to persuade another law enforcement agency to open up a case on the suspect. They are counting on the fact that the new law enforcement agency, the detective from a tiny city without crimes and blinded by “victim confidentiality”, will end up producing results that are completely wrong but which will confirm Homeland Security's false profile of the suspect. Homeland Security needs to intercept this wrong result into the ICJ as evidence in support of their case. This point is very important, as the women must have learned from their experience with the TMU. Because the TMU detectives are more experienced and sophisticated, and, on top of that, are working with federal agencies – even the CIA – these ordinary women, dumb although full of aggression, cannot expect to deceive them. They thus should target detectives from small city's departments who are invariably inexperienced and unsophisticated and so easily deceived. (Perhaps the “professional” has taught them so.) However, they have made one mistake here. The women – having accessed the intercept of the suspect's conversation with W on 16 November – must have bought into his admission that law enforcement visits to his website are 2 KRN has a Facebook friend in Montreal who is an artist, a certain “Ara O s t e r w e i l”. This might be she. 51 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 not logged. In fact, the suspect was wrong. Thus the women are comfortable with the detective visiting the suspect's website on the department's own computers – leaving behind traces all over. Meanwhile, the suspect, after spending the whole night in Westwood without sleep – he is at Kinkos and then comes back to Starbucks – comes to court, frightened to death, especially when Ms Warren, his public defender, tells him to leave her his doctors’ info. Mike and Angela soon show up to comfort him. (The suspect doesn't yet know that Angela is a Homeland Security informant against him.) Then it turns out that the DA just wants restitution. The women have clearly made a very bad impression on the DA last Friday, with all their irrelevant complaints and stories. With Ms Warren and Angela in Ms Warren’s office. Ms Warren would not hear the suspect's story about ANG’s victimization of him. Ms Warren portrays the suspect as a bad-tothe-bone male aggressor who, motivated by lust, just doesn’t know how to respect women’s boundaries while ANG is portrayed as a poor victim of his disrespect and aggression, the innocent prey of male lust who just wants to be left in peace. The exact opposite of reality. Ms Warren is getting increasingly hostile to the suspect evidently because of Homeland Security interview of her about the Paris attacks on 14 November. Homeland Security of course would inform her the false story that the suspect is a paranoia schizophrenic of the worst sort – who has imagined up ANG's gang's going after him – and, whether or not connected to the Paris attacks, is exactly what ANG his poor victim has portrayed. Meanwhile, Homeland Security would say nothing about ANG's true character. Already convinced that the suspect is incurably mentally ill, Ms Warren of course will not hear anything he has to say. Instead, she wants him evaluated by the doctor she has brought in. Also, convinced that ANG is the angelic victim, Ms Warren warns the suspect that he faces prison time (“You are going to jail!”) if he doesn't remove his website. Of course people don't go to jail for a website, but Ms Warren believes, in her mind, that it's her duty to prevent this male monster from tormenting the poor ANG. And so she bluffs. Homeland Security has successfully turned Ms Warren into the suspect's worst enemy by feeding to her ANG's bizarre slanders about him. Furthermore, Ms Warren has become worried that the suspect might become “obsessed with her” – which is another reason why she wants him evaluated by a psychiatrist. Homeland Security's warning to Ms Warren on 14 November apparently also includes ANG's false story that the suspect is prone to become obsessed with any female figure and then stalk her and wouldn't let her go. The suspect can only be further offended by such nonunderstanding of his psychology: not only has he already completely shed his tendency to suffer obsession with women – it will never happen again after SDW – but even the women he has obsessed over in the past were all good-looking women – whereas Ms Warren looks like a gorilla. Apparently, Ms Warren is so dumb as to not even understand that men usually only pursue attractive women and ignore fat, unattractive ones. Frustrated, the suspect goes to lunch, and Angela leaves. Then, the suspect goes to the psychiatric evaluation. Then, he comes back to court. The judge is clearly biased against him: the same stereotype about males as “trouble makers”. The suspect then rides the bus back to Westwood. Starbucks by early evening. That's when he discovers, and is absolutely frightened by, the visits from the Manhattan Beach Police Department. He calls up Mike about the matter. Afterwards, he begins changing his website. By 7 PM, the detective has taken the first step of investigation. First, to collect evidences about the suspect’s “plagiarism”. On 7:15 PM, 64.79.100.19: massive webcrawer.link activities indexing the front page links just as the suspect has begun changing them. 52 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 64.79.100.19 - - [18/Nov/2015:20:14:58 -0700] "GET /robots.txt HTTP/1.1" 200 650 "http://www.lawrencechin2011.com/robots.txt" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:14:58 -0700] "GET / HTTP/1.1" 200 10632 "http://www.lawrencechin2011.com" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:14:59 -0700] "GET / HTTP/1.1" 200 10670 "-" "Mozilla" 64.79.100.19 - - [18/Nov/2015:20:14:59 -0700] "GET /blogs HTTP/1.1" 301 542 "http://www.lawrencechin2011.com/blogs" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:14:59 -0700] "GET /newsummaryweb.html HTTP/1.1" 200 68257 "http://www.lawrencechin2011.com/newsummaryweb.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:15:00 -0700] "GET /archivedblogs HTTP/1.1" 301 558 "http://www.lawrencechin2011.com/archivedblogs" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:15:00 -0700] "GET /newsummaryweb.html HTTP/1.1" 200 68269 "-" "Mozilla" 64.79.100.19 - - [18/Nov/2015:20:15:00 -0700] "GET /archivedblogs2 HTTP/1.1" 404 1322 "http://www.lawrencechin2011.com/archivedblogs2" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:15:01 -0700] "GET /preface27rev5.html HTTP/1.1" 200 22319 "http://www.lawrencechin2011.com/preface27rev5.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:15:01 -0700] "GET /preface27rev5.html HTTP/1.1" 200 22357 "-" "Mozilla" 64.79.100.19 - - [18/Nov/2015:20:14:59 -0700] "GET /blogs/ HTTP/1.1" 301 337 "http://www.lawrencechin2011.com/blogs" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:15:01 -0700] "GET /vol1appendixcont.html HTTP/1.1" 404 1322 "http://www.lawrencechin2011.com/vol1appendixcont.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:15:01 -0700] "GET /karinsemail07/ HTTP/1.1" 200 459 "http://www.lawrencechin2011.com/karinsemail07/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:15:02 -0700] "GET /karinsemail07/ HTTP/1.1" 200 497 "-" "Mozilla" 64.79.100.19 - - [18/Nov/2015:20:15:02 -0700] "GET /story_docu HTTP/1.1" 301 552 "http://www.lawrencechin2011.com/story_docu" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36" 64.79.100.19 - - [18/Nov/2015:20:15:02 -0700] "GET /vol1appendixcont.html HTTP/1.1" 404 1360 "-" "Mozilla" …. 64.79.100.19 - - [18/Nov/2015:20:15:08 -0700] "GET /petition/attachment12/ HTTP/1.1" 200 569 "-" "Mozilla" 53 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 64.79.100.19 - - [18/Nov/2015:20:15:08 -0700] "GET /lawsuit.html HTTP/1.1" 200 9781 "-" "Mozilla" But webcrawler.link would certainly show that the suspect’s website contains no plagiarized materials. Meanwhile, the suspect is in Starbucks continuing the work of removing his “Secret History”. By 7:45 PM, he has deleted his whole blog. Around 8:20 PM, Blue Host's server suddenly goes down. By 8:57 PM, Blue Host server has come back online. Our Manhattan Beach detective must have ordered Blue Host to pull out the suspect’s whole website for examination offline. No hacking software would have been found either, however. Around this time, SDW posts a new blog post for the first time since 10 October. She has been refraining from posting in order to pretend that she fears the suspect's cyberstalking. Now she starts again – evidently to set a trap. On 1:15 AM, Scott S posts a comment on SDW’s latest blog post. This should situate SDW’s blog post to some time tonight. It’s evident that SDW’s post and Scott's comment are intended as a sting operation on the suspect. Scott, in his comment, provides his location (Amherst, NY) and information about his talk show at Talk Shoe (Saturday, 4 PM). Apparently, the gang has decided that, now that the detectives have accepted their case, they should find ways to enable law enforcement to intercept the suspect’s “electronic penetration of their communication” since they know quite well that the suspect has never hacked their communications in any way. Thus SDW and Scott put up the sting posts hoping that the suspect would see them and then clandestinely join in on the talk show, hear something, and then blog about it, all under police surveillance, which would then enable the detective to obtain evidence for the suspect’s “cyberstalking”. 19 November (Thursday) It appears that, early morning, the Secret Society’s friends in the UK continue to stage the show of “concerned strangers trying to track down who the author of the LB posting is”. The “stranger” has now discovered the academic writings of the suspect: 8:23 AM, 81.104.208.22, cable.virginm.net, Scunthorpe, UK. 81.104.208.22 - - [19/Nov/2015:09:23:35 -0700] "GET /scientificenlightenment1/representation.html HTTP/1.1" 200 24645 "https://www.google.co.uk" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" … By 8:35 AM, she has come to the Table of Contents: 81.104.208.22 - - [19/Nov/2015:09:35:21 -0700] "GET /thermex2.html HTTP/1.1" 200 568 "http://www.lawrencechin2011.com/scientificenlightenment1/representation.html" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" 54 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 It’s evident that she will then pretend to contact the Secret Society women and broadcast the news to everyone saying that she has identified the suspect’s academic writing, and that it appears that he is merely plagiarizing scholarly works. The Secret Society women will then turn this stranger’s communication to the detectives. Meanwhile, Homeland Security would have intercepted another piece of evidence in support of their false profile of the suspect in the ICJ. By 8:49 AM, the suspect's friend in Egypt, Robin, has sent the suspect a private message: to verify his email address? Most likely. Since Robin is most likely TMU's (or FBI's) mole inside the Secret Society, this is in effect a TMU/ CIA's agent here to collect evidences proving the fraudulent nature of the evidences which Homeland Security is collecting in support of their case. Homeland Security is thus at the same time stuck with the problem of domestic feud with other US agencies. We have seen that the moles inside the Secret Society (such as AAM) must have played the function of disrupting Secret Society operations by encouraging the women to discredit themselves, such as to the DA on 13 November. Homeland Security knows this, but can't do anything about it. They can't just warn the Secret Society women, “Hey, don't trust so and so, he's a mole from the FBI/ TMU”, for it's a violation of federal laws to knowingly reveal the identities of federal agents or informants. The Secret Society women have not yet known that the suspect has, by morning, completely removed his “Secret History”. This is indication that Homeland Security is not in constant communication with the women – in order to not “taint” the evidences they need. The women have to do most of the work on their own in order not to leave behind traces showing that they are only staging a show under Homeland Security direction (that Homeland Security is cheating in the ICJ). “Witness coaching”. The women continue to instruct the group of “strangers” (“volunteers”) originating from the LB forum to pretend to track down the suspect’s website and identify him. After studying the suspect’s cache, the German Lady has noticed that the suspect has inserted a lot of his own personal information in the Preface to “K’s meetups”. She thus instructs one of the volunteers in Brooklyn to pretend to discover the Preface by accident and match it up with the identification made so far of the author of the LB posting. Thus, on 5:50 PM, 67.81.30.224, dyn.optonline.net, Brooklyn, NY. 67.81.30.224 - - [19/Nov/2015:18:50:59 -0700] "GET /kmupreface15/kmupreface15d.pdf HTTP/1.1" 404 1360 "http://www.google.com/search? q=patriotism+honor+and+power+elites+relate+C. +Wright+Mills&hl=en&gbv=2&prmd=ivns&ei=d3xOVtLLFIPTQGis4OgDw&start=10&sa=N" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3" When the Brooklyn friend reports to the German Lady saying that the chapter is not actually online anymore, she must have been shocked. 30 minutes later, she asks the same South Korean scout (who has been here four times already) to check on the suspect’s website: 6:29 PM, 221.145.183.167. It is then that the Secret Society women have at last discovered that the suspect’s website has gone offline. 55 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 221.145.183.167 - - [19/Nov/2015:19:29:01 -0700] "GET / HTTP/1.1" 200 4527 "http://www.birthdayexpress.com/" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1)" 221.145.183.167 - - [19/Nov/2015:19:29:03 -0700] "GET / HTTP/1.1" 200 2268 "https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)" 221.145.183.167 - - [19/Nov/2015:19:29:03 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360 "https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)" Meanwhile, on 7:24 PM, while in Starbucks (Little Tokyo), the suspect changes his profile picture at Peace Pink. Then, around 8:20 PM, the suspect surfs onto SDW’s blog. When he clicks on the latest post, however, the page is first blocked, and then connected. It’s law enforcement’s collection of evidence for his “cyberstalking” of SDW. The women must be discussing all night long about what to do: now that the suspect’s “Secret History” has disappeared, it’s no longer possible to stage the show “concerned strangers, freaked out by the LB posting, tracks down its author and discovers his grave insanity and harassment and stalking of the Secret Society women”. On 12:05 AM, Robin (Egypt) sends the suspect another private message. Probably because the Secret Society women are discussing new strategies, there are very few visits tonight. A noteworthy activity occurs on 3:27 AM, 173.252.102.116 - - [20/Nov/2015:04:27:23 -0700] "GET /blogs/2012/04/28/the-difficult-searchfor-a-microchip-inside-my-head-part-iii HTTP/1.1" 404 1322 "-" "facebookexternalhit/1.1" 173.252.102.115 - - [20/Nov/2015:04:27:28 -0700] "GET /blogs/2012/04/28/about:blank HTTP/1.1" 404 1322 "-" "facebookexternalhit/1.1" 31.13.112.120 - - [20/Nov/2015:04:27:35 -0700] "GET /blogs/2012/04/28/the-difficult-searchfor-a-microchip-inside-my-head-part-iii HTTP/1.1" 404 1322 "-" "facebookexternalhit/1.1" 31.13.112.119 - - [20/Nov/2015:04:27:39 -0700] "GET /blogs/2012/04/28/about:blank HTTP/1.1" 404 1322 "-" "facebookexternalhit/1.1" This means that a Facebook page on which the suspect's old blog post on brain-chip is linked is being examined. Is this one of the Secret Society's Secret Facebook Groups? Perhaps, while brainstorming, the women have gone back to the Secret Facebook Groups and reviewed some of the old ideas that have been posted there, in the process calling up the suspect's old blog post which has already been removed. 20 November (Friday) The Secret Society’s operation: 6:09 AM, 168.235.200.95, Quantil, confirmed proxy server, Pasadena. This person seems to be an Indian girl residing in the United States (“en-us”: in fact in the Los Angeles area) since the IP address shows up on the log of aeparc.org: 56 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 168.235.200.95 - - [20/Nov/2015:07:09:15 -0700] "GET /petition/c0901379jl/sf_c0901379jl_redo.pdf HTTP/1.1" 404 1360 "http://www.google.co.in/search?ie=ISO-8859-1&q=www.blaeleed.com&btnG=Search" "Mozilla/5.0 (Linux; U; Android 4.4.2; en-US; Aqua Star II Build/KOT49H) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/10.7.5.658 U3/0.8.0 Mobile Safari/534.30" 57 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 The search is supposed to look like this: It thus seems that this is part of the staged show “another concerned netizen accidentally discovers the true identity of the author of the LB posting and relates it to the Secret Society women and then law enforcement”. However, the document is not there anymore. The Secret Society women must be frustrated. 58 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Then, less than 30 minutes later, the Secret Society’s friend in Thailand continues to pretend to track down the suspect: 6:36 AM, 49.228.96.168, Fixed Broadband Network, Thailand (no more information available). Immediately he goes to the gallery. 49.228.96.168 - - [20/Nov/2015:07:36:05 -0700] "GET /gallery/perspective2.jpg HTTP/1.1" 200 45626 "https://www.google.co.th/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 49.228.96.168 - - [20/Nov/2015:07:36:54 -0700] "GET /gallery/gallery.html HTTP/1.1" 200 4395 "http://www.lawrencechin2011.com/gallery/perspective.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Yes, he has discovered the suspect. But the materials are harmless. It seems that he is simply to rumor, “Look, I think he has plagiarized his theory on linear perspective”. “Concerned citizens” continue to discover that the author of the LB posting is a plagiarizer. Homeland Security continues to bring the intercepts of these staged rumors into the ICJ as evidence in support of their false profile of the suspect. Then, on 2:47 PM, 128.197.173.248, Boston University, Massachusetts. 128.197.173.248 - - [20/Nov/2015:15:47:03 -0700] "GET /readings/Audacity_kompakt_Leseprobe.pdf HTTP/1.1" 200 3141377 "https://www.google.com" "Mozilla/5.0 (X11; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" The same thing. “Concerned citizens” have discovered that the suspect has stolen other people’s contents and put them on his website. This “concerned netizen's” testimony carries special weight since he is a student from a prestigious university. This is important since webcrawler.link has not discovered any plagiarized materials on the suspect’s website. More evidence in favor of Homeland Security in the ICJ. In response, on 3:28 PM, the suspect, in Starbucks, Westwood, at the time, has even changed the URL of /roach and /readings. He then logs into Couch Surfing – he hasn't done it for a long time – and offers his service to a Russian woman who is a flight attendant (“Marina”) and a Chinese girl who is coming from New Zealand. Around 6:47 PM, the suspect has a phone conversation with his best friend W (from 53:00 onward in the recording). The details of the conversation are as follows: (1) the women have discredited themselves on 13 November, and the DA no longer wants any trial. (2) About the women's new complaint against the suspect at another city's police department. W: “It's illegal.” (3) The suspect believes the women are slandering him online (staged “online harassment”). (4) The suspect's suspicion that the women have access to what he says to W. (5) Alexandra might take W to Concord, Massachusetts. (6) W assures the suspect that he has never recorded him and left the recording somewhere online for the women to find. (7) Worried about FN. The new alliance France-US-Russia against ISIS might be related to the ICJ judgment (previous). The conversation tonight is not very long. 59 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Then, on 8:35 PM, the St. John’s College person from 15 November, 4:55 PM, comes to do some scouting for the Secret Society: 204.69.190.254, St John’s College, Santa Fe. 204.69.190.254 - - [20/Nov/2015:21:35:42 -0700] "GET /newsummaryweb.html HTTP/1.1" 404 1360 "https://www.google.com" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 204.69.190.254 - - [20/Nov/2015:21:35:46 -0700] "GET /timelinepartIII-s/timelinepartIII-s.pdf HTTP/1.1" 404 1360 "https://www.google.com" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" Bad news. All the materials are gone. As the story about “crazy guy who suffers schizophrenic delusion believing that these poor women are going after him” is going viral online (all a staged show), more and more netizens volunteer to search for his traces only to have to rumor that he has removed many of his crazy materials. Nevertheless, the St John's College person will probably now pretend to be somebody “who remembers”: “Yes, I have been onto his website before. I know this guy. He used to post all this crazy stuff about having an electronic chip stuck inside his brain and a group of women going after him as part of some government conspiracy against him. Even though he has removed the materials, I can testify that I have seen it.” Thus, both the detective and Homeland Security will have their evidences nonetheless. On 11:41 PM, the Secret Society tries again: 76.254.66.115, dsl.pltn13.sbcglobal.net, Oakland, CA. 76.254.66.115 - - [21/Nov/2015:00:41:57 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1" 404 1360 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" The Oakland person also couldn’t pretend to have discovered, after tracking down the author of the LB posting, that he suffers grave insanity (for believing in all the government conspiracies and being chipped in the brain). We can therefore safely assume that this Oakland person will be another one “who remembers”, supplying the same testimony as the previous St John's College person. 21 November (Saturday) Without many volunteers' pretending to remember seeing the suspect's website before, the Secret Society women’s project would have been in jeopardy. And with it, Homeland Security's case in the ICJ. They would be missing a huge chunk of evidences for the suspect's incurable schizophrenia. It would be better, of course, if “strangers” could still pretend to discover the suspect’s personal information and find evidences for his grave insanity. The German Lady must have, in the past seven days, read through his essay on Le Pen. There are several characteristics about this essay which must have caught her eyes: (1) The name “KRN” is mentioned one time, although without a last name; and (2) at the end of the essay the suspect mentions something about being gang-stalked by a group of women for three years. (3) Furthermore, the criticism of 60 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 American feminism in the essay, though all reasonable, can be used to convince most people that the suspect is a misogynist since most people do not have the time to read anything and do not have the capacity for reasoning. Given the controversy which would surround this “Marine document” in the ICJ, i.e. that it is proof that the suspect is a high functioning intellectual, we can imagine that Homeland Security is still desperate to discredit his genius. We have seen how the Secret Society women have once instructed their members (like Francesca in Switzerland) to plagiarize the suspect in order to accuse the suspect of plagiarism at law enforcement. Seeing that the suspect, in the second half of the essay, is mostly recycling his old writings on his blog from 2014 and that he has been compelled to remove his blog from his website, Homeland Security must have decided to use the Secret Society women again to discredit the suspect. That is, the Secret Society women shall have somebody plagiarize the suspect again so that, while they accuse the suspect of plagiarism behind his back at law enforcement, Homeland Security might intercept more evidences into the ICJ showing the suspect to have plagiarized all his good ideas from somebody else and to be therefore nothing like a high functioning intellectual. On 6:56 AM, the Secret Society sends another agent pretending to be a stranger who has been caught up in the viral created by the suspect's LB posting and who also joins in on the investigation: 50.178.107.23, hsd1.il.comcast.net, Chicago. She pretends to Google for the suspect whom everybody has already identified and to arrive at the suspect’s web gallery: 50.178.107.23 - - [21/Nov/2015:07:56:52 -0700] "GET /gallery/gallery.html HTTP/1.1" 200 4452 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7" … Within one minute she comes to the external links page: 50.178.107.23 - - [21/Nov/2015:07:57:00 -0700] "GET /gallery/linkex.html HTTP/1.1" 200 10198 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7" … Within two minutes she comes to the front page: 50.178.107.23 - - [21/Nov/2015:07:59:17 -0700] "GET / HTTP/1.1" 200 2266 "http://www.lawrencechin2011.com/gallery/linkex.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7" … And she immediately – because she is following the instruction (the “script”) given her – comes to the essay on Le Pen: 50.178.107.23 - - [21/Nov/2015:07:59:39 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200 701933 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7" 61 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 She would rumor back to the crowd that the author of this essay seems indeed to be the author of the LB posting because he mentions at the end of the essay something about being gang-stalked by a group of women for three years. He also mentions a woman named “KRN”. Moreover, the essay is “full of misogynist rambling”. As instructed by the Secret Society women, she would pretend to contact the Secret Society women themselves to tell them about this. Then, all of a sudden, it would be discovered that many of the suspect's ideas in the document are found elsewhere. Meanwhile, since the debate is still raging over the content of the suspect's “Marine document”, Homeland Security is able to bring in another piece of evidence to the ICJ showing that this document is in fact full of plagiarized crap and misogynist rambling and slandering about the women. Then, as the rumor about the further identification of the author of the LB posting spreads, the same Richmond Hill person who was here on 17 November, 11:07 AM, comes also. It is only two hours later: 9:11 AM, 99.238.175.189, net.cable.rogers.com, Richmond Hill, Ontario. 99.238.175.189 - - [21/Nov/2015:10:11:36 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200 701933 "http://r.search.yahoo.com/_ylt=A0LEVvXZektWLRoA.i4XFwx.;_ylu=X3oDMTBzZTdrbmk3 BHNlYwNzcgRwb3MDMTQEY29sbwNiZjEEdnRpZAM-/RV=2/RE=1447816025/RO=10/RU =http%3a%2f%2fwww.lawrencechin2011.com %2flepen3%2flepen3l.pdf/RK=0/RS=W2nSiW8heiGDQbzIMNviwB5aBpY-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" Why is she here again looking at the same document? It must be because the news that the suspect has plagiarized in this document has reached her too so that she is coming to peek into the matter for herself. And, of course, she confirms it. Homeland Security needs even more testimonies to strengthen their case that the suspect's “Marine document” is an evil piece of shit and full of plagiarized crap. Meanwhile, the group of “concerned netizens” continues to pretend to track down the author of the LB posting – only to discover that he is a plagiarizer, so the “script” goes. On 9:53 AM, 75.118.170.143, wideopenwest.com, Columbus, Ohio. 75.118.170.143 - - [21/Nov/2015:10:53:47 -0700] "GET /scientificenlightenment1/daodejin222.html HTTP/1.1" 200 17844 "http://r.search.yahoo.com/_ylt=A0LEVj6nr1BWD2IAoQMnnIlQ;_ylu=X3oDMTE0MGhyOW FlBGNvbG8DYmYxBHBvcwMxBHZ0aWQDUFJEQkNLMV8xBHNlYwNzcg--/RV=2/RE=14 48157224/RO=10/RU=http%3a%2f%2flawrencechin2011.com %2fscientificenlightenment1%2fdaodejin222.html/RK=0/RS=nbQ8ZuN3GXLhiD3qrFVwrsYb0 PM-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0" After he has discovered the suspect’s chapter on Daoism, he looks at the previous chapter, and then the Table of Contents, all within two minutes. (Since he is just “acting”, he doesn't linger very long to actually read anything. Normally, of course, it takes more than two minutes to discover that a book is entirely plagiarized.) 62 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 75.118.170.143 - - [21/Nov/2015:10:55:18 -0700] "GET /scientificenlightenment1/daodejin.html HTTP/1.1" 200 23037 "http://lawrencechin2011.com/scientificenlightenment1/daodejin222.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0" 75.118.170.143 - - [21/Nov/2015:10:55:22 -0700] "GET /thermfr2.html HTTP/1.1" 200 907 "http://www.lawrencechin2011.com/thermex2.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0" And so on. We shall not list the other attempts here. Although the Secret Society women have suffered a major defeat because the suspect’s “Secret History” has disappeared, they are still betting that he would clandestinely call in on Scott’s Talk Shoe episode on 4 PM, thus producing concrete evidence, for law enforcement, for his electronic stalking of the Secret Society women. The suspect, in Casbah at the time, is continually tipped off. On 3:28 PM, he goes to his AVFM posting from his website’s links page, and is at first blocked. He is now aware that law enforcement has isolated his posting on AVFM as well, so that the Secret Society women would know about it too. Then, the suspect posts a note on AVFM expressing his wish for men's rights movement in the US to connect up with the European far right parties. While the suspect posts this because he is worrying about having uttered too many anti-American statements, this would be evidence in favor of the Russians and the French, and against Homeland Security. Then, on 4 PM, the suspect never calls in on Scott’s Talk Shoe show. Instead, he is applying for a job online. On 7:25 PM, when the suspect goes to the LB posting from his website’s links page, he is again blocked. The detective is collecting evidence about the suspect's being the author of this posting as well. The Secret Society women must feel like they have suffered another horrible defeat. Their prediction to law enforcement detective that the suspect would be spying on them has never materialized. Their case against the suspect is quickly falling apart. All they could do at the moment is to concentrate on the suspect’s supposed plagiarism and misogyny. Thus, under the German Lady’s direction, the rumor about the suspect’s plagiarism keeps on spreading. Another Vancouver person has pretended to get wind of it, and, on 10:23 PM, comes for a look. Again, the chapter on Daoism, to confirm the testimony made on 9:53 AM. 50.67.29.61 - - [21/Nov/2015:23:23:15 -0700] "GET /scientificenlightenment1/daodejin.html HTTP/1.1" 200 23037 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 50.67.29.61 - - [21/Nov/2015:23:23:16 -0700] "GET /scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12120 "http://lawrencechin2011.com/scientificenlightenment1/daodejin.html" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 63 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 50.67.29.61 - - [21/Nov/2015:23:23:16 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" Now there is another person to bear (false) witness to the suspect’s plagiarism. And more evidence for Homeland Security as well. Late night, home. The suspect posts the first indication of his awareness of the new law enforcement investigation of him. “It appears that, four days ago, the gang of women, G, J, K, and M, were able to get two of their friends to help them file a case of online harassment and cyberstalking against me (using the method “false flag online harassment” noted above) at another city’s police department after their case against me at my own city (at the TMU) was dismissed.” This is supposed to have gravely upset the Secret Society women: the suspect is able to keep up with their secret activities after all – the story that law enforcement visits to his website do not show up on his log is all but a lie. The Secret Society women are now prompted to close their new case at the Manhattan Beach Police Department and open a new one at another city's police department. As usual, they would instruct the Manhattan Beach Police Department detective to abide by the confidentiality agreement and to never reveal the existence of the case to anybody, even to detectives from other departments. Then, on 1:29 AM, Hutchison Global Communications, Hong Kong, 221.127.28.137 - - [22/Nov/2015:02:29:10 -0700] "GET /1/layereduniverse.html HTTP/1.1" 200 34939 "https://www.google.com.hk/" "Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" This Hong Kong person is also an actor pretending to be a stranger joining in on the campaign to identify the suspect only to discover that he is a plagiarizer. Then, on 3:34 AM, hkcable.com.hk, Hong Kong, 218.252.57.12 - - [22/Nov/2015:04:34:26 -0700] "GET /1/epilogue330.html HTTP/1.1" 200 25916 "https://www.google.com.hk/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 218.252.57.12 - - [22/Nov/2015:04:34:26 -0700] "GET /1/athd2.jpg HTTP/1.1" 200 12120 "http://www.lawrencechin2011.com/1/epilogue330.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 218.252.57.12 - - [22/Nov/2015:04:34:27 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/1/epilogue330.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" This second Hong Kong person is here to bear false witness both to the suspect’s misogyny and to his plagiarism. 22 November (Sunday; Orphism) 64 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Today, because the Secret Society women no longer have any case about the suspect’s “grave insanity” and “online harassment”, and because their case has been exposed to the suspect in any case, they are going to focus their entire efforts on artificially producing evidences for his “plagiarism” and “misogyny” for Homeland Security's case in the ICJ. Meanwhile they would be looking for a new police department elsewhere, where the detectives would also be too dumb and uneducated to be ever able to distinguish that all these testimonies they will supply him are complete bullshit. 5:31 AM, 81.154.39.11, BT, Mold, UK. 81.154.39.11 - - [22/Nov/2015:06:31:49 -0700] "GET /1/chinesepatriarchy220.htm HTTP/1.1" 200 32775 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More chatter about the suspect’s misogynist rambling and plagiarism. 6:42 AM, 64.233.172.175, orphism.html, Google IN, Google proxy, Android 4.2.1, en-us. More chatter about the suspect's plagiarism. This chapter on Orphism is about to go viral. Stay tuned. 7:20 AM, 142.134.104.2, highspeed.nl.bellaliant.net, Gander, Newfound Land, Canada. 142.134.104.2 - - [22/Nov/2015:08:20:14 -0700] "GET /1/epilogue225.html HTTP/1.1" 200 83648 "https://www.google.ca/" "Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1" More chatter about the suspect’s misogynist rambling (although this chapter, a severe criticism of “victim feminism”, is indeed derogatory about American feminism). 8:57 AM, 141.0.11.216, Opera Mini. 141.0.11.216 - - [22/Nov/2015:09:57:51 -0700] "GET /1/appendix.html HTTP/1.1" 200 76624 "http://www.google.com.bd/search? q=English+as+a+fusional,agglutinating+and+Isolating+language&client=ms-opera-miniandroid&channel=new&hl=bn&prmd=ivns&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjl0 Jj4v6TJAhUHKYgKHRR2APoQ_AUIBigB" "Opera/9.80 (Android; Opera Mini/7.5.35199/37.7148; U; en) Presto/2.12.423 Version/12.16" This person in Bangladesh shall also bear witness to the suspect’s plagiarism. As you can see, the German Lady is employing the same method she has promoted last year: if the suspect quotes from other authors in his writings, then just say he has plagiarized. Now the Secret Society women still wish to produce, for Homeland Security's case in the ICJ, evidences for the suspect’s “grave insanity” (such as belief in brain chips). On 9:32 AM, the women have another Wisconsin person search for them: 72.135.123.16, new.res.rr.com, Appleton, Wisconsin. 65 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 72.135.123.16 - - [22/Nov/2015:10:32:24 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1" This is probably another person who has “remembered”. Then another Belgian pretends to stumble upon the suspect’s website’s front page: 10:50 AM, 81.240.51.101, isp.belgacom.be, Antwerp. 81.240.51.101 - - [22/Nov/2015:11:50:03 -0700] "GET / HTTP/1.1" 200 2266 "https://www.google.be/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Then, another testimony about the suspect's plagiarism. 1:04 PM, 141.114.238.211, emilygagne.wireless.um.maine.edu, Gorham, Maine. University of Maine. 141.114.238.211 - - [22/Nov/2015:14:04:41 -0700] "GET /scientificenlightenment1/presocratics.html HTTP/1.1" 200 20438 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7" The Secret Society women have found another university student to do the “chatter” in order to enhance its credibility. Meanwhile, the suspect arrives at St Sophia late, past noon: goodbye luncheon for Fr Alan. Scolded by Mike. (“The conversation about the Secret Society women can't go on anymore.”) He talks with Angela and Johanna. Johanna gives him her email address. Then, another testimony about the suspect's misogyny: 1:52 PM, 176.9.7.169, clients.yourserver.de. 176.9.7.169 - - [22/Nov/2015:14:52:17 -0700] "GET /1/culturalfeminism.html HTTP/1.1" 200 147025 "http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=content" "Mozilla/5.0 (compatible; Konqueror/3.2; Linux 2.6.2)" Another testimony about the suspect's plagiarism: 3:31 PM, 75.118.170.143, try.wideopenwest.com, Columbus, Ohio. 75.118.170.143 - - [22/Nov/2015:16:31:38 -0700] "GET /HTcontribution1-philosophy.htm HTTP/1.1" 200 13966 "http://www.lawrencechin2011.com/thermfr2.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:41.0) Gecko/20100101 Firefox/41.0" Then, 3:34 PM, 92.2.39.155, orphism.html, Google UK, Talk Talk, Porth, UK. 92.2.39.155 - - [22/Nov/2015:16:34:56 -0700] "GET /scientificenlightenment1/orphism.html HTTP/1.1" 200 39990 "https://www.google.co.uk/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/537.86.2" 3:39 PM, 92.2.39.155, orphism.html is linked from Facebook. Somehow the 6:42 AM person – evidently an Indian girl living in Los Angeles – has suggested to the German Lady that stronger 66 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 evidences can be produced for Homeland Security's case in the ICJ using the suspect's chapter on Orphism. They have found somebody who runs a Facebook group, “Bacchic Orphism”, where there are plenty of “experts” on the topic. This “somebody” is this Porth person. After 9 hours, this Porth person has responded and agreed to help. He thus links the suspect’s chapter on Orphism from his Facebook group “Bacchic Orphism”. The linking is “open” (for the suspect to discover) because it is also a decoy operation. The “professional” has taught the women that they need to get volunteers to link the suspect’s writings from their Facebook pages in order to create the appearance that the past linking of the suspect’s chapters from Facebook did not necessarily point to the existence of a “Secret Facebook Group” devoted to his website but might just be somebody showing interest in his work and linking it from his or her Facebook page. Furthermore, by doing this, the volunteers hope to deceive the suspect – perhaps in order to “keep the women safe” – into the impression that, as his website is going viral, this is due to people loving his writings rather than to more and more people becoming concerned with this mental health. This of course wouldn’t really fool the suspect for long, since, in the entire past 17 years of his website’s existence, such attention to his website has virtually never happened: that’s how apathetic people are nowadays. 3:43 PM, 174.55.176.147, orphism.html, direct visit, hsd1.pa.comcast.net, Lewistown, Pennsylvania. The suspect's chapter on Orphism begins going viral, as more “volunteers” are discovering it to be plagiarized and passing the link to it from person to person. Then, another testimony that the suspect's writing on Daoism is plagiarized: 5:15 PM, 172.56.28.64, daodejin222.html, direct visit, T-Mobile USA, Philadelphia. 67 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 172.56.28.64 - - [22/Nov/2015:18:15:29 -0700] "GET /scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12120 "-" "Mozilla/5.0 (Linux; Android 5.0.1; SM-N910T Build/LRX22C) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.76 Mobile Safari/537.36" 172.56.28.64 - - [22/Nov/2015:18:15:34 -0700] "GET /scientificenlightenment1/daodejin222.html HTTP/1.1" 200 17806 "-" "Mozilla/5.0 (Linux; Android 5.0.1; SM-N910T Build/LRX22C) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.76 Mobile Safari/537.36" 172.56.28.64 - - [22/Nov/2015:18:15:36 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://lawrencechin2011.com/scientificenlightenment1/daodejin222.html" "Mozilla/5.0 (Linux; Android 5.0.1; SM-N910T Build/LRX22C) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.76 Mobile Safari/537.36" 5:52 PM, 206.45.38.58, orphism.html, from Facebook, dynamic.mtsallstream.net, Winnipeg, Manitoba. 6:30 PM, 173.48.174.85, orphism.html, from /m.facebook.com, iPhone, bstnma.fios.verizon.net, Arlington, Massachusetts. 7:39 PM, 207.140.33.203, orphism.html, from /m.facebook.com, iPhone. AT&T, Kennett, Missouri. Many volunteers are clicking on the suspect's chapter from “Bacchic Orphism” and are pretend to rumor, “Hey, it looks like this guy is just plagiarizing. And I think I have heard of him elsewhere. It's the guy who believes he is being gone after by a bunch of women and has a microchip implanted in his brain!” 9:40 PM, 186.54.171.245, anteldata.net.uy, Montevideo, Uruguay. 186.54.171.245 - - [22/Nov/2015:22:40:58 -0700] "GET /blogs/ HTTP/1.1" 301 375 "http://mind-control-torture.blogspot.com.uy/2014/04/the-nonsense-about-gang-stalking.html" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" The person seems to be the author of the very blog from which the visit has come. This visit is particularly damaging – and a very special piece of evidence which Homeland Security needs. The suspect has, more than an year ago, left a note on this guy's blog saying that the microchip in his brain is programing him to become especially paranoid and to misinterpret accidental environmental details as intentionally orchestrated, and that much of the gang-stalking phenomenon may have originated in this way. Now, the women want this admission from the suspect himself to present to their next detective proving that the suspect has indeed imagined up their gang-stalking of him and false reporting about him, and Homeland Security needs this piece of evidence to confirm their false profile of the suspect as mentally insane (in that he has imagined up both the women's gang-stalking and false prosecution of him and the implantation of a chip inside his brain). 68 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Note that, on 10:57 PM, Marina logs into Couch Surfing, but still has not declined the suspect's offer. Perhaps she has already been contacted by Homeland Security: “This guy is a psychopath pervert and maybe a secret agent of your government. Do not accept his offer. But do not decline it either, for he might retaliate.” 23 November (Monday) 69 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Today, Putin will meet with the Iranian president to sign a 5 billion dollar trade agreement and to provid Iran with SA-300 ground-to-air missiles. This act might have provoked the Republicans to perform the stunt which you will see on 16 December. 12:19 AM, the suspect, at home, deletes his comment at mind-conrol-torture.blogspot.com.uy. Meanwhile, the chatter about the suspect's chapter on Orphism (“He has plagiarized”) continues. 12:32 AM, Bell Canada, London, Ontario, 64.229.122.17 - - [23/Nov/2015:01:32:12 -0700] "GET /scientificenlightenment1/orphism.html HTTP/1.1" 200 39990 "https://www.facebook.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" The person will definitely rumor, “It looks like this guy is just copying contents from books.” Then, 1:22 AM, Free FAS, Toulouse, France, 82.236.120.201 - - [23/Nov/2015:02:22:08 -0700] "GET /scientificenlightenment1/magicsquare.html HTTP/1.1" 200 10309 "https://www.google.fr" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" More rumoring about the suspect's plagiarism. Etc. 5:39 AM, 73.167.49.133, orphism.html, from Facebook, vt.comcast.net, Montpelier, Vermont. Another volunteer has discovered the suspect's plagiarism. 6:18 AM, 81.82.251.56, presocratics.html, Google BE, static.telenet.be, Bruges. Another chatter about the suspect's plagiarism. 7:26 AM, 54.169.158.246, from interpreteeg007.blog.163.com. 54.169.158.246 - - [23/Nov/2015:08:26:27 -0700] "GET /2012/92012-8.png HTTP/1.0" 200 831587 "http://interpreteeg007.blog.163.com/blog/static/2060561642013628801821/" "Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/FreeBrowser Mobile Safari/537.36 FreeBrowser/23" 70 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 This guy in China has copied the suspect's entire blog post onto his own site. Thank God, the Secret Society women must have thought, for the volunteers are now able to track down this “cache” which proves that the suspect has once blogged about having microchips stuck inside his brain. He is truly insane! And Homeland Security is happy to intercept another piece of evidence in support of their false profile of the suspect. 71 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Since this Chinese guy was copying the suspect, it's not clear whether the Secret Society women have also made out of this episode another round of chatter about how the suspect has copied other people's web content. 10 AM, 69.71.0.1, perspective.html, Google Images, Monett, Missouri, Total Highspeed LLC. More chatter about how the suspect has plagiarized his theory on linear perspective. 10:39 AM, 5.169.143.196, orphism.html, Google IT, Telecom Italia Mobile, Italy. More chatter. 12:47 PM, 187.189.169.212, orphism.html, from Facebook, iusacell.net, Guadalajara. More chatter. 1:27 PM, 69.171.231.225, 2012/04/28 (brain chip III), from Facebook, Linux. (Facebook IP address) 69.171.231.225 - - [23/Nov/2015:14:27:30 -0700] "GET /blogs/2012/04/28/the-difficult-searchfor-a-microchip-inside-my-head-part-iii HTTP/1.1" 404 1360 "http://l.facebook.com/lsr.php? u=http%3A%2F%2Fwww.lawrencechin2011.com%2Fblogs%2F2012%2F04%2F28%2Fthedifficult-search-for-a-microchip-inside-my-head-part-iii&ext=1448314350&hash=Acm5jkvEntJmNu5DmKwUV4PAAGv4vtJIDqjz9BwD_88Og" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.101 Safari/537.36" 69.171.231.226 - - [23/Nov/2015:14:27:31 -0700] "GET /blogs/2012/04/28/about:blank HTTP/1.1" 404 1360 "http://l.facebook.com/lsr.php?u=http%3A%2F%2Flawrencechin2011.com %2Fblogs%2F2012%2F04%2F28%2Fabout %3Ablank&ext=1448314350&hash=AclJBzU7fVKsdCNHfbZf8sqz5FRyixH7we-Id4r6JjhjOA" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.101 Safari/537.36" It must be that the Secret Society women's associates have in the past, as instructed, linked the blog post from their own Facebook pages, and are now pretending to be re-checking it: “Oh, I think I remember this guy who talks about electronic chips being implanted inside his brain. I have even linked it from my Facebook, because it was just so funny! Let me see...” He then does not find the post anymore, but at least what he says gets intercepted into the ICJ to support Homeland Security's case. 1:40 PM, 108.185.115.15, socal.res.rr.com, Studio City. 108.185.115.15 - - [23/Nov/2015:14:40:43 -0700] "GET /scientificenlightenment1/aztec.html HTTP/1.1" 304 162 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" It would seem to be chatter about how the suspect has feigned artistic talent (poorly drawn diagram) and plagiarized (a large bloc of quotation in the chapter). But, given the fact that this volunteer would return repeatedly looking at this chapter, it's most likely a decoy. 2:03 PM, athd2.jpg called up from Facebook. What's this about? The portion of the Secret Facebook Group in which this image is linked is being accessed. 72 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Meanwhile, the suspect has awakened late and so missed his planned trip to Work Source. He buys a pair of new pants at Goodwill, 11:30 AM, left home. Interview at Ross, 2 PM. Didn’t go well. Hatred for Americans. He then comes back to downtown. 2:42 PM, 99.237.228.191, cable.rogers.com, Richmond Hill, Ontario. 99.237.228.191 - - [23/Nov/2015:15:42:49 -0700] "GET /gallery/perspective.html HTTP/1.1" 200 2659 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:40.0) Gecko/20100101 IceDragon/40.1.1.18 Firefox/40.0.2" This person is probably related to the Richmond Hill person looking for “Le Pen” on 17 and 21 November. On minutes later, 99.237.228.191 - - [23/Nov/2015:15:43:03 -0700] "GET /gallery/newgoddessA.html HTTP/1.1" 200 838 "http://www.lawrencechin2011.com/gallery/perspective.html" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:40.0) Gecko/20100101 IceDragon/40.1.1.18 Firefox/40.0.2" 99.237.228.191 - - [23/Nov/2015:15:43:18 -0700] "GET /gallery/xper.html HTTP/1.1" 200 1079 "http://www.lawrencechin2011.com/gallery/perspective.html" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:40.0) Gecko/20100101 IceDragon/40.1.1.18 Firefox/40.0.2" More rumor about how the suspect has plagiarized his theory on linear perspective. Meanwhile, 4 PM, the suspect is at the public library, downtown. Internet connection blocked. Connection soon restored. 4:32 PM, access to Facebook blocked. Connection then restored. Then Internet shut down again. It doesn’t seem to be police actions, however. Chrysalis, Tanisha, Men’s Groups. There is a group discussion about brain-death through digital technology and brain chips. Then, Starbucks, Westwood. The suspect would stay there all night, until 2 AM. On 7:20 PM, he changes his profile picture at Facebook. 9:54 PM, he sends a private message to “Bacchic Orphism” on Facebook (using his other Facebook page to hide his identity). He wants to investigate whether this “Bacchic Orphism” is related to the Secret Society's operation. 12:10 AM, 8.37.233.45, Android (en-US), Quantil, Pasadena. 8.37.233.45 - - [24/Nov/2015:01:10:58 -0700] "GET /gallery/perspective2A.html HTTP/1.1" 200 1841 "-" "Mozilla/5.0 (Linux; U; Android 4.4.3; en-US; D5322 Build/19.1.1.C.0.56) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/10.7.5.658 U3/0.8.0 Mobile Safari/534.30" It's more rumoring about how the suspect has plagiarized his theory on linear perspective. This person seems to be related to the 6:09 AM person on 20 November (possibly a girl of Indian descent) who was using the same proxy (the phone is different). The strange thing is that the theory on perspective2A.html is clearly the suspect's most original contribution. Either the Secret Society is making the claim about the suspect's plagiarism out of complete ignorance or this person is a TMU mole inside the Secret Society here to disrupt the women's case at law enforcement or Homeland Security operation. 73 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 12:24 AM, the guy at “Bacchic Orphism” replies the suspect. The Secret Society must have taught him: “Just say you linked it because you have an interest in his work. In this way he might think that he has wrongly suspected us for linking his webpages on our Secret Facebook Group. We must also not raise his suspicion that we are discovering him to be a plagiarizer; otherwise he might retaliate.” The Bacchic person does likewise. He also invites the suspect to come to his closed group on Orphism and Hellenistic religions. This, because the suspect is using his fake Facebook identity. The Secret Society women hope that the suspect might accept the invitation, in which wise the next detective can be given a piece of evidence showing the suspect doing something like “electronic penetration” and “cyberstalking”. But of course the suspect never takes the bait. 12:54 AM, 208.103.245.241, orphism.html, eastlink.ca, Sydney, Nova Scotia, Canada. More rumoring about the suspect's plagiarism. 4:08 AM, Packet Exchange, Quantil, Los Angeles, 70.39.185.105 - - [24/Nov/2015:05:08:51 -0700] "GET /gallery/bensonathena.jpg HTTP/1.1" 200 146537 "http://images.google.co.in/imgres? imgurl=http://www.lawrencechin2011.com/gallery/bensonathena.jpg&imgrefurl=http://www.law rencechin2011.com/gallery/redathena.htm&usg=__UB8WKbOkT1PQcuoPZzyKgoOFN4%3D&h=495&w=600&hl=en&start=793&tbnid=vqViCm7 UzTt-QM:&tbnh=111&tbnw=135&ei=H09UVr6rJYG4jAOqhbLgCw&sa=X&ved=0ahUKEwjttCi_6jJAhUBHGMKHaqCDLw4mAYQrQMIHTAA&ptbm=isch&q=hd+paintings+of+athena" "UCWEB/2.0 (MIDP-2.0; U; Adr 4.4.2; en-US; SM-T231) U2/1.0.0 UCBrowser/10.4.2.659 U2/1.0.0 Mobile" Compare it with the Indian person from 20 November, 6:09 AM: (Linux; U; Android 4.4.2; enUS; Aqua Star II Build/KOT49H) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/10.7.5.658 U3/0.8.0 Mobile Safari/534.30 Somehow this person is related to the 12:10 AM person and the 6:09 AM person from 20 November. Again, more rumoring about how the suspect is a “fake artist” since he has merely put other people's artworks on his site claiming them as his own. 24 November (Tuesday) Today, Turkey’s F-16s would shoot down a Russian SU-24 over Syria. The shoot-down is clearly planned since the F-16s have been circling in the area for two hours waiting for the Russian jet to appear. It is said that the US has wanted Turkey to do this in order to disrupt the formation of US-France-Russia anti-ISIS alliance. Since the current ICJ trial has contributed to the strengthening of the Franco-Russian alliance formed since the Paris attacks, NUL (at the Eurasian bureau of the State Department, who must have taken part in this US plan with Turkey while, at the same time, being heavily involved in the current ICJ trial over the suspect) is presumably also seeking ways to alienate the French from the Russians in the current ICJ trial. 74 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Note that it is primarily the neocon wing in the US who has wanted this hardline position toward Russia. The CIA's wing probably wants to play soft, such as in the previous US-Iran agreement over the nuclear question (“win-win”, “cooperation for mutual benefits”) to which the Republicans, under neocon influence, have objected. Meanwhile, the Secret Society women's operation on the suspect continues throughout the morning. 5:20 AM, 80.245.147.81, Cheney Plan, direct visit, lxproxy4.bfinv.de, Bundesamt fuer Finanzen (proxy). 80.245.147.81 - - [24/Nov/2015:06:20:38 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1" 404 1360 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" It appears that this is a past member of the Secret Society here to serve as a volunteer. He will rumor – after receiving a notice from other volunteers about the discovery of a paranoid schizophrenic who has so frightened a group of poor American women with his paranoia delusion about their persecuting him through law enforcement mechanism – : “Hey, I remember this guy. I have once surfed onto his writings, something about Dick Cheney's 'master plan'. I thought he was completely nuts.” And so he pretends to want to find it again, but the document is already removed. No matter, for his chatter will be additional testimony which the Secret Society women will turn over to their next detective and which Homeland Security will intercept into the ICJ as evidence in support of their case. 8:44 AM, 94.134.254.160, Versatel Deutschland, Horst, Germany. 94.134.254.160 - - [24/Nov/2015:09:44:50 -0700] "GET /scientificenlightenment1/capra.html HTTP/1.1" 200 11888 "http://images.google.de/imgres? imgurl=http://www.lawrencechin2011.com/scientificenlightenment1/cosmicdance2.jpg&imgrefu rl=http://www.lawrencechin2011.com/scientificenlightenment1/capra.html&h=274&w=400&tbn id=GuiEFLDFlOS73M: &tbnh=95&tbnw=138&usg=__pbDSS5EXiGwbq13-LP92Wm1yP5M %3D&docid= 7FmrBabauZJZFM&client=ubuntu&sa=X&ved=0ahUKEwjU6 _b5wKnJAhWBkw8KHQ2lDJMQ9QEIHzAA" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:42.0) Gecko/20100101 Firefox/42.0" More rumor about the suspect's plagiarism. 10:32 AM, 94.248.212.237, kabelnet.hu, Kaposvar, Hungary. 94.248.212.237 - - [24/Nov/2015:11:25:01 -0700] "GET /1/chemoton.jpg HTTP/1.1" 200 86500 "https://www.google.hu/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 94.248.212.237 - - [24/Nov/2015:11:32:23 -0700] "GET /1/thermhch6d222.html HTTP/1.1" 200 29197 "https://www.google.hu/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 75 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 More rumor about the suspect's plagiarism. 10:57 AM, 108.20.205.216, bstnma.fios.verizon.net, Belmont, Massachusetts. 108.20.205.216 - - [24/Nov/2015:11:57:06 -0700] "GET /scientificenlightenment1/capra.html HTTP/1.1" 200 11888 "http://www.google.com/search? q=images+for+first+generation+of+leptons+and+quarks&hl=en&gbv=2 &tbm=isch&prmd=ivns&ei=6LJUVsDXOYrb-QGLirmoCw&start=60&sa=N" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10" More rumor about the suspect's plagiarism. As you can and will see, capra.html and thermhch6d222.html are both favorite targets of the Secret Society women (in the domain of false reporting or false rumoring about the suspect's plagiarism). 11:23 AM, 107.72.164.47, daodejin222.html, AT&T Wireless, Fort Lauderdale. 107.72.164.47 - - [24/Nov/2015:12:23:03 -0700] "GET /scientificenlightenment1/daodejin222.html HTTP/1.1" 200 17844 "http://www.bing.com/search?q=Heraclitus%2c+John%2c+%26 +Logic+and+Inquiry+&qs=n&pq=heraclitus%2c+john%2c+%26 +logic+and+inquiry+&sc=00&sp=-1 &sk=&cvid=EAAF4AB72BBD406B9E7BFD9446A0B662&first=15&FORM=PERE" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko" The search terms clearly indicate that they are supplied to the volunteer by the German Lady: in the past 11 years of the webpage's existence, there has never been a single person who has put together Heraclitus and John, searched for the two, and found the suspect's chapter. But, of course, only educated person would have noticed this, and the German Lady is not one. Hence, another piece of chatter about the suspect's plagiarism has been intercepted into the ICJ as evidence. Meanwhile, the suspect rests in Westwood Village until 5:15 AM. Then, on the bus toward LAMP. He waits there from 6 AM until past 8 AM, only to be told (Serena Pawl) that they do not have advocates to help clients with legal matters. Already 9 AM. Somebody then steals the suspect's shoes. Tremendously angered. Ate breakfast, public library, 10:10 AM. Checked log. Then, the suspect reads the story about “Teardrop Rapist” in LA Times. Downloaded SPOE’s Parteiprogramme. Then nap. 12:43 PM, 83.44.186.175, dynamicip.rima-tde.net, Illescas, Spain. 83.44.186.175 - - [24/Nov/2015:13:43:11 -0700] "GET /suppl_pld_4_60bg/suppl_pld_4_60bg.pdf HTTP/1.1" 404 1360 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 83.44.186.175 - - [24/Nov/2015:13:43:12 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/suppl_pld_4_60bg/suppl_pld_4_60bg.pdf" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 76 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Clearly, more volunteers are saying: “Hey, I remember this guy. Give me the link. Yes, he is the guy with this bizarre delusion about some ICJ trial. Oh, the document is not there anymore.” Same thing: the chatter is enough testimony for the next detective and evidence for Homeland Security. Then, 1:37 PM, 173.196.204.18, holywh.html, then gallery, west.biz.rr.com, Los Angeles. This looks so much like ANG from House Z. 173.196.204.18 - - [24/Nov/2015:14:37:51 -0700] "GET /gallery/gallery.html HTTP/1.1" 200 4452 "http://www.lawrencechin2011.com/gallery/holywh.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" …. On 1:59 PM,, she's here again: 173.196.204.18 - - [24/Nov/2015:14:59:27 -0700] "GET /gallery/gallery.html HTTP/1.1" 200 4452 "http://www.lawrencechin2011.com/gallery/holywh.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" What's particularly noteworthy is that there is no log entry for her visit to holywh.html. How then has she got to the web gallery from the link on holywh.html? You have to suspect that, because she is so afraid that the suspect might know she is visiting his website again – and yet she wants to participate in the rumoring as well in order to produce testimonies for the next detective and evidence for Homeland Security – she decides to look at the suspect's painting of “Holy Whore” from the HK Hacker's cache of the suspect's website. To make sure that the suspect's web gallery is actually still existent, however, she eventually would have to come to the suspect's site itself, thus getting herself detected nonetheless. Now, why is she wanting to see the painting “Holy Whore”? Probably just as the suspect would later suspect: she wants to make false testimony saying that the suspect has painted her nude thus embarrassing her and violating her privacy. Not only is this golden (though false) evidence for the next detective, but golden evidence for Homeland Security in support, in the ICJ, of their false profile of the suspect as a “misogynist” and “constantly violating women's space and privacy”. 2:03 PM, 71.94.58.80, Foucault on bio-power, dhcp.snlo.ca.charter.com, Los Osos, CA. 71.94.58.80 - - [24/Nov/2015:15:03:06 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More false rumoring about the suspect's plagiarism. 2:17 PM, 125.128.226.172, Seoul, Korea. 125.128.226.172 - - [24/Nov/2015:15:17:23 -0700] "GET /shizukadetail.jpg HTTP/1.1" 200 380066 "http://www.lawrencechin2011.com/fising2.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/22.0.1207.1 Safari/537.1" More false rumoring about how the suspect has violated Ms Kudo's privacy by putting her photograph on his website and claiming that it is his drawing (!). 77 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Meanwhile, 2:50 PM, the suspect sets out for Chrysalis. Waited for Tanisha until 4 PM. 5 PM, out. With Derrick. Bail Hotline. Starbucks, Normandie. Terrified by ANG’s visit to “Holy Whore”. Forum, like a zombie. Slightly recovered toward the end. Home. Meanwhile, the Secret Society's operation continues. 6:35 PM, 6:37 PM, 190.113.164.2, supercanal.com.ar, Villa Mercedes, Argentina. 190.113.164.2 - - [24/Nov/2015:19:35:17 -0700] "GET /suppl_pld_4_113b/suppl_pld_4_113b.pdf HTTP/1.1" 404 1360 "https://www.google.com.ar/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 190.113.164.2 - - [24/Nov/2015:19:35:28 -0700] "GET /suppl_pld_4_113b/suppl_pld_4_113b.pdf HTTP/1.1" 404 1360 "https://www.google.com.ar/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Presumably, same as the earlier ones: “Hey, I remember this guy,” etc. 2:22 AM, 173.252.112.100 - - [25/Nov/2015:03:22:15 -0700] "GET /scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12120 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" The portion of the Secret Facebook Group in which the image athd2.jpg is linked is being accessed. 25 November (Wednesday; fewer actions from the Secret Society) The Secret Society's operation: 5:03 AM, 161.139.222.37, quantum mechanics, Universiti Teknologi Malaysia, Taman Bukit Skudai. 161.139.222.37 - - [25/Nov/2015:06:03:07 -0700] "GET /scientificenlightenment1/quantummechanics.htm HTTP/1.1" 200 28558 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2471.2 Safari/537.36". 5:04 AM, he looks also at the PDF version. Clearly, the Secret Society needs somebody with academic credentials to join in on the rumoring about the suspect's plagiarism in order to enhance the credibility of their ridiculous portrayal of the suspect. More testimony for the next detective and more evidence for Homeland Security. 6 AM, 64.233.172.159, Google Web Light. 64.233.172.159 - - [25/Nov/2015:07:00:57 -0700] "GET /thermh1.html HTTP/1.1" 200 24055 "http://www.google.co.in/search?hl=en-GB&redir_esc=&client=ms- androidsamsung&source=android-launcher-widget&v=133247963 &qsubts=1448460164933 &action=devloc&q=is+antropic+carbo+mill+effects+on+women&v= 133247963" "Mozilla/5.0 78 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 (Linux; Android 4.2.1; en-us; Nexus 5 Build/JOP40D) AppleWebKit/535.19 (KHTML, like Gecko; googleweblight) Chrome/38.0.1025.166 Mobile Safari/535.19" Note that this guy is in the UK (“en-GB”). More bad rumors about the suspect's plagiarism. 6:03 AM, 93.172.39.29, Google IL, Greek religion, netvsion.net.il. More bad rumors about the suspect's plagiarism. 7:50 AM, 77.99.54.50, layereduniverse.html, direct visit, aztw.cable.virginm.net, Bath, UK. (Note the visitor from Bath, 26 June, 2014, 1:10 AM.) 7:51 AM, he went to the Table of Contents. This is evidently another volunteer “who has heard of the suspect before” and given the link by another volunteer. 9:32 AM, 180.177.104.151, allegoryofcave.html, direct visit, dynamic.kbronet.com.tw, Hsinchu, Taiwan. Another volunteer. Surely, there must be “volunteers” whose job it is not to rumor about the suspect's plagiarism but to simply visit his site for no reason whatsoever, in order to generate “decoys”. 6:15 PM, 103.231.241.108, capra7777.html, proxy7.dlsu.edu.ph, de la Salle University, Manila, Philippines. Another volunteer. “Plagiarism”. There is nothing particular about the suspect today. He leaves home around 12:30 PM. Storage. Casbah, almost immobilized: not sure what to do. Tony there. Left almost 8 PM. To home. Of note is that (1) Mr Crouch has replied the suspect on 6:25 PM (forwarded by Mr Angelucci); and (2) Marina still hasn’t declined the suspect's offer. Both Mr Crouch and Mr Angelucci must have already been warned by Homeland Security that the suspect is suspected of connection with the Paris attacks and that he suffers severe schizophrenic delusion about a group of women going after him, upon which Mr Angelucci would have noted that he has indeed received a narrative from the suspect about “women's affairs”. They have probably also been contacted by the Manhattan Beach Police Department detective around 19 November. In this way they would have been in contact with the Secret Society women. Unless both have also been recruited by the TMU/ CIA, they would not know the truth. It's evident here that they are contacting the suspect solely in order to verify the suspect's email account and lure him to give out his debit card information. For two purposes. First, the next detective would need the information to conduct his investigation. Second, Homeland Security is planning to create confusion in the interception of the financial transaction in order to end up with a piece of (false) evidence seemingly indicating the suspect receiving money from the Russians. Homeland Security is now changing its plan. Since there is no possible way to suspect the suspect of having prior knowledge of Paris attacks – given his complete social isolation, this is a ridiculous charge – Homeland Security is creating a new scenario where it is the Russians and the French who have prior knowledge of the attacks and who have decided to “let them happen” for political purposes. The French and the Russians – so the story goes – then secretly instruct the suspect to put up his essays just days before the attacks so that both parties can look at them on the pretext of emergency situation and, getting amazed by his talents, make him a star and denounce Homeland Security's profile as 79 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 “false”. In this new scenario, the suspect does not have to have prior knowledge. He is said to follow instruction and receive payment for his work without understanding why. 2:07 AM, RM Education Plc, London. (This is a company providing network services to schools.) Another volunteer to rumor about the suspect's “plagiarism”. 217.179.202.2 - - [26/Nov/2015:03:07:51 -0700] "GET /scientificenlightenment1/cosmicdance2.jpg HTTP/1.1" 200 40022 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.132 Safari/537.36" 2:57 AM, Primelink Telecom, Moscow, 95.131.179.202 - - [26/Nov/2015:03:57:14 -0700] "GET /scientificenlightenment1/nostratic2.jpg HTTP/1.1" 200 42640 "https://www.google.ru/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Probably a Russian informant inside the Secret Society. Pretending to join in on the rumoring but secretly collecting evidences. 26 November (Thursday, Thanksgiving) The Secret Society's operation continues. 6:23 AM, 177.182.55.57, plato.html, Google BR, virtua.com.br, Belo Horizonte. Another volunteer to rumor about the suspect's “plagiarism”. 6:58 AM, 97.44.66.132, myvzw.com, Verizon Wireless, Arizona. 97.44.66.132 - - [26/Nov/2015:07:58:56 -0700] "GET /blogs/2014/04/14/last-word-on-my-pasttwo-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 4.4.2; VS415PP Build/KOT49I.VS415PP2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.76 Mobile Safari/537.36" This volunteer pretends to surf onto the suspect's past Prison Planet forum posting to get freaked out: this guy's delusion about the women he's obsessed with is incredible! No wonder that the women are so scared! He would then pretend to contact the women to express his concern for their safety. Another testimony for the next detective and another piece of evidence for Homeland Security. 7:01 AM, 78.193.54.96, Free SAS, Paris. 78.193.54.96 - - [26/Nov/2015:08:01:40 -0700] "GET/scientificenlightenment1/plato333.html HTTP/1.1" 200 5286 "https://www.google.com" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:42.0) Gecko/20100101 Firefox/42.0" Another volunteer. Some volunteers, of course, must be TMU informants. Some might even be Interpol's informants. 80 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 7:02 AM, the 6:58 AM Arizona person came back: 97.44.66.132 - - [26/Nov/2015:08:02:31 -0700] "GET /blogs/2014/07/02/my-perps-and-whythey-are-currently-targeting-me-part-ii/ HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 4.4.2; VS415PP Build/KOT49I.VS415PP2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.76 Mobile Safari/537.36" This actress continues to pretend to have tracked down the identity of the crazy poster; probably even to pretend to have shown interest in suspect's LB posting and thereby discovered the identities of the women referred to in the summary there. 10:21 AM, 87.164.116.164, capra.html, Google DE Images, t-ipconnect.de, Hamburg. Another volunteer: “This guy is stupid. He wants to pretend to be an intellectual, and so copies all this stuff from Fritjof Capra's famous book and puts it on his website to fool people. What a jerk.” Excellent testimony for the next detective and excellent evidence for Homeland Security in the ICJ. 10:59 AM, 131.247.226.153, laptops.usf.edu, University of South Florida, Tampa, Florida. 131.247.226.153 - - [26/Nov/2015:11:59:58 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200 27754 "https://www.google.com/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" This person was here before. Another volunteer. Not sure whether it is a decoy or another bad rumor. 1:05 PM, 192.55.54.38, fmdmzpr03-ext.fm.intel.com, Intel Corporation, Santa Clara. 192.55.54.38 - - [26/Nov/2015:14:05:55 -0700] "GET /scientificenlightenment1/fermat.html HTTP/1.0" 200 36447 "-" "AHC/1.0" A direct visit. Given the link. Another volunteer. Rumor about the suspect's “plagiarism”. 1:39 PM, 221.145.183.167, /, Google KR. The same Korean scout. 4:59 PM, 92.236.133.178, quantum mechanics, direct visit, cable.virginm.net, Birmingham, UK. Another volunteer. Meanwhile, the suspect. Woke up late. Came directly to downtown. Got free food. 1:36 PM, Starbucks, downtown, Internet connection cut off. Then, SM Beach. 4 PM, found Erik. Then, Starbucks at the Promenade. Paid to become a member of NCFM. The suspect has fallen into Homeland Security's trap. 6 PM, at Googies, French Language Friends. Simone there (German). There is this “Noah” who wants to establish contact with the suspect. He is a Homeland Security informant here to frame the suspect. Earlier, when the suspect pays for his NCFM membership fee, Homeland Security has already produced a piece of evidence for his financial dealing with the French and the Russians (by confusing NCFM's Paypal account with the suspect's own tiny 81 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 bank account). Unaware of Noah's evil intent, the suspect shows him his web gallery. 7:10 PM, the suspect uses Noah's phone to look at his web gallery: 166.137.246.46, mycingular.net, Rancho Cucamonga. The suspect leaves the meetup on 7:30 PM. 7:52 PM, 24.217.89.32, justiceinrepublic.html, Google, Ballwin, Missouri. Another bad rumor about the suspect's plagiarism. 10:26 PM, 73.32.209.249, yunqing.pdf, Comcast, Sugar Land, Texas. This person seems to have been here before. 10:51 PM, she’s here again looking for the same chapter. (Note the visit from Sugar Land on 2 November, 3:07 PM: biopower2.html.) Certainly a volunteer: “I remember this guy. He is the one who has grabbed off other people's contents and put them on his website to pretend to be knowledgeable.” 3:49 AM, wsip-68-15-198-222.ok.ok.cox.net, Tulsa, Oklahoma, 68.15.198.222 - - [27/Nov/2015:04:49:53 -0700] "GET /scientificenlightenment1/orphism.html HTTP/1.1" 200 39990 "-" "Mozilla/5.0 (Windows NT 6.2; WOW64; rv:30.0) Gecko/20100101 Firefox/30.0" This volunteer is simply sent the link in order to join in on the rumoring about the suspect's plagiarizing habit. 27 November (Friday) 4:58 AM, 42.2.83.225, yunqing.pdf, static.netvigator.com, Hong Kong. Another volunteer has pretended to remember that the suspect repeatedly violates other people's copyrights by putting their content on his website. Again, the document is not there anymore, and this is only the PDF printout of somebody else's blog post: it's just something which everybody does from time to time. Hardly a case of violation of others' copyright. 8:13 AM, 66.87.121.178, the female brain, pools.spcsdns.net, Houston. Another volunteer looking for signs of plagiarism on the suspect's website. Even though the material is long gone, chatter nevertheless. 10:07 AM, 171.33.193.111, humandispersal.html, Google FR Images, London Grid for Learning Trust, London. Chatter about the suspect's plagiarism because of a large bloc of quotation on the chapter. 11:12 AM, schuld.html. Chatter (“plagiarism”). 11:24 AM, 74.102.228.62, newsummaryweb.html (not there), nwrknj.fios.verizon.net, Short Hills, New Jersey. Again, even though the material is gone, the volunteer “remembers seeing it”. Chatter about the suspect's bizarre insanity for believing in a secret ICJ trial and being implanted with brain chips. 11:57 AM, 68.196.138.169, 1/appendix.html, dyn.optonline.net, Bergenfield, New Jersey. Chatter about the suspect's plagiarism. 82 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 12:18 PM, the Princeton decoy, 128.112.155.172 - - [27/Nov/2015:13:18:17 -0700] "GET /scientificenlightenment1/coatlicue.jpg HTTP/1.1" 200 75741 "http://www.lawrencechin2011.com/scientificenlightenment1/ancestorcult.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" As always, this frequent visitor from Princeton University is doing decoy, most likely. 3:49 PM, 86.168.231.108, familyphoto4.jpg, BT, Toddington, UK. Chatter about how the suspect violates his family members' privacy. 3:56 PM, 70.215.135.107, presocratics.html, myvzw.com, Sherwood, Arkansas. Chatter about the suspect's plagiarism. 5:34 PM, 49.207.191.234, xper3.html, Google IN, ras.beamtele.net, Chennai, India. Chatter about how the suspect has put other people's artworks on his website and claimed them as his own. (Recall that, in 2008, this large drawing of the suspect's was stolen from his home by Homeland Security and given to somebody else as if it belonged to that someone else, so that the suspect can be falsely accused of putting somebody else's drawing on his website.) Meanwhile, the suspect: Woke up 11 AM. Lunch at the Vietnamese restaurant. Home. MST. (MILF.) 12:30 PM, out. Casbah, directly. Tony there. Past 6 PM, the suspect goes to AVFM forum posting from his links page. Blocked on Google Chrome. Tried it on Firefox, still blocked. Then, the suspect posts Summary II (Sequel) at the AVFM forum (recounting the Secret Society's operation from 13 November up till the present moment). Then he tries to go to the posting again from his links page on Internet Explorer, allowed. Began talking to “Ren” (girl). Left a message with W. Later, RT Deutsch from links page also blocked. These are the evidences which a new law enforcement authority has begun collecting for the suspect's possible anti-American activity in collusion with foreign powers, which would also be golden evidence for Homeland Security in the ICJ. 6:28 PM, 108.199.226.79, lightspeed.irvnca.sbcglobal.net, Glendale, CA. 63.250.204.24 - - [27/Nov/2015:19:28:40 -0700] "GET /imp_documents_5/fr_jennifer_day_nov_2006.jpg HTTP/1.1" 200 441483 "https://search.yahoo.com" "YahooCacheSystem; YahooWebServiceClient" 108.199.226.79 - - [27/Nov/2015:19:28:53 -0700] "GET /imp_documents_5/fr_jennifer_day_nov_2006.jpg HTTP/1.1" 200 436767 "https://search.yahoo.com" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" Presumably JD has been contacted again by both the Secret Society women and the volunteers. JD of course also serves also as a law enforcement informant inside the Secret Society. (This is 83 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 not necessarily JD herself, but somebody doing the search for her, maybe her friend.) “He is violating women's privacy”: both “chatter” and “evidence”. 7:48 PM, 173.252.88.185 - - [27/Nov/2015:20:48:22 -0700] "GET /scientificenlightenment1/cosmicdance1.jpg HTTP/1.1" 206 9302 "http://alfaimg.com/show/antiprotons-diagram.html" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" 173.252.90.80 - - [27/Nov/2015:20:48:22 -0700] "GET /scientificenlightenment1/cosmicdance2.jpg HTTP/1.1" 206 9302 "http://alfaimg.com/show/antiprotons-diagram.html" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" Apparently, the Secret Society women have linked alfa-img.com search results from the Secret Facebook Group. The Secret Society is brainstorming. 8:35 PM, 108.184.15.237, Yunqing (not there), socal.res.rr.com, Garden Grove. 108.184.15.237 - - [27/Nov/2015:21:35:45 -0700] "GET /miscellaneous/yunqing.pdf HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 _1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) GSA/10.0.63022 Mobile/12H321 Safari/600.1.4" More chatter about the suspect's putting other people's contents on his website without consent (violation of other people's copyrights). Meanwhile, past 8 PM, the suspect has left Casbah. 9:01 PM, Noah from last night text-messages the suspect. He is going to further frame the suspect for conspiracy with the French (FN) and the Russians. 10:41 PM, 174.57.216.202, hackbb forum, Bing, “Deep Web Murder”, nj.comcast.net, Wildwood, New Jersey. This is evidently more chatter: “Look, if I search for 'Deep Web Murder', references to his website will show up. This guy is truly scary! His website is scary!” Other visits of note (chatter) afterwards include: 11:12 PM, dsl.sndg02.pacbell.net, Escondido, California, 69.109.158.247 - - [28/Nov/2015:00:12:51 -0700] "GET /1/elementarystructures.htm HTTP/1.1" 200 18877 "https://www.google.com/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Chatter about the suspect's “misogyny”. 11:59 PM, hsi6.kabel-badenwuerttemberg.de, Reutlingen, Germany, 109.192.195.101 - - [28/Nov/2015:00:59:53 -0700] "GET /gallery/himiko.html HTTP/1.0" 200 2873 "http://images.google.de/imgres? 84 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 imgurl=http://www.lawrencechin2011.com/gallery/himiko.jpg&imgrefurl=http://www.lawrencec hin2011.com/gallery/himiko.html&h=738&w=550&tbnid=SN9eqxHIBGoC1M:&docid=fIxlUI3 _J9yy_M&ei=glxZVrWxH4epUfOajugO&tbm=isch&iact=rc&uact=3&page=3&start=76&ved= 0ahUKEwi1-tne0LLJAhWHVBQKHXONA-0QrQMIqwIwWA" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko" 109.192.195.101 - - [28/Nov/2015:00:59:53 -0700] "GET /gallery/himiko.jpg HTTP/1.0" 200 492538 "http://images.google.de/imgres? imgurl=http://www.lawrencechin2011.com/gallery/himiko.jpg&imgrefurl=http://www.lawrencec hin2011.com/gallery/himiko.html&h=738&w=550&tbnid=SN9eqxHIBGoC1M:&docid=fIxlUI3 _J9yy_M&ei=glxZVrWxH4epUfOajugO&tbm=isch&iact=rc&uact=3&page=3&start=76&ved= 0ahUKEwi1-tne0LLJAhWHVBQKHXONA-0QrQMIqwIwWA" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko" This is what the search looks like: Again, chatter about how the suspect has copied someone else's painting. (You recall that somebody else, around 2008, has copied this 2001 painting of the suspect). 3:49 AM, Kenya Education Network, Ruiru, Kenya, suspected network sharing device: 41.89.10.241 - - [28/Nov/2015:04:49:37 -0700] "GET /scientificenlightenment1/quantummechanics.htm HTTP/1.1" 200 28558 "http://www.bing.com/search? q=relationship+between+zeeman+effect+and+quantum+atomic&qs=n&form=QBRE&scope=we b&pq=relationship+between+zeeman+effect+and+quantum+atomic&sc=0-24&sp=- 85 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 1&sk=&cvid=e3abbb0640ce4d9da3655ca6f2f4dafe" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko" 3:50 AM, Non-state educational institution Educational Science, Moscow, 93.175.7.158 - - [28/Nov/2015:04:50:38 -0700] "GET /scientificenlightenment1/higgsfield.jpg HTTP/1.1" 200 44655 "https://www.google.ru/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Both indicate “chatter” about the suspect's plagiarism. 28 November (Saturday; W) 6:53 AM, 74.109.34.137, Genealogy of Morals, Bing, “Walter Kaufmann translation of…” He immediately goes to acad.html, phlapa.fios.verizon.net, Morrisville, PA. This may be just a “decoy” rather than “chatter” (plagiarism). 7:55 AM, 136.179.21.64, switchnap.com, California. 136.179.21.64 - - [28/Nov/2015:08:55:35 -0700] "GET /pleading_papers/opposition_to_demurrer.doc HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (iPad; CPU OS 8_4_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H321 Safari/600.1.4" This is evidently another “volunteer” (perhaps somebody related to the suspect's cousin Evelyn) who “remembers” how the suspect has violated his own family members' privacy. Luckily, the suspect has already removed the document, so that only the “chatter” could be used as evidence against him at the next law enforcement authority. Nonetheless, it is evidence for Homeland Security in the ICJ. 8:49 AM, 70.169.133.38, American Civil Religion, Google, Norfolk, Virginia, wsip-70-169-13338.hr.hr.cox.net. “Decoy”? 9:18 AM, retail.telecomitalia.it, Crecchio, Italy, 95.252.229.185 - - [28/Nov/2015:10:18:10 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 315020 "https://www.google.it" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" The same chatter about how the suspect has copied somebody else's painting. 12:02 PM, 221.145.183.167, /, Google KR. It’s the Korean scout. Last time here, 1:39 PM, 26 November. Around 12 PM, the suspect is still at home. His Windows Defender warns of “Trojan” inside his computer. Then, for the rest of the day, icons on Windows Explorer would flash every minute or so. The suspect begins to wonder whether the police might have installed malware on his computer. It might in fact be either Homeland Security or the Russians. 86 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 1:58 PM, 86.18.119.34, himiko.jpg, London. The same chatter as on 9:18 AM? 2:30 PM, Evgeny – a Russian journalist to whom the suspect has also made offer on Couch Surfing – logs onto Couch Surfing, but does not respond to the suspect's offer. He must have been warned by the Russian authority not to respond, lest there be more suspicion about the suspect's conspiracy with the Russians. 3:11 PM, 92.151.113.23, schuld.html, abo.wanadoo.fr, Paris. 3:21 PM, the suspect is now at Casbah, and he calls W. W answers it. As usual, all the parties to the ICJ trial are listening in attentively on the suspect's words looking for evidences in their respective favor. The details of the conversation are as follows (from 59:00): (1) About W's public policy online course. (2) His answering machine is still on. How did the women gain access to their conversation? (3) Worried that law enforcement, unaware of the situation, is taking the Secret Society's case all very seriously. A trojan horse in his computer? (4) The women depend on other people being stupid in order to succeed, whereas the suspect depends on other people being intelligent in order to survive. Since stupid people outnumber smart people by hundreds to one, the suspect is greatly disadvantaged and always in danger. Hence the women have gone to a small city's police department, where the detectives are inexperienced and unsophisticated. (5) Why was ANG looking at the suspect's painting “Goddess Athena rewarding the scientist”? (6) How the volunteers pretend to discover that the suspect's writings are plagiarized. This might be evidence in favor of Russia and France: the suspicion that the intercepts which Homeland Security has brought into the court house might be fake. (7) W: “Why don't you move to a different state?” The suspect: They are accusing him of cyberstalking in order to avoid the difficulty that the suspect doesn't actually stalk them at all (1:10:00). Furthermore: “It depends on where the victims live, not where the suspect lives.” W: “But if it's crossing state line, then they can't do anything...” (8) The suspect: “Unfair, somebody was hurting me back in April and May, and now I couldn't move anywhere because of the trial and the upcoming probation, and I don't even know what the point is of it all, is it to let FN win? I'm only guessing....” W: “You've got to move on...”. Then, when a car honks nearby, W asks: “What's that?” “Cars honking” (1:16:00). W: “What does that mean?” The suspect: “Nothing.” W is trying to lure the suspect to say, as he used to say, that, when cars honk, it's because the control center is signaling that he has said something right. This then would make the suspect look crazy to anyone who is listening on the suspect's conversation. It would thus be evidence for Homeland Security to confirm their false profile of the suspect in the ICJ. And so W must have been instructed by both the Secret Society women and Homeland Security beforehand to play tricks whenever possible to make the suspect look crazy. In fact, even the suggestion for the suspect to move out of the state seems like a trick to lure the suspect to become a fugitive. (9) How the cyberstalking case is established. The “scientific method” which the women and the detectives cannot imagine because their brain has significantly shrunken. The example of how the scientists have come to the conclusion that there is this thing called “Dark Matter”. “Their brain has lost the inferential thinking function...” The suspect: “My problem is caused by the fact that most people's brain is crushed... This is a good way to demonize Americans, because 87 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 American culture has become so degenerate that the human brain which grows up in it is crushed under its weight.” W: “Capitalism turns people into sheep, in today's consumerist culture there is no longer any preoccupation with ideals.... That's why Donald Trump can say what he says and be liked, just because he is honest... All the social media and so on exist to preoccupy people's time, thus giving corporations the power and opportunity to manipulate people... By now nobody studies philosophy.. .” The suspect, “This is precisely what Marine has said, but she hasn't quite pinpointed the problem; other than naming the 'robotic consumer', she didn't recognize the issue about brain deterioration.” Then the suspect expresses his wish to convince Marine to add the issue about brain development to her agenda. And, he notes, Russia can also build up its reputation by endorsing the agenda of saving the human brain from American corporate assault. W: “The corporate consumer culture easily brainwashes consumers... Selling products as a way of life...” (1:27:00). The suspect: “When Russia does so, it must emphasize it's the US which wants this globalized commerce and consumer culture...” W: “It doesn't matter... to prevent people from becoming free thinker...” The suspect: “But Marine says just this...” About the Frankfurt school. About the Una-Bomber. The suspect disagrees that the Una-Bomber has the same agenda against consumerism. W: “How you can dumb down people... Make them become dependent on machines...” The suspect: “Terrorism is not a big issue... Protecting the human brain is a bigger issue...” (1:31:00). W: “Corporations are making you into robots... Everything controlled and manipulated by corporations...” The suspect: “FN is saving the world from corporations...” W: “FN does not have a good reputation... The common impression of FN is that they are bigots...” About how the guy with a good idea is wasted because he is under Nazi's banner. W is here hinting to the suspect that all his philosophies to debunk American political correctness are now considered “terrorist plans” and, along with Russians' similar ideas, potentially banned under UN Resolution 1373 because of his status as a “misogynist terrorist”, and yet the suspect is not quite aware of it. It will be very hard for him to grasp everybody's enormous demonization of him as a “dangerous terrorist” because, stuck in his traditional mindset, he finds it hard to imagine how breaking people's windows could be considered “terrorism” under international laws. The suspect: About the variety of far right parties in Europe. About Geert Wilders. How Russia can make a good reputation for itself by demonizing American global commerce as destroying the human brain. Then the suspect shouts: “I hope they can hear me, but I don't want to get into troubles... But somebody has to do something about this American digital culture, as people are becoming so dumb that they can only understand stereotypes.” This is certainly evidence in Russia's favor, i.e., that the suspect doesn't have prior knowledge of Russia's involvement. He doesn't even know that the Russians, as well as the French, are listening in on his conversation. W: “What I like about the French is precisely how they have imposed an intellectual culture... The French have got America wrong, and then got it right...” “The stereotype of Americans are becoming true...” (1:42:00). Then the suspect expresses his wish to be part of the FN movement.” W: “Be that in LA...” The suspect doesn't think it possible because he has no following. W: “It's possible to do it without established institutions...” W: “People nowadays are all about living a materialist life, they are braincrushed...” W: “Average people are becoming more intelligent... But this impression is all due to 'standard deviation'...” (1:49:00). The suspect: “Among Women there are fewer idiots, but also 88 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 fewer geniuses...” W then suddenly mentions he will call the suspect back (1:52:00). The suspect notices that, 3:38 PM, Noah has called while the suspect was talking to W (323-573-2717). When the suspect hangs up, he looks at Noah's message to him, and then calls him to tell him that he will call him back shortly. Why did W go into all this rambling about capitalism and corporations in the manner of a (vulgar version of) critical theory critique? Insofar as Homeland Security has insisted on the terrorist suspect status of the suspect, both the Russians and the French must have pointed out that the Marine document, as well as other writings of the suspect, simply doesn't fit the typical image of a “terrorist”, who is a Muslim, or at least religious. Homeland Security recalls that the UnaBomber Ted Kaczynski is something like an anti-capitalist, Marxist type, a vulgar version of Marcus and Adorno, and he is classified as a “terrorist”. And so they must have instructed W to steer the suspect onto this line of thought. Insofar as his anti-feminism stance derives from his staunch opposition to corporate profits, his (supposed) “misogynist vandalism” can help classify him as a “terrorist” along the line of the Una-Bomber. Then W calls back on 2:08:30. About why women, on average, do better than men in college. W: “Why are there more male idiots than female idiots?” W's answer: males are more likely to be addicted to video games. The suspect's answer: “testosterone”. This is evidence in favor of TMU/CIA and, indirectly, of the Russians and the French, i.e. evidence that Homeland Security's profile of the suspect as a misogynist cannot be correct. The suspect's view on gender differences is entirely objective and based on scientific researches. He has not expressed anything close to “hatred toward women”. The suspect then expresses his wish again to be part of FN so as to persuade FN to make this “digital dementia” into part of the party's agenda. W: Naomi Klein's view. Then, about how digital technology has changed people's brain. “There are other forces which are also making people increasingly stupid.” W seems to be repeating the viewpoints which the suspect himself has expressed in his “Subhman meets poisonous friends”. It would thus seem that W is again carrying out his order from Homeland Security, i.e. to express the suspect's viewpoints as if it were his own so that others can suspect the suspect of plagiarizing his best friend! This is thus evidence in favor of Homeland Security, that the suspect is indeed a plagiarizer. W continues: “Unless you write the Great American Novel, where everything is your own ideas...” It would seem that W is passing along a “secret message” from the Invisible Hand, since the “Great American Novel”, i.e. Moby Dick, will later make its appearance as well. W: “Whereas in academic studies, you find many people's ideas, so that people are tuned to others, Facebook has turned everyone's attention onto himself or herself... Everybody has turned from the 'third person' to the 'first person'... Nowadays, being egocentric is the norm rather than the deviation from the norm...” W thus continues to repeat the suspect's ideas in his “Subhuman meets” and “Syrian scandal, conclusion”. Then, the suspect complains about having to spend most of his time dealing with gang-stalking instead of studying philosophy. “Only if the scenario about BOL were correct...” then both the suspect and W would be saved. The suspect then brings up something very important: “Marion, 'victim feminism'” (2:22:00). The suspect concludes: “Maybe just a coincidence.” This of course has completely saved the French and the Russians, since, at the time, 11 November, if you recall, it is really the TMU which has instructed one of 89 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 their moles inside the Secret Society to make this visit, the purpose being to create a piece of evidence that they might need precisely in the present situation in which they have found themselves. The suspect: “Sad that every far right party in Europe is focused on terrorism, this is a waste, they should focus on the problem of brain development, these ISIS terrorists are just a bunch of losers... Nations shouldn't have to change their policy just because of a bunch of nobodies”. (2:26:00) He continues: “The Paris attacks look more like mass murder than terrorism...” This is of course more evidence in favor of the TMU/ CIA and the French and the Russians. The suspect is neither a violently-oriented and hate-filled “terrorist” like Homeland Security has imagined nor a hater of Muslims, a “bigot” which is the stereotypical supporter of FN. He continues: “These women are the embodiment of evil, trying to prevent me from saving the world... Women are really bad, people don't know that... And law enforcement tries to protect them... America is upside down, what a fucking country....” Homeland Security might enter this last confession of the suspect as evidence to support their false profile of the suspect as a misogynist; but the French, Russians, and TMU/ CIA might respond that the suspect's negative assessment of womankind is completely reactionary, a response to his being gang-stalked by a group of women. The operations which occur while the suspect is talking to W include: 3:38 PM, 130.113.109.216, allegoryofcave.html, ipreg.mcmaster.ca, McMaster University, Hamilton, Ontario. More chatter about the suspect's plagiarism by a credible source, a university student. 4:18 PM, the suspect calls Noah back. He gives the suspect a link. There must be something wrong with the link. Should the suspect ever click on the link, Homeland Security would have obtained another piece of evidence demonstrating the suspect's conspiracy with the French and the Russians. But he is already suspecting that something is up, and so will never even look at the link. However, he is, at this time, suspecting that it is law enforcement detective who wants to insert malware into his computer. 4:26 PM, the suspect calls Noah back. 4:30 PM, W calls back. 6:27 PM, Marina logs into Couch Surfing but still does not respond to the suspect's offer. 7:21 PM, Noah texts the suspect again. He continues to ignore Noah. 7:34 PM, the suspect, still at Casbah, posts on Partisans (Les américaines qui sont contre la [mondialisation] et qui soutiennent Marine de loin). This posting, along with the suspect's cry on the phone, “I wish the Russians could hear me”, is evidence in support of the Russian/ French claim that the suspect is not conspiring with them and has no prior knowledge of what is going on right now. 7:57 PM, the suspect calls Angela. 8:07 PM, 75.1.146.106, layereduniverse.html, Google, sbcglobal.net, San Antonio. More chatter about the suspect's plagiarism. 90 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 8:55 PM, 70.124.197.5, germaninvasion.html, Google, Brownsville, Texas. (Note the Brownsville person from 2:53 AM, 27 June 2014.) Another volunteer is chitchatting about the suspect's plagiarism. 9:27 PM, 37.188.133.49, Greek Religion, Yahoo, Prague, Czech Republic. Either a decoy or chatter. 12:24 AM, the suspect, already home, posts on LB: Now the gang of women who are gang-stalking me are sending their online friends to pretend to be concerned strangers and to track down my true identity and the identities of women designated as “J”, “K”, “G”, and “M” above, so that they can pretend to be concerned netizens warning everybody here that the above story is bullshit and contacting the women about the matter and enabling them to go to law enforcement to falsely accuse me of “online harassment” and “online slandering” – all this I have narrated in another Internet forum. It’s a massive staged show to discredit me. I shall not, however, bother to direct any of you over there. Presumably you can find it yourself. Of course, under normal circumstances, nobody will give a crap. But the women’s online friends will pretend to be so interested in the matter that they will direct you over there in order to discredit me. As soon as the suspect has posted this, the Secret Society goes into operation in response. 1:12 AM, cable.virginm.net, Mansfield, UK, 86.2.89.123 - - [29/Nov/2015:02:12:27 -0700] "GET /blogs/?author=1 HTTP/1.1" 200 3385 "https://www.google.co.uk" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 86.2.89.123 - - [29/Nov/2015:02:12:48 -0700] "GET /blogs/wpcontent/plugins/jetpack/_inc/genericons/genericons/genericons.css?ver=3.1 HTTP/1.1" 304 162 "http://webcache.googleusercontent.com/search? q=cache:hpFjW6xn5cwJ:lawrencechin2011.com/blogs/%3Fauthor %3D1+&cd=1&hl=en&ct=clnk&gl=uk" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" Evidently, the LB Admin has pretended to get freaked out by the suspect's latest posting, and contacted this Mansfield person and provided him with the suspect's email address. The Mansfield person then, having heard about this “crazy blog” of the suspect, then Googles for it, pretending to show interest and be concerned about the Secret Society women's safety and producing the evidences which Homeland Security needs. In the following you will be witnessing “cyber gang-stalking” and “cyber-street theater” at its best. One after another “gangstalker” would post something to create the impression for bystanders that the suspect is completely insane and totally paranoid over nothing. 91 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 1:53 AM, nemesis45 posts the first reply on LB. (Total posts: 7994; per day: 20.43; joined: 3 November 2014): “I just can't see what you are hoping to achieve. English Civil and/or Criminal Law is not going to help you seek advice from US based lawyers and/or law forums.” 2:21 AM, Kati LB Team Member posts a second reply. (Total posts: 7162; per day: 13.41, joined: 13 June 2014): “I can guarantee that no one has joined LB with the intention of PM-ing our users to discredit you. If that had been the case, the whole site team would have quickly known about (and put an end to) it straight away. 2:29 AM, nemesis45 posts a third reply: “Has anyone reported such a PM Kati? I get a fair number of PM's daily and I've not seen one.” 2:33 AM, Kati LB Team Member posts a fourth reply: “Nope. As you know, we're pretty strict about such things on here too.” 3:04 AM, nemesis45 posts a fifth reply: “I thought as much! Very strange posts indeed. It seems it's done the rounds elsewhere!” 3:15 AM, nemesis45 posts a sixth reply: “Looking back to post #1 again one of my initial thought[s] [sic] was brought to mind, i.e. that this [is] rather a strange spam”. These members at LB have been instructed by both the “professional” and Homeland Security to stage this show in order to make the suspect look crazy and paranoid. Of course, there have in fact not been any bulk emails to LB members warning everybody about the suspect, so that nobody is here lying, per se. Nevertheless it's all a staged show. The Russians need all this done in order to avoid the charge of “conspiracy” with the suspect, while Homeland Security wants all this in order to have more evidences in the ICJ to demonstrate that their false profile of the suspect (a paranoia schizophrenic) is correct. 29 November (Sunday) 4:32 AM, 107.77.75.21, AT&T Wireless, Sacramento, CA. 107.77.75.21 - - [29/Nov/2015:05:32:12 -0700] "GET /scientificenlightenment1/capra7777.html HTTP/1.1" 200 21637 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1" More volunteers' chatter: “This guy plagiarizes.” 4:38 AM, Amethyst (Site Owner; LB Admin) posts a seventh reply: “If it needs confirming, there have been no messages at all [sent] to the OP of this thread except for the initial welcome message from Celesinte.” And so the staged show continues. While everybody at LB is doing 92 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 this in order to make the suspect look crazy to bystanders, everybody is also trying to deceive the suspect into the impression that nobody is pulling shit behind his back, just as the Bacchic Orphism guy has done. But of course the suspect will never be so duped. 4:49 AM, 80.189.8.35, dyn.plus.net. This is the LB Admin. 11 minutes after she has posted the seventh reply, she is Googling the suspect's email address the second time.. 80.189.8.35 - - [29/Nov/2015:05:49:19 -0700] "GET /blogs/?author= 1 HTTP/1.1" 200 3385 "http://www.google.co.uk/url?url=http://lawrencechin2011.com/blogs/%3Fauthor%3D1 &rct=j&q=&esrc=s&sa=U&ved= 0ahUKEwjw1uHO1bXJAhVGWRQKHXQmAtoQFggUMAA&sig2 =VU7iAltWMPcKORSx2ESZhw&usg=AFQjCNGvultm4bYWm5l08RhW6LNi5AX4bw" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" 80.189.8.35 - - [29/Nov/2015:05:49:41 -0700] "GET /vol-6/8_18_ 10/towes81810.pdf HTTP/1.1" 404 1360 "http://www.google.co.uk/url? url=http://www.lawrencechin2011.com/vol6/8_18_ 10/towes81810.pdf&rct=j&q=&esrc=s&sa=U&ved= 0ahUKEwjw1uHO1bXJAhVGWRQKHXQmAtoQFggeMAI&sig2=BoIxJ4zTNj8Q7iFbad0Gw&usg=AFQjCNEOY_uLsXXrXjbyVo42eFHrcKuw6Q" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" At the same time, 4:49 AM, the Sacramento person is still looking at capra7777.html. The LB Admin continues: 93 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 80.189.8.35 - - [29/Nov/2015:05:49:47 -0700] "GET /2008docs/Gmail112408.pdf HTTP/1.1" 404 1360 "http://www.google.co.uk/url? url=http://www.lawrencechin2011.com/2008docs/Gmail112408.pdf&rct= j&q=&esrc=s&sa=U&ved= 0ahUKEwjw1uHO1bXJAhVGWRQKHXQmAtoQFggZMAE&sig2 =tXuKi7acRrcYOLpNCgloMg&usg=AFQjCNEA5GCMYhGoYnpgjCfB-do9cWhYEQ" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" Again, this is the email correspondence between the suspect and the German Lady in November 2008. 4:50 AM, the LB Admin looks at blogs/?author=1 again, petition/ecf_request.doc, 4:51 PM, blogs/?p=61. 80.189.8.35 - - [29/Nov/2015:05:50:45 -0700] "GET /blogs/?author= 1 HTTP/1.1" 200 3385 "http://www.google.co.uk/url? url=http://lawrencechin2011.com/blogs/%3Fauthor%3D1 &rct=j&q=&esrc=s&sa=U&ved= 0ahUKEwj48ID61bXJAhUHPhQKHVr3DmAQFggUMAA&sig2=MuBQR1 _kYk0STCmUmyCm0w&usg=AFQjCNGvultm4bYWm5l08RhW6LNi5AX4bw" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" 80.189.8.35 - - [29/Nov/2015:05:50:54 -0700] "GET /petition/c0901379jl/ecf_request.doc HTTP/1.1" 404 1360 "http://www.google.co.uk/url? url=http://www.lawrencechin2011.com/petition/c0901379jl/ecf_request.doc&rct=j&q=&esrc=s &sa=U&ved= 0ahUKEwj48ID61bXJAhUHPhQKHVr3DmAQFgggMAM&sig2=KNbl2MU1ryDOw2czxbPD aQ&usg=AFQjCNENptlesH2hrdDmyq_m4sUz1d-QSA" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" 80.189.8.35 - - [29/Nov/2015:05:51:00 -0700] "GET /blogs/?p=61 HTTP/1.1" 404 3475 "http://www.google.co.uk/url? url=http://lawrencechin2011.com/blogs/%3Fp%3D61 &rct=j&q=&esrc=s&sa=U&ved= 0ahUKEwj48ID61bXJAhUHPhQKHVr3DmAQFgglMAQ&sig2 =zAH9m_w5VB9IRGRhr0IzfQ&usg=AFQjCNHQhO90mtJVz4VCXRr6VCpAPlc_wQ" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" 4:52 AM, because the entire blog and all the email correspondences have already been removed, the LB Admin goes to the Way Back Machine to look for his blog: 207.241.226.215 (wwwbapp19.us.archive.org, Internet Archive, San Francisco). 207.241.226.215 - - [29/Nov/2015:05:52:56 -0700] "GET /blogs/wp- includes/js/wp-emojirelease.min.js?ver=4.3.1 HTTP/1.1" 200 16166 "http://lawrencechin2011.com/blogs/" "Opera/9.80 (X11; Linux x86_ 64; Edition Linux Mint) Presto/2.12.388 Version/12.16 (via Wayback Save Page)" 207.241.225.235 - - [29/Nov/2015:05:54:08 -0700] "GET /petition/c0901379jl/ecf_request.doc HTTP/1.1" 404 2664 "-" "Mozilla/5.0 (compatible; archive.org_bot; Wayback Machine Live Record; +http://archive.org/details/archive.org_bot)" 94 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 4:55 AM, the LB Admin is looking for the Korean Letter. Not there either. 80.189.8.35 - - [29/Nov/2015:05:55:16 -0700] "GET /korealetter- censored/korealettercensored.pdf HTTP/1.1" 404 1360 "http://www.google.co.uk/url? url=http://www.lawrencechin2011.com/korealetter- censored/korealettercensored.pdf&rct=j&q=&esrc=s&sa=U&ved= 0ahUKEwjJjoT21rXJAhXD1RQKHXKlC1YQFggxMAc&sig2=g4_ 9KT046zjXW_ZJR_Nmvw&usg=AFQjCNGiX8mBURWhI8yNV90rJ5L7X69c6A" "Opera/9.80 (X11; Linux x86_64; Edition Linux Mint) Presto/2.12.388 Version/12.16" Evidently, the LB Admin is trying the same trick again. After everybody has staged a show entrapping the suspect into the appearance that he is suffering severe paranoia delusion, the LB Admin pretends to show concern and Googles his email address trying to track down the identity of this “NDC”. Now, the question is: why is the LB Admin looking for the same email correspondences again, when she has already found them 13 days ago? She must have already been informed by Homeland Security that these documents have been removed. Hence: she is first of all trying to obtain proofs that documents once found on the suspect's website have the habit of disappearing. Secondly, because the suspect has become aware of the case which the Secret Society women have opened on him at the Manhattan Beach police department, the women have decided to close the case – so that the suspect's continual utterance on the matter can work against him as evidence for his paranoia delusion, that he always imagines that the women he's obsessed with are filing false reports about him to law enforcement – and open a new one, using the same document (hatred crime vandalism) and the same argument (that the suspect is always believing, due to severe paranoia schizophrenia, that the women he's obsessed with him are going after him by falsely reporting him to law enforcement). And, not to forget, the women are still looking for an opportunity to involve W in this staged show (or “cyber street theater”). It can be assumed that, this afternoon, the Secret Society women will go to another law enforcement agency to open up another case on the suspect – bringing all the volunteers' testimonies with them – as if all the previous cases, the case at Manhattan Beach police department as well as those at the TMU, had never existed. Which police department will be chosen this time? The Hermosa Beach Police Department? Or the Pasadena Police Department? 6:23 AM, 93.91.151.36, static.grapesc.cz, Louny, Czech Republic. 93.91.151.36 - - [29/Nov/2015:07:23:58 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 491814 "https://www.google.cz/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36 OPR/33.0.1990.115" More chatter about how the suspect has copied other people's painting. 7:29 AM, 86.61.85.11, dynamic.siol.net, Slovenia. 95 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 86.61.85.11 - - [29/Nov/2015:08:29:20 -0700] "GET /scientificenlightenment1/representation222.html HTTP/1.1" 200 6299 "https://www.google.si" "Mozilla/5.0 (Windows NT 6.1; WOW64; v:42.0) Gecko/20100101 Firefox/42.0" More chatter about the suspect's supposed plagiarism. 8:32 AM, 221.145.183.167, the Korean scout, 221.145.183.167 - - [29/Nov/2015:09:30:20 -0700] "GET / HTTP/1.1" 200 4834 "http://iristech.net" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1)" 221.145.183.167 - - [29/Nov/2015:09:32:24 -0700] "GET / HTTP/1.1" 200 2430 "https://www.google.co.kr/" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1)" 8:49 AM, access.telenet.be, Maldegem, Belgium, 178.117.155.163 - - [29/Nov/2015:09:49:54 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 491814 "https://www.google.be/" "Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More chatter. Around 11 AM, the suspect, going to his church, has arrived at Normandie station. There is a piece of paper left on the escalator: “katheryna.edu” then “usc.edu: jobs on the bottom”. At first the suspect takes it, but then throws it away. He finds it very strange. Eternal recurrence of the same. As if the “suit team” were still trying to produce evidence showing him conspiring with the Russians. But that's back in 2008. Indeed, because the suspect never bothers with Noah's link, Homeland Security is trying it again, sending an agent to place this piece of paper inside the Metro station, knowing, from the control center's simulation, that the suspect will walk past this point. And now Homeland Security has failed again, and is still unable to prove in the ICJ that the suspect is conspiring with the Russians and the French. Thus the suspect's phobia, inherited from the past, has once again saved the Russians and the French. 11:19 AM, sloane82 has posted the eighth reply on LB (Total posts: 244. Per day: 0.59. Joined: 9 October 2014.): “Can you move from where you are living? Do you have loads of mates at all? It's a sorry state of affair as we are not legally trained with US rules. Keep in touch and put up as much info [and] written letters sent up here. And we'll have a look.” This is clearly a trap. Again, both the Secret Society women and Homeland Security have been trying to persuade the suspect to go out of California so that he could become a fugitive. Furthermore, they want the suspect to post more pronouncements about how he is being gang-stalked by a group of women so that they could have more “evidences” on the basis of which to report him for suffering severe paranoia delusion about the women he's supposedly obsessed with. 1:38 PM, 221.145.183.178, the Korean scout, /. The suspect is at St Sophia. Fr Alan’s last sermon. Saw Angela. Then the long debate with Dan and Johanna about neoliberalism. Starbucks, Normandie. 96 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 1:55 PM, 24.157.210.58, videotron.ca, Saint Jerome, Quebec. 24.157.210.58 - - [29/Nov/2015:14:55:04 -0700] "GET /kudoshizuka1988.jpg HTTP/1.1" 200 218090 "https://www.google.ca/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 24.157.210.58 - - [29/Nov/2015:14:55:05 -0700] "GET /shizukadetail.jpg HTTP/1.1" 200 296836 "https://www.google.ca/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More chatter about how the suspect is feigning artistic talent. 4:15 PM, the suspect is now in Starbucks, Culver City, checking his visitors' log. His own search for his blog on the Way Back Machine after discovering LB Admin's actions. Upset for a while after discovering the operations on LB. He has now realized that Homeland Security is involved in the gang-stalking. 6:22 PM, 74.37.55.244, Genealogy of Morals, Google, mond.mn.frontiernet.net, Delano, Minnesota. Either decoy or more chatter. Dinner at the Sushi place, 5 PM. 6:20 PM, Miguel comes over to inform the suspect that French in Mind is canceled. 6:33 PM, allegoryofcave.html, Bing Preview. 7:03 PM, cpe.metrocast.net, Lexington Park, Maryland, 72.9.0.139 - - [29/Nov/2015:20:03:34 -0700] "GET /shizukadetail.jpg HTTP/1.1" 200 380104 "-" "Mozilla/5.0 (iPad; CPU OS 8_4_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) GSA/8.0.57838 Mobile/12H321 Safari/600.1.4" 64.233.172.175 - - [29/Nov/2015:20:03:36 -0700] "GET /fising2.html HTTP/1.1" 200 881 "http://www.google.com/search" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko; Google Web Preview) Chrome/27.0.1453 Safari/537.36" (This is the portrait of Ms Kudo Shizuka.) More chatter about how the suspect is feigning artistic talent. 7:04 PM, athd2.jpg refreshed on Facebook. The Secret Facebook Group is being accessed. 7:18 PM, Noah calls again. The suspect does not answer the call. Homeland Security could never obtain the evidence they need for the suspect's conspiracy with France. The suspect rides the bus to Westwood. Starbucks. 8:09 PM, teksavvy.com, Brampton, Ontario. 192.0.196.199 - - [29/Nov/2015:21:09:29 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 491814 "https://www.google.ca/" "Mozilla/5.0 (iPad; CPU OS 7_1_1 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D201 Safari/9537.53" 97 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 More chatter about how the suspect has copied somebody else's painting. 9:33 PM, the suspect is now in Starbucks. He has realized what has happened in the early morning of 16 November. His reconstruction on the matter – which he has posted on AVFM forum – is not quite correct. Now, he changes his email address on LB. 9:57 PM, the suspect begins posting the latest on LB: Great acting, you guys! I knew there were some PMs on 16 November about the identification of the “poster” of the above narrative and “his website” because I got a notification from somebody. But obviously I’m not producing that. The guy who is the “friend” of the women referred to in the story and who has pretended to be able to track down the true identity of the poster seems to be from Sheffield, UK, with an original IP address 146.200.162.191. He uses a Linux computer (X11; Linux x86_64; Edition Linux Mint). He seems to be an administrator of this forum, having access to the email addresses of the members. And, so, on 16 November, he was told to Google for my email address to track down my website and identify the women referred to in the story and then contact them. The women then took the information to the local police to open up a case of “online harassment” on me, alleging that I was slandering them in this forum because I suffered from paranoia delusion believing they have been going after me. Well, police’s case on me then got stuck because the investigation so far doesn’t show me to be completely crazy. But thanks to your guys’ acting, this Sheffield guy Googled for my email address again this morning (which would be afternoon yesterday in your time zone) and, upon finding no website any more, he has actually gone to the Way Back Machine to get the cache of the old website. Since you guys’ acting (“Oh no, there is no PM at all, nobody has received anything!”) has made it look like I was being paranoid, these women were able to go to the police again to use you guys’ posting as “evidences” that I am indeed crazy and am slandering them online. But the Way Back Machine’s cache might not be sufficient evidence for actions to be taken. And so, the question is: who told this Sheffield guy to Google for my email address? These women are able to pull all these stunts so far – many of them illegal, like presenting forged evidences to law enforcement – because there are some people in the US Department of Homeland Security who are helping them and covering for them. Well, that’s fine. There are also informants in their online group from other law enforcement agencies who will occasionally tip me off about the danger that is coming to me. I don’t know why they do that, and I don’t even know for which 98 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 agencies they work. I don’t know why the several law enforcement agencies which are working on this gang-stalking case I’m talking about are working against each other. I’m spilling out all this because, in case I should get arrested for “online slandering” and “online harassment”, this posting might be counter-evidence against the charges against me. The fact that I don’t use any names in the narrative above, and don’t place any links, clearly proves that I don’t intend for the women referred to in the above summary to be identified. And I don’t intend for myself to be identified either. And so what this Sheffield guy did is very much not appreciated. Members’ email addresses on this forum should have remained private. And now I have even changed the email address, and so don’t bother me anymore. I consider that this thread is closed. Please leave it alone. 10:15 PM, the suspect has finished with editing his latest posting on LB. 10:30 – 10:33 PM, the suspect has posted the latest on AVFM. (“The Sheffield person.”) 10:48 PM, the suspect begins researching “Sharon Coleman”: he has now discovered the true identity of LB Admin (the “Sheffield person”). The new master “gang-stalker” Sharon Coleman (LB Admin) 10:50 PM, Marina has logged into Couchsurfing, she still hasn’t declined the suspect's offer. 99 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 11:31 PM, it appears that Amethyst (LB Admin) has made a last reply before deleting the thread. She has posted the reply in order to enable law enforcement and Homeland Security to intercept the posting as evidence and yet quickly deleted it before the suspect gets to see it. This, because the Secret Society women don't want the suspect to know what exactly he has been accused of. What remaining evidence which Homeland Security still needs to justify their false profile of the suspect in the ICJ? We must thus assume that the LB Admin has pretended to get freaked out by the suspect's insider knowledge so that Homeland Security might obtain evidences showing the suspect to be a computer hacker. 12:48 AM, 140.137.20.70, dividedline.html, Google TW, was.pccu.edu.tw, Taiwan Academic Network Information Center, Taipei. More chatter about the suspect's plagiarism. By 1:10 AM, the entire posting “Being gang-stalked” has been deleted. 1:13 AM, bot.net.in, Delhi. More chatter about the suspect's plagiarism or misogyny or pedophilia: 59.177.234.90 - - [30/Nov/2015:02:13:08 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692 "https://www.google.co.in" "Mozilla/5.0 (Windows NT 6.0; rv:38.0) Gecko/20100101 Firefox/38.0" 2:29 AM, lightspeed.turga.sbcglobal.net, Conyers, Georgia. 107.197.83.17 - - [30/Nov/2015:03:29:14 -0700] "GET /scientificenlightenment1/greekreligion.html HTTP/1.1" 200 44324 "https://www.google.com/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More chatter about the suspect's plagiarism. 30 November (Monday; a new law enforcement case on the suspect) And so today the Secret Society women have opened a new case on the suspect, at a undefined police department, probably at the anti-terrorism unit of some local police department like the Hermosa Beach police department or Pasadena police department, on the same “domestic terrorism” charge. This is their 13th attempt to exterminate the suspect. (Counting all the previous attempts: TMU: 7; LAPD Hate Crime Unit: 1; French: 1; UN: 1; West LA division: 1; DA: 1; Manhattan Beach Police Department: 1. The Secret Society women are estimated to have thus far filed around 20,000 false reports about the suspect, having mobilized around 10,000 people for the enterprise.) The profile which they would construct of the suspect for the new detectives is the same false profile which Homeland Security has established, as has been defined above. Yesterday the case was opened on the premise that the Secret Society women are frightened because the suspect has the tendency to develop, about the women he's obsessed with, paranoia delusion that they are going after him by falsely reporting him to law enforcement. This, in 100 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 addition to the claim contained in the confidential “DRCRR warning” or Homeland Security warning that the suspect commits hate crime against white females out of misogynist ideology and hatred. Then, last night, LB Admin has supplied a hint about the suspect's computer hacking. And so now the Secret Society women need to establish the rest of the characteristics through the volunteers' efforts: Misogynist, white supremacist, plagiarizer, computer-hacker, stalker, cyberstalker, anti-American terrorist, vandalizer (i.e. a misogynist terrorist who is prone to become obsessed with women, stalk them, and then vandalize their properties in order to terrorize them), violent, delusional, paranoia schizophrenic, sexually perverted and yet impotent thus loving and hating white females at the same time, extremely malicious and pathologically deceitful (anti-social). The volunteers will visit the suspect's website, and falsely rumor about what they have seen in accordance with the above characteristics. The rumors will then be submitted to the detectives in charge of the new case. As usual, because the suspect is apparently a computer-hacker violating the women's privacy, the detectives are prohibited by “victim confidentiality” from running surveillance directly on the suspect or looking at his website, and, while being required to never reveal the existence of the case to the suspect or anyone else, also from verifying the veracity of the “victims'” reports about the suspect and his website. Note that this is, at bottom, a Homeland Security operation. The evidences submitted to the new law enforcement detectives will be intercepted into the ICJ to support Homeland Security's case against the French and the Russians.3 The suspect passes the night in Westwood Village. He wakes up on 5 AM, due to the cold. He goes to Starbucks. 6:40 AM, the suspect posts the below notice on AVFM: It appears that the Sheffield person is just the site owner of LB herself. It’s actually a woman. Why is she running a “men’s rights forum”? Within 6 hours of my posting the above summary on 15 November, she has agreed to cooperate with the gang of women and to pretend to show concern about the post and Google my account activation email address to track down my website and the identities of the gang of women referred to in the story. This is clearly a violation of forum members’ privacy in order to help the gang of women to get me arrested. 3 If the latest case is opened at the Hermosa Beach police department, we shall note that, according to its website, the Hermosa Beach police department has six detectives on duty, one Detective Sergeant, and one Terrorism Liaison Officer, Jonathan Cruz, who works with the local AntiTerrorism Information Center. If the latest case is opened at the Pasadena police department, we shall note that, according to its website, there are nine detectives assigned to the Special Investigation Unit (Vice/ Narcotics), and that the Criminal Investigation Division is comprised of four sections staffed with 77 people in total. The Pasadena police department is much larger, and so less fitting for the Secret Society women's purposes. 101 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Once again, I have no intention for anybody mentioned in the summary account to be identified. It’s usually impossible for people designated by “J”, “K”, “G”, “M” to be identified in any case. The Sheffield person has deleted the thread over there at LB within three hours of the posting of the above reply. She probably will then see the replicate here and complain to the UK police about slandering. We’ll then just have to argue whether the IP address noted above is actually hers. But then she can always just deny that she has in fact contacted the gang of women. Alternative: While we can argue whether the IP address noted above is actually hers, she can always just deny that she has in fact contacted the gang of women. 7:51 AM, 188.71.255.213, Wataniya Telecom, Kuwait City. 188.71.255.213 - - [30/Nov/2015:08:51:42 -0700] "GET /1/layereduniverse.html HTTP/1.1" 200 34939 "https://www.google.com.kw/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More chatter about the suspect's plagiarism. 7:56 AM, 82.211.202.71, dynamic-ip.k-net.dk, Kongens Lyngby, Denmark. 82.211.202.71 - - [30/Nov/2015:08:56:47 -0700] "GET /sci/sci.pdf HTTP/1.1" 200 480167 "https://www.google.dk" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" A testimony about the suspect's misogyny. 8:28 AM, 107.167.108.61, Opera Mini, San Mateo, California. 107.167.108.61 - - [30/Nov/2015:09:28:35 -0700] "GET /1/chinesepatriarchy220.htm HTTP/1.1" 200 32718 "https://www.google.co.in/" "Mozilla/5.0 (Linux; Android 4.4.2; SM-G355H Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.78 Mobile Safari/537.36 OPR/32.0.1953.96473" Another testimony about the suspect's misogyny. 10:16 AM, 94.29.208.101, Qualitynet, Kuwait City. 94.29.208.101 - - [30/Nov/2015:11:16:17 -0700] "GET /1/layereduniverse.html HTTP/1.1" 200 34939 "https://www.google.com.kw/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Another testimony about the suspect's plagiarism. 102 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 10:22 AM, 108.185.115.15, socal.res.rr.com, Studio City, California. This person was here before, 1:40 PM, 23 November, and 9:02 PM, 11 November, always looking at the same chapter. 108.185.115.15 - - [30/Nov/2015:11:22:55 -0700] "GET /scientificenlightenment1/aztec.html HTTP/1.1" 200 12505 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" It's not clear whether he is here to provide more testimony about the suspect's plagiarism or just to generate decoy. Given the fact that he will come again on 6 December, he is most likely doing decoy. 12:05 PM, 54.169.158.246, ap-southeast-1.compute.amazonaws.com, Singapore. The Secret Society women still want to produce more testimony for the suspect's delusion mind (“brain chips”) for their new law enforcement case. 54.169.158.246 - - [23/Nov/2015:08:26:27 -0700] "GET /2012/92012-8.png HTTP/1.0" 200 831587 "http://interpreteeg007.blog.163.com/blog/static/2060561642013628 801821/" "Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/FreeBrowser Mobile Safari/537.36 FreeBrowser/23" Meanwhile, the suspect has gone to Work Source, 7 AM. Orientation. He is barely able to concentrate: frightened about being falsely arrested as a computer-hacker. Thinking only about how to escape. He is there until 1 PM. Afterwards, he comes back to the public library. While on the bus, he has deleted Metasploit (which he has never used) from his computer for fear of being misunderstood. (Not completely, however.) Law enforcement surveillance might very well have picked this up. (There is a black man wearing earphones sitting behind the suspect on the bus.) This episode indicates that Homeland Security has got inside the control center and has asked the supercomputer inside to program the suspect to fit their false profile of the suspect. 1:46 PM, athd2.jpg refreshed on Facebook. 173.252.90.249 - - [30/Nov/2015:14:46:32 -0700] "GET /scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12120 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" The Secret Facebook Group is being accessed. 3:27 PM, it's the Princeton “decoy”: 128.112.155.171, wash.cs.princeton.edu. 128.112.155.171 - - [30/Nov/2015:16:27:37 -0700] "GET /scientificenlightenment1/asmatpoles.jpg HTTP/1.1" 200 37829 "http://www.lawrencechin2011.com/scientificenlightenment1/ancesto rcult.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" Angela left a message for the suspect around 4:38 PM. 103 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 5:47 PM, 64.233.172.159, Blue Host Forum, “strange visits”, Google Web Preview. About being hacked. The Secret Society is producing more testimonies for the suspect's being a computer hacker. (Namely, according to the women, when the suspect reports, in 2012, his suspicion of being hacked, he is bragging about hacking other people's computers.) 6:21 PM, 205.197.242.153, 205.197.242.153 - - [30/Nov/2015:19:21:46 -0700] "GET /karinaftrwrd/karinaftrwrdb.pdf HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=184178.0" "Mozilla/5.0 (Linux; Android 4.4.4; ZTE-Z755 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Mobile Safari/537.36" The volunteers have again tracked down the suspect's past posting on “electronic chips” inside his brain. Although the posting is more than three years old, the volunteers would presumably intentionally overlook the date on the posting and submit testimony to the police to the effect that the suspect is currently engrossed in the same schizophrenic delusion. This is also in response to the suspect's admission about “BCI” on “Sequel” in his AVFM posting. Homeland Security has obtained more evidence in support of their false profile, in the ICJ, of the suspect as suffering schizophrenic delusion. Note that this IP address is either a proxy or belongs to a computer geek. In both cases this person is a computer geek: perhaps a Wikia contributor at valkyriecrusade.com. 104 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Meanwhile, the suspect is at Chrysalis, 3 PM. Tanisha. He gets new shoes. Starbucks, he then comes back to Chrysalis, dinner and Men’s Group. George makes fun of him. 7:54 PM, hsd1.ca.comcast.net, Santa Cruz, California, 24.6.95.230 - - [30/Nov/2015:20:54:07 -0700] "GET /gallery/perspective.html HTTP/1.1" 200 2659 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) GSA/6.0.51363 Mobile/13B143 Safari/600.1.4" More chatters about how the suspect has plagiarized his theory on linear perspective. From 8:10 PM onward, there are 17 visits to images, and no visit to web pages until 12:08 AM. Are the Secret Society women conferring with the detectives? Meanwhile, the suspect: after Chrysalis, he is at Starbucks, Little Tokyo, and goes home around 9 PM. The Secret Society women's operation continues after midnight. 12:43 AM: 193.255.91.153 - - [01/Dec/2015:01:43:03 -0700] "GET /owl.JPG HTTP/1.1" 200 11579 "https://www.google.com.tr/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 1:09 AM, 212.219.191.137 - - [01/Dec/2015:02:09:08 -0700] "GET /scientificenlightenment1/standardmodeldrell.gif HTTP/1.1" 200 9790 105 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Two more chatters about how the suspect has massively copied images from books and other website without their consent. 1:55 AM, ua.batelco.jo, Amman, Jordan, 212.35.66.30 - - [01/Dec/2015:02:55:17 -0700] "GET /scientificenlightenment1/standardmodeldrell.gif HTTP/1.1" 200 9790 "https://www.google.com" "Mozilla/5.0 (Windows NT 5.1; rv:41.0) Gecko/20100101 Firefox/41.0" One more chatter to such effect. 2:37 AM, the same Princeton guy, decoy: 128.112.155.173 - - [01/Dec/2015:03:37:25 -0700] "GET /scientificenlightenment1/foodcycle.jpg HTTP/1.1" 200 44316 "http://www.lawrencechin2011.com/scientificenlightenment1/ancestorcult.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" 2:41 AM, 48-150.cablevision.qc.ca, Val d’Or. 24.212.48.150 - - [01/Dec/2015:03:41:52 -0700] "GET /timeline9/timeline9d.pdf HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Another volunteer: “I remember this guy. He suffers paranoia delusion imagining a group of women is going after him. He wrote it down. I read it somewhere. Here. Oh, it's gone.” But the chatter has done enough damage, both with the detectives and with Homeland Security in the ICJ. 1 December (Tuesday) 4:07 AM, himiko.jpg, Google ID, Google proxy (“en-us”). More chatter: “Oh, the guy who has copied someone else's painting...” 5:08 AM, 176.2.101.9, E-Plus Mobilfunk, Germany. 176.2.101.9 - - [01/Dec/2015:06:08:38 -0700] "GET /blogs/2014/04/14/last-word-on-my-pasttwo-month-targeting-and- gang-stalking/ HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 4.4.4; C6603 Build/10.5.1.A.0.292) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.76 Mobile Safari/537.36" 106 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 The news about how a paranoia schizophrenic's paranoia delusion about a group of women going after him has now reached another guy in Germany, who comes to the Prison Planet Forum to take a look. 5:08 AM, MRI machine, Baidu. 5:10 AM, MRI machine, Baidu, proxy. It looks like these two China persons were communicating while looking at the image. The “news” keeps on spreading. 5:17 AM, 128.112.155.172, the Princeton “decoy”. 128.112.155.172 - - [01/Dec/2015:06:17:16 -0700] "GET /1/secularization.jpg HTTP/1.1" 200 91889 "http://www.lawrencechin2011.com/1/amcivilreligion.htm" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" 5:18 AM, classificationofindia.html. More chatter about the suspect's dilettantism and plagiarism. 6:08 AM, the Princeton University “decoy” looks at the images on humandispersal.html. It would seem that he is accessing it from some sort of cache, perhaps the cache in his own browser, for there is no trace of his accessing the webpage itself. 128.112.155.171 - - [01/Dec/2015:07:08:12 -0700] "GET /scientificenlightenment1/afroasiaticmap.jpg HTTP/1.1" 200 49245 "http://www.lawrencechin2011.com/scientificenlightenment1/humandispersal.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" 6:15 AM, the Princeton University “decoy” looks at ancestorcult.html. Again, it appears that he is accessing it from some sort of cache. 128.112.155.171 - - [01/Dec/2015:07:15:38 -0700] "GET /scientificenlightenment1/haidapoles.jpg HTTP/1.1" 200 40774 "http://www.lawrencechin2011.com/scientificenlightenment1/ancestorcult.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" It's just “decoy”, presumably. 6:25 AM, 193.49.225.25, cacheserv3.univ-lille1.fr, Commissariat à l’Energie Atomique, Université de Lille, Sciences et Technologiques. Noted as a proxy. 193.49.225.25 - - [01/Dec/2015:07:25:51 -0700] "GET /1/thermhch6d222.html HTTP/1.0" 200 29197 "http://images.google.fr/imgres?imgurl=http%3A%2F%2Fwww.lawrencechin2011.com %2F1%2Fchemoton.jpg&imgrefurl=http%3A%2F%2Fwww.lawrencechin2011.com %2F1%2Fthermhch6d222.html&h=577&w=521&tbnid=LVI6uQxXz6zVEM %3A&docid=9B6KU0G77WbTkM&ei=4q1dVpJew7dp107 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 7a28AQ&tbm=isch&iact=rc&uact=3&dur=236&page=1&start=0&ndsp=13&ved=0ahUKEwiS 1_fz7rrJAhXDWxoKHXubDU4QrQMIITAA" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Just yesterday, Marine Le Pen was in Lille. This visit might be related to that. Perhaps a FN's mole (who is a student at the University of Lille). Namely, while joining the Secret Society's operation to exterminate the suspect in order to avoid charges of conspiracy with him, the mole is also secretly gathering evidence showing that the suspect hasn't really plagiarized and that he isn't like what the Secret Society women have claimed him to be. 7:20 AM, sci/appendix.html. More chatter about the suspect's plagiarism. 9:05 AM, 83.135.41.109, capra.html, versanet.de, Uetersen, Germany. More chatter (plagiarism). 11:25 AM, 86.179.139.238, UK. 86.179.139.238 - - [01/Dec/2015:12:25:37 -0700] "GET /readings/David_Jacobs_The_Threat.pdf HTTP/1.1" 404 1360 "https://scholar.google.co.uk/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" As the news continues to spread, another person joins in on the “hunt”. “Oh, he has once put up other people's book on his website without obtaining consent.” 11:35 AM, Benson’s Goddess. “Oh, he puts up other people's painting on his website as if it were his own.” 12:57 PM, 41.206.1.4, mtnnigeria.net, Nigeria. Note that this IP address has appeared in Project Honey Pot for association with spam harvesting and dictionary attacks. It's a proxy. 41.206.1.4 - - [01/Dec/2015:13:57:54 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.1" 404 1360 "https://www.google.com.ng/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" This volunteer either “remembers” or has joined in on the “hunt”. 1:12 PM, the Princeton “decoy”, 128.112.155.173 - - [01/Dec/2015:13:12:46 -0700] "GET /scientificenlightenment1/totem1.jpeg HTTP/1.1" 200 17576 "http://www.lawrencechin2011.com/scientificenlightenment1/ancestorcult.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" The same thing. 1:14 PM, 76.64.226.252, Fermat, Google CA, dsl.bell.ca, Oakville, Ontario. The “hunters” even suspect the suspect's original contribution (that Fermat's principle of least time is at bottom an instance of the principle of conservation of energy) to be “plagiarized”. 108 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 3:34 PM, 191.184.33.92, Foucault on biopower, Google BR, virtua.com.br, Maceio, Brazil. Chatter (plagiarism). 3:35 PM, 174.66.163.236, ip174-66-163-236.sd.sd.cox.net, Chula Vista. (South of San Diego.) 174.66.163.236 - - [01/Dec/2015:16:35:36 -0700] "GET /blogs/2013/11/11/four-women-try-toknock-down-my-website- part-16/ HTTP/1.1" 404 1360 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:42.0) Gecko/20100101 Firefox/42.0" This might be either Dina B or a friend of hers. He is evidently sent the link by somebody who pretends to “remember”: “Yeah, the guy suffers from this paranoia delusion, that a group of women are filing false stalking claims against him at the TMU. He wrote it down on this blog. I have seen it. It's removed. It used to be at this URL.” And so he sends the link to this San Diego person. 4:05 PM, 65.208.151.114, Verizon Business, US (no information given), massive indexing of everything on the front page. 4:10 PM, gallery. 4:15 PM, Table of Contents and everything on acad.html. 4:19 PM, everything on the links page. 4:22 PM, every gallery page. 4:26 PM, everything on the Old Gallery page. 65.208.151.114 - - [01/Dec/2015:17:05:51 -0700] "GET / HTTP/1.1" 200 2392 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" See the warning about this IP address: https://www.paulstechtalk.com/2009/02/being-a-bad-bot/. See also this warning: http://hostile-ip-addresses.blogspot.com/2011/02/denial-of-service-attackfrom.html. It is said that this IP address belongs to Homeland Security. 109 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 It seems that this is what has happened. Now that the Secret Society women have spent the previous two days conferring with the detectives, they are telling the latter that they are afraid to visit his website looking for what delusional slander he might have blasted about them, all because the suspect, due to suffering paranoia schizophrenic, is wont to mistake the purpose of their visits and construct, on the basis of these visits, further delusional scenarios about how they are going after him by falsely reporting him to law enforcement behind his back, etc. And so the detectives ask Homeland Security to cache the suspect's entire website in order to enable the “victims” to look through it offline without tipping off the suspect. This incident might also help cover up the fact that the Secret Society women have already instructed the HK Hacker to cache the suspect's entire website many times. Evidently, the HK Hacker has been instructed to destroy that cache to eliminate evidences, now that the entire story has changed: the women have never filed any stalking or hate crime claims against the suspect at any law enforcement agency in the past. The suspect has imagined all this up by mistaking the meaning of the visits to his website. The women only have visited it out of concern for his paranoia delusion about them. Meanwhile, 4:33 PM, Dina B or her friend continues: 174.66.163.236, ip174-66-163236.sd.sd.cox.net. 174.66.163.236 - - [01/Dec/2015:17:33:34 -0700] "GET /suppl_pld_ 58bg/suppl_pld_drft_58bgg.pdf HTTP/1.1" 404 1322 "https://www.google.com" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:42.0) Gecko/20100101 Firefox/42.0" He is probably explaining to the detective how the suspect has requested Dina's friendship on Facebook, and how she is shocked to discover that the suspect is so frightening because of his tendency to become obsessed with women and then develop bizarre persecution mania about being persecuted by them. 174.66.163.236 - - [01/Dec/2015:17:34:11 -0700] "GET /petition/n4b-17/n4b-17.pdf HTTP/1.1" 404 1360 "https://www.google.com" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:42.0) Gecko/20100101 Firefox/42.0" 174.66.163.236 - - [01/Dec/2015:17:37:33 -0700] "GET /01_09_47/01 _29_47.pdf HTTP/1.1" 404 1360 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:42.0) Gecko/20100101 Firefox/42.0" As he continues to Google for the suspect, however, he finds nothing. Everything is removed. But the “chatter” would have already done the damage (both with the police and at the ICJ). 4:37 PM, the indexing continues, Table of Contents. 4:53 PM, translations of Christian Dogmatics. 4:54 PM, 24.214.216.96, chinesepatriarchy.html, knology.net, North Charleston, South Carolina. 24.214.216.96 - - [01/Dec/2015:17:54:01 -0700] "GET /1/chinesepatriarchy.htm HTTP/1.1" 200 15792 "https://www.google.com/" "Mozilla/5.0 (iPad; CPU OS 8_1_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12B435 Safari/600.1.4" 110 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Just more chatter (misogyny, plagiarism). 4:56 PM, the indexing has finished. The whole process has lasted 50 minutes. 5:56 PM, 71.204.26.159, daly.html, hsd1.ga.comcast.net, Decatur, Georgia. More “chatter” about the suspect's “misogyny”. Meanwhile, the suspect. He wakes up late. Father Bob calls! It's about his volunteering at Urban Ministry. Why does Father Bob suddenly call the suspect when he has never done this before? We can only assume that Homeland Security has already interviewed Father Bob and has falsely warned him that the suspect is a paranoia schizophrenic who is imagining being gone after by a group of women, who have thus become frightened of him. Masturbation has caused the suspect to miss the bus. He leaves home only after 1:30 PM. No time for Social Security. Bail Hotline. Urban Ministry. Then, instead of Forum, he has gone to German language lesson meetup, West LA. He talks to Angela while on the bus, and then discovers the indexing. He is shocked. 6:26 PM, the suspect, arriving in Westwood, begins removing his ancient (20 year-old) Manga “Limit of Love,” etc., from Old Gallery. Also the portrait “Monkey Pyramid”. 9:24 PM, 177.242.8.90, customer-leon-8-90.megared.net.mx, Leon, Mexico. 177.242.8.90 - - [01/Dec/2015:22:24:33 -0700] "GET /scientificenlightenment1/capra.html HTTP/1.1" 200 11888 "https://www.google.com.mx/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More chatter (“plagiarism”). 9:38 PM, the suspect returns to Vermont from his German language lesson meetup. At Starbucks, he removes mycousinsfamily.htm. (The old portraits of the German Lady are on there.) 9:54 PM, 170.148.69.141, JP Morgan Chase APTI, New York, New York. 170.148.69.141 - - [01/Dec/2015:22:54:48 -0700] "GET /scientificenlightenment1/schuld.html HTTP/1.1" 200 25700 "http://www.google.com.hk/url? sa=t&rct=j&q=&esrc=s&source=web&cd= 1&ved=0ahUKEwjcmvPIvrzJAhWBpJQKHYAOD60QFgghMAA&url=http%3A%2F% 2Fwww.lawrencechin2011.com%2Fscientificenlightenment1% 2Fschuld.html&usg=AFQjCNGYtvVUlBMdcFSjHKDlfaas7LBjnQ" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko" Another visit from the most bizarre place. This volunteer, working at a financial center, has the time to receive a “notice” about the new rumor, and to Google for the suspect. Is this guy Chinese? (Note that this person might not actually be in New York, where it's already past midnight.) Then, 10:32 PM, 50.92.192.33, bchsia.telus.net, Burnaby, British Columbia. 50.92.192.33 - - [01/Dec/2015:23:32:42 -0700] "GET /scientificenlightenment1/presocratics222.html HTTP/1.1" 200 9907 "https://www.google.ca/" 111 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More chatter. 1:16 AM, 41.77.14.131, Globe Internet Limited, Blantyre, Malawi (east of Mozambique). 41.77.14.131 - - [02/Dec/2015:02:16:55 -0700] "GET /correlate_revised_no_summary_126/correlate_revised_no_summary%20126_(secure).pdf HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 41.77.14.131 - - [02/Dec/2015:02:17:16 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/correlate_revised_no_summary_126/correlate_revised_no_s ummary%20126_(secure).pdf" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" This is evidently a proxy. Somebody has “remembered”: “Oh, this crazy guy has once written about his relationship with the FBI, CIA, and DHS. That nuthead!” And this “volunteer” receives the notice from that “somebody”, and so Googles for the matter. Meanwhile, the suspect is at home, and spends two hours getting frightened by the bad news about the indexing IP address. 3:44 AM, 71-217-215-37.cdrr.qwest.net, Iowa City: another bad rumor (“plagiarism). 71.217.215.37 - - [02/Dec/2015:04:44:37 -0700] "GET /scientificenlightenment1/capra7777.html HTTP/1.1" 200 21637 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 3:54 AM: 66.220.158.107 - - [02/Dec/2015:04:54:13 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 56998 "http://alfa-img.com/show/yamatai-kingdom.html" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" 69.171.228.123 - - [02/Dec/2015:04:54:15 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 491814 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" What is this about? It seems that the Secret Society women have linked up the suspect's painting of Goodess Athena and Queen Himiko from the Secret Facebook Group. 2 December (Wednesday) And so the Secret Society operation continues. 4:54 AM, 143.117.240.114, representation222.html, y0114.fin.qub.ac.uk, Queens University Belfast, UK. (In Northern Ireland.) More chatter about the suspect's “plagiarism” in order to produce evidence in the ICJ showing him to be a plagiarizer. 5:58 AM, thermhch6d222.html, Google IN, Opera Mini (en). The same chatter. 112 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 6:12 AM, 150.199.179.92, himiko.jpg, Google, Central Methodist University, mail.fz.k12.mo.us, Columbia, Missouri. 150.199.179.92 - - [02/Dec/2015:07:12:46 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 491814 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More chatter about how the suspect has copied somebody else' painting. Then, 8:07 AM, 24.114.80.60, Rogers Cable, Montreal. 24.114.80.60 - - [02/Dec/2015:09:07:47 -0700] "GET /scientificenlightenment1/standardmodeldrell.gif HTTP/1.1" 200 9790 "https://www.google.ca/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_0_2 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13A452 Safari/601.1" More chatter about how the suspect has copied other people's content onto his own website. Then, 9:35 AM, 106.221.133.56, representation222.html, Google IN, Bharti Airtel, Pune, India. 106.221.133.56 - - [02/Dec/2015:10:35:55 -0700] "GET /scientificenlightenment1/representation222.html HTTP/1.1" 200 6299 "https://www.google.co.in" "Mozilla/5.0 (Windows NT 5.1; rv:42.0) Gecko/20100101 Firefox/42.0" 9:41 AM, he comes again: 106.221.133.56 - - [02/Dec/2015:10:41:20 -0700] "GET /scientificenlightenment1/representation222.pdf HTTP/1.1" 200 2382156 "http://www.lawrencechin2011.com/scientificenlightenment1/representation222.html" "Mozilla/5.0 (Windows NT 5.1; rv:42.0) Gecko/20100101 Firefox/42.0" More chatter (plagiarism). 10:37 AM, dukesm2.jpg linked up from the Secret Facebook Group. 173.252.120.116 - - [02/Dec/2015:11:37:09 -0700] "GET /gallery/dukesm2.jpg HTTP/1.1" 200 5252 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" The Secret Society is brainstorming how to falsely report the suspect for playing fraud with his artworks. 10:49 AM, reverse.completel.net. 89.224.15.27 - - [02/Dec/2015:11:40:04 -0700] "GET /1/chinesepatriarchy220.htm HTTP/1.1" 200 32775 "http://images.google.fr/imgres?imgurl=http%3A%2F% 2Fwww.lawrencechin2011.com%2F1% 2Fyangshaototalview.jpg&imgrefurl=http%3A%2F% 2Fwww.lawrencechin2011.com%2F1%2Fchinesepatriarchy220.htm&h=444 &w=650&tbnid=uuBPKv09rTmkzM% 3A&docid=Z0dYMR2kd4JUUM&hl=fr&ei=xDpfVorFPMi6atKaqqAH&tbm=isch&ia ct=rc&uact=3&dur=374&page=2&start=48&ndsp=57&ved=0ahUKEwiKt4G06b3JAhVInRoK HVKNCnQQrQMIrgIwWQ" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; WOW64; Trident/5.0)" 113 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 More chatter about the suspect's plagiarism. 11 AM, 62.178.95.140, vie.surfer.at, Vienna. 62.178.95.140 - - [02/Dec/2015:12:00:19 -0700] "GET /readings/Audacity_kompakt_Leseprobe.pdf HTTP/1.1" 404 1360 "http://www.google.at/search? q=virtualbox+kompakt+reibold+filetype%3Apdf&btnG=Suche&hl=deAT&biw=&bih=&gbv=1" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:42.0) Gecko/20100101 Firefox/42.0" Another volunteer has discovered that the suspect once has put other people's content on his website. 11:02 AM, descartes202.html, Opera Mini. More chatter about the suspect's plagiarism. Meanwhile, the suspect. He wakes up 10 AM, leaving home 10:30 AM. Social Security Administration, 11:46 AM. Obtained the letter needed for Work Source. Library, checked log. Then, he sets out for Westwood, to catch his appointment at Edelman. Until 4 PM, there were 24 visits to the images on his website! 4:14 PM, 66.87.133.61, pools.cgn.spcsdns.net, Wingate, North Carolina. 66.87.133.61 - - [02/Dec/2015:17:14:06 -0700] "GET /1/chinesepatriarchy.htm HTTP/1.1" 200 15792 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1" More chatter about the suspect's misogynist rambling and plagiarism. Meanwhile, the suspect: he is with Dr Burns on 2:30 PM. After that, he comes back to Westwood. Starbucks. Checked log. He is getting worried over Secret Society’s renewed actions. 5:30 PM, he leaves for Draw Anything LA. 5:48 PM, 37.221.161.72, Romania. This is evidently a proxy. 37.221.161.72 - - [02/Dec/2015:18:48:53 -0700] "GET /cheneyplan25/cheneyplan25.pdf HTTP/1.0" 404 2613 "http://www.lawrencechin2011.com/cheneyplan25/cheneyplan25.pdf" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.124 YaBrowser/14.10.2062.12521 Safari/537.36" 37.221.161.72 - - [02/Dec/2015:18:48:53 -0700] "GET / HTTP/1.0" 200 4834 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.124 YaBrowser/14.10.2062.12521 Safari/537.36" Another volunteer has “remembered” (even though the “crazy material” has been removed). Then, 7:31 PM, 99.74.242.211, presocratics.html, lightspeed.irvnca.sbcglobal.net, Orange. 99.74.242.211 - - [02/Dec/2015:20:31:33 -0700] "GET /scientificenlightenment1/presocratics.html HTTP/1.1" 200 20438 "http://www.google.com/" 114 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 "Mozilla/5.0 (Linux; U; Android 4.3; en- us; MT2L03 Build/HuaweiMT2L03) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30" More chatter (plagiarism). 7:52 PM, 81.231.190.105, secularization.jpg, from amcivilreligion.html, tbcn.telia.com, Nora, Sweden, Webcollage 1.65. What is this about? Most likely, to create the impression in Homeland Security's surveillance that the suspect has put together his webpages by copying from other websites and collaging them together. More evidence in support of Homeland Security's case in the ICJ. 8:27 PM, 70.24.206.240, dsl.bell.ca, Vaudreuil-Dorion, Quebec. 70.24.206.240 - - [02/Dec/2015:21:27:23 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692 "https://www.google.ca/" "Mozilla/5.0 (iPhone; CPU iPhone OS 7_1_2 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D257 Safari/9537.53" More chatter (plagiarism). 8:32 PM, upanishad.html, Google IN. More chatter (plagiarism). Then 9 visits to images. Two hits to perspective.jpg (1 and 2) in a row. More false chatter about how the suspect has plagiarized his theory on linear perspective. 10:50 PM, 72.130.131.55, hawaii.res.rr.com, Waipahu, Hawaii. 72.130.131.55 - - [02/Dec/2015:23:50:51 -0700] "GET /scientificenlightenment1/ancestorcult.html HTTP/1.1" 200 56018 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0" A direct visit. The person is simply sent the link by other volunteers. This volunteer has verified again that the suspect has plagiarized. 1:03 AM, TM Net, Subang Jaya, Malaysia, 124.13.27.215 - - [03/Dec/2015:02:03:13 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 177180 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" More chatter (how the suspect has copied somebody else's painting). 1:37 AM, is somebody looking for the cache of the suspect's blog at Bing? Likely. So many volunteers are pretending to show interest in him, the paranoia schizophrenic who believes that a group of women is going after him. 199.30.25.216 - - [03/Dec/2015:02:37:26 -0700] "GET /blogs/wpcontent/themes/twentyfifteen/style.css?ver=4.3.1 HTTP/1.1" 200 20206 "http://lawrencechin2011.com/blogs/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534+ (KHTML, like Gecko) BingPreview/1.0b" 199.30.25.216 - - [03/Dec/2015:02:37:26 -0700] "GET /blogs/wpcontent/themes/twentyfifteen/js/skip-link-focus-fix.js?ver=20141010 HTTP/1.1" 200 690 115 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 "http://lawrencechin2011.com/blogs/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534+ (KHTML, like Gecko) BingPreview/1.0b" Meanwhile, the suspect is at Draw Anything LA until 9:15 PM. He is very worried about Secret Society’s actions (alert?). Talked to Angela on the phone. He then comes back to Westwood, Starbucks. He is depressed because he has to post on AVFM again in view of the indexing from yesterday. All this is draining his time and energy away. He works on the post past 2 AM. He has to finish it and post it while outside Starbucks (around 2:50 AM) because the coffeehouse closes already. The suspect then sleeps in Westwood Village. 3:50 AM, anvianet.fi, Seinajoki, Finland, 85.157.197.190 - - [03/Dec/2015:04:50:16 -0700] "GET /2013-9-15/91413-19.png HTTP/1.1" 200 73778 "https://www.google.fi/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" This visit might be important. Namely, the volunteer is to chatter: “I find all these images on his website, they seem to have something to do with computer hacking...” Thus is more evidence to support Homeland Security's case in the ICJ. 3 December (Thursday) Less than two hours after the suspect has posted on AVFM, on 4:31 AM, Flightless Bird has posted a reply – he is giving the suspect a very good advice. 116 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 The suspect cannot escape the impression that this Flightless Bird was instructed by the TMU/ CIA team to post this to warn him. As you can see, since the latest law enforcement case is opened on the ground that the suspect is dangerous to the women because he suffers, due to his obsession with them, this delusion that they have been attempting to falsely prosecute him, his continual pronouncement about their past attempt to “get him” – when all this has already been ruled the “product of his schizophrenic delusion” – puts him in increasing danger (looks like a confirmation of the women's claim about him, that he's obsessed with them). The TMU/ CIA, with their true profile of the suspect at stake in the ICJ, thus wants him to desist, for fear not only that he might produce more evidences in support of Homeland Security's case but also that he might really get arrested by law enforcement, thus screwing up the Agency's whole plan. 5:07 AM, 75.150.140.11, Comcast Business, Havertown, Pennsylvania. 75.150.140.11 - - [03/Dec/2015:06:07:58 -0700] "GET /scientificenlightenment1/schuld.html HTTP/1.1" 200 25700 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7" Either another decoy or more chatter (plagiarism). 5:41 AM, somebody from the Secret Society is looking at the suspect's chapter on Lavoisier on Bing Preview: 199.30.24.191 - - [03/Dec/2015:06:41:40 -0700] "GET /scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12063 "http://www.lawrencechin2011.com/scientificenlightenment1/lavoisier.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534+ (KHTML, like Gecko) BingPreview/1.0b" 117 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 What's this about? More chatter about how the suspect has stolen other people's work? (Since this is the suspect's homework for a class at UC Berkeley 15 years ago.) 6:30 AM, 71.83.12.138, static.aldi.mi.charter.com, Traverse City, Michigan. 71.83.12.138 - - [03/Dec/2015:07:30:48 -0700] "GET /suppl_pld_9_ 139/suppl_pld_9_139b.pdf HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1" It appears that another volunteer has “remembered” something and/or is Googling for the suspect's online pronouncements about ANG after hearing ANG's complaint. (Of course the pronouncement is no longer there.) 6:41 AM and 6:42 AM, Sri Lanka Telecom, Piliyandala, Sri Lanka, 112.134.65.130 - - [03/Dec/2015:07:41:27 -0700] "GET /scientificenlightenment1/cosmicdance2.jpg HTTP/1.1" 200 40022 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 112.134.65.130 - - [03/Dec/2015:07:42:15 -0700] "GET /scientificenlightenment1/cosmicdance1.jpg HTTP/1.1" 200 45431 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" More chatter (how the suspect has copied images from books without regard for others' copyrights). 6:48 AM, 91.82.70.144, invitel.hu, Hungary. 91.82.70.144 - - [03/Dec/2015:07:48:00 -0700] "GET /scientificenlightenment1/nonbeing.html HTTP/1.1" 200 13719 "http://r.search.yahoo.com/_ylt=A0LEVzAHVmBW4kMAw19XNyoA; _ylu=X3oDMTExZWZubmMzBGNvbG8DYmYxBHBvcwM3BHZ0aWQDVUlDMl8xBHNlY wNz cg--/RV=2/RE=1449182856/RO=10/RU=http%3a%2f% 2fwww.lawrencechin2011.com %2fscientificenlightenment1% 2fnonbeing.html/RK=0/RS=Tr_jzRuVDkn7vkOnU_zy6O6NaEU-" "Mozilla/5.0 (Windows NT 6.3; rv:42.0) Gecko/20100101 Firefox/42.0" More chatter. 8:03 AM, 80.89.192.49, himiko.jpg, Google RU, nat49.academ.org, Novosibirsk. Is this Russians' mole inside the Secret Society? To secretly gather evidence while going along with the Secret Society women's operation? Meanwhile, the suspect wakes up 7 AM in Westwood Village. Starbucks. He then discovers Flightless Bird’s response. He posts a reply on 9:12 AM. 9:42 AM, the suspect deletes the links to all the forum postings from the links page on his website. He then walks to Ackerman. 10:29 AM, he checks his website from the computers inside Ackerman bookstore. 10:44 AM, 23.121.20.21, lightspeed.miamfl.sbcglobal.net, Hialeah, Florida. 118 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 23.121.20.21 - - [03/Dec/2015:11:44:46 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 491814 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More chatter? Then, after eating (with his Spanish lesson again), the suspect comes back to the Village. As he is waiting for buses, he suddenly realizes the nature of the game. He hurries back to Starbucks to post his realization on AVFM. He is done by 12:46 PM: “On 16 November, the LB Admin, after seeing the above summary posted on her forum, got very concerned about the mental state of the poster, Googled his email address, identified his website and the women referred to in the summary, and contacted the women. The women responded saying they have been, for a while, very frightened by this guy’s paranoia delusion that they have been going after him by making false reports about him to law enforcement. They must have admitted that they have failed to convince the DA, but, now, with the LB Admin’s communication, they could go to the small city’s police department to open a case on their suspect for “online harassment”, etc. The women’s story must be that this guy, when he sees visits to his website from strange places, has wrongly assumed that they are responsible for it, all because he suffers incurable paranoia schizophrenia. But, yet, when the DA and the police visit his website, he is able to conclude, correctly, that it’s because these women have gone to the DA and the police to show them his website in an attempt to report him. So the official story line is that this guy is mostly insane, although sometimes he is correct, because he spends a lot of time on his log. He has therefore correctly identified LB Admin’s actions behind his back despite his mental insanity and disconnect with reality, and both the LB Admin and the group of women, being so frightened to visit his website fearing that he might misunderstand the purposes, asked law enforcement to look at his website instead. And so law enforcement, on 1 December, sent a robot to cache the suspect’s entire website so that the “victims” (the group of women and their associates) can look through the website offline without the suspect’s noticing.” This is much closer to the truth than his previous speculations. The question is whether the detective (either from the Pasadena department or Hermosa Beach department) is allowed to see it. After posting, the suspect is feeling much safer. He proceeds to go to Work Source to turn in the SSA letter. After which, he comes back to downtown. 3:22 PM, 221.145.183.167, /, the Korean scout again. 3:48 PM, at downtown, the suspect goes inside this cybercafe to check his website and his posting on AVFM just to make sure that the new law enforcement case has not resulted in blockage or other tricks about his online activities. Everything is fine. Then the suspect comes to 119 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Starbucks. Can’t connect to Wi-Fi in Starbucks. Then, storage. By then, the mouse pad on his Asus laptop has stopped functioning definitively. It's not clear whether this is “natural” or whether Homeland Security and the Russians have done something because of their case in the ICJ. The suspect then comes back to downtown. Public library. Meanwhile, 5:45 PM, the German Lady begins her meetup at La Fiesta Grande (Pasadena). 6:12 PM, 66.87.82.48, himiko.jpg, pools.spcsdns.net, Hyattsville, Maryland. More volunteer's “chatter”? Unless it's a “decoy”. 7:26 PM, 98.103.147.11, capra.html, Google, Kent, Ohio, central.biz.rr.com. More chatter (plagiarism). 8:23 PM, dynamic.hinet.net, Taiwan, 61.228.153.238 - - [03/Dec/2015:21:23:16 -0700] "GET /scientificenlightenment1/aztecaxismundi.jpg HTTP/1.1" 200 102595 "https://www.google.com.tw/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" More chatter (“He copies from books and draws these shitty diagrams because he doesn't know how to draw”). Homeland Security's evidence in the ICJ. Meanwhile, the suspect attends Chrysalis’ Empowerment Writing show. He sits with Tanisha. 8:30 PM, left, Starbucks. Checked log. Rode the bus home. Near home. The suspect gets angry because he realizes that, at some point after 21 November, his reconstruction must have gone askew. (He is quite right.) Hatred toward this American system of secrecy in order to exacerbate the problem for everybody. Between 11 PM and 11:40 PM, his Asus laptop continues to malfunction. All browsers have crashed, Sony Voice Editor crashes, Windows Explorer crashes. France 24 crashes. In combination with the society's “conspiracy” to make him look crazy: severe hatred toward Americans. He believes that the authority has placed malware in his computer. Even this diary freezes repeatedly. The suspect might not be too far from the truth: both the Russians and Homeland Security would have an interest in bugging his computer. 1:47 AM, Quantil, Pasadena, 168.235.206.207 - - [04/Dec/2015:02:47:01 -0700] "GET /miscellaneous/openlettertosibel6.pdf HTTP/1.1" 404 1360 "http://www.google.co.in/search?q=classified+womanthe+sibel+edmonds+story+pdf&hl=en&ie=UTF8&prmd=ivns&ei=rmBhVr6KE5GfugTOvbS4Bg&start=80&sa=N" "Mozilla/5.0 (Linux; U; Android 4.4.2; en-US; InFocus M2_3G Build/KOT49H) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/10.1.0.527 U3/0.8.0 Mobile Safari/534.30" 120 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 This person again seems to be related to the girl of Indian descent seen on 6 AM, 20 November. Another volunteer seems to have pretended to track down more traces of insanity which the suspect has left behind online, even though the document has been removed. 4 December (Friday; W; more chatters than usual) 8:09 AM, 213.147.128.130, himiko.jpg, Google, pasargadnet.ir, Tiran, Iran. More chatter. 10:38 AM, Benson’s Athena. More chatter about how the suspect has placed other people's painting on his website in order to pretend to be an artist. 1:26 PM, 108.204.29.1, presocratics.html, lightspeed.anami.sbcglobal.net, Ann Arbor, Michigan. More chatter about the suspect's plagiarism? 3:39 PM, Readings on Secret Societies, mc.videotron.ca, Saint Lazare de Bellechasse. 4:54 PM, 82.102.214.192, himiko.jpg, Hadara, Ramallah, Palestine. More chatter about how the suspect has copied other people's painting. Meanwhile, the suspect. MST (with saved videos). The suspect then leaves home on 12:30 PM. On the bus toward Westwood. He rereads his writing on how to develop Russia’s soft-power. He has realized something. In Starbucks, he searches “State Department, EU far rights” – Internet connection is very slow, and he can’t download any PDF documents. His computer has completely malfunctioned. Evidently, it’s Homeland Security which is obstructing his Internet connections. They don’t want him to write anything more which might contradict their false profile of him as uneducated and a plagiarizer. Most importantly, they don't want him to write anything which is pro-US, since that would definitely contradict their argument that he is conspiring with the Russians and the French – for which the anti-American tones of his “Marine document”, at the very least, is evidence. 5:10 PM, the suspect calls W while in Starbucks (from 3:17:00 onward). Here is the detail of the conversation: (1) “Everything which has happened before November the women will deny; but not their trip to the DA and the Manhattan Beach Police Department.” The suspect is in fact mistaken here. The women will deny everything except the current law enforcement investigation. Then the “official story line”. (2) About Homeland Security indexing and caching of the suspect’s website. This is evidence in the ICJ in favor of TMU/ CIA's case, and, indirectly, in favor of the Russians and the French. The suspect's thinking is completely rational. When he has inferred things incorrectly, people call him “crazy” because most people are not educated enough to be able to distinguish between “wrong inference” and “delusion”. (3) Then, the US' possible strategy for dealing with the rise of far right parties in Europe: projecting a conservative, Christian image. This is very bad evidence for Homeland Security; the suspect is about to produce evidences which would disprove that he's thoroughly anti-American and so must be conspiring with the Russians and FN. Then the suspect notes that there might be “light” for him 121 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 in this direction. This admission will be evidence in favor of the Russians and the French later on (non-conspiracy). (3) How to use the log as evidence to prove gang-stalking on cyberspace. W suggests that the suspect not use the computer at all. This “advice” evidently comes from Homeland Security: again, they don’t want the suspect to do anything that might jeopardize their case. W discounts the Republican defense of gun rights. W discourages the suspect from putting things online and paying attention to the IP addresses on his log. Again, he is speaking for Homeland Security and the Secret Society women. “Don’t complain; you are being unreasonable”. The suspect’s retort: Women have a right to dress sexy. W continues to argue with the suspect using the “rape example”. This demonstrates that W is quite aware of what the authority (TMU/ CIA) wants, i.e. evidence as to the suspect’s real attitude toward women. The suspect’s response is evidence in favor of the TMU/ CIA – and indirectly of the Russians and the French later on, i.e. that Homeland Security’s profile of the suspect as a misogynist terrorist – loving and hating white women at the same time due to an inability to get laid with them – is completely false, in violation of international agreement. W’s final warning (speaking for Homeland Security): “If you want to write about the European far right movement, then face the consequences….” Again, it's quite in the suspect's interest to write about it. It's Homeland Security which will be in trouble if the suspect demonstrates his genius and shows sign of proAmericanism in front of everybody. Note also the suspect's comment: “Everybody farts, but, when I fart, I'll be arrested, while nothing happens to other people who fart, all because there are people who don't like me and who are looking for every little fault on my part.” A perfect description. He is being accused of plagiarizing for more than 8,000 times by the Secret Society women – and yet he has never plagiarized. He has always given references when he cites others. But the Secret Society women claim he plagiarizes because he often cites an entire paragraph or an entire page without asking for publishers' permission – even though he has given references. Everybody does that on the Internet, of course, and nobody really cares – as long as you give references. But the Secret Society women will report the suspect – for they are looking for any dirt they can possibly find on the suspect. Meanwhile the Secret Society's operation continues. 7:30 PM, 213.1.13.237, dividedline.html, Google UK, btcentralplus.com, Consett, UK. Immediately, she goes to allegoryofcave.html. 7:34 PM, she goes to the gallery. 7:35 PM, she goes to heidegger.html from dividedline.html. She then goes from heidegger.html to politea.html. 7:37 PM, she goes from politea.html to socrates335.html. 7:39 PM, she goes to the Table of Contents. 7:39 PM, he goes to the first chapter (The Material Meaning of History) from Table of Contents. 7:40 PM, she goes from the first chapter to “Foucault on biopower”. While this person – behaving so abnormally – is without doubt a member of the Secret Society (related to LB Admin, perhaps), it's not clear whether she is here to produce more testimonies about the suspect's plagiarism or whether she is simply doing “decoys” – randomly visiting the suspect's webpages for no reasons whatsoever in order to drive up the suspect's paranoia in regard to the reasons of her visits (as W has warned, “Red Herrings”). 122 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 8:07 PM, scripted.com: the 3rd time. 8:28 PM, 99.105.12.166, FOIA (synthetic telepathy; not there), lightspeed.oshkwi.sbcglobal.net, Neenah, Wisconsin. Another volunteer has discovered that the suspect used to put other people's content on his website. (Bullshit.) 8:30 PM, 72.192.146.1, 1/appendix.html, sd.sd.cox.net, El Cajon, CA. 72.192.146.1 - - [04/Dec/2015:21:30:38 -0700] "GET /1/appendix.html HTTP/1.1" 200 76624 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" Decoy or chatter (plagiarism)? Is this person a friend of Dina B? 8:50 PM, a black guy, very vulgar, with tattoos, comes to sit next to the suspect in Starbucks, just when he is about to begin writing “Russian-supported far right parties in Europe”. The suspect rightly suspects him of being a Homeland Security surveillance agent. He moves to a different table. The surveillance, however, is probably not just there because Homeland Security wants to know what threat the suspect is posing to the nation next, but also because the TMU/ CIA, as well as the Russians and the French, want to collect their own evidence showing Homeland Security’s profile of the suspect to be false (that the suspect is a plagiarizer). From today onward, the suspect’s Asus laptop begins to malfunction until its keyboard shall completely break down. 9:05 PM, 41.244.234.238, presocratics222.html, Viettel Cameroun Sarl, Cameroon. Decoy or chatter? 11:12 PM, 11:18 PM, two visits from Google PH to raisininpudding.png. Evidently more chatter about how the suspect has merely copied contents from other people without regard for their copyright. 2:25 AM, home.otenet.gr, Athens, Greece, 85.72.212.77 - - [05/Dec/2015:03:25:33 -0700] "GET /1/feministethics.html HTTP/1.1" 200 32450 "https://www.google.gr/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" 85.72.212.77 - - [05/Dec/2015:03:25:33 -0700] "GET /1/athd2.jpg HTTP/1.1" 200 12120 "http://www.lawrencechin2011.com/1/feministethics.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" 123 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 85.72.212.77 - - [05/Dec/2015:03:25:34 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/1/feministethics.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" Within 1 minute, she comes to the Table of Contents, 85.72.212.77 - - [05/Dec/2015:03:26:02 -0700] "GET /thermex2.html HTTP/1.1" 200 568 "http://www.lawrencechin2011.com/1/feministethics.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" 85.72.212.77 - - [05/Dec/2015:03:26:03 -0700] "GET /thermfr2.html HTTP/1.1" 200 907 "http://www.lawrencechin2011.com/thermex2.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" 85.72.212.77 - - [05/Dec/2015:03:26:03 -0700] "GET /thermh1.html HTTP/1.1" 200 24055 "http://www.lawrencechin2011.com/thermex2.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" 85.72.212.77 - - [05/Dec/2015:03:26:03 -0700] "GET /athd2.jpg HTTP/1.1" 200 12120 "http://www.lawrencechin2011.com/thermfr2.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" This person is just like the Consett person from 7:30 PM, and it can't be determined whether she is doing decoy or producing rumors (about the suspect's plagiarism and misogynist rambling). 2:36 AM, Universiti Malaysia Sabah, Kota Kinabalu, 103.26.196.158 - - [05/Dec/2015:03:36:12 -0700] "GET /shizukadetail.jpg HTTP/1.1" 200 380104 "https://www.google.dk/" "Mozilla/5.0 (iPhone; CPU iPhone OS 7_1_2 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D257 Safari/9537.53" This is evidently a proxy. More chatter (how the suspect is feigning artistic talent)? 2:53 AM, 141.0.14.222 - - [05/Dec/2015:03:53:07 -0700] "GET /scientificenlightenment1/ancestorcult.html HTTP/1.1" 200 56056 "http://www.google.com.ng/search?q=what+are+the+taboo+of+animism&client=ms-opera-miniandroid&channel=new&prmd=ivns&ei=M8FiVo_5NsLiPfedr5AE&start=10&sa=N" "Opera/9.80 (Android; Opera Mini/9.0.1829/37.7327; U; en) Presto/2.12.423 Version/12.16" More chatter (plagiarism)? 4:04 AM, cinci.res.rr.com, Oxford, Ohio. 24.33.75.168 - - [05/Dec/2015:05:04:52 -0700] "GET /scientificenlightenment1/socrates335.html HTTP/1.1" 200 33272 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/600.8.9 (KHTML, like Gecko) Version/8.0.8 Safari/600.8.9" 24.33.75.168 - - [05/Dec/2015:05:04:52 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/scientificenlightenment1/socrates335.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/600.8.9 (KHTML, like Gecko) Version/8.0.8 Safari/600.8.9" 124 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 24.33.75.168 - - [05/Dec/2015:05:04:53 -0700] "GET /scientificenlightenment1/socrates335.html HTTP/1.1" 200 33272 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 8_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12B410 Safari/600.1.4" 24.33.75.168 - - [05/Dec/2015:05:04:53 -0700] "GET /apple-touch-icon-precomposed.png HTTP/1.1" 404 1360 "-" "com.apple.WebKit.WebContent/10600.8.9 CFNetwork/720.5.7 Darwin/14.5.0 (x86_64)" 24.33.75.168 - - [05/Dec/2015:05:04:53 -0700] "GET /apple-touch-icon.png HTTP/1.1" 404 1360 "-" "com.apple.WebKit.WebContent/10600.8.9 CFNetwork/720.5.7 Darwin/14.5.0 (x86_64)" More chatter? (Plagiarism.) There seem to be more chatters than usual tonight. 5 December (Saturday; the Secret Society women's conferring with the detective tonight) Today is the last time this month that the German Lady would upload pictures of her meetups to the Meetup website (3 December meetup). She would not post anything for the rest of the month, probably in order to pretend to be scared of the suspect. (“He suffers incurable delusion believing that we are going after him, and would act on his delusional belief by cyber-stalking us in return.”) 5:58 AM, 36.8.36.43, himiko.jpg, Bing, ppp-bb.dion.ne.jp, Koriyama, Japan. More chatter (how the suspect has copied somebody else's painting)? 7:04 AM, 70.109.57.77, quantummechanics.html, fios.verizon.net, Leesburg, Virginia. More chatter (plagiarism). 7:22 AM, 70.215.134.157, /, direct visit, myvzw.com, Southaven, Mississippi. What is this about? Meanwhile, the suspect, after resting in Westwood Village all night, wakes up past 9 AM! Starbucks, Westwood. Checked log. 10 AM, Benson’s Athena, Google NO. More chatter about how the suspect, to pretend to be an artist, puts up somebody else's painting on his website. 10 AM to 10:04 AM, massive indexing, 188.165.234.68, crawl03.lp.007ac9.net, OVH, France. It's not clear whether this is related to the FN. 10:54 AM, 95.106.50.239, Rostelecom, Ryazan, Russia. 95.106.50.239 - - [05/Dec/2015:11:54:42 -0700] "GET /1/thermhch6d222.html HTTP/1.1" 200 29197 "http://go.mail.ru/search?q=illustration%20of%20evolution%20of% 20life%20on%20the 125 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 %20earth%20steps&sf=20" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:30.0) Gecko/20100101 Firefox/30.0" The fact that the search was done from mail.ru indicates that he is sent the instruction “Search with these search terms, find the webpage, and then rumor: wow, he is just copying from books!” and does as instructed. 10:57 AM, 117.218.165.51, capra.html, BSNL, Pune, India, Ubuntu. More chatter (plagiarism). 12:38 PM, 198.210.116.105, layereduniverse.html, Google, ruraltel.net, Hays, Kansas. More chatter (plagiarism). 12:54 PM, classificationofindia.html. More chatter (plagiarism). Meanwhile, the suspect. By 1 PM, new hypothesis. He then posts on AVFM: “Lynn on gangstalking”.4 Then, he goes to buy blank discs in Ackerman. After that he goes upstairs to take a nap. The Secret Society's operation continues. 1:24 PM, himiko.jpg. More chatter (how the suspect has copied other people's painting). 1:43 PM, himiko.jpg, Google ES. Same chatter. 4 This is what the suspect has posted: “I have received the following in email from somebody; it’s a short commentary on 'gangstalking' along with advices to help victims of gangstalking. I thought I shall post it here, in case anybody in MRM also suffers this problem. It might be of some help. The following, as indicated in the email notification, is taken from 'Are You Really Crazy, or Are You Being Gang Stalked?' by Lynn Stuter, January 10, 2006, NewsWithViews.com. I include here only the commentary, since the advices she offers I don’t consider to be good at all. But if you want to see the advices, I guess you can just go to the original source. 'The intent of gangstalking is to (1) render the target, the victim, psychologically demoralized even to the point of committing suicide; (2) make the target appear to the larger community to be mentally unstable in order to discredit and psychologically demoralize the target and ensure that no one will believe the targets when they claim they are being targeted; (3) alienate and marginalize the target from the larger community, even family, making it easier to psychologically demoralize and discredit the target. Gangstalking relies heavily on (1) the target becoming so psychologically demoralized that he/she believes there must be something wrong with him/her and is, therefore, afraid to say anything for fear others will think him/her crazy; (2) the target will have no evidence beyond his/her word that the gangstalking is happening; (3) the target will have no detailed records or documentation showing what, when, where, and to what extent; (4) the target will not be able to find out who the perpetrators are or those involved in the gangstalking.'” The suspect then adds an additional note: “propaganda in the mirror” as the favorite tactics by the gangstalkers. 126 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Between 5:30 PM and 12 AM, fewer visits, only 9 visits to images. As you shall see, it's because the Secret Society women are busy conferring with the detective. Meanwhile, the suspect. Past 4 PM, he is awakened by the police in Ackerman. The officer checks the suspect's ID. Then he lets him go. Starbucks, Westwood. Burning DVD 497B. 5 PM, the keyboard of his Asus laptop malfunctions continually. Paint malfunctions. 6:30 PM, he checks the date and time where the Korean scout first appears, and his Microsoft Word crashes. 10:20 PM, when the suspect is at El Monte Station, the Windows Explorer on his Asus laptop freezes for 5 minutes. Very angered. 8:49 PM, Blue Host sends a notice to the suspect: system maintenance to take place on 8 December, 8:30 PM. 15 to 20 minute downtown expected. In reality, this must be the detective's work. There are few visits tonight probably because the Secret Society women are busy conferring with the detective, who is asked to pull out the entire content of the suspect's website to look for malware and the women's private information and other illegal materials. In order to not raise the suspect's suspicion, this should be disguised as a routine upgrade by the hosting company, hence the email notification. 12:07 AM, mycingular.net, Louisiana (no more info) 166.137.118.34 - - [06/Dec/2015:01:07:07 -0700] "GET /timelinepartII-o/timelinepartII-o.pdf HTTP/1.1" 404 1360 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 6_1_6 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10B500 Safari/8536.25" It seems that, while the Secret Society women are conferring with the detective, SDW, fearing to be left out of the crowd of “victims” (since she doesn't actually live in Los Angeles and so has difficulty in making a “stalking” case out of the suspect), is asking somebody related to the Secret Society women to Google for that document in which the suspect accuses her of filing a stalking claim against him behind his back. The volunteer testifies: “In this document, the suspect narrates his delusional, imaginary scenario – believing it's real – that the German Lady has asked SDW to file a confidential stalking claim against him at the TMU. It's all because he has misunderstood the meaning of the visits to his website on 3 April, 2014.” Here we see signs that SDW, in order to be involved, has also mobilized a detective from the San Diego Police Department (or somewhere around there) and filed a separate case with him. To open her separate case, SDW must have fed the San Diego detective with a whole pile of the “testimonies” from volunteers around the world. The San Diego detective is convinced, not knowing that all these “testimonies” were coached by SDW and her gang-members themselves, and is asked to work with the Pasadena/ Hermosa Beach detective on the current case on the suspect. 1:57 AM, gifu.gifu.ocn.ne.jp, Hashima, Japan, 114.174.126.159 - - [06/Dec/2015:02:57:02 -0700] "GET /scientificenlightenment1/capra7777.html HTTP/1.1" 200 21637 "https://www.bing.com/" 127 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/601.2.7" More chatter (“plagiarism”). 2:49 AM, Olsztyn.mm.pl, Olsztyn, Poland, 66.102.9.121 - - [06/Dec/2015:03:49:58 -0700] "GET /scientificenlightenment1/capra.html HTTP/1.1" 200 11888 "https://translate.googleusercontent.com/translate_p? hl=pl&prev=search&sl=en&u=http://www.lawrencechin2011.com/scientificenlightenment1/capr a.html&depth=1&rurl=translate.google.pl&usg=ALkJrhgAAAAAVmQUAX32eeyzA_AchuDr_ npWNq_AKGxt" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36,gzip(gfe)" 89.228.253.13 - - [06/Dec/2015:03:49:59 -0700] "GET /scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12120 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" 89.228.253.13 - - [06/Dec/2015:03:54:04 -0700] "GET /scientificenlightenment1/capra.html HTTP/1.1" 200 11888 "https://www.google.pl/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" More chatter (“plagiarism”). 6 December (Sunday; election in France; the involvement of the San Diego Police Department detective) 5:10 AM, 90.41.81.72, layereduniverse.html, abo.wanadoo.fr, Pers-Jussy, France. (Near Lyon.) Is this person related to FN? 6:06 AM, 108.79.42.173, presocratics.html, lightspeed.livnmi.sbcglobal.net, Birmingham, Michigan. Two more instances of chatter (“decoy” and “plagiarism”). 8:09 AM, another volunteer has come to take a peek to understand the severe paranoia delusion he has developed about the women: 107.77.173.12, AT&T Wireless, US. No more information. 107.77.173.12 - - [06/Dec/2015:09:09:13 -0700] "GET /blogs/2013/04/ HTTP/1.1" 404 1303 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 5.0.1; LGL33L Build/LRX21Y) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.76 Mobile Safari/537.36" Meanwhile, the suspect: 8:30 AM, awakened, corrected grammar mistakes in “Le Pen”. On the bus, 9:30 AM. 11 AM, at St. Sophia. 11:20 AM, Evgeny has replied the suspect. (“What do you like about Russian culture?”) The fact must have been entered into evidence at the ICJ by Homeland Security that the suspect has been 128 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 everyday listening to Russian disco music. And, in his previous communication to Evgeny, he mentioned how he liked Russian culture. It must be the Russian authority who has instructed Evgeny to ask this question as a way to test the suspect's response. 11:36 AM, 130.203.74.168, Pennsylvania State University, State College. 130.203.74.168 - - [06/Dec/2015:12:36:28 -0700] "GET /1/consumerization.htm HTTP/1.1" 200 44671 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_2) AppleWebKit/600.3.18 (KHTML, like Gecko) Version/8.0.3 Safari/600.3.18" Is this “decoy” or “chatter”? 11:59 AM, 221.145.183.167, the Korean scout, scores.nbcsports.com. 12 PM, the suspect is engaged in a philosophical discussion with Dan. Johanna not there. Afterward, the suspect is alarmed: is there an “Operation Le Pen”? (Namely, is the CIA utilizing this opportunity to influence the Le Pen family, looking for chances to melt their heart, so as to soften their anti-Americanism?) In the sermon, Father John just has to say, “We are all bored with our culture....” After the discussion, the suspect professes to Dan that he is at bottom a German Romanticist. The suspect's weekly conversation with Dan and Johanna, demonstrating himself to be a high functioning intellectual, continues to be counter-evidence against Homeland Security's case in the ICJ. The suspect then goes to Starbucks, Normandie. 3 PM, unable to log into Blue Host. He looks up information on NULND, beginning to be aware of her involvement in the current affair. Checked FN election results. Around 3 PM, left a message for W, “FN has won the first round”. This Homeland Security would use as evidence for the suspect's possible conspiracy with FN. 3:43 PM, 108.185.115.15, socal.res.rr.com, Studio City. 108.185.115.15 - - [06/Dec/2015:16:43:06 -0700] "GET /scientificenlightenment1/aztec.html HTTP/1.1" 200 12505 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" This Studio City person was last here on 30 November, 10:22 AM, if you recall. He will be here again on 13 December, 7:59 AM, always looking at the same chapter. Given his repeated visits, he is most likely just creating decoys. 5:43 PM, dividedline.jpg, Google, 5:45 PM, dividedline.html, dsl-user.acndigital.net, Toronto. More chatter (“plagiarism”). 129 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 By now, the suspect has arrived in Culver City, checking his log and online messages before attending French in Mind. 6:15 PM, he replies Evgeny: “I don’t know why. I like a lot of different cultures.” Then he is at French in Mind. There is a French guy who has been in China for a long time, working in the film industry. He might be another Homeland Security informant. Homeland Security is most likely wishing that the suspect would want to connect up with him. But, once again, he will never do that. 6:15 PM, 65.95.106.9, capra7777.html, Bell Canada, Pickering, Ontario. More chatter (“plagiarism”). 8:12 PM, classificationofindia.html. Chatter (“plagiarism”). 8:36 PM, when the suspect is already going home: 76.167.90.235, natsow.res.rr.com, San Diego, CA. 76.167.90.235 - - [06/Dec/2015:21:36:39 -0700] "GET /suppl_pld_9_139/suppl_pld_9_139b.pdf HTTP/1.1" 404 1360 "http://stoporgangstalking.com/about/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1" This is certainly somebody related to SDW, either she herself or one of her TI friends or Dina B or Dina's friend. SDW is probably discussing the suspect again with the San Diego Police Department detective, who is asked to connect up with the detective up here in charge of the suspect's case (the detective from either the Pasadena Police Department or Hermosa Beach Police Department). SDW is saying: “Yes, he has developed this paranoia delusion about how I have teamed up with Ms ANG to falsely report him to law enforcement. And he has left this document about Ms ANG on my blog, but, look, he has removed it.” Tonight must be another busy night for the Secret Society women, who are discussing both among themselves and with the detectives both down there in San Diego and up here in Los Angeles. 10:38 PM, 58.174.204.12, relativity.html, bigpond.net.au, Salisbury, Australia. Another chatter or decoy. 12:11 AM, Interoute Communications Limited, UK, 213.39.103.9 - - [07/Dec/2015:01:11:48 -0700] "GET /readings/Audacity_kompakt_Leseprobe.pdf HTTP/1.1" 404 1360 "https://www.google.co.uk" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" This volunteer might be submitting testimony to the San Diego detective who is now also involved: “Yes, and he puts a lot of other people's materials on his website without regard for their copyright. Look, this Audacity manual. But he has removed it.” 130 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Meanwhile, at home, the suspect is busy working to impress NULND. Past midnight, he has uploaded the summary of “American response”. While this is evidence in the ICJ that the suspect is not conspiring with the Russians and the French, it looks like a piece of evidence that he is orchestrating a huge scandal in order to achieve a revolutionary purpose (reindustrialization of the US and the US giving up of US dollar as world's principal medium of exchange). Note also that, today, the oppositional party in Venezuela has won a major victory in parliamentary election. 7 December (Monday; Donald Trump’s remark about Muslims) 4:22 AM, DTAC, Bangkok, 1.46.42.120 - - [07/Dec/2015:05:22:08 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 121068 "https://www.google.co.th/" "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" More chatter. 5:17 AM, 126.207.253.186, chinesepatriarchy220.html, bbtec.net, Japan. What? Chatter? Decoy? 8:03 AM, 195.242.80.40, meta.ua/?q=lawrencechin2011.com. What? 10:59 AM, 134.126.170.225, representation222.html, Google, James Madison University, Harrisonburg, Virginia. This is chatter about the suspect's plagiarism. (The credibility of the testimony enhanced by the volunteer's status as a university student.) 11:21 PM, 71.201.170.34, Normal, Illinois. 71.201.170.34 - - [07/Dec/2015:12:21:06 -0700] "GET /scientificenlightenment1/whyshouldwebejust.html HTTP/1.1" 200 68711 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1 (KHTML, like Gecko) CriOS/47.0.2526.70 Mobile/13B143 Safari/601.1.46" More chatter (plagiarism). Meanwhile, the suspect awakes past 9 AM. MacDonald. Checked France 24 News: FN victory. Home, showered, left home 11:30 AM. 11:40 AM, on the bus. Suddenly, what looks like a Homeland Security surveillance agent gets on the bus, sits in front of the suspect, and, then, just as the suspect is reviewing a June 2010 recording in which he recounts a Homeland Security agent moving about him on the bus, moves in synchrony with the happening in the recording. What is going on? Clearly, even while Homeland Security and the Russians are engaged in a life131 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 and-death struggle in the ICJ, Homeland Security, by law, has to permit EKT's team to meet with the Homeland Security team inside the control center charged with neutralizing the suspect by controlling his mind. The Russians must have pointed out to Homeland Security that one way to make the suspect look crazy is to orchestrate such synchrony between his external environment and the happening in the recording he is reviewing at the moment so that, as the suspect continues to review those recordings from June 2010, he will come to believe that whatever is happening in the recording will also happen in his present day real life, thus looking superstitious and crazy. Meanwhile, Homeland Security, being impressed by this idea, doesn't know that the Russians are playing tricks on them: Homeland Security is duped into replacing evidences from the previous ICJ trial without knowing. 11:56 AM, SK Broadband, Seoul, 218.38.44.139 - - [07/Dec/2015:12:56:15 -0700] "GET /kudoshizuka1988.jpg HTTP/1.1" 200 218090 "https://www.google.co.kr/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9 _1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1" 218.38.44.139 - - [07/Dec/2015:12:56:45 -0700] "GET /shizukadetail.jpg HTTP/1.1" 200 380104 "https://www.google.co.kr/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9 _1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1" 12:11 PM, bad visits, from Blue Host forum (32041), Opera Mini, Europe (en). More chatter about the suspect's “computer-hacking”. (In reality, the suspect was complaining about his website's possibly being hacked.) 2:33 PM, 130.43.129.41, Fermat, London. More chatter (plagiarism). 3:55 PM, ancestorcult.html, Apizaco. More chatter (plagiarism). Meanwhile, the supsect. 12:56 PM, he is on the Metro train, his keyboard is half-broken, and can’t be used. He is very saddened and angered. Then it is suddenly functioning again. Casbah. The suspect would stay there until 4:30 PM. He looks retarded while staring at pretty AWFs. He continues to work on “Far right”. 4:23 PM, 153.106.80.247, calvin.edu, Calvin College, Grand Rapids, Michigan. 153.106.80.247 - - [07/Dec/2015:17:23:09 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200 27754 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10) AppleWebKit/600.1.25 (KHTML, like Gecko) Version/8.0 Safari/600.1.25" 5:19 PM, he comes again. 6:06 PM, he comes again. He will be here again two days later, which means that he is most likely doing “decoy”. 132 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Meanwhile, the suspect. After Casbah, he comes to Chrysalis. Outside, he looks retarded while saying Bye to Ariane. Dinner. Men’s group. The suspect makes a statement about the overrepresentation of blacks in jail. While at the Metro station (Little Tokyo), the suspect produces a (incorrect) outline of what might be going on right now. He is now going home. 8:36 PM, ath2d.jpg is called up on Facebook. 173.252.88.186 - - [07/Dec/2015:21:36:16 -0700] "GET 734/scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12120 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" The Secret Facebook Group is being accessed. 9:01 PM, static.pichincha.andinanet.net, Quito, Ecuador, 181.112.82.24 - - [07/Dec/2015:22:01:09 -0700] "GET /kudoshizuka1988.jpg HTTP/1.1" 200 15412 "https://www.google.com.ec/" "Mozilla/5.0 (Linux; Android 5.1.1; D5316 Build/19.4.A.0.182) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.76 Mobile Safari/537.36" More chatter. 10:29 PM, Korea Telecom, Seoul, 175.223.18.11 - - [07/Dec/2015:23:29:50 -0700] "GET /scientificenlightenment1/capra7777.html HTTP/1.1" 200 21637 "http://www.google.co.kr/url?sa=t&source=web&cd=85 &rct=j&q=principle%20of%20noncontradiction%20quantum&ved= 0ahUKEwiimKnF0cvJAhUkiKYKHdOiA9A4UBAWCCcwBA&url=http%3A%2F% 2Fwww.lawrencechin2011.com%2Fscientificenlightenment1% 2Fcapra7777.html&usg=AFQjCNGxRH3rOYHWFbq7taVc_0pfSVgS8Q&sig2 =IZ2D8VV28Pr2syVjs6-SIw&cad=rjt" "Mozilla/5.0 (Linux; U; Android 4.4.2; ko-kr; LGF320K/22h Build/KOT49I.F320K22h) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.2 Chrome/30.0.1599.103 Mobile Safari/537.36" More chatter. Presumably, plagiarism and: “Ha, he believes that he might have solved the origin of the universe! Ha ha ha!” Then KRN would analyze: “He suffers grandiosity because of his narcissistic tendency”, thus projecting herself onto the suspect. Near home, the suspect reads in the newspapers the story about the radicalization of the San Bernardino shooters on the Internet. He becomes very scared. He fears being labeled such a case in official records. He goes home, and, on 11:05 PM, posts a reply on Partisans to his own previous anti-American posting, something to the effect that the struggle against political 133 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 correctness should not be a struggle between nation-states. This, in order to tone down his earlier anti-American tone. 2:08 AM, Angelson posts a reply to the suspect's new posting on Partisans. The posting is unintelligible. But clearly, by disavowing his anti-Americanism – more evidence in France's and Russia's favor – the suspect has set going a new round of operations on the part of FN. 3:25 AM, dynamicip.rima-tde.net, Toledo, Spain, 83.53.203.95 - - [08/Dec/2015:04:25:20 -0700] "GET /scientificenlightenment1/germaninvasion.html HTTP/1.1" 200 33105 "https://www.google.es/" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" More chatter or decoy. 8 December (Tuesday; torture resumed) 6:12 AM, grincheux posts a reply on partisansmarine.com. (She has a daughter who is going to Los Angeles.) Now that the suspect has produced a testimony showing him to not intend to conspire with the Russians and the French, the Russians and the French have devised this test: “if he intends to conspire with us, he would want to meet our 'contact'.” Of course the Russians have known the suspect well enough to know that the suspect is not as stupid as would believe that the other side is so dumb as to want to send a contact to him while the whole matter is being debated in the ICJ. (The suspet understands all about “conspiracy”.) 6:30 AM, schuld.html, Salisbury, Maryland. Either chatter or decoy. 7:39 AM, 137.54.1.97, Foucault on biopower, University of Virginia, Charlottesville, Virginia. More chatter (plagiarism). 7:43 AM, capra.html. More chatter. 8:37 AM, 89.36.137.248, Google RO, Le Pen, static.linuxship.ro, Romania. Presumably a proxy. 89.36.137.248 - - [08/Dec/2015:09:37:52 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "http://www.lawrencechin2011.com/lepen3/lepen3l.pdf" "Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/45.0.2454.101 Chrome/45.0.2454.101 Safari/537.36" What is this about? Has the suspect's evidence for non-conspiracy at last enabled the FN members of Partisans to look at the “Marine document” for themselves without violating international laws? 134 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 9:04 AM, himiko.jpg. More chatter (how the suspect has copied other people's painting). 11:24 AM, himiko.jpg. More chatter. Meanwhile, the suspect. Woke up almost 10 AM. Breakfast at MacDonald. Discovered the replies at Partisans. Left home 11:30 AM. Severely disturbed by the replies: more Homeland Security operations. He then leaves home, 11:30 AM. Because the keyboard on his Asus laptop no longer functions (type “l” and “6” will appear on the screen, and so on), he can only read on the bus. And yet, unable to concentrate. Severe anger. Then, on Silver Line, nervous breakdown. Because the suspect is under surveillance on the bus, Homeland Security, with the Russians by their side, is controlling the suspect to suffer nervous breakdown, in order to cause surveillance showing the suspect fitting their false profile of him to enter into the ICJ as evidence. The suspect gets to downtown without having been able to do any work at all. He thus gives up the plan to go to Work Source. 1:43 PM, junk call: 408-610-7145. Is Homeland Security, seeing that the suspect didn't take the bait at Partisans, trying to produce more faulty evidence showing the suspect receiving secret instructions from the Russians? 2:17 PM, 105.153.190.246, perspective.html (the first visit since it was changed), Maroc Telecom, Morocco (no more info). Rabat? 2:20 PM, he is checking out the artwork pages linked from perspective.html. This is more chatter (how the suspect has plagiarized his theory on linear perspective). Meanwhile, the suspect has arrived at Casbah. More nervousness as the suspect comes to suspect that ANG and SDW are trying to file TRO against him. 3:40 PM, the girl sitting next to the suspect leaves. A vulgar white guy then comes in, looking like a Homeland Security guy. The suspect is very upset by him. Then he reviews the wrong recording, then Renee Chappell gives him the wrong phone number for the Department of Rehabilitation. He calls the Department of Rehabilitation again, but they would not make any appointment with him. He calls Renee back. Severely angered and frustrated by all the nonsense. Forget about looking for a job. Started writing. Gradually calmed down. The guy sitting next to the suspect turns out to have a German accent. Not DHS? Well, it's evident that both the Russians and Homeland Security are controlling the suspect to be especially agitated, and then send a guy in for him to misidentify him as a Homeland Security surveillance agent, all in order to confirm Homeland Security's false profile of the suspect as violent and suffering from paranoia schizophrenia (falsely believing that government agency is putting him under surveillance). At Casbah, the suspect has written down: 135 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Realized since last night: Homeland Security doesn’t want me to write because they have been continuing to insist in diplomatic channels that their false profile of me is correct and foreign governments have once again questioned the accuracy of their depiction of me (insane, violent, racist, misogynist, plagiarizing, unintellectual, computer-hacking, vicious and antisocial). This is more evidence that he isn’t conspiring with the Russians and the French. 5:01 PM, 71.170.120.217, santtx.dsl-w.verizon.net, Johnson City, Texas. 71.170.120.217 - - [08/Dec/2015:18:01:50 -0700] "GET /diaryreview2013-1233/diaryreview2013-12-33Wc.pdf HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" It appears that another volunteer has joined in on the chatter about the suspect (“He's insane, believing that a group of women is going after him). This is testimony for the detectives and evidence in the ICJ. 5:05 PM, 131.247.226.170, American Civil Religion, laptops.usf.edu, University of South Florida, Tampa, Florida. He was here: 26 November 10:59 AM, the same chapter. Given this, he is most likely doing “decoy”. 7:32 PM, 141.209.238.15, Victim Feminism, Central Michigan University, Mount Pleasant, Michigan. 7:33 PM, she comes to the Table of Contents. She's here to “chatter” (misogyny and plagiarism). 7:40 PM, classificationofindia.html, Google IN. He immediately goes to upanishad.html. Either decoy or chatter (plagiarism). 8:05 PM, 70.209.193.118, Corona, CA. (East of Orange County.) 70.209.193.118 - - [08/Dec/2015:21:05:29 -0700] "GET /blogs/2014/04/14/last-word-on-mypast-two-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 5.1.1; VS880 Build/LMY47V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.94 Mobile Safari/537.36" Another volunteer has pretended to show concern and joined in on the “hunt”. Along with the 5:01 PM Johnson City person, he is probably supplying testimonies to the San Diego Police Department detective since the latter is forbidden by “victim confidentiality” from actually looking at the posting itself. The testimony would for sure consist in something like: “He is 136 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 terrifying. He really believes, out of his paranoia delusion, that the poor SDW is teaming up with KRN and others to falsely report him to law enforcement. He slanders them, and spills out their private information to embarrass them.” 8:06 PM, 178.239.59.82, “Subhuman meets”, Netrouting Shared IP Spaces, Amsterdam. 178.239.59.82 - - [08/Dec/2015:21:06:15 -0700] "GET /diaryreview2013-1239/diaryreview2013-12-39W.pdf HTTP/1.1" 404 1360 "https://www.google.nl" "Mozilla/5.0 (X11; Ubuntu; Linux x86 _64; rv:42.0) Gecko/20100101 Firefox/42.0" Another volunteer is trying to track down the suspect's chapter linked from the Prison Planet forum posting hoping to supply more or less the same testimony to San Diego Police Department detective to strengthen SDW's case. Meanwhile, the suspect has left Casbah around 6:30 PM. Russian church, Forum. In very bad mood, working on “Far right”, and not participating very much. He leaves the church around 9:15 PM. Note that, 8:30 PM, Blue Host is doing its scheduled maintenance. Again, the detectives are shutting down the suspect's website for 20 minutes in order to pull all content out of the server for examination. While the detectives would not find any malware or pornography or things like that, the “victims” are expected to be given access to all the contents and thus to know that the contents which the suspect has supposedly removed – all the suspect's reconstruction of the Secret Society women's illegal conducts against him in the past – are still hidden somewhere on his website. The entire content of the suspect's website will also be intercepted into the ICJ as evidence – as evidence against Homeland Security. 8:39 PM, chinesepatriarchy.html, Astoria, NY. More chatter. (Misogynist rambling and plagiarism.) 11:13 PM, capra.html, Google IN. More chatter. (Plagiarism.) Meanwhile, the suspect. Very difficult time reading on the computer because of the broken keyboard. Home, past 11:40 PM. Gripped by severe fear about the women’s TRO. Called Angela, yelling at her (“The women will prohibit me from using the Internet”). Calmed down soon afterward. Both the Russians and Homeland Security are programming the suspect to experience extreme paranoia fear in order to enable the detectives to intercept more evidences in favor of the women's case. 2:57 AM, st-andrews.ac.uk, the University of St. Andrews, 137 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 138.251.252.82 - - [09/Dec/2015:03:57:07 -0700] "GET /scientificenlightenment1/capra.html HTTP/1.1" 200 11888 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" This visit is unusual. Perhaps a verification on behalf of the TMU/ CIA team. Especially since this webpage is one of the Secret Society women's favorites (for falsely reporting the suspect for plagiarism), they would want an university professor or student to read through it to judge whether it is really plagiarized. (Note that it's almost noon in the UK.) Overall, there are a lot fewer visits this night. The Secret Society women are busy with the detectives for the third night. 9 December (Wednesday; the Secret Society women are busy with something afternoon and night) 5:03 AM, 58.97.241.248, /, Google, banglalionwimax.com, Dhaka, Bangladesh. What is this about? 5:24 AM, /1/appendix.html, Google proxy. More chatter (plagiarism). 6:01 AM, 180.190.91.185, thermh1.html, Google, Globe Telecom, Pasig, Philippines. 6:02 AM, oppressionofwomen1.htm. 6:03 AM, Table of Contents. Either decoy or more chatter about the suspect's plagiarism. 9:11 AM, Youtube notifies the suspect of the removal of “War Lords”. Apparently, in order to support Homeland Security's profile of the suspect as a plagiarizer, the Secret Society wants to produce more instances where the suspect is accused of violating other people's copyright. Seeing that the suspect has this movie on his Youtube channel, the Society instructed somebody to report the suspect to Youtube. Of course, hosting a movie on one's Youtube channel is what everybody else does from time to time, but, when the suspect does it, it would be evidence that he is a habitual plagiarizer who constantly steals other people's contents without regard for this thing called “copyright”. Meanwhile, the suspect wakes up past 9 AM. Breakfast at MacDonald. Found abandoned pancake. Wanted to eat it, but a woman claimed it. She then lets the suspect have it and wants to pay for his food. It's not clear whether this is all staged by Homeland Security in order to deceive the ICJ judges into the impression that the suspect is not being gang-stalked and victimized by American people. When he goes home he discovers the warning from Youtube. He is quite distraught. He farts just like everyone else does, but, while nothing happens to everyone else, he will be persecuted for farting. Then he discovers the video “Flirten auf russisch”. (Perhaps Homeland Security has obtained another piece of circumstantial evidence for the suspect's conspiracy with the Russians as he constantly shows interests in videos about Russia or Russian disco music.) He leaves home, 11:30 AM. This time, he has to bring not only his external 138 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 keyboard, but also his Toshiba. On the bus he calls Angela to apologize for his behavior last night. 12:38 PM, 153.106.89.156, American Civil Religion, direct visit, Calvin College, Grand Rapids, Michigan. 153.106.89.156 - - [09/Dec/2015:13:38:10 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200 27754 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10) AppleWebKit/600.1.25 (KHTML, like Gecko) Version/8.0 Safari/600.1.25" This person was here on 4:23 PM, 7 December, or two days ago. Again, he is decoying the suspect. 12:38 PM, sci/appendix.html. More chatter (plagiarism). 12:46 PM, 77.147.110.206, germaninvasion.html, Google FR, rev.sfr.net, Vitré, France. 77.147.110.206 - - [09/Dec/2015:13:46:23 -0700] "GET /scientificenlightenment1/germaninvasion.html HTTP/1.1" 200 33105 "http://images.google.fr/imgres?imgurl=http%3A%2F% 2Fwww.lawrencechin2011.com %2Fscientificenlightenment1% 2Fsaxonwarrior.jpg&imgrefurl=http%3A%2F% 2Fwww.lawrencechin2011.com%2Fscientificenlightenment1% 2Fgermaninvasion.html&h=512&w=638&tbnid=pFTtBXZ0snuMXM% 3A&docid=GnTFiZdAHeVUWM&ei=EZNoVqC1LcGQaL_ZuNAK&tbm=isch&iact=rc& uact=3&dur=698&page=1&start=0&ndsp=20&ved=0ahUKEwjggebw0s_JAhVBCBoKHb8sDq oQrQMIKTAD" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" 1:10 PM, the Vitre person comes again. 77.147.110.206 - - [09/Dec/2015:14:10:09 -0700] "GET /scientificenlightenment1/germaninvasion.html HTTP/1.1" 200 33105 "http://images.google.fr/imgres?imgurl=http%3A%2F% 2Fwww.lawrencechin2011.com %2Fscientificenlightenment1% 2Fsaxonwarrior.jpg&imgrefurl=http%3A%2F% 2Fwww.lawrencechin2011.com%2Fscientificenlightenment1% 2Fgermaninvasion.html&h=512&w=638&tbnid=pFTtBXZ0snuMXM% 3A&docid=GnTFiZdAHeVUWM&ei=H5RoVr6KDIS4ac3Kn6AK&tbm=isch&iact=rc& uact=3&dur=710&page=1&start=0&ndsp=18&ved=0ahUKEwjlaTx08_JAhUEXBoKHU3lB6QQrQMIMjAG" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" 139 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 This French person is either doing chatter (plagiarism) to support Homeland Security's case or secretly gathering evidence against Homeland Security and in favor of TMU/ CIA's case. Around this time, the suspect is in Bail Hotline. Quite excited for a while. He then goes to the public library in downtown. He meets with Tanisha at Chrysalis, 3:30 PM. He leaves there by 4 PM, and comes to Starbucks, Prospect. 4:38 PM, 73.137.181.245, representation222.html, Cartersville, Georgia. More chatter about the suspect's plagiarism. 6:19 PM, Google MX, Synthetic Telepathy FOIA. Another volunteer has tracked down an instance of the suspect's putting other people's content on his website without regard for their copyrights. The chatter has become testimony for the detectives and evidence in the ICJ, even though the document has been removed. (In reality, this is the FOIA release in regard to US military's synthetic telepathy technology, and several people have obtained it and put it on their website, including FFCHS. Again, everybody does it, but, when the suspect does it, he gets persecuted.) There would be very few visits to the suspect's website for the rest of the day. The Secret Society women must be busy with something. It's the fourth night that a San Diego detective is involved. Perhaps it has something to do with that. After checking his log and checking up on the German Lady’s meetups and KRN’s Twitter, he leaves 6:30 PM. (The detective has intercepted the suspect “cyberstalking” the German Lady.) Draw Anything LA. Grace there. The suspect draws the Chinese president tonight. He leaves a little bit past 9 PM. El Monte station. Can’t transfer June 2014 log to Toshiba: the file corrupted. Very strange. Home, past midnight. The suspect becomes frightened by the possibility of a TRO again. 12:40 AM, he posts on AVFM: “I need some serious help here. There is some posting on another online forum, very old, which these women have probably wanted to use against me. However, it’s impossible to delete the posting. I don’t know if any users there have been cooperating with the group of women, pretending to notify them that somebody is suffering paranoia delusion about their going after him and pretending to track down my website. I suppose these women will, if they can, want to use that old posting as evidence and go to the police and the judge in order to get a restraining order against me, which will stipulate that I shall not be allowed to use the Internet or have my website or something like that. (I don’t think the order will simply say I’m not allowed to write about them online, since I have already stopped writing about them, and the goal of these women is to prevent me from getting online altogether, not to prevent me from writing about them.) What shall I do? I even tried to delete the 140 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 account there, but still it needs approval from the forum admin. And there is never any response to my requests. “Sorry. But if anyone has any suggestion about what to do, please share it with me. Or PM me even.” The suspect is referring to the Prison Planet forum posting. He has posted there numerous times asking the moderator to delete the post “Some comments on targeted individuals”, from which all the visits have come to his website. But the moderator has never responded. This is what has driven him paranoid in the past two days. 1:06 AM, P.T. Wireless Indonesia, Bulupitu, Indonesia, 114.79.29.113 - - [10/Dec/2015:02:06:32 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 83100 "https://www.google.co.id" "Mozilla/5.0 (Windows NT 5.1; rv:43.0) Gecko/20100101 Firefox/43.0" Evidently more chatter (how the suspect has copied other people's painting). 1:22 AM, Berne has posted a reply on AVFM: “Personally, I think you should just get off the Internet for a whole while. Go on a vacation, or take a break or whatever, somewhere in nature, rent a cabin and start realizing that living your life on the internet is not living a life at all. Go breathe some fresh air, take a hike, go for a swim, get out of your head, stop thinking and just breathe. You're driving yourself insane.” It's almost as if he were talking to KRN and her gang-members instead, who are on the computer all their waking hours coordinating cyberstalking of the suspect and his website. 3:25 AM, Chonbuk National University, Korea, 210.117.131.140 - - [10/Dec/2015:04:25:34 -0700] "GET /scientificenlightenment1/capra7777.html HTTP/1.1" 200 21637 "http://www.google.co.kr/url? sa=t&rct=j&q=&esrc=s&source=web&cd=17&ved=0ahUKEwjgpKal9HJAhUoeaYKHe_vCywQFghrMBA&url=http%3A%2F%2Fwww.lawrencechin2011.com %2Fscientificenlightenment1%2Fcapra7777.html&usg=AFQjCNGxRH3rOYHWFbq7taVc_0pf SVgS8Q&bvm=bv.109395566,d.dGY&cad=rjt" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko" Is this guy here doing more chatter (plagiarism and “Ha! The solution to the origin of the universe?”)? 3:52 AM, Beour3rd posted a second reply 141 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 “you want help but you don't want help. i gave you the best advice you're going to get. Leave. Move. Get into a different head space. “All your actions and your interactions with those girls... make them continue doing this, “You're like the kid that keeps responding to the guy who's teasing you. They have proven they are evil to you. They hold ALL the cards , ALL the power and you stay in their power. Get the fuck out.” It would seem that Beour3rd is getting instruction from the Secret Society or Homeland Security to give the suspect another wrong advice. Once again, everybody is encouraging the suspect to flee so that he would become a fugitive. 10 December (Thursday; the German Lady’s meetups) 4:49 AM, aztec.html, Google DE, Dusseldorf. More chatter (plagiarism). 5:45 PM, languagechangecycle.jpg, Google BG. More chatter (copying contents from books). 5:55 AM, languagechangecycle.jpg, Google PL. More chatter (copying contents from books). 6:15 AM, 125.239.165.215, oppressionofwomen1.html, Google NZ, Jetstream.xtra.co.nz, Wellington, New Zealand. More chatter (misogynist rambling and/or plagiarism). 6:26 AM, 95.5.34.185, Samsun, Turkey. 95.5.34.185 - - [10/Dec/2015:07:26:33 -0700] "GET /drawLA/drawLA_ 01_15/drawanythingLA/anja.jpg HTTP/1.1" 200 466330 "https://www.google.com.tr/" "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" 95.5.34.185 - - [10/Dec/2015:07:26:33 -0700] "GET /drawLA/drawla2/eva.jpg HTTP/1.1" 200 1247445 "https://www.google.com.tr/" "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36" Why is this Turkish guy looking for the portraits the suspect has done of the lead singers in Flunk and Julie? Are the Secret Society women planning to contact, and recruit, Anja and Eva? 6:45 AM, 131.247.244.20, University of South Florida, laptops.usf.edu, Tampa, Florida. 142 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 131.247.244.20 - - [10/Dec/2015:07:45:18 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200 27754 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.85 Safari/537.36" Compare this with the visit on 5:05 PM, 8 December, also from the University of South Florida. 131.247.226.170 - - [08/Dec/2015:18:05:38 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200 27754 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36" It's not the same person, but the two persons are presumably related. Presumably more chatter about the suspect's plagiarism. (Namely, the earlier USF student has found another student at the same college to chatter about the suspect.) 7:19 AM, 24.10.109.161, hsd1.ca.comcast.net, Rancho Cordova, California. (East of Sacramento.) 24.10.109.161 - - [10/Dec/2015:08:19:59 -0700] "GET /1/epilogue2.html HTTP/1.1" 200 35067 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3" This person will come again on 16 December, 9:52 PM, looking at the front page. Either chatter (misogynist rambling, plagiarism) or decoy. 8:29 AM, representation222.html. (More chatter?) Meanwhile, the suspect. He wakes up almost 8 AM. He has an orientation at Work Source today. Forgot to bring his external keyboard while running for the bus, and so missed the 8 AM bus. Upset. Then the suspect loses his hat. Had to go to Work Source late. Very upset. However, 10:30 AM, he has arrived at Work Source, and everything is just getting started. Lunch: continued watching “Flirten auf Russich”. The suspect leaves Work Source around noon. 12:28 PM, 219.56.26.18, Utsunomiya, Japan, 219.56.26.18 - - [10/Dec/2015:13:28:44 -0700] "GET /fising2.html HTTP/1.1" 200 881 "http://www.google.com/search? q=shizuka+kudo&client=safari&rls=en&tbm=isch&prmd=ivns&ei=QuBpVu3 zKYS2mAWto4yYBQ&start=80&sa=N" "Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3" Is this chatter or decoy?. 12:32 PM, 209.82.118.250, Calgary, Alberta. 143 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 209.82.118.250 - - [10/Dec/2015:13:31:57 -0700] "GET /cheneyplan19/cheneyplan19d.pdf HTTP/1.1" 404 1360 "https://www.google.ca" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:42.0) Gecko/20100101 Firefox/42.0" It looks like another volunteer is looking for the suspect's traces online (his insanity). Then, from 12:32 PM to 12:34 PM, the Utsunomiya person is exploring other drawings of the suspect's on his Old Gallery. Again, unclear whether s/he is doing decoy or the “real thing” (chatter, testimony). 3:11 PM, 50.169.18.44, Comcast, Stoughton, MA. 50.169.18.44 - - [10/Dec/2015:16:11:36 -0700] "GET /scientificenlightenment1/descartes202.html HTTP/1.1" 200 11660 "https://www.google.com/" "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" This person seems to have been here before. Given the same visit later, it's most likely chatter (“plagiarism”). Meanwhile, the suspect has spent time in the public library in downtown. Read a little “Hoelderlin”. He posts on AVFM again.5 He then goes to his storage facility – he needs to get the DVD containing the log for June 2014. Discovered while there that his scanner has disappeared. Very worried. 3:52 PM, dianliwenmi.com (Shizuka). This visit is very strange, and will appear again later. 4:12 PM, descartes222.html, a different person than the 3:11 PM person. Just more chatter to reinforce the earlier chatter (“plagiarism”). 5 This is what the suspect has posted: “Brd, I can’t just leave because I want to. Financial and legal reasons. You don’t know how bizarre Internet has become for me. There seems to be some professional involved to make sure that I conform to the profile of suffering severe paranoia always falsely believing that somebody is going after me when nobody is. This professional gets all these people to visit my website for no reason whatsoever and to behave so abnormally, in order to drive me to paranoia thinking that they are sent here to collect evidences again. Then, when I simply posted something completely boring and meaningless on Internet forums, the posting will go viral and break all records for number of views, scaring the hell out of me. I have an interesting theory, though. I hope it’s at least entertaining. It seems that some authority is involved so that I’m required to behave like a paranoid insane computer geek who constantly blames what is my own faults on others, etc. Presumably, I am supposed to behave badly in order to make a bad example out of myself, so that the authority can use me as a reason to pass new laws, etc., in order to prevent something like me from happening again. And so, right now, I’m helping to make the world a better place.” 144 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 4:36 PM, Beour3rd has posted another reply urging the suspect to go away. It seems that both Homeland Security and the Secret Society women just can't wait for the suspect to become a fugitive. Meanwhile the suspect has come back to Chrysalis. During men's group, George is talking about “outsourcing”. 7:09 PM, 170.140.105.10, nat.emory.edu, Emory University, Atlanta, Georgia. Is this decoy or chatter? 170.140.105.10 - - [10/Dec/2015:20:09:49 -0700] "GET /thermhchapter5.html HTTP/1.1" 200 35705 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" Very few visits afterwards. There are 8 visits to images until 12:15 AM. Meanwhile, the suspect, after men's group, is at Starbucks, Little Tokyo. He checks over all the videos he has shot of his storage unit, and concludes that he has forgotten to bring in the scanner the last time he was using it. Went home. Began working on “Suffering Woman”. 12:52 AM, phnx.qwest.net, Phoenix, Arizona, 75.171.5.58 - - [11/Dec/2015:01:52:31 -0700] "GET /scientificenlightenment1/menard.htm HTTP/1.1" 200 24310 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" More chatter about the suspect's plagiarism? 3:38 AM, the “Princeton decoy”, spin.cs.princeton.edu, 128.112.155.173 - - [11/Dec/2015:04:38:33 -0700] "GET /scientificenlightenment1/americanlanguagefamilies.jpg HTTP/1.1" 200 155609 "http://www.lawrencechin2011.com/scientificenlightenment1/humandispersal.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" 11 December (Friday; “Suffering Woman”) 7:46 AM, orphism.html, direct visit, Budapest. More chatter (plagiarism). 11:42 AM, 199.217.32.2, Academy School District 20, Colorado Springs. 145 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 199.217.32.2 - - [11/Dec/2015:12:42:13 -0700] "GET /scientificenlightenment1/creationmythnotes.html HTTP/1.1" 200 13099 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" Another chatter about the suspect's plagiarism (by a school teacher in order enhance the credibility of the false evidence to be used with the detectives and in the ICJ). Meanwhile, the suspect wakes up 9 AM. MacDonald. Home. MST. Didn’t come. Wanted to do it again. Thus missed the 11:30 AM bus. MST the second time, came. (Japanese.) Left home 12:30 PM. 1:19 PM, descartes222.html. Chatter? (“Plagiarism”, following upon the two testimonies from yesterday.) 1:34 PM, 134.39.153.20, fermat.pdf, Google, Washington State Board for Community and Technical Company, Wenatchee, Washington. Another chatter by somebody from a “respectable institution” in order to enhance the credibility of the Secret Society women's case. 2:47 PM, Nostratic, Google BG. Chatter (how the suspect is feigning artistic talent). When the suspect arrives in downtown, he first goes to the barber shop. Haircut. Then, he is going to Starbucks, Westwood. While on the bus, he works on “Russian-supported…” Fewer visits after 4 PM. Soon, the suspect is in Starbucks, Westwood. He checks his log, eats, then, W calls back: IMPstrbkwstwdWes_12_11_15_608PM.MP3 (from 38:00 onward). The suspect notes that he has more crazy things to say. (1) The new hypothesis about how the previous ICJ trial judgment really works: only a few important people (the conspirators in France) are “chipped” and are required to do certain things to cause certain reactions from the rest of the people, the totality of which reactions would then add up the state of affair ordained by the ICJ judgment. Did the Russians once not want to activate the ICJ trial? (2) What has happened: the French came, and there was a conflict between TMU’s profile of the suspect and Homeland Security’s. The suspect has got this correctly, and it is more evidence that the suspect has had no prior knowledge and has not conspired with the Russians and the French. (3) Could the “Marine essay” have stirred up any controversy? How good was it, really? It has no meaning for the French except as an antiAmerican propaganda tool. (4) W: can the FN begin to like Americans? Donald Trump: perhaps he said those offensive things in order to influence FN toward a favorable perception of the Americans. Only if there is an ideologue in FN who is looking for an anti-American propaganda. The suspect notes that Homeland Security would charge the FN ideologue with “conspiracy” with him if the ideologue wants to use his ideas. (5) The suspect notes his motive for writing 146 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 “American response”. The suspect: “Maybe the Russians and the French then said to the US: You can’t use his ideas, it would be 'conspiracy' too.” This is not actually what has happened. “American response” has merely been used by the French and the Russians as evidence for the suspect's non-conspiracy with them. (6) The cause for the United States' conflict with the European far right: free trade. “It looks more like British Old Lady's program” (honking: 55:30). (7) The suspect then confesses what he has figured out yesterday: his ideas on Russia’s development of soft-power were prefaced with crazy-sounding comments which became an excuse for EKT to file stalking claims against him, and yet the ideas themselves were ingenious. It thus looked like he was pretending to be crazy in order to pass onto her suggestions which she could use to rebuild her nation. Thus, it was suspected of fraud with EKT in October 2014. “Hence, all my ideas are banned, per Homeland Security’s trick (bad profile).” This might be evidence against Homeland Security in the ICJ. (8) W: The best way to get a person’s ideas to circulate widely is to call him “crazy” and then ban them. (9) The suspect predicts: FN will come to power, but their anti-Americanism will be toned down (1:05:00). More evidence against Homeland Security's case in the ICJ. (10) The suspect notes that his “delusions” are so complex that it requires a special upper-division course in order for people to understand them. About John Nash. The suspect confesses that he is doing to his best friend what John Nash has done to his friends. W goes on about numbers. About the Straussians' looking for patterns (esoteric messages) in text. The suspect might be accidentally correct, and affirms that many of the things he has said about the Secret Society women are true. (11) His job in this society is to be crazy, if he is found not to be crazy, people will get angry. W: this is the “functional theory”: even thieves and crooks perform functions indispensable for the functioning of a society. It all depends on the goal which a society has set for itself. Indeed, if a society is striving to become a “security state”, criminals perform the indispensable catalytic function by providing the society with justification for expanding its security apparatus. The suspect: there are some people who have no function in society other than slowing down other people's function. He is specifically referring to the Secret Society women, who waste everybody's time, foremost his own. This function is not valid unless the society has decided that it is moving too fast with its objectives – when it has set for itself the goal of wasting itself away. (12) The congruence between the suspect and ANG: both are fond of a certain image of the suspect as mentally retarded. But ANG wants him to be dangerous as well. ANG and her gang-members, if they can't exterminate him, will make a TV show out of him. Kinda cool. ANG is the only person who likes his Nicaragua video diaries. His wish for the “British Old Lady” to be involved, for she will defend him. It would appear that, after this round of conversation, Homeland Security's charge of a “conspiracy” between the Russian camp and the suspect no longer has any substance. The suspect has only realized what has happened afterwards and is not hiding his realization of it. The Russians are about to make a definitive move to exonerate themselves and the French. After the conversation, the suspect returns to work. The suspect finishes “Suffering Woman” and uploads it to his website. What he has done is further exonerating the Russians and French, for, in it, the suspect speaks about wanting to sell the idea to any party who is willing to purchase it – 147 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 be it the Russians, the European far right, or the Republicans. This is evidence that the suspect is not trying to conspire with any foreign power whatsoever to harm the US, but is simply looking for opportunities for himself. The suspect then goes home, 8:30 PM, giving up the idea of passing the night in Westwood. Meanwhile, the Secret Society's operation continues. 7:29 PM, upanishad.html. More chatter (“plagiarism”). 9:55 PM, 8.37.233.17, classificationofindia.html, Quantil, Indonesia. 8.37.233.17 - - [11/Dec/2015:22:55:38 -0700] "GET /scientificenlightenment1/classificationindia.html HTTP/1.1" 200 2885 "http://www.google.co.in/search? site=webhp&oq=classification+of+Indian+philosophy&aqs=mobile-gwslite..&q=classification+of+Indian+philosophy" "Mozilla/5.0 (Linux; U; Android 4.4.4; en-US; 2014818 Build/KTU84P) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/10.7.0.636 U3/0.8.0 Mobile Safari/534.30" Since this is obviously a proxy (“en-US”), it's from the Secret Society. Maybe the same Indian girl from 20 November. More testimony about the suspect's plagiarism. 10:08 PM, 117.244.98.124, classificationofindia.html, Varanasi, India. 117.244.98.124 - - [11/Dec/2015:23:07:59 -0700] "GET /scientificenlightenment1/classificationindia.html HTTP/1.1" 200 2885 "-" "Mozilla/5.0 (Linux; U; Android 4.4.4; en-US; 2014818 Build/KTU84P) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/10.7.0.636 U3/0.8.0 Mobile Safari/534.30" This is evidently the same person – the same Indian girl – from 9:55 PM. It would seem that she is visiting the chapter continually because she is actually on the phone with the detective (from either Pasadena or Hermosa Beach) supplying verbal testimony about the suspect's plagiarism. Then, the suspect. On bus 20 going back to downtown, the suspect is very turned on by the woman wearing stocking sitting next to him. Home, MST: the so-called “teenage model”. It's not clear whether Homeland Security's false profile of him includes “pedophile”. Then, the Secret Society's actions. 1:46 AM, netvisao.pt, Almada, Portugal, 84.90.98.210 - - [12/Dec/2015:02:46:10 -0700] "GET /drawLA/drawLA_01_15/drawanythingLA/anja.jpg HTTP/1.1" 200 466330 "https://www.google.pt" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:42.0) Gecko/20100101 Firefox/42.0" 148 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Are the Secret Society women really wanting to recruit Anja? 2:46 AM, Quantil, Pasadena, proxy, 168.235.206.86 - - [12/Dec/2015:03:46:13 -0700] "GET /scientificenlightenment1/classificationindia.html HTTP/1.1" 200 2885 "https://www.google.co.in/search?hl=en&ie=ISO-88591&q=classification+of+indian+philosophy+" "Mozilla/5.0 (Linux; U; Android 4.4.4; en-US; D2212 Build/18.5.B.0.26) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/10.5.2.582 U3/0.8.0 Mobile Safari/534.30" The same proxy. Compare it with the user-agent of the “Los Angeles Indian girl” from earlier tonight and from 20 November: "Mozilla/5.0 (Linux; U; Android 4.4.4; en-US; 2014818 Build/KTU84P) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/10.7.0.636 U3/0.8.0 Mobile Safari/534.30" It's a different phone. But this person seems to be related to her. This person is therefore most likely also supplying false testimony about the suspect's plagiarism to the detectives. It would appear that the detectives might actually be skeptical of all these testimonies from complete strangers. 12 December (Saturday) 4:41 AM, 132.199.182.129, biopower2.html, Universitaet Regensburg. More chatter about the suspect's plagiarism. The credibility of the testimony enhanced by the chatterer's status as a university student. 8:51 AM, 94.251.143.229, Ying and Yang I, from kurzwelai.net, dynamic.mm.pl, Chrzanow, Poland. 94.251.143.229 - - [12/Dec/2015:09:51:32 -0700] "GET /suppl_pld_8bg42/suppl_pld_8bg42c.pdf HTTP/1.1" 404 1360 "http://www.kurzweilai.net/forums/topic/the-reversal-of-brain-computer-interface-in-a-usmilitary-project-darpa" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" 149 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 It would appear that more “volunteers” have pretended to track down the “crazy poster” online. He has left traces everywhere complaining about the electronic chips implanted inside his brain. This testimony about the suspect's insanity is “golden evidence” which the Secret Society women are instructing the volunteer to pass onto the detectives and which Homeland Security has intercepted into the ICJ to support their case. 12:01 PM, athd2.jpg, from sacrifice.html. 199.30.25.230 - - [12/Dec/2015:13:01:52 -0700] "GET /scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12063 "http://lawrencechin2011.com/scientificenlightenment1/sacrifice.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534+ (KHTML, like Gecko) BingPreview/1.0b" Meanwhile, the suspect leaves home, 10:50 AM. He comes to the storage facility. Somewhat upset because there is no longer Wi-fi in the food mall. Desperate to make changes in “Suffering Woman” in order to avoid misunderstanding. Storage, put in DVD 498. Counted discs. He comes back to food mall. He runs into Angela. He greets her happily, unaware that Angela has been recruited by Homeland Security as an informant against him and has believed wholeheartedly the lies that he suffers paranoia schizophrenia and that the group of women has never gone after him using law enforcement. Then, suddenly, W calls the suspect wanting to borrow money from him. The suspect immediately suspects this to be a Homeland Security operation, and is half-correct: because evidences have been found last night that the suspect’s has no intention to conspire with the Russians and the French, the Russians have, in front of the ICJ judges, called into question the evidence which Homeland Security has submitted on 26 November to prove that the suspect 150 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 has received payment from the Russians. Homeland Security, you recall, used “protecting women victims' confidentiality” as a pretext under which to censor out the names and other vital information from the intercept of the transaction and then intentionally misinterpreted NCFM's bank account as the suspect's. The Russians point this out to the judges, and request that the Court authorize a test to verify it. The judges thus authorize this operation, and both the Russians and Homeland Security have instructed W to ask the suspect to transfer money to him in order to ascertain the suspect's banking information in the intercept of the transaction. (Somehow the Russians are not allowed to simply check with the suspect's bank directly.) Homeland Security knows that they are in troubles. 1:03 PM, 176.219.152.66, bad visit, from Blue Host forum, Vodafone, Turkey. 176.219.152.66 - - [12/Dec/2015:14:03:39 -0700] "GET /badvisits/5712-43.png HTTP/1.1" 200 108985 "http://www.bluehostforum.com/showthread.php?32041-strange-visits-are-they-stealingcontent-of-my-site" "Dalvik/1.4.0 (Linux; U; Android 2.3.6; GT-S5830i Build/GINGERBREAD)" Again, another volunteer is looking at the “crazy guy’s” past postings at Blue Host Forums and reporting to the detectives that “he was talking about hacking websites”. The German Lady must have taught the volunteer that, when the suspect was talking about his website's being hacked, the volunteer should be vague and just report “He is talking about hacking websites”, so that the detectives would mistakenly believe that the suspect was talking about hacking other people's websites rather than about being hacked himself. Again, how to make false reports to law enforcement (to use the “system” to assassinate the target) and then completely get away with it. 3:43 PM, 189.5.57.233, virtua.com.br, Sorocaba, Brazil. 189.5.57.233 - - [12/Dec/2015:16:43:30 -0700] "GET / HTTP/1.1" 200 2878 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3" Another “volunteer” is here supplying testimonies to the detectives (how the suspect suffers bizarre delusion about the women going after him and spills out his delusion online to threaten them and slander them). 4:09 PM, 24.7.39.129, Comcast, Redwood City, CA. 24.7.39.129 - - [12/Dec/2015:17:09:37 -0700] "GET /scientificenlightenment1/capra7777.html HTTP/1.1" 200 21637 "-" "Mozilla/5.0 (iPad; CPU OS 9_0 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13A344 Safari/601.1" This person is not too far away. He will come repeatedly performing the same visits; hence he is a “decoy”: the “Redwood City decoy”. 151 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Meanwhile, the suspect is at Casbah. He has made the necessary changes to “Suffering Woman” in order to avoid misunderstanding. (Eliminating a “secret message” for European audience.) 4:43 PM, the suspect calls W back (from 5:37:00 onward). The suspect is already suspecting that this is a Homeland Security trick. W wants the suspect’s bank account number. The suspect then confesses his hypothesis about the enforcement of the (previous) ICJ judgment: that it would be the DGSE chief who is going to provide the US with a chance to influence FN, but that the suspect will have a different explanation (that the DGSE chief has only done so because he was forced to and was chipped). W: a certain crazy person who has really good anti-government ideas. The suspect confesses that he likes to look crazy while producing world-saving ideas, but that looking crazy is dangerous. About “Jean-Paul Sartre”: because he was so famous, the French authority couldn't do anything to him when he caused problems during the Algerian War; and yet in the end he does more good to France than harm. Snowden is in a similar league. The is more evidence for the suspect’s true motivation for posting “American response”: fear. Is Snowden a traitor? How to get rid of somebody: call him “crazy” as a way to make oneself feel good about oneself, as if one were the “protector”. W is describing the Secret Society women. About harming under the disguise of helping. Soon two Homeland Security looking guys came in sitting next to the suspect. Homeland Security needs more instances where the suspect mistakes ugly people for being Homeland Security surveillance agents in order to obtain more evidences confirming that the current false profile of the suspect as suffering paranoia schizophrenia is correct. 6:08 PM, 173.252.90.104 - - [12/Dec/2015:19:08:51 -0700] "GET /scientificenlightenment1/cosmicdance1.jpg HTTP/1.1" 206 9302 "http://alfaimg.com/show/antiprotons-diagram.html" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" 173.252.90.109 - - [12/Dec/2015:19:08:51 -0700] "GET /scientificenlightenment1/cosmicdance2.jpg HTTP/1.1" 206 9302 "http://alfaimg.com/show/antiprotons-diagram.html" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" The last time we saw this is 27 November. This usually means that the Secret Society is accessing the 27 November portion of the Secret Facebook Group. 152 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 6:10 PM, the suspect emails W his checking account number.6 This is the first piece of evidence to enter the ICJ confirming that 26 November evidence showing the suspect receiving payment from the Russians is faulty. 6:42 PM, the suspect posts on AVFM. (“All his postings are going viral”.)7 The suspect leaves Casbah, 8:30 PM. Ren gives the suspect a can of drink. It's not clear whether Ren has also been instructed by Homeland Security to be especially nice to the suspect in order to deceive the ICJ judges. 8:38 PM, Beour3rd posts a reply on AVFM. (“Move”.) Both Homeland Security and the Secret Society women are desperate for the suspect to become a fugitive. 10:13 PM, 70.211.10.207, myvzw.com, Murrieta, California. 70.211.10.207 - - [12/Dec/2015:23:13:48 -0700] "GET /sci/sci.pdf HTTP/1.1" 200 480167 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 8_0 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) GSA/11.0.65374 Mobile/12A365 Safari/600.1.4" 6 The suspect's email contains a long note: “W, another thing: My log clearly indicates that my old postings on Internet forums are going viral all suddenly lately. It’s unavoidable to conclude that a whole group of people from around the world are suddenly noticing that there is this guy who is completely insane posting everywhere saying a group of women are going after him, and are helping the women track down all his other crazy posts everywhere on the Internet. They have discovered, chiefly, that this guy is so insane that he believes there is a chip implanted in his brain. Presumably, the goal of the operation is to put me in the mental hospital, so that our KRN, the leader of the women, can come out and say to me: 'Lawrence, you have so much talent, but you suffer incurable schizophrenic paranoia, believing that we are going after you. Let us help you, please!' But I just don’t see how all this discovery that I’m insane can possibly lead to forced hospitalization, even though this is clearly what the group of women wants. Should I worry? Or are they just trying to discredit me to as many people as possible? Maybe getting Homeland Security to broadcast an alert about me warning everybody that I’m insane? Don’t show this email to anybody, okay?” 7 The suspect's post in entirety: “I’m getting worried. My log clearly indicates that my old postings on Internet forums are going viral all suddenly lately. It’s unavoidable to conclude that more and more people from around the world are suddenly noticing that there is this guy who is completely insane posting everywhere saying a group of women are going after him, and are helping the women track down all his other crazy posts everywhere on the Internet. A huge rumor has probably started online around the group of women about how insane this guy is. Presumably, the goal of the operation is to put me in the mental hospital eventually, but I just don’t see how all this discovery that I’m insane can possibly lead to forced hospitalization, even though this is clearly what the group of women would like to happen. Should I worry? Or are they just trying to discredit me to as many people as possible? Maybe getting some government agency to broadcast an alert about me warning everybody that I’m insane?” 153 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Another volunteer – quite nearby – has been instructed by the Secret Society women to offer false testimony to the detectives saying the suspect is engaged in misogynist ranting against American white women on his website. 10:53 PM, it’s the “Princeton decoy” again. 128.112.155.171 - - [12/Dec/2015:23:53:00 -0700] "GET /scientificenlightenment1/afroasiaticmap.jpg HTTP/1.1" 200 49245 "http://www.lawrencechin2011.com/scientificenlightenment1/humandispersal.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36" 11:04 PM, humandispersal.html, Google MY. More chatter, or testimony for the detectives (“plagiarism”). 11:15 PM, christiandogmatics02e.html, Hong Kong. This is sign that the Secret Society women have submitted the “David Chin” document to the detectives. The suspect's translation of Christian Dogmatics is always used by the Secret Society women as proof that the “David Chin” document originates with the suspect. 12:06 PM, while at home, the suspect posts a rely on AVFM: If I’m paranoid, then I have nothing to worry about, then I don’t have to move. If I should move, then I have something to worry about, then I’m not paranoid. So there is a contradiction here, it seems. But I have already said it, I have no money to move away. Everything costs money. This posting by the suspect will be used by the TMU/ CIA to counter Homeland Security in the ICJ: the suspect only looks insane. His paranoia displays a rational structure which means that the evidences for his paranoia schizophrenia are really proofs of his wrong inferences. But, on 12:57 AM, Beour3rd replies to the suspect: “No contradiction. Move!” 1:44 AM, dynamic.ziggo.nl, Wijk bij Duurstede, Netherlands, 83.83.219.150 - - [13/Dec/2015:02:44:36 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 491814 "https://www.google.nl/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" Another volunteer's testimony (how the suspect has copied other people's painting). Then, on 1:48 AM, hsd1.co.comcast.net, Littleton, Colorado, 154 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 67.177.251.224 - - [13/Dec/2015:02:48:34 -0700] "GET /gallery/bensongoddesscloseup.jpg HTTP/1.1" 200 344816 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" Another testimony for the detectives that the suspect has put other people's paintings on his website without regard for their intellectual property rights. Then, 2:58 AM, another volunteer has joined in on the hunt: cable.rogers.com, Ottawa, Canada, 174.115.254.240 - - [13/Dec/2015:03:58:22 -0700] "GET /scientlitfr.html HTTP/1.1" 200 10747 "http://www.google.ca/search?q=scientific+enlightenment+by+lawrence+chan&hl=enCA&biw=&bih=&gbv=2&oq=scientific+enlightenment+by+lawrence+chan&gs_l=heirloomserp.3...414568.426707.0.427122.41.22.0.19.5.0.158.2306.10j12.22.0....0...1ac.1.34.heirloomserp..15.26.2239.m3kjl1VgvXs" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10" 1 minute later, she clicks on the first chapter: 174.115.254.240 - - [13/Dec/2015:03:59:09 -0700] "GET /scientificenlightenment1/synopsis.html HTTP/1.1" 200 28181 "http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10" 6 minutes later, she re-searches for the suspect's theory, this time getting the suspect's name correctly: 174.115.254.240 - - [13/Dec/2015:04:05:26 -0700] "GET /thermex2.html HTTP/1.1" 200 568 "http://www.google.ca/search? client=safari&rls=en&q=Lawrence+Chin+Scietific+enlightenment&ie=UTF-8&oe=UTF8&gfe_rd=cr&ei=8lBtVvzYGsuC8QfJsZnYDw" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10" Is this a decoy or more testimony for the detectives that the suspect is a plagiarizer? Then, 3:33 AM, Banaras Hindu University Medical Sciences, Varanasi, India, 14.139.225.180 - - [13/Dec/2015:04:33:05 -0700] "GET /scientificenlightenment1/classificationindia.html HTTP/1.0" 200 2847 "https://www.google.co.in/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.155 Safari/537.36" Given the strange location, this is certainly related to the Secret Society. More testimony that the suspect is a plagiarizer. 155 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 13 December (Sunday; W) 4:32 AM, greekreligion.html. More chatter or testimony (plagiarism). 7:54 AM, W emails the suspect his routing number and account number. He also asks for the suspect's routing number. W is evidently instructed by Homeland Security and the Russians to do this, for the ICJ is trying to verify whether the 26 November intercept is correct. Now in his email W says something quite interesting: In addition, I do not think people around the world really care about your metal health. To them KRN looks a bit paranoid, and perhaps crazy. A paranoid schizophrenic (KRN) can be paranoid about another being a schizophrenic. Is W giving hints about the current condition reigning in the Secret Society’s online group? That many volunteers, as TMU's moles inside the Secret Society, were able to see the true side of the Secret Society women while pretending to go along with the operation? W continues: As far as how your site has gone viral, there is much research on contagion. Most argue that there are few but powerful carriers that once a disease, idea, belief, lie, crosses their path, they spread it rapidly. Airplane pilots, journalists, professors at prestigious universities, and popular websites are all powerful carriers. Marketing experts, political consultants, propagandists, and the CDC are all interested in contagion. One explanation to why your site went viral is simply it passed the path of a powerful carrier, perhaps there is a link to your site. Is W giving out hint that the suspect’s writings are now being considered by many bureaucrats in the US, Europe, and Russia because of Homeland Security’s stunt and the current ICJ trial? More likely, however, it is just somebody in the Secret Society, like Dr P or SDW, who has instructed W to try to deceive the suspect into the impression that the sudden increase of visits to his website since late 2013 is not due to the Secret Society's operations but to somebody (a contagion) who has “discovered” the suspect. I read a lot of papers and these days students do 99% of their research on Google. I have noticed that the exact bad ideas show up in their papers from the same sites time and time again and from year to year. Often these sites are high school senior projects that are completely wrong. The teachers probably do not know basic Pol Sci 101 to detect the mistakes (or maybe they do). Is W giving out another hint that the debate in ICJ is fueled by the fact that the Russians have developed similar ideas to the suspect’s? Perhaps you should add to your site a more accessible summary of your ideas. Like many philosophers, sometimes you have unconventional definitions of terms which are important to the understanding of your arguments. David Hume wrote 156 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 his magnum opus only to have it rejected by most. He rewrote it, and it was well received. Now scholars look at his first version and understand it in light of the second version. John Rawls did the same; Justice as Fairness is an accessible version of A Theory of Justice. Honestly, most academics do not understand A Theory of Justice, they think and teach the veil of ignorance which is not his argument, but a simple illustration. Is W giving out hint that the Invisible Hand has finally persuaded the Republicans to make use of the “Kiersten Affair”, all because of the “Suffering Woman” document which the suspect has uploaded on Friday night? No. It's more likely that W is trying to hint at something else, i.e., that the most valuable idea which the Invisible Hand has found in the suspect's work – the one idea which can save the world – is “victimology”, insofar as the suspect means by the term “sacralization of the victim” whereas the term is normally used to refer to a particular academic discipline devoted to the study of the impact of crimes on their victims.8 It would also seem that W is hinting that the suspect is doomed to lose to the Secret Society women during this round and will only win during the next round, i.e., it's during the next round that bystanders will be convinced of the perniciousness in the women's persistent desire to be recognized as his “victims”. Then, the Secret Society's operation continues: 9:46 AM, 87.113.18.133, dyn.plus.net, UK. 87.113.18.133 - - [13/Dec/2015:10:46:50 -0700] "GET /scientificenlightenment1/capra.html HTTP/1.1" 200 11850 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" This person seems to be related to LB Admin, but it’s a Windows NT 6.3. It appears that he wants to use a proxy to carry out the Secret Society's operation (to offer more false testimonies to the detective that the suspect has plagiarized) and that LB Admin refers him to the proxy she has always been using. Meanwhile, the suspect, leaving home on 9:30 AM, is at St Sophia from 11 AM onward. He meets up with Stephanie, Angela, and Johanna. Chatted randomly with Angela and Johanna. After church, Angela drops off the suspect, Normandie and Wilshire. Checked news. The suspect is stunned by the complete loss of FN in regional election. Mood dampened, for it means probably that the ICJ trial will continue for a long time to come while everything will seem as if nothing had never happened. (The black hole of ignorance.) Panicked. 1:12 PM, 221.145.183.157, /, Korean scout? (It’s usually 167). 8 See John P. J. Dussich's “Victimology: Past, Present, and Future”, at: http://www.unafei.or.jp/english/pdf/RS_No70/No70_12VE_Dussich.pdf. 157 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 The suspect comes to Westwood. 4:43 PM, the suspect talks to W while in Starbucks, Westwood (from 5:24:00). Here are the details of the conversation. (1) Why did W need the routing number? Apparently, without the routing number, Homeland Security and the Russians cannot decide in the ICJ whether the 26 November evidence showing the suspect receiving money from the Russians was flawed. (2) Then, that FN has lost. Who has played this trick? (3) The suspect is correct again: the French/ Russians and Homeland Security have gone to court to argue whether Homeland Security's profile of him as “crazy” is correct. This is further evidence that the suspect has not conspired with the Russians: Homeland Security must be very desperate. (4) The suspect asks: Has he been in a TV show? Everybody is much nicer to him lately. He wouldn't have guessed that it isn't NULND, but Homeland Security who might have instructed everybody to be extra kind to the suspect. (5) Is Donald Trump trying to influence the French election with his offensive statements? (6) The most probable US response: simply to strengthen the opposition. The loss of FN is a “crime” in order for them to win the 2017 election through an ICJ judgment. (7) The suspect is worried about his writing when it comes to the ICJ trial. Once again, while the suspect is talking about the previous ICJ trial, another current ICJ trial is going on. Anybody new to this current trial will be utterly confused. (8) About NULND. Could she have made the suspect or SDW into a TV show to broadcast in France to influence the election? Complete nonsense. (9) The suspect concludes that NULND is not going to harm him. (10) The suspect requests that, if he be made a bad example, it has to be totally bad. (11) What about his writing about the ICJ trial? The German Lady has found somebody in Germany (the “Berlin plagiarizer”) to copy his work several times already. W: not to worry about it. (12) Russia is going to get rid of the part of the previous ICJ trial where it shares the victim status with the United States. People don’t want to get along. This is incorrect. The CIA, as it seems, will remain co-victim with the Russians in the previous ICJ trial. (13) Finally, the suspect and W have a discussion about why certain US bureaucrats can never live without going after Russia. W: “They have made a career out of there being always an evil enemy to the US.” It should be noted that this is all very bad evidence for Homeland Security. Since the suspect's attitude toward NULND is positive, it would seem that he has written “American response” to please her, which is thus evidence that he doesn't intend to conspire with Russia or FN. 6:10 PM, the suspect emails W his routing number. 6:37 PM, schuld.html. More chatter/ testimony (plagiarism). 8:07 PM, 93.229.246.87, orphism.html from Facebook, Iserlohn, Germany. More chatter/ testimony (plagiarism). Meanwhile, the suspect works in Starbucks until 8:30 PM. Went home in sadness. A Brazilian girl talks to him in Vermont station. 12:45 AM, the suspect gets nervous again and writes this email to W: 158 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 W, there are two possibilities: (1) it’s possible that there is an operation behind your borrowing money from me. It could be this: the women have already talked to the DA, or are going to talk to the DA, so that something is going to happen to me if I transfer the money to you on Monday. Maybe the DA has already agreed that my online postings have constituted violation of my bonds. If I transfer the money to you tomorrow, then I might be arrested and sent to jail by Tuesday. Then, the group of women will provide my bank account and routing number to the DA so that Social Security can be notified that I have been arrested and stop depositing money into my account. In this way, since there is zero dollar left in my bank account, my storage unit’s rent will not be paid by New Year, so that all my stuff will be gone by March. Then, by the time I finish mental evaluation in jail and come to court, I will have no more things left. All the reconstructions and logs will be gone too. This does seem like an operation which the women would want, helped by Homeland Security. (2) I’m just being paranoid, as required. Lately there seems to be a requirement that I be paranoid every night before sleep about being arrested, etc. It appears that I’m just required to produce evidences showing me to be extremely paranoid and crazy. And so there is probably no trick in your needing to borrow money from me. I’m just required to be paranoid and afraid that a group of women are going after me when they are not, in order to confirm their claim that I suffer schizophrenic paranoia believing that they are going after me when they are not. The evidence can then be used in some court battle between Homeland Security and foreign governments or broadcast to people to discredit me (especially in regard to my claim about their filing false reports about me last year). But, since (1) is possible, I shouldn’t have provided you with my bank account number, etc., and I’m not sure about clearing up my bank account to give you the money until I can get assurance that (1) is absolutely not going to happen. Can you think of a way to assure me of that? In fact, unless I can get such assurance, I shouldn’t even be talking to you, since there is always the possibility that you are required to help the women to go after me. 1:09 AM, live.vodafone.in, West Bengal, 112.79.38.184 - - [14/Dec/2015:02:09:10 -0700] "GET /scientificenlightenment1/classificationindia.html HTTP/1.1" 200 2885 "https://www.google.co.in/" "Mozilla/5.0 (Linux; Android 4.4.4; SM-A500G Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.93 Mobile Safari/537.36" You have seen continual visits to this (incomplete) chapter from the Secret Society. The easiest chapter to target, since it is incomplete. More testimony for the detectives that the suspect is a plagiarizer. 159 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 There are only visits to images for the rest of the night. 14 December (Monday; the “Berlin plagiarizer”) 5:35 AM, classificationofindia.html. The same chapter again. More chatter/ testimony (plagiarism). 7:29 AM, 80.239.194.50, Cambridge, UK. 80.239.194.50 - - [14/Dec/2015:08:29:17 -0700] "GET /scientificenlightenment1/quantummechanics.htm HTTP/1.1" 200 28558 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" What's this visit about? There are now three possibilities. (1) A volunteer to bear false witness that the suspect has plagiarized or is just repeating things he has read from books; (2) a decoy; and (3) the TMU having found another university professor to assess whether the suspect has really plagiarized. 7:56 AM, 129.97.246.240, University of Waterloo, Ontario. 129.97.246.240 - - [14/Dec/2015:08:56:46 -0700] "GET /scientificenlightenment1/whyshouldwebejust.html HTTP/1.1" 200 68711 "https://www.google.ca/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" The same three possibilities for this visit too. 8:04 AM, 173.79.173.230, washdc.fios.verizon.net, Sterling, Virginia. 173.79.173.203 - - [14/Dec/2015:09:04:27 -0700] "GET /blogs/2014/04/14/last-word-on-mypast-two-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1" Another volunteer has got wind of the situation and comes to join in on the rumoring. More damaging testimonies to supply to the detectives. (“He's crazy. He says these women are going after him.”) 8:36 AM, 50.204.57.98, comcastbusiness.net, Oak Park, Illinois. 160 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 50.204.57.98 - - [14/Dec/2015:09:36:23 -0700] "GET /scientificenlightenment1/quantummechanics.htm HTTP/1.1" 200 28558 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" If the visit from an hour ago is indeed requested by the TMU/ CIA, then this visit would be Homeland Security's response to the earlier positive review (the suspect didn't plagiarize), i.e. that the suspect has indeed plagiarized (or does nothing more than summarize what he has read). 9:25 AM, 87.205.236.135, ancestorcult.html, adsl.inetia.pl, Warsaw, Poland. Another volunteer (plagiarism). 12:01 PM, junk call – it seems to be from the Social Security Administration on Vermont and Catalina. Did Homeland Security instruct somebody in that SSA branch to call the suspect for no reason whatsoever, only in order that they might have a chance to scramble up the interception to end up with another piece of evidence seemingly showing the Russians trying to contact the suspect? Meanwhile, the suspect. He has left home 11:30 AM. (On the bus: a guy who looks like a DHS agent is reading the Bible.) He comes to Bail Hotline first. Then he is at the Wells Fargo bank, Vermont/ Wilshire. He is now ready to proceed with the transfer of money. 1:25 PM, he first emails W saying he retracts his worries from last night. 1:30 PM, W replies. The suspect is then walking to the nearest Bank of America. 2:10 PM, the suspect leaves a message with W: the transfer of funds completed at Bank of America. The intercept of the transaction is immediately examined in the ICJ: it proves that the 26 November evidence is faulty: the account which has received a large sum of money belongs to NCFM, not to the suspect. 2:25 PM, W calls to thank the suspect. Note that the suspect has however come up with a wrong, but not entirely wrong, theory: “Homeland Security is trying to produce evidence showing me conspiring with the Russians by receiving money from them. This, because, while Homeland Security is trying to prove that I'm insane, Russians have evidences proving otherwise. Homeland Security is trying to suppress Russians' evidences on ground of conspiracy.” 2:29 PM, 81.7.230.119, orphism.html, Google, static.cablecom.ch, Switzerland. More chatter/ testimony (plagiarism). 3:57 PM, 66.191.86.141, Zhuangzi.html, wi.charter.com, Eau Claire, Wisconsin. 161 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 66.191.86.141 - - [14/Dec/2015:16:57:12 -0700] "GET /scientificenlightenment1/zhuanzi.html HTTP/1.1" 200 20514 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" Note the persons from Eau Claire on 11 October (3:57 PM) and on 21 June 2014 (7:48 PM). This person is probably related to the previous two persons. More chatter (plagiarism). 7:39 PM, 64.7.147.163, capra.html, Cambridge, Ontario. More chatter (plagiarism). Meanwhile, after being done with the money business, the suspect comes back to Starbucks, Vermont. Called the strange number. No answer. Then, Chrysalis, around 5 PM. Dinner. Fell asleep in Men’s group. Then, 7 PM, going to Starbucks, Westwood. Even though he doesn’t quite believe that he would be arrested, for safety’s sake… Fewer visits from 8:40 PM until 12:40 AM. Only images. 2 or 3 visits to dividedline.jpg. 1:50 AM, Birdie Smoot posts a reply to SDW’s 18/11/15 post. As for the suspect, he continues to work on “Far right”, and then uploads it to his Gmail account for backup. 2 AM, he goes to sleep in Westwood Village. 2:18 AM, NTE Bredband, Norway, Levanger, Norway, 217.168.83.42 - - [15/Dec/2015:03:18:58 -0700] "GET /blogs/wpcontent/uploads/2013/09/91313-58.png HTTP/1.1" 200 225418 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36" Another volunteer: “This guy has got all these hacking materials on his website.” More testimony for the detectives and more evidence in the ICJ to support Homeland Security's case. 2:19 AM, EHIHosting, San Jose, CA. This is proxy, 50.118.197.65 - - [15/Dec/2015:03:19:14 -0700] "GET /scientificenlightenment1/schuld.html HTTP/1.1" 200 25662 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" 50.118.197.65 - - [15/Dec/2015:03:19:15 -0700] "GET /scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12082 "http://www.lawrencechin2011.com/scientificenlightenment1/schuld.html" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" 50.118.197.65 - - [15/Dec/2015:03:19:17 -0700] "GET /favicon.ico HTTP/1.1" 200 408 "http://www.lawrencechin2011.com/scientificenlightenment1/schuld.html" "Mozilla/5.0 162 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" Another testimony (plagiarism). 3:07 AM, the most important feat, it's the “Berlin plagiarizer”, his third time here: pd9f74be9.dip0.t-ipconnect.de, Berlin, 217.247.75.233 - - [15/Dec/2015:04:07:50 -0700] "GET /thermh1.html HTTP/1.1" 200 24055 "https://www.google.de" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:07:51 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:08 AM, he looks at the first chapter, 217.247.75.233 - - [15/Dec/2015:04:08:24 -0700] "GET /1/thermhch1.html HTTP/1.1" 200 20693 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:08:25 -0700] "GET /1/athd2.jpg HTTP/1.1" 200 12082 "http://www.lawrencechin2011.com/1/thermhch1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:09 AM, he looks at the second chapter, 217.247.75.233 - - [15/Dec/2015:04:09:32 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:09:32 -0700] "GET /1/sexdispositive.jpg HTTP/1.1" 200 31827 "http://www.lawrencechin2011.com/1/thermhch2.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:09:32 -0700] "GET /1/biopower2.jpg HTTP/1.1" 200 8906 "http://www.lawrencechin2011.com/1/thermhch2.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:10 AM, he began copying the second chapter and pasting it on his Libre Office: 217.247.75.233 - - [15/Dec/2015:04:10:23 -0700] "GET /1/sexdispositive.jpg HTTP/1.1" 200 31827 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:10:23 -0700] "PROPFIND /1/sexdispositive.jpg HTTP/1.1" 404 864 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:10:24 -0700] "GET /1/biopower2.jpg HTTP/1.1" 200 8906 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:10:24 -0700] "PROPFIND /1/biopower2.jpg HTTP/1.1" 404 859 "-" "LibreOffice" 3:10 AM, he looked at the third chapter: 163 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 217.247.75.233 - - [15/Dec/2015:04:10:37 -0700] "GET /1/thereasonofstate.htm HTTP/1.1" 200 23602 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:11 AM, he looked at the fourth chapter: 217.247.75.233 - - [15/Dec/2015:04:11:44 -0700] "GET /1/thermh10.html HTTP/1.1" 200 14761 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:12 AM, he looked at fourth chapter B: 217.247.75.233 - - [15/Dec/2015:04:12:56 -0700] "GET /1/culturalfeminism.html HTTP/1.1" 200 64653 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:13 AM, he looked at the fifth chapter: 217.247.75.233 - - [15/Dec/2015:04:13:54 -0700] "GET /thermhchapter5.html HTTP/1.1" 200 35705 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:13:54 -0700] "GET /athd2.jpg HTTP/1.1" 200 12120 "http://www.lawrencechin2011.com/thermhchapter5.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:13:54 -0700] "GET /patches.jpg HTTP/1.1" 200 143017 "http://www.lawrencechin2011.com/thermhchapter5.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:14 AM, he began copying the fifth chapter and pasting it onto his Libre Office: 217.247.75.233 - - [15/Dec/2015:04:14:41 -0700] "GET /patches.jpg HTTP/1.1" 200 143017 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:14:42 -0700] "PROPFIND /patches.jpg HTTP/1.1" 404 855 "-" "LibreOffice" 3:14 AM, he looked at the fifth chapter B: 217.247.75.233 - - [15/Dec/2015:04:14:55 -0700] "GET /1/democracy2.html HTTP/1.1" 200 6999 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:15 AM, he looked at the fifth chapter C: 164 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 217.247.75.233 - - [15/Dec/2015:04:15:39 -0700] "GET /1/originofnationstate.htm HTTP/1.1" 200 20528 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:16 AM, he began copying the fifth chapter C and pasting it onto his Libre Office: 217.247.75.233 - - [15/Dec/2015:04:16:23 -0700] "GET /1/athd2.jpg HTTP/1.1" 200 12120 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:16:23 -0700] "PROPFIND /1/athd2.jpg HTTP/1.1" 404 855 "-" "LibreOffice" 3:16 AM, he looked at the sixth chapter: 217.247.75.233 - - [15/Dec/2015:04:16:53 -0700] "GET /1/oppressionofwomen1.htm HTTP/1.1" 200 25322 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:16:54 -0700] "GET /1/higherprimateevolution.jpg HTTP/1.1" 200 68767 "http://www.lawrencechin2011.com/1/oppressionofwomen1.htm" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:16:54 -0700] "GET /1/primateevolution.jpg HTTP/1.1" 200 70071 "http://www.lawrencechin2011.com/1/oppressionofwomen1.htm" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:16:54 -0700] "GET /1/hominoidsociality.jpg HTTP/1.1" 200 227020 "http://www.lawrencechin2011.com/1/oppressionofwomen1.htm" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:17 AM, he began copying the sixth chapter and pasting it onto his Libre Office: 217.247.75.233 - - [15/Dec/2015:04:17:24 -0700] "GET /1/higherprimateevolution.jpg HTTP/1.1" 200 68767 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:17:24 -0700] "PROPFIND /1/higherprimateevolution.jpg HTTP/1.1" 404 872 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:17:25 -0700] "GET /1/hominoidsociality.jpg HTTP/1.1" 200 227020 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:17:26 -0700] "PROPFIND /1/hominoidsociality.jpg HTTP/1.1" 404 867 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:17:26 -0700] "GET /1/primateevolution.jpg HTTP/1.1" 200 70071 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:17:27 -0700] "PROPFIND /1/primateevolution.jpg HTTP/1.1" 404 866 "-" "LibreOffice" 3:17 AM, he looked at the sixth chapter B: 165 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 217.247.75.233 - - [15/Dec/2015:04:17:42 -0700] "GET /1/oppressionofwomen20.htm HTTP/1.1" 200 39490 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:17:43 -0700] "GET /1/lunarperiodicity.gif HTTP/1.1" 200 4699 "http://www.lawrencechin2011.com/1/oppressionofwomen20.htm" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:17:43 -0700] "GET /1/pottery.jpg HTTP/1.1" 200 60375 "http://www.lawrencechin2011.com/1/oppressionofwomen20.htm" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:18:27 -0700] "GET /1/lunarperiodicity.gif HTTP/1.1" 200 4699 "-" "LibreOffice" 3:18 AM, he began copying the sixth chapter B and pasting it onto his Libre Office: 217.247.75.233 - - [15/Dec/2015:04:18:27 -0700] "PROPFIND /1/lunarperiodicity.gif HTTP/1.1" 404 866 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:18:28 -0700] "GET /1/pottery.jpg HTTP/1.1" 200 60375 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:18:29 -0700] "PROPFIND /1/pottery.jpg HTTP/1.1" 404 857 "-" "LibreOffice" 3:19 AM, he looked at chapter 9: 217.247.75.233 - - [15/Dec/2015:04:19:05 -0700] "GET /1/originofmonogamy.pdf HTTP/1.1" 200 1596781 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:19 AM, he looked at chapter 10: 217.247.75.233 - - [15/Dec/2015:04:19:40 -0700] "GET /1/thermhch6d.html HTTP/1.1" 200 19021 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:20 AM, he looked at chapter 10 B: 217.247.75.233 - - [15/Dec/2015:04:20:40 -0700] "GET /1/thermhch6d222.html HTTP/1.1" 200 29197 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/trnaribozyme.jpg HTTP/1.1" 200 30172 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/oilpatch.jpg HTTP/1.1" 200 29169 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 166 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/obcell1.jpg HTTP/1.1" 200 38319 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/chemoton.jpg HTTP/1.1" 200 86500 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/abstriction2.jpg HTTP/1.1" 200 71943 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/obcell2.jpg HTTP/1.1" 200 88291 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/treeoflife1.jpg HTTP/1.1" 200 286406 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:20:41 -0700] "GET /1/treeoflife2.jpg HTTP/1.1" 200 337490 "http://www.lawrencechin2011.com/1/thermhch6d222.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:21 AM, he began copying chapter 10 B and pasting it onto his Libre Office: 217.247.75.233 - - [15/Dec/2015:04:21:18 -0700] "GET /1/trnaribozyme.jpg HTTP/1.1" 200 30172 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:19 -0700] "PROPFIND /1/trnaribozyme.jpg HTTP/1.1" 404 862 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:19 -0700] "GET /1/oilpatch.jpg HTTP/1.1" 200 29169 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:20 -0700] "PROPFIND /1/oilpatch.jpg HTTP/1.1" 404 858 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:20 -0700] "GET /1/chemoton.jpg HTTP/1.1" 200 86500 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:21 -0700] "PROPFIND /1/chemoton.jpg HTTP/1.1" 404 858 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:22 -0700] "GET /1/abstriction2.jpg HTTP/1.1" 200 71943 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:23 -0700] "PROPFIND /1/abstriction2.jpg HTTP/1.1" 404 862 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:24 -0700] "GET /1/obcell1.jpg HTTP/1.1" 200 38319 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:25 -0700] "PROPFIND /1/obcell1.jpg HTTP/1.1" 404 857 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:26 -0700] "GET /1/obcell2.jpg HTTP/1.1" 200 88329 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:27 -0700] "PROPFIND /1/obcell2.jpg HTTP/1.1" 404 857 "-" "LibreOffice" 167 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 217.247.75.233 - - [15/Dec/2015:04:21:27 -0700] "GET /1/treeoflife1.jpg HTTP/1.1" 200 286406 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:30 -0700] "PROPFIND /1/treeoflife1.jpg HTTP/1.1" 404 861 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:31 -0700] "GET /1/treeoflife2.jpg HTTP/1.1" 200 337490 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:21:33 -0700] "PROPFIND /1/treeoflife2.jpg HTTP/1.1" 404 861 "-" "LibreOffice" 3:22 AM, he looked at Epilogue 1: 217.247.75.233 - - [15/Dec/2015:04:22:52 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200 27754 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:22:53 -0700] "GET /1/secularization.jpg HTTP/1.1" 200 87535 "http://www.lawrencechin2011.com/1/amcivilreligion.htm" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:23 AM, he began copying Epilogue 1 and pasting it onto his Libre Office: 217.247.75.233 - - [15/Dec/2015:04:23:21 -0700] "GET /1/secularization.jpg HTTP/1.1" 200 87535 "-" "LibreOffice" 217.247.75.233 - - [15/Dec/2015:04:23:22 -0700] "PROPFIND /1/secularization.jpg HTTP/1.1" 404 864 "-" "LibreOffice" 3:23 AM, he looked at chapter 12: 217.247.75.233 - - [15/Dec/2015:04:23:44 -0700] "GET /1/epilogue330.html HTTP/1.1" 200 25916 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:24 AM, he looked at Epilogue 1 B: 217.247.75.233 - - [15/Dec/2015:04:24:37 -0700] "GET /1/consumerization.htm HTTP/1.1" 200 44671 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:26 AM, he looked at Introductory Summary B: 217.247.75.233 - - [15/Dec/2015:04:26:57 -0700] "GET /thermh2.html HTTP/1.1" 200 45320 "http://www.lawrencechin2011.com/thermh1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:27:50 -0700] "GET /scientlitfr.html HTTP/1.1" 200 10747 "http://www.lawrencechin2011.com/thermh2.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 168 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 At the same time, somebody else has come: 3:34 AM, Brandeis University, Waltham, Massachusetts, 129.64.151.154 - - [15/Dec/2015:04:34:28 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 129.64.151.154 - - [15/Dec/2015:04:34:28 -0700] "GET /1/athd2.jpg HTTP/1.1" 200 12120 "http://www.lawrencechin2011.com/1/thermhch2.html" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 129.64.151.154 - - [15/Dec/2015:04:34:28 -0700] "GET /1/biopower2.jpg HTTP/1.1" 200 8906 "http://www.lawrencechin2011.com/1/thermhch2.html" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 129.64.151.154 - - [15/Dec/2015:04:34:28 -0700] "GET /1/sexdispositive.jpg HTTP/1.1" 200 31827 "http://www.lawrencechin2011.com/1/thermhch2.html" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 129.64.151.154 - - [15/Dec/2015:04:34:29 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" Since it's 6:34 AM in the morning over there, it's presumably a student in the dormitory. Either a decoy or another testimony for the detective (plagiarism). 3:45 AM, the Berlin guy looked at the first chapter of “Genealogy of Testamental Religions”: 217.247.75.233 - - [15/Dec/2015:04:45:20 -0700] "GET /scientificenlightenment1/geneaology222.htm HTTP/1.1" 200 20187 "http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:45:21 -0700] "GET /scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12120 "http://www.lawrencechin2011.com/scientificenlightenment1/geneaology222.htm" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:46 AM, he looked at chapter 4 of “Testamental Religions”: 217.247.75.233 - - [15/Dec/2015:04:46:10 -0700] "GET /scientificenlightenment1/schuld.html HTTP/1.1" 200 25700 "http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" At the same time, he looked at chapter 5 of “Testamental Religions”: 217.247.75.233 - - [15/Dec/2015:04:46:49 -0700] "GET /scientificenlightenment1/christianity.htm HTTP/1.1" 200 29139 "http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 169 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 3:47 AM, he looked at the first chapter of “Philosophical Enlightenment in Ancient India”: 217.247.75.233 - - [15/Dec/2015:04:47:50 -0700] "GET /scientificenlightenment1/classificationindia.html HTTP/1.1" 200 2885 "http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:50 AM, he looked at the second chapter of “Ancient India”: 217.247.75.233 - - [15/Dec/2015:04:50:30 -0700] "GET /scientificenlightenment1/earlyindia.html HTTP/1.1" 200 33678 "http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:51 AM, he looked at the third chapter of “Ancient India”: 217.247.75.233 - - [15/Dec/2015:04:51:13 -0700] "GET /scientificenlightenment1/upanishad.html HTTP/1.1" 200 15118 "http://www.lawrencechin2011.com/scientlitfr.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:51 AM, he looked at the fourth chapter of “Ancient India”: 217.247.75.233 - - [15/Dec/2015:04:51:59 -0700] "GET /scientificenlightenment1/buddha1.html HTTP/1.1" 200 7211 "http://www.lawrencechin2011.com/scientificenlightenment1/upanishad.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 3:53 AM, he returned to the Table of Contents: 217.247.75.233 - - [15/Dec/2015:04:53:08 -0700] "GET /thermex2.html HTTP/1.1" 200 568 "http://www.lawrencechin2011.com/scientificenlightenment1/buddha1.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" 217.247.75.233 - - [15/Dec/2015:04:53:09 -0700] "GET /thermfr2.html HTTP/1.1" 200 907 "http://www.lawrencechin2011.com/thermex2.html" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0" The “Berlin plagiarizer” is on the suspect's website for about 50 minutes. He is here to copy the entire “A Thermodynamic Interpretation of History” except the following chapters: (0) Summary B. (1) The Material Meaning of History. (3) The Truth of Nation-State. (4A) The Liberation of Women. (4B) The Problem of Cultural Feminism. (5A) The Origin of Democracy of Totalitarianism (A). (5B) The Origin of Totalitarianism (B). (7A) The Elementary Structures of Kinship (A). (7B) The Elementary Structures of Kinship (B). (B); (8A) The Origin of Classical Patriarchy (A). (8B) The Origin of Classical Patriarchy (B). (8C) The Origin of Classical 170 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Patriarchy (C). (9.2 A) The Progressive Bildung (A). (10.2 A) Foucault and Feminism. (10.2 C) The Origin of Good and Evil in the Human Experience of Thermodynamics. (11A) A Genealogy of Feminism (A). (11B) The Origin of Liberal Feminism in the Differentiation of Subjectivity. (11C) Cultural Feminism's Transition to Victim Feminism. (11D) On Mary Daly. (12) The Problem of Feminist “Liberation”. (13) The Feminist Ethic and the Spirit of Consumerism in the Case of Betty Friedan. It seems to be EKT who has instructed the Secret Society women to ask the “Berlin plagiarizer” to copy almost the entirety of the suspect’s theory. The Berlin plagiarizer is supposed to play the old trick of deleting all the references in the suspect's chapters and then turn it in to the detectives to prove that the suspect is a plagiarizer. EKT must have told the Secret Society women that this will also be golden evidence in the ICJ to support Homeland Security's false profile of the suspect since, in the “Marine document”, the suspect has extensively quoted from his past blogs without giving references, so that, when all the references to quotations are deleted from the suspect's thermodynamic interpretation of history, it could fool the ICJ judges into the impression that the old theory without references is indeed the original form of the suspect's theory. Meanwhile, the Russians, now that they have proven to the ICJ judges' satisfaction that the 26 November evidence is erroneous, are making an additional argument to seal their victory once and for all: “We will prove that the suspect has no prior knowledge of the current ICJ trial. He has figured things out on his own, by observing actions and reactions. You just watch. EKT has persuaded the Secret Society women to instruct their Berlin guy to copy all his work again. In the afternoon, when the suspect shall check his log, he’ll discover this and realize that the women have access to his phone conversation through Homeland Security, which proves to him that EKT is involved. He’ll think like this because he’ll remember he has mentioned the ‘Berlin guy’ just on Sunday night, and the women have responded on Tuesday morning by ordering the Berlin guy to do it again, which can only mean that the women have heard his conversation on Monday afternoon.” 15 December (Tuesday) The Secret Society's operation continues. 7:19 AM, 14.139.225.180, classificationofindia.html, Yahoo, Banaras Hindu University Medical Sciences, “confirmed proxy server”, Varanasi, India. 14.139.225.180 - - [15/Dec/2015:08:19:25 -0700] "GET /scientificenlightenment1/classificationindia.html HTTP/1.0" 200 2847 "http://in.search.yahoo.com/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.155 Safari/537.36" This guy was just here on 3:33 AM, 13 December. 7:26 AM, he comes again, using Google IN instead. 14.139.225.180 - - [15/Dec/2015:08:26:05 -0700] "GET /scientificenlightenment1/classificationindia.html HTTP/1.0" 200 2847 171 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 "https://www.google.co.in/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.155 1273Safari/537.36" Repeated visits to the same chapter usually means “decoy”. However, we still suspect that he is offering repeated testimonies to the detectives because the latter, with TMU detectives by their side to “tutor” them, are getting skeptical of the volunteers' testimonies. (Although the TMU detectives couldn't reveal the truth, they could train the Pasadena or Hermosa beach detective to look for inconsistencies in the testimonies.) Meanwhile, the suspect wakes up in Westwood Village, 6 AM. Too cold. Starbucks. After checking his log, he becomes very concerned with the Berlin plagiarizer’s actions. He begins looking for an Internet forum to report him. He has by now realized that both EKT and Homeland Security have wanted him to look crazy. He has also thought about the US strategy for dealing with the rise of European far right: pursuing three avenues at the same time, (1) maintaining the status quo, (2) getting ready to project an image of itself as a conservative Christian nation, and (3) getting ready to establish a new form of liberals based on a thermodynamic interpretation of history. This has got the suspect excited for a while, and he is quite turned on by all the pretty AWFs in Starbucks. While the suspect is getting all excited for nothing (not knowing that everybody is against him), the Secret Society continues its operation. 11:27 AM, 123.195.62.194, quantum mechanics, Google TW, kbronet.com.tw, Hsinchu, TW. More testimony (plagiarism) 12:05 PM, 96.92.147.181, Eva, Comcast Business, Groveland, MA. Again, not clear whether the Secret Society women are trying to recruit Eva. 12:18 PM, 50.143.225.117, Comcast, Modesto, California. 50.143.225.117 - - [15/Dec/2015:13:18:49 -0700] "GET /pleading_papers/opposition_to_demurrer.doc HTTP/1.1" 404 1360 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" Another volunteer is trying to find evidence for the suspect's violation of his family members' privacy. But, unfortunately, the suspect has removed the document. 3:58 PM, the Brandeis University person from 3:34 AM has come looking at the same chapter: it’s already cached in his browser. 129.64.154.114 - - [15/Dec/2015:16:58:57 -0700] "GET /favicon.ico HTTP/1.1" 200 446 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" Again, while repeated visits to the same chapter means “decoy”, it is possible that the detectives are getting suspicious about whether the huge chuck of evidences which the Secret Society 172 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 women have turned in – especially the pile which the “Berlin plagiarizer” has just turned in today – is really genuine, and that the Brandeis person is trying to persuade them that, indeed, it is, that the suspect has really cited all these materials from others without giving references. Meanwhile, the suspect, still in Westwood, calls Father Bob to tell him that he will come to volunteer on 3:30 PM. He has left Westwood by 1:30 PM. Slept on the bus. Passed Vermont station. Went back. He has called Ms Warren two times today, but, as usual, she has never called back. Then, while going to Urban Ministry on bus 204, he calls up W, and W answers it. Here are the details of the conversation (from 22:00 onward): (1) The suspect has figured out that the women have access to his phone conversation through Homeland Security, which means that EKT is involved, since only EKT has the kind of authority to command Homeland Security to violate the suspect's privacy in such a blatant manner. The suspect then gives the summary of his scenario so far: the conflict between Homeland Security's profile and TMU's profile. EKT also has an interest in confirming Homeland Security's profile. But EKT has to disprove Homeland Security's claim that the suspect is conspiring with her. Only the US government has to disprove both claims. EKT wants to monopolize the idea of making the women a bad example. But US government doesn't want this. As you can see, the suspect is only about 50 percent correct. (2) About the French regional election: FN didn't quite lose, since their base has considerably enlarged, and, insofar as the opposition must have played tricks, FN will definitely come to power in 2017 via an ICJ judgment, so that US' only option is to contain the influence of FN in Europe. Thus the US will need the suspect, just as the US will need a backup plan, which will be the suspect's “American response”. “Thus the US should pursue all three avenues at the same time.” Then, to respond to Russia, the US can claim the suspect's theory as part of America's “brand-name”. (3) About the “Berlin plagiarizer”. Plagiarism vs “simultaneous development of the same idea” (41:00). W: His brother, when publishing his ideas, skewed part of his conclusions and left out a few essential variables on purpose, so that, when somebody else copies them, he couldn't work out the conclusions. The suspect laments that he couldn't convince the government to rack up these women. (4) W’s colleagues are ignoring each other because of some online posting about affirmative actions. The suspect wishes he can escape to a third country. (5) The suspect: this country is like shit in your mouth, you just have to vomit. Criminals are in control of this country. W complains about how the suspect has put up his idea about Rousseau on his website. W’s friend has once published in Vanity Press. (6) The Secret Society women have visited the suspect's website so much that they have single-handedly changed the site’s Google ranking status. Around 4:30 PM, the suspect has finished his conversation with W. After this conversation, the Russians will have obtained definitive evidence to prove that the suspect has no prior knowledge of their, and French’s, involvement and so has never conspired with them. The Russians are correct: the suspect knows things especially by observing actions and reactions. It now appears that Homeland Security is all but doomed. It would appear that the Russians (or the CIA) have also instructed W to provide hints to the suspect as to what the debate in the ICJ is about, i.e. the Russians have already developed similar ideas to those found, and to be found, in the suspect’s writings on Russia’s soft-power, Marine LP, and Russia's support of European far right movements, and now they risk being banned by an ICJ order from implementing their own ideas because of this “conspiracy” charge. The Russians probably think 173 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 that, if the suspect can comprehend the situation given the hint, then Homeland Security can be convicted of conspiring with the suspect to harm Russia (to prevent Russia from implementing its own ideas). It would also appear that the CIA and the Russians have also instructed W to provide the additional hint that the suspect’s ideas are superior to the Russians' because they are based on a thermodynamic interpretation of history – i.e. have a philosophical foundation – and include a magnificent analysis of the world historical function of American feminism. 5:21 PM, 129.64.154.114, Foucault on biopower, the Brandeis University person. 129.64.154.114 - - [15/Dec/2015:18:21:19 -0700] "GET /1/thermhch2.html HTTP/1.1" 200 38692 "https://www.google.com" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" Why is he here again? Again, while repeated visits of the same page usually mean that the person is here to do decoy, we suspect in this case that it is because the detectives are getting skeptical of the Secret Society women's case. From 6:04 PM onward until 11:52 PM, only visits to images. The Secret Society women are again busy at night. 7:06 PM, Andre M. Pietroschek (Essen) posts a comment on SDW’s 18/11/15 post. This guy soon deletes all his blog content. Note that it’s 4 AM in Germany. One wonders if this guy has anything to do with the “Berlin plagiarizer”. 174 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 After talking with W, the suspect comes to Starbucks, Sunset. Calmed down. Decided that the “Berlin plagiarizer” is not really plagiarizing for the Secret Society’s sake, since they already have a cache of all his writings. In the coffeehouse, the suspect runs into a professor from the east coast writing a book on Hannah Arendt’s letters. After this, the suspect goes to the Forum. Then home. Got very scared again. He fears that the women could get him arrested with another vandalism charge. 2:47 AM, arrownet.dk, Copenhagen, 62.61.130.225 - - [16/Dec/2015:03:47:59 -0700] "GET /familyphotos/familyphoto4.jpg HTTP/1.1" 200 135584 "https://www.google.dk" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:38.0) Gecko/20100101 Firefox/38.0" This is for sure the Secret Society's. What is it about? Testimony that the suspect has violated his family members' privacy? 16 December (Wednesday; the German Lady cancels her meetup) 6:22 AM, somebody is accessing the older portions of the Secret Facebook Group: 173.252.74.118 - - [16/Dec/2015:07:22:18 -0700] "GET /scientificenlightenment1/catalysis.jpg HTTP/1.1" 206 9302 "http://alfa-img.com/show/endergonic-biosynthesis.html" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" 69.171.228.118 - - [16/Dec/2015:07:22:18 -0700] "GET /scientificenlightenment1/catalysis.jpg HTTP/1.1" 200 33200 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" 9:34 AM, 93.163.188.22, Roskilde, Denmark. 93.163.188.22 - - [16/Dec/2015:10:34:35 -0700] "GET /scientificenlightenment1/schuld.html HTTP/1.1" 200 25700 "https://www.google.dk/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" Presumably chatter/ false testimony (plagiarism). Next comes a very important visit. 11:43 AM, 37.254.16.248, Esfahan Telecommunication Company, Isfahan. 37.254.16.248 - - [16/Dec/2015:12:42:57 -0700] "GET /soft/soft.pdf HTTP/1.1" 206 33035 "http://www.google.com/url? sa=t&rct=j&q=&esrc=s&source=web&cd=52&cad=rja&uact=8&ved=0ahUKEwi6n6O1keHJA hVngXIKHaNwARA4MhAWCCIwAQ&url=http%3A%2F%2Fwww.lawrencechin2011.com 175 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 %2Fsoft%2Fsoft.pdf&usg=AFQjCNHaG3Y8rlIHECcaQpZczYB4kqo2g&sig2=e3sabAgNio6OzFptFtEm9w&bvm=bv.110151844,d.bGQ" "Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko" One has to wonder whether this is a proxy. The check on ip2location.com comes up negative. The person is really in Iran, it seems. Why then is the person using Google COM? It appears that the US has deceived the Secret Society women into getting one of their Iranian associates to visit the suspect’s document on Russia's development of soft-power in order to enable Iran to intercept it. Why is this visit so important? The ICJ has probably issued its order last night exonerating the Russians and the French. It appears that, because NULND and the Republicans are currently working on a certain issue about Iran (probably related to their dissatisfaction with Obama’s deal with Iran), they have decided to cut in. Since they can no longer convict the Russians for conspiring with terrorist suspects to harm the US, they are going to use the women to get Iran. At least they can get Iran, if not the Russians and the French. Now, two days later, on Friday, Obama would sign a new law stipulating that people who enjoy visa-free travel to the United States may be barred from such privilege if they have visited Iran before. Clearly, either today or tomorrow, Iran will have been convicted in the ICJ of conspiring with terrorist suspects in the US to destabilize the US and conduct espionage for US' enemy states. This conviction comes despite Iran’s lack of such intention: the US has legally used the Secret Society women as patsies to harm its competitor nations. Meanwhile, since the suspect's document is intercepted in a “terrorist conspiracy”, the 176 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Russians, even though not convicted, will still be forbidden to implement any ideas similar to those found in the document to reform itself. This of course means that the women are doomed, since the United States has decided to continue to maintain them as “terrorist suspects”. (They have been such since the Syrian scandal.) It’s unlikely that the US would have said to SDW: “Visit his writings so that all of them can be banned”, for the US would then be conspiring with the Secret Society women to harm Russia and Iran. The women would now be labeled “terrorists” and “spies for foreign powers” per an ICJ judgment. But the ICJ judgment would also mean that Homeland Security is now convicted of conspiring with the women to harm Russia. Or rather using the suspect to entrap Russia in order to get its plans banned as “terrorist plan”. What's worse, the fact that NULND has particularly chosen the suspect's document on Russia's possible development of soft-power to pull this stunt indicates that she is developing good intention toward the suspect. She must have found the suspect's analysis of Russia's failure (Russians' failure to develop a parental attitude toward minorities, for example) superb and wanted to make the method “To sell Pepsi by showing that there is poison in Coca-Cola” (which the Russians must have themselves thought of doing) into the women's terrorist conspiracy to harm the United States. In this stunt she has pretty much prevented Russia from ever effectively competing with the United States in the domain of soft-power – since any discrediting of America's soft-power will now be considered “terrorist attack upon the US”. She must be developing plans, while damning the women, to free up the suspect and make good use of him after preventing the Russians from benefiting from his ideas. (If you read anything about how she takes good care of her husband, a prominent neoconservative thinker, you will know that she's a woman who values talented men, unlike the Secret Society women.) This must have tremendously offended the thugs inside Homeland Security, who see the suspect as their worst enemy. Homeland Security has therefore decided to fight back. Since they have already broken into the control center, they know from the computers there that the suspect is about to give out the evidences they need to exonerate themselves. 12:33 PM, 71.190.230.156, fios.verizon.net, Syosset, New York. 71.190.230.156 - - [16/Dec/2015:13:33:49 -0700] "GET /scientificenlightenment1/plancklength.gif HTTP/1.1" 200 1414 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" This is more chatter/ testimony for the detectives, presumably (plagiarism). As for the suspect: he wakes up late, almost 11:18 AM. Ran to bus stop, but missed the bus. Returned home, called Christine (Work Source), Fr Bob, and left a message with Ms Warren. Took the 12:30 PM bus. Stopped in Starbucks, Vermont, to open up the log. Then, Urban 177 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Ministry. Read “Essenes” in Ederscheim’s The Life and Time of Jesus the Messiah. Signals. Met with Fr Bob briefly. 5:10 PM, 86.9.133.112, cable.virginm.net, Coatbridge, UK. (In the north.) 86.9.133.112 - - [16/Dec/2015:18:10:04 -0700] "GET /1/amcivilreligion.htm HTTP/1.1" 200 27754 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" More chatter/ testimony (plagiarism), presumably. Meanwhile, after Urban Ministry, the suspect comes to Starbucks, Sunset. 6:06 PM, as the suspect accesses his hidden site, a DHS agent, it seems, comes in to sit nearby. Then, W calls. Homeland Security has certainly instructed W to call the suspect because they already know from the control center's simulation that the suspect is about to give out important evidences to enable Homeland Security to continue fighting. It is because they have already known what the suspect has wanted to say from the control center's simulation that they have sent in a surveillance agent at just the right time to conduct surveillance on the suspect while they have instructed the suspect's best friend to call him. (Both the intercept of the conversation and the surveillance over the suspect will soon be submitted into the ICJ as evidences to continue Homeland Security's fight against the Russians and the French.) The details of the conversation are as follows (from 1:40:00 onwards): (1) The suspect repeats US' possible strategy: pursuing all three avenues at the same time. But this means, the suspect notes, that he will be able to accomplish all his own objectives at the same time: (a) getting out of the vandalism case; (b) getting rid of his adversaries; (c) getting a small following for his theory; and (d) getting laid. (2) He couldn't find a job. W then recounts how he has obtained his current job at the Assembly. (3) “Fitting into KRN’s false profile solely because of the generality of the profile.” (4) TMU’s old fashion profiling of the suspect (“Philip K Dick”). “American bureaucracy”. Why would W, so busy, calls the suspect? His hesitation in the beginning of the conversation is sign that he has been instructed to call and, using “Thank you” as a pretext, to wait for the suspect to say the things which Homeland Security knows the suspect has wanted to say. “Three Avenues” (status quo plus two backup plans) and “I can accomplish all four objectives at the same time”. Then: “If EKT is doing what I thinks she is doing, then I’ll have a light in the tunnel.” These two admissions are what Homeland Security is waiting for the suspect to make. Their new argument: EKT is conspiring with the suspect to harm the women and Homeland Security because her intervention has enabled the suspect to find opportunities among US agendas to damn the women and Homeland Security and make himself a star at the same time. Afterwards, the suspect goes to Astro Burger to attend Draw Anything LA meetup. Grace not there. Drew Marion. Left, a little past 9 PM. Caught up with bus 282 just in time. 178 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Meanwhile, the Secret Society's op: 9:34 PM, 110.164.80.250, perspective.html, static.3bb.co.th, Bangkok. Just another chatter/ testimony about how the suspect has plagiarized his theory on linear perspective. Then, 9:52 PM: 24.10.109.161 - - [16/Dec/2015:22:52:51 -0700] "GET / HTTP/1.1" 200 2878 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3" 24.10.109.161 - - [16/Dec/2015:22:52:52 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3" We have seen this person on 10 December, 7:19 AM. Here the visit doesn't even look like a real visit because favicon.ico is not called up. S/he is then here again on 10:13 PM, about 20 minutes later: 24.10.109.161 - - [16/Dec/2015:23:13:35 -0700] "GET / HTTP/1.1" 200 2878 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3" 24.10.109.161 - - [16/Dec/2015:23:13:35 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3" We thus have to conclude that this is a decoy. All the other visits between 6 PM and 12 AM are to images. Home, past midnight, the suspect suddenly has the desire to sign up VK to check if his site has been talked about there. He then, 1:55 AM, discovers that SDW has signed up VK, August 2013. It's Homeland Security who has programmed the suspect to do this. You shall see why. Past 2 AM, MST (blond). Insomnia. Couldn’t sleep until 4 AM. Meanwhile the Secret Society's operation continues. 12:12 AM, access.hol.gr, Athens, 46.177.117.53 - - [17/Dec/2015:01:12:50 -0700] "GET /thermh2.html HTTP/1.1" 200 45320 "https://www.google.gr/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" 46.177.117.53 - - [17/Dec/2015:01:12:56 -0700] "GET /thermh1.html HTTP/1.1" 200 24055 "http://www.lawrencechin2011.com/thermh2.html" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" 179 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 This is either decoy or chatter/ testimony (plagiarism, misogynist rambling). Then, after a few more visits to images, 2:39 AM, Sofia University St. Kliment Ohridski, Sofia, Bulgaria 62.44.98.22 - - [17/Dec/2015:03:39:02 -0700] "GET /scientificenlightenment1/standardmodeldrell.gif HTTP/1.1" 200 9790 "https://www.google.bg" "Mozilla/5.0 (Windows NT 6.1; rv:42.0) Gecko/20100101 Firefox/42.0" Just more chatter about how the suspect has violated other people's intellectual property rights by putting their images on his website without asking prior permission. The status of the chatterer as a university student is supposed to enhance its credibility. We have usually skipped all the visits to images which correspond to such type of “testimonies” because we wish to save space, but this one should definitely be mentioned because it comes from another unusual place. Then, 2:51 AM, Noordwijkse School, Netherlands. This is an elementary school. 77.61.64.33 - - [17/Dec/2015:03:51:28 -0700] "GET /scientificenlightenment1/dividedline.jpg HTTP/1.1" 200 35072 "http://www.bing.com/images/search? q=plato+for+dummies&view=detailv2&&id=DC0478AF6ADA15B25529F3B6FAAD838F72A BD066&selectedIndex=15&ccid=7Vxfdulq&simid=608049382897877898&thid=OIP.Med5c5f7 6e96a1628fe733cae348b4cdbo0&mode=overlay" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko" The same testimony about the suspet's violation of other people's intellectual property rights. Again, we note this one because it comes from such a unusual place. Then, 3:35 AM, stu9d01.kent.ac.uk, University of Kent, Canterbury, 129.12.157.1 - - [17/Dec/2015:04:35:22 -0700] "GET /scientificenlightenment1/capra.html HTTP/1.1" 200 11850 "https://www.google.co.uk/" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" Another eye witness to the suspect's “plagiarism”. (False testimony.) Note that the German Lady has canceled her meetup tonight. Homeland Security might have shared with them the news that they have got themselves labeled “terrorist suspects conspiring with enemy states” and the new plan which Homeland Security is devising to exonerate them. The women are therefore very upset and busy at the same time, so that the German Lady has decided to skip tonight’s meetup. 17 December (Thursday; Homeland Security’s new case) Homeland Security shall continue to use the control center to control the suspect to fulfill their plan. Their strategy: (1) controlling the suspect to fit their modified false profile of him; (2) dissuade NULND from any good intention toward the suspect; and (3) framing the suspect for conspiracy with the Russians, so that the Secret Society women and they themselves can be made into “victims” of his conspiracy with the Russians and their allies. Homeland Security has thus reopened the ICJ debate by this morning saying: New evidences found (i.e. the suspect’s 180 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 conversation with W last night), the previous judgment that the women have conspired with Iran to harm the US should be reconsidered. Homeland Security is here to prove that the suspect has conspired with the Russians and the French to harm the United States, Homeland Security, and the Secret Society women. Homeland Security will create numerous identities (parallels, semblances) between the women and the suspect in order to transfer (in the case of the Syrian scandal) the women’s terrorist suspect status entirely onto the suspect and exonerate them. Homeland Security will in fact add an additional disgusting characteristic to their false profile of the suspect: not just imagining up the women's going after him using law enforcement, but also imagining up scenarios about being persecuted every single day and worrying over nothing, and then unjustly hating United States for being persecuted, not knowing that the perceived persecution is all but in his mind. Homeland Security immediately sets itself to work. 5:20 AM, 31.53.77.15, “Namely, there is a story behind Khalezov’s story”, btcentralplus.com, Saxmundham, UK. Note that the place is very close to Ipswich, about 25 miles away. The person is thus very likely related to LB Admin. 31.53.77.15 - - [17/Dec/2015:06:20:36 -0700] "GET /vol2appendix/vol2appendixd.pdf %20namely,%20there%20is%20a%20story%20behind%20Khalezov'%20story HTTP/1.1" 404 1360 "-" "Mozilla/5.0 (Linux; Android 5.0.2; SM-A500FU Build/LRX22G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.83 Mobile Safari/537.36" Presumably, Homeland Security has instructed a member of the Secret Society to pretend to be EKT’s messenger and leave a message on the suspect’s log, hoping that, this time, the suspect will believe that it’s the Russians who have messaged him. If so, then conspiracy will be established between the Russians and the suspect. However, the suspect will not be so dumb. 6:46 AM, 66.87.78.156, pools.spcsdns.net, Chicago, Illinois. 66.87.78.156 - - [17/Dec/2015:07:46:57 -0700] "GET /blogs/2014/01/13/kiersten-meetsangelica-february-8-march-1-2013-the-beginning-of-a-beautiful-woman-to-woman-relationship/ HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 5.0.2; HTCONE Build/LRX22G) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Mobile Safari/537.36" It seems that another volunteer has joined in on the “hunt” and is here checking out the situation (“how the suspect has imagined up ANG teaming up with KRN and the German Lady to go after him”). Although the blog post has been removed, the chatter can still be testimony for the detectives and intercepted into the ICJ as evidence. Then, 9:01 AM, 24.7.39.129, capra7777.html, direct visit, Comcast, Redwood City. 181 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 24.7.39.129 - - [17/Dec/2015:10:01:41 -0700] "GET /scientificenlightenment1/capra7777.html HTTP/1.1" 200 21637 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/601.2.7 (KHTML, like Gecko)" Again, it is the “Redwood City decoy”. 9:57 AM, somebody is looking at quantummechanics.htm on Bing Preview. Just more chatter (plagiarism). 11:13 AM, 86.150.187.204, schuld.html, Google UK, btcentralplus.com, Malvern, UK. More chatter (plagiarism). 11:37 AM, 68.110.174.121, orphism.html, Google, ph.ph.cox.net, Chandler, Arizona. More chatter (plagiarism). 12:11 PM, sci/appendix.html, Google preview. More chatter (plagiarism). 1:03 PM, 80.109.103.145, Eva, Google AT, univie.teleweb.at, Vienna, Austria. Again, does this mean that the Secret Society women are trying to recruit Eva? Meanwhile, the suspect. He wakes up almost 11:30 AM. Caught the bus for 12 PM. Arrived in downtown, headed toward the storage facility first. DVD put in: 499. 2 PM. On Metro. There is a new announcement about “sexual harassment on Metro”. The suspect finds it strange. While the suspect is walking to the public library, an ugly Hispanic male walks past him wearing earphones and carrying nothing. Homeland Security surveillance agent? The suspect calls him “ugly”. This is most likely a Homeland Security trap. From reading the mind-reading computer those Homeland Security thugs know that, if they send one of their ugly agents to the suspect, he will call him “ugly”, meaning “Hispanics are ugly”. Homeland Security has just intercepted another piece of evidence showing the suspect to be a bigot and racist against Hispanics. Thus, confirmation of their false profile of the suspect. Back to the Secret Society. 3:42 PM, 174.16.65.190, hlm.qwest.net, Denver, Colorado. 174.16.65.190 - - [17/Dec/2015:16:42:05 -0700] "GET /timeline9/timeline9d.pdf HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_2 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13C75 Safari/601.1" Another volunteer has joined in on the “hunt”. The women (pretend to) complain to him (in order to be intercepted into the ICJ as evidence): “He is insane. He believes that we were arrested, that we are all involved in some government conspiracy against him”, etc. More evidence in the ICJ that the women have been severely victimized by the suspect because of the delusional state of his mind. 182 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 3:49 PM, 76.98.39.218, Comcast, Glenside, Pennsylvania. 76.98.39.218 - - [17/Dec/2015:16:49:02 -0700] "GET /blogs/2014/04/14/last-word-on-my-pasttwo-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2595.0 Safari/537.36" Another netizen has joined in to discover that there is this insane paranoid schizophrenic who is slandering the poor women in online forums. Now it's SDW's turn to complain to the volunteer how she is frightened by this paranoid schizophrenic who is obsessed with her and then develops this delusion that she is going after him with ANG, KRN, and the German Lady. Meanwhile, the suspect is in the public library checking his log. He has discovered the message about Khalezov. He reads a little. (Letters of de Gaulle, etc.) Almost 5 PM. Left. Starbucks. He writes down the following on his diary: Since bed time last night, began contemplating this scenario: EKT came in early November: (1) to monopolize my theory of thermodynamic interpretation of history and “New Feminism” (not my writing on how to improve Russia’s soft-power) under victim confidentiality on the basis of Homeland Security’s false profile of me; (2) to make bad examples of the Secret Society women and broadcast this in Russia in order to obtain a concrete example to illustrate the validity of New Feminism and the thermodynamic interpretation of history. TMU’s profile contradicts DHS’ profile, but DHS’ is legally more authoritative. Paris attacks on 13 November have allowed the French and the Russians to obtain my essay on Marine Le Pen. DHS, US, the French, and the Russians all went to court. US denies the validity of Homeland Security’s profile in order to deny EKT her request to monopolize my theory and to make bad examples of the women. Homeland Security wants to play both ways, affirming the validity of its profile while denying EKT her right to monopolize, etc., by arguing that I’m conspiring with the Russians and the French. EKT affirms the validity of Homeland Security’s profile but denies conspiracy with me. The debate is on whether I fit Homeland Security’s profile. EKT and Homeland Security are losing. I don’t fit the profile and don’t seem to conspire with EKT. Past midnight, December 15, US deceives the Secret Society women into copying my thermodynamic interpretation of history and giving it to EKT to monopolize. 183 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Afternoon, December 15, conversation with W. US establishes that the women are helping EKT to steal my theory. 11:43 AM, December 16, US deceives the Secret Society women into visiting my document on Russia’s soft-power through a proxy in Iran in order to enable Iran to intercept it. US further establishes that the women are helping EKT to steal my theory. 6 PM, conversation with W. US now establishes that the women and Homeland Security are conspiring with EKT to help her monopolize my theory and their bad examples. The court rules that US now shall have the right to monopolize my theory and the bad examples. EKT’s team walk out in anger. Homeland Security’s profile is legally valid, which allows EKT to monopolize my theory and the bad examples. But the US not only tries to disprove this profile, but also deprives Russia of the right to use the theory and advertise the bad examples through a sting operation on the women and by causing me to understand the situation. Since both sides’ actions are legal, the Russians will plagiarize me and broadcast the bad examples in defiance of court’s order. The US will argue that causing me to understand the situation does not constitute “conspiracy” because its citizens have a duty to defend their government. (This episode will be taken backward in time to eliminate the episode of my conspiracy with the CIA to harm France in the previous ICJ trial. Thus the CIA is no longer covictim with the Russians in my conspiracy with France.) 17 December, US deceives the women into framing me for conspiring with the Russians (5:20 AM visit) and then into making false reports about me (Prison Planet). They must have reported to some other division in Homeland Security saying I do espionage for the Russians. After conspiring with the Russians, they will blame me for doing so. And then make false reports to use the legal system to dispose of me. The US is also using this episode to erase the previous ICJ trial altogether. Not clear whether this has become a “crime” in another secret ICJ where the previous ICJ trial is now reinstalled. The suspect finishes writing by 5:31 PM. As you can see, while the suspect has originally come to a vague comprehension of what is going on, he is now building up, on its basis, a completely incorrect scenario. What is important about this confession is that he has prevented Homeland 184 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Security from framing him for conspiracy with the Russians, since he has noted that he does not believe the “Khazlezov” message came from the Russians. Homeland Security shall try again. Then, the suspect attends Chrysalis’ Christmas party. Ariane there. Around 8 PM, the suspect rides the bus to Westwood. He has decided not to go home tonight because of Secret Society’s and Homeland Security’s plan to exterminate him. Like on many nights, there will be no volunteers' visits to the suspect's webpages. Only to images. But we know that SDW is at home. 8:11 PM, SDW posts a random message on her Facebook Group. This is her first time posting since 31 October. She is following the instruction given by Homeland Security. While the suspect is in Starbucks, Westwood, and there comes in an eastern European woman. It might be Russia’s test, the suspect thinks. In reality, Homeland Security is just trying again to frame the suspect. Homeland Security is wishing that the suspect will talk to the woman believing that she's a Russian agent. However, the suspect has made no move at all. Meanwhile, 11:23 PM, SDW has posted a second message on her Facebook Group, hoping that the suspect will look it. From now on, every time when SDW posts on her Facebook Group, the suspect will get an immediate notification. And he did look at the two new messages as soon as he was notified. SDW is instructed to post on her Facebook Group hoping that the suspect would believe, and declare on AVFM, that this is a law enforcement sting operation to enable the women to establish their stalking claim against him. SDW would tell the detectives: “He is so paranoid that he believes we are secretly filing stalking claims against him behind his back. It’s all because he has misunderstood the meaning of my online postings. And, not knowing that he is only imagining up the whole thing, he would stalk us on cyberspace in response.” However, the suspect has not yet responded on AVFM. 1:41 AM, XO Communications, El Paso City Limits, Texas, 216.4.56.143 - - [18/Dec/2015:02:41:09 -0700] "GET /badvisits/5712-43.png HTTP/1.1" 200 108985 "http://www.google.com/blank.html" "Mozilla/5.0 (Linux; U; Android 4.1.2; en-us; ZTE-Z995 Build/JZO54K) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30" This IP address is listed as a proxy or network sharing service. Another testimony that the suspect is engaged in “hacking websites”. 3:31 AM, China Education and Research Network Center, Changchun, 185 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 59.72.84.70 - - [18/Dec/2015:04:31:43 -0700] "GET /scientificenlightenment1/glycolysis.jpg HTTP/1.1" 200 190436 "http://cn.bing.com/images/search? q=glycolysis&view=detailv2&&id=D36571A6B6236A2F97489B387B00811F3FB862D3&selec tedIndex=78&ccid=zOaCN8ov&simid=608047286947545437&thid=OIP.Mcce68237ca2fe6e6f0 ad2a4d766c966do0&mode=overlay" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" This is more chatter that the suspect has plagiarized. The chatter made by an academic to enhance its credibility. 4:11 AM, Jawaharlal Nehru University, New Delhi, India, 202.41.10.3 - - [18/Dec/2015:05:11:52 -0700] "GET /scientificenlightenment1/standardmodeldrell.gif HTTP/1.1" 200 9790 "https://www.google.co.in/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" Another very credible testimony about the suspect's plagiarism by an academic. Unless it's a decoy. 18 December (Friday) Today Obama will sign a new law, as noted: people who enjoy visa-free travel to the United States may be barred from such privilege if they have visited Iran before.9 Iran is convicted of conspiring with terrorist suspects in violation of UN Resolution 1373 because of the Secret Society's stunt on Wednesday. The suspect has stayed in Westwood Village all night, and wakes up on the street corner by 6 AM. Starbucks. Posted “Notice” on “Far Right”. Then uploaded it onto his Gmail account for backup. This is presumably Russia’s first piece of evidence showing that the suspect's primary concern is with the reform of the United States rather than with conspiring with Russia to harm the United States, and that, in fact, the suspect is caught in a conspiracy with Homeland Security to entrap Russia. The Secret Society's operation continues: 8:44 AM, 208.105.135.18, layereduniverse.html, Google, nys.biz.rr.com, Schenectady, New York. More chatter (plagiarism). 8:58 AM, 177.19.224.224, static.gvt.net.br, Curitiba, Brazil, 177.19.224.224 - - [18/Dec/2015:09:58:42 -0700] "GET /scientificenlightenment1/capra.html HTTP/1.0" 200 11888 "https://www.google.com.br" "Mozilla/5.0 (X11; Ubuntu; Linux x86_ 9 See Rick Gladstone, “Tensions with Iran rise over US visa measure”, The New York Times, 24 December 2015. 186 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 64; rv:43.0) Gecko/20100101 Firefox/43.0" 9 AM, he comes to the Table of Contents. 9:01 AM, he comes to capra222.html. 9:02 AM, he comes to capra.html again from Google. 9:03 AM, he comes to yixuai455.html. At the same time, capra7777.html. 9:04 AM, capra1.html. 9:07 AM, he comes to capra.html again from Google. It would appear that he is not doing decoy, but is really here to offer testimony about the suspect's plagiarism. His behavior is more sign that the detectives are getting skeptical about the women's and volunteers' testimonies and evidences. 9:13 AM, Google proxy: perspective.html. More testimony about how the suspect has plagiarized his theory on linear perspective. By 10 AM, the suspect has revised the scenario which he has constructed last night. 10:23 AM, SDW posts on her Facebook Group again. She is clearly getting impatient over the fact that the suspect has not yet reacted. There would be Fewer visits afterward to the suspect's website. From now on the Secret Society women would be very sparing about sending volunteers to the suspect's website. They have heard the intercept of the suspect's conversation with W on Tuesday, and are terribly distraught over the fact that they have helped drive up the suspect's website's ranking on Google and other search engines. They vow to not make the same mistakes again. They will from now on visit the suspect's websites as infrequently as possible, just the minimum to achieve the purpose at hand. Meanwhile, the suspect continues working inside Starbucks. A pregnant AWF is doing interview nearby. Another UCLA student is reading a book by a Dutch author next to him, and the suspect wonders whether that's a “secret message” from the Invisible Hand. (That Mr Wilders would like his ideas very much.) Past 11 AM, he goes to eat, then naps outside UCLA. The Secret Society continues. 1:19 PM, 109.255.25.78, Dublin. 109.255.25.78 - - [18/Dec/2015:14:19:28 -0700] "GET /scientificenlightenment1/schuld.html HTTP/1.1" 200 25700 "https://www.google.ie/" "Mozilla/5.0 (iPad; CPU OS 7_0_4 like Mac OS X) AppleWebKit/537.51.1 (KHTML, like Gecko) Version/7.0 Mobile/11B554a Safari/9537.53" Probably more chatter about the suspect's plagiarism. This IP address shows up on a Debian IRC chat log. Is this person related to LB Admin? 187 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Almost 3 PM, the suspect has come back to Starbucks. The pregnant AWF is still doing interview. The homeless man is keeping his cat inside his luggage. The suspect says something to him, wanting to make sure that the cat is not being tortured. As he checks his log, he notices that whatismyipaddress.com is disabled. It no longer provides information on the geographical locations of IP addresses. The suspect is terribly alarmed. He assumes it's because the Secret Society women have persuaded detectives to order the website owner to refrain from providing information on IP addresses on the ground that the suspect's identification of visitors to his website is considered “cyberstalking”. The suspect is terribly enraged: he has so little legal status that, even when people knock on his door, he is considered stalking the visitors if he wants to find out who it is that is knocking! Just then, 3:55 PM, the eastern European woman who was here last night comes over to the suspect to ask him a simple question and then immediately leaves. Obviously, Homeland Security has decided that, if the suspect refuses to believe that the Russians could be communicating with him, they will stuff the idea down his throat. Homeland Security will present the surveillance of this simple encounter to the ICJ as “evidence” that the suspect believes that this woman is a Russian agent and intends to conspire with the Russians. 4:13 PM, 24.7.39.129: it's the “Redwood City decoy”. 24.7.39.129 - - [18/Dec/2015:17:13:39 -0700] "GET /scientificenlightenment1/zeno.gif HTTP/1.1" 200 2416 "http://www.lawrencechin2011.com/scientificenlightenment1/capra77 77.html" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/601.2.7 (KHTML, like Gecko)" 188 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 By 5:39 PM, the suspect has at last posted on AVFM. He writes that the women have established their 10th stalking claim against him. This is what SDW has been waiting for. They have confirmed for the detectives that the suspect is prone to imagine up the women filing stalking claims against him behind his back just because they put up a new posting and he sees it. The suspect is now experiencing severe anger. He doesn't yet know that he has fallen into a trap. Namely, there is no law enforcement order to whatismyipaddress.com instructing the website to refrain from supplying information on the geographical locations of IP addresses. Homeland Security must have known from the control center's simulation that, if they remotely control the website to malfunction, the suspect will misinterpret it as an action by law enforcement under the women's request and go into a rage over the blatant unfairness in American criminal justice system. He is being mind-controlled to experience a most severe episode of anti-American hatred. He goes on the street, throwing trash around. Called Angela, asked to stay with her. Angela agrees to meet him on Normandie and Wilshire. Then, still in Westwood Village, the suspect calls a woman “Fuck you American”. She ignores him. Past Wilshire, the suspect calls a second woman, “Fuck you American”. She is slightly startled, but walks away. The suspect is not sure whether she would go report him, since this is obviously a Homeland Security op (controlling him to shout anti-American slogans and then showing the surveillance to somebody). The suspect eats noodle at 711. Then, he takes the bus to go to Normandie and Wilshire. He would stay in the Coffee Bean there until 8:30 PM. In the preceding episode Homeland Security has accomplished their objective three-fold: (1) to confirm their false profile of the suspect that he is constantly imagining up persecution by the US system not knowing that it’s all his own paranoia imagination and then unjustly blaming America for it. This, you should note, it's actually the most essential characteristic of SDW; Homeland Security is mind-controlling the suspect to acquire the women's bad characteristics, as always; (2) to show the intercept of the suspect's anti-American angry outburst in order to dissuade NULND from her plan to make use of the suspect; (3) to use the suspect's anti-American angry outburst as circumstantial evidence for the claim that he is prone to conspire with America's enemy to harm America. This piece of evidence shall supplement the evidence showing him interacting with the Russian woman supposedly believing her to be a Russian agent. Meanwhile, the Secret Society continues its operation online. 8:19 PM, Kuwait City, 188.71.192.156 - - [18/Dec/2015:21:19:23 -0700] "GET /badvisits/5712-43.png HTTP/1.1" 200 108985 "https://www.google.fr/" "Mozilla/5.0 (iPhone; CPU iPhone OS 8_1_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12B435 Safari/600.1.4" More false testimony about how the suspect is a computer hacker? 189 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 By 9 PM, the suspect has met up with Angela, who drives the suspect to one of her houses, where he would spend the night there. He would be falling asleep by 10 PM, watching a lecture by Barbara Rosenkranz. He could barely concentrate, however. 9:05 PM, strange massive indexing from France, crawl06.lp.007ac9.net, OVH SAS, Champignysur-Mame (next to Paris). Note that Melissa Data gives: Roubaix, Nord-Pas-de-Calais. (Most give the former. The last time OVH indexing has occurred is 5 December : 37.59.55.128 - - [18/Dec/2015:22:05:31 -0700] "GET / HTTP/1.1" 206 6282 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.17 (KHTML, like Gecko) Chrome/10.0.649.0 Safari/534.17" …. 37.59.55.128 - - [18/Dec/2015:22:05:33 -0700] "GET /acad.html HTTP/1.1" 206 10976 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.17 (KHTML, like Gecko) Chrome/10.0.649.0 Safari/534.17" …. It's of course quite possible that, now that more and more evidences show the suspect not intending to conspire with the Russians and FN, FN is free to examine the content of the suspect's website in its entirety. This OVH robot indexing may be especially devised to enable Marine and Marion to examine the suspect's website offline, just as the Homeland Security robot indexing has once done for the Secret Society women. 9:32 PM, strange massive indexing from Kiev, Ukraine: 178.94.172.184 - - [18/Dec/2015:22:32:19 -0700] "GET / HTTP/1.1" 200 2929 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.0.1599.101 Safari/537.36" …. It's not clear whether this is related, or in response, to the previous OVH indexing for FN's sake. 10:41 PM, BSNL, Gulbarga, India, 59.88.201.159 - - [18/Dec/2015:23:41:20 -0700] "GET /scientificenlightenment1/bohrelementtable.jpg HTTP/1.1" 200 83572 "https://www.google.co.in" "Mozilla/5.0 (Windows NT 5.1; rv:42.0) Gecko/20100101 Firefox/42.0" More chatter about the suspect's plagiarism? 11:31 PM, abo.wanadoo.fr, Geveze, France, 190 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 90.32.124.99 - - [19/Dec/2015:00:31:03 -0700] "GET /scientificenlightenment1/nostratic2.jpg HTTP/1.1" 200 42640 "http://www.junglekey.in/search.php? query=Austric+languages&type=image&lang=en®ion=in&img=1&adv=1" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" It is probably a proxy. This is what the search looks like (17/02/16): The search engine has called up the image from the web server to display among the search results. Another testimony about the suspect's plagiarism. 1:44 AM, the Secret Society is accessing older portions of the Secret Facebook Group. 66.220.146.22 - - [19/Dec/2015:02:44:57 -0700] "GET /scientificenlightenment1/athd2.jpg HTTP/1.1" 200 12120 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" 19 December (Saturday) First, the Secret Society's operation. 4:49 AM, 198.55.96.81, quadranet.com, proxy, 191 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 198.55.96.81 - - [19/Dec/2015:05:49:47 -0700] "GET /1/epilogue225.html HTTP/1.1" 200 183069 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36" Note that ath2d.jpg is not called up. Is this a decoy? We should however consider the possibility that Homeland Security would try to make this superb criticism of “victim feminism” also into part of the suspect's “terrorist conspiracy” against American women, and so it might have something to do with that. Homeland Security has by now established itself as the best friend of the most radical of American feminists. They now want to obtain an ICJ judgment promoting Radical Feminism and victim feminism: women are always the victims of male aggression, no matter what they do and what talents they may or may not have. Then, 7:39 AM, 172.56.5.51, TMobile, Ft Lauderdale, Florida.10 172.56.5.51 - - [19/Dec/2015:08:39:43 -0700] "GET /blogs/2013/04/ HTTP/1.1" 404 1360 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; Android 5.1.1; LGMS345 Build/LMY47V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.111 Mobile Safari/537.36" Another volunteer – who might be related to the Pompano Beach person from before – has offered testimony about how the suspect is suffering paranoia delusion about the Secret Society women going after him and spilling his delusion online to embarrass them. More evidence in support of Homeland Security's new case in the ICJ. Meanwhile, the suspect wakes up early in Angela’s home and comes to Starbucks, Normandie. 9:41 AM, 41.222.237.54, Mundo Startel SA, Cocole, Angloa. 41.222.237.54 - - [19/Dec/2015:10:41:15 -0700] "GET /scientificenlightenment1/allegoryofcave.html HTTP/1.1" 200 29134 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" It's not clear whether the person really is in Angola or whether he is simply using a proxy. Presumably another false testimony about how the suspect has plagiarized. He would be back again tonight around midnight. Meanwhile, the suspect is working hard in Starbucks. Checked log. What looks like a Homeland Security surveillance agent sitting in the distance. The surveillance is most likely called up by the detectives. Outside, the security guard says to the suspect: “Why are you acting to be crazy? Are you on crack?” She stares at the suspect angrily. The suspect develops the impression that the 10 As is traced on Melissa Data, not on What is My IP Address, which didn't provide the geographical location. 192 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 security guard has been alerted about him (the “anti-American, misogynist terrorist”), but it's not clear whether his impression is correct. Then, what looks like another Homeland Security surveillance agent comes sitting down next to him. Told him the seat is reserved. No, he won’t leave. Told him: “Keep watching me, you are falling into my trap.” He makes no sound. 12:41 PM, the suspect modifies the post at AVFM (eliminating “God damns”) while under surveillance. 1:09 PM, the suspect posts more on AVFM. Unless, of course, I get arrested or hospitalized because the great and sympathetic people on this forum decide to show grave concern for my mental well being after seeing me spilling out my paranoia delusion on this forum and to report it to the authority, like it has happened on the other forums. And so I shall include this scenario as well among my paranoia delusions. Hopefully, the great people here will not allow this to come true and prevent me from discrediting myself. Hopefully, we all still uphold the traditional definition of "paranoia delusion", i.e. belief in something that is not true, right? Otherwise, what's the point in calling people "insane", "paranoid," etc? 2:07 PM, the suspect, spurred on by the security guard's comment, posts more on AVFM. Update: Currently law enforcement is still investigating me, of course, but the investigation might have changed my status from “being insane” to “pretending to be insane”, in which case I'm still eligible for arrest for “intentionally slandering the women online motivated by misogynist hatred” and other minor crimes. When the great and sympathetic people on this forum and elsewhere report me to authority out of grave concern for my mental well being, this is presumably the new response. 2:33 PM, Flightless Bird posts a reply on AVFM that is highly critical of the suspect: No one's reporting you dude, and to imply the forum is uncaring is disingenuous. You came here asking for advice and you've had a heap of it, yet you've ignored it all. Perhaps next time tell us exactly what you want us to say so we can copy and paste it. 193 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Everyone is sympathetic to your plight, that much is obvious from the replies, but peoples sympathy tends to wear off when you show no willingness to do something to help yourself. Good luck to you. 2:52 PM, Berne also posts a reply critical of the suspect. As your posting has progressed what I gather is that you love attention and you love to play the victim. You by any chance also go by the name of dmschlom? Berne is clearly describing the suspect as if he were describing the Secret Society women, especially KRN. Clearly, both of them are making these replies under Homeland Security's instruction. KRN, as you know, has been projecting all her bad characteristics onto the suspect – including her tendency to project herself onto her scapegoat – whenever she talks to law enforcement about the suspect. She must have been telling the detectives that, when the suspect describes the Secret Society women, especially their yearning to become his victims, he is just describing himself, especially his own yearning to become the Secret Society women's victims. Whenever KRN analyzes the suspect to law enforcement detectives, she is just describing herself, and so she would also describe the suspect as describing himself when he describes the Secret Society women. In other words, not only has KRN projected her desire to become a victim of male sexual aggression onto the suspect, but also her very projection onto the suspect onto the suspect! Propagande en miroir practiced to the utmost perfection! Those Homeland Security thugs would then want this false portrayal of the suspect (as KRN) to enter into the ICJ as evidence in support of their new case, while the women would want law enforcement detectives to believe them on this. Homeland Security thus helps the women out by instructing Berne to falsely accuse the suspect of “wanting to be a victim” so that KRN”s false portrayal of the suspect (when she is really just describing herself), which is already part of the evidentiary record in the ICJ, may be further confirmed over there by a third party. Meanwhile, seeing the posting, the detectives may also be further convinced of the truthfulness of the lies with which KRN has been feeding them about the suspect. Finally, the suspect of course has nothing to do with this “dmschlom”. This “dmschlom” appears to be a frivolous character, as seen on his Wordpress blog and Twitter. Homeland Security has probably instructed Berne to ask this question in order for more evidences to enter into the ICJ showing the suspect to be a frivolous character habitually impersonating others on the Internet while seeking attention and wanting to be a victim (i.e. just like KRN and just as KRN has described the suspect). Law enforcement detectives presumably wouldn't be fooled to believe that the suspect has created a false profile “dmschlom” since they are supposedly monitoring the suspect's Internet connections. 194 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 6:09 PM, cosmicdance1.jpg, cosmicdance2.jpg, alfa-img.com/show/antiprotons-diagram.html, Facebook. There are very few volunteer actions from 12 PM until 6:21 PM, only four visits to images. Are the Secret Society women conferring with the detectives over the incidents since last night? Meanwhile, the suspect. He calls up Angela and leaves a message with W (“He might be arrested soon”). The suspect then decides to go home first to get his things. Arrived home, past 5 PM. His new passport has arrived. MST (Japanese, Teen Beth). Did Homeland Security also claim he is a pedophile? The suspect then posts his “Far Right: Preliminary Version” on his website. He has finally finished the main text of the essay. The text is basically the same as the final version you see today but minus the footnotes. The suspect however notices that the PDF printout of the essay is damaged (“gooutputstream”). He assumes it’s Homeland Security: to damage the file in order to suppress it as evidence in the ICJ or to frame him for conspiracy with the Russians. Left home, 6:30 PM. There are two Hispanics by the bus stop. The suspect's thought about all the injustice he has suffered enables Homeland Security to program him to go into a rage all of a sudden. He calls one of the Hispanic male as he walks away, “Fuck you Mexican.” The other Hispanic male then walks away too. It appears that the suspect has fallen into another trap by Homeland Security. Homeland Security has sent in one of their ugly Hispanic males on skateboard to the bus stop to serve as “bait”. They then let KRN be the psychic and psychologist. After Homeland Security has communicated to her the control center's simulation as to where the suspect will be and what they are planning to control the suspect to do, she tells the detectives where he will be, and predicts that the suspect will shout anti-Hispanic racist comments. The 195 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 detectives have the surveillance agent ready at the bus stop (the Hispanic male who has walked away). Then Homeland Security remotely controls the suspect to shout anti-Hispanic racist comment at their bait (the ugly Hispanic male on skateboard). The detectives cannot then fail to be impressed by KRN's psychic ability and expertise in the suspect's psychology, not knowing that the whole thing is staged. (You should never underestimate the evil inherent in KRN's heart. The woman is truly a psychopath.) The suspect then leaves the bus stop too. He eats noodle at the Vietnamese pho shop. Bus stop again. On bus 282, he leaves another message with W, “More crazy things to say in case the previous three messages weren’t crazy enough.” W calls back two minutes later (from 1:31:00 onward). The details of the conversation are as follows: (1) The suspect confesses he is supposed to be paranoid and develop insane scenarios out of the patterns of visits to his website: such is the women's claim to law enforcement. He then recounts his latest scenario about what is going on in the ICJ. (2) He confesses he has fallen into a Homeland Security trap by being provoked and remotely controlled to shout anti-American slogans last night. Homeland Security is going to show the intercept to somebody hight up in the government to persuade her to give up monopolizing his website. (As you have seen, something like this is actually the case. However, NULND, unlike the detectives, does know that the suspect is under remote control. But she would also know that, with brain-chip technology, it's only possible to remotely control someone to do the things s/he already has the potential to do.) The suspect then confesses that he is not sure if the scenario he has developed is correct because nobody ever says anything to him. That's itself ground for shouting anti-American slogans. (3) The suspect is not sure whether SDW was instructed to post on her Facebook Group in the past two days because she is going to be his “stalking victim” or just in order to scare him. The suspect concludes that, if he should ever get arrested, it would be for vandalism again. (4) The suspect then confesses that people are not quite clear whether he is really insane or just pretending to be insane to cover his ass. Then: It's not in United States' interest to make a bad example of the Secret Society women. Right on the mark, considering what NULND has just done. The suspect however suggests “diversification of images” as a possible US strategy, but it's not necessary for the US to adopt such strategy. “These women are so protected by the state, from local level to the middle level to the upper level... Don't know if the fact that I got my new passport today means that I will have to run away...” (5) The suspect then confesses that Homeland Security is incapable of understanding TMU's profile of the suspect just as a dog can never understand why a human being does what s/he does. “It's like trying to explain human life to a dog or quantum mechanics to a cat...” (1:52:00). “The problem is that the brain inside the Homeland Security people's head is a new kind of brain, like a dog's brain.... My brain is different from most people's, most people's brain is too simple, like a dog's brain.... So when they see a traditional human being, they can't figure out whether he's insane or not insane, they try to fit him into either of these two categories, but he never quite fits either.” The suspect uses the example of “blue”, “red”, and “purple”, which is the same example you will find in one of the footnotes in “Far right”. The suspect is basically portraying himself as a genius over and above the rest of the American population who is portrayed as animals. While this has always been the suspect's point of view, Homeland Security has of course known, from 196 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 the control center's simulation, that the suspect is about to make such a confession. They would have informed KRN about this too. KRN would then analyze the suspect to the detectives: “This is grandiosity thinking typical of Narcissistic Personality Disorder...” While KRN, who suffers NPD with its grandiosity thinking, has again projected herself onto the suspect, she would have also greatly impressed the detectives with her supposed expertise in human psychology. (6) The suspect complains about vandalism being too vague a charge, how he didn't break the window at the law library. (9) About masturbation. (10) “My original contribution is my old theory. In International Relation, the ceiling is not very high, hence it's easier for people to come up with similar ideas....” Policy level ideas, that is. This might be something which NULND has wanted to hear. She might have been startled by the fact that, never having studied European far right politics before, the suspect, within a few weeks, is able to come up with ideas superior to the professional think tank products she has commissioned. There appears to be another volunteer action in the meantime. 7:49 PM, 45.46.7.185, schuld.html, Google, maine.res.rr.com, Orono, Maine. Chatter or testimony about the suspect's “plagiarism”? 4 more visits to images until 10 PM. 10 PM, 98.127.129.150, bresnan.net, Helena, Montana. 98.127.129.150 - - [19/Dec/2015:23:00:04 -0700] "GET /blogs/2014/04/14/last-word-on-mypast-two-month-targeting-and-gang-stalking/ HTTP/1.1" 404 1303 "http://forum.prisonplanet.com/index.php?topic=260320.0" "Mozilla/5.0 (Linux; U; Android 2.3.5; en-us; DROID X2 Build/4.5.1A-DTN-200-18) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1" Here is another volunteer who has joined in on the hunt. When a new volunteer has joined the chatter, like this one, SDW would probably be happily explaining to him or her how this paranoid schizophrenic misogynist “terrorist”, who is prone to become obsessed with women, stalk them, and vandalize their properties, has become obsessed with her and, due to his mental illness, has developed this delusional belief that she has teamed with the other women he's obsessed with to go after him filing false complaints about him to law enforcement behind his back. How she is terrified, etc. The volunteer, then, not knowing that it is all a made-up story and that SDW is herself quite insane, would be so indignant as to volunteer to offer testimony to the detectives. 10:05 PM, himiko.jpg. Is this another testimony about how the suspect has copied other people's painting? 12:04 AM, the Angola person from 9:41 AM this morning came again: 197 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 41.222.237.54 - - [20/Dec/2015:01:04:25 -0700] "GET /scientificenlightenment1/merging_forces.gif HTTP/1.1" 200 6761 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.101 Safari/537.36" Perhaps it is not a decoy. Perhaps he is here to refine his earlier false report to the detectives about how the suspect is a plagiarizer. This is another sign that the detectives are in fact skeptical of all the testimonies which have been turned in to them about the suspect and his website. Meanwhile, the suepct is at Cafe Mak all night. He continues to revise his latest (mostly erroneous) understanding of what is going on in the ICJ. 2:48 AM, he posts on AVFM once again: The point is this: I’m supposed to suffer paranoia schizophrenia and, thus, constantly get severely paranoid after seeing strange patterns on my visitors’ log, and then, out of severe fear, write down crazy things on Internet forums. This, so that I can get myself into troubles soon. But realistically speaking, it’s probably just a restraining order, either from the presiding judge in my current vandalism case, or from another judge, forbidding me from ever writing about these women online, or ever having a website, or ever using the Internet. (This last one is improbable, however.) Sorry, I can’t be exactly sure what sort of troubles I’m supposed to get myself into, I just know that it has to be something along this line. Presumably, this will be in combination with further vandalism charges when I go to court the next time, which might result in my being imprisoned and sent for mental evaluation, so that the prohibition should come after I shall be released, perhaps a year later. It's not clear what the detectives are going to make of the first line of the confession, since this is precisely the Secret Society women's charge. Are the Secret Society women going to say: “He knows he is crazy, he knows he suffers paranoia schizophrenia and is imagining things out of his own head”? 3:59 AM, Telstra Internet, Cannon Hill, Queensland, Australia, 101.165.35.159 - - [20/Dec/2015:04:59:55 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 200 491814 "https://www.google.com.au/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.2.7 (KHTML, like Gecko) Version/9.0.1 Safari/537.86.2" The location indicates that this is another volunteer. More chatter about how the suspect has copied other people's painting? 20 December (Sunday; domain change) 198 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 After Cafe Mak closes (3 AM), the suspect rides the bus to Westwood. Fearing arrest, he would not even stay in Angela's home. He is at Starbucks there early in the morning. 4:45 AM, he has discovered that a certain Elena Brobonea has added him to her Google circle. Is Homeland Security still trying to manufacture evidence showing him having numerous contacts with Russian secret agents? 5 AM, help chat with Blue Host. Due to all the visits to his website from Prison Planet, the suspect thinks that he had better get rid of his old domain and move to his entire website to a new domain. While he believes that this is best for safety's sake, it might actually be what Homeland Security has wanted him to do for the sake of their new case in the ICJ. Could it be that Homeland Security wants it (is programming him to do this) in order to produce new evidences to erase the original evidences about the suspect’s website (which contradict Homeland Security’s original false profile of the suspect as uneducated and a plagiarizer). By 7 AM, the suspect has finished revising his scenario one more time. Here is the result: EKT came in early November called on by the Secret Society. EKT responded to the women’s cry – on the basis of Homeland Security’s false profile of me. She has responded probably really because of the previous ICJ trial and the coming election in France. TMU’s profile contradicts DHS’ profile, and, if TMU’s profile is allowed to reign supreme, the whole problem wouldn’t even arise, but DHS’ is legally more authoritative. At first, the US resisted by claiming EKT was not allowed to respond to the Secret Society’s invitation because I wanted to use this opportunity to show her my new writing on Le Pen. The Russians however wanted to see what the Americans were hiding. But no. Paris attacks on 13 November have however changed things: both the French and the Russians were able to obtain my essay on Marine Le Pen. The US and the Russians went to court (ICJ). US: EKT is using this opportunity to read my writings. Conspiracy. The debate is on whether I have conspired with EKT. Homeland Security is in charge of “collecting evidences” from me. So far correct. But then the suspect begins to err. By the end of November, no evidences for conspiracy. EKT began developing new plans because the Russians have concurred with me that they could make bad examples of the Secret Society women and broadcast this in Russia in order to obtain a concrete example to (1) expand their ideological support for the European far right movement and (2) persuade their own liberal women (like Pussy Riots) not to be attracted to Western feminist culture. To do this, Russia claimed it suspected that the DHS profile was false and that the Secret Society cried false alarm. United States 199 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 resisted the Russian plan. The United States did not want its liberal image to be damaged in Russia. But the US could only do so by affirming the DHS profile is correct (that I am the stalker and the women my victims). EKT then: Okay, then, I have the right to monopolize this guy’s thermodynamic interpretation of history. If so, EKT can found a New Feminism; although, without bad examples to back it up, she can still establish it entirely as “Russian brand” without America being able to respond. I began developing, independently, ideas on how Russia can expand its ideological justification for supporting the European far right. December 7 to December 9, I wrote “US response”. EKT: okay, I shall monopolize this as well. You are not allowed to implement his ideas, neither defend yourself, nor destabilize the far right, nor influence the far right. Now you can’t respond in any way to European far right since he has considered all possibilities. US changed plan. US shall deny DHS’ profile as correct and affirm TMU’s profile instead. Evidences are now collected to show that I don’t fit DHS’ profile. Past midnight, December 15, US deceives the Secret Society women into copying my thermodynamic interpretation of history and giving it to EKT to monopolize. Afternoon, December 15, conversation with W. (“EKT is here, wants to make a bad example of the women.”) US establishes that I wasn’t conspiring with EKT and that the women were helping EKT to steal my theory. 11:43 AM, December 16, the US deceives the Secret Society women into visiting my document on Russia’s soft-power through a proxy in Iran in order to enable Iran to intercept it. The US now returned EKT’s favor: Okay, these women are helping you to monopolize his writings. Now, by court order, you are not allowed to implement his idea about how to reform your country. Everything is wrong except this last paragraph. The Russian soft-power document is especially damaging to Russia, since Russia is now forbidden by court order to implement my ideas to reform their own liberals. Unfair, since Russia can come up with similar ideas on its own; it has merely been unable to implement them because their people are so underdeveloped. Unfair, because, although the US can’t find me conspiring with EKT, it can easily persuade SDW to conspire with EKT. Unfair, because the US is trying to cause me to understand the situation. But, then, the US did that in order to demonstrate how I came to a comprehension of the situation. Thus, I wasn’t conspiring with anybody. 200 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 As you have seen, it's in fact the Russians who are trying to demonstrate how the suspect has come to a comprehension of the situation. EKT’s team walks out in anger. EKT is unlikely to obey court order because it’s unfair – it’s all Homeland Security’s fault, and so US fault, in any case – and because reforming her country is more important than obeying court order. She’ll implement all my ideas whether the Russians have developed the ideas independently or whether they have learned them from me. EKT’s determination will result in: (1) the US being forced to respond by making a bad example of the Secret Society women – this is where EKT’s victory lies; at least she can have a bad example to illustrate her point, although at the cost of looking bad for disobeying court order; (2) the beginning breakup of the international legal system. There is in fact no plan, on both the US side and the Russian side, to make a bad example of the Secret Society women. The suspect is overly optimistic to his own detriment. 6 PM, conversation with W. It may be that US wants to erase the previous ICJ trial, or prevent the Russians from getting rid of the “American co-victim” part. The US, per the requirement embedded in the previous ICJ trial, is only allowed to do so if it’s good for the world. The US is thus forced to implement my idea about the diversification of its image, since its liberal image is bad for the world and my New Liberal is good for the world. Homeland Security, not understanding the reason for US decision, decides to obstruct it. This conversation is their evidence that I have orchestrated the whole thing – pretending to be crazy to deceive them, and to cause EKT to come to the women’s aid – so that they can label me the terrorist mastermind in the ICJ record. Is the US planning to bust Homeland Security? The only thing that is correct here is the fact that Homeland Security has started another round of ICJ trial. Homeland Security has by now broken into the control center and is controlling me to fulfill their plan. Homeland Security is determined to defend their false profile of me and to protect the women from being made into a bad example. They will argue that they are doing good for US by defending the status quo. Their strategy: (1) controlling me to fit their false profile of me and using faulty surveillance to fraudulently create evidences showing my conformity to that profile; (2) framing me for conspiracy with the Russians, so that the women can be made into “victims” of my conspiracy with EKT. Homeland Security has thus reopened the ICJ debate by 17 201 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 December saying: New evidences found, previous judgment that the women have conspired with the Russians should be reconsidered. This part is more or less correct. Homeland Security begins its operation. 17 December, past midnight, Homeland Security controls me to sign up VK and search for SDW’s profile. 5:20 AM, Homeland Security instructs a member of the Secret Society to pretend to be EKT’s messenger and leave a message on my visitors’ log, framing me for conspiracy with EKT. Homeland Security then tells the women that they will help them get me labeled legally their “stalker” and suppress my right to use the Internet, maybe even help them get me arrested, so that, between 6:30 AM and 7 AM, and between 3:30 PM and 4 PM, the Secret Society women make false reports to law enforcement (Prison Planet). Homeland Security instructs law enforcement to establish me as cyberstalking SDW (VK). Past 8 PM, and past 11:30 PM, Homeland Security instructs SDW to post on her Facebook Group so that I can see them. Cyberstalking established. SDW is euphoric. Homeland Security has so far established me in ICJ records as: espionage for the Russians, cyberstalking women, pretending to be crazy to hurt United States (DHS) and benefit myself. Homeland Security’s purpose is to maintain their false profile of me as an insane, violent, and anti-American cyberstalker while denying anti-American foreign dignitaries from having the right to file stalking claim against me at the same time, and then to dispose of me so that I won’t ever do things to contradict their false profile of me. The only good part about the suspect's confession here is that it will have pretty much prevented Homeland Security from ever establishing conspiracy between him and the Russians. He is, given his awareness of what Homeland Security is trying to do, unlikely to ever believe that any Russian secret agent will come to make contact with him. The Russians will point this out in the ICJ. 18 December, Homeland Security plan’s continues. Yesterday and today, more false reporting to law enforcement about my plagiarizing. Past 11 AM, SDW posts more on her Facebook Group. More evidence for my cyberstalking. Past 5 PM, severe anti-American hatred. Shouted anti-American profanity on the street. This is evidence in the ICJ (my anti-American hatred is evidence for my conspiracy with the Russians), and maybe even to persuade US officials to give up their plan to make bad examples of the women and create a new liberal. 19 December, with W past 7 PM. About this revised scenario. Evidence that I label myself insane in order to cover myself. 202 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Homeland Security is now planning, at worst, for my imprisonment for further vandalism and paranoia schizophrenia (or pretending to be insane), and, at the very least, for my permanent excommunication from the Internet. This is in the real world. Meanwhile, in the ICJ records, it will be established about me: community terrorism, espionage for, and conspiracy with, foreign powers, cyberstalking, and computerhacking. The profile, established through an ICJ judgment and which Homeland Security will pass around the world, will portray me additionally as a plagiarizer, misogynist, and racist (white supremacist). The totality of Homeland Security’s profile of me, justified through an ICJ judgment and known only to diplomatic services around the world and not to the general public, is thus: misogynist, white supremacist, plagiarizer, computer-hacker, stalker, cyberstalker, anti-American terrorist, spy for enemy states, vandalizer, violent, delusional, extremely clever at labeling himself insane in order to cover his paranoia schizophrenia, sexually perverted, extremely malicious and pathologically deceitful (anti-social). Most importantly, many of his writings are not his works, but given to him by the Russians so that he can pretend to be academic. Meanwhile, those women who have intended to work with Russia to harm the United States will be established, through an ICJ judgment, as innocent victims of the conspiratorial malice between the Russians and the suspect and of the sexist American system. Homeland Security is thus trying to use the ICJ system to justify the opposite of reality as reality. Now, back to the Secret Society's operation. 4:52 AM, 31.24.11.123, Iway AG, humandispersal.html, Google CH, Bern, Switzerland. More testimony/ chatter (plagiarism). 5:39 AM, massive indexing, “spbot”, Digital Ocean, New York. 6:14 AM, dynamic.hinet.net, Kao-Sung, 125.230.210.93 - - [20/Dec/2015:07:14:55 -0700] "GET /scientificenlightenment1/higgsfield.jpg HTTP/1.1" 200 44655 "https://www.google.com.tw/" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" More chatter (plagiarism). 10:44 AM, 24.163.83.42, nc.res.rr.com, Durham, North Carolina. 24.163.83.42 - - [20/Dec/2015:11:44:44 -0700] "GET /scientificenlightenment1/schuld.html HTTP/1.1" 200 25700 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/537.86.3" More chatter (plagiarism). 11:05 AM, 86.179.205.4, socrates335.html, btcentralplus.com, Manchester, UK. 203 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 86.179.205.4 - - [20/Dec/2015:12:05:59 -0700] "GET /scientificenlightenment1/socrates335.html HTTP/1.1" 200 33272 "https://www.google.co.uk" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:43.0) Gecko/20100101 Firefox/43.0" More chatter (plagiarism). 12:50 PM, 204.13.200.200, trustwave.com, proxy, Chicago. 204.13.200.200 - - [20/Dec/2015:13:50:20 -0700] "GET / HTTP/1.1" 200 6312 "http://www.bing.com" "Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET CLR 1.0.3705; .NET CLR 1.1.4322)" What is this about? 1:34 PM, 1.186.48.67, christiandogmaticsB1.html, from TranslatorCV.htm, dvois.com, network sharing device, Mangalore, India. Yet, the visit to TranslatorCV.htm is nowhere found on the log! 1.186.48.67 - - [20/Dec/2015:14:34:53 -0700] "GET /christian_dogmatics/christiandogmaticsB1.html HTTP/1.1" 404 638 "http://www.enlightenment1998.com/TranslatorCV.htm" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" 1.186.48.67 - - [20/Dec/2015:14:34:53 -0700] "GET /favicon.ico HTTP/1.1" 404 604 "http://www.lawrencechin2011.com/christian_dogmatics/christiandog maticsB1.html" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" This could mean that the person is accessing the Secret Society's cache of the suspect's website and then visits the suspect's actual website from there. However, the IP address will show up later, on 1:52 PM, 1:54 PM, and 1:59 PM, which seems to indicate that it's a robot. 1.186.48.67 - - [20/Dec/2015:14:52:50 -0700] "GET / HTTP/1.1" 200 554 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 1.186.48.67 - - [20/Dec/2015:14:52:50 -0700] "GET /favicon.ico HTTP/1.1" 200 359 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 1.186.48.67 - - [20/Dec/2015:14:54:04 -0700] "GET / HTTP/1.1" 200 2981 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 1.186.48.67 - - [20/Dec/2015:14:54:04 -0700] "GET /dot_clear.gif HTTP/1.1" 404 606 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 204 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 1.186.48.67 - - [20/Dec/2015:14:54:16 -0700] "GET /dot_clear.gif HTTP/1.1" 404 606 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 1.186.48.67 - - [20/Dec/2015:14:59:13 -0700] "GET /dot_clear.gif 1601HTTP/1.1" 404 606 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 1.186.48.67 - - [20/Dec/2015:14:59:15 -0700] "GET /favicon.ico HTTP/1.1" 304 162 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 1.186.48.67 - - [20/Dec/2015:14:59:34 -0700] "GET / HTTP/1.1" 200 425 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36" 1.186.48.67 - - [20/Dec/2015:14:59:34 -0700] "GET /favicon.ico HTTP/1.1" 200 359 "http://www.lawrencechin2011.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36" We shall dismiss this IP address. However, if it's a real visit from the Secret Society, the implication would be enormous. Meanwhile, the suspect. He is in Starbucks all early morning working while listening to Carolin Kebekus, whom he has discovered for the first time. When he is done, past 9 AM or so, he jokes to himself by saying, in German, he is a “Ninja Terrorist out to xxxx Americans.” He jokes it to a stranger as well. This has presumably become Homeland Security's evidence to support their case: that the suspect is prone to support America's enemy, which is at least circumstantial evidence for the suspect's conspiracy with the Russians and FN. The suspect then rides the bus to church. Because he is carrying a lot of things (having his jeans with him), he wants to wait for the coffee hour. Suddenly, severe panicking, severe fear. (Programmed.) Convinced that he has to escape. Almost broke down. Left the church. He gets on the bus, shaking and trembling while under surveillance. This is presumably the whole reason why Homeland Security is currently controlling him to go into severe panicking: they will submit the surveillance showing him shaking and trembling to the ICJ to support their false profile of him as suffering paranoia schizophrenia. The suspect comes to Starbucks, Normandie, and proceeds with domain change. Calmed down. By 1:40 PM, enlightenment1998.com is pointed to public_html. By 2:11 PM, the front page of the suspect’s original website is gone. His website has at last disappeared. But the Secret Society will not stop visiting his old website, however. 2:17 PM, 192.95.47.204, descartes202.html, Google, OVH, Montreal. This is proxy. 205 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 192.95.47.204 - - [20/Dec/2015:15:17:42 -0700] "GET /scientificenlightenment1/descartes202.html HTTP/1.1" 404 635 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" This volunteer is supposed to offer false testimony about the suspect's plagiarism. But the chapter has already disappeared. Meanwhile, the suspect spends the whole afternoon in Starbucks working on his new domain. 5:01 PM, the suspect posts his new scenario on AVFM. He prefaces it with this: I have spent several days refining the latest delusions I have developed. However, the following delusion is quite exciting to me, I’m compelled to share it (just in case…), and hopefully it can serve to further discredit me, if there is still any need for that. What’s most important is that the following is probably not even intelligible to everybody, let alone striking anyone as crazy and ridiculous. The delusions concern what has happened behind the suspect’s back from late November until now. I don’t claim complete confidence in the correctness of the delusion at all. It’s rather tentative. Upon any discovery of new evidences, the scenario will be subjected to revision. It's not clear whether law enforcement detectives would be allowed to see the posting for themselves. Presumably, the Secret Society women will have the right to censor parts of the whole posting before turning it over to the detectives, who thus are permitted to see only a distorted version of the suspect's posting. After partial censoring, the posting will look more like evidences in support of the Secret Society's false profile of the suspect. The women will tell the detectives that this is evidence that the suspect, as he is supposedly obsessed with the Secret Society women, is prone to develop bizarre delusion about how they are involved in a government conspiracy to go after him. Past 6 PM, the suspect talks to W in front of Angela’s house (from 2:16:45 onward). Here are the details: (1) W's answering machine is still on. (2) The suspect: “Nervous breakdown this morning. The vandalism case is their only way to get me, the women will be going to the judge, who is very sexist.” W: “Homeland Security is not worried about a few broken windows.” “That's not what I was talking about.” “They are going to focus on the vandalism case.” “Homeland Security does care whether I get on the Internet. For I could disprove their false profile of me that way.” (3) The suspect then complains about how he can't escape the country, not having money. (4) He expresses fear for being plagiarized. But who is going to plagiarize him? The Russians? That's not something to worry about. But if it's KRN, then he has to worry about it. W: “I wouldn't worry about it... It wouldn't have any external effect...” KRN will presumably analyze the intercept of this conversation for the detectives in such wise: “He 206 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 plagiarizes others but then worries about being plagiarized by others. That's how he projects himself onto others.” Thus will have KRN projected her own tendency to project herself onto others onto the suspect. (4) The suspect then expresses awareness that his cousin Evelyn is still involved with the Secret Society. (5) The suspect then expresses doubt whether the US is trying to erase or activate the previous ICJ trial. W: “You worry too much because you have too much free time...” That's hardly the case. The suspect has to worry about it because his fate hinges on this ICJ trial. (6) The suspect: “Everybody is telling me to run away only in order to encourage me to get myself into troubles... The same with what you have said about 'Red Herring'”. Then Angela suddenly cuts in (2:30:00). The suspect hangs up with W early. Angela leads the suspect into her house. He burns DVD 500 CP while sleeping. It is merely past 7 PM. Meanwhile, visits continue to come to the suspect's old website even though it has already disappeared. We can be certain that the majority of the visits are volunteers for the Secret Society's project. Here are the more notable among them. 6:29 PM, abhsia.telus.net, Calgary, Alberta, 204.191.93.116 - - [20/Dec/2015:19:29:34 -0700] "GET /scientificenlightenment1/injuredleg.jpg HTTP/1.1" 404 632 "https://www.google.ca/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.81 Safari/537.36" 204.191.93.116 - - [20/Dec/2015:19:29:41 -0700] "GET /scientificenlightenment1/descartes202.html HTTP/1.1" 404 635 "https://www.google.ca/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.81 Safari/537.36" This one is notable because it looks like a follow up on the 2:17 PM visit. 6:38 PM, bbtec.net, Soft Bank, Japan, 126.207.253.186 - - [20/Dec/2015:19:38:20 -0700] "GET /1/chinesepatriarchy220.htm HTTP/1.1" 404 619 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/600.7.12 (KHTML, like Gecko) Version/8.0.7 Safari/600.7.12" 7:10 PM, codetel.net.do, Santo Domingo, Dominican Republic, 200.88.158.104 - - [20/Dec/2015:20:10:00 -0700] "GET /scientificenlightenment1/saxonwarrior.jpg HTTP/1.1" 404 634 "https://www.google.com.do/" "Mozilla/5.0 (Linux; Android 5.0.1; SGH-I337M Build/LRX22C; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/46.0.2490.76 Mobile Safari/537.36 GSA/5.7.14.19.arm" 8:39 PM, preklad39.elsatnet.cz, Ceske Budejovice, Czech Republic, 207 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 81.90.168.39 - - [20/Dec/2015:21:39:14 -0700] "GET /scientificenlightenment1/germaninvasion.html HTTP/1.1" 404 637 "https://www.google.cz" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0" 11:58 PM, ww.hibikino.ne.jp, Softbank BB, Kitakyushu, Fukuoka, Japan, 118.103.54.80 - - [21/Dec/2015:00:58:04 -0700] "GET /1/yangshaototalview.jpg HTTP/1.1" 404 616 "https://www.google.co.jp/" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" This one is notable because it looks like a follow up on the 6:38 PM visit from Japan. 12:28 AM, austin.res.rr.com, Austin, Texas, 70.114.198.125 - - [21/Dec/2015:01:28:46 -0700] "GET /scientificenlightenment1/genealogy_of_morals.htm HTTP/1.1" 404 641 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.80 Safari/537.36" 1:18 AM, telecomitalia.it, Fragagnano, Italy, 80.19.125.154 - - [21/Dec/2015:02:18:16 -0700] "GET /scientificenlightenment1/capra222.html HTTP/1.1" 404 631 "https://www.google.it/" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" 1:30 AM, tukw.qwest.net, Seattle, Washington, 174.21.195.146 - - [21/Dec/2015:02:30:17 -0700] "GET /gallery/himiko.jpg HTTP/1.1" 404 611 "http://www.bing.com/images/search? q=Himiko+Yamatai&view=detailv2&&id=721AC7A6884C534DC7D42760C634F5D0FFA7E8 EB&selectedIndex=11&ccid=n0owTdGj&simid=608036424982004689&thid=OIP.M9f4a304dd 1a378f4a73d8cd15ccc6e4fo0&mode=overlay" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko" 3:23 AM, wlan.uni-bonn.de, Rheinische Friedrich-Wilhelms-Universitaet Bonn, North RhineWestphalia, Germany 131.220.199.165 - - [21/Dec/2015:04:23:08 -0700] "GET /scientificenlightenment1/capra.html HTTP/1.1" 404 628 "http://images.google.de/imgres? imgurl=http://www.lawrencechin2011.com/scientificenlightenment1/cosmicdance2.jpg&imgrefu rl=http://www.lawrencechin2011.com/scientificenlightenment1/capra.html&h=274&w=400&tbn id=GuiEFLDFlOS73M:&q=pion+proton+collision&tbnh=144&tbnw=210&docid=7FmrBabauZ 208 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 JZFM&usg=__mi0WKhD-u21eAc2_x1iBu1mxLkQ=&sa=X&ved=0ahUKEwic-L-w6zJAhXIiywKHUCPAHgQ9QEIHzAA" "Mozilla/5.0 (Linux; Android 5.1.1; SAMSUNG SMJ500FN Build/LMY48B) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/3.3 Chrome/38.0.2125.102 Mobile Safari/537.36" All these volunteers are supposed to produce testimonies for the suspect's plagiarism, presumably. But now that the site is not there anymore, what? 21 December (Monday) The suspect wakes up 2:30 AM or so in Angela's house. He is unable to sleep further. Began writing. After 6 AM, left the house. Ate in the Korean restaurant near his former home. Then, Starbucks, Vermont. The suspect suddenly discovers that the index page of his website at the new domain is removed. He is shocked. Somebody has actually hacked into his website to remove it. Suspected it is the work of the Secret Society women. But why? Very upset. Changed password. There always seem to be surveillance agents nearby. Concerned, because he believes that SDW might have obtained his password from Homeland Security surveillance. By 10:25 AM, the suspect has restored the index page. He finds an international relation discussion forum (World Affairs Board), and, there, in order to advertise his new domain, posts a short message with links to his two essays the “Marine document” and the brand new “Far right”: “Rumor has it that court ruling has banned certain far right parties in Europe from implementing the ideas contained in these two essays.” As you can see, the suspect is somewhat correct here. He then posts on AVFM. One of the things that really drive you crazy is strange coincidence. Get this. This morning, on the street, I saw this crazy homeless man shouting how society has wronged him by making him crazy and homeless. He vowed revenge, and shouted how he will one day create a “worldwide ‘Super Ninja Terrorist Group’ to find and capture Americans around the world to dig their eye balls out and market them in Mongolia”. It was kind of funny. There were several people on the sidewalks and everybody just ignored him. So I too. I just thought it kind of strange: for I have been thinking all day long yesterday and today about how angry I am for having to be either mentally insane or disposed of “in the system” or both, just because there is that God-damned thing dangling in between my legs which this society doesn’t approve. But there can’t be any pranks here, and the homeless man really does look real. But I thought: maybe the homeless man is really prophesizing, a prophet. For now, it looks like he is just blaming what is his own fault on society, but maybe he really is a great prophet. I mean, this is a joke in today’s world, but history books are filled with prophets who look like junks. In any case, like what I have said, strange coincidence. 209 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Although I’m happy that the great people here are beginning to ignore my delusional rambling, for the following I do need somebody’s input. A certain logical paradox has emerged during my delusional episode today, which causes me to be stuck in thinking. Delusional content: I’m a dutiful citizen working hard (doing my citizen duty) to protect the clandestine op special division of the Department of Homeland Security from suffering harm (i.e. criminal prosecution, punishment for negligence of duty, or political struggle with rival federal agencies), but I can only do so if I hate them and hate this America country. But only if unconsciously. As soon as I become conscious that, by hating DHS and America, I’m benefiting DHS and America, then I will no longer benefit them both by hating them both. But as soon as I am conscious of this consequence as well, then I’m benefiting them both again, and by being conscious of this further consequence, I’m not benefiting them again, ad infinitum. So, do I benefit them or not, at this moment? That’s the question. Basically, my delusional mind is trying to work out this delusional scenario: Homeland Security is benefiting from me because I have (according to them) intended to conspire with others to harm them. I therefore must hate them in order for them to get legally compensated. But if I intend to hate them in order to help them get compensated, then they can’t get compensated because then they will be conspiring with me. But if I know this consequence? Ad infinitum. My delusional mind tells me that, in this delusional episode, DHS is likely to go to court to appeal to “original intent”. What is his “original intent”? Does this guy wish us dead or not? But then I wonder what the judge would think: given how ugly the people inside Homeland Security are, how can any human being not wish them dead? Human beings are not born with the capacity to stuff dog shit into his mouth and truly, truly, enjoy the taste. That’s the paradox. It is clearly Homeland Security which has remotely controlled the suspect to post this in order to boost the Secret Society women's new case at law enforcement and their own case at the ICJ. How? The Secret Society women must be showing the detectives TG's surveillance video showing a man, face covered, breaking her windows. With the “DRCRR warning” or Homeland Security warning in hands, they want to convince the detectives not only that this man is the suspect, but also that the suspect's motivation is to target particular white females and terrorize them. The women are trying to solidify their case against the suspect into “domestic terrorism” and “hate crime against white women”. This is why Homeland Security has been using the control center to program the suspect to come up with this joke “Ninja Terrorist”. And so the detectives would read the above posting and take in the Secret Society women's analysis that the 210 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 suspect has had the habit of sneaking around at night with his face covered like a ninja and vandalizing the properties of the white women with whom he has been obsessed and whom he is stalking in order to terrorize them. The suspect leaves Starbucks, past 1:30 PM. The suspect will days later discover that a small text file has been inserted into the folder /gallery on his website. The text file reads: Objective Concept Objective Concept. OBJECTIVE CONCEPT registered [company], number: 500 790 910, 13/15 rue de Chevreul 94700 Maison Alfort European Union State of France Our fax: 09 59 11 52 26 . Email Box : contact@officecopyright.com. To leave us a message, please fill out the form below, an email will be sent to us automatically and we will contact you as soon as possible. The file is dated 9 September 2015, 8:09 AM, like the rest of his files, but he has never seen it there before. This Objective Concept (officecopyright.com) is an intellectual property company in Paris. Did Homeland Security instruct the Secret Society women to find somebody to hack into the suspect's website to insert this file in order to frame him for conspiracy with FN and the Russians? Perhaps the file is inserted into his website right after the suspect has, last night, expressed fear over being plagiarized: it looks like something which he would want given his fear. Given the suspicion of “conspiracy”, both the suspect's website and his copyright records at the Library of Congress would be suppressed as evidence in the ICJ so that these could no longer contradict Homeland Security's false profile of him and jeopardize their case. (Homeland Security might have legally justified their actions with the suspect's admission last night “Homeland Security doesn't want me to get online and contradict their profile of me”. Homeland Security would argue in the ICJ that the suspect's attempt to contradict their false profile of him should be considered “terrorist harm” against them – yes, if you lie about a terrorist suspect and the suspect tries to prove you wrong, he is considered to have conducted terrorist attack on you! – so that, per UN Resolution 1373, they are legally entitled to neutralize the suspect by doing something to prevent his Internet activities from entering into the ICJ as evidence to contradict their case.) To this day, the mystery of who has hacked into his website and why and where this text file comes from has never been solved. 211 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Meanwhile, the Secret Society continued their operation. Here is the time line together with the suspect's actions. 8:10 AM, 204.13.200.200, trustwave.com, Chicago, Illinois. 204.13.200.200 - - [21/Dec/2015:09:10:22 -0700] "GET / HTTP/1.1" 200 6069 "http://www.bing.com" "Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET CLR 1.0.3705; .NET CLR 1.1.4322)" The same robot was here yesterday, you recall. Note the HTTP code “200”: this robot is able to access the index page. This means that the index page is removed shortly before the suspect has arrived in Starbucks, maybe between 8:10 AM and 9 AM. It would appear that Homeland Security has instructed the Secret Society women to not only insert the text file in the suspect's website to frame him but also to remove the index page. Why, though? What is certain is that, from now on, there would be no evidence in the ICJ from the suspect's website to contradict Homeland Security's false profile of the suspect as uneducated and a plagiarizer. 10:25 AM, the suspect has restored the index page. 11:31 AM, the suspect has posted on World Affairs Board. 1:28 PM, he has posted on AVFM (“Ninja Terrorist”) 212 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 After the suspect has left Starbucks, he first comes to Bail Hot Line. He needs to ask questions about how to obtain permissions to leave town. He then goes to the superior court, to check whether there is any TRO filed against him. No. Chrysalis. The suspect checks his website from the computer there. Checked his document’s hash value, in case it has been swapped. Then, the public library. He posts more on AVFM.11 The suspect notices that, on 3:28 PM, somebody has posted “Losing my grip” on AVFM.12 The person's description of himself looks so much like a description of the suspect, with just one difference: the person describes himself as “lazy”, while the suspect is never “lazy”. It would 11 This is what he has posted, a followup on his “scenario”: “Revision/ refining of the latest delusional episode: 'But the US could only do so by affirming the DHS profile is correct (that the suspect is the stalker and the women his victims). PRD then: Okay, then, I have the right to monopolize this guy’s theory. If so, PRD can found a N FEM; although without bad examples to back it up, she can still establish it entirely as “Russian brand” without America being able to respond.' 'The suspect began developing, independently, ideas on how Russia can expand its ideological justification for supporting the European FRM. December 7 to December 9, he wrote “US response to European FRM”. PRD: okay, I shall monopolize this as well. You are not allowed to implement his ideas, neither defend yourself, nor destabilize FRM, nor influence FRM. Now you can’t respond in any way to European FRM since he has considered all possibilities.' “Refined: 'But the US could only do so by affirming the DHS profile is correct (that the suspect is the stalker and the women his victims). PRD then: Okay, then, I have the right to monopolize this guy’s theory plus the illustrating examples, i.e. the lifestories of these bad women. Under “victim confidentiality”, that is: since PRD is also “victim”, she will have the right to tell her compatriots about this case if she likes, but the US will have to observe her, and other victims’, confidentiality and not advertise the matter without their consent. If so, PRD can found an NFEM without America being able to respond.' 'The suspect began developing, independently, ideas on how Russia can expand its ideological justification for supporting the European FRM. December 7 to December 9, he wrote ‘US response to European FRM’. PRD: okay, I shall monopolize this as well. You are not allowed to implement his ideas, neither defend yourself, nor destabilize FRM, nor influence FRM. Now you can’t respond in any way to European FRM since he has considered all possibilities. Meanwhile, I can justify our ideological support for European FRM with further illustrating examples.' “So the conclusion of this delusional episode is that the US has now obtained exclusive 'patent' or 'copyright' over the suspect’s analysis plus the illustrating examples, i.e. it has somehow, through the application of international laws, “patented” the lifestories of some of its citizens, like the way a company can patent the genetically mutated species it has designed and created. Any other country which shall broadcast the story without US consent will be violating international laws governing intellectual property, in a way. Bizarre delusion, huh? So what happens, then, when Homeland Security comes to rescue the women from this plan? Are they and the women going to make a bad example of the suspect in retaliation? But there is nothing to patent there. Everybody already knows that bad people are always those with that thing in between their leg. The story is hardly worth 'patenting'. “Enough, back to reality.” 12 This is what the guy has posted: “I'm 31, broke, deeply in debt and have no life skills other than being good at poker (but not good enough yet to make a living). I'm injured and can't do a lot of jobs. I'm incredibly lazy. My parents are unsupportive of my poker ambitions, and they live in a different state so I can't easily move back home. They make life very difficult for me if I ask them for any small favors (they always have). This made me highly 213 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 seem that law enforcement has put this up waiting for the suspect to respond. They want to verify that their profile of the suspect is correct. This is sign that law enforcement is conducting their own investigation of the suspect independent of the women’s reports about him, for the profile is quite realistic. It seems also to indicate that law enforcement has ignored the Secret Society women’s request for “victim confidentiality” and is investigating them as well. It seems to indicate that the TMU detectives are training the detectives (namely, the Hermosa Beach/ Pasadena and San Diego detectives plus the Manhattan Beach detective from the previous case already closed per the women's request) on how to properly conduct criminal profiling and investigate the supposed “victims”. This scenario is indicated by the fact that, although the description seems like an attempt to accurately describe the suspect (rather than falling prey to the women's “simple stereotyping”, i.e., demonizing), there is a certain shallowness to it, which indicates that it is devised by somebody not well-educated and not versed in human psychology, who is therefore probably one of the detectives that are being trained. Unversed in human psychology, the detectives are also inclined to conclude that the suspect is “lazy” when they see him only interested in doing what interests him (writing and reading) but having little desire to do “what he ought to do” (i.e. get a job). If you read Ortega y Gasset's La rebellion de las masas, of course, you will recognize that the suspect would actually be considered a “nobility” by the philosopher, someone who is always making strenuous demands on himself in order to transcend his current self and current situation. But the detectives, being uneducated common people (“Mass Men”), have little comprehension of what “transcendence” means. For them, life is just about “making a living”, and not much more. The trainer from the TMU, however, knows better about the suspect, and so has probably instructed the detectives, “If you disagree, why don't you ask him. He's pretty honest, as you see. If he is really lazy, he'll admit it.” Hence the posting. 4:41 PM, the suspect has posted a reply to “Losing my grip”. “Not lazy, but just distracted.” Feedback to law enforcement’s profiling. 4:33 PM, the suspect posts on AVFM again.13 The Secret Society women would present this posting to the detectives as another piece of evidence showing the suspect to be in the habit of imagining the women he’s obsessed with to be involved in some strange government conspiracy. From 6 PM onward, several people begin clicking on the suspect’s links on the World Affairs Board. Apparently, now that Homeland Security has succeeded in barring the suspect's website from entering into evidence in the ICJ, they can mobilize the Secret Society women to falsely report on his writings without worrying that the other parties – the TMU/ CIA team, the Russians, and the FN – might debunk the false portrayal of the suspect (as a plagiarizer and as highly independent but I have a tough time being social with people. They largely ignored me or teased me when I was a small boy so I have a deep fear and distrust of authority figures. That's probably why I can't keep a job. “I don't really know where to turn. I have a high IQ, I'm incredibly honest and moral, but I'm just not good at living life. I'm inches away from going to a mental institution or overdosing on drugs and just ending it all. I hate to take the coward's way out, but I'm losing faith in my ability to survive in this world. Thank you for any supportive words.” 214 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 stupid and uneducated) by showing his writings to the judges. The Secret Society women, thus, getting wind of their new mission, and informed by Homeland Security that the suspect has now a new domain and has just placed links to his latest essays (the “Marine document” and “Russian-supported European far right”) on an Internet forum, instructed their volunteers to go pretend to find the essays over there. Thus, 6:43 PM, wa.comcast.net, Sammamish, Washington, 76.121.188.161 - - [21/Dec/2015:19:43:06 -0700] "GET /farrights/farright5_noftntb.pdf HTTP/1.1" 200 501700 "http://www.worldaffairsboard.com/showthread.php? t=65401&page=2&p=1000962" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" This is “Far right”, its first ever visit! Then, 6:51 PM, Talk Talk, Maidstone, UK, 2.97.174.116 - - [21/Dec/2015:19:51:44 -0700] "GET /lepen3/lepen3l.pdf HTTP/1.1" 200 714742 "http://www.worldaffairsboard.com/showthread.php?t=65401&page=2&p=1000958" "Mozilla/5.0 (Windows NT 5.1; rv:43.0) Gecko/20100101 Firefox/43.0" The “Marine document”. Then, 8:23 PM, dynamic.rev.eftel.com, Trinity Gardens, Australia, 202.61.229.11 - - [21/Dec/2015:21:23:36 -0700] "GET /farrights/farright5_noftntb.pdf HTTP/1.1" 200 501700 "http://www.worldaffairsboard.com/showthread.php?t=65401&page=2" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" You can be sure that they are here to offer their testimonies to the detectives saying that the suspect has plagiarized and rambled racist and misogynist garbage in these essays, and probably demonstrated his intellectual ineptitude and uneducation. The testimonies will then be intercepted into the ICJ as evidences in support of Homeland Security's case. Meanwhile, the suspect has gone to Chrysalis, and, after men’s group, he comes to Starbucks, Vermont. He calls Angela. Suddenly, he begins imagining – evidently per Homeland Security's remote programming – that the German Lady might have a plan to plagiarize him. He immediately writes an email to W. It is 8:24 PM: 13 This is what he has posted: “Now, back to delusion: The logic of the delusion would certainly lead you to think that the Homeland Security plan to rescue the women indeed includes a plan to allow the government to make a bad example of the suspect. Since the suspect is an immigrant from Eurasia, he would be a bad example to prove that not all multiculturalist acceptance of immigrants is good idea; some immigrants are touted as good but in fact bad, like those from a certain part of the Eurasia continent. (This will be used as part of US response to European FRM.) Since the suspect hints at antiAmerican hatred on a men’s right’s forum, his bad example will also make a bad example of MRM, giving feminists more ammunition to denounce MRM as not just bad for women, but also bad for society and nation. Then, when you stand back, you see that the point of the whole exercise is to establish the suspect as being overly engrossed in bizarre scenarios about government conspiracy and not having time to do other productive things, etc. Like John Nash during his delusional periods. Ah so! Mission accomplished.” 215 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 W, I'm getting very worried. As I reflected on the matter, it's quite clear that the German Lady's crowd has run out of option for exterminating me. Their only solution is to plagiarize me, i.e. to create many different versions of my “International Court story” so that everybody will get quite confused about whether anybody has really written it. The thing is that the last time I tried to copyright my story was August last year, and the application was rejected, for the first time in my life, most likely because of the German Lady's meddling. I'm just letting you know this, because I'm gonna have to spend more time copyrighting my work, and more money on this. I have gradually fallen into their trap, by changing the domain name of my website, by distancing my other Internet forums, and by hiding my international court story. It's the German Lady's idea. She will plagiarize my international court story. I simply don't know why she is so concerned with this. At least she, among all the women in her group, has somewhat of a functional brain. Why doesn't she understand that she is the only person who has ever bothered to read the story about her? Her crowd is obviously getting information from Homeland Security about the current course of the International court trial. Otherwise she will never dare to do this. She must have been told that what she is doing is authorized by ICJ judgment. Ha! As you can see, only the last sentence is correct; the rest is all wrong speculation. It would appear that Homeland Security is simply controlling the suspect to say things which might end up confirming the Secret Society women's false profile of him with law enforcement, and so supporting their own case in the ICJ. KRN will certainly analyze the email to the detectives: “You see, he is always suffering paranoia delusion about the women he's obsessed with. He actually believes we will plagiarize him! Furthermore, you see that, after he has plagiarized others, he projects his own bad characteristics onto others and fears that others might plagiarize him.” 9 PM, the suspect has decided to work on the copyright of all his writings. His fear has finally motivated him to do so. (He has not copyrighted his works for a year and a half due to lack of funds.) But he can’t get into his account at the Copyright Office. Startled. He writes another email to W. It is 9:13 PM, W, this looks like their tactic. They are thinking of filing a restraining order against me on the basis of my postings on Internet forums. Then I will have to deny that this is my posting. At which point, instead of pursuing it, they'll just forget it. Then, they will have many people write stories similar to mine. But they'll make sure that I don't see these anywhere, that I won't not even be aware of it all. Then one day, in case I pull out my story about the German Lady again, everybody will have already seen something like it before. That's how they are going to discredit me! It looks like an ingenious plan, huh? 216 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 Obviously, they got professionals helping them. By “professionals”, the suspect means the SVR officer whom EKT has sent to the Secret Society women. The suspect is all wrong, including this one. After the stunt on 16 December, the Secret Society women will certainly not have any more contacts with EKT's crew, now knowing that they have been considered by somebody in the US government as conspiring with hostile foreign agents to harm the US. In fact, angry about this, they are eager to make the suspect a conspirator with foreign powers to harm the US: in their mind, they are the righteous party and they have suffered injustice by being conceived of otherwise. But, since they can't retaliate against NULND, they will, as usual, retaliate against the suspect instead. Just when the suspect finishes his email, a pretty white female, who would turn out to be European, comes in to sit next to the suspect. She is carrying a fashion magazine. Immediately, another black man comes in to sit in front of the suspect. As the suspect marvels at the white female's beauty, she notices it and makes a gesture, “What?” The suspect is quick to avoid embarrassment, pretending that he was staring at her because he thought she was the model on the cover of the fashion magazine which she was carrying. It would appear that he has deceived her, for she retracts her gesture and replies that she isn't the model. She then leaves. The black man sitting in front of the suspect sneers at him and comments on his cleverness, obviously having seen through his trick (pretending to be a retarded person curious about every little thing so as to completely get away with harassing pretty women). It would however appear that the black man is here doing surveillance for law enforcement (the detectives currently being trained by the TMU detectives) and so is already quite aware that the suspect has the habit of pretending to be retarded while approaching pretty white females. The suspect then calls Angela again. He has decided to go home instead of going to Angela's house. It's all because he has to use the Internet. Five hours after their last operation, the Secret Society women are at it again. 1:30 AM, amazonaws.com, Ashburn, Virginia, 54.159.140.131 - - [22/Dec/2015:02:30:24 -0700] "GET /dot_clear.gif HTTP/1.1" 404 1360 "http://enlightenment1998.com/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/534.34 (KHTML, like Gecko) Qt/4.8.1 Safari/534.34" 54.159.140.131 - - [22/Dec/2015:02:31:23 -0700] "GET /sufferingwoman/sufferingwomand.pdf HTTP/1.1" 200 304958 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/534.34 (KHTML, like Gecko) Qt/4.8.1 Safari/534.34" This is most likely LB Admin. Since it takes her merely one minute to find the document she is looking for, she has obviously been instructed by Homeland Security as to which document to fish out. LB Admin is here to offer her testimony as to what the suspect has written about SDW – this, however, might be the only document which the Secret Society will turn over to the detectives in entirety without much censoring – in order to consolidate the Secret Society women's false profile of him, and Homeland Security has to coordinate the process because the evidences which the detective has collected will be intercepted into the ICJ to support Homeland Security's case. 217 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 You can easily guess how KRN is going to analyze the document to the detectives. On the document, the suspect has listed all the personality characteristics of SDW, a core member of the Secret Society, although without identifying her. KRN would presumably psychoanalyze the suspect to the detective in accordance with the previously established procedure (projecting her own personality disorder onto the suspect, including her love of such projection), saying that the suspect, out of his narcissistic personality, has the habit of projecting himself onto the women he’s obsessed with. They would say to the detective: “You will see how he exhibits all these very characteristics which he describes this woman among us as possessing.” Homeland Security will then remotely control the suspect to behave just like SDW while the latter is under law enforcement surveillance so that the detective will definitely believe the Secret Society women's claim that, when the suspect describes any of them, he is just describing himself. This is possible, furthermore, because the detective is forbidden by “victim confidentiality” from looking at SDW's blog, otherwise he would discover just how accurately the suspect has described her, and not himself. The most important thing here is that, on the document, the suspect has described the woman as “dangerous” because “she is like somebody who suffers paranoia schizophrenia” and “will harm others believing that she is defending herself from harm, not knowing that the harm she believes others are inflicting on her is all but imaginary.” The women would thereby persuade the detective to regard the suspect as “potentially dangerous” since he “will harm others, especially the Secret Society women, believing that he is defending himself against harm by them, not knowing that the harm which he believes has been inflicted upon him is all but imaginary, the product of his paranoia imagination.” The Secret Society's operation continues throughout the morning: 2:25 AM, Vodafone, Italy, 5.90.137.145 - - [22/Dec/2015:03:25:18 -0700] "GET /badvisits/5712-43.png HTTP/1.1" 404 614 "https://www.google.it/" "Mozilla/5.0 (Linux; Android 5.1.1; SM-G361F Build/LMY48B; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/42.0.2311.137 Mobile Safari/537.36 GSA/4.4.10.16.arm" This is testimony about the suspect being a computer hacker. 2:40 AM, ipconnect.de, Munich, 87.177.199.47 - - [22/Dec/2015:03:40:55 -0700] "GET /scientificenlightenment1/representation222.html HTTP/1.1" 404 640 "http://images.google.de/imgres?imgurl=http%3A%2F%2Fwww.lawrencechin2011.com %2Fscientificenlightenment1%2Fballistic.jpg&imgrefurl=http%3A%2F %2Fwww.lawrencechin2011.com %2Fscientificenlightenment1%2Frepresentation222.html&h=440&w=400&tbnid=maoCclUwS1 SEvM %3A&docid=EXCGhu0Emf7iDM&ei=Uih5VsXhLcHBsgGlvrDwCg&tbm=isch&iact=rc&uact =3&dur=7062&page=24&start=766&ndsp=31&ved=0ahUKEwjF0qK8o- 218 The third ICJ trial over the suspect Lawrence C Chin November 2015 – February 2016; revised, August September 2016 _JAhXBoCwKHSUfDK44vAUQrQMI8QEwTw" "Mozilla/5.0 (Windows NT 6.1; rv:41.0) Gecko/20100101 Firefox/41.0" This is testimony that the suspect has plagiarized. 3:34 AM, hsd1.pa.comcast.net, Lancaster, Pennsylvania, 174.54.171.168 - - [22/Dec/2015:04:34:15 -0700] "GET /scientificenlightenment1/cellularrespiration.jpg HTTP/1.1" 404 641 "https://www.google.com/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1" Testimony that the suspect is a plagiarizer. 3:56 AM, dynamic.hinet.net, Hsinchu, Taiwan, 1.171.5.59 - - [22/Dec/2015:04:56:02 -0700] "GET /blogs/wp-content/uploads/2013/09/9131358.png HTTP/1.1" 404 638 "https://www.google.com.tw/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36" Testimony that the suspect is a computer hacker. Note the “404” in all these visits. These are visits to the suspect's old domain. Since the detective is forbidden from looking at the suspect's website himself, he would not know – unless his trainer has enlightened him – that the testimonies are not just false, but actually baseless, insofar as the website being reported about isn't even there anymore. For a long time to come, the Secret Society women will continue to make false reports about the suspect's old domain rather than about the new domain, even though the new domain is identical to the old domain. This is because all of the suspect's old postings on the Prison Planet forum have links to pages on the old domain, and these postings constitute the very substance of the claim of “cyber harassment” which the women are making against the suspect. The Secret Society women's goal remains to suppress the suspect's website on ground of criminal harassment of women, and they can only make such claim against the old domain, not against the new domain. They are going to use the old domain as the pretext for suppressing the new domain, and so they must pretend that the old domain still exists. 219