top of page

RECORDINGS


​In Texas you can record a telephone conversation as long as one of the parties on the line knows they are being recorded.
Disclaimer: These recordings will more than likely be hacked to sound differently in some capacity. I can not  say in what way. It has been my experience even after converting several file and replaying them that there differences in the audio quality, background noise, speed of the conversation and some words had been change to sound differently. They could leave it as it is and it sound as it was. I had a  friend tell me that they watched one of my videos and the sound was so low they couldn't hear it. I know I speak loud at times, clear and my punctuation is ok when I am not being affected.
Keep in mind, that this crime is committed in REAL TIME. When we gain a better understanding of what that means then maybe we can reduce  the level of skepticism that may be present for some. What I mean is that they are committing these crimes all day literally (which sounds impossible, but for one person it is. For 25 of more people that log on to a system to dedicate 1 hour to harassing me (and others) while streaming live video and audio of me 24 hours by way of some advanced infrared, Xray, ultrasound or other technology... I am sure it would be fairly less complicated). One of their main methods is criminal voyeurism, which sounds like a difficult task but if you have the money to fund the crime then I am sure that it is not as complicated as it seems.  Consider how  hackers operate in the realm of  cyber financial  crimes and  other white collar crimes that yield substantial profits.
Hackers can hack into a multi-million dollar company and steal thousands of  dollars at a time and not be detected until years later , if that. Imagine having several advanced hackers, working together and  stealing from multiple companies. Procuring financial  means to support their criminal activities would seem like a small feat. The method and means of a REAL TIME crime of this nature means that since part of their strategy to evade detection comes from the added benefit of having multiple assailants. Randomness protects them all.  Individuals do nothing alike. The assailants would not participating in this crime if it were not for profit. What criminal commits crime for leisure  purposes, very few.
wealthy perhaps. Multiple individuals decrease the chances that law enforcement will detect or be able to establish  
these criminals  pattern to trace them and begin an investigation.  The first hurdle that must be jumped and law  enforcement ​must stop waiting and take their crimes seriously.
I listened to the recording again and noticed that some of the audio was altered, there was static which is uncommon for a cell phone conversation (but not if it is being hacked). Also, understand that I am sure what you hear and what I hear will be different. If we were able to hear the audio together then we could discern what was heard and assess it more effectively. Realistically that is not going to occur. I have to work with what I have.
Keep in mind that not all the individuals are members of gangs. If you were going to hack radio waves what would you do? You would find someone that has knowledge about all the intricates of audio engineering technology and other related specialties. This "Cyber Mafia" has practiced because we need to find a way to regulate the areas of technology they are operating and get these criminals off the streets.

Click here to go to next page. They will not allow me to edit paper properly. VIEW THE VIDEOS. 

SAVE TEXAS

 

This website was made before I knew what was happening  - (apologize for not updating it sooner). Before I knew htc were using lasers/sasers and free space systems (which are energy weapons in all regards). Note that one strategy used by these htc criminals has been the circulation of misinformation or terms to aid them in preventing the crime from being addressed.   Consider this before and this one:  http://savehouston.wix.com/saveyourprivacy  after research . 

bottom of page