Académique Documents
Professionnel Documents
Culture Documents
Dear Sir:
Re: Seeking an investigation pursuant to violations of s. 342.1 of the
Criminal Code of Canada; File No. VA15 - 128135
Further to the home visit by yourself and your partner on July 14th in
furtherance of the above-captioned, consider this cover letter /
correspondence a comprehensive description and compilation of evidence.
1
Aggressive disruptions of my computer and Internet access began back in
2002. This criminality was pled in the Amended Statement of Claim:
282. The campaigns acts included, but were not limited to:
[...]
The two main electronic pieces of equipment that are central to modern life
are the television and the computer. Recently, [I] described how the latter
became a target for remote manipulation:
And then theres the criminality hes had to endure relating to his
computer. Hes watched for years as the security services
developed and operationalized various techniques to manipulate
his computer remotely.
1
Emails of research findings were sent to parliamentarians and other public sector
officials in 2007 and 2008. The malfeasance led to the practice of requesting
acknowledgment of receipt of my correspondence to confirm delivery.
2
[]
Over the years, hes witnessed the ability to seize up and crash
the computer, stop files from being saved to disc and shutting off
and turning on the auto spell check and auto correct
functions. And lately, hes experienced the manipulation and
blocking of his Explorers ability to search files on the hard drive.
(i) suspend the copy-paste function. The result is not being able to
capture the intended text so it can be transferred from one place on
the page to another or from one document to another;
(ii) initiate various programs to fill the screen with unwanted windows;
(iii) manipulate the tab command, which has the effect of eliminating
certainty one has that Microsoft Word will work as expected;
(iv) initiate the insert command, which has the effect of eliminating type
as one adds text to a document; and
(v) alter highlighted text the user has selected for elimination or
amendment.
Mr. Kempo, further to your inquiry I did receive both e-mails with their
attachments: 3 for April 30th and 3 from April 21st.
3
Mike Aubry, Supt.OIC, Employee and Management Relations
Section "E" Division
657 West 37th Avenue, Vancouver, BC
Over the course of the preliminary stages of the lawsuit I detected a judicial
bias. When combined with the abuses of power as pled I concluded it was
imperative I utilize my knowledge and skills afforded me by my B.A. Degree
in political science (and philosophy) and LL.B. to discover the conditions and
antecedents that led to the decade plus long systemic malfeasance and why
the Bench was so blatantly favoring the Defendant (findings in Chapter 1).
4
The dissemination went into high gear in August 2007; and lasting until the
end of 2009. By that time I had informed virtually everyone in government
on the federal, provincial and municipal levels. I also got in contact with the
RCMP; which led to several conversations with Superintendent Mike Aubry.
At that time he was at the administrative top of B.C.s Integrated National
Security Enforcement Team Division (I.N.S.E.T.). He referred what I pled
and my research to Ottawa; and in September of that year I was advised the
umbrella agency had launched a formal investigation.
2
http://reformcoalitionofcanada.yolasite.com
5
Two years later I founded an academic institute.3
3
http://cgrc.yolasite.com
6
Other Board members include Erik Anderson B.Com., a career economist,
Charles Relland B.Sc., an Alberta Land Titles Examiner (19 yrs.), Dennis
Shaw B.A., who spent 13 years in the Canadian military and William Morin,
B.F.A., B.A., M.A.. Mssrs. Relland, Shaw and Morin founded, were
presidents or executives of registered political parties on the federal and
provincial levels. Citing these credentials does not fully reflect their
multitudinous pursuits and accomplishments; and their rsums ought to be
reviewed to appreciate theyre all well educated and exceptionally
upstanding members of their respective communities.4 Each is fully
cognizant of the multi-decade abuse of power I endured (including the two
instances of psych ward unlawfulness), what was academically discovered
and that which I pursued both in the Canadian and U.S. courts.
4
http://cgrc.yolasite.com/who-are-we.php
5
http://ccp1.yolasite.com
7
This initiative infuriated those who govern this country because it deprives
them of most political power6:
The CCP has only one item on its political platform - changing the way
government functions to ensure the primary influence on what it does is
Canadians.
I attach two chapters of my research, which you may or may not review. 7 In
the event of the latter, here is an excerpt from the U.S. District Court
pleading that summarizes my findings:
6
Reference Chapter 3: The Unconstitutional Interference With and Criminal
Sabotage of the Emerging Canadian Citizens Party
7
Chapter 1 is summarized in para. 2.21 to 2.25; and Chapter 2 in para. 2.26.
8
had its evolutionary roots back to the inception of Canada as a
sovereign nation in the 1860s. Where the Founding Fathers and
Americans fought a long and costly war to be rid of English
imperialistic rule, their Canadian counterparts fully embraced the
Monarchy. Doing so led to all that was repugnant to the United
States of America being fully embedded in the fabric of Canadas
political system and administration of justice and which has
festered ever since. Extreme political nepotism and patronage
since Confederation and the Liberal Party of Canada having
cumulatively governed for three-quarters of the 20th century led
to a complete consolidation of power and wealth and what he
labeled closet authoritarianism. Inter alia, the Canada-China
alliances economic elite was and still is able to project its
parochial democracy-antithetical interests and influence across
every major institution of the state; exclusively deciding who are
appointed to the courts, who attorneys general are and who
comprise the countrys political leadership on the federal,
provincial and municipal levels and the executives of law
enforcement, the military and intelligence establishments. It also
had consolidated and owns all mainstream media assets. The
consequence of these multi-generational processes is the
complete loss of transparency and accountability for criminality
and abuses of power by public servants and the economic elite.
He also discovered Canadas Prime Minister in the 1970s, Pierre
Elliot Trudeau, had established more than friendly relations with
Cubas then Prime Minister Fidel Castro, who at the time was
Moscows man in the Western Hemisphere; a declared enemy of
the United States of America and NATO allies during the Cold War.
Given the closet paradigm of governance it made perfect sense
9
Prime Minister Trudeau would have a very close and adoring
relationship with his Cuban counterpart.
[]
8
http://www.primetimecrime.com/Articles/RobertRead/Sidewinder%20page%201.htm
10
the countrys political leaders, economic elite and all the major
institutions of the State.
[]
2.25 When the Cold War ended, globally proliferating communism fell
off the DEFENDANTS foreign policy front burner. But when China
in the early 2000s was incontestably on a trajectory to becoming
a superpower, Canada became an even more acute national
security threat to American and NATO 2.0 and interests than
during the Cold War.
11
seeking to, as KEMPO articulated in his research, buy, bribe,
seduce, lend and capitalistically extort their way dominos-style to
a global hegemony that seriously jeopardizes the gains made by
democracy, human rights and free market capitalism in the 20th
century. His findings were corroborated by an award winning
producer and investigative reporter employed by the Canadian
Broadcasting Corporation, Bruce Livesey. He is a producer for a
program that like 60 Minutes examines matters relating to
government corruption and impropriety. In the spring of 2012,
Random House Canada published his work Thieves of Bay Street:
How Banks, Brokerages and the Wealthy Steal Billions from
Canadians. It comprises proof of how the Canada-China alliances
economic elite perpetuated massively corrupt financial and
banking systems and benefited from similarly dysfunctional
government, police, courts and regulatory agencies. He offers a
plethora of case studies of citizens who thought they lived in a
democracy that had an economy governed by the rule of law, only
to be deprived of their life savings. The said elite, according to
his in-depth inquiries and critical analysis, had morphed into a
wealth destroyer, a parasitic reaper of money from the middle and
working classes. He argues [T]he nature of the Canadian
establishment [is that its] modeled on the Family Compact [a]
sclerotic group of officials who dominated the legislative bodies,
top bureaucratic positions and judiciary of Upper Canada as an
incestuous pseudo-aristocracy. He further states Todays
establishment coalesces in clubby fiefdoms in Halifax, Montral,
Toronto, Winnipeg, Calgary and Vancouver, where they live and
work together, protecting each others interests; Canada is
dominated by business oligopolies. KEMPO titled his academic
12
treatise The Last Democratic Fiefdom as a consequence of his
academic research. Mr. Livsey goes on to claim, and rightfully,
The financial, legal and regulatory establishments form close-
knit, even insular, subsections of the population; [c]aptains of
industry, corporate lawyers, bankers and mandarins [are]
bound together as corporate oligopolies and by a handful of
dynastic families that dominate the economy. [] Canada, in
short, is run by very few people.
2.27 During December 2004 and January 2005 the two primary
research findings of closet authoritarianism and Chinese joint
hegemony plus evidence of the R&D, deployment ... were
disseminated to parliamentarians, Canadian government
department and agency executives and the heads of private
sector organizations and associations in Canada.
[]
9
Those responsible for the botched August 2004 attempt at psych ward committal
desperately wanted to succeed to punitively retaliate for the research and
Federal Court of Canada litigation.
13
I pled the reasons why I entered into the May 26, 2006 contract with the
U.S. government:
[...]
[...]
[...]
14
2.53 The DEFENDANTs pled offers and acceptances of and
consideration for said express and implied terms were fraudulent,
deceptive and manipulative.
2.54 KEMPO relied and acted in good faith upon said offers,
acceptances and considerations to his extreme detriment;
expending in the fulfillment of his obligations under the
agreement in excess of 20,000 hours between May 26, 2006 and
when discovering the deceit on or about February 20, 2011. At all
material times the Bush and Obama administrations knew their
offers, acceptances, considerations motivated KEMPO to continue
fulfilling his obligations and responsibilities under the agreement
and thereby expecting at some time in the future taking receipt of
what the DEFENDANT had contractually ratified.
You and your partner were shown copies of decisions by the U.S. District
Court of Appeals for the District of Columbia and the United States Supreme
Court. They revealed the relief sought in both judicial forums, which was
not pursuant to breach of contract but for the tort of deceit, was not
granted.10 To explain why it wasnt would be voluminous and distract you
from the investigation. The relevance of the foregoing pleading excerpts
speaks to what I indicated to you about U.S. intelligence agencies having
monitored my reform and accountability efforts over the years. They have
conducted extensive surveillance on Canadian and Chinese agents, some of
whom are responsible for the malfeasance documented herein that
constitutes violations of s. 341.2 of the Criminal Code.
10
Breach of contract and the tort of deceit are two very distinct causes of action
and the relief sought is very different. Its unclear at the time of authorship of
this correspondence whether the two U.S. courts were motivated by political
influences and therefore biased as was the Federal Court of Canada. At some
future date that determination will be made when more evidence is available.
15
Because this countrys political and economic leaders and the government of
the Peoples Republic of China continue to maintain their national security
threatening posture as pled, the decision may be made to provide the RCMP,
VPD and I.N.S.E.T. with intel to assist in prosecutions and to secure
convictions. Consequently, my formal complaint lays the groundwork
for that criminal justice and reform initiative.
I consulted with the computer whiz I referred to who put my Microsoft Vista
computer system together; which was first operational on August 8, 2013
(and thus is only two years old). During that time he was at my residence
about once a year to conduct standard maintenance (which included making
sure all updates were downloaded and conducting malware sweeps of the
hard drive). The first thing he asked me to do right after your home visit was
to access the System Information; as I wanted to know what the
computers technical specs are. This is what came up:
16
He indicated he has never ever seen Cant Collect Information, which
fueled the inference my computer has been significantly compromised. So he
instructed me to initialize Glary Utilities 5. It didnt load. He also found
that suspicious. So his next advice was to run Malwarebytes. Results: no
malware was detected. Glary still didnt start. So he suggested going into
the administration constituent of the hard drive and try doing so there. It
also didnt initialize; leading him to the conclusion my computers been the
target of a sophisticated cyber-attack.
Some purchasers of the Vista program have leveled complaints against the
operating system. One blogger offered these categories of concerns11:
slower not faster; hogs memory; constant hard drive activity; lack of drivers
for various hardware. Another offered others12: browsing folders using
Windows Explorer; folder sort order disappears; system tray icons
disappear; application windows constantly display Not responding; errors
when saving network files cause automatic file deletion; network shares
dont map on startup; editing filenames no longer highlights the complete
name; data fails to be stored in clipboard when copied; folder view setting
constantly needs resetting; folder typesetting constantly needs resetting;
intermittent rearranging of desktop and quick launch icons; devices
randomly reinstall themselves on connection. Heres a third source of
complaints13: RAM-hogging aero interface; jarring user interface; driver
support; the user account control; the forced-upgrade saga; crappy games
performance.
11
http://blog.pluralsight.com/top-10-reasons-people-hate-windows-vista
12
http://maddisondesigns.com/2009/07/13-reasons-why-vista-is-crap
13
http://www.gizmodo.co.uk/2013/01/happy-birthday-vista-heres-10-reasons-why-you-
sucked
17
One is relevant to what I experienced: application windows constantly
display Not responding.14 Why it ought to be considered a component of
the cyber-disruption I regularly experience is because it happens all the
time. It occurs upwards of or more than a dozen times a day every single
day when engaging in authorship thats related to reform and accountability.
Here are the dates on which evidence documentation was authored: 2013:
September 12; 2014: March 7, March 11, April 17, April 29, May 5, May 11,
May 12, May 13, May 19, May 28, June 2, June 28, July 11, July 12, October
30, November 25, December 15, December 16, December 18, December 22,
December 25, December 31; 2015: January 1, January 7, February 19,
February 22, March 2, March 6, March 7, July 12, July 15.
14
It may be relevant to the technical aspect of your investigation to know the
following: I contacted Shaw Cable on July 20th and was advised that on June
29, 2014 my Internet pipe was increased to 20 MGs per second.
18
must reboot; and a significant minority of times more than once and which
can reach five or six before the malfeasance is halted. And Ive noted what
my reform comprises is quite often a trigger for this criminality. The intent
dating back many years has been to not just generate the continually
reinforced perception what Im working on is being monitored, but also is
highly objectionable and therefore punitive retaliation is warranted.
Cutting access to the Internet; unable to access a website. This occurs daily
and quite often several times. On occasion it takes one and sometimes
several reboots and anywhere from ten minutes to two hours before full
access is allowed.15
15
A cyber-attack lasting just under five hours is documented in VPD Submission 2.
19
Freezing the initialization of Word. On occasion it takes upwards of five
minutes for it to be operating.
20
Scrambling a webpage image. To return to normal operation requires hitting
the refresh button.
21
Initializing the Page(s) unresponsive notification. Frequently, it would
return instantly after hitting the Wait button; and on occasion five and
more minutes would go by before access is regained.
22
Halting the loading of a website being accessed:
23
Preventing a video stream from loading. Infrequently, I wouldnt get access
to it at all. On other occasions, Id have to hit the refresh button more than
once.
24
Significantly slowing a reboot. When theres no cyber-attack, a reboot takes
just a few minutes. When there is one itll take upwards of ten minutes.
25
Initializing the bios diagnostic system:
26
Adding splotches to the image:
Only permitting a partial loading of the Google webpage and recently visited
website icons:
27
Temporarily preventing the pop-up menu that includes the Explorer
initialization icon:
28
29
Initializing the saving auto recovery program that halts word processing:
Trying to close a Word doc and the End Program function initializes:
30
Triggering buffering when watching video streams:
31
Triggering buffering when using Word and whiting the entire screen:
32
Change the space between Word doc pages from 1/8th of an inch to a sliver:
33
Significant delaying the initialization of my digital camera photo downloading
window from seconds to sometimes five to ten minutes; and slowing the
picture downloading process from seconds to minutes:
34
Causing the highlighting of the Pixresizer desktop icon and continuing to
keep it that way for hours after having halted that illumination.
35
Causing a doubling of just typed text:
36
The rearranging of bottom navigation bar commands several times a day.
I always place them in the following order: Explorer, Chrome Browser, Word,
Notepad.
Disable wireless keyboard and mouse. On several occasions both were made
inoperative. When the latter was I retrieved from storage the land line
version and used it until the cyber-attack was halted. With respect to the
former I kept rebooting until it was allowed to function properly.
Causing the uppercase function to initialize. At least once a day Ive had to
hit the Caps Lock key to disengage WHAT WAS MADE TO BE THIS.
37
From June to August 2006 I kept a daily diary of all forms of computer and
Internet unlawfulness16:
Thursday, June 22, 2006: Attempt at 12:02 a.m. to transfer from the C:
drive to the A: drive an authored chapter blocked by computer sabotaging
technology.17
Friday, June 23, 2006: Two authored chapter were blocked at 12:49 by
computer sabotaging technology. Copy function sabotaged at 12:44.
Internet access terminated at 12:53.
Sunday, June 25, 2006: Attempt at 10:56 p.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology.
Monday, June 26, 2006: Attempt at 10:18 p.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Cut Internet Connection: 12:37.
Tuesday, June 27, 2006: Attempt at 12:04 p.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology.
Wednesday, June 28, 2006: Attempt at 12:11 p.m. to transfer from the C:
drive to the A: drive two authored chapters were unsuccessful and were
blocked by sabotaging technology.
16
The unlawful conduct described until page 42 herein began much earlier. I only
decided to create this diary because there was so many cyber-attacks. Further,
they were in direct reaction to the May 26, 2006 contract I had with the U.S.
government to pursue reform and accountability.
17
I would continue trying to transfer the new or amended chapter until it was
successfully backed up on a floppy disc.
38
Tuesday, July 4, 2006: Interference with computer: 6:09 X7; 6:12 X2; 6:13;
6:35.
Saturday, July 8, 2006: Attempt at 12:26 p.m. to transfer from the C: drive
to the A: drive an authored chapter blocked by computer sabotaging
technology. Computer interference: 8:04; 8:51; 8:55; 9:01; 9:56; 10:16
X3; 11:14; 11:20 X2; 1:41 X4; 6:13; 8:11 X2; 8:12 X5; 8:21; 8:25 X3;
8:26; 8:27 X2; 8:31; 9:09.
Sunday, July 9, 2006: Attempt at 12:04 p.m. to transfer from the C: drive to
the A: drive an authored the chapter was blocked computer sabotaging
technology.
Monday, July 10, 2006: Attempt at 12:15 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 7:02; 8:43; 2:09; 10:32.
Tuesday, July 11, 2006: Attempt at 12:19 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Cut Internet connection: 9:51.
Wednesday, July 12, 2006: Attempt at 1:15 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 10:45.
Thursday, July 13, 2006: Attempt at 12:06 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Crash Internet connection: 8:54; 9:36; 9:39; 9:42.
Friday, July 14, 2006: Attempt at 12:10 a.m. to transfer from the C: drive to
the A: drive an authored chapter was blocked by computer sabotaging
technology.
39
Saturday, July 15, 2006: Attempt at 12:10 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology.
Sunday, July 16, 2006: Attempt at 7:10 a.m. to transfer from the C: drive to
the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 8:43a.m.. Computer interference:
8:05p.m.; 10:10.
Monday, July 17, 2006: Attempt at 12:20 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 11:28 X2; 12:11.
Tuesday, July 18, 2006: Attempt at 12:22 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 9:48.
Wednesday, July 19, 2006: Attempt at 12:29 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 9:48.
Thursday, July 20, 2006: Attempt at 12:08 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 8:27.
Friday, July 21, 2006: Attempt at 12:05 a.m. to transfer from the C: drive to
the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 10:14 X3.
Saturday, July 22, 2006: Attempt at 12:20 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 10:59.
Sunday, July 23, 2006: Attempt at 12:01 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 8:51.
Monday, July 24, 2006: Attempt at 12:04 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Internet interference: 9:58. Cut Internet connection: 9:59
a.m.; 10:03; 10:04. Denied Internet access: 10:00 p.m..
40
Tuesday, July 25, 2006: Attempt at 12:39 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 3:44 X2; 8:23; 8:24; 10:22 X2.
Wednesday, July 26, 2006: Attempt at 12:19 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 12:27 X2; 1:51; 1:57; 5:16;
10:30; 10:43; 10:54 X2.
Thursday, July 27, 2006: Attempt at 12:15 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 8:38 X10; 9:47; 10:39;
10:51; 11:37; 12:21; 12:30; 1:22; 1:25; 1:43 X22; 3:10; 10:03; 10:14 x
88; 10: 14 X12; 10:15 X19; 10:36 X3; 10:47; 10:53. Interference with
Internet: 10:30.
Friday, July 28, 2006: Attempt at 12:07 a.m. to transfer from the C: drive to
the A: drive an authored chapter was blocked by computer sabotaging
technology. Internet connection denied: 2:36 2:39 X4. Internet
interference: 2:40 X2. Computer interference: 2:44; 2:45 X2; 2:58 X5;
3:09; 10:34; 10:37 X20; 11:13 X3; 11:14 X20; 11:35; 11:45; 12:18;
12:26; 12:38 X5; 12:51; 1:19 X5; 5:33.
Saturday, July 29, 2006: Attempt at 12:01 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 12:20 X10; 12:21 X3;
12:37; 12:39; 12:43 X7; 1:43 X2; 1:44; 2:31; 2:32; 2:37; 2:38; 2:51;
4:09 4:10; 4:17; 4:26; 4:32; 4:47; 4:58; 4:59; 5:00 X2; 5:12; 5:31; 8:36;
9:11; 9:40; 9:53 X2; 9:54; 10:45 X2; 11:09.
Sunday, July 30, 2006: Attempt at 12:03 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 12:11; 12:14; 9:27; 9:31; 9:54;
10:12; 10:21; 10:25; 11:38 X2; 7:52; 8:39 X15; 8:43 X 5; 9:03 X4; 9:20
X3; 9:54 X2; 10:07 X23; 11:30 X14. Cut Internet connection: 12:08;
12:09.
Monday, July 31, 2006: Attempt at 12:10 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 12:10.
41
Wednesday, August 2, 2006: Attempt at 12:14 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 8:43.
Friday, August 4, 2006: Attempt at 12:06 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 5:22; 5:24.
Thursday, August 10, 2006: Attempt at 12:27 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 7:59.
Friday, August 11, 2006: Attempt at 12:24 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 5:10; 9:30.
42
In mid-June 2012 I authored The Unconstitutional Interference With and
Criminal Sabotage of the Emerging Canadian Citizens Party (Chapter 3); and
on pages 15 and 16 is my compilation of criminal activity:
(iii) shutting off and turning on the auto spell check and auto correct
functions
(iv) manipulating and blocking his Explorers ability to search files on the hard
drive
(v) suspend the copy-paste function -- not being able to capture the
intended text so it can be transferred from one place on the page to
another or from one document to another
(vi) initiate various programs to fill the screen with unwanted windows
(ix) initiate the insert command, which has the effect of eliminating type as
one adds text to a document, and
(x) alter highlighted text the user has selected for elimination or amendment
(xi) changed the type line function from a space and a half to a space
18
This unlawfulness is identical to what I described on page 2 above.
43
(i) going into authored content and (a) breaking links between web pages
and (b) changing link information to prevent access to other websites and
directing readers to another web page
Not only were my law practice, two entrepreneurial ventures and a plethora
of reform and accountability initiatives sabotaged in many different ways
employing cyber-attacks, so was my latest business undertaking. In mid-
January 2015 a friend of some twenty years and former squash adversary at
the citys Bentall Center Athletic Club retained me to help raise US$4.5
million to purchase a producing gold mine in the Yukons Klondike Gold
Fields. My remuneration was a US$135,000 finders fee. I launched a
website so that companies could conduct due diligence. 19 Because all my
solicitations were to mining firms outside Canada I wanted to identify and
keep track of who was gaining access after my telephone and/or email
introduction.
19
http://mcpp.yolasite.com
44
[...]
45
[...]
46
I wasnt surprised when all of a sudden and for no apparent logical reason
the tracker stopped identifying who was gaining access. Because of what
had transpired with respect to my reform and accountability initiatives and
all the cyber-malfeasance it was an easy inference that the same responsible
parties had fatally compromised the tracking system.
How does one establish the evidentiary inference criminal activity was
involved? Before the tracker stopped functioning I received automated
emails every Monday. Then after statistics on the previous weeks traffic
were no longer being generated I was still receiving emails which meant
that as far as the service was concerned the system was still operational:
47
Over the years so many times have documents, including academic
authorship and correspondence, been wiped off my hard drive I commenced
a while ago the process of forwarding the most important of them to my
reform colleagues to maintain back-ups. The most recent request was this
one:
Gentlemen:
On Sunday this was displayed on my computer screen for the first time that
I can remember.
48
This is a manifestation of what has been documented by academics who
study the security establishment as standard behavior. A culture of
harassment, coercion20, intimidation and fear generation is described in
Whose National Security? Canadian State Surveillance and the Creation of
Enemies, Kinsman, Buse, Steedman (Between the Lines Toronto, 2000):
20
Using psych wards to silence reform and dissent and punish those involved is
another methodology of coercion. The administration of powerful pharma-
ceuticals as I experienced in February 2005 has over the last few years caused
some internationally to label that conduct torture.
21
This evidence is to be contextualized with respect to the findings of the CSIS-
RCMP Sidewinder Report referenced above which demonstrated that vast
swaths of the Canadian economy were in the mid-1990s directly and indirectly
owned and operated by Beijing and mega-wealthy Chinese nationals.
49
"It is an honour to be selected by Bell in building the company's next
generation wireless network," said Ken Hu, Executive Vice President and
Chief of Huawei. "Carriers are looking for long-term partners as they future-
proof their wireless network infrastructure. Huawei has globally deployed
industry leading UMTS/HSPA technologies as well as taking a leading position
in LTE development and we are dedicated to helping Bell enhance its
competitiveness in the Canada market."
Stephen Howe, Bell Senior Vice President of Wireless Network and Chief
Technology Officer said: "Bell is committed to delivering Canadians the
broadest choice in high-speed wireless service now with national 3G service
and in future as we prepare to move to LTE. We are proud to work with
industry leading technology providers such as Huawei Technologies to make
both these objectives a reality."
Chinese Tech Giant Tries New Tack to Enter US Market But claims of
independence are false, say experts
by Matthew Robertson
Epoch Times
March 1, 2011
Huawei, the Chinese tech giant, is tired of being blocked from the U.S.
telecommunications market. For more than a decade it has been dogged by
security concerns over links to the Chinese Communist Party (CCP) and
Chinese military. In a recent open letter, it says that these accusations are
vague and unfair, and that in fact, Huawei has no such ties.
Huawei has long coveted the U.S. Telecommunications market, the most
lucrative in the world. Attempts to sell its wares in the United States have
repeatedly met with staunch resistance from Congress and the intelligence
community. Its most recent response has been a sophisticated PR campaign.
[]
50
Huawei Shenzhen Technology Company was founded in 1988 by Ren
Zhengfei, the former director of the Peoples Liberation Army (PLA) General
Staff Departments Information Engineering Academy. He was responsible for
telecom research for the PLA before going into business.
His company got its start laying down the fiber optic network, which became
the basis for the computerization of China in the 1990s, Fisher says. This was
a job closely connected to the needs of the PLA and particularly its first
mission, which is to keep the CCP in power.
A widely quoted 2007 Rand Corporation report says, Huawei maintains deep
ties with the Chinese military, which serves a multifaceted role as an
important customer, as well as Huaweis political patron and research and
development partner.
[]
The Epoch Times analyzed over a dozen speeches and articles by Ren,
including ones published in the internal magazine Huawei People. The picture
that emerges shows that Mr. Ren is a committed adherent to communist rule
in China.
While in the military Mr. Ren was a model for learning from Mao, Maos
stratagems of war communism helped form Mr. Rens understanding of
Huaweis corporate culture.
Huawei also has active Communist Party cells inside the company. Party cells
are a form of social control exercised across government, military, and
industry in China. Major organizations have Party branches, according to Mr.
Fisher. The existence of a Party branch inside Huawei can be seen as both a
display of ideological commitment to the Partys rule by Mr. Ren, and an
increase in the Partys level of control over Huawei, Mr. Fisher said.
Mr. Fisher says that to prove it is independent from the Party and state, and
could not be a proxy for Chinese intelligence or military activities, Huawei
would have to explicitly detail the entire history of its relationship with the
CCP.
51
It would have to, as well, detail and identify all of the Party members within
its leadership. And it would have to detail the history of its Party cell. It
would have to detail all of the work that it has done for the Chinese military
for Chinese intelligence organizations, and detail its current relationship, Mr.
Fisher said.
The report says that neither company cooperated sufficiently with the
investigation and makes several recommendations for U.S. companies and
government agencies that deal with either of the Chinese companies.
While noting that non-compliance isn't the same as wrongdoing, the report
nonetheless concludes "the risks associated with Huawei's and ZTE's
provision of equipment to U.S. critical infrastructure could undermine core
U.S. national-security interests."
According to the report, the increasing global dominance of Huawei and ZTE
in the telecom equipment market affords the two companies with an
opportunity to spy or conduct malicious activity.
Because U.S. authorities continually cite the threat from Chinese cyber-
espionage and both companies are Chinese-founded, Chinese-owned, and
have ties to the Chinese government and military, the report concludes that
the lack of satisfactory answers from the two companies demands that
Huawei and ZTE should be viewed with suspicion and their telecom
equipment should be avoided.
52
Criminal Code violations are proven beyond all doubt as described and
compiled herein; and more so given whats documented in VPD Submission
2.
Two political and foreign policy characteristics that have been patently
obvious and many times brazen are arrogance and belligerence.
Democratic leaders and their subordinates submit to the dictates of law,
justice, personal accountability and international standards and norms.
Authoritarians and communists do not. Instead, they bristle at the thought
of being compelled to operate within the confines of, for instance, the
Criminal Code of Canada and United Nations human rights enactments.
While ordinary Canadians enjoy functioning courts and administrative
tribunals and observe and benefit from a press that to them is free to report
government improprieties, malfeasance and corruption, the opposite is true
for those in my position.
What has been more than apparent over the years is that my contractual
collaboration with the U.S. Government caused them to do what has been
noted of totalitarians, despots and dictators in the 20th century and recently;
namely, upon being condemned and demands made they reform they
engage in more criminality, human rights violations and egregious
impropriety. Over the last decade this reactionary behavior was noted in
North Koreas Kim Jon Il, Burmas military junta, Iraqs Saddam Hussein,
Libyas Momar Kaddafi and Syrias Bashir al-Assad. They do so in the
accurate belief they are virtually untouchable when operating behind
sovereign borders. Only when circumstances become acute, like genocide or
being a military threat to neighbors, a region or the world, does the
international community have the jurisdiction to intervene. All the
53
community of nations can do when these conditions dont exist is to
condemn, effect isolationism and impose economic and military sanctions.
The transition of China from Cold War sideliner to a mid-21st century global
economic and military superpower delivers a unique series of challenges for
the United States, its allies and emerging democracies. The Beijing
leaderships global military menace is as acute as it is insidious. Canadas
southern neighbor became aware of its threat to national and economic
security interests in the early 2000s; but the Bush and Obama
administrations got distracted, which led to abdicating their responsibilities
in these two regards. The latter has been and continues to play catch-up in
terms of shoring up defenses.
Depriving Beijing of its Tibetan-esque province north of the 49th Parallel has
been, at least in word but not yet deed, a major U.S. foreign policy objective
during the last few years. President Obama, his cabinet and international
counterparts have little wiggle room with respect to the staunch
communists; but theres more that can be pursued in the relationship with
Canada being Americas next door neighbor, largest trading partner and
54
one of the countrys largest suppliers of energy. I expect the approach when
launched will either be incremental or publicly non-transparent shock and
awe. It may begin with aggressively challenging and stressing Canadian-
China intelligence capabilities; since some if it is directed at the U.S. as part
of a wider strategy of military and industrial espionage. The soft underbelly
includes the culpability exposure of those who have been using cyber-
attacks all these years to disrupt and defeat my U.S.-supported reform and
accountability. Thats why I state on page 16 above in bold font my formal
complaint lays the groundwork for that criminal justice and reform
initiative.
Your investigation ought to pursue other avenues; like the one I suggested
in Mondays voicemail. The RCMP could provide resources and guidance.
And if some of the cyber-attacks are originating in foreign countries, like
China, I.N.S.E.T. has jurisdiction.
Yours truly,
c.c. Shaw Cable, Customer Protection Team (Ref No. 983-53) & Tom
Copeland, Canadian Association of Internet Providers
55