Vous êtes sur la page 1sur 55

Canadian Governance Reform Council

914 950 Drake Avenue


Vancouver, British Columbia,
Canada V6Z 2B9
Ph. 604.609.0520
cgrc.yolasite.com
bradkempoesq@gmail.com
July 21, 2015
Vancouver Police Department
3750 1st Avenue
Vancouver, BC

Attention: Constable Jordan Ginther (#2981)


E-Mail: Jordan.ginther@vpd.ca

Dear Sir:
Re: Seeking an investigation pursuant to violations of s. 342.1 of the
Criminal Code of Canada; File No. VA15 - 128135

Further to the home visit by yourself and your partner on July 14th in
furtherance of the above-captioned, consider this cover letter /
correspondence a comprehensive description and compilation of evidence.

I began by indicating I remain a quarter century albeit retired member of


the Bar and offering you information about my family. I attach a bio which
identifies the credentials and accomplishments of my mother, the Hon.
Wallis Kempo J., and uncle, the Hon. Senator Paul Lucier (deceased); both of
whom I described as having such high profile federal appointments it led to
me experiencing an abuse of power in the 1990s which sabotaged my law
practice (and two entrepreneurial ventures). Also indicated was having
commenced litigation in the Federal Court of Canada in September 2002 and
the Government of Canada upon filing its defence claimed national security
privilege to prevent critical documentation from being entered into the court
record.

1
Aggressive disruptions of my computer and Internet access began back in
2002. This criminality was pled in the Amended Statement of Claim:

282. The campaigns acts included, but were not limited to:

(n) between March and April 2002, sending hundreds of computer


viruses across the Internet to attack the Plaintiffs computer
when he was working on the corporate Plaintiffs business,
Canada Law Topics, and notwithstanding a firewall.

A couple years later the rogue constituents of the security services


inundated the hard drive with hundreds of megabytes of meaningless data
causing it to crash irreversibly; requiring a new one. That attack was
malicious retaliation for aggressively prosecuting the lawsuit and conducting
academic research that commenced in March 2004 (Chapter 1 herein).

In my early May 2008 evidence compilation chapter Canadas Security


Apparatus Breaks Criminal Code Prohibition on Interfering with and
Sabotaging the Internet1 I state the following:

The countrys security establishment made a habit of disrupting the [my]


use of the Internet and enough times prevented e-mails and portions of e-
mails from arriving at their intended destinations to conclude that a whole
series of technologies, techniques, strategies and tactics were developed.

[...]

The two main electronic pieces of equipment that are central to modern life
are the television and the computer. Recently, [I] described how the latter
became a target for remote manipulation:

And then theres the criminality hes had to endure relating to his
computer. Hes watched for years as the security services
developed and operationalized various techniques to manipulate
his computer remotely.

1
Emails of research findings were sent to parliamentarians and other public sector
officials in 2007 and 2008. The malfeasance led to the practice of requesting
acknowledgment of receipt of my correspondence to confirm delivery.
2
[]

Over the years, hes witnessed the ability to seize up and crash
the computer, stop files from being saved to disc and shutting off
and turning on the auto spell check and auto correct
functions. And lately, hes experienced the manipulation and
blocking of his Explorers ability to search files on the hard drive.

Now one can add five more kinds of remote manipulation:

(i) suspend the copy-paste function. The result is not being able to
capture the intended text so it can be transferred from one place on
the page to another or from one document to another;

(ii) initiate various programs to fill the screen with unwanted windows;

(iii) manipulate the tab command, which has the effect of eliminating
certainty one has that Microsoft Word will work as expected;

(iv) initiate the insert command, which has the effect of eliminating type
as one adds text to a document; and

(v) alter highlighted text the user has selected for elimination or
amendment.

In that same chapter I state:

The illegalities took on a different and just as ominous form on March


13th, 2008. Two research findings recipients advised him they did not
receive an e-mail with two attached submissions. It happened again on
March 18th. He sent several supplementals, one of which the assistants
to two Senators said they hadnt received.

To demonstrate not only complete mastery of Internet sabotage but an


arrogance of power, the April 30th e-mail was disrupted; not getting
through to some recipients. The following requests for confirmation of
receipt therefore were received from the RCMP:

Fwd: from Brad Kempo


From: Mike AUBRY (mike.aubry@rcmp-grc.gc.ca)
Sent: May 1, 2008 5:47:03 PM
To: bkempo@hotmail.com

Mr. Kempo, further to your inquiry I did receive both e-mails with their
attachments: 3 for April 30th and 3 from April 21st.

3
Mike Aubry, Supt.OIC, Employee and Management Relations
Section "E" Division
657 West 37th Avenue, Vancouver, BC

Over the course of the preliminary stages of the lawsuit I detected a judicial
bias. When combined with the abuses of power as pled I concluded it was
imperative I utilize my knowledge and skills afforded me by my B.A. Degree
in political science (and philosophy) and LL.B. to discover the conditions and
antecedents that led to the decade plus long systemic malfeasance and why
the Bench was so blatantly favoring the Defendant (findings in Chapter 1).

The Canadian Bar Associations Code of Professional Conduct encourages


lawyers to participat[e] in law reform. Ive always interpreted this as
being much too professionally parochial; and has always been interpreted to
include a political component as lawyers and political science professors
are really the only ones in the country able to analyze how government has
become dysfunctional; and as a result of having the requisite training,
expertise and credibility can initiate meaningful and efficacious change.

In March 2004 my multi-year research project began. In December I started


disseminating my findings to various categories of recipients. As a result of
that process what failed in August as described to you (fabricating emails to
make it appear I was stalking who was then BCTVs weather woman, Tamara
Taggart, and not charging me with criminal stalking, but rather seeking an
involuntary committal) was successfully attempted in early February 2005.
The psychiatric ward incarceration had two consequences. The first was
shredding my academic and professional credibility by way of an acute form
of medical slander; the second was profoundly corroborating what I had
discovered about what lies at the core of our system of governance which
isnt democracy at the intersection of political power and vast wealth.

4
The dissemination went into high gear in August 2007; and lasting until the
end of 2009. By that time I had informed virtually everyone in government
on the federal, provincial and municipal levels. I also got in contact with the
RCMP; which led to several conversations with Superintendent Mike Aubry.
At that time he was at the administrative top of B.C.s Integrated National
Security Enforcement Team Division (I.N.S.E.T.). He referred what I pled
and my research to Ottawa; and in September of that year I was advised the
umbrella agency had launched a formal investigation.

The dissemination and attempts at government reform didnt stop there. In


the spring of 2010 I launched the RCC.2 More than 300 private sector
organizations, associations and groups were contacted (listed on the
website); the intention being to generate a national collective awareness of
what Id discovered where its most publicly non-transparent.

2
http://reformcoalitionofcanada.yolasite.com
5
Two years later I founded an academic institute.3

Critical in terms of establishing the credibility of my research findings and


what was pled in the Federal Court is who joined the CGRC in pursuit of
reform and accountability. Don Reid, for example, became the Atlantic
Provinces Chambers of Commerce Chairman for the period 2011 2012
after beginning his upward mobility as the 2006 President of the Greater
Summerside Chamber of Commerce; followed by being the President of the
P.E.I. Chambers of Commerce from 2007 to 2010. Since 1990 hes been
working in the office of the provinces Attorney General in the roles of
Sheriff, Peace Officer and Youth Worker.

3
http://cgrc.yolasite.com
6
Other Board members include Erik Anderson B.Com., a career economist,
Charles Relland B.Sc., an Alberta Land Titles Examiner (19 yrs.), Dennis
Shaw B.A., who spent 13 years in the Canadian military and William Morin,
B.F.A., B.A., M.A.. Mssrs. Relland, Shaw and Morin founded, were
presidents or executives of registered political parties on the federal and
provincial levels. Citing these credentials does not fully reflect their
multitudinous pursuits and accomplishments; and their rsums ought to be
reviewed to appreciate theyre all well educated and exceptionally
upstanding members of their respective communities.4 Each is fully
cognizant of the multi-decade abuse of power I endured (including the two
instances of psych ward unlawfulness), what was academically discovered
and that which I pursued both in the Canadian and U.S. courts.

My latest pursuit was conceptualizing this in the spring of 20125:

4
http://cgrc.yolasite.com/who-are-we.php
5
http://ccp1.yolasite.com
7
This initiative infuriated those who govern this country because it deprives
them of most political power6:

Major Structural Reform of How Canadas Parliamentary System


Operates

The CCP has only one item on its political platform - changing the way
government functions to ensure the primary influence on what it does is
Canadians.

The result is our Party doesnt offer its recommendations on a wide


range of topics to convince you its candidates ought to be elected every
four years. What is done in the public's name becomes the exclusive
domain of 33 million voters.

Because technology has advanced swiftly in the last 20 years, allowing


for a new way for the will of the people to be reflected in policy
formation, the CCP will implement an Internet-based referendum
system on policy.

Several times a year proposed government policies will be put to a


vote. Matters that have a particular geographical scope i.e., national,
regional, provincial, intra-province-regional and local, will each have its
own separate referendum process.

I attach two chapters of my research, which you may or may not review. 7 In
the event of the latter, here is an excerpt from the U.S. District Court
pleading that summarizes my findings:

2.21 KEMPOs academic research, commenced in March 2004 was


triggered by how the Federal Court of Canada behaved and his
circumstances as pled herein dating back to the late 1980s. He
discovered a publicly unknown authoritarian paradigm of
Canadian governance operating since the early 1970s and which

6
Reference Chapter 3: The Unconstitutional Interference With and Criminal
Sabotage of the Emerging Canadian Citizens Party
7
Chapter 1 is summarized in para. 2.21 to 2.25; and Chapter 2 in para. 2.26.
8
had its evolutionary roots back to the inception of Canada as a
sovereign nation in the 1860s. Where the Founding Fathers and
Americans fought a long and costly war to be rid of English
imperialistic rule, their Canadian counterparts fully embraced the
Monarchy. Doing so led to all that was repugnant to the United
States of America being fully embedded in the fabric of Canadas
political system and administration of justice and which has
festered ever since. Extreme political nepotism and patronage
since Confederation and the Liberal Party of Canada having
cumulatively governed for three-quarters of the 20th century led
to a complete consolidation of power and wealth and what he
labeled closet authoritarianism. Inter alia, the Canada-China
alliances economic elite was and still is able to project its
parochial democracy-antithetical interests and influence across
every major institution of the state; exclusively deciding who are
appointed to the courts, who attorneys general are and who
comprise the countrys political leadership on the federal,
provincial and municipal levels and the executives of law
enforcement, the military and intelligence establishments. It also
had consolidated and owns all mainstream media assets. The
consequence of these multi-generational processes is the
complete loss of transparency and accountability for criminality
and abuses of power by public servants and the economic elite.
He also discovered Canadas Prime Minister in the 1970s, Pierre
Elliot Trudeau, had established more than friendly relations with
Cubas then Prime Minister Fidel Castro, who at the time was
Moscows man in the Western Hemisphere; a declared enemy of
the United States of America and NATO allies during the Cold War.
Given the closet paradigm of governance it made perfect sense

9
Prime Minister Trudeau would have a very close and adoring
relationship with his Cuban counterpart.

2.22 In addition to that bizarre foreign policy, former Prime Minister


Trudeau established the same with Chinas Chairman Mao Tse-
Tung. By the end of the 1970s Canada had become a mature
base of military and intelligence operations for the Government of
China and which threatened U.S. national and economic security
interests during that period of time in world history. Another
finding, derived from a leaked joint study by the Royal Canadian
Mounted Police and Canadas spy agency, CSIS, The Sidewinder
Report,8 was that the leaders of the Communist Party of China
and the countrys wealthiest nationals had been invited beginning
in the early 1970s by the Government of Canada and the
economic elite to purchase ever larger swaths of the economy.
KEMPO labeled the relationship between the two governments as
constituting a geo-political marriage of the most intimate kind.
One of the consequences of the insidious evolution to closet
authoritarianism and the Cuba and China relationships was the
emergence of a political culture of seething hostility for all things
American a hatred so intense it rivals whats observed in the
Middle East.

[]

2.24 As a direct result of these two personal heads of state


relationships in the 1970s and 1980s, the DEFENDANT labeled
Canada a national security threat and conducted surveillance on

8
http://www.primetimecrime.com/Articles/RobertRead/Sidewinder%20page%201.htm

10
the countrys political leaders, economic elite and all the major
institutions of the State.

[]

2.25 When the Cold War ended, globally proliferating communism fell
off the DEFENDANTS foreign policy front burner. But when China
in the early 2000s was incontestably on a trajectory to becoming
a superpower, Canada became an even more acute national
security threat to American and NATO 2.0 and interests than
during the Cold War.

2.26 Not only were Chinas military and intelligence operations in


Canada an exceptionally serious matter, so was the Communist
Party of Chinas capital generating capabilities in the country.
Further research in the summer of 2010 confirmed what KEMPO
had suspected during the latter stages of his 2004-commenced
academic investigation. Professors of economics were contacted:
Dalhousie Universitys Professor Lars Osberg, Queens Universitys
Professor Charles Beach and McMaster Universitys Professor
Michael Veall; as was Armine Yalnizyan, Senior Economist with
the Canadian Centre for Policy Alternatives. He concluded after
speaking with them and reading their publications that upwards if
not exceeding $10 trillion had been covertly extracted from the
Canadian economy since the mid-1980s by the Canada-China
alliances economic elite what academics label prosperity
theft; and a significant portion of what had been embezzled was
being used to advance the Government of Chinas global
expansionist ambitions. Its leaders have for a decade been

11
seeking to, as KEMPO articulated in his research, buy, bribe,
seduce, lend and capitalistically extort their way dominos-style to
a global hegemony that seriously jeopardizes the gains made by
democracy, human rights and free market capitalism in the 20th
century. His findings were corroborated by an award winning
producer and investigative reporter employed by the Canadian
Broadcasting Corporation, Bruce Livesey. He is a producer for a
program that like 60 Minutes examines matters relating to
government corruption and impropriety. In the spring of 2012,
Random House Canada published his work Thieves of Bay Street:
How Banks, Brokerages and the Wealthy Steal Billions from
Canadians. It comprises proof of how the Canada-China alliances
economic elite perpetuated massively corrupt financial and
banking systems and benefited from similarly dysfunctional
government, police, courts and regulatory agencies. He offers a
plethora of case studies of citizens who thought they lived in a
democracy that had an economy governed by the rule of law, only
to be deprived of their life savings. The said elite, according to
his in-depth inquiries and critical analysis, had morphed into a
wealth destroyer, a parasitic reaper of money from the middle and
working classes. He argues [T]he nature of the Canadian
establishment [is that its] modeled on the Family Compact [a]
sclerotic group of officials who dominated the legislative bodies,
top bureaucratic positions and judiciary of Upper Canada as an
incestuous pseudo-aristocracy. He further states Todays
establishment coalesces in clubby fiefdoms in Halifax, Montral,
Toronto, Winnipeg, Calgary and Vancouver, where they live and
work together, protecting each others interests; Canada is
dominated by business oligopolies. KEMPO titled his academic

12
treatise The Last Democratic Fiefdom as a consequence of his
academic research. Mr. Livsey goes on to claim, and rightfully,
The financial, legal and regulatory establishments form close-
knit, even insular, subsections of the population; [c]aptains of
industry, corporate lawyers, bankers and mandarins [are]
bound together as corporate oligopolies and by a handful of
dynastic families that dominate the economy. [] Canada, in
short, is run by very few people.

2.27 During December 2004 and January 2005 the two primary
research findings of closet authoritarianism and Chinese joint
hegemony plus evidence of the R&D, deployment ... were
disseminated to parliamentarians, Canadian government
department and agency executives and the heads of private
sector organizations and associations in Canada.

[]

2.29 The dissemination as described in Paragraph 2.27 herein outraged


the Canada-China alliance; so they engaged in more intimidation,
coercion, harassment and fear generation to punitively retaliate.
Evidence was fabricated to justify and it did successfully effect an
involuntary committal [for just over a month] in the aforesaid St.
Pauls Hospital psychiatric facility; which occurred on February 7,
2005.9

9
Those responsible for the botched August 2004 attempt at psych ward committal
desperately wanted to succeed to punitively retaliate for the research and
Federal Court of Canada litigation.
13
I pled the reasons why I entered into the May 26, 2006 contract with the
U.S. government:

2.39 KEMPO agreed to assist the DEFENDANT originally because he


wanted to help acquire evidence against those whod engaged in
such egregious criminal and civil malfeasance ... for so long as
pled herein.

[...]

2.40 The geographical proximity of, economic interconnectivity


between and mutual largest trading partner status of the United
States of America and Canada significantly complicated reform
and accountability initiatives; so there was no lack of appreciation
... how difficult achieving reform and accountability were going to
be and how long it would take for benchmark successes and
positive outcomes. He made it evident to everyone he was in it for
the long haul.

[...]

2.52 Another implied term KEMPO agreed to and which constituted


consideration was he would in due course, and he did, design and
implement a series of political reform and accountability initiatives
to democratize those constituents of Canadian governance that
had become authoritarian and had been afflicted by Chinese joint
hegemony and which threatened U.S. national security interests.

[...]

14
2.53 The DEFENDANTs pled offers and acceptances of and
consideration for said express and implied terms were fraudulent,
deceptive and manipulative.

2.54 KEMPO relied and acted in good faith upon said offers,
acceptances and considerations to his extreme detriment;
expending in the fulfillment of his obligations under the
agreement in excess of 20,000 hours between May 26, 2006 and
when discovering the deceit on or about February 20, 2011. At all
material times the Bush and Obama administrations knew their
offers, acceptances, considerations motivated KEMPO to continue
fulfilling his obligations and responsibilities under the agreement
and thereby expecting at some time in the future taking receipt of
what the DEFENDANT had contractually ratified.

You and your partner were shown copies of decisions by the U.S. District
Court of Appeals for the District of Columbia and the United States Supreme
Court. They revealed the relief sought in both judicial forums, which was
not pursuant to breach of contract but for the tort of deceit, was not
granted.10 To explain why it wasnt would be voluminous and distract you
from the investigation. The relevance of the foregoing pleading excerpts
speaks to what I indicated to you about U.S. intelligence agencies having
monitored my reform and accountability efforts over the years. They have
conducted extensive surveillance on Canadian and Chinese agents, some of
whom are responsible for the malfeasance documented herein that
constitutes violations of s. 341.2 of the Criminal Code.

10
Breach of contract and the tort of deceit are two very distinct causes of action
and the relief sought is very different. Its unclear at the time of authorship of
this correspondence whether the two U.S. courts were motivated by political
influences and therefore biased as was the Federal Court of Canada. At some
future date that determination will be made when more evidence is available.
15
Because this countrys political and economic leaders and the government of
the Peoples Republic of China continue to maintain their national security
threatening posture as pled, the decision may be made to provide the RCMP,
VPD and I.N.S.E.T. with intel to assist in prosecutions and to secure
convictions. Consequently, my formal complaint lays the groundwork
for that criminal justice and reform initiative.

I consulted with the computer whiz I referred to who put my Microsoft Vista
computer system together; which was first operational on August 8, 2013
(and thus is only two years old). During that time he was at my residence
about once a year to conduct standard maintenance (which included making
sure all updates were downloaded and conducting malware sweeps of the
hard drive). The first thing he asked me to do right after your home visit was
to access the System Information; as I wanted to know what the
computers technical specs are. This is what came up:

16
He indicated he has never ever seen Cant Collect Information, which
fueled the inference my computer has been significantly compromised. So he
instructed me to initialize Glary Utilities 5. It didnt load. He also found
that suspicious. So his next advice was to run Malwarebytes. Results: no
malware was detected. Glary still didnt start. So he suggested going into
the administration constituent of the hard drive and try doing so there. It
also didnt initialize; leading him to the conclusion my computers been the
target of a sophisticated cyber-attack.

Some purchasers of the Vista program have leveled complaints against the
operating system. One blogger offered these categories of concerns11:
slower not faster; hogs memory; constant hard drive activity; lack of drivers
for various hardware. Another offered others12: browsing folders using
Windows Explorer; folder sort order disappears; system tray icons
disappear; application windows constantly display Not responding; errors
when saving network files cause automatic file deletion; network shares
dont map on startup; editing filenames no longer highlights the complete
name; data fails to be stored in clipboard when copied; folder view setting
constantly needs resetting; folder typesetting constantly needs resetting;
intermittent rearranging of desktop and quick launch icons; devices
randomly reinstall themselves on connection. Heres a third source of
complaints13: RAM-hogging aero interface; jarring user interface; driver
support; the user account control; the forced-upgrade saga; crappy games
performance.

11
http://blog.pluralsight.com/top-10-reasons-people-hate-windows-vista
12
http://maddisondesigns.com/2009/07/13-reasons-why-vista-is-crap
13
http://www.gizmodo.co.uk/2013/01/happy-birthday-vista-heres-10-reasons-why-you-
sucked

17
One is relevant to what I experienced: application windows constantly
display Not responding.14 Why it ought to be considered a component of
the cyber-disruption I regularly experience is because it happens all the
time. It occurs upwards of or more than a dozen times a day every single
day when engaging in authorship thats related to reform and accountability.

When you and your partner arrived at my apartment on Tuesday I was in


the process of compiling my photographic evidence files for this cover letter
/ correspondence. There are over two hundred digital photos of the
malfeasance that have accumulated over the years. You will recall observing
my computer monitor and seeing some of them displayed.

Here are the dates on which evidence documentation was authored: 2013:
September 12; 2014: March 7, March 11, April 17, April 29, May 5, May 11,
May 12, May 13, May 19, May 28, June 2, June 28, July 11, July 12, October
30, November 25, December 15, December 16, December 18, December 22,
December 25, December 31; 2015: January 1, January 7, February 19,
February 22, March 2, March 6, March 7, July 12, July 15.

It is very important to stress that the cyber-attacks Ive experienced over


the years arent very infrequent occurrences. They dont happen randomly
once or twice a week. Whats transpired has been every single day, hour
after hour, such that there are approaching and regularly exceeding some
two hundred every week. Not infrequently a half dozen to dozens of times a
week the malfeasance completely cuts off access to or freezes my Internet
access and halts word processing programs (Word, Notepad) to the point I

14
It may be relevant to the technical aspect of your investigation to know the
following: I contacted Shaw Cable on July 20th and was advised that on June
29, 2014 my Internet pipe was increased to 20 MGs per second.

18
must reboot; and a significant minority of times more than once and which
can reach five or six before the malfeasance is halted. And Ive noted what
my reform comprises is quite often a trigger for this criminality. The intent
dating back many years has been to not just generate the continually
reinforced perception what Im working on is being monitored, but also is
highly objectionable and therefore punitive retaliation is warranted.

It wouldnt be constructive for your investigations purposes to compile in


this correspondence all two hundred plus photos of the malfeasance.
Instead, the following are the categories of disruption and sabotage.

Cutting access to the Internet; unable to access a website. This occurs daily
and quite often several times. On occasion it takes one and sometimes
several reboots and anywhere from ten minutes to two hours before full
access is allowed.15

15
A cyber-attack lasting just under five hours is documented in VPD Submission 2.
19
Freezing the initialization of Word. On occasion it takes upwards of five
minutes for it to be operating.

20
Scrambling a webpage image. To return to normal operation requires hitting
the refresh button.

21
Initializing the Page(s) unresponsive notification. Frequently, it would
return instantly after hitting the Wait button; and on occasion five and
more minutes would go by before access is regained.

Initialization the Shockwave flash isnt responding notification. Frequently,


it would return instantly and on occasion five or more minutes would go by
before access is regained.

22
Halting the loading of a website being accessed:

Blanking the entire screen of the website or Word doc:

23
Preventing a video stream from loading. Infrequently, I wouldnt get access
to it at all. On other occasions, Id have to hit the refresh button more than
once.

Preventing the initialization of Word. On occasion it would take upwards of


five to ten minutes to launch. On others, Id have to reboot sometimes more
than once to get it working again.

24
Significantly slowing a reboot. When theres no cyber-attack, a reboot takes
just a few minutes. When there is one itll take upwards of ten minutes.

Initializing the check disc diagnostic system. Infrequently, it will be


initialized because the process takes upwards of fifteen minutes to complete.

25
Initializing the bios diagnostic system:

Scrambling to illegibility fonts:

26
Adding splotches to the image:

Only permitting a partial loading of the Google webpage and recently visited
website icons:

27
Temporarily preventing the pop-up menu that includes the Explorer
initialization icon:

Cascading dozens of browser tabs:

Heres an instance of documenting the number of reboots before the cyber-


attack was halted:

28
29
Initializing the saving auto recovery program that halts word processing:

Trying to close a Word doc and the End Program function initializes:

30
Triggering buffering when watching video streams:

31
Triggering buffering when using Word and whiting the entire screen:

Blacking out the entire screen:

32
Change the space between Word doc pages from 1/8th of an inch to a sliver:

Preventing an email attachment from uploading:

33
Significant delaying the initialization of my digital camera photo downloading
window from seconds to sometimes five to ten minutes; and slowing the
picture downloading process from seconds to minutes:

Infrequently initializing a Canon digital camera window that is superfluous


and only had the objective of reminding me my reform initiatives were being
monitored. The fact is the device is not already being used by Windows.

34
Causing the highlighting of the Pixresizer desktop icon and continuing to
keep it that way for hours after having halted that illumination.

35
Causing a doubling of just typed text:

Inserting formatting identifiers:

36
The rearranging of bottom navigation bar commands several times a day.
I always place them in the following order: Explorer, Chrome Browser, Word,
Notepad.

Disable wireless keyboard and mouse. On several occasions both were made
inoperative. When the latter was I retrieved from storage the land line
version and used it until the cyber-attack was halted. With respect to the
former I kept rebooting until it was allowed to function properly.

Causing the uppercase function to initialize. At least once a day Ive had to
hit the Caps Lock key to disengage WHAT WAS MADE TO BE THIS.

Generating spelling mistakes, causing grammatical and syntax errors,


removing files from the ISP and breaking links. In November 2010 I
published an eBook and added this caution to the introduction for my
audiences edification:

Addendum [X] compiles, often with photographic evidence, many of the


kinds of electronic interference and cyber-sabotage thats been
experienced over the years. Consequently, its to be expected that
intrusions in one form or another may be employed to make this eBooks
author, me, look academically incompetent.

Two manifestations you might encounter are spelling mistakes and


grammatical errors. On previous websites I constructed many years ago,
words were regularly altered and the structure of sentences changed
made to be incomprehensible, leading to the conclusion that spyware and
Trojan horses surreptitiously installed on my computer were used to
discover the password to the server on which the information was
posted; and then gain entry to my account to engage in what amounts to
electronic vandalism.

In addition to changing words and sentences, many times uploaded files


had been removed and links broken. A check of links in the Chapter 5
and 6 indexes on January 1, 2011 revealed dozens have been since
publication.

37
From June to August 2006 I kept a daily diary of all forms of computer and
Internet unlawfulness16:

Thursday, June 22, 2006: Attempt at 12:02 a.m. to transfer from the C:
drive to the A: drive an authored chapter blocked by computer sabotaging
technology.17

Friday, June 23, 2006: Two authored chapter were blocked at 12:49 by
computer sabotaging technology. Copy function sabotaged at 12:44.
Internet access terminated at 12:53.

Saturday, June 24, 2006: Three authored chapters blocked by computer


sabotaging technology. Further, highlight and insert function sabotaged at
12:46.

Sunday, June 25, 2006: Attempt at 10:56 p.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology.

Monday, June 26, 2006: Attempt at 10:18 p.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Cut Internet Connection: 12:37.

Tuesday, June 27, 2006: Attempt at 12:04 p.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology.

Wednesday, June 28, 2006: Attempt at 12:11 p.m. to transfer from the C:
drive to the A: drive two authored chapters were unsuccessful and were
blocked by sabotaging technology.

Sunday, July 2, 2006: Internet access terminated at 7:31. Interference with


computer: 7:42; 7:45; 8:23.

Monday, July 3, 2006: Interference with computer: 9:08.

16
The unlawful conduct described until page 42 herein began much earlier. I only
decided to create this diary because there was so many cyber-attacks. Further,
they were in direct reaction to the May 26, 2006 contract I had with the U.S.
government to pursue reform and accountability.
17
I would continue trying to transfer the new or amended chapter until it was
successfully backed up on a floppy disc.
38
Tuesday, July 4, 2006: Interference with computer: 6:09 X7; 6:12 X2; 6:13;
6:35.

Wednesday, July 5, 2006: Computer interference: 7:45; 7:55 X2; 12:50;


2:12; 2:23. TV clicks 8:13; 10:46.

Thursday, July 6, 2006: Internet connection terminated: 12:53. Computer


interference: 1:01; 12:06; 1:09; 3:54; 8:16. Attempt at 1:09 p.m. to
transfer from the C: drive to the A: drive authored chapter was blocked by
computer sabotaging technology.

Friday, July 7, 2006: Computer interference: 11:18; 12:14.

Saturday, July 8, 2006: Attempt at 12:26 p.m. to transfer from the C: drive
to the A: drive an authored chapter blocked by computer sabotaging
technology. Computer interference: 8:04; 8:51; 8:55; 9:01; 9:56; 10:16
X3; 11:14; 11:20 X2; 1:41 X4; 6:13; 8:11 X2; 8:12 X5; 8:21; 8:25 X3;
8:26; 8:27 X2; 8:31; 9:09.

Sunday, July 9, 2006: Attempt at 12:04 p.m. to transfer from the C: drive to
the A: drive an authored the chapter was blocked computer sabotaging
technology.

Monday, July 10, 2006: Attempt at 12:15 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 7:02; 8:43; 2:09; 10:32.

Tuesday, July 11, 2006: Attempt at 12:19 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Cut Internet connection: 9:51.

Wednesday, July 12, 2006: Attempt at 1:15 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 10:45.

Thursday, July 13, 2006: Attempt at 12:06 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Crash Internet connection: 8:54; 9:36; 9:39; 9:42.

Friday, July 14, 2006: Attempt at 12:10 a.m. to transfer from the C: drive to
the A: drive an authored chapter was blocked by computer sabotaging
technology.

39
Saturday, July 15, 2006: Attempt at 12:10 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology.

Sunday, July 16, 2006: Attempt at 7:10 a.m. to transfer from the C: drive to
the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 8:43a.m.. Computer interference:
8:05p.m.; 10:10.

Monday, July 17, 2006: Attempt at 12:20 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 11:28 X2; 12:11.

Tuesday, July 18, 2006: Attempt at 12:22 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 9:48.

Wednesday, July 19, 2006: Attempt at 12:29 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 9:48.

Thursday, July 20, 2006: Attempt at 12:08 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 8:27.

Friday, July 21, 2006: Attempt at 12:05 a.m. to transfer from the C: drive to
the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 10:14 X3.

Saturday, July 22, 2006: Attempt at 12:20 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 10:59.

Sunday, July 23, 2006: Attempt at 12:01 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 8:51.

Monday, July 24, 2006: Attempt at 12:04 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Internet interference: 9:58. Cut Internet connection: 9:59
a.m.; 10:03; 10:04. Denied Internet access: 10:00 p.m..

40
Tuesday, July 25, 2006: Attempt at 12:39 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 3:44 X2; 8:23; 8:24; 10:22 X2.

Wednesday, July 26, 2006: Attempt at 12:19 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 12:27 X2; 1:51; 1:57; 5:16;
10:30; 10:43; 10:54 X2.

Thursday, July 27, 2006: Attempt at 12:15 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 8:38 X10; 9:47; 10:39;
10:51; 11:37; 12:21; 12:30; 1:22; 1:25; 1:43 X22; 3:10; 10:03; 10:14 x
88; 10: 14 X12; 10:15 X19; 10:36 X3; 10:47; 10:53. Interference with
Internet: 10:30.

Friday, July 28, 2006: Attempt at 12:07 a.m. to transfer from the C: drive to
the A: drive an authored chapter was blocked by computer sabotaging
technology. Internet connection denied: 2:36 2:39 X4. Internet
interference: 2:40 X2. Computer interference: 2:44; 2:45 X2; 2:58 X5;
3:09; 10:34; 10:37 X20; 11:13 X3; 11:14 X20; 11:35; 11:45; 12:18;
12:26; 12:38 X5; 12:51; 1:19 X5; 5:33.

Saturday, July 29, 2006: Attempt at 12:01 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 12:20 X10; 12:21 X3;
12:37; 12:39; 12:43 X7; 1:43 X2; 1:44; 2:31; 2:32; 2:37; 2:38; 2:51;
4:09 4:10; 4:17; 4:26; 4:32; 4:47; 4:58; 4:59; 5:00 X2; 5:12; 5:31; 8:36;
9:11; 9:40; 9:53 X2; 9:54; 10:45 X2; 11:09.

Sunday, July 30, 2006: Attempt at 12:03 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 12:11; 12:14; 9:27; 9:31; 9:54;
10:12; 10:21; 10:25; 11:38 X2; 7:52; 8:39 X15; 8:43 X 5; 9:03 X4; 9:20
X3; 9:54 X2; 10:07 X23; 11:30 X14. Cut Internet connection: 12:08;
12:09.

Monday, July 31, 2006: Attempt at 12:10 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 12:10.

Tuesday, August 1, 2006: Attempt at 12:04 a.m. to transfer from the C:


drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 2:46; 3:56.

41
Wednesday, August 2, 2006: Attempt at 12:14 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 8:43.

Thursday, August 3, 2006: Attempt at 12:21 a.m. to transfer from the C:


drive to the A: drive an authored chapter was blocked by computer
sabotaging technology Computer interference: 8:43.

Friday, August 4, 2006: Attempt at 12:06 a.m. to transfer from the C: drive
to the A: drive an authored chapter was blocked by computer sabotaging
technology. Computer interference: 5:22; 5:24.

Saturday, August 5, 2006: Attempt at 12:02 a.m. to transfer from the C:


drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 8:51; 11:15; 11:24; 11:33
X3; 11:41 X2; 7:23; 10:23; 10:55.

Sunday, August 6, 2006: Attempt at 12:01 a.m. to transfer from the C:


drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 8:43; 5:34 X2; 11:49 X2.

Monday, August 7, 2006: Attempt at 12:16 a.m. to transfer from the C:


drive an authored chapter was blocked by computer sabotaging technology.
Computer interference: 2:35.

Tuesday, August 8, 2006: Attempt at 12:16 a.m. to transfer from the C:


drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 7:52; 7:57; 8:43; 3:06 X2.

Wednesday, August 9, 2006: Attempt at 12:16 a.m. to transfer from the C:


drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 11:04; 11:12.

Thursday, August 10, 2006: Attempt at 12:27 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 7:59.

Friday, August 11, 2006: Attempt at 12:24 a.m. to transfer from the C:
drive to the A: drive an authored chapter was blocked by computer
sabotaging technology. Computer interference: 5:10; 9:30.

42
In mid-June 2012 I authored The Unconstitutional Interference With and
Criminal Sabotage of the Emerging Canadian Citizens Party (Chapter 3); and
on pages 15 and 16 is my compilation of criminal activity:

(i) seize up and crash the computer, requiring a full reboot

(ii) stop files from being saved to disc

(iii) shutting off and turning on the auto spell check and auto correct
functions

(iv) manipulating and blocking his Explorers ability to search files on the hard
drive

(v) suspend the copy-paste function -- not being able to capture the
intended text so it can be transferred from one place on the page to
another or from one document to another

(vi) initiate various programs to fill the screen with unwanted windows

(vii) trigger the virus scan window

(viii) manipulate the tab command

(ix) initiate the insert command, which has the effect of eliminating type as
one adds text to a document, and

(x) alter highlighted text the user has selected for elimination or amendment

(xi) changed the type line function from a space and a half to a space

(xii) the type went from normal to bold, and

(xiii) the margin alignment function was altered.

Another method of interference included surreptitiously downloading gigabytes


of undetectable data - what was labelled black matter - that filled up the hard
drive leaving only a few dozen megabytes of space on it. That rendered
information and evidence acquisition and authorship exceedingly slow to
impossible.18

A website was constructed and launched in December 2008 to post research


material. It was also interfered with in the following ways:

18
This unlawfulness is identical to what I described on page 2 above.
43
(i) going into authored content and (a) breaking links between web pages
and (b) changing link information to prevent access to other websites and
directing readers to another web page

(ii) changing or deleting content just authored, and

(iii) temporarily seizing up or crashing the computer during the uploading


process.

From pages 18 to 30 in The Unconstitutional Interference With and Criminal


Sabotage of the Emerging Canadian Citizens Party (Chapter 3) there is
documentation of two cyber-attacks that were so substantial it required the
attention of the computer system vendor over the course of many hours to
purge the malware. Also note a third attack (pages 38 to 40). I conclude
with Only after [I] disconnected [my] computer from the Internet was
command of the computer returned to [me]. And this has been the case on
so many occasions. When the cyber-attack becomes protracted, the only
way to terminate it is to disconnect from the Web.

Not only were my law practice, two entrepreneurial ventures and a plethora
of reform and accountability initiatives sabotaged in many different ways
employing cyber-attacks, so was my latest business undertaking. In mid-
January 2015 a friend of some twenty years and former squash adversary at
the citys Bentall Center Athletic Club retained me to help raise US$4.5
million to purchase a producing gold mine in the Yukons Klondike Gold
Fields. My remuneration was a US$135,000 finders fee. I launched a
website so that companies could conduct due diligence. 19 Because all my
solicitations were to mining firms outside Canada I wanted to identify and
keep track of who was gaining access after my telephone and/or email
introduction.

19
http://mcpp.yolasite.com
44
[...]

45
[...]

To do so I added a traffic tracker on or about February 20th. It was


sabotaged on or around March 29th.

46
I wasnt surprised when all of a sudden and for no apparent logical reason
the tracker stopped identifying who was gaining access. Because of what
had transpired with respect to my reform and accountability initiatives and
all the cyber-malfeasance it was an easy inference that the same responsible
parties had fatally compromised the tracking system.

How does one establish the evidentiary inference criminal activity was
involved? Before the tracker stopped functioning I received automated
emails every Monday. Then after statistics on the previous weeks traffic
were no longer being generated I was still receiving emails which meant
that as far as the service was concerned the system was still operational:

47
Over the years so many times have documents, including academic
authorship and correspondence, been wiped off my hard drive I commenced
a while ago the process of forwarding the most important of them to my
reform colleagues to maintain back-ups. The most recent request was this
one:

erik andersen <twolabradors@shaw.ca>, Don Reid <don.mulberry@gmail.com>,


Dennis Shaw <dennis.bcr@gmail.com>, Jim McIntosh <jim@mcintosh.on.ca>,
Neil Fenske <n.e.fenske@sasktel.net>,
William Morin willpower@ontera.net

Tue, Jun 23, 2015 at 12:13 PM

Gentlemen:

I'm about to launch another reform and accountability initiative. To


prevent the attached documents from disappearing from my hard
drive, I'm forwarding a copy to each of you for safe keeping.

On Sunday this was displayed on my computer screen for the first time that
I can remember.

48
This is a manifestation of what has been documented by academics who
study the security establishment as standard behavior. A culture of
harassment, coercion20, intimidation and fear generation is described in
Whose National Security? Canadian State Surveillance and the Creation of
Enemies, Kinsman, Buse, Steedman (Between the Lines Toronto, 2000):

The national security campaigns would stir up and maintain a


climate of fear directed against those defined as different or
other and thereby also help to maintain the control of people
located in positions of power and privilege.

By the political and economic leaderships definition, reformers are


different and constituent the other because they stand in opposition to
their interests (which include that of the Beijing leadership).

Pages 27 to 32 of the included Chapter 1 comprise a window into who jointly


operates Canadas Internet infrastructure.21

Bell Canada selects Huawei Technologies to provide infrastructure


development for national wireless network enhancement

[Toronto, Canada, 14 October] Huawei Technologies today announced that it


has been selected by Bell Canada to provide network infrastructure for its
national overlay of HSPA (High Speed Packet Access) technology to its
national EVDO (Evolution Data Optimized) wireless network. The HSPA
overlay will also offer Bell an efficient upgrade path forward to LTE (Long
Term Evolution), the global Fourth Generation (4G) wireless standard. The
multi-year, multi-million dollar agreement will see Huawei providing Bell with
radio access network technology for its new next generation wireless
network.

20
Using psych wards to silence reform and dissent and punish those involved is
another methodology of coercion. The administration of powerful pharma-
ceuticals as I experienced in February 2005 has over the last few years caused
some internationally to label that conduct torture.
21
This evidence is to be contextualized with respect to the findings of the CSIS-
RCMP Sidewinder Report referenced above which demonstrated that vast
swaths of the Canadian economy were in the mid-1990s directly and indirectly
owned and operated by Beijing and mega-wealthy Chinese nationals.
49
"It is an honour to be selected by Bell in building the company's next
generation wireless network," said Ken Hu, Executive Vice President and
Chief of Huawei. "Carriers are looking for long-term partners as they future-
proof their wireless network infrastructure. Huawei has globally deployed
industry leading UMTS/HSPA technologies as well as taking a leading position
in LTE development and we are dedicated to helping Bell enhance its
competitiveness in the Canada market."

Stephen Howe, Bell Senior Vice President of Wireless Network and Chief
Technology Officer said: "Bell is committed to delivering Canadians the
broadest choice in high-speed wireless service now with national 3G service
and in future as we prepare to move to LTE. We are proud to work with
industry leading technology providers such as Huawei Technologies to make
both these objectives a reality."

The company has major and exceptionally problematic connections to the


Peoples Liberation Army (PLA):

Chinese Tech Giant Tries New Tack to Enter US Market But claims of
independence are false, say experts
by Matthew Robertson
Epoch Times
March 1, 2011

Huawei, the Chinese tech giant, is tired of being blocked from the U.S.
telecommunications market. For more than a decade it has been dogged by
security concerns over links to the Chinese Communist Party (CCP) and
Chinese military. In a recent open letter, it says that these accusations are
vague and unfair, and that in fact, Huawei has no such ties.

But not according to analysts. Its perfectly understandable from a public


relations-flak point of view, says James Mulvenon, vice president of the
Intelligence Division of Defense Group Inc., but that doesnt make it true.
Mr. Mulvenon has researched Huawei for over a decade.

Richard Fisher, an expert on Chinas military modernization who wrote a book


on the subject in 2008, was blunter, This is flat out BS. You can quote that."

Huawei has long coveted the U.S. Telecommunications market, the most
lucrative in the world. Attempts to sell its wares in the United States have
repeatedly met with staunch resistance from Congress and the intelligence
community. Its most recent response has been a sophisticated PR campaign.

[]

50
Huawei Shenzhen Technology Company was founded in 1988 by Ren
Zhengfei, the former director of the Peoples Liberation Army (PLA) General
Staff Departments Information Engineering Academy. He was responsible for
telecom research for the PLA before going into business.

His company got its start laying down the fiber optic network, which became
the basis for the computerization of China in the 1990s, Fisher says. This was
a job closely connected to the needs of the PLA and particularly its first
mission, which is to keep the CCP in power.

A widely quoted 2007 Rand Corporation report says, Huawei maintains deep
ties with the Chinese military, which serves a multifaceted role as an
important customer, as well as Huaweis political patron and research and
development partner.

[]

The Epoch Times analyzed over a dozen speeches and articles by Ren,
including ones published in the internal magazine Huawei People. The picture
that emerges shows that Mr. Ren is a committed adherent to communist rule
in China.

While in the military Mr. Ren was a model for learning from Mao, Maos
stratagems of war communism helped form Mr. Rens understanding of
Huaweis corporate culture.

One article enthuses: He has deep understanding of Maos theory in military


strategy, methods for dealing with the general public, conflict resolution,
dialectical materialism, and others areas. He applied those theories and uses
them as the foundation of his corporate management strategy.
Mr. Ren regularly commends the rule of the Party in his remarks. Mr. Ren has
said, Only the CCP can make China develop steadily, and Employees of
Huawei always love the country, love the people, and love the Party as our
corporate culture.

Huawei also has active Communist Party cells inside the company. Party cells
are a form of social control exercised across government, military, and
industry in China. Major organizations have Party branches, according to Mr.
Fisher. The existence of a Party branch inside Huawei can be seen as both a
display of ideological commitment to the Partys rule by Mr. Ren, and an
increase in the Partys level of control over Huawei, Mr. Fisher said.

Mr. Fisher says that to prove it is independent from the Party and state, and
could not be a proxy for Chinese intelligence or military activities, Huawei
would have to explicitly detail the entire history of its relationship with the
CCP.

51
It would have to, as well, detail and identify all of the Party members within
its leadership. And it would have to detail the history of its Party cell. It
would have to detail all of the work that it has done for the Chinese military
for Chinese intelligence organizations, and detail its current relationship, Mr.
Fisher said.

Why Huawei Has Congress Worried


by Thomas Claburn
InformationWeek
October 9, 2012

Chinese telecommunications firms Huawei Technologies and ZTE Corp.


should be viewed as potential threats to national security, a U.S.
congressional report said on Monday.

The report, "The U.S. National Security Issues Posed by Chinese


Telecommunications Companies Huawei and ZTE," presents the results of a
House Permanent Select Committee on Intelligence investigation begun in
November 2011, nine months after Huawei published an open letter
challenging "unfounded and unproven claims" that the company has ties to
the Chinese military.

The report says that neither company cooperated sufficiently with the
investigation and makes several recommendations for U.S. companies and
government agencies that deal with either of the Chinese companies.

While noting that non-compliance isn't the same as wrongdoing, the report
nonetheless concludes "the risks associated with Huawei's and ZTE's
provision of equipment to U.S. critical infrastructure could undermine core
U.S. national-security interests."

According to the report, the increasing global dominance of Huawei and ZTE
in the telecom equipment market affords the two companies with an
opportunity to spy or conduct malicious activity.

Because U.S. authorities continually cite the threat from Chinese cyber-
espionage and both companies are Chinese-founded, Chinese-owned, and
have ties to the Chinese government and military, the report concludes that
the lack of satisfactory answers from the two companies demands that
Huawei and ZTE should be viewed with suspicion and their telecom
equipment should be avoided.

Combine Canadas publicly non-transparent trans-generational authoritarian


rule with four decades of Chinese joint governance and the categories,
amounts and duration of cyber-criminality are to be expected. These

52
Criminal Code violations are proven beyond all doubt as described and
compiled herein; and more so given whats documented in VPD Submission
2.

Two political and foreign policy characteristics that have been patently
obvious and many times brazen are arrogance and belligerence.
Democratic leaders and their subordinates submit to the dictates of law,
justice, personal accountability and international standards and norms.
Authoritarians and communists do not. Instead, they bristle at the thought
of being compelled to operate within the confines of, for instance, the
Criminal Code of Canada and United Nations human rights enactments.
While ordinary Canadians enjoy functioning courts and administrative
tribunals and observe and benefit from a press that to them is free to report
government improprieties, malfeasance and corruption, the opposite is true
for those in my position.

What has been more than apparent over the years is that my contractual
collaboration with the U.S. Government caused them to do what has been
noted of totalitarians, despots and dictators in the 20th century and recently;
namely, upon being condemned and demands made they reform they
engage in more criminality, human rights violations and egregious
impropriety. Over the last decade this reactionary behavior was noted in
North Koreas Kim Jon Il, Burmas military junta, Iraqs Saddam Hussein,
Libyas Momar Kaddafi and Syrias Bashir al-Assad. They do so in the
accurate belief they are virtually untouchable when operating behind
sovereign borders. Only when circumstances become acute, like genocide or
being a military threat to neighbors, a region or the world, does the
international community have the jurisdiction to intervene. All the

53
community of nations can do when these conditions dont exist is to
condemn, effect isolationism and impose economic and military sanctions.

The transition of China from Cold War sideliner to a mid-21st century global
economic and military superpower delivers a unique series of challenges for
the United States, its allies and emerging democracies. The Beijing
leaderships global military menace is as acute as it is insidious. Canadas
southern neighbor became aware of its threat to national and economic
security interests in the early 2000s; but the Bush and Obama
administrations got distracted, which led to abdicating their responsibilities
in these two regards. The latter has been and continues to play catch-up in
terms of shoring up defenses.

The interconnectedness of the Chinese, Canadian and U.S. economies


presents serious and very difficult obstacles. Americas defensive behavior is
constrained for this and other legitimate reasons. The two colluding
adversaries to democracy, the rule of law, human rights and free market
capitalism persist with the view that our southern neighbor and its allies will
remain geo-politically impotent in perpetuity. Im of a different opinion.
Theyve backed the sleeping American giant into a corner; and history
proves over and over and over it always comes out swinging and, as
importantly, triumphant.

Depriving Beijing of its Tibetan-esque province north of the 49th Parallel has
been, at least in word but not yet deed, a major U.S. foreign policy objective
during the last few years. President Obama, his cabinet and international
counterparts have little wiggle room with respect to the staunch
communists; but theres more that can be pursued in the relationship with
Canada being Americas next door neighbor, largest trading partner and

54
one of the countrys largest suppliers of energy. I expect the approach when
launched will either be incremental or publicly non-transparent shock and
awe. It may begin with aggressively challenging and stressing Canadian-
China intelligence capabilities; since some if it is directed at the U.S. as part
of a wider strategy of military and industrial espionage. The soft underbelly
includes the culpability exposure of those who have been using cyber-
attacks all these years to disrupt and defeat my U.S.-supported reform and
accountability. Thats why I state on page 16 above in bold font my formal
complaint lays the groundwork for that criminal justice and reform
initiative.

Your investigation ought to pursue other avenues; like the one I suggested
in Mondays voicemail. The RCMP could provide resources and guidance.
And if some of the cyber-attacks are originating in foreign countries, like
China, I.N.S.E.T. has jurisdiction.

Yours truly,

Brad Kempo Esq.

c.c. Shaw Cable, Customer Protection Team (Ref No. 983-53) & Tom
Copeland, Canadian Association of Internet Providers

55

Vous aimerez peut-être aussi