i found out while in jail in maricopa county that invisible people do horrible things to inmates with invisible animals.

for example for me to take a show they fucked my ex girlfriend who was invisible at the time, in the shower next to me, with a fucking dog. yes you read that right a dogs penis was in her vagina the whole time i showered.

not only that, i was fucked by people who where invisible who had invisible animals with them. for example, snaked were used on my ass, a dog was used on my ass, a horse was used on my ass, and maybe even some odd shit with a penguin was used.

see these invisible people have a system set up called “control”. it is the name for the invisible computer system hooked up to everyones brains. it records everything. every muscle movement, every thought (images, sounds, etc), everything you hear and see.

even the invisible people are connected to control. so much that they are willing to do about anything to “pass controls”. passing control is where a person has control checked on them and they are found not to be guilty of felonies, or lying.

with such a system a regular person with the right set of controls could be arrested, and be set free very quickly. see even the police and sheriff officers that are visible rely on this control system. they all hear voices and possibly even see images put directly into their brains telling them if you are passing control or not when you are being arrested by them.

they fuck people with animals as a way to lie against control.

some people sell their bodies and prostitute so they can say things while it is happeneing or see an image or hear a sound and then pass control using the control linked to another individual that they were prostituting to (they help you lie if you put out for them in short).

this is what was talking about when he or she said something like “words control worlds”.

now i will give more of an explanation about control and how the system works.

there is circuitry in your brain (yes it is invisible as far as i know which means it is made of antimatter and no it will  not be picked up on any standard scanner). this circuitry is connected to a distributed computer system. this system is called control.

when ever you are alive you have invisible antimatter people with you monitoring your control at all times. since birth. the original invisible people that were around would have been your family most likely. along with some other people but as when you are born you are not implicated in lying with control or any felonies you family probably hangs out with you quite a bit. they are under control, and they add control to you which is under there segment in the control database. these databases are usually linked to your family native country. control has been around since man was visible on planet earth as far as i know.

now lets go through average day as an adult while taking control into our perspective.

your asleep. everything you see and hear while asleep is part of control. invisible people control what you see and hear in your dreams. they use this to check control on you when you do not have the ability to defend yourself. now you wake up. you didn’t even realize that one of your invisible people made you wake up. so now you maybe get a change of clothes (controls are on almost everything you see, better put they are on everything you see). controls are checked on the clothes you are wearing, and the new ones you have yet to wear. you disrobe to get into the shower. controls are run on your body (yes people use shit, piss, booger (the british definition for booger (in control speak) is boo goverment ers (er in british speak is very violent. it means they stick you in a fucking er because of what they did to you. but you never notice this because there are invisible people in your family in it happens to them most of the time, not you)… scary. now your naked. you touch the shower objects to turn the water on. controls are checked on everything you touch, even the water. a change in temperature, control are checked. you get into the shower. now water rinses some of the invisible filth you have on your body off. controls are checked. next you take out your store bought soap to lather up. controls are used by the “owner” of the soap. controls are checked. you start to wash your hair. controls from the manufacturer of the shampoo are checked. your finish and turn off the shower. controls on the water, handles of the shower for hot and cold are checked. now you have to dry off. controls on the towel are checked.

now your supposedly “clean”, funny because you normally do not see the invisible filth which is on your body. you put on your deodorant, controls are checked you put on your cologne, controls are check, you brush your teeth, controls are checked. now you get dressed, controls are checked.

when i say controls are check i am saying that something related to the object has been entered in to the control database and every time you use whatever it is they check to see if someone lied, or someone was convicted of criminal activity using control.

now lets move on to food. your now hungry. you go to your fridge and guess what, controls are checked on about everything in the fridge. yes, lots of names of products, etc are run. even controls on the hardware which makes up the fridge is checked.

so yes now you know you cook the food, say in a microwave. controls are checked again. while that fucking food is cooking, and after. even the numbers on the time for the cook are controls.

how about tv. lets chat about tv now.

you sit down on your couch (which is a control someone is likely lying with).

turn on the tv.  controls are checked on every button you touch, the on led on the tv, and every part of the screen usually. now you want to watch your “favoritve tv show”.

what you may not know is the show is sitting there (yes while invisible people modify what is on the television screen) threaten you and your family with criminal activity and lies using the control system. tv is funny. they are there (invisible people) changing how the voices of the actors in the tv change, what they are saying may be changed to threaten you, and even onbjects and letters and numbers of the images on the tv may change. all to threaten you and in a attempt to murder you and your invisible family.

do not even get me started on a hospital. now that i a scary fucking place.

for now i am done.

just remember, with the correct combination of muscle movements, images in your brain, words said outloud or in your brain, etc you can pass control.

better said. bypass control.

scott parsons and honeywell

there is a guy named scott parsons who is from what i have been told related to the owner of the godaddy website which is not a lie. he chose to lie with his name and the name james and a wii u and a word of website. he also clained the internet as a word. he from what i have been told illegally breaks the law and backdoor computer hardware equipment at honeywell or he was doing that when he worked there.

a new radioactive power source

i have come to understand it may be possible to get more power out than you put in using this new technique.


you take a radioactive metal, pump high voltage low and (from my approx) low amperage electricity through it at the voltage level required to emit a certain wavelength of gamma which displays the properties of the photoelectric effect. the gamma radiation is thus converted into electron movement!

a new magnetic lava lamp!

here i document my invention of the ferro fluid lava lamp.

the lava lamp is covered with a glass dome, half spherical in shape. the bottom is half a cube in shape in which the neodymium magnet rests on a gear which rotates the magnet there by changing the shape of the ferro fluid in the glass dome.

on the bottom is a light to make the dome glow.

i obtained a royalty free image from wikipedia on ferro fluid, and modified it to my liking.

the drawing is not that good but I rarely use the gimp now days.



magnetic_ferro_lava lamp!.png

magnetic_ferro_lava lamp!

star trek phasers in real life

this is a theory about sci fi fantasy being real.


phasers in star trek are nothing more than gamma radiation weapons.

they use a  radioactive metal with electricity and a mandy fielder focusing device to focus the beam of gamma radiation which can be deadly to humans.


you change the volltage to change the wavelength, and change the amperage to change the effected field.

about the programming notes on my site

i have been informed by someone that I plagiarized information in the creation of my notes on programming languages. i own many books, and I read quite a bit online and my notes were created from multiple sources. I do not even know all of the sources so if you think I somehow violated your copy write please let me know and I will update the programming notes which are mainly for me only anyhow.

who are the shadow brokers? the answer might suprise you.

update: someone has modified my website and changed the lowercase letters to capital letters so they could lie.

this is new information. it turnes out shana thompson is also involved in the hells angels.

well i figured i would out the shadow brokers since it is halloween!

may i ask is the group known as the shadow brokers really a woman from arizona name shana thompson? can you find here here at i think so. is she also the author of ? i think she is!

update: shana is aka: the drunk russian, rotten tomatos, annie, ann, pip, pippy long stalkings, little orphan annie, amanfrommars, amanfrommars1, ruth, red, big red, the shadow brokers, with more to come.

is this the ip that this girl uses for home and vpn ?

it just might be!

so there you have it.

your new name will be inbread woman.

what is arizona law enforcement using your internet for?

i ask you the question: just what is arizona law enforcement using your internet for?

the answer might suprise you.


child pornography, distribution of pirated software, distribution of pirated multimedia (music and movies), the distribution of 0day exploits to your computer systems for the purpose of backdooring your computers and planting evidence.


they are also using calea (communications assistance for law enforcement act) hardware to man in the middle attack your internet connections to modify what you see on the internet. this means you may get different search results than other people when you surf the net, and with the scripts they are using actually fake your browsing history so they can create fake evidence. If you are suspected of a crime they create large volumes of accounts on services that you use (yahoo, aol, facebook, twitter, tinder, etc) and they redirect you to their accounts by surrounding you with their peoples disinformation, lies, and even mislabeled content so they can say you clicked on something to obtain the content.


They take sites like google and modify your search results with large amounts of pages containing content they have created. Upping their results in the google search (click and advertising *fraud* Bby the way). They even modify the text of the search results and place words or partial sentences in there to threaten the “suspect”.


take a movie sharing site for instance. i found that by monitoring one of the movie sites which had pirated movies that a single female agent has upload a huge chunk of the movie base. yes, a government agent who is supposed to uphold the law was mass uploaded pirated movies. It gets worse. this site was ad driven, so not only was she helping people break the law, they were getting paid for her criminal activity.


another example: pirated software. did you know that the government agencies in the state of arizona are responsible a very large volume of the pirated software that is available on the internet? This s also ad driven. I even caught them using a software package for work within the government in the state of arizona which costs more than $1000 (ida pro)  and it was stolen software.


here in arizona the law enforcement thinks they are above the law aka “the untouchables” (their words).


I will tell you my story about how I came upon this information.

years ago I was a computer consultant for banks. one night a girl that I had slept with in the past many times called me multiple times and explained she wanted to come over and have sex with me. she came over, we had sex, then i asked her to leave. i didnt think much of it at the time as my girlfriend was gone for a while and it just seemed like cheating to me which I know was wrong but I did. a few days later the police department from phoenix (another city)  shows up to my front door (in glendale) and asks to speak with me. they said she claimed i kidnapped and raped her. i did not. i answered their questions and asked them to leave. then i payed for an attorney. i moved to another county shortly afterwards (yavapi county) and this is when I started noticing them on my internet.

in short it was like a living hell. every site i went to for the most part had images they planted that said things like “i rape” or “rapist” (yes in my internet now all the sudden are people starting to say odd things about rape). i found the ringleaders of this group and they have a website . turns out they are law enforcement and they lie on the website and say they are all in the United Kingdom. is a god example also, thats joseph m arpaio with a uk website were he tracks criminals using a web proxy to commit crimes.


then i started to notice it in person. everywhere i went people were calling me a rapist (in person mind you). this has not stopped to this day. most recently they started contacting me on tinder posing as women saying very sexual things and asking me to violently attack them such as (i really love being spanked and choked.. you into that kinda stuff?)


turns out they need me to have the profile (a character profile that is, for use in court to convict me with just my character) of a violent sexual deviant. so they can say I violently attacked that girl (i did not do anything violent to her, by the way) and convict me of kidnapping and violent rape.


so be careful, the things you see and hear on the internet just may be another corrupt official trying to get their name on the wall using your life as the price.


this corruption has to stop.


i have informed the police, the sheriff, and even the fbi.

they have refused to investigate my findings.

using the rekall memory forensics tool

download the latest recall sourcecode tarball and decompress.
change to directory that was just decompressed
sudo python install

cd rekall-gui
edit file
search for line which is :exec open(“rekall_gui/”).read() in VERSION_ENV
replace with : exec open(“”).read() in VERSION_ENV

save file
sudo python install

now rekall and rekall gui are installed.

Now onto creating the profile:
cd ../  (back to main rekall src dir that was decompressed)
cd tools/linux
make profile

this creates the zip file which is converted to a json file (the final version of the profile)
in your tools/linux directory there will now be a zip file

convert that zipfile to a json file like follows: rekall convert_profile myFinalProfile.json
next copy this json file somewhere in your home directory so it can be used later.

now lets use LiME to create the image of your RAM.

Download LiME at:
I personally just download the zip of the github dir and decompress it. anyhow lets move on to building the kernel module for memory dumping.

cd to LiME dir
cd src/

this will create a LiME kernel module in this directory (granted you need to make sure you install any prerequisites for LiME)

Lets perform the memory dump assuming the module was named LiME.ko, but again it is the only .ko in the dir:
insmod LiME.ko “path=/home/fuion/RAM.lime format=lime”

I know that rekall has its own memory utility but I found it to be a pain in the ass so I used LiME and it works great.

I would say now to create a directory and place both the json file and the RAM.lime files in it for safe keeping.

I used the rekall gui becuase the konsole based version gave me issues with the inventory and there was little documentation on it,
and the gui does not have this problem. also you can be running many plugins at the same time and it has a nice output
format which is easy to read. say what you will 😉

we now start the rekall gui and get right to digging inside the image file.

first step is to create a dir for use with worksheets that the rekall program uses: mkdir worksheets

now start rekall: rekall webconsole –browser –port 8001 –worksheet /home/fuion/worksheets

rekall will open your web browser and the rekall gui will be in it.
make sure if you are using noscript you allow the local host based pages to use scripts as they are required.

to start out click the “Session” button on the upper to left hand side of the page.
for now we will use just the default session, which will show on your right hand side of the page.
leave ept alone
for “filename” click the text box and browse to your LiME image
leave pagefile alone
for “profile” click the text box and browse to your json file
now you are set to start running plugins on the image
to exit this screen click the grey background which surrounds the manage templates screen, it will go back to the main
screen and you will now click the “Cell” button
a popup will be shown with options, select “Rekall Plugin”

*note that after using rekall for the first time the directory you created for the worksheets is populated with data files,
and if you start the rekall gui again without rm’ing the files in that directory you will have gui problems*

now on your screen you will see a green checkmark with the word plugin next to it.
below this the plugins are listed, so scroll down to the one you want to test and click on it once.
now you will she it shows more options (which most are optional) and at this point you want to
click the little green check box at the very top of the screen
it will load the plugin and create an output box on close to the middle of the screen
this box has the output for the plugin.
sometimes it can take a while to populate the output in this box

to make reading the output of the plugin a bit easier click the two little arrows (the ones going diagonally not just up and down) button
which is located at the very top of the plugins output box close to “default session”
this will resize the output box.

and that is about it!

for more plugins to be loaded repeat the procedure above and they will be added to the screen.
have fun using rekall!