• Report: #1107034

Complaint Review: BALDERAS'S JALAPENOS KITCHEN AND GRILL, INC.

  • Submitted: Sat, December 14, 2013
  • Updated: Sun, November 22, 2015

  • Reported By: alains1905 — san jose California
BALDERAS'S JALAPENOS KITCHEN AND GRILL, INC.
3251 20th ave suite 250c 1 polk street 1708 San Francisco, California USA

BALDERAS'S JALAPENOS KITCHEN AND GRILL, INC. JALAPENOS GRILL AND KITCHEN, JALAPENOS BALDERAS KITCHEN AND GRILL, MEXICAN, LA PARILLA, EL DIAMANT FRAUD, U-VISA, IMMIGRATION, ABUSE, TAX EVASION, HEALTHCARE FRAUD, FALSE IMPRISONMENT, ALIAS, THEFT, CONVERSION OF PROPERTY, REFUGE, BANK OF AMERICA, BANAMEX, MONEY LAUNDERING, ARGENTA, SAN FRANCISCO, STONESTOWN GALLERIA, SAN FRANCISCO STATE UNIVERSITY, DAN BLDRBSTS, MEXICO, JALAPENOS MEXICAN KITCHEN AND GRILL, BALDERAS DANIEL RENE, SARA LOURDES BALDERAS BARRIENTOS VALLEJO, LA PARILLA, XALAPA VERACRUZ, DANIEL BALDERAS, PARK MERCED, GRIJALVA DR., GARCES DR. MAQUARIE AUSTRALIA, CITY CLINIC OF SAN FRANCISCO, BERKELEY, 2020 KITTREDGE, 680 MISSION STREET, 1 POLK ST 1708, 1905, TOYOTA VENZA SILVER, San Francisco California

*Author of original report: DANIEL BALDERAS POSING UNDERCOVER GOVERNMENT KILLINGS

*Author of original report: DUTY OF CARE

*Author of original report: RESTRAING ORDER

*Author of original report: DOMESTIC TERRORISM

*Author of original report: NUCLEAR PLANTS

*Author of original report: VISA VIOLATIONS

*Author of original report: leg

*Author of original report: VOICE MORPHING

*Author of original report: radiation particles in dirty bomb

*Author of original report: TERRORISTS AND IMMIGRATION

*Author of original report: harassment from terrorists

*Author of original report: people smuggling

*Author of original report: DIRECT ENERGY WEAPONS USED BY TERRORISTS GANGSTALKERS AND WHITE COLLAR CRIMINALISTS

*Author of original report: targeted individuals of gangstalking

*Author of original report: The Narcissistic Family

*Author of original report: SOCIOPATH

*Author of original report: TRAITS

*Author of original report: VISA

*Author of original report: automatic 4 year status

*Author of original report: sara lourdes balderas barrientos vallejo

*Author of original report: execution

*Author of original report: DELERIUM

What's this?
What's this?
What's this?
Is this
Ripoff Report
About you?
Ripoff Report
A business' first
line of defense
on the Internet.
If your business is
willing to make a
commitment to
customer satisfaction
Click here now..

Does your business have a bad reputation?
Fix it the right way.
Corporate Advocacy Program™

SEO Reputation Management at its best!

Daniel claimed refuge and residency in San Francisco  although living in Berkeley  only a month ,being on a student visa to apply for government assistance and  receive free treatment by the city.

4 years later 2011 , after opening a restaurant Jalapenos Mexican Kitchen and Grill which was his discreet  goal on a student visa working the system to remain with legal status, unemployed spending enough for TWO families monthly, and receiving government aid, he  files a restraining order without notice as a form to get one more benefit out of our relationship. Shockingly parents who do not live in this country and very well known for their food buisnesses, La Parilla El diamante internationally located in Xalapa Veracruz Mexico and never have been here more than a couple weeks decided to include themselves in the "harassment via text" abuse statement as an effortless way for qualification benefitting from US VISA victim protective laws

THE MOST INFURIATING PART WAS THAT SARA LOURDES BALDERAS BARRIENTOS VALLEJO, WOULD NOT LET ME SPEAK TO HER SON AND APPOINTED HERSELF AS HIS POINT OF CONTACT DUE TO KNOWLEDGE OF HER SONS TRUE SELF, LACK OF ACCOMPLISHMENTS, DISTRUST, EVERLASTING HUSH MONIES AND INABILITY  TO BE AN ADULT AND  COMMUNICATE WITH ME HIMSELF. [continued below]....

.....

HAVING NO OTHER OPTIONS, I WOULD SPEAK TO SARA AND QUESTION HER IGNORANT REMARKS ABOUT HER SONS BEHAVIOR, NOT KNOWING MORE THAN WHAT WAS PLAYED OFF BY HER SON EACH TIME TO GET HER TO HANG UP THE PHONE DAILY.

SHE WOULD SPEAK TO ME, LIKE THE CARING GENEROUS PERSON I THOUGHT SHE HAD BEEN FOR 4 YEARS, AS WE BOTH KNEW I HAD TAKEN THE RESPONSABILITY OF A PARENT, ONE THAT SHE EVEN KNEW SHE HAD FAILED. WITH MUCH GRATITUDE SHE WOULD HANG UP THE PHONE WITH ME AND INSTRUCT DANIEL ON HOW TO EXECUTE THE PLANS TO DEFRAUD AND CLAIM ABUSE, SUCH AS NOT ENTERING THE APARTMENT OR BEING DISTANT EVEN IF IT MEANT TO MENTALLY DESTROY ME WITH SELF- DOUBT.

DESPITE COMMUNICATING IT WAS ALL FABRICATED, AND KNOWING HIS CHARACTER MYSELF... IT WAS EXPECTED; HOWEVER EVEN HAVING HIS PARENTS COME FROM MEXICO OVER FALSIFIED CLAIMS OF ABUSE TO JUSTIFY INFIDEILTY IN THE RELATIONSHIP, NOT ABLE TO HOLD HIS OWN GROUND LIKE ANY ANOTHER MAN; IT WASNT ENOUGH TO SHOW HOW SELFISH AND MANIPULATIVE THEIR SON REALLY WAS EVEN IF THE CAPRICIOUS ACT COST THOUSANDS OF DOLLARS.

 

I know the kind of maintenance the owner has first hand, and is not trained or passionate about meeting any kind of standards wether it be food quality or following the health code. It has been a cover up, and most likely this buisness is more than just food. "substitutes" temporary new menu items tend to be ok,  simply because there is no knowledge of health codes and standards. 

It would be ignorant of me to assume, however i found out much later that my name was used as a member of the board and secretary knowingly that this would allow "flexibility" with payroll, taxes, scheduling, and overall buisness ethics. There has not been anything that contributes to the general public interests which was a requirement for approval of a buisness license .

offshore accounts, money laundering, falsified legal documents, governemnt assistance, news articles in mexico about hit and run driver accusations,  falsified abuse, shipping steroids and sex toys to the food buisness, " rat poopings", conversion of property, embesslement, defamation, false accusations, fraud on vehicle loans, I can say that the damages are piling up and that would most likely mean less priority towards the quality of business as a whole.

 

the damages are negelected,  and continue to plot further accusations, victimizing, and have no shame to claim such family traditions, which im sure are not food if anything.


This report was posted on Ripoff Report on 12/14/2013 01:42 PM and is a permanent record located here: http://www.ripoffreport.com/r/BALDERASS-JALAPENOS-KITCHEN-AND-GRILL-INC/San-Francisco-California-94321/BALDERASS-JALAPENOS-KITCHEN-AND-GRILL-INC-JALAPENOS-GRILL-AND-KITCHEN-JALAPENOS-BALDE-1107034. The posting time indicated is Arizona local time. Arizona does not observe daylight savings so the post time may be Mountain or Pacific depending on the time of year.

Ripoff Report has an exclusive license to this report. It may not be copied without the written permission of Ripoff Report.

Click Here to read other Ripoff Reports on BALDERAS'S JALAPENOS KITCHEN AND GRILL, INC.

Search for additional reports

If you would like to see more Rip-off Reports on this company/individual, search here:

Search Tips
Report & Rebuttal
Respond to this report!
What's this?
Also a victim?
What's this?
Repair Your Reputation!
What's this?
REBUTTALS & REPLIES:
22Author 0Consumer 0Employee/Owner
Updates & Rebuttals

#1 Author of original report

DANIEL BALDERAS POSING UNDERCOVER GOVERNMENT KILLINGS

AUTHOR: - ()

FOR THE LAST YEAR I HAVE HEARD VOICES IMPERSONATING MY FAMILY AND ACQUAINTANCES TOTALING APPROXIMATELY 20 PEOPLE DAILY, HARASSING ME, RIDICULING ME, AND MAKING IT A VERY VALUE POINT THAT MY EX-PARTNER DANIEL BALDERAS AND HIS MOTHER SARA LOURDES BALDERAS BARRIENTOS VALLEJO BLACKLISTED ME IN SOMEWAY TO GET ELECTRONIC HARASSMENT AND DO WHAT IS CALLED A “SILENT MURDER."

 

TO THIS DAY I AM UNSURE IF THE PERPETRATION IS AN AGENCY IN THE UNITED STATES CLAIMING AT TIMES TO BE THE NSA OR MEXICO DUE TO MIXED INFORMATION BY PERPETRATORS THAT SARA LOURDES BALDERAS BARRIENTOS PAID FOR THIS TO KILL ME TO GET LEGAL STATUS FOR HER AND 5 OTHER INDIVIDUALS LIVING IN MEXICO AND AVOID PROSECUTION FOR FEDERAL CRIMES.

 

I HAVE DO NOT HAVE ANY KNOWLEDGE AND IT AFFECTS ME PSYCHOLOGICALLY DAILY HOW DANIEL BALDERAS AND HIS MOTHER SARA BARRIENTOS WHICH LIVES IN XALAPA VERACRUZ MEXICO, BLACKLISTED ME WITH A PROGRAM THAT COULD GET EVERYONE INVOLVED KILLED FOR ITS CONNECTION WITH UNDERCOVER TARGETED KILLINGS BY THE GOVERNMENT.  AS OF OCTOBER 2014, MY FAMILY OF OVER 20 PEOPLE, PSYCHIATRISTS, DOCTORS, PARAMEDICS, POLICE OFFICERS, FIRE DEPARTMENT, PUBLIC DEFENDERS, AND MOST OF SAN JOSE AND CALIFORNIA GOVERNEMENT AGENCIES ARE BECOMING AWARE OF WHAT IS POSING AS GOVERNMENT SURVEILLANCE, IS POSSIBLY COMING FROM MEXICO, SOME INDEPENDENT AGENCY, AND ARE USING MIND CONTROL PROGRAMS WITH VOICES BEAMED AT VICTIMS BY PERPETRATORS WHO WORK TOGETHER USING COMPUTER PROGRAMS, SATILLITES;  USING THESE METHODS TO COERCE INNOCENT AMERICAN CITIZENS TO PARTICIPATE IN GANGSTALKING AND COMMIT ORGANIZED MURDER.

 

I AM REMINDED BY MY PHYSICAL ENVIORMENT AND MY ELECTRONIC HARASSMENT THAT DANIEL BALDERAS AND SARA LOURDES BALDERAS BARRIENTOS ARE INTERNATIONAL TERRORISTS, AND BEGAN THIS EPIDEMIC IN THE UNITED STATES TO CAUSE TERRORISM BY USING PERPETRATORS TO SPY THROUGH PEOPLES EYES, NOT ONLY TO HARASS ME AND TELL ME MY PRIVACY IS INVADED, IM MIND RAPED, AND REMINDED THEY HAVE KNOWLEDGE OF MY LOCATION TO GET BURGLARIZED, ASSAULTED, FOLLOWED, AND KILLED DAILY; (THEY KEEP ME HOSTAGE IN MY HOME WITH MY FAMILIES AWARENESS.)

 

 I AM TOLD THEY ARE DOING IT DISCREETLY TO FAMILY AND AQUAINTENCES ALSO WITHOUT THEIR KNOWLEDGE USING THEIR EARS AS A MICROPHONES AND EYES AS A HUMAN CAMERAS SENDING THEM THOUGHTS TO IGNORE ME AND REFUSE TO HELP ME FINANCIALLY, EVENTUALLY RUN THE RISK OF GETTING ME KILLED TO FOR SOME UNKNOWN BENEFIT.

 

I HAVE BEEN IN A HOSTAGE ENVIRONMENT SINCE FEBRUARY OF 2013 AT 661 GLENBURRY SAN JOSE, 50 MILES FROM SAN FRANCISCO AFTER BEING EVICTED FROM MY RESIDENCE UNLAWFULLY BY SARA BALDERAS BARRIENTOS VALLEJO AND DANIEL BALDERAS AS THEY SAID THEY WOULD GET ME KILLED “WATCHING ME FOR YEARS” AFTER EVICTION AND THAT I WOULD HAVE A HARD TIME GETTING HELP FROM AUTHORITIES BECAUSE I WAS THEN HOMELESS AND THEY EXECUTED A STAY AWAY ORDER FROM MY RESDIENCE AT 1 POLK STREET 1905 SAN FRANCISCO, , AND ORDERED STAY 100 FEET FROM THE BUISNESS WHICH DANIEL AND I HAD DUAL PARTNERSHIP AND PROMISED WOULD SUPPORT US FOR LIFE, BALDERASS JALAPENOS MEXICAN KITCHEN AND GRILL INC IN STONESTOWN GALLERIA.

 

FOR THE LAST 3 YEARS IT HAS BEEN IMPOSSIBLE FOR ME TO GET HELP FINANCIALLY FROM FAMILY, TRANSPORTATION TO COURT, UNLAWFUL EVICTIONS FOR MAKING POLICE REPORTS OF ABUSE, TO  PREVENT RECOVERING PROPERTY AND SEEKING RESTITUTION IN HUNDREDS OF THOUSANDS OF DOLLARS OR MY SHARE OF THE BUISNESS PROFITS HAVING MY OWN FAMILYS INVOLVEMENT WITH THE BALDERAS FAMILY. I WAS TRANSFERED AS A HOSTAGE FROM 1 POLK STREET 1905 SAN FRANCISCO TO 661 GLENBURRY WAY SAN JOSE BECAUSE OF THE SAME COMMON INTEREST FOR MY MOTHERS HUSBAND JAVIER GARCIA, IMMIGRATION BENEFITS AND LEGAL STATUS OR IN OTHER WORDS PEOPLE SMUGGLING.

 

MY HARDSHIPS BY VOICES USING ELECTRONIC HARASSMENT DAILY CONSTANTLY REMIND ME THAT THIS IS SOMETHING DANIEL BALDERAS PAID FOR FUNDED BY HIS MOTHER AND THAT THEY HAD A JOB TO DO HAVING THEM AS CLIENTS; TO TORTURE ME, HARASS ME, CONFUSE ME, PREVENT ME FROM LEAVING THE HOUSE BY THREATS FOR GETTING KILLED DAILY TO PREVENT POLICE INVOLVMENT, REPORTING FEDERAL CRIMES, FILING A COURT ORDER IN CRIMINAL OR CIVIL COURT FOR CLAIMS OVER 25,000.00  AND AS OF LATE CARELESSLY  BECOMING VERY OBVIOUS AND TELLING ME THEY ARE DELETING FILES ON MY COMPUTER, TAMPERING WITH EQUIPEMENT TO DAMAGE IT  OR LOSE PERFORMANCE, SPYING ON MY EMAILS, SEND TEXT MESSAGES  ON GOOGLE VOICE HARASSING PEOPLE, SPREADING RUMORS ON CHAT SITES TO PREVENT HAVING RELATIONSHIPS WITH PEOPLE, AND ACCESSING FACEBOOK; CONTACTING PEOPLE I SPEAK WITH OR COME IN CONTACT WITH ASKING FOR HELP TO IGNORE ME BY BRIBERY OR THREATS, STEAL FROM ME,  AND EVEN TORTURE ME DAILY WITH VOICES THAT PEOPLE I KNOW ARE PURSUEDED TO OBTAIN A GUN AND COME TO MY HOUSE IN THE MIDDLE OF THE NIGHT TO KILL ME BECAUSE THEY ARE EASY TARGETS WHO NEED THE MONEY.

 

Respond to this report!
What's this?

#2 Author of original report

DUTY OF CARE

AUTHOR: - ()

California Civil Code section 1714 imposes a general duty of ordinary care, which by default requires all persons to take reasonable measures to prevent harm to others.[8] In the 1968 case of Rowland v. Christian, the court held that judicial exceptions to this general duty of care should only be created if clearly justified based on the following public-policy factors:

  • the foreseeability of harm to the injured party;
  • the degree of certainty he or she suffered injury;
  • the closeness of the connection between the defendant’s conduct and the injury suffered;
  • the moral blame attached to the defendant’s conduct;
  • the policy of preventing future harm;
  • the extent of the burden to the defendant and the consequences to the community of imposing a duty of care with resulting liability for breach;
  • and the availability, cost, and prevalence of insurance for the risk involved.[9]
Respond to this report!
What's this?

#3 Author of original report

RESTRAING ORDER

AUTHOR: - ()

FALSE RESTRAING ORDER FOR VISA BENEFIT

Respond to this report!
What's this?

#4 Author of original report

DOMESTIC TERRORISM

AUTHOR: - ()

 18 U.S.C. § 2331 DEFINES "INTERNATIONAL TERRORISM" AND "DOMESTIC TERRORISM" FOR PURPOSES OF CHAPTER 113B OF THE CODE, ENTITLED "TERRORISM”: “INTERNATIONAL

TERRORISM" MEANS ACTIVITIES WITH THE FOLLOWING THREE CHARACTERISTICS:INVOLVE VIOLENT ACTS OR ACTS DANGEROUS TO HUMAN LIFE THAT VIOLATE FEDERAL OR STATE LAW;

 

 APPEAR TO BE INTENDED (I) TO INTIMIDATE OR COERCE A CIVILIAN POPULATION; (II) TO INFLUENCE THE POLICY OF A GOVERNMENT BY INTIMIDATION OR COERCION; OR (III) TO AFFECT THE

 CONDUCT OF A GOVERNMENT BY MASS DESTRUCTION, ASSASSINATION, OR KIDNAPPING; AND OCCUR PRIMARILY OUTSIDE THE TERRITORIAL JURISDICTION OF THE U.S., OR TRANSCEND

 NATIONAL BOUNDARIES IN TERMS OF THE MEANS BY WHICH THEY ARE ACCOMPLISHED, THE PERSONS THEY APPEAR INTENDED TO INTIMIDATE OR COERCE, OR THE LOCALE IN WHICH THEIR PERPETRATORS OPERATE OR SEEK ASYLUM.* "DOMESTIC TERRORISM" MEANS ACTIVITIES WITH THE FOLLOWING THREE CHARACTERISTICS: INVOLVE ACTS DANGEROUS TO HUMAN

 LIFE THAT VIOLATE FEDERAL OR STATE LAW; APPEAR INTENDED (I) TO INTIMIDATE OR COERCE A CIVILIAN POPULATION; (II) TO INFLUENCE THE POLICY OF A GOVERNMENT BY INTIMIDATION

 OR COERCION; OR (III) TO AFFECT THE CONDUCT OF A GOVERNMENT BY MASS DESTRUCTION, ASSASSINATION. OR KIDNAPPING; AND OCCUR PRIMARILY WITHIN THE TERRITORIAL JURISDICTION OF THE U.S. 18 U.S.C. § 2332B DEFINES THE TERM "FEDERAL CRIME OF TERRORISM" AS AN OFFENSE THAT: IS CALCULATED TO INFLUENCE OR AFFECT THE CONDUCT OF

 GOVERNMENT BY INTIMIDATION OR COERCION, OR TO RETALIATE AGAINST GOVERNMENT CONDUCT; AND IS A VIOLATION OF ONE OF SEVERAL LISTED STATUTES, INCLUDING § 930(C)

 (RELATING TO KILLING OR ATTEMPTED KILLING DURING AN ATTACK ON A FEDERAL FACILITY WITH A DANGEROUS WEAPON); AND § 1114 (RELATING TO KILLING OR ATTEMPTED KILLING OF

 OFFICERS AND EMPLOYEES OF THE U.S.). * FISA DEFINES "INTERNATIONAL TERRORISM" IN A NEARLY IDENTICAL WAY, REPLACING "PRIMARILY" OUTSIDE THE U.S. WITH "TOTALLY" OUTSIDE

 THE U.S. 50 U.S.C. § 1801(C).

Respond to this report!
What's this?

#5 Author of original report

NUCLEAR PLANTS

AUTHOR: - ()

The danger this situation poses is obvious. Although none of those arrested appear to have ties to terrorism, the idea that employee background checks in key areas are this lax points toward a danger that the Trumpet has warned about many times.

We already know that the borders of the U.S. are not even close to secure, with tons of illicit drugs and a million illegal immigrants crossing the U.S.-Mexico border every year. A terrorist could easily enter the U.S. with whatever destructive capabilities he brought along. But imagine how much damage someone with a fake id and access to a nuclear facility could cause!

Respond to this report!
What's this?

#6 Author of original report

VISA VIOLATIONS

AUTHOR: - ()

Visa Fraud

What is a visa?

The U.S. visa is a document, obtained at any U.S. embassy or consulate, granting a non-U.S. traveler permission to apply for admission into the United States at a port of entry. It is not a guarantee of entry into the United States. Department of Homeland Security inspectors determine if, and for how long, an alien is admitted. To learn more about applying for a U.S. visa, visit Destination USA.

There are two basic types of visas:

Immigrant visa (IV) — Immigrant visas are for people who intend to live permanently in the United States, as provided by the Immigration and Nationality Act.

Nonimmigrant visa (NIV) — Nonimmigrant visas are for people who wish to visit the United States temporarily–for tourism, medical treatment, business, temporary work, or study. Some applicants intend to abuse their nonimmigrant visas by remaining in the United States illegally.

What are typical types of visa fraud?

·         The sale, provision, or transfer of otherwise legitimate visas

·         Misrepresentation of reasons for traveling

·         Forgery or alteration of a visa

Who commits visa fraud and why?

·         Unlawful immigrants for a variety of reasons, most commonly including:

Economic considerations

Flight from prosecution

Facilitation of narcotics and terrorist operations

·         Brokers and smugglers in the furtherance of other crimes

·         Federal employees, usually for monetary gain

Visa fraud and related statutes include:

·         18 USC 1546    Fraud and Misuse of Visas, Permits, and Other Documents

·         18 USC 1001    False Statements or Entries Generally

·         18 USC 1028    Fraud in Connection with Identification Documents

·         18 USC 201      Bribery of Public Officials

·         18 USC 371      Conspiracy to Commit Offense or to Defraud the United States

Penalties for Passport and Visa Fraud

Passport and visa fraud are federal felonies. Penalties are:

·         10 years (for a first offense if not tied to terrorism or drug trafficking)

·         15 years for fraud with other criminal links

·         20 years for fraud related to drug trafficking

·         25 years for fraud related to international terrorism

Stop and give some thought to the fact that the penalty for visa fraud committed by a single alien is supposed to be a maximum of ten years in prison if the alien has not committed other crimes as a result of the fraud, fifteen years if criminal activities are involved, twenty years if the crimes involved include drug trafficking and twenty-five years if the fraud was committed in conjunction with terrorism!

Respond to this report!
What's this?

#7 Author of original report

leg

AUTHOR: - ()

leg

Respond to this report!
What's this?

#8 Author of original report

VOICE MORPHING

AUTHOR: alains1905 - ()

1. Let the computer talk in any persons own voice (called voice morphing). A recording of only ten seconds of a persons voice is said to be sufficient to apply this voice morphing technique.
2. Project the voice made with the voice morphing technology (the person 'own' (between brackets) voice) into the brain of the victim.
3. Let people in the environment of the victim know what the victim is thinking.
The perpetrators send the thoughts to the victim so the perpetrators can know what the person will think next, because they are sending thoughts to the victim and therefore control what the victim thinks to a very great extend, but the minds of the people in the environment to an even bigger extend, because the victims where attacked the victims usually took steps to protect themselves and legal action.
4. By knowing what the victim will think next (see previous point 3) and the victim not knowing her or his inner voice is not her or his own inner voice any more a victim can be driven crazy. I wonder how many people are in insane assylums that are totally normal but found out about the voice to skull technology.
5) The perpetrators changing a victims brain wave can be the same as the perpetrators letting people in the environment of the victim know what the victim is supposedly thinking, the same perpetrators that change the victim's brain-wave, but they can also be civillians that use advanced technology and subliminal message to change or perpetrators from other countries. Signal flow. Use equipment (spectrum analyzer, Narda microwave radiation meter, radar detector) to pick up the perpetrators signal to trace them to their location.

Respond to this report!
What's this?

#9 Author of original report

radiation particles in dirty bomb

AUTHOR: alains1905 - ()

(((see pic)))

Respond to this report!
What's this?

#10 Author of original report

TERRORISTS AND IMMIGRATION

AUTHOR: alains1905 - ()

The findings show widespread terrorist violations of immigration laws. The report highlights the danger of our lax immigration system, not just in terms of who is allowed in, but also how terrorists, once in the country, used weaknesses in the system to remain here. The report makes clear that strict enforcement of immigration law -- at American consulates overseas, at ports of entry, and within the United States -- must be an integral part of our efforts to prevent future attacks on U.S. soil.

Among the findings:

  • Of the 94 foreign-born terrorists who operated in the United States, the study found that about two-thirds (59) committed immigration fraud prior to or in conjunction with taking part in terrorist activity.
  • Of the 59 terrorists who violated the law, many committed multiple immigration violations -- 79 instances in all.
  • In 47 instances, immigration benefits sought or acquired prior to 9/11 enabled the terrorists to stay in the United States after 9/11 and continue their terrorist activities. In at least two instances, terrorists were still able to acquire immigration benefits after 9/11.
  • Temporary visas were a common means of entering; 18 terrorists had student visas and another four had applications approved to study in the United States. At least 17 terrorists used a visitor visa -- either tourist (B2) or business (B1).
  • There were 11 instances of passport fraud and 10 instances of visa fraud; in total 34 individuals were charged with making false statements to an immigration official.
  • In at least 13 instances, terrorists overstayed their temporary visas.
  • In 17 instances, terrorists claimed to lack proper travel documents and applied for asylum, often at a port of entry.
  • Fraud was used not only to gain entry into the United States, but also to remain, or "embed," in the country.
  • Seven terrorists were indicted for acquiring or using various forms of fake identification, including driver's licenses, birth certificates, Social Security cards, and immigration arrival records.
  • Once in the United States, 16 of 23 terrorists became legal permanent residents, often by marrying an American. There were at least nine sham marriages.
  • In total, 20 of 21 foreign terrorists became naturalized U.S. citizens.
Respond to this report!
What's this?

#11 Author of original report

harassment from terrorists

AUTHOR: alains1905 - ()

The listener needs to know that at least one method of voice to skull transmission, using microwave pulses much like radar, is not particularly new. During World War II, technicians working in the path of energized radar antennas discovered they could hear a buzz, seeming to originate inside their skulls. This buzz was being caused by the train of very short pulses of microwave signal, each pulse causing a single click.

In the early 1970s, Dr. Joseph Sharp of the Walter Reed Army Institute of Research used a computer to control a radar transmitter such that for each time a human voice waveform changed from a peak to a valley, the radar transmitter sent out a single pulse, causing a single click to be heard by the test subject. Because these clicks were timed according to the human voice waveform, the test subject heard a voice, rather than a string of clicks. This has not been pursued, at least publicly, due to concerns about the effect of microwave signals aimed at a person’s skull, but it does work.

In actual fact, a suitably modified amateur radio transmitter operating in either the 420 to 450 megahertz band or the 1.3 gigahertz band, with a highly directional antenna, is capable of transmitting voice to skull signals at less cost than the price of an automobile.

In addition to simply driving a target crazy, voice to skull can cause far more severe damage to a targeted person if instead of audible voice, one of several types of SUBLIMINAL voice is transmitted instead. When the subliminal voice is that of a hypnotist, and is aimed at a targeted person’s bed, voice to skull can be used over time to undetectably program the person. Because the power level required is fairly modest, being something like the output of the common heat lamp, the person being programmed could have no idea this was happening.

A person who is highly susceptible to hypnosis, and about one in five are, could be put through living Hell simply by way of subliminal voice to skull.

It is common for psycho-electronic mind control victims to report a very frequent or constant "ringing in the ears", which is also a symptom of the "Lowery" method of subliminal voice conversion. Lowery’s method is described in U.S. patent 5,159,703 and such a converter can easily be built by someone with reasonable electronic assembly abilities. Source: the7thfire.com

Effects of Radiation Harassment Technology (V2K) Technology - PERPS (Perpetrator or the harasser) have technology that in a nut shell can do the following:

  • They are a very faint sound, therefore a person interprets them as their own thoughts. Since they are a very faint sound, only those things that are know to a person can be manipulated. Put it simply they won’t be able to teach you Chinese. An example of this is that if a person says a sentence very slowly and close to your ears, then you will only understand it if you know it or parts of it, otherwise your interpretation of what’s being said would be different as compared to what was actually said.

 

  • PERPS use other means to make a person dwell on things that where unknown to them. Like after listening to a news article, or even other people saying something similar that PERPS would want a target to direct there thoughts on. Affects related to this are listed below. (VOICE)

 

  • They can vibrate certain muscles, affects related to that are mentioned below. (MUSCULAR)

 

  • Certain parts in nervous system react to them. Affects related to this are mentioned below. (NERVOUS)

 

  • They can cause power surges. (EMP) (EMP = Electromagnetic Pulses)

 

  • Give throat irritation, mucus formation. (MUSCULAR)

 

  • Watery mouth. (MUSCULAR)

 

  • Hyperventilation, sudden shortness of breath. (MUSCULAR)

 

  • Vibrate certain muscles in our body. (MUSCULAR)

 

  • Give different body aches and pains. Specially back ache. (MUSCULAR)

 

  • Tinnitus. (MUSCULAR OR NERVOUS)

 

  • Clogged ears. (Like the way it feels when the elevation changes, like in plane or in elevators). (MUSCULAR)

 

  • If a person have an existing condition, like a cut, or infection, they can make it really pain. (MUSCULAR)/(NERVOUS)

 

  • Nausea, headaches. (NERVOUS)

 

  • Listen to a person’s thoughts. Yes that’s what they are capable of. Lots of time, during early manipulation, that’s what a person complains of, that someone knows what they are thinking, or watching them all the time, however, not all is true, some of those thoughts are manipulated by PERPS. (NERVOUS)

 

  • Manipulate a person’s thoughts, by putting specific words while a person is thinking. (VOICE)

 

  • Manipulate a person’s emotions by making them angry or inducing anxiety or even make a person cry or laugh. (NERVOUS)

 

  • They can cause simple sounds to occur again and again. For instance, if a pager is set to simple beep, then they make a person to think that the pager is on, yet when its not. (VOICE)

 

  • They can cause surges, yes, the lights that went out recently in NY, is there doing. (EMP)

 

  • They can make minor malfunctions in electronic equipment. Causing them to flicker, or even in some cases render the equipment useless. (EMP)

 

  • Any sensor driven machine is prone to them. They can cause a light sensor to activate at night, causing the light to go out. (EMP)

 

  • They can temper with thermostats. Causing the air conditioner to come on, or the refrigerator to malfunction, or cause the car to over heat. Yep, that’s what they can do. (EMP).

 

Source: Voicetoskull.com

 

BEAMING VOICES - "…Until recently, people who believe the government is beaming voices into their heads would have added social isolation to their catalogue of woes. But now, many have discovered hundreds, possibly thousands, of others just like them all over the world. Web sites dedicated to electronic harassment and gang stalking have popped up in India, China, Japan, South Korea, the United Kingdom, Russia and elsewhere. Victims have begun to host support meetings in major cities, including Washington. Favorite topics at the meetings include lessons on how to build shields (the proverbial tinfoil hats), media and PR training, and possible legal strategies for outlawing mind control. The biggest hurdle for TIs is getting people to take their concerns seriously. A proposal made in 2001 by Rep. Dennis Kucinich (D-Ohio) to ban "psychotronic weapons" (another common term for mind-control technology) was hailed by TIs as a great step forward. But the bill was widely derided by bloggers and columnists and quickly dropped. Doug Gordon, Kucinich’s spokesman, would not discuss mind control other than to say the proposal was part of broader legislation outlawing weapons in space. The bill was later reintroduced, minus the mind control. "It was not the concentration of the legislation, which is why it was tightened up and redrafted," was all Gordon would say…" (Mind Games)

PATENT - "…Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10,000 megahertz that are modulated with a particular waveform. The waveform consists of frequency modulated bursts. Each burst is made up of ten to twenty uniformly spaced pulses grouped tightly together. The burst width is between 500 nanoseconds and 100 microseconds. The pulse width is in the range of 10 nanoseconds to 1 microsecond. The bursts are frequency modulated by the audio input to create the sensation of hearing in the person whose head is irradiated…" (Patent For Microwave Voice-To-Skull Technology)

SUSCEPTIBLE TO HYPNOSIS - "…In actual fact, a suitably modified amateur radio transmitter operating in either the 420 to 450 megahertz band or the 1.3 gigahertz band, with a highly directional antenna, is capable of transmitting voice to skull signals at less cost than the price of an automobile. In addition to simply driving a target crazy, voice to skull can cause far more severe damage to a targeted person if instead of audible voice, one of several types of SUBLIMINAL voice is transmitted instead. When the subliminal voice is that of a hypnotist, and is aimed at a targeted person’s bed, voice to skull can be used over time to undetectably program the person. Because the power level required is fairly modest, being something like the output of the common heat lamp, the person being programmed could have no idea this was happening. A person who is highly susceptible to hypnosis, and about one in five are, could be put through living Hell simply by way of subliminal voice to skull. It is common for psycho-electronic mind control victims to report a very frequent or constant "ringing in the ears", which is also a symptom of the "Lowery" method of subliminal voice conversion. Lowery’s method is described in U.S. patent 5,159,703 and such a converter can easily be built by someone with reasonable electronic assembly abilities…" (What is voice to skull?)

PSYCHOLOGICAL DAMAGE - "…When used as a "nonlethal" weapons system it becomes an ideal means for neutralizing or discrediting a political opponent. Peace protestors, inconvenient journalists and the leaders of vocal opposition groups can be stunned into silence with this weapon. Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read, then Passwords, PIN numbers, and personal secrets simply cannot be protected. One cannot be alone in the bathroom or shower. Embarrassing private moments cannot be hidden: they are subject to all manner of hurtful comments and remarks. Evidence can be collected for blackmail with tremendous ease: all the wrongs or moral lapses of one’s past are up for review. Like a perverted phone caller, a hostile person with this technology in hand can call at any time of day, all day long. Sleep can be disrupted. Prayers can be desecrated, religious beliefs mocked. Business meetings can be interrupted, thoughts derailed. Love can be polluted, perverted, twisted, abused. Dreams can be invaded, fond memories trashed. The attacker cannot be seen or identified, the attack cannot be stopped, and the psychological damage is enormous. But there is no physical damage, not one single mark is left on the body and there is absolutely no proof that any crime or any violation ever took place! Everything that "happens" to the victim happens inside the victim’s head. What physical evidence is there to give the police? Without physical evidence, how can one photograph the "crime scene" or fingerprint the stalker? There are no footprints leading to or from the scene. Indeed, there is no physical scene at all, and no evidence that an attack ever took place. Most people who experience this abusive form of "artificial telepathy" feel as if their mind has been raped. They find themselves hunted, stalked, harassed and abused by a person or persons who refuse to give their names, who defile one’s mind with the most foul and perverse language imaginable, and who refuse to hang up or go away. The caller or callers delight in the perverse and sadistic torture of their targets. Furthermore, they delight in violating the privacy of their targets, reading the target’s mind and commenting on everything the target thinks, in an effort to demonstrate as brutally as possible that the target has no privacy at all…" (Artificial Telepathy 101)

THE VOICE WILL PANETRATE THEIR INNER PEACE - "…Indeed it isn’t. It’s an ad for "Paranormal State," a ghost-themed series premiering on A&E this week. The billboard uses technology manufactured by Holosonic that transmits an "audio spotlight" from a rooftop speaker so that the sound is contained within your cranium. The technology, ideal for museums and libraries or environments that require a quiet atmosphere for isolated audio slideshows, has rarely been used on such a scale before. For random passersby and residents who have to walk unwittingly through the area where the voice will penetrate their inner peace, it’s another story. Ms. Wilson, a New York-based stylist, said she expected the voice inside her head to be some type of creative project but could see how others might perceive it differently, particularly on a late-night stroll home. "I might be a little freaked out, and I wouldn’t necessarily think it’s coming from that billboard," she said. Joe Pompei, president and founder of Holosonics, said the creepy approach is key to drawing attention to A&E’s show. But, he noted, the technology was designed to avoid adding to noise pollution. "If you really want to annoy a lot of people, a loudspeaker is the best way to do it," he said. "If you set up a loudspeaker on the top of a building, everybody’s going to hear that noise. But if you’re only directing that sound to a specific viewer, you’re never going to hear a neighbor complaint from street vendors or pedestrians. The whole idea is to spare other people." Holosonics has partnered with a cable network once before, when Court TV implemented the technology to promote its "Mystery Whisperer" in the mystery sections of select bookstores. Mr. Pompei said the company also has tested retail deployments in grocery stores with Procter & Gamble and Kraft for customized audio messaging. So a customer, for example, looking to buy laundry detergent could suddenly hear the sound of gurgling water and thus feel compelled to buy Tide as a result of the sonic experience…" (Voice to Skull Technology in New York)

FROM YOUR MEMORY BANK - "…How is it possible to produce a voice without a resonating sound box and expect it to be received and understood without a physical audio receiver (and a memory bank) as the source of intelligence for understanding? Even more important, I reasoned; if the cortex in which our memories are stored are lost at the time of the loss of our bodies at death, how can we establish communication after we have slipped out of our mortal coil, and transmit messages to those we have left behind us in this vale of tears with no memory from which to draw upon? The answer to my questions had to be simply that it is not possible to communicate with the non- physical realities into which we pass at the time of our death, unless we employ some type of scanning process with which to tap the memory banks of those with whom we would communicate in the physical reality, and this would transcend the use of either voice or language, since it consisted only of stimulating and rearranging mind patterns. With this process, it would not even be necessary to make use of a language, or even to utilize any spoken or written language common to both transmitter and receiver, because the transmission would be that of thought patterns, and memory impulses, which the receiver would have to translate into words, and/or voice patterns for understanding, and recording. The voice you would hear then, when you received messages from the spirit world, would have to be either your own or taken from your memory bank to put the telepathic communication into words, and sounds for your own convenience in understanding, and recording. There was no reason why radio could not be used for this purpose, I concluded, because it was entirely possible to scan the memory banks of the living by radio waves, and it was also within the realm of possibility to transmit thought patterns, suggestive impulses, and stimulate the ego to translate, and interpret telepathic communications into memorized sounds, and words for recording, and understanding. The voice you hear in your head, then, although it may not be your own, would have to be supplied by you from your memory bank, and what you thought you were hearing would not be sounds, but a matter of perception, and although quite real, nevertheless, only real to you, and only after you had created it out of your imagination…" (The Next Voice You Hear)

 

 

Comments

Respond to this report!
What's this?

#12 Author of original report

people smuggling

AUTHOR: alains1905 - ()

People smuggling (also called human smuggling) is "the facilitation, transportation, attempted transportation or illegal entry of a person or persons across an international border, in violation of one or more countries' laws, either clandestinely or through deception, such as the use of fraudulent documents"

Respond to this report!
What's this?

#13 Author of original report

DIRECT ENERGY WEAPONS USED BY TERRORISTS GANGSTALKERS AND WHITE COLLAR CRIMINALISTS

AUTHOR: alains1905 - ()

THESE ARE THE TYPES OF WEAPONS USED BY PERPETRATORS TO HARASS INNOCENT VICITIMS CAUSING BURNS, CANCER, POOR HEALTH, INSOMNIA, HEARING VOICES, CARBON MONOXIDE INTOXICATION

Respond to this report!
What's this?

#14 Author of original report

targeted individuals of gangstalking

AUTHOR: alains1905 - ()

Gang stalking is stalking by several people who know each other and who have the same intent.

Mobbing is the most familiar type of gang stalking.

Bullying is also a type of gang stalking when several children participate.

Paparazzi are a type of gang stalking.

Some secret societies like the Ku Klux Klan and some religious cults like Scientology are notorious because of their gang stalking activities.

Gang stalking occurs frequently in apartment buildings, housing estates, shops, and libraries.

Gang stalking is also perpetrated by agents of the state, the Mafia, religious sects, and utility companies (electricity, gas, water, telephone, cable TV, internet).

Some crimes like car theft and home invasions are usually preceded by a period of gang stalking.

Social media are a type of gang stalking. In 2012 the Belgian political magazine Knack wrote: “Twitter is […] an organized form of stalking, where people call themselves literally ‘followers.’”

Gang stalking is possible thanks to extreme police corruption. It’s the fastest growing crime.

The police debase themselves often to gang stalking. In 1998 Knack wrote about the new stalking law: “From Sunday on at least one special police technique won’t be legal anymore.” This shows that stalking is used as a method of investigation. The criminologist Stijn Vivijs of the Catholic University of Leuven in Belgium wrote in 2011 that policing is equal to stalking when the police use aggressive techniques like Very Irritating Police (VIP).

Gang stalking is the usual way in which large drugs trafficking rings are dismantled.

1 in 70 people experience gang stalking. 1 in 30 workers experience mobbing at work. 7 in 10 middle school and high school students experience bullying in school.

Gang stalking can be so bad that you can never escape some degree of harassment. The harassment is often carried out in a way to blame the victim for the harassment. This is called victim blaming.

The goal of gang stalking by the state is that everyone becomes scared and searches protection by joining a secret society. Ultimately, everyone will be a slave in a single secret society with a world dictator as its leader.

Respond to this report!
What's this?

#15 Author of original report

The Narcissistic Family

AUTHOR: alains1905 - ()

The people closest to the narcissist or sociopath tend to share the same weaknesses and typically these relationships are based on personal gains actively helping them abuse their victim(s) and their dirtiest, darkest secrets often remain concealed, hidden for decades whilst they carry out their reverse psychology propaganda gradually destroying one another.

In short,  Narcissistic and sociopathic family members use and manipulate each other and hide each other's secrets whilst simultaneously building self esteem and bouncing off one another.  The family can often have their own invisible web of lies, distortions and deceit which remains at a level above (or below) the heads of everyone around them; in this case  appearing to be a very close, sucessful family ; looking further simply utilizing one another for financial gains or gradually disowning parents remaining distant for physically and mentally failing to fit the ideal trophy son role;   remaining outside of their perception.

 

Respond to this report!
What's this?

#16 Author of original report

SOCIOPATH

AUTHOR: alains1905 - ()

If you are dealing with someone who has considerable money, you must realize that they probably won't try to harm you themselves, they will contract with someone to make the hit. The malignant type is a coward and will not expose himself or herself to personal danger if he or she can avoid it. 

 The police will do nothing with this information except to keep it on file, since they are powerless to act until a crime has been committed. Unfortunately, that often is usually too late

(2) They are egotistical to the point of narcissism. They really believe they are set apart from the rest of humanity by some special grace.

(3) They scapegoat; they are incapable of either having the insight or willingness to accept responsibility for anything they do. Whatever the problem, it is always someone else's fault.

(4) They are remorselessly vindictive when thwarted or exposed.

(1) They are habitual liars. They seem incapable of either knowing or telling the truth about anything. 

(5) Genuine religious, moral, or other values play no part in their lives. They have no empathy for others and are capable of violence. Under older psychological terminology, they fall into the category of psychopath or sociopath, but unlike the typical psychopath, their behavior is masked by a superficial social facade.  

for the victim. 

B. Conning for pleasure or profit, repeated lying, or the use of aliases. C. Failure to plan ahead or being impulsive.
D. Repeated assaults on others.
E. Reckless when it comes to their or others safety.
F. Poor work behavior or failure to honor financial obligations.
G. Rationalizing the pain they inflict on others. 

sychopaths also tend to switch jobs as frequently as they switch partners, mainly because they don't have the qualities to maintain a job for the long haul. Their performance is generally erratic, with chronic absences, misuse of company resources and failed commitments. Often they aren't even qualified for the job and use fake credentials to get it. 

Irresponsibility/Unreliability
Not concerned about wrecking others' lives and dreams. Oblivious or indifferent to the devastation they cause. Does not accept blame themselves, but blames others, even for acts they obviously committed.

Promiscuous Sexual Behavior/Infidelity
Promiscuity, child sexual abuse, rape and sexual acting out of all sorts.

Lack of Realistic Life Plan/Parasitic Lifestyle
Tends to move around a lot or makes all encompassing promises for the future, poor work ethic but exploits others effectively.

Criminal or Entrepreneurial Versatility
Changes their image as needed to avoid prosecution. Changes life story readily. 

Respond to this report!
What's this?

#17 Author of original report

TRAITS

AUTHOR: alains1905 - ()

Irresponsibility/Unreliability
Not concerned about wrecking others' lives and dreams. Oblivious or indifferent to the devastation they cause. Does not accept blame themselves, but blames others, even for acts they obviously committed.

Promiscuous Sexual Behavior/Infidelity
Promiscuity, child sexual abuse, rape and sexual acting out of all sorts.

Lack of Realistic Life Plan/Parasitic Lifestyle
Tends to move around a lot or makes all encompassing promises for the future, poor work ethic but exploits others effectively.

Criminal or Entrepreneurial Versatility
Changes their image as needed to avoid prosecution. Changes life story readily. 

Respond to this report!
What's this?

#18 Author of original report

VISA

AUTHOR: alains1905 - ()

VISA VIOLATIONS

Respond to this report!
What's this?

#19 Author of original report

automatic 4 year status

AUTHOR: alains1905 - ()

an effortless way for qualification benefitting from US VISA victim protective laws

Respond to this report!
What's this?

#20 Author of original report

sara lourdes balderas barrientos vallejo

AUTHOR: alains1905 - ()

sara, daniels mother, vistied frequently however it was insufficient to make any claims by assumption. When i contacted sara asking for help and to clarify any false accusations by her son, it was mainly because Daniel had led me to believe that he told his parents I had falsely assaulted him, and that they would travel from mexico, into the US to have a "talk" with me or in other words kick me out of the apartment. I was unsure either way, why a man of almost 30 years old would need parents present in order to responsibly have closure.  When i spoke to sara by calling her in mexico, i asked to not to let daniel know i contacted her and that i needed her help, despite what her son had said. she agreed to keep it between us, and even showed sympathy. when i woke up the next day my cellphone was cut by her son. I had believed saras willingness to help me, in the sense that although her son of 28 years old got anything he asked for, he had never in his lifetime been employed therefore his mother sara was truly the one who made all the decisions financially and ultimately the one who makes any arrangements moving forward. she had offered to pay my deposit on a new apartment, pay my apartment a few months, and support me so that i could get my life back together, but she was hung up on the idea that her son and i were not getting back together. later i found conversations of her instructions to her son on how to execute the following weeks, such as limited visits to the apartment, to have someone present as much as possible such as our housemaid, and minimal communication.

Respond to this report!
What's this?

#21 Author of original report

execution

AUTHOR: alains1905 - ()

 The result was a restraining order, daniels mother and father (who happened to come on vacation from mexico the previous week) unlocking with a key and  walking into the apartment nov 16 ,  tampering with a witness by disconnecting my phone as i was calling for 911, lying to an officer who arrived, and then fabricating another lie 3 days later to bring in another officer on nov 19

victimizing  with looks of fear hiding in a corner from shame, which this officer had no knowledge of the previous unwarned entry on the 16th and the removal of the party from the residence by the police under a felony warning.    I was left with nowhere to go, but a few clothing items, because Daniel rene balderas barrienos told the officer I was not entitled to any property.

oddly, emergency orders are just that , based on emergency for PROTECTION UNTIL HEARING, so it was only known to the malicious party they would remove all evidence and clear out the apartment before even appearing in court nov 21. i was given only a few days; 2 to be exact; living out of a car with no cellphone and my two dogs, trying to find a lawyer or any help and develop a legal strategy. property was removed before the case was heard and apt keys turned in by offenders.

it was obvious something was to be kept from being exposed, giving me limited  access to evidence and withholding information, and denying any of my computers obviously which may of been essential to proving my innocence, and their corrupt practices.

Respond to this report!
What's this?

#22 Author of original report

DELERIUM

AUTHOR: alains1905 - ()

"I DIDNT CALL THE POLICE BECAUSE I WAS IN SHOCK."

"NO VISABLE MARKS BUT MY NECK HURT THE NEXT DAY."

" HE KEEPS CONTACTING THEM EVERYDAY THROUGH CALL AND TEXT MESSAGES THOUGHOUT THE WHOLE DAY SOMETIMES AS MUCH AS 300 TIMES PER DAY."

"FOAMING AT THE MOUTH"

"CRAZY LOOK"

Respond to this report!
What's this?
Report & Rebuttal
Respond to this report!
What's this?
Also a victim?
What's this?
Repair Your Reputation!
What's this?
X