Re: [art] Regulation/Compliance question [historical perspective]

"Suresh Kalkunte" <suresh_surya@gmx.com> Tue, 26 February 2019 06:31 UTC

Return-Path: <suresh_surya@gmx.com>
X-Original-To: art@ietfa.amsl.com
Delivered-To: art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4115130E77 for <art@ietfa.amsl.com>; Mon, 25 Feb 2019 22:31:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.876
X-Spam-Level:
X-Spam-Status: No, score=-1.876 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.723, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OzCuvYQFEQeG for <art@ietfa.amsl.com>; Mon, 25 Feb 2019 22:31:38 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C82A129619 for <art@ietf.org>; Mon, 25 Feb 2019 22:31:37 -0800 (PST)
Received: from [209.58.147.42] ([209.58.147.42]) by web-mail.gmx.net (3c-app-mailcom-bs11.server.lan [172.19.170.179]) (via HTTP); Tue, 26 Feb 2019 07:31:33 +0100
MIME-Version: 1.0
Message-ID: <trinity-64a0e650-1125-4e20-a9f4-694d9e700bae-1551162693773@3c-app-mailcom-bs11>
From: Suresh Kalkunte <suresh_surya@gmx.com>
To: Bob.McCooey@nasdaq.com
Cc: art@ietf.org
Content-Type: text/html; charset="UTF-8"
Date: Tue, 26 Feb 2019 07:31:33 +0100
Importance: normal
Sensitivity: Normal
References: <trinity-6311f600-026a-45d1-89ce-cb0465874908-1549613007435@3c-app-mailcom-bs13>
X-UI-Message-Type: mail
X-Priority: 3
X-Provags-ID: V03:K1:oCPuJ5u3dTs6QZDfBuTYFM3s2p1eHOTg0NA5YXWKd4Xr9uBUDwVGB3dkSV+39w7e9llkg Ojft8WBW/5vLrp2lA6Wv29NySkUtC+zvleKn8rG357nnQHhLg9FoZoK34H0kRHq4J+swBGWyYSIq 51iyh/xXmbZaPR9eXGzI1cf0e5RKa60LpRGw8kxieKs9QaZp/BGgwGnNeYg6KW7qEd1BwXvDOX3k /xedwrEdchPgBghUf9IDi3sfBdUeBquJe6ZWzzDqe7L3dYF305riOXySUw3P7afLmds5KW1ll0Hc f0=
X-UI-Out-Filterresults: notjunk:1;V03:K0:64Xq136kNw4=:xjnnKT9EY/Qd1RBqCPTYEl W1+4drkUlW1NHxDopCtbmeUDFU5Iu/zhwtzqb08i0BxZAr5nWyyR0jdL+0rCtES9+nBmZOPwb 0OPUt1Nb4cFCbtWxJFTfQiVqxd5qdAQkwPrpzyl7YnEIUYvVxJAa7S8+PwGLYTIkOkBzQP7Cy Qx5Ewk6rHE73av3cg6ZJfbL5zhsD9E5Gr8gN/uAPPqmzDL7dkzoQZDwwNt3pi3baF1sOKd/HP VPFosgy/c9GyXAy8kgxncI0ReynaGbhV41OynMFZMc1VpTpoCm+3wQ78CXOlnGnR2cFiLT4k/ A7aKYDGamm4ZFlgTrVMgJKCpXWAay/6+A2GXm0aCg83NYCxrarUIAYya6Uf39m6PlPqSHVApQ 9jbqDQDbRU5fdNTWq5bT8uU//HQAHycMKToDbIk3rph3KFgxgz/A7klV0i9GufExgcqhz7Ut0 co81X/SWdDMRFFfhymZb6eT/HgtipxyZLQNYyPntwdObycrBCkCj5iNXBv7vpeltwB2cyhbhj dzuU+l/Qv5m/S0xgU/osnGlCi0rvbIz/Xaz++Io1Rr1ICJ1kTjSUSEf7jaU44eutDSRat2pAc Jz4yERdvVfyI0=
Archived-At: <https://mailarchive.ietf.org/arch/msg/art/kJY_5CM_msFqR1M4SIkSVn-ykeQ>
Subject: Re: [art] Regulation/Compliance question [historical perspective]
X-BeenThere: art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications and Real-Time Area Discussion <art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/art>, <mailto:art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/art/>
List-Post: <mailto:art@ietf.org>
List-Help: <mailto:art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/art>, <mailto:art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2019 06:31:41 -0000

Hello Bob,
 
The following is an update on how contemporary technology misuse (described in enclosed email) invigorates archetypal feudal practices seen prior to the 13th century albeit in a _dishonorable_ mode.

- History of rule of law:
+ Prior to the 13th century, the practice of feudal law [1] - taking control of property and jurisdiction over people though arbitrary was pursued for _honor_. Emperor Frederick II in 1231 paved the way of constitutional governance.
 
- Basis of rule of law:
+ Inviolability of a person and property constitutes the formal basis [2] on which rule of law stands.
 
Considering the above, malicious use of commonly found components emitting potent energy permits the perpetrator to dominate over people by cued/contextual fear conditioning (biophysical harm from potent energy at a minimum induces muscular pain/pricking sensation, cognitive deficits and worse) and consequently over _physical property_. With no forensic tests to detect such technology misuse, the perpetrator and those under his/her aegis are guaranteed leadership/ownership.
 
I copy the Internet Engineering Task Force in support of a request to include new capability in protocol standards governing the transmission of electronic mail so that an independent platform on the Internet is empowered to support advocacy efforts for common good on behalf of individuals like myself with no organizational leverage.
 
Best Regards,
Suresh
 
 
[1] Hittinger F. "The Rule of Law and the Rule of Reason", http://www.lawliberty.org/liberty-forum/the-rule-of-law-and-the-rule-of-reason/" rel="noreferrer nofollow noopener" target="_blank">www.lawliberty.org/liberty-forum/the-rule-of-law-and-the-rule-of-reason/.
 
[2] Grosby S. "Why Freedom Is a Legal Concept", http://www.lawliberty.org/liberty-forum/why-freedom-is-a-legal-concept/" rel="noreferrer nofollow noopener" target="_blank">www.lawliberty.org/liberty-forum/why-freedom-is-a-legal-concept/.
 
Sent: Friday, February 08, 2019 at 1:33 PM
From: "Suresh Kalkunte" <suresh_surya@gmx.com>
To: Bob.McCooey@nasdaq.com
Subject: Regulation/Compliance question
Hello Bob,
 
The biophysical harm from potent energy when used for malice is not covered in existing statutes concerning physical trespass, assault, RICO, antitrust. Consequently, a person/business can take advantage of such a loop hole in rule of law. The following suggestion is a step to maximize integrity of businesses transacting on the NASDAQ.
 
I would like to suggest that a company listed on the NASDAQ be asked to provide a written disclosure indicating that it does not  orchestrate technology* as a method to coerce/intimidate neither directly (using one's own employees) nor indirectly (third party) in its quest to:
- Stifle dissent in one's own employees (including the board of directors) and/or
- Stifle/acquire business competitors and/or
- Gain potential clients.
 
Please note that my contacting you is preceded by a discovery spanning 11+ years to be specific (contacting subject matter experts in technology, science and law in addition to my own health experiences when being in proximity of harm from potent energy) in what manner potent energy is opportune to commit crime, how and where it diverts opportunity/resources to those who are under the aegis of such negative innovation in technology.
 
The depth and breadth of my discovery to support this concern for good business practice can be viewed at https://competitionunlimited.wordpress.com" target="_blank" rel="nofollow">https://competitionunlimited.wordpress.com.
 
Best Regards,
Suresh
 
[*] Commonly found components emitting potent energy (home heating appliance - Magnetron, outdoor wireless transmitters - outdoor high gain Line of Sight transmitters, medical diagnostics - X-ray tube) improvised to function as a weapon (only barrier is expertise in electronic circuit design and fabrication) renders laws pertinent to physical trespass, assault, RICO and antitrust compromised since a victim can be located behind building barriers using doppler/ultrawideband based human vital sign detection. When such radar meant for health care is improvised for malice, the radar's radiated RF power stipulated by the FDA would exceed to an extant until a victim is located to compensate for attenuation/fading from intervening distance/building barriers.