Tuesday, May 2, 2017

My creditor's claim and the estate's worth

When Dennis’s lawyer told Judge Vicki Miles-LaGrange Dennis had died that very morning at the sentencing hearing May 6, 2016, the indictment against him was dismissed within days, and the U.S. attorney told me it should provide some comfort that I could rely on the civil judgment for restitution. I told him it was certainly no comfort.

For measure I instructed “my lawyers” to file a claim against his estate, and they did August 11, 2016. The summary of the probate action is here. Notice the document has no lawyers’ signature block, which is odd. It mentions our $380,177.50 civil judgment and the federal indictment. I asked why neither I nor the trust got a bill for this, and in October the law firm admitted my stepmother had been paying their invoices for some time, and I assume from almost the beginning.
In that my stepmother talked Dennis into stealing the money and helped him make it disappear, I complained to the bar association about this unacceptable conflict of interest. The bar association did not feel it merited an investigation. However, the lawyers broadcast the news widely, so now I won’t be able to hire a lawyer.

Dennis’s wife filed a written statement of claim February 27, 2017 that his estate’s worth is a negative $617.84, so I assume that is that, a miserable ending to a previously hard-working, honest man who couldn’t resist stealing my entire future. I sent “my lawyers” a letter terminating them and told them their insufficient, ineffective counsel makes them liable for all the loss to the trust, in that they ignored my numerous pleas to ask the court for a structured repayment schedule for a year after we received the judgment.
For writing laws allowing my spurious designation as “an enemy of the state,” requiring no support and for which I have no appeal, thus making stealing these assets virtually legal, the United States is potentially liable, assuming I could hire a lawyer, and I can’t, and assuming a lawyer would see it through. Judging from the slight precedent, the behavior of all the lawyers in these cases and considering no one can name a lawyer who is a human being and might make me their client, suing the good old U.S.A. is highly unlikely. Nonetheless, it’s not just okay.

Sunday, January 15, 2017

My journal of events


These are pages from my journal beginning in 2013. I paged through it a couple weeks ago and found it very shocking. This mess is far from a conclusion. There is more to steal, and the gang stalking events continue.

In Oklahoma it’s accepted you can steal what amounts to a quarter million dollars from someone’s bank account, then KILL THEM. “The law” simply does not care about stealing and killing. The journal is solid evidence this is absolutely true. I haven’t made a note about every instance of a surveillance troll. I saw some several times last week.

I stopped counting after 20 encounters with contaminated water and food. There are many more in this journal, and it happened before I started the journal. It has happened scores of times. This is outrageous. Stealing and killing aren’t crimes. The crime is complaining about them.

Saturday, October 15, 2016

More fun and profit lawbreaking

The man in the picture is the U.S. attorney for the western district of Oklahoma, formerly interim attorney following the unexpected resignation of the previous U.S. attorney who served with distinction.

He resigned to play no role in the disgusting disposition of the federal criminal case on this issue. He and his wife paid off their home loan ten years ago. In May, 2016 they took out a $100,000 home equity loan to keep themselves out of the street.

On September 26, I sent the Department of Justice Office of Professional Responsibility this e-mail pointing out things appear haywire at our local office. For months I debated the wisdom of doing this, finally deciding cordiality from the U.S. attorney is a ship that long ago sailed.
Consider what happened. I’ve asked lately about Dennis’s death certificate. It’s now been 162 days since May 6, 2016 when his lawyer said he died. No one can say they’ve seen his death certificate. If he is alive, the long delay in getting the criminal case to court was because it took time to find a dead body matching his description enough to fake out relevant parties. Police arrived at his office that morning to serve a warrant, according to news reports. I don’t know what that was about. They found a body, and called it a suspicious death because it was in a state of decomposition inconsistent with death a few minutes or hours before. It’s just a theory—and it explains a lot of things. If this is the real story, the U.S. attorney's office knew it New Years Day, 2016, and probably before.

Faking your death is legal, even to avoid prosecution. If Dennis is alive, he’s received world class coaching in survival and evasion. Still, he must wonder every minute if police are about to kick in the door and take him.

Since, the gang stalking program has been blistering. I talked with police three times last week, and was almost arrested. However, the new activity comes out of my saying I intended and wanted to divest the trust, because it isn’t useful or secure.

Monica, the trustee, told me my darling stepmother, Patty, is a signatory on the trust! I asked how and when that happened, and she said we went to the bank and signed paperwork when she became trustee. I did not do that, and never signed anything at a bank with any trustee. Her story is a lie concocted by Patty and friends in order to do some real looting. After taxes, the oil lease has produced as much money as Dennis stole. To top it, the lawyer I hired (pictured here)
told me Patty has been paying his invoices, a small detail that I suspected and for which lacked verification. She pays off everybody to get her way. So, what I have is as shitty a mess as one can imagine. The new word is I’ll never be able to touch a penny under any circumstances, if there is anything left. I never could be called greedy.

Sunday, October 2, 2016

Endless misery

The trust has surprising, new income—and that’s bad. If it is stolen, and indications are that it will be, then what went to taxes and was stolen will total more than half a million dollars. As always my pump sewage stepmother is driving the whole thing, because she thrives on stealing and killing. It’s a family tradition. I don’t do it, so I am a target.

Last week was a very busy one for gang stalking. It was evident I had new home invasion. Week before last, I found a tarp strap outside my house. Tarp straps are not typical household items. Here’s a video of me talking about it during the presidential debate.
video
Last week someone dumped four new, starving cats on our street that joined the cute black and white one my neighbor dumped before. I made sure they had plenty to eat, photographed them and sent their photos to the animal welfare center asking why the city tolerates this crime. I had home invasion and consumed contaminated water twice, which is unusual. It gave me sudden onset, projectile diarrhea. The cats’ water was also contaminated. The girl cat had diarrhea with blood. I changed the water and her stool instantly normalized. She remained sick and listless for four days.

On Thursday, September 29, the trustee refused my incentive to divest the trust, $10,000. That comes after she announced she would help herself to an 800% increase in pay. She writes one check a month, and won’t let me touch the money, so her demand is outrageous. She also told me my stepmother is a signatory—a huge bomb.

I asked how and why that happened. She said she, pump sewage and I went to the bank when she became trustee, and all of us signed paperwork making it happen. I told her I did not do that and have NEVER gone to the bank with a trustee and signed anything. I told her I would NEVER assent to my stepmother’s becoming a signatory or any other thing. I spent all day Friday asking the bank if they could verify this information with no result.

I was so pumped with adrenaline, I didn’t sleep for two nights. Thursday night I made this simple felt marker on butcher paper sign. The website, FightGangStalking.com, says posting a sign with the link acts to discourage this activity. It’s been very quiet in the street since it went in the window. At night it’s backlit so it shows every minute of every hour, 24 hours a day. These assholes are trying very hard to kill me. As always, endless stealing and killing are what trust is.

Wednesday, September 14, 2016

Is Dennis really dead? It doesn't matter.

Yesterday I called Judge Vicki Miles-LaGrange’s office to tell them 130 days since May 6, the day of Dennis’s sentencing hearing, and the day he was said to have died, I am yet to talk to anyone who says they’ve so much as seen any authentic, state-issued documentation regarding his death, as in there is no death certificate. That can mean only one thing, I told them, that Dennis isn’t really dead.

Dennis’s wife, his estate’s lawyers and FBI don’t have a copy. My lawyers and I apparently aren’t “eligible” to receive a copy, according to Oklahoma law.

Is hoaxing your death to evade prosecution illegal? According to this article, the answer is NO. Dennis’s criminal team is highly skilled.

Sunday, July 17, 2016

MUST READ: How this stealing was made completely legal

Stealing this money represents a new model of legalized stealing. I outline it in this blog post. It links to this blog post that finishes the explanation. You see, all you have to do is get it into a crime database a person is a traitor or terrorist, then you can do whatever you want to him and evade civil and criminal liability. You can also engage in other lawbreaking unrelated to the original victim with no liability under the law. That’s because we live in the security era. Believe it. This is real. You can see how secure it is.

Friday, June 24, 2016

Watchlisting

In April, ACLU published a report about secret watchlists with a few revealing details that allows me to put together a slightly improved model of my personal, total destruction program of which this trust’s plundering is a part. Combined with reading about organized harassment or “gang stalking,” an alarming picture emerges of tremendous significance to everyone that remains unseen by nearly everyone.

After what the U.S. government spends for military, the next biggest federal agency is Department of Homeland Security. Seventy percent of their budget goes to private security contractors; so, after defense, the next biggest thing Uncle Sam buys is the work of private security contractors. Their work is producing phony law enforcement intelligence for a galaxy of secret, criminal databases and organized harassment programs—illegal, extrajudicial punishment without purpose or value in every case.

That’s all done in the interest of security, right? Wrong. Almost every targeted person was improperly placed on a secret watchlist, and therefore inappropriately designated a criminal, a threat to society and/or a terrorist. The number of names on the list tells us that. Further, we have only an estimate of the numbers from 2003 to 2008, in that no oversight or hard numbers are available. How many are on these lists now isn’t available and perhaps isn’t even known.

I thought it was very strange that when I told local police about the theft of this sum of money and consuming contaminated food and water in my own home, they did not care. They were provocative, dismissive and unfriendly. They wanted to know about my vehicle and whether I owned a gun. That had nothing to do with my complaints. I knew it was a clue, but it was opaque and I couldn’t guess what it meant. It turns out they checked a federal criminal database, probably KST, and they followed the guidelines. What do you know? They think I’m a terrorist. No reason is needed to put a name on a list, and expanding the lists is important for expanding these police state programs.

From Trapped In A Black Box: Growing Terrorism Watchlisting In Everyday Policing:
The total number of records in the VGTOF database increased dramatically over the relevant period (see Figure 2) [December, 2003 to December, 2008]. The total increased from under 13,054 records in December 2003 to 272,198 records by December 2008, an approximately 2,000 percent growth over only a five year period. This number includes both regular and silent hit entries (described in Section V). Even by the most conservative estimate, this means an addition of 259,144 new records to the database in a period of five years—an average of 142 new records per day.
Assuming this rate of growth remained constant, an additional 388,725 names would be added to KST from January 1, 2009 to June 30, 2016. Assuming no names were removed, the new total is 660,923. The report repeatedly states this is a conservative estimate. I’d be surprised to find there are 142 people engaged in planning and carrying out terrorist activity in the whole country. Yet, there are probably far more names on these lists than 661,000.

The report uses anagrams to refer to agencies and databases. It’s mind numbing. I picked out the most used ones and defined them:

NCIC = National Crime Information Center—within FBI
TSC = Terrorist Screening Center—government's consolidation point for known and suspected terrorist information, foreign and domestic
TSDB = Terrorist Screening Database
VGTOF = Violent Gangs and Terrorist Organizations File
KST = Known or Suspected Terrorists File
NCTC = National Counterterrorism Center—part of the Office of the Director of National Intelligence
TREX = Terrorist Review and Examination Unit—FBI field office submits nominations to TREX, the FBI headquarters unit that processes nominations from open FBI investigations
TIDE = Terrorist Identities Datamark Environment—the NCTC database of international terrorist nominations which feeds names to TSC, which enters them into TSDB as well
No-Fly List = individuals prevented from boarding an airplane
Selectee List = individuals subject to heightened airport screening when they seek to board an airplane
CLASS = State Department's Consular Lookout And Support System used to screen visa and passport applications
TECS Database = used by customs and border patrol to screen people at ports of entry

My name has been on at least one watchlist, put there by the same people who talked the Man of Steal into taking all the trust’s money, for the purpose of obstructing justice. The tactic worked perfectly. It ignores the fact I’m not engaged in subversive activity, never was and have no plans to be. I was stripped of the law’s protection, a constitutional guarantee.

I told Steal Man these guys are trying to get rid of me and you as well. He thought I was imagining things. Since then, there have been at least 20 hard attempts to kill me, and he is DEAD. He’s been dead since May 6, 2016, and we still don’t have the medical examiner’s report. Some people think I shouldn’t be armed? No one on earth needs protection more than I.

These watchlisting programs are bogus, a waste of time and money, and they impose devastating consequences on the unlucky people whose names appear on the lists. This is how Trapped In A Black Box begins:
In the last fifteen years, the U.S. government has drastically expanded a consolidated watchlisting system that includes hundreds of thousands of individuals based on secret evidence. Some parts of that system have drawn significant attention, including the No Fly List—composed of individuals who are barred from flying to, from, or over U.S. airspace—and, to a lesser extent, the Selectee List—composed of individuals who are subjected to additional screening and questioning every time they seek to board an airplane. Yet a key component of the watchlisting system has received far less scrutiny: the Known or Suspected Terrorist (KST) File, which is maintained by the FBI and is accessible to federal, state, and local law enforcement entities nationwide through the National Crime Information Center (NCIC).

The KST File is a successor to what was known until 2009 as the Violent Gangs and Terrorist Organizations File (VGTOF). Whereas VGTOF contained fewer than 10,000 terrorism related entries in 2003, KST contains hundreds of thousands of entries today. To be sure, law enforcement agencies have a legitimate interest in coordinating efforts to locate people for whom arrest warrants are outstanding. Today, though, KST is part of a vast system of domestic surveillance of people whom law enforcement labels suspect based on vague and loose criteria, with serious constitutional and privacy implications for those who are included in the File. Such individuals may be stigmatized as potential terrorists and are vulnerable to increased law enforcement scrutiny, often without knowing that they are on a secret watchlist, and without a meaningful way to confirm or contest their inclusion.

The ACLU obtained information from the FBI about its VGTOF/KST File through a Freedom of Information Act (FOIA) request and subsequent lawsuit. Although much about the current size and operation of KST remains secret from the public, the more than 13,000 pages we now have, covering a five-year period from December 2003 to December 2008, offer key insights into the workings of this sprawling government database. Further information we analyze in this report came from another FOIA suit brought by the Electronic Privacy Information Center, inspector general reports, and the government’s Watchlisting Guidance leaked to the media in August 2014.

This report presents an analysis of the most important findings from these documents and other resources, which raise serious concerns about the fairness, accuracy, and effectiveness of the KST File.
Politicians and activist groups are saying people on the no-fly list or terrorism watchlists should not be able to buy a gun from a dealer, like that will stop gun violence. You have to wonder how legitimate are these lists, and precisely how many names are on them? Names are added to the list beginning with someone taking part in the “if you see something say something” Nazi slogan theme, among other ways. Did someone see you taking pictures with a cell phone? They might think you’re a terrorist.

Secret watchlisting hasn’t stopped even one terrorist event. It didn’t stop shootings in theaters and schools, and it didn’t stop what happened in Orlando.

From this ACLU report, here are the three handling codes police look at when you encounter them, and how I knew I was watchlisted:
Handling Code 1 applies to individuals with outstanding arrest warrants in the NCIC Wanted Persons File. As of 2009, Handling Code 1 reads as follows:

***LAW ENFORCEMENT SENSITIVE INFORMATION***

WARNING – APPROACH WITH CAUTION.

THIS INDIVIDUAL IS ASSOCIATED WITH TERRORISM AND IS THE SUBJECT OF AN ARREST WARRANT, ALTHOUGH THE WARRANT MAY NOT BE RETRIEVABLE VIA THE SEARCHED IDENTIFIERS. IF AN ARREST WARRANT FOR THE INDIVIDUAL IS RETURNED IN YOUR SEARCH OF NCIC, DETAIN THE INDIVIDUAL PURSUANT TO YOUR DEPARTMENT’S PROCEDURES FOR HANDLING AN OUTSTANDING WARRANT, AND IMMEDIATELY CONTACT THE TERRORIST SCREENING CENTER AT (866) XXX-XXXX FOR ADDITIONAL DIRECTION.

IF AN ARREST WARRANT FOR THE INDIVIDUAL IS NOT RETURNED, USE CAUTION AND IMMEDIATELY CONTACT THE TSC AT (866) XXX-XXXX FOR ADDITIONAL DIRECTION WITHOUT OTHERWISE EXTENDING THE SCOPE OR DURATION OF THE ENCOUNTER. IF YOU ARE A BORDER PATROL OFFICER IMMEDIATELY CALL THE NTC.

UNAUTHORIZED DISCLOSURE OF TERRORIST WATCHLIST INFORMATION IS PROHIBITED. DO NOT ADVISE THIS INDIVIDUAL THAT THEY MAY BE ON A TERRORIST WATCHLIST. INFORMATION THAT THIS INDIVIDUAL MAY BE ON A TERRORIST WATCHLIST IS PROPERTY OF THE TSC AND IS A FEDERAL RECORD PROVIDED TO YOUR AGENCY THAT MAY NOT BE DISSEMINATED OR USED IN ANY PROCEEDING WITHOUT THE ADVANCE AUTHORIZATION OF THE TSC.

***LAW ENFORCEMENT SENSITIVE INFORMATION***

Handling Code 2 appears to pertain mainly to watchlisted individuals who are subject to current or future DHS detainers. The future detainers apply to those who would be given detainers if they encounter law enforcement.105 People with sealed federal indictments can also be subject to Handling Code 2.106 In addition, documents from 2008 indicate that Handling Code 2 could be used for entries made under “exigent circumstances which require immediate entry of the record.”107 The full text of Handling Code 2 is as follows:

***LAW ENFORCEMENT SENSITIVE INFORMATION***

WARNING – APPROACH WITH CAUTION. THIS INDIVIDUAL IS OF INVESTIGATIVE INTEREST TO LAW ENFORCEMENT REGARDING ASSOCIATION WITH TERRORISM AND THERE MAY BE A DETAINER AVAILABLE FROM THE
DEPARTMENT OF HOMELAND SECURITY FOR THIS INDIVIDUAL.

IMMEDIATELY CONTACT THE TERRORIST SCREENING CENTER (TSC) AT (866) XXX-XXXX OR, IF YOU ARE A BORDER PATROL OFFICER, IMMEDIATELY CALL THE NTC TO ASCERTAIN IF A DETAINER IS AVAILABLE FOR THE INDIVIDUAL AND TO OBTAIN ADDITIONAL DIRECTION. PLEASE QUESTION THIS INDIVIDUAL TO ASSIST THE TSC IN DETERMINING WHETHER THE INDIVIDUAL ENCOUNTERED IS THE SUBJECT OF A DETAINER WITHOUT OTHERWISE EXTENDING THE SCOPE OR DURATION OF THE ENCOUNTER.

UNAUTHORIZED DISCLOSURE OF TERRORIST WATCHLIST INFORMATION IS PROHIBITED. DO NOT ADVISE THIS INDIVIDUAL THAT THEY MAY BE ON A TERRORIST WATCHLIST. INFORMATION THAT THIS INDIVIDUAL MAY BE ON A TERRORIST WATCHLIST IS PROPERTY OF THE TSC AND IS A FEDERAL RECORD PROVIDED TO YOUR AGENCY THAT MAY NOT BE DISSEMINATED OR USED IN ANY PROCEEDING WITHOUT THE ADVANCE AUTHORIZATION OF THE TSC.

***LAW ENFORCEMENT SENSITIVE INFORMATION***

As the above language indicates, the querying officer is instructed to “question this individual” in order to help the NTC to determine whether this person is subject to a detainer, but the message provides no guidance on the questioning or the kind of information that would assist in such a determination. It also appears doubtful that officers could question an individual “without otherwise extending the scope or duration of the encounter,” since presumably an encounter with an individual not listed in VGTOF/KST would not involve additional questioning or awaiting a reply from the TSC or the NTC. Thus, encounters with individuals subject to Handling Code 2 will likely be longer and more intrusive than they otherwise would because of the ambiguity of the instructions and the directive to officers to question the individuals further.

Finally, Handling Code 3 applies to all entries that are not categorized as Handling Code 1, Handling Code 2, or silent hits. The text of the message for Handling Code 3 states:

***LAW ENFORCEMENT SENSITIVE INFORMATION***

DO NOT ADVISE THIS INDIVIDUAL THAT THEY MAY BE ON A TERRORIST WATCHLIST. CONTACT THE TERORRIST SCREENING CENTER (TSC) AT (866) XXX-XXXX DURING THIS ENCOUNTER. IF THIS WOULD EXTEND THE SCOPE OR DURATION OF THE ENCOUNTER CONTACT THE TSC IMMEDIATELY THEREAFTER. IF YOU ARE A BORDER PATROL OFFICER IMMEDIATELY CALL THE NTC.

ATTEMPT TO OBTAIN SUFFICIENT IDENTIFYING INFORMATION DURING THE ENCOUNTER, WITHOUT OTHERWISE EXTENDING THE SCOPE OR DURATION OF THE ENCOUNTER, TO ASSIST THE TSC IN DETERMINING WHETHER OR NOT THE NAME OR IDENTIFIER(S) YOU QUERIED BELONGS TO AN INDIVIDUAL IDENTIFIED AS HAVING POSSIBLE TIES WITH TERRORISM.

DO NOT DETAIN OR ARREST THIS INDIVIDUAL UNLESS THERE IS EVIDENCE OF A VIOLATION OF FEDERAL, STATE OR LOCAL STATUTES.

UNAUTHORIZED DISCLOSURE IS PROHIBITED.

INFORMATION THAT THIS INDIVIDUAL MAY BE ON A TERRORIST WATCHLIST IS PROPERTY OF THE TSC AND IS A FEDERAL RECORD PROVIDED TO YOUR AGENCY THAT MAY NOT BE DISSEMINATED OR USED IN ANY PROCEEDING WITHOUT THE ADVANCE AUTHORIZATION OF THE TSC.

WARNING – APPROACH WITH CAUTION.

***LAW ENFORCEMENT SENSITIVE INFORMATION***

This message makes clear that the querying officer should attempt to identify, but not to arrest or detain, the individual; it also states that the officer may contact the TSC after letting the individual go to avoid extending the length of the encounter.

The three handling codes above were in operation as of 2009, but it is not clear if they continue to contain the language and format as listed above. In the past, some handling code messages contained a stronger warning against using the VGTOF hit as grounds for search and seizure:

WARNING – STANDING ALONE, NCIC VIOLENT GANG AND TERRORIST ORGANIZATION FILE INFORMATION DOES NOT FURNISH GROUNDS FOR THE SEARCH AND SEIZURE OF ANY INDIVIDUAL, VEHICLE, OR DWELLING

This warning appears to have been omitted from the most recent handling codes; the 2009 handling codes lack such specific instructions for law enforcement to ensure that they do not use KST hits improperly to extend the scope of detentions.
Very quietly, Congress greatly expanded these programs in the last year. Secret, criminal watchlists might now contain millions or even tens of millions of names—and nearly every one of them has committed no crime or been engaged in subversive activity. Practically none of them are fugitives, have an outstanding warrant or are even suspected in a crime. Let’s be honest. Haul down the stars and stripes and raise the red field black swastika.

I have one more thing to say about this. The remaining live criminals who did this jazz are aware I see this much of their mischief. They continue to spread the potent lie I am a dangerous maniac in an effort to make others deaf, since silencing me hasn’t worked. I am still at very high risk.

Thursday, June 23, 2016

Surveillance trolls

These are surveillance trolls. The woman and little girl are SRPs, or surveillance role players and my next door neighbors for more than 12 years. The little girl is now entering adolescence and until a few months ago had not been enrolled in school, her work with the stalking team having been far more important. The other guys I had not seen. I took their pictures on the sly because perps don’t like cameras. Once they saw I was noticing them, they quickly departed. There have been many, many more. Often they show up at night, so photographing them without specialized equipment wasn’t practical. This is a gang stalking tactic, as was stealing the trust’s money.