I have mentioned on many occasions that ex-military personnel have been the primary perps when it comes to staging, directing, hacking, supplying bogus complaints, and most of the crimes described in these blogs, including the ex-military cops and prosecutors that authored the bogus police reports and made the bogus database entries.
All of it is obviously coordinated, and therefore the frauds are all connected by people connected to the Department of Defense, the Friends of John Andrew Whitcraft, Jr. Military personnel continue to function in this capacity, but I can't always verify that they are indeed ex-military, even when I know that the asshole that looks like ex-military sitting in a parking lot making a cell call, or following me in a pickup truck, or conspicuously sending text messages via an Android is ex-military.
However, when I see someone behaving in such a manner there are occasions when I do find out that they are indeed ex-military. I just verified that a typical Android stalker, an individual that has exhibited all of the traits described here, and a Starbucks employee as well, is indeed ex-military. I only inquired because of the conspicuous feigning of familiarity, the contrived opportunity to cause a conversation, and of course the frequent use of an Android at what appear to be strategic points that correlate to cop bitch activity, No surprise here. I described this individual as someone that appeared to "aspire to military or police work" in a previous blog.
It has always been necessary for these scams to be coordinated. The bogus complaints are obviously intended to support the falsified reports I've either seen or collected, reports that I later found out were authored by ex-military cops. Even the reports are based on complaints by military personnel and this is an unmistakable pattern that has repeated hundreds of times, always for tactical reasons, to cause a police response, to allow for theft of property during a stop, to support other bogus complaints, to terminate my Internet use or discovery of incriminating evidence.
The movements and performances of the cop-bitch stalkers also have to be directed and staged, which requires coordination and knowledge of my whereabouts. The hacking of the website and my blogs is tactical, part of an overall strategy that is not random. The editing and reprogramming is clearly intended to support or allow for law enforcement contrivances and fabrications.
For these reasons, I concluded a long time ago that all of which i describe here, including the crimes committed by these assholes, is based on shared information and knowledge, for instance, of police reports that no one else could possibly know about. There have been dozens of complaints that served no other purpose than to support an arrest and booking report authored by an ex-military cop referring to the perpetrator of the identity fraud. That report was an exhibit at the identity hearing on June 4, 1997 but I doubt if anyone else has knowledge of its existence besides those with a vested interest in falsely maintaining that it refers to me despite all the evidence that disproves that contention.
So another example of cop-bitch activity, Android stalking, and insider surveillance that allows for the direction of the cop-bitches has been provided. Another individual that performed these functions in a rather obvious manner, that turned out to be ex-military on the rare occasion when it was possible verify it.
So while I was writing this blog, there was at least one, likely several ex-military personnel observing. When I walked out side there were a couple more lurking in the parking lot, also with no other reason to be sitting in a parking lot except the obvious coordination of the cop-bitches that was in progress. If I decided to go somewhere else, the cop-bitches would have followed or arrived within minutes. I see them getting their directives on many occasions, sometimes with hand signals and gesturing by people with military haircuts, sometimes via direct cell calls, so from my perspective it is stalking, but also something I should explain when it is used to define military slime coordination tactics.
This stuff is purely military style, tactical, predatory, and exactly what occurs in the field consistent with military strategy when they attack an enemy. There is also some PsyOps involved when the harassment, insults, flying objects, sucker punches and so on are employed. It is constant and only reliant on knowledge of my whereabouts, something that they make sure is never unknown. You'll have to take my word for it, but when you see guys in pickup trucks making a panic U-turn and racing back towards you because you decided to make an unexpected turn down a side street, you would understand.
And for the sake of honest reporting, cops don't do this stuff, unless they are also ex-military. These tactics are illegal, and the cops know it so they don't usually participate, at least overtly. But they are the beneficiaries and they have knowledge that it is occurring so they will never acknowledge a report of the crimes committed by military slime. Most cops are not culpable as far as the series of felonies that I have specified here. But those that work for prosecutors that are culpable, specifically Steve Cooley and Anthony Rackauckas, have engaged in patently illegal abuses of authority on a regular basis.
It happens that a lot of ex-military slime are cops or security guards or in this case, Starbucks employees that are always engaged in what I refer to as cop bullshit scams because I have no door to lock behind me when I sit down to write, no way to avoid the cop-bitches, military slime and the cops that always have opportunities to use the tactics described. Military slime has proven that they are not accountable to civilian law enforcement officials, even when I make allegations of serious felonies they\\at are supported by proof or compelling evidence. They are simply ignored.
So when Republican law enforcement officials like Steve Cooley or Anthony Rackauckas refuse to acknowledge those crimes, it demonstrates that they not only have knowledge of them already, but also know the perpetrators and the tactical value of those crimes; to destroy evidence, to provide false testimony, to tamper with evidence, or falsify official reports, or to assist their efforts to use malicious prosecution to retaliate against this writer.
In other words, they are accessories by definition.
Based on what we've seen, described in these blogs over time, there should be enough factual evidence and clues for the reader to conclude what is actually going on. When one connects the examples of cop scam frauds, a rather clear picture emerges of how the various scams interact, especially when one considers motive, opportunity and the players involved.
Let's review some of the basics of cop bullshit.
There has been a consistent duplication factor, the copying of authentic account data when it is created that applies to e-mail accounts, bank accounts, log-in displays, phone records and other variations.
There has been Android stalking by military or ex-military personnel that correlates with cop-bitch activity. This activity is characterized by proximity posers affecting portrayals of illegal activity, cell phone use, phony inaudible faux conversations often by people that creep up behind me. It is often supplemented with gesturing, waving, feigned familiarity and the display of currency or contraband.
There has been the hijacking of Internet services, access blocked on some occasions, passwords stolen on other occasions. The result has been a series of alterations, deletions, re-programming of internal software, insertion of malware that allows for remote exploitation, DNS redirects, the result always favoring the fraudulent practice by law enforcement of fabricating bogus “evidence” that appears to be the purpose of the attacks.
There has been “herding” that occurs when options are systematically precluded. For example, Internet access being blocked everywhere except an AT&T ISP. There are many other examples, and the only reason I am writing this blog at this location is because every electrical outlet that I have used in the last few weeks has been blocked or terminated after it was used to keep my laptop charged. This is a familiar phenomenon, not attributable to chance.
There has been a constant stream of cop bitch stalkers, usually making cell calls or sending text messages as soon as they establish proximity, sometimes waiting for me to approach, often following me when they do. Their movements after are unknown, as is the destination of the calls, but it is reasonable to assume there are other cop-bitches out there on the receiving end of those calls and messages.
We have conspicuous coordination by ex-military personnel of these assholes, based on constant surveillance, often shared by a single “send” message that appears to signal other ex-military slime and cop-bitch stalkers.
There is evidence to support the creation of a bogus Facebook account beyond the incoming e-mail that indicated as much. It only takes an e-mail address that can be associated with the target, the victim, and it's been done more than 83 million times which is probably a low number since it was a calculation of the brain-eating social disorder that is nothing more than a data mining scam run by Mark Zuckerburg.
There are other corporate entities as well, including but not limited to Bank of America, AT&T, Starbucks and McDonalds, that have obviously participated in some of the contrivances described here, and that doesn't include the phony phone records that were displayed on a bogus website more than four years ago along with many other individuals that worked for other corporations. I could elaborate, but it isn't necessary for the purpose of this quiz.
And it would appear that all of these factors are inter-related, connected by motives, affiliations, technical expertise, surveillance apparatus, staged photo-ops, cop drive-by activity, culpability, liability, and of course a common, pervasive shared interest in achieving an objective that I have described as a perpetual investigation for the purpose of making false allegations that would preclude the exercise of free speech and allow for the confiscation and destruction of evidence that supports my journalistic efforts.
I'll pause here to allow the reader to consider these factors and to review previous blogs if necessary.