This morning, one of my children and I found illegal surveillance equipment that had been installed inside the walls of our house. Someone had carved out two thin grooves, one on either side of the inside of a sliding door that separates our living room and family room (the latter being the room where we spend much of our time). Wires were run through these grooves on either side, ending in what looks like a pinhole camera on the living room side and either a smaller or fiber optic camera on the den side, with corresponding tiny holes through the walls in those locations. The wires and equipment are encased in plaster to hold them in place as the door is slid back and forth.
The wire on the family room side appears to have been run from inside a light switch located further along the same wall. The wire on the living room side can be seen turning and running up toward the ceiling about halfway down the inside of the wall on that side. On the outside, the locations of the pinholes give off strong radio frequency signals.
We were able to find this equipment after I spoke with a San Antonio organized stalking who has filed serious complaints against the same licensed private investigator (p.i.) and apparent former FBI agent (see previous post). The San Antonio victim believes this p.i. is running a major organized stalking gang in our area and has amassed a great deal of information about who the p.i. employs for this, how the gang operates, who their associates are, and, most importantly for us, what some of their methods are for installing illegal surveillance equipment.
We will be continuing to look for this equipment, and we will continue to document what we find on this blog. We will also continue to insist that local, state, and federal law enforcement (including the U.S. Department of Justice) stop covering for these people and start prosecuting them.
For another example of federal law enforcement at all levels covering for a corrupt former federal agent, you might want to go back and look at my 9/20/09 posts here titled "DOJ Said" and "Response From DOJ".
Wednesday, March 30, 2011
Friday, March 25, 2011
Who Lied?
Consider the following sequence of events.
On 1/24/05, I spoke with the owner of a private investigation (p.i.) agency in Boerne, Texas, whom I’ll call P.I. #1, about hiring him to help me deal with a fraudulent trust document my name had been forged on and also to collect evidence that my children and I were being stalked and harassed. P.I. #1 told me he was a former DEA agent with many years of law enforcement experience who believed he could help me. We agreed to meet about this in Boerne, after he returned from a business trip to Washington, D.C.
On 1/31/05, I met with P.I. #1 at a restaurant in Boerne. P.I. #1 was accompanied at this meeting by a second man and his wife. This second man, whom I’ll call P.I. #2, was introduced to me as a retired FBI agent who had specialized in fraud cases and now worked as a p.i. with a specialty in that area. P.I. #1 said he wanted P.I. #2 to consult on my case if I hired him and that he would pay P.I. #2 himself out of what I paid him if I hired them.
Both of these men said they were licensed as private investigators by the State of Texas, and they told me how to go to the DPS/PSB website to verify this (which I later did). P.I. #1 carried a large black leather briefcase with an official-looking seal on it that he said was from his days with the DEA. He had asked me to bring along a cashier’s check for his retainer if I decided to hire him, which I did decide to do (Doc. A). As I left this meeting, P.I. #2 pulled out a business card, wrote his cell phone number on it while I watched, and handed it to me (Doc. B, top).
On 2/2/05, P.I. #2 personally escorted me to the office of an attorney in Boerne that both p.i.s insisted I hire to help me deal with the fraudulent trust. I did hire this lawyer at that time.
On 2/4/05, P.I. #2 asked me to meet with him at his home, which was located in Fair Oaks Ranch, an affluent suburb between Boerne and San Antonio. He gave me directions to his house over the phone, and I jotted them down along the edge of my kitchen calendar. I drove to his house, where I met with him and his wife, who they said helped with his business. While I was there, the couple showed me a large glass case containing a handgun, a badge, and other items I was told were related to the man’s years as an FBI agent. I was also shown briefly into a room with a computer in it that was being used as an office. This room had a wooden shelf attached to the wall than ran all along one side. There were some small items on the shelf, but my attention was drawn to a large framed art print that was propped up against the wall on the shelf, midway down the room. This print was a still-life of various items related to FBI service (gun, badge with “FBI” clearly written on it, etc.). It was in the style of a well-known Kentucky artist named Don Ensor, and it was very similar or possibly identical to a print I recalled seeing a few years earlier at the home of my father’s next-door neighbor, an FBI agent, in Kentucky.
I only met with P.I. #2 at his home this one time. After this, both p.i.s insisted on meeting with me in an assortment of other unusual locations instead. P.I. #1 always insisted on being paid in cash only. When I demanded a receipt, he finally hand-wrote me one (Doc. C).
All three of these men (the two p.i.s and the lawyer they took me to) charged me large amounts of money for work they claimed to be doing as part of my case, but when I began asking to see actual results of their work and requesting written reports of what they’d done, they began stalling. I confronted all three of them at a meeting in the lawyer’s office on 8/15/05 that I can only describe as very frightening and threatening. Desperate to defuse the situation, I told the three men I needed to spend the next few weeks getting two of my children off to college in other states and then would re-evaluate things. As I was leaving this meeting, I spotted my former father-in-law’s vehicle nearby and realized he’d been listening in on the meeting, probably from an adjacent office. At that point, I realized I’d been conned.
On 8/21/05, I mailed a formal complaint in the form of a box of documents plus a cover letter against the persons involved in the fraudulent trust, P.I. #1, P.I. #2, and the Boerne lawyer to the FBI office in San Antonio (Doc. D). However, I was followed into the post office by two men who flashed badges at postal employees and were immediately admitted into the “Employees Only” part of the building. Because I was concerned about this, I went in person to the FBI office a few days later to follow up on my complaint. The Special Agent I met with there (who never told me his name) said their office hadn’t received my complaint. I explained that one of the p.i.s who’d defrauded me was a former FBI agent. The current agent took down P.I. #2’s information and said he’d do some checking.
Beginning on 9/4/05, I started noticing P.I. #1 and P.I. #2 following me and stalking me. I recorded these incidents in a logbook.
I officially fired P.I. #1, P.I. #2, and their lawyer-friend on 9/9/05. I had deliberately waited to do this until after I was sure there were written records of the crimes committed against me on file with the FBI because of how frightening the confrontation with the two former federal agents in particular had been.
On 9/13/05, I received a letter from the FBI that was dated 9/1/05 in which they refused to do anything (Doc. E). This letter was printed on cheap, flimsy paper and arrived with its envelope hanging wide open. It referred to a strange unknown letter I was supposed to have sent them on 8/24/05, rather than the supposedly missing box of documents with its very clear cover letter that I’d actually sent on 8/22/05 as shown above.
On 10/21/05, I filed formal complaints with the DPS/PSB (Texas p.i. licensing board) against P.I. #1 and P.I. #2 (Doc. F).
When I got no response from the DPS/PSB, I began complaining to the Texas OAG and other agencies. I also sent a letter to the DPS/PSB on 11/10/05 asking about the lack of response to my complaints (Doc. G). On 11/13/05, I emailed the DPS/PSB about my fear of P.I. #2 because he was frightening me by stalking me and driving by our house repeatedly (Doc. H).
On 11/15/05, a DPS investigator in San Antonio called and asked me to meet him at a public location that was between my house and his office later that day to give him copies of all the documents related to the complaints I’d filed. During this conversation, he hinted that P.I. #2 might not have actually been an FBI agent.
About 20 or 30 minutes after this call ended, the DPS investigator called me back to cancel our meeting in San Antonio. He said he’d just learned that a senior DPS investigator in Dallas had already been assigned to my case. He instead asked me to fax him a few of the most important documents from my complaints, and he gave me his fax number. Then he told me straight out that he hadn’t been able to find any indications of P.I. #2’s ever having worked for the FBI. I told the investigator I was shocked to hear this. He told me to just fax what he’d asked for, and he said someone would get back in touch with me soon.
I immediately gathered up what the investigator had asked for. I started faxing the documents to the number I’d been given but quickly discovered that the fax number didn’t work. I thought I must have jotted the number down incorrectly, so I called the investigator back to check on this. A different investigator answered the phone, said the person I’d just talked to had left the office, and told me the fax machine I’d been trying to send to was out of order. He gave me the number of a different machine he said was located down the same hallway, and he promised me he’d personally make sure that my documents got to the correct investigator. I then faxed my documents to the second number without any problems.
As it happened, P.I. #1 and P.I. #2 had provided me with simple equipment for recording phone calls, and I still had this equipment attached to my telephone. As a result, I had a cassette tape recording of my phone conversations with the San Antonio DPS investigator. (The third call about the broken fax machine was made from a different phone and was not recorded.)
That evening, I suddenly remembered the business card P.I. #2 had given me (Doc. B, top). I got it out, looked at it again, and saw that it contained both a statement implying he’d been an FBI agent and a sample of his handwriting proving he’d given it to me. Based on what the DPS investigator had told me on the phone, I now believed the card might be proof that P.I. #2 had impersonated an FBI agent. The next morning, 11/16/05, I sent a letter (Doc. I) and a copy of the card to the DPS investigator in San Antonio.
On 2/6/06, I was sent a letter from the San Antonio DPS investigator giving me the contact information for the Dallas investigator who was handling my case (Doc. J).
The Dallas investigator, the DPS, and the Texas OAG all later refused to take any action whatsoever against P.I. #1 or P.I. #2. Because I was upset about law enforcement’s refusal to do anything at all about investigating or prosecuting these p.i.s and was seriously concerned about them defrauding someone else because they still held valid Texas p.i. licenses, I began sending copies of the business card from P.I. #2 to various agencies and the media. Meanwhile, I continued to log various stalking incidents directed against me by both of these p.i.s.
On 6/26/07, I went back down to the San Antonio FBI office on another matter and met with a different agent there who did identify himself (Doc. B, bottom). I was surprised to discover very quickly that this agent was more interested in P.I. #2 than he was in the matter I’d come there about. The agent began this discussion by asking me if I wasn’t afraid of being sued by P.I. #2 for accusing him of impersonating a federal agent by sending around copies of his business card. I told him no, and I explained about how the DPS investigator had told me there was no record of P.I. #2 ever having worked for the FBI. I was stunned when the agent told me P.I. #2 actually had worked for the FBI as a fraud investigator. I asked him why the DPS investigator had lied to me. He said he didn’t know, and he implied that I was not being truthful about having been told this.
At that point, I became very upset. I immediately told the agent that I just happened to have a cassette tape recording of the phone conversation in which the DPS investigator had made the statements in question, and I got out the tape and handed it to him. At this, the agent became agitated, grabbed the tape from me, and ran out of the room.
He returned a few minutes later with a small tape recorder that he turned on. My tape was in the recorder, and it started playing right at the spot during my first call with the investigator where he implied that P.I. #2 hadn’t worked for the FBI but didn’t actually state this. This made me wonder how the agent had managed to locate that spot on the tape so quickly, since he hadn’t been out of the room very long. I knew the part of the tape he needed to hear was in the second phone call, but when I told him this, he moved the tape ahead (again to just the right spot!) and showed me there was only one phone call on my tape, even though I knew there had been two. I tried to tell him the other call had somehow disappeared from the tape, but he made it clear he didn’t believe me. I told him that, regardless of his FBI status, P.I. #2 had defrauded me and had been stalking me ever since and that I was afraid of him. We discussed a particular incident in which P.I. #2 had been tailgating me too closely and might have tapped my bumper with his vehicle at a stop sign, before moving on to the matter I’d actually come to discuss.
I was extremely upset about my cassette tape, which I knew had to have been tampered with at some point. As soon as I got home, I got out a copy of the tape I’d made and played it. To my astonishment, someone had also removed the second phone call from the copy as well!
I was positive both tapes had been tampered with. The matter I’d gone to the FBI office about involved, among other things, another lawyer who’d recently defrauded me. I remembered that a few months before, she had asked me to make her copies of all the tape recordings related to my case, which I’d kept hidden because of repeated break-ins at our house. I’d also gone to the FBI to ask their help in locating illegal surveillance devices we knew were installed in our house and on our property that were being used to facilitate the stalking (which they refused to do), and I realized that the illegal surveillance might have revealed where I kept the tapes so they could be doctored during one of the break-ins, using the copy I’d provided the lawyer with to determine what on the tape needed to be altered. I’m told a very high-quality doctored master could have been prepared in advance using a tool called “Audacity” and stored as an .aup file on a laptop; this could at some point be recorded onto my tapes directly in a very short amount of time. I’m also told it’s possible to bookmark specific spots on a tape.
Regarding the question of whether P.I. #2 really had or had not been an FBI agent as he’d claimed, I remained puzzled. I knew what I’ve related here was correct and accurate, because I’d personally experienced all of it. That meant that two different persons in law enforcement had given me completely conflicting information. There was no escaping the fact that one of them might have lied to me. Since I was unsure of who was being truthful and who wasn’t, I of course immediately contacted as many of the people and agencies I could remember having sent copies of P.I. #2’s business card to and explained the situation to them.
I wondered if I’d ever be able to get to the truth of the matter. Recently, the subject came up again in a most unexpected way. I was put in touch with another victim of organized stalking in San Antonio, and when I mentioned the name of P.I. #2, this victim recognized it instantly. The other victim had discovered P.I. #2 actually runs a major regional organized stalking gang that employs numerous members of both his and his wife’s extended families. I was provided with information on persons and vehicles known to be involved in this stalking gang, and I recognized many of them. This other victim says he has personally filed serious complaints with various law enforcement agencies against P.I. #2, and he knows of at least three other victims who’ve done this as well.
It now appears likely that, although I did not meet P.I. #2 until 2005, he had actually been stalking me from the very beginning, which was probably in 1999.
As to the question of whether P.I. #2 really is a former FBI agent or not, the San Antonio victim says he checked the man out thoroughly and was told by someone he trusted at the FBI that P.I. #2 definitely had worked for the FBI. (In that case, I would very much like to know what he did there and why he left!) As of 3/25/11, P.I. #2 still holds a valid Texas p.i. license, according to the DPS/PSB website. (P.I. #1 appears to have retired.)
As to the question of why someone in law enforcement might have lied to me, there are a couple of other possibilities. For example, the DPS investigator might have checked someone else with a similar name. Or perhaps the DPS investigator checked directly with Quantico, who didn’t know P.I. #1 had been employed by the local FBI office as a private contractor, paid informant, or in some other capacity rather than as an agent. The problem with those sorts of explanations is why I wasn’t simply given them at some point.
I’ve now come to realize that the important question isn’t who lied to me or even whether they lied to me or not; it’s why no one in law enforcement has been straight with me about P.I. #2, why he still has his license after there’ve been so many serious complaints filed against him, and why he’s never been prosecuted for anything as far as I know.
On 1/24/05, I spoke with the owner of a private investigation (p.i.) agency in Boerne, Texas, whom I’ll call P.I. #1, about hiring him to help me deal with a fraudulent trust document my name had been forged on and also to collect evidence that my children and I were being stalked and harassed. P.I. #1 told me he was a former DEA agent with many years of law enforcement experience who believed he could help me. We agreed to meet about this in Boerne, after he returned from a business trip to Washington, D.C.
On 1/31/05, I met with P.I. #1 at a restaurant in Boerne. P.I. #1 was accompanied at this meeting by a second man and his wife. This second man, whom I’ll call P.I. #2, was introduced to me as a retired FBI agent who had specialized in fraud cases and now worked as a p.i. with a specialty in that area. P.I. #1 said he wanted P.I. #2 to consult on my case if I hired him and that he would pay P.I. #2 himself out of what I paid him if I hired them.
Both of these men said they were licensed as private investigators by the State of Texas, and they told me how to go to the DPS/PSB website to verify this (which I later did). P.I. #1 carried a large black leather briefcase with an official-looking seal on it that he said was from his days with the DEA. He had asked me to bring along a cashier’s check for his retainer if I decided to hire him, which I did decide to do (Doc. A). As I left this meeting, P.I. #2 pulled out a business card, wrote his cell phone number on it while I watched, and handed it to me (Doc. B, top).
On 2/2/05, P.I. #2 personally escorted me to the office of an attorney in Boerne that both p.i.s insisted I hire to help me deal with the fraudulent trust. I did hire this lawyer at that time.
On 2/4/05, P.I. #2 asked me to meet with him at his home, which was located in Fair Oaks Ranch, an affluent suburb between Boerne and San Antonio. He gave me directions to his house over the phone, and I jotted them down along the edge of my kitchen calendar. I drove to his house, where I met with him and his wife, who they said helped with his business. While I was there, the couple showed me a large glass case containing a handgun, a badge, and other items I was told were related to the man’s years as an FBI agent. I was also shown briefly into a room with a computer in it that was being used as an office. This room had a wooden shelf attached to the wall than ran all along one side. There were some small items on the shelf, but my attention was drawn to a large framed art print that was propped up against the wall on the shelf, midway down the room. This print was a still-life of various items related to FBI service (gun, badge with “FBI” clearly written on it, etc.). It was in the style of a well-known Kentucky artist named Don Ensor, and it was very similar or possibly identical to a print I recalled seeing a few years earlier at the home of my father’s next-door neighbor, an FBI agent, in Kentucky.
I only met with P.I. #2 at his home this one time. After this, both p.i.s insisted on meeting with me in an assortment of other unusual locations instead. P.I. #1 always insisted on being paid in cash only. When I demanded a receipt, he finally hand-wrote me one (Doc. C).
All three of these men (the two p.i.s and the lawyer they took me to) charged me large amounts of money for work they claimed to be doing as part of my case, but when I began asking to see actual results of their work and requesting written reports of what they’d done, they began stalling. I confronted all three of them at a meeting in the lawyer’s office on 8/15/05 that I can only describe as very frightening and threatening. Desperate to defuse the situation, I told the three men I needed to spend the next few weeks getting two of my children off to college in other states and then would re-evaluate things. As I was leaving this meeting, I spotted my former father-in-law’s vehicle nearby and realized he’d been listening in on the meeting, probably from an adjacent office. At that point, I realized I’d been conned.
On 8/21/05, I mailed a formal complaint in the form of a box of documents plus a cover letter against the persons involved in the fraudulent trust, P.I. #1, P.I. #2, and the Boerne lawyer to the FBI office in San Antonio (Doc. D). However, I was followed into the post office by two men who flashed badges at postal employees and were immediately admitted into the “Employees Only” part of the building. Because I was concerned about this, I went in person to the FBI office a few days later to follow up on my complaint. The Special Agent I met with there (who never told me his name) said their office hadn’t received my complaint. I explained that one of the p.i.s who’d defrauded me was a former FBI agent. The current agent took down P.I. #2’s information and said he’d do some checking.
Beginning on 9/4/05, I started noticing P.I. #1 and P.I. #2 following me and stalking me. I recorded these incidents in a logbook.
I officially fired P.I. #1, P.I. #2, and their lawyer-friend on 9/9/05. I had deliberately waited to do this until after I was sure there were written records of the crimes committed against me on file with the FBI because of how frightening the confrontation with the two former federal agents in particular had been.
On 9/13/05, I received a letter from the FBI that was dated 9/1/05 in which they refused to do anything (Doc. E). This letter was printed on cheap, flimsy paper and arrived with its envelope hanging wide open. It referred to a strange unknown letter I was supposed to have sent them on 8/24/05, rather than the supposedly missing box of documents with its very clear cover letter that I’d actually sent on 8/22/05 as shown above.
On 10/21/05, I filed formal complaints with the DPS/PSB (Texas p.i. licensing board) against P.I. #1 and P.I. #2 (Doc. F).
When I got no response from the DPS/PSB, I began complaining to the Texas OAG and other agencies. I also sent a letter to the DPS/PSB on 11/10/05 asking about the lack of response to my complaints (Doc. G). On 11/13/05, I emailed the DPS/PSB about my fear of P.I. #2 because he was frightening me by stalking me and driving by our house repeatedly (Doc. H).
On 11/15/05, a DPS investigator in San Antonio called and asked me to meet him at a public location that was between my house and his office later that day to give him copies of all the documents related to the complaints I’d filed. During this conversation, he hinted that P.I. #2 might not have actually been an FBI agent.
About 20 or 30 minutes after this call ended, the DPS investigator called me back to cancel our meeting in San Antonio. He said he’d just learned that a senior DPS investigator in Dallas had already been assigned to my case. He instead asked me to fax him a few of the most important documents from my complaints, and he gave me his fax number. Then he told me straight out that he hadn’t been able to find any indications of P.I. #2’s ever having worked for the FBI. I told the investigator I was shocked to hear this. He told me to just fax what he’d asked for, and he said someone would get back in touch with me soon.
I immediately gathered up what the investigator had asked for. I started faxing the documents to the number I’d been given but quickly discovered that the fax number didn’t work. I thought I must have jotted the number down incorrectly, so I called the investigator back to check on this. A different investigator answered the phone, said the person I’d just talked to had left the office, and told me the fax machine I’d been trying to send to was out of order. He gave me the number of a different machine he said was located down the same hallway, and he promised me he’d personally make sure that my documents got to the correct investigator. I then faxed my documents to the second number without any problems.
As it happened, P.I. #1 and P.I. #2 had provided me with simple equipment for recording phone calls, and I still had this equipment attached to my telephone. As a result, I had a cassette tape recording of my phone conversations with the San Antonio DPS investigator. (The third call about the broken fax machine was made from a different phone and was not recorded.)
That evening, I suddenly remembered the business card P.I. #2 had given me (Doc. B, top). I got it out, looked at it again, and saw that it contained both a statement implying he’d been an FBI agent and a sample of his handwriting proving he’d given it to me. Based on what the DPS investigator had told me on the phone, I now believed the card might be proof that P.I. #2 had impersonated an FBI agent. The next morning, 11/16/05, I sent a letter (Doc. I) and a copy of the card to the DPS investigator in San Antonio.
On 2/6/06, I was sent a letter from the San Antonio DPS investigator giving me the contact information for the Dallas investigator who was handling my case (Doc. J).
The Dallas investigator, the DPS, and the Texas OAG all later refused to take any action whatsoever against P.I. #1 or P.I. #2. Because I was upset about law enforcement’s refusal to do anything at all about investigating or prosecuting these p.i.s and was seriously concerned about them defrauding someone else because they still held valid Texas p.i. licenses, I began sending copies of the business card from P.I. #2 to various agencies and the media. Meanwhile, I continued to log various stalking incidents directed against me by both of these p.i.s.
On 6/26/07, I went back down to the San Antonio FBI office on another matter and met with a different agent there who did identify himself (Doc. B, bottom). I was surprised to discover very quickly that this agent was more interested in P.I. #2 than he was in the matter I’d come there about. The agent began this discussion by asking me if I wasn’t afraid of being sued by P.I. #2 for accusing him of impersonating a federal agent by sending around copies of his business card. I told him no, and I explained about how the DPS investigator had told me there was no record of P.I. #2 ever having worked for the FBI. I was stunned when the agent told me P.I. #2 actually had worked for the FBI as a fraud investigator. I asked him why the DPS investigator had lied to me. He said he didn’t know, and he implied that I was not being truthful about having been told this.
At that point, I became very upset. I immediately told the agent that I just happened to have a cassette tape recording of the phone conversation in which the DPS investigator had made the statements in question, and I got out the tape and handed it to him. At this, the agent became agitated, grabbed the tape from me, and ran out of the room.
He returned a few minutes later with a small tape recorder that he turned on. My tape was in the recorder, and it started playing right at the spot during my first call with the investigator where he implied that P.I. #2 hadn’t worked for the FBI but didn’t actually state this. This made me wonder how the agent had managed to locate that spot on the tape so quickly, since he hadn’t been out of the room very long. I knew the part of the tape he needed to hear was in the second phone call, but when I told him this, he moved the tape ahead (again to just the right spot!) and showed me there was only one phone call on my tape, even though I knew there had been two. I tried to tell him the other call had somehow disappeared from the tape, but he made it clear he didn’t believe me. I told him that, regardless of his FBI status, P.I. #2 had defrauded me and had been stalking me ever since and that I was afraid of him. We discussed a particular incident in which P.I. #2 had been tailgating me too closely and might have tapped my bumper with his vehicle at a stop sign, before moving on to the matter I’d actually come to discuss.
I was extremely upset about my cassette tape, which I knew had to have been tampered with at some point. As soon as I got home, I got out a copy of the tape I’d made and played it. To my astonishment, someone had also removed the second phone call from the copy as well!
I was positive both tapes had been tampered with. The matter I’d gone to the FBI office about involved, among other things, another lawyer who’d recently defrauded me. I remembered that a few months before, she had asked me to make her copies of all the tape recordings related to my case, which I’d kept hidden because of repeated break-ins at our house. I’d also gone to the FBI to ask their help in locating illegal surveillance devices we knew were installed in our house and on our property that were being used to facilitate the stalking (which they refused to do), and I realized that the illegal surveillance might have revealed where I kept the tapes so they could be doctored during one of the break-ins, using the copy I’d provided the lawyer with to determine what on the tape needed to be altered. I’m told a very high-quality doctored master could have been prepared in advance using a tool called “Audacity” and stored as an .aup file on a laptop; this could at some point be recorded onto my tapes directly in a very short amount of time. I’m also told it’s possible to bookmark specific spots on a tape.
Regarding the question of whether P.I. #2 really had or had not been an FBI agent as he’d claimed, I remained puzzled. I knew what I’ve related here was correct and accurate, because I’d personally experienced all of it. That meant that two different persons in law enforcement had given me completely conflicting information. There was no escaping the fact that one of them might have lied to me. Since I was unsure of who was being truthful and who wasn’t, I of course immediately contacted as many of the people and agencies I could remember having sent copies of P.I. #2’s business card to and explained the situation to them.
I wondered if I’d ever be able to get to the truth of the matter. Recently, the subject came up again in a most unexpected way. I was put in touch with another victim of organized stalking in San Antonio, and when I mentioned the name of P.I. #2, this victim recognized it instantly. The other victim had discovered P.I. #2 actually runs a major regional organized stalking gang that employs numerous members of both his and his wife’s extended families. I was provided with information on persons and vehicles known to be involved in this stalking gang, and I recognized many of them. This other victim says he has personally filed serious complaints with various law enforcement agencies against P.I. #2, and he knows of at least three other victims who’ve done this as well.
It now appears likely that, although I did not meet P.I. #2 until 2005, he had actually been stalking me from the very beginning, which was probably in 1999.
As to the question of whether P.I. #2 really is a former FBI agent or not, the San Antonio victim says he checked the man out thoroughly and was told by someone he trusted at the FBI that P.I. #2 definitely had worked for the FBI. (In that case, I would very much like to know what he did there and why he left!) As of 3/25/11, P.I. #2 still holds a valid Texas p.i. license, according to the DPS/PSB website. (P.I. #1 appears to have retired.)
As to the question of why someone in law enforcement might have lied to me, there are a couple of other possibilities. For example, the DPS investigator might have checked someone else with a similar name. Or perhaps the DPS investigator checked directly with Quantico, who didn’t know P.I. #1 had been employed by the local FBI office as a private contractor, paid informant, or in some other capacity rather than as an agent. The problem with those sorts of explanations is why I wasn’t simply given them at some point.
I’ve now come to realize that the important question isn’t who lied to me or even whether they lied to me or not; it’s why no one in law enforcement has been straight with me about P.I. #2, why he still has his license after there’ve been so many serious complaints filed against him, and why he’s never been prosecuted for anything as far as I know.
Labels:
Boerne,
Carmen,
gang stalking,
Hays,
Hix,
illegal surveillance,
organized stalking,
Short,
tapes
Sunday, March 20, 2011
Note To The Texas Medical Board
[Posted along with my thanks to Medawar!]
The following example shows what happens when medical authorities and the colleagues of a mentally unstable physician ignore well-founded concerns about him.
A subsequent public inquiry under Lady Justice Janet Smith came up with many more probable victims of this man.
The original of this list can be found at the following link:
http://www.guardian.co.uk/uk/2002/jul/19/shipman.health2
Please also see the following video:
http://www.bbc.co.uk/news/uk-england-10669090
• guardian.co.uk, Friday 19 July 2002 15.23 BST
Harold Shipman: full list of victims
An alphabetical list of the 215 people murdered by the Greater Manchester doctor, Britain's worst serial killer:
Acton, Lily
Adams, Lizzie
Adkinson, Sarah
Adshead, Norman
Adshead, Rose Ann
Aitken, Irene
Andrew, Dorothy Mary
Andrew, Joseph
Andrew, Mary Emma
Arrandale, Albert
Arrowsmith, Winifred
Ashcroft, Netta
Ashton, Dora Elizabeth
Ashton, Ellen
Ashworth, Ada
Ashworth, Brenda
Ashworth, Elizabeth
Ashworth, James
Ashworth, Sarah
Aveyard, Clara Ethel
Baddeley, Elizabeth Mary
Baddeley, John
Bagshaw, Bertha
Barber, Squire
Bardsley, Joseph
Bardsley, Lily
Bardsley, Nellie
Barker, Elsie
Barlow, Charles Henry
Barnes, James Edward
Battersby, Elizabeth
Baxter, William
Beech, Joseph
Bell, Norman John
Bennett, Ethel
Bennett, Frances
Bennett, Nellie
Bennison, Charlotte
Bent, Arthur
Berry, Irene
Bill, Edith Annie
Birchall, Mary Ivy
Bird, Violet May
Black, Alice
Boardman, Kathleen May
Boardman, Mary Louisa
Bogle, Geoffrey
Bolland, Alice
Bowers, Mary Elizabeth
Bradshaw, Miriam
Brady, Edith
Bramwell, Harold
Bramwell, Vera
Brassington, Charles Geoffrey
Brassington, Nancy Anne
Bridge, Doris
Bridge, Jane
Brierley, Albert
Brierley, Edith
Broadbent, Lily
Brock, Edith
Brocklehurst, Charles Edward
Brocklehurst, Vera
Brooder, Irene
Brookes, Lily
Brookes, May
Brown, Alice
Brown, Mary Alice
Brown, William Henry
Buckland, Edward
Buckley, Ethel
Burke, Elizabeth Mary
Butcher, Lydia Edith
Cains, Ida
Callaghan, Sean Stuart
Calverley, Edith
Campbell, Annie
Carradice, Marion
Carrington, Alice
Carroll, Josephine May
Cartwright, Hannah
Chadwick, Wilfred
Challinor, Ivy Elizabeth
Challoner, Genevieve
Chapman, Irene
Chappell, Alice
Chappell, Wilfred
Charlton, John
Charnock, George
Cheetham, Albert
Cheetham, Alfred
Cheetham, Elsie
Cheetham, Hena
Cheetham, Norah
Cheetham, Thomas
Chidlow, Amy
Clarke, Fanny
Clayton, Elsie
Clayton, Frances
Clee, Beatrice Helen
Clough, James
Condon, Thomas
Connaughton, Alice Hilda
Connors, Michael
Conway, Margaret Ann
Coomber, Frederick
Cooper, Ann
Copeland, Erla
Copeland, Sydney Hoskins
Couldwell, Constance Anne
Coulthard, Ann
Coutts, Mary
Couzens, Hilda Mary
Cox, Eileen Theresa
Crompton, Eileen Daphne
Crompton, Frank
Crompton, John
Crossley, Lily
Cullen, Lilian
Cuthbert, Valerie
Davies, Cissie
Davies, Eric
Davies, Fred
Davies, Miriam
Dawson, Fanny
Dean, Elsie Lorna
Dean, Joan Edwina
Delaney, Bessie
Denham, Christopher
Dentith, Frederick
Devenport, Ronnie
Dixon, Alice
Dobb, Edgar
Dolan, Ethel
Drinkwater, Alice
Drummond, Joseph
Dudley, Mary Rose
Dutton, Elaine
Earls, Doris
Earnshaw, William
Eddleston, Harold
Eddleston, Monica
Edge, Agnes
Evans, Bethel Anne
Everall, Hannah
Everall, Joseph Vincent
Farrell, Phyllis
Fernley, Marie Antoinette
Firman, Mary Elizabeth
Fish, Hilda
Fitton, Hilda
Fletcher, Dorothy
Fletcher, Elizabeth
Floyd, Arthur
Fogg, Leah
Foulkes, Edwin
Fowden, Thomas
Fox, Moira Ashton
France, John
Freeman, Harold
Freeman, Winifred
Frith, Hannah
Galpin, Minnie Doris Irene
Garlick, Rose
Garlick, Violet
Garratt, Mary Alice
Garside, Millicent
Gaskell, Marion
Gaunt, Mary
Gee, Nellie
Gess, Clifford
Givens, William
Goddard, Edith
Godfrey, Elsie
Golds, Annie Elizabeth
Gorton, Alice Maude
Graham, Edith
Gray, Rebecca
Greenhalgh, John Sheard
Grimshaw, Annie
Grimshaw, Muriel
Grundy, Donald Anthony
Grundy, Kathleen
Grundy, Nora
Hackney, Clara
Hackney, Clara
Hadfield, Violet
Hague, William
Hall, Josephine
Halliday, Frank
Hallsworth, Janet
Hamblett, Leonora
Hamer, Mary Emma
Hammond, Caroline Veronica
Hampson, Jesse
Hancock, Christine
Hannible, Elsie
Harding, Joan Milray
Harris, Charles
Harris, Harriet
Harrison, Christina
Harrison, David Alan
Harrison, Marion
Harrison, Muriel Eveline
Harrison, Samuel
Harrop, Elsie
Haslam, Mary Elizabeth
Hawkins, Sarah
Healey, Winifred
Heapey, Clifford Barnes
Heapey, Gladys
Heathcote, Irene
Heginbotham, Olive
Hennefer, Ellen
Hett, Mary Jane
Heywood, Ada
Heywood, Florence
Hibbert, Hilda Mary
Hickson, Robert
Higginbottom, George Eric
Higginbottom, Peter
Higgins, Barry
Higgins, Lily
Higham, Marion Elizabeth
Highley, Ruth
Higson, Ellen
Hill, Sarah Ann
Hillier, Pamela Marguerite
Hilton, Ada Matley
Hilton, John
Hirst, Emma
Holgate, Ethel Doris
Holland, Alline Devolle
Holt, Alice
Hopkins, Dorothy Doretta
Howcroft, John
Hulme, Hilda
Hurd, May
Iwanina, Jozef
Jackman, Harold Edward
Jackson, Maureen Lamonnier
Jackson, Nancy
Jameson, Ronald
Jeffries, Beatrice
Johnson, Norah
Johnson, Richard
Johnston, Leah
Jones, Alice Mary
Jones, David
Jones, Hannah
Jones, Ivy
Jones, Jane
Jones, Robert Edward
Jordan, Mary Ellen
Keating, Mary
Kellett, Ethel May
Kellett, Fred
Kelly, Ellen
Kelly, Moira
Kennedy, Alice
Killan, Charles Henry
King, Elsie
King, James Joseph
Kingsley, Mary
Kitchen, Alice Christine
Lacey, Renee
Leach, Florence
Leech, Edith
Leech, William Henry
Lees, Olive
Leigh, Carrie
Leigh, Joseph
Leigh, Wilfred
Lewis, Elsie
Lewis, Florence
Lewis, Peter
Lilley, Jean
Lingard, Robert Henry
Linn, Laura Frances
Livesey, John Louden
Llewellyn, Edna May
Lomas, Harry
Lomas, Ivy
Long, Dorothy
Longmate, Thomas Alfred
Lord, Jane Ellen
Lowe, Beatrice
Lowe, Esther
Lowe, May
Lyons, Eva
MacConnell, Charles
Mackenzie, Selina
Mackie, Christina McCulloch
Mansfield, Mary Ann
Mansfield, Walter
Marley, Martha
Marsland, Sarah Hannah
Matley, Maud
McDonald, Kathleen
McLaren, William James
McLoughlin, Gertrude
Melia, Joan May
Mellor, Elizabeth Ellen
Mellor, Samuel
Mellor, Winifred
Meredith, Oscar
Metcalfe, Margaret
Middleton, Deborah
Middleton, Mary
Mills, Samuel
Mitchell, Cyril
Mitchell, Wilbert
Molesdale, John Bennett
Morgan, Emily
Moss, Bertha
Moss, Hannah
Mottram, George Henry
Mottram, Hannah Helena
Mottram, Pamela Grace
Moult, Thomas
Mullen, Nellie
Mycock, Miriam Rose Emily
Needham, Nora
Nicholls, Violet
Nichols, Fanny
Nichols, Lily
Nuttall, Hervey
Nuttall, Norah
O'Sullivan, Thomas
Ogden, Mary
Oldham, Agnes
Oldham, Samuel
Oswald, Frances Elaine
Otter, Enid
Ousey, Margaret
Ovcar-Robinson, Konrad Peter
Overton, Renate Eldtraude
Oxley, Phyllis
Parker, Marjorie
Parkes, Annie
Parkin, Laura Victoria
Parr, Bertha
Pearce, Elizabeth
Pedley, Rosetta
Penney, Vara
Pickering, Leah
Pickup, Kenneth
Pickup, Mavis Mary
Pitman, Edith
Platt, Elsie
Platt, Marion
Pomfret, Bianka
Potts, Frances
Potts, Reginald
Powers, Annie Alexandra
Preston, Ada Marjorie
Prestwich, Alice
Proud, Ethel May
Quinn, Marie
Ralphs, Anne Lilian
Ralphs, Ernest Colin
Rawling, Alice
Reade, Audrey
Redfern, Tom
Renwick, Dorothea Hill
Richards, Jose Kathleen Diana
Richardson, Alice
Riley, Stanley
Roberts, Edith
Roberts, Esther Hannah
Roberts, Gladys
Robinson, Eileen
Robinson, Eveline
Robinson, Lavinia
Robinson, Mildred
Rogers, Elizabeth Ann
Rostron, Jane Frances
Rowarth, Dorothy
Rowbottom, Annie
Rowland, Jane Isabella
Royles, Elsie
Royston, Betty
Rudol, Ernest
Russell, Tom Balfour
Sankey, Margaret
Saunders, Albert Edward
Saunders, Gladys
Scott, Edith
Scott, Elsie
Sellors, Kate Maud
Sharples, Cicely
Shaw, Joseph
Shaw, Leonard
Shaw, Lilian
Shaw, Neville
Shaw, Susan Eveline
Shawcross, Edna
Shawcross, Ernest
Shawcross, Mabel
Shelmerdine, Jack Leslie
Shelmerdine, Jane Elizabeth
Shore, Lily
Sidebotham, Florence
Sigley, Elizabeth Teresa
Simpson, Kenneth Harry
Slater, Albert
Slater, Florence
Slater, Lena Norah
Slater, May
Smith, Alice
Smith, Dora Elizabeth
Smith, Emma
Smith, Kenneth Ernest
Smith, Margaret
Smith, Mary Alice
Smith, Sidney Arthur
Smith, Winifred Isabel
Sparkes, Monica Rene
Squirrell, Alice
Stafford, Harry
Stafford, Kate Elizabeth
Stansfield, Joe Ainscow
Stocks, Louisa
Stone, John
Stopford, Arthur Henderson
Stopford, Harriet
Strickland, Ruth
Sumner, Grace
Swann, Bessie
Swann, Robert
Swindells, Emmeline
Taylor, Caroline Mary
Taylor, Edna Mary
Taylor, Florence
Taylor, Lily Newby
Taylor, Mary
Tempest, Mary Ann
Thomas, Alice
Thomas, Sarah Ann
Thornton, Maria
Tideswell, Sarah
Tierney, Angela Philomena
Tingle, Walter
Toft, Beatrice
Tomlin, Mary
Townsend, Margaret
Tucker, Dorothy
Tuff, Mary
Tuffin, Winifred Amy
Turner, Frances Elizabeth
Turner, Irene
Uttley, Stanley
Vickers, Frederick
Vickers, Margaret Mary
Virgin, Lucy
Vizor, George Edgar
Vizor, May
Wagstaff, George Lawton
Wagstaff, Jessie Irene
Wagstaff, Laura Kathleen
Waldron, Margaret Anne
Walker, Edward
Walker, Ellen
Walker, Henrietta
Walker, Winifred Mary
Waller, Harry
Waller, Marjorie Hope
Walls, Mary
Walton, Sydney
Warburton, Ada
Ward, Maureen Alice
Ward, Minnie
Ward, Muriel Margaret
Ward, Percy
Wardle, Eric
Wareing, William Hill
Warren, May
Wass, Kathleen May
Watkins, Annie
West, Maria
Wharam, Ellen Frances
Wharmby, Lavinia
White, Mona Ashton
Whitehead, Amy
Whitham, Colin
Whittaker, Maureen
Whittaker, Violet Mary
Whittingslow, Vera
Whittle, Edith
Wibberley, Edith
Wilcockson, Joseph Frank
Wilkinson, Annie
Wilkinson, Maud
Williams, Albert Redvers
Williams, Emily
Williamson, Sarah Jane
Wills, Jack
Wilmore, Margaret
Wilson, Muriel Elsie
Wimpeney, Mark
Winston, George
Winston, Olive
Winterbottom, Mary
Wood, Annie
Wood, Charles Henry
Wood, Fanny
Wood, James
Woodhead, Joyce
Woodhead, Kenneth Wharmby
The following example shows what happens when medical authorities and the colleagues of a mentally unstable physician ignore well-founded concerns about him.
A subsequent public inquiry under Lady Justice Janet Smith came up with many more probable victims of this man.
The original of this list can be found at the following link:
http://www.guardian.co.uk/uk/2002/jul/19/shipman.health2
Please also see the following video:
http://www.bbc.co.uk/news/uk-england-10669090
• guardian.co.uk, Friday 19 July 2002 15.23 BST
Harold Shipman: full list of victims
An alphabetical list of the 215 people murdered by the Greater Manchester doctor, Britain's worst serial killer:
Acton, Lily
Adams, Lizzie
Adkinson, Sarah
Adshead, Norman
Adshead, Rose Ann
Aitken, Irene
Andrew, Dorothy Mary
Andrew, Joseph
Andrew, Mary Emma
Arrandale, Albert
Arrowsmith, Winifred
Ashcroft, Netta
Ashton, Dora Elizabeth
Ashton, Ellen
Ashworth, Ada
Ashworth, Brenda
Ashworth, Elizabeth
Ashworth, James
Ashworth, Sarah
Aveyard, Clara Ethel
Baddeley, Elizabeth Mary
Baddeley, John
Bagshaw, Bertha
Barber, Squire
Bardsley, Joseph
Bardsley, Lily
Bardsley, Nellie
Barker, Elsie
Barlow, Charles Henry
Barnes, James Edward
Battersby, Elizabeth
Baxter, William
Beech, Joseph
Bell, Norman John
Bennett, Ethel
Bennett, Frances
Bennett, Nellie
Bennison, Charlotte
Bent, Arthur
Berry, Irene
Bill, Edith Annie
Birchall, Mary Ivy
Bird, Violet May
Black, Alice
Boardman, Kathleen May
Boardman, Mary Louisa
Bogle, Geoffrey
Bolland, Alice
Bowers, Mary Elizabeth
Bradshaw, Miriam
Brady, Edith
Bramwell, Harold
Bramwell, Vera
Brassington, Charles Geoffrey
Brassington, Nancy Anne
Bridge, Doris
Bridge, Jane
Brierley, Albert
Brierley, Edith
Broadbent, Lily
Brock, Edith
Brocklehurst, Charles Edward
Brocklehurst, Vera
Brooder, Irene
Brookes, Lily
Brookes, May
Brown, Alice
Brown, Mary Alice
Brown, William Henry
Buckland, Edward
Buckley, Ethel
Burke, Elizabeth Mary
Butcher, Lydia Edith
Cains, Ida
Callaghan, Sean Stuart
Calverley, Edith
Campbell, Annie
Carradice, Marion
Carrington, Alice
Carroll, Josephine May
Cartwright, Hannah
Chadwick, Wilfred
Challinor, Ivy Elizabeth
Challoner, Genevieve
Chapman, Irene
Chappell, Alice
Chappell, Wilfred
Charlton, John
Charnock, George
Cheetham, Albert
Cheetham, Alfred
Cheetham, Elsie
Cheetham, Hena
Cheetham, Norah
Cheetham, Thomas
Chidlow, Amy
Clarke, Fanny
Clayton, Elsie
Clayton, Frances
Clee, Beatrice Helen
Clough, James
Condon, Thomas
Connaughton, Alice Hilda
Connors, Michael
Conway, Margaret Ann
Coomber, Frederick
Cooper, Ann
Copeland, Erla
Copeland, Sydney Hoskins
Couldwell, Constance Anne
Coulthard, Ann
Coutts, Mary
Couzens, Hilda Mary
Cox, Eileen Theresa
Crompton, Eileen Daphne
Crompton, Frank
Crompton, John
Crossley, Lily
Cullen, Lilian
Cuthbert, Valerie
Davies, Cissie
Davies, Eric
Davies, Fred
Davies, Miriam
Dawson, Fanny
Dean, Elsie Lorna
Dean, Joan Edwina
Delaney, Bessie
Denham, Christopher
Dentith, Frederick
Devenport, Ronnie
Dixon, Alice
Dobb, Edgar
Dolan, Ethel
Drinkwater, Alice
Drummond, Joseph
Dudley, Mary Rose
Dutton, Elaine
Earls, Doris
Earnshaw, William
Eddleston, Harold
Eddleston, Monica
Edge, Agnes
Evans, Bethel Anne
Everall, Hannah
Everall, Joseph Vincent
Farrell, Phyllis
Fernley, Marie Antoinette
Firman, Mary Elizabeth
Fish, Hilda
Fitton, Hilda
Fletcher, Dorothy
Fletcher, Elizabeth
Floyd, Arthur
Fogg, Leah
Foulkes, Edwin
Fowden, Thomas
Fox, Moira Ashton
France, John
Freeman, Harold
Freeman, Winifred
Frith, Hannah
Galpin, Minnie Doris Irene
Garlick, Rose
Garlick, Violet
Garratt, Mary Alice
Garside, Millicent
Gaskell, Marion
Gaunt, Mary
Gee, Nellie
Gess, Clifford
Givens, William
Goddard, Edith
Godfrey, Elsie
Golds, Annie Elizabeth
Gorton, Alice Maude
Graham, Edith
Gray, Rebecca
Greenhalgh, John Sheard
Grimshaw, Annie
Grimshaw, Muriel
Grundy, Donald Anthony
Grundy, Kathleen
Grundy, Nora
Hackney, Clara
Hackney, Clara
Hadfield, Violet
Hague, William
Hall, Josephine
Halliday, Frank
Hallsworth, Janet
Hamblett, Leonora
Hamer, Mary Emma
Hammond, Caroline Veronica
Hampson, Jesse
Hancock, Christine
Hannible, Elsie
Harding, Joan Milray
Harris, Charles
Harris, Harriet
Harrison, Christina
Harrison, David Alan
Harrison, Marion
Harrison, Muriel Eveline
Harrison, Samuel
Harrop, Elsie
Haslam, Mary Elizabeth
Hawkins, Sarah
Healey, Winifred
Heapey, Clifford Barnes
Heapey, Gladys
Heathcote, Irene
Heginbotham, Olive
Hennefer, Ellen
Hett, Mary Jane
Heywood, Ada
Heywood, Florence
Hibbert, Hilda Mary
Hickson, Robert
Higginbottom, George Eric
Higginbottom, Peter
Higgins, Barry
Higgins, Lily
Higham, Marion Elizabeth
Highley, Ruth
Higson, Ellen
Hill, Sarah Ann
Hillier, Pamela Marguerite
Hilton, Ada Matley
Hilton, John
Hirst, Emma
Holgate, Ethel Doris
Holland, Alline Devolle
Holt, Alice
Hopkins, Dorothy Doretta
Howcroft, John
Hulme, Hilda
Hurd, May
Iwanina, Jozef
Jackman, Harold Edward
Jackson, Maureen Lamonnier
Jackson, Nancy
Jameson, Ronald
Jeffries, Beatrice
Johnson, Norah
Johnson, Richard
Johnston, Leah
Jones, Alice Mary
Jones, David
Jones, Hannah
Jones, Ivy
Jones, Jane
Jones, Robert Edward
Jordan, Mary Ellen
Keating, Mary
Kellett, Ethel May
Kellett, Fred
Kelly, Ellen
Kelly, Moira
Kennedy, Alice
Killan, Charles Henry
King, Elsie
King, James Joseph
Kingsley, Mary
Kitchen, Alice Christine
Lacey, Renee
Leach, Florence
Leech, Edith
Leech, William Henry
Lees, Olive
Leigh, Carrie
Leigh, Joseph
Leigh, Wilfred
Lewis, Elsie
Lewis, Florence
Lewis, Peter
Lilley, Jean
Lingard, Robert Henry
Linn, Laura Frances
Livesey, John Louden
Llewellyn, Edna May
Lomas, Harry
Lomas, Ivy
Long, Dorothy
Longmate, Thomas Alfred
Lord, Jane Ellen
Lowe, Beatrice
Lowe, Esther
Lowe, May
Lyons, Eva
MacConnell, Charles
Mackenzie, Selina
Mackie, Christina McCulloch
Mansfield, Mary Ann
Mansfield, Walter
Marley, Martha
Marsland, Sarah Hannah
Matley, Maud
McDonald, Kathleen
McLaren, William James
McLoughlin, Gertrude
Melia, Joan May
Mellor, Elizabeth Ellen
Mellor, Samuel
Mellor, Winifred
Meredith, Oscar
Metcalfe, Margaret
Middleton, Deborah
Middleton, Mary
Mills, Samuel
Mitchell, Cyril
Mitchell, Wilbert
Molesdale, John Bennett
Morgan, Emily
Moss, Bertha
Moss, Hannah
Mottram, George Henry
Mottram, Hannah Helena
Mottram, Pamela Grace
Moult, Thomas
Mullen, Nellie
Mycock, Miriam Rose Emily
Needham, Nora
Nicholls, Violet
Nichols, Fanny
Nichols, Lily
Nuttall, Hervey
Nuttall, Norah
O'Sullivan, Thomas
Ogden, Mary
Oldham, Agnes
Oldham, Samuel
Oswald, Frances Elaine
Otter, Enid
Ousey, Margaret
Ovcar-Robinson, Konrad Peter
Overton, Renate Eldtraude
Oxley, Phyllis
Parker, Marjorie
Parkes, Annie
Parkin, Laura Victoria
Parr, Bertha
Pearce, Elizabeth
Pedley, Rosetta
Penney, Vara
Pickering, Leah
Pickup, Kenneth
Pickup, Mavis Mary
Pitman, Edith
Platt, Elsie
Platt, Marion
Pomfret, Bianka
Potts, Frances
Potts, Reginald
Powers, Annie Alexandra
Preston, Ada Marjorie
Prestwich, Alice
Proud, Ethel May
Quinn, Marie
Ralphs, Anne Lilian
Ralphs, Ernest Colin
Rawling, Alice
Reade, Audrey
Redfern, Tom
Renwick, Dorothea Hill
Richards, Jose Kathleen Diana
Richardson, Alice
Riley, Stanley
Roberts, Edith
Roberts, Esther Hannah
Roberts, Gladys
Robinson, Eileen
Robinson, Eveline
Robinson, Lavinia
Robinson, Mildred
Rogers, Elizabeth Ann
Rostron, Jane Frances
Rowarth, Dorothy
Rowbottom, Annie
Rowland, Jane Isabella
Royles, Elsie
Royston, Betty
Rudol, Ernest
Russell, Tom Balfour
Sankey, Margaret
Saunders, Albert Edward
Saunders, Gladys
Scott, Edith
Scott, Elsie
Sellors, Kate Maud
Sharples, Cicely
Shaw, Joseph
Shaw, Leonard
Shaw, Lilian
Shaw, Neville
Shaw, Susan Eveline
Shawcross, Edna
Shawcross, Ernest
Shawcross, Mabel
Shelmerdine, Jack Leslie
Shelmerdine, Jane Elizabeth
Shore, Lily
Sidebotham, Florence
Sigley, Elizabeth Teresa
Simpson, Kenneth Harry
Slater, Albert
Slater, Florence
Slater, Lena Norah
Slater, May
Smith, Alice
Smith, Dora Elizabeth
Smith, Emma
Smith, Kenneth Ernest
Smith, Margaret
Smith, Mary Alice
Smith, Sidney Arthur
Smith, Winifred Isabel
Sparkes, Monica Rene
Squirrell, Alice
Stafford, Harry
Stafford, Kate Elizabeth
Stansfield, Joe Ainscow
Stocks, Louisa
Stone, John
Stopford, Arthur Henderson
Stopford, Harriet
Strickland, Ruth
Sumner, Grace
Swann, Bessie
Swann, Robert
Swindells, Emmeline
Taylor, Caroline Mary
Taylor, Edna Mary
Taylor, Florence
Taylor, Lily Newby
Taylor, Mary
Tempest, Mary Ann
Thomas, Alice
Thomas, Sarah Ann
Thornton, Maria
Tideswell, Sarah
Tierney, Angela Philomena
Tingle, Walter
Toft, Beatrice
Tomlin, Mary
Townsend, Margaret
Tucker, Dorothy
Tuff, Mary
Tuffin, Winifred Amy
Turner, Frances Elizabeth
Turner, Irene
Uttley, Stanley
Vickers, Frederick
Vickers, Margaret Mary
Virgin, Lucy
Vizor, George Edgar
Vizor, May
Wagstaff, George Lawton
Wagstaff, Jessie Irene
Wagstaff, Laura Kathleen
Waldron, Margaret Anne
Walker, Edward
Walker, Ellen
Walker, Henrietta
Walker, Winifred Mary
Waller, Harry
Waller, Marjorie Hope
Walls, Mary
Walton, Sydney
Warburton, Ada
Ward, Maureen Alice
Ward, Minnie
Ward, Muriel Margaret
Ward, Percy
Wardle, Eric
Wareing, William Hill
Warren, May
Wass, Kathleen May
Watkins, Annie
West, Maria
Wharam, Ellen Frances
Wharmby, Lavinia
White, Mona Ashton
Whitehead, Amy
Whitham, Colin
Whittaker, Maureen
Whittaker, Violet Mary
Whittingslow, Vera
Whittle, Edith
Wibberley, Edith
Wilcockson, Joseph Frank
Wilkinson, Annie
Wilkinson, Maud
Williams, Albert Redvers
Williams, Emily
Williamson, Sarah Jane
Wills, Jack
Wilmore, Margaret
Wilson, Muriel Elsie
Wimpeney, Mark
Winston, George
Winston, Olive
Winterbottom, Mary
Wood, Annie
Wood, Charles Henry
Wood, Fanny
Wood, James
Woodhead, Joyce
Woodhead, Kenneth Wharmby
Monday, March 14, 2011
Take A Number, Please!
[This post is a continuation of the previous post.]
In January of 2004, a private investigator I'd hired named Ed Hodges forged my name on a fraudulent trust document that gave him and a lawyer-friend of his complete control of my house and land. (This document was filed by the county clerk's office despite the fact that it was not even properly notarized.) At some time between then and June of that year, the county tax office changed the owner's address on my house and property to that of my ex-husband's business office, as documented in the earlier post here titled "Address Changes".
In February of 2004, as shown here, a woman named Sandy, whom I'd been told was an employee of Ed Hodges, sent me the two completely unsolicited emails shown here. She told me I should consider changing my Internet service to one of the two companies she mentioned if any of their access numbers were not long distance for me because their fees were cheaper than the provider I'd been using.
At the time, I was satisfied with our service, so I ignored these. Later, however, our provider raised our rates considerably, so I went back to these emails to take a closer look. Each of the two servers had only one number that was a local call for us: the same number in nearby Willow City. I chose the cheaper of these options and switched our service over.
The provider I switched to as a result uses the server involved in the Man In The Middle attack on my computer in the previous post. In retrospect, I believe Sandy knew there was only one number in each list that I could use. I feel certain she deliberately sent me to it knowing it would enable the attack on my computer.
These emails provide documentation of serious federal offenses that can and should be added to those documented in the previous post.
Sunday, March 6, 2011
Man In The Middle
Over the last twelve years, my children and I have been the victims of constant and unrelenting attacks on our home computers: severe hacking; poor to non-existent connections; constant sudden disconnects; disappearing or altered files, icons, programs, and more; human voices and bizarre sounds of various types emanating from our fax machine; strange emails such as the one posted earlier on this blog and titled "A Reporter Said"; and much more. I've taken our home computer and my children's student laptops to many different computer repair shops and professionals in several different cities over the years and paid them a great deal of money to receive their assurances that our problems were fixed, only to discover that our computer troubles were actually worse, not better.
Recently, I've finally been able to find a few computer and security experts with honesty and integrity who were kind enough to look into some of our computer woes. Among many other things, I've learned that I am the victim of what's known as a "Man In The Middle" (MITM) attack. As it was explained to me, every time I sent anything from my email account, a mirror copy was also being sent to someone else through a hack on the server. The "someone else" would remove any legitimate replies I might receive and substitute their own bogus replies instead.
Let's look at some different examples of this. I'll start with the headers from an email I received in 2004 from a group of San Antonio lawyers (Ex. 1). An examination of the path this email took shows it came directly to me rather than being routed through the loopback. (This legal group sent me to an attorney with ties to my ex-husband who tried to con me.)
Now let's move on to a different kind of example. The second email posted here (Ex. 2) is one of a great many harassing ones I've received over the years. This email came through the loopback and has ridiculous addresses that were clearly fabricated, even though they look superficially real.
The third example posted here (Ex. 3) is of what appears to be a death threat sent to me by a friend of my father's. This email is odd because it seems to have come from the Earthlink server instead of the Yahoo one, although it came from Yahoo originally.
My final MITM example is actually a double one (Exs. 4 and 5). In March of 2006, I attempted to file a formal written complaint with the U.S. Department of Justice (DOJ) by email as well as by regular mail, since so much of our regular mail was being tampered with or stolen. (I have a stack of tracking receipts for mail that comes up as "No Record" over an inch thick!)
Immediately after I emailed my complaint, I received the two emailed responses shown here as Exs. 4 and 5. The one titled "Re: Serious Complaints" (Ex. 4) is similar in appearance to others I've received as automated replies from the DOJ over the years, and an examination of the headers from it shows it did come from the DOJ's server.
However, the email titled "Out of Office AutoReply: Serious Complaints" (Ex. 5) does not look like anything I've received before from the DOJ. An examination of the headers shows this email came from the loopback. It looks as if my original email was also diverted to an account outside the DOJ, where it generated an automatic reply that came back along the same false route. This means that when I sent my original email to the DOJ, I received two automated replies, one from the DOJ that was authentic, and a second one that was a fake from the path I'd sent my original email on.
These duplicate automated responses show that whoever is behind the MITM attacks on my computer gets immediate copies of everything I send and has software already set up to send an immediate automatic response back to me that looks just like whatever path I sent my email on--but is actually fake. This means that whoever has been attacking my computer has software specifically designed to enable them to impersonate federal agencies and officials.
As you've no doubt guessed by now, these examples document a number of very serious federal offenses. Although these are examples of past crimes, my computer continues to be attacked in this way, making it nearly impossible for me to accurately communicate with people or agencies that are trying to help us. Furthermore, I have documented evidence of additional federal offenses committed against me through my computer that I choose not to post at this time, although I may well post these at a later date.
As a wise friend recently commented, "No wonder so many people think that stalking is a government plot."
Recently, I've finally been able to find a few computer and security experts with honesty and integrity who were kind enough to look into some of our computer woes. Among many other things, I've learned that I am the victim of what's known as a "Man In The Middle" (MITM) attack. As it was explained to me, every time I sent anything from my email account, a mirror copy was also being sent to someone else through a hack on the server. The "someone else" would remove any legitimate replies I might receive and substitute their own bogus replies instead.
Let's look at some different examples of this. I'll start with the headers from an email I received in 2004 from a group of San Antonio lawyers (Ex. 1). An examination of the path this email took shows it came directly to me rather than being routed through the loopback. (This legal group sent me to an attorney with ties to my ex-husband who tried to con me.)
Now let's move on to a different kind of example. The second email posted here (Ex. 2) is one of a great many harassing ones I've received over the years. This email came through the loopback and has ridiculous addresses that were clearly fabricated, even though they look superficially real.
The third example posted here (Ex. 3) is of what appears to be a death threat sent to me by a friend of my father's. This email is odd because it seems to have come from the Earthlink server instead of the Yahoo one, although it came from Yahoo originally.
My final MITM example is actually a double one (Exs. 4 and 5). In March of 2006, I attempted to file a formal written complaint with the U.S. Department of Justice (DOJ) by email as well as by regular mail, since so much of our regular mail was being tampered with or stolen. (I have a stack of tracking receipts for mail that comes up as "No Record" over an inch thick!)
Immediately after I emailed my complaint, I received the two emailed responses shown here as Exs. 4 and 5. The one titled "Re: Serious Complaints" (Ex. 4) is similar in appearance to others I've received as automated replies from the DOJ over the years, and an examination of the headers from it shows it did come from the DOJ's server.
However, the email titled "Out of Office AutoReply: Serious Complaints" (Ex. 5) does not look like anything I've received before from the DOJ. An examination of the headers shows this email came from the loopback. It looks as if my original email was also diverted to an account outside the DOJ, where it generated an automatic reply that came back along the same false route. This means that when I sent my original email to the DOJ, I received two automated replies, one from the DOJ that was authentic, and a second one that was a fake from the path I'd sent my original email on.
These duplicate automated responses show that whoever is behind the MITM attacks on my computer gets immediate copies of everything I send and has software already set up to send an immediate automatic response back to me that looks just like whatever path I sent my email on--but is actually fake. This means that whoever has been attacking my computer has software specifically designed to enable them to impersonate federal agencies and officials.
As you've no doubt guessed by now, these examples document a number of very serious federal offenses. Although these are examples of past crimes, my computer continues to be attacked in this way, making it nearly impossible for me to accurately communicate with people or agencies that are trying to help us. Furthermore, I have documented evidence of additional federal offenses committed against me through my computer that I choose not to post at this time, although I may well post these at a later date.
As a wise friend recently commented, "No wonder so many people think that stalking is a government plot."
Labels:
computers,
death threat,
DOJ,
hacking,
Man In The Middle,
MITM
Tuesday, March 1, 2011
Subscribe to:
Posts (Atom)