Total Pageviews

Wednesday, August 17, 2011

Theft Report

To simplify and summarize the first 137 essays, it was the theft of personal property that resulted in the late Michael E. Bartley acquiring two fraudulent IDs courtesy of the California DMV which at the time had plenty of data and photos to prevent it had they chosen to do so. Many other thefts occurred both before and after the issuance of those IDs, all of which would have to be construed as evidence of the various scams that progressed from that point. On May 4, 2007 I was relieved of two IDs, one a California driver's license that was current and valid between 2000-04 by Orange County Sheriff Deputy Johnston. Two days later, I became aware that Kevin M. Cimarusti had stolen the rest of my property from my mother's residence, that which remained from those things that he had stolen previously, which included just about every item that I'd acquired since childhood. Authorities with jurisdiction took no action, and in fact chose not to acknowledge the report of those thefts. When I attempted to report the thefts, I was detained, which resulted in the theft and corruption of my remaining belongings.

Not long after that, ex-Marine David S. Mack, stole personal property and replaced documents and storage media with corrupted versions of those that were stolen. After that, County of Los Angeles officials provided themselves with access to my belongings which resulted in the theft of property. After that San Diego law enforcement officials stopped me on one occasion which resulted in more missing items after the stop. After that, an ex-Navy couple ransacked my belongings which resulted in theft and destruction of many items that would constitute evidence of previous criminality on the part of military personnel.

After that, L.A. County law enforcement officials ordered me away from my property and to face a wall while they "searched" my belongings. I cannot be certain what may have been taken or replaced, but storage media, specifically some CDs appeared to be switched. The same law enforcement officials have stopped me on other occasions, the most recent being May 3, 2011, when I was restrained and relieved of my possessions, which of course resulted in the theft of property. On two occasions, thefts of documentation and personal property occurred at the State of California EDD offices, and on another occasion officials ordered me to establish an online account against my wishes. Other thefts have occurred at facilities funded by agencies that apparently perceive civil or criminal liability, and still others occurred by personnel who appeared to affiliated with the military or law enforcement.

And along the way, many complaints have been made by America's Heroes and Public Servants, some of them bizarre in their speciousness, but all of them appear to be connected to falsified reports by law enforcement officials or other complaints made by America's Heroes and Public Servants previously. No formal charges have ever been made against me (that weren't dropped or dismissed), nor were the alleged "arrests" described by "Book-em Dan-O" Lasher known to me, which precluded any opportunity to dispute their validity, however on the many occasions when Accusing Fingers have conspicuously arrived to make an allegation, either property was removed or some sort of report was made that did not include my input or rebuttal.

In other words, no person that has made a complaint has ever done so in a manner that would allow me to dispute it either in person or in a judicial environment. The rest of the time, the complaint has been about my "attitude" or some other form of baseless, contrived, but transparently purposeful allegation., the report itself the only indication that any such occurrence took place, the complainants managing to maintain anonymity for the purpose of concealing their affiliations. However, it has become obvious over the last several years, based on the activities of law enforcement personnel and proxies, that the reports of the thefts described above will not be officially acknowledged. In fact, it would appear that law enforcement officials have decided that they will relieve me of my remaining possessions using the same devices and tactics, the vast majority of which include documentation that supports these essays, insuring that the destitution caused by the criminal misconduct of other law enforcement officials does not become known to the judiciary or the general population.

It has also been rather obvious that every element, every component of the various law enforcement storylines, as well as every theft that constituted destruction of evidence or obstruction was perpetrated by a very narrow segment of the population, approximately 10% which include ex-military personnel, law enforcement officials and their immediate relatives. How the other 90% was somehow excluded from a sequence of events that spans more than twenty years, I find to be revealing, not particularly surprising once one understands the motives and the affiliations of those involved. 

From this point, and for those who have not read the previous essays, we can proceed with the technical aspects of all of this, the motives of the characters, the money trail back to the perpetrators, the contrivances, misrepresentations and falsifications by law enforcement personnel, and the implications of these things as they pertain to the Constitution and contemporary society. And for those that have read the previous essays, a new CLEO scam has surfaced that I will refer to as the Abandoned Cell Phone Scam in the future (although the title probably serves as an adequate description). More proof that a CLEO scam is always in progress regardless of my location or my activity.

© 2011 humble journalist

The first essay on these subjects was titled "Questioning the Internet" which can be found at http://hubpages.com/hub/humblejournalist. Since then, content was redirected to a malicious URL, the bogus content attributed to me for obvious reasons (false attribution). On many occasions since, I have noted that text was altered or removed, (note the swath that was cut from Essay 97 at http://hubpages.com/hub/essay97). All of the examples of illegal access and tampering appear to share a common purpose, a motive, for the particular alteration, deletion or redirect. All of them hostile and malicious without question. So I will continue, making the best attempt to maintain integrity and accuracy, but also knowing that for the reasons described in "Questioning the Internet" that this is, for all practical purposes, an impossible task, and apparently law enforcement shares that view:

http://www.guardian.co.uk/technology/2011/jul/26/us-cyber-security-chief-quits

No comments: