How to Know if the Government Is Tracking Your Emails
This could be one of the most important blogs in our 9-plus-year history. It concerns our illustrious legal system—a.k.a. the world’s largest crime syndicate—and the things that it does to everyday people mostly unnoticed. These are things that could severely and negatively impact you or your loved ones. Read on; but fasten your seatbelt first. It’s going to be one helluva bumpy ride.
A few years ago, I decided to look for browser-based email tracking. I was fighting a liar/lawyer at the Department of Injustice, Kristin Tavia Mihelic, who belongs in prison for numerous crimes. Her lies were so prolific, I thought it would be helpful to be able to bag her lying in every single email correspondence. It turns out that Streak email tracking is the tool I chose for this task. We had no business relationship with them then nor do we have now. The email tracking portion is free, installs easily, and works nearly flawlessly. Sara and I recommend it in chapter 7 of Stack the Legal Odds in Your Favor. Certain other plug-ins, such as Shopback and Topcashback, may interfere with its operation, however, so just keep this fact in mind.
The Streak email tracker allows you to track when an email is opened, how many times it is opened, any links formatted as straight text inside it that are clicked, and where it is opened. The latter is accurate from a PC with a physical, local ISP connection, but from a mobile phone connection, the results can display just about any city in the originating country because of the way cell towers use repeaters and whatnot.
False positives are not possible, but false negatives are. This has to do with the software implementation and means that if an email shows as being read, it has definitely been read, but if it shows as not being read, it could still have been read. There are a few reasons for this which are beyond the scope of this post. If links show as being clicked but the email shows zero views, then this is an indication of a false negative. The email has certainly been read.
After the syndicate had committed innumerable crimes against me and stolen over $1,000,000 in money and property from my family and me, I was understandably pissed. I began sending daily complaints to the Federal Bureau of Iniquity and DOI along with hammering the syndicate in several other ways. It began a war with me. I will certainly finish it. I had originally started with filing just one online complaint every few months, but since nobody at these criminal-run organizations lifted a toxic finger to right an enormous injustice, the complaints became more and more frequent—until they reached the current limit of 10 to each of the two criminal-based organizations every day.
So, rather than go after the individuals committing the crimes, the syndicate decided to go after the person reporting the crimes and fighting the criminals responsible for them. This was also a big mistake. When I make calls to the glorified, unelected lawyer-criminals in black gowns, I hear a lot of clicking and static on the line. This is a telltale sign that the call is being monitored. I don’t mind, but it sure is yet another waste of taxpayer dollars. Incidentally, if I were to guess, I’d estimate that well over $3,000,000 of taxpayer money has been wasted to fight me thus far. Money continues to be wasted fighting me. Rather than using only a portion of the tax dollars judiciously to prosecute the criminals who have committed the crimes and have plenty left over, the syndicate would rather use the funds to protect the criminals so they can continue to victimize Americans—the ultimate slap in the face to all of us.
At one point in the past many months, I noticed something quite interesting with an email message to one of the crime syndicate members. I can’t recall which one, but my email had been read nearly instantaneously after sending it. Moreover, it was read not just in one location but in many—worldwide—Boardman, OR; London, England; São Paulo, Brazil; Sydney, Australia; and Frankfurt, Germany. To say the least, it struck me as quite odd. Days, maybe weeks, passed, and I sent another email to another person in government. The same thing happened. Note that these places did not vary. For every federal senator, judge, or public official from that point onward, the email would almost immediately show as being read in most or all of these locations, and links in the email would appear “opened.” I even noticed this when I emailed Jeff Bezos at Amazon.
Figure 1
It took me a bit to understand what was happening, but it is crystal clear now. I first thought, “Why would agents for the syndicate be monitoring my emails from overseas when I am emailing their minions here in the U.S.A.?” Noting the consistency of locations, the speed at which my emails were read, and the geographical distance between the locations where the messages were read makes the answer obvious. Nobody was physically reading any of the emails. What the syndicate is doing is completely automated.
They have server farms at all of these locations. They also have sophisticated software that is automated to open the emails, gather certain data/keywords from them, follow the links in order to gather more incriminating information, and store/red flag any of it in some massive database. Most likely, someone analyzes the output of certain algorithms that crunch this data and produce some calculated threat indicator along with a high-level report. The syndicate likely maintains a list of “terrorists” who are to be monitored. As I’ve said many times, there’s the FBI’s Ten Most Wanted Fugitives.....and then there’s me in a category all by myself.
The syndicate probably also maintains a list of targets—people in government who are to be protected. Added to this list are other high-profile people, Jeff Bezos being one. I can only speculate who is on the target list, but I would surmise all federal government officials, Hollywood stars, CEOs, and possibly certain mainstream media individuals. It appears that certain state government actors are also on this list: one being a criminal named Joseph L. Michaud, who is also a housing court judge in the People's Republic of Massachusetts.
It's no secret that there are data centers at all of the above locations. It's also no secret that the "parent company" of the syndicate, the U.S. government, is in bed with Amazon and other private companies. And it's no longer a secret that Amazon was awarded the NSA's formerly classified "Wild and Stormy" cloud computing contract to support the "agency's mission." While I can't prove a link exists between the contract and the inclusion of Mr. Bezos on the target list, it would be quite coincidental otherwise. However, I've learned that there are no coincidences with the syndicate—there are only planned occurrences.
The reason for the five different locations for data centers worldwide is for data security. If a tsunami hits Australia, the servers are safe in London. If nuclear war breaks out in Germany, the data is safe in Brazil. Keeping data safe is one of the primary tenets of software engineering. This is achieved through redundancy and geographic separation.
The first question, now, is: how could this all possibly happen—the syndicate being able to redirect emails? It happened because someone at the FBI or DOI made a phone call to Google and said, “Hey, we need to monitor this person. Put a packet sniffer on his outgoing emails.” Of course, Google folded over like an old card table. The term “packet sniffer” may not be entirely correct in this instance, but there is some way that the tech giant is working with the syndicate to make sure that my emails are sent to the aforementioned five locations in addition to the intended recipient. My emails are not intercepted. They reach their destination. It’s just that they also reach five other “destinations.”
It is important to point out that redirection may not be just based on the sender's or recipient's email address. It may also be based on the sender's IP address. Latest data from Streak show that it could be and strongly suggest that redirection can also be based on keywords within the email itself such as "governor" or "director." Amazingly, this is something straight out of the movie Enemy of the State, one of my top three favorites of all time not just because of Gene Hackman's stellar performance but because of the storyline. I'm not sure who the technical adviser was in that flick, but that person sure as hell was spot on.
The second and even bigger compound question is: to how many people is the syndicate doing this, and are you one of them? Thirdly, how would you ever know without email tracking? And the final question combination is: what about texting or other forms of electronic communication? Are they also being monitored? Well, the Utah Data Center is alleged to store every electronic transmission worldwide since 2014. I’m sure the output of the five data centers makes it there. I might even have my own personal storage space. Wouldn’t that be quite an honor.....
The crucial takeaway of this post is this: without having the tools to stay three steps ahead of these corrupt circus monkeys, I probably would have crumbled long ago, with my physical presence having been erased from planet Earth. Having Steak, knowing the syndicate’s “game plan,” and using other software applications are precisely what help me stay alive and keep my gigantic lead on them.
While a good portion of readers may not have anything to worry about right now, I highly recommend taking just a few simple steps to protect yourself and your loved ones. The syndicate can strike anyone at any time. Knowing some of the criminal things they do ahead of time is an incredibly huge advantage. Besides Streak, there are other protective tools. One, for example, is my first book, which was mentioned earlier, and another is You Have the Right to Remain Innocent, which is a book by Professor James Duane. These are the only two known books written in the last 100 years that protect people from the syndicate. Both are free on Kindle Unlimited, and both are in libraries nationwide. If you take no action now, you will only have yourself to blame later.
***EDIT 8-1-25: It now appears that the government is attempting to use strictly domestic servers as a front for their data collection. Over the last several days, my emails have been "opened" only in Phoenix, AZ, and San Antonio, TX. To clarify, they are using the IP address from which the message appears to be sent to determine what native host country will process the email at one of its data centers. The syndicate probably got wind of me knowing about what they are doing and had its engineers address this "security risk." What they seem to do now is limit the visible tracking to domestic locations by "reading" emails only in the suspected host country but then have their software system copy and paste message contents into another email—or another format entirely—and then forward it to the other countries for redundant storage. This way, people who use email tracking will be less likely to suspect they are being monitored if their emails are apparently being read in their own country.....unless, of course, they find and read this post.***
Incidentally, Sara and I would like to let readers know that our blog has been selected as one of the Top Ten Best Anti-Corruption Blogs out of well over one thousand. We are honored to have been bestowed this distinction and will continually try to meet the requisite standards by doing our best to fight corruption in the American "justice" system every day.
Comments
If you want to comment as a guest without signing in with social media and without signing up with Disqus:
1 – Enter your comment2 – Click in the Name box and enter the name you want associated with your comment
3 – Click in the Email box and enter your email address
4 – Select "I'd rather post as a guest"
5 – Validate the CAPTCHA and then click the arrow
comments powered by Disqus