Lawyers who are trusted and tried to uphold the law, respect the Constitution, and ensure due process and civil liberty, are frequently stymied when they realize the extent to which the prosecution, police, and other institutions are involved is involved in organized gang stalking, and it’s related complaints.
Many of the federal governments cases today are the results of online and offline “organized gang stalking” tactics, methods, and techniques ranging from what you have read in the claims of TI’s to other constitutionally cringe-worthy and equally horrifying prosecutorial misconduct. And because most of those targeted this way are low-status, low income individuals, we see that justice in any sense is a mere mockery of the law.
As the seasoned defense counsel is well aware, most prosecutors are institutional psychopaths, and judges and those who testily before them all fit into the categories of blackmailed asset’s, cultists, political watch fobs, and more that I have outlined herein.
So, here below is a guide written by the Electronic Frontier Foundation, the American Civil Liberties Association, and the National Association of Criminal Defense Lawyers to help the criminal defense lawyer, or the civil litigator to understand the stunning and predatory depth and breadth of the governments hidden and malicious conduct, and to help you become a better trier of facts:
A Guide to Malware Deployed on Targeted Individuals and common suspects alike.
The new 48-page guide—authored by the Electronic Frontier Foundation, the American Civil Liberties Union, and the National Association of Criminal Defense Lawyers—seeks to:
…educate defense attorneys about these highly intrusive surveillance techniques and to help them prepare a zealous defense on behalf of their clients against secretive and potentially unlawful hacking. Such hacking has never been discussed by Congress, and we in no way endorse government hacking. However, given that the federal government is deploying malware and a recent amendment to Rule 41 only makes such deployment easier, it is our goal to ensure that all uses of malware are subject to meaningful Fourth Amendment analysis so that malware is installed only when supported by individualized suspicion. Our Fourth Amendment right to be free from unreasonable searches applies regardless of whether new technology is involved in effectuating a particular search; however, the law may be slow to catch up, particularly when the government goes to great lengths to hide details about its use of new surveillance techniques.
Then, you can take a look within this blog to understand the issue of OGS deeper, and to litigate for your clients in a more informed manner. I have a “How to Fight Back” section, and a “How to Defend Yourself” section as well.
Related Reading: How the CIA’s tools went wild, and allowed criminals to do what the NSA/CIA/FBI/DEA are doing ANYWAYS, ALL THE TIME.