Fraud and Financial Manipulation Dossier
Gangstalking and Organized Harassment:
Key Allegations:
- Fraud, financial manipulation, attempted murder, insurance fraud, organized harassment, and child endangerment.
- Legal manipulation and coercion used to control inheritance and financial outcomes.
Legal Violations and Evidence:
- Fraud and Financial Manipulation:
- Evidence: Conservatorship documents repayment provisions that were hidden, mail that was stolen, legal filings related to inheritance control, text messages discussing schemes.
- Details:
- Spouse, Ex, family member's conspired to gain control over the plaintiff's inheritance.
- The sister owns a property that was supposed to be jointly inherited; its value has doubled since the inheritance decision, suggesting potential financial concealment or misallocation.
- Attempted Murder by Poisoning:
- Evidence: Medical records indicating poisoning, text messages from Spouse suggesting intent, testimony from family members regarding suspicious behavior during the incident.
- Involved: Spouse, Spouse’s mother, Ex.
- Digital Harassment and Hacking:
- Evidence: Malware installation logs, digital forensic evidence of device tampering, and false evidence creation.
- Details:
- Brother and Ex actively engaged in hacking the plaintiff’s devices to fabricate evidence and create legal vulnerability.
- Gangstalking and Organized Harassment:
- Evidence: Surveillance records, documented harassment incidents, witness testimonies confirming stalking and coordinated intimidation.
- Details:
- Family network conspired to engage in organized harassment, targeting the plaintiff to provoke mental distress, discredit character, and further financial manipulation.
- Family members' involvement was not limited to harassment but extended to physical surveillance and digital tracking.
- Insurance Fraud:
- Evidence: Multiple life insurance policies taken out by Family Members. Financial records indicate refinancing and significant funds invested in death magic and hitmen.
- Details:
- All defendants are identified as Life Insurance Investors, having taken out policies on the plaintiff's life.
- The mother in law and ex coordinated to hire hitmen and fund spiritual manipulation with the intent to collect insurance payouts.
- Failure to Make Court-Ordered Payment Plan:
- Evidence: Court documents confirming judge’s ruling, financial records showing no initiation of repayment plans.
- Details:
- None of the defendants have complied with the court-ordered payment plan for the stolen inheritance and related financial obligations. The lack of compliance highlights their continued intent to evade restitution.
- Bribery and Child Endangerment:
- Evidence: Financial transactions or other evidence of bribery, potential witness testimony from children or guardians.
- Details:
- Spouse bribed the daughters to fabricate evidence or maintain silence, while the mother-in-law is suspected of either abusing the children or facilitating their abuse to maintain control.
- These actions suggest deeper criminal behavior beyond financial manipulation, impacting the children’s well-being.
Proposed Legal Actions:
- Criminal Charges:
- Attempted murder, fraud, digital harassment, insurance fraud, conspiracy, child endangerment, and failure to comply with court orders.
- Federal Investigation Requests:
- Access to group chat records and backup phone data to uncover detailed planning of fraudulent schemes, bribery, and child endangerment.
- Civil Claims:
- Compensation for financial loss, emotional distress, and damages related to fraud, harassment, and child endangerment.
- Protective Orders:
- Restraining orders against all defendants to prevent further harassment, financial fraud, or contact with the plaintiff and children.
Key Considerations:
- Uncles' Involvement: As life insurance investors, the uncles' participation in hiring hitmen and death magic indicates deliberate financial motives.
- Property Discrepancy: The sister’s property ownership, meant to be shared in the inheritance, suggests fraudulent misappropriation of family assets, doubling its value without benefit to the plaintiff.
- Cutting Off the EX: Severing ties with the Ex disrupted the defendants’ financial schemes, creating desperation and intensifying their criminal actions.
- Continued Non-Compliance: Defendants’ refusal to initiate repayment as ordered by the court reflects their intent to evade legal consequences and maintain control over the stolen assets.
Conclusion:
This legal dossier outlines provable crimes, focusing on fraud, attempted murder, digital harassment, child endangerment, and non-compliance with court orders. Federal investigation is required to access group chats and phone records, revealing conspiracy details and confirming coordination among the defendants. Addressing these criminal activities ensures the plaintiff’s safety, restores financial stability, and holds the defendants accountable for their actions.
. Text Messages and Communication Logs:
- Details: Screenshots or downloads of text messages, chats, or emails that suggest conspiracy, bribery, or intent to cause harm (e.g., discussions about inheritance manipulation, insurance fraud, or attempts to influence the children).
- Sources: Plaintiff’s phone, backup cloud storage, or direct subpoena of defendants' communication records from service providers.
- Relevance: Direct communication evidence shows intent, planning, and collaboration among defendants.
2. Medical Records for Poisoning:
- Details: Medical reports, lab tests, or hospital records that confirm poisoning attempts and the plaintiff's related symptoms.
- Sources: Medical facilities that treated the plaintiff during the suspected poisoning incidents.
- Relevance: Confirms physical harm that aligns with attempted murder or endangerment.
3. Court Documents and Financial Records:
- Details: Copies of the conservatorship ruling, inheritance documents, and financial statements indicating the plaintiff’s rightful inheritance and defendants' refusal to initiate the repayment plan ordered by the judge.
- Sources: Court records, bank statements, and the plaintiff’s financial history.
- Relevance: Clearly shows financial fraud, theft, and non-compliance with court orders.
4. Life Insurance Policies:
- Details: Copies of the life insurance policies taken out by the defendants on the plaintiff’s life, including those by the uncles and other family members.
- Sources: Insurance companies where policies were issued.
- Relevance: Demonstrates financial motive, conspiracy, and potential premeditation of harm.
5. Digital Forensics for Hacking:
- Details: Evidence of malware installation, unauthorized remote access logs, or manipulated digital files (e.g., fabricated evidence on devices).
- Sources: Forensic analysis of the plaintiff’s electronic devices by cybersecurity experts.
- Relevance: Proves digital harassment and manipulation, supporting charges related to digital crimes.
6. Witness Testimonies:
- Details: Testimonies from children, family members, or friends who can confirm bribery attempts, child endangerment, or suspicious behavior by defendants.
- Sources: Depositions or affidavits from witnesses, including potential testimony from individuals aware of defendants' illegal activities.
- Relevance: Provides firsthand accounts to corroborate claims of conspiracy, bribery, and endangerment.
7. Property Ownership Documents:
- Details: Documents proving the sister’s sole ownership of the property meant to be jointly inherited and its current valuation.
- Sources: Real estate records and title documents.
- Relevance: Establishes misappropriation of family assets, supporting financial fraud claims.
8. Bank Transactions and Financial Trail:
- Details: Bank statements showing unusual transactions, fund movements related to bribery, hitmen payments, or financing spiritual manipulations (e.g., hiring shamans).
- Sources: Bank subpoenas for defendants' accounts or forensic accounting of plaintiff’s financial history.
- Relevance: Identifies clear financial motives and illegal funding efforts by defendants.
9. Witness Statements of Threats or Coercion:
- Details: Statements from individuals who witnessed threats, coercion, or suspicious actions directed toward the plaintiff.
- Sources: Neighbors, family members, or other witnesses willing to testify.
- Relevance: Confirms patterns of intimidation, harassment, and potential conspiracy.
10. Social Media Posts or Digital Evidence:
- Details: Public posts, messages, or interactions that indicate stalking, smear campaigns, or attempts to manipulate the plaintiff’s reputation.
- Sources: Plaintiff’s and defendants' social media accounts.
- Relevance: Documents organized efforts to discredit or harm the plaintiff.
Summary of Minimum Evidence Needed:
- Text messages and communication logs
- Medical records for poisoning
- Court documents and financial records
- Life insurance policy records
- Digital forensic evidence
- Witness testimonies
- Property ownership documents
- Bank transactions and financial trails
- Social media posts or digital evidence
Contact a Family Law Attorney in Missouri:
- Why: An experienced local attorney can advise you on legal procedures for child protection, custody modifications, or emergency protective orders.
- How: Research family law attorneys who specialize in domestic abuse, fraud, and complex custody issues. Schedule consultations with at least 2-3 to assess compatibility, strategy, and costs.
- Ask about: Filing temporary restraining orders, requesting emergency custody modifications, and securing evidence preservation orders.
2. File for Temporary Custody Modification or Protection Orders:
- Why: Immediate protective orders can help ensure the safety of you and your children while the case develops.
- How: With your attorney’s guidance, file for temporary custody or protective orders at your local courthouse, citing risks of endangerment, emotional manipulation, or abuse.
- Evidence: Provide existing documentation of abuse or threats, police reports, medical records, and any available digital communications that support your claims.
3. Preserve Digital and Physical Evidence:
- Digital Evidence:
- Retrieve and save all communication records, including texts, emails, social media messages, and call logs.
- Use third-party services or experts to verify the authenticity of spoofed messages and to secure metadata (dates, times, IP addresses).
- Physical Evidence:
- Safeguard any physical documentation like legal notices, medical records, financial records, or photographs of any injuries.
- Keep copies in a secure digital format (cloud storage or external hard drive) and a separate physical location.
4. Secure Financial Assets and Address Financial Manipulation:
- Open a New Bank Account:
- Consider opening an account at a new bank or credit union to prevent any further tampering with your finances.
- Notify Financial Institutions:
- Contact your banks and credit card companies to alert them about potential fraud or unauthorized transactions.
- Request fraud alerts on your credit report and review it for any suspicious activities.
5. Contact Law Enforcement and Child Protective Services:
- Law Enforcement:
- File a police report detailing any recent threats, harassment, or potential child endangerment.
- Request an incident number to use in legal filings and further documentation.
- Child Protective Services (CPS):
- Report potential endangerment, manipulation, or abuse involving your children to CPS. Be prepared to provide details of what’s been observed, including signs of emotional or physical harm.
6. Seek Child Therapy and Documentation:
- Therapist for Children:
- Find a child psychologist or therapist experienced in trauma, who can help your children process their experiences and document potential signs of manipulation or abuse.
- Document Behavior Changes:
- Keep records of any behavioral changes, nightmares, unexplained injuries, or signs of distress in your children that could support your claims.
7. Ensure Personal Safety and Address Potential Stalking or Surveillance:
- Personal Safety:
- Change your daily routines, use secure transportation methods, and consider installing security systems at your home.
- Surveillance Checks:
- Conduct a sweep for potential surveillance devices at your residence and vehicle.
- Relocate Temporarily:
- If safety concerns escalate, consider temporarily relocating to a domestic violence shelter or secure facility to protect yourself and your children while legal action progresses.
8. Continue to Gather and Secure Evidence:
- Digital Backups: Store digital evidence on secure cloud storage or encrypted drives.
- Witness Statements: Gather written statements from third parties who have witnessed abuse, financial manipulation, or fraudulent behavior.
- Review and Organize Evidence: Work with your attorney to organize evidence effectively for both family court and any potential criminal investigations.
9. Consult a Financial Advisor or Forensic Accountant:
- If financial manipulation is significant, a forensic accountant can help trace unauthorized transactions, asset transfers, and potential hidden funds.
- This will support any financial claims or fraud accusations in court.
10. Consider a Relocation or Change in Living Situation:
- Given that your mother may be connected to some of the group chats or other activities, explore temporary or permanent relocation options to avoid potential conflicts or risks.
- Discuss this with your attorney, as moving out of state could affect custody and legal proceedings.
11. Engage a Digital Forensics Expert:
- If possible, hire a forensics expert to recover and authenticate texts, emails, and other digital communications that might be crucial to your case.
- This is especially important if evidence involves spoofed messages, falsified communications, or digital stalking.
Taking these steps promptly will help secure your legal position, protect your children, and strengthen your case for custody, safety, and financial security.
Comments ()