Using Wireshark and other electronic tools to catch gang stalkers: the “lawful intercept protocol” and electronic discovery as the “old switcharoo,” and Catch Me If You Can policing

I have many sections where targeted individuals can find help. Most are titled “help for targeted individuals,” or “Free tools,” “how to prove gang stalking,” “how to file a lawsuit” etc. I will list a few of those posts at the bottom of this article.

Wireshark is an AMAZING TOOL which you can use to monitor the people who are monitoring you. It is what is called a “deep packet inspector” and it can pick up anything from your neighbor using your WiFi, to the FVEYs/Feds wiretapping you, to a Sting Ray or Hailstorm device stealing your cell phone signal and routing it through a Harris or other spook shop device–which can then also be exploited ( contact me and ask me how!)

And, of the millions of data points that can help you prove you are being gang stalked,Wireshark’s deep packet sniffing can narrow down malicious bad actors, like the widespread unlawful, and unconstitutional surveillance by these exact Law Enforcement Agencies’s that claim they are doing “lawful” things. Yup–law? Yeah, check. Lots and lots of “laws” that inhibit citizens, and zero laws which protect them from their own governments spying

Ful of something?–you bet; full of unlawful spying, as documented in every newspaper, anywhere for the last two decades. And full of lies about that spying too.

THERE IS ALMOST NOTHING “LEGAL” ABOUT LAWFUL INTERCEPTS in the broad construction of the phrase, without police having a warrant–which they seldom if ever do when spying from Fusion Centers. This is why this one protocol is extremely important for targets to understand–it is “proof you are targeted. Note that exact language in the slide below:

Image:eDecision4you

SO the lawful intercept protocol can be used AGAINST those who deploy it on you, to produce actual court room worthy evidence of unlawful spying by the NSA, which collects ALL DATA of ALL AMERICANS; and other agencies, local law enfarcement agents, and FVEYs spook shops that are doing the same. The US Government even turned that data over to the ethno-ationalist state of Israel, completely unfiltered! –allowing a theocratic, race-based foreign government to spy on, cyberstalk, and offline in real time stalk American’s.

Wireshark can “prove” that you are being targeted, and that your phone, computer, or other device is wiretapped BY the authorities–or OTHERS who are known stalkers, such as Infragard agents, or any of the many FVEYs’ spook shops that mercilessly target and harass western citizens as if they are terrorists–because at its heart the western narrative is a religious jihad, targeting the “unfaithful” who they then persecute–with actual “electronic harassment” in the form of wiretaps, etc.

Don’t freak out if you discover that your devices are indeed wiretapped, because since 2003 or so, the US government has been monitoring the communications of all American’s, and entrapping the data in a huge data warehouse deep in the desert of Mormon held territory of Utah. At one point, the US government gave all of that data to an ethno-nationalist apartheid state, and allowed them to target the data, and target Americans too.

And, of its thousands of data points that can help you prove you are being gang stalked, the lawful intercept protocol can be used to produce that your phone, computer, or other device is wiretapped BY the authorities–or OTHERS who are known stalkers, such as Infragard agents, or any of the many FVEYs’ spook shops that mercilessly target and harass western citizens as if they are terrorists–because at its heart the western narrative is a religious jihad, targeting the “unfaithful” –and they even turned that data over to the racist, ethno-nationalist state of Israel completely unfiltered! allowing radical zionists to then spy on people they later targeted, and persecuted with actual “electronic harassment” in the form of wiretaps, etc.; and gang stalking too.

This is extremely common knowledge now, but it wasn’t when I was using Wireshark to document these facts that are now aiding in winning Pulitzer Prizes; and long before other journalists began collecting that evidence in other forms, such as Freedom of Information Act Requests, and other documentary evidence.

Lets look at this protocol, and see how it can be used to direct an investigation back at the people who targeted you, your client, or others who need such information. Let’s look at Cisco (who have themselves been targets of intel hacking) first for a description:

Lawful intercept is a process that enables a Law Enforcement Agency (LEA) to perform electronic surveillance on an individual (a target) as authorized by a judicial or administrative order. To facilitate the lawful intercept process, certain legislation and regulations require service providers (SPs) and Internet service providers (ISPs) to implement their networks to explicitly support authorized electronic surveillance.

The surveillance is performed through the use of wiretaps on traditional telecommunications and Internet services in voice, data, and multiservice networks. The LEA delivers a request for a wiretap to the target’s service provider, who is responsible for intercepting data communication to and from the individual. The service provider uses the target’s IP address to determine which of its edge Catalyst 6500 series switchs [sic] handles the target’s traffic (data communication). The service provider then intercepts the target’s traffic as it passes through the Catalyst 6500 series switch, and sends a copy of the intercepted traffic to the LEA without the target’s knowledge.

The Lawful Intercept feature supports the Communications Assistance for Law Enforcement Act (CALEA), which describes how service providers in the United States must support lawful intercept. Currently, lawful intercept is defined by the following standards:

Telephone Industry Association (TIA) specification J-STD-025

Packet Cable Electronic Surveillance Specification (PKT-SP-ESP-101-991229)

SO, to put a positive note on that devious Law Enforcement Agency practice, which is widely and abominably abused by police for political purposes in a grand “Catch Me If You Can*” form of policing, we can note that every lawful intercept goes somewhere–that the data will be available for a later subpoena. But more importantly for targets, it confirms the facts of being monitored.

Then, there is the issue of “electronic implants, ” which is how spooks and hackers describe malware implanted into computer chips in cell phones and computers, and other electronic devices.

Read this story “American’s and Greeks Started 2004 Wiretaps Together,” about how the NSA, CIA and the Greek government used the 2004 Olympics as the a launching point for the lawful intercept to take on larger, more ominous proportions, the effects of which we can see, and measure today.

More on the Lawful Intercept protocol here

*Catch Me If You Can is a a movie about a misguided forger, Frank Abignale Jr., pursued by the FBI for many years. But it is also a criminals mantra; or that of agency types who respect nor uphold any laws

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s