Any of the persons I believe to be Confidential Informants who were directed to intrude into my life would have legitimate fears of all of the following situations. Confidential informants are treated as disposable human beings. I believe that they have taken weak people with little self respect and inserted them into my life. When those people see that what they are doing to me is wrong – at so many levels – they become even more fearful. They see that I am a good person suffering through tremendous injustice. They see that the victim of injustice will only be further victimized by injustices.


These examples from the New Jersey /ACLU Report explain the varied situations.

Manufacturing and Overlooking Criminal Conduct — Some law enforcement officers overlook the criminal conduct of CIs under their supervision. In addition, police officers have allowed CIs to participate in crime with other civilians and then arrested only the non-informant. In cases where a CI is encouraged to induce a civilian to engage in criminal activity, those actions might validly be subject to claims of entrapment.

Financial Abuse — Interviews revealed that some police agents use personal money or money confiscated from criminal suspects to fund CIs despite written policies prohibiting these practices. Engaging in such practices allows individual officers to recruit and deploy CIs without their departments’ knowledge and outside the appropriate oversight — behavior that is also expressly prohibited by existing written policies.

Physical and Verbal Abuse — We learned from the community interviews that law enforcement officers sometimes assault or threaten civilians in order to coerce them or their friends and relatives to serve as CIs. Based on information provided by community members, who admitted to acting as CIs, “cooperation” achieved through such means has led individuals to fabricate information. This practice, while seemingly rare, is criminal. Reports of verbal abuse were more prevalent than reports of physical abuse. The reported verbal abuse included derogatory name calling and threats of civil action (such as child removal) if civilians refused to act as informants.

“Burning” the CI — Police officials fail to sufficiently safeguard information about the identities and locations of CIs or about their relationships with the police, thereby exposing civilians to risk of harm. At times, CIs perceive the “burning” as intentional punishment for failing to cooperate as expected; other times it appears to be inadvertent — police or prosecutors carelessly make verbal statements or gestures in the presence of others (outside the police-informant relationship) from which an inference can be made that the civilian is “working for” the police.

Use of Unreliable Informants — Police survey responses and community interviews indicate that police sometimes take CIs at their word without first carefully and independently corroborating the veracity of their statements before attempting to make an arrest. Incentives offered to CIs, including leniency in their own criminal cases, increase the risk that CIs will provide unreliable information. The prevalent and repeated use of drug-addicted civilians as CIs increases the risk that the information they provide may be unreliable.

Misuse of Juvenile Informants — There is currently no absolute ban on using children as CIs. Current state, county, and municipal policies include age restrictions and requirements such as parental or prosecutorial consent prior to using juveniles as CIs, but the policies are not uniform across the three levels of government. This means police may use underage persons as CIs, in some cases without consulting the juvenile’s attorney or legal representatives. Juvenile CIs by virtue of their age are even more vulnerable than the general population, when dealing with law enforcement and the criminal justice system.

“Legal” Coercion — Police “squeeze” criminal defendants by threatening them with additional charges or counts related to their own cases if they do not “cooperate” by becoming CIs.

Using Big Fish to Catch Little Fish — Police or prosecutors occasionally give upper-level drug dealers, traffickers, and manufacturers more lenient treatment because they can “give up” numerous less-serious offenders in the ranks below them. This means that the more culpable leaders of drug networks — the “kingpins” — may get less severe punishment than underlings who play a lesser role in the drug trafficking operation.

Although procedural changes were made in 2004 to limit such situations in New Jersey, some public defenders interviewed during this study reported that this situation still occurs, though less frequently.

Failure to Protect the Safety of Lower-Level Informants — The practice of allowing, encouraging, or coercing low-level offenders to actively participate in the investigation and apprehension of more serious or higher-level offenders exposes low-level offenders, their families, and their friends to the risk of serious physical harm if their identities become known. As reported in the public defender interviews, mere motor vehicle traffic violators were used in some cases to infiltrate criminal enterprises run by interstate drug traffickers.

Failure to Put Agreements in Writing — State guidelines require that cooperation agreements between the state and a defendant facing sentencing for a drug crime be in writing, pursuant to the Attorney General mandates that bind county prosecutors (the “Brimage Guidelines”) (See Appendix B).23 There is substantial evidence that, with the exception of a few counties, this requirement is often not followed. In addition, the Brimage requirements do not apply in a variety of other contexts where the state seeks and obtains cooperation from witnesses. There is little evidence that written agreements are used in these other contexts, and it appears that New Jersey law enforcement officials consistently fail to comply with the dictates of Brimage when written cooperation agreements are required. In all contexts where CIs are used, the absence of a written agreement pits a CI’s word against that of a law enforcement agency, leading to disputes about what promises were made in return for cooperation, as well as the nature and duration of the expected cooperation.

Circumventing Search Warrant Requirements — In urban areas, according to community respondents, CIs are sometimes used in place of search warrants to gain access to dwellings that the police believe contain evidence of drug sales. Rather than apply for a search warrant, the police send an informant to make a purchase at a residence they suspect of drug involvement. When an occupant opens the door to conduct a hand-to-hand transaction, the police push their way into the residence and conduct a search of the entire premises, not just the area within the arrestee’s immediate reach.

Anonymous Accusers — Several of the public defenders interviewed stated that they sometimes questioned the veracity of a CI’s claim against a client or even whether a CI actually was involved in a particular investigation. Under the general legal rule, applicable in both federal and state courts, CIs with information that relates directly to a defendant’s guilt or innocence cannot remain anonymous and may be called to testify.25 In practice, the public defenders and private attorneys reported that they rarely succeed in compelling the disclosure of an alleged CI’s identity.26 In the rare case, where such a motion is successful, prosecutors elect to dismiss charges rather than reveal information about the informant.

Street-Level Recruitment — When police officers are allowed to recruit a CI on the street in lieu of arresting him or her, it increases their use of CIs and precludes the oversight mandated by written policies. The unregulated recruitment of individuals on the street and their participation in the act of informing undermine community cohesion and faith in fair law enforcement.



Turns out the number is someone I know who hasn’t had any involvement with the site in 15 years. Tim Goodwin was asked by Nelly Neben to gain control of the site.

I was in contact with Nelly Neben repeatedly during the events in January, February and March, and I kept Nelly Neben informed with my pursuit of the caller’s identity. WHY DIDN”T NELLY NEBEN TELL ME SHE PUT THE PERSON UP TO IT? WHY IS SHE HIDING HER ACTIONS? WHY WOULD SHE PUT ME THROUGH THE ANXIETY OF NOT KNOWING?

Considering that this event lead to the discovery of the criminal actions of the Contra Costa Drug Task Force and the Private Investigator – a story which offers many parallels to my situation. Have I once again learned more from their mistakes?

Text Message Update to Friends: I just spoke to Tim Goodwin. NELLY HAD PUT HIM UP TO THE CALL IN JANUARY. Why wouldn’t she tell me that? Why would she rather I kill myself rather than admit her actions? Tim & I are cool. He had no idea what was behind Nelly’s actions… or why she was keeping her attempt to gain control of the site from me. Why not just ask me? talk to me? explain to me? it’s the least I deserve after all I have done for her.”

Why would Nelly Neben not tell me what she was doing when she was aware of the stress her actions were causing?
   –  Fear of becoming further involved in the technology used to hack my life.
   –  An ongoing investigation where she was not permitted to speak with me.
   – National Security Letters  ( Real or Faked? )

As I have been told by the FBI and County Detectives (in refusing to investigate any of my reported technology intrusions) that I am not under any investigation and have not been under any investigation as far back as July 2007… Then any National Security Letter about me would be a fake.

As a National Security Letter forbids the recipient from discussing it in any form with anyone, including their attorney, their spouse,m their family under threat of incarceration. It makes for a great document for someone to hide behind when trying to undermine any support or help I might be getting.

Who knows enough about National Security Letters to abuse them? The FBI would definitely know… As would retired FBI agents.

After I first met Ron Trombino, he used one of my computers to get on the web. After he left, I checked the history and searched a few key terms. Terms not relevant to law enforcement or anything. Surprising thing was Google returned an entry for RETIRED FBI AGENTS. Peculiar???

RETIRED FBI AGENTS was a private investigation company based in Doylestown, PA. The same town where Ronnie rented an apartment and worked for SEPCADD (SouthEastern Pennsylvania Council on Alcoholism and Drug Dependance).

RETIRED FBI AGENTS is now known as Foresight Investigations, on Duane Rd in Doylestown. Their address is a post office box on the edge of a property at the corner of 611 and Duane Road. No building. No office. Just a mailbox.

Foresight Investigations is a popular name with private investigators. That business name shows up in the same cities as the people who infiltrated my life. They either came from the city, or moved to the city when they left. There were so many of them I noticed the pattern of key cities.

Ronnie went to Minneapolis. He left everything in his apartment when he left. He just left. He told me he was going on vacation for a few days. He didn’t tell his boss he was leaving/quitting. And SEPCADD seems to have closed at the same time. Coincidence?

Ron’s disappearance occurred within days of my telling someone on the phone we had a fight that escalated and things were broken. I made the story up. Not out of anger, or malice. Moreso for curiosity. Hoping to prove myself wrong.

How could it be possible that me telling a false story to someone on the telephone would have this repercussion? I did this only 2 more times. Each time a few months apart. Each resulted in the disappearance of the person without explanation.

Ron didn’t want to go on vacation. He delayed leaving for days… delaying just a day at a time without explanation while lurking at my house and not going back to his own place. Discussion of my false story and phone call would reveal he knew about the tech intrusion into my life. I noticed his frustration, and realized he didn’t really want this vacation. After a few days, he woke me at 4AM. I took him to the airport, and he was gone. It wasn’t a vacation.

I tried very hard to trust Ron. I considered him a close friend, yet there was always something he wasn’t telling me. He didn’t like to see me when I was down. He learned early on that when I became silent, the emotions were welling up inside me. He always left when that happened. He didn’t ask for a ride home, or wait for one. There was always someone he knew in the area to come pick him up and get him with only a few minutes notice. He didn’t like to see the emotional devastation that the ‘divorce’ was having on me.


They stole everything… my family, my career, my friends, my health, my security, my spirit, and every joy and passion in my life.

4 years of hell and they continue to attack… they aren’t done yet.

There is no recovery. There is no survival.

NO ONE F**KING HELPED ME. No one cared.

Colin, Brennan,
Since you can’t communicate with me without getting caught, I am writing my message here.

You have permitted my destruction. You made that choice, you can live with that.
Forgive yourselves when you realize what you’ve done.
I gave you everything I could in life. I was there for you whenever you needed me.

I’m ashamed that you would allow this to happen to me. Why?
(and if that gives you the anger you need to continue your life, so be it.)
Be careful though, because they will be coming for you when I am gone.
Their secret injustice won’t die with me.

I never did anything to hurt you. Never would.
Good Luck in life,


Something I didn’t install on my computer. Appeared wiithout Publisher information. And provides remote printing capabilities… like printing to a PDf file for small file size and easy transmission. …and it works for Windows Terminal Server …with transparent printing, so it goes unnoticed. Part of the Stealth Surveillance package. Ya think?

I’ve been unable to disable Terminal Services for years. It permits stealth remote access to the VM programs.

No wonder the computer can’t process anything quickly. It’s too busy taking and sending printouts of my screens and messages to whomever it is that wants me dead, but wants me to do it for them.

Now could that be why I am getting all those Adobe PDF Reader Updates also? Or is Adobe now providing twice daily updates to their programs and getting so lazy with their installs that the buttons are downright chatty in context.

REDMONTransparent PostScript printing from Windows 95/98 and NT (3.51, 4, 2000 and XP) and soon Windows Vista and Windows 7.

The RedMon port monitor redirects a special printer port to a program. RedMon is commonly used with Ghostscript and a non-PostScript printer to emulate a PostScript printer.

RedMon can be used with any program that accepts data on standard input.

Using RedMon you create a redirected printer port. If you connect a Windows printer driver to the redirected printer port, all data sent to the redirected port will be forwarded by RedMon to the standard input of a program. The output of this program can be sent to different printer port, or the program can generate whatever output it desires.

%d bloggers like this: