CT WHISTLEBLOWER RETALIATION IS REAL! THE JUDGE’S CLIENT TOOK MY HOME—NO HEARING. NO JUSTICE.

6 months ago
16

🎥 This Rumble channel documents my 15-year experiences and journey through the Connecticut Judicial Branch and Probate Court system.
It all began when I was named a beneficiary in my grandmother’s will — and en-trusted with managing the family’s finances.
What followed was a relentless, coordinated attack on me and my entire family, driven by systemic corruption within Connecticut’s courts.
A gang of legal locusts descended through the Probate Court, and it hasn’t stopped for over 15 years.
This channel reveals just a small portion of what I’ve witnessed and experienced — the retaliation, the manipulation, the trauma — all because I tried to protect my family and uphold the truth.
🚨 First the Farm Stand and now they’ve unlawfully seized and stolen the family homestead. 🏡💔
Connecticut corruption has escalated and it’s now infecting local federal courts and beyond.
TikTok is already restricting my content. Watch it before it’s taken down:
🔗 https://www.tiktok.com/@bigchiefct
🚨 I'm moving all TikTok content to Rumble and X because Rumble allows the real story without censorship.
🗣️ Freedom of speech is protected on Rumble — not on TikTok.

👇 What they don’t want you to see:

Connecticut Family Court. Probate Court. Foreclosure Court.
All weaponized to exploit people of Connecticut and the disabled, erase records, and seize land with fraudulent rulings. ⚖️

💻No trials. No hearings. No evidence.
Just attorney hearsay no clients, no corporate officers, no plaintiff victims.
All smoke and mirrors. The Connecticut Judicial Branch court system is a total sham and should be placed under federal receivership until it is forensically audited by an inde-pendent third party. The Judges mute, block, and disconnect pro se, sui juris individuals, and people with disabilities during remote hearings.
The Connecticut E-Services system has no user verification, no legal authentication, and zero accountability — with secret backdoors and undocumented features used to upload fake documents, steal homes, kidnap children, silence whistleblowers, and imprison them indefinitely.

They granny-snatch the elderly so they can medicate, isolate, and liquidate the assets of the entire probate estate — before the elders even pass away.

👶👵 They’re stealing children. Snatching elders. Seizing homes.
This isn’t a glitch — it’s a plan.

📂 And now the system behind it has been exposed.
🚨 Refiled Lawsuit Exposes Ongoing Judicial Corruption in Connecticut
A lawsuit originally filed in 2018 has been refiled in 2024 under case number HHD-CV24-6191630-S, titled:
PAVONIX (Massachusetts), Inc. f/k/a Softscape, Inc. v. State of Connecticut, Judicial Branch.
Connecticut Judicial Branch stole proprietary software code from Pavonix Inc. to devel-op its internal case management system — originally known as the Judicial Electronic Bridge (JEB) now know as Connecticut Judicial Branch e-Services case management soft-ware.
📛 That system has since been rebranded as “E-Services”, but the underlying stolen code remains in active use.
📂 People allege:
• • The state failed to pay Pavonix for contracted development work, then unlawfully used its code to build and deploy the Connecticut Judicial Branch's e-Services soft-ware platform, and has allowed unauthorized users to access the Connecticut computer system without authority, in violation of:
“Sec. 53a-251. Computer crime. (a) Defined. A person commits computer crime when he violates any of the provisions of this section.
• (b) Unauthorized access to a computer system. (1) A person is guilty of the com-puter crime of unauthorized access to a computer system when, knowing that he is not authorized to do so, he accesses or causes to be accessed any computer sys-tem without authorization
• Sec. 53a-254. Computer crime in the third degree: Class D felony. (a) A person is guilty of computer crime in the third degree when he commits computer crime as defined in section 53a-251 and (1) the damage to or the value of the property or computer services exceeds one thousand dollars or (2) he recklessly engages in conduct which creates a risk of serious physical injury to another person.”
• The system is used to manipulate court outcomes, erase evidence, and generate fraudulent rulings.
• It enables actors within the system to steal homes, kidnap children, silence whis-tleblowers, and intentionally inflict emotional distress on targeted individuals — very often without any proper hearings, trials, or verified documentation.
• The process is a “total sham” relying on attorney hearsay, no verified plaintiffs or corporate officers, and secret backdoors for uploading falsified legal documents.

5 Ways Unauthorized Computer Use Creates a Risk of Serious Physical Injury:
• Wrongful Evictions Leading to Homelessness & Suicide
• Fake rulings generated through E-Services force people — including the elderly and disabled — out of their homes, often without due process, leading to homeless-ness, medical neglect, or suicidal ideation.
• Unjust Termination of Parental Rights Leading to Homicides & Suicide
• Fraudulent judgments remove children from loving homes, often based solely on at-torney hearsay, triggering psychological trauma and, in some cases, self-harm or breakdowns in both parents and children.
• Elder Abuse via Probate Fraud Leading & Suicide
• Unauthorized access to probate filings enables the isolation, overmedication, and financial liquidation of elderly individuals before death — causing physical deteri-oration, stress-related illness, or early death.
• Suppression of ADA Rights in Remote Hearings
• Muting or blocking disabled litigants during hearings causes emotional distress, disorientation, and in some cases medical emergencies, especially for pro se liti-gants with neurological or mental health conditions.
• Targeting Whistleblowers with False Charges
• Fake filings or manipulated outcomes can result in wrongful imprisonment or forced institutionalization of whistleblowers or dissidents, putting them at risk of physical abuse, denial of medical care, or suicide under duress.

⚠️ This is more than software theft it's about how a corrupted digital system became a weaponized tool of injustice, used to violate rights, erase due process, and target the most vulnerable.
📆 On March 20, 2025, they seized my home and 5-acre property in Easton, Connecticut.
I was forced to leave by local police under threat of arrest.
I was never given an in-person evidentiary hearing. During the few remote hearings I was allowed, the judge muted my testimony, preventing me from exposing the fake documents used against me.
Even worse — the judge had previously served as attorney for the plaintiff in over 50 cases just before taking the bench.
He essentially set the entire case up so his former client, now the plaintiff, could steal my home.
They took everything from me — in retaliation for being a whistleblower and an ADA rights advocate.

This is part of widespread systemic corruption — not an isolated case.
This is real. Connect the dots. 🔎⚖️
🔥 Like, Share, & Follow — before it’s too late. ⏳
🔗 https://www.tiktok.com/@bigchiefc

Loading comments...