Citizens' Oversight Maryland---Maryland Progressives
CINDY WALSH FOR MAYOR OF BALTIMORE----SOCIAL DEMOCRAT
Citizens Oversight Maryland.com
  • Home
  • Cindy Walsh for Mayor of Baltimore
    • Mayoral Election violations
    • Questionnaires from Community >
      • Education Questionnaire
      • Baltimore Housing Questionnaire
      • Emerging Youth Questionnaire
      • Health Care policy for Baltimore
      • Environmental Questionnaires
      • Livable Baltimore questionnaire
      • Labor Questionnnaire
      • Ending Food Deserts Questionnaire
      • Maryland Out of School Time Network
      • LBGTQ Questionnaire
      • Citizen Artist Baltimore Mayoral Forum on Arts & Culture Questionnaire
      • Baltimore Transit Choices Questionnaire
      • Baltimore Activating Solidarity Economies (BASE)
      • Downtown Partnership Questionnaire
      • The Northeast Baltimore Communities Of BelAir Edison Community Association (BECCA )and Frankford Improvement Association, Inc. (FIA)
      • Streets and Transportation/Neighbood Questionnaire
      • African American Tourism and business questionnaire
      • Baltimore Sun Questionnaire
      • City Paper Mayoral Questionnaire
      • Baltimore Technology Com Questionnaire
      • Baltimore Biker's Questionnair
      • Homewood Friends Meeting Questionnaire
      • Baltimore Historical Collaboration---Anthem Project
      • Tubman City News Mayoral Questionnaire
      • Maryland Public Policy Institute Questionnaire
      • AFRO questionnaire
      • WBAL Candidate's Survey
  • Blog
  • Trans Pacific Pact (TPP)
  • Progressive vs. Third Way Corporate Democrats
    • Third Way Think Tanks
  • Financial Reform/Wall Street Fraud
    • Consumer Financial Protection Bureau >
      • CFPB Actions
    • Voted to Repeal Glass-Steagall
    • Federal Reserve >
      • Federal Reserve Actions
    • Securities and Exchange Commission >
      • SEC Actions
    • Commodity Futures Trading Commission >
      • CFTC Actions
    • Office of the Comptroller of the Currency >
      • OCC Actions
    • Office of Treasury/ Inspector General for the Treasury
    • FINRA >
      • FINRA ACTIONS
  • Federal Healthcare Reform
    • Health Care Fraud in the US
    • Health and Human Services Actions
  • Social Security and Entitlement Reform
    • Medicare/Medicaid/SCHIP Actions
  • Federal Education Reform
    • Education Advocates
  • Government Schedules
    • Baltimore City Council
    • Maryland State Assembly >
      • Budget and Taxation Committee
    • US Congress
  • State and Local Government
    • Baltimore City Government >
      • City Hall Actions
      • Baltimore City Council >
        • Baltimore City Council Actions
      • Baltimore Board of Estimates meeting >
        • Board of Estimates Actions
    • Governor's Office >
      • Telling the World about O'Malley
    • Lt. Governor Brown
    • Maryland General Assembly Committees >
      • Communications with Maryland Assembly
      • Budget and Taxation Committees >
        • Actions
        • Pension news
      • Finance Committees >
        • Schedule
      • Business Licensing and Regulation
      • Judicial, Rules, and Nominations Committee
      • Education, Health, and Environmental Affairs Committee >
        • Committee Actions
    • Maryland State Attorney General >
      • Open Meetings Act
      • Maryland Courts >
        • Maryland Court System
    • States Attorney - Baltimore's Prosecutor
    • State Comptroller's Office >
      • Maryland Business Tax Reform >
        • Business Tax Reform Issues
  • Maryland Committee Actions
    • Board of Public Works >
      • Public Works Actions
    • Maryland Public Service Commission >
      • Public Meetings
    • Maryland Health Care Commission/Maryland Community Health Resources Commission >
      • MHCC/MCHRC Actions
    • Maryland Consumer Rights Coalition
  • Maryland and Baltimore Development Organizations
    • Baltimore/Maryland Development History
    • Committee Actions
    • Maryland Development Organizations
  • Maryland State Department of Education
    • Charter Schools
    • Public Schools
    • Algebra Project Award
  • Baltimore City School Board
    • Charter Schools >
      • Charter Schools---Performance
      • Charter School Issues
    • Public Schools >
      • Public School Issues
  • Progressive Issues
    • Fair and Balanced Elections
    • Labor Issues
    • Rule of Law Issues >
      • Rule of Law
    • Justice issues 2
    • Justice Issues
    • Progressive Tax Reform Issues >
      • Maryland Tax Reform Issues
      • Baltimore Tax Reform Issues
    • Strong Public Education >
      • Corporate education reform organizations
    • Healthcare for All Issues >
      • Universal Care Bill by state
  • Building Strong Media
    • Media with a Progressive Agenda (I'm still checking on that!) >
      • anotherangryvoice.blogspot.com
      • "Talk About It" Radio - WFBR 1590AM Baltimore
      • Promethius Radio Project
      • Clearing the Fog
      • Democracy Now
      • Black Agenda Radio
      • World Truth. TV Your Alternative News Network.
      • Daily Censured
      • Bill Moyers Journal
      • Center for Public Integrity
      • Public Radio International
      • Baltimore Brew
      • Free Press
    • Far Left/Socialist Media
    • Media with a Third Way Agenda >
      • MSNBC
      • Center for Media and Democracy
      • Public Radio and TV >
        • NPR and MPT News
      • TruthOut
  • Progressive Organizations
    • Political Organizations >
      • Progressives United
      • Democracy for America
    • Labor Organizations >
      • United Workers
      • Unite Here Local 7
      • ROC-NY works to build power and win justice
    • Justice Organizations >
      • APC Baltimore
      • Occupy Baltimore
    • Rule of Law Organizations >
      • Bill of Rights Defense Committee
      • National Lawyers Guild
      • National ACLU
    • Tax Reform Organizations
    • Healthcare for All Organizations >
      • Healthcare is a Human Right - Maryland
      • PNHP Physicians for a National Health Program
      • Healthcare NOW- Maryland
    • Public Education Organizations >
      • Parents Across America
      • Philadelphia Public School Notebook thenotebook.org
      • Chicago Teachers Union/Blog
      • Ed Wize Blog
      • Educators for a Democratic Union
      • Big Education Ape
    • Elections Organizations >
      • League of Women Voters
  • Progressive Actions
    • Labor Actions
    • Justice Actions
    • Tax Reform Actions >
      • Baltimore Tax Actions
      • Maryland Tax Reform Actions
    • Healthcare Actions
    • Public Education Actions
    • Rule of Law Actions >
      • Suing Federal and State government
    • Free and Fair Elections Actions
  • Maryland/Baltimore Voting Districts - your politicians and their votes
    • 2014 ELECTION OF STATE OFFICES
    • Maryland Assembly/Baltimore
  • Petitions, Complaints, and Freedom of Information Requests
    • Complaints - Government and Consumer >
      • Sample Complaints
    • Petitions >
      • Sample Petitions
    • Freedom of Information >
      • Sample Letters
  • State of the Democratic Party
  • Misc
    • WBFF TV
    • WBAL TV
    • WJZ TV
    • WMAR TV
    • WOLB Radio---Radio One
    • The Gazette
    • Baltimore Sun Media Group
  • Misc 2
    • Maryland Public Television
    • WYPR
    • WEAA
    • Maryland Reporter
  • Misc 3
    • University of Maryland
    • Morgan State University
  • Misc 4
    • Baltimore Education Coalition
    • BUILD Baltimore
    • Church of the Great Commission
    • Maryland Democratic Party
    • Pennsylvania Avenue AME Zion Church
    • Maryland Municipal League
    • Maryland League of Women Voters
  • Untitled
  • Untitled
  • Standard of Review
  • Untitled
  • WALSH FOR GOVERNOR - CANDIDATE INFORMATION AND PLATFORM
    • Campaign Finance/Campaign donations
    • Speaking Events
    • Why Heather Mizeur is NOT a progressive
    • Campaign responses to Community Organization Questionnaires
    • Cindy Walsh vs Maryland Board of Elections >
      • Leniency from court for self-representing plaintiffs
      • Amended Complaint
      • Plaintiff request for expedited trial date
      • Response to Motion to Dismiss--Brown, Gansler, Mackie, and Lamone
      • Injunction and Mandamus
      • DECISION/APPEAL TO SPECIAL COURT OF APPEALS---Baltimore City Circuit Court response to Cindy Walsh complaint >
        • Brief for Maryland Court of Special Appeals >
          • Cover Page ---yellow
          • Table of Contents
          • Table of Authorities
          • Leniency for Pro Se Representation
          • Statement of Case
          • Questions Presented
          • Statement of Facts
          • Argument
          • Conclusion/Font and Type Size
          • Record Extract
          • Appendix
          • Motion for Reconsideration
          • Response to Defendants Motion to Dismiss
          • Motion to Reconsider Dismissal
      • General Election fraud and recount complaints
    • Cindy Walsh goes to Federal Court for Maryland election violations >
      • Complaints filed with the FCC, the IRS, and the FBI
      • Zapple Doctrine---Media Time for Major Party candidates
      • Complaint filed with the US Justice Department for election fraud and court irregularities.
      • US Attorney General, Maryland Attorney General, and Maryland Board of Elections are charged with enforcing election law
      • Private media has a responsibility to allow access to all candidates in an election race. >
        • Print press accountable to false statement of facts
      • Polling should not determine a candidate's viability especially if the polling is arbitrary
      • Viability of a candidate
      • Public media violates election law regarding do no damage to candidate's campaign
      • 501c3 Organizations violate election law in doing no damage to a candidate in a race >
        • 501c3 violations of election law-----private capital
      • Voter apathy increases when elections are not free and fair
  • Maryland Board of Elections certifies election on July 10, 2014
  • Maryland Elections ---2016

February 28th, 2019

2/28/2019

0 Comments

 
Continuing my DEPOSITION bringing examples of environmental structures enabling the kind of crimes tied to NOSY NEIGHBOR AND THE GANG-----the societal attitudes promoted by global banking cultural arts FADS------as MONSTERS, INC......I now move from my home and building surrounded by NOSY NEIGHBOR AND THE GANG------describing hierarchy of POWER and MONEY-----to how this model is mirrored on a larger scale with INSTITUTIONAL CAMPUSES and CORPORATE PROPERTY such as HOTELS, HIGH-RISE RESIDENTIAL APARTMENTS. I want to use the article below as an example of how Baltimore's institutional leaders KNOW there is a growing proliferation of SEXUAL ATTACKS----SEXUAL PREDATOR crimes in each  community in Baltimore.  This time we are seeing CHILD SEXUAL ABUSE--------in FOSTER CARE -----while this article makes no mention of saturated illegal surveillance PORNOGRAPHY all around global hedge fund corporation JOHNS HOPKINS' campuses.

While creating research articles claiming to desire social benefit in protecting children from SEXUAL ASSAULT----CHILD SEXUAL ASSAULT are soaring through illegal surveillance NOSY NEIGHBOR AND THE GANG pornography networks. 

THESE INSTITUTION KNOW THIS.

The next point I will make is this:  it does not take a ROCKET SCIENTIST to understand the PROGRESSION from NON-CONTACT SEXUAL ASSAULTS as with NOSY NEIGHBOR AND THE GANG -----to VIOLENT PHYSICAL SEXUAL ASSAULTS of men via SODOMY----of women via RAPE----of children via pedophilia physical contact and rape.

So, the societal attitudes when saturated NOSY NEIGHBOR AND THE GANG illegal surveillance pornography filled with NON-CONTACT SEXUAL ASSAULT escalates to PHYSICAL ASSAULTS----well, that's OK-----the women caught in illegal surveillance pornography------they were prostitutes so they ASKED FOR IT.  This children captured as non-contact porn----well, back in 1000BC sex with children was norm say far-right wing global banking 5% freemason/Greek PLAYERS---CLINTON/BUSH/OBAMA.


Sexual Abuse: An Epidemic in Foster Care Settings?

FIND MORE LEGAL ARTICLES



Children who have unstable homes are often placed in foster homes. This placement may occur because the home life is volatile. Often, foster care is treated as a temporary solution while the parent or parents in the home work on problems to later become reunited with their children. However, children may be raped, molested or sexually abused in these settings.



Prevalence of the Problem

Approximately 530,000 children in the United States live in foster care at any given time. Some of these children are placed in foster care because they have been sexually abused, abused in other ways or neglected. Unfortunately, many of these children are again abused in the foster care setting.



A study by John Hopkins University found that children who are in foster care are four times more likely to be sexually abused than other children not in this setting. Additionally, children who are in group homes are 28 times more likely to be abused than children not living in these homes.



Male and female children may be sexually abused. Likewise, very young children to nearly adult children can be abused in these settings.


What Is Sexual Abuse?

Sexual abuse is unwanted sexual behavior, such as touching, kissing, groping or penetrating a child who is not legally able to consent to such contact. Additionally, it can include acts that do not involve touching, such as taking inappropriate pictures of a sexual nature of a child.



Who Are the Abusers?

Abusers can be anyone. They do not necessarily have a criminal record of abuse. They can be the foster parents. They could also be employees for group homes, foster care workers, social workers, religious advisors, teachers or others in the child’s life. It is common for sexual predators to use their position in the child’s life to take advantage of the child.



Signs of Sexual Abuse


There are often a number of signs that may arise if a child is being abused. Younger children may be more likely to revert to child-like behaviors such as thumb sucking or wetting the bed. They may use inappropriate words to describe their genitals and other private parts. They may refuse to remove their clothing when necessary, such as to toilet, change a diaper or take a bath. They may start to act out sexually with peers or others. They may play with their toys, using suggestive language or actions indicative of sexual behavior. They may wet themselves when around the abuser.


Adolescents are often coerced into sexual abuse. They may be threatened and may be afraid to tell a loved one what is going on. Adolescents who are being sexually abused are more likely to be sexually promiscuous, do drugs, drink alcohol, run away from home and try to commit suicide. They may engage in self-injury or may compulsively eat or diet. They may be afraid to get close to others and may appear depressed or anxious.


Children who are being abused may have some physical warning signs, such as having blood on their undergarments. They may have pain when using the bathroom or have discoloration or discharges in certain areas of their body.



Many behavioral signs may point to abuse. Not every behavioral change is dispositive that abuse is occurring. However, if several signs are present, a loved one may want to investigate further into the possibility of sexual abuse being present. A child being sexually abused may have nightmares or have trouble sleeping. He or she may have a sudden change in eating habits or may refuse to eat. The child may think of their body as gross or bad. He or she may talk about a new older friend or refuse to share a secret shared with an older friend. He or she may be fearful around certain people or in certain settings. He or she may have sudden and unexplained mood swings or may socially withdraw.


Legal Action Against the Foster Care Agency

Foster care agencies are often required to follow strict protocol regarding how they vet foster parents and conduct extensive background checks. However, these procedures may not always be followed, or a foster parent may develop ways to get around them. In some cases, a foster care agency may be held liable for harm that befalls the child, such as if the foster care agency was negligent in the child’s placement. However, sometimes foster care agencies are state governmental programs, which may have immunity from such lawsuits. It is important to contact an experienced lawyer to discuss the possibility of pursuing a claim against a negligent foster care agency.


Provided by HG.org


Disclaimer: While every effort has been made to ensure the accuracy of this publication, it is not intended to provide legal advice as individual situations will differ and should be discussed with an expert and/or lawyer.


*************************************************************
I will make the case of RACKETEERING to include PUBLIC OFFICIALS-----AKA POLITICAL MACHINES to be front-and-center in these NOSY NEIGHBOR AND THE GANG networks.  This is the RICO RACKETEERING side of this case. 

If my Baltimore political are too BUSY operating NOSY NEIGHBOR AND THE GANG operations---they will not be ENFORCING city codes and legal statutes surrounding protection of citizens/children from SEXUAL PREDATORS




'According to our research of Maryland and other state lists there were 1,647 registered sex offenders living in Baltimore as of February 28, 2019. The ratio of number of residents in Baltimore to the number of sex offenders is 373 to 1'.


My living space/building is block away from a ELEMENTARY SCHOOL filled with children whose parents mostly here in my community surrounded by NOSY NEIGHBOR AND THE GANG SEXUAL PREDATORS.


This chart below would indicate the concentration of registered sexual offenders are in communities surrounding BALTIMORE----ie. Baltimore County.  My premise will be these sexual offenders are highly likely to be recruited by NOSY NEIGHBOR AND THE GANG-----HOSTING SERVER level person----to be THE GANG part of the network.  THE GANG function in installing inside and outside buildings all that illegal surveillance infrastructure and devices.  THE GANG functions as WATCHING the movement of a targeted victim LEAVING A LOCATION to come home for example so that NOSY NEIGHBOR is at the computer ready to capture illegal surveillance with undressing, hard porn sexual activity,  soft porn nudity.

I definitely do not assume ALL FORMER SEXUAL OFFENDER are repeaters----but statistics show heavy RECIDIVISM in the category of SEXUAL CRIMES.


Baltimore, MD ratio of number of residents to the number of sex offenders compared to nearest cities:


(Note: Higher values mean more residents per sex offender)


Arbutus: 21,594
Lansdowne: 8,419
Woodlawn: 4,993
Towson: 3,660
Brooklyn Park: 2,875
Parkville: 794
Rosedale: 647
Dundalk: 570
Baltimore: 373


Baltimore, MD ratio of number of residents to the number of sex offenders compared to county and state: (Note: Higher values mean more residents per sex offender) Maryland: 922 Baltimore city County: 431 Baltimore: 373



So, in my community not only do THE BALTIMORE POLICE------the BALTIMORE CITY COUNCIL------the COMMUNITY ASSOCIATION, but institutional campuses like GLOBAL HEDGE FUND CORPORATION JOHNS HOPKINS.  My community cannot be saturated with NOSY NEIGHBOR AND THE GANG illegal surveillance and pornography if these organizations are FUNCTIONING----ENFORCING EXISTING LAWS SURROUNDING SEXUAL ASSAULT----SEXUAL PREDATORS.

COMMUNITY INSTITUTIONS AS 'ANCHORS' IGNORING SATURATED NOSY NEIGHBOR AND THE GANG ACTIVITY----- NO SOCIAL BENEFIT----

Below I show psychological profile of SEXUAL PREDATOR looks much like the profile I developed in my DEPOSITION over these several months.



'Psychological factors associated with a higher risk of recidivism among perpetrators of sexual assault


Intensity of sexual preoccupations Sexual preference for prepubescent or pubescent children Sexualized violence Presence of multiple paraphilias (e.g. voyeurism, fetishism)

Attitudes supportive of sexual assault Emotional congruence with children Lack of emotional intimacy with adults Manifestations of impulsiveness Difficulty resolving problems Opposition to rules and legal supervision Negative social influences' 



What is the legal distance a registered sex offender can live near a school or a park?


Question: Dear Stop It Now!,

My daughter and grandchildren live in a neighborhood with a long list of sexual offenders. One of them lives less than 0.3 of a mile from a high school. Is it legal for a registered sex offender to live that close to a school or park?

Response: 

Dear Concerned Grandparent,Restrictions such as the ones you refer to in your email vary according to the status of each individual registered sex offender. Restrictions usually apply to registered offenders living in the community who are under court-ordered supervision through parole or probation. But when an offender has served out his or her sentence and is no longer under court-ordered supervision by the criminal justice department, they typically would not have to comply to any restrictions.



Residency Restrictions Depend on Local Laws


Residency restrictions vary by distance (500 to 2000 feet from places where children tend to congregate) and by community. I would encourage you to take a look at the FAQs from the Center for Sex Offender Management . See especially “Managing Known Sex offenders” and “Where Sex Offenders Can Live”. To learn how you can find out more about a specific individual’s case, read the section “Specific Cases and Concerns” under the FAQs.




Sex Offenders Have Different Levels of Risk


It’s also important to understand registered sex offenders pose different levels or risk. For instance, a registered offender is less likely to re-offend if they have received sex offender treatment, if they are being supervised through the criminal justice system (has a parole officer), has employment and some type of support system, such as family members.



When a registered offender is not able to re-integrate in a safe way into the community they are more likely to take on a life style (being homeless, alone, unemployed) that could increase the risk of re-offending. There is also a difference in the offenders listed on the registry in this way: some are there for sexual offenses against adults, not children. Please also see our FAQs on the Sex Offender Registry and our prevention tool, Concerned about a sex offender in your neighborhood from our website.


Safety Planning


It is always important for parents and other adults to know Warning Signs in adults or children that might possibly indicate child sexual abuse, as well as to talk to their children about healthy sexuality and the differences between appropriate and inappropriate touching. Additionally, parents and adults should keep safety planning in the forefront all the time, not just when a potentially "dangerous" situation is presented. By designing and following simple but clear safety plans, adults are helping the whole family develop boundaries and guidelines for all times. Please see our prevention tools online, including
  • Everyday Actions to Keep Kids Safe
  • Create your family safety plan
  • Talking to children and teens
I hope these resources will help your family as they think about safety
Take care,
Stop It Now!


***************************************************************
Baltimore Sex Offender Registry Search


Are there restrictions on where sex offenders can live?

Yes, most states have residency restrictions for sex offenders. In many states, sex offenders are not allowed to live within a certain distance from "child safety zones," which typically includes schools, childcare facilities, parks, playgrounds, and other areas frequented by children. The exact restrictions vary by state.

***********************************************************


Looking at SPY CAMERA AND MICROPHONE industry products being released knowing citizens will be made VULNERABLE to illegal surveillance and pornography capture----the SPY PRODUCTS are heavily marketing and developed for CORPORATE/INSTITUTIONAL SETTING.

Below I show BLACK-OPS PLASTIC made just for hiding the smallest of spy cameras.  Many of these products----black plastic will be bought and installed in HOTELS/RESIDENTIAL temporary living HOTELS------in institutional patient suites/rooms et al.  This will extend yet another avenue of VULNERABILITY to NOSY NEIGHBOR AND THE GANG illegal surveillance pornography. 

WHO CHECKS INSIDE THESE KINDS OF PRODUCTS AS DECOR IN HOTEL ROOMS----PATIENT SUITE SPACE?  NO ONE.


An institution or corporation like HOTEL which buy BLACK OP PLASTIC PRODUCTS saying they didn't place a camera inside these items-----it's not our responsibility.....

OH, REALLY?????


'Only cameras can see through Black-Ops Plastic


By Matthew Humphries 06.30.2012 :: 10:02AM EST'

Monitoring a location or person with a camera or microphone has become a lot easier in recent years due to cameras having much higher resolutions while being fitted into ever smaller devices. Just about every smartphone now carries a high resolution camera capable of recording video along with a decent microphone.


If you want to record someone covertly though, you still have the issue of hiding your recording devices from view. You’re also going to want to leave them recording for long periods of time without being discovered. Qwonn, a manufacture of security products, has come up with the perfect solution to this problem and is calling Black-Ops Plastic.


If you want to record someone covertly though, you still have the issue of hiding your recording devices from view. You’re also going to want to leave them recording for long periods of time without being discovered. Qwonn, a manufacture of security products, has come up with the perfect solution to this problem and is calling Black-Ops Plastic.

The material is black in color and cannot be seen through with the naked eye. However, if you point a black and white camera at a sheet of Black-Ops Plastic, it becomes transparent allowing the camera to record whatever is on the other side.



What this means is you can hide a camera inside an object made of this special plastic and no one will know it is there. But the camera is free to record without having its view blocked.


As you can see from the images above, Black-Ops Plastic can be shaped into many different objects. Qwonn claim they can produce virtually any shape required for your spying needs.



Beyond a few images there’s very little detail as to how the plastic works. It’s patent pending so you can understand why Qwonn wouldn’t want to share much detail about it. The one thing it will guarantee though, is that everyone is more suspicious of shiny black plastic objects from now on.

*******************************************************************


PORT-A-WALL ROOM DIVIDERS------DRESSING SCREENS

When there is a soaring market for a product like the above-----with people buying these for travel to address illegal surveillance in HOTELS, BED-BREAKFAST----et al with intentions of looking for ONE WALL and ceiling that may not have an illegal surveillance in order to back themselves up against that wall between the PORT-A-WALL DRESSING SCREEN in a desperate attempt not be be made a VICTIM of NOSY NEIGHBOR AND THE GANG at an institutional and corporate level ------I can make the case that the ENVIRONMENT of vulnerability to illegal pornography capture is RELEVANT.

So, now a family on vacation must throw a DRESSING SCREEN into the trunk to protect family while traveling staying at HOTELS/BED BREAKFAST as well as professionals traveling for business-----more and more request to CONCIERGE services to BRING THESE DRESSING SCREENS TO HOTEL ROOMS


CONCIERGE -------DRESSING SCREEN TO MY HOTEL ROOM PLEASE!



Privacy Screens, Room Dividers, Privacy Panels, Hospital Curtains, Medical Furniture, Partitions

24 Products On Sale Below


Privacy screens, also called privacy panels, can shield an individual from others in a variety of settings involving healthcare, the military, education, or disaster relief. They may be self-standing and portable so they can be located wherever the need arises, or they may be stationary, and permanently attached to a ceiling.

What are Room Dividers?

Room dividers, sometimes referred to as room partitions, are devices that allow the space in a room to be divided into areas or subsections. The use of room dividers, in some cases, has to do with a decorating theme for the space. At other times, the reason for using a room divider is more functional than decorative. There are basically two types of room dividers. The first type is a folding divider, also called a privacy screen. It normally involves a series of panels that are hinged together, and is free standing. Generally, a privacy screen has three or more panels, but some only have two panels for smaller areas. The panels are unfolded and positioned in a way that sections off part of a room. Privacy screens can be used in bedrooms to create a changing area, or to create a visual distinction between a living and sleeping space. Many privacy screens are used in healthcare, military, education, or disaster relief settings and scenarios to give people privacy from others, or from a crowd.

The second type of room divider is the accordion style, often called a privacy curtain. Privacy curtains are mounted in metal tracks which run across the ceiling area. This makes it easy to slide them into place when necessary. Depending on the size of the space, one or more sets of privacy curtains may be installed. This design is often used in patient rooms of a hospital or a healthcare facility in order to be able to give patients privacy on demand.

One of the benefits of room dividers is the ability to manage sound in the space. For example, in an office setting, the partitions can separate a larger space into several work areas to help minimize the sounds created by the various employees in that space. While the effect is usually not as definitive as placing the employees in different rooms, the use of partitions help make it possible to contain enough of the sounds so that employees are not distracted by each other.

Room dividers not only add functionality, but can also add an element of visual interest to the space. This can be true in any area they are used in. Partitions made of panels may be covered in print fabrics or painted with any type of design that suits its use. Both types of room dividers are available in a wide range of colors, making them more attractive and welcoming as part of the overall design.


0 Comments

February 27th, 2019

2/27/2019

0 Comments

 
Today's DEPOSITION expands on HOSTING SERVER second level of power in NOSY NEIGHBOR AND THE GANG----revenue sources for saturated illegal surveillance and pornography network in my community and all communities in Baltimore.

I state often that for some reason I am waking up each morning at 1:30-2:00AM changing from usual 3:00-3:30 AM-----thinking of a reason.  My hypothesis of BODY ELECTRIC feeling massive internet data downloads from businesses to HOST SERVERS which then transfer that data to internet platform----such as COMCAST/VERIZON internet cables in our city.  I knew for example our community banks download ATM data each day at 1:30-2:00AM because it is the middle-of-night when capacity for these massive downloads can access space -----businesses closed----people using internet sleeping for the most part.

As NOSY NEIGHBOR AND THE GANG illegal surveillance with camera and microphone capture soared in and around my living space I could feel the soaring electrical feedback released by surveillance devices-----by transmission of daily continuous streaming videos from all these surveillance devices from computers where data is first collected to when it is downloaded onto internet heading for HOST SERVERS.


In thinking of why I was experiencing these reactions to electrical transmissions particularly at those early morning hours, I remembered---HIND SIGHT IS 20/20----articles being written in national media tied to cell phone users having data downloading packages with their cell phones experiencing UNKNOWN SOURCES OF DOWNLOADING CHARGES often adding hundreds/thousands of dollars to a single monthly CELL PHONE BILLING PLAN.

As I set a TIMELINE for when NOSY NEIGHBOR AND THE GANG network may have began-----grown---becoming saturated in my community I know these several years saw that explosion in illegal surveillance of homes/apartments as newer and more complex telecommunications devices were placed on market.  Remember, all these SPY CAMERA products are coming from WAR ZONE surveillance and spying products used in overseas CIVIL UNREST CIVIL WAR zones.

Below, I found the earliest hint of hacking to transfer costs of WEBCAM streaming video downloads corresponding with 2010 spike in citizens having cell phone plans tied to streaming video.  WHERE DID ALL THAT MEGA-BITE download fee come from say these telecom customers------VODAPHONE, ATT, et al these conversations coming from CHAT LINES tied to CUSTOMER SERVICE platforms each telecom created to solve CONSUMER COMPLAINTS------ie. why is my monthly data download charges EXTREMELY HIGH!

In each case the common denominator was WIFI------cell phone CHARGER-------the data downloads occurring in middle of night when phone was on charger and inactive.


Fix iphone high data usage spike common culprit and how to stop data leak overage


Adam Bednarz
Published on Oct 26, 2013
Fix for any Apple iphone that has a high, excessive or unexplained jump in data usage. The common culprit and how to stop this issues is in the video and description.

*******************************************************
Microsoft chat-----Jan 12, 2014


Options to control excessive data usage

Dear Forum,

I have progressively switched on/off various options in the phone to try to limit the background data usage however this month I have received a substantial excess data usage bill from my carrier.  Looking at the records supplied by the carrier, a large proportion of these data usage records are logged during the middle of the night or early morning when my phone is connected to my home wifi and on standby. 

**********************************************************

Some general questions:
a) does my phone process background tasks over wifi when available and phone is on standby?
b) what can it possibly be doing at 2-5am when in standby that would use up 50-250MB?
c) my carrier has said "it could be a virus transmitting data".  Is this possible? I haven't been able to find any reports of virus attacks on WP8.

***************************************************

Excessive data use - Vodacom Communitycommunity.vodacom.co.za/t5/Prepaid-Services/... I bought a 100mb data bundle as i was told it would last me at least a week. i checked my data balance the next day, and it was down to 14mb which is strange, because i was connected to wifi for a good portion of the time and used the wifi, to download and install/upgrade apps.



Whereas my DEPOSITION and lawsuit is tied to illegal surveillance and pornography------I encourage people having been victims of EXTREME cell phone data streaming charges to JOIN IN CLASS ACTION LAWSUITS. Sometimes the victim of NOSY NEIGHBOR AND THE GANG are the same victims of hacking of cell phone data plans-------if victim of pornography capture does not have these kinds of cell phone plans----those NOSY NEIGHBORS will be looking for any UNPROTECTED CELL PHONE ON CHARGER ----having that plan.  APPLE I PHONE is particularly VULNERABLE because all products have built-in CAMERA/MICROPHONE parts for easy HACKING CAPTURE.

Unknown data usage early morning


With the changes to the data plans, i decided to look at my wifes data usage on her iphone. What i have found is odd and a bit concerning. Overall her data usage is pretty much nothing, except for something that occurs every morning around 1 or 2 am. I have included data usage on the AT&T account below. As you can see, something happens around 1 or 2 am every morning, i just dont know what it is. The amount of data being transferred is REALLY high if you ask me, as high as 75336KB back on the 17th. I called AT&T support and they said it was the phone updating or mail being downloaded, basically they have no idea. I have the mail set to fetch manually already. Anyway to determine what is going on???



06/04 01:22 AM phone Internet/MEdia Net Sent 3368KB
06/03 01:45 AM phone Internet/MEdia Net Sent 18906KB
06/02 01:45 AM phone Internet/MEdia Net Sent 6878KB
06/01 01:45 AM phone Internet/MEdia Net Sent 9460KB
05/31 07:45 PM phone Internet/MEdia Net Sent 1918KB
05/31 01:27 AM phone Internet/MEdia Net Sent 7551KB
05/30 02:27 PM phone Internet/MEdia Net Sent 1224KB
05/30 01:17 AM phone Internet/MEdia Net Sent 2685KB
05/29 01:39 AM phone Internet/MEdia Net Sent 8120KB
05/28 01:39 PM phone Internet/MEdia Net Sent 5410KB
05/28 01:07 AM phone Internet/MEdia Net Sent 5068KB
05/27 10:42 AM phone Internet/MEdia Net Sent 21778KB
05/27 01:06 AM phone Internet/MEdia Net Sent 10419KB
05/26 09:26 AM phone Internet/MEdia Net Sent 20657KB
05/26 01:50 AM phone Internet/MEdia Net Sent 8467KB
05/25 02:21 PM phone Internet/MEdia Net Sent 18086KB
05/25 01:25 AM phone Internet/MEdia Net Sent 5249KB
05/24 01:25 AM phone Internet/MEdia Net Sent 1012KB
05/23 01:25 AM phone Internet/MEdia Net Sent 12978KB
05/22 01:25 AM phone Internet/MEdia Net Sent 9749KB
05/21 01:41 AM phone Internet/MEdia Net Sent 19166KB
05/20 01:17 AM phone Internet/MEdia Net Sent 23860KB
05/18 11:56 PM phone Internet/MEdia Net Sent 15440KB
05/18 01:06 AM phone Internet/MEdia Net Sent 29900KB
05/17 01:12 AM phone Internet/MEdia Net Sent 75336KB
Posted on Jun 5, 2010 4:56 AM
*************************************************
Jun 6, 2010 8:21 AM in response to cnpeyton


I have the same issues. My phone is almost always on WIFI so my cell data usage is fairly low but I went to look at my history at AT&T and discovered the same thing - unauthorized, unexplained cellular data transfers in the early morning (1 to 3 am). At this point in my billing cycle, these unexplained transfers account for almost 2/3's of my usage. My transfers range from 50KB to 2MB, which is orders of magnitude more than "collecting simple statistics". But your amounts !! wow, what is going on there? This stuff combined with some normal usage could put you over the 200MB cap in less than a week and end up costing you money.

**************************************************************
Jun 5, 2010 6:14 AM in response to jinx.pt
The thing that i don't get is that at home, the iphone run on WIFI over my home network. So why at 1 or 2 am when the phone is on the charger at home, is there these huge data transfers over the 3G network?



This is way to much data for stats, i have some nights at 20 MB, 30 MG, even 70 MB. I am going to make sure the phone is set to fetch manually, but outside of that, i can't imagine what is going on.
********************************************************
Jun 6, 2010 8:39 AM in response to cnpeyton
Thanks for bringing this up. I see the same activity, outbound data, around 2:24 AM each day. the smallest transfer over the past 3 weeks was 99 KB, the largest 10 MB. I DO have Exchange push email enabled, but I wouldn't be sending, only receiving.

Jun 7, 2010 7:45 AM in response to Lawrence Finch
Same here. I'm only a few days into my billing cycle and it already used 15MB all on its own

*************************************************************
Jun 7, 2010 3:54 PM in response to cnpeyton
Just looked at my data usage and I have the same issue. Every other night around midnight when I am asleep and the phone is being charged there is are unknown data transfers. On 5/30 there was 71,000 KB of data transferred at 12:28 A.M. I'm really curious to know what is causing this. Everyone should check their bill and see if this is happening to them!

***********************************************************

It is common knowledge that plenty of SPYING AND HACKING TOOLS exist which can allow any hacker to search for UNPROTECTED technology devices to hack-------including a person who has UNPROTECTED cell phone------a brand likely to have a DATA STREAMING PLAN allowing for transfer of costs from NOSY NEIGHBOR AND HOSTING SERVER second level of power----to transfer costs of DAILY DOWNLOADING OF THESE SURVEILLANCE VIDEO DATA.

While the act of hacking cell phone data plans for downloading illegal surveillance feeds is not PORNOGRAPHY-----it does fall under COMPUTER HACKING LAWS-------which include the hacking of ANY technology device not owned by hacker.

When we think of the REVENUE GAINS by NOSY NEIGHBOR AND THE GANG in transferring these data transfer costs to victim----I am noting ADDITIONAL PROFITS earned in process of illegal surveillance of my home by continuous video and microphone capture.  The size in MBs of these data streams each day--------gives an estimate of how much revenue gain HOSTING SERVER second level power saves in cost of doing ILLEGAL, RACKETEERING BLACK MARKET pornography operations.

'Unauthorized Access with Intent to Defraud (which includes internet fraud and “phishing”)'

'Violations of the Computer Fraud and Abuse Act can be prosecuted as misdemeanors or felonies primarily depending on the motivation behind the computer misconduct'.

'Another law that is occasionally used in “computer hacking” cases is the protection against unlawful access to stored communications (18 U.S.C. §2701). This law punishes the use of a computer to access another person’s “electronic communication service” where the person has their email or voicemail stored. If the unauthorized access to a person’s voicemail or email is done for profit or financial gain, then it is a felony'.

Below the COMPUTER HACKING LAWS article would make one think only PROTECTED COMPUTERS as defined as GOVERNMENT/FINANCIAL computers----but that is not how these laws are interpreted------the update of computer hacking frauds/crimes include ANY COMPUTER CONNECTED TO INTERNET-------
Wire Fraud'Wire fraud refers to fraud that is committed through the use of wires, or electronic means. Wire fraud may be committed using interstate wires, television or radio communications, or the Internet. Wire fraud is an intentional act to defraud another individual or entity of his money or property, and is a federal crime punishable by up to 30 years in prison. To explore this concept, consider the following wire fraud definition'.

Definition of Wire FraudNoun
  1. The crime of using an interstate wire, television or radio communications, or the Internet, in order to defraud someone.
Origin
1872     U.S. legal system
What is Wire FraudWire fraud shares many characteristics with regular fraud, though it is committed through the use of phone lines or other wires, utilizing electronic communications. Wire fraud is committed in order to defraud another person out of money or something else of value, to the financial gain of the perpetrator. Wire fraud is a federal crime. To successfully charge an individual with wire fraud, the crime must meet four specific elements:
  1. The defendant voluntarily concocted, or participated in, a scheme to defraud a person or entity out of money, or something else of value
  2. The defendant perpetrated the scheme with the intent to defraud the victim
  3. The defendant used interstate wire communications to perpetrate the fraud
  4. The defendant should have known that interstate wire communications would be used to complete the fraud
Mail and Wire FraudModern technology in communications has seen the evolution of more sophisticated fraud schemes. Mail and wire fraud fit into old laws that have been modified to accommodate these techniques. Both mail and wire fraud are felony crimes, involving fraudulent acts committed for the purpose of depriving another person or entity of money, property, or other assets.
Mail fraud, which has been a federal crime since 1872, entails fraud committed through the use of the U.S. Mail system. Wire fraud, a much newer issue, entails fraud committed through the use of any electronic communications, including email, text message, telephone call, the Internet, television communication, and radio communication.
Example 1
Larry prints up postcards imitating a non-profit organization seeking donations to save the local animal shelter. Larry then mails those postcards through the U.S. Post Office to residents of a neighborhood in which mostly affluent older people live, figuring they are most likely to write out checks for his phony cause. The moment Larry put those cards into the mail he has committed mail fraud.
Example 2:
Larry instead decides to create a webpage imitating his fictional non-profit organization, asking people to donate to his cause through PayPal. He sends out spam emails, and makes a bunch of social media posts soliciting donations. Larry’s crime now uses electronic means to commit his fraud scheme, which constitutes wire fraud.
Wire Transfer FraudWire transfers are used to move funds from one account to another. These electronic wire transfers can be used to move money between banks, pay bills, or send money to another person or business. Scammers use many tools, including phishing sites and malware, to steal bank and other account login information. Once this information is obtained, the scammers commit wire transfer fraud to move the victim’s money into their own accounts.
Experts advise individuals and entities to protect their assets from wire transfer fraud by installing a firewall, anti-virus, and anti-malware software on their computers and other electronic devices. They also advise maintaining secure passwords, and using caution when entering passwords and any personal information on a website, or into a POS terminal.
Wire Fraud ScamsScammers use a wide variety of wire fraud scams to defraud people out of their hard-earned money. Typically, wire fraud scams involve attempts to steal people’s financial information, which can be used to access credit cards or bank accounts, to make purchases, and even to open new credit accounts. One common wire fraud scam is known as “phishing.”
Phishing wire fraud scams begin when the scammer sends out emails to a large number of people, detailing a tragic story, and outlining why the scammer needs financial help. The email wraps up by asking the recipient for money or other financial assistance. Once the victim takes that bait, replying to the email (or social media message), the scammer begins weaving a complex story, and ultimately requests the victim’s personal information with the intent of using it to gain financially.
For example:
A scammer sends out a mass email claiming to be a Nigerian prince who has been exiled. He states in the email that he has money in a Nigerian bank account that needs to be transferred to the United States. He tells the recipient that, if she will allow him to temporarily deposit $100,000 into her bank account, he will pay her $2,000 once he transfers the money to a safer bank. Once the victim gives the scammer her bank account information, he has access to her money.
Wire Fraud PenaltiesWire fraud penalties can be severe, as this federal crime is classified as a felony. Each act of wire fraud is charged as a separate offence, punishable by large fines, and 20 years or more in prison. This means that, if the perpetrator makes 20 phone calls attempting to defraud people, he can be charged with 20 separate counts of wire fraud. In such a case, wire fraud penalties stack up, and can result in a lifetime behind bars. Wire fraud penalties in cases involving a financial institution are much more severe.
St. Louis Man Guilty of Four Counts of Wire FraudOn May 8, 2015, 54-year old Dana Jefferson stood in court, as U.S. District Judge Audrey Fleissig handed down his sentence for a string of felony wire fraud counts. Jefferson had convinced certain people that he had received an inheritance from his father, the amount of which varied between $5 million and $200 million. There was no inheritance, and Jefferson approached potential victims using several different names. He told these prospective fraud victims that the money was tied up in a trust, or sometimes that it was in a Florida bank, making up various convincing reasons he could not access it at the time.
By making promises to enrich his intended victims, by paying double the amount of the loan he was seeking, buying them homes or expensive cars, or paying for plastic surgery, Jefferson duped nine people out of a total of $740,000. The means Jefferson used to contact his victims, by mail, email, and phone, makes this a crime of mail and wire fraud. In a plea deal, Jefferson pled guilty to four counts of felony wire fraud, and was sentenced to 42 months in federal prison.
Related Legal Terms and Issues
  • Defendant – A party against whom a lawsuit has been filed in civil court, or who has been accused of, or charged with, a crime or offense.
  • Felony – A criminal offense punishable by a year or more in jail.
  • Fraud – A false representation of fact, whether by words, conduct, or concealment, intended to deceive another.
  • Fraudulent Intent – A false statement or deceptive act made with the intent to deceive the victim.
  • Perpetrator – A person who commits an illegal or criminal act.

*************************************************************

Computer Fraud and Abuse Act (18 U.S.C. §1030).
Subsection 1030 (a) (5)------transmitting code that damages a computer system.


Computer Hacking Laws

We understand computer hacking laws.

Over the past 20 years, our federal criminal defense lawyers have helped people charged with violating computer hacking laws in courts across the United States.With the increased use of computers and digital information across the world, our firm has seen the United States Department of Justice dramatically increase its investigation and prosecution of alleged violations of computer hacking laws. While there are a number of different federal criminal laws that may apply to allegations of computer hacking and cybercrime, most federal prosecutors focus on a few specific computer crime laws.

Computer Hacking Laws

The term “computer hacking” generally refers to the illegal use of a computer in an attempt to access another computer without authorization in order to commit fraud or cause harm.


Most computer hacking charges are prosecuted under the Computer Fraud and Abuse Act (18 U.S.C. §1030). This law covers a variety of different types of computer crimes and has been used very aggressively by the government in recent years.


The basic requirements for prosecution under this computer hacking law are that the computer is a “protected computer,” and that the individual charged accessed that computer “without authorization.” Due to recent amendments to this law, the government defines these terms very broadly.


A “protected computer” is not just a computer that belongs to a government agency, it can include any computer that is connected to the internet. That would include a person’s computer provided by their employer, a computer at the public library, or other electronic devices that have internet access.


Similarly, the definition of “without authorization” is very broad. A person who has authorization to use a certain computer may nonetheless be prosecuted under this law if the person’s use of the computer “exceeds authorization” or if the person uses the computer for some “improper purpose.” If a person is given access to a work computer for limited purposes, but then uses that computer to engage in activity that is not approved (fantasy football, for example), then that person can arguably be prosecuted under this law.



Most criminal prosecutions under the Computer Fraud and Abuse Act fall into one of the following categories:
  • Obtaining National Security Information
  • Unauthorized Access of a Protected Computer
  • Trespassing in Relation to Government Computers
  • Unauthorized Access with Intent to Defraud (which includes internet fraud and “phishing”)
  • Damaging a Computer or Computer Information
  • Trafficking in Computer Passwords with the Intent to Defraud
  • Threatening to Damage a Computer
In cases involving alleged violations of computer hacking laws, the government also prosecutes anyone who is attempting or conspiring to engage in any of this type of activity. The Computer Fraud and Abuse Act has a provision that specifically addresses attempt and conspiracy charges.


Violations of the Computer Fraud and Abuse Act can be prosecuted as misdemeanors or felonies primarily depending on the motivation behind the computer misconduct. Accessing a computer and obtaining information for profit is generally prosecuted as a felony, as is any violation of this law that causes a loss in excess of $5,000.


The specific penalties for violating the Computer Fraud and Abuse Act depend on the type of misconduct involved and the amount of harm that it causes. As with any other federal criminal prosecution, a person’s sentence will be determined primarily by the calculation of the Advisory Federal Sentencing Guidelines.


In addition to the Computer Fraud and Abuse Act, there are a couple of other laws that deal with “computer hacking” offenses. The CAN-SPAM Act is intended to prosecute people who distribute large amounts of unsolicited commercial email (“spam”) (18 U.S.C. §1037). There are a variety of different civil and criminal penalties under this law, and the punishment usually depends on the amount of “spam” delivered or how it was used.


Another law that is occasionally used in “computer hacking” cases is the protection against unlawful access to stored communications (18 U.S.C. §2701). This law punishes the use of a computer to access another person’s “electronic communication service” where the person has their email or voicemail stored. If the unauthorized access to a person’s voicemail or email is done for profit or financial gain, then it is a felony.
***********************************************************
This goes to my case claim of IDENTIFY THEFT in hiding and lying about lack of CONSENT for illegal surveillance

'Joseph Cox


The Dar
k Web as You Know It Is a Myth
The Rest of the Web Is Just as ‘Dark’

For years there have been sites where you can instantly buy a stranger's Social Security Number, date of birth, full name, address and phone number for under a dollar, or others that host reams of stolen credit card details, ripe for a fraudulent spending spree'.


My case involves as well NOSY NEIGHBOR tapping my cell phone without permission allowing for illegal capture of incoming calls------incoming messages-----even knowing what images my PHONE CAMERA was taking.



How To Spy on a Cell Phone Without Possession
PhoneSpector is a powerful utility app (aka:“tracking apps for cell phones”), that allows you to spy on a cell phone or any mobile device without having the device in your possession. The app works by remotely accessing data from the target phone (the phone you are monitoring) and displaying that data on your cell phone, tablet or computer. PhoneSpector claims that it will collect texts, calls, GPS, Facebook, Twitter and more from virtually any phone.
We decided to put this sneaky little app to the test so, with the consent of our co-worker, Tracy, we remotely connected to her phone here in the office. You will be shocked at what we discovered!
The program was every bit invasive as you might think. PhoneSpector gathered text messages, calls, GPS tracking information, social media messages and pictures and just about everything else that transpired on the phone. With the “Stealth Camera” feature we were able to secretly take a picture using the telephone’s camera and have that picture sent to the phone that we were spying from. Think of it this way; Tracy, our consenting co-worker, has her phone in her hands and I am monitoring her phone from mine. I send a command to Tracy’s phone telling it to take a picture. The program snaps a picture on her phone, then automatically sends that picture to me. I can now view that picture on my cell phone. A little creepy, but wait, it gets worse…

********************************************************
In any lawsuit the case presented is not only EVIDENCE of crime-----but societal environments identifying the prevalence of the crime in case----in my case illegal surveillance by camera and microphone for identity theft and pornography.

I brought the history of CIVILIZING PORNOGRAPHY laws and regulation to show the increasing expansion of types of pornography and how an exploding black market resulted over a few decades.  Below we see an example of HOLLYWOOD creating what I consider the model of NOSY NEIGHBOR AND THE GANG pornography network.  ANIMATIONS are often marketed for children having adult themes woven inside.  MONSTER INC clearly addresses the structure of GLOBAL INTERNET------GLOBAL MANUFACTURING SYSTEMS ANALYSIS ON THAT INTERNET STRUCTURE.

This movie has the premise of MONSTERS having the ability and/or being assigned to enter DOORS---------which we then see open into a PERSON'S HOME -----in this case the MONSTERS enter these doors were hidden in CLOSETS in children's bedrooms.  While playfully done, these MONSTERS mission was to SCARE THAT CHILD.

NOSY NEIGHBOR THE GANG is the image of MONSTER INC.  They illegal enter a home----through 'DOORS' via devices and literally breaking and entering with criminally duplicated building keys.

They are HIDDEN-----the closet may be on the other side of victim's HOME-----they are told to be QUIET------don't let the CHILD know you are in the CLOSET------

This film was created in 2001------as BUSH era was super-sizing WAR ZONE spying and surveillance devices like CAMERAS AND MICROPHONES.

Watching the MONSTERS standing on ESCALATORS simulates the inner working of global internet structures.  The MONSTERS are carried to a particular DOOR ------where the mission is to enter DOOR and SCARE CHILD.

This is exactly what illegal surveillance by camera and microphone by NOSY NEIGHBOR AND THE GANG does.

HOLLYWOOD ALWAYS CREATE FILMS IDENTIFYING SOCIETAL FADS OFTEN SEEN ONLY A DECADE OR SO LATER.




Monsters, Inc.
From Wikipedia, the free encyclopedia

For the equipment manufacturer company "Monster Inc.", see Monster Cable. For the franchise, see Monsters, Inc. (franchise). For the 2001 video game, see Monsters, Inc. (video game).


Monsters, Inc.

Theatrical release poster
Directed byPete Docter
Produced byDarla K. Anderson
Screenplay by
  • Andrew Stanton
  • Dan Gerson

Budget$115 million[1]
Box office$577.4 million[1]


Monsters, Inc. is a 2001 American computer-animated buddy[2] comedy film produced by Pixar Animation Studios and distributed by Walt Disney Pictures



Randall pursues them to the door vault, and a wild chase ensues among the millions of doors as they move in and out of the storage vault on rails to the factory floor. Boo's laughter causes all the doors to activate at once, allowing the monsters to freely pass in and out of the human world. Randall attempts to kill Sulley, but Boo overcomes her fear and attacks him, enabling Sulley to catch him. Sulley and Mike then trap Randall in the human world, where two residents at a trailer park mistake him for an alligator and beat him with a shovel.


Sulley and Mike take Boo and her door to the training room, and trick Waternoose into revealing his plot with Randall, while Mike secretly records the entire conversation for the CDA to review. The CDA arrests Waternoose, and it is revealed that Roz, the scare floor secretary, is the CDA's leader. Roz thanks Sulley and Mike for their help, orders them to return Boo home, and has Boo's door demolished to prevent any further contact with her.



With the factory temporarily shut down, Sulley is named the new CEO of Monsters, Inc. Under his leadership, the energy crisis is solved by harvesting children's laughter instead of screams, as laughter has been found to be ten times more potent. Mike takes Sulley aside, revealing he has rebuilt Boo's door. It needs one final piece, which Sulley took as a memento, in order to work. Sulley puts the door chip into place, enters and joyfully reunites with Boo.



****************************************************************

I share much on the societal decline in PORNOGRAPHIC regulation leading to all kinds of SEXUAL ASSAULTS ------all kinds of PORNOGRAPHY committed illegally.  As we watched deregulation of CIVILIZED PORNOGRAPHY, global banking always creates BLACK MARKET economies as RACKETEERING and cartel profiteering.  In this case the DARK WEB PORNOGRAPHY exploded---first, with CHILD PORN-------early 2000s ------then expanded to any person inside any apartment or home.

Below we see who was behind MONSTERS INC-------looking at those exposed as CHILD SEX PREDATORS. 

I want to include the connection of HILLARY CLINTON as SECRETARY OF STATE during OBAMA----I identify the DARK WEB being DARPA----global private military complex----HILLARY through e-mail hacking was found to be tied to DARK WEB----and CHILD PORN with WEINSTEIN as BEST FRIENDS with Clintons --------the connections of all the above to what was called PIZZA-GATE ----COMET PIZZA in Washington DC ----shows how NOSY NEIGHBOR AND THE GANG would use illegal surveillance and pornography capture of surrounding BUILDINGS to force building owners to SELL-------humiliate, intimidate------just as is happening in my community as my NOSY NEIGHBOR captures my BUILDING trying to force ME and/or my LANDLORDS to LEAVE or sell building.

SAME THING.


Nolte – Disney’s Monsters Inc.: Harvey Weinstein, John Lasseter, and Mark Halperin


November 22, 2017 Disney’s, Halperin, Harvey, Inc., John, Lasseter, Mark, Monsters, Nolte, Weinstein

Nolte – Disney’s Monsters Inc.: Harvey Weinstein, John Lasseter, and Mark Halperin


Everybody knew! Everybody knew! Everybody knew!

Over and over and over again, as these non-stop allegations result in a long overdue reckoning for the cream of our media and Hollywood crop, we are told that Everybody Knew! But if there is a singular pattern, a black thread running through all of this, it is woven directly into the history of the Walt Disney Co.
Thus far, in a scandal that has unwound the careers of nearly 100 men, three of the most powerful of this unseemly Gang of 100 are directly connected to the Mouse House.


Worse still, the cries of Everybody Knew! are the loudest around these three former and current Disney employees, this unbelievably powerful trio of alleged abusers who reportedly preyed on women for years in their own Monstrous Kingdom, who are almost certainly going to go into the history books with the word “disgraced” attached to their names.



The Walt Disney Co. is a corporate leviathan with tentacles that go well beyond its theme parks, its studio, and its merchandising machinery.


Between 1993 and 2005, Disney owned Miramax while Harvey Weinstein ran it and thrived and made everyone millions.


Between 1996 and 2006, Disney owned ABC News while Mark Halperin’s influence and power exploded.
Since 2006, John Lasseter has been a top executive at Disney and chief creative officer at Pixar, which is also owned by Disney.



Weinstein’s alleged crimes and the fact that they were no secret within the media and entertainment industries, has already been well-documented.  Worth repeating, though, is the news that Weinstein settled eight sexual harassment suits (that we know of), and the most infamous one so far (the alleged rape of Rose McGowan) occurred in 1997, smack dab in the middle of Weinstein’s Disney era.



According to the latest reporting on Mark Halperin, all of his alleged sexual misconduct — which involves around ten women who claim they were victims of everything from harassment to unwanted touching to being shoved to watching Halperin masturbate under his desk  — happened while he was at ABC News. And once again, we are being told that this was an “open secret” at ABC/Disney.


Finally, there is John Lasseter who put himself on a six-month leave of absence Tuesday in the wake of a number of allegations of harassment and sexual misconduct. According to Variety, for decades there was a “whisper campaign” at the Disney-owned company about Lasseter’s alleged predations:



Many former female Pixar employees said there was a classic whisper network at the animation company, where young women were advised to keep their distance from the co-founder.


Another former employee told Variety that she was cautioned about Lasseter soon after she started work there, in the late 1990s.
“Just be warned, he likes to hug the pretty girls,” she said she was told. “He might try to kiss you on the mouth.”
…
Another former employee said that after Pixar grew out of its Point Richmond office and moved to Emeryville in 2000, Lasseter’s behavior became more brazen. She said he would walk up to women in the office and kiss them on the lips.
…
She said she also heard from co-workers who told her that they had to hide from Lasseter at wrap parties. She said she never reported these issues because the systems were not in place to address the problem.



According to the Hollywood Reporter, Lasseter was known by company “insiders” for “grabbing, kissing, making comments about physical attributes.” It gets worse…



A longtime insider says he saw a woman seated next to Lasseter in a meeting that occurred more than 15 years ago. “She was bent over and [had her arm] across her thigh,” he says. “The best I can describe it is as a defensive posture …  John had his hand on her knee, though, moving around.” After that encounter, this person asked the woman about what he had seen. “She said it was unfortunate for her to wear a skirt that day and if she didn’t have her hand on her own right leg, his hand would have traveled.”



The same source said he once noticed an oddly cropped photo of Lasseter standing between two women at a company function. When he mentioned that to a colleague, he was told, “We had to crop it. Do you know where his hands were?”



No one in the elite media is going to go after Disney or connect these dots or demand some accountability from a company that for years employed and apparently enabled and empowered three men who allegedly and systemically (for years) treated subordinate women in ways that range from wholly-unacceptable to unspeakable.



Disney will be protected for two reasons. 1) Disney is a left-wing company. 2) Disney’s Rupert Murdoch, its chairman and CEO, is Bob Iger, a longtime Democrat who raised money for Hillary Clinton’s presidential campaign, who resigned from a Trump advisory council after the president pulled out of the Paris Climate Agreement, and who is now registered as an Independent — a move many see as the first in a 2020 bid to unseat Trump.


No, Disney will be enabled and protected because as we have seen over the last eight weeks, America’s beautiful people within Harveywood and the mainstream media come in only three packages: 1) Those who abuse women. 2) Those who enable those who abuse women. 3) And the victims of #1 and #2.


The media will work overtime to smother any inconvenient Disney truths, so this might be the only route to full corporate transparency and accountability.
**********************************************************




(AP/Andrew Harnik/Jose Luis Magana) Pizzagate, explained: Everything you want to know about the Comet Ping Pong pizzeria conspiracy theory but are too afraid to search for on RedditHow this incredibly stupid and dangerous piece of fiction captured the lurid imaginations of many gullible people


Andrew Breiner
December 10, 2016 9:00PM (UTC)
"Pizzagate" seems like too cute of a name for a conspiracy theory that's escalated to the point that an armed man actually drove up the East Coast to "self-investigate" whether a D.C. pizza restaurant had a secret pedophilia dungeon in its basement, ending with him shooting his assault rifle inside the restaurant and being arrested.


But the name stuck. The story seemed like a hilarious curiosity in the weeks before the presidential election. Taking the so-called Pizzagaters seriously seemed about as sensible as taking the possibility of a Donald Trump presidency seriously, and both seemed like relatively safe targets for poking fun.



But just as many expected a return to the rational world after Trump's defeat, only to wake up on November 9 living in Trump's world, this bizarre pizza-pedophilia piece of make-believe seems to have struck the right kind of nerve in this simultaneously gullible and paranoid time to become a lasting, serious concern.
Sometimes a slice is just a slice
Pizzagate started, as so many things have in the last few months, with Wikileaks. When Wikileaks released emails from former Hillary Clinton 2016 Campaign Chairman John Podesta's account, most commentators honed in on the ones showing Clinton allies speaking candidly and sometimes disparagingly about the candidate and her associates, as well as about policies like a federal $15 minimum wage.

00:00 00:00 00:00 00:00 00:00 00:00 00:00 00:00 00:00 But a small number of people on message boards like 4chan and Reddit were more interested in seemingly mundane emails about small social gatherings and parties hosted by Podesta and his friends. Specifically, they noticed that these emails mentioned pizza a few times.



Boldly disregarding the simple explanation that the emailers, like most Americans, eat pizza regularly and find it to be an easy food to serve and eat while socializing, self-appointed Internet detectives decided that "pizza" was a complex code for pedophilia. Using this code, Pizzagaters claim, Podesta and his well-heeled pals could brazenly discuss their plans for throwing disgusting sex parties exploiting enslaved children, in between exchanges about Clinton's campaign strategy and setting up conference calls.


It's important to note that since the theories that would become Pizzagate began on 4chan and Reddit, sites known for trolling people with cruel, complicated pranks, it's likely that many of the conspiracy theory's originators were joking — coming up with absurdities to entertain themselves.



But it took a very short time for /r/Pizzagate, the now-closed Pizzagate-focused Reddit subforum, or subreddit, to fill with people who appeared to be true believers. The theory also became popular on Reddit’s “The Donald,” a hub for Trump supporters. From there, Pizzagate caught the attention of conservative fake news sites, minor white supremacist celebrities, and supporters of Turkish President Recep Tayyip Erdogan. It's been amplified for unknown reasons by Twitter bots traced to the Czech Republic, Cyprus and Vietnam.
Everyone's in on it
The theories grew to engulf pretty much anything that could be linked to Podesta, or anyone who had ever met him. That's how they landed on Comet Ping Pong, a popular family-friendly pizza restaurant in Washington, D.C., that also hosts occasional punk shows. James Alefantis, owner of Comet as well as other nearby restaurants, used to date David Brock, head of a pro-Clinton group, and John Podesta knew Alefantis and ate at the restaurant. If "pizza" is code for pedophilia, the rumor mongers reasoned, clearly a pizza restaurant is the dungeon where all the horrors go down.



Though the whole idea of the conspiracy was clearly unhinged from the start, this is where things became especially personal and frightening. Conspiracy theorists began pouncing on any social media posts involving children, adding foul comments attempting to read abuse into innocent photos.

Threatening phone calls regularly harassed and frightened employees of many restaurants near Comet, and other pizza places in D.C. that theorists decided must be linked to the pedophilia ring because they also serve pizza. Anything they decided looked "creepy" or "wrong" was thrown into the evidence bin without question, from the dark album art of a band that had played at Comet, which they deemed satanic, to an email describing a handkerchief with "a map that seems pizza-related." Even modern-art murals on the walls of the restaurant were implicated. Anyone remotely connected to a piece of so-called evidence became a target for threatening phone calls and social media messages.


In one particularly bizarre incident, a participant in /r/Pizzagate claimed to have hacked the website of a D.C. pizza restaurant called WeThePizza with a friend who was killed or captured in the process, and found an actual menu of child sex services offered, as well as child pornography. Shockingly trusting conspiracy enthusiasts apparently downloaded the files this person provided before realizing that "I was investigating pizzagate" would not be a great defense against criminal child pornography charges, and publicly panicked on the forum.
0 Comments

February 26th, 2019

2/26/2019

0 Comments

 
Today's DEPOSITION brings one more comment on SCAT PORN------every population group is vulnerable to exposure from sales of this kind of PORN.  Senior living facilities where aging citizens having urine or bowel dysfunction---often messing clothing needing to clean and change-----can be captured on surveillance cameras ---both institutional public space capture ----or inside private homes.  What is one person's MESS is another person's SCAT PORN-----tied to sexual arousal.  Baby CAMS------or illegal surveillance capture of light bulbs, smoke alarms, TV CAMs can have NOSY NEIGHBOR AND THE GANG capturing images of BABIES DIAPER CHANGE-----great blend of CHILD PORN and SCAT PORN.  I speak mostly about TOILET CAMS------URINAL CAMS-----tied to SCAT PORN.


Continuing my thoughts on what a NOSY NEIGHBOR AND THE GANG network looks like regarding hierarchical power and profit gains....I discussed the categories of individual houses or apartments with a NOSY NEIGHBOR having a WEBCAM tied to THE GANG led by person at next level ----having the HOSTING SERVER which receives each day's NOSY NEIGHBOR WEB CAM continuous video feeds.  I want to look at smaller networks like individual homes and row house/duplex apartment as operating WEB CAMS sending video feed to HOSTING SERVERS. 

I want to distinguish between power structure and profits in looking at several instances of operations by small time NOSY NEIGHBOR AND THE GANG networks then follow with this same analysis for those national property building owners and large institutions acting as large-scale NOSY NEIGHBORS AND THE GANG.

My building for example has 3 floors ---3 apartments.  Two apartments are rather small only one or two people capable of living comfortably----one floor larger able to hold two adults or a family with child.  This is typical of all communities in Baltimore.  My community having mostly college students-----single adults----mixed with families having a child or two.

When a home or apartment is WEB CAMMED whether knowingly by a landlord or unknowingly by NOSY NEIGHBOR AND THE GANG illegal surveillance capture of someone elses building, all people inside that building are being made victims of illegal surveillance and pornography.  So, a house as family home with husband, wife, children are each made profits from surveillance video feed attached to WEBCAM sending daily feed to HOSTING SERVER.  Wife, husband each wake in morning take showers---each undress and redress for day-----children undressing -----each doing toilets.  Then, each come home after daily routine changing clothes again---doing toilets again.  At end of day each family member is again possibly bathing-----changing clothes for bedtime.

PORNOGRAPHY images are represented in each case.  The husband is captured in TOILET CAM-----taking that morning shower-----dressing for work.  The wife is captured for each as well.  The images of TOILET CAMS sent as video feed each day to HOSTING SERVER is sorted for being SCAT PORN----or simple soft porn exposing naked that person in process of toileting.

Those images of each family member changing cloths is also sent in video feed daily used as SOFT PORN.  Images of each family member taking a bath/shower sent as another category of SOFT PORN----showering brings more profit then simply changing clothes for example.

The bonanza for NOSY NEIGHBOR AND THE GANG during that one day is capturing a husband and wife having SEX----HARD PORN------

Images of each child/baby sent in video feed and separated as CHILD PORN.

ALL OF THIS IS CAPTURED EACH DAY------WEBCAM operated by NOSY NEIGHBOR downloads and sends daily CAMS to HOSTING SERVER controlled by the next level of power------


I shared an example of how much money a global technology corporation like AIRBNB gives a homeowner for being a WEBCAM site -------$6,600 in annual pay for allowing continuous WEBCAM feeds be captured via AIRBNB.  This is a flat rate not taking in to consideration illegal surveillance and pornography images.  The second tier POWER -----HOSTING SERVER for example earns that $6,600 each year for each house he/she has WEB CAMMED.  NOSY NEIGHBOR operating the WEBCAM getting only a small percentage of that $6,600----peanuts to next level HOSTING SERVER guy.

NOSY NEIGHBOR gains income from each pornographic image he/she can capture in course of day.  An article indicates $20 for each porn image ----estimate------so, if the family described above is hit  possibly 6 times in separate PORN categories------that would bring $180 a day from that one WEBCAM HOUSE.  The second level HOSTING SERVER guy gets most of this---NOSY NEIGHBOR gets a small percentage of these PORN CAPTURE revenue each day.

One other source of income from that daily WEBCAM video feed--------global corporations buy general video WEBCAMS of simply people living in these homes----cooking, cleaning, taking care of children minus any PORN.  These bulk video feeds sent each day from WEB CAMS to HOSTING SERVERS sort out images PORN VS GENERAL ACTIVITY FEED.  Global corporations pay a rate for accessing that daily general activity feed-----

AIRBNB global corporations paying a DAILY RATE for allowing WEBCAM in a house/apartment------global corporation comes and buys general video feed paying a rate for this.  Second level HOSTING FEED guy getting bulk of what these two global corporations pay for WEBCAM feeds.  NOSY NEIGHBOR no doubt gets a small percentage of these totals.

The above description was a FAMILY HOME captured by WEBCAM using example family of three.  Rowhouse/duplex apartment often add to that number of victims-----each floor apartment having one person----possibly two-----the large apartment having possibly family with children.

Now, here in Baltimore as other US CITIES -----zoning laws regarding number of people allowed to live in row house apartment for most of last century would have the above number of people as potential victims to NOSY NEIGHBOR AND THE GANG.  Several years ago, cities like BALTIMORE passed city code on zoning ending that limit per row house---opening the door to one apartment having as many as 6-10 people living like worker dorm---college dorm in shared apartment space.  If we look at the difference between my apartment building having a total of 3-5 people vs the rotating dormitory stacking of people into row houses apartment having 6-10 people ----we see that profit from PORNOGRAPHY in each category triple------ergo, $180 each day becomes $540 each day.

SO, THE DRIVING GOAL OF ILLEGAL SURVEILLANCE CAMERA AND MICROPHONE-----GENERAL VIDEO FEED AND PORNOGRAPHY IS TO GET AS MANY PEOPLE INTO THAT WEB CAM BUILDING AS POSSIBLE.

Want to bet our political machines passing all these zoning laws as SOCIAL BENEFIT-----seeming unable to notice SATURATED NOSY NEIGHBOR AND THE GANG black market pornography-----OWN those buildings holding the most people-----made victims of ILLEGAL SURVEILLANCE AND PORN.

HERE IN BALTIMORE, THIS NOSY NEIGHBOR AND THE GANG BLACK MARKET IS LIKELY THE TOP INDUSTRY EARNER IN PROFITS.




0 Comments

February 25th, 2019

2/25/2019

0 Comments

 
Next week still writing DEPOSITION for NOSY NEIGHBOR AND THE GANG ----illegal surveillance by camera and microphone and pornography----I will look at CATEGORIZING these continuing acts-----legal definitions-----statutes. At this point I am looking at the legal definition of DEPRAVITY OF MIND------


Below we see what is simply these few decades of far-right wing, global banking 1% CLINTON/BUSH/OBAMA march towards US AS FAILED NATION/STATE-----where 5% freemason/Greek players as FAKE religious leaders have corrupted all our 99% of WE THE PEOPLE religions---Muslim, Catholic, Protestant, Jewish, Hindi-Buddhist. Global banking 1% in MOVING FORWARD ONE WORLD ONE GOVERNANCE ----killing all these religions heading for 3000BC HINDI-BRAHMIN.



When I make a police complaint about illegal surveillance inside my apartment-----at public toilets ---and a response of disbelief comes from those required to take these concerns seriously----these are the stats I will use in lawsuits to show the ever-growing CIVILIZED PORNOGRAPHY effect of far-right wing neo-liberal think tanks feeling our US 99% WE THE PEOPLE have no right to societal morals and ethics-----values keeping global corporate pornography and prostitution at bay.

'Southern Baptist Convention: More than 200 ministers, deacons and others have been found guilty of sex abuse, report says

A total of about 380 Southern Baptist leaders and volunteers have faced allegations of sexual misconduct, a newspaper investigation found'.

Our US 99% OF WE THE PEOPLE are not losing their religion---not losing those AGE OF ENLIGHTENMENT humanist philosophic political structures of MORALS, ETHICS, RULE OF LAW, GOD'S NATURAL LAW----it is only a very small global banking 5% freemason/Greek players to include NOSY NEIGHBOR AND THE GANG.

*************************************************************


'DEPRAVITY OF MIND


An aggravating circumstance of murder in the first degree is where the murder involved depravity of mind.



The condition of mind described as depravity of mind is characterized by an inherent deficiency of moral sense and integrity. It consists of evil, corrupt and perverted intent which is devoid of regard for human dignity and which is indifferent to human life. It is a state of mind outrageously horrible or inhuman'.


*******************************************************************


DEPRAVITY OF MIND as regards my DEPOSITION tied to NOSY NEIGHBOR AND THE GANG----illegal surveillance and pornography will take from a long history of psycho-sexual crimes and the tools used by courts to assess when crimes become DEPRAVITY OF MIND.  Just a few examples of crimes with a history of this designation-----WW2-HITLER NAZI abuses start with identifying and singling out one population then another; then segregating into ghetto; then creating labor camps; followed by concentration camps; ending with death camps.  What starts as ordinary war footprint turns to crimes against humanity in stages------the final stages being deemed DEPRAVITY OF MIND by International Criminal Courts.  In this case a DEPRAVITY STANDARD was developed for legal prosecution.

Another example of DEPRAVITY OF MIND also with COURT STANDARDS in legally assessing is SERIAL KILLERS.  First, that killer kidnaps a victim; then killer imprisons that victim; then killer tortures in some way that victim often in DEPRAVED WAYS; ending with death of victim.  In cases of murder, this is the STANDARD MEASURE OF DEPRAVITY.


In my case, NOSY NEIGHBOR AND THE GANG using illegal surveillance with camera and microphone creating continuous video of my living space and all my actions and conversation start with profiting from video sold as HOW PEOPLE IN WESTERN NATIONS LIVE for example showing only video feed of victims walking through their home----showing them cooking, cleaning, taking care of children.  Then these video start bringing profit by revealing what is called SOFT PORN where victim is captured in various stages of undress---skin porn.  Then the progression goes to HARD PORN as victim is captured on video during sexual acts.  Then we have final stages where victim is shown on video doing what US 99% of citizens and our US history call DISTASTEFUL------DEVIANT---DEPRAVED porn-----that is DEFECATION PORN------


'The original version of this story was titled "Why Is the Guy Who Made 2 Girls 1 Cup Going to Jail?"

Ira Isaacs, the "guy" in question, did not produce 2 Girls 1 Cup. He did, however, make scat porn, which has landed him a jail sentence for obscenity.


For a lot of you reading this, it may seem a bit strange that the production of a video where people poo on each other can be deemed illegal, let alone worthy of four years in jail. Who was hurt? There’s nothing in any of the Department of Justice reports that say these girls were being filmed against their will, so who cares? Apparently, Ira’s case was initiated by the Department of Justice’s “Obscenity Prosecution Task Force,” (OPTF for short)'




I include this as a last category of illegal porn images captured by NOSY NEIGHBOR AND THE GANG with intent to profit as well as to use in psycho-sexual warfare in intimidation/humiliation/character assassination.



'coprophilia

(redirected from Scat porn)
Also found in: Dictionary.
coprophilia [kop″ro-fil´e-ah]

an absorbing interest in feces or filth, particularly a paraphilia in which sexual arousal or activity is linked to feces'.



About the Research FAQ Take the Survey Advisory Board Media Contact Us
About the Depravity Standard Research



Home > About the Depravity Standard Research
What we’re doing: An overview



The Depravity Standard research addresses arbitrariness in criminal sentencing by operationalizing an evidence-driven distinction for legal terms such as “heinous,” “atrocious,” “evil” and “depraved.”



The research will ultimately develop a classification reference to inform sentencing decisions and release determinations based upon the components that make certain crimes more severe than others. The Depravity Standard’s focus on evidence of intent, actions, victimology and attitude promote guidelines that are racially and socio-culturally blind, consistently applied across jurisdictions, and easy for judges, jurors, and other justice officials to apply.




Large-scale public participation in the Depravity Standard surveys helps to establish consensus, across various demographics, of what intent, action, victimology and attitude items make a crime depraved, and how depraved each item is. The Depravity Standard will ultimately reflect a foundation of public opinion. As such, it is the first forensic science or justice project ever developed in which society (and future jurors, victims, and defendants) collectively shapes future criminal sentencing. Data from the public input to the Depravity Standard converges with data mined from hundreds of adjudicated cases to establish statistical thresholds for low, medium, and high depravity crime.


Why we're doing it: Our Mission



Many states rely on “aggravating factors” that escalate sentencing once a defendant is found guilty. One such factor is the depravity of the crime. A defendant found guilty of an especially depraved, heinous, atrocious, cruel, inhuman, or vile crime may have years added to their sentence, or be sentenced to the death penalty. However, while descriptors likes “evil,” “heinous” and “depraved” have been upheld as constitutional, there is no standardized, consistent, clear definition for the terms.



Current specifications within the United States, established in higher court decisions and applied by lower courts, vary from state to state, or even between courts in the same state. With ill-defined instructions, judges and jurors have little direction as to what makes a crime “depraved” and are forced to rely on subjective, often emotion-driven, court-arguments. In certain instances, these potentially uninformed decisions, which are then vulnerable to bias, can mean the difference between life and death.
Our research, which is grounded in higher-court decisions, refined by public opinion, and validated with actual large-scale case sampling, will operationalize an evidence-focused Depravity Standard to assist judges and juries. The instrument will measure specific intents, actions, victimology, and attitudes of criminal activity – the “what” of a crime, as opposed to the “who” or the “why.” In distinguishing depraved aspects of a crime’s fact pattern, sentences applied due to a depravity-based aggravating factor will be done so without relying on arbitrary subjective opinion, but specific criteria.



The Depravity Standard instrument will only be used as a guideline to aid the trier of fact in assessing evidence relevant to its sentencing decisions on questions of depravity – a decision made by the judge and juror and not by a Depravity Standard.



The U.S. Supreme Court has promoted the need for guidance to assist the trier of fact in matters of jury inexperience. The Depravity Standard and its research accomplishes exactly that mission.


Among other applications, The Depravity Standard will also assist parole boards and other corrections agencies charged with classifying crimes by severity in order to inform early release decisions. Evidence-based release decisions, promote fairness and limit bias in efforts to relieve prison overcrowding.


How we’re doing it: A multiphase process


Background


In Furman v. Georgia (1972), the U.S. Supreme Court ruled that the death penalty could be reserved only for a narrowed class of defendants, and that narrowed class could not be arbitrarily defined. In response to the Court’s ruling in Furman, states created laws that distinguished potential mitigating and aggravating factors (including the already-in-use “heinous,” “atrocious,” and “cruel” distinctions) in cases being considered for capital sentences.


In Gregg v. Georgia (1976), the Court upheld the use of the “heinous, atrocious and cruel” aggravator as constitutional. The same decision, however, acknowledged the jury’s burden to weigh factors despite a lack of expertise, and noted that this quandary could be alleviated with guidance regarding the factors about the crime and the defendant that “society deems relevant.”



Additionally, in Walton v. Arizona (1990), the Court clarified that aggravating factors need to be identified through objective circumstances.


The Depravity Standard research objectives have been developed in order to fashion an instrument that assists jurors, while emphasizing details and objective circumstances over impressionism, and fairness over arbitrariness, as mandated by the courts in Furman, Gregg, and Walton.



Laying the foundation


In 1998, psychiatrist and lead researcher Michael Welner, M.D. reviewed over 100 appellate court decisions where jury findings of “heinous” or “depraved” were challenged and upheld and reversed. Through this review, he identified details of perpetrators’ intents, actions, and attitudes that inspired these decisions, and distilled those details down to common features. The features were then organized in accordance with psychiatric diagnostic constructs; specifically, antisocial personality, psychopathy, malignant narcissism, antisocial-by-proxy, sadism, and necrophilia. Fifteen items emerged from this exercise, intents, actions, and attitudes as had been signified by American courts, establishing content validity.


Dr. Welner then prepared vignettes of fictitious homicides and provided them to attendees of law and forensic science lectures on the legal dilemma of undefined terminology denoting “evil.” Respondents were asked to volunteer hypothetical examples of intent, actions, and attitudes that would distinguish that crime as the “worst of the worst,” with application to crimes beyond homicide. The exercise sought to more fully account for the range of human choices and behavior that might manifest itself through violent or non-violent criminal acts.


Through the data gathered from this exercise, the original 15 items expanded to 26 items for further consideration of inclusion in the Depravity Standard. These items were then referred for further study in Phase B, the Depravity Scale.


Phase B - The Depravity Scale: Establishing public consensus


Phase B was an internet-based study designed to collect public opinion on what features of a criminal act represent depravity. The 26 items of specific intents, actions, and attitudes of a crime, developed from Phase A, were presented in the study, along with examples of each. Participants rated each item as “especially,” “somewhat,” or “not” depraved. One item with heavy overlap to others was dropped from consideration, leaving 25 items for continued study.


Phase B’s purpose was to assess which of the studied items could achieve consensus support (regardless of demographic and background differences) as reflective of a depraved element of a crime. Phase B did not identify any items that should be eliminated from the final instrument. Public response found that all items represented an aspect of a depraved crime, and has allowed us to rank the items from 1 (most depraved) to 25 (least depraved) based on the public’s responses.



Phase C - Ranking depravity


The goal of Phase C was to establish how the items on the Depravity Standard should be weighted when present in a given crime. We recognized that even if participants rated a number of the Phase B items as representative of depravity, some qualities of a crime may be even more depraved, even much more depraved, than others. Therefore, Phase C compared the items under study to one another. Participants are asked to rank the items from “least depraved” (1) to “most depraved” (5), when presented in randomly ordered groups. This allowed us to determine a ranking of most to least depraved, similar to Phase B results.


Phase D: Validation


Concurrent to collecting public opinion on these 25 items, we are in a phase of validating the application of the items to actual murder, assault, sex crime and non-violent felony criminal cases. Our research team is collecting and reviewing hundreds of closed convictions, randomly selected by jurisdictions all over the country for inclusion, and data mining them to discern aspects of depravity as defined and ranked in phases A-C. Data from Phase D will determine the validity of the tool in its application to real cases.


Phase E- Weighing depravity


We have established that our list of 25 items are at least somewhat, if not especially representative of depravity. We also determined a ranking system from most to least depraved items. Phase E aims to establish the weight of each item by measuring the amount of depravity the public attributes to each item. Weighting the components of each case will assist judges and juries to make more informed decisions in comparing similar crimes based on degree of depravity.


The Depravity Standard: The Instrument



There is no available inventory or methodology to assess whether specific crimes are reflective of depravity – there is no standardized definition of depravity in the first place. By identifying and refining items for inclusion on the legal instrument, we are delineating the meaning of depravity as a byproduct of court-decisions, public survey, and case sampling. In this manner, the Standard will provide not only an instrument, but a reference point.


When complete, the Depravity Standard will focus inquiry on intents, actions, victimology, and attitudes of a crime in order to minimize reliance on subjective judgments and presumptions in reaching sentencing decisions. The Depravity Standard will insulate the assessment of what depraved factors are present in a crime from potential biases about who perpetrated the crime, or why.


The Standard will apply to any crime that is, as prescribed in a given jurisdiction’s sentencing code, eligible to receive a more severe sentence if the crime is “heinous,” “atrocious,” “depraved,” “evil,” or any such variant. This ranges from violent crime such as murder, rape, assault and arson, to non-violent crimes, including property offenses, fraud, and embezzlement.
The development of the instrument will meet a long-standing need within our criminal court system. Juries bear the burden of establishing “heinous, atrocious and cruel” will now participate in proceedings that focus on the presence or absence of given qualities of depravity, as opposed to the exercise of reaching into one’s gut with only the guidance of attorneys’ ability to argue. Parole and corrections officials will benefit from guidance that minimizes early release decisions that may favor bias or influence. The Standard will provide this guidance by presenting a tool that is grounded in law, structured on scientific principles, and refined by the public – the juries of today and tomorrow.

***************************************************

This week I will move from defining individual categories of harm from illegal surveillance to include pornography to identifying how two networks are created in NOSY NEIGHBOR AND THE GANG.  One network revolves around the UMBRELLA of power within this PORNOGRAPHY NETWORK and the other is the FINANCIAL/PROFIT gain from these illegal surveillance camera and microphone continuous stream video.



'A video surveillance system would enable further pervasive and repressive surveillance.

Making streams publicly available, too, would threaten every citizen’s privacy: A busybody neighbor could easily spy on the activities of the family next door as they run errands or go on vacation'.

Below I use ONE EXAMPLE of a global technology corporation platform being used to advance this public space surveillance and having a platform for individual building owners/homeowners place that building or capture a buildings next to them onto WEBCAM CAPTURE.

 In my case, I suggested two entities being large property/building owners as source of NOSY NEIGHBOR AND THE GANG illegal surveillance and pornography.  SOUTHERN MANAGEMENT CORPORATION owning a great number of high rise residential building no doubt using WEBCAMS as security as is well-known easily capable of hacking.  These WEBCAMS are often used by these high-rise residential building as well as individual residential buildings in rental advertising AKA rental space webcams allowing apartment hunters to view inside apartment for rent.  Know what?  Just because a property management corporation rent that apartment does not mean that inside WEBCAM has gone off.  As well, a community having a heavy concentration of residential housing owned by one family/property owner-----can as well end with WEBCAMS inside apartments also left on after one tenet leaves and next moves in. 

These WEBCAMS having been around for a decade or two are located on what is called HOSTING SERVERS owned by other global technology corporations.  This creates a network through which products like WEBCAMS and those videos PASS.




Trevor Timm column
Internet of things

The government just admitted it will use smart home devices for spying


Trevor Timm


Many consumers are wholly unaware that the smart devices making their home more custom and responsive are making data that can be hacked or collected


@trevortimm

Tue 9 Feb 2016 15.29 EST Last modified on Tue 9 Feb 2016 15.39 EST


'Tentler told Ars that webcam manufacturers are in a race to bottom. Consumers do not perceive value in security and privacy. As a rule, many have not shown a willingness to pay for such things. As a result, webcam manufacturers slash costs to maximize their profit, often on narrow margins. Many webcams now sell for as little as £15 or $20.


Then there are the rampant security issues with the internet of things that allow hackers – whether they are criminal, government or something in between – to access loads of data without any court order, like the creeps who were eavesdropping on baby monitors of new parents. Just a few weeks ago, a security researcher found that Google’s Nest thermostats were leaking users’ zipcodes over the internet. There’s even an entire search engine for the internet of things called Shodan that allows users to easily search for unsecured webcams that are broadcasting from inside people’s houses without their knowledge.



FTC to the rescue?


When it comes to strong-arming manufacturers, government entities like the US Federal Trade Commission (FTC) may be able to help. Ars UK spoke with Maneesha Mithal, associate director of the FTC’s division of privacy and identity protection, and she was quick to mention several examples where the organization went after at-fault companies. In recent years according to Mithal, the FTC has prosecuted more than 50 cases against companies that did not reasonably secure their networks, products, or services'.

************************************************************

I discuss often the DARK WEB and its ties to DARPA----tied to global private military complex-----to include much criminal activity. 

All that public space surveillance captured from our streets, sidewalks, alleys are channeled into super-computers here in Baltimore located on global banking 1% Johns Hopkins hedge corporate campus.  All this mega-data of everyone in the city heading to HOST SERVERS tied to sorting data to subject matter.  This too is what happens with WEBCAMS of residential buildings where buildings have its own HOST SERVER also routing data where that surveillance data is sorted by subject matter. 

So, if a building deemed a WEBCAM BUILDING is controlled by NOSY NEIGHBOR AND THE GANG-------each building sending data to HOST SERVER would see that video sorted according to the categories of illegal surveillance upon which I have written these few weeks.  From there an individual building having WEBCAM account tied to one NOSY NEIGHBOR-----would receive that small percentage of profit from each category of streamed WEBCAM video.  A illegal surveillance and pornography network like NOSY NEIGHBORS AND THE GANG would use the DARK WEB-----would use tools like TOR
SYSTEM to allow members of THE NETWORK to log-in to these pornography sites on DARK WEB.




'Cinema ModeOff
Spying through webcams just got easier

Shodan is making freeze-framed images from unsecured webcams available to the public.
cnbc.com3 years ago'


Below I show two categories represented on DARK WEB-----using TOR SYSTEM to post streaming WEBCAM videos of pornography according to subject----here CHILD PORN---REVENGE PORN.  This would include SOFT PORN, HARD PORN and SCAT PORN.


Anonymous Just Took Down 1/5 Of Dark Web's Child Pornography

anonhq.com/anonymous-just-took-down-more-than...


The hacktivists breached Freedom Hosting II — the largest host of Dark Web sites accessible only through Tor — downloaded gigabytes of data, and took down and defaced some 10,613 .onion websites. This means that the hack took down nearly a fifth of the Dark Web for hosting child pornography.



Revenge Porn Returns to the Dark Web
- Motherboard

motherboard.vice.com/en_us/article/53988z/...

A notorious dark web revenge porn site was shut down, but an archive of material from it has reappeared. ... Revenge Porn Returns to the Dark Web. ... The administrator of another pornography site ...


The Tor system: Welcome to the dark internet where you can search in secret

Every day, 15,000 people in Britain log on to an obscure online domain where they can search for anything they want in secret. The NSA whistleblower is a fan. It is anonymous. It is growing. And it is often criminal.

  • Charlotte Philby @philbycharlotte
  • Monday 10 June 2013


AIRBND is simply one WEBCAM HOSTING PLATFORM GLOBAL CORPORATION.  I am not suggesting this is the one being used by my NOSY NEIGHBOR AND THE GANG----but, one like it.

As seen in this article it is becoming quite popular for landlords, bed-breakfasts, high-rise apartments---HOTELS et al to use this WEBCAM hosting platform for advertising and marketing.  These WEBCAMS as stated are NOT TURNED OFF----ie, cameras end up hidden -----or devices in these living space remain captured for HOSTING NETWORK.


This article addresses surveillance cameras planted separately from devices I identify in my case----light bulbs, SMART TV/RADIO, smoke and carbon monoxide detectors.

The journalist KAMPING-CARDER working for WALL STREET JOURNAL not telling us how all those ordinary products/devices in living are captured.  One does not see a CAMERA LENS if hacking is occurring through LIGHT BULB----through SMOKE ALARM.



How to find a hidden camera planted by your landlord, Airbnb host or another creep


July 19, 2018 - 10:00am
By Leigh Kamping-Carder


Brick Underground supports our readers with product recommendations specifically curated for New Yorkers. If you buy something through our links, we may earn an affiliate commission.
If you tally up supers, landlords, doormen, roommates, house cleaners, dog walkers, nannies, pet sitters, and assorted friends and neighbors, you get a surprisingly large number of people that may very well have keys to an apartment you're renting or Airbnb-ing. Which means there are that many people who could potentially plant a hidden camera in your bookcase and secretly record your every move for their own sick pleasure.


[An earlier version of this post was published in 2014 and has been updated with new information in July 2018.]



Think we sound paranoid?


Possibly. But consider the case of Aksana Kuzmitskaya, a young woman who claimed her former landlords installed secret cameras in her bedroom and bathroom, filming her private life on 70-odd occasions. In exchange for cleaning apartments at their Upper West Side building, they had given her room and board. (Kuzmitskaya sued the two men she deemed responsible, and one—who had done the same to another woman--was ultimately sentenced to a year of therapy and ordered to stay away from his victims.)




In the interest of avoiding such an egregiously creepy situation, we spoke to Todd Morris, CEO of BrickHouse Security (no relation to Brick Underground), a Manhattan-based security and surveillance company, who enlightened us on how to spot a landlord spy, and what to do if you have one.


How do I catch someone filming me?

“The best thing to do is know when someone is in your apartment and they shouldn’t be,” says Morris, since that will be your first clue that they may have installed surveillance equipment. Common sense suggests that you should check that your stuff hasn’t been moved, but that's harder to do if you live with other people or animals.



“If you have pets or roommates, people become oblivious to things moving around,” says Morris, who jokes that someone could install a camera on his own rather messy desk and he’d never know it. Some New Yorkers who have two locks will purposely leave one unlocked so that if someone comes in and out of the apartment, heedlessly securing the deadbolt, for example, they’ll know they've had an unwanted visitor.


 

Another option is a bug detector. Starting at about $195 and roughly the size and shape of a deck of cards, the device can detect wired and wireless mics, cameras, and bugs, and comes with a camera detector attachment, which allows you to see bugs through a special lens, thanks to its emission of a high-frequency red light. (Plus, it’s portable enough to soothe all your dressing-room, hotel room, and Airbnb paranoias as well.) BrickHouse used to do their own sweeps at a cost of $1,000 for four hours, with apartments usually taking up to six or eight hours, but hasn't offered the service in a while because demand dropped after the technology became easy enough for an amateur to use, Morris says. 


What should I do if I find a hidden camera?

Don’t touch it; call the police, advises Morris. The cops will dust the equipment for fingerprints and, if they’re able to find any clues about the owner’s identity, will try to track them down. It’s wise to get the police involved before telling your landlord or condo/co-op board, according to Morris, as they may tell someone like the super, who could be the perpetrator.

What about surveillance in my own apartment?


It’s perfectly legal to use a hidden camera in your own abode, as long as it's not in a place where your nanny or roommate has a reasonable expectation of privacy, Morris explains. A living room or child’s room are fair game; the au pair’s bedroom or bathroom are not. A good rule of thumb: if a person would assume you’d knock before entering, you’re probably not allowed to plant a camera there.


Cameras made for apartment surveillance start at around $100, with the most popular models costing between $200 and $300, Morris says. Your basic model will have a time-stamped recording (so the footage will hold up in court) and a motion sensor (so it only records when someone enters the room, saving you from wading through hours of footage of nothing). “Hidden cameras come in all shapes and sizes,” says Morris. “They can really look like almost anything.” (Note: There's a federal law prohibiting the sale and use of devices designed to covertly record the voices of people without their consent, so most won't record audio.) 



What are the penalties for spying?


Planting a hidden camera could get your landlord slapped with trespassing and stalking charges. “If you catch someone in a state of undress—god forbid it’s someone underage—it could be even worse,” Morris says.


People are often caught because they post the footage online.


**********************************************************

 I will take this week to include in DEPOSITION not only the physical structure of THE NETWORK ---NOSY NEIGHBOR AND THE GANG----but as well, look at the profit---money-making side of THE PORNOGRAPHY NETWORK

Below the article shows a WEBCAM building hosted on AIRBNB-----could be unoccupied building using for security or could be an occupied building showing each room inside those homes.  So, $6,600 for what might be security footage video---or a base pay for allowing daily video feeds to be downloaded as MEGA-DATA.  Each one of these homes in South Dakota could be owned or hacked by a local NOSY NEIGHBOR AND THE GANG sending pornography video feed to AIRBNB platform.



This goes to my case claim of IDENTIFY THEFT in hiding and lying about lack of CONSENT for illegal surveillance


'Joseph Cox


The Dark Web as You Know It Is a Myth
The Rest of the Web Is Just as ‘Dark’

For years there have been sites where you can instantly buy a stranger's Social Security Number, date of birth, full name, address and phone number for under a dollar, or others that host reams of stolen credit card details, ripe for a fraudulent spending spree'.




Airbnb reveals how many in South Dakota opens their homes, and how much they make


Jeremy Fugleberg, Sioux Falls Argus Leader Published 11:03 a.m. CT Jan. 11, 2019 | Updated 11:44 a.m. CT Jan. 11, 2019



Airbnb released details Friday about its activity in South Dakota last year.

The hospitality company with the popular travel app and website said more than 900 people – or as the company calls them, "hosts" – opened their homes to a total of 72,800 guests in 2018. 


Hosts in South Dakota typically earned about $6,600 annually, for a total of $7.4 million Airbnb said. The company also noted that about one in four of its hosts are 60 years of age or older, highlighting how seniors are making money through home-sharing.



0 Comments

February 22nd, 2019

2/22/2019

0 Comments

 
My DEPOSITION needs to express the difference in legal standing----in statutes the term FIGHTING BACK as regards SEXUAL ASSAULT.  PHYSICAL ASSAULT defines FIGHTING BACK as the victim needing to physically repel the attacker.  NON-PHYSICAL ASSAULT----AKA NOSY NEIGHBOR AND THE GANG ILLEGAL SURVEILLANCE AND PORNOGRAPHY defines FIGHTING BACK differently.  Once I understood I was compromised inside my living space, I immediately worked to determine where any and all illegal cameras and microphones were installed in my apartment.  I was NOT required to FLEE my residence to meet the legal definition of FIGHTING BACK. 

I met the legal definition of FIGHTING BACK by first, trying as hard as possible to keep myself SAFE from capture of image by illegal camera tapping by NOSY NEIGHBOR AND THE GANG.  I met the legal definition of FIGHTING BACK by calling police and making an POLICE COMPLAINT.  Finally, I met the legal definition of FIGHTING BACK by advancing LAWSUIT against the illegal use of my image as PORNOGRAPHY.


Below, I post what is in Baltimore City our far-right wing global banking 5% freemason/Greek player as CITY ATTORNEY PRETENDING to be fighting for women's civil rights regarding SEXUAL ASSAULT.  I say PRETENDING because these statutes passed whether state assembly or city council which then are never ENFORCED -----are not left social benefit.  Baltimore City Attorney record of prosecuting physical sexual assault is dismal at best.  Absolutely no addressing saturated illegal surveillance NOSY NEIGHBOR AND THE GANG PORNOGRAPHY in every community in BALTIMORE and especially downtown in HOTELS et al.



'"For far too long in Maryland, we've been promoting a sort of rape culture," Baltimore's State Attorney Marilyn Mosby told the Baltimore Sun'.

Anyone wanting to create a lawsuit surrounding NOSY NEIGHBOR AND THE GANG---whether tenet or HOMEOWNER need to distinguish between FIGHTING BACK.....NON-CONTACT SEXUAL ASSAULT.


sexual assault

|
by Bethy Squires
|
Jul 27 2017, 1:29pm

Why Do We Still Have Laws that Say It's Not Rape Unless the Victim Fights Back?


In states like Alabama, outdated "earnest resistance" laws that require assault victims to fight back are still on the books.



The story of Megan Rondini—who reported a rape to Tuscaloosa police in July 2015, only to have the police side with her alleged attacker—has shocked millions of readers since Buzzfeed published an extensive report on the case in June of this year, not least because it highlights the antiquated state of rape laws in America. According to the account, 20-year-old Rondini had been out with her sorority sisters when 34-year-old TJ Bunn, a businessman from a prominent Tuscaloosa family, spotted her walking in the street and offered her a ride. He then drove her to his house, told her to go to his room, and insisted that they have sex. Rondini repeatedly told him she didn't want to have sex, but eventually felt like complying was the only way he would let her leave. After Bunn fell asleep, Rondini fled out his bedroom window. The police who investigated her claim did not believe that she had adequately resisted Bunn's advances. "Look at it from my side," an officer reportedly told her. "You never kicked him or hit him or tried to resist him." In this officer's mind—and according to the laws of the state of Alabama—it's only rape when the victim "earnestly" fights back.

Specifically, the legal definition of rape in Alabama is sexual intercourse in which the actor "uses forcible compulsion" or "the other person is incapable of consent" by reason of mental incapacitation, age, or physical incapacitation. In turn, "forcible compulsion" is defined as "Physical force that overcomes earnest resistance or a threat, express or implied, that places a person in fear of immediate death or serious physical injury to himself or another person." In practice, the vagueness of the phrasing leaves room for interpretation at every level: everyone from the beat cop taking a victim's statement to the judge presiding over a grand jury has a chance to personally define what resistance counts as earnest.


"Earnest resistance has been defined relatively loosely," says Kathleen Connolly of the Alabama Coalition Against Rape (ACAR). "Saying 'no' or putting your hands up has counted in case law."



"Very few states have in their codes that resistance is required," says Jennifer Long, the chief executive officer of AEquitas, a resource on violence against women designed for prosecutors. "But as a practical matter, when you have the use of force as part of the law, there is an insidious burden that's placed on a victim." The burden is psychological as well as evidentiary. "Rape victims are likely to self-blame, so when we actually say, 'Why didn't you fight?' we cause real psychological damage," says Long. "And that damage can be severe."

Maryland recently changed its definition of sexual assault to remove a requirement for physical resistance. "For far too long in Maryland, we've been promoting a sort of rape culture," Baltimore's State Attorney Marilyn Mosby told the Baltimore Sun. Montana also changed its definition of rape this year. Activists in Alabama are hoping to do the same. "I am hopeful," Meg McGlamery of the Crisis Center Birmingham. "It is time."

**********************************************************

I share this article from 1977 UNIVERSITY OF CHICAGO in regards to my case because it shows the point in which public policy geared to DEREGULATING our legal and societal attitudes toward PORNOGRAPHY were loosened driven by global banking 1% wanting to create SOFT PORN MAGAZINES------Larry Flint/Hugh Hefner-----as well as a SOFT PORN FILM INDUSTRY both of which over these decades moved to include HARD PORN----non-physical porn to physical porn.

What is called EXCLUSIVE OBSCENITY NUISANCE STATUTES were written with a goal of ending CRIMINAL STATUS for PORNOGRAPHY and creating a CIVIL STATUS for violating pornography legal precedence.  These NUISANCE STATUTES were directly aimed at CORPORATE PORNOGRAPHY and included the requirement of CONSENT by any citizen wanting to POSE for HUGH HEFNER----or be that PORN FILM STAR. 

These NUISANCE STATUTES in no way negated what has been several centuries of COMMON LAW----US FEDERAL LAWS regarding SEXUAL ASSAULT.


'and by the growing conviction among civil libertarians that any form of restriction on the availability of sexually explicit expression to consenting adults is incompatible with the first amendment.'

Above, we see far-right wing global banking 1% LIBERTARIAN views on public policy telling us there should be NO RESTRICTIONS to availability of SEXUALLY EXPLICIT EXPRESSION to consenting adults.  This means--------creating a business surrounding SEXUAL PORNOGRAPHY is a FIRST AMENDMENT RIGHT that trumps several centuries of COMMON LAW and US Federal legal precedence over PORNOGRAPHY. 

Again, the distinction between LEGAL PORNOGRAPHY-----between what CONSENTING ADULTS----even CHILDREN was still in place.



The University of Chicago Law Review
VOLUME 44 NUMBER 3 SPRING 1977


Civilizing Pornography:

The Case For An Exclusive Obscenity Nuisance Statute

Doug Rendlemant


Criminal penalties are increasingly perceived to be too severe for regulating obscenity.

Professor Rendleman shares this perception and suggests that we replace criminal obscenity laws with an exclusive civil sanction utilizing injunctions. He proposes a comprehensive nuisance statute and discusses the various issues that arise in the equitable regulation of pornography.


If there ever was a consensus in American society about the proper role of the government in controlling
pornography, that consensus is breaking down. To be sure prosecutors continue to enjoy popular support for pursuing the distributors of obscenity.

But the distributors have become emboldened by their own commercially lucrative, if silent, public support,  and by the growing conviction among civil libertarians that any form of restriction on the availability of sexually explicit expression to consenting adults is incompatible with the first amendment.'


In the face of this eroding consensus, the law, at least at the state legislative level, is moving slowly but inexorably toward less instrusive methods of regulating obscenity.

********************************************************

This Supreme Court ruling below made clear states may regulate HARD CORE PORN-----but may not regulate obscenity counter to FEDERAL LAW.   Again, these definitions are directed at PORNOGRAPHY businesses dealing in LEGALLY DEFINED PORNOGRAPHY.

A state cannot pass statutes skirting 300 years of COMMON LAW/FEDERAL COURT PRECEDENCE as to how ruling define NON-PHYSICAL SEXUAL ASSAULT----NON-CONSENT even with LEGAL PORNOGRAPHY.


The Court held that state regulation of obscenity must be limited to hard core pornography, defined by the following guidelines:


(a)
whether "the average person, applying contemporary community standards" would find that the work, taken as a whole, appeals to the prurient interest,

(b)
whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law; and


(c)
whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value."

Legal standings until today seek out and prosecute any PORN FILM/PORN PHOTO where ACTORS/CITIZENS are known to be NON-CONSENTING----AKA being FORCED into these sexually explicit capture of images as PORN.

This is today's NOSY NEIGHBOR AND THE GANG illegal surveillance and pornography black market must work so hard to create VOICE SOUND BITES ET AL making it appear those captured by illegal cameras are WILLING to be portrayed by these camera pornographers and not UNWILLING ----NO CONSENT victims.

I started today's DEPOSITION parsing the history of NUISANCE LAWS tied to PORNOGRAPHY to lead into what NUISANCE LAWS cover now.  My neighbor may be that NOSY NEIGHBOR AND THE GANG-----tapping into my apartment/someone BUILDING/HOUSE to gather PORNOGRAPHY------thinking it may fall into a category of NUISANCE PORNOGRAPHY.  I want to clear in this lawsuit-------there is no such thing as NUISANCE PORNOGRAPHY when it is tied to ILLEGAL COLLECTION OF PORNOGRAPHIC IMAGES.

Again, I am a tenet seeking justice for myself, but as well my DEPOSITION wants to include BUILDING OWNERS/HOMEOWNERS being either victims of illegal surveillance pornography or being FORCED to have a building captured by neighboring PORNOGRAPHERS.


If someone is a building owner being squeezed by these criminal pornography cartels forced to either allow tapping of devices or forced to sell property in order to avoid being made a NOSY NEIGHBOR AND THE GANG PORNOGRAPHER-----both legal cases need to distinguish between NUISANCE LAWS tied to pornography and current legal standing clearly identifying ILLEGAL PORNOGRAPHY or it distribution via internet is not PROTECTED under NUISANCE LAWS.


Being victim of NOSY NEIGHBOR AND THE GANG in private living space------one type of NUISANCE-----vs being victim of TOILET CAM for example inside business or institutional PUBLIC toilets.



There are two basic types of nuisance suits.


These are private and public nuisance actions.



Property Rights: My Neighbor is a Nuisance

By submitting this form, you agree to Findlaw.com's terms. We respect your privacy.

In the early days of this country, land was abundant and neighbors were distant. As the population began to grow and urban areas increased, the courts were called upon to resolve property disputes. One of the very first judge-made doctrines applied to property disputes in the United States, the law of nuisance, was inherited from England. This doctrine still finds its way into property disputes today. At the risk of oversimplification, this doctrine is generally raised when a neighboring property owner is acting in a manner that can be described as a nuisance.

The Law of Nuisance

Lawsuits invoking the law of nuisance typically involve neighbors suing their neighbors or a public official suing a property owner for the benefit of the general public. By bringing suit, the plaintiff usually seeks to control or limit the use of the land owned by the defendant.



There are two basic types of nuisance suits.


These are private and public nuisance actions.

A private nuisance means there has been a loss of the use or enjoyment of property without an actual physical invasion of that property. An action for a physical invasion of property is known as a trespass action. A public nuisance is one that has more far reaching effects. It has the ability to affect the health, safety, welfare, or comfort of the public in general.



No matter what the type of nuisance, to be subject to injunctive relief, the interference with the property must be substantial and continuous. Relief that is injunctive in nature generally requires the defendant to take some specific actions to minimize the negative effect of its operations on the plaintiff, from limiting the hours of the action to placing an all out prohibition on the negative action. In constructing its relief, however, most courts will attempt to balance the relative hardships to both of the parties involved in the action. Especially where an ongoing business, as opposed to an individual, is the defendant in the action, the court will try to minimize the economic impact on the business.



How Courts Decide Cases

In deciding nuisance disputes, several factors influence courts. First, courts will look at the location in which the alleged nuisance is occurring and any applicable zoning restrictions that may apply to that area. For instance, a court may be less likely to place restrictions on a livestock feedlot located in a rural area than on one located at the edge of urban sprawl. On the other hand, no matter how rural, if the feedlot is located in a "residential" zone, a court may be more likely to allow injunctive or other relief. At the same time, the fact that an activity is located in area that is zoned for that type of operation does not mean that it cannot be found to constitute a nuisance. For example, an area may be zoned to allow a mixture of residential and commercial building, and, a court might still find that an "all night" gas station creates a nuisance for the residential property owners in the area.



There are some other points to consider if you are thinking about bringing a nuisance action. First, a mere fear of future injury will not merit injunctive relief. Further, usually pure aesthetic considerations, such as the "look" of a funeral home in a residential area, will not rise to the level of a nuisance. Finally, where a person specifically purchases property knowing that a given operation is located nearby, the "moving to the nuisance" doctrine will usually prohibit injunctive relief. In this manner, if a person moves into a house located next to a baseball field, this doctrine may prohibit the person from seeking relief from the bright lights and noise.

Is Your Neighbor a Nuisance?
Get Legal Help with Your Property Rights

Being on either side of a nuisance lawsuit is not a pleasant experience and can be quite emotionally draining. Lawsuits like these arise when disputes between neighboring property owners go unresolved. If your neighbor is making it difficult for you to enjoy your property, you may want to reach out to an experienced real estate attorney to help you get to a resolution.



0 Comments

February 21st, 2019

2/21/2019

0 Comments

 
I took yesterday to bring International Human Rights ICC law relevant to my case of NOSY NEIGHBOR AND THE GANG to set the stage for how widespread over several centuries both Old World Western Europe and US by COMMON LAW and BILL OF RIGHTS/CONSTITUTIONAL RIGHTS enshrined through 300 years in US these protections from SEXUAL ASSAULT/PREDATORY SEXUAL NETWORKS.

The ICC and International Human Rights sprang from abuses of WW2----including SEXUAL ABUSES/ENSLAVEMENT always tied to global military actions.

I deliberately reach for those very WAR ZONE activities of PSYCHO-SEXUAL warfare knowing that our US cities are being tied to global private military security and policing bringing lots of war zone covert actions home to our US communities.  NOSY NEIGHBOR AND THE GANG as a illegal surveillance and pornography network stems from these same war zone activities and I feel these actions very similar to those atrocities committed during WW2----from which INTERNATIONAL HUMANS RIGHTS /ICC was created.

I will show today how all these INTERNATIONAL HUMAN RIGHTS/ICC legal standing were derived from Western OLD WORLD EUROPEAN COMMON LAW-----installed in our US FEDERAL court and Constitutional laws, ergo these human rights have 300 years of Federal court precedence.  Because our US Federal and Constitutional law enshrined COMMON LAW from Western Europe---these humans rights including SEXUAL ASSAULT reflect today's Federal, state, and local statutes and court history as well as civil society acceptance-----

'Three generations of international human rights law


Human rights activism can be described as a struggle to ensure that the gap between human rights and human rights law is narrowed down in order to ensure the full legal recognition and actual realization of human rights. History shows that governments do not generally grant rights willingly but that rights gains are only secured through a successful challenge to absolutist authority. Following on the Magna Carta, which set limits on the powers of royal Government in thirteenth century England, the 1776 American Declaration of Independence and the 1789 French Declaration des droits de l'Homme et de du citoyen (Declaration of the Rights of Man and Citizen) were landmarks of how revolutionary visions could be transformed into national law and made into justiciable guarantees against future abuse'.

The evolution of COMMON LAW surrounding SEXUAL ASSAULT began with WOMEN being physically penetrated sexually unable to bring to court charges of crime---women were property of husband/man so, husband/man legally brought criminal charges for rape of wife/daughter.  RAPE several centuries ago was legally defined as physical, but the 20th century broadened those legal definitions of SEXUAL ASSAULT-----ergo, sexual assault does not have to be physical----women can now make that legal charge------and degrees of SEXUAL from FELONIES to MISDEMEANORS have FEDERAL COURT precedence and also many state court precedence.


The WLP has worked for more than ten years to improve law enforcement response to sex crimes in
Philadelphia.


The WLP testified before the Senate Judiciary Subcommittee on Crime & Drugs in September, 2010 about the chronic and systemic failure of police to investigate sex crimes throughout the United States.


Law enforcement, however, may not be aware of the latest research in sexual assault. And decades- (sometimes centuries-) old definitions of rape certainly do not take such findings into consideration. Until 2012, the FBI's definition of rape had remained unchanged since 1927, and bore a striking resemblance to the definition of rape in medieval English common law. American law is heavily indebted to English common law: Much of what we understand does and does not constitute a crime comes from the Middle Ages.



In colonial Massachusetts, where sexual assault laws were based on English common law, rape was called "ravishment" and defined as "carnal knowledge of any woman above the age of ten years against her will and of a woman child under the age of 10 years with or against her will."

(This is still almost word for word the legal definition of rape in Georgia.)


*****************************************************************
SEX CRIME law reforms hit hard in 1960s whether crimes against women, men, or children.  Now, women are not property men----have separate legal rights to file SEXUAL ASSAULT charges----and at this time SEXUAL ASSAULT moved from being only physical penetration to being non-physical with several defining characteristics.


Sweeping sex crime law reform began in the 1970s.

Feminists rejected the notion that women are the property of men without independent legal status or rights


For example, conduct defined as “rape” in one jurisdiction may be termed “sexual assault,” “sexual abuse,” or “sexual battery” in other jurisdictions.


By focusing on the elements rather than the terms, similarities and distinctions become apparent.


Notwithstanding the complexity of this analysis, jurisdictions can be grouped and analyzed based on the following elements:
•
The range of covered conduct, specifically penetration, contact (non
-­‐
penetration), or exposure,

•
The use of force,
•
The absence of consent,
•
Th
e victim’s capacity to consent, and
•
Whether the conduct was for the purpose of sexual arousal or degradation.


When creating a DEPOSITION I thought broadly in how NOSY NEIGHBOR AND THE GANG illegal surveillance pornography captured digitally and transferred online to pornography sites could be defined. 

Below we see NON-PENETRATION CRIMES ----VS PHYSICAL RAPE


We also see variations of pornography------I use those terms-----intimidation/humiliation/below DEGRADATION.  As well, I recognize NOSY NEIGHBORS AND THE GANG while working as SUBCONTRACTORS for a larger criminal pornography corporation-------THE NETWORK as described likely national ----brings in the concept of THIRD PARTY described below.  This is RACKETEERING where the targets/victims can be assigned by a third person with a community NOSY NEIGHBOR actually committing these illegal surveillance and pornography crimes.

THIS CASE NOT ONLY ADDRESSES A NOSY NEIGHBOR AS ILLEGAL SURVEILLANCE OF MY LIVING SPACE TO INCLUDE PORNOGRAPHY---BUT AS WELL ADDRESSES THE FACT THAT THERE IS A HIERARCHY TO THESE NATIONAL PORNOGRAPHY NETWORKS FOR WHICH NOSY NEIGHBOR AND THE GANG WORK.


My case is not one of CONTACT sexual assault---

Now, I must delineate between CONTACT vs NON-CONTACT SEXUAL ASSAULT.


Non­‐Penetration Crimes


Contact Sexual contact crimes involve touching or fondling, direct and indirect, of sexual or other intimate parts of a person. In some jurisdictions, they also include contact with third parties.


One jurisdiction, New Mexico, requires the contact to be skin-­‐to-­‐skin but most include touching that occurs over clothing. Significantly, contact crimes are graded as misdemeanors in every jurisdiction. In some jurisdictions, these crimes can also include conduct such as urinating or defecating on a person for sexual arousal, gratification, or degradation.



Exposure


Sexual exposure crimes may include forced viewing of a body part or of sexual activity. Typically dismissed as “morals crimes,” exposure crimes involve conduct
commonly used by perpetrators to groom their victims.



These crimes involve sexual acts in public or exposure of genitals in a public place or where other persons are present for the purpose of offending, alarming, or arousing others. These statutes may also include conduct in which the offender causes someone else to expose him/herself.

Remember, exposure to pornography is different if in your own home vs exposure in public spaces-----which can be businesses or institutions with TOILET CAMS.

The next distinction needing to be made is SEVERITY of SEXUAL ASSAULT.  RAPE as a FELONY while soft porn a MISDEMEANOR------shows there is a criminal distinction with plenty of FEDERAL COURT PRECEDENCE.  My case involves my own targeting------but will become a FELONY since my images were posted via THE NETWORK.  People doing a CLASS-ACTION or RICO RACKETEERING LAWSUIT-----would automatically be deemed FELONY-----not misdemeanor.


Good schematic of felony vs misdemeanor/force vs without consent


Please GOOGLE as these schematics could not be copied.

Page 14
Figure 1.



This visual is intended to provide a big picture understanding of the types of rape and sexual assault crimes, their gradation, and the conduct prohibited.


***********************************************************

As a victim of SEXUAL ASSAULT via NOSY NEIGHBOR AND THE GANG----illegal surveillance pornography I was required to FILE A POLICE COMPLAINT---I did so with THE BALTIMORE POLICE DEPARTMENT making sure to VIDEO that interaction-----and will request POLICE VIDEO CAM of that complaint report.  Complaint report made for University of Maryland campus Medical Library for TOILET CAM pornography.


The statutes of limitation are different FEDERAL COURT----STATE COURT-----city/county courts-----below we see what is standard for state statutes on limitations for SEXUAL ASSAULTS-------TWO YEARS to file that police complaint.  Some states TEN YEARS to file that police complaint.


PLEASE---GET THESE NOSY NEIGHBOR AND THE GANG POLICE REPORTS AND COURT CASES GOING NOW-----AS MILLIONS OF US 99% WE THE PEOPLE AND NEW IMMIGRANTS ARE BEING MADE VICTIMS OF SEXUAL ASSAULT.



'Under the existing law, the statute of limitations for a civil action for sexual assault is two years, as sexual assault currently falls under the same limitations as assault and battery. Similarly, a survivor of domestic violence has three years from the date of the last act of domestic violence to bring a civil action against the person accused.


The change from two years to 10 years is significant, since survivors of sexual assault and harassment often have difficulty coming forward to report the crime for a variety of reasons'.

*****************************************************************
My case involves CRIMINAL SEXUAL ASSAULT AND WIRE DISTRIBUTION FOR PROFIT pornographic images-----so, there is another distinction which must be made----


Whereas I do feel my case is tied to REVENGE PORN-----ie, political retaliation-------I also recognize my case is same as any random target in any community in Baltimore and other US cities/counties.  The term REVENGE PORN does relate but is not the direction of writing these national network criminal pornography crimes.  Revenge porn is normally SMALL TIME----a person at school captures image of student undressing for gym and sends around to some friends in community.  What REVENGE PORN LAWS do for my case is recognize ONLINE TRANSMISSION OF PORNOGRAPHY as a SEXUAL ASSAULT crime.  


Revenge porn often does not not have a FINANCIAL/PROFIT motive-----but it does meet the LACK OF INDIVIDUAL'S CONSENT----it specifically calls this distribution CRIMINAL -----


SOME NOSY NEIGHBOR AND THE GANG CRIMES CAN BE REVENGE----IF SOMEONE FINDS A NEIGHBOR OR A BUILDING OWNER GUILTY OF ILLEGAL SURVEILLANCE PORNOGRAPHY, THAT VICTIM MAY REVENGE LIKEWISE. 


REVENGE PORN LAWS

----38 STATES
'Laws treating sexual assault, harassment, and abuse continue to progress. Thirty-eight states, including Arkansas, have enacted revenge porn laws, criminalizing the distribution of sexually explicit images or videos without the individual’s consent. What is clear is that continued progress can only be achieved by keeping sexual assault and harassment relevant in the national dialogue. As stories continue to emerge, and as more and more men join this dialogue, lawmakers may enact legislation addressing these problems head-on'.

Below I show FTC-------FCC -----both FEDERAL AGENCIES tied to filing Federal complaints because these NOSY NEIGHBOR AND THE GANG pornography THE NETWORK is transmitted by WIRE.  As well, bringing in US FEDERAL JUSTICE DEPARTMENT---CIVIL RIGHTS are actions to move forwards these FEDERAL LAWSUITS.



'If you experienced non-consensual pornography, need help or advice, and you live in the U.S., call the Cyber Civil Rights Initiative’s crisis hotline: 844-878-CCRI (2274).


If you are the victim of non-consensual pornography, take the steps above – and then tell the Federal Trade Commission if a company posts your image without your consent and won’t take it down. In fact, the FTC recently announced a lawsuit against MyEx.com and its principals for, according to the FTC, promoting revenge porn and then demanding money to take the images down'.


*******************************************************
While I am a single individual seeking justice with charges aimed at personal harm----I want to see victims of illegal surveillance PORNOGRAPHY as HOMEOWNERS-----as FAMILIES having parents and children EXPOSED TO SEXUAL ASSAULT ----as BUILDING OWNERS being captured by surround NOSY NEIGHBORS AND THE GANG  invading that building's sovereign space----taking that building to being UNSAFE/PORNOGRAPHY CAMERAS tied to apartments/buildings not owned or inhabited by NOSY NEIGHBOR AND THE GANG.


BELOW WE SEE THE MODUS OPERANDUS OF NOSY NEIGHBOR AND THE GANG----using sexual nature to harass, frighten, intimidate, threaten, and abuse tenets and or homeowners during the course of PSYCHO-SEXUAL illegal surveillance by camera and microphone an apartment and/or building not owned or occupied by NOSY NEIGHBOR AND THE GANG.

Whereas this specific statute addresses FAMILY OR HOUSEHOLD MEMBER-----while my case or the case of another HOMEOWNER/BUILDING OWNERS may not meet the standard of FAMILY MEMBER---this bill sets a precedence the CRIMINALITY OF THESE PORNOGRAPHIC VIDEO PHOTO transactions.  Doesn't have to be a FAMILY-MEMBER.


AN ACT TO CRIMINALIZE THE DISTRIBUTION OF AN IMAGE, PICTURE, VIDEO, OR VOICE OR AUDIO RECORDING OF A SEXUAL NATURE TO HARASS, FRIGHTEN, INTIMIDATE,
THREATEN, OR ABUSE A FAMILY OR HOUSEHOLD MEMBER


Stricken language would be deleted from and underlined language would be added to present law
.
Act 304 of the Regular Session

*DLP027* 01-28-2015


12:31:27 DLP027
State of Arkansas
As Engrossed: S2/17/15

90th General Assembly
A Bill

Regular Session, 2015
SENATE BILL 156


By: Senator
Hester

By: Representatives
House, Wright



For An Act To Be Entitled

AN ACT TO CRIMINALIZE THE DISTRIBUTION OF AN IMAGE,

PICTURE, VIDEO, OR VOICE OR AUDIO RECORDING OF A

SEXUAL NATURE TO
HARASS, FRIGHTEN, INTIMIDATE,

THREATEN, OR ABUSE A FAMILY OR HOUSEHOLD MEMBER OR A PERSON IN A CURRENT OR FORMER DATING RELATIONSHIP; AND FOR OTHER PURPOSES.



Subtitle

TO CRIMINALIZE THE DISTRIBUTION OF IMAGES
OR RECORDINGS OF A SEXUAL NATURE TO
HARASS, FRIGHTEN, INTIMIDATE, THREATEN,
OR ABUSE A FAMILY OR HOUSEHOLD MEMBER OR
PERSON FROM A DATING RELATIONSHIP


BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE OF ARKANSAS:


SECTION 1. Arkansas Code § 5
-

302 is amended to read as follows:


5-26-302. Definitions.

As used in this subchapter:

(1)(A) “Dating relationship” means a
romantic or intimate social

relationship between two (2) individuals that is determined by examining the

following factors:

(i) The length of the relationship;

(ii) The type of the relationship; and

(iii) The frequency of interaction betw
een the two


As Engrossed: S2/17/15
SB156
201-28-2015 12:31:27 DLP027


(2) individuals involved in the relationship.
1
(B) “Dating relationship” does not include a casual
2
relationship or ordinary fraternization between two (2) individuals in a
3
business or social context;
and
4
(2) “Family or household member” me
ans:
5
(A) A spouse;
6
(B) A former spouse;
7
(C) A parent;
8
(D) A child, including any minor residing in the household;
9
(E)(i) Persons related by blood within the fourth degree of
10
consanguinity.
11
(ii) The degree of consanguinity is compu
ted pursuant
12
to § 28
-
9
-
212;
13
(F) Persons who presently or in the past have resided or
14
cohabited together;
15
(G) Persons who have or have had a child in common; or
16
(H) Persons who are presently or in the past have been in a
17
dating relationship
together
.
;
18
(3) "Harass" means an act of harassment as prohibited by § 5
-
71
-
19
208;
20
(4) "Intimidate" means to force into or deter from an action by
21
inducing fear;
22
(5) "Sexual nature" means that an image, picture, video, or
23
voice or audio recording de
picts actual or simulated:
24
(A) Sexual intercourse;
25
(B) Deviate sexual activity;
26
(C) Bestiality;
27
(D) Masturbation;
28
(E) Sadomasochistic abuse for the purpose of sexual
29
stimulation; or
30
(F) Lewd exhibition of the:
31
(i)
Genitals or pubic area of any person; or
32
(ii) Breast of a female; and
33
(6) "State of nudity" means:
34
(A) The appearance of a human anus, human genitals, or a
35
female breast below a point immediately above the top of the areola; or


As Engrossed: S2/17/15
SB156
3
01
-
28
-
2015 12:31:27 DLP027
(B) A st
ate of dress that fails to opaquely cover a human
1
anus, human genitals, or a female breast below a point immediately above the
2
top of the areola.
3
4
SECTION 2. Arkansas Code Title 5, Chapter 26, Subchapter 3, is amended
5
to add an additional section to read
as follows:
6
5
-
26
-
314. Unlawful distribution of sexual images or recordings.
7
(a) A person commits the offense of unlawful distribution of sexual
8
images or recordings if, being eighteen (18) years of age or older, with the
9
purpose to harass, frighten, i
ntimidate, threaten, or abuse another person,
10
the actor distributes an image, picture, video, or voice or audio recording
11
of the other person to a third person by any means if the image, picture,
12
video, or voice or audio recording:
13
(1) Is of a sexual na
ture or depicts the other person in a state
14
of nudity; and
15
(2) The other person is a family or household member of the
16
actor or another person with whom the actor is in a current or former dating
17
relationship.
18
(b) The fact that an image, picture, vid
eo, or voice or audio
19
recording was created with the knowledge or consent of the other person or
20
that the image, picture, video, or voice or audio recording is the property
21
of a person charged under this section is not a defense to prosecution under
22
this s
ection.
23
(c) Unlawful distribution of sexual images or recordings is a Class A
24
misdemeanor.
25
(d)(1) Upon the pretrial release of a person charged under this
26
section, the court shall enter an order consistent with Rules 9.3 and 9.4 of
27
the Arkansas Rules o
f Criminal Procedure and shall give notice to the person
28
charged under this section of the penalties contained in Rule 9.5 of the
29
Arkansas Rules of Criminal Procedure.
30
(2) An order under subdivision (d)(1) of this section remains in
31
effect during the
pendency of any appeal of a conviction under this section.

01
-
28
-
2015 12:31:27 DLP027


************************************************************

Here we see STATE OF MARYLAND using REVENGE PORN stating the conditions of my case----protecting from ridicule, humiliation, personal destruction -------aka IDENTITY THEFT


'a bill that “balances the need to protect men and women from ridicule, humiliation, and personal destruction'



'State delegates approved revenge porn legislation in early March 2014. Source

Revenge porn is officially a misdemeanor in Maryland as of May 2014. Source

Grace's Law: House Bill 396'






Maryland Politics

Maryland delegates approve ‘revenge porn’ legislation
By Jenna Johnson
March 1, 2014



The Maryland House of Delegates has approved legislation that would make it a crime to disseminate “revenge porn” — using private, intimate photos or videos to harass or embarrass someone, often once a relationship ends.


The bill, which passed in a 130 to 0 vote Friday morning, sets penalties for those who cause “serious emotional distress to another by intentionally placing” an identifiable pornographic image, video or recording online. Those found guilty of the crime would face up to two years in prison and a fine of up to $5,000.



The Maryland Senate has yet to take action on the measure.



Several states have contemplated similar legislation, while navigating tricky questions about First Amendment rights. California and New Jersey have made such actions a crime, and Virginia is close to making the malicious distribution of pornographic material a Class 1 misdemeanor.


In Maryland, there have been several competing versions of revenge porn legislation, but lawmakers ultimately settled on one drafted by Del. Luiz R.S. Simmons (D-Montgomery).



In a statement Friday, Simmons said it was not easy to craft a bill that “balances the need to protect men and women from ridicule, humiliation, and personal destruction while still respecting the boundaries of the First Amendment.”


He said he hopes the legislation will “become a model for legislatures across the nation.”



0 Comments

February 19th, 2019

2/19/2019

0 Comments

 
Today, in DEPOSITION, I want to address two legal points.  First, I will be looking at definitions of SEXUAL ASSAULT as defined by INTERNATIONAL CRIMINAL COURTS------as well as looking at the legal definition of CONSENT-----INTEGRITY AND SECURITY OF THE PERSON.

When I state NOSY NEIGHBOR AND THE GANG have attacked my PERSONAL IDENTITY----AKA, IDENTITY THEFT---- where a person who is GOOD, MORAL CHARACTER is portrayed as opposite through various means-----this is a description of SEXUAL ASSAULT as it pertains to a citizen's fundamental rights to PHYSICAL AND PSYCHOLOGICAL integrity-----WELL-BEING.


When NOSY NEIGHBOR AND THE GANG work so hard to create VOICE BITES knowingly being used to create FAKE video/voice streams attached to non-CONSENTING VICTIMS of illegal surveillance of inside apartments/homes to include capture of stages of undress ----ie. PORNOGRAPHY----this can be used to identify NOSY NEIGHBOR AND THE GANG knowing these illegal surveillance acts are CRIMINAL.  If one tries to falsify CONSENT then one knows those actions are ILLEGAL.


Sexual assault violates the victim’s fundamental rights, including the right to physical and psychological integrity and security of the person (p. 22).


'However, protection of individuals’ physical and mental
integrity is a primary duty of states, which should be implemented through the criminal law',


The statement above moves this fundamental right of protection from SEXUAL ASSAULT away from only INTERNATIONAL CRIMINAL COURTS----but makes it clear it is a DUTY of SOVEREIGNS NATIONS to protect these human rights via CRIMINAL LAW.



Many of the articles I including in today's DEPOSITION are taken from AMNESTY INTERNATIONAL HUMAN RIGHT JUSTICE ORGANIZATION and INTERNATIONAL CRIME COURT---ICC.

In order to incorporate human rights law and standards in its practice, the Court’s interpretation of the definition of the crimes should address the behaviour and actions of the perpetrator, and how this affects the victim’s ability to exercise free and genuine choice, that is, to enjoy his or her human right to physical and mental integrity and sexual autonomy, without discrimination. The Court’s deliberation should not just address the victim’s purported ‘consent’ in isolation.

All references to the term ‘consent’ within the Elements of Crimes must be interpreted consistently with a fuller, more accurate and human-rights based understanding of the word
consent–that a consensual decision is a decision made without force, threat of force, coercion, or taking advantage of a coercive environment.


Where evidence of force, threat of force or coercion is present, there should absolutely be no additional element of law of consent for the prosecution to prove.


There are two time periods in NOSY NEIGHBOR AND THE GANG illegal surveillance pornography in this case.  First, the target does not KNOW that this illegal surveillance is happening------then, at some point that target discovers these pornographic actions and are left to decide how to escape exposure.  I discovered and immediately worked to eliminate exposure/compromise inside my home-----but, as well, the victim of these kinds of sexual assaults inside homes must consider two things.  First, do I allow these attacks to force me to VACATE my home?  Second, if I VACATE my home I know there will be a next person who is SEXUALLY ASSAULTED----and conscience does not allow one to open this door for a next victim. 

ALL THIS MUST BE CONSIDERED WHEN COURT CONSIDERS WHETHER VICTIM WAS UNDER FORCE, COERCION, TAKING ADVANTAGE OF COERCIVE ENVIRONMENT TO MEET TERMS OF 'FAILURE TO GIVE CONSENT'.


***************************************************************
I want to distinguish between a more common determination of SEXUAL ASSAULT-----that being RAPE-----vs what I have been victim which is illegal surveillance pornography inside my home and one case that will include BUSINESS TOILET CAM activities.

Whereas a defense may deem SEXUAL ASSAULT as having to include PHYSICAL PENETRATION----PHYSICAL TOUCH by perpetrator-----US and international law recognizes SEXUAL ASSAULT can occur without any physical contact-----




'agreement to sexual contact of both or all parties to that contact, whether or not such sexual contact involves penetration'...............whereas the definition of other kinds of sexual violence is potentially extremely wide, due to the variety of methods chosen by perpetrators to commit these crimes':

With the soaring online pornography sites I know as many these pornography posts often have not been captured via PHOTO----or VIDEO-STREAM with consent-----while knowing these kinds of PORNOGRAPHY are indeed classified as SEXUAL ASSAULT.




'The ICTR continued:

“Sexual violence is not limited to a physical invasion of the human body and may include acts that do not involve penetration or physical contact. Sexual violence covers both physical and psychological attacks directed at a person’s sexual characteristics.”'


The BILL CLINTON/MONICA LEWINSKY ----I DID NOT HAVE SEXUAL RELATIONS WITH THAT WOMAN--------was a FALSE FLAG-----promoted again by our US FAKE NEWS media.  Whether ORAL SEX or PORNOGRAPHIC SEX------if no consent was given----if the victim had no ability to stop these attacks-----this is still considered SEXUAL ASSAULT.  Lewinsky case was different.  She claimed sexual assault in workplace ----Lewinsky's case was one of POWER being COERCIVE----but Lewinsky did have the ability NOT to perform ORAL SEX.  Lewinsky's case was WORKPLACE and POWER OF EXECUTIVES over employees AKA workplace sexual harassment----whereas I am victim of home invasion -------sexual assault without consent through technology ----NOSY NEIGHBOR AND THE GANG ILLEGAL SURVEILLANCE with cameras and microphone capture of devices placed inside apartment and or devices like TV, RADIO, SMOKE DETECTORS, LIGHT BULBS-----being standard products inside everyone's home. 



'as stated in the Triffterer Commentary, “Sexual violence is a term broader than rape. The term is used to describe any kind of violence carried out through sexual means or by targeting sexuality”'



(Akayesu,Trial Judgment

above, note 8: paragraph 688)




INTERPRETED CONSISTENTLY WITH HUMAN RIGHTS LAW AND STANDARDS


The human right of equality and non-discrimination in the enjoyment of physical and mental integrity requires that there should be equality in weight given to the free and full

In its General Recommendation 19, (llth session, 1992), paragraph 7,The Committee on the
Elimination of All Forms of Discrimination against Wom
en identified gender based violence, including rape and sexual violence, as a form of discrimination, and stated that:



agreement to sexual contact of both or all parties to that contact, whether or not such sexual contact involves penetration.

The use of force, or threat of force or coercion, by the
perpetrator makes it impossible for the victim to exercise their right to physical and mental integrity, and therefore their sexual autonomy.

Rape is a particular kind of sexual violence, where the definition is confined to the act of penetration of the body, whereas the definition of other kinds of sexual
violence is potentially extremely wide, due to the variety of methods chosen by perpetrators to commit these crimes:


as stated in the Triffterer Commentary, “Sexual violence is a term broader than rape. The term is used to describe any kind of violence carried out through sexual means or by targeting sexuality”


(Otto Triffterer Commentary on the
Rome Statute of the International Criminal Court”
Hart Publishing, 2008, page 214).


According to the ICTR in the Akayesu judgement, sexual violence, which includes rape, is considered       “any act of a sexual nature committed under circumstances that are coercive.”


(Akayesu, above, note 8: paragraph 598).


The ICTR continued:

“Sexual violence is not limited to a physical invasion of the human body and may include acts that do not involve penetration or physical contact. Sexual violence covers both physical and psychological attacks directed at a person’s sexual characteristics.”


(Akayesu,Trial Judgment

above, note 8: paragraph 688)


However, the aspects of coercion and violation of sexual autonomy are common to both the definition of rape and the definition of sexual violence, and are of relevance to the investigation and prosecution of both crimes.



The terms “sexual contact” “sexual act” and “committing sexual acts” shall be used in this document to describe the physical acts through which crimes of rape or sexual assault are committed, in order to identify the physical conduct without making assumptions about whether it was sought or unsought, therefore identifying it as either legal or criminal activity. The use of this term is to allow a description in the text of the physical acts which occurred, while reflecting the reality that rape and sexual violence is not “sexual intercourse”(a term which implies agreement by the participants). The use of this term allows a clear differentiation to be made between conduct which is criminal, and conduct which is protected behaviour under human rights law, when it is actively wanted and agreed to by the participants.


For a comprehensive overview of the issues, see
“Sexuality and human rights” a discussion paper, published by the International Council on Human Rights Policy, 2009.


http://www.ichrp.org/en/projects/137?theme=6
last accessed on 20 April 2010.



********************************************************


I want to be clear about FEEDBACK from NOSY NEIGHBOR while using illegal surveillance for PORNOGRAPHY ----the repetition of phrases like------SHE LIKES POSING FOR ME--------SHE ISN'T POSING FOR ME ANYMORE------SHE IS POSING FOR HIM NOW-------

This idea POSING as selling CONSENT has a long history tied to PROSTITUTES and COURTESANS for example -----who would pose for artists-----who would laze around a royal chamber in whatever undress-------I am clear -------SEXUAL ASSAULT through pornography is NOT POSING.  FEEDBACK as well told me I appear SLEEPING in PORNOGRAPHY which is course what I WAS DOING.  SLEEPING while captured on pornography is not POSING.



'A consideration of whether an individual was able to exercise sexual autonomy, by contrast, takes into account the overall dynamic and environment surrounding those sexual acts and how these had an impact on the victim’s ability to make a genuine choice'.

A period of what I describe as BODY ELECTRIC saturation of my apartment with surveillance device FEEDBACK had as a goal allowing me to KNOW these pornographic surveillance had been happening without my knowledge-----and creating saturated FEEDBACK is a step towards INTIMIDATION/HUMILIATION with goals of forcing a victim to RUN ----to LEAVE THAT APARTMENT OR HOME.  The goal of NOSY NEIGHBOR AND THE GANG is continuous turnover of victims to capture ---new faces and bodies bring more profit on pornography sites----they can't keep the same person in capture----




3.1
TO BE LAWFUL, SEXUAL ACTS MUST BE AGREED TO BY BOTH PARTIES EQUALLY


An individual’s sexual autonomy is an aspect of physical and mental integrity, the core human rights value protected by the criminalization of sexual violence. Unfortunately, however, sexual autonomy is frequently conflated with narrow views of ‘consent’ under domestic criminal law which do not capture the reality of how acts of rape and sexual violence are committed, and this misunderstanding affects how such acts are treated in criminal investigations, prosecutions and in criminal judgments.


Sexual autonomy and consent are two distinct concepts. The concept of ‘consent’ as used in domestic criminal law imports a notion of individual choice, typically without a consideration of the reality of abuse of power (whether evidenced through physical force, or other forms of coercion) and other factual
conditions that may prevail before, during and perhaps after the sexual acts in question. A consideration of whether an individual was able to exercise sexual autonomy, by contrast, takes into account the overall dynamic and environment surrounding those sexual acts and how these had an impact on the victim’s ability to make a genuine choice.



Women’s right to equality before the law is frequently violated in domestic criminal jurisdictions because their evidence is distrusted. Women, therefore, have been treated unequally in that their right to freedom from sexual coercion by a perpetrator is extremely limited. In domestic jurisdictions, rape and sexual assault laws have often put people in terms of a ‘proposer’ of sexual acts, and the ‘acceptor’ is deemed to consent to the act unless their resistance is made clear, especially by using physical resistance. This is contrary to an approach to the criminal law which incorporates the human right to equality.

As stated in an intervention to the European Court of Human Rights in the case of M.C. v Bulgaria,

"The equality approach starts by examining not whether the woman said 'no', but whether she said 'yes'. Women do not walk around in a state of constant consent to sexual activity unless and until they say 'no', or offer resistance to anyone who targets them for sexual activity. The right to physical and sexual autonomy means that they have to affirmatively consent to sexual activity."



In this case, the European Court of Human Rights noted
that “the development of law and practice in that area [of the crime of rape] reflects the evolution of societies towards effective equality and respect for each individual’s sexual autonomy” and also made it clear that


****************************************************************


One more point today looks at BUILDING OWNERS finding themselves captured unwillingly by NOSY NEIGHBORS AND THE GANG by remote illegal surveillance by camera and microphone of their building and devices inside that building.

Common law from several centuries protect property owners---it generally entailed physical trespass and/or property damage------against the OWNER'S WILL BY FORCE.



“In the sixteenth century, the common law of theft protected an owner’s property only when a wrongdoer physically removed it from the owner’s possession, against the owner’s will and by force.


Over the centuries what is legally described as PROPERTY RIGHTS OF BUILDING OWNERS has extended to TECHNOLOGY CAPTURE------to include the actions happening to me in this case of NOSY NEIGHBOR AND THE GANG.  The devices inside my home remotely captured ---the devices installed in my home by people other than the BUILDING OWNERS----the duplication of BUILDING AND APARTMENTS keys to allow open-door entry by NOSY NEIGHBORS AND THE GANG into a building owned by someone else-----as happened in this case----this is all ILLEGAL ATTACK ON PROPERTY RIGHTS------it is an illegal ATTACK ON IDENTITY----AKA, IDENTITY THEFT------for those UNWILLING building owners.


'It punishes virtually all interference with property rights without the owner’s genuine consent'.


That's a HARD ----NO says FEEDBACK regarding a citizen wanting to have their building used for NOSY NEIGHBOR AND THE GANG illegal pornography surveillance.



Shippers and servants who made off with property entrusted to them and scoundrels who obtained possession under false pretences could not be prosecuted, and the law of theft didn’t protect intangible interests or immovable property at all. As commerce and the nature of valuables became more complex, the law evolved, slowly at first, to fill the intolerable gaps, although many of them survived into the early twentieth century. Today the law of theft protects property owners comprehensively. It guards against embezzlement by employees and dispossession by fraud, and it protects intangible items of value such as debts, property rights, trade secrets, and most recently, computer software. It punishes virtually all interference with property rights without the owner’s genuine consent.

0 Comments

February 18th, 2019

2/18/2019

0 Comments

 


'So it can be very hard sometimes to decide whether a person is lying, or whether a statement is false.  While the Supreme Court in Bronston was trying to create a well-defined rule, it is not at all clear that it accomplished its aim'.


Back in 1990s we started to see FEDERAL COURT/SUPREME COURT RULINGS that went against the grain of legal precedence in US and old world COMMON LAW-----since we are discussing in this lawsuit SEXUAL ATTACKS via illegal surveillance by NOSY NEIGHBOR AND THE GANG----we will need to research legal ruling since CLINTON era tied to defining WHAT IS SEX-----WHAT IS SEXUAL ATTACK for example.


Most US 99% of WE THE PEOPLE remember this KABUKI THEATER over BILL AND MONICA------most people were aghast that a US President would made very public over sexual encounters that happen throughout history at these national power levels.


WHY DID ALL THE WORLD NEED TO HEAR A US PRESIDENT SAYING-----I DID NOT HAVE SEXUAL RELATIONS WITH THAT WOMAN?



The goal with this court ruling was to weaken what were strong, moral and ethic philosophy over the illegality of sexual attacks to include any unwilling attack on any person's VIRTUE. Here Clinton was telling us that ORAL SEX was not having SEX WITH THAT WOMAN----


OH, REALLY said everyone in the US.





'Perjury charges


In his deposition for the Jones lawsuit, Clinton denied having sexual relations with Lewinsky. Based on the evidence—a blue dress with Clinton's semen that Tripp provided—Starr concluded that the president's sworn testimony was false and perjurious.


During the deposition, Clinton was asked "Have you ever had sexual relations with Monica Lewinsky, as that term is defined in Deposition Exhibit 1?"


The judge ordered that Clinton be given an opportunity to review the agreed definition. Afterwards, based on the definition created by the Independent Counsel's Office, Clinton answered, "I have never had sexual relations with Monica Lewinsky." Clinton later stated, "I thought the definition included any activity by [me], where [I] was the actor and came in contact with those parts of the bodies" which had been explicitly listed (and "with an intent to gratify or arouse the sexual desire of any person"). In other words, Clinton denied that he had ever contacted Lewinsky's "genitalia, anus, groin, breast, inner thigh, or buttocks",
and effectively claimed that the agreed-upon definition of "sexual relations" included giving oral sex but excluded receiving oral sex'

*********************************

While Bill Clinton was redefining what SEXUAL RELATION/SEXUAL ASSAULT in US meant ----this same attack on our US morals and ethics surrounding SEXUAL MISCONDUCT was happening in BUSH-era under the guise of WAR ZONE battle treatment of both civilians and combatants.  Bush worked HARD to redefine what TORTURE meant during war-----he tried HARD to make this act of SEXUAL INTIMIDATION/SEXUAL HUMILIATION acts that a US MILITARY embraced.  Of course, those creating these psycho-sexual war zone activities were not US MILITARY, they were employees of global private military contractors like BLACKWATER/ZE.

Remember as well, during Bush era global private military contractors like BLACKWATER were being introduced into our US communities under the guise of replacing a STATE NATIONAL GUARD which were busy being US military troops.  So, this decade during the 2000s are when the same global private military contractors tied to war zone use of PSYCHO-SEXUAL intimidation and humiliation came to be installed in our US communities with HOMELAND SECURITY. 

I am not saying NOSY NEIGHBOR AND THE GANG are officially employed by these same global private military contractors----I am saying that the CULTURE/TRAINING/EQUIPMENT used overseas are now being used inside our US CITIES deemed FOREIGN ECONOMIC ZONES.





'It is also clear that the purpose of these techniques is to inflict pain, suffering and severe humiliation on detainees. Once that purpose was legitimized by military and intelligence officials, it is not surprising that ordinary soldiers came to believe that even more extreme forms of abuse were acceptable. The brazenness with which some soldiers conducted themselves at Abu Ghraib, snapping photographs and flashing the "thumbs-up" sign as they abused prisoners, confirms that they felt they had nothing to hide from their superiors'.



'While 11 soldiers were ultimately convicted of abusing detainees, Vincent Warren, executive director of the Center for Constitutional Rights, told Truthout last year that Abu Ghraib remains an example of corporate crimes going unpunished: “Private corporate contractors, hired by the US government to interrogate detainees, played a key role in directing and encouraging the acts of the low-level soldiers in those photos'.


Regardless of the finality of US MILITARY COURT rulings against these ABU GRAIB sexual predators-----MILITARY COURT RULING do not prevail in US CIVIL COURTS---ie. rulings saying these troops following orders from higher up not relevant in US civil courts.



Definitions
This media kit will discuss four different perspectives on sexual assault, i.e., political, legal, clinical and scientific perspectives, and the different definitions of sexual assault associated with each one.

  1. The Québec government has provided a definition of sexual assault from a political perspective in a policy document entitled Orientations gouvernementales en matière d’agressions sexuelles (link is external) [government directions on sexual assault]. This definition demonstrates the wide array of sexual assault situations that exist, and describes this type of assault as an act of power and domination that is criminal in nature.1
    • “Sexual assault is a sexual act, with our without physical contact, committed by an individual without the consent of the victim or, in some cases, and especially when children are involved, through emotional manipulation or blackmail. It is an act that subjects another person to the perpetrator’s desires through an abuse of power, the use of force or coercion, or implicit or explicit threats. Sexual assault violates the victim’s fundamental rights, including the right to physical and psychological integrity and security of the person (p. 22).
    • This definition applies regardless of the age, sex, culture, religion or sexual orientation of the victim or of the perpetrator of the assault, regardless of the type of sexual act committed or the place or life setting in which it is committed, and regardless of the relationship between the victim and the perpetrator.
    • Certain other terms are also used to refer to sexual assault, including “rape,” sexual abuse,” “sexual offence,” “sexual contact,” “incest,” “prostitution” and “child pornography.”
  2. [TRANSLATION]
 
 In Canada, the offences of rape and indecent assault were replaced by the offence of sexual assault in 1983. To learn more, see the section in the Criminal Code on changes in legislation pertaining to sexual assault.

From a legal standpoint in Canada, sexual assault is defined as a form of assault that is sexual in nature.2
  • The law makes certain distinctions based on the age of victims, by providing for specific criminal offences (see the Sexual offences tab) in the case of sexual abuse committed against minors.2
  • In order for there to be sexual assault within the meaning of the law, three conditions must be present:2




Prisoner rape

Iraqi prisoner (sitting) forced to perform oral sexIn 2004, Antonio Taguba, a major general in the U.S. Army, wrote in the Taguba Report that a detainee had been sodomized with "a chemical light and perhaps a broomstick."[41] In 2009, Taguba stated that there was photographic evidence of rape having occurred at Abu Ghraib.[42] An Abu Ghraib detainee told investigators that he heard an Iraqi teenage boy screaming, and saw an Army translator raping him, while a female soldier took pictures.[43] A witness identified the alleged rapist as an American-Egyptian who worked as a translator. In 2009, he was the subject of a civil court case in the United States.[42] Another photo shows an American soldier apparently raping a female prisoner.[42] Other photos show interrogators sexually assaulting prisoners with objects including a truncheon, wire and a phosphorescent tube, and a female prisoner having her clothing forcibly removed to expose her breasts.[42] Taguba supported United States President Barack Obama's decision not to release the photos, stating, "These pictures show torture, abuse, rape and every indecency."[42] Obama, who initially agreed to release the photographs, changed his mind after lobbying from senior military figures, saying their release could put troops in danger and "inflame anti-American public opinion".[42]


In other instances of sexual abuse, soldiers were found to have raped female inmates, and senior U.S. officials admitted that rape had taken place at Abu Ghraib.[44][45] Some of the women who had been raped became pregnant, and in some cases, were later killed by their family members in what were thought to be instances of honor killing.[46] In addition, according to Seymour Hersh video exists which shows that children were raped by prison staff in front of watching women.[47]


Other abuses


Specialist Charles A. Graner punching handcuffed Iraqi prisonersIn May 2004, the Washington Post reported evidence given by Ameen Saeed Al-Sheik, detainee No. 151362. It quoted him as saying; "They said we will make you wish to die and it will not happen [...] They stripped me naked. One of them told me he would rape me. He drew a picture of a woman to my back and made me stand in shameful position holding my buttocks."[48] "'Do you pray to Allah?' one asked. I said yes. They said, '[Expletive] you. And [expletive] him.' One of them said, 'You are not getting out of here health[y], you are getting out of here handicapped. And he said to me, 'Are you married?' I said, 'Yes.' They said, 'If your wife saw you like this, she will be disappointed.' One of them said, 'But if I saw her now she would not be disappointed now because I would rape her.' " [...] "They ordered me to thank Jesus that I'm alive." [...] "I said to him, 'I believe in Allah.' So he said, 'But I believe in torture and I will torture you.'"[48]


*********************************************************************


CENTER OF DISEASE CONTROL ----CDC -----DEFINITIONS of sexual assault---sexual violence ---this is why a PUBLIC HEALTH AGENCY like CDC----would be leading this effort against NOSY NEIGHBOR AND THE GANG.

Whereas CLINTON AND BUSH worked hard to redefine what SEXUAL RELATIONS/SEXUAL CONTACT/SEXUAL ASSAULT means in US and COMMON  LAW for several centuries-----below we see what has been the LEGAL definition in US court precedence.



Noncontact unwanted sexual experiences


Includes unwanted sexual attention that does not involve physical contact. Some examples are verbal sexual harassment (e.g., making sexual comments) or unwanted exposure to pornography. This occurs without a person’s consent and sometimes, without the victim’s knowledge. This type of sexual violence can occur in many different settings, such as school, the workplace, in public, or through technology.


As said above, these sexual violence can occur in public----aka TOILET CAMS----at home/school/workplace---aka fire fighters and their TOILET CAMS-----and includes TECHNOLOGY use such as with NOSY NEIGHBOR AND THE GANG.



Sexual Violence: Definitions


Sexual violence is defined as a sexual act committed against someone without that person’s freely given consent. Sexual violence includes:
  • Completed or attempted forced penetration of a victim
    Includes unwanted vaginal, oral, or anal insertion through use of physical force or threats to bring physical harm toward or against the victim.
  • Completed or attempted alcohol or drug-facilitated penetration of a victim
    Includes unwanted vaginal, oral, or anal insertion when the victim was unable to consent because he or she was too intoxicated (e.g., unconscious, or lack of awareness) through voluntary or involuntary use of alcohol or drugs.
  • Completed or attempted forced acts in which a victim is made to penetrate someone
    Includes situations when the victim was made, or there was an attempt to make the victim, sexually penetrate a perpetrator or someone else without the victim’s consent because the victim was physically forced or threatened with physical harm.
  • Completed or attempted alcohol or drug-facilitated acts in which a victim is made to penetrate someone
    Includes situations when the victim was made, or there was an attempt to make the victim, sexually penetrate a perpetrator or someone else without the victim’s consent because the victim was too intoxicated (e.g., unconscious, or lack of awareness) through voluntary or involuntary use of alcohol or drugs.
  • Nonphysically forced penetration which occurs after a person is pressured to consent or submit to being penetrated
    Includes being worn down by someone who repeatedly asked for sex or showed they were unhappy; having someone threaten to end a relationship or spread rumors; and sexual pressure by misuse of influence or authority.
  • Unwanted sexual contact
    Includes intentional touching, either directly or through the clothing, of the genitalia, anus, groin, breast, inner thigh, or buttocks of any person without his or her consent, or of a person who is unable to consent. Unwanted sexual contact also includes making a victim touch the perpetrator. Unwanted sexual contact can be referred to as “sexual harassment” in some contexts, such as a school or workplace.
  • Noncontact unwanted sexual experiences
    Includes unwanted sexual attention that does not involve physical contact. Some examples are verbal sexual harassment (e.g., making sexual comments) or unwanted exposure to pornography. This occurs without a person’s consent and sometimes, without the victim’s knowledge. This type of sexual violence can occur in many different settings, such as school, the workplace, in public, or through technology.
Why Is a Consistent Definition Important?
A consistent definition is needed to monitor the prevalence of sexual violence and examine trends over time. A consistent definition also helps in determining the magnitude of sexual violence and aids in comparing the problem across jurisdictions. Consistency allows researchers to measure risk and protective factors for victimization and perpetration in a uniform manner.

0 Comments

February 16th, 2019

2/16/2019

0 Comments

 
Here we have a UK global banking 1% FAKE NEWS media myth-making and propaganda over MUGABE/ZIMBABWE. MUGABE works for global banking 1% OLD WORLD KINGS AND QUEENS creating civil unrest/civil war in that African nation these few decades for coming FOREIGN ECONOMIC ZONE development MOVING FORWARD especially during OBAMA era. So, as with over DICTATORSHIPS installed by global banking 1% -----ZIMBABWE during MUGABE had all those global banking 5% freemason/Greek players flee ZIMBABWE while all that civil unrest/civil war unfolded----tremendous brutality and deaths for those 99% of WE THE ZIMBABWEANS. Hyper-inflation et al is hallmark of bringing in WORLD BANK/IMF leading to installing FOREIGN ECONOMIC ZONES----that is the history for ZIMBABWE these few decades.


This article creating FAKE NEWS pretends all those 5% freemason/Greek players who fled to UK-------are not players but those wanting to be 99% POPULIST LEADERS as MOVING FORWARD building FOREIGN ECONOMIC ZONES begins in earnest. Remember, ZIMBABWE was the BREAD-BASKET for not only southern Africa but exported to all African nations. MUGABE was touted as being AFRICAN LEADER getting rid of all WHITE BIG AG taking back the land----then left all that FARMLAND ---fallow. He did that because the goal in MASTER PLAN 1990s---was to make all that FARMLAND into massive global corporate FACTORIES/MINING/FRACKING.



These smiling faces are 5% PLAYERS only seeking to profit from what will be again COLONIALISM and enslavement for our 99% of AFRICAN citizens-----these players no doubt ---DON'T CARE.

'He'll be killed': Fears for UK asylum seekers threatened with deportation under alleged deal with Zimbabawe



Exclusive: 'I’m shocked that they want to send me back to a place where all those terrible things are happening. I won’t be able to walk out of the airport terminal without being interrogated by the police. There will be brutal beatings. I won't be spared'

  • May Bulman Social Affairs Correspondent @maybulman
Zimbabwean asylum seekers who were forced to attend meetings with officials from their home country have been threatened with removal, in a move believed to be part of an agreement to “repatriate” thousands of failed asylum seekers to the country.



At least two people who arrived in the UK after fleeing political persecution in Zimbabwe were detained and issued with 72-hour removal notices while signing on with the Home Office at Vulcan House immigration reporting centre in Sheffield on Monday.


It comes after the two men, along with an unknown number of other Zimbabwean asylum seekers, were asked “distressing” questions by Zimbabwean embassy officials in “re-documentation interviews” which took place on 4 December. 



Lawyers believe these interviews formed part of an agreement between the British and Zimbabwean governments for the UK to “repatriate” 2,500 Zimbabwean nationals.



Other Zimbabwean nationals who attended the interviews in December have been ordered to attend Home Office meetings in the coming week, and said they were “terrified” that the government was also planning to remove them.

It comes after more than 1,000 people were arrested and many brutally beaten during demonstrations in the Zimbabwean capital Harare last month following a widespread breakdown of public order linked to food and fuel shortages.

 

One of the men issued with a removal notice is Victor Mujakachi, who initially came to the UK on a student visa in 2003. He sought asylum when a warrant was issued for his arrest in Zimbabwe after he wrote blog posts hostile to the government.

Mr Mujakachi, 58, said that in his re-documentation interview in December, embassy officials had asked for more information about him and his relatives in a bid to confirm his identity – which he found “highly suspicious”. He added that he “would not be spared” by the Zimbabwean authorities.



Speaking from Vulcan House on Monday, he said: “I’m shocked that they want to send me back to a place where all those terrible things are happening. I’ve been vocal about the atrocities through my Twitter feeds and on YouTube. I will definitely stand out.


“I won’t be able to walk out of the airport terminal without being interrogated by the police. There will be brutal beatings.


“There was recently a debate in the House of Commons condemning the brutality and heavy-handedness of the Zimbabwean army and the police. They’ve condemned it. Do they think a mere condemnation by words is going to stop what’s happening?



“Every government has a right to control immigration within its borders, but with this government it’s ideologically driven. They look at soft targets, and I am a soft target.”

Mr Mujakachi’s son, Simba, who was also ordered to sign on with the Home Office on Monday, but was not detained like his father, said he believed that if his father was removed to Zimbabwe, he would be “killed straight away”.


“I don’t know how they can pull a move like this, working with the Zimbabwean government. It doesn’t make sense with what’s going on in Zimbabwe. It’s cruelty,” he said.



“I think he’s going to get killed straight away. They will take him from the airport straight away and we will never hear about him again. We know how this government runs. A lot of people have been taken recently and no one knows where they are.

“I haven’t eaten since I went and my dad got taken. I’ve been struggling to eat. I’m worried about my dad. I’m worried about me. I don’t know why I was let out yesterday, but I’m sure that sooner or later they will take me.”



Mr Mujakachi’s solicitor, Kathryn Hodder, who is seeking to submit an injunction to prevent his removal, said she believed the alleged agreement between the Home Office and Zimbabwean officials could be acting in breach of UK immigration rules, which prohibit “actors of persecution” being directly informed that an application for asylum has been made.



She added: “Before, they couldn’t remove Zimbabweans because there was no agreement with the government. So no one from Zimbabwe could be removed unless they got a passport.

“But it looks like this government wants aid from the UK, so it’s just part of politics – we’ll give you money if you take back your people.


“Victor didn’t have a passport, and now he’s got travel documents from the Zimbabwean government. The embassy representative had a big file and said he knew everything about him. It’s not good if they government knows about him even before he’s removed.”



Sheffield councillor Jackie Drayton, who accompanied Mr Mujakachi to sign on at Vulcan House, where he was detained, said it was “awful” that he was facing removal, saying: “He didn’t come prepared to not go home. It’s so sudden and shocking.



“Victor is somebody who has been threatened by the government. And he’s very active about the things going on at the moment. Yes, Mugabe is not in power now, but there’s no doubt people in his government are still I power, and it’s not a safe place for people.”



Marian Machekanyanga, another Zimbabwean national who was also forced to attend a re-documentation interview in December, and has been ordered to sign on next week, said she was “terrified” that she would have the same fate as Mr Mujakachi.

The 54-year-old, who has been in the UK for 16 years after fleeing political persecution for her opposition to the government, said: “I was in tears when I received the letter. I’m very scared. I know that they are going to take me. People are being killed by the regime. I’m even more scared than last time.”



It was widely reported by the Zimbabwean media in February that the then British ambassador to Zimbabwe, Catriona Laing, had told Kembo Mohadi, Zimbabwe’s deputy president, that the UK intended to deport illegal Zimbabweans to the country. 

Mr Mohadi reportedly responded by saying the Zimbabwean government had no problem taking back its nationals but it needed to check them to ensure they were truly Zimbabweans.


 

A Home Office spokesperson said: “The UK has a proud history of granting asylum to those who need our protection.



“Where a decision has been made that a person does not require international protection, removal is only enforced when we and the courts conclude that it is safe to do so, with a safe route of return.”
__________________________________________


Here is FAKE RELIGIOUS RIGHT smiling face of a far-right wing global banking 5% player pol PRETENDING that her stance against ABORTION is about GOD'S NATURAL LAW. What this woman----being far-right wing global banking 1% CLINTON NEO-LIBERAL has as a goal is PLAYING with the definition of ABORTION.



We have DR WEN from Baltimore as PLANNED PARENTHOOD all set to MOVE FORWARD global depopulation installing here in US those same CHINESE 1 CHILD structures today using REMOTE CONTROLLED CONCEPTION MICROCHIPS implanted in VERY young girls and we are sure the goal now will be not 1 CHILD----but NO CHILD MOVING FORWARD.



We discussed in detail the difference in defining ABORTION-----some think egg and sperm meeting to create fertilized embryo -----is the point of definition of when action against this embryo is called ABORTION. Some think the process of blocking a sperm from fertilizing an egg------is ABORTION. Historically, in US our Federal court precedence placed that definition to the former----action AFTER sperm meets egg. It is RELIGIOUS groups defining it as blocking sperm from egg-----such as CATHOLIC CHURCH.



CATHOLIC CHURCH reversing stance because POPE et al support depopulation remote-controlled contraception microchips. These devices are designed to block sperm from egg ---ergo, no ABORTION by US Federal standards----but still ABORTION by RELIGIOUS standards.
THE FAKE RELIGIOUS RIGHT KNOW THESE POLICIES MOVING FORWARD ARE INDEED ABORTION ESPECIALLY TO RELIGIOUS GROUPS.


This article seeks to FOOL 99% of right wing real religious people while keeping silent from our 99% of left social progressive the goals of NO CHILD ONE WORLD ONE GOVERNANCE.

This will effect both US 99% of WE THE PEOPLE wanting families and liberties in planning families AND our new to US 99% of immigrants.....black, white, and brown citizens.


Iowa Bans Most Abortions As Governor Signs 'Heartbeat' Bill


May 5, 201811:22 AM ET
Sasha Ingber



Iowa Gov. Kim Reynolds signed one of the country's most restrictive abortion bills into law on Friday.


The so-called "heartbeat" legislation bans abortions once a fetal heartbeat has been detected, at about six weeks of pregnancy. Exceptions are made in cases of rape, incest or medical emergency.



Republican state lawmakers worked late into the night this week to push the measure forward. During Tuesday's debate in the Statehouse, Rep. Sandy Salmon said, "A baby has become something we can throw away. This bill says it's time to change the way we think about unborn life."



The bill passed the state House on Tuesday and the state Senate early Wednesday. Then it landed on Reynolds' desk.

"I understand that not everyone will agree with this decision," Reynolds said in a written statement. "But if death is determined when a heart stops beating, then doesn't a beating heart indicate life? For me, it is immoral to stop an innocent beating heart."


The legislation drew firm Republican support. Iowa Sen. Joni Ernst tweeted, "Glad to see Iowa leading the way and standing up for the most vulnerable in our society, the unborn. Thank you @IAGovernor for taking this important step forward in protecting life."


No Democrats voted for the bill. "This unconstitutional bill is nothing but a thinly veiled attack on Iowa women's most basic rights and freedoms — every woman deserves the fundamental right to make decisions about her own body with her doctor," Democratic National Committee women's media director Elizabeth Renda said in a written statement.



Iowa has permitted most abortions up to 20 weeks. Critics of the new law say the six-week deadline will prohibit abortions before women may even realize they are pregnant.



"The likelihood that an individual can miss her period, get a pregnancy test, then make an appointment to see an abortion provider, take time off of work if she's working, find child care for her other children, get in to get her abortion and have all of that done prior to a six-week time period is absolutely unrealistic and unreasonable," said Dr. Jamila Perritt, a fellow with Physicians for Reproductive Health, which advocates for contraception and abortion rights.


Perritt said the law is simply designed to limit access to abortion. "The reality is that it's justice by geography. Abortion is legal in this country."



At a rally on Friday at the Iowa State Capitol, Suzanna de Baca, president and CEO of Planned Parenthood of the Heartland, said the organization would file a lawsuit against the governor if she signed the bill. The organization tweeted, "We will fight like hell with everything we have."


The American Civil Liberties Union also announced plans to sue with the Planned Parenthood Action Fund.
Reynolds knew that her signature would be incendiary. "I understand and anticipate that this will likely be challenged in court and that courts may even put a hold on the law until it reaches the Supreme Court," she said in the statement. "However, this is bigger than just a law. This is about life. I am not going to back down from who I am or what I believe in."



According to Planned Parenthood, the law will not go into effect until July 1, "and that is only if the courts don't intervene first."

_____________________________________________



Here we have what is called a REAL ALL-AMERICAN taking a KNEE for supposedly for our US 99% of black citizens. The global banking freemason football STAR----KAEP is a PLAYER---not a 99% black populist leader. KAEP is doing nothing for our 99% of black citizens whether US or new to America African citizens.


When our 99% of right wing citizens take a stand against TRUMP------this meme showing a AMERICAN FLAG ---using that ALL -AMERICAN stance same as TRUMP ----


These are far-right wing global banking 5% freemason/Greek players working for ONE WORLD ONE GOVERNANCE taking the US to DARK AGES colonial status--



Indeed this 5% white freemason/Greek player does indeed stand with KAEP----as a 5% black freemason/Greek player in these DARK AGES MOVING FORWARD goals.



I’ll Take A Knee with Kaep Before I Ever Stand with Trump Colin Kaepernick Hoodie

$33.80 – $38.00

About I’ll Take A Knee with Kaep Before I Ever Stand with Trump Colin Kaepernick Hoodie from clothzoo.com


This hoodie is Made To Order, one by one printed so we can control the quality.
We use newest DTG Technology to print on to hoodie.
Color variant is black, gray, white.



__________________________________________

Here is FAKE OUR REVOLUTION 'populist leader' CORTEZ being made to look 'LEFT MARXIST' when indeed she is a far-right wing global corporate campus FASCIST------nothing LEFT happening with WORLD BANK GLOBAL CORPORATE FASCISM----simply setting stage for CIVIL UNREST CIVIL WAR just as has occurred in LATIN AMERICA-----southeast Asia----ARABIA----and AFRICA----
SAME FAKE MARXISM MADE TO LOOK PRO-WORKER ALWAYS LEADING TO POVERTY AND ENSLAVEMENT.
That is what all OUR REVOLUTION for what the global 1% OLD WORLD KINGS AND QUEENS ----work



Ocasio-Cortez and progressives score a victory in Amazon fight

Analysis by Zachary B. Wolf, CNN


Updated 1:27 PM ET, Thu February 14, 2019

Landing Amazon HQ2 was supposed to be a big win for Democrats who run New York, but instead it's turned into a monstrous headache that's exposing deep political fissures inside the party.



One one side is Gov. Andrew Cuomo, who joked he'd change his name to 'Amazon' to win the company's business, and Mayor Bill de Blasio.

Amazon said to be reconsidering New York City headquarters


On the other is freshman Rep. Alexandria Ocasio-Cortez, who on Friday declared victory amid reports that the company might be having second thoughts -- and former New York Mayor Michael Bloomberg, who suggested that Amazon doesn't really need any more tax breaks.

The Amazon deal is the odd issue in US politics that can tie de Blasio and Cuomo together on one side, and Bloomberg and Ocasio-Cortez on the other.
It turns out that what some Democrats call economic improvement, others see as corporate charity.


To recap, the Internet behemoth promised billions of dollars in new tax base, tens of thousands of high-paying jobs and the honor of being home to HQ2.



Policymakers nationwide were eating from the Internet giant's hands and falling over each other to sweeten Amazon's pot with tax breaks and infrastructure improvements, all but begging Jeff Bezos to pick them and move in.



It was like a nationwide real-life season of "The Bachelor," with rounds of courtship and periodic cuts. The rose was ultimately split between Queens, New York, and Crystal City in Arlington, Virginia. A smaller campus is also planned for Nashville.



Virginia consummated things Tuesday when embattled Democratic Gov. Ralph Northam signed into law a $750 million incentive package.



But at least part of the resulting three-way marriage feels about as sturdy as a match made on TV.


New York is supposed to grant $1.5 billion in incentives contingent on the company creating 25,000 jobs with an average salary of $150,000.


"We can't find two nickels to rub together to make the subways run on time or to build affordable housing or to build enough schools for our kids -- in this very neighborhood, mind you -- and yet we're showering Jeff Bezos with all this money that he clearly doesn't need," said Michael Gianaris on CNN. He's the deputy majority leader of the New York State Senate, represents Queens and has emerged as a top critic of the deal.


0 Comments

February 15th, 2019

2/15/2019

0 Comments

 
AMENDMENT TO COMPLAINT
Cindy Walsh Complaint #190085


I sent yesterday my COMPLAINT case of TOILET CAM in 1st fl women's bathroom U of M Baltimore Medical Library.  Today, with more knowledge I would like to make one more point in VULNERABILITY to sexual assault tied to hacking existing wiring to create toilet cam pornography.

While my original complaint identified LIGHT FIXTURES and LIGHT BULB as source of capture by hackers for illegal surveillance I want to include what is called MICRO-USB APPLE CHARGING PLATFORMS.  Now, charging platforms can be small for home use---or they can be large for institutional/corporate use.  Both large and small platforms have the same capacity to be hacked and made into illegal surveillance both camera and microphone.  In this case, U of M Baltimore Medical Library installed a institutional sized CHARGING PLATFORM about the time renovations of 1st floor bathrooms occurred, ie. about 4 months ago.  I include the article below because it is an example of that SMALLER CHARGING PLATFORM being used for just what my complaint outlines.  Someone can place any laptop, notepad, smart phone inside CHARGING PLATFORM wired connection to Library electrical source---same as bathroom LIGHT FIXTURES/LIGHT BULBS.  The charging process for these devices which likely are CAMERA-MICROPHONE-READY allow someone to not even be in those close locations I describe in yesterday's complaint.  I know my concerns outlined yesterday are VALID----but now I see further VULNERABILITY with CHARGING PLATFORM placed right against 1st floor bathrooms.  Camera functions can be piggy-backed---meaning someone could use another computer to attach to that device inside CHARGING PLATFORM and control image capture same way as described in yesterday's account.  This platform is additional to my claims in yesterday's complaint.  I am sure both avenues have and will be exploited when these bathroom renovations create VULNERABILITY not only with LIGHT FIXTURES/LIGHT BULBS----but any device inside bathroom being SENSORED-----as fire alarms for example.

MICRO-USB APPLE CHARGING PLATFORM



"voyeur” porn sites, some of which showed “what appeared to be footage from hidden cameras in bathrooms of women using the restroom.”

'she removed it from the downstairs bathroom at DFR Station 11 to charge her phone upstairs. Her husband was reportedly the one who first realized the charger actually also functioned as a camera'


Below we see where in DALLAS, a DALLAS police department took all this very seriously----they are investigating-----the FIRE DEPARTMENT leaders were pushing this investigation.  What is different in this DALLAS----or maybe not-----is that where this article hints this pornography suspect was a LONE-GUN------I KNOW my was not a LONE-GUN and I KNOW my case ended being downloaded onto pornographic internet sites, this making it WIRE CRIMES ----not simply a case of self-enjoyed images.

Please, include in any investigation of this COMPLAINT #190085 all of these points of VULNERABILITY and the knowledge these TOILET CAM PORNOGRAPHY are being found on the internet pornography sites.  All these VULNERABILITIES can be solved through FACILITIES CORRECTIONS PROTECTING LIGHT FIXTURES and placement of things like CHARGING PLATFORMS away from BATHROOMS/GYM LOCKER ROOMS/ANY CHANGING AREA.


Dallas firefighter hid camera in firehouse bathroom, took sex toys to work, police say

DALLAS NEWS.COM Feb 14, 2019


A former Dallas Fire-Rescue (DFR) firefighter has been arrested and charged with attempted invasive visual recording for allegedly planting a hidden camera in a fire station bathroom. The matter is currently under investigation.


Another firefighter’s wife first discovered the device, which doubles as a phone charger, on Thanksgiving Day last year when she removed it from the downstairs bathroom at DFR Station 11 to charge her phone upstairs. Her husband was reportedly the one who first realized the charger actually also functioned as a camera, but he didn’t come forward at the time because he was new to his job and didn’t want to draw attention to himself, according to an arrest affidavit obtained by CBS affiliate WFAA.


Two months later, Capt. Daniel Puente discovered the camera and started questioning firefighters to find its owner. That’s when Craig Lawrence, the firefighter accused of misconduct, allegedly “exhibited nervous behavior” and ultimately admitted on Jan. 21 that the USB device was his, though he claimed he didn’t know it doubled as a camera.


According to the affidavit, Lawrence began to break down later that day, telling Puente, “I’m about to lose everything. I’m going to jail. I’m going to lose my job and my kids, [my wife] is going to divorce me.”



DFR spokesperson Jason Evans told Yahoo Lifestyle in a statement that Lawrence was placed on administrative leave while police launched an investigation. But on Jan. 24, Lawrence resigned from DFR — where he had worked for five years — and started working as a full-time firefighter for the city of Wilmer, Texas.


Lawrence reportedly has a history of “sexually explicit behavior” at work, including telling sexually graphic stories, showing off sex toys and spending an inordinate amount of time on his laptop with the screen hidden, according to WFAA.

Investigators searching Lawrence’s home reportedly found “sexual-related props” as well as a “hand-drawn caricature of a Dallas firefighter sitting on the toilet with his pants down.” According to the affidavit, a search of the firefighter’s web browser history revealed visits to “voyeur” porn sites, some of which showed “what appeared to be footage from hidden cameras in bathrooms of women using the restroom.”


When questioned by authorities last Friday, Lawrence changed his story. He said he had purchased the camera to try to “determine who had been rummaging through his duffel bag at work,” according to the affidavit, and that it accidentally made its way into the bathroom. He denied planting the device himself. He also initially told police he didn’t own a laptop — but then later said his laptop had broken and that he’d thrown it away. Authorities were unable to recover any footage from the camera, as its memory card was damaged.



On Wednesday, Lawrence was booked into Dallas County Jail and charged with invasive visual recording, a class A misdemeanor. His new employers in Wilmer have placed Lawrence on administrative leave until further notice.



Lawrence’s alleged behavior has been condemned by Jim McDade, president of the Dallas Firefighters Association. “It’s absolutely inexcusable, and not forgivable at all,” he said to WFAA. “A station is where firefighters spend a third of their lives. It’s our home away from home, and we expect it to be able to be safe so we can bring our families here. This is not representative of who firefighters are and what we stand for.”


He did, however, praise the firefighters who reported the misconduct. “They did exactly what they were supposed to do,” he said. “They recognized it as a direct threat to their families and all of our employees.”
0 Comments
<<Previous

    Author

    Cindy Walsh is a lifelong political activist and academic living in Baltimore, Maryland.

    Archives

    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    December 2012
    November 2012
    October 2012
    September 2012
    August 2012
    July 2012
    June 2012
    May 2012
    April 2012

    Categories

    All
    2014 Economic Crash
    21st Century Economy
    Affordable Care Act
    Affordable Care Act
    Alec
    Americorp/VISTA
    Anthony Brown
    Anthony Brown
    Anti Incumbant
    Anti-incumbant
    Anti Incumbent
    Anti Incumbent
    Attacking The Post Office Union
    Baltimore And Cronyism
    Baltimore Board Of Estimates
    Baltimore Board Of Estimates
    Baltimore Development Corp
    Baltimore Development Corp
    Baltimore Recall/Retroactive Term Limits
    Bank Fraud
    Bank Fraud
    Bank Of America
    Bank Settlement
    Bank-settlement
    B Corporations
    Bgeexelon Mergerf59060c411
    Brookings Institution
    Business Tax Credits
    California Charter Expansion
    Cardin
    Career Colleges
    Career Colleges Replacing Union Apprenticeships
    Charters
    Charter School
    Collection Agencies
    Common Core
    Consumer Financial Protection Bureau
    Consumer-financial-protection-bureau
    Corporate Media
    Corporate-media
    Corporate Oversight
    Corporate-oversight
    Corporate Politicians
    Corporate-politicians
    Corporate Rule
    Corporate-rule
    Corporate Taxes
    Corporate-taxes
    Corporate Tax Reform
    Corporatizing Us Universities
    Cost-benefit-analysis
    Credit Crisis
    Credit-crisis
    Cummings
    Department Of Education
    Department Of Justice
    Department-of-justice
    Derivatives Reform
    Development
    Dismantling Public Justice
    Dodd Frank
    Doddfrankbba4ff090a
    Doug Gansler
    Doug-gansler
    Ebdi
    Education Funding
    Education Reform
    Edwards
    Election Reform
    Election-reform
    Elections
    Emigration
    Energy-sector-consolidation-in-maryland
    Enterprise Zones
    Equal Access
    Estate Taxes
    European Crisis
    Expanded And Improved Medicare For All
    Expanded-and-improved-medicare-for-all
    Failure To Prosecute
    Failure-to-prosecute
    Fair
    Fair And Balanced Elections
    Fair-and-balanced-elections
    Farm Bill
    Federal Election Commissionelection Violationsmaryland
    Federal Election Commissionelection Violationsmarylandd20a348918
    Federal-emergency-management-agency-fema
    Federal Reserve
    Financial Reform Bill
    Food Safety Not In Tpp
    For Profit Education
    Forprofit-education
    Fracking
    Fraud
    Freedom Of Press And Speech
    Frosh
    Gambling In Marylandbaltimore8dbce1f7d2
    Granting Agencies
    Greening Fraud
    Gun Control Policy
    Healthcare For All
    Healthcare-for-all
    Health Enterprise Zones
    High Speed Rail
    Hoyer
    Imf
    Immigration
    Incarceration Bubble
    Incumbent
    Incumbents
    Innovation Centers
    Insurance Industry Leverage And Fraud
    International Criminal Court
    International Trade Deals
    International-trade-deals
    Jack Young
    Jack-young
    Johns Hopkins
    Johns-hopkins
    Johns Hopkins Medical Systems
    Johns-hopkins-medical-systems
    Kaliope Parthemos
    Labor And Justice Law Under Attack
    Labor And Wages
    Lehmann Brothers
    Living Wageunionspolitical Action0e39f5c885
    Maggie McIntosh
    Maggie-mcintosh
    Martin O'Malley
    Martin O'Malley
    Martin-omalley
    Martin-omalley8ecd6b6eb0
    Maryland Health Co Ops
    Maryland-health-co-ops
    Maryland-health-co-ops1f77692967
    Maryland Health Coopsccd73554da
    Maryland Judiciary
    Marylandnonprofits
    Maryland Non Profits
    Maryland Nonprofits2509c2ca2c
    Maryland Public Service Commission
    Maryland State Bar Association
    Md Credit Bondleverage Debt441d7f3605
    Media
    Media Bias
    Media-bias
    Medicaremedicaid
    Medicaremedicaid8416fd8754
    Mental Health Issues
    Mental-health-issues
    Mers Fraud
    Mikulski
    Military Privatization
    Minority Unemploymentunion And Labor Wagebaltimore Board Of Estimates4acb15e7fa
    Municipal Debt Fraud
    Ndaa-indefinite-detention
    Ndaaindefinite Detentiond65cc4283d
    Net Neutrality
    New Economy
    New-economy
    Ngo
    Non Profit To Profit
    Nonprofit To Profitb2d6cb4b41
    Nsa
    O'Malley
    Odette Ramos
    Omalley
    O'Malley
    Open Meetings
    Osha
    Patronage
    Pension-benefit-guaranty-corp
    Pension Funds
    Pension-funds
    Police Abuse
    Private-and-public-pension-fraud
    Private Health Systemsentitlementsprofits Over People
    Private Health Systemsentitlementsprofits Over People6541f468ae
    Private Non Profits
    Private-non-profits
    Private Nonprofits50b33fd8c2
    Privatizing Education
    Privatizing Government Assets
    Privatizing-the-veterans-admin-va
    Privitizing Public Education
    Progressive Policy
    Progressive Taxes Replace Regressive Policy
    Protections Of The People
    Protections-of-the-people
    Public Education
    Public Funding Of Private Universities
    Public Housing Privatization
    Public-libraries-privatized-or-closed
    Public Private Partnerships
    Public-private-partnerships
    Public Transportation Privatization
    Public Utilities
    Rapid Bus Network
    Rawlings Blake
    Rawlings-blake
    Rawlingsblake1640055471
    Real Progressives
    Reit-real-estate-investment-trusts
    Reitreal Estate Investment Trustsa1a18ad402
    Repatriation Taxes
    Rule Of Law
    Rule-of-law
    Ruppersberger
    SAIC AND INTERNATIONAL SECURITY
    Sarbanes
    S Corp Taxes
    Selling Public Datapersonal Privacy
    Smart Meters
    Snowden
    Social Security
    Sovereign Debt Fraudsubprime Mortgage Fraudmortgage Fraud Settlement
    Sovereign Debt Fraudsubprime Mortgage Fraudmortgage Fraud Settlement0d62c56e69
    Statistics As Spin
    Statistics-as-spin
    Student-corps
    Subprime Mortgage Fraud
    Subprime-mortgage-fraud
    Surveillance And Security
    Sustainability
    Teachers
    Teachers Unions2bc448afc8
    Teach For America
    Teach For America
    Technology Parks
    Third Way Democrats/new Economy/public Union Employees/public Private Patnerships/government Fraud And Corruption
    Third Way Democratsnew Economypublic Union Employeespublic Private Patnershipsgovernment Fraud And Corruption
    Third-way-democratsnew-economypublic-union-employeespublic-private-patnershipsgovernment-fraud-and-corruptionc10a007aee
    Third Way/neo Liberals
    Third-wayneo-liberals
    Third-wayneo-liberals5e1e6d4716
    Third Wayneoliberals7286dda6aa
    Tifcorporate Tax Breaks2d87bba974
    Tpp
    Transportation Inequity In Maryland
    Union Busting
    Unionbusting0858fddb8b
    Unions
    Unionsthird Waypost Officealec3c887e7815
    Universities
    Unreliable Polling
    Unreliable-polling
    Van Hollen
    Van-hollen
    VEOLA Environment -privatization Of Public Water
    Veterans
    War Against Women And Children
    War-against-women-and-children
    Youth Works

    RSS Feed

Powered by Create your own unique website with customizable templates.