I state often that for some reason I am waking up each morning at 1:30-2:00AM changing from usual 3:00-3:30 AM-----thinking of a reason. My hypothesis of BODY ELECTRIC feeling massive internet data downloads from businesses to HOST SERVERS which then transfer that data to internet platform----such as COMCAST/VERIZON internet cables in our city. I knew for example our community banks download ATM data each day at 1:30-2:00AM because it is the middle-of-night when capacity for these massive downloads can access space -----businesses closed----people using internet sleeping for the most part.
As NOSY NEIGHBOR AND THE GANG illegal surveillance with camera and microphone capture soared in and around my living space I could feel the soaring electrical feedback released by surveillance devices-----by transmission of daily continuous streaming videos from all these surveillance devices from computers where data is first collected to when it is downloaded onto internet heading for HOST SERVERS.
In thinking of why I was experiencing these reactions to electrical transmissions particularly at those early morning hours, I remembered---HIND SIGHT IS 20/20----articles being written in national media tied to cell phone users having data downloading packages with their cell phones experiencing UNKNOWN SOURCES OF DOWNLOADING CHARGES often adding hundreds/thousands of dollars to a single monthly CELL PHONE BILLING PLAN.
As I set a TIMELINE for when NOSY NEIGHBOR AND THE GANG network may have began-----grown---becoming saturated in my community I know these several years saw that explosion in illegal surveillance of homes/apartments as newer and more complex telecommunications devices were placed on market. Remember, all these SPY CAMERA products are coming from WAR ZONE surveillance and spying products used in overseas CIVIL UNREST CIVIL WAR zones.
Below, I found the earliest hint of hacking to transfer costs of WEBCAM streaming video downloads corresponding with 2010 spike in citizens having cell phone plans tied to streaming video. WHERE DID ALL THAT MEGA-BITE download fee come from say these telecom customers------VODAPHONE, ATT, et al these conversations coming from CHAT LINES tied to CUSTOMER SERVICE platforms each telecom created to solve CONSUMER COMPLAINTS------ie. why is my monthly data download charges EXTREMELY HIGH!
In each case the common denominator was WIFI------cell phone CHARGER-------the data downloads occurring in middle of night when phone was on charger and inactive.
Fix iphone high data usage spike common culprit and how to stop data leak overage
Published on Oct 26, 2013
Fix for any Apple iphone that has a high, excessive or unexplained jump in data usage. The common culprit and how to stop this issues is in the video and description.
Microsoft chat-----Jan 12, 2014
Options to control excessive data usage
I have progressively switched on/off various options in the phone to try to limit the background data usage however this month I have received a substantial excess data usage bill from my carrier. Looking at the records supplied by the carrier, a large proportion of these data usage records are logged during the middle of the night or early morning when my phone is connected to my home wifi and on standby.
Some general questions:
a) does my phone process background tasks over wifi when available and phone is on standby?
b) what can it possibly be doing at 2-5am when in standby that would use up 50-250MB?
c) my carrier has said "it could be a virus transmitting data". Is this possible? I haven't been able to find any reports of virus attacks on WP8.
Excessive data use - Vodacom Communitycommunity.vodacom.co.za/t5/Prepaid-Services/... I bought a 100mb data bundle as i was told it would last me at least a week. i checked my data balance the next day, and it was down to 14mb which is strange, because i was connected to wifi for a good portion of the time and used the wifi, to download and install/upgrade apps.
Whereas my DEPOSITION and lawsuit is tied to illegal surveillance and pornography------I encourage people having been victims of EXTREME cell phone data streaming charges to JOIN IN CLASS ACTION LAWSUITS. Sometimes the victim of NOSY NEIGHBOR AND THE GANG are the same victims of hacking of cell phone data plans-------if victim of pornography capture does not have these kinds of cell phone plans----those NOSY NEIGHBORS will be looking for any UNPROTECTED CELL PHONE ON CHARGER ----having that plan. APPLE I PHONE is particularly VULNERABLE because all products have built-in CAMERA/MICROPHONE parts for easy HACKING CAPTURE.
Unknown data usage early morning
With the changes to the data plans, i decided to look at my wifes data usage on her iphone. What i have found is odd and a bit concerning. Overall her data usage is pretty much nothing, except for something that occurs every morning around 1 or 2 am. I have included data usage on the AT&T account below. As you can see, something happens around 1 or 2 am every morning, i just dont know what it is. The amount of data being transferred is REALLY high if you ask me, as high as 75336KB back on the 17th. I called AT&T support and they said it was the phone updating or mail being downloaded, basically they have no idea. I have the mail set to fetch manually already. Anyway to determine what is going on???
06/04 01:22 AM phone Internet/MEdia Net Sent 3368KB
06/03 01:45 AM phone Internet/MEdia Net Sent 18906KB
06/02 01:45 AM phone Internet/MEdia Net Sent 6878KB
06/01 01:45 AM phone Internet/MEdia Net Sent 9460KB
05/31 07:45 PM phone Internet/MEdia Net Sent 1918KB
05/31 01:27 AM phone Internet/MEdia Net Sent 7551KB
05/30 02:27 PM phone Internet/MEdia Net Sent 1224KB
05/30 01:17 AM phone Internet/MEdia Net Sent 2685KB
05/29 01:39 AM phone Internet/MEdia Net Sent 8120KB
05/28 01:39 PM phone Internet/MEdia Net Sent 5410KB
05/28 01:07 AM phone Internet/MEdia Net Sent 5068KB
05/27 10:42 AM phone Internet/MEdia Net Sent 21778KB
05/27 01:06 AM phone Internet/MEdia Net Sent 10419KB
05/26 09:26 AM phone Internet/MEdia Net Sent 20657KB
05/26 01:50 AM phone Internet/MEdia Net Sent 8467KB
05/25 02:21 PM phone Internet/MEdia Net Sent 18086KB
05/25 01:25 AM phone Internet/MEdia Net Sent 5249KB
05/24 01:25 AM phone Internet/MEdia Net Sent 1012KB
05/23 01:25 AM phone Internet/MEdia Net Sent 12978KB
05/22 01:25 AM phone Internet/MEdia Net Sent 9749KB
05/21 01:41 AM phone Internet/MEdia Net Sent 19166KB
05/20 01:17 AM phone Internet/MEdia Net Sent 23860KB
05/18 11:56 PM phone Internet/MEdia Net Sent 15440KB
05/18 01:06 AM phone Internet/MEdia Net Sent 29900KB
05/17 01:12 AM phone Internet/MEdia Net Sent 75336KB
Posted on Jun 5, 2010 4:56 AM
Jun 6, 2010 8:21 AM in response to cnpeyton
I have the same issues. My phone is almost always on WIFI so my cell data usage is fairly low but I went to look at my history at AT&T and discovered the same thing - unauthorized, unexplained cellular data transfers in the early morning (1 to 3 am). At this point in my billing cycle, these unexplained transfers account for almost 2/3's of my usage. My transfers range from 50KB to 2MB, which is orders of magnitude more than "collecting simple statistics". But your amounts !! wow, what is going on there? This stuff combined with some normal usage could put you over the 200MB cap in less than a week and end up costing you money.
Jun 5, 2010 6:14 AM in response to jinx.pt
The thing that i don't get is that at home, the iphone run on WIFI over my home network. So why at 1 or 2 am when the phone is on the charger at home, is there these huge data transfers over the 3G network?
This is way to much data for stats, i have some nights at 20 MB, 30 MG, even 70 MB. I am going to make sure the phone is set to fetch manually, but outside of that, i can't imagine what is going on.
Jun 6, 2010 8:39 AM in response to cnpeyton
Thanks for bringing this up. I see the same activity, outbound data, around 2:24 AM each day. the smallest transfer over the past 3 weeks was 99 KB, the largest 10 MB. I DO have Exchange push email enabled, but I wouldn't be sending, only receiving.
Jun 7, 2010 7:45 AM in response to Lawrence Finch
Same here. I'm only a few days into my billing cycle and it already used 15MB all on its own
Jun 7, 2010 3:54 PM in response to cnpeyton
Just looked at my data usage and I have the same issue. Every other night around midnight when I am asleep and the phone is being charged there is are unknown data transfers. On 5/30 there was 71,000 KB of data transferred at 12:28 A.M. I'm really curious to know what is causing this. Everyone should check their bill and see if this is happening to them!
It is common knowledge that plenty of SPYING AND HACKING TOOLS exist which can allow any hacker to search for UNPROTECTED technology devices to hack-------including a person who has UNPROTECTED cell phone------a brand likely to have a DATA STREAMING PLAN allowing for transfer of costs from NOSY NEIGHBOR AND HOSTING SERVER second level of power----to transfer costs of DAILY DOWNLOADING OF THESE SURVEILLANCE VIDEO DATA.
While the act of hacking cell phone data plans for downloading illegal surveillance feeds is not PORNOGRAPHY-----it does fall under COMPUTER HACKING LAWS-------which include the hacking of ANY technology device not owned by hacker.
When we think of the REVENUE GAINS by NOSY NEIGHBOR AND THE GANG in transferring these data transfer costs to victim----I am noting ADDITIONAL PROFITS earned in process of illegal surveillance of my home by continuous video and microphone capture. The size in MBs of these data streams each day--------gives an estimate of how much revenue gain HOSTING SERVER second level power saves in cost of doing ILLEGAL, RACKETEERING BLACK MARKET pornography operations.
'Unauthorized Access with Intent to Defraud (which includes internet fraud and “phishing”)'
'Violations of the Computer Fraud and Abuse Act can be prosecuted as misdemeanors or felonies primarily depending on the motivation behind the computer misconduct'.
'Another law that is occasionally used in “computer hacking” cases is the protection against unlawful access to stored communications (18 U.S.C. §2701). This law punishes the use of a computer to access another person’s “electronic communication service” where the person has their email or voicemail stored. If the unauthorized access to a person’s voicemail or email is done for profit or financial gain, then it is a felony'.
Below the COMPUTER HACKING LAWS article would make one think only PROTECTED COMPUTERS as defined as GOVERNMENT/FINANCIAL computers----but that is not how these laws are interpreted------the update of computer hacking frauds/crimes include ANY COMPUTER CONNECTED TO INTERNET-------
Wire Fraud'Wire fraud refers to fraud that is committed through the use of wires, or electronic means. Wire fraud may be committed using interstate wires, television or radio communications, or the Internet. Wire fraud is an intentional act to defraud another individual or entity of his money or property, and is a federal crime punishable by up to 30 years in prison. To explore this concept, consider the following wire fraud definition'.
Definition of Wire FraudNoun
- The crime of using an interstate wire, television or radio communications, or the Internet, in order to defraud someone.
1872 U.S. legal system
What is Wire FraudWire fraud shares many characteristics with regular fraud, though it is committed through the use of phone lines or other wires, utilizing electronic communications. Wire fraud is committed in order to defraud another person out of money or something else of value, to the financial gain of the perpetrator. Wire fraud is a federal crime. To successfully charge an individual with wire fraud, the crime must meet four specific elements:
- The defendant voluntarily concocted, or participated in, a scheme to defraud a person or entity out of money, or something else of value
- The defendant perpetrated the scheme with the intent to defraud the victim
- The defendant used interstate wire communications to perpetrate the fraud
- The defendant should have known that interstate wire communications would be used to complete the fraud
Mail fraud, which has been a federal crime since 1872, entails fraud committed through the use of the U.S. Mail system. Wire fraud, a much newer issue, entails fraud committed through the use of any electronic communications, including email, text message, telephone call, the Internet, television communication, and radio communication.
Larry prints up postcards imitating a non-profit organization seeking donations to save the local animal shelter. Larry then mails those postcards through the U.S. Post Office to residents of a neighborhood in which mostly affluent older people live, figuring they are most likely to write out checks for his phony cause. The moment Larry put those cards into the mail he has committed mail fraud.
Larry instead decides to create a webpage imitating his fictional non-profit organization, asking people to donate to his cause through PayPal. He sends out spam emails, and makes a bunch of social media posts soliciting donations. Larry’s crime now uses electronic means to commit his fraud scheme, which constitutes wire fraud.
Wire Transfer FraudWire transfers are used to move funds from one account to another. These electronic wire transfers can be used to move money between banks, pay bills, or send money to another person or business. Scammers use many tools, including phishing sites and malware, to steal bank and other account login information. Once this information is obtained, the scammers commit wire transfer fraud to move the victim’s money into their own accounts.
Experts advise individuals and entities to protect their assets from wire transfer fraud by installing a firewall, anti-virus, and anti-malware software on their computers and other electronic devices. They also advise maintaining secure passwords, and using caution when entering passwords and any personal information on a website, or into a POS terminal.
Wire Fraud ScamsScammers use a wide variety of wire fraud scams to defraud people out of their hard-earned money. Typically, wire fraud scams involve attempts to steal people’s financial information, which can be used to access credit cards or bank accounts, to make purchases, and even to open new credit accounts. One common wire fraud scam is known as “phishing.”
Phishing wire fraud scams begin when the scammer sends out emails to a large number of people, detailing a tragic story, and outlining why the scammer needs financial help. The email wraps up by asking the recipient for money or other financial assistance. Once the victim takes that bait, replying to the email (or social media message), the scammer begins weaving a complex story, and ultimately requests the victim’s personal information with the intent of using it to gain financially.
A scammer sends out a mass email claiming to be a Nigerian prince who has been exiled. He states in the email that he has money in a Nigerian bank account that needs to be transferred to the United States. He tells the recipient that, if she will allow him to temporarily deposit $100,000 into her bank account, he will pay her $2,000 once he transfers the money to a safer bank. Once the victim gives the scammer her bank account information, he has access to her money.
Wire Fraud PenaltiesWire fraud penalties can be severe, as this federal crime is classified as a felony. Each act of wire fraud is charged as a separate offence, punishable by large fines, and 20 years or more in prison. This means that, if the perpetrator makes 20 phone calls attempting to defraud people, he can be charged with 20 separate counts of wire fraud. In such a case, wire fraud penalties stack up, and can result in a lifetime behind bars. Wire fraud penalties in cases involving a financial institution are much more severe.
St. Louis Man Guilty of Four Counts of Wire FraudOn May 8, 2015, 54-year old Dana Jefferson stood in court, as U.S. District Judge Audrey Fleissig handed down his sentence for a string of felony wire fraud counts. Jefferson had convinced certain people that he had received an inheritance from his father, the amount of which varied between $5 million and $200 million. There was no inheritance, and Jefferson approached potential victims using several different names. He told these prospective fraud victims that the money was tied up in a trust, or sometimes that it was in a Florida bank, making up various convincing reasons he could not access it at the time.
By making promises to enrich his intended victims, by paying double the amount of the loan he was seeking, buying them homes or expensive cars, or paying for plastic surgery, Jefferson duped nine people out of a total of $740,000. The means Jefferson used to contact his victims, by mail, email, and phone, makes this a crime of mail and wire fraud. In a plea deal, Jefferson pled guilty to four counts of felony wire fraud, and was sentenced to 42 months in federal prison.
Related Legal Terms and Issues
- Defendant – A party against whom a lawsuit has been filed in civil court, or who has been accused of, or charged with, a crime or offense.
- Felony – A criminal offense punishable by a year or more in jail.
- Fraud – A false representation of fact, whether by words, conduct, or concealment, intended to deceive another.
- Fraudulent Intent – A false statement or deceptive act made with the intent to deceive the victim.
- Perpetrator – A person who commits an illegal or criminal act.
Computer Fraud and Abuse Act (18 U.S.C. §1030).
Subsection 1030 (a) (5)------transmitting code that damages a computer system.
Computer Hacking Laws
We understand computer hacking laws.
Over the past 20 years, our federal criminal defense lawyers have helped people charged with violating computer hacking laws in courts across the United States.With the increased use of computers and digital information across the world, our firm has seen the United States Department of Justice dramatically increase its investigation and prosecution of alleged violations of computer hacking laws. While there are a number of different federal criminal laws that may apply to allegations of computer hacking and cybercrime, most federal prosecutors focus on a few specific computer crime laws.
Computer Hacking Laws
The term “computer hacking” generally refers to the illegal use of a computer in an attempt to access another computer without authorization in order to commit fraud or cause harm.
Most computer hacking charges are prosecuted under the Computer Fraud and Abuse Act (18 U.S.C. §1030). This law covers a variety of different types of computer crimes and has been used very aggressively by the government in recent years.
The basic requirements for prosecution under this computer hacking law are that the computer is a “protected computer,” and that the individual charged accessed that computer “without authorization.” Due to recent amendments to this law, the government defines these terms very broadly.
A “protected computer” is not just a computer that belongs to a government agency, it can include any computer that is connected to the internet. That would include a person’s computer provided by their employer, a computer at the public library, or other electronic devices that have internet access.
Similarly, the definition of “without authorization” is very broad. A person who has authorization to use a certain computer may nonetheless be prosecuted under this law if the person’s use of the computer “exceeds authorization” or if the person uses the computer for some “improper purpose.” If a person is given access to a work computer for limited purposes, but then uses that computer to engage in activity that is not approved (fantasy football, for example), then that person can arguably be prosecuted under this law.
Most criminal prosecutions under the Computer Fraud and Abuse Act fall into one of the following categories:
- Obtaining National Security Information
- Unauthorized Access of a Protected Computer
- Trespassing in Relation to Government Computers
- Unauthorized Access with Intent to Defraud (which includes internet fraud and “phishing”)
- Damaging a Computer or Computer Information
- Trafficking in Computer Passwords with the Intent to Defraud
- Threatening to Damage a Computer
Violations of the Computer Fraud and Abuse Act can be prosecuted as misdemeanors or felonies primarily depending on the motivation behind the computer misconduct. Accessing a computer and obtaining information for profit is generally prosecuted as a felony, as is any violation of this law that causes a loss in excess of $5,000.
The specific penalties for violating the Computer Fraud and Abuse Act depend on the type of misconduct involved and the amount of harm that it causes. As with any other federal criminal prosecution, a person’s sentence will be determined primarily by the calculation of the Advisory Federal Sentencing Guidelines.
In addition to the Computer Fraud and Abuse Act, there are a couple of other laws that deal with “computer hacking” offenses. The CAN-SPAM Act is intended to prosecute people who distribute large amounts of unsolicited commercial email (“spam”) (18 U.S.C. §1037). There are a variety of different civil and criminal penalties under this law, and the punishment usually depends on the amount of “spam” delivered or how it was used.
Another law that is occasionally used in “computer hacking” cases is the protection against unlawful access to stored communications (18 U.S.C. §2701). This law punishes the use of a computer to access another person’s “electronic communication service” where the person has their email or voicemail stored. If the unauthorized access to a person’s voicemail or email is done for profit or financial gain, then it is a felony.
This goes to my case claim of IDENTIFY THEFT in hiding and lying about lack of CONSENT for illegal surveillance
The Dark Web as You Know It Is a Myth
The Rest of the Web Is Just as ‘Dark’
For years there have been sites where you can instantly buy a stranger's Social Security Number, date of birth, full name, address and phone number for under a dollar, or others that host reams of stolen credit card details, ripe for a fraudulent spending spree'.
My case involves as well NOSY NEIGHBOR tapping my cell phone without permission allowing for illegal capture of incoming calls------incoming messages-----even knowing what images my PHONE CAMERA was taking.
How To Spy on a Cell Phone Without Possession
PhoneSpector is a powerful utility app (aka:“tracking apps for cell phones”), that allows you to spy on a cell phone or any mobile device without having the device in your possession. The app works by remotely accessing data from the target phone (the phone you are monitoring) and displaying that data on your cell phone, tablet or computer. PhoneSpector claims that it will collect texts, calls, GPS, Facebook, Twitter and more from virtually any phone.
We decided to put this sneaky little app to the test so, with the consent of our co-worker, Tracy, we remotely connected to her phone here in the office. You will be shocked at what we discovered!
The program was every bit invasive as you might think. PhoneSpector gathered text messages, calls, GPS tracking information, social media messages and pictures and just about everything else that transpired on the phone. With the “Stealth Camera” feature we were able to secretly take a picture using the telephone’s camera and have that picture sent to the phone that we were spying from. Think of it this way; Tracy, our consenting co-worker, has her phone in her hands and I am monitoring her phone from mine. I send a command to Tracy’s phone telling it to take a picture. The program snaps a picture on her phone, then automatically sends that picture to me. I can now view that picture on my cell phone. A little creepy, but wait, it gets worse…
In any lawsuit the case presented is not only EVIDENCE of crime-----but societal environments identifying the prevalence of the crime in case----in my case illegal surveillance by camera and microphone for identity theft and pornography.
I brought the history of CIVILIZING PORNOGRAPHY laws and regulation to show the increasing expansion of types of pornography and how an exploding black market resulted over a few decades. Below we see an example of HOLLYWOOD creating what I consider the model of NOSY NEIGHBOR AND THE GANG pornography network. ANIMATIONS are often marketed for children having adult themes woven inside. MONSTER INC clearly addresses the structure of GLOBAL INTERNET------GLOBAL MANUFACTURING SYSTEMS ANALYSIS ON THAT INTERNET STRUCTURE.
This movie has the premise of MONSTERS having the ability and/or being assigned to enter DOORS---------which we then see open into a PERSON'S HOME -----in this case the MONSTERS enter these doors were hidden in CLOSETS in children's bedrooms. While playfully done, these MONSTERS mission was to SCARE THAT CHILD.
NOSY NEIGHBOR THE GANG is the image of MONSTER INC. They illegal enter a home----through 'DOORS' via devices and literally breaking and entering with criminally duplicated building keys.
They are HIDDEN-----the closet may be on the other side of victim's HOME-----they are told to be QUIET------don't let the CHILD know you are in the CLOSET------
This film was created in 2001------as BUSH era was super-sizing WAR ZONE spying and surveillance devices like CAMERAS AND MICROPHONES.
Watching the MONSTERS standing on ESCALATORS simulates the inner working of global internet structures. The MONSTERS are carried to a particular DOOR ------where the mission is to enter DOOR and SCARE CHILD.
This is exactly what illegal surveillance by camera and microphone by NOSY NEIGHBOR AND THE GANG does.
HOLLYWOOD ALWAYS CREATE FILMS IDENTIFYING SOCIETAL FADS OFTEN SEEN ONLY A DECADE OR SO LATER.
From Wikipedia, the free encyclopedia
For the equipment manufacturer company "Monster Inc.", see Monster Cable. For the franchise, see Monsters, Inc. (franchise). For the 2001 video game, see Monsters, Inc. (video game).
Theatrical release poster
Directed byPete Docter
Produced byDarla K. Anderson
Box office$577.4 million
Monsters, Inc. is a 2001 American computer-animated buddy comedy film produced by Pixar Animation Studios and distributed by Walt Disney Pictures
Randall pursues them to the door vault, and a wild chase ensues among the millions of doors as they move in and out of the storage vault on rails to the factory floor. Boo's laughter causes all the doors to activate at once, allowing the monsters to freely pass in and out of the human world. Randall attempts to kill Sulley, but Boo overcomes her fear and attacks him, enabling Sulley to catch him. Sulley and Mike then trap Randall in the human world, where two residents at a trailer park mistake him for an alligator and beat him with a shovel.
Sulley and Mike take Boo and her door to the training room, and trick Waternoose into revealing his plot with Randall, while Mike secretly records the entire conversation for the CDA to review. The CDA arrests Waternoose, and it is revealed that Roz, the scare floor secretary, is the CDA's leader. Roz thanks Sulley and Mike for their help, orders them to return Boo home, and has Boo's door demolished to prevent any further contact with her.
With the factory temporarily shut down, Sulley is named the new CEO of Monsters, Inc. Under his leadership, the energy crisis is solved by harvesting children's laughter instead of screams, as laughter has been found to be ten times more potent. Mike takes Sulley aside, revealing he has rebuilt Boo's door. It needs one final piece, which Sulley took as a memento, in order to work. Sulley puts the door chip into place, enters and joyfully reunites with Boo.
I share much on the societal decline in PORNOGRAPHIC regulation leading to all kinds of SEXUAL ASSAULTS ------all kinds of PORNOGRAPHY committed illegally. As we watched deregulation of CIVILIZED PORNOGRAPHY, global banking always creates BLACK MARKET economies as RACKETEERING and cartel profiteering. In this case the DARK WEB PORNOGRAPHY exploded---first, with CHILD PORN-------early 2000s ------then expanded to any person inside any apartment or home.
Below we see who was behind MONSTERS INC-------looking at those exposed as CHILD SEX PREDATORS.
I want to include the connection of HILLARY CLINTON as SECRETARY OF STATE during OBAMA----I identify the DARK WEB being DARPA----global private military complex----HILLARY through e-mail hacking was found to be tied to DARK WEB----and CHILD PORN with WEINSTEIN as BEST FRIENDS with Clintons --------the connections of all the above to what was called PIZZA-GATE ----COMET PIZZA in Washington DC ----shows how NOSY NEIGHBOR AND THE GANG would use illegal surveillance and pornography capture of surrounding BUILDINGS to force building owners to SELL-------humiliate, intimidate------just as is happening in my community as my NOSY NEIGHBOR captures my BUILDING trying to force ME and/or my LANDLORDS to LEAVE or sell building.
Nolte – Disney’s Monsters Inc.: Harvey Weinstein, John Lasseter, and Mark Halperin
November 22, 2017 Disney’s, Halperin, Harvey, Inc., John, Lasseter, Mark, Monsters, Nolte, Weinstein
Nolte – Disney’s Monsters Inc.: Harvey Weinstein, John Lasseter, and Mark Halperin
Everybody knew! Everybody knew! Everybody knew!
Over and over and over again, as these non-stop allegations result in a long overdue reckoning for the cream of our media and Hollywood crop, we are told that Everybody Knew! But if there is a singular pattern, a black thread running through all of this, it is woven directly into the history of the Walt Disney Co.Thus far, in a scandal that has unwound the careers of nearly 100 men, three of the most powerful of this unseemly Gang of 100 are directly connected to the Mouse House.
Worse still, the cries of Everybody Knew! are the loudest around these three former and current Disney employees, this unbelievably powerful trio of alleged abusers who reportedly preyed on women for years in their own Monstrous Kingdom, who are almost certainly going to go into the history books with the word “disgraced” attached to their names.
The Walt Disney Co. is a corporate leviathan with tentacles that go well beyond its theme parks, its studio, and its merchandising machinery.
Between 1993 and 2005, Disney owned Miramax while Harvey Weinstein ran it and thrived and made everyone millions.
Between 1996 and 2006, Disney owned ABC News while Mark Halperin’s influence and power exploded.
Since 2006, John Lasseter has been a top executive at Disney and chief creative officer at Pixar, which is also owned by Disney.
Weinstein’s alleged crimes and the fact that they were no secret within the media and entertainment industries, has already been well-documented. Worth repeating, though, is the news that Weinstein settled eight sexual harassment suits (that we know of), and the most infamous one so far (the alleged rape of Rose McGowan) occurred in 1997, smack dab in the middle of Weinstein’s Disney era.
According to the latest reporting on Mark Halperin, all of his alleged sexual misconduct — which involves around ten women who claim they were victims of everything from harassment to unwanted touching to being shoved to watching Halperin masturbate under his desk — happened while he was at ABC News. And once again, we are being told that this was an “open secret” at ABC/Disney.
Finally, there is John Lasseter who put himself on a six-month leave of absence Tuesday in the wake of a number of allegations of harassment and sexual misconduct. According to Variety, for decades there was a “whisper campaign” at the Disney-owned company about Lasseter’s alleged predations:
Many former female Pixar employees said there was a classic whisper network at the animation company, where young women were advised to keep their distance from the co-founder.
Another former employee told Variety that she was cautioned about Lasseter soon after she started work there, in the late 1990s.
“Just be warned, he likes to hug the pretty girls,” she said she was told. “He might try to kiss you on the mouth.”
Another former employee said that after Pixar grew out of its Point Richmond office and moved to Emeryville in 2000, Lasseter’s behavior became more brazen. She said he would walk up to women in the office and kiss them on the lips.
She said she also heard from co-workers who told her that they had to hide from Lasseter at wrap parties. She said she never reported these issues because the systems were not in place to address the problem.
According to the Hollywood Reporter, Lasseter was known by company “insiders” for “grabbing, kissing, making comments about physical attributes.” It gets worse…
A longtime insider says he saw a woman seated next to Lasseter in a meeting that occurred more than 15 years ago. “She was bent over and [had her arm] across her thigh,” he says. “The best I can describe it is as a defensive posture … John had his hand on her knee, though, moving around.” After that encounter, this person asked the woman about what he had seen. “She said it was unfortunate for her to wear a skirt that day and if she didn’t have her hand on her own right leg, his hand would have traveled.”
The same source said he once noticed an oddly cropped photo of Lasseter standing between two women at a company function. When he mentioned that to a colleague, he was told, “We had to crop it. Do you know where his hands were?”
No one in the elite media is going to go after Disney or connect these dots or demand some accountability from a company that for years employed and apparently enabled and empowered three men who allegedly and systemically (for years) treated subordinate women in ways that range from wholly-unacceptable to unspeakable.
Disney will be protected for two reasons. 1) Disney is a left-wing company. 2) Disney’s Rupert Murdoch, its chairman and CEO, is Bob Iger, a longtime Democrat who raised money for Hillary Clinton’s presidential campaign, who resigned from a Trump advisory council after the president pulled out of the Paris Climate Agreement, and who is now registered as an Independent — a move many see as the first in a 2020 bid to unseat Trump.
No, Disney will be enabled and protected because as we have seen over the last eight weeks, America’s beautiful people within Harveywood and the mainstream media come in only three packages: 1) Those who abuse women. 2) Those who enable those who abuse women. 3) And the victims of #1 and #2.
The media will work overtime to smother any inconvenient Disney truths, so this might be the only route to full corporate transparency and accountability.
(AP/Andrew Harnik/Jose Luis Magana) Pizzagate, explained: Everything you want to know about the Comet Ping Pong pizzeria conspiracy theory but are too afraid to search for on RedditHow this incredibly stupid and dangerous piece of fiction captured the lurid imaginations of many gullible people
December 10, 2016 9:00PM (UTC)"Pizzagate" seems like too cute of a name for a conspiracy theory that's escalated to the point that an armed man actually drove up the East Coast to "self-investigate" whether a D.C. pizza restaurant had a secret pedophilia dungeon in its basement, ending with him shooting his assault rifle inside the restaurant and being arrested.
But the name stuck. The story seemed like a hilarious curiosity in the weeks before the presidential election. Taking the so-called Pizzagaters seriously seemed about as sensible as taking the possibility of a Donald Trump presidency seriously, and both seemed like relatively safe targets for poking fun.
But just as many expected a return to the rational world after Trump's defeat, only to wake up on November 9 living in Trump's world, this bizarre pizza-pedophilia piece of make-believe seems to have struck the right kind of nerve in this simultaneously gullible and paranoid time to become a lasting, serious concern.
Sometimes a slice is just a slice
Pizzagate started, as so many things have in the last few months, with Wikileaks. When Wikileaks released emails from former Hillary Clinton 2016 Campaign Chairman John Podesta's account, most commentators honed in on the ones showing Clinton allies speaking candidly and sometimes disparagingly about the candidate and her associates, as well as about policies like a federal $15 minimum wage.
00:00 00:00 00:00 00:00 00:00 00:00 00:00 00:00 00:00 But a small number of people on message boards like 4chan and Reddit were more interested in seemingly mundane emails about small social gatherings and parties hosted by Podesta and his friends. Specifically, they noticed that these emails mentioned pizza a few times.
Boldly disregarding the simple explanation that the emailers, like most Americans, eat pizza regularly and find it to be an easy food to serve and eat while socializing, self-appointed Internet detectives decided that "pizza" was a complex code for pedophilia. Using this code, Pizzagaters claim, Podesta and his well-heeled pals could brazenly discuss their plans for throwing disgusting sex parties exploiting enslaved children, in between exchanges about Clinton's campaign strategy and setting up conference calls.
It's important to note that since the theories that would become Pizzagate began on 4chan and Reddit, sites known for trolling people with cruel, complicated pranks, it's likely that many of the conspiracy theory's originators were joking — coming up with absurdities to entertain themselves.
But it took a very short time for /r/Pizzagate, the now-closed Pizzagate-focused Reddit subforum, or subreddit, to fill with people who appeared to be true believers. The theory also became popular on Reddit’s “The Donald,” a hub for Trump supporters. From there, Pizzagate caught the attention of conservative fake news sites, minor white supremacist celebrities, and supporters of Turkish President Recep Tayyip Erdogan. It's been amplified for unknown reasons by Twitter bots traced to the Czech Republic, Cyprus and Vietnam.
Everyone's in on it
The theories grew to engulf pretty much anything that could be linked to Podesta, or anyone who had ever met him. That's how they landed on Comet Ping Pong, a popular family-friendly pizza restaurant in Washington, D.C., that also hosts occasional punk shows. James Alefantis, owner of Comet as well as other nearby restaurants, used to date David Brock, head of a pro-Clinton group, and John Podesta knew Alefantis and ate at the restaurant. If "pizza" is code for pedophilia, the rumor mongers reasoned, clearly a pizza restaurant is the dungeon where all the horrors go down.
Though the whole idea of the conspiracy was clearly unhinged from the start, this is where things became especially personal and frightening. Conspiracy theorists began pouncing on any social media posts involving children, adding foul comments attempting to read abuse into innocent photos.
Threatening phone calls regularly harassed and frightened employees of many restaurants near Comet, and other pizza places in D.C. that theorists decided must be linked to the pedophilia ring because they also serve pizza. Anything they decided looked "creepy" or "wrong" was thrown into the evidence bin without question, from the dark album art of a band that had played at Comet, which they deemed satanic, to an email describing a handkerchief with "a map that seems pizza-related." Even modern-art murals on the walls of the restaurant were implicated. Anyone remotely connected to a piece of so-called evidence became a target for threatening phone calls and social media messages.
In one particularly bizarre incident, a participant in /r/Pizzagate claimed to have hacked the website of a D.C. pizza restaurant called WeThePizza with a friend who was killed or captured in the process, and found an actual menu of child sex services offered, as well as child pornography. Shockingly trusting conspiracy enthusiasts apparently downloaded the files this person provided before realizing that "I was investigating pizzagate" would not be a great defense against criminal child pornography charges, and publicly panicked on the forum.