While prosecuting a global corporation like search engines YAHOO or GOOGLE for allowing transmission of these DARK WEB illegal surveillance PORN to PORN SITES -----and while trying to hold FEDERAL LAW ENFORCEMENT AGENCIES like HOMELAND SECURITY accountable for all these illegal transference of PORN is very, very, very hard to do in US Federal court------there are Congressional laws of IMMUNITY for these entities-----
IT IS NOT HARD TO PROSECUTE INDIVIDUAL PRIVATE CITIZENS SUCH AS NOSY NEIGHBORS AND THE GANG.
'Between private citizens, the rules of illegal surveillance are often far more delineated than between citizens and government investigators'.
It is also very easy to prosecute 'businesses' such as HOSTING SERVER NOSY NEIGHBORS ------having a network operating on these global internet cables.
We are introducing a few new lawsuits having hit court dealing with illegal activities similar to MY CASE of NOSY NEIGHBORS illegally surveilling my living space.
'The spyware allegedly captured a wide array of personal information: "credit and debit card numbers, expiration dates, security codes, pin numbers, passwords, social security numbers, birth dates, identity of children and the children's personal school records, tax returns, personal health information, employment records, bank account records, email addresses, login credentials, answers to security questions and private communications with health care providers, therapists, attorneys, and other confidants." The record also reveals what appear to be screenshots of adult-oriented and active webcam transmissions and conversations of an intimate nature'.
Below I share court cases sounding much like mine-----these cases do not have to pertain to exact criminal activity to show APPROACHES to case development. These case analysis discuss both PLAINTIFF------victim and DEFENDANT pros and cons of legal stances and approaches. Just because an approach or stance was denied by a court-----one cannot win against YAHOO or GOOGLE ---it is hard to win against a company which goes BANKRUPT for example----these stances can be considered from perspectives where the crimes and criminals are different.
Stayart v. Yahoo! Inc., 651 F. Supp. 2d 873 Preview
United States District Court for the Eastern District of Wisconsin
Aug 28, 2009
7th Circuit - US District Court Cases
Overview: Plaintiff, who used her own name to search on defendant Internet search engines which produced links to pornographic websites, failed to satisfy the prudential standing requirement for a false endorsement claim under Lanham Act. Plaintiff was not engaged in the commercial marketing of her identity, and she did not allege intent to commercialize.
... and Various . HN20 At common law, there were four distinct privacy torts: (1) intrusion into seclusion, solitude, or private affairs; (2) public ...... public disclosure of embarrassing private facts; (3) false light invasion of privacy ; and (4) appropriation of the plaintiff's name or likeness. Wis. ...... torts, including the misappropriation tort. The relevant section defines "invasion of privacy " as the use, for advertising purposes or for purposes of ...... its AdultFriendFinder service ( www.adultfriendfinder.com ), Various markets and sells on-line adult-oriented social networking services to individuals, including what it advertises as "the world's largest adult social personals with over 20,000,000 members." Stayart lives in Elkhorn , ...... as a 'statutory hybrid,' combining specific enumeration of three types of privacy with a general acknowledgment in 995.50(3) of guidance from 'the developing common law of privacy.' That section adopting the 'appropriation' type of invasion of privacy , and arguably also a statutory form of the right of ...... and (3) repeatedly linking Plaintiff to a website captioned "Free Streaming Porn -- HOTTEST DAILY PORN " displaying 27 hard-core pornographic photos. For example, Stayart alleges that ...
- The spyware allegedly captured a wide array of personal information: "credit and debit card numbers, expiration dates, security codes, pin numbers, passwords, social security numbers, birth dates, identity of children and the children's personal school records, tax returns, personal health information, employment records, bank account records, email addresses, login credentials, answers to security questions and private communications with health care providers, therapists, attorneys, and other confidants." The record also reveals what appear to be screenshots of adult-oriented and active webcam transmissions and conversations of an intimate nature.
- The spyware, as described in the Byrds' complaint, was Orwellian-like in that it guaranteed that "[t]here was of course no way of knowing whether you were being watched at any given moment," George Orwell, 1984, at 3 (Signet Classics 1950), because Aspen Way's corporate intranet (and Aaron's corporate server by proxy) apparently activated the PC Rental Agent's Detective Mode "whenever they wanted to." Id.
- 2On March 20, 2012, the District Court issued an order noting that DesignerWare filed for bankruptcy in the U.S. Bankruptcy Court for the Western District of Pennsylvania. Accordingly, the District Court ordered that no action be taken against DesignerWare and that the case be administratively closed as to that defendant.
- 3In the motion for class certification, the Byrds proposed the following classes:
Class I (against Aaron's Inc. for direct liability under ECPA) --
All persons residing in the United States, who have purchased, leased, rented or rented to own, Aaron's computers and individuals who used said computers whose personal information, electronic communications and/or images were intercepted, used, disclosed, accessed, monitored and/or transmitted via PC Rental Agent or other devices or software without the customers [sic] authorization.
Class II (against Aaron's Inc., Aspen Way, and all other Franchisee Defendants for direct liability under ECPA, invasion of privacy, conspiracy, and aiding and abetting) --
All customers of the Aaron's Defendants who reside in the United [**7] States, who have purchased, leased, rented or rented to own, Aaron's computers and individuals who used said computers whose personal information, electronic communications and/or images were intercepted, used, disclosed, accessed, monitored and/or transmitted by the Aaron's Defendants via PC Rental Agent or other devices or software without the customers [sic] authorization.
Byrd, 2014 U.S. Dist. LEXIS 44322, 2014 WL 1316055, at *4. The Byrds also set forth an alternative class definition for Class II as:Class II (against Aaron's Inc., and Aspen Way for direct liability under the ECPA, invasion of privacy, conspiracy, and aiding and abetting (under Wyoming law)) --
- All persons residing in the United States, who have purchased, leased, rented or rented to own, Aaron's computers from Aspen Way Enterprises, Inc., d/b/a Aarons Sales and Leasing, and individual[s] who used said computers whose personal information, electronic communications and/or images were intercepted, used, disclosed, accessed, monitored and/or transmitted by Aspen Way and/or Aaron's via PC Rental Agent or other devices or software without the customers [sic] authorization.
Id. It is worth noting that the Byrds' revised proposed class definitions did not expressly require an electronic communication [**8] to be "intercepted," although that is a necessary element in successfully proving their ECPA claims. See 18 U.S.C. §§ 2511, 2520(a).
Just because a court case ends without a conviction does not make that court case decisive against a similar case---it is all in how these stances are developed and presented in PLAINTIFF'S----victim's case.
Any lawyer taking a complicated case like NOSY NEIGHBORS AND THE GANG will be looking at hundreds of these cases some WINNING for PLAINTIFF---victim---some LOSING for victim. Use these cases to understand legal stances and mold them to your specific case.
'I have post traumatic stress disorder. To think that people are so pervertedly interested in what other people do really winds me up. The only thing is I find it difficult to prove that people do look into your business. It's disgusting.
The old "camera in the bathroom" thing is a practice that still taints the reputation of the famed Chuck Berry. In a nutshell, he owned a restaurant in Missouri called the Southern Air. He was sued by several women in a class action suit in the 1990s claiming he was filming them in the women's bathroom in that restaurant and Berry settled the case out of court.
Still, 20 years later, that incident taints Berry's legend more than a bit.
That is an extreme form of illegal surveillance, but it still highlights the notion that we simply don't approve of being filmed against our wishes in the United States. The problem, of course, is that what is legal or illegal surveillance is a matter of law and those can change easily unless citizens complain. The government will always have an excuse for authorizing more surveillance (claiming it's necessary to root out terrorism, etc.) and they can make formerly illegal practices legal unless we citizens throw a fit'.
What is Illegal Surveillance?
Illegal surveillance is the monitoring of a person's activities or property in a manner that breaks regional laws. What constitutes legal versus illegal surveillance may be very different depending on the region and whether the spying is being done by a private citizen or law enforcement group. Depending on the region, wiretapping, recording a conversation without consent, following a target, or postal interception may be deemed illegal surveillance.
Surveillance is often crucial to law enforcement investigations; it is also frequently helpful in the work of private detectives. Government agencies, like the Federal Bureau of Investigation in the United States, use surveillance techniques to hunt for possible terrorist activity and to track down federal criminals. Where surveillance crosses the line into a violation of rights to privacy, however, is a gray area of frequent controversy.
Between private citizens, the rules of illegal surveillance are often far more delineated than between citizens and government investigators.
In some regions, it is illegal to monitor or record any type of conversation without consent of the participants. In some areas, like the state of Colorado, only one participant need agree to the taping, which allows the use of evidence-gathering techniques such as having a consenting participant talk to the surveillance target while wearing a recording device.
In California, on the other hand, it is illegal to record any conversation without the consent of all parties. In states or regions where this type of monitoring is considered illegal surveillance, any recorded information is usually inadmissible as evidence or to build a case.
Sometimes, the legality of surveillance may depend on the location of the surveillance devices. For instance, it is legal in many places to have security video cameras in stores, around check-out counters, and in parking lots. These devices are usually allowed because these are public locations where people have less claim to the right of privacy; since they are in public, they usually can't legally claim that their actions were meant to be private.
A security camera in a restroom stall, on the other hand, is likely to be an instance of illegal surveillance, since a restroom stall is usually considered a place where a person can reasonably expect privacy.
Surveillance via the Internet is a growing problem in the 21st century and one of the major contributing factors to identity theft. Hackers and thieves often seek to gain personal information about an Internet user by using unsecured Internet connections or hacking password-protected accounts.
With this information, a person's whereabouts, activities, private communications, and bank account or credit card information.
This type of activity, particularly the interception of email or private communication, is usually considered illegal surveillance unless it is done by authorized law enforcement personnel as part of an ongoing investigation.
This video tied to PSYCHIC et al is speaking to corruption within religious groups by sexual predators just as I speak of my case......FALSE PROPHETS creating cults around sex and theft of members' assets. While I am not a PSYCHIC person---this woman makes some points.
How Sexual Predators Infiltrate Spiritual Communities and What You Can Do About It
It took me over 5 years to build the courage to create a video like this. When I originally spoke out about…
We wanted to share this article because it shows how POPULATION GROUP TENSION is deliberately manufactured when global banking want to create these civil unrest civil war TENSIONS. This article written by a Christian noting fellow religious groups like MENNONITES co-existing just fine while a NEW BRAND of religious groups make changes which cause social frictions as in Mexico as well.
It was what national media called 'RELIGIOUS RIGHT EVANGELICALS' who turned out to be simply global banking freemasonry---NOT RELIGIOUS corrupting our Christian religions.
Same is happening with AMISH/MENNONITE----so, no 99% REAL RELIGIOUS citizen is WINNING.
'We don't have any Amish families living near us, but there are areas of Christian and Todd Counties that do have settlements of Old Order Amish and New Order Amish. In Christian County, the New Order Amish seem to have settled mostly around Crofton (northern Christian County), and the Old Order Amish have settled in southern Christian County'.
'Amish dairy farmers at risk of losing their living and way of life as their buyer drops their milk
Monday, December 31st, 2018
An Amish worker empties milk from a steel can at K&K Cheese in Cashton. This cheese factory is one of a few dairy plants in the state that still accepts Amish milk in the 80-pound steel milk cans.
A group of Amish dairy farmers have lost their milk buyer, putting their livelihood and way of life at risk, as a crisis deepens in America’s dairyland'.
An unlikely feud between beekeepers and Mennonites simmers in Mexico
Survival is at stake as Mennonite colonies’ illegal soy farms threaten the livelihood of Maya beekeepers.
Maya beekeepers in the Mexican state of Campeche say their bees are dying and honey harvests have declined since the expanding Old Colony Mennonite communities started…'
People calling themselves MENNONITES are also doing the same in Amazon along South American coast. What this article describes making categories of OLD WORLD MENNONITES/AMISH vs NEW MENNONITES/AMISH are simply the same corruptions of all our Western religions----Christian/Muslim/Jewish.
What are being called EVANGELICALS----OR NEW ORDER MENNONITES are likely simply global banking 5% freemason/Greek FAKE RELIGIOUS PLAYERS.
These Amish/Mennonite cultures would not destroy nature or natural processes----they live simply to conserve MOTHER EARTH.
Photograph by Nadia Shira Cohen, National Geographic
By Nina Strochlic
Photographs by Nadia Shira Cohen
PUBLISHED April 12, 2019
Campeche, Mexico“How did it start?” asks Everardo Chablé. He’s propped on a stool in his living room as the daylight fades outside. The only noise in this tiny Mexican town in the Yucatán Peninsula—where there’s no cell signal and little electricity—comes from the music his father is blasting in the yard. He speaks up. “For thousands of years the Maya people had bee culture. Then the Mennonites came with large machines and started to deforest large parts of land where the bees feed. We had virgin forest with very delicate ecosystems—deer, toucans—but most importantly bees that keep up life. When deforestation started they destroyed everything from millennia back.”