Quantcast
Channel: Subliminal Ridge
Viewing all 264 articles
Browse latest View live

note

$
0
0


Dear Everyone,

I am being harassed terribly on Twitter and Facebook, by some very evil people  who have created Facebook pages that are shockingly horrible.   I do not in any way represent those people or their pages, and I have nothing to do with them.  Please report the pages or accounts for removal.  Thank you so much.  My life has been threatened and I am endangered.
-- Sue

If you want to report them, here is info:


The ones I have contacted are the FBI Office in New Haven Connecticut and the FBI Offices in Chicago. Anything will help. I have been through hell.
FBI New Haven Field Office
600 State Street
New Haven, CT 06511
Phone: (203) 777-6311
Fax: (203) 503-5098
E-mail: newhaven@ic.fbi.gov
Hours
Although we operate 24 hours a day, seven days a week, our normal “walk-in” business hours are from 8:15 a.m. to 5:00 p.m., Monday through Friday. If you need to speak to a FBI representative at any time other than during normal business hours, please telephone our office at (203) 777-6311.
FBI Chicago
2111 W. Roosevelt Road
Chicago, IL 60608
Phone: (312) 421-6700
Fax: (312) 829-5732/38
E-mail: Chicago@ic.fbi.gov
Note: Please do not include attachments with your e-mail. If you need to include supplemental materials, please provide information via mail or fax.
Hours
Although we operate 24 hours a day, seven days a week, our normal “walk-in” business hours are from 8:15 a.m. to 5:00 p.m., Monday through Friday. If you need to speak to a FBI representative at any time, please telephone our office at (312) 421-6700.


Letter to Facebook- December 23, 2012

$
0
0

Letter I Emailed to Facebook Legal Last Night

December 23, 2012 This is the letter I sent to Facebook Legal last night.  The terrible Facebook pages have been removed, finally.

TO FACEBOOK LEGAL AND FACEBOOK OWNERS AND FACEBOOK MANAGEMENT:

THIS IS A LEGAL NOTICE AND DEMAND.

I AM A lawyer acting on my own behalf.  For approximately one week, Facebook has allowed user(s) to publish a page called "Adam Lanza is a Hero."  The page has been removed many times and replaced many times.

This is the current URL of the page:  (page has finally been removed)  

The page has posted a photo of me (that belongs to me) huge at the top of the page and has posted repeated posts stating that I am the person/ page's lawyer.

I AM NOT THE LAWYER FOR THIS PERSON(S) OR THIS PAGE.

In fact, the person(s) has been harassing me for 3+ weeks and has graphically threatened my life.

The page promotes, condones and encourages the killing of children and  babies, and shooting them in schools. The page is the most disgusting sickening thing.  It has outraged many people and rightly so.

When people, including me, have complained about the page, we are sent messages from Facebook stating that the page does not violate community standards. The page promotes killing children.  What the hell are the Facebook Community Standards if pages promoting killing children are within those standards?

My reputation is being destroyed.  My health is being destroyed.  I have received countless communications about being this person(s)'s lawyer. I have spent several days flagging post after post and page after page and photo after photo.

FACEBOOK IS NEGLIGENT OR RECKLESS IN ALLOWING THIS PERSON(S) TO POST THIS PAGE, TO KEEP REPOSTING IT AFTER IT HAS BEEN REPORTED MANY TIMES, TO POST MY PHOTO, TO KEEP REPOSTING MY PHOTO AFTER IT HAS BEEN REPORTED, TO POST THAT I AM THE PERSON(S) LAWYER, TO KEEP REPOSTING SUCH STATEMENTS AND TO REFUSE TO DELETE SUCH STATEMENT THAT IS THIS MINUTE UP ON THE SITE.

FACEBOOK IS NEGLIGENT OR RECKLESS IN NOT PROVIDING PROPER EMERGENCY RESPONSE AND NOT PROVIDING A PHONE CONTACT OR EASY TO LOCATE EMAIL CONTACT.

FACEBOOK IS NEGLIGENT OR RECKLESS IN NOT PROPERLY RESPONDING TO TAKE-DOWN REQUESTS.

FACEBOOK IS NEGLIGENT OR RECKLESS IN ALLOWING THIS SAME PERSON(S) TO POST 5 OR MORE SIMILAR PAGES.

FACEBOOK'S NEGLIGENT AND RECKLESS ACTIONS HAVE CAUSE EXTREME DEFAMATION TO ME, INTENTIONAL INFLICTION OF EMOTIONAL DISTRESS, DAMAGE TO MY HEALTH, EXTREME DAMAGE TO MY REPUTATION, WORLDWIDE DAMAGE TO MY REPUTATION, AND MORE.

I DEMAND THAT FACEBOOK IMMEDIATELY REMOVE THE PAGE OFF FACEBOOK, REMOVE ALL SIMILAR PAGES, BAN THE USER, SAVE AND MAINTAIN ALL THE ELECTRONIC DATA BECAUSE I DEMAND IT AS DISCOVERY, AND PAY ME FOR MY DAMAGES TO MY HEALTH, REPUTATION, TIME, BUSINESS, MENTAL HEALTH, EMOTIONS, ETC.  

Susan Basko, Attorney for myself

Rustle League Attack

$
0
0

Angels and Saints I pray will protect me in dealing with Evil.
Rustle League Attack
by Sue Basko

Nazi-inspired terrorism, from stalking to plans for murdering schoolchildren. 

Special Note to All the Concerned People Writing in: Yes, acts described in this post are crimes.  The post does not get into detail about this since these are under investigation.  

For over a month, from November 2012 through January 2013, I was attacked online and in real life by a neo-Nazi racist cyber terror group called Rustle League.  My experience has been so horrifying that I want to warn others.  I have located other victims.  One victim has described the group as “an army of terrorists.”  I concur.  That victim was attacked so viciously that she has had severe problems from it – as I have also.  She has been advised to get police protection.  So have I.  I have heard from several men at different Occupy groups that they are also being harassed and stalked by the Rustle League.  Their experiences have been so terrifying that they are afraid to speak out.     

I will explain briefly what the Rustle League group did to me.  However, I know of other victims that have received phone threats and swatting, which is when police are falsely called to your home for an emergency, which can be extremely dangerous.  The terrorizing tactics of the group are diverse.

In this article, I will not be giving the screen or real life names of the Rustle League, although these are now mostly known.  At some point, I will most likely post those and I will make that information available to journalists.  The situation is under investigation.  I also will not give screen shots, although  dozens exist, as do recordings of phone messages, a chat log, direct messages, and emails.  Those are also available for journalists.  All this evidence exists, but will not be shown here, for legal reasons. I also do not want to spread the filth created by this group to a further audience.  It is best for it to remain unshown.  There are also hundreds or thousands of eyewitnesses, as much of the harassment occurred online.  

I had no previous contact or interaction with any of the attackers.  I do not know any of them.  Some of them were in my Twitter timeline and I noticed they were forming a group called Rustle League, the aim of which was to harass other people.  The group calls it “rustling” someone’s “jimmies.”  The group members seem to think stalking and threatening others is “funny.”  The Rustle League is racist and anti-Semitic.  They speak of their hatred often, and use Nazi symbolism and words, such as swastikas, their email of Hitler@Lowermyjews, pictures of Hitler, etc.  I started blocking these people from my Twitter timeline, but at the time, I did not have my account locked, so they could still easily see it.  After I locked my account, the Rustle League people created dozens of fake accounts that they tried to get me to allow as followers.  These people are like cockroaches trying to sneak in every crack, so they can continue on with their nightmarish assault.   They are the most hate-filled, useless scum I have ever experienced.

At some point in November, I received a few @ messages in my Twitter timeline, mentioning things about “jimmy” or “jimmies,” and giving cryptic messages I had no idea what they were talking about.  I would block the senders.  I had no interest in having anything to do with such immature and hate-filled people.

On Thanksgiving day, a young man known to some of the Rustle League members was arrested.  He was somewhat known to me, also.  The situation is complicated and cannot be explained here, but I had to become involved in assisting this young man  get a public defender, which was not happening automatically at the jail.  (Note: The young man is peaceful and loving, is not a Rustle Leaguer.)

Shortly after this, I noticed two forged documents being passed around online. Both forged documents were letters purportedly written by the father of the man I was assisting.  One of the forged letters was the father rejecting his son. This was far from the truth, as the father cared very much about his son.  The other forged letter was defamation of me, stating I was “full of shit” and saying the father hired me 5 months prior and fired me.  In reality, I have never been hired by the father and 5 months before, I had never heard of him or his son.  Also, the father, mother, and young man have all thanked me many times.

I wanted to know who forged these letters, who was passing them around online, and what on earth their motive was in interfering with me and this family.  I also wanted to stop the defamation of me as a lawyer.  At this point, I had no idea it was the Rustle League that had created the letters.

The forged letters came from a certain email address.  So one evening, I posted on Twitter that forged letters had been sent from this email and asking if anyone knew to whom the email address belonged.  This started an onslaught of attacks by the Rustle League and their associates that lasted over a month. 

At that point, the Rustle League forgers could have owned up, said they were sorry, and taken the offensive letters off the internet.  But they chose instead to engage in a shocking campaign of racist terrorism against me.  You see, they decided I am Jewish and attacked me on this basis. I am not Jewish, but I am grateful, in a sense, that I got to experience a most horrifying anti-Semitic attack, because it gives me real insight into the things faced by Jews being attacked by anti-Semitic terror groups.

I received a chat log of the group, as they were responding to my query about the forged documents.  First, one person, with help from a few others, looked up personal information about me and posted it online.  Most of it is incorrect, but this does not make it any better or less offensive or less dangerous.  What kind of depraved person responds to an inquiry about forged documents by trying to endanger the victim further by posting personal information online?  At the same time,  the Rustle League posted terrifying death threats against me from several accounts. These were graphic death threats of knifings.  There was one death threat that included a photo of a bloody knife.   There was a death threat that included an address that they thought was my home address.   When they could not locate me at that address, they started trying to connect with me on Skype.  I blocked their accounts.  The Rustle League started a twitter account that was nothing but death threats aimed at me.   It was interesting and terrifying to read on the chat log the lack of morality of all members of the group,   except for one who made mild objections.  (He has tweeted that he is not a member of the Rustle League, yet he was in their chat room.)  The other Rustle League members on the chat log agreed with this wrongdoing and participated in it.  They thought it was fun, funny, they were ROFL.

Note: One reason it is so important to stand up to such defamer /bullies is because the lies they create stay on the internet.  A while back, a crazy person started a smear campaign that I dislike autistic people.  Like the Rustle League did, this crazy person stole my photos and used them to post her own ideas and attributed her tweets and blogs to me. (There must be a DSM classification for this sort of madness, though legally, it is impersonation and cyberstalking.) In fact, I help run a blog written by an autistic man who is in prison, to give him voice and share his experiences.  The blog has a solid following. This is his blog: http://paulmodrowksi.blogspot.com)   But the lies spread by the crazy person are still out there - and were even quoted by the Rustle League when they were dishing up "info" about me on the internet.  See -- lies have a way of spreading and being cited as reality.

One sure way to know the Rustle League members and their associates are truly evil is that they have not removed their postings from the internet.  Aside from the ones I had removed, the others remain.  These demented individuals feel no shame in creating death threats and racist taunts and spreading defamatory lies, and neither remove them nor apologize. This lack of remorse is what shows they are darkly, deeply evil.

Then the same person who was posting my personal information online quickly started a campaign of lies and defamation against me. The lie was that I had in some way slighted the person’s sexuality. I had in fact done no such thing, had not in any way whatever even mentioned this topic.  Soon, this hate gang had lots of hate-filled people posting tweets of vitriol and violence at me.     Granted, the people posting these tweets at me were already known to be hate-filled convicted criminals or racist anti-Semites often charged up with anger at women, Jews, and Blacks.  That is the kind of mob that follows the Rustle League.   No one decent or normal would be associated with them.

In the weeks to come, during the continued attack against me by the Rustle League, I noticed that this technique is one they often employ: they pretend a person has made a statement and then they act all upset by it and begin to post defamation.  They did this even to members of the public who posted messages on the Rustle Leagues' facebook pages where they promoted killing children, which I write about below.   The Rustle League person pretends there has been a slight and then launches a defamation campaign against the person who supposedly made the imaginary slight. This is a technique of extreme manipulation geared to deflect the guilt to the innocent party and away from the wrongdoer. (Rustle League is an extremely evil, very tricky group.)

At this point, it was a few hours after I had inquired about who had created the forged documents, and in this short time period, the Rustle League attack against me included: posting my personal information, speaking and posting horrific anti-Semitic statements against me, lying that I had slighted someone's sexuality and stirring up an online mob attack against me, graphic violent death threats, stalking by skype, posting of hundreds of defamatory tweets, and creating several accounts full of defamation and death threats aimed at me.  Reading the chat logs and tweets, one notes this group of sadistic racists found all of this “fun.”

The Rustle League then engaged in online harangues and harassment, attempts at flooding my email account using auto-sending, attempts to break into my email accounts, attempts to break into my Twitter account, etc.  The Rustle League created various accounts using my name and photos, and used those to harass, defame, badger, and mock.

At no point did any of these deranged individuals state what their problem was. They simply hated Jews and wanted to torment one.  (I am not Jewish. That makes no difference.  Even if I were Jewish, of course, the things done to me were 100% wrong.)  They are Nazis and I am perceived by them as Jewish, and that was all they needed to spend a month stalking, harassing, threatening, and defaming me.    

The Rustle League created a Twitter account using my name and photo. It was anti-Semitic and horrifying. The background was the Israeli flag.  The header was a piece of raw red meat, against which they placed my photo. They tweeted as if they were me, using my name and photo.  They tweeted things I would never tweet.  They tweeted: "I am a Jewish internet lawyer," and many other bizarre tweets meant to mock being Jewish.  The followers of the account were the people who started it and some of the other racist Rustle League members.  The other followers were fake profiles. The anti-Semitic twitter account managed to fool a few "real people" who followed it, apparently thinking it was me.  How defamatory that people thought I would post such a page!  Twitter really needs to change its policies and not only ban users who create such things, but should also do prompt and full police reporting.

When I got the Twitter page removed, one constantly belligerent young woman associated with Occupy Oakland, tweeted harassment at me about having it removed.  Apparently, this sick woman thinks hate crimes are a right.  This same belligerent young woman had also posted a tweet mocking me as "psycho" for saying I would block anyone that followed the account.  Did this disrespectful person think I was supposed to gladly welcome anti-Semitism and hate aimed at me?  Yes -- because she is full of anti-Semitism and hate and feels it is within her rights to torment Jewish people!  In her world view, Jewish people should smile and stand silently while being attacked.   Why the Occupy movement allows such a person in its ranks is beyond me.

   Another young woman, who I know is deeply mentally ill and has a history of harassing people, was also involved with the Rustle League antics.  This is typical: When a hate group starts, it gathers others, usually gathering those who are mentally ill or incapable of thinking clearly.  That is because, of course, no other type of person would be associated with such a group.

Hate group actions are so dangerous because all participants in them are either fueled by hate or by lack of conscience and empathy, or by mental illness.  None of this is good and all of it is horrifying to be the victim of it.

The Rustle League created a defamatory and bizarre you tube video “about” me.  When I had this removed, three men called me late at night and left a threatening, terrorizing voice mail.  The phone number was a cell phone belonging to one of the Rustle League members in Daytona, Florida.  Receiving this terrorizing call was – terrorizing.  I keep using that word, but it is the only word that is apt to the situation.  I was terrorized.   In the terrorizing late night call, the one doing most of the talking sounded drugged-up and psychotic – if psychosis has a vocal sound.  “Deranged” is the only word that comes close.

I do not in any way want to minimize the horrors inflicted on the Jews in the Holocaust, but I do think I have tasted a hint of it. I have been stalked, terrorized, denigrated, endangered, defamed, traumatized -- and had mocking, belligerent young sadists tell me this is "fun."

One strange and bizarre thing the deranged people of the Rustle League kept repeating was that I was a “fake lawyer.”  It was odd and I wondered if one of these sickos was someone that I had rejected as a client.  I have no idea.  I only accept clients who are good and kind, decent and fair.  I spend time getting to know potential clients and understanding their goals and values.   If a Rustle League type asked to be my client, they would be rejected.  But I do not recall rejecting any of these people in particular.    

Then, the week before Christmas, the Rustle League went over the top in its extreme campaign of hate against me.  There had been a tragic mass killing of school children at Sandy Hook School in Connecticut, committed by a young man named Adam Lanza.  The Rustle League created a facebook page called “Adam Lanza is a Hero.” They posted a large photo of me at the top with a caption stating “Sue Basko, Attorney at LOL.”  The Rustle League posted that I was the lawyer for them and their  page and that I agreed with what they were doing.  Then the Rustle League emailed me from one of the  same email accounts they had been using all along to harass me.  In the email, they stated that they had put my photo at the top of the “Adam Lanza” page, and this was “lulz,” or funny, in their idea.  Also, the email contained the group's usual sexual denigration and defamation of me as a lawyer.  I checked the Twitter timeline of the Rustle League member in Florida, from whom the terrorizing phone call had come just days before, and he had posted a congratulatory announcement that they had just notched up their harassment against me.  

I checked my other emails. There were many emails from concerned citizens asking if I was the lawyer for the horrifying “Adam Lanza”  page. People were shocked, enraged that any lawyer would be involved in such a thing.  I had to quickly reply to these people, assuring them that I was not the lawyer for the group, but was its victim and my life had been threatened by them.  I also had to quickly file complaints with the FBI, post on the Lanza pages that I was not the lawyer, and start to flag the photos, comments, and the whole page for removal.  A counter- group had already formed, called “Remove Adam Lanza is a Hero Page,”  which I call the "Remove" page.  These people were my saving grace during this ordeal.  Over the next week, this group and I both spent many hours flagging the posts, photos and pages.  When Facebook would remove a post or a whole page, the Rustle League people would post more.  It went on and on all day and night, for many days.  The Rustle League apparently had the page staffed with several "characters" at a time.  They were relentless in their meanness and in the callousness they showed toward human life.

The posts made by the Rustle League detailed their plans and hopes of killing children. The posts were shocking and horrifying.  People all over the nation, as well as internationally, were contacting police and FBI offices.  The things that were posted promoted the killing of schoolchildren. Over the course of days, each new post seem more and more shocking and devoid of any shred of humanity.  The Rustle League posts  taunted the parents of the murdered children, saying the parents hated their children. (Flashback: This was the same thing the Rustle League had written in the forged letter  about the man I was helping -- that his father did not love him.)  

 Some of the posts made by the Rustle League detailed methods for killing children, other posts extolled what a good thing it was that children were killed.  Reading the posts, I knew I was coming face to face with the devil.  For real.  The screen shots show a horrifying lack of any normal social or human functioning, only the deepest darkest depraved evil.  I was physically and spiritually shaken to my core from dealing with this – and yet I had to do it, to keep my name from being associated with it.  

I would not have made it through this ordeal without the support of the 500+ people of the “Remove” group there, 24 hours a day, to assist and give love.  The Rustle League  kept posting statement after statement  about me being their lawyer, the aim being to defame me by association with the disgusting violent things they were posting.  The things they posted with my name attached were truly sickening.  I feel like vomiting when I think of it, their ideas were so sordid and devoid of any decency.  I had to spend 20+ hours per day for 5 days flagging things before Facebook finally got its act together and started removing things more promptly. Facebook bears a great deal of responsibility in allowing this to happen.  

Ahh, but this was not the end of the Rustle League attack against me.  They created the above-mentioned anti-Semitic Twitter account using my name. 

And then, the Rustle League created 3 facebook accounts using my name and photos.  They used the Facebook accounts to post vile and sickening statements, as if I would post such things.  I and the wonderful team from the “Remove” page had to flag these  accounts to have them deleted.  The fake posts in my name momentarily tricked the "Remove" page moderator, who emailed me asking what was up with all the sickening posts on the page.   The moderator then quickly discovered it was not me, but more horrors from the Rustle League attackers.

Then on New Years eve, the biggest twitter account in the name of  Anonymous, @YourAnonNews, tweeted a threat to harass me some more.  Then after making the threat, my email account was flooded with 10,000 hate-filled email messages signed from the Rustle League. I noted who had “liked” this threat message  - the mentally ill woman with a history of harassing others, and a few other well-known accounts using fake names and photos.  They were all "people" who, over time, had shown themselves to be lacking in decency or respect for others.

I have questioned why the @YourAnonNews account was used to threaten me.  An account with 800,000+ followers, that is supposed to be a news announcement account, posted a threat at a lawyer who is known to help Anons and Occupiers?  What is wrong with this picture?  To me, it is proof that the account is not run by Anons, but is actually being manned by the racist, anti-Semitic, misogynist and criminal Rustle League.  I have inquired of one of the men who says he helps run the account and have received no solid answer.  Therefore, I am warning readers that, until I have heard a solid explanation and gotten a strong apology, and  until I know that whoever posted the threat is no longer allowed onto the account, that  @YourAnonNews account is not run by Anons, but is tainted and being run by racist terrorists.  Until the situation is fully explained, that’s how it is.  It cannot be trusted.

Then the Rustle League members created a set of memes using my photo and defamatory statements.  The idea was that I file “frivolous lawsuits.” Reality is, I file  no lawsuits, am not a litigation attorney.  I saw one of the Rustle League members tweet that he had created these memes.  I wonder  how depraved this person is that he thinks it acceptable – and even brag worthy --  to harass a woman, a professional whom he does not know and with whom he has never had any dealings.  What kind of person is capable of such disrepect?  No one with any sort of education or culture would even dream of such a thing.

Who are these Rustle League people that they lack all morals, decency, respect?  These are people who consider a young man who killed 20 children to be their "hero." These are people who spent days posting their plans and desires to kill more children.  These people spent a week tormenting the families of children who had been murdered.  And tormenting and instilling fear into the grieving public.  This is the kind of group this is, rotten to the core.   

I have some thoughts about this whole thing.  I am not sure exactly why I was targeted.  I look at the other woman who was severely abused by the Rustle League and the only similarity I can see is that it was a matter of convenience.  She runs a radio show at the same place one of the Rustle League members runs his show.  How do I connect?  The only connection I can see is that the man I am assisting (the man who was arrested) was a guest on the man’s radio show one time.  Somehow, this must have gotten the attention of these disgusting crazies and when I helped the man, the crazies latched onto the idea of attacking me.  That’s the only explanation or connection, as tenuous as it is.

The second thought is that sickos like the Rustle League and their associates are only brave because they are using fake names and identities and hide themselves from the people they attack. These monsters must be revealed and  bought to justice.  They are racist, anti-Semitic, and they want to kill children.  They have caused huge damage to me and to their other victims. 

KEEP IN MIND, THE EVENTS I DESCRIBE ABOVE ALL TOOK PLACE in a matter of weeks.  The assault was gigantic and disabling.  The criminals perpetrating it NEED to be brought to justice.  Also, keep in mind, the attackers are not anyone with whom I had ever had any dealings whatever. They are total strangers, seeking thrills by victimizing someone with their hate.

Also, it amazes me that anyone could be idiotically stupid as to join such a group, the purpose of which is to commit crimes, and to open oneself to very easy conspiracy charges on the crimes committed by all the other members. These people are not just disgusting, they are idiots.

Not a single member of this group has stepped forth to apologize, make amends or try to help identify those whose identities are still unknown. They are all cowards and criminals, every last one of them. 

Ballad of Barrett Brown

RNC 2008 - Psalm for St Paul

$
0
0
RNC - 2008 - Psalm for St. Paul
Prayers for Atheists

Deep Web Secrecy and Security: Book Review

$
0
0

Deep Web Secrecy and Security:
Book Review 
by Sue Basko, Kenneth Lipp, and Anonymous

Deep Web Secrecy and Security is an interactive internet-based book that is a guide to keeping private and secure on the internet, as well as a guide to exploring the hidden realms of the deeper internet.  It is a 46-page guide with many links to the services or sites being described.  The guide is written by Conrad Jaeger, the pen name for the writer of the Techtivist, a column on Occupy.com  The guide is sold in pdf and ebook versions online for under $10.  It is available from Deep Web Guides, Amazon, Barnes and Noble.

I come as a novice to the topic of web security and security.  The guide says the deep web is used mainly for three purposes – porn, crime, and spying.  I have no interest in partaking in any of those.  However, web security is of interest to me.  

I tend to be very open on the internet, because I think it is important that there be some “real” people with stated ideas and values letting themselves be known on the internet.  Things such as Twitter and comment boards have been overtaken by anonymous or sock puppet users behaving in abusive, counterproductive ways.  I think there should be some real people operating under their real names and standing up for what they believe to be right and good.  However, this leaves me, and others like me, open to extreme abuse by hordes of sock puppets, cointelpro agents, internet troll gangs, and mentally ill stalker/ defamers.   

Therefore, I came to this book with the point of view that I wish to use my real identity and be known, but wish to protect myself.  From this perspective, I immediately loved the book and put the helpful ideas into practice as I read the book.  I started off with checking my cookies.  I often reset my browser, which removes all cookies.   I checked to see which sites had deposited cookies and was shocked to see that sites I considered of little importance, that I had only briefly visited, had deposited the most cookies. 

The book also has information on VPNs and many other topics of interest to me.  But, is this advice solid? This is where I need to turn to people far more knowledgeable than I am on this topic.  The very first person I turned to for expert advice was a young woman who is known as an internet security advocate and organizer.  She refused to review the book.  I say this because I think women should be treated as tech experts, and I welcome any to please email me and write a review.

    I then turned to two men whom I consider to be masters on this topic and whose opinions I consider trustworthy:  Kenneth Lipp, active in the Philadelphia Cryptoparty and one of the original OWS members;  and Anonymous, an international Anon.

+++
from Kenneth Lipp: Although not qualified to assess all of the technical aspects of this book, in my experience the practical instructions on using Tor/security technology are sound and accessible. However, language in the introduction regarding making one "impossible to find" or monitor seems misleading. There is no 100% secure method of obscuring one's identity and/or location, and I believe it is important for this fact to be a solid part of anyone's information awareness when working online.

One point about the title and terminology: while those operating in 'tunnels' or VPNs would be a part of the "Deep Web" by its broadest definition, the term is most commonly used to refer to that part of the internet which is not crawled and archived by Google (more generally, the major metasearch engines), to include many private networks, repositories, and academic databases. In this milieu there are methods and tools for search and discovery (see:http://www.lib.berkeley.edu/TeachingLib/Guides/Internet//InvisibleWeb.html). There are even proprietary search engines for the "deep web," such as Infomine and ipl2.

+++
from Anonymous:  For a book of few pages, it certainly covers a lot of information.

This book is concisely written, accurate, and very accessible. It's an easy read for the computer novice, average user, as well as the tech-nerds.

It covers a broad swathe of, not only pro-sec tips, but it also touches on the roots of the good side of the internet and the deep underbelly of the bad.

It provides great advice on how to sail safely on the internet, as well as providing background and reasons as to why one should ALWAYS be proactive about ensuring your computer is secure.

Studies show that, in America, people have a VERY high confidence level in their internet security, yet these same studies also prove that the security levels are extremely weak. Conversely, these same studies show that in some countries, which shall remain nameless (do the research yourself if you're interested ;-P), have very low confidence levels in their security but are some of the most secure in the world.

This book doesn't recommend that one go out and buy Anti-Virus software, nor do I. That's one of the things I like most about this book. It actually informs one how the 'net operates and what one can and should do to remain safe.

As a seasoned veteran of these things, I am very familiar with these aspects of the net but I still enjoyed the read.

It's clearly written by one who is both knowledgeable about the workings of the internet and altruistic at the same time. I admire the effort, sincerity and pricing of this book. I mean, think about it, how often does one come across such an educational and beneficial book at such a price.

Not to sound like a shill. I don't know the author or those affiliated. I write this review as a disconnected, non-partisan, Anon. So, please take the next paragraph to heart.

I'm writing this as one who got the book for free to review. As someone who does nothing "illegal," so to speak, but often battles pedophilia on the net, tries to facilitate safe communications to the citizens of countries who are being oppressed, and defends the human rights and safety of others, I would recommend this book to all.

Many, true and old-school Anonymous and netizens, will be familiar with a lot that this book covers. BUT, I assure you, it is still very informational and educational. It will prove especially useful to those who are not familiar with the pro-sec aspects of the net. To those who are not knowledgeable about staying safe, this is a MUST-READ. To those who are, I would say it is a nice refresher and will probably remind you of a few things you may have forgotten to do.

Whether you use a Macintosh or PC, this is a must-read.

Sincerely,
Merely one Anonymous of a Legion

P.S. I write this not as a representative of Anonymous, as we are leaderless. Despite what your Governments and/or Mainstream-media may tell you, we do fight for you. Stay educated and safe."


     

Creep or Cointelpro Agent?

$
0
0


Cyberstalkers Rob Others’ Civil and Human Rights:
Creep or Cointelpro Agent?
by Sue Basko

Journalists note:Many screen shots are available of the cyberstalking activities named in this essay.  Please be in contact if you wish to view them.

A group of people I know are beta testing an organization to educate people about Cyberstalking.  The main tact is to inform and educate cyberstalkers and online harassers that their behavior is illegal and anti-social.  I think this is great and agreed to be their first test case "victim of cyberstalking" to be assisted.  I have been cyberstalked by a mix of cointelpro agents, mental cases, and people with genuinely ugly personalities.   All are engaging in illegal behavior. 

Cyberstalking and online harassing are the modern equivalent of the old time obscene phone caller or deep breather. Their object is to get attention by negative means, because they are that desperate for attention.  That’s pretty pathetic, but it is true.   They get off on bothering others.  This stems from their maladjusted personalities, where normal societal behavior has failed to form in them.   

Cyberstalkers are abusers.  Conventional wisdom says to tiptoe around them, for fear of spurring on these abusers and sociopaths to even more malicious behavior.  The idea behind this “Code of Silence” is that the abuser will move on to a new victim, not that the cyberstalker will stop stalking.  Doesn't this just enable these abusers?  As a society, should we keep passing these sociopaths on to the next victims, or should we strive to stop them?  Today, we have an array of criminal laws to stop them.  The California Criminal Code allows for cyberstalkers to be imprisoned, fined, or placed in a behavioral treatment facility.

The helpful group’s beta info:

Legal Notice is a new organization to protect the Constitutional and Human Rights that are usurped by Cyberstalkers, online harassers, online defamers,  and online abusers.

Cyberstalkers rob others of their basic civil and human rights.  Cyberstalkers harm the social fabric.

There are a myriad of State and Federal laws that aim to protect people from Cyberstalkers, harassers, and abusers.

Our group aim is to educate the public and give notice to cyberstalkers and abusers that laws are in effect against their behavior.   We send out notices and emails to let Cyberstalkers and abusers know about the law.   Most Cyberstalkers and abusers will stop once they realize their behavior is illegal and anti-social.  A few will continue on, and these need to be dealt with by criminal complaints, civil actions, or mental health treatment.        

+ + +  
Cointelpro? In considering cyberstalkers, we also need to look at the practice of the government hiring and paying people as cointelpro agents – people who stalk, harass, and defame others.   Let’s look at a couple of the cyberstalkers who have chosen me as their target, and let’s also look at what they might really be doing.  Read and see if you think they are actually cointelpro agents.

One person who has cyberstalked me for months is Twitter user @asshurtmacfags, whose real identity is Richard Cochran of Chicago, aka Jaime Cochran.  I do not know Cochran and have had no dealings with this person.  However, Cochran, who is a constant cyberstalker, has posted hundreds of tweets towards me.  Richard Cochran has posted my personal information online, so it can be used to commit financial and physical crimes against me.  Are Cochran and his friends using it for this purpose? I must assume so, otherwise, why create this endangering situation? Normal, safe, socially-acceptable people do not do such things.  (Note: Cochran is part of the Rustle League, a Nazi-themed online group started to terrorize and threaten others.  They have a website (nazifag.com), a IRC channel, and say they have an upcoming radio station.) 

What drives on a criminal cyberstalker like Cochran?  Is this a cointelpro agent, a paid harasser, as seems to be the case? Why does a stalker such as this engage in criminal acts so openly?  From the lack of repercussions, can we assume Cochran is a cointelpro agent?  I assume this and until Richard Cochran is arrested and tried for crimes, I will continue to assume Cochran is a cointelpro agent.

The same applies to many of these cyberstalkers.  Intelligent, well-adjusted “normal” people do not harass others online, day in, day out.  There is plenty of money to be made right now harassing others, with the government outsourcing cointelpro.  These goons without consciences are hired to cyberstalk, defame, harass, and follow others around with the pitter-patter of their pathetic prattle.

Another Twitter person that has taken to harassing me is @worthoftheworld. I do not even know if this is a real person, or a persona created just for Twitter stalking.  The persona is a chubby, bossy, hateful, anti-Semitic, mean girl.  This @worthoftheworld character is disrespectful and obnoxious, and thus, I blocked that account well over a year ago.   And my account is  locked so my tweets are hidden so only my friends see them.  (And my tweets tend to be about music I like and things I find wonderful and amazing.) 

Lately, this @worthoftheworld character has taken to regularly tweeting ignorant, obnoxious things at me.  What is the deal with this?  I have never had any dealings with this person, if it even is a real person.  Therefore, I conclude this is a person who recently got a job as a paid cointelpro agent, as there is no other explanation for such behavior.  Why would anyone spend all day tweeting stupid stuff at a person who has never contacted them and never responds?  If @worthoftheworld is a real person, it is no one I have ever had any dealings with.  It is also a person who spends a HUGE amount of time  posting idiotic things at me. My conclusion? This person is being paid to engage in cyberstalking as cointelpro.

Something that Richard Cochran (@Asshurtmacfags) and @worthoftheworld have in common is that they have both posted or “favorited”  anti-Semitic, racist postings aimed at me. They are obviously so hateful that they feel a need to hate Jews, even though I am not Jewish.   This makes it clear they are full of irrational hate, and it festers within them, ready to be thrown onto anyone.  

For example, just now, Richard Cochran posted a tweet calling me an “evil Jew cunt.”  What sort of job could Cochran have, that such public online behavior does not result in loss of that job?  Not too many, right?  That is more evidence that tends to say Cochran is a cointelpro agent.  

Same goes with @worthoftheworld.  A person who posts  such ignorant things in public at a stranger,  with whom she has never had any relationship or any interaction,  is not really employable at any real job.  Such a person would not be desirable as a teacher, or in an office, or in a cafe, or on a film crew, or in a medical office -- or anywhere, really. Who wants an employee with a track record of being racist, vicious, and harassing to strangers?  No one, right? 
   
Today, we have criminal and civil laws that are clearly on the side of normal society and against those who engage in cyberstalking.  We need to use those laws to shut down these stalkers.  Just as our society uses the law to battle child molesters, arsonists, wife beaters, and other abusers, so too, we need to use the present laws to stop the cyberstalkers and harassers.  The Code of Silence needs to end.




Why I Use Blogger

$
0
0

Why I Use Blogger
by Sue Basko

A stalker on the internet was mocking that I use Blogger, implying that as a lawyer, I should pay for website hosting.  Mostly, I think this person was complaining that he was neither able to hack my blogs, nor DDOS them.  Those are two of the reasons I use Blogger.  

Blogger is not perfect.  There is no option for a Contact Form.  I would also like to see a music player with the option of adding my own mp3s onto it.  And the User Interface is probably very complex for people who have not used it since Blogger began, as changes have been built upon it to make it more and more complex, with many things hidden from the beginning user.  On the other hand, there are many instant style options for users who don’t want to spend time on their design. 

 I love using Blogger, and here’s why:

1) Blogger has highly flexible design options.  One can get on and use an instant format, or go to more design-it-yourself options.  There are magazine styles for those who use a lot of photos.  I use more text.  I love doing website design and the more advanced options let me do that.  I can import my own textures, banners, etc.  There are lots of font choices.     

2) Blogger lets me use HTML, for flexible design.  I feel so constrained on sites where HTML is not an option. 

3) Google puts mega-millions of dollars into the Blogger design, security, and serving.  Whatever I could afford would not begin to be as good.  And Google keeps making improvements. 

4) You want to attack my site’s server?  That’s Google’s super secure server you’re going after. 

5) Blogger is crawling with spiders and has great SEO.  Google search brings lots of readers to my blogs.  My blogs have great SEO.  All the tools to get great SEO are built into the format.  Google is the major search engine; surely Blogger is designed to get great SEO on Google search.  

6) There’s lots of independent developers making gadgets for Blogger.  There’s always something new to add on, if you’re into that.

7) It’s easy to monetize Blogger. I don’t, because I don’t like ads.

8) I like to have a lot of blogs and sites.  With Blogger, that is easy and free.  When I get an idea for a new blog, I just start creating it, no problem.

9) Blogger interacts with Google search, gmail, google+, and youtube very easily.

10) Blogger has good analytics for free.

11) My blogs have withstood some highly stressed times when I have had many viewers at once, such as when Julian Assange was speaking on the balcony at the embassy and my blog was one of the only places with a working live video feed.

12) There are options for posts and pages. I use both.


How to Become a Lawyer

$
0
0


How to Become a Lawyer
by Sue Basko

People often tell me they want to be a lawyer, or that they are thinking of going to law school.  Most of them do not know what is involved.  This is for them.

This is the path to becoming a lawyer, in chronological order:

1) High School. You must be a high school graduate. If you are going to be a likely candidate to become a lawyer, you should be attending a high-ranking school, getting top grades, scoring in the top 5% of standardized tests, and having a good character.  The good character part involves not abusing drugs or alcohol, not getting arrested, and developing a clear sense of morality and ethics, including a sense of justice and equality for all.

2) College. You need at least an undergraduate degree to apply for law school.  Today, many law school students already have Masters, PhD, or other degrees. The law school I attended had a medical law program, so many of the students were doctors with an M.D. or nurses with R.N.  They came to law school after years of practicing medicine.  Law schools today like students with varying backgrounds, so it is good to get your undergraduate degree in a field you love.  It is important to have a high GPA if you want to go to law school.  It is also important to avoid getting arrested or getting in trouble at school.  This includes arrests for DUI or drugs, which will tend to exclude you from becoming a lawyer. 

Many law schools like applicants who have worked in another field for some years.  I went to law school with people who, before law school, worked as accountants, doctors, nurses, teachers, professors, a construction foreman, a stockbroker, a prison guard, people actively in the military. Several were musicians.  My B.A. was in Film and Video and I had worked in film, TV, video, music, and event production before law school.  Many of my law school classmates had children or grandchildren.  Some other law schools tend to have single students straight out of undergraduate school.  

My classmates went on to a wide variety of activities – to be State or federal prosecutors,  to work at a public defenders office, to be military lawyers for the JAG (Judge Advocate Guard), to be professors, to work for insurance companies, to private law firms.  Several went on to be FBI and CIA agents.  Several ran for public office.  Quite a few run their own small legal businesses, working in whatever fields appeal to them.  Others continued on to get degrees such as Masters in Social Work, PhDs in various fields, etc., and have used their knowledge of the law in those fields.   

Computer Skills. To go to law school, you should also be sure you have very good computer skills. You will need to be able to do legal research on a computer.  You will need to research databases. You will also need to do your own word processing.  This is a minimum.  As many computer skills that you can learn, the better.  

3) LSAT. To apply for law school, you have to take the Law School Admissions Test, or LSAT.  It is expensive to take the test.   There are test prep courses offered.  I used an LSAT test prep book called “Cracking the LSAT.”  This worked well for me.  Most people take the test about a year before they want to go to law school and then apply once they get their test results.  However, you can also do it quickly.  I took the test in May, got my results in June, applied, and started school in August.   

4) Applications for Law School: CAS.  Most law schools use the Law School Admission Council (LSAC) service called Credential Assembly Service, or CAS.  You will send your undergraduate transcripts, LSAT scores,  letters of recommendation, and a writing sample to the CAS.  The CAS adjusts grades to a norm scale, and provides this  information to the law school admission departments.  The CAS charges a hefty fee. 

5) Applications for Law School:  School Applications. Then you figure out what schools to apply for, and fill out their applications. This includes an essay and writing sample. It also includes disclosing if you have ever been arrested, have any issues with alcohol or drugs, have mental illness that affects judgment, have ever had serious disciplinary issues in school, ever had a residence hall violation, or have physical health issues that need to be accommodated.  Students are weeded out if it seems they will not be able to pass the character and fitness requirements to become a lawyer, which are quite stringent.  If you have such issues in your past, you should talk with a counselor at the LSAC to see if you are likely candidate for law school or the legal profession.

6) Law School.  Law School is 3 years of full time work.  Most schools hold you hostage for those three years; classes and mandatory events will be held any day of the week, day and evening.  If you want to graduate competitively, you will find it takes every day, all day long, to do law school.  Holidays and vacations are spent reading, writing, and taking extra classes. 

Law schools do not allow students to be absent or late for class.  And by late, they mean one second late.  In the first year, all the classes are prescribed and everyone takes the same courses.  The second year,  you will have be able to choose a few electives.  In the third year, there will be more choices still. 

My law school allowed me to take film courses as part of law school, which is rare.  To do this, I had to have a very high GPA and fill out a form showing that the film courses applied to what I would do with my law degree.  After law school, I went directly into an M.A. program in Radio, TV, Film and Journalism.  

My law school also had combined programs in JD/MD for those who wanted to be lawyer/ doctors and JD/MBA for those headed to business. 

If you want a special program at law school, that should be a factor in what schools you apply to.  I found law school to be deadly boring and I do not think I would have made it through, except that I was able to escape over to the Radio/TV/Film Building and do some music mixing.  I was also writing and doing interviews for a news weekly while in law and graduate school.  This also helped keep my mind from getting bogged into the law school black hole. 

During law school, if you plan to graduate competitively, you will need to think in those terms.  Every law school is competitive at the top of the class. The students who graduate at the top are doing all the reading, working extra hard on papers, turning everything in on time, and getting high test scores.  Ideally, the aim should be to graduate in the top 10% of your class.  Obviously, 90% of the class will not do that.  At the other end of the spectrum, a high proportion of people flunk out of law school.  Most law schools routinely dismiss the bottom 10 - 30 % of the first year class, and an additional few people after the second year of law school. 

7) Character and Fitness. To be a lawyer, you must be considered to have a good character and to be mentally fit to practice law.  The different State Bars work their character and fitness applications differently.  Some State bars use a service, others handle it themselves.  Most states begin this process while the student is law school; some states begin the process as early as the first year of law school. In the Character and Fitness process, you must reveal all sorts of information about yourself –  financial, legal, personal.  Some things may prevent a person from becoming a lawyer in a particular state.  If an applicant is denied in one state, often that denial will be applied by other states, even if the other states would not have denied the applicant on the basis of the impediment. 

There is no exact formula for what will keep a person from becoming a lawyer.  Sometimes a bar will put an applicant on a sort of probation, where they are assigned to a bar member and must report to them to assure they are overcoming their difficulty.  Things that usually affect the ability to become a lawyer include having a DUI, being arrested or convicted of almost any sort of charges,  abusing drugs, being litigious, or having mental or personality issues that affect good judgment.  Domestic violence arrests or charges and any sexual-related arrests or charges will be big issues that may keep a person from becoming a lawyer.

Morality issues that have affected bar admissions include posing for nude photos, performing as sexual dance or sex fantasy worker.  In the very recent past, a divorced person could not become a lawyer, and even still, divorces must be revealed and will be questioned.  Failure to pay child support or reports of child abuse or neglect are likely to keep one from being admitted as a lawyer.  In some states, living with a partner while not married has been an issue in the recent past and may still be an issue in conservative areas.  Bar admission has been denied on the basis that the applicant was a racist or was prejudiced on the basis of religion.

8) MPRE Exam.  This is the MultiState Professional Responsibility Exam.  Almost every State requires a bar applicant to pass this exam.  Most people take the MPRE while still in law school.  This exam is a multiple choice exam that tests knowledge of a lawyer’s professional ethical responsibilities.  The test is multiple choice.  Test prep is mandatory because the professional rules do not always follow what might seem like common sense.

9) Bar Exam.  A lawyer must be licensed in each state in which they plan to practice regularly.  Some states have reciprocity with other states.  Each state gets to make up its own rules about reciprocity.  Wisconsin does not require graduates of University of Wisconsin Law School to take a bar exam.

Most state bar exams are two or three days long, from about 8 am to about 5 pm, with a long lunch break.  Most states run their exams twice a year, in July and February.  If an applicant does not pass the first time, some states allow a retest six months later, if the applicant can show they are doing something differently that makes them likely to pass on the second try.

Most bar exams include three basic segments: multiple choice, essay questions,  and practical tasks.  To pass the bar exam, you have to complete each section and do fairly well on each section.  Many state bar exams include the MBE, the Multistate Bar Exam. These are multiple choice questions.  Many states also use MEE, which is a Multistate Essay Exam.  Other states have their own essay portions, specific to their own states.  A typical format is to have 6 essay questions.  Some states use the MPT, Multistate Performance Test, which sets out several legal tasks that must be accomplished in a limited time frame of a few hours.  Other states have their own performance tasks.

Bar Prep: Most people take expensive Bar Prep courses in the summer after they graduate from law school.  I preferred to study on my own using bar prep books from several companies.  I took my Illinois bar in the summer after law school and the California bar exam the following February.  I found both tests to be very basic and thought the bar exam hype was greatly overblown.  It may be that the hype is scaring people so they cannot think and function during the exam.  I think this hype may come from the companies that sell the outlandishly high-priced bar review courses.  I avoided the fear sellers, the group nervousness, etc., stayed at home and did test prep on the areas I thought I needed to work on, and breezed on through my exams.  If you are a self-starter and a good test taker, I recommend this. 

I was also in graduate school while preparing for and taking my bar exams.  The only real problem this posed was that I had to take a few days off my graduate school classes to go take my bar exams.  Before you plan to be in a graduate program while taking bar exams, you should ask to be sure you will be allowed to be absent for about a week for each state bar you plan to take.  The exams are about 3 days long, and there is travel.  Being in graduate school kept me from getting hooked into the hype about Bar Exam fear.  I just did not have time for it. 

10) Oath.  Once you pass the Character and Fitness, the MPRE, and a Bar Exam, you have to go to a ceremony, take an oath, and be admitted to the State Bar.  To practice in Federal Courts, you have to apply for the specific districts where you want to practice, according to the rules of each court.  It feels really good to be sworn in to uphold the Constitutions of the U.S. and of your States.  I take that oath really seriously.

11) CLE, Pro Bono, Fees.  Once you are a Bar Member, there are annual dues and fees.  Some states have pro bono requirements where each lawyer must provide some free legal service each year. Many lawyers provide many more than the minimum hours required.  Many States also have Continuing Legal Education Requirements.  For example, in each of my states, I have to complete 25 or 30 hours of Continuing Legal Education (CLE) credits in each reporting period.  I love doing CLE because it gives me the chance to keep learning new things.  Good new CLE companies offer affordable courses in interesting topics.  I have studied music law, sports agent law, computer forensics, internet law, social media law, computer forensics, etc.     

12) Whew. It is a long, expensive, difficult path to become a lawyer. If you really want to do it, it is worth it.  I am glad I did it.  I love being a lawyer.  I love sharing my knowledge with others.  I love helping people.  I merge my knowledge and experience in film, music and events, with my legal expertise. 

I also use being a lawyer to advance human rights in the fields of freedom of assembly and freedom of association.  In the U.S., these often involve the rights to protest and to free media.  These things are of great importance to me.  I am glad I am a lawyer so I can advance positive changes in these areas.

I work on being a lawyer about 70 or 80 hours per week.  A great deal of that time is not paid.  I am often working in the middle of the night.  I work on weekends and on most holidays, at least for a few hours.  Lawyers don’t ever really have any “off” time, because the world does not stand still.  However, the work we do is incredibly fulfilling and enriching.

If you want to be a lawyer, I say: Go for it!       
            

Are You a Rustle League Victim?

$
0
0

Are You a Rustle League Victim?

We are looking for people who are or have been victims of the Rustle League, to possibly join in a complaint(s) with other victims or simply to compare experiences.   Some of us have been comparing already and find that our experiences are so overwhelming, we have been washed over by waves of crime and abuse by this strange group of racists.

If you are or think you may be a victim of this group, please email to SueBaskoLaw@gmail.com. Your information will be kept confidential until if, when, and how you want to reveal it, to the extent that is allowed by law.  Lawful subpoenas or warrants from law enforcement agencies that demand the information will be obeyed.

Gathering Evidence: Try to get screenshots (grabs) or pdfs, phone recordings, chat logs, emails, copies of Twitter Abuse reports, copies of FBI reports and police reports, and any other type of evidence you can gather.  

The Rustle League is a cyberterror gang that does things both online and off.  They front as a "troll group," and pretend that their actions and crimes are "funny" or are "rustling jimmies." The Rustle League is a racist hate group and their main hate targets are Jews.  Some of the members are known or said to have criminal backgrounds and/or backgrounds in credit card or financial fraud, swatting, etc.  Some of them consider themselves "security" or "infosec" or "social engineers."   There is a group of members, other followers, and some imitators.  If you have been a victim of any of the things listed below, it might be the Rustle League or their followers or imitators. Let's compare notes and see.  Usually you'll know if it's them.

The Rustle League is known to have members or followers in many areas, including, but not limited to, several locations in California, New York, Chicago, Missouri, Florida, Idaho,  the UK.   There may be many other locations.  Some of the followers front as being part of Anonymous or part of Occupy.  Most of them use fake names.  Many of them have Twitter accounts.  Many of them have multiple or many Twitter accounts.

As a disclaimer, I must state that I personally have been a victim of the Rustle League, their followers, and their imitators, for about 4 months now.  They have committed an incredible string of crimes against me. I thought I had seen everything, until I started to compare with other Rustle League victims.  The crimes are very serious, the people are extremely dangerous.  DO NOT try to deal with them on your own without the help of law enforcement.

Right now, there is a solid group of victims  who have had a wide variety of criminal type acts committed upon them.  If you are a victim, you are not alone.  So please, be in contact.

Under California's new cyberstalker law, repeat unwanted contacts online are illegal.  Impostor accounts or using someone else's name online for such purposes is illegal.  There are many other laws that make death threats, bomb threats, harassment, stalking, swatting, etc., illegal.

If someone is bothering you for their own amusement, you should question if that person is part of the Rustle League, or is some other nuisance person or criminal.  Please be in contact if you want to discuss.  DO NOT LISTEN to anyone else who is not a victim of the Rustle League (or other cyberterror group)  tell you that it is okay for you to be attacked. It isn't okay.

"This is all so crazy, it is hard for others to understand or believe." That is what several victims have said of the all-encompassing, overwhelming crime waves against them by the Rustle League.  If you are a victim, come share with us, we understand.

WHAT RUSTLE LEAGUE (RL) DOES:  The actions we know about include, in order of severity, although the least severe are still very harmful.  The list basically goes from "Terrible" to "More terrible."  Please contact us to let us know if they have done other  things to you that are not on the list:

1. Having someone post tweets at you calling you "crazy" or "insane."  Posting that you are an "aspie," that you "should take meds," that you are "ugly,"  etc.  This is a Rustle League stock way to harass and defame. ( Other cyberterror gangs do the same. )   This is supposed to break you down so you feel you are deserving of ill treatment, and is supposed to negate you as a human in the eyes of the abuser, so that they feel like it is okay to victimize you.  This is how the RL have started many of their attacks, which escalate quickly.  If this is happening, you can be pretty sure you are about to be pounced on by an online gang of some sort. Reacting quickly and firmly with reports to the Social Media company and/or to police, can possibly help stem the acts from escalating.

2. Having people doing mean or strange things to you online and then posting things about "jimmies" being "rustled." This is the Rustle League way of laughing at their own crimes. Their crimes are not funny and not jokes, and you can and should report them.

3. Having someone go into your locked Twitter account and retweet out your tweets.

4. Having tweets from your locked account appear posted by people who are blocked from your account.   Having someone "seeing" tweets in your locked account, reading your private emails and talking about them, and other such creepy surveillance techniques that seem like the person is hacking your account, using  keystroke recorder or otherwise invading your privacy.

5. Having people whom you have blocked or who you do not know posting tweets at you or about you.  Having people you have never met, or sock puppet accounts, posting insults or derisive tweets at or about you.

6. Have people DM with you and then post the DMs elsewhere, so private conversations are made public.

7. Have people post your private emails elsewhere.  This is illegal unless they have your permission.

8. Having people record phone calls without your permission. This is illegal in most states.

9. Getting strange or threatening emails.

10. Having anyone post your personal information online, such as "doxing" you.

11. Having anyone posting your IP address online.

12. Having anyone posting your Social Security Number online.

13. Having anyone threatening to post any personal information online.

14. Having anyone posting a link to any personal information, photo, or anything else that  you do not want to have posted.

15. Any sort of fraud or financial or other theft.

16. Posting that they are going to get "get (your) Jew gold." This is one of the Rustle League themes.

17. Posting racist comments.  Posting anti-Semitic comments.

18. Strange or forged letters or documents or emails sent to you or your family or job making strange accusations or trying to harm or upset you or your family or job.

19.  Having "memes" created using your name or photo.

20. Having derogatory or mean or obscene photos created "about" you.

21. Having unknown people post derogatory or defamatory posts or emails about you, your work, your job, or your sex life.

22. Having people use a big "news" type account to post harassment at you or about you.

23.  Having "sock puppets" harass you.

24.  People using sock puppets, malware, or bots to harass you.  Getting multiple matching tweets from different accounts.  Having an automated series of tweets aimed at you.  Having bots trying to become your twitter follower.  Having malware deposited onto your Twitter account so it malfunctions.  The RL has done all of these.

25. Having people you don't know suddenly appearing to harass you.

26. Having people create "impostor" Twitter or Facebook accounts using your name, a similar name, your photo, etc.  Having other people posting as if they are you.

27. Having people using  your name on their Twitter or Facebook account.

28. Having people post videos using your name, your voice, your video footage, your pictures, or in any way mentioning you to harass you.

29. Having people post that you should commit suicide, that you should drink bleach, or posting your name in any such taunts.  Having people post mocking things about the dead, about suicide victims, about victims of massacres, about the families of such people, or any other such mocking or taunts against grieving people.

30. Having anyone posting your nude, sexy, or partly clothed or any such photo without your permission.

31. Having anyone creating an obscene or dirty picture using a photo of you.

32. Having anyone include your name in a tweet or posting where there is no good reason to include you or where you don't want to be included.

33. Having people make strange accusations via Twitter or email, such as accusing you of being racist, or being "transphobic" or other such things.  These accusations may be made by people who have never met you and/or with whom you have not even had any dealings!  The accuser will likely try to stir up a mob of hate against you.  This is a well-known tactic used by several members of the Rustle League.

34. Having anyone posting anything "dirty" or nasty about you or your sexuality or asking for photos or posting such offensive things as "Tits or GTFO."  Receiving strange, repeat sexual tweets or emails.

35. Any inappropriate or unwanted sexual comments or invitations.

36. Having anyone try to blackmail or extort you by saying or threatening or implying they will post photos or other things about you if you do not do something.

37. Being stalked or followed about online or off.

38. Threatening, bizarre or abusive phone calls or phone messages.

39. Attempts to or hacking of your accounts -- Skype, Twitter, email, etc.  Flooding your email with spam.  Attempts to DDOS your sites.  Threats to do any of these acts.

40. Attempts to or making purchases on your online or other accounts.

41. People posting lies trying to tie you to crimes, murders, etc.

42. Hearing from family members or friends that they received a strange, threatening, or accusatory email about you or about them.

43. Being followed, either in real life or around on the internet.

44. Finding strange objects just outside your home.

45. Repeat phone calls with no messsage, often tied to your presence on Twitter.  (Someone trying to place your location at a given time.)

46. Receiving death threats of any kind.  Death threats posted online.

47. Receiving bomb threats.  

48.  Being swatted -- that is, having the police falsely called and told there is an emergency at your house.   This is extremely dangerous and can cause injuries or death.

49. ANYTHING ELSE that seems threatening, weird, annoying that seems to be coming from the Rustle League members, followers, or imitators.






Risk-Taking Manifesto

Swatting in Occupy and Anonymous

$
0
0


Swatting in Occupy and Anonymous
by Sue Basko

I know of several instances of swatting of people in Occupy or Anonymous.  All of the instances I know of are thought to originate with the same group of racist online trolls/ harassers who are anti-Anonymous.

Swatting is when someone falsely notifies police that there is an emergency in progress, resulting in police making an emergency response to someone’s house.  The word swatcomes from SWAT (special weapons and tactics), the SWAT squad. 

Swatting is always illegal. It is illegal to file a false police report.  

Swatting is also extremely dangerous.  In a recent swatting, little children were held at gunpoint.  They were endangered and have been traumatized.  Swatting causes trauma and PTSD in adults, too.  Swatting is dangerous for all involved, even the police.  Swatting is also a huge financial drain on the local emergency services.

WHAT TO DO IF YOU ARE SWATTED:  If you are swatted, you will be surprised, shocked.  Police arrive at your house in a state of heightened alert.  They are ready to shoot.  There may be dogs, many vehicles, lots of guns.  Police may be silent and surround the house, or they may bang on a door.  It depends what story was told by the swatter.  You will be in a state of shock and the police will be hopped up ready to go to battle.  You have to think clearly and respond appropriately.

If you are swatted, DO NOT LET THE POLICE IN TO YOUR RESIDENCE.  DO NOT ALLOW THEM TO SEARCH.  You know nothing is going on.  Do not let them in.  Politely and firmly tell them several times that everything is okay and you do not want them to search.  Just keep repeating this and close the door, if needed.  Thank them, be polite, but do not let them in and do not let them search. 

Ask the police to follow up with you about who swatted you.  Pursue this.  You want to catch the swatters.

If you have made that error and told the police they could search, you can revoke that permission at any time.  Clearly tell them to stop the search, that you no longer give permission. 

Sometimes a call will come from “inside the house.”  That can be someone hacking in to the phone line, especially if the phone and computer wifi are on the same optical cable.  I was swatted a while back, and this is what happened.  Police wanted to check the house to be sure I was safe.  I politely and repeatedly refused.  It did freak me out with them telling me the call came from within the house.  It is the stuff of horror movies.  But logic would tell you that if there’s a killer hiding in your house, they aren’t going to call the police.

IF YOU WALK OUTSIDE INTO A SWATTING SITUATION or if you are outside already when it happens:  If you are outside, the police will likely take you as a suspect.  That is why, if you see police arrive at your house, you should stay inside.  Even if they detain you, you should still refuse any search of the house or yard or outbuildings.  The police may demand an explanation or demand identification.  If you left that in the house, things are going to get complicated.  Try to stay calm and logical.    

AFTER YOU HAVE BEEN SWATTED: Take care of yourself.  Expect PTSD to set in.  Do what makes you feel safe and comfortable.  Follow through with the police to see if you can catch the swatter.  If you don’t, they’ll go on doing it to others.  If you think you know who swatted you, say so.            

Protests for Families

$
0
0

 Protests for Families

by Sue Basko

A protest planner in a small U.S. city contacted me about a protest she is planning.  The protest will include families and children.  They plan a rally in a city park, followed by a short march.  I wrote these ideas for her.

 I think with protests that involve families with kids, the main issues to think about are:

With families and kids, your best plan might be to hold a rally in a park, and have Tshirts and balloons, but definitely have a protest vibe with signs, etc.   You can have speakers and music.  And then maybe go for a short march to the town square or whatever point of interest where your protest is effective.

 A Circular route is best for families -  where you start and end at the park.

Reserve the park space so that your event is there and will not be overtaken by any other event or group.  There could be teams or classes or weddings, etc.  You may be required to reserve the space.  Check with your city.

Plan your sound system carefully. Usually it is best to bring your own so you do not have to pay for any City techs.  But make sure it will sound good and not all squawky and distorted.

Keep speaking short.  Children will become restless. Allow each speaker a timed 2 minutes.  Keep the whole speaker program to a total of less than 15 minutes, including introductions and clapping.

Try to have video people live-streaming to ustream, so people at home can watch the event live.  Also, try to have others video the event to put onto youtube.

Send out press releases to all the local media outlets of any kind.  Remember college and independent media outlets.

It is very nice to have a sing-a-long, so look into musicians who can donate their time and who have the right abilities.

With children present, be sure no one is displaying gory or violent pictures.  Some people are known to habitually show up at protests with posters full of such photos.  Ask them not to.  This is another reason why it is good to reserve the space for your group, if possible.
  
Have plenty of people as Staff or Security who wear special tshirts or jackets, carry a whistle, etc., who will assist with street crossings and keep your protesters off the streets.

When your group goes off on a march, assign a few people to stay behind and keep watch on the belongings left behind.  This is a good job for responsible adults who may not be able to walk the march route.  

Have plenty of porta-potties unless there are plenty of other truly public bathrooms.  Never use businesses' bathrooms.  Porta-potties are expensive and you usually need a permit to place them someplace.  But you should rent porta-potties, if needed.

Have water.  If the town requires a permit to distribute food or drink, what other places do is they bring cases of bottled water and place them around on the ground with a sign saying  Free Water, Take One.

Seating: If the park has seating and tables you can use, this is good.  Otherwise, you may need to bring tables and ask people to bring their own chairs or blankets. 

If a protest is large or the city or park is strict about what can be brought into a protest area, you may not be allowed to bring such things as chair, tables, or other items without a specific permit for each item.  You need to ask about this far in advance.

Most cities now freak out if a tent appears at a protest.  If you plan any tents, even as picnic or first aid shelters, and want to avoid the freak-out, clear this all in advance. 

Ending with a free meal is a good thing, if you can arrange this. This also gives people a reason to show up.  The ideal is to have a shared group meal brought in by an organization or caterer.  Check in advance on any permits needed for this.  Try to use recyclables.

Be sure there are trash bins.  If there are not, bring cardboard cartons lined with big plastic trash bags.

Do NOT let anyone pass out flyers. These end out all over the ground for blocks around.  If there are flyers on the ground, have your clean-up crew pick them up. 

 Be sure no one brings any stickers!  Stickers are so damaging!

Have a clean up crew and allow a few hours for clean-up.  The more clean-up people, the better.  Make the area look better than you found it.


Where is Vince in the Bay?

$
0
0

Where is Vince in the Bay?
by Sue Basko

Vince's last tweet before vanishing: a link to Pres. Nixon's goodbye speech 
Vincent L. Tocce, who is @VinceintheBay on Twitter, and host of Vince in the Bay Blog Talk Radio show, has been missing off the internet and from his radio show since March 7.  People are wondering where he is.   Where is Vince?  The short answer is: I don't know.  The long answer is: I have some clues.

Vince is reportedly 39 years old, lives in the San Francisco area, hosts an internet radio show that often features the racist and idiotic Rustle League, a group that has harassed this writer for months.  Vince's show features Big Titties Tuesday, his site has many photos of the clothed large breasts of women.  Pacer records show him to have a prior federal criminal charge for which he got a year of probation and a fine.  News stories say this was for accessing the PETA website after he was fired and deleting videos he had worked on. 

Since the Rustle League (www.nazifag.com) has senselessly stalked and harassed me since November  2012, I have reluctantly become a Rustle League watcher.  The Rustle League has always looked to me like a honey pot, a lure by law enforcement to catch the unwary.  The Rustle League seemed to me to be comprised of former members of Team Poison, a carding ring, law enforcement agents, cointelpro operatives, and several mentally deranged obsessive young men and women.   I never quite understood why the  "leaders" chose to have their  compulsive and deranged followers stalk and harass me, and so viciously, too.  There seemed to be almost a cult arrangement, where confused young people were being led to believe they were becoming popular by behaving like total asses on the internet, harassing me,  a lawyer who has always been generous in giving time to Occupy and Anons.

The Rustle League members were supposedly anti-Anonymous, so it was very odd several weeks ago when, out of the blue, @AnonSikko appeared on Twitter to join up with Rustle League.  It seemed very much like he had been recruited as, or forced into being, an infiltrator to lure Anons into the honey pot.  One of the first things he did was insult me.  This seemed very odd, because he had been nice to me before.   It seemed like something fake and fishy was happening.  

According to @Anon_Sapphire, on January 18, 2013, the computers of @AnonSikko were seized and he was subsequently arrested for alleged possession of child pornography involving boys, as well as a heroin charge.  I have no other evidence of this.  Reading the timeline of @Anon_Sapphire,  (a selection of the tweets is shown below), he or she goes from disbelieving the charges and backing @AnonSikko, to stating that @AnonSikko is cooperating with authorities, to then stating the disappearance of @VinceintheBay is connected to @AnonSikko cooperating with authorities.  Again, I do not know if any of this is true and welcome evidence in any direction.  California criminal cases are very difficult to impossible to accurately search online. There is no federal case listed for the real-life name that I have for @AnonSikko.  If he is cooperating with authorities, however, the case would likely be sealed.  Also, please be aware that a criminal charge does mean a person has committed an act; any person is presumed innocent until proven guilty. And even then, many are still innocent, but convicted.  Also, please note, I have no idea of the true identity of @Anon_Sapphire.

READ the following selection of tweets, and story continues below after the tweets.  Please continue reading.


@Anon_Sapphire showing early support for @AnonSikko

Still Showing Support for @AnonSikko
Lists off the alleged counts against @AnonSikko. 

Claims that @AnonSikko has preliminary hearing but does not state in what court.

When the Rustle League was not harassing me, they were harassing a young Anon, who shall be called "the Young Anon." The Young Anon and I both set about to find the identities of the Rustle League members that we did not yet know.   On or about February 26, around 8:00 am EDT, the Young Anon was rather certain he had found the LinkedIn profile of one of the older Rustle League members, who shall be called Older RL. The LinkedIn profile showed the Older RL man to be an employee of an IT staffing company, an intelligence analyst, and an Army group leader.   If the identification was correct, the man appeared to be in the Rustle League as an undercover operative and intelligence analyst.  The Young Anon tested his theory by tweeting a link to the LinkedIn profile to the Older RL.

Within 5 minutes of tweeting the link to the Older RL, the Young Anon was swatted at his home, in a massive display of police force that endangered his family, including young children who were held at gunpoint. The LinkedIn profile was immediately deleted and the cache of it quickly disappeared, too.  The Young Anon took these things as proof that his identification of the Older RL was correct.  If the Older RL was not the man shown in the LinkedIn profile, how and why was the profile immediately deleted?    Meanwhile, the Young Anon and his family endured a dramatic swatting, the house surrounded by police,  bomb dogs sniffing,  the Secret Service arrived with a computer forensics specialist, there was a full house raid without a warrant, the Young Anon was held handcuffed and captive for many hours, and his computers were confiscated.  At the end of a long day of senseless police activity, The Young Anon was not arrested or charged with any crime.

Note: I would not write about the Older RL being outed as a likely undercover operative, except it has been amply written about and posted online already. I would not break this man's cover publicly myself.  In this blog post, I am trying to be as discreet as possible.   

While the Young Anon was outing the Older RL as a likely intelligence operative embedded in Rustle League, @VinceintheBay was reportedly also on Twitter and saw the whole thing happening.   Vince made some tweets about it.

Meanwhile, a girl associated with Rustle League had been sending me a series of hundreds of bizarre tweets, including her unpleasant and racist sex fantasies.  Although I had her blocked, she persisted. It went on day after day, long strings of tweets of her fantasies sent to me.  I had no clue who she was.   I wrote a blog post about this and later deleted it.

In the days following, I noticed a tweet from @VinceintheBay to the girl asking her to send him a picture of her "bewbs."  She said "K."  Right then, I was pretty sure Vince was doomed.  The girl has since tweeted that she is 20 years old.  Still, this gave a hint that perhaps Vince was careless in how and from whom he acquired photos to sate his breast fetish.

On March 3, a man using the name Cpl. Bohater on www.theflawlesscrew.wikia.com wrote that Vince was on $200,000 bail for possession of child pornography.  I have searched Pacer federal criminal records and there is no such federal case. At the state level, California arrest and criminal court records are very difficult to search, though I have tried and have found no such case.  I have tweeted asking Bohater to send me some information on the case, if it exists.

This wikia entry made March 3, 2013 claims Vince is
 on $20,000 bail for an arrest for possession of Child Pornography.

  Cpl. Bohater is @TBohater or Toby Bohater, most likely a fake name.  The Twitter account has 4 tweets and a few followers.  His wikia profile (below) says he is from New York, of Polish descent, and a Call of Duty gamer.  Of course, this could all be made up information.   How does he know about Vince's alleged arrest and bail amount?  Who is Bohater?


Cpl. Bohater wiki says he lives in New York City.

In the tweets above, @Anon_Sapphire says "I have received info saying that @VinceintheBay recent vanish from twitter is related to @AnonSikko cooperating with law enforcement." If this is true, the implication seems to be that @AnonSikko provided evidence or a set-up for the alleged arrest of @VinceintheBay.  But anyone with two eyes could see Vince's online photo collection and know that some of the girls were most likely under 18 and that the photos were for "prurient interests," as the legal lingo goes.  However, the pics I saw may not qualify as "child pornography," except under the strictest interpretation of the definition.

The upshot of all this is:  @VinceintheBay is missing.  @AnonSikko is a hot potato, at least for now.  Hopefully, that will pass.  A Young Anon has been senselessly swatted, his family endangered.  An Older RL has likely been outed.  The whole Rustle League is a honey pot, as I suspected all along.  Only a fool would be in the Rustle League, but then, that was the case all along.  And I still have no clue why this group of whack-job ne'er-do-wells would pick me, of all people, to harass.  I write about what you do to me!

Questions: Was Vince's alleged arrest related to his knowing about the (alleged) outing and swatting?  How many of the Rustle Leaguers are law enforcement agents?  Why did the government think it helpful to allegedly place an Anon as a CI into an organization that claims to hate Anonymous?  Didn't that seem fishy and weird to everyone?   Why and how the hell did the Rustle League decide to sick its mentally disturbed members on me, nonstop and viciously, since November?  Is allegedly swatting a person a good way to stop them from identifying an embedded intelligence agent?  What if the little children of the family  had been shot when the police pulled guns on them?   And where in the world is @VinceintheBay?  And will all you screwed up jerks kindly stop bothering me now, forever? Thank you.

FOR ME, the BIGGEST QUESTION IS: Why is our government spending tax dollars to engage in all this foolishness?


Federal Computer Crimes List

$
0
0

Federal Computer Crimes List
by Sue Basko

Below is a partial list of U.S. Federal Computer Crimes and the sections in the Federal code that pertain to them.   The laws given are the actual sections under which the Federal prosecutors charge and prosecute computer crimes.  In addition, there are Internet Hate Crimes, which come under Civil Rights laws.  Hate crimes are acts based on a person's race or religion.  There are also federal laws against internet gambling, and sales of drugs or alcohol on the internet.

In addition to federal crimes, most states have computer crimes laws, especially laws against harassing or cyberstalking.   The laws that apply are the ones where the perpetrator is located, where the victim is located, or where a company is located if a website or service is involved.

The CFAA (Computer Fraud and Abuse Act) refers to a "protected computer."  In 2008, the CFAA was changed to include any computer connected to the internet as a "protected computer."

I will cover some of these laws in-depth in upcoming blog posts.  If you want to know about a certain one, please send an email.    YES - There are a lot of computer laws!

FEDERAL COMPUTER CRIMES and
 the sections under which they are prosecuted:

Denial of Service Attacks  (DDoS, Tango Down): 
18 U.S.C. § 1030(a)(5)(A)
(transmission of program,
information, code, or command,
resulting in damage)

18 U.S.C. § 1362 (interfering with
government communication systems)

Obscenity:
47 U.S.C. § 223(a)(1)(A) (using
telecommunications device to
make, create, or solicit, and transmit
any obscene comment, request,
suggestion, proposal, image, or other
communication)

18 U.S.C. § 1465 (using interactive
computer service for purpose of sale
or distribution of obscene material)

Electronic Threats:
18 U.S.C. § 875 (transmitting
communications containing threats of
kidnap or bodily injury) (Hobbs Act)

18 U.S.C. § 1951 (interfering with
commerce by robbery, extortion, threats or violence) (Hobbs Act)

47 U.S.C. § 223 (a)(1) (C) (anonymously using
telecommunications device to threaten person who receives
communication)

Electronic Harassment:
47 U.S.C. § 223 (a)(1)
(C) (anonymously using
telecommunications device to harass person who receives communication)

47 U.S.C. § 223(a)(1)(E) (repeatedly
initiates communication with a
telecommunication device solely
to harass person who receives
communication)

 
Cyberstalking: (see also Electronic Harassment)
18 U.S.C. § 2261A (using any facility
of interstate or foreign commerce
to engage in a course of conduct that places person in reasonable
fear of death or serious bodily
injury to person, person's spouse or
immediate family)


Interception of Electronic Communications (hacking emails or voicemail):
18 U.S.C. § 2511 (intercepting
electronic communications)

18 U.S.C. § 2701 (accessing stored
communications)

18 U.S.C. § 1030(a)(2) (accessing a
computer and obtaining information


Substitution or Redirection of a website:
18 U.S.C. § 1030(a)(5)(A)
(i) (transmission of program,
information, code, or command,
resulting in damage)

18 U.S.C. § 1030(a)(5)(A)(ii)-(iii)
(accessing a computer without
authorization, resulting in damage)


Password Fraud:
18 U.S.C. § 1030(a)(6) (trafficking in
computer passwords)

18 U.S.C. § 1029 (access device
fraud)

18 U.S.C. § 1343 (wire fraud)


Child Pornography, Child Luring, etc:
18 U.S.C. §§ 2251, 2252, 2252A
(sexual exploitation of children)

18 U.S.C. § 2423 (transportation
of minors or travel with intent to
engage in illicit sexual conduct)

18 U.S.C. § 1466A (obscene visual
representations of the sexual abuse
of children)


Disclosure of Private Information:
18 U.S.C. § 2511(1)(c) (disclosing
intercepted communications)

Spam:
18 U.S.C. § 1037 (CAN-SPAM Act)  

Spoofing Email Address:
18 U.S.C. § 1037 (CAN-SPAM Act)


Credit Card Fraud:
18 U.S.C. § 1030(a)(2)(A) (accessing a
computer and obtaining information
from a financial institution, card
issuer or consumer reporting
agency)

18 U.S.C. § 1029 (access device
fraud)

15 U.S.C. § 1644 (credit card fraud
aggregating at least $1,000)

18 U.S.C. § 1343 (wire fraud)


Use of Misleading Domain Name:
18 U.S.C. § 2252B (using misleading
domain name with intent to deceive
a person into viewing obscene
material or with intent to deceive a minor into viewing harmful material)

Extortion:
18 U.S.C. § 1030(a)(7) (transmitting,
with intent to extort, communication
containing threat to cause damage)

18 U.S.C. § 875(b), (d) (transmitting,
with intent to extort, threat to
kidnap or harm a person, or threat
to injure a person's property or harm
a reputation) (Hobbs Act)

18 U.S.C. § 1951 (interfering with
commerce by robbery, extortion,
threats or violence)


Piracy and Intellectual Property Theft:  
17 U.S.C. §§ 1201-1205 (Digital
Millennium Copyright Act)

18 U.S.C. § 545 (smuggling goods into
the United States)

18 U.S.C. §§ 1831, 1832 (theft of
trade secrets)

18 U.S.C. § 2318 (trafficking in
counterfeit labels)

17 U.S.C. § 506 and 18 U.S.C. § 2319
(criminal copyright infringement)

18 U.S.C. § 2319A (trafficking
in recordings of live musical
performances)

18 U.S.C. § 2320 (trafficking in
counterfeit goods or services)

47 U.S.C. § 553 (unauthorized
reception of cable service)

18 U.S.C. § 1343 (wire fraud)


Internet Fraud (e.g.,  auction fraud or phishing:
18 U.S.C. § 1030(a)(4) (accessing
a computer to defraud and obtain
something of value)

18 U.S.C. § 1028 (fraud in connection
with identification documents and
authentication features)

18 U.S.C. § 1028A (aggravated
identity theft)

18 U.S.C. § 1343 (wire fraud)

18 U.S.C. §§ 1956, 1957 (money
laundering)

18 U.S.C. § 1001 (making false
statements in any matter within the
jurisdiction of the government)

15 U.S.C. § 45 (unfair or deceptive
trade practices)

15 U.S.C. § 52 (false advertising)

15 U.S.C. § 6821 (fraudulent access
to financial information)


Espionage:
18 U.S.C. § 1030(a)(1) (accessing
a computer and obtaining national
security information)

18 U.S.C. § 1030(a)(2) (accessing a
computer and obtaining information
from any department or agency of
the United States)

18 U.S.C. § 1030(a)(3) (accessing a
nonpublic United States government
computer)

18 U.S.C. § 793 (gathering,
transmitting or losing defense
information)

18 U.S.C. § 798 (disclosing classified
information)


Federal Computer Laws, more info

$
0
0

Federal Computer Crime Laws, more info
by Sue Basko


In the last blog post, I listed Federal Crimes and the legal code sections under which they are actually prosecuted by the federal prosecutors.  This information is direct from the prosecutorial handbooks. I did not research these myself, I simply cribbed what the prosecutors use. 

A young man on Twitter was questioning whether some of these laws pertain to computer usage.  I have not read all of them, but these are in fact the code sections applied by federal prosecutors who are assigned to bring evidence to a grand jury for an indictment and then later to prosecute the case.  The sections that I have read do apply to computers, often by referring to "electronic communications," "electronic transmissions," "telecommunications," and the like. 

The same young man also questioned how it is that he might possibly have broken federal law many times on Twitter and yet, he was still a Twitter user.  The answer for this is quite simple: Twitter is not enforcing the law.   That's not their job.  Twitter is only slightly responding to Abuse Reports.  It would be the FBI that would handle complaints of computer crimes such as stalking, threats, and obscenity that might take place on Twitter.

Also, please keep in mind that the FBI does not have power to remove things off of the internet, other than if it is a true national security concern.  Go onto Youtube and watch the Barrett Brown videos where he talks about his dealings with an FBI agent.  Barrett has been charged with various crimes based on the videos, but the videos remain up on Youtube.   Also, the Stratfor emails are online, but Jeremy Hammond sits in jail for allegedly hacking them.   There are many other similar examples.

WHY I PROVIDED THE COMPUTER CRIMES LIST: I provided the computer crimes list and will provide more information on how the federal prosecutors are told to interpret the law in upcoming blog posts.  My reason for doing this is to inform people of REALITY.  Right now, I see infiltrators running certain groups on the internet and obviously trying to influence the followers into committing crimes. I noticed a few such leaders of entrapment groups mocking the blog post or mocking me, trying to diminish the truth or trying to discredit me.

These ridiculous people call me stupid, crazy, delusional, etc -- to try to discredit me because I am  presenting the young people online with what the law actually is.   I consider the people making those attempts to discredit my work to be pathetic, shills, selling their souls for a paycheck.  I want you to know the truth and am willing to tell you, even if it means I get called names by some wicked people who do not want you to know the truth because they want you to go to prison.  They want you to fill the cement cellblocks so that a corporation that runs prisons can have a bigger profit.  They want you to go to prison so they fill their own scorecard and get promoted on the job.  I am telling you the truth, so you can know what the law is and not be entrapped.  I want you to have information so you can make wise decisions.  You can do as you wish with the information, but I want you to have it.   

 I think our government should be TEACHING young people, NOT ENTRAPPING them.   And my effort at teaching them, at teaching you, is giving you the truth.  Unlike those whose jobs it is to entrap you, I have nothing to gain one way or the other.  But as a lawyer who cares deeply and truly about young people, I care if you get tricked or fooled into believing your actions are legal when they are not.

In the entrapment groups, they are surrounding you to try to make you feel like everyone is doing it, it is the cool thing to do, you will lose your friend circle if you don't participate. These are typical entrapment tricks that the "leaders" have been taught in special training. Please try to see if for what it is.  Consider whether you want to wreck your life to please some goofed-up character on the internet who collects his or her paycheck and lives a real life at the end of their shift of toying with you. 
  

Subpoena to Cloudflare in Barrett Brown's Case

$
0
0
This subpoena, written by FBI Agent Robert Smith, was served upon Cloudflare, an aggregate site server providing web security as a service.  If you sign your website up with Cloudflare,  the service chases away hackers and spammers.  Project PM is served by Cloudflare.  Project PM is a shared journalistic research resource that Barrett Brown helped found.   Basically, journalists who want to share their research put it on the site so others can access it.

Barrett Brown has been hit with 3 federal indictments.  The first indictment notes that "Project PM was a IRC/wiki-based blogger network created to allow Brown and those he associated with to share information and achieve or pursue certain goals." It is unclear why Project PM is mentioned in an indictment or why it is the subject of a subpoena, as journalism and research are legal activities.  It is also unclear why, if the government wants to read Project PM, they don't just get on it and read, since it is publicly available on this magical thing called the internet.  These things have yet to be explained.  

The subpoena is being challenged by an intervenor represented by a lawyer named Jason Flores Williams, of New Mexico.   Stay tuned.  This should get interesting.

The subpoena pages below are jpegs. If you want to see them bigger, pull them off the page and click to enlarge to any size. 







How to Run a Prison Blog

$
0
0



How to Run a Prison Blog
by Sue Basko

Back in 2009, I helped start a blog written by a man, Paul Modrowski, who is in Stateville, a maximum security prison south of Chicago,  Illinois.  There is a team of wonderful blog helpers.  The blog, Paul Modrowski: On the Inside, is now very well-established with a solid readership.  The blog is also apparently read by prison guards and management.   Over this time, Paul has become an excellent writer.   Paul has autism, so having a prison job would subject him to commotion that would unnerve him.  Writing the blog is his constructive activity. 

Paul Modrowski: On the Inside gives an important, detailed look at everyday life inside a hellish maximum security prison.  Stateville is a place of murderers and madmen, the cacophony of the towering roundhouse, the filth of cockroaches and bad plumbing.  There is the joy of birds nesting in the roundhouse, the delight of a meal of a small piece of fried chicken, a visit with loved ones in a crowded, noisy room.  There are hundreds of men kept for many years in tiny cages, a reality we try to push from our minds because it is too horrible.  This is the painstakingly detailed story of one of them.  I think it is a literary masterpiece of today.

Should you start a prison blog?  A prison blog requires a prisoner who wants to write on a regular basis and a team of helpers on the outside.  The team needs someone who can start, design, and manage a blog, someone who can type in entries, and someone who can manage comments and emails.  It is a fairly big commitment of time and work.   

 How does a prison blog work?  Most prisoners do not have access to the internet or to a computer or typewriter.   Therefore, the prisoner writes the blog entry on paper and mails it out to one of the blog team members.  One of the team types it up as a doc and then transfers it onto the blog.  Sometimes, pictures or videos are added to the blog post.  A Table of Contents entry is added.  When comments come in, they are printed up and mailed to the prisoner.  The prisoner writes back a response, which is posted on the blog.  Other jobs include promoting the blog by posting links.

What expenses are involved?  If you use a free blog site, that is best and will cut down on expenses.  The other expenses are paper and pen or pencils for the prisoner, and envelopes and stamps.  All this comes from the prison commissary.  The helpers also need internet access.  Assuming you have internet access, the cost is very low.

How to Get Started: Find a prisoner who wants to write a blog.  Gather a small team to assist.  Choose a blogging site.  I like Blogger.  Start a blog and pick a good name and URL.  The person’s name is a good choice.  Ask the prisoner what kind of design they would like.  Make a design that is easy to read, with a white or very light background and good-sized lettering in a traditional font.  Other than that, choose colors and a mood that suit the person.  Start an email account to go with the blog.

Who Should Be the Publisher: The prisoner should be the publisher.  You and the team cannot be responsible for what is written.  If the person typing up sees something that seems as if it should not be published, withhold it or discuss it.  Ultimately, responsibility must lie with the writer as publisher.  Everyone else is just a helper and the helpers come and go.   

Will What is Written Affect a Court Case?  It can.  Many lawyers will say not to write at all, or at least not to write about the court case, if the prisoner is pretrial.  It is probably best, in any situation, not to write about the court case.  However, prisoners love to write about their court cases.  If the prisoner has a lawyer, their directions should be followed.

Should the Prisoner’s Writing Be Edited?  At first, Paul’s writing had to be edited to fix sentence structure and misuse of words.  Then, we sent him a book on writing.  By using the book and writing many blog posts, he taught himself to be a very good writer.  I’d suggest you do the same.  Edit as much as is needed to make the blog readable, and try to use the experience to let the prisoner become a better writer.  If the person typing in the post thinks there is material that seems like it should not be published, they should withhold it and discuss with the prisoner.  Ultimately, the prisoner is the publisher of his or her own writing.      

How to Handle Comments:  A prison blog is bound to draw comments and emails.  If the comments or emails are abusive, there should be no response.  Be sure to set the Comments settings so that all comments are moderated.  If a comment is abusive or baiting or invasive, do not post it.  Comments are printed up and mailed to the prisoner, who mails back replies that are posted.  

Use your sense. Not every comment should be mailed to the prisoner,  because all mail in and out is read by prison staff. There are people who will write some pretty crazy, destructive, invasive, abusive, or bizarre comments and emails, and it is important to just keep those off the blog and out of the mail.  

Also, the people running the blog may have angry strangers and weirdos write mean or inappropriate things to them.  If you expect this, you won't be surprised when it happens.  

Emails and Feedback:  Be sure to provide an email address so anyone with feedback or concerns can write in. 

Suggested Topics for the Prisoner/ Blogger to Write About:    What the everyday schedule is at the prison, what food is served, what the prisoners do for enjoyment, reviews of books, TV shows, and movies, opinion pieces on current events in the news, descriptions of what is going on day to day, description of the medical service in the prison, telling about the interactions of the people in the prison, what is happening.    

Encouragement: Sometimes, Paul has been discouraged about writing.  Then, when he hears how many readers he gets, he perks up.   When he found out the guards and staff read his blog, he was encouraged.  One guard told Paul, "You tell it like it really is."  

Privacy:  Paul has kept quiet with most other prisoners about writing the blog.  A few have found out from their relatives on the outside.  Paul has found that this level of privacy has enabled him to better continue his writing.   

Dot Gov: Beware of Fake Government Websites

$
0
0

Dot Gov: Beware of Fake Government Websites 
.gov vs .com 
by Sue Basko

Many government websites use the .gov extension.  If you go to the same URL name, but with a .com ending, you will usually find a for-profit business that looks official and is selling services or products related to the topic of the government site. This can be misleading, because you can end out paying a lot of money for something that would have been free.  In some instances, the look-alike URLs may be selling worthwhile services.  The important thing is that you, as a user, should know if you are dealing with a government site or with a company trying to sell you their wares.   Always remember: .gov is where you will find the real, official government site.

Examples - Dot Gov versus Dot Com:

FAFSA.gov is the Free Application for Federal Student Aid.  It will also come up as FAFSA.ed.gov  This is where you can fill out the free, no charge application for college and university student financial grants, loans and employment.

FAFSA.com is a for-profit service that helps you fill out the FAFSA form.  It looks very slick and professional and official.  But it is not the official, free FAFSA application.  Schools have financial aid offices that will help fill out the form if it is difficult for you. 

IRS.gov is the government’s site where you can get tax forms and information and file taxes.

IRS.com is a site that looks more “official” than the real IRS site.  It is run by Banks.com and provides official-looking links to many paid services.  Beware.

USPTO.gov is the government’s site for registering patents and trademarks.  The site has an e-filing portal as well as  database search.

USPTO.com is a for-profit portal to many ads selling services and products related to patents, trademarks, and copyrights.

Copyright.gov is the official U.S. Copyright Office where you can register copyrights and search the database.

Copyright.com is a site for Copyright Clearance Center, an organization selling goods and services related to copyright. 

HUD.gov is the U.S. Department of Housing and Urban Development.  The site offers information on free and legal mortgage and foreclosure counseling, and many other services.

HUD.com is a site that charges the users to look at supposed HUD house listings.

WhiteHouse.gov is the official website of the White House and President Obama.  Users can send a message to the President, get on an email list to receive White House emails, and find the latest causes and concerns of the President.

WhiteHouse.com is a website that gives links to ads about tours in Washington, D.C.,  but mainly features links to ads on how to find a Russian bride, Latino women, and other such ridiculous matching ads.   If you accidentally got on this page and thought the President was concerned for finding you a hot Latina bride, sorry, not likely.


Filing a Complaint with the FCC

$
0
0


Filing a Complaint with the FCC
by Sue Basko

You can easily file an online informal complaint with the FCC at: http://www.fcc.gov/complaints

The complaint topics range from signal jammers, caller ID spoofers,  loud commercials, to indecent programming.  Below is a listing of the complaint categories available on the online form.  To make your complaint on the form page, just click on the category and click Next at the bottom of the page and follow along till completed.

Tower Light Outages or Signal Interference
  • Tower Light outages
  • Hindrance to a public safety service or device by a communications service or device
  • Problems completing 911 calls
  • Cell Phone, GPS, and Wi-Fi jammers
  • Other jammers
  • Narrowbanding


Wireless Telephone
  • Telemarketing (including Do-Not-Call)
  • Prerecorded messages
  • Billing
  • Service
  • Privacy
  • Identity theft
  • Disability access
  • Number portability
  • Unlawful advertising
  • 911 calls
  • Tower Light outages
  • Signal interference to other devices
  • Cell phone jammers
  • Rural Call Completion

Broadband Service and VOIP
  • Unsolicited emails on cellular phone
  • Billing
  • Service
  • Availability
  • Number portability
  • Unlawful advertising
  • Disability access
  • 911 calls


Broadcast (TV and Radio), Cable, and Satellite Issues
  • Obscene or indecent programs
  • Unlawful or illegal advertising
  • Disability access
  • Emergency alerts
  • Unauthorized/unfair/biased/illegal broadcasts
  • Cable modem or signal issues
  • DTV issues
  • CableCARD issues
  • Loud Commercials


Wired Telephone
  • "Slamming," which occurs when your authorized wireline telephone company for local, local toll or long distance service is switched without your permission.
  • Telemarketing (including Do-Not-Call)
  • Prerecorded messages
  • Billing
  • Service
  • Privacy
  • Identity theft
  • Disability access
  • Number portability
  • Equipment
  • Unlawful advertising
  • Rural Call Completion


Disability Access to Communications Services and Equipment
  • Video Description
  • Closed Captioning on Television
  • IP Closed Captioning
  • Telecommunications Relay Services (TRS)
  • Section 255: Telecommunications Services and Equipment Accessibility
  • Hearing aid compatibility
  • Emergency broadcast information
  • Visual Description


Junk Fax
  • Unwanted/unsolicited fax to your residential or business fax machine


Telemarketing, Prerecorded Messages, Caller ID Spoofing, and Do-Not-Call
  • Do-Not-Call
  • Wireless spam
  • Calls or messages to residential lines, business lines, wireless devices, emergency lines, patient rooms, and toll-free numbers
  • Calls that provide a false or "spoofed" incoming phone number on the caller ID display






Viewing all 264 articles
Browse latest View live