Friday Fill-Up -Standing Strong Against Cyber-Extortionists
Nothing would give me more pleasure than to share some personal things with you about myself. I’m restrained from doing so because of people who take anything I say, twist it, and then go on doxxing expeditions. Be aware – any attempts of defamation that can only point to “evidence” written by the person or one of their minions. Their evidence cannot be trusted.
Ask them how they know the name they purport is the person’s real name, and they won’t be able to point to any “evidence” other than what another one of them has written.
Well, I’m going into this because since one cyber-extortionist was unsuccessful in his copyright infringement claims, and unsuccessful in getting a court ordered restraining order against a person he harassed, numerous people are being attacked for associating together.
What is happening is not cyber-harassment. It’s much more serious than that.
In Illinois, statute defines harassment as
“knowing conduct which is not necessary to accomplish a purpose that is reasonable under the circumstances, that would cause a reasonable person emotional distress and does cause emotional distress to another.”
What the cyber-extortionists do has a purpose. They not only intend to cause their victims emotional distress but by their own words, they intend to “destroy” their victims. That threat generally follows their first threat, which is to defame the target victim unless they remove their presence from the internet. Not only that, but their reason for targeting victims is because of race.
Beginning in 2012 as people took interest in what happened to Trayvon Martin, the cyber-extortionists assumed that anyone wanting George Zimmerman arrested and brought to trial had to be Black. When they realized that not all are Black, they coined the term “White guilt idiots.” It’s another way of calling a person a “race traitor.”
They do not want people exercising their right to freely associate with others regardless of race, nationality, gender, sexual preference, age. Their purpose is to violate our civil rights. They want Jim Crow in cyber-world as it once was in our physical nation.
What the cyber-extortionists and those like them depend on, is that the people they contact with the “outing” material will have the same prejudicial and judgmental heart that they have. Throw race into the mix with an allegation that the person is “racist,” along with adjectives such as “vicious” or “savage” and that’s suppose to convince people to disassociate.
They like searching for court documents. If they find one that they can disparage, they will allege it is about their target victim. On their main defamation blog, they have arrest records for a target victim because he made videos during the George Zimmerman case. Note: “Arrest records.” Not “conviction.” The case was dismissed, but the author of that blog does not mention that. It’s also for an individual in the State of Florida, while their target victim resides in another state. But, since when did they care about getting their purported facts right?
The cherry on top is when they say you don’t want to associate with a person because you are better than that – better than that person.
That speaks volumes.
When people do things for the wrong reason, there is nothing right about it. Why should it bother anyone that some people use handles or nicknames on the internet rather than their real names? The internet gives us options to use our real names, nicknames, handles, or any combination. The only reason a person insists that everyone on the internet uses their real name, is for intimidation purposes. It gives them a sense of control. If you don’t march to their music, they know your name, and will search the internet. Anywhere that name appears, they will allege it is their victim. This includes where you live, where you work, the names of your children and where they attend school.
The person who thinks that people should use their real name on the internet might not contact your job, your spouse, or your kids, but they will give information to others so they can, while they sit back and watch the agenda to violate your civil rights – all while they sit in another country.
But first, we must believe what they say and by their own pattern and reputation, we cannot believe anything they say. The person now going about the defamation route is one who has demonstrated the ability to change photos. He can make anything look like he wants it to look.
What the cyber-extortionists have managed to do, by their own actions, is cause many of their victims to come together. Violating law against one person using the internet might not cause law enforcement much concern, but when groups of people from across the nation begin reporting the same individuals violating law for the same reasons, it MUST get the attention of law enforcement.
Before I forget, I also want to bring some peace to those who feel threatened by comments that Twitter is being subpoenaed for their account information. Twitter has terms for privacy that apply when the person requesting information is not law enforcement. Even in cases where law enforcement requests account information, Twitter does not release it without first contacting the account holder. That gives the account holder standing to ask the court to quash the subpoena.
Backing out of this, it means that unless a case is filed, whether civil or criminal, a subpoena is as good as a blank piece of paper. It does not have to be honored and without it being issued in a case, there is no power to enforce compliance. People in the black robes have the power – not a form titled “subpoena” unassociated with a case. There must be a case filed, even if filed against “John or Jane Doe.”
Again, the account holder is notified so that the account holder’s legal defenses or objections are not limited. Hence, do not be intimidated by empty threats. I would argue too that a private individual has no rights to anyone’s account information, nor their tweets, unless they have proof that the individual has tweeted to them.
My fill-up today is to remind us to never, ever, let anyone else define us. Define yourself. Have confidence in who you are and never allow bullies to define you. When they try, the best defense is no defense.
Here is where I enter into a spiritual lesson demonstrated by Jesus the Christ. When he was in the wilderness, it was not what the tempter wanted Jesus to do that was the real temptation. It was why the tempter wanted him to take certain actions. The tempter started by saying, “If thou be the Son of God, then …”
Jesus never once defended himself against that.
There are layers of understanding in that lesson, but an important one is, you can never prove who you really are to anyone who has already made it clear to you that don’t believe who you are in character and/or purpose, anyway. They will always seek to re-define you according to the image they want you to be.
The branch of this lesson, also from Jesus the Christ, is that it makes no difference who others say you are. The only people we should give any credibility to for their opinion, are those standing beside us, who have fished, eaten, and shared their lives with us. And, we ask, “Who do you say I am?”
The correct answer is not for our benefit but gives the person with the correct answer a new purpose in life;
Thou name is now “Rock.”