Category Archives: Cyber Abuse
The Democrat and Chronicle reports that when first interviewed by the FBI, William Rosica claimed innocence. His former girlfriend received emails from Katy Jones. Rosica’s proof of his innocence was showing FBI agents that Katy Jones also sent him a load of emails. Rosica claimed that Katy Jones was sending emails to him to warn him that his former girlfriend was surveilling him.
“Please be careful,” read one of the Katy Jones emails to Rosica. “She is very devious and wants to ruin you. She thinks you’re with someone else.”
As the agents suspected, Rosica was using the name Katy Jones when sending the emails to his former girlfriend and himself.
“Between February 2016 and March 2017, defendant William Rosica subjected the victim to a nonstop sadistic campaign of terror and psychological torture intended to kill, injure, harass, and intimidate her”.
Federal prosecutors alleged that Rosica enlisted other police to surveil his former girlfriend; had other individuals use disposable “burner” phones to pass information onto him about her whereabouts; had someone rummage through the woman’s trash; and surreptitiously secured information about her television viewing that he then used “to show that he knew her every move”. Read the rest of this entry
Cross posted from Stop Cyber Abuse
On January 3, 2018, I predicted that if Kansas has felony murder law, that Tyler Barriss would be charged for the death of Andrew Finch.
I’ve been following and posting about this case. It is another demonstration for how cyber abuse crosses the line of the internet into the personal and private lives of victims, causing harm emotionally, physically and in this case, resulting in death.
Tyler Barriss made a call reporting that he killed his father, was holding his mom and little brother hostage, had poured gasoline throughout the house and was planning to set it on fire. He gave 911 dispatch an address. It was not his address. Barriss was making a swatting call. Andrew Finch, the man at the address, heard noise outside the house and opened his front door. He was shot dead by a Wichita police officer.
Barriss, who is 25-years old, was still on the phone with dispatch after Andrew was shot. Andrew was unarmed and uninvolved in the events leading to Barriss’ false police report. Andrew was 28-years old and the father of two children. Read the rest of this entry
The victim waited three years for trial, but only had to wait 20 minutes for the verdict.
In 2010, Brittany Assam was 22 years-old, and James Krey was 37 years-old. They both were police officers with the Davie, Florida police department. They had dated for 18 months and broke-up in February 2015. James Krey wanted Brittany to leave town. He threatened to send naked pictures and a sex video of Brittany to their colleagues if she didn’t leave town.
“Jimmy, please don’t destroy me. I will leave the department,” Brittany said in one text message, which she read to the jury at trial.
“You’re going to have to leave Broward, sweetheart,” he replied. “Anywhere you go, I have people.”
On March 10, 2015, Brittany took the threatening text messages to the Coral Springs Police Department where she resided. James Krey was arrested and placed on paid leave.
In July 2017, Krey asked the court to exclude evidence from his cell phone. Judge Bailey declined to suppress the disputed evidence because police did not actually search the contents of Krey’s phone until after they had obtained a warrant. Krey’s defense lawyer, Jeremy Kroll, conceded that the jury could still see the texts on Brittany’s phone. Read the rest of this entry
There was a swatting incident on December 30, 2017 in Wichita, Kansas. I’ve been reporting on it on my other blog. Some of you might already know that my other blog deals solely with cyber abuse, whether harassment, stalking, swatting, threats, spoofing, or combinations.
Today after reading some articles and comments on Twitter about the most recent swatting incident, I asked myself if there is anything I could have done to make information more available; to inform the public that spill-over of internet harassment into the personal lives of target victims is dangerous. However, as with other issues, people don’t seem to take an interest unless major media reports it first or unless it happens to them. Then too, I’m only a drop of water in a vast ocean.
Swatting is a prank where someone makes a call to a police department with a false story of a happening crime involving killing or hostages and guns. Police arrive and at times, SWAT is dispatched.
In order to pull-off the prank, an address is needed and that is generally obtained by doxing targets. Doxing is the seeking and gathering of personal information of others to use to harass, cause them fear and distress, post publicly on the internet, and yes — to swat or encourage others to do so.
On November 23, 2014, I blogged about a civil case filed in Northern Illinois that involved swatting. The plaintiff in that case was awarded $50,000 by a jury.
On February 9. 2015, I blogged about a case where a Nevada man swatted a resident of Naperville, IL and was extradited to Illinois for prosecution. The State’s Attorney stated that he would seek legislation to make swatting a felony.
On May 20, 2015, I recapped those two cases in another blog post about a couple arrested for harassment by eletronic media.
In August 2017, I wrote a post about a Bill introduced by Representatives Katherine Clark (D-MA), Susan Brooks (R-IN) and Patrick Meehan (R-PA). The Bill is H.R. 3067 and is titled the Online Safety Modernization Act of 2017. If passed, it will make swatting and doxing federal crimes.
Now that the father of a 2-year old and 7-year old is dead because of a swatting prank, Kansas.com, the Post Gazette, and the New York Times among other news sources, are reporting on the introduced Bill and asking the question, who is at blame for Andrew Finch’s death? Read the rest of this entry
I’m cross-posting here from the flightattendant blog because the threat made by Santiago Rodriguez pertains to this blog.
Santiago Came To Me Asking For Help
In May 2014, a man named David Piercy filed for a restraining order against Santiago Rodriguez. The court granted Piercy a temporary restraining order against Santiago. There was a hearing scheduled for a ruling on the permanent restraining order. As I understand it, there were exchanges on Twitter where Santiago became aware that bloggers and others had allegedly been harassed by Piercy. Someone pointed Santiago in my direction and he reached out to me.
Subsequently, Santiago asked that I put his name on the border of my blog, We Hold These Truths To Be Self-Evident, as a writer. This is how it happened …
(Cross posted from Flightattendantfailures)
After an approximate 3-month investigation, a 14-year-old Northampton, PA student has been charged with cyber harassment and ethnic intimidation. The 14-year old took a video of a 16-year old student eating lunch and posted it on Snapchat. The 14-year old is White. The 16-year old is Black.
Northampton County District Attorney, John Morganelli, said of the video;
“I reviewed the video today and I find it to be highly offensive and reprehensible. It depicts the 16-year-old minding his own business eating chicken wings while the 14-year-old records him and narrates it by describing the scene as ‘a N-word eating chicken.’
“The video demeans the 16-year-old with numerous uses of the N-word and references to being broke and on welfare. As bad as that is, the 14-year-old published the offensive video on social media including Snapchat that was viewed by numerous students as well as the 16-year-old male, …”
However, the District Attorney did not know of the video until after the 16-year old Black student was arrested and charged with simple assault, harassment and disorderly conduct. That’s because while at a football game attended by both student, the Black student retaliated by opening a can of whoop-ass on the 14-year old.
Neither teen has been publicly identified by authorities.
D.A. Morganelli will allow the 14-year-old to seek an “informal adjustment” in juvenile court. If he completes the probationary requirements, he will not be charged with the crimes.
The 16-year old Black student will also be allowed an “informal adjustment.” Morganelli said the black student had previously been the subject of discrimination from a group of students calling themselves “the rednecks.” He said he had a confederate flag thrown on him when he transferred to the school from out of state. Read the rest of this entry
On January 19, 2016, California Attorney General Kamala D. Harris and Placer County District Attorney R. Scott Owens, announced the arraignment of Riley Bangerter, 36, of Roseville. Bangerter has been charged with 11 counts of identity theft in a case of cyber harassment. Bangerter was arrested on December 3, 2015 and was arraigned on January 11, 2016. Bangerter has pled not guilty.
In 2011, Attorney General Harris created the eCrime Unit within the California Department of Justice to identify and prosecute for crimes including identity theft, cybercrimes and other crimes involving the use of technology.
An investigation by Attorney General Harris’ eCrime Unit found that Bangerter superimposed images of his ex-wife onto pornographic images and posted them online, accompanied by her personal identifying information.
When announcing charges against Bangerter, AG Harris stated,
“Bangerter’s heinous actions sought to humiliate, belittle and destroy the personal and professional life of his victim. This prosecution sends a clear message to all who dare to perpetrate the crimes of cyber harassment and cyber exploitation, that these cowardly acts will not be tolerated in California. I thank the Placer County District Attorney’s office for their partnership and commitment to holding Bangerter accountable for these deplorable acts.”
Michael C. Ford thought he was sophisticated in how he terrorized young women on the internet. His methods however, resulted in federal charges of interstate threats, fraud in connection with computers, wire fraud, and cyberstalking.
Some of us are familiar with the threats, being on the receiving end. They are threats that unless you do what the perpetrator wants, that they will post your personal information on the internet. Many times, that is combined with claiming to have some type of “public document” and misrepresenting it so they can demean and mock.
Michael C. Ford however, did not use “public documents” as a threat against his victims. He hacked into protected accounts on the internet and obtained sexual photos of his victims. The 17 page warrant is an interesting read.
Ford used various Google email addresses to make contact with a woman, reported to be 18-years old, letting her know that he had obtained some sexually compromising photos of her, and that he also knew her real name and address. He demanded that she take videos of other girls undressing and/or nude, and send them to him or he would release the photos to her family and friends, and post them on the internet along with her personal information.
In November 2014, we reported on the case of Steven and Joseph Rusinowski versus Robert DiDomenico. It was a case of cyberharassment gone wild. The case was originally filed in the Circuit Court of Cook County and on July 15, 2011, transferred to the federal district court for the Northern District of Illinois. On October 2, 2014, the jury returned a verdict in favor of Rusinowski and against DiDomenico, awarding Rusinowski $50,000.
One of the most important rulings in that case caught the attention of attorneys. The judge ruled that Illinois has long arm jurisdiction that applies to electronic harassment. That means that those who harass citizens of Illinois over the internet and/or telephone, no matter where the perpetrator lives, will have to defend in Illinois.
In February of this year, we reported on Brandon Wilson of Las Vegas, Nevada, who hacked, harassed, and pulled pranks over the internet. Evidently feeling comfortable behind his computer and using handles, he made a serious mistake — he made a call to Naperville, Illinois 911 and gave a false police report resulting in SWAT showing up to an innocent man’s house. Evidence was gathered from Wilson’s computers showing that it was not the only time that he made a false police report.
Wilson was extradited to Illinois.
Last month, KMOV news reported that a Collinsville, Illinois’ family was electronically harassed. It began with the family’s 12-year old son receiving threatening voice texts and harassment on Facebook. The 12-year old’s brother, 20-year old Devon Dean, tried to step in to stop it, but the person then made him a target. The harassment included racially offensive comments. Read the rest of this entry
The other week, I was watching the Steve Harvey show and Paula Todd was a guest on his program. Paula Todd is a Canadian journalist, investigative author, broadcaster, and lawyer. She is a professor of broadcast journalism and digital media at Seneca College, and is a frequent speaker on cyberabuse, Internet culture, writing, reporting, literacy and freedom of the press. In 2014, she published the book, Extreme Mean: Trolls, Bullies and Predators Online.
An introduction of her book starts with;
“Cyberbullying, tormenting and revenge porn. Workplace digital skullduggery, online defamation and reputation annihilation. Cyberstalking, Anon hate and adults ridiculing other’s children. Digital sexual extortion, blackmail and predators on the prowl. Which kids, youth and adults are behind this negative online behaviour and what can be done to stop the abuse?”
For those who have Word Press blogs, you know that we can see referrals to our blog from other sites and emails. I don’t always check that section on the Admin side, but when I saw a significant increase in the number of views one day, I did check.
Steve Harvey’s website linked to an article on Blackbutterfly7. Words cannot express how honored I was. Of all the sites on the internet that reported on the particular subject matter, Blackbutterfly7 was chosen. I didn’t publicly share that information. Why? Because for years, cyberextortionists stalk the internet looking for opportunity to disparage this blog and defame me. I did not want them trying to verbally vandalize Steve Harvey’s website and taking up the time of his staff to moderate their defamatory vileness. Read the rest of this entry
Lessons learned, old lessons remembered……
(Alert. Some might find the content in the comments of others presented in this article to be offensive.)
Five words I would hear on a regular basis day in and day out when training as an amateur boxer; “Protect yourself at all times.” You hear those words time and time again in the gym, even while hitting heavy bags or doing mitt work. It’s important even during sparring although those sessions are controlled and not as intense as an actual fight.
The idea is to instill that way of thinking into your head so you keep your hands up, keep your head moving and your feet moving, thus reducing the chance of getting caught with a shot you don’t see only to deposit you on the canvas.
It’s the last set of words you hear after having passed the ammunition to your opponent (Touching Gloves) and just before the opening bell sounds.
What do I mean in all of this? Lets look back when the internet started to surface and started to become the trend that it is today.
If you were a parent back then or even a single lady living alone, the internet was a place where you knew trouble lurked. You didn’t want your kids on the internet because you have prowlers trying to lure your kids to meet them. You have scam artists setting up websites in attempt to look legit but are intended to get your personal info and steal your identity or clean out your bank account. These are things we are all aware of and we all keep our guard up in regards to these types of realities. But I am going to take it even one step further. How many of you have surfed Youtube only to see some crazy conspiracy theories in the videos? I am pretty sure everybody here has stumbled across them on a couple of occasions.
The disturbing part is the creators of the videos; the creators of those theories, believe in them so much that if you even utter a word disagreeing they tend to claim your hired by the Government sent out to discredit truth seekers. Or am I the only one who happens to find Youtube users like that? Don’t take my word for it. Look up some of the Planet X theorist and try to debate reality with their warped sense of thinking and see what happens.
Anyhow, I have seen some crazy stuff surfing. There are videos where anti-Obama nutters claim that the Aurora shooting, Sandy Hook and even the Trayvon Martin shooting never took place. They claim that these were all paid actors and one huge effort to take away our 2nd amendment rights. Read the rest of this entry
Hey @blanc_papillon7, aka Papillon_Jane.
You’ve just been Rick Rolled.
Long before there was a police force in America, there were sheriffs. The office of sheriff has its roots in 9th century England. According to the National Law Enforcement Museum, the early policing system was modeled after the English structure, which incorporated the watch, constables, and sheriffs (derived from the British term, “shire-reeves”) in a community-based police organization. The British system developed from “kin policing” dating back to about 900 A.D., in which law enforcement power was in the people’s hands, and they were responsible for their families or “kin.”) Early law enforcement was reactionary, rather than pre-emptive—the watch usually responded to criminal behavior only when requested by victims or witnesses.
Then called a “reeve,” what is now known as the Sheriff in America, was an individual originally selected by the serfs to be their informal social and governmental leader. The reeve soon became the Kings appointed representative to protect the King’s interest and act as mediator with people.
In the United States, approximately 98 percent of sheriffs are elected. Good, bad or mediocre, what sets the office of sheriff apart from the police force, is that the sheriff’s office is accountable to the citizens through the election process. Read the rest of this entry
This is a case of cyber-harassment gone wild. The case was originally filed in the Circuit Court of Cook County and on July 15, 2011, transferred to the federal district court for the Northern District of Illinois. There were numerous defendants named in the complaint, but the person of significant interest is Robert DiDomenico, a resident of Rome, New York. The other named defendants consisted of law enforcement officers, hospitals, and doctors, all of whom became involved in the lives of Steven and Joseph Rusinowski because of Robert DiDomenico.
Since July 15, 2011, the case had proceeded to summary judgments, some of which were denied, some granted, and some granted in part and denied in part. DiDomenico argued lack of jurisdiction. The court didn’t buy it. DiDomenico also played games about his “handle” The court didn’t buy it. Read the rest of this entry
iPredator Inc. is a New York State based Information Age Forensics Company founded to provide educational and advisory products & services to online users, consumers and organizations on cyber bullying, cyber harassment, cyber-stalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., C.F.C., their goal is to reduce victimization, theft and disparagement from online assailants.
The organization has conducted studies and provides definitions and descriptions for those who use information and communications technology (ICT) to harm others.
An ICT Predator is a person or group that directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal gain.
Michael Nuccitelli of iPredator Inc, believes that cyber-harassers are usually motivated by a need for peer acceptance and/or power and control. The most malevolent feels minimal remorse for the harm they are inflicting upon the target. Read the rest of this entry
This concerns race as others see it when they want to use it to mock and denigrate others — when they want to justify their racial bigotry — when they want to hate. Mostly however, it’s about ignorance. The inspiration for this post is this man;
Shaun King is an activist who came into the spotlight when he used Twitter to advocate for justice for Michael Brown, the unarmed 18-year old shot to death by Ferguson police officer Darren White. Shaun is now a writer for The Daily Kos. Supporting his presentations with facts, compassionate, and wise, Shaun is targeted by cyber-harassers. They call him a “wigger” because they perceive his race is White.
Urban dictionary defines “wigger” as
a white person who tries to emulate or acquire cultural behavior and tastes attributed to African-Americans.
It’s a blend of the word “white” and the “n” word.
There is an underlying subject here of allowing those of mixed race to define themselves, but that subject is effectively covered on Mixed American Life so I won’t go into it here.
If people are going to look at the color of skin and/or physical features to determine race for the purpose of judging others, (and targeting them for cyber-harassment), they might be surprised at their ignorance. The following famous people are bi-racial or multi-racial. Read the rest of this entry