Blog Archives

Davie, Florida Cop Found Guilty Of Sextortion

The victim waited three years for trial, but only had to wait 20 minutes for the verdict.

In 2010, Brittany Assam was 22 years-old, and James Krey was 37 years-old.  They both were police officers with the Davie, Florida police department.  They had dated for 18 months and broke-up in February 2015.  James Krey wanted Brittany to leave town.  He threatened to send naked pictures and a sex video of Brittany to their colleagues if she didn’t leave town.

James Krey

“Jimmy, please don’t destroy me. I will leave the department,” Brittany said in one text message, which she read to the jury at trial.

“You’re going to have to leave Broward, sweetheart,” he replied. “Anywhere you go, I have people.”

On March 10, 2015, Brittany took the threatening text messages to the Coral Springs Police Department where she resided. James Krey was arrested and placed on paid leave.

In July 2017, Krey asked the court to exclude evidence from his cell phone.  Judge Bailey declined to suppress the disputed evidence because police did not actually search the contents of Krey’s phone until after they had obtained a warrant.  Krey’s defense lawyer, Jeremy Kroll, conceded that the jury could still see the texts on Brittany’s phone.  Read the rest of this entry

State Dept. Employee Charged With Cyberstalking, Hacking and Extortion

Michael C. Ford thought he was sophisticated in how he terrorized young women on the internet. His methods however, resulted in federal charges of interstate threats, fraud in connection with computers, wire fraud, and cyberstalking.

Some of us are familiar with the threats, being on the receiving end. They are threats that unless you do what the perpetrator wants, that they will post your personal information on the internet. Many times, that is combined with claiming to have some type of “public document” and misrepresenting it so they can demean and mock.

Michael C. Ford

Michael C. Ford

Michael C. Ford however, did not use “public documents” as a threat against his victims. He hacked into protected accounts on the internet and obtained sexual photos of his victims. The 17 page warrant is an interesting read.

Ford used various Google email addresses to make contact with a woman, reported to be 18-years old, letting her know that he had obtained some sexually compromising photos of her, and that he also knew her real name and address. He demanded that she take videos of other girls undressing and/or nude, and send them to him or he would release the photos to her family and friends, and post them on the internet along with her personal information.

Read the rest of this entry

The Tarnished History and Image of Police Departments

Long before there was a police force in America, there were sheriffs. The office of sheriff has its roots in 9th century England. According to the National Law Enforcement Museum, the early policing system was modeled after the English structure, which incorporated the watch, constables, and sheriffs (derived from the British term, “shire-reeves”) in a community-based police organization. The British system developed from “kin policing” dating back to about 900 A.D., in which law enforcement power was in the people’s hands, and they were responsible for their families or “kin.”) Early law enforcement was reactionary, rather than pre-emptive—the watch usually responded to criminal behavior only when requested by victims or witnesses.

Then called a “reeve,” what is now known as the Sheriff in America, was an individual originally selected by the serfs to be their informal social and governmental leader.   The reeve soon became the Kings appointed representative to protect the King’s interest and act as mediator with people.

In the United States, approximately 98 percent of sheriffs are elected. Good, bad or mediocre, what sets the office of sheriff apart from the police force, is that the sheriff’s office is accountable to the citizens through the election process. Read the rest of this entry

Friday Fill-Up -Standing Strong Against Cyber-Extortionists

Black butterflyNothing would give me more pleasure than to share some personal things with you about myself. I’m restrained from doing so because of people who take anything I say, twist it, and then go on doxxing expeditions.   Be aware – any attempts of defamation that can only point to “evidence” written by the person or one of their minions.  Their evidence cannot be trusted.

Ask them how they know the name they purport is the person’s real name, and they won’t be able to point to any “evidence” other than what another one of them has written.

Well, I’m going into this because since one cyber-extortionist was unsuccessful in his copyright infringement claims, and unsuccessful in getting a court ordered restraining order against a person he harassed, numerous people are being attacked for associating together. Read the rest of this entry

Cyber-Extortion – Jared James Abrahams Arrested

Some people who commit cyber-crime, because they are not  immediately arrested, do not believe that law enforcement takes it seriously and brushes away victims.  Others think that they can stay hidden because they disguise their online identity.  Jared Abrahams now knows better.  He faces up to 11 years in prison.

Jared-James-Abrahams

Jared Abrahams

On September 26, 2013, Bill L. Lewis, Assistant Director of the FBI’s Los Angeles Field Office, and André Birotte, Jr., United States Attorney for the Central District of California issued a press release announcing the arrest of 19-year old Jared James Abrahams of Temecula, CA.  On September 17, 2013, Abrahams was charged in a federal criminal complaint filed under seal in the United States District Court in Orange County.  According to the complaint, investigation began around March 2013. Read the rest of this entry

A Message To Re-Bloggers, Friends, and Supporters

cycle of bullyingYesterday, someone brought to my attention that they visited a blog that was linked on  Blackbutterfly7, and discovered a disparaging comment about me personally.  A blogger who re-blogged Shellie Zimmerman’s letter to Judge Lester has not yet approved my comment in response to Miss Filth, so I have copied it below.

(9/4/2013 UPDATE.  I checked on http://teesepowell.wordpress.com, and she approved my comment, and also removed Miss Filth’s comment.    Thank you, Tess. At your convenience, please check out Tess’ blog.)

Those who know about the cyber-harasser, doxer, impersonator, identity thief, know that I refer to her as Miss Filth.  Of the year that Miss Filth has stalked, harassed, and threatened me, I’ve only posted one comment in response to her on this blog.   That time, I thought it was necessary to expose that she sends comments to blogs using the names or handles of  George Zimmerman supporters — people that she agrees with on Zimmerman support and White Supremacists blogs.    If she doesn’t use their handles or names as the sender, she uses them in the fake email addresses.  (Her IP address is always the same.) Read the rest of this entry

%d bloggers like this: