UPDATE

AS OF JANUARY 1, 2013 - POSTING ON THIS BLOG WILL NO LONGER BE 'DAILY'. SWITCHING TO 'OCCASIONAL' POSTING.

Sunday, February 27, 2011

Cyber-Harassment Trial Found No Proof of 'Emotional Distress'

Your thoughts, readers? -- EOPC

by Shane Anthony

Jurors who acquitted a St. Peters woman in a cyber-harassment case said prosecutors failed to prove a 17-year-old girl suffered emotional distress when the woman posted her information in a sexually suggestive Craigslist ad.

On Thursday, the jury of seven women and five men found Elizabeth Thrasher, 41, not guilty of felony harassment for making the post after she and the teenager exchanged a series of insults on MySpace. Attorneys said this was the first case to go to trial since the state Legislature passed a cyber-harassment law in 2008 in the wake of Dardenne Prairie teenager Megan Meier's suicide.

Jury foreman John Seifert said Friday that all the jurors believed the state had proven all but one element of its case against Thrasher — that the girl had suffered emotional distress.

"We really felt for her," Seifert said. "She made this claim, but we felt like there wasn't any evidence that supported the claim."

The state was required to prove seven elements of the crime. Juror Christine Cundiff said jurors agreed unanimously that prosecutors proved six. But they didn't believe the girl's testimony was proof enough that she had suffered emotional distress, she said.

"We felt the charge of a felony was extremely serious to send someone to prison when we were not 100 percent guilty on all seven (elements)," Cundiff said.

The spat between Thrasher and the girl erupted on May 1, 2009. Thrasher had a conflict with the girl's mother, who was dating Thrasher's ex-husband.

After the two exchanged insults over MySpace, Thrasher used information from the girl's MySpace account to create a sexually suggestive Craigslist ad under the "Casual Encounters" section. The posting featured the girl's photos, cell phone number, e-mail address and the restaurant where she worked.

The girl testified that after the Craigslist post, she started receiving text messages, pictures and phone calls from men. One came to the restaurant looking for her and was asked to leave by the manager, she said.

The girl said she eventually quit her job. She testified she was afraid of being raped and killed.

Prosecutors also called two police investigators to testify, but jurors said they wanted to hear from someone else who could corroborate the girl's testimony about distress.

"Anybody that could have taken the stand and said this is what I've noticed about the young lady," Seifert said.

St. Charles County Prosecutor Jack Banas said he had not thought other witnesses were needed. (note: Banas was the Prosecutor in the Megan Meier case.)

"We didn't feel it was necessary to go on any further to prove what comes out of her mouth based on the assumption that most people would be distressed to have their personal information put on Craigslist," he said.

Thrasher's attorney, Mike Kielty, said the law is flawed.

"It criminalizes behavior that, but for the medium, wouldn't be criminal."

Saturday, February 26, 2011

Find the Facts Out About Them


(Florida, USA) Karen Berry got into private investigation the hard way: Somebody was stalking her, and she decided to take matters into her own capable hands. The 25-year Sunrise resident was working as property manager for a condo in Davie in the early '90s, living alone while her military husband was overseas serving in Desert Storm. One of the condo residents took a dislike to her when the association started pursuing him to pay late maintenance fees.

"I was the closest person handy," she says, "because my condo was near his. He threatened to kill me, he flattened my tires, he had my car stolen, he even hired somebody to shoot a gun near me. He was very open about it. He would leave voice mails saying he was gonna get me."

Berry decided she wanted to get him first. "I worked for a company called Record Search, so I started looking into him. I found out he had a violent past and a prior record for marijuana possession. I found 15 police reports on the guy."

Eventually, Berry's work helped put her stalker away for three years.

Now, almost two decades later, after doing investigative work for a series of companies, she has founded her own investigation company, Berry WorldWide, which takes a decidedly softer bent: Berry helps find old flames. The ones that got away. The guy you dated a few times before you shipped off to college and just couldn't forget. The grade-school sweetheart who was really meant for you.

Isn't this just a kinder, gentler form of stalking? "I always call the person being searched for once I find them," Berry says. "I tell them who I am and what I'm doing. I ask their permission to divulge their phone number or location." So far, not a single person has refused to be found. And several of the ten couples she has reunited so far are pursuing serious relationships.

As for us, we tracked down Berry through Facebook, which itself raised another question. With social media networks gobbling up the internet, aren't sites like Classmates, Facebook, MySpace, and others cutting into her profits?

Not really. "Sometimes people just don't have time to do their own searches," Berry says, "or they don't really know how to go about it. Or sometimes women change their names if they've gotten married."

Berry charges an extremely reasonable $40 for a basic search. "Most people can be found very easily; it's not like I have to do any intensive investigative research. I don't feel like I should gouge anybody because with the databases I have available, it doesn't cost me a whole lot."

Berry, who suffers from Lymphedema, moved to Pittsburgh two weeks ago to be closer to a friend who's a trauma nurse. And she's still married to the guy who came home from Desert Storm. "He takes good care of me, and I love this business," she says. "Plus, I get to work in my pajamas."

Friday, February 25, 2011

Connecticut, USA Says Online Dating is Dangerous


Anyone looking for love online knows that the person on the other end of an online connection might not be who he or she says they are.

In Connecticut, this is becoming a political issue.

While most of the 20 million people who use online dating services are looking for a relationship, there are other cases where women have been sexual assaulted or scammed.

It is to prevent this that State Rep. Mae Flexer, a Democrat representing Killingly, Plainfield and Sterling [counties], introduced her bill.

“Sexual predators now have a new tool to find victims — internet dating websites,” Flexer told the General Law Committee on Tuesday. “We have a responsibility as lawmakers to amend our laws to reflect technological changes and protect our citizens.”

Flexer’s bill that would require online dating sites that charge fees to provide safety tips and advice to make dating, online and off, safer.

“Currently, one in five Connecticut residents has experienced sexual assault. My bill is a sensible solution to inform potential customers of the risks involved with using these sites and help protect women,” Flexer said.

She is asking for advice including:
  • Don't put your last name, e-mail address, home address, phone number, place of work, photo or any other identifying information in your Internet [Facebook] profile or initial e-mail messages.
  • If someone pressures you for personal or financial information or attempts in any way to trick you into revealing it, end the communication.
  • When you plan to meet face-to-face, always tell someone in your family or a friend where you are going and when you will return.
  • Never agree to be picked up at your home. Always provide your own transportation to and from your date and meet in a public place with several people around.

Flexer’s bill, if approved, Connecticut would become the third state to regulate internet dating sites, after New York and New Jersey.

The General Law Committee will vote on the bill in the coming weeks.

Thursday, February 24, 2011

EXPOSING THEM - CREATIVELY


"I remember thinking - the internet got me into this mess with this [cyberpath] and now the internet is going to get me out."

- openly available information is out there for sure!

We found websites started by people wishing to out THEIR predator, cheater or cyberpath. We commend every one of these people for being brave enough to put their stories out there to make sure these predators don't do it to someone else.


Some of these people listed have been covered by our site, some have not. Nonetheless, they have our support! - Fighter

Creativity can be a blessing when healing from a predator, user and/or abuser:
click below to go to some of the sites made in their "honor":

DIANA MEDINA

WILLIAM BARBER

BEATRICE M. ACEVEDO


SAMMY BENOIT / JEFF DUNETZ/ YIDWITHLID

MARK GRANIERI

JOSEPH A. CAFASSO

JASON CAPOZELLO

GARETH RODGER


There's more on the right of this site under VICTIMS FIGHT BACK!

Here's just a couple recommended sites that expose cyberpaths & abusers in order to educate the public about the M.O. and patterns of these predators (see full list at right):


FILTHY LIAR

LIAR LIAR LIST


(see our right margin for more sites to expose them. Maybe they will get help for their behavior and not harm others.

EXAMPLES OF PREDATORS WE'VE DONE (or are about to do)- EXPOSED ON OTHER SITES:

Dan Jacoby
one
two

Jeff Dunetz/ Gridney/ Yidwithlid
one
two

Nathan Ernest Burl Thomas, Jr.
one
two


Remember: You are only as sick as your secrets. Telling can put YOU on the road to healing.)

Wednesday, February 23, 2011

Breakup Notifier



Waiting for that special someone to break up so you can move in?

Now you can get an email telling you when it's time start wooing.

A new site called Breakup Notifier lets you log in using your Facebook account, choose who you're interested in and then sends you an email when their relationship status changes.

"You like someone. They're in a relationship. Be the first to know when they're out of it," the site says.

In other words, forget about constantly refreshing a Facebook profile with the hope that the relationship status is about to change.

The idea came from the founder's efforts to find the perfect guy for his fiancee's sister. Dan Loewenherz, his fiancee and his mother found the right guy on Facebook only to learn that he was in a relationship.

So Loewenherz spent four hours coming up with Breakup Notifier, TechCrunch.com reported.

Breakup Notifier crawls Facebook every 10 minutes.

The site is now free but Loewenherz may charge .99 cents for early adopters and $4.99 at some point in the future, TechCrunch reported.

Saturday, February 19, 2011

CyberStalked After Reunion on Facebook

By Rob Wolchek

A man says he's been stalked for the last year. His life has been threatened, his four-year-old daughter has been threatened; his mother, too.

He says it all started when a girl he went to school with 25 years ago friended him on Facebook.

Kevin had no idea when he clicked his mouse and friended Lisa that she had an ex-boyfriend with a criminal past.

original article here

Sounds like how our exposed predator - Jeff Dunetz aka YidwithLid - found his Target #1 (via Classmates.com) and harassed & threatened her when she told the truth about him.

Friday, February 18, 2011

Internet Fraud Dupes Men More Often Than Women

by Robert McMillan

When it comes to being taken in by Internet fraudsters, men have a knack for losing cash, according to a new report from the Internet Crime Complaint Center.

Data compiled from more than 206,000 complaints received last year by the U.S. Internet Crime Complaint Center (IC3.gov) shows that men lost US$1.67 to every $1 lost by women in online fraud.

Identifying Fraud Trends
The IC3 is the clearinghouse for online crime complaints in the U.S., and its database is used by regulators and law enforcement to get a picture of criminal trends and, in some cases, help hunt down the criminals. It is a joint effort run by the U.S. Federal Bureau of Investigation and the National White Collar Crime Center.

The organization says that buying patterns and human nature play into the findings.
"Historically men were more apt to purchase large ticket item like electronics... that could explain a lot of it," said John Kane, the IC3 research manager who wrote the report.
But with women now spending more online, the difference is also due to the fact that certain types of schemes seem to suck men in. "Men tend to fall victim... to business investment schemes and some other schemes that have a higher dollar loss," Kane said.

Investment fraud complaints, where the average loss is more than $3,500, were overwhelmingly submitted by men, Kane said. Compare that to something like auction fraud, where both men and women are frequently victimized. The average loss there is just over $480.

Men also tend to be the victims of check fraud (average loss: $3,000) and Nigerian letter fraud scams ($2,000), Kane said.
Crime Climbs

Overall, Internet crime is netting the bad guys more money than ever.

Total losses from 2007 complaints came to $239 million, up $40 million from 2006.

The 2007 data, released Thursday, shows that the total number of complaints received by the group was actually down for the second year in a row. In 2007 the IC3 Web site logged just under 207,000 complaints. In 2005 that number was over 231,000.

Kane credited the drop in complaints to increased consumer awareness, but according to Gary Warner, director of research in computer forensics with the University of Alabama at Birmingham, there may be another explanation.

Warner spends a lot of time studying the criminals and said that in recent months, researchers have noticed that credit card numbers have often been stolen and then not used. "One theory is that nobody wants to go to jail for stealing $40," he said. "So when they get access to these accounts, they're using only the ones that they can get the most value from."

Often, criminals will do a balance check and then sell only the cards with the highest balances. "I think there's a little bit of filtering on the criminal side that's at play here," he said.

There was another interesting finding in the 2007 data. The IC3 found that many countries that were commonly linked with cybercrime were the sources of the incidents it tracked, but it did not list China as a top source of perpetrators. China has been named as the source of many online attacks over the past year, but it didn't make IC3's list of top 10 countries by perpetrators.

Leading the list were the U.S., the United Kingdom and Nigeria.

SOURCE

Thursday, February 17, 2011

An Internet Affair --- AGAIN?

Photobucket - Video and Image Hosting

Dear Dr. Bob,

I have been married for 10 months now. I met my wife playing spades on the internet then we started talking on the phone for hours and hours until I left CA. and moved to TN. with her

we have a good relationship but now she spends so much time on the internet thats making me worried and i don't like it when she talks in IM's to strange guys or gets too close online with them. What should I do? the only thing we fight about is that Iasked her many times not to get close to guys on the spades games and she tells me i'm being jealous she hides her computer so i can't see what she is doing on their.

All i hear is her typing on it in games you click the mouse not type as much as she does she was under her screen name on my computer so i looked at her mail i saw something thats is bugging me very much i saw that she had been talking to this guy and was telling him that she was going to call him when i go to work what should i do?


My response:

As Yogi Berra once said, "This must seem like deja vu all over again." It certainly appears that her behavior now on the net finds some parallels with how your relationship with her started? And, of course, you have a right to be concerned - here she goes again!

You describe behavior that could be labeled "addictive." Her focal point becomes these relationships that generate excitement, intrigue and fantasies? She seemingly can't keep her fingers off the keyboard? Other parts of her life take a back seat? And, she denies that she has a problem or minimizes her activities - she's not doing anything wrong!
Photobucket - Video and Image Hosting

Please understand that usually, beneath this minimization, are some guilt and shame and a part of her that is truly looking for something else. And, you want her to find that "something else" with you… not in a series of net/phone "romances."

Confronting, pleading and arguing won't work. She will resist, retreat to her keyboard and you will feel increasingly frustrated and alone.

I suggest you start with a tactic I call, "problemize." Periodically make comments about the problem(s) you see. MAKE SURE you use words, tone of voice and body language that convey acceptance, concern and lack a tone of judgment, condemnation or a sense of superiority.

For example: "Does it ever seem to you that you are going through the same thing now as when you first met me?" "Do you ever stop to think what impact your net/phone relationships will have on our relationship?" "Do you ever think there is more to life than meeting someone on the net?" "You must get a 'high' out of these relationships?" "I wonder what you are REALLY looking for?" "I wonder what I eventually will do with this." "I wonder if you will always be looking?"

Get the idea? Leave a question in your voice. Open the door for her to talk and explore. This is your first step. If, over time, her actions persist, begin to think about what you are willing to tolerate and what actions you may need to take. But, first, "problemize" and see where that goes.

Wednesday, February 16, 2011

Voyeurs 'Held ' After Filmed Men getting Changed at Leisure Centre


Two men have been arrested over claims they secretly recorded men getting changed at a leisure centre and then put the footage on a gay website.

Up to 28 men are believed to have been filmed in various states of undress at the FX Leisure Centre in Gateshead.

Existence of the footage only came to light when one of the men said to have been taped as he changed at the gym saw pictures of himself on a gay website.

Two men have been arrested after allegations that men getting changed at a leisure centre were secretly filmed. The footage is then said to have been posted on a gay website

The businessman contacted the club's management and police after seeing footage of himsself, according to the Daily Mirror, and two men were then arrested.

A staff member at FX Leisure Centre told the newspaper the man ‘thought it was a joke at first but then realised he had been filmed in the changing room’.

‘He went straight to the club management to complain. Some of the members are not too happy about their manhood making an unwanted guest appearance on a gay website.’

A spokesperson for Northumbria Police confirmed: ‘A 30-year-old man and a 34-year-old man were arrested on suspicion of voyeurism and have been bailed.'

Officials at the Gateshead leisure centre have declined to comment on the police investigation.

Wednesday, February 09, 2011

Beware of the 'HACK TRAP'


Don't fall for that elusive e-mail with an enticing subject line asking for your personal details. It's a cyber criminal who is using a facade to lure you into a trap. Don't just delete the mail, report it to the cyber cell!

The Mumbai police are waking up to battle the rampant increase of crime in the cyber world. All of us, at some point would have been victims in the virtual world, ranging from falling prey to deadly viruses, to internet stalking or the more serious hacking and character assassination.

The Mumbai police, apart from spreading awareness by holding workshops in schools and colleges and issuing advice to parents has also launched a drive to secure over 2 lakh wi-fi connections in the city.

According to statistics, there were 76 cases of cyber crime registered in 2010 as compared to just 6 cases in 2006.

"Cyber crime and white collar crimes is the new trend and is committed by people from the middle and upper middle class," remarked Sanjeev Dayal, Mumbai police commissioner at the annual police meet held recently. "It's a kind of crime where the educated are involved," he added.

The city's first cyber police station, which was set up in 2006 and the police are making efforts to create more awareness amongst the public. We give you a brief take on the kinds of cyber crime that you need to be wary of and guidelines to avoid being a victim.

Watch out for these cyber crimes

Hacking:
Hacking means an illegal intrusion into a computer system, network or your personal email id. The motive can range from monetary gains such as stealing credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. It could also be for revenge or a desire to access forbidden information

Cyber stalking:
Cyber stalking is a repeated act of harassment or threatening behavior of the cyber criminal towards the victim through the internet. A vast majority of stalkers are dejected lovers or jilted ex-lovers, who intend to harass the victim because they failed to satisfy their secret desires. Many a time, the stalker posts phone numbers or email address of the victim as willing to solicit sexual favours. The stalker even uses filthy and obscene language to incite the person.

Virus Dissemination:
Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium. These are malicious viruses

Phishing:
This is an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs users to visit a website where they are asked to update personal information, such as passwords and credit card details, social security and bank account numbers, already available to the legitimate organisation. The website, however, is bogus and set up only to steal user information.

Tips for adults, children and teens:
1. Do not give out identifying information such as name, home address, school name or telephone number in a chat room.
2. Do not send your photograph to any one on the Net without initially checking with the parent or guardian.
3. Do not respond to messages that are obscene or threatening.
4. Never arrange a meeting without informing your parents.
5. Remember that people online may not be who they seem to be
what you need to register a complaint
If you are a victim of hacking

Bring the following information:
  • Server Logs
  • Copy of defaced web page in soft copy as well as hard copy format, if your website is defaced
  • If data is compromised on your server or computer or any other network equipment, keep a soft copy of original data and soft copy of compromised data.
  • Access control mechanism details i.e. who had what kind of the access to the compromised system
  • List of suspects - if the victim suspects anyone


If you're are a victim of e-mail abuse, vulgar e-mail;
Bring the following information-
  • Extract the extended headers of the offending e-mail
  • Bring a soft copy as well hard copy of the offending e-mail. Do not delete the offending e-mail from your inbox.
  • Save the copy of the offending e-mail on your computer's hard drive.

Where to complain
Cyber Crime Investigation cell
Annex III, 1st floor, Office of the Mumbai Commissioner of Police,
DN Road, Mumbai 400001

How to safeguard yourself
1. Ensure your passwords have both letters and numbers, and are at least eight characters long. Avoid common words. Some hackers use programs that can try every word in the dictionary.
2. Don't use your personal information, your login name or adjacent keys on the keyboard as passwords
3. Don't share your passwords online or over the phone
4. Protect yourself from viruses by installing anti-virus software and updating it regularly
5. Use different passwords for different websites.
6. Send credit card information only to secure sites.

CyberStalking - A Very Real Problem


(U.S.) Cyberstalking is defined as threatening behavior or unwanted advances directed at another using the internet and other forms of computer communications. It can involve the use of email, instant messaging, chat rooms, bulletin boards and/or other electronic communication devices to repeatedly harass or threaten another person.

The process of stalking a person in real life generally requires that the perpetrator and victim be in close physical proximity. Cyber stalkers can be across the street, the country, or the globe from their victims.
"Cyber stalking can cause the same kind of trauma to its victims as traditional forms of stalking," says Holly Quist, public health educator at the Chattanooga-Hamilton County, Tennessee Health Department. She continues, "But, behind a username, stalkers can be difficult to identify."

Most stalkers repeatedly change usernames and accounts to slow down or deter the identification process. The anonymity of the Internet makes it easier for perpetrators to carry out their attacks against their victims. The most popular targeted areas are: Live Chat or IRC (Internet Relay Chat) in which a user talks live with others, Message Boards (IM) and Email.

Cyber Stalking Prevention Tips:
  • Never be gender specific- Use a neutral gender name. Use a nickname your stalker won't know if you create a new email account.
  • Change your password often- Never share your password or personal information with anyone.
  • Use the private settings on social networking sites and let friends know not to share your information.
If you do become a victim of cyber stalking, let the offender know that contact is unwanted. But when harassment continues, contact your local police authorities and collect evidence by documenting all contact by the offender.

Visit http://www.haltabuse.org for more information on cyberstalking and how to prevent becoming a victim.

The Rape Prevention Program of the Chattanooga-Hamilton County Health Department focuses on reducing the number of rapes and educating the community on how to prevent rape from happening. Through partnerships with local domestic violence advisory boards and other local domestic violence agencies, the program is able to provide resources for contacts, educational materials, and programs. For additional information, please call (423) 209-8282.

Tuesday, February 08, 2011

Girl gets revenge on ex-boyfriend by spamming Google with his image


NOTE!!: BE CAREFUL WHAT YOU PUT ONLINE (forums, online dating, Facebook, etc) about Yourself and ANYONE else!!! - Sometimes even GOOGLE can't remove it!

It may be a tale as old as time but, in a modern version of 'hell hath no fury like a woman scorned', a teenage boy's ex-girlfriend has wreaked her revenge by spamming Google with his image.

Using a picture of hapless Jack Weppler, his former partner has pasted his image all over the search engine under such unloving messages such as 'I can't read', claiming unfashionable rocker Kenny Loggins 'is my saviour' and he's working in the gym 'on my two pack'.

He comes in for further ridicule with an assessment of his fashion sense: 'V-necks. Mom jeans' and the camp avowal 'This diva needs his stage', alongside dozens of others which are not fit to print.

The cyber-attack has left him 'stressed out and embarrassed', according to his mother, who apparently wrote to Google's webmaster help forum for advice on how to remove the images.


She wrote: 'My minor son's ex-girlfriend took a copyrighted picture of him (we own copyright) and uploaded it more than 60 times to a website.

On each image she wrote slanderous, defamatory and pornographic captions.

'The webmaster of the site states he removed the images 6 weeks ago, but Google Search still shows all the images.'

'My son is so stressed out and embarrassed and we've done everything we can to get images off of Google including URL removal tool, a letter to Google Legal with all the URLs because of copyright infringement, and nothing has worked!'

Online commentators have commiserated, but advised that no one should upset a partner with such technical knowledge of search engines.

A Google spokeswoman said: 'We crawl, index and rank millions of web pages everyday, to make content discoverable and searchable for users online.

'To get content removed, users should contact the webmaster or owner of the site where that content appears.

'They can also file a removal request with Google at: https://www.google.com/webmasters/tools/removals.'

original article here

Saturday, February 05, 2011

Con Man Uses Online Dating to Net $140K


A New York lothario posing as a multimillionaire Navy commander and confidante of George Bush scammed close to $140,000 from women he met on online dating sites, according to Westchester authorities.

After cultivating relationships with women met on sites like Match.com, Jesus Nasser asked for loans, explaining that he was suddenly in dire financial straits for a host of reasons, reports the Journal News.

He has been charged with larceny, fraud and tax felonies, and faces up to 15 years if convicted.

Friday, February 04, 2011

Cyberstalker Invited Men to Woman's Home

By MARK MORRIS

As Shawn D. Memarian remembered it Wednesday, his relationship with a woman he met online in 2006 “ended in a sour way.”

Classic understatement.

Memarian, 29, of Kansas City, pleaded guilty to a federal cyberstalking charge for relentlessly harassing the woman through threatening and intimidating e-mails and by posting bogus Web ads inviting men to her home. Many men appeared — expecting sex.

Memarian, who faces up to five years in prison, said he understood that he went way over the line.
“I know what I did was wrong,” he told a federal judge before pleading guilty. “I did cause her distress, and I’m very sorry for what I did.”

The two met in mid-June 2006, while he was working as a civilian contractor at Fort Leavenworth. By July 15, the relationship had cooled. In court records, Memarian agreed that he wanted her to return some personal items and reimburse him $76 for the cost of one of their dates. He later wanted her to pay half of his lawyer’s fee for defending him against an order of protection she had filed.

In court Wednesday, Memarian said he also was upset that someone had scratched his vehicle, and he suspected it was her.

“Oh and I don’t make threats, I get even,” he wrote on July 27.

When his victim told him she was saving his e-mails for police, Memarian reminded her of claims he had made earlier that he once had dated a woman related to a Kansas City organized-crime family.

Subsequently, the woman received threatening e-mails from an alias — “Sal Civella” — created on Memarian’s computer at the Army post.

Memarian ramped up the harassment in August and began posing as the woman, creating two online personal ads on MySpace.com and Craigslist.com. He posted her phone number and home address in the ads and described her as a “sex freak” seeking sexual encounters.

She received phone calls and visits at her home from about 30 unknown men in August and September 2006.
“She did, in fact, have men knocking on her door at all hours of the day, thinking they were about to have sex with her,” said Assistant U.S. Attorney John Cowles.

Memarian also posted personal ads on Facebook.com and created a Web site on the now defunct GeoCities.com to threaten the woman. Prosecutors said that between August 2006 and May 9, 2008, the date of his arrest, he sent more than 75 threatening e-mails to the woman, who since has moved out of state.

Since his arrest there have been no more communications,” Cowles said.

Most people who face federal charges on computer-related offenses are unaware of just how well their computers preserve evidence for investigators. Memarian would appear to be the exception.
jerk! Pictures, Images and Photos

He holds a bachelor’s degree in information systems and worked as an applications developer while at Fort Leavenworth. His resume shows skills in 11 computer languages and technologies.

Still, when the FBI and police went knocking, Army criminal investigators willingly provided a copy of the hard drive from Memarian’s government computer. That revealed evidence of the e-mail accounts he used to threaten the victim and showed how he used Facebook.com to intimidate her.

ORIGINAL

One of our exposed Predators - Jeff Dunetz/ YidwithLid - has DONE THIS SAME THING and gets away with it! (because apparently, he & his wife have 'friends' in their police department!)

Wednesday, February 02, 2011

Man speaks out about libelous internet posts



Gene Cooley says untrue internet posts amounted to "character assassination" and cost him his job and home in Blairsville. Now he's pushing to make such libelous posts illegal.

SOURCE

Tuesday, February 01, 2011

MARRIED & 'ECHEATING': A DREADFUL ALLIANCE

Photobucket - Video and Image Hosting
MARRIED & 'ECHEATING': A DREADFUL ALLIANCE

In Homer’s Odyssey (a Greek Myth) sailors were lured to their death by Sirens, mythological temptresses who sang seductive songs. Sailors called Argonauts escaped the songs, because of the great musician Orpheus. He played his lyre so beautifully, that it drowned out the songs from the Sirens. His decisive deed saved the crew from total devastation.

Today’s version of this enticement is “ECheating” - a phrase I’ve coined. “ECheating” enchants new scalawags to an internet isle. Rather than sail, today’s Argonauts surf to this island. In great numbers surfers are defying danger and destruction for a chance encounter - a rendezvous.

Here’s one such tale:
Martin leaves mornings for work before rush hour. He hates the wasted time or so he’s been coached to tell Michelle, his unwitting wife. She cleans up breakfast dishes before heading off to work an hour later. Michelle loves Martin and thinks of him throughout the day. She faithfully trusts him.

Martin is the first at work. He logs onto the internet using his personal laptop to avoid detection and violation of company policy. He follows these tips from his team of “eCheating” consultants. Martin receives many hits just a few days after setting up his “eCheating” membership profile. He only has seconds to wait. With his coffee still steaming, seventeen women want to hear from him. Several want dialogue, others want extra. Nervously rolling his wedding band around his finger Martin is tempted to read them all. He’s overcome will excitement, finally the monotony is gone! (That’s the Siren’s seductive song.)
“Your name is Cindy; you live in Seattle and need to spice up your marriage. This is your first time too? You enjoy things that might make some blush……Oh no, what am I doing?”

Martin says under his breath. With a quick click of the mouse Martin’s off the net - escaping what seemed like a crime he’s committed. His heart beat races. Martin is both scared and energized. For now signing off is the right thing. “That’s it, no more,” Martin says to himself. “Well at least they helped me cover my tracks. Michelle will never know I signed up.”

Almost coincidentally, Martin’s boss passes the cubicle with a routine welcome. “Oh not bad Paul, thanks for asking… Man that was close! I can’t believe what I’m doing. I’m married; what am I crazy; I’ve got so much to lose. What would the kids do if they found out?” Martin asks himself.

Unfortunately, Martin yields to his desires and a rendezvous devised. His next business trip provides the perfect alibi. He will meet his chosen “eCheater” at a nearby convention hotel. Michelle remains clueless.

But wait, “eCheating” serves a compelling purpose, true? Just listen to one slogan “When Monogamy becomes Monotony.” This catchphrase conjures up a sense of justification or reason. It includes not just a sex theme, but a sense of fellowship.

Does marriage end when it’s unexciting?

Is in fact adultery the answer?

These new dreadful alliances would lead you to believe it is!
Photobucket - Video and Image Hosting

I am deeply troubled these “eCheating” businesses are flourishing! Isn’t it time we put an end to them? How? What can YOU do about them?

Be proactive.

Get informed.

Search adultery keywords for banner ads.

Learn these “ECheating” sites by name.

Search computer history for visits to them.

Don't get another computer or laptop - install a Keylogger on THEIR computer.

Install spy ware on home PC – yours of course.

Keep an eye on credit cards statements.

Monitor computer usage.

Paying attention to your relationship.

Fight for your marriage and spouse – seek help.

Don’t use God or the Bible as a weapon in confrontations.

Therapy sessions don’t work if you are forcing them.

Don’t require your spouse to go to therapy – it will deliberately fail after a few sessions and be used against you.

Safeguard your homes and kids from the internet.

Make time to watch the eHighway carefully for those hazardous detours.

Communicate better.

Recognize the signs of adultery early on.
Photobucket - Video and Image Hosting

If you don’t know them, I can help you.

You are not alone… let’s break these alliances together.

To receive a free special report entitled Emergency Infidelity Survival Plan—Top Fifteen Steps to Implement Right Now! send an e-mail to mitchellreports@bellsouth.net, with “Emergency Plan” in the subject line. We will respect your privacy.