On November 22, 2015, I made a blog administrator’s decision. Out of spite, the person who asked for my help and communicated with me for the greater part of 11 months, went into revenge mode. He has me over a barrel. Because the person is involved in pending litigation and I referred him to the attorney representing him, and at the request of that attorney, I am restrained from giving details publicly about what took place. That however, does not stop his client from complaining that everything I blog is about his case. Indeed, I can barely post “Good morning” on Twitter or this blog without him calling his attorney complaining that I am interfering in his “cases,” or talking about “his “business” or “bad-mouthing” him.
On the other hand, while I am restrained from sharing certain information, he has no restraints and has gone public with his lies, harassment and the carrying out of his threats. Therefore, I am compelled to share some knowledge to settle any concerns or fears based on his most recent misrepresentation. Additionally, I have the right to defend the integrity of my blogs, my reputation, and those who support me.
I didn’t want to do this, but knowledge is power. Additionally, seeing that he is exploiting a person to use intimidation, saying that they are going to have my Twitter account suspended, I need to make a public record.
The subject person introduced himself to me around May 2014, based on a referral by another blogger who was also harassed, and in whom we communicated about same. Around December 2014 he reached out to me again. In January 2015, he informed me that he had petitioned the court to have David Piercy held in contempt for violating a restraining order. He reached out to me for help in obtaining legal counsel.
Because he was overcome with the trauma of the harassment, I opened the door for him to contact me whenever he needed to vent. During the course of our 11 month communications, he often told me about programs or script that I could put on the blog. I explained to him the difference between a word press dot com blog, and a word press dot org blog.
Word Press dot com provides free blogs. They are hosted on Word Press servers. Blog administrators do not have access to the servers. We cannot enter script nor programs or any such things that have to be placed on servers in order to operate. The free blogs are a “package” deal. We get what Word Press provides for us so we can write posts and publish them without knowing computer language and without worrying where to upload plug-in’s and what folders to put things in on the server side.
Word Press dot org is for those who want to host their own blog. Word Press provides the blogging software, but the person has to find their own hosting company and essentially, be a web master. Word Press explains the differences, including what plug-in’s they provide for the dot com blogs and what can be done by hosting your own blog on a private server.
During the course of our 11 month communications when he would suggest what I add to the blog what can only be added by accessing the server, we went around the same mountain about my blog being a dot com blog hosted by Word Press. No matter my response, he always followed it with “Right, but ….” or “I understand, but …. “ One time, when he brought up for maybe the tenth time that he found a program that gathers personal information of visitors that I “needed” for the blog, we started going around the same mountain again when he shouted at me, “WAIT. JUST LISTEN.” I hung up the phone.
About a week later after I forgave him, he brought up the subject again. I asked why he thought I needed such a program. His reason was that “we” could help lots of people who are harassed because if the program captured names and physical addresses, we could give it to those harassed to give to law enforcement or use to serve with summons if they chose to file a civil suit. I argued that logically, if there are such programs, then law enforcement would have it rather than having to subpoena account holder information from internet service providers.
After about the fifth, “Right, but ….” I said that I don’t have time to learn and use such a program. There are days when Blackbutterfly7 receives over 1,000 visits. He offered to help me by going over the data daily. If it is true that there are programs that can be placed on websites that capture the “personal information” of visitors, then that information of MY BLOG VISITORS IS NONE OF HIS BUSINESS. His response? He alleged that I don’t care about victims but only my “damn blog.” Well, my “damn blog” has visitors and I’m damn sure that their personal information is none of his damn business.
Let him start his own business. He can open his own website for the purpose of opening websites for those harassed on the internet and bait harassers to those sites where he can use the installed programs to gather the “personal information” of harassers. He can name it “Troll Trapper Vortex.”
Don’t you think if there are such programs that there would also be a “Troll Trapper Vortex” businesses already?
THREATS CARRIED INTO ACTION
During the course of our 11 month communications, I shared with the person how the internet extortionists operate; i.e., their methods and accusations. Among them, is how they target those who associate with me and intimidate and threaten them to sever our fellowship. I reported on one of those situations on this blog.
That person who I thought that I was helping to acquire discipline and confidence through knowledge learned — he learned the methods of the internet extortionists, not so he could help other victims to identify and be able to explain the methods to authorities, but so he can use them against me.
In the following screenshot, please note the first handle that the tweet is intended for.
@TKO_RD_1 is the subject person who, for over a period of about 11 months, called me on a daily basis, sometimes more than a handful of times per day. He is the individual who reached out to me for help, and in whom I tried to help. He is also the individual who suggested to me that I put certain plug-ins, script or programs on the blog, and in whom I had to explain the difference between Word Press dot com, and Word Press dot org numerous times. He is also the client of my attorney friend who I referred him to for representation in a contempt hearing.
Please also note the content states “TEAMKJ23.” That is important. When I can be more open, I’ll share about it in regards to TKO.
As a side-note: The other day, the person using the Hood’s handle (in one of its variations) called me a “Zebra.” If you’re unfamiliar with that, you can look it up in the racial slur database. Funny thing is, I never had any communications with “Hood” for him to know anything about me; but TKO and I did have such conversations.
Now, according to S. Mitchell-Fambro, I have spots.
At one point, TKO told me about a subscribed service that will trace any IP address to its “originating source.” I thought that was strange, so I went to the site and entered my own IP address. By doing that, I learned that the “originating source” is the internet service provider’s office, or where their servers are located. The true “originating source” is where the server is located — not the home that receives the service. I needed that experience so I could tell him about being a responsible consumer and not falling for scams.
TKO not only wanted me to purchase the software, but he also wanted me to transfer my blog to a private server so I could use it and any other script or program that he fancies. He even offered to hook me up with one of his computer tech friends for $4K a month.
Some blogs use Google stats or a stat counter program. Some of you might have visited web pages and seen the following. Here is one from the blog hosted by Blogger.
As you can probably tell, if you access a blog using a proxy IP address, you can come from places such as Quito, Pichincha.
Here is one from a Word Press blog.
Some of those programs provide options, so you can choose for it to show the visitor’s name if it’s the government, for example, “A visitor from the DOJ in DC.” That’s because the DOJ has its own server. These stat programs do not gather “personal information.”
WHO IS THIS STRANGER?
The first I became aware of the handle @sofambro90, was in October 2015 when that handle was included in a subpoena served on Twitter for her account information. Soframbro90 did not reach out to me about that. We never communicated with each other in any way, until about December 18, 2015.
On December 18, 2015, @sofambro90 sent me a follow request on Twitter. My Twitter account was then protected so people wanting to follow had to request approval to follow. I approved her. She then blocked me, then sent a direct message saying that she made a mistake. She sent another follow request that I approved. Immediately, she attacked me and NavyDad0007, (ILoveMyWife0007) accusing us of lying. The following day, she attacked @miamidecor for tweeting support to myself and NavyDad0007.
It turned out that because I did not credit anyone by name for being responsible for the ACLU’s involvement in the case involving the subpoena to Twitter, that she thinks I wrote a “false blog”. The ACLU’s amici brief is dated November 18, 2015. Based on a press release, on November 20, 2015, I posted a blog about the ACLU filing an amici brief. The first time I ever communicated with @sofambro was on December 18, 2015.
I tweeted that I named no one in that post. Since I did not name anyone, then it is unfair to accuse me of lying about who is responsible. I know of certain verified communications, but it’s not my place to verify what she says that she did after-the-fact. A letter? An email? She did not offer to send me anything to verify her story.
Since it seemed to be so important to her, I offered her an alternative –I told her that she is welcomed to come to the blog and post a comment there taking the credit she wants. I said that I would change the option so she wouldn’t need a Word Press account to comment. She blocked me. I blocked her. She hasn’t submitted a comment. It’s been two months now since she started accusing me of lying about who is responsible for contacting the ACLU. She still hasn’t posted that comment. She could have posted it two months ago. She could have put her luggage down.
I did not name anyone in the post about the ACLU’s involvement because what they did was for the good of everyone whose account information was subpoenaed. They considered it work for the team. I mean, come on! Even she says “TEAMKJ23.” I don’t see an “I” in “team.” On Twitter, she has taken credit for being the party responsible for the ACLU’s involvement, and no one is taking that credit from her.
WHY ATTACK THIS BLOG?
During the week of November 22, 2015, I received numerous emails, and comments to this blog from TKO, first demanding that I delete this blog. When that didn’t work, he asked that I delete posts on it that referenced David Piercy. When that didn’t work, he developed a story that this blog is ruining his pending case against Piercy because —- because — (wait for it) —- because it provokes Piercy to harass him and his wife.
Piercy is vile but let’s not blame him for things he has not done since November 22, 2015. The harassment he did previously was not motivated by anything on this blog. Additionally, not once have I witnessed Piercy harassing Santiago’s wife. TKO filed a petition with the court in January 2015 alleging that Piercy violated a restraining order. This blog was launched on July 4, 2015. Whatever motivated Piercy to harass TKO from July 2014 when the restraining order was entered, through July 4, 2015, was certainly NOT this blog. Additionally, anything that I’ve written since July 2015 has no relevance to the petition filed by Santiago 7 months earlier.
TKO made no demands, nor requests that I not write about David Piercy, nor did he make allegations that what I write provokes Piercy, until after November 22, 2015.
Indeed, if Piercy is still harassing TKO, that should help his case to have Piercy held in contempt rather than ruin his case..
Aiming at this blog, the subject person is using others to target those who tweet the links to this blog. The following is one example.
For those unfamiliar with Twitter, please allow me to explain. The above is a true and correct screenshot of a “retweet” with comment. The comment section is first, and contains two handles; @Anontrip and @AngelDevil1166. AngelDevil1166 follows me on Twitter. The day before the above was tweeted, she tweeted that she did not want to be involved in what they are doing. I understand because I’ve also been included in tweets where I wanted no part of what was happening. @Anontrip does not follow me. He might not even know who I am.
On Twitter, you have no control over people putting your handle in their tweets. Even if you mute or block them, they can still put your handle in their tweets, (as you can see in the screenshot prior to the one above).
The bottom portion of the above tweet was tweeted by the person “shyloh.” I know her as a dear, loving soul who won’t hurt a fly. She has participated on Blackbutterfly7 for years, knowing me long before I knew of TKO’s existence. So, shyloh tweeted a link to this blog. Shyloh included Charlie’s tweeter handle, “@CGrapski” in her tweet along with other handles. I understand that S. Mitchell-Fambro, (@sofambro90) tweeted to each of the individuals that shyloh did, only @sofambro did not tweet to promote the post but rather, to try to make people concerned that if they visited here, that a “censor” would determine their “personal information.”
The content of @sofambro90’s “comment” is directly related to shyloh’s tweet. Need we wonder who brought to @sofambro90’s attention that there are “censors” for websites that “determine personal information”? Even more, need we wonder who brought to @sofambro90’s attention that there are “censors” for websites that “determine personal information” although he has good reason to know that if such exists, that it CANNOT be installed on free Word Press blogs?
Need we wonder who gave @sofambro90 instructions on how to intimidate those who follow and/or support me?
To dispel some rumors and outright lies, on November 13, 2014, I posted an article on Blackbutterfly7 on behalf of TKO. That was more than a year ago. It demonstrates my sincerity in helping someone who reached out to me for help.
On another matter, something very strange has happened. On Saturday, I discovered that my gravatar now appears with scrodriguez’s comments. When seeing my gravatar, please make sure you also read the handle/name next to it so my comments are not mistaken as those posted by scrodriguez. I do not know why this has happened, and have contacted Word Press/Gravatar.
Additionally, scrodriguez/TKO changed his Word Press account, changing his handle from “scrodriguez” to “Xena” thereby changing the by-line on the posts he wrote to make them appear as if I wrote them. I contacted Word Press and they gave me instructions on correcting that.
More update; March 6, 2016. The situation with TKO using my Gravatar is resolved. If it should happen again in the future, I’ll inform the Word Press community.