- Follow Stop Cyber Abuse on WordPress.com
Santiago Rodriguez shows the intent for his course of conduct.
- 14 Manipulative Tactics January 26, 2019
- Bullies and Bystanders August 17, 2018
- Newspaper shooting suspect nursed years-long vendetta after cyberstalking, harassment case — fox8.com July 3, 2018
- Manhattan Lawyer David Waldman Charged With Cyberstalking June 14, 2018
- Two Men Federally Indicted Along With Swatter Tyler Barris May 29, 2018
- Blog Changes May 19, 2018
- Juan Thompson Sentenced To 5 Years In Federal Prison For Cyberstalking And Making Hoax Bomb Threats March 23, 2018
- Former Irondequoit, NY Cop Sentenced To Five Years For Cyberstalking February 12, 2018
- Accused Swatter Tyler Barriss Charged With Involuntary Manslaughter January 27, 2018
- Kansas Seeks Extradition of Alleged Swatter Tyler Barriss January 2, 2018
- I’ll Reblog Your Page! December 30, 2017
- Los Angeles Man Arrested For Making Swatting Call December 30, 2017
- Man Killed In Swatting Prank December 29, 2017
- VPN Use Did Not Hide Cyber Abuser Who Is Now Charged With Federal Crime November 5, 2017
- U.S. Court of Appeals For 11th Circuit Upholds 10-Year Sentence For Cyberstalker September 2, 2017
- Proposed Bill In The U.S. Congress Will Make Doxing A Federal Crime August 29, 2017
- Florida Woman Sentenced To 22 Months In Prison For Cyberstalking June 1, 2017
- Defamation on Social Media and Spreading Rumors April 21, 2017
- Alabama Man Charged With Aggravated Stalking and Cyber Stalking April 12, 2017
- After Stealing My Word Press Identity, Former Writer Threatens To Have Blog “Shutdown” April 2, 2017
Search This Blog
© Flightattendantfailures 2015-2019. Unauthorized use and/or duplication of this material without express and written permission from this blog’s administrator is strictly prohibited. The reblog function that Word Press provides is considered consent.
December 30, 2017 Update to post Man Killed In Swatting Prank.
Along with the arrest, more information has been released about the false report known as “swatting” that resulted in an un-involved, innocent man being killed by the police.
Tyler R. Barriss, 25-years old, has been arrested on suspicion of making the swatting call that ended with Wichita police killing Andrew Finch. The person targeted for swatting gave the perpetrator a fake address that turned out to be the home of Andrew’s mother where he was visiting. Police shot and killed Andrew, who was unarmed.
Andrew Finch is the father of two.
It has now been reported that Barriss told 911 that he was inside the house, had shot his father in the head, was armed, and holding hostages. He also told dispatch that he had poured gasoline all over the house and was going to set it on fire. Therefore, the police engaged the incident thinking that they were confronting an armed man who had just murdered his father. Continue reading
I first heard of swatting in 2011 due to a lawsuit filed in Illinois. It was a case of cyber-harassment gone wild. In 2014, the victim was awarded $50,000 after a jury trial.
Then came the case of Brandon Wilson of Las Vegas, Nevada. Apparently not aware of a court ruling that Illinois has long arm jurisdiction that applies to electronic harassment, Wilson progressed his cyber harassment course of conduct to include swatting. He was extradited to Illinois to face charges.
To my surprise, average personnel working for law enforcement, from dispatchers to those taking criminal complaints, have not heard of swatting. Not knowing about it means they have no training on asking appropriate questions that should raise flags when receiving anonymous calls alleging to know what has happened in the residence of another.
Swatting is a prank where someone makes a call to a police department with a false story of an ongoing crime involving killing or hostages and guns. Police arrive and at times, SWAT is dispatched.
A person is now dead because of swatting. Continue reading
Back in 2013 when I was bombarded with vile, harassing comments sent to my other blog through proxy IP addresses, I learned that those sites are hosted by companies that provide server computers.
I also learned that although some promise that those using the proxy IP address service will not be traceable, that is not true. Users enter the site through an IP address that is generally the one provided by their internet service provider. Law enforcement has authority to obtain the logs that provide online fingerprints.
This case is similar where a man assumed that his use of VPN’s would hide him online as he went about violating laws.
Ryan Lin of Massachusetts used VPN services, an encrypted email service and Tor to conceal his identity. He hacked into his targeted victim’s email account and sent emails to others, which is called “spoofing”. Through spoofing email, he also made bomb threats to local schools.
Documents by authorities use the name “Smith” in reference to the target victim to keep her identity anonymous. For over a year, local police investigated Smith’s crimes. Then they called in the FBI for assistance. The trail of evidence led to Ryan Lin.
Ryan Lin rented a room in a house with Smith and her roommates. Subsequently, he gained access to Smith’s personal devices. Smith did not have a lock on her door and did not password protect her computer. According to Smith, Lin was such a bad roommate that she moved out two months after Lin moved in.
The FBI got a hold of Lin’s old work computer. Google Chrome artifacts detailed that it was Lin who sent bomb threats against local schools and that Lin was using VPN’s on his work computer.
According to an FBI criminal complaint and accompanying affidavit published by the U.S. Department of Justice, 24 year-old Ryan Lin is accused of harassing and cyber-stalking Smith. He carried out his dirty work between April 2016 and his arrest on October 5, 2017. Continue reading
He lived in Tallahassee, Florida, attended Syracuse University and has a master’s degree in business administration from Florida State University. He also took pleasure in using the internet to ruin the lives of others.
In March 2016, Michael Daniel Rubens was 31-years old when he was sentenced to 10 years in federal prison, a $15,000 fine, and $1,550 in restitution. What was his crime? Cyberstalking, unauthorized access to protected computer and aggravated identity theft.
Rubens publicly humiliated dozens of young women by hacking into their online accounts and stealing photographs and other personal information. Rubens’ went as far as creating pornographic images, posting them on social media websites.
Rubens used proxy IP addresses to do most of his dirty work. The investigation included the assistance of the U.S. Immigration and Customs Enforcement, Homeland Security Investigations, the Florida State University Police Department, and the Leon County Sheriff’s Office. Continue reading
Cross-posted from We Hold These Truths To Be Self-Evident
In case you’re unfamiliar with doxing, it is term that describes using the internet to search for and obtain the personal information of others, and to post it publicly on the internet with the intent to threaten, intimidate, harass or incite the commission of a crime of violence against a person or a member of the immediate family of that person.
Some states consider doxing to fall under stalking laws and include an intent to cause the person doxed extreme emotional distress. In fact, in some prosecuted cases of cyberstalking, the victim’s personal information can be the personal knowledge of the perpetrator who posts it publicly on the internet for a malicious purpose.
The personal information that is publicly posted does not have to be accurate. In fact, it can be for someone totally different, which can then lead to civil lawsuits for defamation and identity theft. Doxing has become a serious problem in the United States.
There is a current federal statute for protecting individuals performing certain official duties from having their personal information and that of their families made publicly available. The statute is 18 U.S.C. § 119. It makes it a federal crime to make publicly available the Social Security number, home address, home phone number, mobile phone number, personal email, or home fax number of, and identifiable to, restricted personnel.
The federal statute defines restricted personnel as a grand or petit juror, witness, officer in or of any court of the United States, or an officer who may be, or was, serving at any examination or other proceeding before any United States magistrate judge or other committing magistrate; an informant or witness in a Federal criminal investigation or prosecution; or a State or local officer or employee whose restricted personal information is made publicly available because of the participation in, or assistance provided to, a Federal criminal investigation by that officer or employee. Family members are also protected under the statute.
I’ve often wondered why our federal government does not seem to believe that all citizens want the same protection and the right to be let alone. Maybe that will change soon. Continue reading
On January 3, 2017, the FBI reported how they resolved a case of cyberstalking, resulting in Kassandra Cruz of Miami, Florida being sentenced to 22 months in prison.
According to the FBI’s website, the messages sent by Cruz were relentless. They came by texts, phone calls, and on social media posts to a woman in the state of California.
Fifteen years ago when the victim was an 18-year old high school student, she made a bad decision to do pornography films. It was something she kept hidden from her family and employers.
Kassandra Cruz found the pornography website and tracked down the actress through her social media accounts. Cruz even impersonated being a man, a Marine, to send the victim friend requests. Continue reading
Countries sit at the negotiation table to discuss how they can bring peace between themselves.
Arbitrators sit at the arbitration table to discuss the merits of cases so parties can avoid going to trial.
Mediators sit at the mediation table to discuss bringing resolve to matters of disagreement.
Lawyers from opposing sides sit down and discuss how to settle cases to avoid spending years in litigation.
All of these situations are enemies coming together to negotiate resolution of problems between them.
But, I have been accused of being a traitor for trying to negotiate a peace treaty to stop harassment.
In the video at the end of this post, attorney David Allen explains a case involving defamation on social media. This important subject gives me opportunity to address a recent major misunderstanding.
If you have followed the posts on this blog, then you might be familiar with some of the names and people and their actions. If not, here is a summary;
In October 2015, a person reached out to me because he and others became aware that a subpoena was issued to Twitter in a case in the State of Georgia. The parties issuing that subpoena are known as “The Bells.” They filed a cross-complaint alleging that the mother of deceased Kendrick Johnson used “authorized agents” on social media who use the words “murdered,” and “murderers” thereby defaming the Bells.
The subpoena included the handles of 23 individuals, and requested their account information, including their IP addresses. Subsequently, the ACLU filed for leave to file an Amici brief in that case and the Bells filed a document that they were not going to compel Twitter to comply with the subpoena.
There is a thread here. Please bear with me. Continue reading
People have the right to privacy, and they have the right to not have their peace disturbed. When their privacy and/or peace are violated, it can lead to criminal charges as we see in this case.
NPR reports that in January 2017, the Escambia County Sheriff’s Office arrested 31-year old Sean Michael Vest on 15 counts of aggravated stalking and cyber-stalking. The alleged harassment occurred between December 16, 2016 and the time that Vest was arrested in January. The Sheriff then began looking for more alleged victims in a complex cyber-stalking case.
According to Pensacola News Journal, in the six weeks following his arrest, 32 alleged victims have come forth, and the number of counts against Vest increased to 26.
Vest represented himself as ‘”Mr. Pervert.” He used a series of harassing text messages and phone calls to several women by pulling their public photos off social media. He did that through all hours of the day and night. Deputy Amber Bernard is leading the investigation and stated about Vest’s actions;
“He then used these photos on some sexual dating websites, along with some graphic images and graphic content.”
Vest is also accused of collecting photographs of victims, including children, from social media sites and selling them to sexual websites. Continue reading
Santiago Came To Me Asking For Help
In May 2014, a man named David Piercy filed for a restraining order against Santiago Rodriguez. The court granted Piercy a temporary restraining order against Santiago. There was a hearing scheduled for a ruling on the permanent restraining order. As I understand it, there were exchanges on Twitter where Santiago became aware that bloggers and others had allegedly been harassed by Piercy. Someone pointed Santiago in my direction and he reached out to me.
Subsequently, Santiago asked that I put his name on the border of my blog, We Hold These Truths To Be Self-Evident, as a writer. This is how it happened …