Monthly Archives: May 2011

May 16th 2011 @3:33pm ( met avemaria law student at Ave Maria church last evening Sunday May 15th 2011 )

last evening I babysat from 11:30am-4:30pm… then left the hotel by about 4:45pm… went to go and get groceries.. and was going to make it to 7pm mass at ave maria which is the last catholic mass that i  found on line …. needless to say…I  drove there and there  was no mass.. but i did meet a recent graduate from ave maria law school, Luke, who was there with his parents.   I had a ncie chat with him concerning west law and teh new version that is similar to google and is very easy to use and find the statutes.. and cases by  subject … he said was a breeze… very nice to know.. i gave hm the email to this website and blog.. and my  whatatbmary email in hopes that he or any of his fellow law school students might be able to help in my search for justice. So if Luke you get a chance to read this… thank you for the information… hope to hear great news from you… and if you or anyone  you know has any information or cases or statues.. laws that might be helpful to me in my search for justice .. please feel free to contact me… also if you hear of any articles so that i might be able to catch the people who have basically ruined my life… that i can put in this blog so that no one else can or will be hurt … please let me know. thank you for your kind attention to this note… sincerely, mary jean ziska 

ps… this is a note concerning the day of my trip out to ave maria.. If anyone knows the real schedule for the masses of ave maria.. please email me.. this is the second time i have goes out to make it to the English mass and it says it is still at 7 pm… but i arrived there approx 7:12pm… and no one was there…

I said  my saint Jude novena.. as i have done everyday since August 12th 2010…  for protection from all harm.. for blessings to a list of people and people at certain establishments that have been good and nice and haven’t harmed me or my life…. and of course  i still pray for that elusive …. winning lottery ticket… and a huge financial miracle…. 

If anyone knows when masses are going on… on the campus… for real…. please let me know.. everything was closed.. only one family and tow people came into the church besides me … one lady in jeans and a maroon scarf i though i saw her before praying at the chapel in st. john’s…  

then as i was leaving in my green saturn Vue.. with  license plates of :   ( wait maybe i shouldnt put my license plates… ) I’ll think on that one… but anyway.. there was a huge group of cars…  ( one in fact reminded me of Gloria’s maroon hummer that she or Blake Fletcher had ages ago.. like 2004-5… or even before that.. but i hadn’t seen many hummers out and about… all headed to Ave maria.. was there even a later mass?  i almost turned around to find out but i was really tired.. i had been p since 4am… on the treadmill.. wanted to go to early mass at 7am at st. john’s but  there was a huge rain storm… then the power cut out for a minuter that somehow left my phone inoperable… and luckily a nice neighbor allowed me to borrow his cell… and I tried  for almost an hour to get  in touch with the babysitting clients… and ended up  reaching them at 11 then headed right over babysit by 11:30am… Sheesh… busy bay…HA!  …  

Oh also almost forgot… i saw a bear.. a real live bear on the side of the road.. it was alive and walking.. think it was going to try to cross the street… but i dint even know there were bears in Florida… what a shocker… ..thinki may put this post in the www.mygingerbreadman.com blog as well since it is not all about law .. and catching criminals..HA!

monday May 16th 2011 @3:31pm ( how to prevent spoof calls )


Ads by Google

How to Prevent Spoofing

updated: December 05, 2010


How to Prevent Spoofingthumbnail
Secure your voicemail to protect it from hacking.

Spoofing is a common phishing
tactic. Caller ID and email spoofing are two of the most prevalent
types of spoofing. Caller ID spoofing is the act of using a spoof card
or other tool to call someone’s phone under a false name. Often,
spoofers display the names of banks and other financial institutions as
the caller identity. Email spoofing is the act of sending an email under
a false name. You can avoid being a victim of spoofing.

Difficulty:
Moderately Easy

Instructions

  1. Prevention of Caller ID Spoofing

    • 1

      Block spoofing
      calls. Services such as trapcall.com or safercall.com allow you to
      block calls that display false caller information. Such calls cannot go
      through unless the callers display their true identities.

    • 2

      Password protect your voicemail.
      Failure to password protect your voicemail allows criminals to hack
      into your voicemail and steal your personal information and contacts.
      Criminals can use this information to make spoof calls to your contacts
      and phish for sensitive information.

    • 3

      Avoid revealing sensitive
      information, such as your credit card or bank account number, via phone.
      Banks will never call you and request such information; they only
      request such information over phone when you initiate the contact. One
      of the main reasons that criminals spoof is to obtain your information.
      Hence, always be on guard, and do not assume the caller ID is always
      accurate.

    Prevention of Email Spoofing

    • 1

      Safeguard your email
      address and avoid disclosing it. Spammers are one of the biggest
      perpetrators of spoofed emails. Use a spam filter, and always use an
      image to display your email online.

    • 2

      Distinguish real emails from
      spoofed ones. Look at the part of the email after the “@” sign. Make
      sure that this part fully matches the company’s name.

    • 3

      Examine the email’s language,
      tone and appearance, and note if it is different than usual. A sudden
      difference in tone or appearance as well as excessive grammar errors are
      warning signs.

    • 4

      Do not disclose personal
      information. Many spoofing emails will request your Social Security
      number, date of birth or bank account number. Most legitimate financial
      institutions, however, will never request such information via email.

    • 5

      Report suspicious emails to the
      company being spoofed. Call the company, or find the email address for
      reporting suspicious activity on its website. Doing so encourages the
      company to alert other customers.

Ads by Google

References

  • Photo Credit:
    James Braund/Photodisc/Getty Images;

Comments

    Helpful?
    Yes
    No

      Monday may 16th 2011 @3:26pm ( how to trace a spoof card call )



      Ads by Google

      How to Trace the Location of a Spoof Card Call

      updated: November 23, 2010


      How to Trace the Location of a Spoof Card Callthumbnail
      The source of spoofed phone calls no longer has to remain a mystery.

      With advancements
      in technology, people have numerous methods available to block a number
      when placing a phone call. Spoofing a telephone number is a method
      that developed and became illegal in 2007. This method actually makes a
      number appear as a different number when it shows up on caller ID, which
      can be quite confusing for anyone receiving one of these phone calls.
      An individual can be certain that a number was a spoof call if he
      attempts to call a number back and it is not in service. In some cases,
      tracing the location of a spoof call might give some peace of mind.

      Difficulty:
      Moderately Easy

      Instructions

      things you’ll need:

      • Trap Line (ANI)
        • 1

          Obtain the spoofed number from caller ID.

        • 2

          Try calling the number back to
          verify that the number is a spoofed number. Sometimes a recording will
          be played stating that the number is not in service. This is a sure way
          to know that it is a spoofed number. In other cases, a perfect stranger
          may answer who has nothing to do with the nuisance phone call.

        • 3

          Visit a website that offers a reverse look-up tool to go through any and all possible search engines and locate the source of the number.

        • 4

          Rent a trap line, a
          technological tool that unblocks blocked phone calls or spoofed numbers.
          Multiple companies offer this service. A trap line is commonly used by
          private investigators to trace the exact location of a caller. Trap
          lines use Automatic Number Identification.

        • 5

          Report ongoing unwanted
          telephone calls to the police and local telephone company. According to
          PrivacyRights.org, a harassing phone call is classified by a call that
          uses abusive or threatening language. It can also be any phone call that
          uses heavy breathing or silence as a form of intimidation. Multiple
          phone calls, of course, also fall into this category.

      Ads by Google

      Tips & Warnings

      • Keep in mind that a
        spoofed number could be the number of someone totally innocent and
        unrelated to the unwanted telephone call. When calling a number back
        when trying to investigate a spoofed call, remember that the person on
        the other end of the line may not be the individual who placed the call.

      • Police
        cannot become involved with an unwanted telephone call unless the calls
        have been received multiple times or if abusive or threatening language
        has occurred during the phone calls.

      References

      Resources

      • Photo Credit:
        calling by phone image by Maria Brzostowska from Fotolia.com;

      Comments

        Helpful?
        Yes
        No

          May 16th 2011@3:17pm ( aritcle about stopping and detecting spoof cards)

          Use and distribution of this article is subject to our Publisher Guidelines
          whereby the original author’s information and copyright must be included.

          Can You Trace Harassing Phone Calls If They Use A Caller ID Spoof Card   by Ed Opperman

          in Family    (submitted 2011-02-21)

          Copyright (c) 2011 Opperman Investigations Inc

          Years ago
          it was normal childhood behavior to make a few prank calls while growing
          up. It was mostly good fun for the kids but could be a nuisance if you
          were on the receiving end of the crank calls. In the mid 80s the phone
          company introduced a service called Caller ID. This enabled a person to
          see the name and phone number of the person calling in. This took most
          of the fun out of the childhood prank call. But even caller ID did not
          put a stop to more serious harassing phone calls. This could be calls
          where the caller just lets it ring then hangs up, heavy breathing or
          even Violent verbal abuse over the phone to their victim. Caller ID did
          not do much o stop this because people would just dial *67 before making
          the call, Disabling or blocking the Caller ID feature.

          It was
          around this time that the phone company introduced Call Trace , *57.
          Many states offer a feature where you can dial *57 shortly after
          receiving a phone call and then at the end of the month you’ll see the
          callers information on your next months phone bill. his also put serious
          crimp into the sport of making harassing phone calls. Today call trace
          is not as widely available as it once was. Many states require a police
          report before activating it and many states the police will not
          prosecute a hang up call. They will only investigate a harassing
          telephone call if here is a specific threat.

          Private investigators
          have taken up the slack by offering a private telephone trap and trace
          service so that the general public can rent a telephone trap line. This
          enables the victim of telephone harassment to get an instant email
          notification of a caller’s telephone number even if the caller uses *67
          to block the caller ID on the victims phone. A telephone trap line
          utilizing ANI, automatic Number Identification can unblock blocked
          calls.

          But what if the caller is using a caller ID spoofing web
          site or spoof card? Can the call still be traced? The answer is yes and
          no. The telephone trap line can reveler the actual number the person is
          calling from and disable the Caller ID Spoof card or it may trace the
          call back to the company that sells the service. In that case you can
          contact them and try to get their cooperation. If not they can be
          subpoenaed to get their records for court. Sometimes the trap line will
          report the same number as the caller ID shows and te caller ID Spoof
          card will defeat te tap line service but there is no way to until in
          advance until the system is tested.

          About the Author

          Ed Opperman is president of Opperman Investigations Inc. He is considered an expert in telephone harassment investigations. If you need a trap line service with (ANI)Automatic Number Identification visit http://www.emailrevealer.com


          May 15th 2011 @8:57am ( possible phone issues again)

          So last evening i went to go and babysit and the husband and one child were both  ill…. so it was cancelled. I t headed home stopping to get gas, then stopping at my mother’s home, then to say my novena at the church and then onto my home.

           While  was at my mother’s home she mentioned that I called through the hotel  to  contact her  which was  completely  not true.. i mentioned  in a blog post in the past that i was given a telephone number  that was supposed to be my aunt Dottie’s telephone number in Virginia.  When i was speaking to her my voice was echoing  on the line..II could hear a repeat  of everything I was saying.  This was  very odd since each phone call I  had made through the magic jack number had been crystal clear up to that point.    After investigating all the  manipulation that can be done with voices through a computer program/ spoof cards and  probably all sorts of other ways i haven even found out about…. and  revealed yet.  I am attemping to record the facts so that the criminals who  are in the process of manipulating  cable and telephone lines… and therefor manipulating lives and businesses…. can be caught and be stopped.  

          Another odd phone call was for a contact in pelican Marsh that i had me with the call I was told was for   immediate work.  Once again the phone call was a bit odd since the person i was speaking  with  could not  recall the nuns she was close freinds with  who were the teachers at my boarding school  … and other information that  was inconsistent.

          In total, there have been  at the minimum ….. 5 total jobs with  a few of them being jobs that were of a more stable and scheduled  events thereby a continuous  flow of income…  so who knows th exact amount of income that has been manipulated. 

          I am still guesing that the same people who were stealing jobs allthe way back form when they were calling in to get my messages and obtain jobs by stealing my message…. it  may be the same culprites… and somehow in their twisted and criminal minds they enjoy ther annominity by beign able to steal both a business and individual jobs without having a face/ real name to take any of the responsibility or being held criminally culpable for their actions.   once again may i repeat I hate criminals……

          March and April were very busy months for babysitting but in May even though i kept  getting calls that  there are a lot of jobs available  and coming through…  it mysteriously has happened that each and every time each and every job  has fallen though.   Since most of the business is achieved  through the phone communication and through email… it is a mystery that the first point:    someone is telling me again that i am making calls that i did not make, and second that the same method of   manipulating jobs by telling me the jobs go thorough and then a second call to announce that it is cancelled. it may be too much of a coincidence that that is the same method of stealing jobs and business  and in fact i was just reading about the monopolization of a business and the Florida statutes that pertain to illegal practice   concerning the monopolization of a business  and another Florida statutes that concerning racketing/ and illegal practices pertaining to imitation and monopolization of a business…. even a statute relating to the committing any offense for the purpose of benefiting promoting or furthering the interests of a criminal gang…

          My point is… a very calculating organized  group or (GANG)  of individuals have for a while deliberately, methodically, and systematically and criminally gone about to tamper with telephones… with a business and with the running of a business… in order to profit for themselves.   by attempting to  eliminate all competition   through illegally and criminal methods… they have not only broken many laws but should be held liable for all their actions…   

           

          May 14th 2011 @1:26pm ( the 2010 florida sttues title XLVII chapter 934 section 03)

          2010
          Florida Statutes (including Special Session A)

          Title XLVII
          CRIMINAL PROCEDURE AND CORRECTIONS
          Chapter 934
          SECURITY OF COMMUNICATIONS
          View Entire Chapter


          934.03 Interception and disclosure of wire, oral, or electronic communications prohibited.

          (1) Except as otherwise specifically provided in this chapter, any person who:

          (a) Intentionally
          intercepts, endeavors to intercept, or procures any other person to
          intercept or endeavor to intercept any wire, oral, or electronic
          communication;
          (b) Intentionally
          uses, endeavors to use, or procures any other person to use or endeavor
          to use any electronic, mechanical, or other device to intercept any
          oral communication when:

          1. Such
          device is affixed to, or otherwise transmits a signal through, a wire,
          cable, or other like connection used in wire communication; or
          2. Such device transmits communications by radio or interferes with the transmission of such communication;
          (c) Intentionally
          discloses, or endeavors to disclose, to any other person the contents
          of any wire, oral, or electronic communication, knowing or having reason
          to know that the information was obtained through the interception of a
          wire, oral, or electronic communication in violation of this
          subsection;
          (d) Intentionally
          uses, or endeavors to use, the contents of any wire, oral, or
          electronic communication, knowing or having reason to know that the
          information was obtained through the interception of a wire, oral, or
          electronic communication in violation of this subsection; or
          (e) Intentionally
          discloses, or endeavors to disclose, to any other person the contents
          of any wire, oral, or electronic communication intercepted by means
          authorized by subparagraph (2)(a)2., paragraph (2)(b), paragraph (2)(c),
          s. 934.07, or s. 934.09
          when that person knows or has reason to know that the information was
          obtained through the interception of such a communication in connection
          with a criminal investigation, has obtained or received the information
          in connection with a criminal investigation, and intends to improperly
          obstruct, impede, or interfere with a duly authorized criminal
          investigation;

          shall be punished as provided in subsection (4).

          (2)(a)1. It is lawful under ss. 934.03934.09
          for an operator of a switchboard, or an officer, employee, or agent of a
          provider of wire or electronic communication service whose facilities
          are used in the transmission of a wire or electronic communication, to
          intercept, disclose, or use that communication in the normal course of
          his or her employment while engaged in any activity which is a necessary
          incident to the rendition of his or her service or to the protection of
          the rights or property of the provider of that service, except that a
          provider of wire communication service to the public shall not utilize
          service observing or random monitoring except for mechanical or service
          quality control checks.
          2. Notwithstanding
          any other law, a provider of wire, oral, or electronic communication
          service, or an officer, employee, or agent thereof, or landlord,
          custodian, or other person, may provide information, facilities, or
          technical assistance to a person authorized by law to intercept wire,
          oral, or electronic communications if such provider, or an officer,
          employee, or agent thereof, or landlord, custodian, or other person, has
          been provided with:

          a. A court order directing such assistance signed by the authorizing judge; or
          b. A certification in writing by a person specified in s. 934.09(7)
          that no warrant or court order is required by law, that all statutory
          requirements have been met, and that the specified assistance is
          required, setting forth the period of time during which the provision of
          the information, facilities, or technical assistance is authorized and
          specifying the information, facilities, or technical assistance
          required.
          3. A
          provider of wire, oral, or electronic communication service, or an
          officer, employee, or agent thereof, or landlord, custodian, or other
          person may not disclose the existence of any interception or the device
          used to accomplish the interception with respect to which the person has
          been furnished an order under ss. 934.03934.09,
          except as may otherwise be required by legal process and then only
          after prior notice to the Governor, the Attorney General, the statewide
          prosecutor, or a state attorney, as may be appropriate. Any such
          disclosure renders such person liable for the civil damages provided
          under s. 934.10, and such person may be prosecuted under s. 934.43.
          An action may not be brought against any provider of wire, oral, or
          electronic communication service, or an officer, employee, or agent
          thereof, or landlord, custodian, or other person for providing
          information, facilities, or assistance in accordance with the terms of a
          court order under ss. 934.03934.09.
          (b) It is lawful under ss. 934.03934.09
          for an officer, employee, or agent of the Federal Communications
          Commission, in the normal course of his or her employment and in
          discharge of the monitoring responsibilities exercised by the commission
          in the enforcement of 47 U.S.C. ch. 5, to intercept a wire, oral, or
          electronic communication transmitted by radio or to disclose or use the
          information thereby obtained.
          (c) It is lawful under ss. 934.03934.09
          for an investigative or law enforcement officer or a person acting
          under the direction of an investigative or law enforcement officer to
          intercept a wire, oral, or electronic communication when such person is a
          party to the communication or one of the parties to the communication
          has given prior consent to such interception and the purpose of such
          interception is to obtain evidence of a criminal act.
          (d) It is lawful under ss. 934.03934.09
          for a person to intercept a wire, oral, or electronic communication
          when all of the parties to the communication have given prior consent to
          such interception.
          (e) It is unlawful to intercept any wire, oral, or electronic communication for the purpose of committing any criminal act.
          (f) It is lawful under ss. 934.03934.09
          for an employee of a telephone company to intercept a wire
          communication for the sole purpose of tracing the origin of such
          communication when the interception is requested by the recipient of the
          communication and the recipient alleges that the communication is
          obscene, harassing, or threatening in nature. The individual conducting
          the interception shall notify local police authorities within 48 hours
          after the time of the interception.
          (g) It is lawful under ss. 934.03934.09 for an employee of:

          1. An ambulance service licensed pursuant to s. 401.25, a fire station employing firefighters as defined by s. 633.30, a public utility, a law enforcement agency as defined by s. 934.02(10), or any other entity with published emergency telephone numbers;
          2. An agency operating an emergency telephone number “911” system established pursuant to s. 365.171; or
          3. The central abuse hotline operated pursuant to s. 39.201

          to
          intercept and record incoming wire communications; however, such
          employee may intercept and record incoming wire communications on
          designated “911” telephone numbers and published nonemergency telephone
          numbers staffed by trained dispatchers at public safety answering points
          only. It is also lawful for such employee to intercept and record
          outgoing wire communications to the numbers from which such incoming
          wire communications were placed when necessary to obtain information
          required to provide the emergency services being requested. For the
          purpose of this paragraph, the term “public utility” has the same
          meaning as provided in s. 366.02
          and includes a person, partnership, association, or corporation now or
          hereafter owning or operating equipment or facilities in the state for
          conveying or transmitting messages or communications by telephone or
          telegraph to the public for compensation.

          (h) It shall not be unlawful under ss. 934.03934.09 for any person:

          1. To
          intercept or access an electronic communication made through an
          electronic communication system that is configured so that such
          electronic communication is readily accessible to the general public.
          2. To intercept any radio communication which is transmitted:

          a. By any station for the use of the general public, or that relates to ships, aircraft, vehicles, or persons in distress;
          b. By
          any governmental, law enforcement, civil defense, private land mobile,
          or public safety communications system, including any police or fire
          communications system, readily accessible to the general public;
          c. By
          a station operating on an authorized frequency within the bands
          allocated to the amateur, citizens band, or general mobile radio
          services; or
          d. By any marine or aeronautical communications system.
          3. To engage in any conduct which:

          a. Is prohibited by s. 633 of the Communications Act of 1934; or
          b. Is excepted from the application of s. 705(a) of the Communications Act of 1934 by s. 705(b) of that act.
          4. To
          intercept any wire or electronic communication the transmission of
          which is causing harmful interference to any lawfully operating station
          of consumer electronic equipment to the extent necessary to identify the
          source of such interference.
          5. To
          intercept, if such person is another user of the same frequency, any
          radio communication that is not scrambled or encrypted made through a
          system that utilizes frequencies monitored by individuals engaged in the
          provision or the use of such system.
          6. To intercept a satellite transmission that is not scrambled or encrypted and that is transmitted:

          a. To a broadcasting station for purposes of retransmission to the general public; or
          b. As
          an audio subcarrier intended for redistribution to facilities open to
          the public, but not including data transmissions or telephone calls,
          when such interception is not for the purposes of direct or indirect
          commercial advantage or private financial gain.
          7. To
          intercept and privately view a private satellite video communication
          that is not scrambled or encrypted or to intercept a radio communication
          that is transmitted on frequencies allocated under subpart D of part 74
          of the rules of the Federal Communications Commission that is not
          scrambled or encrypted, if such interception is not for a tortious or
          illegal purpose or for purposes of direct or indirect commercial
          advantage or private commercial gain.
          (i) It shall not be unlawful under ss. 934.03934.09:

          1. To use a pen register or a trap and trace device as authorized under ss. 934.31934.34 or under federal law; or
          2. For
          a provider of electronic communication service to record the fact that a
          wire or electronic communication was initiated or completed in order to
          protect such provider, another provider furnishing service toward the
          completion of the wire or electronic communication, or a user of that
          service, from fraudulent, unlawful, or abusive use of such service.
          (j) It is not unlawful under ss. 934.03934.09
          for a person acting under color of law to intercept the wire or
          electronic communications of a computer trespasser which are transmitted
          to, through, or from a protected computer if:

          1. The owner or operator of the protected computer authorizes the interception of the communications of the computer trespasser;
          2. The person acting under color of law is lawfully engaged in an investigation;
          3. The
          person acting under color of law has reasonable grounds to believe that
          the contents of the communications of the computer trespasser will be
          relevant to the investigation; and
          4. The interception does not acquire communications other than those transmitted to, through, or from the computer trespasser.
          (3)(a) Except
          as provided in paragraph (b), a person or entity providing an
          electronic communication service to the public shall not intentionally
          divulge the contents of any communication while in transmission on that
          service to any person or entity other than an addressee or intended
          recipient of such communication or an agent of such addressee or
          intended recipient.
          (b) A person or entity providing electronic communication service to the public may divulge the contents of any such communication:

          1. As otherwise authorized in paragraph (2)(a) or s. 934.08;
          2. With the lawful consent of the originator or any addressee or intended recipient of such communication;
          3. To a person employed or authorized, or whose facilities are used, to forward such communication to its destination; or
          4. Which
          were inadvertently obtained by the service provider and which appear to
          pertain to the commission of a crime, if such divulgence is made to a
          law enforcement agency.
          (4)(a) Except
          as provided in paragraph (b), whoever violates subsection (1) is guilty
          of a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, s. 775.084, or s. 934.41.
          (b) If
          the offense is a first offense under paragraph (a) and is not for any
          tortious or illegal purpose or for purposes of direct or indirect
          commercial advantage or private commercial gain, and the wire or
          electronic communication with respect to which the offense under
          paragraph (a) was committed is a radio communication that is not
          scrambled, encrypted, or transmitted using modulation techniques the
          essential parameters of which have been withheld from the public with
          the intention of preserving the privacy of such communication, then:

          1. If
          the communication is not the radio portion of a cellular telephone
          communication, a cordless telephone communication that is transmitted
          between the cordless telephone handset and the base unit, a public land
          mobile radio service communication, or a paging service communication,
          and the conduct is not that described in subparagraph (2)(h)7., the
          person committing the offense is guilty of a misdemeanor of the first
          degree, punishable as provided in s. 775.082 or s. 775.083.
          2. If
          the communication is the radio portion of a cellular telephone
          communication, a cordless telephone communication that is transmitted
          between the cordless telephone handset and the base unit, a public land
          mobile radio service communication, or a paging service communication,
          the person committing the offense is guilty of a misdemeanor of the
          second degree, punishable as provided in s. 775.082 or s. 775.083.

          History.s.
          3, ch. 69-17; s. 1163, ch. 71-136; ss. 2, 3, ch. 74-249; s. 249, ch.
          77-104; s. 1, ch. 78-376; s. 187, ch. 79-164; s. 2, ch. 80-27; s. 1, ch.
          87-301; s. 2, ch. 88-184; s. 2, ch. 89-269; s. 1582, ch. 97-102; s. 18,
          ch. 99-168; ss. 7, 9, ch. 2000-369; s. 2, ch. 2002-72; s. 30, ch.
          2010-117.

          May 14th 2011 @12:52pm ( florida sttutes /chpater 843 obstucting justice unlawfuluse of police badges or other indicia of authority ) )


          Title XLVI

          CRIMES

          Chapter 843

          OBSTRUCTING JUSTICE
          View Entire Chapter

          843.085  Unlawful use of police badges or other indicia of authority.–It is unlawful for any person:

          (1)  Unless appointed by the Governor pursuant to chapter 354,
          authorized by the appropriate agency, or displayed in a closed or
          mounted case as a collection or exhibit, to wear or display any
          authorized indicia of authority, including any badge, insignia, emblem,
          identification card, or uniform, or any colorable imitation thereof, of
          any federal, state, county, or municipal law enforcement agency, or
          other criminal justice agency as now or hereafter defined in s. 943.045,
          which could deceive a reasonable person into believing that such item
          is authorized by any of the agencies described above for use by the
          person displaying or wearing it, or which displays in any manner or
          combination the word or words “police,” “patrolman,” “agent,” “sheriff,”
          “deputy,” “trooper,” “highway patrol,” “Wildlife Officer,” “Marine
          Patrol Officer,” “state attorney,” “public defender,” “marshal,”
          “constable,” or “bailiff,” which could deceive a reasonable person into
          believing that such item is authorized by any of the agencies described
          above for use by the person displaying or wearing it.

          (2)  To own or operate a motor vehicle marked or identified in
          any manner or combination by the word or words “police,” “patrolman,”
          “sheriff,” “deputy,” “trooper,” “highway patrol,” “Wildlife Officer,”
          “Marine Patrol Officer,” “marshal,” “constable,” or “bailiff,” or by any
          lettering, marking, or insignia, or colorable imitation thereof,
          including, but not limited to, stars, badges, or shields, officially
          used to identify the vehicle as a federal, state, county, or municipal
          law enforcement vehicle or a vehicle used by a criminal justice agency
          as now or hereafter defined in s. 943.045,
          which could deceive a reasonable person into believing that such
          vehicle is authorized by any of the agencies described above for use by
          the person operating the motor vehicle, unless such vehicle is owned or
          operated by the appropriate agency and its use is authorized by such
          agency, or the local law enforcement agency authorizes the use of such
          vehicle or unless the person is appointed by the Governor pursuant to
          chapter 354.

          (3)  To sell, transfer, or give away the authorized badge, or
          colorable imitation thereof, including miniatures, of any criminal
          justice agency as now or hereafter defined in s. 943.045,
          or bearing in any manner or combination the word or words “police,”
          “patrolman,” “sheriff,” “deputy,” “trooper,” “highway patrol,” “Wildlife
          Officer,” “Marine Patrol Officer,” “marshal,” “constable,” “agent,”
          “state attorney,” “public defender,” or “bailiff,” which could deceive a
          reasonable person into believing that such item is authorized by any of
          the agencies described above, except for agency purchases or upon the
          presentation and recordation of both a driver’s license and other
          identification showing any transferee to actually be a member of such
          criminal justice agency or unless the person is appointed by the
          Governor pursuant to chapter 354. A transferor of an item covered by
          this subsection is required to maintain for 2 years a written record of
          such transaction, including records showing compliance with this
          subsection, and if such transferor is a business, it shall make such
          records available during normal business hours for inspection by any law
          enforcement agency having jurisdiction in the area where the business
          is located.

          (4)  Nothing in this section shall prohibit a fraternal,
          benevolent, or labor organization or association, or their chapters or
          subsidiaries, from using the following words, in any manner or in any
          combination, if those words appear in the official name of the
          organization or association:  “police,” “patrolman,” “sheriff,”
          “deputy,” “trooper,” “highway patrol,” “Wildlife Officer,” “Marine
          Patrol Officer,” “marshal,” “constable,” or “bailiff.”

          (5)  Violation of any provision of this section is a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083. This section is cumulative to any law now in force in the state.

          History.–s. 1, ch. 91-163; s. 2, ch. 94-103.

          Copyright © 1995-2011 The Florida Legislature • Privacy StatementContact Us

          May 14th 2011 @12:46pm ( florida statutes ( chapter 918.12 or s.918.13/ relating to tampering with jurors and evidence ) )


          Title XLVII

          CRIMINAL PROCEDURE AND CORRECTIONS

          Chapter 918

          CONDUCT OF TRIAL
          View Entire Chapter

          918.13  Tampering with or fabricating physical evidence.

          (1)  No person, knowing that a criminal trial or proceeding or an
          investigation by a duly constituted prosecuting authority, law
          enforcement agency, grand jury or legislative committee of this state is
          pending or is about to be instituted, shall:

          (a)  Alter, destroy, conceal, or remove any record, document, or
          thing with the purpose to impair its verity or availability in such
          proceeding or investigation; or

          (b)  Make, present, or use any record, document, or thing, knowing it to be false.

          (2)  Any person who violates any provision of this section shall
          be guilty of a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.

          History.–s. 2, ch. 72-315.

          may 13th 2011 @6:29pm ( so i got an email today that my cashmire sweater cannot be found at a residence wher a little girl who looked like karne kahel…took items)

          I received an email today  from  a family i regularly babysit.  and such disappointing news….the khaki cashmere sweater is not in their possession….   the weird thing about t the day…..  the little girl looked almost exactly like Karen kahel that day.. with the long oval face.. the white blond hair and the freckles… it actually  almost scared me…. she looked so different… and her manners were different.. and when she went through  my pirate log in book  and took the treasure clue cards/the 6 Thomas the train bubbles and i was missing my cashmere sweater… well…  it was just another experience   to make me not believe in the goodness of people… and the honesty of people… and wondering when the dishonestly starts… as children? what a shame.. 

          I called my mother and she said  she will buy me another sweater.. it was a  sweater set… a matching sweater set… ugg….  but that is now two sweaters that have been ruined by these girls… who obviously don’t want me wearing anything tan or kaki…. UGG…. i even asked for a picture    this one was part of a sweater set…. the other was part of an outfit for a wedding…. my sisters wedding…

          so will have to add this to  a police report  to make sure that if by chance anyone actually does decide to be honest and give it back… i will be able to get it back.

           Dear                                                  Wednesday May 11th 2011 @ 3:02pm
          I
          hope this email finds you and your  family doing well.  I hope you had a
          nice Easter and Mother’s day.  I have been meaning to email you to ask
          if after your family left you were able to find my tan/khaki sweater. 
          It was a cashmere cardigan that was a part of a sweater set from Saks 5th
          Ave
            my mother had purchased for me for  me a few Christmas’s ago.  It
          had a tie in the back and the tag was purple and black.   it had a tiny
          hole in one of the sleeves where  my charm bracelet had caught on the
          threads.  I pretty much wore it with everything as it matched those tan
          or khaki Stubs an Wooten  shoes I always wear… ( the sweater is about
          the same color if you remember them and can’t recall the sweater color
          )  I think Christine may actually have the sweater( at least the back of
          it)  in a picture when she was taking pictures of me with the boys to
          send to her husband. 

          I have been praying/hoping/ wishing  that
          you have it.  I went through all my suitcases and closets and there is
          not a trace of it in my home at all. If you don’t have it then I  will
          have to contact the proper authorities in case it was stolen.  Please
          email me back either way so that I can follow through with the necessary
          steps to retrieve it. 

          I can be reached via email: 
          whatabtmary@yahoo.com
          maryjeanziska@mysearchforjustice.com
          maryjeanziskka@mygingerbreadman.com  

          Thank you for your kind attention to this email.

          Sincerely,
          Mary Jean Ziska        

           

          A Tender Loving Care Service

          Mary Jean Ziska   Assistant Director

          whatabtmary@yahoo.com

           

          May 13th 2011 @6:20pm ( reply email from the biometric center of excellence)

          I’m not sure that they understood what i was trying to achieve with my email questions concerning:

          I was wondering what technology and
          procedure you have in place to recognize various people via a biometric
          voice identifying method.  I would also like to know  if any cases have
          been  taken to court and won due to  identifying  the voice of the
          criminal.  I need your help! I  think I have yet another 
          > phone
          line compromised  

          Ms. Ziska,
           
              The FBI’s Biometric Center of Excellence (BCOE)
          is not an investigative entity.  The FBI’s Science and Technology Branch
          created the BCOE to be the FBI‘s focal
          point to advance the adoption of optimal biometric and identity
          management solutions within the FBI and across the law enforcement,
          homeland security, and intelligence communities.  
           
               Since the BCOE is not an investigative entity within the FBI, I encourage you to either contact your local law enforcement agencies
          to report any information or by visiting the FBI’s public web
          site.  The FBI maintains a public web site with the capability to
          report information online at  https://tips.fbi.gov/
           
          Thanks,
           Brandi
           FBI, CJIS Division
           Biometric Services Section
           Biometric Center of Excellence

          —– Original Message —–
          From: mary jean ziska <whatabtmary@yahoo.com>
          Date: Wednesday, May 11, 2011 8:13 pm
          Subject: requesting information of biometric technologies availableto public to stop criminals
          To: biometriccoe@leo.gov

          >

          >
          > To whom it may concern:   May 11 2011

          >  

          > I
          have had a great deal of problems with bullies and others  criminals on
          a phone line… actually almost on  every phone  line i have had since 
          2003. Some of the criminals have used a spoof card  and other times
          gotten a phone number close to mine to gain access to my voice
          mail. Because of their intrudance  into my life via the phone and
          computer lines they have been able to know my schedule, to break into my
          home, to steal not only my possessions but clients from 3 businesses I
          helped to create since 2003….

          I was wondering what technology and
          procedure you have in place to recognize various people via a biometric
          voice identifying method.  I would also like to know  if any cases have
          been  taken to court and won due to  identifying  the voice of the
          criminal.  I need your help! I  think I have yet another 
          > phone
          line compromised   as of today.  It started having a funny ring and the
          people on the phone line souned very familiar for bing  complete
          strangers.  Thank you for your kind attention to this email.

          > Sincerely,

          > Mary Jean Ziska 

          >  

          > You can please email me :  maryjeanziska@mysearchforjustice.com  /my webiste is:  www.mysearchforjustice.com    

          >  

          > PS. I started a blog to try to elaborate on the methods andmultiple times  they have broken multiple laws.

          > I really want them caught and put in jail and to sue them civilly and criminally for all the  harm they have committed.    

          >  

          >

          A Tender Loving Care Service

          >

          Marion Gregory   Director 239-598-1515

          >

          naplesmarion@aol.com

          >

          Mary Jean Ziska   Assistant Director 239-287-2294

          >

          whatabtmary@yahoo.com

          >

          This
          e-mail may contain Personally Identifiable Information which must be
          protected in accordance with applicable privacy and security policies. 
          If you are not the intended recipient of this information; disclosure,
          reproduction, distribution, or use of this information is prohibited.