Author Archives: mary jean ziska

May 17th 2011 @ 2:35pm ( joel osteen email )




Tue, May 17, 2011 1:30:00 AM


Today’s Word with Joel & Victoria










From:

Joel Osteen Ministries <no-reply@joelosteen.com>  
To: mary jean ziska <whatabtmary@yahoo.com>














If you are unable to see this e-mail, please click here.






























Joel
Today's Word with Joel and Victoria
Watch Joel on YouTube

Ask What You Desire



TODAY’S SCRIPTURE


“If you abide in Me, and My words abide in you, you will ask what you desire, and it shall be done for you.”
(John 15:7, NKJ)



TODAY’S WORD from Joel and Victoria



It pleases God to give you the desires of your heart! He wants to see you happy, whole, strong and enjoying His blessing. When you make the Word of God your number one priority, when you stay connected to Him through prayer and worship, God promises that He will give you the desires of your heart.


Psalm 37:4 tells us again that if we delight ourselves in Him, He will give us the desires of our hearts. One of the root definitions of the word “delight” means “soft.” This gives the picture of us being soft and moldable, like clay, in the Potter’s hands. As we allow Him to shape and mold our character, as we yield ourselves to Him, our thoughts become His thoughts, our words become His Words, and our desires become His desires! That’s how we can ask whatever we will because our will is in alignment with Him!


Today, don’t allow the distractions of everyday life keep you from spending time with Him. Abide in Him and let His Words abide in you because He will give you the desires of your heart!



A PRAYER FOR TODAY


Heavenly Father, today I submit every area of life to You. I invite You to have Your way in my heart. Mold me and make me as I surrender every area of my life to You. I praise You and give You all the glory. In Jesus’ Name. Amen.


— Joel & Victoria Osteen


Have Joel pray a blessing over you Today. CLICK HERE NOW


ACCELERATE | God's Plan to Propel Your Life WITH A GIFT OF ANY SIZE
ACCELERATE
Inspirational 2-disc resource


Receive Your Copy






FAITH BUILDERS WITH A GIFT $150 OR MORE
FAITH BUILDERS
Hardcover Bible,
2 books,
4-disc audio resource,
Plus: ACCELERATE


Receive Your Copy












HomeAboutBroadcastEventsHope For TodayPartnerDonateStore













You are subscribed to Today’s Word with Joel and Victoria as whatabtmary@yahoo.com. To unsubscribe from this email list, click here to be removed. To ensure delivery to your mailbox, please add no-reply@joelosteen.com to your address book of approved senders.


© 2011 Joel Osteen Ministries | Privacy Policy | Terms of Use






May 17th 2011 @ 1:37pm ( another great resource for german sheppards)

I found another great resource for german sheppherds… a rescue site.. with some really beautiful animals… i swear one of the pictures looks soooo much like one of our old german sheppards… amazing… so here is the information for them: 
 












      Tuesday, May 17 2011 @ 02:20 PM EDT











Home


The Hoffer Family Foundation Inc. (a 501C3) founded South West Florida German Shepherd Rescue in 2007. Our Rescue implemented its program in early 2008.  To date IN 2010 we have adopted out over 38 pure bred German Shepherd dogs and about 8 not so pure bred, but tremendous four legged friends. IN THE PAST 3 YEARS OF THE FOUNDATION WE HAVE ADOPTED OUT OVER 70 GERMAN SHEPHERDS TO GREAT FAMILIES! We operate the rescue with dogs received from shelters and from owner turn-ins. Follow us on Twitter, my sign on is Hoffdogbun!


These dogs primarily come from an area just south of Tampa, to just South of Naples Florida.


Our Mission:


To take in discarded or turned-in German Shepherd Dogs, give them a positive environment, healthy food, medical attention, socialization and lots of love and understanding in order to find them new forever homes in our local communities.  We are breed specific but at times fall in love with a dog or two that requires our help.


We seek qualified families and individuals who wish to own German Shepherd dogs.  If you wish to adopt, please send us an email to schedule a qualification interview.  The interviews are held in Punta Gorda.  Our ideal adopter is someone who has had a GSD in their past and knows the breed. We especially want people who will dedicate the appropriate time to train the dog.  We require that people we adopt to have the resources for the medical any physical health costs of the animal.  We especially want people who will provide the kindness, compassion, love and affection these dogs crave in a forever home.


Adoption Process:


Our adoption process begins with an interview. We will ask you about your current pets, we will ask you for evidence of their up to date vaccinations, your vets name and number, your track record in keeping animal shots and registrations up to date, your training experience and about your commitment. We will ask to meet your entire family and anyone else that lives in the home with the dog. We will also ask that if you have pets, that you bring your dog here to meet his new friend.


We will require that you sign an agreement regarding the care of the dog you may be given.  We will ask that upon adoption that you show us receipts for 6 months of heart worm prevention and give us your vets name and address and phone for verification purposes.


We charge $150 for any dog we adopt out and $150 for any we take in as give ups from owners. We also require owner give ups to be spayed or neutered, at the owners expense prior to the turn over. At the point when dogs are surrendered to SWFLGSD Rescue we require all medical records be given to us along with any chip registration information and numbers, complete shot record and vet who administered them as well as a current heart worm test paid for by the owner prior to turning the dog over to us.  The money is paid to us by check made out to the Animal Welfare League of Charlotte County.  The AWL is a 501C3 charity and the ‘donation is tax deductible.


These funds provide us with medical resources we need to cover expenses required to restore the health of many of the dogs we get.  The AWL provides us with assistance and supports us in countless ways.


We strongly recommend researching the breed before deciding on a GSD.  Once you have adopted a dog, we recommend a qualified training program. WE NOW REQUIRE LOCAL AREA RESIDENTS TO ENROLL YOUR NEW DOG IN TRAINING AND POST A MINIMUM OF 1 6 WEEKS CLASS SESSION AT A COST OF $70 IN A CHECK MADE OUT TO THE CHARLOTTE BOC. This class is taught buy the Peace River Dog Fanciers club. For those adopting outside the local Punta Gorda area, we require proof of enrollment in any dog training class from PetsMart to Schutzund. As affiliates of the German Shepherd Schutzhund Club of SW Florida, whose contact information appears above, we advise you to seek their help in developing a training regimen during the first 6 months you have the dog.


This needed training will insure a bond between you and your pet and guaranties a great relationship for life. Nothing is more stressful than having an animal you love be out of control, unruly or unsocialized.


It is important to note that we are not in the pet business, but rather a rescue. When we get dogs we do our best to find them qualified adoptive families. We do not seek out dogs to rescue. If you are approved to get a dog from us, we will not stop trying to find the perfect dog for you until you have the perfect pet.  We never ask that you take any dog, but rather show you what we have in our system and allow you to decide.  We will always take a dog back if things do not work out. You will never feel pressure from us to accept any animal we offer. We expect honesty from any potential adopter in giving us as much direction as possible in so far as “your perfect dog’.


If you feel that a German Shepherd is right for you and your family then give us a call at 941 575 0243 or email us at alphadog63@comcast.net or goingtothedogs@comcast.net to schedule an interview in Punta Gorda. You can now follow us on Facebook and Twitter if I could only figure out how to use them.









Rescued Dogs











Raj our first adoption of 2011

Raj our first adoption of 2011
Browse Album





What’s New



Stories

No new stories


Pet Gallery Last 7 Days







Who’s Online


Guest Users: 1






 


Web Sites By: All Merchant Services


May 16th 2011 @4:27pm…. i found some great sites… to stop spoofing…. trapcall.com and safecall.com ) finally!!!!!

Unmask Blocked Calls!

Always Know Who’s Calling

TrapCall unmasks blocked and restricted calls, blacklists harassing callers, and can even
record your incoming calls. There is no software to install, and it works on any mobile phone.

Watch our quick video to see how easy TrapCall really is!


Sign Up For TrapCall Today.

Watch It In Action
See Plans & Pricing

Heavy on Features, Light on Price

  • Unblocks Blocked And Restricted Calls

    Always know who’s calling. The way it should be, right?

  • Trapcall works with any cell phone.

    Most providers, any phone. We got ya’ covered.

  • Manage your account online.

    No more clumsy in-phone stuff. Handle it all right here.

  • Different plans for different folks.

    ‘Bet we have a plan that fits.
    Check them out.

  • And much, much more.

    Recording, blacklisting, and more.
    See them here.

“I was receiving almost a dozen harassing calls a day from a blocked number.
I signed up for TrapCall, unmasked the next blocked call I got, and found out
it was my crazy ex-girlfriend!”

– John S.
Brandston, Missouri


Sign up for TrapCall today in less than five minutes.

See Plans & Pricing

May 16th 2011 @3:33pm ( met avemaria law student at Ave Maria church last evening Sunday May 15th 2011 )

last evening I babysat from 11:30am-4:30pm… then left the hotel by about 4:45pm… went to go and get groceries.. and was going to make it to 7pm mass at ave maria which is the last catholic mass that i  found on line …. needless to say…I  drove there and there  was no mass.. but i did meet a recent graduate from ave maria law school, Luke, who was there with his parents.   I had a ncie chat with him concerning west law and teh new version that is similar to google and is very easy to use and find the statutes.. and cases by  subject … he said was a breeze… very nice to know.. i gave hm the email to this website and blog.. and my  whatatbmary email in hopes that he or any of his fellow law school students might be able to help in my search for justice. So if Luke you get a chance to read this… thank you for the information… hope to hear great news from you… and if you or anyone  you know has any information or cases or statues.. laws that might be helpful to me in my search for justice .. please feel free to contact me… also if you hear of any articles so that i might be able to catch the people who have basically ruined my life… that i can put in this blog so that no one else can or will be hurt … please let me know. thank you for your kind attention to this note… sincerely, mary jean ziska 

ps… this is a note concerning the day of my trip out to ave maria.. If anyone knows the real schedule for the masses of ave maria.. please email me.. this is the second time i have goes out to make it to the English mass and it says it is still at 7 pm… but i arrived there approx 7:12pm… and no one was there…

I said  my saint Jude novena.. as i have done everyday since August 12th 2010…  for protection from all harm.. for blessings to a list of people and people at certain establishments that have been good and nice and haven’t harmed me or my life…. and of course  i still pray for that elusive …. winning lottery ticket… and a huge financial miracle…. 

If anyone knows when masses are going on… on the campus… for real…. please let me know.. everything was closed.. only one family and tow people came into the church besides me … one lady in jeans and a maroon scarf i though i saw her before praying at the chapel in st. john’s…  

then as i was leaving in my green saturn Vue.. with  license plates of :   ( wait maybe i shouldnt put my license plates… ) I’ll think on that one… but anyway.. there was a huge group of cars…  ( one in fact reminded me of Gloria’s maroon hummer that she or Blake Fletcher had ages ago.. like 2004-5… or even before that.. but i hadn’t seen many hummers out and about… all headed to Ave maria.. was there even a later mass?  i almost turned around to find out but i was really tired.. i had been p since 4am… on the treadmill.. wanted to go to early mass at 7am at st. john’s but  there was a huge rain storm… then the power cut out for a minuter that somehow left my phone inoperable… and luckily a nice neighbor allowed me to borrow his cell… and I tried  for almost an hour to get  in touch with the babysitting clients… and ended up  reaching them at 11 then headed right over babysit by 11:30am… Sheesh… busy bay…HA!  …  

Oh also almost forgot… i saw a bear.. a real live bear on the side of the road.. it was alive and walking.. think it was going to try to cross the street… but i dint even know there were bears in Florida… what a shocker… ..thinki may put this post in the www.mygingerbreadman.com blog as well since it is not all about law .. and catching criminals..HA!

monday May 16th 2011 @3:31pm ( how to prevent spoof calls )


Ads by Google

How to Prevent Spoofing

updated: December 05, 2010


How to Prevent Spoofingthumbnail
Secure your voicemail to protect it from hacking.

Spoofing is a common phishing
tactic. Caller ID and email spoofing are two of the most prevalent
types of spoofing. Caller ID spoofing is the act of using a spoof card
or other tool to call someone’s phone under a false name. Often,
spoofers display the names of banks and other financial institutions as
the caller identity. Email spoofing is the act of sending an email under
a false name. You can avoid being a victim of spoofing.

Difficulty:
Moderately Easy

Instructions

  1. Prevention of Caller ID Spoofing

    • 1

      Block spoofing
      calls. Services such as trapcall.com or safercall.com allow you to
      block calls that display false caller information. Such calls cannot go
      through unless the callers display their true identities.

    • 2

      Password protect your voicemail.
      Failure to password protect your voicemail allows criminals to hack
      into your voicemail and steal your personal information and contacts.
      Criminals can use this information to make spoof calls to your contacts
      and phish for sensitive information.

    • 3

      Avoid revealing sensitive
      information, such as your credit card or bank account number, via phone.
      Banks will never call you and request such information; they only
      request such information over phone when you initiate the contact. One
      of the main reasons that criminals spoof is to obtain your information.
      Hence, always be on guard, and do not assume the caller ID is always
      accurate.

    Prevention of Email Spoofing

    • 1

      Safeguard your email
      address and avoid disclosing it. Spammers are one of the biggest
      perpetrators of spoofed emails. Use a spam filter, and always use an
      image to display your email online.

    • 2

      Distinguish real emails from
      spoofed ones. Look at the part of the email after the “@” sign. Make
      sure that this part fully matches the company’s name.

    • 3

      Examine the email’s language,
      tone and appearance, and note if it is different than usual. A sudden
      difference in tone or appearance as well as excessive grammar errors are
      warning signs.

    • 4

      Do not disclose personal
      information. Many spoofing emails will request your Social Security
      number, date of birth or bank account number. Most legitimate financial
      institutions, however, will never request such information via email.

    • 5

      Report suspicious emails to the
      company being spoofed. Call the company, or find the email address for
      reporting suspicious activity on its website. Doing so encourages the
      company to alert other customers.

Ads by Google

References

  • Photo Credit:
    James Braund/Photodisc/Getty Images;

Comments

    Helpful?
    Yes
    No

      May 15th 2011 @8:57am ( possible phone issues again)

      So last evening i went to go and babysit and the husband and one child were both  ill…. so it was cancelled. I t headed home stopping to get gas, then stopping at my mother’s home, then to say my novena at the church and then onto my home.

       While  was at my mother’s home she mentioned that I called through the hotel  to  contact her  which was  completely  not true.. i mentioned  in a blog post in the past that i was given a telephone number  that was supposed to be my aunt Dottie’s telephone number in Virginia.  When i was speaking to her my voice was echoing  on the line..II could hear a repeat  of everything I was saying.  This was  very odd since each phone call I  had made through the magic jack number had been crystal clear up to that point.    After investigating all the  manipulation that can be done with voices through a computer program/ spoof cards and  probably all sorts of other ways i haven even found out about…. and  revealed yet.  I am attemping to record the facts so that the criminals who  are in the process of manipulating  cable and telephone lines… and therefor manipulating lives and businesses…. can be caught and be stopped.  

      Another odd phone call was for a contact in pelican Marsh that i had me with the call I was told was for   immediate work.  Once again the phone call was a bit odd since the person i was speaking  with  could not  recall the nuns she was close freinds with  who were the teachers at my boarding school  … and other information that  was inconsistent.

      In total, there have been  at the minimum ….. 5 total jobs with  a few of them being jobs that were of a more stable and scheduled  events thereby a continuous  flow of income…  so who knows th exact amount of income that has been manipulated. 

      I am still guesing that the same people who were stealing jobs allthe way back form when they were calling in to get my messages and obtain jobs by stealing my message…. it  may be the same culprites… and somehow in their twisted and criminal minds they enjoy ther annominity by beign able to steal both a business and individual jobs without having a face/ real name to take any of the responsibility or being held criminally culpable for their actions.   once again may i repeat I hate criminals……

      March and April were very busy months for babysitting but in May even though i kept  getting calls that  there are a lot of jobs available  and coming through…  it mysteriously has happened that each and every time each and every job  has fallen though.   Since most of the business is achieved  through the phone communication and through email… it is a mystery that the first point:    someone is telling me again that i am making calls that i did not make, and second that the same method of   manipulating jobs by telling me the jobs go thorough and then a second call to announce that it is cancelled. it may be too much of a coincidence that that is the same method of stealing jobs and business  and in fact i was just reading about the monopolization of a business and the Florida statutes that pertain to illegal practice   concerning the monopolization of a business  and another Florida statutes that concerning racketing/ and illegal practices pertaining to imitation and monopolization of a business…. even a statute relating to the committing any offense for the purpose of benefiting promoting or furthering the interests of a criminal gang…

      My point is… a very calculating organized  group or (GANG)  of individuals have for a while deliberately, methodically, and systematically and criminally gone about to tamper with telephones… with a business and with the running of a business… in order to profit for themselves.   by attempting to  eliminate all competition   through illegally and criminal methods… they have not only broken many laws but should be held liable for all their actions…   

       

      May 14th 2011 @1:26pm ( the 2010 florida sttues title XLVII chapter 934 section 03)

      2010
      Florida Statutes (including Special Session A)

      Title XLVII
      CRIMINAL PROCEDURE AND CORRECTIONS
      Chapter 934
      SECURITY OF COMMUNICATIONS
      View Entire Chapter


      934.03 Interception and disclosure of wire, oral, or electronic communications prohibited.

      (1) Except as otherwise specifically provided in this chapter, any person who:

      (a) Intentionally
      intercepts, endeavors to intercept, or procures any other person to
      intercept or endeavor to intercept any wire, oral, or electronic
      communication;
      (b) Intentionally
      uses, endeavors to use, or procures any other person to use or endeavor
      to use any electronic, mechanical, or other device to intercept any
      oral communication when:

      1. Such
      device is affixed to, or otherwise transmits a signal through, a wire,
      cable, or other like connection used in wire communication; or
      2. Such device transmits communications by radio or interferes with the transmission of such communication;
      (c) Intentionally
      discloses, or endeavors to disclose, to any other person the contents
      of any wire, oral, or electronic communication, knowing or having reason
      to know that the information was obtained through the interception of a
      wire, oral, or electronic communication in violation of this
      subsection;
      (d) Intentionally
      uses, or endeavors to use, the contents of any wire, oral, or
      electronic communication, knowing or having reason to know that the
      information was obtained through the interception of a wire, oral, or
      electronic communication in violation of this subsection; or
      (e) Intentionally
      discloses, or endeavors to disclose, to any other person the contents
      of any wire, oral, or electronic communication intercepted by means
      authorized by subparagraph (2)(a)2., paragraph (2)(b), paragraph (2)(c),
      s. 934.07, or s. 934.09
      when that person knows or has reason to know that the information was
      obtained through the interception of such a communication in connection
      with a criminal investigation, has obtained or received the information
      in connection with a criminal investigation, and intends to improperly
      obstruct, impede, or interfere with a duly authorized criminal
      investigation;

      shall be punished as provided in subsection (4).

      (2)(a)1. It is lawful under ss. 934.03934.09
      for an operator of a switchboard, or an officer, employee, or agent of a
      provider of wire or electronic communication service whose facilities
      are used in the transmission of a wire or electronic communication, to
      intercept, disclose, or use that communication in the normal course of
      his or her employment while engaged in any activity which is a necessary
      incident to the rendition of his or her service or to the protection of
      the rights or property of the provider of that service, except that a
      provider of wire communication service to the public shall not utilize
      service observing or random monitoring except for mechanical or service
      quality control checks.
      2. Notwithstanding
      any other law, a provider of wire, oral, or electronic communication
      service, or an officer, employee, or agent thereof, or landlord,
      custodian, or other person, may provide information, facilities, or
      technical assistance to a person authorized by law to intercept wire,
      oral, or electronic communications if such provider, or an officer,
      employee, or agent thereof, or landlord, custodian, or other person, has
      been provided with:

      a. A court order directing such assistance signed by the authorizing judge; or
      b. A certification in writing by a person specified in s. 934.09(7)
      that no warrant or court order is required by law, that all statutory
      requirements have been met, and that the specified assistance is
      required, setting forth the period of time during which the provision of
      the information, facilities, or technical assistance is authorized and
      specifying the information, facilities, or technical assistance
      required.
      3. A
      provider of wire, oral, or electronic communication service, or an
      officer, employee, or agent thereof, or landlord, custodian, or other
      person may not disclose the existence of any interception or the device
      used to accomplish the interception with respect to which the person has
      been furnished an order under ss. 934.03934.09,
      except as may otherwise be required by legal process and then only
      after prior notice to the Governor, the Attorney General, the statewide
      prosecutor, or a state attorney, as may be appropriate. Any such
      disclosure renders such person liable for the civil damages provided
      under s. 934.10, and such person may be prosecuted under s. 934.43.
      An action may not be brought against any provider of wire, oral, or
      electronic communication service, or an officer, employee, or agent
      thereof, or landlord, custodian, or other person for providing
      information, facilities, or assistance in accordance with the terms of a
      court order under ss. 934.03934.09.
      (b) It is lawful under ss. 934.03934.09
      for an officer, employee, or agent of the Federal Communications
      Commission, in the normal course of his or her employment and in
      discharge of the monitoring responsibilities exercised by the commission
      in the enforcement of 47 U.S.C. ch. 5, to intercept a wire, oral, or
      electronic communication transmitted by radio or to disclose or use the
      information thereby obtained.
      (c) It is lawful under ss. 934.03934.09
      for an investigative or law enforcement officer or a person acting
      under the direction of an investigative or law enforcement officer to
      intercept a wire, oral, or electronic communication when such person is a
      party to the communication or one of the parties to the communication
      has given prior consent to such interception and the purpose of such
      interception is to obtain evidence of a criminal act.
      (d) It is lawful under ss. 934.03934.09
      for a person to intercept a wire, oral, or electronic communication
      when all of the parties to the communication have given prior consent to
      such interception.
      (e) It is unlawful to intercept any wire, oral, or electronic communication for the purpose of committing any criminal act.
      (f) It is lawful under ss. 934.03934.09
      for an employee of a telephone company to intercept a wire
      communication for the sole purpose of tracing the origin of such
      communication when the interception is requested by the recipient of the
      communication and the recipient alleges that the communication is
      obscene, harassing, or threatening in nature. The individual conducting
      the interception shall notify local police authorities within 48 hours
      after the time of the interception.
      (g) It is lawful under ss. 934.03934.09 for an employee of:

      1. An ambulance service licensed pursuant to s. 401.25, a fire station employing firefighters as defined by s. 633.30, a public utility, a law enforcement agency as defined by s. 934.02(10), or any other entity with published emergency telephone numbers;
      2. An agency operating an emergency telephone number “911” system established pursuant to s. 365.171; or
      3. The central abuse hotline operated pursuant to s. 39.201

      to
      intercept and record incoming wire communications; however, such
      employee may intercept and record incoming wire communications on
      designated “911” telephone numbers and published nonemergency telephone
      numbers staffed by trained dispatchers at public safety answering points
      only. It is also lawful for such employee to intercept and record
      outgoing wire communications to the numbers from which such incoming
      wire communications were placed when necessary to obtain information
      required to provide the emergency services being requested. For the
      purpose of this paragraph, the term “public utility” has the same
      meaning as provided in s. 366.02
      and includes a person, partnership, association, or corporation now or
      hereafter owning or operating equipment or facilities in the state for
      conveying or transmitting messages or communications by telephone or
      telegraph to the public for compensation.

      (h) It shall not be unlawful under ss. 934.03934.09 for any person:

      1. To
      intercept or access an electronic communication made through an
      electronic communication system that is configured so that such
      electronic communication is readily accessible to the general public.
      2. To intercept any radio communication which is transmitted:

      a. By any station for the use of the general public, or that relates to ships, aircraft, vehicles, or persons in distress;
      b. By
      any governmental, law enforcement, civil defense, private land mobile,
      or public safety communications system, including any police or fire
      communications system, readily accessible to the general public;
      c. By
      a station operating on an authorized frequency within the bands
      allocated to the amateur, citizens band, or general mobile radio
      services; or
      d. By any marine or aeronautical communications system.
      3. To engage in any conduct which:

      a. Is prohibited by s. 633 of the Communications Act of 1934; or
      b. Is excepted from the application of s. 705(a) of the Communications Act of 1934 by s. 705(b) of that act.
      4. To
      intercept any wire or electronic communication the transmission of
      which is causing harmful interference to any lawfully operating station
      of consumer electronic equipment to the extent necessary to identify the
      source of such interference.
      5. To
      intercept, if such person is another user of the same frequency, any
      radio communication that is not scrambled or encrypted made through a
      system that utilizes frequencies monitored by individuals engaged in the
      provision or the use of such system.
      6. To intercept a satellite transmission that is not scrambled or encrypted and that is transmitted:

      a. To a broadcasting station for purposes of retransmission to the general public; or
      b. As
      an audio subcarrier intended for redistribution to facilities open to
      the public, but not including data transmissions or telephone calls,
      when such interception is not for the purposes of direct or indirect
      commercial advantage or private financial gain.
      7. To
      intercept and privately view a private satellite video communication
      that is not scrambled or encrypted or to intercept a radio communication
      that is transmitted on frequencies allocated under subpart D of part 74
      of the rules of the Federal Communications Commission that is not
      scrambled or encrypted, if such interception is not for a tortious or
      illegal purpose or for purposes of direct or indirect commercial
      advantage or private commercial gain.
      (i) It shall not be unlawful under ss. 934.03934.09:

      1. To use a pen register or a trap and trace device as authorized under ss. 934.31934.34 or under federal law; or
      2. For
      a provider of electronic communication service to record the fact that a
      wire or electronic communication was initiated or completed in order to
      protect such provider, another provider furnishing service toward the
      completion of the wire or electronic communication, or a user of that
      service, from fraudulent, unlawful, or abusive use of such service.
      (j) It is not unlawful under ss. 934.03934.09
      for a person acting under color of law to intercept the wire or
      electronic communications of a computer trespasser which are transmitted
      to, through, or from a protected computer if:

      1. The owner or operator of the protected computer authorizes the interception of the communications of the computer trespasser;
      2. The person acting under color of law is lawfully engaged in an investigation;
      3. The
      person acting under color of law has reasonable grounds to believe that
      the contents of the communications of the computer trespasser will be
      relevant to the investigation; and
      4. The interception does not acquire communications other than those transmitted to, through, or from the computer trespasser.
      (3)(a) Except
      as provided in paragraph (b), a person or entity providing an
      electronic communication service to the public shall not intentionally
      divulge the contents of any communication while in transmission on that
      service to any person or entity other than an addressee or intended
      recipient of such communication or an agent of such addressee or
      intended recipient.
      (b) A person or entity providing electronic communication service to the public may divulge the contents of any such communication:

      1. As otherwise authorized in paragraph (2)(a) or s. 934.08;
      2. With the lawful consent of the originator or any addressee or intended recipient of such communication;
      3. To a person employed or authorized, or whose facilities are used, to forward such communication to its destination; or
      4. Which
      were inadvertently obtained by the service provider and which appear to
      pertain to the commission of a crime, if such divulgence is made to a
      law enforcement agency.
      (4)(a) Except
      as provided in paragraph (b), whoever violates subsection (1) is guilty
      of a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, s. 775.084, or s. 934.41.
      (b) If
      the offense is a first offense under paragraph (a) and is not for any
      tortious or illegal purpose or for purposes of direct or indirect
      commercial advantage or private commercial gain, and the wire or
      electronic communication with respect to which the offense under
      paragraph (a) was committed is a radio communication that is not
      scrambled, encrypted, or transmitted using modulation techniques the
      essential parameters of which have been withheld from the public with
      the intention of preserving the privacy of such communication, then:

      1. If
      the communication is not the radio portion of a cellular telephone
      communication, a cordless telephone communication that is transmitted
      between the cordless telephone handset and the base unit, a public land
      mobile radio service communication, or a paging service communication,
      and the conduct is not that described in subparagraph (2)(h)7., the
      person committing the offense is guilty of a misdemeanor of the first
      degree, punishable as provided in s. 775.082 or s. 775.083.
      2. If
      the communication is the radio portion of a cellular telephone
      communication, a cordless telephone communication that is transmitted
      between the cordless telephone handset and the base unit, a public land
      mobile radio service communication, or a paging service communication,
      the person committing the offense is guilty of a misdemeanor of the
      second degree, punishable as provided in s. 775.082 or s. 775.083.

      History.s.
      3, ch. 69-17; s. 1163, ch. 71-136; ss. 2, 3, ch. 74-249; s. 249, ch.
      77-104; s. 1, ch. 78-376; s. 187, ch. 79-164; s. 2, ch. 80-27; s. 1, ch.
      87-301; s. 2, ch. 88-184; s. 2, ch. 89-269; s. 1582, ch. 97-102; s. 18,
      ch. 99-168; ss. 7, 9, ch. 2000-369; s. 2, ch. 2002-72; s. 30, ch.
      2010-117.

      May 14th 2011 @12:52pm ( florida sttutes /chpater 843 obstucting justice unlawfuluse of police badges or other indicia of authority ) )


      Title XLVI

      CRIMES

      Chapter 843

      OBSTRUCTING JUSTICE
      View Entire Chapter

      843.085  Unlawful use of police badges or other indicia of authority.–It is unlawful for any person:

      (1)  Unless appointed by the Governor pursuant to chapter 354,
      authorized by the appropriate agency, or displayed in a closed or
      mounted case as a collection or exhibit, to wear or display any
      authorized indicia of authority, including any badge, insignia, emblem,
      identification card, or uniform, or any colorable imitation thereof, of
      any federal, state, county, or municipal law enforcement agency, or
      other criminal justice agency as now or hereafter defined in s. 943.045,
      which could deceive a reasonable person into believing that such item
      is authorized by any of the agencies described above for use by the
      person displaying or wearing it, or which displays in any manner or
      combination the word or words “police,” “patrolman,” “agent,” “sheriff,”
      “deputy,” “trooper,” “highway patrol,” “Wildlife Officer,” “Marine
      Patrol Officer,” “state attorney,” “public defender,” “marshal,”
      “constable,” or “bailiff,” which could deceive a reasonable person into
      believing that such item is authorized by any of the agencies described
      above for use by the person displaying or wearing it.

      (2)  To own or operate a motor vehicle marked or identified in
      any manner or combination by the word or words “police,” “patrolman,”
      “sheriff,” “deputy,” “trooper,” “highway patrol,” “Wildlife Officer,”
      “Marine Patrol Officer,” “marshal,” “constable,” or “bailiff,” or by any
      lettering, marking, or insignia, or colorable imitation thereof,
      including, but not limited to, stars, badges, or shields, officially
      used to identify the vehicle as a federal, state, county, or municipal
      law enforcement vehicle or a vehicle used by a criminal justice agency
      as now or hereafter defined in s. 943.045,
      which could deceive a reasonable person into believing that such
      vehicle is authorized by any of the agencies described above for use by
      the person operating the motor vehicle, unless such vehicle is owned or
      operated by the appropriate agency and its use is authorized by such
      agency, or the local law enforcement agency authorizes the use of such
      vehicle or unless the person is appointed by the Governor pursuant to
      chapter 354.

      (3)  To sell, transfer, or give away the authorized badge, or
      colorable imitation thereof, including miniatures, of any criminal
      justice agency as now or hereafter defined in s. 943.045,
      or bearing in any manner or combination the word or words “police,”
      “patrolman,” “sheriff,” “deputy,” “trooper,” “highway patrol,” “Wildlife
      Officer,” “Marine Patrol Officer,” “marshal,” “constable,” “agent,”
      “state attorney,” “public defender,” or “bailiff,” which could deceive a
      reasonable person into believing that such item is authorized by any of
      the agencies described above, except for agency purchases or upon the
      presentation and recordation of both a driver’s license and other
      identification showing any transferee to actually be a member of such
      criminal justice agency or unless the person is appointed by the
      Governor pursuant to chapter 354. A transferor of an item covered by
      this subsection is required to maintain for 2 years a written record of
      such transaction, including records showing compliance with this
      subsection, and if such transferor is a business, it shall make such
      records available during normal business hours for inspection by any law
      enforcement agency having jurisdiction in the area where the business
      is located.

      (4)  Nothing in this section shall prohibit a fraternal,
      benevolent, or labor organization or association, or their chapters or
      subsidiaries, from using the following words, in any manner or in any
      combination, if those words appear in the official name of the
      organization or association:  “police,” “patrolman,” “sheriff,”
      “deputy,” “trooper,” “highway patrol,” “Wildlife Officer,” “Marine
      Patrol Officer,” “marshal,” “constable,” or “bailiff.”

      (5)  Violation of any provision of this section is a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083. This section is cumulative to any law now in force in the state.

      History.–s. 1, ch. 91-163; s. 2, ch. 94-103.

      Copyright © 1995-2011 The Florida Legislature • Privacy StatementContact Us

      May 14th 2011 @12:46pm ( florida statutes ( chapter 918.12 or s.918.13/ relating to tampering with jurors and evidence ) )


      Title XLVII

      CRIMINAL PROCEDURE AND CORRECTIONS

      Chapter 918

      CONDUCT OF TRIAL
      View Entire Chapter

      918.13  Tampering with or fabricating physical evidence.

      (1)  No person, knowing that a criminal trial or proceeding or an
      investigation by a duly constituted prosecuting authority, law
      enforcement agency, grand jury or legislative committee of this state is
      pending or is about to be instituted, shall:

      (a)  Alter, destroy, conceal, or remove any record, document, or
      thing with the purpose to impair its verity or availability in such
      proceeding or investigation; or

      (b)  Make, present, or use any record, document, or thing, knowing it to be false.

      (2)  Any person who violates any provision of this section shall
      be guilty of a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.

      History.–s. 2, ch. 72-315.

      may 13th 2011 @6:29pm ( so i got an email today that my cashmire sweater cannot be found at a residence wher a little girl who looked like karne kahel…took items)

      I received an email today  from  a family i regularly babysit.  and such disappointing news….the khaki cashmere sweater is not in their possession….   the weird thing about t the day…..  the little girl looked almost exactly like Karen kahel that day.. with the long oval face.. the white blond hair and the freckles… it actually  almost scared me…. she looked so different… and her manners were different.. and when she went through  my pirate log in book  and took the treasure clue cards/the 6 Thomas the train bubbles and i was missing my cashmere sweater… well…  it was just another experience   to make me not believe in the goodness of people… and the honesty of people… and wondering when the dishonestly starts… as children? what a shame.. 

      I called my mother and she said  she will buy me another sweater.. it was a  sweater set… a matching sweater set… ugg….  but that is now two sweaters that have been ruined by these girls… who obviously don’t want me wearing anything tan or kaki…. UGG…. i even asked for a picture    this one was part of a sweater set…. the other was part of an outfit for a wedding…. my sisters wedding…

      so will have to add this to  a police report  to make sure that if by chance anyone actually does decide to be honest and give it back… i will be able to get it back.

       Dear                                                  Wednesday May 11th 2011 @ 3:02pm
      I
      hope this email finds you and your  family doing well.  I hope you had a
      nice Easter and Mother’s day.  I have been meaning to email you to ask
      if after your family left you were able to find my tan/khaki sweater. 
      It was a cashmere cardigan that was a part of a sweater set from Saks 5th
      Ave
        my mother had purchased for me for  me a few Christmas’s ago.  It
      had a tie in the back and the tag was purple and black.   it had a tiny
      hole in one of the sleeves where  my charm bracelet had caught on the
      threads.  I pretty much wore it with everything as it matched those tan
      or khaki Stubs an Wooten  shoes I always wear… ( the sweater is about
      the same color if you remember them and can’t recall the sweater color
      )  I think Christine may actually have the sweater( at least the back of
      it)  in a picture when she was taking pictures of me with the boys to
      send to her husband. 

      I have been praying/hoping/ wishing  that
      you have it.  I went through all my suitcases and closets and there is
      not a trace of it in my home at all. If you don’t have it then I  will
      have to contact the proper authorities in case it was stolen.  Please
      email me back either way so that I can follow through with the necessary
      steps to retrieve it. 

      I can be reached via email: 
      whatabtmary@yahoo.com
      maryjeanziska@mysearchforjustice.com
      maryjeanziskka@mygingerbreadman.com  

      Thank you for your kind attention to this email.

      Sincerely,
      Mary Jean Ziska        

       

      A Tender Loving Care Service

      Mary Jean Ziska   Assistant Director

      whatabtmary@yahoo.com