Author Archives: mary jean ziska

November 23rd 2010@6:40pm ( November 21st 2006 note problem with an old aol account)

 November 21st 2006
Not only was AOL  allowed access onto my computer but the entire process was done while I was not even  in my house.

I had a scheduled manicure for 9am i was running late and didn’t  even leave the house until 9:30.  Since i was too late for my apt i ended up gong out running errands than to work I didn’t  allow access for AOL  because it happened one other time a few weeks ago I went to log on and saw that an icon on my desktop was from AOL so i called Comcast cable and was told by one of the  gentleman that AOL  couldn’t have been downloaded by a hacker since i have privacy block and all the security for MacAfee he also said that someone would have to have been sitting right in front of my computer to access the internet.

* note:  this note actually also means someone had to have broken into my home and was trespassing into our complex and/had to sit at my computer to download the aol program. 

November 23rd 2010 @6:52pm( phone call problem with credit card password for nov. 21st 2006)

Today I called to make a payment on my credit card .  This card was the card issued after a renewal card did not show up at my home.

Today called to make a $953.00 payment on credit card spoke with:
shakira ( id#T3L433) and Her boss BaBa(id# EP13)  They said i could not make a payment over the phone because i needed a password on my account.

I never set up a password on my account.

Prior to accessing info. today and making a payment I had to send in a password request/ copy of forms and my social security #.    

Tuesday November 23rd 2010( letter to dean Peck ecomonic crime unit Naples florida- jan. 5th 2007)

 Attention : Dean Peck
Economic Crime Unit Naples Florida

Dear Dean Peck,                                              January 5, 2007

This letter is written to confirm our conversation this afternoon approximately 2:00pm.  We discussed the phone call I received concerning a gentleman calling to answer my inquiry for refinancing my home.  He was from a company: Triumph Funding Corporation and hot a toll free telephone number (516-422-6433 begin_of_the_skype_highlighting              516-422-6433      end_of_the_skype_highlighting).  He was able to quote me all my personal information yet used an email address hat I have never used.  The email address he used was Mary.Ziska@nomail.com.  He also mentioned that he received my inquiry on September 27th 2007 and i had not made an inquiry on line for his company at that time. 

I called your unit because i have had a lot of problems with identity”borrowing” Last year a gentleman that refinanced my home actually disappeared and “borrowed money” The company phones were disconnected even though I retained a layer.  still haven’t been able to retrieve the $2000.00 that was personally “borrowed ” by the broker.  This occurred approximately at the same time when the were 42-48 hits on my credit report some with various emails but most utilizing all my personal information. 
I am in the process of trying to fix all the damage that has occurred with my accounts with my home and with my life.  You mentioned that there was a booklet that you will sending concerning identity theft.  Thank you for the information.  I look forward  having my wonderful, nice and happy and problem free life back as soon as possible

You requested that I fax you this letter to attach to a report already on file .  I will retain a copy fo my reports and records.
Thank you for your kind attention in this matter.
Sincerely Yours,
Mary Jean Ziska    

Tuesday November 23rd 2010( police report:# 06-27161 8/18/2006)

sworn statement filed: August 18th 2006
Report #:  06-27161
content of report:

I entered into Bank of America @ Travila circle.  I came in to check on my bank account and was informed that my account was overdrawn.  I protested that was impossible since I had $1000.00 in my account as of my last statement.  The bank employee went through my account and informed me that a check for $804.94
( #1006) was rendered from my account.  She gave me a copy of the check and it is NOT my handwriting nor is it on past ordered checks.  There were also 50 checks ordered  without my consent and  I did not receive any checks.  Checks were written off my account # 1001/#1002( $1194.06)/#1003($664.87) #1004 (206.05)#1005 ($45.00) all the above checks were not my handwriting but using my signature.  I didn’t authorize anyone  to write checks from my account i will prosecute the people involved.

November 15th 2010 Bullying ( Bullycide )

I first heard about  a case that  went to trial  concerning bulling when  i learned about  Lori Drew and Megan Myer.   February 2008  

United states of America /United States district court for the central district of California ( plaintiff) vs. Lori Drew( defendant )  the case involved a 13 year old girl Megan Meier.

Grand Jury charges/ Indictment 18 USC 371:  Conspiracy;18 USC 1030(a) (2) (c),(c)  (2)  (ii):  Accessing Protected Computers to Obtain information; 18 USC  2(a), (b) :Aiding and Abetting and Causing an Act to be Done

*The intentional infliction of pain /humiliation

* willful and fraudulent 

*Lori Drew ” was conspiracy”_ people conspired to entrap a young girl with the express purpose of humiliating ( a form of torture)
torture/tortuous act: (  to intentionally inflict emotional distress)

*Conspiracy: co conspirators  knowingly conspired and agreed with each other  

*accessing protected computers without authorization=hacking

*”without authorization in excess of authorized access and by means of interstate communication obtain information from the computer to further a TORTIUS ACT
(definition of a tortious act:  namely intentional  infliction of emotional distress / violation of 18USC SS 1030(a) (2) (c)

*knowingly harassed/intimidated

definition of bulling:  when a person is picked on over and over again by an individual or group with more power ,  in terms of physical strength or social standing

If your child lets you know that he/she is being bullied Lener said your first response should be to validate your child’ feelings and let them know its NOT OK for someone to treat them like that 

 Proper Response of parent :  “Be supportive and let your child know that you’ll help then consult your child and ask how he/she would like you to get involved observed Rofey… Many  youngsters may ask their parents to take a hands off approach she said but she recommends setting some guidelines. Say something like It seems you have this situation in control right now but lets keep talking and checking in about it.

Rofey also recommends teach your child how to avoid situations that might lead to teasing or bulling and talking with your child  about how to reach out to adults if they need to 

Tess Health “Dealing with Bulling

ex). Kick a Ginger Day

ex) E investigates :  the documentary series E online :  Bullying /
Dillon sued owon case of $250,000.00.  Dr. Carol smith /
 *learning to trust

ex)Phibbie Prince
her bulling was meant to make her cry designed to humiliate her
staff knew about bulling
bulling became intolerable

ex)BullyPolice E-book
http://www.bullypolice.com/ebookhtml

http://www.bullycide.org
Bullycide In America  … Moms speak out about the bulling/suicide connection
Complied by Brenda High
“Much more than a mere expose of horrifying statistics, this book is a collection of personal letters to you, straight from a broken heart, about the most devastating case of bullycide ever.. the one that claimed the writer’s own child.  I applaud every author in these pages who has struggled in the depths of grief to tell the most painful story of their life, and I challenge America to respond to there tear-stained pages.”
author and journalist Neil Marr ( who coined the word Bullicide in Bullicide death at playtime, co -authored by the late Tim Field.

blog posts May 15th 2008 2:13pm
“They aren’t criminally prosecuting her ( lori Drew) for complicity in the suicide.  they indicted her on conspiracy to commit fraud.  The fraud is supported by the overt acts that resulted in the intentional  infliction of pain and /or humiliation but she isn’t being prosecuted for that pain and /or humiliation.  She’s being prosecuted for willful and fraudulent violation  of terms of  service and the like.  Sure it never would have gotten to this point if the girl hadn’t killed herself  but Drew isn’t being held criminally liable for her death.  If she was it would be manslaughter charge-not fraud” posted by Chris may 15th 2008 2:15:19 pm

My opinion( by mary jean ziska….i believe she( lori drew )  should have been charged with manslaughter! her direct actions caused a reaction and the death in a girl. grave miscarriage of justice….

“This woman broke the law- that’s easy.  You agree to teams of service( especially when it comes to  harassment) then it’s pretty clear.
Some have argued that she shouldn’t be held accountable for the s girl’s death.  I can see why you might argue this , but that’s not  what the law says.  
Should this woman serve 20 years?  Probably not , but I think she should serve jail time, the outcome of this woman’s actions was the suicide of a young girl. 
As for culpability, I think you have to see this woman’s action as criminally reckless, she probably didn’t KNOW what the outcome would be but she must have known it was a real possibility. Like a drunk driver, she mus be culpable under the law.
Hopefully this case will continue to be widely reported as a warning to others. 
Posted by JEZ May 15th 2008 2:20:18pm
 

Tuesday November 23rd 2010@3:13pm( article on lori drew and Megan Meier from Wired.com)

Lori Drew Indicted in My Space Suicide Case–Updated by Kim Zettler May 15th 2008 3:01:41pm from WIRED

A federal grand jury issued an indictment against a woman in Missouri accused of creating a fake My Space page to bully a 13 year old girl.  the girl committed suicide as a result of the bullying.

Lori Drew was indicted this morning in Los Angeles on federal charges for fraudulently using an account on My Space.  The indictment charges Drew in four counts —
one
count for conspiracy and three counts “for accessing protected computers without authorization to obtain information to inflict emotional distress”

according to a press release.  The later charge relates to the Computer Fraud and Abuse Act.

The indictment (pdf.) alleges that Drew and her co-conspirators violated My Space’s terms of service, which requires registrants to provide truthful registration information and refrain from soliciting personal information from anyone under 18 or using registration information and refrain from soliciting  personal information from anyone under 18 or using information obtained from  My Space services to harass or harm other people among other terms.

If convicted on all four counts, Drew could face up to 20 years in federal prison. 

“This adult woman allegedly used the internet to target a young teenage girl, with horrendous ramifications”  said United States Attorney Thomas P. O’Brien.  “After a thorough investigation  we have charged Ms. Drew with criminally accessing My space and violating rules established to protect young vulnerable people.  Any adult who uses the internet to a social-gathering website to bully or harass another person, particularly a young teenage girl needs to realize that their actions can have serious consequences. ” 

Drew’s co-conspirators include her daughter and another teenager, Ashley Grills, who helped set up the MySpace account and sent comments to Megan Meier that contributed to her suicide.  It was reported earlier this year that Grills was given immunity for her cooperation with investigation. 

When asked at the press conference what this might mean for other people who engage in similar behavior, O’Brien responded that , “Anyone who engages in harassment and violates the law similar to Ms. Drew is subject to investigation and prosecution on the right facts.”

Tuesday November 23rd @3:02pm ( florida statute “stalking”)

 784.048 f.s.      Abstract:

 (2) Any person who willfully, maliciously, and repeatedly follows, harasses, or cyberstalks another person commits the offense of staling, a misdemeanor of the first degree, punishable as provided in s.  741.30 or after any other court-imposed prohibition of conduct toward the subject person or that person’s property, knowingly, willfully, maliciously,and repeatedly follows, harasses, or cyberstalks another person commits the offense of aggravated stalking a felony of the third degree.

Tuesday November 23rd 2010 @2:03pm ( email to police dated thursday september 4th 2008)

this blog entry is a recreation of the email sent to the police department  (ccsoweb@colliersheriff.net) on Thursday September 4th 2008 @ 2:23pm I am typing this blog on Tuesday November 23rd at 2:04pm

To Whom it may concern,                                                    9/04/2008

I am writing today Thursday September 04, 2008 to reconfirm conversations i have had these past weeks with various police officers.  I am writing to receive a copy of the report that should have been written and to find the progress of the case.

I was and still am missing personal items from my home and called the police @1am 08/28/08, after working on my computer for A Tender Loving Care Service and
 A TLC Kindergarten Preparatory and Etiquette School.  I  discovered items missing while i was putting my computer away.  The items missing were from a locked briefcase when I place my computer every evening .  The reason i now lock up my compute when not in use is due to an incident that occurred December 2007 see case #07-400-79.  On 8/28/08 Officer Hurley badge #2308 came4 to my home after i reported the missing items.  He spoke with me concerning the incident however he didn’t take any notes nor did he file a report for the occurrence.  He did call detective Chris Allen and told him of the incident .  Chris Allen was the detective that had been assigned the case in December 2007.

Within the next following days I went to the substation off Vanderbilt drive and met with detective Linquist ( badge#        )who took notes and told me he would email me a copy of the report so i could keep in my files.  I have not received a report to date.  I called and spoke with  Detective Sannicaro badge#:  2649) on the phone from the front guard gate of my community a few nights ago and told him of more items missing.  Thee are personal photos and letters of mine,  and files on/from  clients and their homes and children.  He told me to not bother Chris  Allen ( badge # 2511) since he was off work but to try him the following day.  Therefore  to make sure I’m not bothering anyone, I am emailing to find out the progress and to obtain a copy of the report. 

Occurrences such as these have been occurring since 2003 when incidences of peeping tom/threatening messages for me and my family began.  For a while Chris Allen had police coming to my home and checking on everything when i gave him my schedule of when i would leave my home.  This seemed to alleviate the occurrences for the time  he had the officers checking on everything.  I am afraid that the same people may be resuming their offenses since as far as i know no one was charged for trespassing or  for stealing.

I was scheduled to do a babysitting for a family in Autumn woods and told detective Linquist.  Once i had told the detectives the sitting was canceled.  As i told Chris Allen, these occurrences would happen when i would leave my home and work or whenever i left my home for scheduled dates or times.  Should I give the detectives a list of clients?  I would hate for someone to compromise their lives, or homes and definitely compromise their children’s safety. 

items missing:
personal photos from a backpacking summer in Europe
Personal photos from  going to school in  France
personal photos from  Saudi Arabia
personal letters
white combination lock from locked suitcase
files from business concerning web hosting accounts and web design
also reported email or hacking problem to internet provide concerning tampering with email addresses, email messages and business emails that composed two years worth of correspondence.
files missing containing personal information on clients in Pelican marsh, Port Royal, and various areas in Naples.  Information contained in files:  phone numbers, email addresses personal information on clients children and on their homes.  Ie: directions, and sometimes security instruction.

Thank you for your kind attention in theis matter. I would appreciate a response as soon as possible.
Sincerely,
Mary Jean Ziska
email:  whatabtmary@yahoo.com 

November 18th 2010 @9:50pm ( article: Caller ID spoofing aboutto be outlawed)

Caller ID Spoofing about to be outlawed
two bills making their way through the House and Senate will outlaw caller ID spoofing.
By Ken Fisher/ last updated June 27th 2007 *8:49PM 

Today the  US Senate Committee on Commerce Science and Transportation has passed S. 704 a bill that would make it a crime to spoof caller Id Dubbed the “truth in Caller ID Act of 2007” the bill would outlaw causing “any caller identification service to transmit misleading or inaccurate caller identification information “via” any telecommunications service or IP-enabled voice service.”  Law enforcement is exempted from the rule.

While  we all probably wish this would outlaw caller ID blocking( think “private”) it won’t The proposed legislation only targets misleading caller ID spoofing such as pranking your buddy by sending along “Bush GHW” with your next VoIP call.

“Caller ID provides critical informatin to whose who rely it ” said Senator Ted Stevens (R-AK) in a statement.  “HOwever, when this technology is used to deceive people it can endanger personal privacy and safety.  This bill will help strengthen the ability  of the FCC and states to combat these nefarious practices”  We know Stevens is just sick of getting calls from “Tubes, Internet” and Mr. Giant Truck”

The bill was introduced in February by Senmator Bill Nelson (D-Fl) and Senator Olympia Snowe(R-ME) A similar act has been introduced in the House and passed, making it very likely that this little bill will indeed someday become a law. 

On a serious note, caller ID spoofing can be used to bypass dial-in systems that use your calling location to determine who you are. 

November 18th 2010 @10:13pm/articel from AARP: “Ask Sid: Who Is That Really on MY Caller ID?” by sid Kirchheimer

 Article concerning spoofing: 

copyright 1995-2009 AARP.  All rights reserved.  A Member of AARP Global Network

From AARP Bulletin  today/  Ask Sid:  Who is that really on my caller id?

By Sid Kirchheimer/ AARP Bullitan Today July 3, 2009
Q.  How does telephone spoofing work an is it legal? 

A.  Caller ID spoofing lets callers hide their real phone number and instead display another number on the recipient’s called ID service, along with the name of the company or individual registered for that number.  Such services, widely available  on the internet and costing as little as $10.00 per house of calling time, are legal and have traditionally been used by collection agencies police private investigators and others who want to hide their identities. 

But increasingly, scammers are using spoofing services to commit identity theft.  They pretend to be calling from a bank, credit card company or a government agency and the recipients may feel safe revealing personal information such as bank account and social security numbers because the name and phone number of the legitimate company or agency appears on their caller ID.

Once a scammer has subscribed to spoofing service getting the victim’s caller ID to display a fake number is easy.  The spoofer simply enters the recipients number and the fake caller ID number on a Web form or telephone touch pad, and the service completes the call.

The practice has become even more widespread with the growth of the technology known as voice over Internet protocol.  VoIP phone services such as Skype and Vonage use computer addresses instead of actual phone numbers to connect calls over the Internet.  That means their subscribers can choose any area code and phone number that’s available in the entire county and scammers can take advantage of that flexibility to choose a deceptive number. 

FLORIDA IS THE ONLY STATE THAT HAS BANNED CALLER ID SPOOFING MAKING IT A FIRST DEGREE MISDEMEANOR AND SOME OTHER STATES ARE CONSIDERING  SIMILAR LAWS.

No matter where you live, people who have signed up for the National Do Not Call Registry ( file complaints)
about unsolicited spoofing calls with the Federal Trade Commission or their STATE ATTORNEY GENERAL’s OFFICE

The bottom line:  Because spoofing is easily done and enforcement has been las, you should never provide sensitive information to any caller.  Instead, look up the number of the company that claims to be calling and dial it yourself.