The document is a newsletter from the AUT Law School Dean, Professor Charles Ricketts. In his message, he discusses the following:
- He has been impressed by the quality of staff and students in his first 8 months as Dean.
- The Law School is undertaking a review of the LLB program structure, content, and pedagogy with changes expected to take effect in 2017.
- Two recent events that the Law School hosted - a workshop for students with the Public Defence Service and a visit from the Attorney-General.
- The newsletter plays a role in fostering relationships between the Law School and legal community to ensure the curriculum remains current and relevant.
IP Institute Presentation on Internet LawBennet Kelley
This document summarizes key issues in internet law in 2013. It discusses the scope of immunity for interactive computer services under Section 230 of the Communications Decency Act and exceptions carved out by courts. It also covers ongoing debates around net neutrality and efforts by states to require online retailers to collect sales taxes. Emerging issues include new generic top-level domains, regulatory approaches to sharing economy businesses, copyright enforcement by ISPs and networks, and the 10th anniversary of CAN-SPAM legislation.
City St.Paul, has Assessed Fees, by Theft,Trespass,Treason, Stealing Cars,Trailer,DL, by Incompetant City Attorneys, triggering Tax Delinquency Ramsey Dist. Crt. 62cv-09-1163, Affiant pai the Property Taxes $900.xx challenging the Arbitrary,Excessive Assessments, "taking" without Compensation 42USC3631
Dun and Bradstreet D-U-N-S Update Screen Captured Proof Roxanne Grinage Caugh...Roxanne Grinage
This document provides contact information for Roxanne Grinage of HireLyrics Administrative Services and details allegations of fraud and identity theft committed by the City of Philadelphia Department of Human Services against HireLyrics. Specifically, it claims that DHS stole HireLyrics' Dun & Bradstreet number and registered it under DHS's address, likely to fraudulently bill federal grant funds. It urges the contacted individuals and organizations to investigate these allegations and alleges ongoing corruption and illegal actions by DHS and family court judges in Philadelphia.
The document appears to be a collection of correspondence and other documents related to Mark Hilbert's career and job searches. It includes references to educational credentials, test scores, copyright registrations, and online career profiles. However, many of the details are unclear, redundant or contradictory. Many of Hilbert's online accounts on job search platforms have been blocked or are corrupted.
The document provides various details about Mark Hilbert including personal information, education history, test scores, career portfolio links, and references. It notes that his LinkedIn, Twitter, and other online accounts have been canceled. The document also references legal exams, applications, and correspondence indicating his accounts on job sites like ZipRecruiter have been blocked or locked without explanation.
The document summarizes malware spam received in January 2013. It received a total of 8 messages, including ones related to Viagra, jobs, banking, and criminal background checks. The messages contained malicious links, attachments, and sender information that indicated they were sent from compromised systems. They often used link masking and domain proxy services to hide the true source.
The document is a newsletter from the AUT Law School Dean, Professor Charles Ricketts. In his message, he discusses the following:
- He has been impressed by the quality of staff and students in his first 8 months as Dean.
- The Law School is undertaking a review of the LLB program structure, content, and pedagogy with changes expected to take effect in 2017.
- Two recent events that the Law School hosted - a workshop for students with the Public Defence Service and a visit from the Attorney-General.
- The newsletter plays a role in fostering relationships between the Law School and legal community to ensure the curriculum remains current and relevant.
IP Institute Presentation on Internet LawBennet Kelley
This document summarizes key issues in internet law in 2013. It discusses the scope of immunity for interactive computer services under Section 230 of the Communications Decency Act and exceptions carved out by courts. It also covers ongoing debates around net neutrality and efforts by states to require online retailers to collect sales taxes. Emerging issues include new generic top-level domains, regulatory approaches to sharing economy businesses, copyright enforcement by ISPs and networks, and the 10th anniversary of CAN-SPAM legislation.
City St.Paul, has Assessed Fees, by Theft,Trespass,Treason, Stealing Cars,Trailer,DL, by Incompetant City Attorneys, triggering Tax Delinquency Ramsey Dist. Crt. 62cv-09-1163, Affiant pai the Property Taxes $900.xx challenging the Arbitrary,Excessive Assessments, "taking" without Compensation 42USC3631
Dun and Bradstreet D-U-N-S Update Screen Captured Proof Roxanne Grinage Caugh...Roxanne Grinage
This document provides contact information for Roxanne Grinage of HireLyrics Administrative Services and details allegations of fraud and identity theft committed by the City of Philadelphia Department of Human Services against HireLyrics. Specifically, it claims that DHS stole HireLyrics' Dun & Bradstreet number and registered it under DHS's address, likely to fraudulently bill federal grant funds. It urges the contacted individuals and organizations to investigate these allegations and alleges ongoing corruption and illegal actions by DHS and family court judges in Philadelphia.
The document appears to be a collection of correspondence and other documents related to Mark Hilbert's career and job searches. It includes references to educational credentials, test scores, copyright registrations, and online career profiles. However, many of the details are unclear, redundant or contradictory. Many of Hilbert's online accounts on job search platforms have been blocked or are corrupted.
The document provides various details about Mark Hilbert including personal information, education history, test scores, career portfolio links, and references. It notes that his LinkedIn, Twitter, and other online accounts have been canceled. The document also references legal exams, applications, and correspondence indicating his accounts on job sites like ZipRecruiter have been blocked or locked without explanation.
The document summarizes malware spam received in January 2013. It received a total of 8 messages, including ones related to Viagra, jobs, banking, and criminal background checks. The messages contained malicious links, attachments, and sender information that indicated they were sent from compromised systems. They often used link masking and domain proxy services to hide the true source.
This document provides details about vulnerabilities in the New York City subway fare collection system. It describes the various devices used, including vending machines and turnstiles, and explains how to decode the magnetic stripe on MetroCards to view stored information like ride balances and card types. The document aims to educate readers about the inner workings of the system while exposing potential security issues.
Human Trafficking Court Case Against FacebookSean Gugerty
This document is a response opposing Facebook's motion to stay trial court proceedings during its mandamus petition regarding the applicability of Section 230 of the Communications Decency Act. It argues that (1) the 2018 FOSTA amendments clarified that Section 230 does not apply to sex trafficking claims like Jane Doe's, (2) basic preemption principles show that Section 230 does not preempt consistent state laws, and (3) a stay would prejudice Jane Doe given Facebook's resistance to discovery efforts thus far in the case.
The document discusses ethical issues related to using social media in litigation. It notes that "friending" opposing parties on social media who are represented by counsel is prohibited, but public information on their social media can be viewed. Subpoenas can be issued for social media information, but private messages are protected, and fishing expeditions are not allowed. Authentication of social media evidence can also be challenging. Monitoring jurors' social media use during trial is allowed but direct contact is prohibited. "Friending" judges on social media may be allowed or prohibited depending on the jurisdiction.
David Campbell earned law degrees from the University of Detroit Mercy School of Law and the University of Windsor Faculty of Law through a joint JD/LLB program in 2004. This allowed him to be licensed to practice law in both the U.S. and Canada. After graduating and passing both the Michigan and Ontario bar exams, Campbell worked at the Toronto law firm McCarthy Tétrault and then returned to Bowman and Brooke in Troy, Michigan as an associate attorney. Campbell's dual licensure allows him to represent corporate clients in product liability, commercial litigation, and other cases on both sides of the U.S.-Canada border.
Malware spam received in March 2013 is summarized as follows:
- A total of 10 malware spam emails were received in March 2013 containing malicious links or attachments. The majority contained links to websites hosting malware.
- Common link domains and hosting IPs traced back to registration proxies and ISPs in countries like the UK, Poland, Germany, Italy and Morocco, obscuring the original senders.
- Several emails contained malicious attachments that could modify files, security settings and registry entries upon opening, posing security risks to users.
This document provides information and advice about internet safety for kids. It discusses common techniques used by cyber child sex offenders to lure children, such as befriending them and gradually soliciting private information. It lists resources for monitoring kids' internet use and warns parents to be aware of personal details kids post online. The document stresses the importance of open communication between parents and kids about internet safety.
The writer expresses frustration with SEC rules that prohibit raising seed capital from non-accredited investors and restrict public discussion of fundraising. She argues that the unclear rules force startups to violate regulations or conceal compliance efforts. She demands that the SEC allow public discussion of fundraising in advance of finalized JOBS Act rules to go into effect in 2015. The writer believes that with honest intent, startups should be able to connect with potential investors and discuss plans before accepting any funds.
This document is a competitive analysis report from SEO, LLC for Brian C. Bateman of SplinternetMarketing.com. It analyzes rankings for 45 keywords and one URL across 4 search engines. The report finds that 52 listings improved in ranking, 25 stayed the same, and 47 declined. It provides statistics on rankings by position and search engine as well as detailed results for each keyword and URL across AOL.com.
The document contains responses from 5 students - Courtney, Kenneth, Zach, Lawson, and Matt - to questions about online privacy. Most of the students were generally in favor of protecting individual privacy online, though some acknowledged tradeoffs between privacy and other issues like law enforcement investigations. A majority of responses supported privacy in questions related to search histories, social media content, and antivirus software protecting against government malware.
This document discusses the challenges posed by increasing cybersex and pornography enabled by advancing technology. It notes growing areas of concern like online child exploitation, revenge porn, and normalization of violence. The landscape tends toward increasing harm, though prosecution faces challenges. Effects on society include changing views of relationships and gender. The church struggles to address this issue, as porn use is common yet shameful. Cybersex has become an elephant in the room that hinders hearing the gospel. More work is needed to help Christians struggling with porn.
This document provides guidance for staff on e-safety and appropriate use of social media and technology. It discusses potential risks of using sites like Facebook and communicating with students online. Staff are advised not to friend students on personal accounts. The document also covers issues like cyberbullying, online grooming and privacy settings. Staff learn about classifying online risks, signs of cyberbullying, and how to support students who experience these issues. They are provided contacts for organizations that can help with online safety concerns. The goal is to empower staff to make wise choices about technology and help keep students safe online.
On Defending Against Doxxing: Benjamin BrownEC-Council
This document provides an overview of doxxing and strategies for defending against it. Doxxing is defined as publicly releasing private identifying information about a person without their consent. This can enable harassment, stalking, swatting and real-world attacks. The document then discusses common doxxing methods like exploiting social media, public records, search tools and data brokers to reveal personal details. It concludes by recommending defense methods such as tightening privacy settings, using strong unique passwords, opting out of data broker services and being mindful of the information shared online.
The Department of Justice prosecutes most large scale child porn cases. Darren Chaker uploads this in depth article about the intricate details prosecutors for the US Attorney to seek and obtain convictions and keep children safe.
This document discusses a political hacking scandal in New Jersey involving a Republican staff member, Jeffrey Land, who gained unauthorized access to over 1,000 computer files and documents belonging to Democratic politicians from 1988 to 1990. The document alleges that Land's superiors were aware of his activities but saw no issue with it. The document also claims the scandal revealed corruption in the political system, including pay-for-play relationships between contributions and legislation. Both political parties want to avoid addressing issues of election funding reform that this scandal exposed.
This document discusses the issue of revenge porn through multiple perspectives. It begins by defining revenge porn and sharing stories from victims about how it has negatively impacted their lives. It then discusses the perspectives of the people who operate revenge porn sites, viewing it as just a business. Next it shares the views of attorneys fighting against revenge porn on behalf of victims and trying to shut down sites. Legislators who have proposed laws banning revenge porn are discussed. Commentators provide analysis on the misogyny of revenge porn sites and debate around Section 230 immunity. The document concludes by introducing the founder of the Internet Law Center, which addresses cyber law issues.
Cooper Law Partners prides itself on effectively advocating for maximum compensation in injury cases. Our lawyers have one mission: to win for you. We refuse to accept any payment for our services until we win or successfully settle your case. We would be happy to discuss how we can help you.
This email from Scott Farmer announces a new Account Manager initiative to the recipient. It explains that the company's biggest growth challenge is increasing business from existing customers. A new Account Manager position will be created to directly manage and grow the top 300 customer accounts at each location. Fifteen positions will be available, and the recipient is asked to consider interviewing for one of the roles.
Councilmember BJ Williams Garland Texas obstructing hispanic developmentAccion America
The document discusses a pre-submittal meeting scheduled for a property located at 3161 Broadway Boulevard in Garland, Texas. The prospective developer, John Rose, will be represented by his engineer consultant, Scott Caruthers. City staff provide background on previous discussions with Rose about entitlements, including recommended solutions for ingress/egress and questions about signage, landscaping, and setbacks. Staff encourage rezoning the property to a Planned Development district to expedite the application process and provide more flexibility given potential variances needed. Rose has not decided whether to fully or partially demolish the existing building.
The document announces two upcoming holiday events for the Washington DC Chapter of Concerns of Police Survivors (C.O.P.S.): a Christmas dinner party on December 12th and an annual tree lighting ceremony on December 9th. It also provides information on other C.O.P.S. initiatives like Project Blue Light and AmazonSmile fundraising. Details are provided on reserving spots for the dinner party and directions for both events.
Social Media and Online Investigation Of ClaimsDano0403
This document summarizes strategies for using social media and electronic discovery in litigation. It discusses asking plaintiffs about their social media use and electronic devices in discovery. It provides tips for seeking authorizations and court orders to obtain information from social media sites like Facebook, MySpace, and Twitter. It also discusses searching social media and the internet to find information about plaintiffs that could be relevant, like postings inconsistent with injury claims.
The document summarizes a typical work day for "Bob Kent" at his company Edge Corp, where his internet usage is monitored and restricted by the IT department based on the company's access policies. During his day, Bob tries to access various websites that are blocked for reasons like containing adult content, being sports sites only allowed at certain times, or being known sources of spyware. He also tries to download a file from an email that is detected as a virus and deleted. The IT department messages provide explanations for restrictions and redirections to comply with the company's policies.
This document provides details about vulnerabilities in the New York City subway fare collection system. It describes the various devices used, including vending machines and turnstiles, and explains how to decode the magnetic stripe on MetroCards to view stored information like ride balances and card types. The document aims to educate readers about the inner workings of the system while exposing potential security issues.
Human Trafficking Court Case Against FacebookSean Gugerty
This document is a response opposing Facebook's motion to stay trial court proceedings during its mandamus petition regarding the applicability of Section 230 of the Communications Decency Act. It argues that (1) the 2018 FOSTA amendments clarified that Section 230 does not apply to sex trafficking claims like Jane Doe's, (2) basic preemption principles show that Section 230 does not preempt consistent state laws, and (3) a stay would prejudice Jane Doe given Facebook's resistance to discovery efforts thus far in the case.
The document discusses ethical issues related to using social media in litigation. It notes that "friending" opposing parties on social media who are represented by counsel is prohibited, but public information on their social media can be viewed. Subpoenas can be issued for social media information, but private messages are protected, and fishing expeditions are not allowed. Authentication of social media evidence can also be challenging. Monitoring jurors' social media use during trial is allowed but direct contact is prohibited. "Friending" judges on social media may be allowed or prohibited depending on the jurisdiction.
David Campbell earned law degrees from the University of Detroit Mercy School of Law and the University of Windsor Faculty of Law through a joint JD/LLB program in 2004. This allowed him to be licensed to practice law in both the U.S. and Canada. After graduating and passing both the Michigan and Ontario bar exams, Campbell worked at the Toronto law firm McCarthy Tétrault and then returned to Bowman and Brooke in Troy, Michigan as an associate attorney. Campbell's dual licensure allows him to represent corporate clients in product liability, commercial litigation, and other cases on both sides of the U.S.-Canada border.
Malware spam received in March 2013 is summarized as follows:
- A total of 10 malware spam emails were received in March 2013 containing malicious links or attachments. The majority contained links to websites hosting malware.
- Common link domains and hosting IPs traced back to registration proxies and ISPs in countries like the UK, Poland, Germany, Italy and Morocco, obscuring the original senders.
- Several emails contained malicious attachments that could modify files, security settings and registry entries upon opening, posing security risks to users.
This document provides information and advice about internet safety for kids. It discusses common techniques used by cyber child sex offenders to lure children, such as befriending them and gradually soliciting private information. It lists resources for monitoring kids' internet use and warns parents to be aware of personal details kids post online. The document stresses the importance of open communication between parents and kids about internet safety.
The writer expresses frustration with SEC rules that prohibit raising seed capital from non-accredited investors and restrict public discussion of fundraising. She argues that the unclear rules force startups to violate regulations or conceal compliance efforts. She demands that the SEC allow public discussion of fundraising in advance of finalized JOBS Act rules to go into effect in 2015. The writer believes that with honest intent, startups should be able to connect with potential investors and discuss plans before accepting any funds.
This document is a competitive analysis report from SEO, LLC for Brian C. Bateman of SplinternetMarketing.com. It analyzes rankings for 45 keywords and one URL across 4 search engines. The report finds that 52 listings improved in ranking, 25 stayed the same, and 47 declined. It provides statistics on rankings by position and search engine as well as detailed results for each keyword and URL across AOL.com.
The document contains responses from 5 students - Courtney, Kenneth, Zach, Lawson, and Matt - to questions about online privacy. Most of the students were generally in favor of protecting individual privacy online, though some acknowledged tradeoffs between privacy and other issues like law enforcement investigations. A majority of responses supported privacy in questions related to search histories, social media content, and antivirus software protecting against government malware.
This document discusses the challenges posed by increasing cybersex and pornography enabled by advancing technology. It notes growing areas of concern like online child exploitation, revenge porn, and normalization of violence. The landscape tends toward increasing harm, though prosecution faces challenges. Effects on society include changing views of relationships and gender. The church struggles to address this issue, as porn use is common yet shameful. Cybersex has become an elephant in the room that hinders hearing the gospel. More work is needed to help Christians struggling with porn.
This document provides guidance for staff on e-safety and appropriate use of social media and technology. It discusses potential risks of using sites like Facebook and communicating with students online. Staff are advised not to friend students on personal accounts. The document also covers issues like cyberbullying, online grooming and privacy settings. Staff learn about classifying online risks, signs of cyberbullying, and how to support students who experience these issues. They are provided contacts for organizations that can help with online safety concerns. The goal is to empower staff to make wise choices about technology and help keep students safe online.
On Defending Against Doxxing: Benjamin BrownEC-Council
This document provides an overview of doxxing and strategies for defending against it. Doxxing is defined as publicly releasing private identifying information about a person without their consent. This can enable harassment, stalking, swatting and real-world attacks. The document then discusses common doxxing methods like exploiting social media, public records, search tools and data brokers to reveal personal details. It concludes by recommending defense methods such as tightening privacy settings, using strong unique passwords, opting out of data broker services and being mindful of the information shared online.
The Department of Justice prosecutes most large scale child porn cases. Darren Chaker uploads this in depth article about the intricate details prosecutors for the US Attorney to seek and obtain convictions and keep children safe.
This document discusses a political hacking scandal in New Jersey involving a Republican staff member, Jeffrey Land, who gained unauthorized access to over 1,000 computer files and documents belonging to Democratic politicians from 1988 to 1990. The document alleges that Land's superiors were aware of his activities but saw no issue with it. The document also claims the scandal revealed corruption in the political system, including pay-for-play relationships between contributions and legislation. Both political parties want to avoid addressing issues of election funding reform that this scandal exposed.
This document discusses the issue of revenge porn through multiple perspectives. It begins by defining revenge porn and sharing stories from victims about how it has negatively impacted their lives. It then discusses the perspectives of the people who operate revenge porn sites, viewing it as just a business. Next it shares the views of attorneys fighting against revenge porn on behalf of victims and trying to shut down sites. Legislators who have proposed laws banning revenge porn are discussed. Commentators provide analysis on the misogyny of revenge porn sites and debate around Section 230 immunity. The document concludes by introducing the founder of the Internet Law Center, which addresses cyber law issues.
Cooper Law Partners prides itself on effectively advocating for maximum compensation in injury cases. Our lawyers have one mission: to win for you. We refuse to accept any payment for our services until we win or successfully settle your case. We would be happy to discuss how we can help you.
This email from Scott Farmer announces a new Account Manager initiative to the recipient. It explains that the company's biggest growth challenge is increasing business from existing customers. A new Account Manager position will be created to directly manage and grow the top 300 customer accounts at each location. Fifteen positions will be available, and the recipient is asked to consider interviewing for one of the roles.
Councilmember BJ Williams Garland Texas obstructing hispanic developmentAccion America
The document discusses a pre-submittal meeting scheduled for a property located at 3161 Broadway Boulevard in Garland, Texas. The prospective developer, John Rose, will be represented by his engineer consultant, Scott Caruthers. City staff provide background on previous discussions with Rose about entitlements, including recommended solutions for ingress/egress and questions about signage, landscaping, and setbacks. Staff encourage rezoning the property to a Planned Development district to expedite the application process and provide more flexibility given potential variances needed. Rose has not decided whether to fully or partially demolish the existing building.
The document announces two upcoming holiday events for the Washington DC Chapter of Concerns of Police Survivors (C.O.P.S.): a Christmas dinner party on December 12th and an annual tree lighting ceremony on December 9th. It also provides information on other C.O.P.S. initiatives like Project Blue Light and AmazonSmile fundraising. Details are provided on reserving spots for the dinner party and directions for both events.
Social Media and Online Investigation Of ClaimsDano0403
This document summarizes strategies for using social media and electronic discovery in litigation. It discusses asking plaintiffs about their social media use and electronic devices in discovery. It provides tips for seeking authorizations and court orders to obtain information from social media sites like Facebook, MySpace, and Twitter. It also discusses searching social media and the internet to find information about plaintiffs that could be relevant, like postings inconsistent with injury claims.
The document summarizes a typical work day for "Bob Kent" at his company Edge Corp, where his internet usage is monitored and restricted by the IT department based on the company's access policies. During his day, Bob tries to access various websites that are blocked for reasons like containing adult content, being sports sites only allowed at certain times, or being known sources of spyware. He also tries to download a file from an email that is detected as a virus and deleted. The IT department messages provide explanations for restrictions and redirections to comply with the company's policies.
This document summarizes a presentation on computer security and cybersecurity. It discusses what hackers want, including personal information, credentials, financial information, and computing resources. It covers social engineering techniques like phishing emails and spear phishing. It emphasizes the importance of online reputation management and provides tips for protecting yourself such as using strong passwords, not clicking links in emails, using protection software, and keeping software updated. The overall message is the importance of cybersecurity awareness and practicing good cyber hygiene.
This document provides a summary and critique of various strategies for reforming Child Protective Services (CPS) based on the experience and perspective of Rosalind McAllister, a family advocate.
The key points made are:
1) Protests, petitions, and rallies are unlikely to directly help reunite families or reform the system as judges are not supposed to consider outside media influences.
2) Reforms must happen at the state and local level as CPS is not a major federal issue due to its small scope.
3) Media involvement risks portraying parents and advocates as "crazy" if claims can't be backed by solid evidence from official reports and documents.
EMAILS - Kentucky Commission on Human RightsVogelDenise
This document contains correspondence between Vogel Denise Newsome and the Kentucky Commission on Human Rights regarding Newsome's discrimination complaint. Newsome provides the Commission with contact information and notifies them that she has completed the discrimination questionnaire and is out of town, providing an alternate mailing address. Newsome requests the Commission correspond with her at this new address regarding her complaint.
The document is an exchange of emails between Ramon Morris of the Governor of Florida's office and Friedrich Siegel regarding a request for a meeting with Governor Rick Scott. In the first email, Morris replies that the governor is unable to meet at this time but to keep them informed of future invitations. In the second email, Morris acknowledges receipt of the meeting request and notes that the scheduling team is currently reviewing it. Siegel's response proposes a meeting agenda to present an innovative financial system called ELPAS-DEF that could eliminate the causes of financial crises without new state debt.
AB C ABC Ports Ltd Birdland, USA 12345 Randy Ready .docxransayo
This letter from ABC Ports Ltd. responds to a request for information from the Department of Homeland Security regarding the port's operations. ABC Ports acknowledges the critical importance of the port's continued operations to US national security. The attached report contains sensitive information and should be protected under Critical Infrastructure Information rules. ABC Ports looks forward to continuing its work with the Department of Homeland Security.
The document provides a summary of briefings given to personnel deployed aboard HMCS PROTECTEUR. It covers command leadership, family support resources, legal issues, postal procedures, and pay and benefits including leave travel allowance. Key topics discussed include the ship's deployment schedule and operations, services from the Military Family Resource Centre, powers of attorney, wills, mailing addresses and prohibited items, and calculating LTA reimbursement amounts for different home locations of family members.
Nsa responds 3 snowden media run-bys with usgAnonDownload
This email exchange summarizes communications between John Young and Cindy B of the NSA regarding Mr. Young's FOIA request. Cindy B informs Mr. Young that his original request is too broad and requires clarification. Mr. Young then narrows the scope of his request to only include communications between specific journalists and government agencies regarding getting pre-publication review of Edward Snowden materials. Cindy B acknowledges that the narrowed request should be sufficient.
This document summarizes the services provided by Creditwrench, a company that teaches consumers how to defeat abusive debt collection practices without lawyers. It includes contact information for Creditwrench, links to videos and podcasts, and a question and answer forum where the CEO provides advice to consumers dealing with debt collectors and lawsuits. The CEO advises consumers on strategies for defeating lawsuits in local courts and provides information on filing federal lawsuits against collectors who violate laws.
1. The document describes tracing an email from "Dr. Grace Lawal" back to its origin. It was determined to be spam through invalid email addresses and lack of records for the named individual.
2. By examining the email headers, the path of the email was traced from an IP address in Nigeria to an ISP named Simba Technology. Simba Technology revealed the IP belonged to a customer who ran a cyber cafe, preventing identification of the individual.
3. Further steps like keylogging could potentially identify the sender, but were not taken due to the non-critical nature of the spam email.
Feldman Feldman & Associates, PC is an immigration law firm located in San Diego, California. The firm’s experienced immigration attorneys combine top-notch legal expertise with excellent client service in all areas of immigration law.
The document summarizes Better Business Bureau activities in northeast Ohio and scams reported to the BBB. It discusses survey results finding that millennials are more vulnerable to scams than previously thought. It also announces upcoming BBB events, webinars, and discounts for accredited businesses. Common scams include IRS, government grant, debt collection, sweepstakes, and tech support scams. The BBB assists over 7 million people annually in the region and handles thousands of customer complaints and business reports.
The document is a webpage for The Doan Law Firm, P.C., a personal injury law firm located in Houston, Texas. It provides information about the law firm, including its contact details and address in Houston. It states that the law firm can help clients recover compensation through personal injury or wrongful death claims for injuries caused by others' negligence, recklessness, or dangerous acts.
High School Life Vs. College Life Compare And ContraErika Nelson
Romeo and Juliet could have lived if:
1) Romeo listened to his bad feeling and did not go to the party where he met Juliet.
2) Romeo stayed longer on the balcony with Juliet before leaving for Verona.
3) Romeo did not kill Tybalt, which would have led to his death sentence anyway for killing Mercutio.
Decoding the Data Breach Framework: How to Prevent Exfiltration LIVE WebcastThomas LaPointe
In today’s fast evolving cybersecurity backdrop, maintaining an up-to-date and efficient data breach security has been a tough challenge for companies all over the world. Data attackers are no longer particular with the size of their target and may attack at any moment. Effective detection and prevention of data breach or any form of illegal release of data and information from a company’s system, requires robust security system and close-monitoring from the top level management.
In a two-hour LIVE Webcast, a notable panel of thought leaders and professionals assembled by The Knowledge Group will offer the audience with an in-depth discussion of the fundamental aspects of a data breach. The panel will also provide the audience with the best practices to avoid common risk and pitfalls in a data breach.
Key topics include:
The Anatomy of a Breach
Risks and Legal Challenges in Data Breach
Data Exfiltration Methods
Identifying, Detecting and Preventing Data Breach
Recent Trends and Developments
To view the webcast go to this link: https://youtu.be/d-QbhiToGLs
To learn more about the webcast please visit our website: http://theknowledgegroup.org
Similar to YouSendIt child pornography, the dark side of the government (20)
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
How to Setup Default Value for a Field in Odoo 17Celine George
In Odoo, we can set a default value for a field during the creation of a record for a model. We have many methods in odoo for setting a default value to the field.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
220711130088 Sumi Basak Virtual University EPC 3.pptx
YouSendIt child pornography, the dark side of the government
1. HnitsdFtjltssFsnstsHARTSENATEOFFICEBUILDING
SUITE112
WASHINGTON,DC 20510-0505
(202 224-3553
http ://boxer. senate. gov/contact
March23,2010
Ms. SaroashSyed
1400 TechnologyLn., Apartment| 524
Petaluma,CA 94954-6935
DearMs. Syed:
I am writing to acknowledgeyour letter to SenatorBoxer. I apologizefor the delay in responding
to your requestfor assistance.
I sympathizewith your concernandunderstandyour desireto havethis matterresolved.
However, the issueyou haveoutlined appearsto fall underthejurisdiction of the Stateof California.
Therefore,I am forwarding your correspondenceto the Attorney General,Edmund G. Brown Jr., for his
reviewandconsideration.
Thank you for writing. Do not hesitateto contactSenatorBoxer in the future shouldyou require
assistancewith a matterconcerningthe federal government.
Sincerely,
EricJos6Vizcaino
Directorof ConstituentServices
EIY:az
cc:Hon.EdmundG.BrownJr.
17OOMONTGOMERY STREET 312 NORTH SPRINGSTREET 501
'I'
STREET 25OOTUTARE STREET 600
'B'
STREET 201 NORTH
'E'
STREET
SUITE 240 SUITE 1748 SUITE7_600 SUITE5290 SUITE2Z4O SUITE210
sAN FBANCISCO, CA 941 11 LOS ANGELES,CA 90012 SACRAMENTO,CA 95814 FRESNO,CA 93721 SAN DIEGO,CA 92101. SAN BERNARDTNO,CA 92401
(415) 403-.0100 (213) 894-5000 l9"t6l 448-2787 (559) 497-5109 (679) 239-3884 (909)888-8525
FOREIGN RELATIONS
fuO*r(b,
PRINTED ON RECYCLED PAPER
2. HnitsdFtstssFsnstsWASHINGTON,DC 20510-0504
http://feinstein.senate.gov
June4,2010
COMMITTEEONAPPROPRIATIONS
COMMITTEEONTHEJUDICIARY
COMMITTEEON RULESAND
ADMINISTRATION
Ms.SaroashSyed
1400TechnoloryLn, Apartment1524
Petaluma,California 94954
DearMs. Syed:
I amforwardingonto youtheresponseI havereceivedfromtheU.S.
Departmentof Justiceaboutyourcase.
I hopethatthisresponseis helpfulandthattheinformationoutlinedin it will
clari$rthesituationfor you. If youhavefurtherquestions,or if thereis anyway
my offrcecanhelpyouin thefuture,I hopeyouwill contactmeagain.
Sincerely,
DianneFeinstein
UnitedStatesSenator
DF:mn
FRESNO OFFICE:
2500 TULARESTREET
SurE 4290
FREsNo.CA 93721
(559) rA5-7430
LOS ANGELES OFFICE:
11111 SANTAMoNrcl Bourevrno
SU|TE915
Los ANGELES,CA 90025
(310) 91+7300
SAN DIEGOOFFICE:
750BSTREET
SurE 1030
SANDrEGo,CA 92101
(619)231-9712
SAN FRANCISCO OFFICE:
One Posr Srneer
SurE 2450
SANFRANcrsco,CA 94104
(415) 39H707
3. Sr,lI i:RAl'rli€eOGF'FlCe
lir":'2; :.ii:il
A - i ; . - , . . _ . * i - * . - . <
U.S.Departmentof Justice
FederalBureauof Investigation
Washington,D. C. 20535-0001
May 1.2, 201-0
Honorabl-e Dianne Feinstei-n
United States Senator
Suite 2450
One Post Street
San Francisco, CA 94L04
Dear Senator Feinstein:
I am writing in response to your letter dated April 9,
20L0, orr behalf of your constituent, Ms. Saroash Syed, and her
complaint concerning the potential possession and lack of
reporting of child pornography by YouSendlt.com.
Upon speaking with representatives in the Innocent
Images Progrdm at FBI Headquarters, I have been been made aware
of Ms. Syed's communications with our Agents concerning this
matter in the past. I was al-so advised that YouSendlt.com is in
compliance with the Child Protection and Sexual Predator
Punishment Act of 1998, which mandates companies to report
instances of child pornography and other obscene material to law
enforcement.
I hope this information wil-I be of assistance to you.
Sincerely,
_,/ ,/
.rVZh ,r 4-
g7:A^^4. /{^boraon flt. Snow
Assistant Di-rector
Cyber Dj-vision
4. lItailq oItalKIl
From:
Sent:
To:
Subject:
Delivery@YouSendlt.com
Tuesday,September13,20058:45AM
hotmouthforuse@yahoo.com
YouSendltNotificationSent: video_boys_fucking_very_gd_v5b.mpeg
Hello fnom YouSendlt,
Your file called "-video_boys_fucking_very_gd_v5b.mpeg" (1,6@2KB) was sent to
Mai o.!:S.hafe@vahqoeroups . com.
PIease keep the following link for youn records in case your recipient misplaces it. The link
will expire in 7 days and will be available for a limited numberof downloads.
Regulan link (fon all web bnowsens):
htSr : / / s34..vquseldit . qgn/d . aspx] i*:3 L98FI K8a5X5U]_K41ZCASSG4VH
This email was automatically genenated, please do not reply to it. Fon any inquiries feel
f nee to email s.Uppott@vr:usend!!-.com
The YouSendlt Team
File too big fon email? Tny yousendrt at http:./lwurwr.yousendit.com
5. Knaltd unarKn
From: PurpleGhost[pg456pg@yahoo.com]
Sent: Tuesday,December27,20052:39PM
To: YSISupport
Subject: RE:[YOU_SEND_IT_LINKS]YouSendltDeliveryNotification:Moviegayporn- 2 littleboys12
and14yearoldhavingtheirfirstsexoralanaljerkoff.mpg
Thankyou for your kind supportandhelpto stampout thesecriminals.
Greatlyappreciateit!
Thanksfor givingus a greatYSI website,by theway!
Wishingyourteama happynewyear!
P G i
YSISupport<supnofri:vouscn$ wrote:
We have deleted the file, and yes this is illegal.We have reportedit to the FBI and to the US NationalCenter for
Missing& ExploitedChildren(flcmec.org).
Regards.
YouSendltSuppolt
hltD:/,/u,ritrr'.t ()r-rr'icndit.c()ln
From:PurpleGhost[mailto:pg456pg@yahoo.com]
Sent:Sunday,December25,200512:55PM
To: YOU_SEND_IT_LINKS@yahoogroups.com.au; support@yousendit,com
Subject: Re:[YOU-SEND-IT-LINKS]YouSendltDeliveryNotification:Moviegayporn- 2 littleboys12and14
yearoldhavingtheirfirstsexoralanaljerkoff.mpg
THIS clip lS TOTALLY ILLEGAL, andthisclip shouldbebannedandreportedto thepolice!
Unacceptable!
nIuu In2-l(a:lihero.it wrote:
,E{{ilr)hr}ro&trilrorunr:ing?Curc .r'ouror,crb.ltervitlr } ouSonrllt!
i Hello,
i
; Youhavea filenamed"Moviegayporn- 2littleboys12and 14yearoldhavingtheir
, firstsex oralanaljerk off.mpg"(2219KB)from alexdo23@libero.itwaitingfor
, download.
Yo, canclickonthefollowinglinkto retrieveyourfile.The linkwillexpirein 7 days
: andwillbe availablefor a limitednumberof downloads.
:
I Movieqav porn- 2 littlebovs12 and 14vearold havingtheirfirstsexoralanalierk
r off.mps (2219 KB)
l-
i v l
U
8. rt tctttu rrt tqtnt I
From:
Sent:
To:
Subject:
AdamSorkin[asorkin@law.harvard.edu]
Wednesday,August03,200510:00PM
abuse@yousendit.corn
illicitmaterial
HeIIo,
I accidentally clicked on this link, and it took me to a video on your website. This video
was child pornography.
I am sending you the link so you can investigate, and so that you can neport this user to the
authorities.
http :.1/s30.vousendi! . comlcL.aspx?id=07HHCIY-OZI,I5ST2YFTSZAIYVBLX
Thanks,
Adam
8 EvengreenSquane, Apt 3
Somerville, MA A2'J,43
asotkin{d].aw. harva nd. e:LU
cell: 44O-574-t4I@
9. KhalidShaikh
From:
Sent:
To:
Subject:
RanjithKumaran[ranjith@yousendit.com]
Friday,September08,20064:03PM
KhalidShaikh;Thoma'sVincent
FW: Searchwarrant
HiTom,
I got a callfromLisa(departnrentofjusticeattorrrey)whois concernedthatthe fewsetsof datathatyoupulledforthe FBI
is notconsistentandthecasemay bedisrnissedif sheshowsthejudgethedata. Forexamplecertainfilesaresaidto be
downloadedX tinresbutlessthanX lP addresseswereprovided.
So you needto provideeither;
A) the rernainingfilesand lP addresses
or
B) a letterexpiainingthatwe cycleourfilesevery7 daysandour logsso the datawas notpreserved
KhalidcanyoLrhelpTompullthisdatatogether?| hadbeenhelpingoutwhileyouwereoutonvacation.lf we'reunable
to reconcilethe datato Lisa'ssatisfactiontheymay needto moveon thewarrantandcomeinto do an auditof servers
andiogs(she'dprefernotto though)^
R
Fromr Freitas,LisaMarie [mailto:LisaMarie.Freitas@usdoj.gov]
Sent: Friday,September08, 20062:22 PM
To: RanjithKumaran
Cc: BrianCoughlin
Subject: Searchwarrant
Ranjith,
Pursuantto ourtelephoneconversation,we requirethefollowingpursuantto thesearchwarrantsent:
1) Theremainingdocumentedvideoclipswiththe followingfilelDs:
-1FF75DCE67935FDA
-3895370A61ED9085
-734F2792081E9DFg
-82C8DD9F1660FB17
-983ECF1431F41744
-9A568F972CzF7778
-F428294378162A8A
2) ThefollowingvideoclipswiththefilelDs of : 3EE0D9B41D416C1A
9E080169044EFD8F
c6920A833578D82E
werefistedon the logsemailed,however,do notappearonthe chartsentbyThomason 07128106.Pleaseidentify
theseclipsas to theiroriginandthe clipsthemselvesalongwithall lP addressesof anyonethatdownloadedthesefiles
needto be provided.
3) The chartprovidedlistseachfileby lD andthe correlatingtimesdownloaded.However,the lP addresses
providedby emailon 09/06/06do notmatchtheamount
of timesdownloaded.Forexample,thefirstfilelD is 1317C9D30AC36784withthe amountof timesdownloaded
listedas 43. Only30 lP addresseswereprovidedforthisfileid. Furthermore,thefilewithlD 698E0BFD55BD3AB0
11. L2272430.wmv
KUMACRI.WMV
si lent%2OHiI 1 partO5.rar
si lent%2oH'iI I . part0z. rar
eigcupgirl . exe
Rvsong2in1.exe
2.jps
1.jpq
PI RATES%Z0o F%2OTHE%2OCARIBBEAN. par t l-2 . r ar
ch27_2006_7_18-]-9-5-44 . rnvb
2. jpg
3comovieMe.wmv
lvtusic%20Rnti%20a1cohol. rar
Tai sumnuk.rar
THAITANIUM%20_
I fiIename I downloadsI gigabytes I
I fi I ename
12272430.wmv
NaNa_CD2. part06. rar
KUMAeRI.WmV
601-3d2acab4a818d. j pq
1.jpg
osT%2OThe%20tmpossibl e%2001--08%20. rar
F01-%20u.H.T
4%2}rawter. rar
x. rar
Rvsong2in1.exe
si gcupgirl . exe
kai pang.rar
L00%2Odays%2}wt th%Zomr . ar ro gant . par t 12 . r ar
2.jps
video.scr
I PIRATES%20oF%20THE%20CARIBBEAN.part20. rar
2605.020999908447|
I pTRATES%20oF%20rHE%2ocARrBBEAN.partl_8. rar
1_01-0.596752t66748|
| !2272430.wmv
629.2990451-80902
I rogether. rar
958.3l_3356488943
I m-b-m-t%20D2.rar
4299.957358492538|
| 601-3d2acab4a818d.jpg
0. 596270901r_5r_
| 1.jpg
0.75053620e904 |
I pol'icew'ithoL.exe
1_1_9.262866957113|
Rage2
abuse
I downloads I gigabytes I
s5376
11435
6371-
6272
5456
4834
4706
4657
4t69
4031
381_3
3431
3l_54
3t-07
2888
1_334.81_978579051_8
L70.7L77L9089240
21-7.80800LL47583
2L4.423447370529
354.981_r_65528297
190.5547866728L6
0. 386041-762307
o.522L778266t3
155. 307352542877
L24.76L498072185
0.069392689504
259.37t362078935
70.477569153532
l_23.905059402809
t34 .482979774475
76L. 493788296357
274.52595531_9405
L12.547679420561
o.46449LLL7746
0. 591-1-5831_0883
l_10.435439264402
2L8.3792t565r_192
1-54.898305845447
63.8979416191_58
L63.94649519491_9
229.3454L9444144
r-1_5.02r_536818705
L20.922923088074
0.055343081-243
1.018307894468
3r-590
8422
7538
6764
672L
5454
5l_61_
4809
4533
4]-59
3525
3397
3246
304r_
2776
-----+
I fi 1ename
I
I downloads I gigabytes
69928 |
27L28 |
26L06 |
rL240 |
1_01_54|
8683 |
8s33 |
7627 I
12. Reference:
bltp :1lbronxdaJvq.qov/fcnmelverimq.htm
Case:ChildPornographyon the Internet
The internetcan providea platformto commit crimesagainstchildren.In the
privacy of his home, thirty-five-year-oldSeth Ritchie uploaded child sex
assault/abuseimagesin June2005throughyousendit.com.Thissite allowsfor the
transferof largefilesover the internet.Ritchietradedand exchangedpicturesand
videoclipsof childrenbeingsexuallyassaulted.Thechildrenpicturedrangein age
from 12 yearsto as youngas toddlers.
Site administratorsfrom the companyyousendit.combecameconcernedand
notifiedthe NationalCenter for Missingand ExploitedChildren(NCMEC).Once
NCMEC investigatorsdetermined that the material in question was "child
pornography,"they tracedthe sourceof the materialto Ritchie'saddressin the
Bronx and contactedthe NYPDComputerCrimesSquad.Detectivesexecuteda
searchwarrantat Ritchie'shome and seizeda computerhard drive, floppydiscs
and compactdiscscontaininghundredsof imagesof childrenengagingin sexual
acts with adults. Ritchie'scomputerwas recoveredalong with 69 CDs,two VHS
tapes,two floppydisks,and L2 DVDs,all containingchildsex abuseimages.Many
of the imagesinvolvedchildrenyoungerthan four yearsold engagingin sexual
actswith adults.
AlthoughRitchiehasan arrestrecord,this wasthe first time he was prosecuted
for a crime of this nature. Ritchietried to argue that he sufferedfrom a mental
illness,bothas a justificationfor his behaviorandto helpmitigatehissentence.
On December7, 2006, Ritchiepleadedguilty to two counts of promotinga
sexualperformanceby a child,a ClassD felony.Hissentenceis pending.
13. Reference:
http ://www. ice.govlpilnews/ newsreleases/articles/07081Tlasvegas.htm
Pahrumpmiddleschoolteacherchargedwith possessingchild pornography
LASVEGAS- A fifth grade teacher with the Nye County School District appeared in
federal court yesterday to answer to chargesof possessingand receivingchild
pornographyover the Internet,followingan investigationby U.S. Immigrationand
CustomsEnforcement(ICE),
MichaelGogerty, 4I, and a residentof Las Vegas, was taken into custody yesterday
morning by ICE agents in the parking lot of a LasVegasarea shoppingcenter.
Gogertyis employedat the HafenElementaryschool in Pahrump,Nev.,where he
has taught for the last two years. Schooldistrict officialsadvise that Gogerty has
been suspendedwithout pay.
Accordingto the affidavitfiled in supportof the criminalcomplaint,the investigation
into Gogerty began after ICE receiveda tip from the Toronto PoliceServicesSex
Crime Unit that a child pornographyvideo file had been postedon the Internet via
"yousendit.com."Subscriberinformationsuppliedby the Internet providerled ICE
agents to the Las Vegasaddress where Gogerty resides.
Duringa consensualsearchof Gogerty'shome, investigatorsdiscoverednumerous
imagesand videofilescontainingchild pornographyon his computer.Agentsseized
more than 200 CDs and floppy diskswhich,accordingto Gogerty,containedimages
of prepubescentminorsengagedillicitsexualconduct.Furtherinvestigation
determinedthat Gogerty'scomputercontainedmore than 250 video fileswith names
indicatingchild pornography.
"This case is particularlytroubling becauseof the suspect'spositionof trust, and it is
a clear reminder of ICE's resolveto search out predators who use the Internet to
sexuallyexploit innocentchildren,"said RichardCurry, assistantspecialagent in
charge of the ICE office of investigationsin Las Vegas. "Some predators mistakenly
believethe anonymityof cyberspaceshieldsthem from scrutiny; in fact, their use of
computers and the Internet have given us new tools in our enforcement efforts to
protectchildren."
At yesteday'shearing,the judge heldthat Gogertywas a dangerto the community
and ordered him to remain in custody. If convictedof the charges,Gogerty faces a
maximum30 yearsin prison,and 9500,000fine.
Gogerty'sarrest is part of Operation Predator,an ongoing ICE enforcement initiatsive
launchedin 2003 to identify, investigate,arrest and, in the case of foreign nationals,
deport child sex predators.Overall,the initiativehas resultedin more than 10,000
arrestsnationwide,includingmore than 85 in Nevada.
ICE encouragesthe reportingof suspectedchild predatorsand any suspiciousactivity
through its toll-freehotline.The number, 1-866-DHS-2ICE,is monitored24 hoursa
day. Suspectedchildsexualexploitationor missingchildrenmay be reportedto the
NationalCenter for Missing& ExploitedChildren,an Operation Predatorpartner, at
1-800-843-5678 or http :/ / www.cybertipline.com.
14. Al prefrrred$tock PurchaseAgreernentby andbstwsentheCompanyandccrtainof the
my's investorsdated December29" 2004 (the "$*ne s AI Prcfernd ttoclc Pwchase
3,15 Sngupelpe$tq.
owesdefened ShaikhandKlalid
in thc*gpegate*Inount (the-'EracntiveDefeneil PaY
t
ible PromissoryNote datedasof May 27,2W5 i*susd to CambrianFund' lJ-C in the
ipalarnountof $1W,0O0(thc*C'nnrlrian PromksoryNote')'
is madEto the KorbaOffer l"rtter.
is madeto the KumaranOfferktter.
is madeto theKhalid ShaikhOffer [,etter-
is madeto theAmir ShaikhOfferl,ener.
ingAgrcementby andbetweentheCompanyandSanchayBanerjeedatedasof
{the"fianerjt e Consulting A gruewenl").
ingAgreementby andbetwecntheCornpanyandMayankOoyaldatedasof lanuaryI'
{the"Gayal Consuhing Agreemant").
ingAgreementby andbet'ffeen&e Coru-panyandNikhil M. Pateldatedasof JanuaryI'
"PalelConsulting Agruement")'
Agreementby andbctweentheCompanyandFrancisWu datedasof January1,2m4
ConsiltingAgreewent").
SyndicationAgreementby andbetweentheCompanyandCNET Networks,lnc. dated
?005tthe"CNETAgreenent"l-
Agrecmentby andbetweentheCompanyandTheExecutiveSuitedatedDecarnber2?,
"SsntrClara SubIaase").
Agreemcntby andbetweenthe CompanyandDefenderTechnologiesGroup,LL,C
,d, t6, 20O4,including related SalesOrder dated November 16, 2004 (the
Agrecment").
Netwo{kSalesOrderby andbetweentheCompanyandBeyondtheNetworkdated
, 2004and Ecyond the Network SalesOrder by and bstween thc Compury,Td
Netrvorkdated April 18, 2005 (collectivcly, the "Beyonil tht Networ* St/r;s
l
?{66?/000r0/bocg/15d!I5$l.3
15. ffi#w,',,ffi$ SaroashSyed<saroash.syed@gmail.com>
i..i l, ,! ii
".:
j,
Phoneconversationon 02,19.2A10at about0825hr with
Ms.SaroashSyed,a reportingpartyof felonycrimethat
doesnotyet havean SJPDcasenumber.
Johnson,David<DAVID.JOHNSON@sanjoseca.gov> Fri,Feb19,2010at 8:56AM
To:saroash.syed@gmail.com
Thisphonecallwasnot recorded.I willdeliverthe documentsto an investigatorfor followup.I willsendcopies
of thisinformationinternallyto organizeassistance.
Ms.Syedwaspresentat the SanJosePoliceDepaftment2 or 3 weeksago,At that time, shespoketo an
officerat the Info Center.Ms.Syedwastryingto tell the policeaboutchildpornographybeingstoredknowingly
by companypersonnelon the networkof YouSendlt.Nopolicereportwasmadeand Ms.Syedwasencouraged
bythedeskofficerto sendherinformationby mailto the HighTechCrimesUnit.
Ms.Syedmailedthe informationasa USPSPriorityMailenvelopewithdeliveryconfirmation.I havethe packet
of documentsthatshowdatesrangingfor theyears2005and2006.Oneemail,dated09-08-2006wasto Ms.
LisaMarieFreitasa TrialAttorneyat the USDOJ(LisaMarie.Freitas(Qusdoj,gov, (202)353-0263)andrefersto
SABrianCoughlirtasthe caseagent.SACoughlin'sphonenumberisgivenas(443)220-5526.Itappearsthe
personwhowasinvolvedin thecasewasRanjithKumaran(ranjith@vousendit.com).
Ms.Syedcanfindoutthe methodsfor gettingaccessto the informationon the servers.
We havediscussedourrequirementsto obeythe lawsof searchandseizureandouraccessto informationthat
is not publiclyavailablewillrequirea searchwarrant.I did notaskMs.Syedto violatethe lawor actasan
investigatorin thismatter.
I haveagreedto meetwith Ms.Syedaftershereturnsfromout of stateto discusshowshehascometo know
thingsandevaluatewhatcan bedonewiththe informationthatsheknows.
Ofc.DavidJ. Johnson#2238
SiliconValleyICACTasKorce/ SanJosePoliceDepartment
201W MISSIONST
SANJOSECA95110