• Re: The revolution we need starts in the mirror

    From Laz Mann@21:1/5 to Taro Tsujimoto on Fri Sep 22 15:06:27 2023
    On Friday, September 22, 2023 at 2:53:25 PM UTC-7, Taro Tsujimoto wrote:
    On Sep 22, 2023, Laz Mann wrote
    (in article<3dd761d8-d528-4fe7...@googlegroups.com>):

    johnhenry.us

    Get a job

    paypal.me/johnhenryus

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Janithor@21:1/5 to Laz Mann on Fri Sep 22 15:07:03 2023
    x-no-archive: yes

    On 9/22/2023 3:06 PM, Laz Mann wrote:
    On Friday, September 22, 2023 at 2:53:25 PM UTC-7, Taro Tsujimoto wrote:
    On Sep 22, 2023, Laz Mann wrote
    (in article<3dd761d8-d528-4fe7...@googlegroups.com>):

    johnhenry.us

    Get a job

    paypal.me/johnhenryus

    I can't, you blocked me.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Laz Mann@21:1/5 to All on Fri Sep 22 14:42:06 2023
    johnhenry.us

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Taro Tsujimoto@21:1/5 to All on Fri Sep 22 17:53:19 2023
    On Sep 22, 2023, Laz Mann wrote
    (in article<3dd761d8-d528-4fe7-b7d0-3dff54e89bcfn@googlegroups.com>):

    johnhenry.us

    Get a job, child molester.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From %@21:1/5 to Janithor on Fri Sep 22 15:24:08 2023
    Janithor wrote:
    x-no-archive: yes

    On 9/22/2023 3:06 PM, Laz Mann wrote:
    On Friday, September 22, 2023 at 2:53:25 PM UTC-7, Taro Tsujimoto wrote: >>> On Sep 22, 2023, Laz Mann wrote
    (in article<3dd761d8-d528-4fe7...@googlegroups.com>):

    johnhenry.us

    Get a job

    paypal.me/johnhenryus

    I can't, you blocked me.

    but he apologised

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Taro Tsujimoto@21:1/5 to All on Fri Sep 22 18:35:28 2023
    On Sep 22, 2023, Laz Mann wrote
    (in article<d5cb6862-2e2f-4676-8af9-2a478adcc90dn@googlegroups.com>):

    On Friday, September 22, 2023 at 2:53:25 PM UTC-7, Taro Tsujimoto wrote:
    On Sep 22, 2023, Laz Mann wrote
    (in article<3dd761d8-d528-4fe7...@googlegroups.com>):

    johnhenry.us

    Get a job

    paypal.me/johnhenryus

    Nobody here wants to send money to a lazy grifter who is also a sexual predator. Just eat the bullet.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Kara Mac@21:1/5 to Taro Tsujimoto on Sun Sep 24 07:08:31 2023
    On Friday, September 22, 2023 at 6:35:34 PM UTC-4, Taro Tsujimoto wrote:
    On Sep 22, 2023, Laz Mann wrote
    (in article<d5cb6862-2e2f-4676...@googlegroups.com>):
    On Friday, September 22, 2023 at 2:53:25 PM UTC-7, Taro Tsujimoto wrote:
    On Sep 22, 2023, Laz Mann wrote
    (in article<3dd761d8-d528-4fe7...@googlegroups.com>):

    johnhenry.us

    Get a job

    paypal.me/johnhenryus
    Nobody here wants to send money to a lazy grifter who is also a sexual predator. Just eat the bullet.

    Laz Man is right!! Look in the mirror- is that a person who will let easily manipulated people be robbed of their hard earned money by the likes of John Henry?? No?? GOOD FOR YOU!!!
    Join the Back Channel Brigade! Stalk that greedy grifter, and when you see someone falling for his game? Message them! Direct them here with a nice link so they get the real picture!!
    Thank you Laz Man for motivating good people to revolt against the likes of JOHN HENRY DEJONG (for google searches so McDs doesnt put a dangerous leftist on the fryolator)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Liz Bentley@21:1/5 to Kara Mac on Sun Sep 24 18:27:52 2023
    On Sun, 24 Sep 2023 07:08:31 -0700, Kara Mac wrote:

    On Friday, September 22, 2023 at 6:35:34 PM UTC-4, Taro Tsujimoto wrote:
    On Sep 22, 2023, Laz Mann wrote (in
    article<d5cb6862-2e2f-4676...@googlegroups.com>):
    On Friday, September 22, 2023 at 2:53:25 PM UTC-7, Taro Tsujimoto
    wrote:
    On Sep 22, 2023, Laz Mann wrote (in
    article<3dd761d8-d528-4fe7...@googlegroups.com>):

    johnhenry.us

    Get a job

    paypal.me/johnhenryus
    Nobody here wants to send money to a lazy grifter who is also a sexual
    predator. Just eat the bullet.

    Laz Man is right!! Look in the mirror- is that a person who will let
    easily manipulated people be robbed of their hard earned money by the
    likes of John Henry?? No?? GOOD FOR YOU!!! Join the Back Channel
    Brigade! Stalk that greedy grifter, and when you see someone falling for
    his game? Message them! Direct them here with a nice link so they get
    the real picture!!
    Thank you Laz Man for motivating good people to revolt against the likes
    of JOHN HENRY DEJONG (for google searches so McDs doesnt put a dangerous leftist on the fryolator)

    SUMMARY

    Cyberstalking generally refers to the use of the Internet or other
    electronic communication to harass, threaten, or intimidate someone. Its prevalence is unknown, but it is a major problem that may presage more
    harmful behavior, including physical violence, according to a 1999
    federal report.

    Federal law criminalizes cyberstalking. And 46 states, including
    Connecticut, have adopted stalking or harassment laws that explicitly incorporate electronic forms of communication, according to the National Conference of State Legislatures (NCSL). Two Connecticut statutes are sufficiently broad to cover some cyberstalking conduct. One statute
    requires the perpetrator to make a threat to the victim and thus does not appear to apply to situations that do not involve a threat, even if the
    victim fears for his or her safety. Another appears to require the
    perpetrator to communicate directly with the victim (e.g., email) and
    thus does not appear to apply to other Internet postings and third-party harassment.

    According to the 1999 federal report, (1) state cyberstalking laws should
    be crafted broadly to encompass the wide range of cyberstalking conduct,
    but must protect constitutionally protected speech, and (2) federal law
    should prohibit the “transmission of any communication in interstate or foreign commerce with intent to threaten or harass another person where
    such communication places another in reasonable fear of death or bodily injury.”

    WHAT IS CYBERSTALKING?

    Black's Law Dictionary (7th Ed., 1999) defines cyberstalking as “the act
    of threatening, harassing, or annoying someone through multiple email
    messages, as through the Internet, esp. with the intent of placing the recipient in fear that an illegal act or an injury will be inflicted on
    the recipient or a member of the recipient's family or household.”

    Certain Internet capabilities facilitate cyberstalking by increasing the capacity to contact potential victims. These include chat rooms, bulletin boards, newsgroups, instant messaging, and other web communication
    devices. Also, the Internet provides a quick, inexpensive, and efficient
    means to collect and disseminate information to a large public audience.
    It can be used from anywhere in the world where there is Internet access
    to:

    1. disseminate intimidating and threatening messages, including pictures, video, and audio;

    2. transmit large volumes of junk mail or viruses in an attempt to damage
    data;

    3. impersonate people and engage in inappropriate conduct in their name;

    4. gather information for harassment purposes;

    5. post false information about, and monitor and spy on, people;

    6. encourage other people to track and harass people; and

    7. engage in other harassing and intimidating behavior.

    FEDERAL REPORTS

    The prevalence of cyberstalking is not known as many cases go unreported
    or undetected because victims do not know that the behavior is criminal.
    And there is no state or national data bank of reported crimes. But
    “current trends and evidence suggests that cyberstalking is a serious
    problem that will grow in scope and complexity as more people take
    advantage of the Internet and other telecommunications technologies,” according to a 1999 federal report (Cyberstalking: A New Challenge for
    Law Enforcement and Industry). The report points out that:

    the ease of use and non-confrontational, impersonal, and sometimes
    anonymous nature of Internet communications may remove disincentives to Cyberstalking. Put another way, whereas a potential stalker may be
    unwilling or unable to confront a victim in person or on the telephone,
    he or she may have little hesitation sending harassing or threatening electronic communications to a victim. Finally, as with physical
    stalking, online harassment and threats may be a prelude to more serious behavior, include physical violence (id., p. 3; see also Stalking and
    Domestic Violence: Report to Congress, 2001).

    Cyberstalking poses several enforcement problems for law enforcement
    officials, including the following cited in the federal report:

    1. the jurisdictional issues involved when a cyberstalker and victim may
    be located in different cities or states making it, in some cases, all
    but impossible for the local authority to investigate the incident;

    2. the lack of adequate state and federal statutory authority; and

    3. “the presence of services that provide anonymous communications over
    the Internet,” which allows cyberstalkers and other cybercriminals. . .to avoid accountability for their conduct (id. at p. 7; see also Stalking
    and Domestic Violence: Report to Congress, p. 6, 2001).

    The report contains recommendations for law enforcement and criminal
    justice officials, the Internet and electronic communications industry,
    and state and federal legislatures, among others. With regard

    to legislative issues, the report recommended that states review their
    stalking and other statutes to ensure they prohibit and provide
    appropriate punishment for cyberstalking.

    As a result of the breadth of conduct potentially involved in stalking, antistalking statues need to be relatively broad to be effective. At the
    same time, because of that breadth and because stalking can involve
    expressive conduct and speech, antistalking statutes must be carefully formulated and enforced so as not to impinge on speech that is protected
    by the First Amendment. . . .Care must be taken in drafting Cyberstalking statutes to ensure that they are not so broad that they risk chilling constitutionally protected speech, such as political protections and
    other legitimate conduct. A carefully drafted statute can provide broad protections against Cyberstalking without running afoul of the First
    Amendment (id., at p.13).

    With regard to federal law, the report noted that:

    [w]hile most cyberstalking cases will fall within the jurisdiction of
    state and local authorities, there are instances—such as serious cyberharassment directed at a victim in another state or involving communications intended to encourage third parties to engage in
    harassment or threats—where state law is inadequate or where state or
    local agencies do not have the expertise or the resources to investigate
    and/or prosecute a sophisticated cyberstalking (id., at p. 12).

    The report recommended that federal law be amended to (1) address gaps in existing law where the conduct involves interstate or foreign commerce
    with intent to threaten or harass another person where such communication places another in reasonable fear of death or bodily injury, (2) include enhanced penalties where the victim is a minor, and (3) make it easier to
    track down stalkers and other criminals in cyberspace while maintaining safeguards for privacy. The law should be technology neutral and apply to
    all forms of communication technology, to ensure that it does not become quickly outdated (id., at p. 14).

    FEDERAL LAW

    Three major federal laws apply to cyberstalking: the Interstate
    Communications Act; the Telephone Harassment Act, as amended by the 2000 Violence Against Women Act (VAWA); and the Interstate Stalking and
    Prevention Act, as amended by VAWA. A fourth federal law protects
    children against on-line stalkers.

    The Interstate Communications Act

    Under the Interstate Communications Act, it is a crime to transmit in interstate commerce any communication (e.g., by telephone, email, or
    beeper) containing a threat to injure anyone (18 USC § 875(c)). One
    limitation of this law is that many cyberstalking behaviors do not
    involve threats.

    Violence Against Women Act (VAWA)

    Certain forms of cyberstalking may be prosecuted under the 1934 Telephone Harassment Act, as amended by the 2006 VAWA. This law makes it a crime to anonymously and knowingly use a telephone or Internet to transmit in
    interstate or foreign commerce any message “to annoy, abuse, harass, or threaten a person” (47 USC §§ 223 & 223(a)(1)(C)).

    A major limitation of this law is that it applies only to direct
    communications (e.g., email) between the stalker and victim. It does not
    appear to cover messages posted on bulletin boards or in chat rooms
    encouraging others to harass someone.

    The Interstate Stalking and Prevention Act

    The 1996 Interstate Stalking and Prevention Act, as amended by VAWA,
    makes it a crime for anyone who travels in interstate or foreign commerce
    to use the mail, any interactive computer service, or any interstate or
    foreign commerce facility to engage in a course of conduct that causes substantial emotional distress to a person or causes the person or a
    relative to fear for his or her live or physical safety (18 USC § 2261A).

    Soliciting Minors for Sexual Activities

    A fourth federal law makes it a federal crime to use any means of
    interstate or foreign commerce (such as a telephone line or the Internet)
    to communicate with anyone with intent to solicit or entice a child under
    age 16 into unlawful sexual activity (18 USC § 2425).

    STATE LAWS

    All 50 states and the District of Columbia have enacted stalking and
    harassment laws. And 46 states, including Connecticut, explicitly include electronic forms of communication within stalking or harassment laws,
    according to an NCSL report (State Electronic Harassment or
    “Cyberstalking” Laws, last updated February 11, 2009; (http:// www.ncsl.org/programs/lis/cip/stalk99.htm). The laws vary in terms of the conduct criminalized, standards that may trigger prosecution, penalties
    for violations, and protections afforded victims, among other things.
    Most apply to crimes of intimidation and harassment using email, pagers
    and cell phones, but not to messages and digital images posted on
    websites.

    At least six states have adopted separate statutes specifically targeting cyberstalking. These are Illinois (720 Ill. Comp. Stat. Ann. § 5/12-7.5); Louisiana (La. Rev. Stat. § 14:40.3); Mississippi (Miss. Code §
    97-45-15); North Carolina (N.C. Gen. Stat. §§ 14-196, 14-196.3); Rhode Island (R.I. Gen. Laws § 11-52-4.2,); and Washington (Wash. Rev. Code Ann
    § 9.61.260). Louisiana's law, for example, applies to the “transfer of signs, signals, writing, images, sounds, data, or intelligence of any
    nature, transmitted in whole or in part by wire, radio, computer, electromagnetic, photoelectric, or photo-optical system.”

    Typically, laws targeting stalking or harassment (on-line or off-line)
    require that a perpetrator engage in the activity (1) on more than one
    occasion and (2) with intent to harass or cause a victim to fear for his
    or her life or safety. Many statutes require that the perpetrator make a credible or actual threat of violence (e.g., Alabama (Ala. Code § 13A-6-92(b)); Connecticut (CGS § 53a-182b); and Florida (Fla. Stat. Ann.
    § 836.10)). Some statutes have a “reasonable person standard.” In this case, the determining factor triggering prosecution is whether the perpetrator's conduct would cause a reasonable person to fear for his or
    her safety (e.g., Del. Code Ann. Tit. 11 § 1312a). Other variations apply.

    Connecticut Law

    Current Statutes. Connecticut incorporates computer network in two
    harassment statutes, which could be used to prosecute some cyberstalking conduct. Under CGS § 53a-182b, a person previously convicted of specified crimes is guilty of 1st degree harassment if with intent to harass,
    annoy, alarm or terrorize another, he or she threatens to kill or
    physically injure someone and communicates that threat by telephone,
    telegraph, mail, or computer network. The crime is a class D felony,
    punishable by one to five years in prison, a fine of up to $5,000, or
    both (CGS § 53a-182b). One limitation of this law with regard to cyberstalking is that applies only to threats.

    Under CGS § 53a-183, a person is guilty of 2nd degree harassment when he
    or she, intending to harass, annoy, or alarm anyone, communicates with
    that person by telegraph, or mail, telephone, orcomputer network, among
    other means, in a manner likely to annoy or alarm. Second-degree
    harassment is a class C misdemeanor punishable by up to one three months imprisonment, a $500 fine, or both. One limitation of this law with
    regard to cyberstalking is that it appears to apply only to messages sent directly to the victim (i.e., email), not other Internet postings or third-party harassment.

    Pending Legislation. Under Raised Bill 6357, currently before the Public
    Safety and Security Committee, a person is guilty of cyberstalking if (1)
    her or she, with intent to harass or intimidate someone, uses a computer, computer network or any other electronic device to (a) broadcast or
    publish the targeted person's picture, name, address or phone number
    without getting consent or (b) broadcast harassing, threatening or
    intimidating content about another person; and (2) such conduct places
    the other person in reasonable fear for such person's safety or the
    safety of a member of his or her immediate family. A violation is a class
    A misdemeanor, punishable by a prison term of of up to one year, a fine
    of up to $2,000, or both.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From ]v[etaphoid@21:1/5 to Liz Bentley on Mon Sep 25 05:58:47 2023
    Liz Bentley <throwaway@fake.address> wrote:
    On Sun, 24 Sep 2023 07:08:31 -0700, Kara Mac wrote:

    On Friday, September 22, 2023 at 6:35:34 PM UTC-4, Taro Tsujimoto wrote: >>> On Sep 22, 2023, Laz Mann wrote (in
    article<d5cb6862-2e2f-4676...@googlegroups.com>):
    On Friday, September 22, 2023 at 2:53:25 PM UTC-7, Taro Tsujimoto
    wrote:
    On Sep 22, 2023, Laz Mann wrote (in
    article<3dd761d8-d528-4fe7...@googlegroups.com>):

    johnhenry.us

    Get a job

    paypal.me/johnhenryus
    Nobody here wants to send money to a lazy grifter who is also a sexual
    predator. Just eat the bullet.

    Laz Man is right!! Look in the mirror- is that a person who will let
    easily manipulated people be robbed of their hard earned money by the
    likes of John Henry?? No?? GOOD FOR YOU!!! Join the Back Channel
    Brigade! Stalk that greedy grifter, and when you see someone falling for
    his game? Message them! Direct them here with a nice link so they get
    the real picture!!
    Thank you Laz Man for motivating good people to revolt against the likes
    of JOHN HENRY DEJONG (for google searches so McDs doesnt put a dangerous
    leftist on the fryolator)

    SUMMARY

    Cyberstalking generally refers to the use of the Internet or other
    electronic communication to harass, threaten, or intimidate someone. Its prevalence is unknown, but it is a major problem that may presage more harmful behavior, including physical violence, according to a 1999
    federal report.

    Federal law criminalizes cyberstalking. And 46 states, including
    Connecticut, have adopted stalking or harassment laws that explicitly incorporate electronic forms of communication, according to the National Conference of State Legislatures (NCSL). Two Connecticut statutes are sufficiently broad to cover some cyberstalking conduct. One statute
    requires the perpetrator to make a threat to the victim and thus does not appear to apply to situations that do not involve a threat, even if the victim fears for his or her safety. Another appears to require the perpetrator to communicate directly with the victim (e.g., email) and
    thus does not appear to apply to other Internet postings and third-party harassment.

    According to the 1999 federal report, (1) state cyberstalking laws should
    be crafted broadly to encompass the wide range of cyberstalking conduct,
    but must protect constitutionally protected speech, and (2) federal law should prohibit the “transmission of any communication in interstate or foreign commerce with intent to threaten or harass another person where
    such communication places another in reasonable fear of death or bodily injury.”

    WHAT IS CYBERSTALKING?

    Black's Law Dictionary (7th Ed., 1999) defines cyberstalking as “the act
    of threatening, harassing, or annoying someone through multiple email messages, as through the Internet, esp. with the intent of placing the recipient in fear that an illegal act or an injury will be inflicted on
    the recipient or a member of the recipient's family or household.”

    Certain Internet capabilities facilitate cyberstalking by increasing the capacity to contact potential victims. These include chat rooms, bulletin boards, newsgroups, instant messaging, and other web communication
    devices. Also, the Internet provides a quick, inexpensive, and efficient means to collect and disseminate information to a large public audience.
    It can be used from anywhere in the world where there is Internet access
    to:

    1. disseminate intimidating and threatening messages, including pictures, video, and audio;

    2. transmit large volumes of junk mail or viruses in an attempt to damage data;

    3. impersonate people and engage in inappropriate conduct in their name;

    4. gather information for harassment purposes;

    5. post false information about, and monitor and spy on, people;

    6. encourage other people to track and harass people; and

    7. engage in other harassing and intimidating behavior.

    FEDERAL REPORTS

    The prevalence of cyberstalking is not known as many cases go unreported
    or undetected because victims do not know that the behavior is criminal.
    And there is no state or national data bank of reported crimes. But “current trends and evidence suggests that cyberstalking is a serious problem that will grow in scope and complexity as more people take
    advantage of the Internet and other telecommunications technologies,” according to a 1999 federal report (Cyberstalking: A New Challenge for
    Law Enforcement and Industry). The report points out that:

    the ease of use and non-confrontational, impersonal, and sometimes
    anonymous nature of Internet communications may remove disincentives to Cyberstalking. Put another way, whereas a potential stalker may be
    unwilling or unable to confront a victim in person or on the telephone,
    he or she may have little hesitation sending harassing or threatening electronic communications to a victim. Finally, as with physical
    stalking, online harassment and threats may be a prelude to more serious behavior, include physical violence (id., p. 3; see also Stalking and Domestic Violence: Report to Congress, 2001).

    Cyberstalking poses several enforcement problems for law enforcement officials, including the following cited in the federal report:

    1. the jurisdictional issues involved when a cyberstalker and victim may
    be located in different cities or states making it, in some cases, all
    but impossible for the local authority to investigate the incident;

    2. the lack of adequate state and federal statutory authority; and

    3. “the presence of services that provide anonymous communications over
    the Internet,” which allows cyberstalkers and other cybercriminals. . .to avoid accountability for their conduct (id. at p. 7; see also Stalking
    and Domestic Violence: Report to Congress, p. 6, 2001).

    The report contains recommendations for law enforcement and criminal
    justice officials, the Internet and electronic communications industry,
    and state and federal legislatures, among others. With regard

    to legislative issues, the report recommended that states review their stalking and other statutes to ensure they prohibit and provide
    appropriate punishment for cyberstalking.

    As a result of the breadth of conduct potentially involved in stalking, antistalking statues need to be relatively broad to be effective. At the
    same time, because of that breadth and because stalking can involve expressive conduct and speech, antistalking statutes must be carefully formulated and enforced so as not to impinge on speech that is protected
    by the First Amendment. . . .Care must be taken in drafting Cyberstalking statutes to ensure that they are not so broad that they risk chilling constitutionally protected speech, such as political protections and
    other legitimate conduct. A carefully drafted statute can provide broad protections against Cyberstalking without running afoul of the First Amendment (id., at p.13).

    With regard to federal law, the report noted that:

    [w]hile most cyberstalking cases will fall within the jurisdiction of
    state and local authorities, there are instances—such as serious cyberharassment directed at a victim in another state or involving communications intended to encourage third parties to engage in
    harassment or threats—where state law is inadequate or where state or
    local agencies do not have the expertise or the resources to investigate and/or prosecute a sophisticated cyberstalking (id., at p. 12).

    The report recommended that federal law be amended to (1) address gaps in existing law where the conduct involves interstate or foreign commerce
    with intent to threaten or harass another person where such communication places another in reasonable fear of death or bodily injury, (2) include enhanced penalties where the victim is a minor, and (3) make it easier to track down stalkers and other criminals in cyberspace while maintaining safeguards for privacy. The law should be technology neutral and apply to
    all forms of communication technology, to ensure that it does not become quickly outdated (id., at p. 14).

    FEDERAL LAW

    Three major federal laws apply to cyberstalking: the Interstate Communications Act; the Telephone Harassment Act, as amended by the 2000 Violence Against Women Act (VAWA); and the Interstate Stalking and
    Prevention Act, as amended by VAWA. A fourth federal law protects
    children against on-line stalkers.

    The Interstate Communications Act

    Under the Interstate Communications Act, it is a crime to transmit in interstate commerce any communication (e.g., by telephone, email, or
    beeper) containing a threat to injure anyone (18 USC § 875(c)). One limitation of this law is that many cyberstalking behaviors do not
    involve threats.

    Violence Against Women Act (VAWA)

    Certain forms of cyberstalking may be prosecuted under the 1934 Telephone Harassment Act, as amended by the 2006 VAWA. This law makes it a crime to anonymously and knowingly use a telephone or Internet to transmit in interstate or foreign commerce any message “to annoy, abuse, harass, or threaten a person” (47 USC §§ 223 & 223(a)(1)(C)).

    A major limitation of this law is that it applies only to direct communications (e.g., email) between the stalker and victim. It does not appear to cover messages posted on bulletin boards or in chat rooms encouraging others to harass someone.

    The Interstate Stalking and Prevention Act

    The 1996 Interstate Stalking and Prevention Act, as amended by VAWA,
    makes it a crime for anyone who travels in interstate or foreign commerce
    to use the mail, any interactive computer service, or any interstate or foreign commerce facility to engage in a course of conduct that causes substantial emotional distress to a person or causes the person or a
    relative to fear for his or her live or physical safety (18 USC § 2261A).

    Soliciting Minors for Sexual Activities

    A fourth federal law makes it a federal crime to use any means of
    interstate or foreign commerce (such as a telephone line or the Internet)
    to communicate with anyone with intent to solicit or entice a child under
    age 16 into unlawful sexual activity (18 USC § 2425).

    STATE LAWS

    All 50 states and the District of Columbia have enacted stalking and harassment laws. And 46 states, including Connecticut, explicitly include electronic forms of communication within stalking or harassment laws, according to an NCSL report (State Electronic Harassment or “Cyberstalking” Laws, last updated February 11, 2009; (http:// www.ncsl.org/programs/lis/cip/stalk99.htm). The laws vary in terms of the conduct criminalized, standards that may trigger prosecution, penalties
    for violations, and protections afforded victims, among other things.
    Most apply to crimes of intimidation and harassment using email, pagers
    and cell phones, but not to messages and digital images posted on
    websites.

    At least six states have adopted separate statutes specifically targeting cyberstalking. These are Illinois (720 Ill. Comp. Stat. Ann. § 5/12-7.5); Louisiana (La. Rev. Stat. § 14:40.3); Mississippi (Miss. Code §
    97-45-15); North Carolina (N.C. Gen. Stat. §§ 14-196, 14-196.3); Rhode Island (R.I. Gen. Laws § 11-52-4.2,); and Washington (Wash. Rev. Code Ann
    § 9.61.260). Louisiana's law, for example, applies to the “transfer of signs, signals, writing, images, sounds, data, or intelligence of any
    nature, transmitted in whole or in part by wire, radio, computer, electromagnetic, photoelectric, or photo-optical system.”

    Typically, laws targeting stalking or harassment (on-line or off-line) require that a perpetrator engage in the activity (1) on more than one occasion and (2) with intent to harass or cause a victim to fear for his
    or her life or safety. Many statutes require that the perpetrator make a credible or actual threat of violence (e.g., Alabama (Ala. Code § 13A-6-92(b)); Connecticut (CGS § 53a-182b); and Florida (Fla. Stat. Ann.
    § 836.10)). Some statutes have a “reasonable person standard.” In this case, the determining factor triggering prosecution is whether the perpetrator's conduct would cause a reasonable person to fear for his or
    her safety (e.g., Del. Code Ann. Tit. 11 § 1312a). Other variations apply.

    Connecticut Law

    Current Statutes. Connecticut incorporates computer network in two
    harassment statutes, which could be used to prosecute some cyberstalking conduct. Under CGS § 53a-182b, a person previously convicted of specified crimes is guilty of 1st degree harassment if with intent to harass,
    annoy, alarm or terrorize another, he or she threatens to kill or
    physically injure someone and communicates that threat by telephone, telegraph, mail, or computer network. The crime is a class D felony, punishable by one to five years in prison, a fine of up to $5,000, or
    both (CGS § 53a-182b). One limitation of this law with regard to cyberstalking is that applies only to threats.

    Under CGS § 53a-183, a person is guilty of 2nd degree harassment when he
    or she, intending to harass, annoy, or alarm anyone, communicates with
    that person by telegraph, or mail, telephone, orcomputer network, among
    other means, in a manner likely to annoy or alarm. Second-degree
    harassment is a class C misdemeanor punishable by up to one three months imprisonment, a $500 fine, or both. One limitation of this law with
    regard to cyberstalking is that it appears to apply only to messages sent directly to the victim (i.e., email), not other Internet postings or third-party harassment.

    Pending Legislation. Under Raised Bill 6357, currently before the Public Safety and Security Committee, a person is guilty of cyberstalking if (1)
    her or she, with intent to harass or intimidate someone, uses a computer, computer network or any other electronic device to (a) broadcast or
    publish the targeted person's picture, name, address or phone number
    without getting consent or (b) broadcast harassing, threatening or intimidating content about another person; and (2) such conduct places
    the other person in reasonable fear for such person's safety or the
    safety of a member of his or her immediate family. A violation is a class
    A misdemeanor, punishable by a prison term of of up to one year, a fine
    of up to $2,000, or both.


    Uh-oh.

    Sounds like John Henry DeJong is plotting to engage the same pro bono Pay-By-Pubes lawyer who incarcerated those evil landlords (and brothers)
    who evicted John just because he was months behind in his rent and who imprisoned Alex Cain for orchestrating the thousands of socks and trolls
    who were undermining John’s employment, beggary and buggary.

    Bad Alex! All you cyber stalkers will go to prison now. Unless you #sendmoney…

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Kara Mac@21:1/5 to All on Mon Sep 25 03:28:09 2023
    On Monday, September 25, 2023 at 1:58:52 AM UTC-4, ]v[etaphoid wrote:
    Liz Bentley <thro...@fake.address> wrote:
    On Sun, 24 Sep 2023 07:08:31 -0700, Kara Mac wrote:

    On Friday, September 22, 2023 at 6:35:34 PM UTC-4, Taro Tsujimoto wrote:
    On Sep 22, 2023, Laz Mann wrote (in
    article<d5cb6862-2e2f-4676...@googlegroups.com>):
    On Friday, September 22, 2023 at 2:53:25 PM UTC-7, Taro Tsujimoto >>>> wrote:
    On Sep 22, 2023, Laz Mann wrote (in
    article<3dd761d8-d528-4fe7...@googlegroups.com>):

    johnhenry.us

    Get a job

    paypal.me/johnhenryus
    Nobody here wants to send money to a lazy grifter who is also a sexual >>> predator. Just eat the bullet.

    Laz Man is right!! Look in the mirror- is that a person who will let
    easily manipulated people be robbed of their hard earned money by the
    likes of John Henry?? No?? GOOD FOR YOU!!! Join the Back Channel
    Brigade! Stalk that greedy grifter, and when you see someone falling for >> his game? Message them! Direct them here with a nice link so they get
    the real picture!!
    Thank you Laz Man for motivating good people to revolt against the likes >> of JOHN HENRY DEJONG (for google searches so McDs doesnt put a dangerous >> leftist on the fryolator)

    SUMMARY

    Cyberstalking generally refers to the use of the Internet or other electronic communication to harass, threaten, or intimidate someone. Its prevalence is unknown, but it is a major problem that may presage more harmful behavior, including physical violence, according to a 1999
    federal report.

    Federal law criminalizes cyberstalking. And 46 states, including Connecticut, have adopted stalking or harassment laws that explicitly incorporate electronic forms of communication, according to the National Conference of State Legislatures (NCSL). Two Connecticut statutes are sufficiently broad to cover some cyberstalking conduct. One statute requires the perpetrator to make a threat to the victim and thus does not appear to apply to situations that do not involve a threat, even if the victim fears for his or her safety. Another appears to require the perpetrator to communicate directly with the victim (e.g., email) and
    thus does not appear to apply to other Internet postings and third-party harassment.

    According to the 1999 federal report, (1) state cyberstalking laws should be crafted broadly to encompass the wide range of cyberstalking conduct, but must protect constitutionally protected speech, and (2) federal law should prohibit the “transmission of any communication in interstate or foreign commerce with intent to threaten or harass another person where such communication places another in reasonable fear of death or bodily injury.”

    WHAT IS CYBERSTALKING?

    Black's Law Dictionary (7th Ed., 1999) defines cyberstalking as “the act of threatening, harassing, or annoying someone through multiple email messages, as through the Internet, esp. with the intent of placing the recipient in fear that an illegal act or an injury will be inflicted on the recipient or a member of the recipient's family or household.”

    Certain Internet capabilities facilitate cyberstalking by increasing the capacity to contact potential victims. These include chat rooms, bulletin boards, newsgroups, instant messaging, and other web communication devices. Also, the Internet provides a quick, inexpensive, and efficient means to collect and disseminate information to a large public audience. It can be used from anywhere in the world where there is Internet access to:

    1. disseminate intimidating and threatening messages, including pictures, video, and audio;

    2. transmit large volumes of junk mail or viruses in an attempt to damage data;

    3. impersonate people and engage in inappropriate conduct in their name;

    4. gather information for harassment purposes;

    5. post false information about, and monitor and spy on, people;

    6. encourage other people to track and harass people; and

    7. engage in other harassing and intimidating behavior.

    FEDERAL REPORTS

    The prevalence of cyberstalking is not known as many cases go unreported or undetected because victims do not know that the behavior is criminal. And there is no state or national data bank of reported crimes. But “current trends and evidence suggests that cyberstalking is a serious problem that will grow in scope and complexity as more people take advantage of the Internet and other telecommunications technologies,” according to a 1999 federal report (Cyberstalking: A New Challenge for
    Law Enforcement and Industry). The report points out that:

    the ease of use and non-confrontational, impersonal, and sometimes anonymous nature of Internet communications may remove disincentives to Cyberstalking. Put another way, whereas a potential stalker may be unwilling or unable to confront a victim in person or on the telephone,
    he or she may have little hesitation sending harassing or threatening electronic communications to a victim. Finally, as with physical
    stalking, online harassment and threats may be a prelude to more serious behavior, include physical violence (id., p. 3; see also Stalking and Domestic Violence: Report to Congress, 2001).

    Cyberstalking poses several enforcement problems for law enforcement officials, including the following cited in the federal report:

    1. the jurisdictional issues involved when a cyberstalker and victim may be located in different cities or states making it, in some cases, all
    but impossible for the local authority to investigate the incident;

    2. the lack of adequate state and federal statutory authority; and

    3. “the presence of services that provide anonymous communications over the Internet,” which allows cyberstalkers and other cybercriminals. . .to
    avoid accountability for their conduct (id. at p. 7; see also Stalking
    and Domestic Violence: Report to Congress, p. 6, 2001).

    The report contains recommendations for law enforcement and criminal justice officials, the Internet and electronic communications industry, and state and federal legislatures, among others. With regard

    to legislative issues, the report recommended that states review their stalking and other statutes to ensure they prohibit and provide appropriate punishment for cyberstalking.

    As a result of the breadth of conduct potentially involved in stalking, antistalking statues need to be relatively broad to be effective. At the same time, because of that breadth and because stalking can involve expressive conduct and speech, antistalking statutes must be carefully formulated and enforced so as not to impinge on speech that is protected by the First Amendment. . . .Care must be taken in drafting Cyberstalking statutes to ensure that they are not so broad that they risk chilling constitutionally protected speech, such as political protections and
    other legitimate conduct. A carefully drafted statute can provide broad protections against Cyberstalking without running afoul of the First Amendment (id., at p.13).

    With regard to federal law, the report noted that:

    [w]hile most cyberstalking cases will fall within the jurisdiction of state and local authorities, there are instances—such as serious cyberharassment directed at a victim in another state or involving communications intended to encourage third parties to engage in
    harassment or threats—where state law is inadequate or where state or local agencies do not have the expertise or the resources to investigate and/or prosecute a sophisticated cyberstalking (id., at p. 12).

    The report recommended that federal law be amended to (1) address gaps in existing law where the conduct involves interstate or foreign commerce with intent to threaten or harass another person where such communication places another in reasonable fear of death or bodily injury, (2) include enhanced penalties where the victim is a minor, and (3) make it easier to track down stalkers and other criminals in cyberspace while maintaining safeguards for privacy. The law should be technology neutral and apply to all forms of communication technology, to ensure that it does not become quickly outdated (id., at p. 14).

    FEDERAL LAW

    Three major federal laws apply to cyberstalking: the Interstate Communications Act; the Telephone Harassment Act, as amended by the 2000 Violence Against Women Act (VAWA); and the Interstate Stalking and Prevention Act, as amended by VAWA. A fourth federal law protects
    children against on-line stalkers.

    The Interstate Communications Act

    Under the Interstate Communications Act, it is a crime to transmit in interstate commerce any communication (e.g., by telephone, email, or beeper) containing a threat to injure anyone (18 USC § 875(c)). One limitation of this law is that many cyberstalking behaviors do not
    involve threats.

    Violence Against Women Act (VAWA)

    Certain forms of cyberstalking may be prosecuted under the 1934 Telephone Harassment Act, as amended by the 2006 VAWA. This law makes it a crime to anonymously and knowingly use a telephone or Internet to transmit in interstate or foreign commerce any message “to annoy, abuse, harass, or threaten a person” (47 USC §§ 223 & 223(a)(1)(C)).

    A major limitation of this law is that it applies only to direct communications (e.g., email) between the stalker and victim. It does not appear to cover messages posted on bulletin boards or in chat rooms encouraging others to harass someone.

    The Interstate Stalking and Prevention Act

    The 1996 Interstate Stalking and Prevention Act, as amended by VAWA,
    makes it a crime for anyone who travels in interstate or foreign commerce to use the mail, any interactive computer service, or any interstate or foreign commerce facility to engage in a course of conduct that causes substantial emotional distress to a person or causes the person or a relative to fear for his or her live or physical safety (18 USC § 2261A).

    Soliciting Minors for Sexual Activities

    A fourth federal law makes it a federal crime to use any means of interstate or foreign commerce (such as a telephone line or the Internet) to communicate with anyone with intent to solicit or entice a child under age 16 into unlawful sexual activity (18 USC § 2425).

    STATE LAWS

    All 50 states and the District of Columbia have enacted stalking and harassment laws. And 46 states, including Connecticut, explicitly include electronic forms of communication within stalking or harassment laws, according to an NCSL report (State Electronic Harassment or “Cyberstalking” Laws, last updated February 11, 2009; (http:// www.ncsl.org/programs/lis/cip/stalk99.htm). The laws vary in terms of the conduct criminalized, standards that may trigger prosecution, penalties for violations, and protections afforded victims, among other things.
    Most apply to crimes of intimidation and harassment using email, pagers and cell phones, but not to messages and digital images posted on websites.

    At least six states have adopted separate statutes specifically targeting cyberstalking. These are Illinois (720 Ill. Comp. Stat. Ann. § 5/12-7.5); Louisiana (La. Rev. Stat. § 14:40.3); Mississippi (Miss. Code § 97-45-15); North Carolina (N.C. Gen. Stat. §§ 14-196, 14-196.3); Rhode Island (R.I. Gen. Laws § 11-52-4.2,); and Washington (Wash. Rev. Code Ann § 9.61.260). Louisiana's law, for example, applies to the “transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature, transmitted in whole or in part by wire, radio, computer, electromagnetic, photoelectric, or photo-optical system.”

    Typically, laws targeting stalking or harassment (on-line or off-line) require that a perpetrator engage in the activity (1) on more than one occasion and (2) with intent to harass or cause a victim to fear for his or her life or safety. Many statutes require that the perpetrator make a credible or actual threat of violence (e.g., Alabama (Ala. Code § 13A-6-92(b)); Connecticut (CGS § 53a-182b); and Florida (Fla. Stat. Ann. § 836.10)). Some statutes have a “reasonable person standard.” In this
    case, the determining factor triggering prosecution is whether the perpetrator's conduct would cause a reasonable person to fear for his or her safety (e.g., Del. Code Ann. Tit. 11 § 1312a). Other variations apply.

    Connecticut Law

    Current Statutes. Connecticut incorporates computer network in two harassment statutes, which could be used to prosecute some cyberstalking conduct. Under CGS § 53a-182b, a person previously convicted of specified crimes is guilty of 1st degree harassment if with intent to harass,
    annoy, alarm or terrorize another, he or she threatens to kill or physically injure someone and communicates that threat by telephone, telegraph, mail, or computer network. The crime is a class D felony, punishable by one to five years in prison, a fine of up to $5,000, or
    both (CGS § 53a-182b). One limitation of this law with regard to cyberstalking is that applies only to threats.

    Under CGS § 53a-183, a person is guilty of 2nd degree harassment when he or she, intending to harass, annoy, or alarm anyone, communicates with that person by telegraph, or mail, telephone, orcomputer network, among other means, in a manner likely to annoy or alarm. Second-degree harassment is a class C misdemeanor punishable by up to one three months imprisonment, a $500 fine, or both. One limitation of this law with
    regard to cyberstalking is that it appears to apply only to messages sent directly to the victim (i.e., email), not other Internet postings or third-party harassment.

    Pending Legislation. Under Raised Bill 6357, currently before the Public Safety and Security Committee, a person is guilty of cyberstalking if (1) her or she, with intent to harass or intimidate someone, uses a computer, computer network or any other electronic device to (a) broadcast or publish the targeted person's picture, name, address or phone number without getting consent or (b) broadcast harassing, threatening or intimidating content about another person; and (2) such conduct places
    the other person in reasonable fear for such person's safety or the
    safety of a member of his or her immediate family. A violation is a class A misdemeanor, punishable by a prison term of of up to one year, a fine
    of up to $2,000, or both.

    Uh-oh.

    Sounds like John Henry DeJong is plotting to engage the same pro bono Pay-By-Pubes lawyer who incarcerated those evil landlords (and brothers)
    who evicted John just because he was months behind in his rent and who imprisoned Alex Cain for orchestrating the thousands of socks and trolls
    who were undermining John’s employment, beggary and buggary.

    Bad Alex! All you cyber stalkers will go to prison now. Unless you #sendmoney…
    I'm offended. I get a cheap and easy copy paste of the law, while someone else not long ago got a scary old video of him threatening to sell all his worldly goods and jump on a bus (damn it- the ticket was $34.99- he was $30 short)
    That video was complete with the pursed lip drawn down eyebrows stare that surely scares all into submission and donations.
    Ima have to up my game.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From ]v[etaphoid@21:1/5 to Kara Mac on Mon Sep 25 10:57:51 2023
    Kara Mac <karamcnamara0630@gmail.com> wrote:
    On Monday, September 25, 2023 at 1:58:52 AM UTC-4, ]v[etaphoid wrote:
    Liz Bentley <thro...@fake.address> wrote:
    On Sun, 24 Sep 2023 07:08:31 -0700, Kara Mac wrote:

    On Friday, September 22, 2023 at 6:35:34 PM UTC-4, Taro Tsujimoto wrote: >>>>> On Sep 22, 2023, Laz Mann wrote (in
    article<d5cb6862-2e2f-4676...@googlegroups.com>):
    On Friday, September 22, 2023 at 2:53:25 PM UTC-7, Taro Tsujimoto >>>>>> wrote:
    On Sep 22, 2023, Laz Mann wrote (in
    article<3dd761d8-d528-4fe7...@googlegroups.com>):

    johnhenry.us

    Get a job

    paypal.me/johnhenryus
    Nobody here wants to send money to a lazy grifter who is also a sexual >>>>> predator. Just eat the bullet.

    Laz Man is right!! Look in the mirror- is that a person who will let
    easily manipulated people be robbed of their hard earned money by the
    likes of John Henry?? No?? GOOD FOR YOU!!! Join the Back Channel
    Brigade! Stalk that greedy grifter, and when you see someone falling for >>>> his game? Message them! Direct them here with a nice link so they get
    the real picture!!
    Thank you Laz Man for motivating good people to revolt against the likes >>>> of JOHN HENRY DEJONG (for google searches so McDs doesnt put a dangerous >>>> leftist on the fryolator)

    SUMMARY

    Cyberstalking generally refers to the use of the Internet or other
    electronic communication to harass, threaten, or intimidate someone. Its >>> prevalence is unknown, but it is a major problem that may presage more
    harmful behavior, including physical violence, according to a 1999
    federal report.

    Federal law criminalizes cyberstalking. And 46 states, including
    Connecticut, have adopted stalking or harassment laws that explicitly
    incorporate electronic forms of communication, according to the National >>> Conference of State Legislatures (NCSL). Two Connecticut statutes are
    sufficiently broad to cover some cyberstalking conduct. One statute
    requires the perpetrator to make a threat to the victim and thus does not >>> appear to apply to situations that do not involve a threat, even if the
    victim fears for his or her safety. Another appears to require the
    perpetrator to communicate directly with the victim (e.g., email) and
    thus does not appear to apply to other Internet postings and third-party >>> harassment.

    According to the 1999 federal report, (1) state cyberstalking laws should >>> be crafted broadly to encompass the wide range of cyberstalking conduct, >>> but must protect constitutionally protected speech, and (2) federal law
    should prohibit the “transmission of any communication in interstate or >>> foreign commerce with intent to threaten or harass another person where
    such communication places another in reasonable fear of death or bodily
    injury.”

    WHAT IS CYBERSTALKING?

    Black's Law Dictionary (7th Ed., 1999) defines cyberstalking as “the act >>> of threatening, harassing, or annoying someone through multiple email
    messages, as through the Internet, esp. with the intent of placing the
    recipient in fear that an illegal act or an injury will be inflicted on
    the recipient or a member of the recipient's family or household.”

    Certain Internet capabilities facilitate cyberstalking by increasing the >>> capacity to contact potential victims. These include chat rooms, bulletin >>> boards, newsgroups, instant messaging, and other web communication
    devices. Also, the Internet provides a quick, inexpensive, and efficient >>> means to collect and disseminate information to a large public audience. >>> It can be used from anywhere in the world where there is Internet access >>> to:

    1. disseminate intimidating and threatening messages, including pictures, >>> video, and audio;

    2. transmit large volumes of junk mail or viruses in an attempt to damage >>> data;

    3. impersonate people and engage in inappropriate conduct in their name; >>>
    4. gather information for harassment purposes;

    5. post false information about, and monitor and spy on, people;

    6. encourage other people to track and harass people; and

    7. engage in other harassing and intimidating behavior.

    FEDERAL REPORTS

    The prevalence of cyberstalking is not known as many cases go unreported >>> or undetected because victims do not know that the behavior is criminal. >>> And there is no state or national data bank of reported crimes. But
    “current trends and evidence suggests that cyberstalking is a serious
    problem that will grow in scope and complexity as more people take
    advantage of the Internet and other telecommunications technologies,”
    according to a 1999 federal report (Cyberstalking: A New Challenge for
    Law Enforcement and Industry). The report points out that:

    the ease of use and non-confrontational, impersonal, and sometimes
    anonymous nature of Internet communications may remove disincentives to
    Cyberstalking. Put another way, whereas a potential stalker may be
    unwilling or unable to confront a victim in person or on the telephone,
    he or she may have little hesitation sending harassing or threatening
    electronic communications to a victim. Finally, as with physical
    stalking, online harassment and threats may be a prelude to more serious >>> behavior, include physical violence (id., p. 3; see also Stalking and
    Domestic Violence: Report to Congress, 2001).

    Cyberstalking poses several enforcement problems for law enforcement
    officials, including the following cited in the federal report:

    1. the jurisdictional issues involved when a cyberstalker and victim may >>> be located in different cities or states making it, in some cases, all
    but impossible for the local authority to investigate the incident;

    2. the lack of adequate state and federal statutory authority; and

    3. “the presence of services that provide anonymous communications over >>> the Internet,” which allows cyberstalkers and other cybercriminals. . .to >>> avoid accountability for their conduct (id. at p. 7; see also Stalking
    and Domestic Violence: Report to Congress, p. 6, 2001).

    The report contains recommendations for law enforcement and criminal
    justice officials, the Internet and electronic communications industry,
    and state and federal legislatures, among others. With regard

    to legislative issues, the report recommended that states review their
    stalking and other statutes to ensure they prohibit and provide
    appropriate punishment for cyberstalking.

    As a result of the breadth of conduct potentially involved in stalking,
    antistalking statues need to be relatively broad to be effective. At the >>> same time, because of that breadth and because stalking can involve
    expressive conduct and speech, antistalking statutes must be carefully
    formulated and enforced so as not to impinge on speech that is protected >>> by the First Amendment. . . .Care must be taken in drafting Cyberstalking >>> statutes to ensure that they are not so broad that they risk chilling
    constitutionally protected speech, such as political protections and
    other legitimate conduct. A carefully drafted statute can provide broad
    protections against Cyberstalking without running afoul of the First
    Amendment (id., at p.13).

    With regard to federal law, the report noted that:

    [w]hile most cyberstalking cases will fall within the jurisdiction of
    state and local authorities, there are instances—such as serious
    cyberharassment directed at a victim in another state or involving
    communications intended to encourage third parties to engage in
    harassment or threats—where state law is inadequate or where state or
    local agencies do not have the expertise or the resources to investigate >>> and/or prosecute a sophisticated cyberstalking (id., at p. 12).

    The report recommended that federal law be amended to (1) address gaps in >>> existing law where the conduct involves interstate or foreign commerce
    with intent to threaten or harass another person where such communication >>> places another in reasonable fear of death or bodily injury, (2) include >>> enhanced penalties where the victim is a minor, and (3) make it easier to >>> track down stalkers and other criminals in cyberspace while maintaining
    safeguards for privacy. The law should be technology neutral and apply to >>> all forms of communication technology, to ensure that it does not become >>> quickly outdated (id., at p. 14).

    FEDERAL LAW

    Three major federal laws apply to cyberstalking: the Interstate
    Communications Act; the Telephone Harassment Act, as amended by the 2000 >>> Violence Against Women Act (VAWA); and the Interstate Stalking and
    Prevention Act, as amended by VAWA. A fourth federal law protects
    children against on-line stalkers.

    The Interstate Communications Act

    Under the Interstate Communications Act, it is a crime to transmit in
    interstate commerce any communication (e.g., by telephone, email, or
    beeper) containing a threat to injure anyone (18 USC § 875(c)). One
    limitation of this law is that many cyberstalking behaviors do not
    involve threats.

    Violence Against Women Act (VAWA)

    Certain forms of cyberstalking may be prosecuted under the 1934 Telephone >>> Harassment Act, as amended by the 2006 VAWA. This law makes it a crime to >>> anonymously and knowingly use a telephone or Internet to transmit in
    interstate or foreign commerce any message “to annoy, abuse, harass, or >>> threaten a person” (47 USC §§ 223 & 223(a)(1)(C)).

    A major limitation of this law is that it applies only to direct
    communications (e.g., email) between the stalker and victim. It does not >>> appear to cover messages posted on bulletin boards or in chat rooms
    encouraging others to harass someone.

    The Interstate Stalking and Prevention Act

    The 1996 Interstate Stalking and Prevention Act, as amended by VAWA,
    makes it a crime for anyone who travels in interstate or foreign commerce >>> to use the mail, any interactive computer service, or any interstate or
    foreign commerce facility to engage in a course of conduct that causes
    substantial emotional distress to a person or causes the person or a
    relative to fear for his or her live or physical safety (18 USC § 2261A). >>>
    Soliciting Minors for Sexual Activities

    A fourth federal law makes it a federal crime to use any means of
    interstate or foreign commerce (such as a telephone line or the Internet) >>> to communicate with anyone with intent to solicit or entice a child under >>> age 16 into unlawful sexual activity (18 USC § 2425).

    STATE LAWS

    All 50 states and the District of Columbia have enacted stalking and
    harassment laws. And 46 states, including Connecticut, explicitly include >>> electronic forms of communication within stalking or harassment laws,
    according to an NCSL report (State Electronic Harassment or
    “Cyberstalking” Laws, last updated February 11, 2009; (http://
    www.ncsl.org/programs/lis/cip/stalk99.htm). The laws vary in terms of the >>> conduct criminalized, standards that may trigger prosecution, penalties
    for violations, and protections afforded victims, among other things.
    Most apply to crimes of intimidation and harassment using email, pagers
    and cell phones, but not to messages and digital images posted on
    websites.

    At least six states have adopted separate statutes specifically targeting >>> cyberstalking. These are Illinois (720 Ill. Comp. Stat. Ann. § 5/12-7.5); >>> Louisiana (La. Rev. Stat. § 14:40.3); Mississippi (Miss. Code §
    97-45-15); North Carolina (N.C. Gen. Stat. §§ 14-196, 14-196.3); Rhode >>> Island (R.I. Gen. Laws § 11-52-4.2,); and Washington (Wash. Rev. Code Ann >>> § 9.61.260). Louisiana's law, for example, applies to the “transfer of >>> signs, signals, writing, images, sounds, data, or intelligence of any
    nature, transmitted in whole or in part by wire, radio, computer,
    electromagnetic, photoelectric, or photo-optical system.”

    Typically, laws targeting stalking or harassment (on-line or off-line)
    require that a perpetrator engage in the activity (1) on more than one
    occasion and (2) with intent to harass or cause a victim to fear for his >>> or her life or safety. Many statutes require that the perpetrator make a >>> credible or actual threat of violence (e.g., Alabama (Ala. Code §
    13A-6-92(b)); Connecticut (CGS § 53a-182b); and Florida (Fla. Stat. Ann. >>> § 836.10)). Some statutes have a “reasonable person standard.” In this >>> case, the determining factor triggering prosecution is whether the
    perpetrator's conduct would cause a reasonable person to fear for his or >>> her safety (e.g., Del. Code Ann. Tit. 11 § 1312a). Other variations apply. >>>
    Connecticut Law

    Current Statutes. Connecticut incorporates computer network in two
    harassment statutes, which could be used to prosecute some cyberstalking >>> conduct. Under CGS § 53a-182b, a person previously convicted of specified >>> crimes is guilty of 1st degree harassment if with intent to harass,
    annoy, alarm or terrorize another, he or she threatens to kill or
    physically injure someone and communicates that threat by telephone,
    telegraph, mail, or computer network. The crime is a class D felony,
    punishable by one to five years in prison, a fine of up to $5,000, or
    both (CGS § 53a-182b). One limitation of this law with regard to
    cyberstalking is that applies only to threats.

    Under CGS § 53a-183, a person is guilty of 2nd degree harassment when he >>> or she, intending to harass, annoy, or alarm anyone, communicates with
    that person by telegraph, or mail, telephone, orcomputer network, among
    other means, in a manner likely to annoy or alarm. Second-degree
    harassment is a class C misdemeanor punishable by up to one three months >>> imprisonment, a $500 fine, or both. One limitation of this law with
    regard to cyberstalking is that it appears to apply only to messages sent >>> directly to the victim (i.e., email), not other Internet postings or
    third-party harassment.

    Pending Legislation. Under Raised Bill 6357, currently before the Public >>> Safety and Security Committee, a person is guilty of cyberstalking if (1) >>> her or she, with intent to harass or intimidate someone, uses a computer, >>> computer network or any other electronic device to (a) broadcast or
    publish the targeted person's picture, name, address or phone number
    without getting consent or (b) broadcast harassing, threatening or
    intimidating content about another person; and (2) such conduct places
    the other person in reasonable fear for such person's safety or the
    safety of a member of his or her immediate family. A violation is a class >>> A misdemeanor, punishable by a prison term of of up to one year, a fine
    of up to $2,000, or both.

    Uh-oh.

    Sounds like John Henry DeJong is plotting to engage the same pro bono
    Pay-By-Pubes lawyer who incarcerated those evil landlords (and brothers)
    who evicted John just because he was months behind in his rent and who
    imprisoned Alex Cain for orchestrating the thousands of socks and trolls
    who were undermining John’s employment, beggary and buggary.

    Bad Alex! All you cyber stalkers will go to prison now. Unless you
    #sendmoney…
    I'm offended. I get a cheap and easy copy paste of the law, while someone else not long ago got a scary old video of him threatening to sell all
    his worldly goods and jump on a bus (damn it- the ticket was $34.99- he was $30 short)
    That video was complete with the pursed lip drawn down eyebrows stare
    that surely scares all into submission and donations.
    Ima have to up my game.


    Just be glad that he didn’t turn you into a quadriplegic like he did the *other* man who had non-consensual intercourse with his daughter…

    #dadsarespecial

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Davey Zimmerman #274@21:1/5 to Kara Mac on Tue Sep 26 19:42:18 2023
    Kara Mac <karamcnamara0630@gmail.com> wrote in news:dff6ed5a-9af4-4bd1-8b7a-ad19ef454630n@googlegroups.com:

    On Monday, September 25, 2023 at 1:58:52 AM UTC-4, ]v[etaphoid
    wrote:
    Liz Bentley <thro...@fake.address> wrote:
    On Sun, 24 Sep 2023 07:08:31 -0700, Kara Mac wrote:

    On Friday, September 22, 2023 at 6:35:34 PM UTC-4, Taro Tsujim
    oto wrote:
    On Sep 22, 2023, Laz Mann wrote (in
    article<d5cb6862-2e2f-4676...@googlegroups.com>):
    On Friday, September 22, 2023 at 2:53:25 PM UTC-7, Taro Tsuj
    imoto
    wrote:
    On Sep 22, 2023, Laz Mann wrote (in
    article<3dd761d8-d528-4fe7...@googlegroups.com>):

    johnhenry.us

    Get a job

    paypal.me/johnhenryus
    Nobody here wants to send money to a lazy grifter who is also a
    sexua
    l
    predator. Just eat the bullet.

    Laz Man is right!! Look in the mirror- is that a person who will
    let

    easily manipulated people be robbed of their hard earned money by
    the likes of John Henry?? No?? GOOD FOR YOU!!! Join the Back
    Channel Brigade! Stalk that greedy grifter, and when you see
    someone falling for his game? Message them! Direct them here with
    a nice link so they get the real picture!!
    Thank you Laz Man for motivating good people to revolt against the
    likes
    of JOHN HENRY DEJONG (for google searches so McDs doesnt put a
    dangerous leftist on the fryolator)

    [FLUSH OF SCREED]

    Uh-oh.

    Sounds like John Henry DeJong is plotting to engage the same pro bono
    Pay-By-Pubes lawyer who incarcerated those evil landlords (and
    brothers) who evicted John just because he was months behind in his
    rent and who imprisoned Alex Cain for orchestrating the thousands of
    socks and trolls who were undermining John’s employment, beggary
    and buggary.

    Bad Alex! All you cyber stalkers will go to prison now. Unless you
    #sendmoney…

    I'm offended. I get a cheap and easy copy paste of the law, while
    someone else not long ago got a scary old video of him threatening to
    sell all his worldly goods and jump on a bus (damn it- the ticket was
    $34.99- he was $30 short) That video was complete with the pursed lip
    drawn down eyebrows stare that surely scares all into submission and donations. Ima have to up my game.

    You are going to be insulted even more when you find out John also lied
    about filing a police report against Cain. Then again, you haven't yet
    been accused of stalking John for over 20 years across four different
    decades with billions of sockpuppets. So you will have to earn your
    spurs. A request for a fifty buck refund just isn't going to cut it. A
    word to the wise, start recruiting henchcritters to piss John off.

    Want to earn some PissedOffParasitePoints(tm)? At one point John mooched
    off a sister after he got streeted in California. The alleged backstory
    to that was that John was recruited to be stud service to a California
    couple and he refused, so they threw him out after a few weeks. Who
    knows how much of that was true?

    The sister supposedly allowed John to move back to her home in Michigan.
    The fun starts when someone asks John why his sister tossed him out
    after two weeks.

    I'm sure he won't answer that he was streeted again because John's
    sister's husband was dying and his pain medications suddenly started disappearing after John moved in. I'm having a hard time believing
    that's true but since you threw in 50 bucks to his cause you could get a different answer or maybe even a confirmation. Me? I think it's another
    vicious rumor no matter how true it may turn out to be.

    A lot of it was here: https://kiwifarms.st/threads/internet-wrestling-community-iwc.34646/page- 4#post-3507785

    PS: It's a regular Tobacco Road up there in Michigan. So anything is
    possible.

    (Tip of the hat to the great Erskine Caldwell)

    Oh, before I forget, here's another meltdown:

    Which he took down at:

    https://johnhenry.us/blog/2021/10/12/still-a-story-of-depression/

    But still exists here: https://web.archive.org/web/20211012081216/https://johnhenry.us/blog/2021 /10/12/still-a-story-of-depression/

    And heres the message-ID:
    Message-ID: <mn.32437e5bcd1547ed.136487@phoid.con>
    And the post: https://groups.google.com/g/rec.sport.pro-wrestling/c/XGCCV4X4ZqY/m/vJwar 7S4AgAJ

    A brief excerpt (good god, he does ramble on!):

    "When I was twelve years old, my half-sister brutally murdered my niece
    (this is public record you can check yourself if you have access to LEXIS-NEXUS: Texas v. Laird, 1983. I warn you now DO NOT READ THE
    DETAILS). While the adults around me were assuming that it didnt
    effect me because the ones who werent self-absorbed jerks were deeply
    steeped in just dont think about it and itll go away thinking was
    before my dad got sober what really happened is I made up my mind
    then and there to try to protect people, keep them safe, do everything
    I can with the considerable gifts I was graced with at birth to make
    the world a better place in every wayand as far as I can tell by the
    evidence, at best I might have said a kind word at the right time for
    an individual, once in a whileand given the state of folks lives, I
    didnt do it enough or to the right people, because I sure wish some
    folks had heard me when I said I love you, and I think youre making a mistake.

    Yeah, thats where all this messiah complex and vulnerability to
    damsels in distress come from: the memory of a four year old who was
    brutally beaten to death for splashing water in the tub because her
    mother was a useless psycho junkie and so was her mothers useless
    psycho junkie boyfriend. Im sparing you a whole lot of very ugly
    details here. Youre welcome; nobody spared me.

    (They both live fine, by the way. Neither served more than a few
    years, and both get most of their bills subsidized while Im out here
    starving and homeless. My murdering sister has a home and I dont. My
    murdering sister has a car and I dont. My murdering sister knows shes
    gonna eat a week from now and I dont. Because in Texas, child safety
    is our number one priority.)"

    Ever wonder why there's huge gaps in his history? I would never put this
    kind of batshit out there but every once in a while John snaps out of it
    long enough to realize he's pretty much out of order and cleans it up.
    It's not that there's anything wrong with putting it out there, it's
    just that it's on a site where he's begging marks for money and he's
    been begging for decades. Optics, motherfucker!

    Paypal him now. After all, John is doing it for you. Aren't you glad you
    asked him to make the sacrifice?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)