REGARDING NAME: VIVIAN RITZEN

Current: child's name (Federal Attorney's & Google contacted dirtsearch.org attorney's re: name associated with massive court actions/information name not associated with & name with information published against Federal & State laws of registered protected stalking victims - below) was ostracized in school (over 3 years) due to cyber stalking abuser/impersonator (below) who operated en-mass against Google & Internet Services (globally) policy's, with mother's and a grandmother's name who also suffered irreparable damages. Family, internet services with Victim (read below) Now, all parties with name protected through 'Safe At Home' Program, due to extreme retaliation from stalkers cyber abusive actions en-mass below.

It's maliciously input to "BLACK HAT SEO" "Googlebomb" ILLEGAL BLASTING SOFTWARE against Google usage < Terms & Conditions > targeting Adult sites sex video's etc, in 1000's of cache back-links (en-mass) with EACH blast. Then, linked anchor-tagged name in caption on Google and in 1000's of web site content pages with obscene key words. After, Victim clears up (with GOOGLE US LAW ENFORCEMENT help/tracing) the Stalker RE-BLASTS over and over - after each clean up. Costing GLOBAL internet ISP/web site services time/money to clear massive server corruption and 'security HACK attack.'

Victim, Pro-Bono Federal Attorney & GOOGLE LAW ENFORCEMENT tracing/CLEARING over 22,000 'anchor tagged' and 'SEO Black Hat links' of name tagged to OTHERS ADULT VIDEOS & OBSCENITIES en-masses over 3.5 years now.

Google isolating and tracing cyber abuse with Pro-Bono Attorney and technical continue tracing via court sealed documents.

Hosting/ISP companies (globally) cooperating with Google on tracing everything with Victims name (at times FULL and rare name to show targeted at this Victim with residing state) since their servers were blasted and corrupted, which cost them several $1000 in company time to clear. Global site owners & hosting/ISP companies with Victim are not going to stop until Google prosecutes so not to suffer public suit themselves.

Times, Stalker published Victim's FULL and RARE name. Only other is Grandmother's on East Coast, Mother listed on internet or a child.

PLEASE SEE: Hostgators ISP Security eMail below < in blue print > and SEO Technical Experts COURT TRANSCRIPTS < in blue print > at bottom of page.

GOOGLE FBI Crackdown SEO poisoning PROSECUTION: �SEO expert� that will be spending the next six years in jail for black hat SEO practices. XXXXXXXX.com � pleaded guilty in Federal District Court to two counts of sending threatening communications, one count of mail fraud and one count of wire fraud. Prosecutors say he should spend between five and six-and-a-half years in jail. AND THEY PROSECUTED MORE: CEO of XXXXX.COM, became the 2nd person convicted of Search Engine Spamming and poisoning for �Scraping and willfully using other�s content - under the �Cleaning Up the Internet Scum Act� Mr. XXXXXX was sentenced to 6 years and $421 million dollars in fines earlier this month for similar violations.

>>>>>>>>>

This site is intended to pass laws similar to AZ Cyber Stalking making this a Class 5 Felony. Additionally, to prevent further harm to the Victim and family by perpetrators who believe the Victim is something they are not. They're trying families reputation and be safe.

TThe site will continue to assist Google who's contacting hosting companies and tracing the name. This will validate the reason for their time and money - to protect their services as well.

>>>>>>>>

There's a Hosting Company in Amsterdam & Asia: who's servers have been 'SEO Black Hat deformation blasted' pointing the Victims name to their Adult web site clients 100,000's of times with illegal child abuse key words. The Hosting Company CEO's have their SECURITY TEAM trace and report to: Google Law Enforcement and International Federal law enforcement etc.

It's costing them several $1000 dollars to clear the servers from pointing the name to "anchor tag" "hack" "compromise" - their web site clients and servers. They were more angry when re-blasted.

OTHER COUNTRIES CYBER SECURITY LAWS ARE MORE STRICT: ASIA, has EXTREMELY STRICT laws regarding REPORTING of: Cyber Crimes, Cyber Harassment, Electronic Impersonation. It's all reported by their hosting company Security Depts into databases with the name and Security Departments traced findings.
>>>>>>>>>>

Anybody, who truly believes that Global Technology companies and real tech's who attended college with BS & MASTERS in TECHNOLOGY - appreciate their Internet business services utilized in the manor...should be imprisoned and forbidden to use the Internet or computers.


******************************************


EMAIL FROM, HOSTGATORS SECURITY, ON 'BLACK HAT SEO' OF NAME: -- received June 2011.

Since, the name re-blasted several times after each clean up.


Hello,

I have investigated this issue thoroughly. These terms do not ever actually appear to be present on our customer's site. It appears that these "cached" links are from the terms on other sites not under or control linking to our customer's sites. There is nothing we are able to do about this as we do not own, nor are in control of the linking sites.

What actually appears to be going on is that the searches for your name are being detected by a "Black Hat SEO" network. This is in turn spawning junk pages on many nodes of the network for the terms linking to other nodes on the network. Some of these links appear to have been pointed to our clients' sites. Individual's sites are often added to these Black Hat SEO networks without their knowledge or authorization via hacks or compromises in their accounts. The sites may have at one point been part of this Black Hat SEO network, but do not appear to be any longer and have been secured/cleaned.

Unfortunately, we would not be able to assist you in tracking down and removing the remaining nodes in the network as they do not fall on servers under our control. You may want to do some reading on google to see if there are any further options to have the material removed from googles cache manually.

Please let us know if you have any further questions.

Regards,

Michael Ka**

Senior Security Administrator

HostGator.com LLC

http://support.hostgator.com


*****************************************

Name is: Grandmother, mother, daughter died 7/12/12 & child. May God, hold her in the palm of his hand.

******************

2010: Victim won Small Claims harassment case. After, all below started and has not stopped for 4 years. Prior, came after Victim with many illegal court tactics (Judges declined all of them) only after Victim provided a 30 day notice, by eMail, to vacate a rental and found Victim was secretly video taped, which some pictures will be of Victim naked. Video tape was to be turned over by judges court order and never done.

Christmas 2010: Victims FULL AND RARE NAME was Googlebombed for over (40) pages on Yahoo and (20) on Google stating: Victim was homeless, on food-stamps and making 100's of complaints about others and companies. Then Stalker linked Victims FULL and RARE name to 1000's of other peoples slander postings about other companies - to make it appear the Victim had actually made 1000's of slander postings herself against 1000's of companies and people. Every page is technically witnessed, printed out and scanned on flash drive.

FEBRUARY 14, 2011 (Valentines Day): Knowing Victim was on Linkedin.com - set up an account of their own and then targeted Victims employment history profile showing viewed Victims account - it's well documented. Stalker was never on Linkedin before. Knew Victims employment history and nickname used for global employment contacts. After, Victims employment history was google-blasted on foreign web sites with personal slander pages while tagging with Adult site obesity web pages (all on one page) and linking with Victims true full legal name. Stalker set all the associations up on one slander page to destroy Victims ability to obtain and maintain a job. It's ALL well documented with technical witnesses and printed pages scanned on Flash Drive. Only Stalker new of ALL the associations from when affiliated with Victim as her Broker. Victim was referred to Linkedin's in-house Attorney and notified Linkedin Security. Until this time, the Stalker was never on Linkedin. The Victims profile was private on linkedin and not public on Google (at all).

MARCH 2011: Victim files and obtains TRO. While under TRO cyber blasting stopped. Victim had time to clear. Directly after TRO case over the suspect walks up to Victim (against orders) and states "good luck to you" - sarcastically. After TRO ended the blasting started again more intense with obscene illegal key words hacked to Adult sites. Harassment Orders were signed after TRO which police stated they could not uphold.

MARCH 2011: Prior to TRO case Stalker blasted own name on Internet and contacted court clerks with judge to view the Stalkers name blasted on Internet. Investigator stated this was to frame Victim. Then, Stalker played a Victim to her attorney, police and judges. Technical Investigators (at this time) were unaware of the Black Hat SEO linking and blasting tool associations with Stalkers father an expert - advised father taught Stalker. After, Stalker got out of TRO with signing Harassment Papers, the Black Hat SEO blasting started again more intense after judges orders ended. The Stalker told police, the Victim was blasting Stalkers name and bullied Victim to clear Stalkers name from Stalkers self inflicted blasting. Attorneys all advised Victim of this framing.

2012: Advised by investigators that Suspects father is Black Hat SEO blasting and linking expert who's affiliated with 100's of blasting sites and sold the Black Hat SEO blasting software on the side. His rare name associated with all of them on the Internet. This is against Google's Terms and Conditions. It's well documented. Since, wiped his name off the Internet Black Hat SEO affiliations after 2nd TRO was tried due to serious of events.

MARCH 2012: Victim files 3RD TRO. Suspect filed RO case (3) days prior to Victims trial without notifying Victim's Attorney. Suspect was declined TRO based on NO evidence. Stalker did not advise Victims attorney and only served papers the day of trial against Victim. Victim's attorney was not be prepared for the suspects only handwritten snippets of eMails supplied in RO case. Attorney wasn't notified a Detective would testify as was not issued subpoena or notified at all. Stalker played a Victim to Police Detective. Detective did state he believed Victim was a Victim. Suspect was previously a trial paralegal. Suspects initial TRO was declined based on "no evidence." Suspect shows up to court and only acts like Victim and produced snippets of distorted personally handwritten eMails which show a distortion of facts. Victim did not have time to produce the eal eMails which were also cc:d to the police dept. Victim only had 'series of events' to show in court. It would take Google Global Security (globally) to trace abuse of this magnitude against their Policies. Suspect never served Victim's Attorney with RO papers until day of hearing and only showed false evidence on side - not submitted to court under penalty of perjury.

2011-2012: Personal slander pages were set up via a German site link with Victims FULL and rare name while blasted on Adult sites. Attorneys stated the Stalker linked on sites out of US to avoid US court subpoena's being issued to trace the IP etc. It's well documented in eMails to the German site owner begging them to please help Victim resolve the account that was set up under Victims name by a Stalker. Additionally, all sites printed out and witnessed by technical support.

OCT 2012: Stalker is blast linking name 1000's of times (in CAPS) to child abuse and child sex act key words on Adult sites hard core video's. This is not only portraying Victim as a Child abuser. However, causing Adult sites poor and illegal Internet Visibility. The Hosting Companies and web site owners are shutting down their services completely to stop the illegal activity that will cause the Fed's to shut them down. Stalker is also setting up personal slander pages tagging victims name to bad words.

CHRISTMAS 2010-2012: (we state below how stalker destory's the Victims holiday season for the 3rd year in a row) Black Hat SEO blaster targeting DOWN-LOAD file sites in the 1000's and blasting name to simply trash it for 1000's of pages with obscenity affiliations - site owners with ISP companies are angry and clearing abuse with hosting security companies & Google tracing with clearing.

THANKSGIVING TO NEW YEARS 2012: The name didn't stop blasting, additionally, targeting Asian Adult site Video's en-mass. Google traced and cleared.

2013 Google tracing and clearing abuse with hosting companies and people databases globally cooperating to help Victim's.

2013: Thank you, for scanning and sending false complaint documentation with eMails sent with Victims name.

NOVEMBER 2013: Technical team contacted Radaris after seeing the name tagged/hacked on Radaris over 67 times with families, ages not associated. All parties with name are confirmed there are not (even close to) 67 people with the name in the entire world. Now, they're abusing Radaris services against the Internet sites Policies. Associating the name with other families who are NOT related en masses. Radaris Security is angry regarding the abuse of their site and working with Google. Appears another attempt to trash the name to cover up abuse targeted at this Victim.

JANUARY 2014: Only one person knew the distant family company affiliations and now tagging name with family business in other countries and victims name.

JANUARY 2014: Courts County CTO notified the Internet cases are distorted and not listed any evidence submitted in this case. Victims pursuing.

MARCH 2014: Name associated on Dirtsearch.org with 1000's of court cases with disgusting information (over past 2 years) which Attorney's verified does not exist with the name. Additionally, family on "Safe At Home." this is a Federal and state Violation against Victims. (2) years of documents sent to: Chief of Police in AZ, FBI, Google Founder, DOJ Attorney in WA, IRS - to have the CEO investigated.

*************************************************

Series of events were eMailed to a Professor who studies psychopaths. He said "the psychopathy is clear here, ignore it, it wants attention."

Suspects step brothers in FL have criminal records of: Assault, Battery, Resisting Arrest, Drug Charges, Non-Payment of Child support and several DUI's.

Technical witnesses to cyber abuse state this appears fun for Stalker. They are angry and cooperating by documenting as witnesses with all pages printed out.

Predators, with a track record of harassing and abusing people would cover themselves with extensive weapons training, in fear of their Victim(s) retaliation.

-----------

The Victim had light Atrial Fibrillation heart damage which is now uncontrollable under medical standards due to the stress. The Victims heart pills are no longer working. This abuse needs to stop or will die from heart complications. Then, we will make this very media public.

DECEMBER 2012: VICTIMS PHYSICALLY COLLAPSED FROM ABUSE AND HER EYE SITE WENT OUT IN EMERGENCY ROOM. THE VICTIM WAS EXHAUSTED CLEARING NAME TO PREVENT THE SPREAD AND TARNISH OF ENTIRE FAMILY'S REPUTATION ON THE MOST DISGUSTING VIDEO'S A HUMAN CAN ENDURE. ALL VIDEOS WERE OF MULTIPLE OTHERS AND OF COLOR SAME AS SUSPECT STALKER. GOOGLE TOOK OVER JANUARY 2012 - VIA COURT SEALED DOCUMENTS IN OTHER COUNTIES, OTHER PRECAUTIONS TO PROTECT VICTIMS FURTHER.

SOME PICTURES, WHICH VICTIMS NAME WAS ANCHOR TAGGED "HACKED" ABOVE OR NEXT TOO: CONSISTED OF UNCLOTHED CHILDREN LAYING ON GROWN MEN'S UNCLOTHED DEAD BODIES WITH THE MEN'S FACES TORN OFF . Other pictures of extreme pregnant women being harmed by several men at one time. Victim's nice upbringing did not raised her to endure such a grotesque world. Experts state the Stalker is attempting to bring Victim into their evil warped fantasies.

Victims with name reported each instance to FBI direct eMail provided.

(2) sites the Victims name was tagged on - were child Adult sites - reported to FBI personal eMail provided and shut down.

Victims parents were Aerospace Engineers retired. Victims Grandfather (her best friend) reported to Presidents as a Federal Naval Aerospace Commanding Engineer and the Admirals and General's reported to Victims Grandfather on the technology side. Victims father's ashes are in the Episcopal Church as he sang in the choir. Victim grew up in Episcopal Church. Victim is known as a kind, meek and helpful person to all. Victim didn't cause harm to others and mostly gave what she had, even when broke.

Victim's highly embarrassed for the entire family and devastated with physically exhausted and tremors from fear.

Experts who study profiles stated: appears this type Stalker grew up bully, running loose, poor. Generally, retaliate against people whom raised in better family life styles.

----------

ARIZONA CURRENTLY HAS: CYBER HARASSMENT, STALKING, IMPERSONATION, LAWS MAKING THIS A "CLASS 5 FELONY."

VICTIM TESTIFIED WITH DOCUMENTATION IN CALIFORNIA TO ENSURE THIS A CLASS 5 FELONY.

----------

Adult site actors use stage names, NOT real names. LAW ENFORCEMENT PEOPLE STATED: The Black Hat SEO cyber psychopathy "STALKER" purpose was to SET UP Victim (globally) to be hunt down and killed (set up for a 'hit'). Lately associating name with UNDERAGE ABUSE and ILLEGAL CHILD ADULT words and linking victims FULL RARE name next to Adult sites.

----------

VICTIM WITNESS PROTECTION PROGRAM THROUGH SAFE AT HOME:

STATE AND FEDERAL GOVERNMENTS (BOTH) HAVE VICTIMS UNDER SAFETY PROTECTION FOR LAST (2) YEARS WITH ADDITIONAL PRECAUTIONS RECENTLY DUE TO CONTINUED ESCALATED ABUSE FOR EXTREME PERIOD OF TIME - NON-STOP - STALKER IS STOPPED AT ONE TACTIC AND MOVES ON TO ANOTHER.

Victims placed through, VICTIM WITNESS, under "STATE" PROTECTION thru the "SECRETARY OF STATE" to "SAFE AT HOME PROGRAM" under "STALKING" laws, in October 2011 * cyber stalking laws below *

Additionally, the "FEDERAL" GOVERNMENT reviewed 5,000 harassment documents stated herein. The "FEDERAL" GOVERNMENT provided the Victim with additional SAFETY PRECAUTIONS and SECURITY MEASURES under the "DEPARTMENT OF JUSTICE" "STALKING" LAWS.

STATE & FEDERAL Government's (BOTH) reviewed all the documents with series of events and IMMEDIATELY believed the INTERNET STALKER posses a severe PHYSICAL THREAT to Victim.

Victim, provided ID-CARDS & CERTIFICATES (from both State and Federal government) TO SUPPORT THIS.

---------

CRIME INCLUDES AND NOT LIMITED TO: UNITED STATES FEDERAL Cyber Stalking Laws against women: Women's Violence Act, Department of Justice Reauthorization Act of 2005, H.R. 3402, titled "Preventing Cyber stalking" "Electronic Impersonation" and numbered as § 113, §113(a)(3) provides that Section 223(a)(1)(C) applies to "any device or software that can be used to originate telecommunications and includes (2) years in prison.

ADDITIONAL INTERNATIONAL FEDERAL CRIMES HARASSMENT/ABUSE OF GLOBAL INTERNET SERVICES: Hacking, disruption of global internet services and global search engine services - as the last attack with the name targeting Adult sites was BLASTED OUT in the mega-1000's. Search engines have been helping to clear abuse as this is considered disruption of there services against their 'Terms and Conditions.'

* Electronic Internet Impersonation: SB1411

* Standard Civil Harassment: 527.6, 528.5, 529; M.S. 609.749, Subd1;

* Cyber Bulling, Electronic Harassment, Cyber Stalking, Cyber Harassment California Civil Code § 1708.7 : Penal 646.9, 422, 653.2, 653m

Direct linking and SEO Black Hat Google-bomb Deformation abuse of the name on 100,000s of Adult sites videos: "Harassment can also include intentionally exposing you to materials which the harasser knows, or has reason to know, are culturally offensive or intimidating to you."

-------

These illegal internet 'en mass' Black Hat SEO Deformation Harassment abuse (STALKING & ELECTRONIC IMPERSONATION) attacks: have caused Victim to live in extreme fear. Especially, due to the horrid Adult video's Victims name tagging with, which attract the global worst.

-------

STALKER VIOLATED INTERNATIONAL CYBER LAWS. ISP'S AND VICTIM FILED COMPLAINTS IN THEIR OWN COUNTRIES AS WELL:

CHINESE GOVERNMENT LAWS:

China illegal information reporting center:

http://www.cnnic.net.cn/html/Dir/2007/06/04/4628.htm

7) Those spread por****, obscenity, gambling, violence, homicide, terror or instigate crimes: Those insult, libel against others and infringe other people's legal rights and interests: or Other contents prohibited in laws, rules and administrative regulations.

---------

A CYBER STALKERS PROFILE BY FLORIDA STATE UNIVERSITY PROFESSORS:

"Are likely to include or evolve into some form of off-line attack."

2.1 The Cyberstalker's profile

Cyberstalking, and more generally cyber harassment, are characterized by the stalker's relentless pursuit of the victim online and are likely to include or evolve into some form of off-line attack. Cyberstalkers can be known or unknown to their victim and are often driven by revenge, hate, anger, jealousy, obsession and mental illness, while cyber harassers are often driven by the desire to frighten or embarrass the victim [33]. The harassment may take several forms...

**************************************

Government investigators know the suspect cyber stalker/blaster is. Google pursuing blasters directly & currently isolating blasting as of (Thanksgiving, Christmas and New Years 2012 blasting) in separate buried link. The Stalker would blast more right before each holiday, more intensely, to ruin the families holiday season.

Additionally, explained in "COURT TESTIMONY TRANSCRIPTS" (below in blue print) by a highly experienced SEO Technical Expert. SEO expert explains how a party utilized (whats called) "Black Hat SEO ILLEGAL BLASTING SOFTWARE" to internet: "back-link" : "key-tag" : "Key-stuff" : "HACK": the name ON TO disgusting Adult web sites etc.(tagging Victims name to others Adult videos with horrible key words) by submitting to 'generate' it 1000's of times in cache, instantly.

Google is also globally tracing the Victims initial personal efforts to stop the abuse herself. Which consisted of 4,000+ (just links) submitted to "GOOGLE REMOVAL TOOLS." Initially, Victim spent (7) days a week at (6-12) hours a day for (2) years contacting global ISP/Hosting companies and web site owners to delete name from content. Then Victim used "GOOGLE REMOVAL TOOLS" to remove the name with key word obscenities from internet searches. GOOGLE ISOLATED THOSE LINKS AND TRACED.

Victim would throw-up with loosing eye site from the horrible obscenity pictures and stress which is documented in ER visits.

Victim also cc:d Google Security with every eMail while contacting web site owners and ISP/Hosting companies abuse departments. It's well documented by many who viewed the actual sites and abuse.

Now Google helping Victim to clear and trace per the Global Hosting Companies complaints to Google whom also want the obscenity cyber blaster stopped and prosecuted. It's costing Internet services time, money and poor visibility. Now Google pursing.

The flash drive with over now 22,000 documented exhibits of abuse brought attorneys to tears. Others have been speechless.

A flash drive of 15,000 documents of exhibits: Google Searches, links and web pages in dated sequence of exhibit events were sent to FOUNDER of Google; XXXXXX, XXXXXX, Security VP of Google with ALL Google Executives (to show them how people are utilizing Google to destroy families and children's lives) and Federal Authorities.

We're sure victim is not their only target which good families and their children's reputations are destroyed forever (en mass) whom have no idea why.

The Stalker has turned Google into a MEGA GLOBAL INTERNET TRASH DUMPSTER OF EXTREME MASSIVE DISGUSTING ABUSE. WHILE HARASSING HOSTING COMPANIES AND WEB SITE OWNERS SERVICES GLOBALLY.

This is making Google a worthless trash dumpster for generations to use for education, information and to view true histories of families ancestors. Technology buffs around the globe are angry and want this stopped.

Suspects family sells the Black Hat SEO blasting software and a member of many illegal (en-mass) Cyber Blasting sites. Since, wiped most their names and reputations off their Black Hat SEO blasting affiliations. However, they have extensive documentation with technical witnesses verified.

Suspect can play an innocent weak victim with the push of a personality button. Classified as true Psychopath by experts.

Suspect falsifies documentation to show police and people on side. Suspect was a trial paralegal and stated she falsified documents for trials, would not file those documents in court records to be truthfully verified and only show judges etc on the side during court cases. Suspect has gun with Black Belt.

Suspects served with TRO papers and blast own name on internet slander sites the day before court hearing. Then, contacted Court Clerks (the day before TRO hearing) to view their own slandered names. This was to take focus off real Victim and, therefore suspect would appear the true Victim. Additionally, A suspect purposely neglects filing exhibits in court documents under 'Penalty of Perjury.' However, only shows (much worse) false documentation, which was NOT on the internet about the suspect: to friend's, Victims attorney and Police - on the side.

Victim and tech's have ALL TRUE documentation regarding A suspects name on the Internet. The true information was NOTHING close to what the suspect personally created to show Police, Judges and Victims Attorney (only) on the side.

Global Adult, web site owners and ISP/hosting companies are angry do to their services abused en-mass.

Thank you, for scanning and eMailing all documentation (including envelopes) received regarding suspects false complaints and false created documentation to encourage others to abuse Victim in attempt to ruin her life more. Including Government Agencies receiving false complaints all forwarded to pro-bono attorneys.

Flash drive with 15,000+ (Adult site deformation abuse links, print outs) with exhibits dated in sequence were forwarded to Google founders and all Google Executives whom took over and ranked this site. Other flash drives sent to DoD, DoJ and FBI.

Stalker attempted to blast this site down several times with obscenities. Appears to prevent the family (place them in fear) from protecting themselves and to allow horrible people to search for Victim (to harm). So, people believe Victim is scum child abuser and should be killed. It's all documented in eMail links sent to Google US Law Enforcement and cc: to previous Attorney for DoD.

HOWEVER, GOOGLE HAS RANKED (TAKEN OVER) THIS SITE FOR VICTIM WHILE TRACING THE ABUSE. TO DATE: Stalker has been unable to blast it down.

Directly after this site was put up to save the family from being sought out and murdered as global Adult trash and child abusers (due to family addresses etc in databases and easy to find). The stalker then blasted the Victims name 100,000's of times with key words of: Child abuse, Child and Kiddy sex obscenities on Adult sites. This caused an ISP/hosting company in Asia and Amsterdam to shut down their services and alert all their site owners who were also shut down from the abuse to their sites. Once the blasting hits a ISP/Hosting company servers they are poisoned and the name with key words attack their customers web sites and "anchor tag" hacked on sites en-mass.

Each time, the family contacted an ISP/Hosting company with eMail link of abuse, they also cc:d the link with Google search copy and all information to Google Security, Legal and US Law Enforcement with Cyber tech's and Attorneys (from the very beginning). It's all documented in 400+ pages of just the copied links and 3+ files boxes of printed out documentation which all in dated in exhibit sequence. It's all well documented with many others including Google as witnesses to the truth on all stated herein. Now, all scanned on Flash drive.

Victims in contact with hosting companies attorneys all over the world. Other countries laws are more strict. We want this Cyber blaster stopped. All links still being traced.

******************************************

Victim obtained (3) short TRO'S. However, advised only Google can trace (supply enough information to stop the Stalker) this type of abuse around the world due to linking name on web-sites owned by people in other countries. While under judges orders to stop - the Black Hat SEO deformation abuse blasting stopped. After Judges Orders ended (each time) - the blasting of Victims name started the very next day with more intensity each time. It's well documented.

Now, as of January 2012: Google's taking over and helping Victim. Otherwise, we don't believe, physically, her damaged heart will hold up much longer.


*****************

COURT TESTIMONY BY SEO TECHNICAL EXPERT ( May 4, 2012 ) STEVE W - A PREVIOUS UNITED STATES MARINE, & TECHNICAL SEO "SEARCH ENGINE OPTIMIZATION" E-BUSINESS EXPERT & FATHER.

A.

I'M A SEARCH ENGINE OPTIMIZATION CONSULTANT

Q.

HOW DID YOU GET INVOLVED IN THAT KIND OF WORK?

A.

I GOT A DEGREE IN E-BUSINESS MANAGEMENT IN 2004 AND I'VE BEEN A WEBMASTER SINCE 1998. AND A LOT OF MY WEB DESIGN CLIENTS WERE HAPPY WITH THEIR WEBSITES BUT COMPLAINING ABOUT THE TRAFFIC AND DIDN'T HAVE A LOT OF MONEY TO INVEST IN MARKETING, SO I LEARNED HOW TO GET THEM NATURAL TRAFFIC FROM SEARCH ENGINES.

Q.

VERY WELL. WHILE YOU'RE TESTIFYING, KEEP IN MIND WE HAVE A COURT REPORTED HERE TODAY THAT WILL BE TAKING DOWN EVERY WORD YOU SAY, SO TRY NOT TO SPEAK TO QUICKLY.

Q.

WHAT TYPE OF EDUCATION DID YOU RECEIVE IN ORDER TO WORK IN THE FIELD YOU'RE CURRENTLY IN?

A.

I HAVE A DEGREE IN E-BUSINESS MANAGEMENT, WHICH COVERS THE SCOPE OF WEB DESIGN, GRAPHIC DESIGN, E-COMMERCE PROJECT MANAGEMENT, AS WELL AS INTERNET MARKETING, AND FROM THERE, OF COURSE, WE LEARNED A LITTLE BIT IN SCHOOL, BUT MOST OF WHAT I LEARNED IS PRETTY SPECIALIZED, THEY DON'T REALLY HAVE A SCHOOL FOR IT. THERE'S WORKSHOPS AND CONFERENCES YOU CAN GO TO, BUT THERE ISN'T A DEGREE IN SEARCH ENGINE OPTIMIZATION.

Q.

HAVE YOU ATTENDED WORKSHOPS AND CONFERENCES?

A.

YES. I ATTEND THEM WHENEVER I HAVE THE OPPORTUNITY, SINCE PROBABLY 2004.

Q.

APPROXIMATELY HOW MANY WOULD YOU SAY YOU'VE ATTENDED ?

A.

30 OR 40.

Q.

COULD YOU DESCRIBE YOUR EXPERIENCE SINCE YOU'VE BEEN INVOLVED IN THIS INDUSTRY WORKING WITH SEO, COMMONLY REFERRED TO, SEARCH ENGINE OPTIMIZATION.

A.

SURE. I GOT MY FOOT IN THE DOOR WITH THE WALT DISNEY COMPANY IN 2006 MANAGING A PAY PER CLICK BATES SEARCH MANAGEMENT ACCOUNT FOR ADVENTURES BY DISNEY AND DISNEYLAND.COM. AND I FINALLY BUILT UP A BUSINESS CASE TO GET A BUDGET TO DO SOME NATURAL SEO FOR DISNEY. SO IT WAS REAL EXCITING TO BE A BIG PART OF THE HOLISTIC INTERNET MARKETING CAMPAIGN FOR GOOGLE, YAHOO, AND FOR DISNEY ACCOUNTS.

FROM THERE I ALSO DID A LOT OF WORK WITH EXPEDIA, RING CENTRAL. I'M CURRENTLY WORKING WITH SKECHERS. I'M THE OUTSOURCE PROVIDER OF SEARCH SERVICES FOR THE SHOE COMPANY SKECHERS AT THE MOMENT. AND I DO GET A LOT OF CALLS AND REFERRALS FROM PEOPLE WHO NEED HELP EITHER GETTING BETTER PLACEMENT IN SEARCH RESULTS OR FIXING A NEGATIVE PLACEMENT. SUCH AS ONE OF MY CLIENTS RIGHT NOW HAS A PROBLEM WHERE SOMETHING NEGATIVE SHOWS UP FOR THEIR BRAND NAME AND MY JOB IS TO HELP THEM REMOVE THAT OUT OF THE SEARCH RESULTS AND TO IDENTITY WHY IT HAPPENED.

Q.

OKAY. AND YOU'RE CURRENTLY WORKING FOR YOURSELF?

A.

CORRECT. I'M A CONSULTANT.

Q.

OKAY. WHAT EXACTLY IS SEARCH ENGINE OPTIMIZATION?

A.

SEARCH ENGINE OPTIMIZATION IS -- IT INVOLVES GETTING BETTER AND HIGHER PLACEMENTS IN SEARCH RESULTS OR THE OPPOSITE, REMOVING SEARCH RESULTS THAT YOU DON'T WANT TO APPEAR. SO WHAT'S INVOLVED AND WHAT THE SEARCH ENGINES USE AS SORT OF A BASE CRITERIA IS BASED ON THREE FACTORS. ONE IS RELEVANCY. IF THERE'S A PAGE OF CONTENT ON A WEB SITE THAT MATCHES A PARTICULAR QUERY, THEN YOU'VE SATISFIED THAT RELEVANCY FACTOR. IF OTHER WEBSITES ARE TALKING ABOUT MENTIONING LINKING OR DISCUSSING ON FACEBOOK OR ELSEWHERE THAT SOME PIECE OF CONTENT, YOU'VE GOT THE POPULARITY FACTOR SATISFIED. SO THERE'S RELEVANCY, POPULARITY, AND THE LAST ON IS USER BEHAVIOR. AND THAT IS HIGH VOLUMES OF SEARCHES FOR PARTICULAR TERMS AND THEN ACTIONS THAT HAPPEN WITHIN THE SEARCH RESULT, SUCH AS A CLICK OR RETURN BACK TO THE SEARCH RESULT IF THAT CLICK DIDN'T PRODUCE THE RESULT THE USER WAS LOOKING FOR. SO GOOGLE WILL FIRST LOOK AT AND MAKE SURE THAT THE RESULTS --

Q.

NO AUDIBLE RESPONSE)

A.

SAY THAT AGAIN.

Q.

SORRY. I WAS JUST ASKING YOU TO SLOW DOWN A LITTLE BIT.

A.

SORRY. SO IN ESSENCE THE FIRST THING THAT SEARCH ENGINES WILL LOOK FOR IS TO MAKE SURE THAT THE PAGE IS RELEVANT TO THE QUERY; SECOND, IT WILL LOOK TO MAKE SURE THAT PAGE IS POPULAR OR DISCUSSED OR MENTIONED ONLINE. LINKS, HYPERLINKS TO THOSE PAGES ARE TYPICALLY, YOU, A MAJOR FACTOR OF ALL THE SEARCH ENGINES. IN FACT, LARRY PAGE OF GOOGLE, WHEN HE CREATED GOOGLE'S PAGE RANGE, IT WAS BASED ON THE SYSTEM OF LINKING. AND I DO HAVE A DOCUMENT THAT KIND OF TALKS ABOUT IT A LITTLE BIT. AND THEN, OF COURSE, THE LAST PART OF IT IS INFLUENCED BY WHAT USERS DO IN THE SEARCH RESULTS. IF YOU SATISFY THOSE THREE THINGS, YOU CAN RANK HIGH AND GET BETTER PLACEMENT FOR ANY QUERY YOU WANT.

Q.

SO HOW EXACTLY DOES GOOGLE WORK AS FAR AS GETTING RANKINGS FOR NAMES, COMPANIES, BUSINESSES, ETC CRITERIA?

A.

IT'S A REALLY GOOD QUESTION. SO BRAND NAMES, SPECIFICALLY, BRAND NAMES DEFINITELY HAVE MORE AUTHORITY IN THE SEARCH RESULTS, SPECIFICALLY BECAUSE PEOPLE ARE SEARCHING FOR THE BRAND NAME ITSELF. SO AS A MODIFIES TO THEIR BRAND NAME, SOMEBODY MIGHT USE, FOR EXAMPLE, "SKETCHERS SHOES." SO NAMES ACTUALLY DO HAVE A LOT MORE WEIGHT WITH SEARCH RESULTS. IF SOMEBODY DOES A BRANDED SEARCH -- WELL, LET ME PULL UP THAT DOC AND TALK ABOUT IT A LITTLE BIT, HOW GOOGLE WORKS, AND SEE IF I CAN VIEW IT FROM THE CURRENT SLIDE.

YOU CAN SEE THIS A LITTLE BIT BETTER, HOW GOOGLE WORKS. SO THIS WAS TAKEN FROM THE TECHNOLOGY PAGE AT GOOGLE.COM AND IT'S PROBABLY HARD TO SEE, BUT LET ME GO BACK ONE.

AND BASICALLY WHAT I'VE HIGHLIGHTED HERE IS IT FOLLOWS A SYSTEM OF LINKING, AND IT'S BECOME A LITTLE BIT LESS IMPORTANT OVER THE LAST SEEK OR SO, THANKS TO SOME RECENT UPDATES THEY HAVE, BUT HISTORICALLY LINKS ARE THE FOUNDATION OF WHAT MAKES A WEB PAGE RANK HIGHER THAN ANY OTHER WEB PAGE. AS A MAJOR BRAND OR A NAME EARNS LINKS TO THAT WEB PAGE, THE HIGHER UP IT'S GOING TO MOVE UP IN THE SEARCH RESULTS. AND, AGAIN, WE KIND OF LOOKED AT SOME EXAMPLES OF WHAT MIGHT HAVE CAUSED SOME OF THE RESULTS THAT VIVIAN HAS SEEN.

Q.

JUST TO INTERRUPT, I APOLOGIZE, HAVE YOU MET VIVIAN BEFORE?

A.

JUST RECENTLY.

Q.

OKAY. AND ARE YOU AWARE OF WHAT HAS TAKEN PLACE WITH HER NAME ON THE INTERNET?

A.

YES.

Q.

OKAY. AND ARE YOU FAMILIAR WITH SOMETHING LIKE THIS HAPPENING? HAVE YOU SEEN THIS BEFORE?

A.

I HAVE SEEN THIS WITH NON ADULT-RELATED CONTENT BEFORE, WHERE BUSINESSES WILL USE (SLANDER BOARDS) AND OTHER THINGS. I'VE NEVER SEEN SOMEBODY USE ADULT CONTENT OR SUBMIT TO ADULT WEBSITES TO GET SOMEBODY'S NAME TO RANK BEFORE. IT'S SOMETHING I WAS VERY CURIOUS ABOUT AND I SPENT QUITE A BIT OF TIME RESEARCHING, TO TRY TO ISOLATE WHY THAT WOULD HAPPEN, BECAUSE A NORMAL SEARCH RESULT FOR A NAME WOULD PRODUCE AN AUTHORITATIVE WEBSITE LIKE FACEBOOK OR TWITTER OR A PERSON'S BLOG. I'VE NEVER SEEN IT WHERE IT WOULD APPEAR WITH ADULT SEARCH RESULTS BEFORE.

Q.

SO YOU STATED YOU RESEARCHED THIS?

A.

YES. SIR.

Q.

OKAY. AND WHAT DID YOUR RESEARCH UNCOVER?

A.

RESEARCH UNCOVERED THE FACTORS THAT I HAD MENTIONED FOR SEARCH. THE RELEVANCY PART OF IT HAD TO DO WITH, YOU KNOW, OF COURSE THE CONTENT ACTUALLY HAVING HER NAME IN IT.

LET ME SCROLL THROUGH AND SHOW YOU WHERE I FOUND IT. ONE IS UP HERE IN THE URL. THIS URL UP HERE ACTUALLY CONTAINS HER NAME. IF THIS WERE DONE BECAUSE OF TAGS OR SEARCH RESULTS ON THAT PARTICULAR WEBSITE, IT WOULD NORMALLY SAY "SITE.COM?" OR "SEARCH?" EQUALS AND THEN THE SEARCH RESULT. BUT THIS IS A STATIC URL AND IT WAS GENERATED, LIKELY, BECAUSE SOMEBODY PHYSICALLY WENT OUT THERE AND CREATED THE PAGE OR SUBMITTED THE PAGE TO HAVE THOSE KEY WORDS IN IT. IT'S NOT SOMETHING THAT'S USUALLY AUTOMATICALLY DONE.

SO THE FACT THAT THIS URL CONTAINS THE FULL NAME, GOOGLE WILL READ THAT AND INCLUDE THAT AS PART OF ITS SEARCH. WITHIN THE CONTENT ITSELF, THE FULL NAME IS MENTIONED AS WELL, WHICH AGAIN IF IT WERE TAGS THAT WERE USED, IT WOULD JUST BE "WORD, WORD," AND IT WOULD BE AN ANOMALY THAT HER NAME WOULD HAPPEN TO SHOW UP.

BUT THE NAME ACTUALLY SHOWS UP SPECIFICALLY WITHIN, YOU KNOW, IMPORTANT ON-PAGE OR RELEVANCY FOCAL POINTS, SUCH AS TITLES, HEADERS AND PAGE DESCRIPTIONS, SO THAT STUFF DOESN'T HAPPEN AUTOMATICALLY.

Q.

SO THIS DOESN'T HAPPEN NATURALLY IN GOOGLE?

A.

NO.

Q.

SO SOMEONE ---

A.

SOMEBODY HAD TO SUBMIT IT TO MAKE IT HAPPEN.

Q.

SOMEONE ACTUALLY AS TO PHYSICALLY DO THIS WITH THAT PARTICULAR NAME?

A.

CORRECT.

Q.

WHAT IS A GOOGLE BOMB?

A.

A GOOGLE BOMB -- THE HISTORICAL TERM FOR A GOOGLE BOMB IS WHAT HAPPENS --- WELL, THE NAME CAME ABOUT WHEN GEORGE BUSH'S BIOGRAPHY PAGE RANKED NUMBER ONE AS PEOPLE WERE LINKING TO HIS WEBSITE WITH THE KEY WORDS "MISERABLE FAILURE." AND SO EVERYONE WOULD DO A SEARCH FOR "MISERABLE FAILURE" AND GEORGE BUSH'S BIOGRAPHY PAGE SHOWED UP NUMBER ONE. BUT IT DIDN'T SATISFY THE RELEVANCY FACTOR, SO EVERYTHING WE'VE TALKED ABOUT WITH RELEVANCY DIDN'T MAKE ANY SENSE TO SIT WOULDN'T EXPLOIT IN GOOGLE SYSTEM OF HOW TO GET UP SEARCH RESULTS AND RANK NUMBER ONE BY LINKING IT, AND SO WHAT HAPPENED WAS IT CALLED IT A GOOGLE BOMB.

IF YOU LINK TO A WEB PAGE WITH A SPECIFIC KEY WORDS ENOUGH, GOOGLE WILL MAKE AN INFERENCE THAT THAT PAGE IS ABOUT THAT TOPIC AND MOVE IT UP IN THE SEARCH RESULT.

THEY HAVE MADE CHANGES TO THEIR ALGORITHM OVER TIME TO MAKE SURE THAT THERE IS MORE RELEVANCY AND THERE IS MORE USER BEHAVIOR INVOLVED IN WHAT HELPS IT RANK. BUT A GOOGLE BOMB HISTORICALLY IS LINKING TO A WEBSITE REPEATEDLY.

NOW, GOOGLE BOMBING OVER THE YEARS HAS CHANGED, SINCE THAT WAS ABOUT 2005, SO NOW WE USE GOOGLE BOMB AS A TERM TO DESCRIBE ANYTHING THAT YOU WOULD DO TO SATURATE SEARCH RESULTS, ANYTHING THAT YOU WOULD DO TO -- LIKE A LOT OF COMPANIES WILL CREATE LITTLE MINI SITES ALL OVER THE PLACE TO KIND OF PROTECT THEIR NAMES, AND THEY'LL SPAM THE SEARCH RESULTS OR GOOGLE BOMB THE SEARCH RESULTS BY CREATING ALL THIS CONTENT, LINKING OT THE CONTENT, AND THEN USING PROGRAMS TO GET PEOPLE TO CLICK ON THE LISTINGS TO MOVE THEM UP HIGHER IN THE SEARCH RESULTS.

Q.

DO YOU HAVE ANY OPINION AS TO WHETHER THE NAME VIVIAN *** WAS BLASTED IN A GOOGLE BOMB?

A.

IT LOOKS PRETTY APPARENT THAT IT WAS.

WHEN I WAS GOING THROUGH THE RESULTS -- LIKE I SAID, NORMALLY GOOGLE FILTERS OUT THE ADULT SEARCH RESULTS AND THEY PUT IN NORMAL POSITIVE PLACEMENTS, THE FACEBOOKS AND THE TWITTERS AND SO FORTH. YOU'D HAVE TO ACTUALLY GO INTO SETTING AND CHANGE YOUR SETTING TO NOT BE SAFE SETTING, TO SEE THE ADULT. THE FACT THAT WE SEE THE ADULT MEANS THAT SOMEBODY USED SOME TYPE OF SOFTWARE OR MANUALLY WENT OUT TO EACH OF THESE INDIVIDUAL SITES, ONE OR THE OTHER, AND CREATED ALL OF THIS CONTENT FOR IT TO MAKE IT LOOK LIKE THE ADULT IS REALLY THE AUTHORITATIVE SOURCE.

Q.

DO YOU HAVE ANY INFORMATION ON HOW MS.***'S NAME COULD HAVE BEEN ASSOCIATED WITH ADULT SITES?

A.

IT HAPPENS -- IT JUST HAPPENS WHEN YOU HAVE ENOUGH SUBMISSIONS AROUND A SPECIFIC TOPIC. BY BLASTING OUT LINKS. CASE IN POINT, ONE OF MY TAG LINES IS "SEO EXPERT" AND I TEND TO RANK PRETTY WELL FOR THE KEYWORD "SEO EXPERT" IN THE NATIONAL SEARCH RESULTS; HOWEVER, WHEN DOING A STUDY WITH SOME OF MY OTHER PEERS, IT WASN'T SIMPLY BECAUSE I HAD BETTER LINKS OR BETTER CONTENT, BECAUSE CHRIS *** ACTUALLY HAD A LOT MORE AUTHORITATIVE LINKS TO HIS WEBSITE, IT TURNED OUT THAT THE FACT THAT "SEO EXPERT" USED WITH MY NAME, STEVE *** I'M NOT ON THE INTERNET, BUT IF I WERE TO PUT "SEO EXPERT" IN QUOTES AND I PUT "STEVE ***" IN QUOTES, I HAD SOME 5,000 RESULTS WHERE CHRIS **** ONLY HAD 700. SO MY NAME WAS SEMANTIC TO "SEO EXPERT," AND SO NOW GOOGLE MAKES AN INFERENCE WHEN YOU SO A SEARCH FOR SEO EXPERT, A LOT OF MY CONTENT AND MY NAME APPEAR FREQUENTLY BECAUSE OF THAT, BECAUSE THE LAST TEN YEARS I'VE BEEN OPTIMIZING AROUND THAT.

Q

IS THIS SOMETHING THAT ANY REGULAR PERSON CAN DO?

A.

NO. IT'S A SPECIALTY. THERE'S NOT EVEN A SCHOOL FOR IT.

Q.

OKAY. WHAT IS THE DIFFERENCE -- OR CAN YOU DEFINE "WHITE HAT" AND "BLACK HAT SEO"?

A.

SURE. SO GOOGLE HAS IT'S POLICIES AND IT'S WEB MASTER GUIDELINES, AS THEY CALL IT, AND "WHITE HAT SEO" MEANS YOU ARE TRYING TO BUILD YOUR VISIBILITY WITHIN THE SEARCH ENGINES BY GOOGLE'S GUIDELINES. YOU READ THEIR STARTER GUIDE, YOU READ HOW TO OPTIMIZE YOU WEBSITE SO THAT IT FITS WITHIN THE TERMS AND CONDITIONS, AND YOU'RE NOT SPAMMING, YOU'RE NOT SHOVING KEY WORDS IN OR ANYTHING.

IF YOU DO VIOLATE THEIR TERMS AND CONDITIONS AND USE 'AUTOMATED TOOLS' TO TRY TO GAIN SEARCH RESULTS, IF YOU PARTICIPATE IN NETWORKS TO TRY TO BUILD LINKS, LIKE, HEY, I HAVE 20,000 WEBSITES, GIVE ME $100 AND I'LL LINK FROM ALL OF THEM TO YOUR WEBSITE, THAT'S A NETWORK. IF YOU DO ANYTHING THAT VIOLATES THE TERMS AND CONDITIONS TO SPECIFICALLY TRY TO GAIN SEARCH RESULTS, THEN THEY CAN FILTER YOU OUT OF YOU COULD LITERALLY LOSE YOUR RANK ALL TOGETHER. Q.

WHAT HAPPENED TO "MS. R***" NAME, WOULD THAT BE CONSIDERED "WHITE HAT" OR "BLACK HAT"?

A.

THAT WOULD BE CONSIDERED "BLACK HAT", BECAUSE IT WAS DONE SPECIFICALLY TO INFLUENCE OR MANIPULATE SEARCH RESULTS.

Q.

WOULD YOU SAY THAT THIS ATTACK WAS SPECIFICALLY GEARED AT THE NAME VIVIAN ***?

A.

ABSOLUTELY !!

FROM WHAT I SAW -- I WENT THROUGH THE PACKET OF PAPERWORK THAT VIVIAN HAD SHOWED ME THAT HAD ALL THE HISTORICAL URL'S. APPARENTLY SHE HAD HAD A LOT OF THEM REMOVED ALREADY, BUT WHEN I LOOKED AT THE HISTORICAL LIST OF THEM, I COULD TELL THAT THEY WERE DESIGNED WITH SPECIFIC CUES. ONE OF THEM WAS THE KEY WORDS, AGAIN, IN THE URL.

ANOTHER WAS THE FACT THAT THEY WERE USING ALL CAPS IN MOST CASES, WHERE A LOT OF THE OTHER SEARCH RESULTS FOR THAT TYPE OF CONTENT WERE TYPICALLY IN SENTENCE CASE OR LOWER CASE, SO TO SEE THE ALL CAPS WAS SORT OF A CUE THAT IT WAS DONE USING SOME TYPE OF SOFTWARE LITTLE PATTERNS OF THINGS THAT YOU CAN PICK UP THAT WERE SIMILAR AMONG ALL THE WEBSITES.

Q.

APPROXIMATELY HOW MANY URL'S WOULD YOU SAY THAT YOU SAW WITH "MS.***" NAME CONNECTED TO SOME TYPE OF ADULT SITES.

A.

THOUSANDS.

Q.

--- MATERIAL?

A.

THOUSANDS.

Q.

THOUSANDS?

A.

THERE WERE 'THOUSANDS' OF THOSE THINGS OUT THERE.

Q.

OKAY. AND DO VIDEO TAGS HAVE ANY RELEVANCE AS FAR AS SEO GOES?

A.

ABSOLUTELY.

ANY KEY WORD THAT YOU USE ON A PAGE, IF YOU DON'T HAVE --- IF YOU PUT IT IN QUOTES IN A SEARCH RESULT, YOU'RE GOING TO GET DIFFERENT RESULTS AS IF YOU DIDN'T. SO WHEN I PUT HER NAME IN QUOTES, FOR EXAMPLE, I WILL ONLY SEE HER NAME WRITTEN OUT EXACTLY IN THAT FORM; HOWEVER, IF I DON'T USE QUOTES, I'LL SEE WHAT GOOGLE THINKS TO BE THE BEST SEARCH RESULT FOR THOSE KEY WORDS THAT I USED IN ANY ORDER AND WITH ANY SEMANTIC VARIATIONS, SUCH AS LAWYER WILL ACTUALLY COME UP WITH ATTORNEY, THE SAME LISTING AS ATTORNEY WILL. SO THERE'S DEFINITELY SIMILAR KEY WORDS THAT YOU CAN USE TO FIND THE SAME THING.

SO IF I WERE TO USE HER NAME WITHOUT QUOTES, I WOULD FIND SOME WEB PAGES THAT ARE JUST USING TAGS FOR "RI****" AND FOR "VI****", SOME OF THEM; AND SOME OF THEM THAT WERE EXPLICITLY "VI***RI****". SO MY FIRST THING WHEN I WAS LOOKING AT THIS TO SEE IF IT WAS JUST A COINCIDENCE, JUST A SYSTEM OF TAGS AROUND VIDEOS AND CONTENT, IS I PUT HER NAME IN QUOTES, AND THAT'S WHEN I KNEW IT WASN'T JUST TAGS, IT WAS SPECIFICALLY DONE BECAUSE IT SHOWED HER NAME IN SEQUENCE, WITHIN TITLES, DESCRIPTIONS, HEADINGS, AND VIDEO CONTENT. SO IT WAS REAL EASY TO ISOLATE BOTH OF THEM OUT. THE MAJORITY SEEMED TO BE IN SEQUENCE.

Q.

OKAY. AND YOU PREVIOUSLY TESTIFIED THAT NOT JUST ANYONE WOULD HAVE THE SKILL OR THE KNOWLEDGE TO BLAST THE NAME LIKE THIS; IS THAT CORRECT?

A.

CORRECT.

Q.

WERE YOU ABLE TO -- DID YOU SPEAK TO "MS. RI***" ABOUT THE PROBLEMS THAT SHE WAS HAVING WITH "****".

YES.

Q.

--- WITH "MS.**** ?"

A.

YES.

Q.

DID YOU DO ANY RESEARCH INTO "MS.****'s F***ER?

A.

YES. SHE HAVE GIVEN ME A STARTING POINT OF WHAT SHE THOUGHT MIGHT HAVE BEEN CAUSING THE PROBLEM.

Q.

"MS. RI ****"

A.

CORRECT.

AND SO I DID SOME RESEARCH, I LOOKED AROUND, AGAIN, USING DIFFERENT SEARCH QUERIES TO TRY TO FIGURE OUT IF I COULD SOURCE IT. AND SO THE FIRST THING THAT I DID WAS I TOOK, OBVIOUSLY, THE NAME AND I WENT OUT THERE AND LET ME SHOW YOU WHAT I FOUND IN THE SEARCH RESULTS. SO, YEAH, I DID A SEARCH AND I FOUND -- HERE'S THE ONE, HERE. THERE WE GO. SO I FOUND MULTIPLE WEBSITES THAT CONTAIN "MR. ****" AND MULTIPLE EXAMPLES OF SOFTWARE THAT HE USED SPECIFICALLY OR MAY HAVE USED SPECIFICALLY TO DO THIS TYPE OF EXERCISE.

AND, AGAIN, THIS IS SOFTWARE WE FROWN ON BECAUSE IT'S "BLACK HAT SOFTWARE" IN THE SEO COMMUNITY, BUT IT WAS OBVIOUS, BASED ON THE TYPE OF SOFTWARE THAT HE WAS USING, THIS "BLAST---" AND SO FORTH -- HERE WE GO, HUNDREDS OF SERVICES HERE. I THINK HERE'S THE SCREEN SHOT THAT KIND OF SHOWED HOW THIS WHOLE BLACK HAT THING WORKS.

YOU BASICALLY CREATE A WEBSITE, YOU USE SOCIAL NETWORKS AND OTHER WEBSITES AND YOU LINK IN TO THAT PARTICULAR SITE AND THEN GOOGLE LOOKS AT THAT AND SAYS IT MUST BE AN IMPORTANT WEB SITE BECAUSE I SEE A LOT OF LINKS TO IT, AND THEN THAT SITE RANKS.

SO THEN I TOOK THAT INFORMATION, I LOOKED FOR DIFFERENT TYPES OF TOOLS THAT HE MIGHT HAVE USED, AND THEN I FOUND HIS NAME ASSOCIATED WITH A LOT OF THEM, LIKE THIS "BLAST--". I COULD PUT A SCREEN SHOT HERE AT THE END. SO IT'S ALSO ON THE "BLAST---" WEB SITE AS WELL. AND BASICALLY WHAT THE SOFTWARE DOES IS IT SUBMITS AND IT CREATES PROFILES ACROSS ALL OF THESE DIFFERENT DESTINATIONS. AND IT'S A COMMON ILLEGAL SOFTWARE THAT BLACK HAT SEO'S USE. THERE'S SEVERAL, ACTUALLY, IN THE LIST. THERE'S THIS "S.E.NU--" ONE THAT'S A REALLY BIG DEAL THAT DOESN'T REALLY ASSOCIATE TO THE ADULT INDUSTRY. THERE'S ALSO, AGAIN, MULTIPLE SOFTWARE OUT THERE THAT IF I PUT A LINK HERE, I AM SURE IT'S IN YOUR DOCUMENTS THAT YOU COULD LOOK AT, TO FIND THE DIFFERENT TYPES OF SOFTWARE THAT PEOPLE USE. HERE'S HOW PEOPLE USE "SOCIAL A--" TO GET THOUSANDS OF PEOPLE ON FACEBOOK, TO LINK TO OR TO DISCUSS A PAGE OR TWITTER OR BOOKMARK A WEBSITE, SUCH AS "DELICIOUS" OR SOME OTHER BOOKMARK WEBSITES.

SO THIS SOFTWARE, YOU KNOW, WE LOOKED INTO IT, THIS "BLASTO--" DOES ESSENTIALLY THE SAME THING, IT GOES OUT AND IT SUBMITS CONTENT EN MASSES. I DON'T KNOW IF IT WAS THE TOOL ITSELF THAT HE USED.

BUT THE FACT THAT HE WAS ASSOCIATED WITH USING THIS TYPE OF "ILLEGAL BLACK HAT SEO SOFTWARE" FROM ALL OF THESE DIFFERENT PLACES THAT WE FOUND HIM ON LINE WHERE HE'S FAMILIAR WITH BLASTING, YOU KNOW, CONTENT AND DOING BULK SUBMISSION TELLS ME THAT'S HE'S VERY ACCLIMATED TO HOW THE SOFTWARE WORKS AND VERY FAMILIAR WITH THAT TYPE OF SOFTWARE.

Q.

IS THAT A PICTURE OF "MR.***?" IN THE BOTTOM LEFT-HAND CORNER?

A.

VIV** INDICATED THAT IT WAS, WHEN WE LOOKED AT IT TOGETHER.

Q.

OKAY. HAVE YOU SEEN ANY PROFILES OF "MR.****" ON LINE PROMOTING THIS TYPE OF SEO WORK?

A.

WELL, WHAT YOU SEE HERE, AND "LEADSO---" AND "BLAST ---" HAD HIS PROFILE ON IT.

Q.

AND FROM THE RESEARCH THAT YOU'VE DONE, YOU'VE BEEN ABLE TO TIE MANY OF THESE WEBSITES TO THE ACTUAL NAME "MR.***.******" AND THAT BUSINESS THAT HE PROMOTES?

A.

CORRECT.

THE BLASTING AND LEAD GENERATION OF BUSINESS BY DOING BULK SUBMISSION, DEFINITELY THERE'S AN ASSOCIATION THERE.

I MEAN, YOU SEE THIS PROFILE IN "SCO--.NET", HIS PROFILE ON "FREE FF--S", EVEN ON SOME OF HIS SOCIAL PROFILES HE'S PROMOTING THE FACT THAT HE CAN GENERATE LEADS BY USING BULK SUBMISSION.

Q.

IN YOUR OPINION WAS EVERYTHING THAT HAS HAPPENED WITH "MS. RI****" NAME DONE BY SOMEONE WITH THE SKILL AND EXPERTISE OF "MR.****".

A.

YES.

YOU ABSOLUTELY NEED OT KNOW WHAT YOU'RE DOING TO BE ABLE TO GET THAT LEVEL OF SATURATION IN THE SEARCH RESULTS.

Q.

AND YOU BELIEVE THAT "MR.***" DOES KNOW WHAT'S HE'S DOING?

A.

ABSOLUTELY.

I LOOKED A THE TOOLS HE WAS USING AND I WENT THROUGH AND I KIND OF ANALYZED THE DIFFERENT DESTINATION THAT THOSE TOOLS GO TO AND HOW THEY CAPTURE PROFILES, AND IT'S VERBATIM WHAT THE BIGWIGS IN THE SEO COMMUNITY USE, WHICH IS THE "S.E. NU--" TOOL.

AND, AGAIN, THIS SCREEN SHOT OVER HERE IS JUST AN EXAMPLE OF ONE. THIS PARTICULAR PIECE OF SOFTWARE ALLOWS YOU TO GO OUT TO ANY WORD PRESS WEBSITE AUTOMATICALLY THROUGH THE SOFTWARE AND PUT IN A COMMENT. JUST CLICK A BUTTON AND YOU CAN HAVE HIGH GRADE BLOG POSTS ON THOUSANDS OF BLOGS ALL ACROSS THE INTERNET. SO THERE'S A LOT OF THIS TYPE OF SOFTWARE OUT THERE, BUT YOU HAVE TO BE ACCLIMATED TO SEARCH, YOU KNOW, HOW TO USE IT EFFICIENTLY.

Q.

WAS THERE ANY OTHER INFORMATION THAT YOU UNCOVERED THAT MAY HAVE INDICATED WHERE --- HOW THIS BEGAN...


**** END STEVE W. COURT TESTIMONY ****


*********************************************


"SAFE AT HOME" PROGRAM - LEGAL NOTIFICATION OF VICTIM PROTECTION LAWS:

http://www.sos.ca.gov/safeathome/sah-laws.htm

STATE LAW WITH SAME FEDERAL LAW: 6208.1. (a) (1) No person, business, or association shall knowingly and intentionally publicly post or publicly display on the Internet the home address, home telephone number, or image of a program participant or other individuals residing at the same home address with the intent to do either of the following: (A) Incite a third person to cause imminent great bodily harm to the person identified in the posting or display, or to a coresident of that person, where the third person is likely to commit this harm. (B) Threaten the person identified in the posting or display, or a coresident of that person, in a manner that places the person identified or the coresident in objectively reasonable fear for his or her personal safety. (2) A participant whose home address, home telephone number, or image is made public as a result of a violation of paragraph (1) may do either or both of the following: (A) Bring an action seeking injunctive or declarative relief in any court of competent jurisdiction. If a jury or court finds that a violation has occurred, it may grant injunctive or declarative relief and shall award the successful plaintiff court costs and reasonable attorney's fees. (B) Bring an action for money damages in any court of competent jurisdiction. In addition to any other legal rights or remedies, if a jury or court finds that a violation has occurred, it shall award damages to that individual in an amount up to a maximum of three times the actual damages, but in no case less than four thousand dollars ($4,000). (b) (1) No person, business, or association shall knowingly and intentionally publicly post or publicly display on the Internet the home address or home telephone number of a participant if that individual has made a written demand of that person, business, or association to not disclose his or her home address or home telephone number. A demand made under this paragraph shall include a sworn statement declaring that the person is subject to the protection of this section and describing a reasonable fear for the safety of that individual or of any person residing at the individual's home address, based on a violation of subdivision (a). A written demand made under this paragraph shall be effective for four years, regardless of whether or not the individual's program participation has expired prior to the end of the four-year period. (2) A participant whose home address or home telephone number is made public as a result of a failure to honor a demand made pursuant to paragraph (1) may bring an action seeking injunctive or declarative relief in any court of competent jurisdiction. If a jury or court finds that a violation has occurred, it may grant injunctive or declarative relief and shall award the successful plaintiff court costs and reasonable attorney's fees. (3) This subdivision shall not apply to a person or entity defined in Section 1070 of the Evidence Code. (c) (1) No person, business, or association shall solicit, sell, or trade on the Internet the home address, home telephone number, or image of a participant with the intent to do either of the following: (A) Incite a third person to cause imminent great bodily harm to the person identified in the posting or display, or to a coresident of that person, where the third person is likely to commit this harm. (B) Threaten the person identified in the posting or display, or a coresident of that person, in a manner that places the person identified or the coresident in objectively reasonable fear for his or her personal safety. (2) A participant whose home address, home telephone number, or image is solicited, sold, or traded in violation of paragraph (1) may bring an action in any court of competent jurisdiction. In addition to any other legal rights and remedies, if a jury or court finds that a violation has occurred, it shall award damages to that individual in an amount up to a maximum of three times the actual damages, but in no case less than four thousand dollars ($4,000). (d) An interactive computer service or access software provider, as defined in Section 230(f) of Title 47 of the United States Code, shall not be liable under this section unless the service or provider intends to abet or cause bodily harm that is likely to occur or threatens to cause bodily harm to a participant or any person residing at the same home address. (e) Nothing in this section is intended to preclude prosecution under any other provision of law. (f) For the purposes of this section, the following terms are defined as follows: (1) "Image" includes, but is not limited to, any photograph, video, sketch, or computer-generated image that provides a means to visually identify the person depicted. (2) "Program participant" means a person certified as a program participant in the manner described in Section 6206. (3) "Publicly post" or "publicly display" means to communicate or otherwise make available to the general public.

6208.2. (a) (1) No person shall post on the Internet, with the intent that another person imminently use that information to commit a crime involving violence or a threat of violence against the participant or the program participant's family members who are participating in the program, the home address, the telephone number, or personal identifying information of a program participant or the program participant's family members who are participating in the program. (2) A violation of this subdivision is a misdemeanor punishable by a fine of up to two thousand five hundred dollars ($2,500), or imprisonment of up to six months in a county jail, or by both that fine and imprisonment. (3) A violation of this subdivision that leads to the bodily injury of the program participant, or of any of the program participant's family members who are participating in the program, is a misdemeanor punishable by a fine of up to five thousand dollars ($5,000), or imprisonment of up to one year in a county jail, or by both that fine and imprisonment. (b) Nothing in this section shall preclude prosecution under any other provision of law.

LEGAL SERVICE TO SAFE AT HOME PARTICIPANT:

The Secretary of State serves as the legal agent to accept legal documents on behalf of participant. If it becomes necessary to execute a process of service, two copies of each document being served are required and shall be delivered to the Secretary of State - direct office between 8a-5p.

Mailing to Safe at Home Participants:

The Secretary of State serves as the legal agent to accept and forward mail on behalf of all participants of the program. (per Government Code §6206(a)(5)) Please be sure to include the participantâ��s four-digit Authorization ID number (provided on the Authorization ID card) when mail is addressed to the participant at their designated Safe at Home mailing address. If possible, the Authorization ID number should be placed adjacent to the participantâ��s last name or as a separate box number in the address line. The Safe at Home mailing address is shared by other participants. The use of the participant Authorization ID number expedites the sorting and forwarding of participant mail. If it becomes necessary to execute a service of process, please prepare two copies of each document being served.

The documents must be delivered to:

Secretary of State�s office, 1500 11th Street, 4th Floor, Sacramento, CA 95814 between 8:00 a.m. and 5:00 p.m., Monday through Friday, excepting state holidays. One copy is immediately forwarded to the program participant and the other copy is retained in the participant's file for reference.

Protecting Participant Information in Court (per Government Code §6207)

The Safe at Home participant should notify the court prior to the scheduled hearing date of his or her enrollment in the Safe at Home Program. He or she may show officers of the court his or her Authorization ID card as proof of active enrollment. The participant�s designated Safe at Home mailing address should be used on all new court documents and his or her confidential address information must be kept confidential.


*********************************************


UNFORTUNATELY, for the "Black Hat SEO" "Google-bombing" STALKER the Victims employment history includes and not limited to: Consultant, flown around the world to build DIVERSIFIED CULTURE, TECHNOLOGY TEAMS of Engineers, Directors, Vice Presidents for Semiconductor (other tech) company projects on VP's budgets. Until, Victim, became ill with heart, low blood counts and LUPUS symptoms for a few years, until under control.

Victim had the knowledge to trace any web site owner with ISP/hosting company via PING RUN>COMMANDS DOS or 100's of other ways. Brings up web site/hosting IP's and then easily traced to find hiding Web Site owners & their Hosting Companies. Then submit abuse tickets and report it to FBI Security and remove name from content.

EVERYTHING IS TRACEABLE ON THE INTERNET - ONE WAY OR THE OTHER.

LUCKILY, Due to some Web Sites RE-hosted 100's of times globally: Victim had additional high level connections in Asia, Germany and UK: through technology connections and ON-LINE GLOBAL TECHNOLOGY "USERS-GROUPS." They would contact the hosting company in their country and help support Victim. Victim, built a global network to resolve issues depending on the country - through connections and technology "USER-GROUPS."

Of course: REAL TECHNOLOGY BUFF'S DON'T APPRECIATE THEIR WORK FIELD UTILIZED IN THIS HARASSMENT MANOR. Especially, against a global recruiter who offers employment opportunities to techies.

One tech strongly stated: "The STALKER is making a joke out of the internet - which is the most powerful tool on the planet and to be preserved for future generations to utilize for: education, connections, news, in a respectable manor. If people like this ##### Stalker, trash the internet so maliciously, the global governments will have re-course to take over and limit freedom of speech."

******************************

GOOGLE REMOVAL TOOLS - Victim removed over 4,000 links of abuse herself in (2) years

A 404 error code is required on the cache link or link below. Please ask the web site owner to use Google removal tools to delete from link cache below. Your assistance is more than greatly appreciated.

Google personally provided while visiting their office for instructions and help. I�m to report all incidents to Google Legal and Security:

Re-Register or login to Google Webmasters Tools:

https://www.google.com/webmasters/tools/removals?action=show&hl=en&pli=1

*** then click on New Removal Request

***insert full url you want remove from Google

***Click on Continue, enable "permanent removal" and click on Submit Request That's all, within 1-2 days it should be removed.

*** There is one condition before this -- he must edit his so called file "robots.txt" and disallow the url he need remove there. So e.g. if he need remove link http://www. -----"he must use this in his robots.txt

file: "Disallow: /some-text", but he should know using of robots.txt file.

More can be found e.g. here:

or

http://www.google.com/support/forum/p/Webmasters/thread?tid=2abd8ea133612078&hl=en

http://searchengineland.com/google-releases-improved-content-removal-tools-10989

******************************

******************************

EVERY MONTH IT CONTINUES. A FLASH DRIVE IS SENT TO FEDERAL GOVERNMENT ATTORNEYS, PRESIDENT, STATE ATTORNEY GENERALS, GOVERNORS....

THE DVD INCLUDES IN SEQUENCE "SERIES OF EVENTS": (3) YEARS OF GOOGLE SEARCHES-DATE STAMPED & PRINTED OUT IN COLOR, COPIES OF 15,000 HARASSMENT/ELECTRONIC IMPERSONATION LINKS CLEARED OF DISGUSTING WEB SITE CONTENT PAGES, SEO TRANSCRIPTS, E-MAILS FROM HOSTING COMPANIES AROUND THE WORLD WHOM STATE THIS IS A "SECURITY ISSUE" WITH "DISRUPTION OF THEIR BUSINESS SERVICES & TIME AND NAME MALICIOUSLY PLACE IN BLACK HAT SEO DEFORMATION ABUSE 1000'S OF TIMES.

A DVD was provided with exhibits of cyber harassment, cyber abuse, electronic impersonation, with series of events, to:

*) Orange County Prosecutors office - felony investigations.

*) Federal Attorneys

*) B. Wilkinson, Attorney, (investigating Google for FTC on SEO abuse). Was previous attorney for Department of Justice.

*) Google US Law Enforcement.

*) IC3.gov

*) Attorney General Office - felony investigations.

*) Yahoo/bing VP of Security & Chief Legal Council.

*) Government Cyber Harassment, Department of Justice, FBI,

*) Attorney Generals of other states.

*) Attorneys for the Department of Justice & FTC.

*) President of Cyber Security in India and Asia: Pavan Dugal - whom report to global Presidents


In America, you have a duty and a right to defend yourself. At the horrid, disgusting, magnitude of the harassment, electronic impersonation - ALL very well documented and witnessed by global Internet services - it's now getting attention from important people. They don't want the internet destroyed for their future children, families & generation - to be turned into a Global Search Engine Trash Dumpster.

This site was put to up to help pass laws. Additionally, the site was set up to save the Victim from being set up to be killed and stalked out by people whom believe the Victim is something she is not, due to the name association. We are also trying to save the family reputation and be free from harm and the Stalking. Additionally, to continue the help from Google who's contacting hosting companies to trace the name as this will validate the reason for their time and money - to protect their services as well.


If you have any knowledge there is a $$$ REWARD.