REGARDING NAME: VIVIAN RITZEN

Current: child's name was ostracized in school (over 3 years) due to cyber stalking abuser/impersonator (below) who operated en-mass against Google & Internet Services (globally) Terms and Conditions (Google has rules and YES they prosecute with direct contact to Yahoo Chief Legal to order security trace links), with mother's and a grandmother's name who also suffered damages. Additionally, FEDERAL CYBER STALKING & HARASSMENT LAWS (below). Family, internet services with Victim (read below) Now, protected through 'Safe At Home' Program, due to extreme retaliation from stalkers cyber abusive actions en-mass below.

Every Link is sent (over 4 years) to direct New York Internet Crimes "IC" FBI private NYxxx@IC.FBI.GOV (they now work with DOJ on Internet Crimes) eMail with cc: Personal Google Security contacts to trace and clear. Or, Yahoo Chief Legal Council, orders the security dept to trace with each abuse and then clear.

Federal Protective Services ordered by Federal Judge. After Judge contacted FBI regarding stalker and viewed documents.

We would like to Thank, the global site owners for assisting to protect the internet for global generations of families. Including and not limited to: Turkey, France, Taiwan, China, Japan, Russia, Ukraine, Netherlands, India.

To the Federal Judge who will read this directly on-line soon (court sealed documents): We've reported each link/blasting to a confidential NY IC FBI Email provided along with (private provided) Google US Law Security & Google International Civil, direct contact to trace and clear. It's very well documented. FBI receives all links in 400 word doc (updated) as well. This website is another example (track record) the stalker has no fear and will kill victim. We published the below(2) years ago, to advise stalker we were pursing justice and to save the family from being associated. However, the stalker continued their relentless pursuit against victim for years and despite of the PUBLIC WARNING TO STOP. Stalker, was advised of our intentions to protect, seek justice and provided every opportunity to stop abusing victim for (4) years through 3 TRO's. After sending Founder of Google and Google Executives a disk with 5,000 exhibits with Yahoo Executives, they started to trace and clear. However, the stalker continued pursuing victim fearlessly and without ANY concern of going to prison. This site, with Google/Yahoo clearing, showed our intentions to protect and the fear lived every second. However, the stalker continued their relentless pursuit over and over 1000's of times to show they have no fear of prison. Due to all the EXTENSIVE 'TRACK RECORD' over several years despite our warning to stop; the longer the PRISON sentence should be and to ensure a prison prosecution. Then, will contact our media connections which include and not limited to: SR. VP of CNN. This long 'track record' of abuse shows judges the stalker is a greater threat to victim and Internet business services globally. The stalker has NO fear of prison and "Track Record" shows they are asking to be put in prison. Each time Stalkers TRO ended, the blasting and linking started the very next day with no fear of prison. Additionally, directly after this site was put up, the stalker tried to blast it down with child abuse and child porn key words associated with Victims name in Google Caption - over and over. Now, Federal Judges and Google pursuing.

The links may be up for a while due to search engines security tracing. People can't disrupt Internet services globally against all the companies and search engines < terms and conditions > and expect to get away, when the abuse is this serious. Costing hosting companies and internet services globally time and money. While making Google a global trash dumpster of abuse.

It's maliciously input to "BLACK HAT SEO" "Googlebomb" ILLEGAL BLASTING SOFTWARE against Google usage < Terms & Conditions > targeting Adult sites sex video's etc, in 1000's of cache back-links (en-mass) with EACH blast. Then, linked anchor-tagged name in caption on Google and in 1000's of website content pages with obscene key words. After, Victim clears up (with GOOGLE US LAW ENFORCEMENT, Technical Forensic Team & FBI help/tracing) the Stalker RE-BLASTS over and over - after each clean up. Costing GLOBAL internet ISP/web site services time/money to clear massive server corruption and 'security HACK attack.'

Victim, Pro-Bono Federal Attorney & GOOGLE LAW ENFORCEMENT tracing/CLEARING over 22,000 'anchor tagged' and 'SEO Black Hat links' of name tagged to OTHERS ADULT VIDEOS & OBSCENITIES en-masses over 3.5 years now.

Google isolating and tracing cyber abuse with Pro-Bono Attorney and technical continue tracing via court sealed documents.

Hosting/ISP companies (globally) cooperating with Google on tracing everything with Victims name (at times FULL and rare name to show targeted at this Victim with residing state) since their servers were blasted and corrupted, which cost them several $1000 in company time to clear. Global site owners & hosting/ISP companies with Victim are not going to stop until Google prosecutes so not to suffer public suit themselves.

Times, Stalker published Victim's FULL and RARE name. Only other is Grandmother's on East Coast, Mother listed on internet or a child.

Federal Non-Profit for cyber, harassment, abuse, bulling: stalking victims meeting with government, media, Google to pass laws as AZ class 5 felony cyber stalking laws with help from our Federal Pro-Bono Attorney assistance. Due to below situation Google founder has been changing Google cache etc. Google does not appreciate it's services utilized as a Global Internet Trash Dumpster and tracking all name links with global hosting company help. Advised Google Security prosecuted others for utilizing their services as a global internet trash dumpster as it's a prison sentence - per below.

PLEASE SEE: Hostgators ISP Security eMail below < in blue print > and SEO Technical Experts COURT TRANSCRIPTS < in blue print > at bottom of page.

GOOGLE FBI Crackdown SEO poisoning PROSECUTION: �SEO expert� that will be spending the next six years in jail for black hat SEO practices. XXXXXXXX.com � pleaded guilty in Federal District Court to two counts of sending threatening communications, one count of mail fraud and one count of wire fraud. Prosecutors say he should spend between five and six-and-a-half years in jail. AND THEY PROSECUTED MORE: CEO of XXXXX.COM, became the 2nd person convicted of Search Engine Spamming and poisoning for �Scraping and willfully using other�s content - under the �Cleaning Up the Internet Scum Act� Mr. XXXXXX was sentenced to 6 years and $421 million dollars in fines earlier this month for similar violations.

http://www.advisemediagroup.com/black-hat-seo-not-worth-the-risk/

>>>>>>>>>

This site is intended to pass laws similar to AZ Cyber Stalking making this a Class 5 Felony. Additionally, to prevent further harm to the Victim and family by perpetrators who believe the Victim is something they are not. They're trying families reputation and be safe.

The site will continue to assist Google who's contacting hosting companies and tracing the name. This will validate the reason for their time and money - to protect their services as well.

The stalker is seriously harassing Google and Internet services globally as Google still tracing with abuse depts as per below they are notified we will sue them if not removed.

Google claims it is immune to defamation liability in the USA due to Section 230C of the Communications Decency Act. I humbly submit that there is an Achilles Heel within that law for Google, and it is all about the definition of the word; INFORMATION, as it is used in the 230C law. Below is my respectful suggestions for any USA residents who are being defamed by Google. Non-USA residents can also sample the text and use it to demolish any defenses Google may have for; INNOCENT DISSEMINATION", which they often use in Common Law countries, such as Australia & The UK.

http://badforpeople.org/how-to-sue-google-for-defamation-and-internet-libel-or-slander/

FBI was very interested in this stalker 2011. Personally went to FBI office to meet. Last (3) years cc: all links name associated with for Federal review to direct eMail NY***@ic.fbi.gov provided. (2) FBI guys sat behind the gun protected glass while we provided a statement. They knew our names. FBI asked us "who do you think is doing this." We stated the stalkers full name to FBI. The VERY second after mentioning the stalkers FULL RARE NAME, the FBI looked quickly at each other and then looked at us, within seconds. Until then, they were taking notes regarding what we said and kept their heads down writing. Once we mentioned the stalkers FULL RARE NAME - they looked up very quickly and asked us if we had anything else to say and asked if the number were where we could be reached and to keep in touch if changes etc. The FBI had our names when walking in. FBI only quickly shocked when mentioning this stalkers name. We believe this very same stalker has done something very evil in their past (or currently this to others) and which the FBI is very interested and been watching for years. (2) low key Psychic's (who report to FBI to find missing children) stated the stalker will be in prison for life and wish she were dead due to media attention. We didn't say anything while they described stalker to a tee. They stated the stalker will cut her hair and die it blond to avoid public recognition blasted all over internet by media. Waiting to make this media public with our information so there is no getting away. Good luck to you. Just a little while 'track record' longer.

>>>>>>>>

There's a Hosting Company in Amsterdam & Asia: who's servers have been 'SEO Black Hat deformation blasted' pointing the Victims name to their Adult web site clients 100,000's of times with illegal child abuse key words. The Hosting Company CEO's have their SECURITY TEAM trace and report to: Google Law Enforcement and International Federal law enforcement etc.

It's costing them several $1000 dollars to clear the servers from pointing the name to "anchor tag" "hack" "compromise" - their web site clients and servers. They were more angry when re-blasted.

OTHER COUNTRIES CYBER SECURITY LAWS ARE MORE STRICT: ASIA, has EXTREMELY STRICT laws regarding REPORTING of: Cyber Crimes, Cyber Harassment, Electronic Impersonation. It's all reported by their hosting company Security Depts into databases with the name and Security Departments traced findings.
>>>>>>>>>>

Anybody, who truly believes that Global Technology companies and real tech's who attended college with BS & MASTERS in TECHNOLOGY - appreciate their Internet business services utilized in the manor...should be imprisoned and forbidden to use the Internet or computers.


******************************************


EMAIL FROM, HOSTGATORS SECURITY, ON 'BLACK HAT SEO' OF NAME: -- received June 2011.

Since, the name re-blasted several times after each clean up.


Hello,

I have investigated this issue thoroughly. These terms do not ever actually appear to be present on our customer's site. It appears that these "cached" links are from the terms on other sites not under or control linking to our customer's sites. There is nothing we are able to do about this as we do not own, nor are in control of the linking sites.

What actually appears to be going on is that the searches for your name are being detected by a "Black Hat SEO" network. This is in turn spawning junk pages on many nodes of the network for the terms linking to other nodes on the network. Some of these links appear to have been pointed to our clients' sites. Individual's sites are often added to these Black Hat SEO networks without their knowledge or authorization via hacks or compromises in their accounts. The sites may have at one point been part of this Black Hat SEO network, but do not appear to be any longer and have been secured/cleaned.

Unfortunately, we would not be able to assist you in tracking down and removing the remaining nodes in the network as they do not fall on servers under our control. You may want to do some reading on google to see if there are any further options to have the material removed from googles cache manually.

Please let us know if you have any further questions.

Regards,

Michael Ka**

Senior Security Administrator

HostGator.com LLC

http://support.hostgator.com


*****************************************

Name is: Grandmother, mother, daughter.

******************

2010: Victim won Small Claims harassment case. After, all below started and has not stopped for (4) years. Prior, came after Victim with many illegal court tactics (Judges declined all of them) only after Victim provided a 30 day notice, by eMail, to vacate a rental and found Victim was secretly video taped, which some pictures will be of Victim naked. Video tape was to be turned over by judges court orders TRO and never done. Video is documented by police and judge with pictures of hidden camera.

* While victim rented the stalker would bully victim. Phyc experts believe the victim was bullied by stalker to make the victim come at stalker so stalker could kill victim on video and claim self defense. However, the victim didn't do anything and spent most time out to get away from stalker. Only after providing 30 day notice by eMail did stalker start illegal court actions and false police filings. Again, another ploy to get victim to come at stalker so could be video tapped on hidden camera. However, victim simply fought the cases and moved out. Stalker could not get victim to retaliate on camera. It's very well documented.

* Stalker ran many scams and wanted victim to lie to stalkers mortgage company. victim refused. All the while, stalker demanded victim pay cash rent to avoid stalker paying taxes. Victim refused to be a part of a mortgage fraud. Stalker had to discredit victim from being a credible witness to stalkers many frauds and came at victim with court actions as though victim did not pay rent and was a problem renter. It's well documented in series of events with Small Claims Case transcripts obtained. Stalker tried to tell judge victim trashed stalkers apartment. Small Claims case judges asked stalker if she had any pictures and stalker did not. All stalker had was fake damage invoices of $1,000.00 which stalker did not have any damage pictures.

* Stalker filed BK in 2003 and (1) year later places 200K down on condo. Stalker told victim stalker used a Credit Repair after BK prior to buying condo. Stalkers insurance partner lost his license due to stalker helping customer to file complaints against her own partner. Then, stalker took over partners clients when he lost is insurance license for 2-3 years. Stalker was able to make a lot of money off her partners clients. Additionally, stalker told victim made money off car accident case. Stalker stole partners clients often and he had no idea. This is what stalker told victim while laughing how stalker is "so smart is scares her."

* Stalker showed victim how Stalker pretended to be paralyzed with brain damage by crawling to bathroom in front of friends/witnesses/doctors during a car accident case. To be the extreme victim. Then, stalker laughs and gets a Black Belt in Karate. Stalker started Karate classes within one year after car accident case settled.

* During Small Claims case stalker forged damage documents to show the judge. However, did not have any pictures. Victim called police on move out day to view the rental with turning over keys. This was to protect victim from stalkers lies. Stalker lies easily with one liners. If asked to elaborate or asked specific questions the stalker get's tangled in lies. Police saw entire rental was in perfect condition and stated in police report. Victim also took pictures of the rental in perfect condition on move out day. Stalker could not show any damage via hidden video camera or pictures AND stalker only testified like a victim to judges there was tremendous damage with showing false damage invoices. Stalker is a master at forging/altering highly professional documents while acting like a victim. Stalker stated when a trial paralegal would take forge documents and take to court while not submitting in evidence to be verified as the truth by plaintiffs or their attorneys. This is illegal but Orange County Court Judges allow it.

* Stalker filed car damage case under stalkers AKA in Small Claims to go around insurance company. Stalkers insurance agent and didn't want the car wash owners to know. The car had previous damage. Stalkers friend falsified damage invoices. Stalker added both damages to get a Small Claims case.

* Stalker files court cases claiming indigent with 200K equity in condo and open credit cards with no debt. This was personally stated by stalker on finances.

STALKER HAS NOT STOPPED COMING AFTER VICTIM SINCE. VICTIM IS A STRAIGHT FEMALE. STALKER STATED "TED BUNDY WAS STALKERS IDOL." STALKER WATCHED IT (3) TIMES IN A MONTH. ALL STALKER TALKED ABOUT WAS EVIL AND KILLINGS AND THOUGHT "NEIGHBORS WERE CARING OUT DEAD BODIES IN ROLLED UP CARPETS." STALKERS EVIL TALK OF KILLINGS OVER (2) MONTHS WITH BULLYING, WHILE RENTING APARTMENT, WERE SO HORRIFYING VICTIM STARTED LOOKING FOR NEW PLACE TO LIVE. EVERYTHING VICTIM SAYS ABOUT STALKER, THE STALKER STATES VICTIM IS DOING. IT'S WELL DOCUMENTED. IT'S LIKE LIVING IN A SYFY MOVIE.

Christmas 2010: Victims FULL AND RARE NAME was Googlebombed for over (40) pages on Yahoo and (20) on Google stating: Victim was homeless, on food-stamps and making 100's of complaints about others and companies. Then Stalker linked Victims FULL and RARE name to 1000's of other peoples slander postings about other companies - to make it appear the Victim had actually made 1000's of slander postings herself against 1000's of companies and people. Every page is technically witnessed, printed out and scanned on flash drive in color. It was also witnessed by many.

2011: Met with FBI who is very interested when victim mentioned stalkers full name. It was apparent this stalker did something evil in past which FBI has not been able to pin yet. A person who does the below to people, would have a strong, track record, history of harming others. It's a game for stalker to bully, harm, pretend to be something they are not and enjoy harming others.

2011: Victim personally went to Google Building crying in lobby (4) separate occasions begging for help. The Receptionist and employees will be a witness to this. They handed victim a Kleenex and sent documents to Google Corporate through the internal mail delivery. Victim thought there was a Google programing problem. Had no idea (at this time) about Black Hat SEO and GoogleBombing until finding out stalkers father a Googlebombing and blasting expert.

FEBRUARY 14, 2011 (Valentines Day): Knowing Victim was on Linkedin.com - set up an account of their own and then targeted Victims employment history profile showing viewed Victims account - it's well documented. Stalker was never on Linkedin before. Knew Victims employment history and nickname used for global employment contacts. After, Victims employment history was google-blasted on foreign web sites with personal slander pages while tagging with Adult site obesity web pages (all on one page) and linking with Victims true full legal name. Stalker set all the associations up on one slander page to destroy Victims ability to obtain and maintain a job. It's ALL well documented with technical witnesses and printed pages scanned on Flash Drive. Only Stalker new of ALL the associations from when affiliated with Victim as her Broker. Victim was referred to Linkedin's in-house Attorney and notified Linkedin Security. Until this time, the Stalker was never on Linkedin. The Victims profile was private on linkedin and not public on Google (at all).

MARCH 2011: Victim files and obtains TRO. While under TRO cyber blasting stopped. Victim had time to clear. Directly after TRO case over the suspect walks up to Victim (against orders) and states "good luck to you" - sarcastically. After each TRO ends the blasting started again more intense with obscene illegal key words hacked to Adult sites. Harassment Orders were signed after TRO which police stated they could not uphold.

MARCH 2011: Prior to TRO case Stalker blasted own name on Internet and contacted court clerks with judge to view the Stalkers name blasted on Internet. Investigator stated this was to frame Victim. Then, Stalker played a Victim to her attorney, police and judges. All the while showing them fake pages of links personally created by stalker. Technical Investigators (at this time) were unaware of the Black Hat SEO linking and blasting tool associations with Stalkers father an expert - advised father taught Stalker. After, Stalker got out of TRO with signing Harassment Papers, the Black Hat SEO blasting started again more intense after judges orders ended. The Stalker told police, the Victim was blasting Stalkers name and bullied Victim to clear Stalkers name from Stalkers self inflicted blasting. Attorneys all advised Victim of this framing.

June 2011: Advised by investigators that stalkers father is Black Hat SEO blasting and linking expert who's affiliated with 100's of blasting sites. He sold the Black Hat SEO blasting software on the side. His rare name associated with all of them on the Internet with his picture attached. This is against Google's Terms and Conditions. It's well documented. Since discovered, he's wiped his name off the Internet Black Hat SEO affiliations after 2nd TRO was tried due to series of events. Additionally, now claiming military deceased per investigator.

MARCH 2012: Victim files 3RD TRO. Suspect filed RO case (3) days prior to Victims trial without notifying Victim's Attorney. Stalker was declined TRO based on NO evidence. Stalker did not advise Victims attorney and only served papers the day of trial. Victim's attorney was not be prepared for the suspects only handwritten snippets of eMails supplied in RO case. Attorney wasn't notified a Detective would testify as was not issued subpoena or notified at all. Stalker played a Victim to Police Detective. Detective did state he believed Victim was a Victim (it's in court transcripts). Suspect was previously a trial paralegal. Suspects initial TRO was declined based on "no evidence." Suspect shows up to court and only acts like Victim and produced snippets of distorted personally handwritten eMails which show a distortion of facts. Victim did not have time to produce the real eMails which were also cc:d to the police dept. The police detective had no idea a lady officer had met with victim and had the real eMails cc:d clearing stalkers name from stalkers own blasting. Stalker was smart enough to going around the officer helping victim and make the detective look like a real idiot ! Victim only had 'series of events' to show in court with 1000's of series of events documents. Stalker never served Victim's Attorney with RO papers until day of hearing and only showed false evidence on side - not submitted to court under penalty of perjury.

* Police Detective, yelled over victim would not allow her to speak and forged a policed report in victims name after she walked out. The Detective LIED in the police report and sure this will be on video and recorded. Police Detective stated victim did not provide evidence, but it was eMailed. Police Detective NEVER called Victim back - ever. This is documented in court transcripts. Investigation reports filed against Detective with FBI and Google notified as the stalker is harassing Google and Internet Service Globally. The Detective did nothing and Sergeant stated "No investigation report was done." Therefore, Got Google and FBI involved. Victim was stonewalled every step of the way by Detective and most likely due to stalkers extensive victim act and lies. It would all be documented in video or tapped. Detective had no idea the real eMails were sent to lady police officer who was working with victim and wrote a nice eMail stating it did lead to stalker. The stalker knew lady police officer was involved and working with victim. The stalker was smart and sneaky enough to NOT tell Detective, so to worked Detective (with lies) like a scamming pro to get him to testify against victim. This is how terrorist like the stalker is and knows how to play and extreme victim while changing personalities with push of button.

* It would take Google Global Security (globally) to trace abuse of this magnitude against their policies. And, they are now.

*Stalker is sending out subpoena's for victims personal information from open 3rd TRO case and not serving victim per the laws prior. Stalker is to serve Victim through "Safe At Home Program" rules (below) and was advised of this. Then stalker is altering the documents. Safe At Home, Secretary of State, notified with Judge that did not uphold, Safe At Home, laws.

2011-2012: Personal slander pages were set up via a German site link with Victims FULL and rare name while blasted on Adult sites. Attorneys stated the Stalker linked on sites out of US to avoid US court subpoena's being issued to trace the IP etc. It's well documented in eMails to the German site owner begging them to please help Victim resolve the account that was set up under Victims name by a Stalker. Additionally, all sites printed out and witnessed by technical support.

JULY 2012: After 3rd TRO against stalker ended - the stalker blasted within 24 hours after TRO ended. Victim rested since May 2012 and kept clearing name from more intense abuse due to stalkers escalated attacks from anger of 3rd TRO. Then, eMailed 300+ pages of links to, Chief of Police, who contacted FBI lady to meet. Victim with Chief, met FBI lady in office. Victim mentioned the linking directly after TRO over with stalkers step brothers out of prison. The Chief and FBI lady, both shook their heads YES and asked for documents victim had. FBI took the documents. The police finally realized the stalker LIED to Police Detective and USED him to come after victim. Turns out they had been watching the Internet since 3rd TRO filed, very closely. Until then, stalker had them fooled with victim act.

OCT 2012: Stalker is blast linking name 1000's of times (in CAPS) to child abuse and child sex act key words on Adult sites hard core video's. This is not only portraying Victim as a Child abuser. However, causing Adult sites poor and illegal Internet Visibility. The Hosting Companies and web site owners are shutting down their services completely to stop the illegal activity that will cause the Fed's to shut them down. Stalker is also setting up personal slander pages tagging victims name to bad words.

CHRISTMAS 2010-2012: (we state below how stalker destroy the Victims holiday season for the 3rd year in a row) Black Hat SEO blaster targeting DOWN-LOAD file sites in the 1000's and blasting name to simply trash it for 1000's of pages with obscenity affiliations - site owners with ISP companies are angry and clearing abuse with hosting security companies & Google tracing with clearing.

THANKSGIVING TO NEW YEARS 2012: The name didn't stop blasting, additionally, targeting Asian Adult site Video's en-mass. Google traced and cleared.

2013 Google tracing and clearing abuse with hosting companies and people databases globally cooperating to help Victim's.

2013: Thank you, for scanning and sending false complaint documentation with eMails sent with Victims name. Stalker is sending out subpoena's for victims personal information from open 3rd TRO case and not serving victim per the laws prior. Stalker is to serve Victim under Safe At Home Program. Then stalker is altering the documents to show police, judges and others Victims personal information which is distorted and changed by stalker.

NOVEMBER 2013: Technical team contacted Radaris after seeing the name tagged/hacked on Radaris over 67 times with families, ages not associated. All parties with name are confirmed there are not (even close to) 67 people with the name in the entire world. Now, they're abusing Radaris services against the Internet sites Policies. Associating the name with other families who are NOT related en masses. Radaris Security is angry regarding the abuse of their site and working with Google. Appears another attempt to trash the name to cover up abuse targeted at this Victim.

JANUARY 2014: Only one person knew the distant family company affiliations and now tagging name with family business in other countries and victims name.

JANUARY 2014: Courts County CTO notified the Internet cases are distorted and not listed any evidence submitted in this case. Victims pursuing.

MARCH 2014: Name associated on Dirtsearch.org (owner & hosting services located in AZ) with 1000's of court cases with disgusting information (over past 2 years) which Attorney's verified does not exist with the name. Additionally, family on "Safe At Home." this is a Federal and state Violation against Victims. (2) years of documents sent to: Chief of Police in AZ, FBI, Google Founder, DOJ Attorney in WA, Google Law Enforcement, Google Civil International, IRS - to have the CEO investigated. Arizona cyber harassment laws are Felonies and a prison sentence. They finally removed.

JUNE 2014:Stalker now using search adult site to tag automatically with generating another site 10000's of times viewed in quotes. Name tagged to child porn again and reported to FBI. International Courts Google division.

JUNE 2014: "Anonymous" #OpAntiBully engaged :)

JULY 2014: Stalker linking name to family on Intellius against Safe at Home, State and Federal Laws of victims. Federal Attorney has direct phone to Manager at Intellius, seeing if they can trace links with IT. Additionally, placing name with cities that don't exist to associated with family members. Direct contact to Yahoo Chief Legal council notified with Intellius.

JULY 2014: Stalker purposely linking with 'search' to appear the below SEO court testimony (below) is not accurate. However, they search name on website and then publish the link with the key 'search' word. It's well tracked and documented by technical. This site is simply is a track record the stalker has no fear and will kill victims. Even trying to blast down this site. Just more evidence traced back to stalker to ensure a longer prison sentence. It hacks the name on site.

AUGUST 2014: Now with evidence advised by 'Safe At Home' Program with support to file Judicial Complaint against Judge for allowing Stalker to file illegal TRO without serving Victim or Subpena's through 'Safe At Home.' We have evidence the Stalker was notified and forged documents/evidence with testimony during 3rd TRO. Additionally, Stalker making case NV without notifying Defendant to block out all documents relating to stalkers abuse. We are pursing now more evidential track record and will clear Victims name from Stalkers forged documents and lies.

The stalker is harassing every website owner, hosting services with tech services - globally. It's cost the Internet Service providers time and money to clear abuse. Therefore, Google pursuing. They will preserve the internet from this abuse so their children and families are not a target some day. Otherwise, Google would be a global trash dumpster of abuse and completely useless.

Tremendous resources donated with Google's time and money to support the preservation.

*************************************************

Series of events were eMailed to a Professor who studies psychopaths. He said "the psychopathy is clear here, ignore it, it wants attention."

Suspects step brothers in FL have criminal records of: Assault, Battery, Resisting Arrest, Drug Charges, Non-Payment of Child support and several DUI's.

Technical witnesses to cyber abuse state this appears fun for Stalker and psychotic behavior playing a victim. They are angry and cooperating by documenting as witnesses with all pages printed out.

Predators, with a track record of harassing and abusing people would cover themselves with extensive weapons training, in fear of their Victim(s) retaliation.

-----------

The Victim had light Atrial Fibrillation heart damage which is now uncontrollable under medical standards due to the stress. The Victims heart pills are no longer working. This abuse needs to stop or will die from heart complications. Then, we will make this very media public.

DECEMBER 2012: VICTIMS PHYSICALLY COLLAPSED FROM ABUSE AND HER EYE SITE WENT OUT IN EMERGENCY ROOM. THE VICTIM WAS EXHAUSTED CLEARING NAME TO PREVENT THE SPREAD AND TARNISH OF ENTIRE FAMILY'S REPUTATION ON THE MOST DISGUSTING VIDEO'S A HUMAN CAN ENDURE. ALL VIDEOS WERE OF MULTIPLE OTHERS AND OF COLOR SAME AS SUSPECT STALKER. GOOGLE TOOK OVER JANUARY 2012 - VIA COURT SEALED DOCUMENTS IN OTHER COUNTIES, OTHER PRECAUTIONS TO PROTECT VICTIMS FURTHER.

SOME PICTURES, WHICH VICTIMS NAME WAS ANCHOR TAGGED "HACKED" ABOVE OR NEXT TOO: CONSISTED OF UNCLOTHED CHILDREN LAYING ON GROWN MEN'S UNCLOTHED DEAD BODIES WITH THE MEN'S FACES TORN OFF . Other pictures of extreme pregnant women being harmed by several men at one time. Victim's nice upbringing did not raised her to endure such a grotesque world. Experts state the Stalker is attempting to bring Victim into their evil warped fantasies.

Victims with name reported each instance to FBI direct eMail provided.

Sites the Victims name was tagged on - were child Adult sites - reported to FBI personal eMail provided.

Victims parents were Aerospace Engineers retired. Victims Grandfather (her best friend) reported to Presidents as a Federal Naval Aerospace Commanding Engineer and the Admirals and General's reported to Victims Grandfather on the technology side. Victims father's ashes are in the Episcopal Church as he sang in the choir. Victim grew up in Episcopal Church. Victim is known as a kind, meek and helpful person to all. Victim didn't cause harm to others and mostly gave what she had, even when broke.

Victim's highly embarrassed for the entire family and devastated with physically exhausted and tremors from fear.

Experts who study profiles stated: appears this type Stalker grew up bully, running loose, poor. Generally, retaliate against people whom raised in better family life styles.

----------

ARIZONA CURRENTLY HAS: CYBER HARASSMENT, STALKING, IMPERSONATION, LAWS MAKING THIS A "CLASS 5 FELONY."

VICTIM TESTIFIED WITH DOCUMENTATION IN CALIFORNIA TO ENSURE THIS A CLASS 5 FELONY.

----------

Adult site actors use stage names, NOT real names. LAW ENFORCEMENT PEOPLE STATED: The Black Hat SEO cyber psychopathy "STALKER" purpose was to SET UP Victim (globally) to be hunt down and killed (set up for a 'hit'). Lately associating name with UNDERAGE ABUSE and ILLEGAL CHILD ADULT words and linking victims FULL RARE name next to Adult sites.

----------

VICTIM WITNESS PROTECTION PROGRAM THROUGH SAFE AT HOME:

STATE AND FEDERAL GOVERNMENTS (BOTH) HAVE VICTIMS UNDER SAFETY PROTECTION FOR LAST (2) YEARS WITH ADDITIONAL PRECAUTIONS RECENTLY DUE TO CONTINUED ESCALATED ABUSE FOR EXTREME PERIOD OF TIME - NON-STOP - STALKER IS STOPPED AT ONE TACTIC AND MOVES ON TO ANOTHER.

Victims placed through, VICTIM WITNESS, under "STATE" PROTECTION thru the "SECRETARY OF STATE" to "SAFE AT HOME PROGRAM" under "STALKING" laws, in October 2011 * cyber stalking laws below *

Additionally, the "FEDERAL" GOVERNMENT reviewed 5,000 harassment documents stated herein. The "FEDERAL" GOVERNMENT provided the Victim with additional SAFETY PRECAUTIONS and SECURITY MEASURES under the "DEPARTMENT OF JUSTICE" "STALKING" LAWS.

STATE & FEDERAL Government's (BOTH) reviewed all the documents with series of events and IMMEDIATELY believed the INTERNET STALKER posses a severe PHYSICAL THREAT to Victim.

Victim, provided ID-CARDS & CERTIFICATES (from both State and Federal government) TO SUPPORT THIS.

---------

CRIME INCLUDES AND NOT LIMITED TO: UNITED STATES FEDERAL Cyber Stalking Laws against women: Women's Violence Act, Department of Justice Reauthorization Act of 2005, H.R. 3402, titled "Preventing Cyber stalking" "Electronic Impersonation" and numbered as § 113, §113(a)(3) provides that Section 223(a)(1)(C) applies to "any device or software that can be used to originate telecommunications and includes (2) years in prison.

ADDITIONAL INTERNATIONAL FEDERAL CRIMES HARASSMENT/ABUSE OF GLOBAL INTERNET SERVICES: Hacking, disruption of global internet services and global search engine services - as the last attack with the name targeting Adult sites was BLASTED OUT in the mega-1000's. Search engines have been helping to clear abuse as this is considered disruption of there services against their 'Terms and Conditions.'

* Electronic Internet Impersonation: SB1411

* Standard Civil Harassment: 527.6, 528.5, 529; M.S. 609.749, Subd1;

* Cyber Bulling, Electronic Harassment, Cyber Stalking, Cyber Harassment California Civil Code § 1708.7 : Penal 646.9, 422, 653.2, 653m

Direct linking and SEO Black Hat Google-bomb Deformation abuse of the name on 100,000s of Adult sites videos: "Harassment can also include intentionally exposing you to materials which the harasser knows, or has reason to know, are culturally offensive or intimidating to you."

-------

These illegal internet 'en mass' Black Hat SEO Deformation Harassment abuse (STALKING & ELECTRONIC IMPERSONATION) attacks: have caused Victim to live in extreme fear. Especially, due to the horrid Adult video's Victims name tagging with, which attract the global worst.

-------

STALKER VIOLATED INTERNATIONAL CYBER LAWS. ISP'S AND VICTIM FILED COMPLAINTS IN THEIR OWN COUNTRIES AS WELL:

CHINESE GOVERNMENT LAWS:

China illegal information reporting center:

http://www.cnnic.net.cn/html/Dir/2007/06/04/4628.htm

7) Those spread por****, obscenity, gambling, violence, homicide, terror or instigate crimes: Those insult, libel against others and infringe other people's legal rights and interests: or Other contents prohibited in laws, rules and administrative regulations.

---------

A CYBER STALKERS PROFILE BY FLORIDA STATE UNIVERSITY PROFESSORS:

"Are likely to include or evolve into some form of off-line attack."

2.1 The Cyberstalker's profile

Cyberstalking, and more generally cyber harassment, are characterized by the stalker's relentless pursuit of the victim online and are likely to include or evolve into some form of off-line attack. Cyberstalkers can be known or unknown to their victim and are often driven by revenge, hate, anger, jealousy, obsession and mental illness, while cyber harassers are often driven by the desire to frighten or embarrass the victim [33]. The harassment may take several forms...

**************************************

Government investigators know the suspect cyber stalker/blaster is. Google pursuing blasters directly & currently isolating blasting as of (Thanksgiving, Christmas and New Years 2012 blasting) in separate buried link. The Stalker would blast more right before each holiday, more intensely, to ruin the families holiday season.

Additionally, explained in "COURT TESTIMONY TRANSCRIPTS" (below in blue print) by a highly experienced SEO Technical Expert. SEO expert explains how a party utilized (whats called) "Black Hat SEO ILLEGAL BLASTING SOFTWARE" to internet: "back-link" : "key-tag" : "Key-stuff" : "HACK": the name ON TO disgusting Adult web sites etc.(tagging Victims name to others Adult videos with horrible key words) by submitting to 'generate' it 1000's of times in cache, instantly.

Google is also globally tracing the Victims initial personal efforts to stop the abuse herself. Which consisted of 4,000+ (just links) submitted to "GOOGLE REMOVAL TOOLS." Initially, Victim spent (7) days a week at (6-12) hours a day for (2) years contacting global ISP/Hosting companies and web site owners to delete name from content. Then Victim used "GOOGLE REMOVAL TOOLS" to remove the name with key word obscenities from internet searches. GOOGLE ISOLATED THOSE LINKS AND TRACED.

Victim would throw-up with loosing eye site from the horrible obscenity pictures and stress which is documented in ER visits.

Victim also cc:d Google Security with every eMail while contacting web site owners and ISP/Hosting companies abuse departments. It's well documented by many who viewed the actual sites and abuse.

Now Google helping Victim to clear and trace per the Global Hosting Companies complaints to Google whom also want the obscenity cyber blaster stopped and prosecuted. It's costing Internet services time, money and poor visibility. Now Google pursing.

The flash drive with over now 22,000 documented exhibits of abuse brought attorneys to tears. Others have been speechless.

A flash drive of 15,000 documents of exhibits: Google Searches, links and web pages in dated sequence of exhibit events were sent to FOUNDER of Google; Sergey Brin and CEO Larry Page, Security VP of Google with ALL Google Executives (to show them how people are utilizing Google to destroy families and children's lives) and Federal Authorities.

We're sure victim is not their only target which good families and their children's reputations are destroyed forever (en mass) whom have no idea why.

The Stalker has turned Google into a MEGA GLOBAL INTERNET TRASH DUMPSTER OF EXTREME MASSIVE DISGUSTING ABUSE. WHILE HARASSING HOSTING COMPANIES AND WEB SITE OWNERS SERVICES GLOBALLY.

This is making Google a worthless trash dumpster for generations to use for education, information and to view true histories of families ancestors. Technology buffs around the globe are angry and want this stopped.

Suspects family sells the Black Hat SEO blasting software and a member of many illegal (en-mass) Cyber Blasting sites. Since, wiped most their names and reputations off their Black Hat SEO blasting affiliations. However, they have extensive documentation with technical witnesses verified.

Suspect can play an innocent weak victim with the push of a personality button. Classified as true Psychopath by experts.

Suspect falsifies documentation to show police and people on side. Suspect was a trial paralegal and stated she falsified documents for trials, would not file those documents in court records to be truthfully verified and only show judges etc on the side during court cases. Suspect has gun with Black Belt.

Suspects served with TRO papers and blast own name on internet slander sites the day before court hearing. Then, contacted Court Clerks (the day before TRO hearing) to view their own slandered names. This was to take focus off real Victim and, therefore suspect would appear the true Victim. Additionally, A suspect purposely neglects filing exhibits in court documents under 'Penalty of Perjury.' However, only shows (much worse) false documentation, which was NOT on the internet about the suspect: to friend's, Victims attorney and Police - on the side.

Victim and tech's have ALL TRUE documentation regarding A suspects name on the Internet. The true information was NOTHING close to what the suspect personally created to show Police, Judges and Victims Attorney (only) on the side.

Global Adult, web site owners and ISP/hosting companies are angry do to their services abused en-mass.

Thank you, for scanning and eMailing all documentation (including envelopes) received regarding suspects false complaints and false created documentation to encourage others to abuse Victim in attempt to ruin her life more. Including Government Agencies receiving false complaints all forwarded to pro-bono attorneys.

Flash drive with 15,000+ (Adult site deformation abuse links, print outs) with exhibits dated in sequence were forwarded to Google founders and all Google Executives whom took over and ranked this site. Other flash drives sent to DoD, DoJ and FBI.

Stalker attempted to blast this site down several times with obscenities. Appears to prevent the family (place them in fear) from protecting themselves and to allow horrible people to search for Victim (to harm). So, people believe Victim is scum child abuser and should be killed. It's all documented in eMail links sent to Google US Law Enforcement and cc: to previous Attorney for DoD.

HOWEVER, GOOGLE HAS RANKED (TAKEN OVER) THIS SITE FOR VICTIM WHILE TRACING THE ABUSE. TO DATE: Stalker has been unable to blast it down.

Directly after this site was put up to save the family from being sought out and murdered as global Adult trash and child abusers (due to family addresses etc in databases and easy to find). The stalker then blasted the Victims name 100,000's of times with key words of: Child abuse, Child and Kiddy sex obscenities on Adult sites. This caused an ISP/hosting company in Asia and Amsterdam to shut down their services and alert all their site owners who were also shut down from the abuse to their sites. Once the blasting hits a ISP/Hosting company servers they are poisoned and the name with key words attack their customers web sites and "anchor tag" hacked on sites en-mass.

Each time, the family contacted an ISP/Hosting company with eMail link of abuse, they also cc:d the link with Google search copy and all information to Google Security, Legal and US Law Enforcement with Cyber tech's and Attorneys (from the very beginning). It's all documented in 400+ pages of just the copied links and 3+ files boxes of printed out documentation which all in dated in exhibit sequence. It's all well documented with many others including Google as witnesses to the truth on all stated herein. Now, all scanned on Flash drive.

Victims in contact with hosting companies attorneys all over the world. Other countries laws are more strict. We want this Cyber blaster stopped. All links still being traced.

******************************************

Victim obtained (3) short TRO'S. However, advised only Google can trace (supply enough information to stop the Stalker) this type of abuse around the world due to linking name on web-sites owned by people in other countries. While under judges orders to stop - the Black Hat SEO deformation abuse blasting stopped. After Judges Orders ended (each time) - the blasting of Victims name started the very next day with more intensity each time. It's well documented.

Now, as of January 2012: Google's taking over and helping Victim. Otherwise, we don't believe, physically, her damaged heart will hold up much longer.


*****************

COURT TESTIMONY BY SEO TECHNICAL EXPERT ( May 4, 2012 ) STEVE W - A PREVIOUS UNITED STATES MARINE, & TECHNICAL SEO "SEARCH ENGINE OPTIMIZATION" E-BUSINESS EXPERT & FATHER.

SINCE THE BELOW PUBLISHED: Stalker purposely linking with 'search' to appear the below SEO court testimony is not accurate. However, they search name on website and then publish the link with the key 'search' word. It's well tracked and documented by technical and Google. They know every hit and every search with this name and where the searches are coming from thanks to judges orders under court sealed documents.

We stop one tactic of stalkers and the psychopathy moves on to another. Can't wait to laugh while stalker is in prison. We've given this person every opportunity to stop and by publishing this. This site is simply is a track record the stalker has no fear and will kill victims. Even trying to blast down this site. Just more evidence traced back to stalker to ensure a longer prison sentence.


A.

I'M A SEARCH ENGINE OPTIMIZATION CONSULTANT

Q.

HOW DID YOU GET INVOLVED IN THAT KIND OF WORK?

A.

I GOT A DEGREE IN E-BUSINESS MANAGEMENT IN 2004 AND I'VE BEEN A WEBMASTER SINCE 1998. AND A LOT OF MY WEB DESIGN CLIENTS WERE HAPPY WITH THEIR WEBSITES BUT COMPLAINING ABOUT THE TRAFFIC AND DIDN'T HAVE A LOT OF MONEY TO INVEST IN MARKETING, SO I LEARNED HOW TO GET THEM NATURAL TRAFFIC FROM SEARCH ENGINES.

Q.

VERY WELL. WHILE YOU'RE TESTIFYING, KEEP IN MIND WE HAVE A COURT REPORTED HERE TODAY THAT WILL BE TAKING DOWN EVERY WORD YOU SAY, SO TRY NOT TO SPEAK TO QUICKLY.

Q.

WHAT TYPE OF EDUCATION DID YOU RECEIVE IN ORDER TO WORK IN THE FIELD YOU'RE CURRENTLY IN?

A.

I HAVE A DEGREE IN E-BUSINESS MANAGEMENT, WHICH COVERS THE SCOPE OF WEB DESIGN, GRAPHIC DESIGN, E-COMMERCE PROJECT MANAGEMENT, AS WELL AS INTERNET MARKETING, AND FROM THERE, OF COURSE, WE LEARNED A LITTLE BIT IN SCHOOL, BUT MOST OF WHAT I LEARNED IS PRETTY SPECIALIZED, THEY DON'T REALLY HAVE A SCHOOL FOR IT. THERE'S WORKSHOPS AND CONFERENCES YOU CAN GO TO, BUT THERE ISN'T A DEGREE IN SEARCH ENGINE OPTIMIZATION.

Q.

HAVE YOU ATTENDED WORKSHOPS AND CONFERENCES?

A.

YES. I ATTEND THEM WHENEVER I HAVE THE OPPORTUNITY, SINCE PROBABLY 2004.

Q.

APPROXIMATELY HOW MANY WOULD YOU SAY YOU'VE ATTENDED ?

A.

30 OR 40.

Q.

COULD YOU DESCRIBE YOUR EXPERIENCE SINCE YOU'VE BEEN INVOLVED IN THIS INDUSTRY WORKING WITH SEO, COMMONLY REFERRED TO, SEARCH ENGINE OPTIMIZATION.

A.

SURE. I GOT MY FOOT IN THE DOOR WITH THE WALT DISNEY COMPANY IN 2006 MANAGING A PAY PER CLICK BATES SEARCH MANAGEMENT ACCOUNT FOR ADVENTURES BY DISNEY AND DISNEYLAND.COM. AND I FINALLY BUILT UP A BUSINESS CASE TO GET A BUDGET TO DO SOME NATURAL SEO FOR DISNEY. SO IT WAS REAL EXCITING TO BE A BIG PART OF THE HOLISTIC INTERNET MARKETING CAMPAIGN FOR GOOGLE, YAHOO, AND FOR DISNEY ACCOUNTS.

FROM THERE I ALSO DID A LOT OF WORK WITH EXPEDIA, RING CENTRAL. I'M CURRENTLY WORKING WITH SKECHERS. I'M THE OUTSOURCE PROVIDER OF SEARCH SERVICES FOR THE SHOE COMPANY SKECHERS AT THE MOMENT. AND I DO GET A LOT OF CALLS AND REFERRALS FROM PEOPLE WHO NEED HELP EITHER GETTING BETTER PLACEMENT IN SEARCH RESULTS OR FIXING A NEGATIVE PLACEMENT. SUCH AS ONE OF MY CLIENTS RIGHT NOW HAS A PROBLEM WHERE SOMETHING NEGATIVE SHOWS UP FOR THEIR BRAND NAME AND MY JOB IS TO HELP THEM REMOVE THAT OUT OF THE SEARCH RESULTS AND TO IDENTITY WHY IT HAPPENED.

Q.

OKAY. AND YOU'RE CURRENTLY WORKING FOR YOURSELF?

A.

CORRECT. I'M A CONSULTANT.

Q.

OKAY. WHAT EXACTLY IS SEARCH ENGINE OPTIMIZATION?

A.

SEARCH ENGINE OPTIMIZATION IS -- IT INVOLVES GETTING BETTER AND HIGHER PLACEMENTS IN SEARCH RESULTS OR THE OPPOSITE, REMOVING SEARCH RESULTS THAT YOU DON'T WANT TO APPEAR. SO WHAT'S INVOLVED AND WHAT THE SEARCH ENGINES USE AS SORT OF A BASE CRITERIA IS BASED ON THREE FACTORS. ONE IS RELEVANCY. IF THERE'S A PAGE OF CONTENT ON A WEB SITE THAT MATCHES A PARTICULAR QUERY, THEN YOU'VE SATISFIED THAT RELEVANCY FACTOR. IF OTHER WEBSITES ARE TALKING ABOUT MENTIONING LINKING OR DISCUSSING ON FACEBOOK OR ELSEWHERE THAT SOME PIECE OF CONTENT, YOU'VE GOT THE POPULARITY FACTOR SATISFIED. SO THERE'S RELEVANCY, POPULARITY, AND THE LAST ON IS USER BEHAVIOR. AND THAT IS HIGH VOLUMES OF SEARCHES FOR PARTICULAR TERMS AND THEN ACTIONS THAT HAPPEN WITHIN THE SEARCH RESULT, SUCH AS A CLICK OR RETURN BACK TO THE SEARCH RESULT IF THAT CLICK DIDN'T PRODUCE THE RESULT THE USER WAS LOOKING FOR. SO GOOGLE WILL FIRST LOOK AT AND MAKE SURE THAT THE RESULTS --

Q.

NO AUDIBLE RESPONSE)

A.

SAY THAT AGAIN.

Q.

SORRY. I WAS JUST ASKING YOU TO SLOW DOWN A LITTLE BIT.

A.

SORRY. SO IN ESSENCE THE FIRST THING THAT SEARCH ENGINES WILL LOOK FOR IS TO MAKE SURE THAT THE PAGE IS RELEVANT TO THE QUERY; SECOND, IT WILL LOOK TO MAKE SURE THAT PAGE IS POPULAR OR DISCUSSED OR MENTIONED ONLINE. LINKS, HYPERLINKS TO THOSE PAGES ARE TYPICALLY, YOU, A MAJOR FACTOR OF ALL THE SEARCH ENGINES. IN FACT, LARRY PAGE OF GOOGLE, WHEN HE CREATED GOOGLE'S PAGE RANGE, IT WAS BASED ON THE SYSTEM OF LINKING. AND I DO HAVE A DOCUMENT THAT KIND OF TALKS ABOUT IT A LITTLE BIT. AND THEN, OF COURSE, THE LAST PART OF IT IS INFLUENCED BY WHAT USERS DO IN THE SEARCH RESULTS. IF YOU SATISFY THOSE THREE THINGS, YOU CAN RANK HIGH AND GET BETTER PLACEMENT FOR ANY QUERY YOU WANT.

Q.

SO HOW EXACTLY DOES GOOGLE WORK AS FAR AS GETTING RANKINGS FOR NAMES, COMPANIES, BUSINESSES, ETC CRITERIA?

A.

IT'S A REALLY GOOD QUESTION. SO BRAND NAMES, SPECIFICALLY, BRAND NAMES DEFINITELY HAVE MORE AUTHORITY IN THE SEARCH RESULTS, SPECIFICALLY BECAUSE PEOPLE ARE SEARCHING FOR THE BRAND NAME ITSELF. SO AS A MODIFIES TO THEIR BRAND NAME, SOMEBODY MIGHT USE, FOR EXAMPLE, "SKETCHERS SHOES." SO NAMES ACTUALLY DO HAVE A LOT MORE WEIGHT WITH SEARCH RESULTS. IF SOMEBODY DOES A BRANDED SEARCH -- WELL, LET ME PULL UP THAT DOC AND TALK ABOUT IT A LITTLE BIT, HOW GOOGLE WORKS, AND SEE IF I CAN VIEW IT FROM THE CURRENT SLIDE.

YOU CAN SEE THIS A LITTLE BIT BETTER, HOW GOOGLE WORKS. SO THIS WAS TAKEN FROM THE TECHNOLOGY PAGE AT GOOGLE.COM AND IT'S PROBABLY HARD TO SEE, BUT LET ME GO BACK ONE.

AND BASICALLY WHAT I'VE HIGHLIGHTED HERE IS IT FOLLOWS A SYSTEM OF LINKING, AND IT'S BECOME A LITTLE BIT LESS IMPORTANT OVER THE LAST SEEK OR SO, THANKS TO SOME RECENT UPDATES THEY HAVE, BUT HISTORICALLY LINKS ARE THE FOUNDATION OF WHAT MAKES A WEB PAGE RANK HIGHER THAN ANY OTHER WEB PAGE. AS A MAJOR BRAND OR A NAME EARNS LINKS TO THAT WEB PAGE, THE HIGHER UP IT'S GOING TO MOVE UP IN THE SEARCH RESULTS. AND, AGAIN, WE KIND OF LOOKED AT SOME EXAMPLES OF WHAT MIGHT HAVE CAUSED SOME OF THE RESULTS THAT VIVIAN HAS SEEN.

Q.

JUST TO INTERRUPT, I APOLOGIZE, HAVE YOU MET VIVIAN BEFORE?

A.

JUST RECENTLY.

Q.

OKAY. AND ARE YOU AWARE OF WHAT HAS TAKEN PLACE WITH HER NAME ON THE INTERNET?

A.

YES.

Q.

OKAY. AND ARE YOU FAMILIAR WITH SOMETHING LIKE THIS HAPPENING? HAVE YOU SEEN THIS BEFORE?

A.

I HAVE SEEN THIS WITH NON ADULT-RELATED CONTENT BEFORE, WHERE BUSINESSES WILL USE (SLANDER BOARDS) AND OTHER THINGS. I'VE NEVER SEEN SOMEBODY USE ADULT CONTENT OR SUBMIT TO ADULT WEBSITES TO GET SOMEBODY'S NAME TO RANK BEFORE. IT'S SOMETHING I WAS VERY CURIOUS ABOUT AND I SPENT QUITE A BIT OF TIME RESEARCHING, TO TRY TO ISOLATE WHY THAT WOULD HAPPEN, BECAUSE A NORMAL SEARCH RESULT FOR A NAME WOULD PRODUCE AN AUTHORITATIVE WEBSITE LIKE FACEBOOK OR TWITTER OR A PERSON'S BLOG. I'VE NEVER SEEN IT WHERE IT WOULD APPEAR WITH ADULT SEARCH RESULTS BEFORE.

Q.

SO YOU STATED YOU RESEARCHED THIS?

A.

YES. SIR.

Q.

OKAY. AND WHAT DID YOUR RESEARCH UNCOVER?

A.

RESEARCH UNCOVERED THE FACTORS THAT I HAD MENTIONED FOR SEARCH. THE RELEVANCY PART OF IT HAD TO DO WITH, YOU KNOW, OF COURSE THE CONTENT ACTUALLY HAVING HER NAME IN IT.

LET ME SCROLL THROUGH AND SHOW YOU WHERE I FOUND IT. ONE IS UP HERE IN THE URL. THIS URL UP HERE ACTUALLY CONTAINS HER NAME. IF THIS WERE DONE BECAUSE OF TAGS OR SEARCH RESULTS ON THAT PARTICULAR WEBSITE, IT WOULD NORMALLY SAY "SITE.COM?" OR "SEARCH?" EQUALS AND THEN THE SEARCH RESULT. BUT THIS IS A STATIC URL AND IT WAS GENERATED, LIKELY, BECAUSE SOMEBODY PHYSICALLY WENT OUT THERE AND CREATED THE PAGE OR SUBMITTED THE PAGE TO HAVE THOSE KEY WORDS IN IT. IT'S NOT SOMETHING THAT'S USUALLY AUTOMATICALLY DONE.

SO THE FACT THAT THIS URL CONTAINS THE FULL NAME, GOOGLE WILL READ THAT AND INCLUDE THAT AS PART OF ITS SEARCH. WITHIN THE CONTENT ITSELF, THE FULL NAME IS MENTIONED AS WELL, WHICH AGAIN IF IT WERE TAGS THAT WERE USED, IT WOULD JUST BE "WORD, WORD," AND IT WOULD BE AN ANOMALY THAT HER NAME WOULD HAPPEN TO SHOW UP.

BUT THE NAME ACTUALLY SHOWS UP SPECIFICALLY WITHIN, YOU KNOW, IMPORTANT ON-PAGE OR RELEVANCY FOCAL POINTS, SUCH AS TITLES, HEADERS AND PAGE DESCRIPTIONS, SO THAT STUFF DOESN'T HAPPEN AUTOMATICALLY.

Q.

SO THIS DOESN'T HAPPEN NATURALLY IN GOOGLE?

A.

NO.

Q.

SO SOMEONE ---

A.

SOMEBODY HAD TO SUBMIT IT TO MAKE IT HAPPEN.

Q.

SOMEONE ACTUALLY AS TO PHYSICALLY DO THIS WITH THAT PARTICULAR NAME?

A.

CORRECT.

Q.

WHAT IS A GOOGLE BOMB?

A.

A GOOGLE BOMB -- THE HISTORICAL TERM FOR A GOOGLE BOMB IS WHAT HAPPENS --- WELL, THE NAME CAME ABOUT WHEN GEORGE BUSH'S BIOGRAPHY PAGE RANKED NUMBER ONE AS PEOPLE WERE LINKING TO HIS WEBSITE WITH THE KEY WORDS "MISERABLE FAILURE." AND SO EVERYONE WOULD DO A SEARCH FOR "MISERABLE FAILURE" AND GEORGE BUSH'S BIOGRAPHY PAGE SHOWED UP NUMBER ONE. BUT IT DIDN'T SATISFY THE RELEVANCY FACTOR, SO EVERYTHING WE'VE TALKED ABOUT WITH RELEVANCY DIDN'T MAKE ANY SENSE TO SIT WOULDN'T EXPLOIT IN GOOGLE SYSTEM OF HOW TO GET UP SEARCH RESULTS AND RANK NUMBER ONE BY LINKING IT, AND SO WHAT HAPPENED WAS IT CALLED IT A GOOGLE BOMB.

IF YOU LINK TO A WEB PAGE WITH A SPECIFIC KEY WORDS ENOUGH, GOOGLE WILL MAKE AN INFERENCE THAT THAT PAGE IS ABOUT THAT TOPIC AND MOVE IT UP IN THE SEARCH RESULT.

THEY HAVE MADE CHANGES TO THEIR ALGORITHM OVER TIME TO MAKE SURE THAT THERE IS MORE RELEVANCY AND THERE IS MORE USER BEHAVIOR INVOLVED IN WHAT HELPS IT RANK. BUT A GOOGLE BOMB HISTORICALLY IS LINKING TO A WEBSITE REPEATEDLY.

NOW, GOOGLE BOMBING OVER THE YEARS HAS CHANGED, SINCE THAT WAS ABOUT 2005, SO NOW WE USE GOOGLE BOMB AS A TERM TO DESCRIBE ANYTHING THAT YOU WOULD DO TO SATURATE SEARCH RESULTS, ANYTHING THAT YOU WOULD DO TO -- LIKE A LOT OF COMPANIES WILL CREATE LITTLE MINI SITES ALL OVER THE PLACE TO KIND OF PROTECT THEIR NAMES, AND THEY'LL SPAM THE SEARCH RESULTS OR GOOGLE BOMB THE SEARCH RESULTS BY CREATING ALL THIS CONTENT, LINKING OT THE CONTENT, AND THEN USING PROGRAMS TO GET PEOPLE TO CLICK ON THE LISTINGS TO MOVE THEM UP HIGHER IN THE SEARCH RESULTS.

Q.

DO YOU HAVE ANY OPINION AS TO WHETHER THE NAME VIVIAN *** WAS BLASTED IN A GOOGLE BOMB?

A.

IT LOOKS PRETTY APPARENT THAT IT WAS.

WHEN I WAS GOING THROUGH THE RESULTS -- LIKE I SAID, NORMALLY GOOGLE FILTERS OUT THE ADULT SEARCH RESULTS AND THEY PUT IN NORMAL POSITIVE PLACEMENTS, THE FACEBOOKS AND THE TWITTERS AND SO FORTH. YOU'D HAVE TO ACTUALLY GO INTO SETTING AND CHANGE YOUR SETTING TO NOT BE SAFE SETTING, TO SEE THE ADULT. THE FACT THAT WE SEE THE ADULT MEANS THAT SOMEBODY USED SOME TYPE OF SOFTWARE OR MANUALLY WENT OUT TO EACH OF THESE INDIVIDUAL SITES, ONE OR THE OTHER, AND CREATED ALL OF THIS CONTENT FOR IT TO MAKE IT LOOK LIKE THE ADULT IS REALLY THE AUTHORITATIVE SOURCE.

Q.

DO YOU HAVE ANY INFORMATION ON HOW MS.***'S NAME COULD HAVE BEEN ASSOCIATED WITH ADULT SITES?

A.

IT HAPPENS -- IT JUST HAPPENS WHEN YOU HAVE ENOUGH SUBMISSIONS AROUND A SPECIFIC TOPIC. BY BLASTING OUT LINKS. CASE IN POINT, ONE OF MY TAG LINES IS "SEO EXPERT" AND I TEND TO RANK PRETTY WELL FOR THE KEYWORD "SEO EXPERT" IN THE NATIONAL SEARCH RESULTS; HOWEVER, WHEN DOING A STUDY WITH SOME OF MY OTHER PEERS, IT WASN'T SIMPLY BECAUSE I HAD BETTER LINKS OR BETTER CONTENT, BECAUSE CHRIS *** ACTUALLY HAD A LOT MORE AUTHORITATIVE LINKS TO HIS WEBSITE, IT TURNED OUT THAT THE FACT THAT "SEO EXPERT" USED WITH MY NAME, STEVE *** I'M NOT ON THE INTERNET, BUT IF I WERE TO PUT "SEO EXPERT" IN QUOTES AND I PUT "STEVE ***" IN QUOTES, I HAD SOME 5,000 RESULTS WHERE CHRIS **** ONLY HAD 700. SO MY NAME WAS SEMANTIC TO "SEO EXPERT," AND SO NOW GOOGLE MAKES AN INFERENCE WHEN YOU SO A SEARCH FOR SEO EXPERT, A LOT OF MY CONTENT AND MY NAME APPEAR FREQUENTLY BECAUSE OF THAT, BECAUSE THE LAST TEN YEARS I'VE BEEN OPTIMIZING AROUND THAT.

Q

IS THIS SOMETHING THAT ANY REGULAR PERSON CAN DO?

A.

NO. IT'S A SPECIALTY. THERE'S NOT EVEN A SCHOOL FOR IT.

Q.

OKAY. WHAT IS THE DIFFERENCE -- OR CAN YOU DEFINE "WHITE HAT" AND "BLACK HAT SEO"?

A.

SURE. SO GOOGLE HAS IT'S POLICIES AND IT'S WEB MASTER GUIDELINES, AS THEY CALL IT, AND "WHITE HAT SEO" MEANS YOU ARE TRYING TO BUILD YOUR VISIBILITY WITHIN THE SEARCH ENGINES BY GOOGLE'S GUIDELINES. YOU READ THEIR STARTER GUIDE, YOU READ HOW TO OPTIMIZE YOU WEBSITE SO THAT IT FITS WITHIN THE TERMS AND CONDITIONS, AND YOU'RE NOT SPAMMING, YOU'RE NOT SHOVING KEY WORDS IN OR ANYTHING.

IF YOU DO VIOLATE THEIR TERMS AND CONDITIONS AND USE 'AUTOMATED TOOLS' TO TRY TO GAIN SEARCH RESULTS, IF YOU PARTICIPATE IN NETWORKS TO TRY TO BUILD LINKS, LIKE, HEY, I HAVE 20,000 WEBSITES, GIVE ME $100 AND I'LL LINK FROM ALL OF THEM TO YOUR WEBSITE, THAT'S A NETWORK. IF YOU DO ANYTHING THAT VIOLATES THE TERMS AND CONDITIONS TO SPECIFICALLY TRY TO GAIN SEARCH RESULTS, THEN THEY CAN FILTER YOU OUT OF YOU COULD LITERALLY LOSE YOUR RANK ALL TOGETHER. Q.

WHAT HAPPENED TO "MS. R***" NAME, WOULD THAT BE CONSIDERED "WHITE HAT" OR "BLACK HAT"?

A.

THAT WOULD BE CONSIDERED "BLACK HAT", BECAUSE IT WAS DONE SPECIFICALLY TO INFLUENCE OR MANIPULATE SEARCH RESULTS.

Q.

WOULD YOU SAY THAT THIS ATTACK WAS SPECIFICALLY GEARED AT THE NAME VIVIAN ***?

A.

ABSOLUTELY !!

FROM WHAT I SAW -- I WENT THROUGH THE PACKET OF PAPERWORK THAT VIVIAN HAD SHOWED ME THAT HAD ALL THE HISTORICAL URL'S. APPARENTLY SHE HAD HAD A LOT OF THEM REMOVED ALREADY, BUT WHEN I LOOKED AT THE HISTORICAL LIST OF THEM, I COULD TELL THAT THEY WERE DESIGNED WITH SPECIFIC CUES. ONE OF THEM WAS THE KEY WORDS, AGAIN, IN THE URL.

ANOTHER WAS THE FACT THAT THEY WERE USING ALL CAPS IN MOST CASES, WHERE A LOT OF THE OTHER SEARCH RESULTS FOR THAT TYPE OF CONTENT WERE TYPICALLY IN SENTENCE CASE OR LOWER CASE, SO TO SEE THE ALL CAPS WAS SORT OF A CUE THAT IT WAS DONE USING SOME TYPE OF SOFTWARE LITTLE PATTERNS OF THINGS THAT YOU CAN PICK UP THAT WERE SIMILAR AMONG ALL THE WEBSITES.

Q.

APPROXIMATELY HOW MANY URL'S WOULD YOU SAY THAT YOU SAW WITH "MS.***" NAME CONNECTED TO SOME TYPE OF ADULT SITES.

A.

THOUSANDS.

Q.

--- MATERIAL?

A.

THOUSANDS.

Q.

THOUSANDS?

A.

THERE WERE 'THOUSANDS' OF THOSE THINGS OUT THERE.

Q.

OKAY. AND DO VIDEO TAGS HAVE ANY RELEVANCE AS FAR AS SEO GOES?

A.

ABSOLUTELY.

ANY KEY WORD THAT YOU USE ON A PAGE, IF YOU DON'T HAVE --- IF YOU PUT IT IN QUOTES IN A SEARCH RESULT, YOU'RE GOING TO GET DIFFERENT RESULTS AS IF YOU DIDN'T. SO WHEN I PUT HER NAME IN QUOTES, FOR EXAMPLE, I WILL ONLY SEE HER NAME WRITTEN OUT EXACTLY IN THAT FORM; HOWEVER, IF I DON'T USE QUOTES, I'LL SEE WHAT GOOGLE THINKS TO BE THE BEST SEARCH RESULT FOR THOSE KEY WORDS THAT I USED IN ANY ORDER AND WITH ANY SEMANTIC VARIATIONS, SUCH AS LAWYER WILL ACTUALLY COME UP WITH ATTORNEY, THE SAME LISTING AS ATTORNEY WILL. SO THERE'S DEFINITELY SIMILAR KEY WORDS THAT YOU CAN USE TO FIND THE SAME THING.

SO IF I WERE TO USE HER NAME WITHOUT QUOTES, I WOULD FIND SOME WEB PAGES THAT ARE JUST USING TAGS FOR "RI****" AND FOR "VI****", SOME OF THEM; AND SOME OF THEM THAT WERE EXPLICITLY "VI***RI****". SO MY FIRST THING WHEN I WAS LOOKING AT THIS TO SEE IF IT WAS JUST A COINCIDENCE, JUST A SYSTEM OF TAGS AROUND VIDEOS AND CONTENT, IS I PUT HER NAME IN QUOTES, AND THAT'S WHEN I KNEW IT WASN'T JUST TAGS, IT WAS SPECIFICALLY DONE BECAUSE IT SHOWED HER NAME IN SEQUENCE, WITHIN TITLES, DESCRIPTIONS, HEADINGS, AND VIDEO CONTENT. SO IT WAS REAL EASY TO ISOLATE BOTH OF THEM OUT. THE MAJORITY SEEMED TO BE IN SEQUENCE.

Q.

OKAY. AND YOU PREVIOUSLY TESTIFIED THAT NOT JUST ANYONE WOULD HAVE THE SKILL OR THE KNOWLEDGE TO BLAST THE NAME LIKE THIS; IS THAT CORRECT?

A.

CORRECT.

Q.

WERE YOU ABLE TO -- DID YOU SPEAK TO "MS. RI***" ABOUT THE PROBLEMS THAT SHE WAS HAVING WITH "****".

YES.

Q.

--- WITH "MS.**** ?"

A.

YES.

Q.

DID YOU DO ANY RESEARCH INTO "MS.****'s F***ER?

A.

YES. SHE HAVE GIVEN ME A STARTING POINT OF WHAT SHE THOUGHT MIGHT HAVE BEEN CAUSING THE PROBLEM.

Q.

"MS. RI ****"

A.

CORRECT.

AND SO I DID SOME RESEARCH, I LOOKED AROUND, AGAIN, USING DIFFERENT SEARCH QUERIES TO TRY TO FIGURE OUT IF I COULD SOURCE IT. AND SO THE FIRST THING THAT I DID WAS I TOOK, OBVIOUSLY, THE NAME AND I WENT OUT THERE AND LET ME SHOW YOU WHAT I FOUND IN THE SEARCH RESULTS. SO, YEAH, I DID A SEARCH AND I FOUND -- HERE'S THE ONE, HERE. THERE WE GO. SO I FOUND MULTIPLE WEBSITES THAT CONTAIN "MR. ****" AND MULTIPLE EXAMPLES OF SOFTWARE THAT HE USED SPECIFICALLY OR MAY HAVE USED SPECIFICALLY TO DO THIS TYPE OF EXERCISE.

AND, AGAIN, THIS IS SOFTWARE WE FROWN ON BECAUSE IT'S "BLACK HAT SOFTWARE" IN THE SEO COMMUNITY, BUT IT WAS OBVIOUS, BASED ON THE TYPE OF SOFTWARE THAT HE WAS USING, THIS "BLAST---" AND SO FORTH -- HERE WE GO, HUNDREDS OF SERVICES HERE. I THINK HERE'S THE SCREEN SHOT THAT KIND OF SHOWED HOW THIS WHOLE BLACK HAT THING WORKS.

YOU BASICALLY CREATE A WEBSITE, YOU USE SOCIAL NETWORKS AND OTHER WEBSITES AND YOU LINK IN TO THAT PARTICULAR SITE AND THEN GOOGLE LOOKS AT THAT AND SAYS IT MUST BE AN IMPORTANT WEB SITE BECAUSE I SEE A LOT OF LINKS TO IT, AND THEN THAT SITE RANKS.

SO THEN I TOOK THAT INFORMATION, I LOOKED FOR DIFFERENT TYPES OF TOOLS THAT HE MIGHT HAVE USED, AND THEN I FOUND HIS NAME ASSOCIATED WITH A LOT OF THEM, LIKE THIS "BLAST--". I COULD PUT A SCREEN SHOT HERE AT THE END. SO IT'S ALSO ON THE "BLAST---" WEB SITE AS WELL. AND BASICALLY WHAT THE SOFTWARE DOES IS IT SUBMITS AND IT CREATES PROFILES ACROSS ALL OF THESE DIFFERENT DESTINATIONS. AND IT'S A COMMON ILLEGAL SOFTWARE THAT BLACK HAT SEO'S USE. THERE'S SEVERAL, ACTUALLY, IN THE LIST. THERE'S THIS "S.E.NU--" ONE THAT'S A REALLY BIG DEAL THAT DOESN'T REALLY ASSOCIATE TO THE ADULT INDUSTRY. THERE'S ALSO, AGAIN, MULTIPLE SOFTWARE OUT THERE THAT IF I PUT A LINK HERE, I AM SURE IT'S IN YOUR DOCUMENTS THAT YOU COULD LOOK AT, TO FIND THE DIFFERENT TYPES OF SOFTWARE THAT PEOPLE USE. HERE'S HOW PEOPLE USE "SOCIAL A--" TO GET THOUSANDS OF PEOPLE ON FACEBOOK, TO LINK TO OR TO DISCUSS A PAGE OR TWITTER OR BOOKMARK A WEBSITE, SUCH AS "DELICIOUS" OR SOME OTHER BOOKMARK WEBSITES.

SO THIS SOFTWARE, YOU KNOW, WE LOOKED INTO IT, THIS "BLASTO--" DOES ESSENTIALLY THE SAME THING, IT GOES OUT AND IT SUBMITS CONTENT EN MASSES. I DON'T KNOW IF IT WAS THE TOOL ITSELF THAT HE USED.

BUT THE FACT THAT HE WAS ASSOCIATED WITH USING THIS TYPE OF "ILLEGAL BLACK HAT SEO SOFTWARE" FROM ALL OF THESE DIFFERENT PLACES THAT WE FOUND HIM ON LINE WHERE HE'S FAMILIAR WITH BLASTING, YOU KNOW, CONTENT AND DOING BULK SUBMISSION TELLS ME THAT'S HE'S VERY ACCLIMATED TO HOW THE SOFTWARE WORKS AND VERY FAMILIAR WITH THAT TYPE OF SOFTWARE.

Q.

IS THAT A PICTURE OF "MR.***?" IN THE BOTTOM LEFT-HAND CORNER?

A.

VIV** INDICATED THAT IT WAS, WHEN WE LOOKED AT IT TOGETHER.

Q.

OKAY. HAVE YOU SEEN ANY PROFILES OF "MR.****" ON LINE PROMOTING THIS TYPE OF SEO WORK?

A.

WELL, WHAT YOU SEE HERE, AND "LEADSO---" AND "BLAST ---" HAD HIS PROFILE ON IT.

Q.

AND FROM THE RESEARCH THAT YOU'VE DONE, YOU'VE BEEN ABLE TO TIE MANY OF THESE WEBSITES TO THE ACTUAL NAME "MR.***.******" AND THAT BUSINESS THAT HE PROMOTES?

A.

CORRECT.

THE BLASTING AND LEAD GENERATION OF BUSINESS BY DOING BULK SUBMISSION, DEFINITELY THERE'S AN ASSOCIATION THERE.

I MEAN, YOU SEE THIS PROFILE IN "SCO--.NET", HIS PROFILE ON "FREE FF--S", EVEN ON SOME OF HIS SOCIAL PROFILES HE'S PROMOTING THE FACT THAT HE CAN GENERATE LEADS BY USING BULK SUBMISSION.

Q.

IN YOUR OPINION WAS EVERYTHING THAT HAS HAPPENED WITH "MS. RI****" NAME DONE BY SOMEONE WITH THE SKILL AND EXPERTISE OF "MR.****".

A.

YES.

YOU ABSOLUTELY NEED OT KNOW WHAT YOU'RE DOING TO BE ABLE TO GET THAT LEVEL OF SATURATION IN THE SEARCH RESULTS.

Q.

AND YOU BELIEVE THAT "MR.***" DOES KNOW WHAT'S HE'S DOING?

A.

ABSOLUTELY.

I LOOKED A THE TOOLS HE WAS USING AND I WENT THROUGH AND I KIND OF ANALYZED THE DIFFERENT DESTINATION THAT THOSE TOOLS GO TO AND HOW THEY CAPTURE PROFILES, AND IT'S VERBATIM WHAT THE BIGWIGS IN THE SEO COMMUNITY USE, WHICH IS THE "S.E. NU--" TOOL.

AND, AGAIN, THIS SCREEN SHOT OVER HERE IS JUST AN EXAMPLE OF ONE. THIS PARTICULAR PIECE OF SOFTWARE ALLOWS YOU TO GO OUT TO ANY WORD PRESS WEBSITE AUTOMATICALLY THROUGH THE SOFTWARE AND PUT IN A COMMENT. JUST CLICK A BUTTON AND YOU CAN HAVE HIGH GRADE BLOG POSTS ON THOUSANDS OF BLOGS ALL ACROSS THE INTERNET. SO THERE'S A LOT OF THIS TYPE OF SOFTWARE OUT THERE, BUT YOU HAVE TO BE ACCLIMATED TO SEARCH, YOU KNOW, HOW TO USE IT EFFICIENTLY.

Q.

WAS THERE ANY OTHER INFORMATION THAT YOU UNCOVERED THAT MAY HAVE INDICATED WHERE --- HOW THIS BEGAN...


**** END STEVE W. COURT TESTIMONY ****


*********************************************


"SAFE AT HOME" PROGRAM - LEGAL NOTIFICATION OF VICTIM PROTECTION LAWS:

http://www.sos.ca.gov/safeathome/sah-laws.htm

STATE LAW WITH SAME FEDERAL LAW: 6208.1. (a) (1) No person, business, or association shall knowingly and intentionally publicly post or publicly display on the Internet the home address, home telephone number, or image of a program participant or other individuals residing at the same home address with the intent to do either of the following: (A) Incite a third person to cause imminent great bodily harm to the person identified in the posting or display, or to a coresident of that person, where the third person is likely to commit this harm. (B) Threaten the person identified in the posting or display, or a coresident of that person, in a manner that places the person identified or the coresident in objectively reasonable fear for his or her personal safety. (2) A participant whose home address, home telephone number, or image is made public as a result of a violation of paragraph (1) may do either or both of the following: (A) Bring an action seeking injunctive or declarative relief in any court of competent jurisdiction. If a jury or court finds that a violation has occurred, it may grant injunctive or declarative relief and shall award the successful plaintiff court costs and reasonable attorney's fees. (B) Bring an action for money damages in any court of competent jurisdiction. In addition to any other legal rights or remedies, if a jury or court finds that a violation has occurred, it shall award damages to that individual in an amount up to a maximum of three times the actual damages, but in no case less than four thousand dollars ($4,000). (b) (1) No person, business, or association shall knowingly and intentionally publicly post or publicly display on the Internet the home address or home telephone number of a participant if that individual has made a written demand of that person, business, or association to not disclose his or her home address or home telephone number. A demand made under this paragraph shall include a sworn statement declaring that the person is subject to the protection of this section and describing a reasonable fear for the safety of that individual or of any person residing at the individual's home address, based on a violation of subdivision (a). A written demand made under this paragraph shall be effective for four years, regardless of whether or not the individual's program participation has expired prior to the end of the four-year period. (2) A participant whose home address or home telephone number is made public as a result of a failure to honor a demand made pursuant to paragraph (1) may bring an action seeking injunctive or declarative relief in any court of competent jurisdiction. If a jury or court finds that a violation has occurred, it may grant injunctive or declarative relief and shall award the successful plaintiff court costs and reasonable attorney's fees. (3) This subdivision shall not apply to a person or entity defined in Section 1070 of the Evidence Code. (c) (1) No person, business, or association shall solicit, sell, or trade on the Internet the home address, home telephone number, or image of a participant with the intent to do either of the following: (A) Incite a third person to cause imminent great bodily harm to the person identified in the posting or display, or to a coresident of that person, where the third person is likely to commit this harm. (B) Threaten the person identified in the posting or display, or a coresident of that person, in a manner that places the person identified or the coresident in objectively reasonable fear for his or her personal safety. (2) A participant whose home address, home telephone number, or image is solicited, sold, or traded in violation of paragraph (1) may bring an action in any court of competent jurisdiction. In addition to any other legal rights and remedies, if a jury or court finds that a violation has occurred, it shall award damages to that individual in an amount up to a maximum of three times the actual damages, but in no case less than four thousand dollars ($4,000). (d) An interactive computer service or access software provider, as defined in Section 230(f) of Title 47 of the United States Code, shall not be liable under this section unless the service or provider intends to abet or cause bodily harm that is likely to occur or threatens to cause bodily harm to a participant or any person residing at the same home address. (e) Nothing in this section is intended to preclude prosecution under any other provision of law. (f) For the purposes of this section, the following terms are defined as follows: (1) "Image" includes, but is not limited to, any photograph, video, sketch, or computer-generated image that provides a means to visually identify the person depicted. (2) "Program participant" means a person certified as a program participant in the manner described in Section 6206. (3) "Publicly post" or "publicly display" means to communicate or otherwise make available to the general public.

6208.2. (a) (1) No person shall post on the Internet, with the intent that another person imminently use that information to commit a crime involving violence or a threat of violence against the participant or the program participant's family members who are participating in the program, the home address, the telephone number, or personal identifying information of a program participant or the program participant's family members who are participating in the program. (2) A violation of this subdivision is a misdemeanor punishable by a fine of up to two thousand five hundred dollars ($2,500), or imprisonment of up to six months in a county jail, or by both that fine and imprisonment. (3) A violation of this subdivision that leads to the bodily injury of the program participant, or of any of the program participant's family members who are participating in the program, is a misdemeanor punishable by a fine of up to five thousand dollars ($5,000), or imprisonment of up to one year in a county jail, or by both that fine and imprisonment. (b) Nothing in this section shall preclude prosecution under any other provision of law.

LEGAL SERVICE TO SAFE AT HOME PARTICIPANT:

The Secretary of State serves as the legal agent to accept legal documents on behalf of participant. If it becomes necessary to execute a process of service, two copies of each document being served are required and shall be delivered to the Secretary of State - direct office between 8a-5p.

Mailing to Safe at Home Participants:

The Secretary of State serves as the legal agent to accept and forward mail on behalf of all participants of the program. (per Government Code §6206(a)(5)) Please be sure to include the participantâ��s four-digit Authorization ID number (provided on the Authorization ID card) when mail is addressed to the participant at their designated Safe at Home mailing address. If possible, the Authorization ID number should be placed adjacent to the participantâ��s last name or as a separate box number in the address line. The Safe at Home mailing address is shared by other participants. The use of the participant Authorization ID number expedites the sorting and forwarding of participant mail. If it becomes necessary to execute a service of process, please prepare two copies of each document being served.

The documents must be delivered to:

Secretary of State�s office, 1500 11th Street, 4th Floor, Sacramento, CA 95814 between 8:00 a.m. and 5:00 p.m., Monday through Friday, excepting state holidays. One copy is immediately forwarded to the program participant and the other copy is retained in the participant's file for reference.

Protecting Participant Information in Court (per Government Code §6207)

The Safe at Home participant should notify the court prior to the scheduled hearing date of his or her enrollment in the Safe at Home Program. He or she may show officers of the court his or her Authorization ID card as proof of active enrollment. The participant�s designated Safe at Home mailing address should be used on all new court documents and his or her confidential address information must be kept confidential.


*********************************************


UNFORTUNATELY, for the "Black Hat SEO" "Google-bombing" STALKER the Victims employment history includes and not limited to: Consultant, flown around the world to build DIVERSIFIED CULTURE, TECHNOLOGY TEAMS of Engineers, Directors, Vice Presidents for Semiconductor (other tech) company projects on VP's budgets. Until, Victim, became ill with heart, low blood counts and LUPUS symptoms for a few years, until under control.

Victim had the knowledge to trace any web site owner with ISP/hosting company via PING RUN>COMMANDS DOS or 100's of other ways. Brings up web site/hosting IP's and then easily traced to find hiding Web Site owners & their Hosting Companies. Then submit abuse tickets and report it to FBI Security and remove name from content.

EVERYTHING IS TRACEABLE ON THE INTERNET - ONE WAY OR THE OTHER.

LUCKILY, Due to some Web Sites RE-hosted 100's of times globally: Victim had additional high level connections in Asia, Germany and UK: through technology connections and ON-LINE GLOBAL TECHNOLOGY "USERS-GROUPS." They would contact the hosting company in their country and help support Victim. Victim, built a global network to resolve issues depending on the country - through connections and technology "USER-GROUPS."

Of course: REAL TECHNOLOGY BUFF'S DON'T APPRECIATE THEIR WORK FIELD UTILIZED IN THIS HARASSMENT MANOR. Especially, against a global recruiter who offers employment opportunities to techies.

One tech strongly stated: "The STALKER is making a joke out of the internet - which is the most powerful tool on the planet and to be preserved for future generations to utilize for: education, connections, news, in a respectable manor. If people like this ##### Stalker, trash the internet so maliciously, the global governments will have re-course to take over and limit freedom of speech."

******************************

GOOGLE REMOVAL TOOLS - Victim removed over 4,000 links of abuse herself in (2) years

A 404 error code is required on the cache link or link below. Please ask the web site owner to use Google removal tools to delete from link cache below. Your assistance is more than greatly appreciated.

Google personally provided while visiting their office for instructions and help. I�m to report all incidents to Google Legal and Security:

Re-Register or login to Google Webmasters Tools:

https://www.google.com/webmasters/tools/removals?action=show&hl=en&pli=1

*** then click on New Removal Request

***insert full url you want remove from Google

***Click on Continue, enable "permanent removal" and click on Submit Request That's all, within 1-2 days it should be removed.

*** There is one condition before this -- he must edit his so called file "robots.txt" and disallow the url he need remove there. So e.g. if he need remove link http://www. -----"he must use this in his robots.txt

file: "Disallow: /some-text", but he should know using of robots.txt file.

More can be found e.g. here:

or

http://www.google.com/support/forum/p/Webmasters/thread?tid=2abd8ea133612078&hl=en

http://searchengineland.com/google-releases-improved-content-removal-tools-10989

******************************

******************************

A FLASH DRIVE IS SENT TO FEDERAL GOVERNMENT ATTORNEYS, PRESIDENT, STATE ATTORNEY GENERALS, GOVERNORS....

THE DVD INCLUDES IN SEQUENCE "SERIES OF EVENTS": (3) YEARS OF GOOGLE SEARCHES-DATE STAMPED & PRINTED OUT IN COLOR, COPIES OF 15,000 HARASSMENT/ELECTRONIC IMPERSONATION LINKS CLEARED OF DISGUSTING WEB SITE CONTENT PAGES, SEO TRANSCRIPTS, E-MAILS FROM HOSTING COMPANIES AROUND THE WORLD WHOM STATE THIS IS A "SECURITY ISSUE" WITH "DISRUPTION OF THEIR BUSINESS SERVICES & TIME AND NAME MALICIOUSLY PLACE IN BLACK HAT SEO DEFORMATION ABUSE 1000'S OF TIMES.

A DVD was provided with exhibits of cyber harassment, cyber abuse, electronic impersonation, with series of events, to:

*) Orange County Prosecutors office - felony investigations.

*) Federal Attorneys

*) B. Wilkinson, Attorney, (investigating Google for FTC on SEO abuse). Was previous attorney for Department of Justice.

*) Google Sergey Brin Founder.

*) IC3.gov

*) Attorney General Office - felony investigations.

*) Yahoo/bing VP of Security & Chief Legal Council.

*) Government Cyber Harassment, Department of Justice, FBI,

*) Attorney Generals of other states.

*) Attorneys for the Department of Justice & FTC.

*) President of Cyber Security in India and Asia: Pavan Duggal - whom report to global Presidents


In America, you have a duty and a right to defend yourself. At the horrid, disgusting, magnitude of the harassment, electronic impersonation - ALL very well documented and witnessed by global Internet services - it's now getting attention from important people. They don't want the internet destroyed for their future children, families & generation - to be turned into a Global Search Engine Trash Dumpster.

This site was put to up to help pass laws. Additionally, the site was set up to save the Victim from being set up to be killed and stalked out by people whom believe the Victim is something she is not, due to the name association. We are also trying to save the family reputation and be free from harm and the Stalking. Additionally, to continue the help from Google who's contacting hosting companies to trace the name as this will validate the reason for their time and money - to protect their services as well.


If you have any knowledge there is a $$$ REWARD.