Article I. Terms of Use

CONDITIONAL TO YOUR USE OR VIEWING OR REDISTRIBUTION OR INTERACTION WITH THIS SERVER OR ITS DATA OR CONTENTS, YOU DO HEREBY AGREE AND CONSENT TO THE FOLLOWING TERMS AND CONDITIONS IN ACCESSING THIS SITE OR ITS ATTACHED DOMAINS TO INCLUDE SPECIFICALLY BUT NOT LIMITED TO ADAOK.ORG, ADAOK.NET, ADAOK.BIZ, ADAOK.INFO, SHADOWDANCERS.COM, SDPMULTIMEDIAGROUP.COM, BEYONDWAR.COM or any variation or hostname or wildcard redirect upon the network of the firm or its licensed internet services provider.

§1. AT NO TIME IS PERMISSION GIVEN TO ARCHIVE, COPY AND STORE BEYOND IMMEDIATE AND INDIVIDUAL USE BY THE REQUESTING PARTY, FOR USE OF ANY SORT IN A CLASSROOM OR EDUCATIONAL SETTING, OR FOR ANY UNLAWFUL OR ILLEGAL MEANS TO INCLUDE PARODY OR REPUBLICATION OR REDISTRIBUTION WITHOUT WRITTEN CONSENT CITING CRIMINAL DEMANDS AND THREATS UPON THE HOST CONDITIONAL AND IN CONTEXT TO SUCH PRIOR USE IN A WRITTEN AND PUBLICLY CIRCULATED AND ORGANIZED PLAN WITH PHYSICAL INJURY, PSYCHOLOGICAL INJURY, AND IRREPARABLE HARM TO A CHILD RESULTANT AND AGGRAVATED BY SUCH ACTIONS.

§2. NO ATTEMPTS TO UPLOAD, TEST, PENETRATE THE SECURITY, BYPASS ANY PROTECTION OR ACCESS ANY FILE OR DOCUMENT NOT LISTED OR LINKED OR PLACED PUBLICLY FOR THE PURPOSE OF VIEWING IN THE CURRENT DOMAIN STRUCTURE STARTING AT THE INDEX FILE - TO INCLUDE SYSTEM FILES, PORTS, SERVICES, FORMS, DATABASE INTERFACES, OR OTHER MECHANISMS WHICH MAY BE CONSTRUED TO POSE A PROBE OF SECURITY OR POSSIBLE EFFORT TO COMPROMISE THE PROTECTED COMPUTER SYSTEM OR DENY BY MALICIOUS AND ABNORMAL REQUESTS THOSE SERVICES OR RESOURCES PLACED HEREIN TO OTHER USERS, AS OCCURED JULY 25 2011 IN ATTACKS TO INTERFERE WITH AN ONGOING POLICE INVESTIGATION AND IN EXTORTION AND BLACKMAIL LETTERS SENT TO THIS COMPANY IN RELATION TO THOSE FRAUDS BY SPECIFIC PARTIES.

§3. SPECIFICALLY THE FOLLOWING PARTIES ARE BARRED BY NAME AND ANY AGENT OR OFFICE OR AGENCY OR PROXY OF THE SAME OR THEIR BUSINESS OR OTHER LEGAL GO-BETWEEN ENTITY ARE PROHIBITED FROM USE OR ACCESS OR REDISTRIBUTION OF THIS SITE UNDER PENALTY OF CRIMINAL LAW AND POSSIBLE CIVIL ACTION AT THE STATE AND FEDERAL LEVEL RELATED PATTERN OF ONGOING MISUSE AND ABUSE AND INTERSTATE CRIMINAL STALKING WITH INTENT TO DEPRIVE THE TARGET OF A CHILD IN VIOLATION OF A COURT ORDER AND EXTORT MONIES AND PROPERTY IN EXCESS OF $250,000 USD PER EXPLICIT LETTERS SENT TO THE FIRM NAMED IN THE RELATED EXPLICIT THREATS PROMISING PERPETUAL CONCEALMENT OF THAT CHILD UNLAWFULLY.

Persons to whom unlawful threats and false claims related the hoax have been alleged on substantial evidence suitable for BARRING OF ACCESS UNDER CRIMINAL TRESPASS and COMPUTER CRIMES STATUTES:
  • Donald Johnathon Beal
  • Veronica Marie Petersen
  • Alicia Scarbrough
  • Bobby C. Scarbrough
  • Persons associated with J. Deutch (alias)
  • Matthew Grigg
  • Ashlie Anderson (Cox)
  • Susan Quincy
  • Brian N. Young
  • Jo Anne Tingle
  • Members of the "Fowler" family (surname) of Oklahoma
  • - cited use of image alleged as author of sexual criminal threats, in addition to numerous relations to parties affiliated commercially with 2009-2012 author of threats to justify a broad ban. Statements affiliated threats of 2011-2012 in repetition of fraud in 2013 also cited.
  • Sandra Tappan/Kalista
Such bar to include the employer, client, partner, agent, agency, or any 3rd party hired or solicited either directly or indirectly or under false name or identity by the prior parties, citing a history of such abuse repeated AUG 2 - 4 2013 in ongoing threats.

Business entities affiliated by ownership or primary operation to a specific party barred from all use of this network, computer, and website in evidence provided to this firm, or whose networks and assets have been used repeatedly to interfere with and attack our services and products demonstrating insider abuse and elevated privilege abuse in context to ongoing directed threats as make them subject to the same BARRING OF ACCESS and CRIMINAL STATUTES prohibiting contact or usage of any kind include but are not limited to:

  • "NTT COMMUNICATIONS GROUP" or its subsidiaries or clients/subscribers or agent or agency
  • NTT AMERICA INC. (Ann Arbor, MI)
  • Nippon Telegraph and Telephone (Japan)
  • COGENT COMMUNICATIONS INC.
  • PSINET INC.
  • CYVEILLANCE INC.
  • "SOFTLAYER TECHNOLOGIES INCORPORATED" or its subsidiaries or clients/subscribers or agent or agency
  • "TELX COLOEXCHANGE (Dallas TX)" or its subsidiaries or clients/subscribers agent or agency
  • "GI PARTNERS" (Menlo Park, CA USA)

  • INFAMOUS PRODUCTIONS LLC (AR, revoked by state)
  • CrInfamous Productions (OK)
  • INFAMOUS PRODUCTIONS (OK)
  • COMPUTER OPTIONS (Ada OK)
    - - - beneficiary by employment of family of party filing false claim 2011 extortion
  • ADA COMPUTER AND ELECTRONIC SERVICES (Ada OK)
    - - - associated w. author of written J.D. rape threats Sept 2012
  • ROBERT HALF TECHNOLOGY (Worldwide, including all clients and contractors)
    - employer of party creating stalker resource site (.com / .me)
  • GEBHARDT BROADCASTING L.L.C. (Plano TX)
  • VIRTBIZ.COM and any of their CLIENTS OR USERS
  • Plano Community Radio (Texas)
  • Any National Public Radio (NPR) Affiliate
  • KEIF-LP Enid OK Radio *FCC license REVOKED AS OF 2013*
  • TRANSGENDERDATE.COM (Lansing MI)
  • ISP Network Operations Centers affiliated with NTT Communications Group or their subsidiaries
  • ISP Networks and clients affiliated with PCH.NET (NTT Co-Director Firm)
Such bar to include all subsidiaries or clients, subscribers, users, agent, agency thereof and/or affiliated likewise with any entity held in any part by securities or shares or contract of ownership or means of control including agreement both formal or informal or defined by 18 U.S.C. 1961 as "Entperprise" relationship to include substantial business ties resulting in influence or control over any aspect of operation or activity.

Such prohibition the direct result with cause of acts showing knowing and wilfull threats to suppress Oklahoma Civil Rights in child concealment defined under 76 O.S. 76-8 and right to prohibit commerce or contact under Title 71 O.S. and authorized by law per 76 O.S. 76-9 for false claims of libel held to be a fraud and hoax under 43A O.S. 43A-5-104 in concealment for profit of a child, abuse to deny public notice of child concealment in 11 year holding, and harassment to violate Oklahoma Constitution Article II section II-3 and II-22 protections in report of a fraud which was designed to conceal and injure a child ORDERED RETURNED TO THE PARTY TARGETED.

THE THREATS OF WHICH WERE DELIVERED AUG 1 2013 AGAIN IN WRITTEN LETTERS BY THE SUBJECTS ABUSING THE NETWORK RESOURCES OF NTT COMMUNICATIONS GROUP, ILLEGALLY (18 U.S.C. 249) USING NETWORK RESOURCES TO CREATE AND TRANSMIT HATE SITES HOSTED IN CALIFORNIA TOWARD THE JOINT MANAGING CONSERVTOR OF THE CHILD IN THE STATE OF OKLAHOMA, AND DEVELOPED IN SUPPORT OF CHILD STEALING (21 O.S. 21-891) AND NETWORK ABUSE SPANNING AUG 1 - 14 2013 POSITIVElY IDENTIFIED AS ORIGINATING TRAFFIC FROM THESE NETWORKS IN CRIMINAL THREATS TO PROMOTE PERPETUAL CONCEALMENT FOR $33,000 USD OR MORE IN DEMANDS VIOLATING FEDERAL LAW (15 U.S.C. 1673 b; 28 U.S.C. 1738A e).

 

§4. CORPORATIONS BANNED FROM ACCESS OR USE DUE TO ABUSE COMMITTED IN AUGUST-SEPTEMBER 2013

THE FOLLOWING BUSINESSES, THEIR CLIENTS, EMPLOYEES, IP ADDRESSES, SERVERS, AGENTS THERETO or THEREOF, OR ANY PERSON OPERATING UNDER THEIR INCITEMENT OR INFLUENCE OR SUGGESTION, ARE BARRED FROM THIS SITE FOR ACTS RELATED THE PRIOR AND ONGOING ATTEMPTS TO OBTAIN PRIVILEGE GAINS BY ABUSE OF NETWORK SERVICES DOCUMENTED BY OUR SYSTEMS.

  • HETZNER.DE and Hetzner Networks - non-stop flooding despite DROP policies in Sept 2013
  • INTERBUSINESS - non-stop flooding despite DROP policies in Sept 2013
  • VIBE COMMUNICATIONS (NZ) - non-stop flooding despite DROP policies in Sept 2013
  • LEASEWEB (5.61.46.159 and all other IPS)
  • OVH Hosting Inc. (Montreal QC)- UNAUTHORIZED USE OF MEANPATH SEARCH BOT
    198.245.51.134 - Sept 25 2013 - 198.245.48.0/20
  • Teksavvy.com - EXPLOIT CODE
    69.165.163.217 - Sept 26 2013 - 69.165.163.0/24
  • Global Village Telecom (Brazil) - more hacking incidents than bear time to discuss over multiple years
  • Any ISP or IP located in UKRAINE or .UA domains (widespread abuse in organized fashion, Sept 2013)
  • Any ISP or IP located in Lithuania (widespread abuse in organized fashion, Sept 2013)
  • Any ISP or IP located in Russia or .RU territory (widespread abuse in organized fashion, Sept 2013)

Pattern of abuse indicates after demands for money were made August 2 2013, during DoS attack with referrer injection of URL to extortion letters, then escalating to Cogent Communications Inc. network, and then to TOR - the attack moved to use of foreign assets primarily provided by OVH Hosting Inc. and Hetzner Inc. (clients of Level 3 Communications) in France and Spain, prior to (upon public report of this fraud) moving again to Leaseweb and Ukrainian hosting services systematically to evade firewall and blocking activity by our network repeatedly. Such activity in 18 U.S.C. 1030 felony violation of the United States Federal Law, for the sole puprose of unlawful privilege gains and access to the networks targeted repeatedly, and such evidence shown in detailed access attempt logs by URL and query of administrative directories and malicious exploitation of common access methods in ongoing tampering to gain privileges and use of our network and servers.

Domains targeted in these attempts were identical to the small subset of assets known to and prior cited by the aforementioned terrorist parties in the 12 year concealment of the child in the STATE OF TEXAS, and strongly indicate pathological criminal stalking to suppress report of such unlawful concealment (violating a court order for POSSESSION of the child to the father, owner of our company) in this ongoing abuse and harassment. No claim of incitement is possible due to the serious nature (21 O.S. 21-891, felony child stealing) to excuse these acts and threats and ongoing refusal to return the child to the family in Oklahoma AS ORDERED, nor to demand money ($33,000 USD; $250,000 USD) and property (registered trademarks; partnership in an existing limited liability business), conditional relief in abuse and violent explicitly published written threats and public incitement to commit murder.

We apologize to the many good people of Ukraine and Lithuania, Russia, Israel, and Italy, who are affected by this block, but the abuse of carrier-level networks and server co-location hosts to attack our system in an organized framework and in retaliation for report of a child snatching and concealment, are absolutely targeting our domains known to the abuser in the STATE OF TEXAS and his associates in these threats in the STATE OF OKLAHOMA and STATE OF ARKANSAS - in the UNITED STATES. We believe your reputation is being exploited as ours was, and urge you to push for action by your State governments under THE ROME STATUTES to stop this fraud as it affects trade with your country and damages the economy of all states involved in criminal activity by business officers against individual human rights.

Whether these abuses are state-sponsored, as Snowden alleges, or the wrongdoing of key personnel does not matter so long as they are refused investigation and no action taken to provide relief in matters as serious as child abduction and $108,000 extortion without due process or habeas corpus (2002-2012) at trial in the taking for perpetual concealment of a newborn child out of the registered home of his father (and legal residence of the child as of the abduction August 11 2001).

 

Article II - FRAUD IN LIBEL CLAIMS

Prior criminal felony allegation of libel to interfere with or "sabotage" and "disrupt" the business of this website host in a premeditated documented written and published plan so described under "The Oklahoma Anti-Terrorism Act, section 3 (b)" for report of the actions of specific persons in an organized series of criminal threats and written statements or direct operation of identified commercial enterprise benefitting extensively and by direct relation from the acts of family members and identified business associates acting to perpetuate the fraud are described as an "enterprise" under Federal Law (18 U.S.C. 1961), AND ARE A FORM OF CRIMINAL FRAUD.

All parties should familiarize themselves with Oklahoma Constitution Section II-3 and II-22, which state that LIBEL shall not be alleged or assumed nor conviction rendered thereof for report of the Truth relevant to the public good, so also explicitly described under Title 76 and section 76-8 civil rights systematically violated without cause or due process in context to criminal demands for money, property, and to gain commercial advantage over the target using the concealment of a child.

Allegations of libel for public report, IN RESPONSE TO ASSAULT INCITED BY FRAUD AND ON THE ESTABLISHED NEED TO PROTECT VICTIMS OF VIOLENT AND ORGANIZED CRIME FROM CRIMINAL RETALIATION IN A CAMPAIGN OF KNOWING IDENTITY THEFT AND MALICIOUS DEFAMATION OF MENTAL HEALTH TO ISOLATE AND DISENFRANCHIZE THE VICTIM IN EXTORTION OF A REAL AND REGISTERED COMPANY OF THE STATE OF OKLAHOMA SO PROHIBITED UNDER FEDLERA LAW (18 U.S.C. 1951 and 42 U.S.C. 1983), AND BY COLOR OF LAW SO DESCRIBED IN 18 U.S.C 872 AND 1202, AND BY HATE CRIMES OF A SEXUAL AND GENDER AND ETHNIC NATURE WRITTEN AND PUBLISHED IN 2001-2013 VIOLATING FEDERAL HATE CRIME STATUTES (18 U.S.C. 249) THAT ALL SUCH RIGHT TO PRIVACY HAS BEEN WAIVED BY THOSE PARTIES ATTACHED THEIR STATEMENTS TO THE TARGET IN EXTORTION AND ACTIVE DEFAMATION ACTS PRE-EMPTING THEIR LISTING HERE AS KNOWN ASSOCIATES OF THE ADA OK, DALLAS TX, SPRINGDALE AR, AND ENID OK GROUPS PARTICIPATING IN THESE ABUSES.

REPORT AND DENIAL OF LAWFUL RELIEF UPON SUBSTANTIAL EVIDENCE TO INCLUDE DISMISSAL OF NUMEROUS WITNESSES OF VIOLENT THREATS AND INTERSTATE STALKING IN SUPPRESSION OF TESTIMONY TO CONCEAL A MINOR CHILD NOW HELD TO BE ENDANGERED AND IN VIOLATION OF A COURT ORDER OR DECREE AND PRIOR FEDERAL LAW, IS THE RIGHT OF THE VICTIM UNDER OKLAHOMA LAW (76 O.S. 76-8 & 76-9) AND SUCH RIGHTS BINDING IN ALL OTHER TERRITORIES AND STATES AS HUMAN RIGHTS UNDER OKLAHOMA SUPREME LAW AND FEDERAL TREATY (1988, ALSO SUPREME LAW). NO IMMUNITY FOR STATE, FEDERAL, OR LAW ENFORCEMENT IS PERMITTED PER FEDERAL TREATY IN SUCH CASE AND CIRCUMSTANCES, AND USE OF SOVEREIGN IMMUNITY IN DEFENSE (Bitara v Texas; Bitara v USA) A VIOLATION OF FEDERAL AND INTERNATIONAL LAW RELATED THIS MATTER IN ONGING WRONGDOING AND INJUSTICE WITH INJURY PROHIBITED AND OBLIGATED REMEDY AND COMPENSATION UNDER FEDERAL LAW (42 U.S.C. 1983).

EFFORTS TO INTERFERE WITH THE BUSINESS, OFFICERS, EMPLOYEES, OR CLIENTS OF THE VICTIM IN THIS CRIME ARE ALSO FEDERAL FELONIES UNDER FEDERAL LAW (18 U.S.C. 1513) AND WILL BE PROSECUTED AND PRIOR WAIVE ALL RIGHT TO PRIVACY UPON THEIR STATED PURPOSE OR ACTIONS DIRECTLY IN CONTEXT TO WRITTEN PUBLISHED PLANS OF COMMERCIAL SABOTAGE TO FURTHER THE CHILD CONCEALMENT AND JUSTIFY THE UNLAWFUL CHILD TAKING WITHOUT DUE PROCESS IN 2001 DALLAS TEXAS.

 

Article III - PRIVACY POLICY

No Right To Privacy is GRANTED OR ASSUMED and EXPRESSLY DENIED in contact or requests sent to this site, and all data created in contact may be archived, stored, sorted, distributed, and published without limitation as deemed fit solely by the owner of the domain and SHADOWDANCERS L.L.C. in agreement. [Smith v. Maryland, 442 U.S. 735, 743-44 (1979)]

This policy is resultant from criminal stalking and use of imaging tools to duplicate, republish, modify, vandalize, and publicize for defamation of CHRISTIANS, NATIVE AMERICANS, HETEROSEXUAL MALE PARENTS, and by exploitation of anxiety and fear in the lesbian, gay, transgender, and white supremecist movements to threaten, defame, stalk, promise violence upon witnesses and family members of the concealed child, and execute a criminal unlawful and malicious child abduction with extortion for money and property over 2001-2013 in Interstate Interference in Commerce (18 U.S.C. 1951) refused relief by the STATE OF TEXAS and STATE OF OKLAHOMA and UNITED STATES in violation of "THE CONVENTION ON THE PREVENTION AND PUNISHMENT OF THE CRIME OF GENOCIDE" and numerous International and domestic war crime acts.

Concealment of a child without trial, without right to face the accuser, and for 'perpetual concealment' refused relief out of fear of discovery of criminal negligence by the State or Federal officers, is a war crime. [The Convention on the Prevention and Punishment of the Crime of Genocide; The Rome Statute, Court of the Hague; ]

Domestic (State, Federal) and International Law provide for remedy and immediate right to act (76 O.S. 76-9) in this matter, to include "REMONSTRATION" to report publicly the nature of the fraud, economic gain by such fraud, and identity of persons engaged in the activity to stop the hoax, fraud (Title 76 O.S.), and prevent injury to a minor child (76 O.S. 76-8) without need for indictment or letter or writ of permission to voice those demands and release information related child recovery and for the mental health of the child and general public good.

Fraudulent claims and assumptions on par with previous racism and hate speech have been characteristic of the "Progressive" supporters (political / religious viewpoint) in this kidnapping, and constitute a definite theme with material resources and support structure alleged as complicity in this activity so described in the 1948 and 1988 Federal Law on war crimes in child taking and concealment in 'genocide' activity. The Presumption of Privacy in such condition is nullified on face value, and information will be used to recover the missing child and identify collaborating parties actions and intrusion activity to suppress this site and violate its terms of service and limitations on use as part of that serious criminal activity as discovery warrants.

Efforts to resort to privacy and publicity laws after death threats and direct public acts of commercial sabotage to prolong a child concealment and extortion in kidnapping nullify any claim of right to privacy after direct registered identity theft in joint criminal threats to commit commercial Interstate and Intnerational extortion in child kidnapping.

This site SPECIFICALLY DENIES any liability under any legal theory for damages or loss related discovery or report of data generated by interaction or use with the server or acts to violate our terms and limitations of permitted use. All violations will be treated as criminal matters, given severity of prior pattern of abuse and injuriy in this cause. All parties are advised to use at their own risk. Customers on COLOCATED SERVERS accessing this site may be scrutinized as they do not represent end-users and home-users, and due to pattern abuse in targeted search engine and archive efforts after letters of extortion and malicious email with virus attachements following direct denial-of-service and testimony of formal agreement to kidnap a child which required suppression of this website to accomplish (2011, 2012 Oct 31).

 

Article IV - MODIFICATION, JURISDICTION, AND TERM

THE TERMS AND CONDITIONS OF USE ARE SUBJECT TO CHANGE AT ANY TIME AND EFFECTIVE WITHOUT NOTICE UPON PUBLICATION ON THE SITE AT THIS OR A SIMILAR DESIGNATED LINK BY SHADOWDANCERS L.L.C. AS SO DIRECTED BY THEIR OFFICER OR SENIOR MANAGER. USE CONSTITUTES ACCEPTANCE OF THIS CONTRACT. WHERE ANY PORTION OF THIS CONTRACT IS VOID, SUCH CHANGES WILL BE MADE TO MAKE IT BINDING IN THE STATE OR JURISDICTION OF SUCH LIMITAITON. HEADINGS OF SECTIONS ARE FOR ORGANIZATIONAL PURPOSE AND ARE NON-BINDING TO THE LEGAL INTENT AND SCOPE OF THE TERMS SPECIFIED HEREIN, AND SERVE AS NAVIGATIONAL AID ONLY TO THE TERMS OF THIS AGREEMENT BETWEEN THE USER AND SHADOWDANCERS L.L.C., a limited liability company in the STATE OF OKLAHOMA. ALL DISPUTES WILL BE SETTLED BY BINDING ARBITRATION IN THE STATE OF OKLAHOMA AT THE LOCATION DESIGNATED BY SHADOWDANCERS L.L.C. WHICH ARISE FROM THIS PUBLICATION, AND USE CONSTITUTES CONSENT TO THIS CONDITION. USE INCLUDES ANY VIEWING, COPYING, REQUESTS FOR DATA OR IMAGES OR INFORMATION FROM THE SERVER (WHETHER SERVED OR FULFILLED OR NOT), TO INCLUDE TRANSMISSION OF DATA TO THE SERVER SUCH AS INTERNET CONTROL MESSAGE PROTOCOL (ICMP) PACKETS OR OTHER FORMS OF DATA TRANSMITTED ELECTRONICALLY OR BY PAPER OR EMAIL TO THE SERVER OR DOMAIN NAMES ASSOCIATED INCLUDING EMAIL IN THAT DOMAIN. IF YOU DO NOT CONSENT YOU MUST CEASE USE AND DESTROY ALL DATA YOU OBTAINED OR TRANSMITTED OR POSTED IN FULL TO BE RELEASED FROM OBLIGATIONS DESCRIBED HEREIN. TERMINATION OF USE DOES NOT RELEASE THE PARTY FROM OBLIGATIONS AND WAIVER OF LIABILITY CREATED UPON PRIOR USE, AND ALL SUCH WAIVER TO ANY REMEDY OR JURISDICTION OTHER THAN THOSE SPECIFIED IS PERPETUAL UPON ANY USE OF ANY KIND.

 

Article V - AUTHORIZATION / SIGNATURES / VERIFICATION

If you have received correspondence or seen public postings by the owner of this site, the firm, or any party claiming to represent them, you have seen this signature style at the bottom. If you have not, you have received a forgery from the party or parties conceling the child. This is a GnuPG signature compatible with GnuPG and GPG4Win, and can be verified. No two signatures will be the same. If you see the same signature in more than one place, you are dealing with a forger. Because the signature can be copied its appearance does not always indicate it was a genuine document. Secure contracts with our firm for any consent, permission, order, or waiver will only be granted by secure contract service or signed encrypted document format from our authentic private key. Contracts not signed in such a fashion or by similar service are not binding and evidence of identity theft or fraud. Each signature is unique to the email you are seeing it originate from or identity, cosigned by our master key, and this is just an example altered to provide educational use.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.21-beta20 (MingW32)

iQEcBAEBAgAGBQJSDDO/AAoJEKdiNJkImuRtjdcH/3VtW7AI60vbj8EpRtA3tnkx
/X5WM8dWGCqyTvE/JbBS1uEsDECl0mv41Rx+j2OIqB6oMPGZpbS3WqjZ0sB41Qhs
J5lCOYxpW7xuw9CjcyhR8RqdkmHMfPoDc4Cdb+NdrVcsbFFpbANN6onSbsntjac3
JKZZnpPUdh7Mc0OzXsMJNcUPHvf+/5UXDYB/FFjx7+akRpGoJqq2YHsQANVVVUTe
BPEvDuM8i8lnhcDu+x7cWcNbj3n1VqwXKNb0FATAimpy7uVPbom5OO9SHuEhvqpa
qt3FjU3cIxBdlGIXNroyu4IHgot7MK6rjRZQJv3h32/jfKYyKHnEsglPBnsYMgg=
=6QkN
-----END PGP SIGNATURE-----

If you approach our representatives and accost them over "something they said or posted", they will likely have no idea what you are talking about because you are the victim of a fraud and such activity consistent with identity theft employed in the taking and kidnapping and commercial sabotage activity of the child abductors over 2001-2013, in effort to promote to the public a hoax that the father of the abused child is mentally ill or unfit, in ongoing acts of a premedited hoax designed to solicit public aid in child abuse, child kidnapping, child concealment, and commercial extortion activity.

Our employees and agents often have no idea what you are talking about, and will respond to physical contact or assault with legal right to disengage and to use force if required to do so or resist removal or intimidation within the legal authority of local and state law (76 O.S 76-9), granted the prior threats of murder, maiming, sexual assault, kidnapping, following, stalking (18 U.S.C. 2261A) and efforts to incite violence against the lawful guardian of the child in order to terminate recovery efforts and intimidate witnesses in evasion of justified criminal charges under THE JOHN WALSH ACT.

 

ERRATA - VERSION / REVISION / DOCUMENT SERIAL NUMBER

Version 1.0.0.2 Revision 001 Series 0002 Serial 01-20130928-2000-02-01
Change Log

  1. Added: AUTHORIZATION / SIGNATURES/ VERIFICATION section to educate the public in fraud ongoing in this criminal matter.

  2. Added: "NTT COMMUNICATIONS GROUP" or its subsidiaries/clients/agent/agency - Reason: 1000 spam referrer messages originating from patriot.lostserver.net, then PSI Net Inc. (subsidity of Cogent Communications Inc.), then TOR network followed by Ahref Pte Ltd abuse, and CA contracted monitoring by NTT affiliate to knowingly violate these rights Aug 1-4 2013, in threat of false legal action in the concealment of a child in violation of a court order. Series Designator 0002.

  3. Added: "SOFTLAYER TECHNOLOGIES INCORPORATED" or its subsidiaries/clients/agent/agency - Reason: 1000 spam referrer messages originating from patriot.lostserver.net, then PSI Net Inc. (subsidity of Cogent Communications Inc.), then TOR network followed by Ahref Pte Ltd abuse, and CA contracted monitoring by NTT affiliate to knowingly violate these rights Aug 1-4 2013, in threat of false legal action in the concealment of a child in violation of a court order. Series Designator 0002.

  4. Added: "TELX COLOEXCHANGE" or its subsidiaries/clients/agent/agency - Reason: 1000 spam referrer messages originating from patriot.lostserver.net, then PSI Net Inc. (subsidity of Cogent Communications Inc.), then TOR network followed by Ahref Pte Ltd abuse, and CA contracted monitoring by NTT affiliate to knowingly violate these rights Aug 1-4 2013, in threat of false legal action in the concealment of a child in violation of a court order. Series Designator 0002.

  5. Added: "GI PARTNERS (Menlo Park CA, USA)" or its subsidiaries/clients/agent/agency or company upon which a Board of Director or Director position is held by any employee of GI PARTNERS - Reason: 1000 spam referrer messages originating from patriot.lostserver.net, then PSI Net Inc. (subsidity of Cogent Communications Inc.), then TOR network followed by Ahref Pte Ltd abuse, and CA contracted monitoring by NTT affiliate to knowingly violate these rights Aug 1-4 2013, in threat of false legal action in the concealment of a child in violation of a court order. Series Designator 0002.

  6. Cause: Illegal creation of a referrer site to falsely submit this site to search engines under fraudulent claims, with intent to damage the parent-child relationship, and by forgery and/or transmission of UDP traffic crossing NTT AMERICA INC networks and SOFTLAYER TECHNOLOGY INCORPORATED client sites and network blocks to harass, query zone transfers non-stop (200 packets / min per originating IP), and reset by privilege gain exploits ("hacking") the router equipment of the Oklahoma-based corporation named in those threats in order to bypass protections blocking such traffic in interference in network services spanning 14 consecutive days of August 2013.

    Premeditated Threats Prior:
    + June 30 2013 threat by written letter.

    Premeditated Acts:
    + March 30 2013 attack upon network services.

    Prior Threat of Murder and Robbery:
    + Sept 11-23 2012 (8 direct letters, 1 public incitement of murder and felony trademark sale for $250,000 USD in criminal plan - accompanied by written description of felony 18 U.S.C. 2261A stalking and sexual assault versus female witnesses in the case in the City of Ada, Oklahoma).

    Hate sites to conceal a child:

    • 2013 - August 1-14, Donald J. Beal, $33000 USD sought in public letter of threat in attack,
      (15 U.S.C. 1637 b violation; 18 U.S.C. 1202 violation)

    • 2011 - 8.3 million ICMP packets July 25 in 2 hour span - Donald J. Beal / to .me site
      / patriot.lostserver.net (VirtBiz.com) / MidwestGuests.com (VirtBiz.com / A. Scarbrough)

    • 2011 - False Libel Claim in Extortion Attempt on concealment of a child; $2000 USD sought,
      Brian N. Young / A. Scarbrough (using real name, public claims & letters)

    • 2011-2012 - Donald J. Beal (using fake name, direct letters of threat)

    • 2009-2012 - Brian N. Young / A. Scarbrough (using fake name, direct letters of threat)

    • 2009-2011 - S. Tappan/Kalista dba Pyrallis Entertainment (adult performer, fined) did threaten J. Allen and K. Kelsay (The Hidden Castle, Norman OK) using similar tactics, means, and on behalf of joint-ventures with A. Scarbrough known as "Oklahoma Steampunk Exposition" and similar ICP-themed performance ventures, incorporating false organized claims with staff of Re:Mission Entertainment (S. Quincy) to damage, defame, and blackmail based upon the child kidnapping and $2000 failed extortion of Raccoon Technologies Incorporated by Brian N. Young for "TrickConTreat 2009", a former project of Pyrallis Entertainmen VP Raymond Martin subordinate to Ivarr Brockinnson (owner, no fault). Targeting by libel (image appropriation and alteration to support child kidnapping and concealment) documented by private investigation upon Facebook.com and published there by Brian N. Young in a planned extortion executed July 21 2011 discussed in sabotage of this website July 19 2011 by the parties as commercial extortion in concealment of a child. Such extortion aided in false sworn testimony by A. Scarbrough, then "Director, INFAMOUS PRODUCTIONS LLC", claiming in police report "no job or officer role in a competing business with James A. Allen at the time of these false allegations with Brian N. Young aiding in (2009) explicit letters of extortion of $2000 USD and plan to "ruin" the business of James Allen supported by testimony (so alleged in writing) of V. Petersen and for her behalf in child concealment.

    • 2008-2009 - M. Grigg / A. Cox did threaten extortion - letters by D. Beal found there endorsing the fraud in identical child concealment and extortion of a business and trademark cited 2007, 2012 in related blackmail for child concealment claims and threats.

    • 2002-2004 - Donald J. Beal (using fake name 2002, direct letters of threat 2003)
      Created and hosted website (.com using the father's full legal name established to justify the child abduction and kidnapping) designed to incite fear of arrest on false charge in visitation / loss of income to targeted parent in child stealing (21 O.S. 21-891) and concealment (threatened perpetual) prior false claim of abandoment without right to face accuser due interference including assault at gunpoint (Nov 2002), arson (2002 during trial), and premeditated identity theft of targeted parent by child's abductor (Sept 2002). Such actions undertaken Sept 2002, after a 2002 May court order to SURRENDER the child to James Arnold Allen, which was concealed and ignored from 2002-present (2013) without any notice of location or contact attempted as ORDERED by the court, in ongiong criminal stalking (18 U.S.C. 2261A) of the father of the child (from whom the baby was taken and carried away Aug 11 2001 by D. Beal over objections and call to police for help refused by the DALLAS TX Police Department) during Interstate transport to the State of Oklahoma as prior arranged and paid for ($10,000 USD) by the child's father and grandfather, with consent then of the mother and promise of non-interference in permanent relocation as a family unit (mother, father, 2 children).

    • 2001-2002 - A. Scarbrough and B. Scarbrough did offer aid to commit murder in support of child concealment and control during periods of time the child was ORDERED SURRENDERED to the father, including the breaking of legs and information to locate and intimidate the parents of the child's father in Oklahoma, jointly (2003 letter by D. Beal, V. Petersen) in concealment of the child. Threats continued in 2007-2012. Aided May 2010 in confrontation to extort by J. Tingle, on behalf of A. Scarbrough so stated in assault.

     

  7. THE FIRM DOES EXPLICITLY PROHIBIT AND BAR WITH CAUSE THE PRIOR ENTITIES AND THEIR AGENTS AND CUSTOMERS UPON UNLAWFUL INTERSTATE SURVEILLENCE VIOLATING 18 U.S.C. 2261A (CyberStalking) and 21 O.S. 1951 (OKLAHOMA COMPUTER CRIMES ACT) in ongoing activity and on behalf of GEBHARDT BRODACASTING L.L.C. and DONALD JOHNATHON BEAL as a customer of COGENTCO.COM (COGENT COMMUNICATIONS INC., a subsidiary of NTT COMMUNICATIONS INC) and associate of NTT AMERICA INC via lostserver.net co-operation documented in 2011 amid similar extortion activity. SUCH BAN EXTENDED TO "NTT COMMUNICATION GROUP" AND ALL PARTICIPATING SUBSIDIARIES AND COMPANIES OF INTEREST (SHARES HELD OF RECORD) UNCONDITIONALLY, TO INCLUDE "SOFTLAYER TECHNOLOGIES INCOPPORATED", "GI PARTNERS", "Telx ColoExchange", and any client of the services used in the harassment of 2001-2013 or appropriation of commercial marks and product names of the targeted Oklahoma firm(s) named in the explicit child concealment threats.

    The following record obtained in Aug 15 2013 query shows yet another firm, operating out of the STATE OF VIRGINIA to follow, harass, interfere with (see prior unauthorized use), query in violation of lawful use (DNS Zone Queries, denied), and acting by such activity to execute threats of surveillance made by PSI NET Inc. users in demands of money in excess of a civil order (15 U.S.C. 1673).

    There is NO LEGITIMATE REASON to send 13 megabytes of UDP ZONE QUERIES from 120.136.0.25 and 14.1.33.1 for four days to the target servers in two states, in efforts to obtain mail server and client and host information from the domains named in criminal threats. Over 130,000 packets in one short measure to a single DNS server, and such activity represents gross misuse of network services:

    [root@mail log]# cat harassingdns.20130815.txt | grep "14\.1\.33\.1" | wc
      62321  623210 6360753
    [root@mail log]# cat harassingdns.20130815.txt | grep "120\.136\.0\.25" | wc
      66183  661830 6956211
    	

    Nor is there reason to send 8.3 million ICMP packets in 2 hours (July 25 2011) in context to identity theft, threats, false criminal complaint to violate 1st Amendment rights of remonstration in taking for concealment of a child, and preparation to harass and to commercially and personally defame a JOINT MANAGING CONSERVATOR of a child to incite public hatred, violence, theft, robbery, and commercial loss of right to do business using the child as a hostage and leverage in violation of an explicit court order, as has been documented in this case and refused aid by Texas, Oklahoma and regional United States Department of Justice officers over 2001-2013.

    Acts of Denial of Service, publication under FALSE NAMES and threats of violence and sexual assault, and forgery to create distributed denial of service in this activity are evident abuse of commercial resources and assets to maintain the concealment of a child in violation of a fully enforcible court order and engage in Interference in Interstate Commerce (18 U.S.C. 1951) with premeditated perjury and abuse of the public trust, providing lawful right to Article II-3 and II-22 "REMONSTRATION" upon refusal to grant relief or any due process of any kind in a child kidnapping for ransom without legal recognition of the 76 O.S. 76-8 inherent rights of the parent targeted, which (PER THE CONVENTION ON THE PREVENTION AND PUNISHMENT OF THE CRIME OF GENOCIDE, A U.S. TREATY, CANNOT BE WAIVED OR SOVEREIGN IMMUNITY EMPLOYED TO DENY IMMEDIATE RELIEF AND RECOGNITION UPON REPORT).

    This ongoing activty in support of intimidation by written letters (2012 Sept) to obtain such funds in excess of income from a target, pattern of theft harssment for stated (written) "robbery" from the subject valued at $250,000 USD ( written claim in threat to false transfer without a bill of sale), and participation in operations aiding ongoing violation of civil rights (76 O.S. 76-8) in concealment of a child from 2001-2013 linked to prior (2001, 2002, 20011) false claims of unfitness for Interstate commerce violating 43A O.S. criminal law in criminal public notices and testimony as perjury before Pontotoc County Court in support of a false writ and false claim of outcome of a court order justify fully our prohibition against any NTT AMERICA INC. or NTT COMMUNICATIONS GROUP activity by any Internet protocol (TCP / UDP / icmp / etc) granted the findings of our monitoring tools as illustrated below.

    [root@xxx log]# whois 38.100.21.68
    [Querying whois.xxxxxxxxxxx]
    [Redirected to rwhois.cogentco.com:4321]
    [Querying rwhois.cogentco.com]
    [rwhois.cogentco.com]
    %rwhois V-1.5:0010b0:00 rwhois.cogentco.com
    network:ID:NET4-2664150018
    network:Network-Name:NET4-2664150018
    network:IP-Network:38.100.21.0/24
    network:Postal-Code:22209
    network:Country:US
    network:State:VA
    network:City:Arlington
    network:Street-Address:1555 Wilson Blvd, Suite 406
    network:Org-Name: Cyveillance Inc.
    network:Tech-Contact:ZC108-ARIN
    network:Updated:2011-03-29 17:02:57
    	
    To fully understand, one need only realize that 38.0.0.0/8 network belongs to COGENT COMMUNICATIONS INC., and such activity toward our servers in context to threats upon their Virginia and Dallas properties creates a nexus for the harassment in context to NTT AMERICA INC. (their owner) and NTT COMMUNICATIONS GROUP ties to the domain (lostserver.net) used in the direct child concealment and ransom demands. Use of Chinese IP ranges to stage attacks only further underlines the International abuse targeting domestic firms with foreign ownership of competitive companies (NTT), for commercial advantage, and in unlawful business practices to evade U.S. jurisdictions and human rights protections.

    After attacks August 1-2nd, mass copying Aug 3-4, and attacks from the TOR network August 3-4 related the prior patriot.lostserver.net threat messages, it is easy to see why ongoing abuse from August 1-15 2013 related stalking activity in context to executed criminal threats to send drugs to frame other security researchers and activity in organized crime recently covered by FORBES support our decision to enact a criminal trespass notice and denial of use to the parties. Evidence shows those domains targeted in the zone query flooding (denied, days non-stop multiple times per second) are associated with prior (2011-2013) letters from the Texas suspect, and indicate use of the TOR network by the same subject to send the threats after VirtBiz.com and Cogent Communications subsidiaries used in the harassment were blocked, having the same written signature in each threat, from the same software tool, proving both evasion to harass, context to criminal activity to hide the origin of the fraud, and signature by the originating party in threat linked to similar "passive voice" quasi-legal intimidation tactics of a violent nature and criminal felony threats (toward family members of bodily harm promised in an organized self-identifying group (2009-2013) and by organized anonymous surveillence to compel silence and suppress reports and communicated "as a threat sent from anonymous accounts created solely for the purpose of this intimidation activity" by the same parties to the targeted party in writing) in activity as were used on security researcher Brian Krebs (2013) and to our firm systematically (2011, 2012, 2013).

    We therefore have reasonable cause to believe the parties are associated with the criminal activity in an organized fashion, abuse of network resources, embezzlement of client network services to carry out the frauds and threats, and logs of such activity to support our claims in criminal harassment at this time. We became aware of the Krebs story after the initial attack on our network, and believe this indicates terrorist activity aided by key employees of U.S. firms involved in long term relationships with foreign owned data service providers to pressure domestic critics and United States incorporated competitors to gain foreign advantage in U.S. markets by criminal activity and organized fraud.

     

  8. 2013-09-28 // Addition of LEASEWEB INC., OVH HOSTING INC, HETZNER.DE in Article I section 4, pursuant ongoing antagonism as of September 22-28th 2013 of 3 distinct separate servers including specific exploit code and referrer information linking the harassment and threats to "steal and resell" trademarks and material from targeted sites including unlawful scraping of those sites in pursuit of such activity to commit felony criminal fraud, gain privileges, generate false network traffic to damage the standing of the firm, gain privileged access to company databases, and organized multi-site attacks in coordination indicating paid or organized crime.

    SAMPLE OF ATTACKS

    The prior logs show Israel crawling ("SMILE Ltd" ISP - repeatedly used in attacks), paired with a LEASEWEB customer referred from w00tw00t.at.blackhats.romanian.anti-sec as the referring party, seeking to gain privileges via attempted login to common pages in series. These attacks, paired closely with threats by DONALD JOHNATHON BEAL, underscore the report of organized International criminal activity in this child stealing and 12 year concealment to include computer crime to damage the business of the (targeted) parent of that child in the STATE OF OKLAHOMA, in context to demands for money and property valued at over $250,000 USD (letter of threat, false sale to damage securities in the STATE OF OKLAHOMA, per Oklahoma Anti Terrorism Act Section 3 b).

 

DEC 2013 ATTACKS


The prior attacks, despite using multiple prior NAMED NETWORKS in forgery, to implicate Hetzner.de, OVH Hosting Inc., and other major (NATIONAL) providers of France and Germany, as well as Level 3 Communications Group, were initiated and terminated in microseconds from all points of origin - indicating a common 400 Megabit per second source engaging in forgery to incriminate all parties in attacks upon a single client server of SDP MULTIMEDIA GROUP in the State of Illinois.

These attacks, originating from port 19 and to destination port 1050, share the characteristics of a mentally ill pathological single attacker with privilege access either on NTT AMERICA INC. or their subsidiary client in DALLAS TX servers, who did send threat letters in concealment of a child August 2 2013 preceeding two weeks of identical criminal abuse.

Such activity are felony crimes, harassment, intereference in Interstate Commerce, and possible only with the permissive use of a 1 Gigabit per second fiber optic route afforded to a major (tier 1) telecommuncations carrier. The effort to shape traffic in the attack to resemble 1.5 Mbps speeds at the fictisious services to imply some group or joint broadband household user or server precense in a botnet or service port exploit, and the use of server ports which require root admin changes to inetd.conf on all devices, including the (true) source host - targeting port 1050 (no service, no cause or solicitation) jointly, further point to mass abuse of network services by a ROBERT HALF TECHNOLOGY employee.

 


Copyright © 2013 Shadowdancers L.L.C. - All Rights Reserved. - - Use conditional to Terms of Service and Restrictions. - - Please regard our Privacy Policy.
All the text, graphics, design, content, and other works are the copyrighted works of Shadowdancers L.L.C. - This site contains links to other Internet sites.
Such links are not endorsements of any products or services, and no information in such site has been endorsed or approved by Shadowdancers L.L.C.
 
Disclaimer - Not a Publication or Authorized by The City of Ada. See www.adaok.info for details.