Friday, June 7, 2013

FALSE ALLEGATIONS AND ROLE REVERSAL IN STALKING BEHAVIOR (18 U.S.C. 2261A) TO KIDNAP AND CONCEAL ILLEGALLY A CHILD (2013 June 6th, quick reference material)




http://en.wikipedia.org/wiki/Cyberstalking
http://en.wikipedia.org/wiki/False_accusations
http://en.wikipedia.org/wiki/False_victimization
http://en.wikipedia.org/wiki/Smear_campaign

There is no part of this criminal pattern of activity that does not fit the 18 U.S.C. 2261A statute (felony) or similar State statutes - nor can be excused in context to the discovery of obligations in the COURT ORDER (01-17702-R, Dallas County) which is the objective of such disruption, intimidation, and obstruction activity in fraud.

Stalking behavior can be best identified only in reference to the series of events and common cause (degree of violence and violation of rights), and is easily confused with free speech without context to the taking of a child or termination of legal rights (28 U.S.C. 1738A e) without lawful order sought by such activity in criminal felony abuse and anonymous denial by a person engaging in premeditated deception of the public and law enforcement over a sustained period of time.

Aspects of emotional instability and impaired judgement seen in threats can often confuse investigators because perpetrators will attempt to present themselves on investigation and interview as stable individuals to distance themselves from the irrational language and narcissism expressed in direct threats and abuse, often to the degree of being able to claim complete dissassociation from such activity without substantial evidence of wrongdoing and communication among victims, law enforcement, and witnesses to the effect of the abuse.



Purposeful deception and denial, concealment, and irrational claims of no-wrongdoing in vulgar acts (calling it a "joke" or claiming no liability for agency inspired by encouragement and false claims of the first party to commit the act) are often common in these sociopath behaviors and personality disorders.

Law enforcement must ask the pertinent question, "What property was taken, who has it, what is the legal right (of POSSESSION) to said property, and how does the action impact that exercise of rights?"

Further, is violence a factor in the abuse and how does that threat of violence (false arrest, false booking, false incarcaration on record, personal injury, personal bodily harm, threat of harm to a loved one or family or child, or financial harm which is legally violence under Federal and State law) factor into the language of the claims and execution of such threats in holding of property even if attempted menace is not coming directly from the party who is in possession and concealing (denying legally ordered possession by deception or intimidation) that property from the victim.



IDENTIFYING GENUINE STALKING
(versus victim pleadings for relief)

A number of key factors have been identified:

False accusations. Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms or other sites that allow public contributions, such as Wikipedia or Amazon.com.[7]

Examples in this case:

2002-2004 creation by Donald J. Beal of "JamesArnoldAllen.com" to justify child concealment
2009-2012 creation of sites.google.com/jamesarnoldallenofadaok.com/ to justify concealment
2011-2012 creation by Donald J. Beal of "JamesArnoldAllen.me" to justify child concealment



Attempts to gather information about the victim. Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective.

Examples in this case:

2002-2004 creation by Donald J. Beal of "JamesArnoldAllen.com" seeking to have J. Allen committed involuntarily in cause of child taking
2007-2009 "Reginald" threats upon MySpace.com in common cause to solicit bodily harm to J. Allen as described by D. Beal in 2012 posts
2012 post by Donald J. Beal calling for murder of J. Allen and later alleging this "a joke" while concealing his child for 11 years illegaly



Monitoring their target's online activities and attempting to trace their IP address in an effort to gather more information about their victims. [8]

Examples in this case:

2002 outing of J. Allen by Alicia Scarbrough by IP address upon public forums used to incite violence during the civil trial.
2003 written threats to intimidate by claim of following and physical menace against British Citizen Elizabeth Botelho, for testifying.
2009-2012 threats to "ruin" J. Allen on behalf of V. Petersen / D. Beal by Brian Young, in Facebook threats and harassment.
2012 use of identity of J. Allen on Craigslist, Facebook, and Twitter in false profiles set up to damage "Beyond War" Trademark.
2012 September continued at-work physical following claims and written threats against British Citizen Elizabeth Botelho, for testifying.



Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.

Examples in this case:

2001-2003 encouragement offering "names, addresses, and phone numbers" to threaten Allen family during abudction by A. Scarbrough
2009-2012 use of quickmemes to steal photos of J. Allen and place slurs on them related the child conealment (over 100 instances)
2012 use of craigslist to try to sell the property of J. Allen using mental health slurs and id theft there to damage his business in fraud.
2012 direct solicitation by D. Beal for person to send gifts to congratulate J. Allen on robbery and sale of trademark illegally ($250K)


False victimization. The cyberstalker will claim that the victim is harassing him/her. Bocij writes that this phenomenon has been noted in a number of well-known cases.

Examples in this case:

2011 false swearing of no commercial interest or provocation or merit to claims of child abduction threats in formal complaint by A. Scarbrough
2012 allegation that publication of lawful claims constituted harassment or stalking under oath by D. Beal, contrary his behavior and concealment of a child violating a court order for 11 years with ongoing aid to support total concelment in 2002-2004 and 2011-2012 confessed.
2009-2012 claim of S. Quincy and B. Young, after extortion attempts in 2007 and 2009 failed against J. Allen.



Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.

Examples in this case:


2011 July 25th attack on J. Allen servers of 8.3 million ICMP messages from D. Beal in 120 minute span, typical of numerous attacks and DDoS
Attacks using equipment of SPARKHOSTING LLC and clients of ROBERT HALF TECHNOLOGY and use of their identity to create domains featuring "jamesarnoldallen" as the root domain to damage commercial and personal rights in false public claims by D. Beal (2012 Oct 31).


Ordering goods and services. They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim's workplace.

Examples in this case:

December 25 2011 subscription to three (3) transgender/furry email lists, and creation of a false account on transgenderdate.com then reported on sites.google.com/jamesarnoldallenofadaok.com/ in context to extortion and incitement to visit and injure James Allen in the cause of the child concealment.



Arranging to meet. Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.[9]

Examples in this case:

2005 unsolicited email suggesting Veronica Petersen should be "plucked from the planet" by Donald J. Beal, sent to J. Allen, following conviction for theft-by-check of D. Beal and termination of use (2002-2004) of domain jamesarnoldallen.com by D. Beal to defame and damage J. Allen in support of kidnapping and having J. Allen involuntarily committed for reporting child abduction at start of concealment (August 11 2001).
2007 Oct solicitation to meet prior bizarre threats in Oklahoma City by accuser S. Quincy, and later claims accusing J. Allen of 'stalking" her for attending tradeshows and concerts in his normal line of business and work (1991-2013, SDP Multimedia Group) where S. Quincy was attempting to create a business for herself as the manager of the band "Axis Satellite" and promoter for BDSM-lifestyle products and events (Beautifully Bound 3) and clothing (on behalf of Bobby Scarbrough and INFAMOUS PRODUCTIONS LLC under the brand name CrInfamous Productions LLC used in context to crinfall hair for cyber-goth low-cost club and dance costume accessories.
2008 SMS messages to demand meetings business facliity access after explusion, and demanding modification of accounts belonging to E. Botelho by user later sending email as hitman4hire@yahoo.com after arrest by Ada City Police and being barred from further contact, communication, or criminal trespass upon the property and leased facilities of Shadowdancers LLC and SDP Multimedia Group. Later threats found linking letters by D. Beal publicly in justification of the child abduction and concealment (then 7 years ongoing) and preceeding letters by myluv187@gmail.com and myluv_187@yahoo.com used in 2009-2012.
Bizarre alias "Josiah Deutch" solicitation July 15 2011 prior threats of "libel" complaint (Ada City Police) threatened in letters to disrupt business then executed by Brian Young, Alicia Scarbrough, and Donald J. Beal jointly to damage the business and disrupt hiring and revenue and child support on July 21 2011-2012 September in a series of threats, confrontations (Feb 2012, M. Grigg and S. Quincy face to face), and letters (8, by J. Deutch - later endorsed publicly by D. Beal and admitted to as authentic in court before Judge Martha Kilgore in Pontotoc County OK)


Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.

Examples in this case:

As many as 10,000 emails each month containing malware targeting email accounts known to belong to J. Allen from prior (2001) contact with V. Petersen and Donald J. Beal targeting commercial sites named in threats by Beal and associates directly, contrary no such use or submission of other accounts on the same domain.




Where the abusing party is holding a minor child (family member of the victim, obligated SURRENDER TO THE VICTIM and SOLE POSSESSION RIGHTS in a COURT ORDER) as a hostage in concealment from the targeted party, there can be no question as to the right of recovery when the abusers are using violent rhetoric and the alienated parent is appealing for relief upon statutes of the State and Federal criminal code consistently. Injury in such abuse is aggravated and compounded by delay in relief, and delay is the objective of the stalking activity and ongoing witness intimidation paired with public deception activity.

Samples of the incorrect and indeed criminal response through ongoing denial by Texas, Oklahoma, and U.S. Citizens to the kidnapping are best explained by cognative defects that perpetrate this abuse such as the "just world hypothesis".

Abuse in this case including total concealment of the child continues as of 2013 (12 years as of August 11 2013) due to widespread practice of system justification behavior in United States officers and State and local officials, combined with successful victim playing by the child abductor and their associates who are directly responsible for the explicit targeted and premeditated threats executed to kidnap for ransom and extortion this minor child. It is further suggested the abuse has found support because of schadenfreude (sadism, a personality disorder) which is a widespread product of western media stereotypes and learned helplessness combined with envy and jealousy of others to take pleasure in their failure and suffering. Prior pay rate, educational competition without commenserate pay, and belief in inherent right to greater pay and standing for having disrupted the victims career (18 U.S.C. 1513) and personal relationships over 12 years are evident in the threats by Beal, Scarbrough, and Young respectively.



No comments:

Post a Comment