Report: #962247

Complaint Review:

  • Submitted: Tue, October 30, 2012
  • Updated: Sat, November 03, 2012
  • Reported By: martica — miami Florida United States of America

    United States of America They are posting a mugshot of me. I have contacted them bc this case is a NO FILE and I wanted to fax them the letter from the state attorneys office. They SAID NO i had to hire an attorney or one of , Internet

*Consumer Comment: Human Traffic

Show customers why they should trust your business over your competitors...

I want my photo removed from the internet this case is a NO FILE by the state attorneys office and they do not want to remove UNLESS I pay. This is a RIP OFF and they are damaging my reputation. Shame on YOU

Is this Ripoff Report About you?
Ripoff Report A business' first line of defense on the Internet.
If your business is willing to make a commitment to customer satisfaction Click here now..

Does your business have a bad reputation? Fix it the right way. Corporate Advocacy Program™

Set the record straight: Arbitration Program

SEO Reputation Management at its best!

This report was posted on Ripoff Report on 10/30/2012 03:51 PM and is a permanent record located here: The posting time indicated is Arizona local time. Arizona does not observe daylight savings so the post time may be Mountain or Pacific depending on the time of year. Ripoff Report has an exclusive license to this report. It may not be copied without the written permission of Ripoff Report. READ: Foreign websites steal our content

Search for additional reports

If you would like to see more Rip-off Reports on this company/individual, search here:

Report & Rebuttal
Respond to this report!
Also a victim?
Repair Your Reputation!

Updates & Rebuttals


#1 Consumer Comment

Human Traffic

AUTHOR: Phoenix - (United States of America)

Internet Crime Complaint Center (IC3) 

18 USC 1030 - Fraud and related activity in connection with computers

The US Law Enforcement Analysis Portal (Network) is designed by Forensic, Inc. LEAP users sign a contractual agreement with their agency, state and Forensic, Inc that each incident of misuse of the system the user must pay $50,000.00, the agency and state must each pay $100,000.00 to Forensic, Inc. Use of LEAP's is for official purposes only and each search must detail that official function. In addition to a secured database LEAP's uses VPN's for transport.

Government personnel steal government property  means of identification -  mugshots (18 USC 1028A - Aggravated identity theft) from LEAP's to place on a public network (internet) which is owned by the Department of Commerce who contracted ICANN to coordinate. Case in point government personnel use private domains .com, .org, etc. The Department of Commerce who owns all domain names only recognizes .gov as a government domain and only government entities may register a . gov domain.

National Information Infrastructure Protection Act
Transmits (internet) advantages to foreign nations (world wide web).

Allowing, conversion of public records would be from cradle to grave government imposed involuntary servitude. Birth records, marriage records, divorce records and death records are all public records. Public records means nothing more than the government makes them available to the public and it does not empower usage, see 18 USC 641 converts (conversion). Private use of public records is conversion of public records. Governmental issuance of public record voids it from public records. 

18 USC 641 Public money, property or records 
Government personnel steal government property, knowingly converts government property to their use and the use of others (blackmailers and extortionists). Allows the sale of government property without authority (unpublish fee/reputation repair fee) and retains government property knowing they have been stolen.

Criminal Resource Manual 1663 Protection Of Public Records and Documents. The taking of a public record or document is prohibited by 18 U.S.C. 641. 
DOJ. Retrieved from

18 USC 1028A - Aggravated identity theft
Whoever, knowingly transfers (steals), possesses, or uses (website), without lawful authority, a means of identification (mugshots) of another person shall, in addition to the punishment provided for such felony, be sentenced to a term of imprisonment of 2 years.

Government personnel intentionally place stolen means of identification -  mugshots (18 USC 1028A - Aggravated identity theft) on to a private website to be restolen. Knowing (mainstream media, numerous criminal complaints) that the stolen property will be restolen and used in domestic and international criminal activity by individuals and organized crime (18 USC 1962).

18 USC 2261A Stalking 
Stalks, harasses, intimidates and causes substantial emotional distress.

18 USC 2319 Criminal infringement of a copyright & 17 USC 506 Criminal offenses
For the purpose of commercial advantage (website) and private financial gain (money).

Governmental Prima Facie Evidence of name and likeness copyright:
State Certified Birth Certificate, State Drivers License, US Passport and other government documents and records created to identify and validate name and likeness.

Government personnel criminal infringe name and likeness copyrights and supply the means for others to do the same.

18 USC 1584 - Sale into involuntary servitude
Government personnel globally (world wide web) human traffic Americans who are held hostage by electronic means to be used for involuntary servitude.  The individual's daily private life is what promotes and makes money for websites that hold them against their will. The webmaster intentionally structures pages to maximize revenue from the the victim I.E. and Google intentionally indexes the individual pages to maximize ad revenue from the site. The website goal is to use the pages to target individuals and land them, their friends, their co-workers, etc to the extortion page.

Mugshot removal from website displaying your mugshot."
"We also work with Google to make sure your mugshots cannot be found by family, friends, current employers or future employers."
Retrieved from

Internet Spyware (I-SPY) Prevention Act of 2007
Intentionally obtains (steals/screen scraps), or transmits (internet) to another person information with the intent to defraud (unpublish/repair reputation).

18 USC 875 - Interstate communications
Transmits (internet) communication interstate (world wide web) with the intent to injure reputation to extort (unpublish/repair reputation).

18 USC 873 Blackmail 
As consideration for not informing demands money (unpublish/repair reputation).

18 USC 1962 - Prohibited activities
Interstate (world wide web) collection of an unlawful debt (unpublish/repair reputation).

18 USC 880 - Receiving the proceeds of extortion
A person(s) who receives, possesses, conceals, or disposes of any blackmail (unpublish/repair reputation) money.

18 USC 2 - Principals
(a) Whoever commits an offense against the United States or aids, abets, counsels, commands, induces or procures its commission, is punishable as a principal. 

Search engines (google, Yahoo, msn\bing), server companies, identity theft websites and consumer complaint websites (i.e. complaint: victim refuses to pay the extortion money).

18 USC 4 - Misprision of felony
Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both. 

Bizarre Logic and Reasoning
If kidnappers called the ransom amount the returning person fee would it bedazzle the system again? Further, if the kidnappers rationalized their acts with the same logic would the system be mystified by them? Reasoning, they had to go through the hassle of kidnapping someone hence they are entitled to the returning person fee (Ransom Money).

If blackmailers called the extortion amount the unpublish/reputation repair fee would it bedazzle the system? Further, if the blackmailers rationalized their acts with the same logic would the system by mystified be them? Reasoning, they had to go through the hassle of stealing government property, identity theft, stalking people, holding people to involuntary servitude, injuring their reputation, blackmailing them hence they are entitled to an unpublish/reputation repair fee (Extortion Money).
Respond to this report!
Ripoff Report Recommends
ZipBooks Accounting Software

Advertisers above have met our
strict standards for business conduct.