Constant's pations

If it's more than 30 minutes old, it's not news. It's a blog.

Monday, May 01, 2006

Iran: Congress going down the same route as with Iraq

If at first you don't succeed, try next door.

Don't miss: Revised/Updated: 11:35P Tues, 2 May 2006 -- New section added [Yellow Box, worth sharing with your friends: Entertainment!]

Quick link Visit this Yellow Box: [ Click ]

* * *

This note is for a general audience, and not intended as legal advice. Talk to your private counsel before taking any action.

* * *

American public well aware and fully cooperating with lawful inquiry: [ Comment 17 Comments 37-38FireC--pLake ]

Very interesting commentary on blogging, highly recommended: [ Click

* * *

Alert: Consider [ 1512(d)] and consider seeking legal advice from counsel that is competent/licensed/active member of state bar, inter alia

  • A. To advise what precautions you may consider; and

  • B. Assist you if you believe you may be under any sort of intimidation, threat, or other alleged misconduct with the hopes of interfering with your truthful reports to law enforcement.

    * * *

    Alleged Violations of GA Code


    214 Ga. App. 122


    Ga. Code 16-9-90, statute affirmed as constitutional.

    Consider Federal: 1512(c)(1) in re Trexxing: Alleged evidence tampering, altering


    Judgment affirmed, [214 Ga. App. 122]
    The appellant is mistaken in its contention that the evidence failed to establish a violation of the Georgia Computer Systems Protection Act, O.C.G.A. § 16-9-90 et seq., on the ground that the Act requires [*124] an actual physical invasion of a computer. In listing the types of property protected by the Act, O.C.G.A. § 16-9-92 (7) specifically includes computer programs.


  • 1. On or about 1 May 2006 individual allegedly knew, or should have known the use of the computer facilities was not consistent with the University Rules as promulgated under Ga. Code 16-9-90; and/or allegedly accessed the computer system without authorization in violation of the same statute.

  • 2. Individual allegedly repeatedly accessed the computer system and used it in a manner wholly inconsistent with terms and conditions in contravention with Ga. Code 16-9-90.

  • 3. Individual and other allegedly made frequent use of computer services related to non-official use of computer services, otherwise known as [ Trexxing; alleged defendant did make adjustments to the computer log; and computer does hold this information in cache].

  • 4. Governing local rules and policies: Duties; UGA ethics: "IX. Expose corruption wherever discovered." Computer Use policies: "Using a computer without permission is theft of services and is illegal under state and federal laws." . . ."No one without specific authorization shall use any University computer or network facility for non-University business"]

  • 5. Factors appear applicable, witness impeachment: Page 21/633 [ 29/633 ](Federal) QUOTE: "Bull Dog, I have no idea what you're talking about and don't care. Thesaurus Rex | Homepage | 05.01.06 - 11:21 am |" Ref Not a credible statement, see Click See: "Suggested Pattern Jury Instructions, Vol. II Criminal Cases" Ref Rule 404(b), FRE 63/633 [Character: 66/633] ]

  • 6. Alleged defendant is in a no-win situation, either: He's allegedly using the computer system with permission -- and a member of faculty, and known -- and allegedly using the equipment in a manner inconsistent with the UGA ethics/rules; or he's not using it with permission and has allegedly violated Ga. Code 16-9-90

    Identifying information

  • 7. Individual's identifying information is consistent across all observed interactions and here is the identifying information: [ the site Where located Contact info note the same first name Click Unclear if this is the same Click]

  • 8. Other identifying information includes: Confirmation: E-mail traces back to blog, site, and name on FDL. Here is the profile information, if true -- and not at the IT-center -- note the high profile, vocal-public position -- voice recordings are available; can cross reference work, site access, with work activities/demo tape. We judge the asserted vocal-related position is bogus.

  • 9. For profiling purposes, GCHQ confirms access to this site; please verify.

  • 10. Identifying possible information: [ Click also note photo available ] Photo Comment

    We make no claim this information is correct. Radio Station Classical Music Librarian

  • 11. Follow-ups, ask about: Weight lifting, Alicia, walking, [ Fantastice4 The Thing ] Dave got trexxed: Warning, profanity alert: [ This quote] got deleted; [ Thesaurus Rex | Homepage | 01.20.06 - 5:12 is missing from this ] Identical Twin; Red headed, two Siamese cats Has a brother The Revival Tent St. Nicky

    * * *

    Notifications Options: Feel free to provide your information

  • 12. University of Georgia Officials are allegedly well aware of the situation and appear to have an issue with insecure computer access for non-official purposes. Please encourage this person to review the matter for possible disciplinary action [Contact: Provost, Dr White.

  • 13. Contact info: Map; proximity to public affairs, at B To the right of Sanford Stadium

  • 14. Other Actions: See blue box here for additional notifications made; request others draft similar letters.

  • 15. Headline for Conyers: FDL member allegedly violates Georgia Criminal Statute; allegedly under investigation by Georgia State Officials. [ Tip Line ] If you provide this information to law enforcement, you may be eligible for a cash award. You may also be eligible for special recognition if you supply your details to this organization.

  • 16. Follow-up with UGA police and resource control: Have them complete a survey report, and provide to the Provost [ Click ] certifying that all unauthorized access issues to the UGA computer center have been resolved.

  • 17. Draft a Press release to the UGA newspaper outlining the allegations; various comments; practices of the FDL/internet posters; provide cautions and warnings to students; remind students of who to contact at the University Police if they see people using the computers who have not been authorized.

  • 18. Local interview: Confirmed local contact who has an interest in intelligence issues.

  • 19. Contact this organization and specifically mention SAS 99 as a basis to recommend the IT-department-access logs under go an immediate, increased audit scope.

  • 20. Contact the this person with information to provide to this institution. Feel free to inquire with this institution whether your "lessons learned" may be of interest for educational/training purposes.


    The following information may be of interest to state and federal law enforcement:

    A. Access times to your website by the above IP;

    B. Any copies of the alleged individuals access to your websites at times during official hours from the university;

    C. Photographs of the alleged individual and other identifying information;

    D. Any e-mails with headers, written documents, signed policy memos, budget worksheets, internal policies the individual may have signed/reviewed;

    E. Confirmed training records showing they were trained on the appropriate use of the University resources; and

    F. Any memoranda from supervisors related to training, updates, or other legal notes they would have received and reviewed showing they were fully aware of the statutes, but allegedly failed to adequately oversee.

    Describe the interactions in your own words, as if it were a story. Your job is to be truthful and do not "try to make" the case. Rather, let the trained investigators determine who/what is or is not credible. Simply present what you know and let the system adjudicate what the lawful remedy should be.

    Be professional, polite, and encourage others to come forward if they are aware of any other trexxing/allegedly illegal use of the University of Georgia resources.

    Again, carefully review [ 1512(d)] and seek advice of competent legal counsel to advise whether you need to take precautions, or believe you may be under any sort of intimidation, threat, or other alleged misconduct with the hopes of interfering with your truthful reports to law enforcement.

    * * *

    It remains to be understood whether supervisors knew and failed to act; or whether they should have known and did not have adequate resource control to prevent the alleged non-authorized use of campus resources.

    It remains to be understood to what extent campus legal counsel knew -- or should have known -- there were alleged weaknesses in the internal control and allegedly failed to meet the minimum legal standards of conduct in re the Georgia Attorney Professional Rules of Conduct, inter alia

  • A. [ Competence ]

  • B. [ Communication ]

  • C. [ FIduciary Duty: Duty of care, diligence.]

  • D. [ Disclosures and certifications to the campus internal audit.

  • E. [ Whether counsel has or is aware of alleged misconduct but has failed to timely report that under the Georgia Rules.

  • F. [ Certification whether any audit for cause has occurred, or should have occurred.

    Similar questions also apply to the Campus auditors.

    * * *

    Thank you for your voluntary cooperation and interest.

    You are not being promised anything.

    * * *

    The alleged abuse of the internet and computer resources needs to end; and the individuals need to cease and desist from their arrogant hypocrisy. You are no better than the arrogant people inside the White House.

  • * * *

    Back to Top

    Dave's Premonitions of Self-Destruction and Doom

    - - -

    Prophetic Dave: His Inspired Words Became

    The Wicked Future He Now Slovenly Endures

    Short Version: Scroll over the links with your mouse to read the comments; the full comments are at the link.


    Below you will see various curious comments Dave has made while visiting various sites. To be clear, we've attempted to capture the essential truths which Dave has so well stated.

    It is our view that Dave secretly desired to be like Bill O'Reilly and have his world come crashing down. You'll see how many of the quotes below mirror his current predicament: He says one thing, but does something else.

    The words are originally his. For clarification, we've added [in brackets] various comments to clarify and expand his words. Unlike Dave's habit of changing people's words, we let Dave do all the talking. You'll see he enjoys being used by Jane; and Jane likes to use him: He does alot of talking, but his words are really about him and FDL.

    Unfortunately, because Dave is saving up for a big trip -- county? -- he doesn't -- apparently -- have enough money to have a Haloscan Archive. We've summarized what little remains. We'd given you more, but if we gave you anything more we'd be making things up. . .

    * * *

    But first. . .Guess who trexxed this: The rumors were true: She never read the book: Failure to deny something that should have been denied.

    Answer: Dave self-trexxed that. His words, didn't deny the accusations against Jane. What's up with that?

    [Friendly Quiz: Did you remember to scroll over the green-link to see the yellow summary box? Very good! That's the secret on all the links below.]

    * * *

    Premonitions of own demise:

    "[E]veryone had a good-natured laugh at his expense. . ."
    -- T h e s au rus Re x | Homepage | 12.07.05 - 2:41 pm |

    Do unto Others

    Dish it out, but won't eat leftovers.

    Fruit Loopie Bounty Hunter

    . . Or something

    Does Dave Think He's Irrelevant in a lonesome Georgia Library?

    Who does the bell toll for: The irrelevant ones

    Dave Says The Rules Must Be Enforced

    Is the rule of law applicable to all, or just some: High Standards of Accountability Hypocrisy: Let the punishment fit the rhyme


    What's my alibi?

    Self Trex

    Rex turns into a Quail




    Good Music Student: Being An Excellent RNC Mole


    Good for the goose, not for the gander

    Look who's talking

    Rushing: Where's there's a fool, there's Dave

    Takes bait

    Fearful of Google

    Dave Likes It Colder

    Red State Wreckage

    Life on the Edge: Padded cells and diapers

    Heard, but did not hear

    Fail to heed own warning

    Is he listening to himself?


    Getting Ready for Solitary, Driving, and Big Friends with Curlers

    Preparations for cold storage

    Heavy equipment job

    Flee to Brussles

    Little Old Dave: "Who, me?!?"


    Dave: "They remind me of myself"


    Dave's Idols: Rush, Tony, and Bill


    How dare they!

    Dave's Maturity


    Who's being childish?

    That's Siamese Cat Fur

    FrogMarch Delay

    It could be worse: Your name could be Dave

    It could be worse

    Back to Top

    * * *

    Soulful note to Dinosaur Dictionary-Child: "We pray to Allah for your wellbeing": [ Click Source ]

    * * *

    EasyBase: May need to correct link [in msg 26170] from 432 to 431 [ Here is 431 link, the correct one Click ]

    Reed, take a look at this policy: Two clauses: "We reserve the right to suspend, delete, or cancel any account/service at any time for any reason." and "Except in cases of abuse to our system, we do not make any attempt to associate these IP addresses with individual users." [These are the terms which open the door to subpoenas.] Encourage others to make concerns known to this email -- changing text would appear to be "abuse"; including identifying information/email/IP/Haloscan account name -- save a copy of correspondence -- provide to others for backup.

    * * *



    Why is this Congress giving the President "more green lights" to violate the laws he's already ignoring?

    All this whining about, "Weren't we fooled about Iraq," and they've proceeded to jump down the same slide into Iran.

    What a bunch of hypocrites.

    What, are we going to learn -- boo-hoo -- that someone "lied" to us about Iran?

    Hay, we haven't solved the mess with Iraq; who is going to have any credibility talking about "democracy" in Iran.

    What specifically is wrong with what the Iranians are doing -- they have a government, that hopes to recognize Israel, but this American government refuses to discuss this.

    What about the mess in Iraq -- why should we expect anything different in Iran?

    How does the US actually propose to pay for this?

    Wasn't the "big lesson" from Iraq was that "the desire for democracy" should not overshadow what the White House says. Again, the RNC is going to point to this resolution on Iran as "proof" that Iran has to "meet" some externally-imposed standard. That non-sense argument was "supposedly" discredited over Iraq.

    Before Congress lectures the world about "democracy" maybe the US Congress can have some Democracy at home. What is the Congress going to show that it is serious about American democracy before preaching to the world, "We want Iran to do what we refuse to do at home"?

    * * *

    Despite the lessons of Iraq, this Congress and "leadership" have shown they are utter hypocrites. Whining about Iraq, but willing to engage in the same long-line of "precedent" to spread the same disaster to Iran.

    * * *

    All this whining in Dec 2005 about illegal NSA activity; then this Congress ignores the laws, precedent, and recent history in Iraq and wants to continue the Nazi march into Teheran.

    Arrogant Americans!