this is a locked note.
Maybe not.
Why would a locked note have to be connected to iCloud?
That is the sharing and storage of privileged information that is deemed lockable and yet still on a database system outside that of the personal computer?
That seems to come off as a red flag of interest for others.
What systematic red flag is this?
There is still automatic sharing of recorded keystrokes and private notes to that of the Google mail system on here.
Seriously, what do I do at this point of Invasion. You obviously wanted my intellectual property, I’ve gone to the FBI before. I’ve tried to do everything by the book and apparently others are too…it just happens to be my books for some of it and definitely was not paid for. What indirect direct retaliation is this to the point that this disrupts the entire structure because this known behavior since 2018-2019 has been reported with major questions of the Apple system and others. I have updated to the latest Ventura Blvd. and I am pretty sure Tom Petty in regards is going on a playlist.
A Question considering what has occurred directly for years.
involuntary servitude
(8) Involuntary servitude The term “involuntary servitude” includes a condition of servitude induced by means of— (A) any scheme, plan, or pattern intended to cause a person to believe that, if the person did not enter into or continue in such condition, that person or another person would suffer serious harm or physical restraint; or (B) the abuse or threatened abuse of the legal process.
It is basically slave trade where I have continued to try to work to make a living and others have been reaping from what I sowed on my private computer. Far different from the known term, ‘indentured servant’ which still is not applicable to modern standards of venacular.
I can attest that that would apply to my experience at Alfred Angelo as I was threaten to work far below fair market value at the threat of corporatology and pay disputes. My question here is that I am continually working towards sustainability of my life’s work and all of it is completely compromised and ultilized elsewhere while I of no financial benefit to date from such and no means to an end on postively reenforced negative behavior detrimental to my way of living and life and abusive in practice, invasive and denotes false ownership over my property and that of superiority tactics based on their wealth, means and advantage pulling me from my home and space into their own world for their benefit and not my own in current form.
This is going somewhere to someone and does showcase the complete disregard to humanity’s desire for privacy and security of shelter.
5 years of this directly now.
3 times a place of employment.
I could look at this completely seperate from I for a second, I imagine it the below market value that I consider a thought process in, where there is what I was looking at in question at SCAD. Although, it is not a forced servitude aspect to that of the guise of SCADpro, there is an exploitative aspect of such that is of no provided market value while a gain of such on the otherside where most definitely the students have to sign non-disclosures before entering into that agreement while still citing question on if they were properly educated on such an agreement prior and if it was for the best of the student to go into such an agreement of that kind without legal representation for that of the protection of the students from that of real-world application projects that result in real world financials of gain and still a cost of tuition for the student. Although it may not fall under this per se, it still goes into my thoughts on the revamp of the age discrimination law for protection of those under 40 and definitely of those of degree-seeking nature before entering the workforce without proper training of what does and does occur in such.
False arrest and obstruction of justice: The U.S. Constitution guarantees the right against unreasonable searches or seizures and prohibits the use of cruel and unusual punishment. The Fourteenth Amendment secures the right to due process—meaning a person accused of a crime must be allowed the opportunity to have a trial.
Failure to keep from harm: The public counts on its law enforcement officials to protect local communities. If it’s shown that an official willfully failed to keep an individual from harm, that official could be in violation of the color of law statute.
Below pulled from the FBI website, feel free to visit, they have tons of fun Educational Purposes available.
Title 18, U.S.C., Section 241 - Conspiracy Against Rights
This statute makes it unlawful for two or more persons to conspire to injure, oppress, threaten, or intimidate any person of any state, territory or district in the free exercise or enjoyment of any right or privilege secured to him/her by the Constitution or the laws of the United States, (or because of his/her having exercised the same).
It further makes it unlawful for two or more persons to go in disguise on the highway or on the premises of another with the intent to prevent or hinder his/her free exercise or enjoyment of any rights so secured.
Punishment varies from a fine or imprisonment of up to ten years, or both; and if death results, or if such acts include kidnapping or an attempt to kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill, shall be fined under this title or imprisoned for any term of years, or for life, or may be sentenced to death.
Title 18, U.S.C., Section 242 - Deprivation of Rights Under Color of Law
This statute makes it a crime for any person acting under color of law, statute, ordinance, regulation, or custom to willfully deprive or cause to be deprived from any person those rights, privileges, or immunities secured or protected by the Constitution and laws of the U.S.
This law further prohibits a person acting under color of law, statute, ordinance, regulation or custom to willfully subject or cause to be subjected any person to different punishments, pains, or penalties, than those prescribed for punishment of citizens on account of such person being an alien or by reason of his/her color or race.
Acts under "color of any law" include acts not only done by federal, state, or local officials within the bounds or limits of their lawful authority, but also acts done without and beyond the bounds of their lawful authority; provided that, in order for unlawful acts of any official to be done under "color of any law," the unlawful acts must be done while such official is purporting or pretending to act in the performance of his/her official duties. This definition includes, in addition to law enforcement officials, individuals such as Mayors, Council persons, Judges, Nursing Home Proprietors, Security Guards, etc., persons who are bound by laws, statutes ordinances, or customs.
Punishment varies from a fine or imprisonment of up to one year, or both, and if bodily injury results or if such acts include the use, attempted use, or threatened use of a dangerous weapon, explosives, or fire shall be fined or imprisoned up to ten years or both, and if death results, or if such acts include kidnapping or an attempt to kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill, shall be fined under this title, or imprisoned for any term of years or for life, or both, or may be sentenced to death.
I did hear enough internally to consider that of my massive stances against discrimination and of race.
Title 18, U.S.C., Section 245 - Federally Protected Activities
1) This statute prohibits willful injury, intimidation, or interference, or attempt to do so, by force or threat of force of any person or class of persons because of their activity as:
A voter, or person qualifying to vote...;
a participant in any benefit, service, privilege, program, facility, or activity provided or administered by the United States; (Unemployment, EEOC)
a juror or prospective juror in federal court; (I’ve been a prospective juror in my life)
2) Prohibits willful injury, intimidation, or interference or attempt to do so, by force or threat of force of any person because of race, color, religion, or national origin and because of his/her activity as:
A student or applicant for admission to any public school or public college; (does this apply to private colleges?)
How TOC Groups Operate
Transnational organized crime (TOC) groups are associations of individuals who operate, wholly or in part, by illegal means. There is no single structure under which TOC groups function—they vary from hierarchies to clans, networks, and cells, and may evolve into other structures.
These groups are typically insular and protect their activities through corruption, violence, international commerce, complex communication mechanisms, and an organizational structure that spans national boundaries.
cyber crime
The vast sums of money involved can compromise legitimate economies and have a direct impact on governments through the corruption of public officials.
Today, TOC groups are more commonly incorporating cyber techniques into their illicit activities, either committing cyber crimes themselves or using cyber tools to facilitate other crimes. Technology also enables TOC groups to engage in traditional criminal activity, such as illegal gambling, but with a greater reach.
TOC poses a significant and growing threat to national and international security with dire implications for public safety, public health, democratic institutions, and economic stability across the globe. It jeopardizes our border security, endangers our health through human trafficking and counterfeit pharmaceuticals, and seeks to corrupt officials domestically and abroad.
There is definitely that of my digital presence being trafficked.
Countering Transnational Organized Crime
To combat the ongoing threat posed by these groups, the FBI has a long-established—yet constantly evolving—transnational organized crime program dedicated to eliminating the criminal enterprises that pose the greatest threat to America.
Due to the transnational nature of these criminal enterprises, the FBI leverages relationships domestically and abroad to combat the influence and reach of these organized crime groups. The Bureau deploys subject matter experts to international locations to develop strategies to address TOC matters impacting the region, as well as to identify targets of mutual interest.
The FBI also participates in selecting TOC groups to appear on the Department of Justice’s (DOJ) Top International Criminal Organizations Target List and contributes to the Treasury Department’s Office of Foreign Asset Control efforts to pursue criminal enterprises. Further, to pool resources and leverage technical and investigative expertise, the Bureau participates in many organized crime task forces with our state and local law enforcement partners.
Major Theft Crimes
Major theft crimes have a devastating impact on the U.S. economy, not only contributing to the rise of consumer prices but also to the loss of tax revenues to states and communities. The FBI focuses its resources on the most egregious major theft activity that crosses state and sometimes international lines, particularly thefts of:
art
Art Crime
Art theft is the illicit trade in art and cultural artifacts. Although tremendous strides have been made to combat cultural property crime, intelligence reveals this is a growing global threat, demanding proactive FBI measures and resources. The FBI established the National Stolen Art File (NSAF) – a computerized index of stolen art and cultural property as reported to the FBI by law enforcement agencies throughout the U.S. and internationally. It also formed a specialized Art Crime Team to investigate art and cultural crime cases.
Corporate Fraud
As the lead agency investigating corporate fraud, the FBI focuses its efforts on cases that involve accounting schemes and self-dealing by corporate executives, as well as obstruction of justice (activities designed to conceal this type of criminal conduct).
The FBI’s corporate fraud investigations primarily focus on:
Illicit transactions designed to escape regulatory oversight
Self-dealing by corporate insiders:
Insider trading (stock trading based on material, non-public information)
Kickbacks
Misuse of corporate property for personal gain
Individual tax violations related to self-dealing
Intellectual Property Theft/Piracy
Intellectual property theft involves robbing people or companies of their ideas, inventions, and creative expressions—known as intellectual property. This can include everything from trade secrets to proprietary products to movies, music, and software.
Intellectual property theft costs U.S. businesses billions each year.
The FBI's intellectual property investigations focus on the theft of trade secrets and copyright infringement on products that can impact people's health and safety, like counterfeit parts for cars and electronics. The FBI works with partners in the private sector and other law enforcement agencies at all levels to investigate these cases.
Learn more at the National Intellectual Property Rights Coordination Center.
Similarly, economic espionage costs the American economy hundreds of billions of dollars per year and puts our national security at risk. In these cases, foreign competitors deliberately target economic intelligence in advanced technologies and successful U.S. industries.
-P.
The Matthew Shepard and James Byrd, Jr., Hate Crimes Prevention Act of 2009, 18 U.S.C. § 249
(1) the crime was committed because of the actual or perceived race, color, religion, national origin of any person or (2) the crime was committed because of the actual or perceived religion, national origin, gender, sexual orientation, gender identity, or disability of any person and the crime affected interstate or foreign commerce or occurred within federal special maritime and territorial jurisdiction. (proof on why you don’t attack through dating apps)
It could also be discussed that attacks on mental health can be perceived as physical harm as the mind is of physicality and if able to prove with evidence that of constant attacks towards such, the long-term effects on attacks towards mental health definitely have a physical toll on such which does not warrent it as self-harm, but that of environmental conditions that the victim has to cope with and sustain based on other abusive or unlawful practices. Everything the body does is through that of electronic signals to the brain, proven of such of toll on physicality, this could actually be discussed as just as severe or greater based on the previous notion that mental health can be attacked in-directly and then of ‘false innocence’ from those who actually inflict it directly or in-direct base on a case-per-case basis.
Consider this as it goes through my email as physical evidence of proof of that which has been difficult to process, shouldn’t be allowed and still consideration in the same vein as battered victims looking to get out of an environment but put in a strained and strapped position by their abuser that never should had happened, nor continued for as long as it had in a capacity of understanding the physicality aspect of abusive tactics in positions of power.
What this does prove is that someone out there knows the behind the scenes on some things or that of straight up personal property. Consider that while I am left currently without medical insurance against other’s known liability and refusal to accept responsibility while going through a system now where they can be judged by their peers, the neighbors, other business and other countries for their continued action of violations of human rights while in America for that of corporate advancement.
What this proves is someone has inside access to a private citizen’s computer, all of my intellectual property and probably waiting for me to say something online or on social media to run with that which they have already stolen and say, ‘Hey…I came up with a great plot point for our own property and not off of other peoples’. Is that about right? I am not freely giving away my intellectual property, I am not puting things in my internals of my website because that has already been captured, corrected in that of this format to copyright before laying it out again in InDesign and you may or may not had been caught off guard by that while those who invaded my website definitely were or will be caught off guard by the difference of twice over protected. I am not playing that game on that front and I am not freely posting important things on the internet so others can take it and run in different directions and still leave me in the dust and still not proper citation. Your system has been seriously challenged and your methods are pretty easy to spot just as much as mine are. I keep you on your toes while not even comprehending the difference between my 800-900 dollars take home pay bi-weekly against what I am up against and I guarentee my paycheck is not attached to anyone in this method who could had stopped this years or others who can chime in on any time. The only difference is I told the truth from the beginning and other people have been trying to retrace steps and backtrack from the damage done based off their issues and arrogance or whatever the issue may be.
Just Food for Thought.
It is understood based on the ovbiously proven recorded keystrokes aspects of this, that the compromised aspects denotes leverage on the Apple side while still someone caught off guard by “No ‘Starving Artist’s” in this manner and continued to send out through my Google paid for email, which is also known compromised by that of recorded keystrokes to another place of presumed looked at and documented as such of tampering by others since 2018-2019 to the point that I am using this method as proof I am not sending through my email, this is illegal search and seizure. At some point it has hit the point that if you don’t want to talk directly and you don’t want to accept any liability that can be flat out proven from multiple sources at this point, you probably shouldn’t be in the business you are in and still considered a danger to the stability of society.
If this was for investigative reporting purposes, they could talk to me at any time which has never occurred who that route doesn’t work.
If this was for legal investigative purposes, I have not been talked to directly. There may be a reason for that while any opposing party will find this as still illegal and some were beginning to learn about laws back in 2018…I wouldn’t advise this as a continued method if of opposing council or hired private investigative purposes…there are flaws in such leading towards ethics and the protection of intellectual property.
If this was a hacker aspect of such, same rule apply with that of further charges.
If this was governmental for that of favors to corporations, there are always going to be United States Citizens but companies come and go and get eaten all the time.
If this was constantly trying to blame me for something to extend that of investigations internal or that of external, there are time limits to things, there are reasons for extensions, and there comes a point 5+ years of such might be considered abuse of power. If you know more than you should on a private computer, you can love or hate someone on just about everything. If it was longer, I would need more clarification before saying one way or the other.
If for some strange reason this is for protection of myself, it does wonders to wrap it up and use accordingly.
They seemed to have gotten the memo after ‘danger to the stability of society’ and stopped. Extended content if I post on my website.
The Re-assembly Cut.
Honestly, this is everyday for me….just another day of the same thing where perhaps I’ll explore other Tom Petty songs. There are Heart-breaking moments out there on how long this has occurred.