Cyber Crime and Virtual Rape

Cyber Crimes

For cyber crimes in order to obstruct justice, also refer to page Obstruction of Justice. Here I list the type and content of the Cyber Crimes for all purposes including block internet business (see constitutional rights page on main site for more detail) and the associated intention for Virtual Rape. The Scope for the Cyber Crimes listed here are broader than the name implies. I include everything – any device, appliance, machine (either electronic or mechanical) and the web and network (wi-fi or cell phone network, GPS network or any other signal) interference. The most frequent and severe cyberspace crime is on cell phone and computer (including web browser program or any other program), particularly after (since March, this year) my storage unit was racked by Individual 45 and all my electronic devices and electronic storage media in the storage unit were stolen (tablet, camera, mp3 player, external hard drive, flash drives, memory cards); and (I used to have a computer, but it was stolen by Donald trump on 1/20/18 – see Theft and Robbery page).

Cyber Crimes that resulted in the Identity Theft Fraud (almost all Identity Theft Fraud were done online and are actually the most severe cyber crimes; but those Daily Logs are not tagged with cyber crime, instead they were tagged with Identity Theft Fraud and Theft and Robbery only which was summarized in a separate page under the Tab ‘Theft And Robbery’.

  • Cell Phone
    • control the amount of battery and how long the battery has to be charged to full (9-15 hrs for apparent virtual rape). On many occasions, the cell phone was charged from 15 to 50 min only to fill 1% to 5% of battery; manipulate the amount of battery left while doing things on the cell phone. show low battery notification and shortly after, showing another low battery notification with a sharp drop the amount of battery left or even simply power off the cell phone.
    • block sign into the public Wi-Fi sometimes
    • block the use of some Apps
    • power off the cell phone in the middle of a phone call, when transfer photo to online storage
    • causing the cell phone to be shut off 2/3 of the time (being discouraged to use the cell phone)
    • cell phone now is free from California Life Line program (a free cell phone program), as I said in Theft and Robbery, free stuff has a higher probability of being stolen and/or damaged,
  • Public Computer
    • slow
    • slow browser or not loading the page saying the site is not responding
    • block the use of some other programs
  • Personal Computer (before 1/20/18; on 1/20/18 the personal computer was stolen, refer to Theft And Robbery page)
    • If  I did not connect the adaptor and cord to the outlet, in the middle of doing something on the computer (for example, working on QuickBooks accounting for somebody), it had shown the virtual rape message – “plug-in or seek another power source”.
  • Tablet
    • The tablet I had was a gift from a timeshare vacation real estate company after I participated in their marketing event. (It was stolen in the Burglary case)
    • It worked out worse than my California Lifeline cell phone (a free cell phone program): battery is low
    • Speed was even slower and internet browsing was hard to do. Even though this tablet was neither iPad nor Samsung tablet; but it should not run that slow.
  • Camera, Camcorder And Camera Accessories (Memory Cards) (the cyber crime on the camera is always in the context of domestic travel)
    • Individual 45 destroyed my Camcorder (although I don’t think the intention of that crime is malicious at that time (May last year) when I was travelling to Alaska on a cruise ship. The view of Alaska really deserve a good camera. But my iPhone was stolen, the camcorder’s picture resolution was bad – pictures are blurred. So I bought this camera on the cruise ship and all the travel after this one was photographed with this Nikon camera. (It was stolen in the Burglary case together with all other electronic devices in the storage unit)
    • Individual 45 can control the memory card space and he had made the memory card out of memory but in reality they were not. (All the memory cards were stolen in the Burglary case as well together with all other electronic storage media – external hard drives and flash drives)
    • This same travel to Alaska was finished with another 9 days in Seattle and its surrounding National Parks. Toward the last few days of trip, all my memory cards were out of memory. I had to go to CVS to purchase another memory card with much larger size 64 G, making it impossibility to run out of space.
    • He can control the battery of the camera as he did on other electronic devices and playing Virtual rape games. Most of the times, he powered off the battery near the last portion of the sightseeing photo opportunities in a day.
    • But this was not true for the trip to San Francisco and for the trip to Reno-Lake Tahoe during which time he committed the felony – right femur bone fracture, he powered off the battery at the critical part of the day tour, essentially destroyed the quality of the travel (refer to femur bone fracture felony – motive analysis page).
  • Other Devices electronic or mechanical
    • Printer: (before 9/30/17; the printer was owned by my parents; after 9/20/18 I moved out of my parents house and is not owning any printer since)
      • He can not only control what time the printer’s scan, copy or print function work or not work (sometimes the cartridge is OK – no signal saying the cartridge is empty – but nothing can be seen on the paper coming out).
      • He can also control what time the cartridge is empty or run out of the ink. If I do not replace the cartridge, then the printer is not going to print.
    • a Travel Clock:
      • He can not only control the time on the clock, how fast the clock run, whether the clock has the battery or not (this type of clock seldom run out of battery); he can also control how each individual number (LED screen display) only display portions of it – I have to guess what that number exact was. (this clock was disposed due to the damage to the screen display; it dropped to the floor several times)
  • Information Deletion
    • delete or mess the content of this web site and the main site (those daily logs were also tagged as obstruction of justice)
    • delete all the files in the impeachment fold in my flash drive (also tagged as obstruction of justice)
    • massive deletion of fraud alert email (refer to identity theft fraud page)
    • massive deletion of my past emails I had kept for my record.
  • List of All The Daily Logs Which Contain Cyber Crime

Virtual Rape

His virtual rape is unparalleled to anybody as far as its frequency and severity is concerned. Virtual Rape actually is not just limited to electronic device. Virtual rape is anything symbolic as long as they deliver the message of rape between the preyer and the victim and passing rape feeling psychologically onto the victim. It could be noise too. His virtual rape started the first day he was in the White House last year and has never stopped. It is  after he committed the felony crime –  femur bone fracture, his other virtual rape are not so severe except for the case of cell phone.