Other Sites
Features
Company News
Welcome To Rabid Radio�
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
RabidKnine Logo Called Porno
As a result of this action 14 email accounts and 32 sites were closed!
Posted on September 6, 2011 at 1:35 PM
AmendmentI Congress shall make no law respecting an establishment of religion,or prohibiting the free exercise thereof; or abridging the freedom ofspeech, or of the press; or the right of the people peaceably toassemble, and to petition the Government for a redress of grievances.
Recentlywhile the local C.N.N. Version of the news, an error was noticed. Thetitle of an aircraft carrier. For those that did not know aliashurricane Irene could not have created emergency response by the UnitedNavy Carrier U.S.S. Wasp! For civilian personnel, the U.S.S. Wasp was adistinguished combat vessel serving duty in the Pacific ocean. As aresult of battle damage during action against the Japanese, Wasp sankwith a loss of several hundred crewman. Prior to this catastrophe, Waspwas responsible for the rescue of crewman from the combat group sistership. The actual release of this information was withheld severalmonths from the civilian public coincidentally.
I am temptedbeyond the creation of a small �They did what article� to demandretraction from the station in question. Misinformation even in smallitems such as this creates distrust within the media. As quoting onecivilian witness, �Do they think we are all stupid?� Still serving withthe United States Navy is the U.S.S. Lexington II. Named so after theoriginal vessel was also sank in similar action against the opponent.This carrier operates as a training vessel for new aviators andmidshipmen transitioning to commissioned officer status. In related newquips:
Amendment IX The enumeration in the Constitution, ofcertain rights, shall not be construed to deny or disparage othersretained by the people. Heated battles continue over the informationsupper highway, craving for advanced knowledge has created a backlog ofwork. Demands for prioritization of request is now in full effect.Without proper request and clearance form many inquiries are will beignored despite of harassment or intimidation efforts. While publicservice utilities are utilized for some forms of communication thepilferage and abuse of the input users runs rampant. Theft of paperworkunder the constitutional amendment is an act of crime and violation ofcivil rights. (As is violation of attorney client privilege)
Amendment13 1. Neither slavery nor involuntary servitude, except as a punishmentfor crime whereof the party shall have been duly convicted, shall existwithin the United States, or any place subject to their jurisdiction.2. Congress shall have power to enforce this article by appropriatelegislation. Amendment 4 The right of the people to be secure in theirpersons, houses, papers, and effects, against unreasonable searches andseizures, shall not be violated, and no Warrants shall issue, but uponprobable cause, supported by Oath or affirmation, and particularlydescribing the place to be searched, and the persons or things to beseized.
Amendment V No person shall be held to answer for acapital, or otherwise infamous crime, unless on a presentment orindictment of a Grand Jury, except in cases arising in the land ornaval forces, or in the Militia, when in actual service in time of Waror public danger; nor shall any person be subject for the same offenseto be twice put in jeopardy of life or limb; nor shall be compelled inany criminal case to be a witness against himself, nor be deprived oflife, liberty, or property, without due process of law; nor shallprivate property be taken for public use, without just compensation.
Amendment5 No person shall be held to answer for a capital, or otherwiseinfamous crime, unless on a presentment or indictment of a Grand Jury,except in cases arising in the land or naval forces, or in the Militia,when in actual service in time of War or public danger; nor shall anyperson be subject for the same offense to be twice put in jeopardy oflife or limb; nor shall be compelled in any criminal case to be awitness against himself, nor be deprived of life, liberty, or property,without due process of law; nor shall private property be taken forpublic use, without just compensation.
While the quotation ofsuch law is immediately disputed, the concepts of utterance demand theproper adherence in simplest forms. Recently in a war of words withalleged police personnel, one made the following remark. �I just lovevisiting this guy and seeing what he has to say�. My response was toremind this officer I was not required under law to make statements orconsent to an interview with the presence of credible attorney at lawbeing present. I further admonished them that seeking to obtainrecordings of my vocalized speech dissertation for the purpose ofcreative writing and testing of phonetic speech patterns violatedconstitutional rights. In response, the officer stated �I can stop andquestion you at any time I deem appropriate, and no I do not have toallow your attorney to be present. He further stated I can place youupon administrative hold for reasons of �walk thru booking� orobservation without permitting your attorney to be notified. That ishow I do my job�. I replied then we need new policemen.
Messageinterception is a prevalent issue with all forms of person demanding tobe acclaimed and bluster personal importance. The issue is becoming amajor issue clogging the dispatch circuit. Demands for the unqualifiedto intercept and present opinions upon private issue of discussion. Iremind all of you that under the heading of Amendment IX the wording isquite clear. Your rights to freedom of speech and action cease to belegal when they violate the freedoms and rights of another person.Furthermore the repeating of of valid case information is not slander,nor is it unlawful to discuss real news stories regardless of origin.
Amendment I
Amendment VI In all criminal prosecutions, the accused shall enjoy theright to a speedy and public trial, by an impartial jury of the Stateand district wherein the crime shall have been committed, whichdistrict shall have been previously ascertained by law, and to beinformed of the nature and cause of the accusation; to be confrontedwith the witnesses against him; to have compulsory process forobtaining witnesses in his favor, and to have the Assistance of Counselfor his defense. In some areas blackmail �extortion� attacks areoccurring. Demands for silence and quiet release of criminal complaintsoccur with daily. I've seen veteran police personnel squelch reportsfor the reasons of keeping quiet misconduct. When confronted they denyall allegations and further harass the victims.
Even in timesof war certain forms of conduct are deemed unacceptable. Such anexample is the tampering with of this document and unauthorized releaseby any person other than myself or representative legal council. It isan act of blatant harassment and bigotry to even claim parody uponclassified �pres-manuscript� items of any copyrighted author. (Pettytheft also)
I remind all of you any allegations made requireunder law redirection for the presentation of evidence within theconfines of civil and or criminal court. Many a time I have challengedyou. Meet me there without tampering the the theft of materials.Anyway, that is the law as known to me in layman's terms. Below are thepublic versions.
Computer printouts used as evidence, when.569.094. In a prosecution under sections 569.095 to 569.099, computerprintouts shall be competent evidence of any computer software,program, or data contained in or taken from a computer, computersystem, or computer network. (L. 1987 H.B. 208 � 2)
Tamperingwith computer equipment, penalties. 569.097. 1. A person commits thecrime of tampering with computer equipment if he knowingly and withoutauthorization or without reasonable grounds to believe that he has suchauthorization: (1) Modifies, destroys, damages, or takes equipment ordata storage devices used or intended to be used in a computer,computer system, or computer network; or (2) Modifies, destroys,damages, or takes any computer, computer system, or computer network.2. Tampering with computer equipment is a class A misdemeanor, unless:(1) The offense is committed for the purpose of executing any scheme orartifice to defraud or obtain any property, the value of which is fivehundred dollars or more, in which case it is a class D felony; or (2)The damage to such computer equipment or to the computer, computersystem, or computer network is five hundred dollars or more but lessthan one thousand dollars, in which case it is a class D felony; or (3)The damage to such computer equipment or to the computer, computersystem, or computer network is one thousand dollars or greater, inwhich case it is a class C felony. (L. 1982 H.B. 1454, et al. � 3, A.L.1987 H.B. 208, A.L. 2002 H.B. 1888) CROSS REFERENCES: Civil action fortampering with computer equipment, expenses and attorney fees, RSMo537.525 Definitions for criminal statutes for computer crimes unlesscontext requires a different definition, RSMo
556.063 Tamperingwith computer users, penalties. 569.099. 1. A person commits the crimeof tampering with computer users if he knowingly and withoutauthorization or without reasonable grounds to believe that he has suchauthorization: (1) Accesses or causes to be accessed any computer,computer system, or computer network; or (2) Denies or causes thedenial of computer system services to an authorized user of suchcomputer system services, which, in whole or in part, is owned by,under contract to, or operated for, or on behalf of, or in conjunctionwith another. 2. The offense of tampering with computer users is aclass A misdemeanor unless the offense is committed for the purpose ofdevising or executing any scheme or artifice to defraud or to obtainany property, the value of which is five hundred dollars or more, inwhich case tampering with computer users is a class D felony. (L. 1982H.B. 1454, et al. � 4, A.L. 1987 H.B. 208, A.L. 2002 H.B. 1888) CROSSREFERENCES: Civil action for tampering with computer users, expensesand attorney fees, RSMo 537.525 Definitions for criminal statutes forcomputer crimes unless context requires a different definition,
RSMo556.063 Tampering with computer data, penalties. 569.095. 1. A personcommits the crime of tampering with computer data if he knowingly andwithout authorization or without reasonable grounds to believe that hehas such authorization: (1) Modifies or destroys data or programsresiding or existing internal to a computer, computer system, orcomputer network; or (2) Modifies or destroys data or programs orsupporting documentation residing or existing external to a computer,computer system, or computer network; or (3) Discloses or takes data,programs, or supporting documentation, residing or existing internal orexternal to a computer, computer system, or computer network; or (4)Discloses or takes a password, identifying code, personalidentification number, or other confidential information about acomputer system or network that is intended to or does control accessto the computer system or network; (5) Accesses a computer, a computersystem, or a computer network, and intentionally examines informationabout another person; (6) Receives, retains, uses, or discloses anydata he knows or believes was obtained in violation of this subsection.2. Tampering with computer data is a class A misdemeanor, unless theoffense is committed for the purpose of devising or executing anyscheme or artifice to defraud or to obtain any property, the value ofwhich is five hundred dollars or more, in which case tampering withcomputer data is a class D felony. (L. 1982 H.B. 1454, et al. � 2, A.L.1987 H.B. 208, A.L. 2002 H.B. 1888) CROSS REFERENCES: Civil action fortampering with computer data, expenses, attorney fees,
RSMo 537.525 Definitions for criminal statutes for computer crimes unless context requires a different definition, RSMo 556.063
See http://www.moga.mo.gov/statutesearch/Default.aspx">Revised Statutes Of Missouri
InitialNotices of Digital Transmissions of Sound Recordings The followingservices have filed Initial Notices of Digital Transmissions of SoundRecordings under Statutory License pursuant to section 201.35 of title37, Code of Federal Regulations, between November 12, 2001 and April 9,2004. Please note that the notice and recordkeeping regulations locatedin sections 201.35-201.37 have been moved to a new part 270, effectiveApril 12, 2004. Copies of Initial Notices filed are available in theLicensing Division Public Records Office, or you may contact theLicensing Division. See Circular 75 for more information. (181. PrimalImage Entertainment, Inc. 182. PrivateJazz.com 183. Rabid Radio 184.Radio 1190 Online 185. Radio Africana, LLC 186. Radio Free Hamptons{exert})
<html>
<head>
<title>M86 Web Filtertitle>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<style type="text/css">
.blockcopy { font-family: Arial, Helvetica, sans-serif; font-size: 13px; font-style: normal; font-weight: bold}
.content { font-family: Arial, Helvetica, sans-serif; font-size: 11px; font-style: normal}
.heading { font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-style: normal; font-weight: bold; color: #FFFFFF}
.contentbold { font-family: Arial, Helvetica, sans-serif; font-size: 11px; font-style: normal ; font-weight: bold}
style>
<SCRIPT type="text/javascript">
SCRIPT>
head>
<body bgcolor="#FFFFFF" text="#000000" link="#000000" vlink="#666666" alink="#666666">
<FORM METHOD=POST NAME=block>
<input type=hidden name="SITE" value="_BLOCK_SITE_">
<input type=hidden name="IP" value="172.16.101.31">
<input type=hidden name="URL" value="http://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1284225348&rver=5.5.4177.0&wp=MBI&wreply=https:%2F%2Fauth.bay.livefilestore.com%2Fstorageservice%2Fpassport%2Flogin.aspx%3Fcid%3D-2616476874826979895%26cru%3Dhttp%253a%252f%252frabidradio.spaces.live.com%252fdefault.aspx%253fwa%253dwsignin1.0%2526sa%253d486673095&lc=1033&id=250915">
<input type=hidden name="CAT" value="WSTORE">
<input type=hidden name="USER" value="RADACCT-172.16.101.31">
<input type=hidden name="STEP" value="STEP1">
<input type=hidden name="AUTHIP" value="">
<input type=hidden name="CE" value="0">
<table width="600" border="0" cellspacing="0" cellpadding="1" align="center" bgcolor="#68788C">
<tr>
<td>
<table width="599" border="0" cellspacing="0" cellpadding="0">
<tr>
<td width="12" bgcolor="#68788C" height="2">
<div align="center"><font face="Arial, Helvetica, sans-serif" size="2"><b><font color="#FFFFFF">font>b>font>div>
td>
<td width="50" bgcolor="#68788C" height="2" class="contentbold"> td>
<td width="474" bgcolor="#68788C" height="2">
<div align="center"><font color="#FFFFFF"><font class="heading">ACCESS DENIED!font>font>div>
td>
<td width="50" bgcolor="#68788C" height="2">
<div align="right"><b><font color="#000000"><span class="content"><a href="http://www.m86security.com/support/r3000/accessdenied.asp">
<font color="#FFFFFF" class="contentbold">HELPfont>a>span>font>b>div>
td>
<td width="12" bgcolor="#68788C" height="2"> td>
tr>
<tr align="left" valign="top" bgcolor="#FFFFFF">
<td height="20" colspan="5">
<div align="center">
<p><img src="./../spacergif.gif" width="2" height="10">p>
div>
td>
tr>
<tr align="left" valign="top" bgcolor="#FFFFFF">
<td colspan="5">
<div align="center">
<p><font color="#000000" class="blockcopy">Internet access to the requested website has been denied based on your user profile and organization's Internet Usage Policy.font>
<br><font color="#000000" class="blockcopy"><a href="">a>font>p>
<table width="550" border="0" cellspacing="0" cellpadding="1" bgcolor="#68788C">
<tr>
<td>
<table width="100%" cellspacing="0" cellpadding="0" align="center" bgcolor="#FFFFFF">
<tr>
<td colspan="3" class="content" bgcolor="#C1CAD2" align="left" valign="top">
<p align="right" class="contentbold">User/Machine:p>
td>
<td width="2%" bgcolor="#C1CAD2" class="content" align="left" valign="top"> td>
<td width="80%" bgcolor="#C1CAD2" class="content" align="left" valign="top">RADACCT-172.16.101.31td>
<td width="2%" bgcolor="#C1CAD2" class="content"> td>
tr>
<tr>
<td colspan="3" class="contentbold" bgcolor="#FFFFFF" align="left" valign="top">
<div align="right">IP:div>
td>
<td width="2%" align="left" valign="top"> td>
<td width="80%" class="content" bgcolor="#FFFFFF" align="left" valign="top">172.16.101.31td>
<td rowspan="3" class="content" bgcolor="#FFFFFF" width="2%"> td>
tr>
<tr>
<td colspan="3" class="contentbold" align="left" valign="top">
<div align="right">Category:div>
td>
<td width="2%" align="left" valign="top"> td>
<td width="80%" class="content" align="left" valign="top">Web Based Storagetd>
tr>
<tr>
<td colspan="3" class="contentbold" bgcolor="#FFFFFF" align="left" valign="top">
<div align="right">Blocked URL:div>
td>
<td width="2%" align="left" valign="top"> td>
<td width="80%" class="content" bgcolor="#FFFFFF" align="left" valign="top">http://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1284225348&r<br>ver=5.5.4177.0&wp=MBI&wreply=https://auth.bay.livefilestore.com/storag<br>eservice/passport/login.aspx?cid=-2616476874826979895&cru=http%3a%2f%2<br>frabidradio.spaces.live.com%2fdefault.aspx%3fwa%3dwsignin1.0%26sa%3d48<br>6673095&lc=1033&id=250915td>
tr>
table>
td>
tr>
table>
<p><span class="contentbold">For further options, <a href="javascript:do_options1()">click herea>.span> p>
<span class="contentbold">To submit this blocked site for review,
<a href="mailto:[email protected]?subject=review&body=User/Machine:%09RADACCT-172.16.101.31%0aIP:%09%09172.16.101.31%0aCategory:%09WSTORE%0aBlocked Url:%09http://login.live.com/login.srf?wa=wsignin1.0%26rpsnv=11%26ct=1284225348%26rver=5.5.4177.0%26wp=MBI%26wreply=https:%252F%252Fauth.bay.livefilestore.com%252Fstorageservice%252Fpassport%252Flogin.aspx%253Fcid%253D-2616476874826979895%2526cru%253Dhttp%25253a%25252f%25252frabidradio.spaces.live.com%25252fdefault.aspx%25253fwa%25253dwsignin1.0%252526sa%25253d486673095%26lc=1033%26id=250915">click herea>.
For assistance, contact your Administrator.span><br>
<span class="content">M86 Web Filter provided by
<a href="http://www.m86security.com/support/r3000/accessdenied.asp">M86 Securitya>.font>span>
<span class="content"><font color="#000000">Copyright 2010.
All rights reserved.font>span>
div>
td>
tr>
table>
td>
tr>
table>
<p> p>
FORM>
body>
html>
Comments(2)
21.02.
Comments(8)
13.46.


Windows is a registered trademark
of Microsoft Corporation. All rights reserved.
MacOS and Macintosh are
registered trademarks of Apple Computer, Inc. All rights reserved.
The Arc Angel Express BBS� 1986; Sleepless
Nights BBS�;1988
The Twilight of The Aftermath �
1981 (Role Playing Game)
The Rabid K. Nine� 1989; Tiela
Williams� 1981 created by Charles W. Munhollon�;copy. All
rights reserved.
Reproduction in whole or part is strictly forbidden!
See
the Revised
Statutes Of Missouri
Search
Engine Submission - AddMe
Search Engine
Optimization
