09/27/2021 - Four Demands - Tom sends video addressed to Ride to some old man over on AMB

What a fucking mess of a human. Jesus. I can't believe he thinks it's going to go anywhere. If the New Zealand government couldn't shut this place down or get a legal leg up on Null, he doesn't have a chance. If he keeps hitting the drugs as hard as he is, he's gonna die on top of it. Which hey, at least you'd know he couldn't be prowling schoolyards to snap creepshots anymore.
 
This guy does not ever know when to quit with his corpse ass and has been shitting up nulls inbox for days after trying to set up a stupid debate or whatever.

@Miss Tommie Jayne Wasserberg YOU RAPED A DOG AND A CHILD.. There is nothing to debate here. Nobody thinks your a good person. Please stop wasting the world's supply of heroin only taking enough to continue enjoying it and overdose already.
 
Tomfoolery of a toothless lunatic. He'd be an idiot to waste a cent of the late uncle's money on launching failed legal disputes. Maybe some Jewish lawyer will steal his shekels, while knowing Tom, doesn't stand a chance in starting court proceedings? Or more likely, Tooter's gonna chimpout and waste TPD's time on livestream; Throwing a tantrum he didn't get anything from his family.
 
Tomfoolery of a toothless lunatic. He'd be an idiot to waste a cent of the late uncle's money on launching failed legal disputes. Maybe some Jewish lawyer will steal his shekels, while knowing Tom, doesn't stand a chance in starting court proceedings? Or more likely, Tooter's gonna chimpout and waste TPD's time on livestream; Throwing a tantrum he didn't get anything from his family.
Either way we'll have a chuckle at Tom's expense.
 
Tomfoolery of a toothless lunatic. He'd be an idiot to waste a cent of the late uncle's money on launching failed legal disputes. Maybe some Jewish lawyer will steal his shekels, while knowing Tom, doesn't stand a chance in starting court proceedings? Or more likely, Tooter's gonna chimpout and waste TPD's time on livestream; Throwing a tantrum he didn't get anything from his family.
If he gets shit, he'll waste it on drugs and wind up like a lottery winner. Based on his own admission to the relationship with his family I reckon he won't get a red cent though.
 
This is fucking hilarious.

@Miss Tommie Jayne Wasserberg what do you hope to do with @CammieDoxGirl dox info? You live in a state with castle law, if you show up on their doorstep to rage shart, you're just going to get shot in the spleen again. It would definitely be funny, but we all know you're too much of a lazy fatass to follow through with any of your empty threats, so I'm just curious what the end goal is.
 
I believe Tom's diabolical plan was to use the Dox to get a restraining order against CDG so they can't say truthful mean things about him him online....
The good thing is that even if he somehow gets a judge order to shut me up and violates my first amendment rights systemically, we all know this rapist is far too proud of their degeneracy and will never stop bragging about it until the day they die which, hopefully they will cause themselves to do just that, very soon (kill urself Tom). World would be a better place with one less pedo dockfucker in existence.
 
This guy does not ever know when to quit with his corpse ass and has been shitting up nulls inbox for days after trying to set up a stupid debate or whatever.

@Miss Tommie Jayne Wasserberg YOU RAPED A DOG AND A CHILD.. There is nothing to debate here. Nobody thinks your a good person. Please stop wasting the world's supply of heroin only taking enough to continue enjoying it and overdose already.
heroin is it now , you insane truscum? your evidence? you believe that i raped a dog and child but you cannot make any sort of rational case for inciting violence against me today for that so many years later in the eyes of the law.


The good thing is that even if he somehow gets a judge order to shut me up and violates my first amendment rights systemically, we all know this rapist is far too proud of their degeneracy and will never stop bragging about it until the day they die which, hopefully they will cause themselves to do just that, very soon (kill urself Tom). World would be a better place with one less pedo dockfucker in existence.
The first amendment does not protect your right to incite violence against me, you stupid fucking incel.

@Daisymae the video was sent privately to @Ride here and Bucket@anothermessageboard.com if neither of them passed you this video, you have just admitted to a federal felony which may actually get some action off the IC3 site if they take attachments. they wouldn't let me bring anything to the field office here.


I don't need anybody's dox to destroy this site.

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Charles Doyle Senior Specialist in American Public Law October 15, 2014 Congressional Research Service 7-5700 www.crs.gov 97-1025 Cybercrime: An Overview of 18 U.S.C. 1030 and Related Federal Criminal Laws Congressional Research Service Summary The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of CFAA and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326, 122 Stat. 3560 (2008). In their present form, the seven paragraphs of subsection 1030(a) outlaw • computer trespassing (e.g., hacking) in a government computer, 18 U.S.C. 1030(a)(3); • computer trespassing (e.g., hacking) resulting in exposure to certain governmental, credit, financial, or computer-housed information, 18 U.S.C. 1030(a)(2); • damaging a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce (e.g., a worm, computer virus, Trojan horse, time bomb, a denial of service attack, and other forms of cyber attack, cyber crime, or cyber terrorism), 18 U.S.C. 1030(a)(5); • committing fraud an integral part of which involves unauthorized access to a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce, 18 U.S.C. 1030(a)(4); • threatening to damage a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce, 18 U.S.C. 1030(a)(7); • trafficking in passwords for a government computer, or when the trafficking affects interstate or foreign commerce, 18 U.S.C. 1030(a)(6); and • accessing a computer to commit espionage, 18 U.S.C. 1030(a)(1). Subsection 1030(b) makes it a crime to attempt or conspire to commit any of these offenses. Subsection 1030(c) catalogs the penalties for committing them, penalties that range from imprisonment for not more than a year for simple cyberspace trespassing to a maximum of life imprisonment when death results from intentional computer damage. Subsection 1030(d) preserves the investigative authority of the Secret Service. Subsection 1030(e) supplies common definitions. Subsection 1030(f) disclaims any application to otherwise permissible law enforcement activities. Subsection 1030(g) creates a civil cause of action for victims of these crimes. Subsections 1030(i) and (j) authorize forfeiture of tainted property. This report is available in abbreviated form—without the footnotes, citations, quotations, or appendixes found in this report—under the title CRS Report RS20830, Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws, by Charles Doyle. Cybercrime: An
 
Last edited by a moderator:
I don't need anybody's dox to destroy this site.

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Charles Doyle Senior Specialist in American Public Law October 15, 2014 Congressional Research Service 7-5700 www.crs.gov 97-1025 Cybercrime: An Overview of 18 U.S.C. 1030 and Related Federal Criminal Laws Congressional Research Service Summary The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of CFAA and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326, 122 Stat. 3560 (2008). In their present form, the seven paragraphs of subsection 1030(a) outlaw • computer trespassing (e.g., hacking) in a government computer, 18 U.S.C. 1030(a)(3); • computer trespassing (e.g., hacking) resulting in exposure to certain governmental, credit, financial, or computer-housed information, 18 U.S.C. 1030(a)(2); • damaging a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce (e.g., a worm, computer virus, Trojan horse, time bomb, a denial of service attack, and other forms of cyber attack, cyber crime, or cyber terrorism), 18 U.S.C. 1030(a)(5); • committing fraud an integral part of which involves unauthorized access to a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce, 18 U.S.C. 1030(a)(4); • threatening to damage a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce, 18 U.S.C. 1030(a)(7); • trafficking in passwords for a government computer, or when the trafficking affects interstate or foreign commerce, 18 U.S.C. 1030(a)(6); and • accessing a computer to commit espionage, 18 U.S.C. 1030(a)(1). Subsection 1030(b) makes it a crime to attempt or conspire to commit any of these offenses. Subsection 1030(c) catalogs the penalties for committing them, penalties that range from imprisonment for not more than a year for simple cyberspace trespassing to a maximum of life imprisonment when death results from intentional computer damage. Subsection 1030(d) preserves the investigative authority of the Secret Service. Subsection 1030(e) supplies common definitions. Subsection 1030(f) disclaims any application to otherwise permissible law enforcement activities. Subsection 1030(g) creates a civil cause of action for victims of these crimes. Subsections 1030(i) and (j) authorize forfeiture of tainted property. This report is available in abbreviated form—without the footnotes, citations, quotations, or appendixes found in this report—under the title CRS Report RS20830, Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws, by Charles Doyle. Cybercrime: An
None of that applies here, you old fool.
 
Look you fucking malformed disgusting retarded peice of shit..



If you want people to stop talking about how you raped a dog and how you molested at least one child then you need to fuck off and dissappear yourself already.



You are such a fucking dipshit that you post about how you did it and how you think it isn't a big deal constantly.



1. You admit to doing it.


2. Your opinion that your past behavior doesn't reflect a present danger is YOUR OPINION.



Absolutely would not trust a person like you around animals or children because I believe you are likely to reoffend. WHY? because clearly you have ZERO remorse for the rape you have committed in the past and even if you did feel remorse... YOU RAPED A DOG AND A CHILD!



It isn't a debate and you aren't a real trans person. I dont need you to lecture me on your dirty greasy bleeding balls. Ugh gross.. shut the fuck up about ur fucked up balls already you nasty old man.



You're just a predator taking advantage of whatever means you can and it's absolutely typical of a disgusting subhuman like you to try to force people not to speak out how disturbing of a threat you are to the general public.



Go fucking cut your chode off and bleed to death if you have to. I don't care what you do in order to accomplish it but it is my honest viewpoint that you need to do something to get the fuck out of everyone's life. I don't give a fuck if you take yourself out and honestly would feel a sense of relief for children and dogs in Tucson if you did you fucking monster.
 
Last edited:
I don't need anybody's dox to destroy this site.

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Charles Doyle Senior Specialist in American Public Law October 15, 2014 Congressional Research Service 7-5700 www.crs.gov 97-1025 Cybercrime: An Overview of 18 U.S.C. 1030 and Related Federal Criminal Laws Congressional Research Service Summary The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of CFAA and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326, 122 Stat. 3560 (2008). In their present form, the seven paragraphs of subsection 1030(a) outlaw • computer trespassing (e.g., hacking) in a government computer, 18 U.S.C. 1030(a)(3); • computer trespassing (e.g., hacking) resulting in exposure to certain governmental, credit, financial, or computer-housed information, 18 U.S.C. 1030(a)(2); • damaging a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce (e.g., a worm, computer virus, Trojan horse, time bomb, a denial of service attack, and other forms of cyber attack, cyber crime, or cyber terrorism), 18 U.S.C. 1030(a)(5); • committing fraud an integral part of which involves unauthorized access to a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce, 18 U.S.C. 1030(a)(4); • threatening to damage a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce, 18 U.S.C. 1030(a)(7); • trafficking in passwords for a government computer, or when the trafficking affects interstate or foreign commerce, 18 U.S.C. 1030(a)(6); and • accessing a computer to commit espionage, 18 U.S.C. 1030(a)(1). Subsection 1030(b) makes it a crime to attempt or conspire to commit any of these offenses. Subsection 1030(c) catalogs the penalties for committing them, penalties that range from imprisonment for not more than a year for simple cyberspace trespassing to a maximum of life imprisonment when death results from intentional computer damage. Subsection 1030(d) preserves the investigative authority of the Secret Service. Subsection 1030(e) supplies common definitions. Subsection 1030(f) disclaims any application to otherwise permissible law enforcement activities. Subsection 1030(g) creates a civil cause of action for victims of these crimes. Subsections 1030(i) and (j) authorize forfeiture of tainted property. This report is available in abbreviated form—without the footnotes, citations, quotations, or appendixes found in this report—under the title CRS Report RS20830, Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws, by Charles Doyle. Cybercrime: An
Do it, faggot.
arsefaces-first-reveal-in-preacher-2.jpeg
 
Back