Google

Katherine “Evidence Tampering” Wessling and Legal Advocates for Witness Intimidation — Special Identity Theft Edition (with Wire Fraud Bonus)

January 22, 2012 | Filed Under Computers, Feminism, Missouri, Paleo-Skeptic, Society/Culture, The Law | Comments Off

-By Paleo-Skeptic

Note: I am not an attorney. I just offer this exposition as the product of my personal research.

Today, I would like to talk a little bit about wire fraud and identity theft, and how they relate to the Federal statutes. In my own particular circumstance, I was a victim of witness intimidation (Title 18 § 1512, U.S.C.), being a party (a creditor) to a bankruptcy, where there were numerous efforts to impede any manner of lawful investigation of assets. This manner of fraudulent enterprise culminated in an abusive order of protection filing, which itself invoked Federal jurisdiction with the words, “Is a creditor in my bankruptcy,” contained in the original petition.

Why it is that the Family Law Courts would openly embrace and assist in the commission of Federal crimes is beyond me. I have no reasonable explanation for it.

So, let’s take a look at this, shall we?


Identity Theft was first criminalized at the Federal level as a part of the False Identification Crime Control Act of 1982. This was amended by the Identity Theft and Assumption Deterrence Act in 1998. This Act established Section 1028 (a) (7) of Chapter 47 of Title 18 as the Federal identity theft statute. It states:

(a) Whoever, in a circumstance described in subsection (c) of this section—

(7) knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, or in connection with, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law;

First, the statute requires a “circumstance,” or predicate act, so that identity fraud will always consist of two actions taken together. Now, the first two paragraphs of subsection (c) deal with defrauding the Federal government (such as claiming you want some money to help battered women, then getting involved in a bankruptcy and actively assisting in witness intimidation, or using that money to go to court to prevent a song from being published), which is a big no-no. But paragraph 3 of subsection (c) invokes the powers reserved to Congress; the Commerce clause and the Postal clause:

(c) The circumstance referred to in subsection (a) of this section is that— (3) either—

(A) the production, transfer, possession, or use prohibited by this section is in or affects interstate or foreign commerce, including the transfer of a document by electronic means; or

(B) the means of identification, identification document, false identification document, or document-making implement is transported in the mail in the course of the production, transfer, possession, or use prohibited by this section.

Wire fraud, being under the Commerce clause, requires that the communication must cross state lines in order to fall into Federal jurisdiction (or affect interstate of foreign commerce in some way); the Postal clause, having reserved all matters in regulating the mail, does not. In either case, each subsequent incident constitutes a separate indictable offense.

The Federal Courts have held that “[t]here are two elements in mail fraud: (1) having devised or intending to devise a scheme to defraud (or to perform specified fraudulent acts), and (2) use of the mail for the purpose of executing, or attempting to execute, the scheme.” (Schmuck v. United States) Elsewhere, the Courts have determined that “wire fraud is identical to mail fraud statute except that it speaks of communications transmitted by wire.” (United States v. Frey) Further, “The fraud statutes speak alternatively of devising or intending to devise a scheme to defraud and do not require that the deception bear fruit for the wrongdoer or cause injury to the intended victim as a prerequisite to successful prosecution. [S]uccess of the scheme and loss by a defrauded person are not essential elements of the crime under 18 U.S.C. §§ 1341, 1343 . . . .” (United States v. Pollack)

Salois Straussner Wessling LAAW Legal Advocates for Abused Women conspiracy federal RICO

Maybe this screenshot would make more sense to you if you knew this person’s name wasn’t really “George.”

§ 1028A of Title 18, U.S.C., became law in 2004. This statute established aggravated identity theft as a federal crime, prohibiting the use of identifying information belonging to another in certain federal offenses and in relation to terrorism offenses.

The general provisions in subsection (a) state that:

Whoever, during and in relation to any felony violation enumerated in subsection (c), knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person…

There are five chapters of the United States Code specified in subsection (c). These are: Chapter 47 (fraud and false statements), Chapter 63 (mail, bank, and wire fraud), Chapter 69 (nationality and citizenship), Chapter 75 (passports and visas), and Chapter 8 of title II of the Immigration and Nationality Act. Any violation in any of these chapters would serve as a predicate act. There are also several sections of various chapters specified in this subsection.

Which is to say, that the use of a false identity by wire communication which travels over state lines falls into federal jurisdiction.

It looks like that to target a creditor in a pending bankruptcy proceeding in such a manner would certainly qualify as:

(c) Whoever corruptly—
(2) otherwise obstructs, influences, or impedes any official proceeding, or attempts to do so

One interesting thing to note is that these three— wire fraud (§ 1343), identity theft (§ 1028A), and witness intimidation (§ 1512)— are all listed as predicate acts under Chapter 96 of Title 18, known as the RICO statute.

It looks more and more like that would be the standard for Ms. Katherine “Evidence Tampering” Wessling and her scurvy crew of crooked cronies.


Leave a Comment

If you would like to make a comment, please register to do so. I hate to do that but there are so many spam-bots out there that deleting spam comments would be a full time job if I were to just open it up for anyone without asking them to jump through a few hoops first.

You must be registered and logged in to post a comment. Anyone can register. No registrant's information is kept, used, or sold. CLICK HERE TO REGISTER

Social Networking


Help the Soldiers!



American Genius

Our Founding Ideas

"Governments are instituted among men,deriving their just powers from the consent of the governed." Declaration of Independence July 4, 1776





Enter your Email


Preview
Powered by FeedBlitz

Subscribe in a reader




Recently Written

  • Black ‘Professor’ Who Attacked Teen Anti-Abortion Protester Blames ‘Slavery’
  • Leftist Columnist Glenn Greenwald Somehow Blames Israel for Ferguson Riots
  • VIDEO: Obama Was Back On Golf Course Only Seven Mins After Ferguson Address
  • Book Publishers Refused Bowe Bergdhal Book Because It Would Hurt Obama
  • NJ Town Suing Homeowners to Fix Own Sidewalks or Face Fines
  • Taxpayers Lose $23.5 Million to Pay IRS Union Members to Do Union Business On The Clock
  • ‘Meet The Press’ Update: Top Ten Most Left-Biased American Journalists – #4: Chuck Todd, NBC
  • Liar In Chief Now Claiming Pulling US Troops Out of Iraq Not His Idea
  • Man Buys Every Burger King Pie to Get Even With Mom and Her Out of Control Brat
  • Atheists Threaten to Sue Restaurant for Giving Discounts to Patrons Who Pray Before Meals


  • What THEY Say:
    Foreign News In English




    Click HERE for information
    on my fedora collection.
    Antique Stetsons, hat history...



























    Contact Us

    Email Publius' Forum

    Archives

  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005



  • Add to Technorati Favorites


    Clicky Web Analytics