Thursday, September 27, 2012

Cybersecurity and Censorship

Advocacy to save people, even children, from the prison industrial complex is censored. To my dismay, I found that some of my blogs are listed as "unrated." Please see the approved safety rating at the end of this article. My blogs are all at Blogger, and Google is one of the most respected Internet companies. My blogs only endanger hypocrites in the injustice system, where many lawyers, prosecutors, judges and lawmakers are prison investors who benefit financially every time someone is imprisoned, whether innocent or guilty, every time someone is denied DNA tests or a new trial to present post-conviction evidence that might lead to exoneration, and every time a mental hospital, care home for the mentally ill, or a drug treatment center is closed or downsized, which leads to crimes and eventual imprisonment.

My censorship is generally accomplished by taking over my personal computers and laptops and putting them on an Intranet over which I am not the administrator. This happens immediately after I purchase a new computer or have one wiped clean and Windows re-installed in my continuous attempts to have the freedom of press Americans are promised. Occasionally, the saboteurs censor me in ways that cannot be done by taking over my computers, because I have no ability to manipulate major Internet sites. Perhaps they buy help from within those Internet companies, or they may have ultimate control over every Internet company in the USA. I believe the later option is correct. Two days ago, I opened a "!" account, and saboteurs changed my password. I went to the site and requested a new password, and the email I received from "Scoop.It!" was empty. Saboteurs on America's Internet censorship force can change or delete part or all of the text in emails and on web sites, remove signatures from petitions, redirect your browser, redirect your links, issue denial of service (DOS) for censored persons or censored Internet sites, manipulate the number of hits that register on your websites and videos, and more. They can make it appear that emails you receive come from friends' email accounts in order to deceitfully communicate with you.

Cyberstalkers prevent my using TalkShoe conference call service probably because audio broadcasts are less vulnerable to surreptitious Changes they make to websites. That is not to say audio broadcasts are safe. Saboteurs interject pauses in the audio for videos and taped Internet radio broadcasts, corrupt the sound to the point that the playback is inaudible, and they had one of my 10-minute YouTube videos to stop after 2.5 minutes (see "Cochran Firm Fraud videos 1 and 2 at YouTube). After a huge outcry by my Care2 friends who had seen the videos in their entirety, cyberstalkers put the rest of the video back online. Live broadcasts are censored by interjecting static over speakers' voices or taking over speakers' phones and hanging up or preventing the calls from going through in the first place. I was allowed to record only one episode of "MaryLovesJustice Show" at TalkShoe. I had to have an intermediary  to accomplish it: "Stop Executions in Bible Belt States." The next week, our topic was "Are Whistleblowers Persecuted in America?" Cyberstalkers hung up my phone repeatedly and interjected static over my voice to such an extent as to make the tape of the broadcast nearly useless. When we first taped "Stop Executions in Bible Belt States," the sound was clear. Stalkers have since then added pauses and corrupted the sound in certain places in the broadcast. They are very pro-execution, anti-God, racist Nazis who hire Georgia Negroes to follow me and do much of, if not all of, the Internet censorship I experience.

It is my belief that the government pays for my censorship, because police refuse to address my stalking online or in person. On Saturday, January 15, 2011, a young man actually confessed that he was hired to stalk me. He followed me to the library where I was forced to use the Internet since my home computer had been destroyed. He was driving a red V6 Cavalier - DeKalb County license tag BKP8027. The man looked so much like Micheal Moon that I asked if they were related. The stalker indicated that he was indeed related to Michael Moon (the computer technician who invaded my home in February 2010, destroyed my computers, and extorted $80 from my aged mother and me for a wipe clean/re-install of Windows). I asked the young man why he stalked me to the library. He said, "Because it pays well." When saboteurs follow me to the library, they are able to manipulate the computer I use there almost as well as they do my home PCs. Police refused to run the stalker's license number and question him. Neither will police use the IP addresses my computer security system captured to locate and stop my censorship. The IP addresses are in this article:
"Google Persecuted: Senate Bill 968 [PIPA] to Remove Dissidents from Internet" 

Excerpt: Right now there are four cyberstalkers breaking through my security. My security program reports: Deny PortScan Attack from Remote Host The cyberstalkers' attack continued, and they got won. Now I cannot go to Twitter, send emails, or log in at Yahoo Answers. My security program reported: IE Sent Data to Remote Host; IE Sent Data to Remote Host; IE Sent Data to Remote Host; and Application "SYSTEM" sent data to Remote Host (The IP addresses were captured in 2011, so the censorship team probably Changed them by now.)

Below is the latest information from Google regarding the safety level of my main blog, "EXPOSED: FreeSpeakBlog," which is at this link . I hereby ask all Internet security rating companies to adjust the safety rating for FreeSpeakBlog accordingly or show just cause to rate the site differently.

Mary Neal, director of Assistance to the Incarcerated Mentally Ill (AIMI), an online advocacy organization dedicated to juvenile justice, decriminalizing mental illness, eliminating capital punishment, over-sentencing, wrongful convictions. For information, email

Safe Browsing

Diagnostic page for  Advisory provided by Google

What is the current listing status for

This site is not currently listed as suspicious.
Of the 16 pages we tested on the site over the past 90 days, 0 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2012-09-19, and suspicious content was never found on this site within the past 90 days.This site was hosted on 1 network(s) including AS15169 (Google Internet Backbone).
Has this site acted as an intermediary resulting in further distribution of malware?
Over the past 90 days, did not appear to function as an intermediary for the infection of any sites.
Has this site hosted malware?
No, this site has not hosted malicious software over the past 90 days.
Next steps:

Thank you for your interest in justice news and viewpoints as relayed by this layperson. My advice to human/civil rights advocates is to invest in a printer and stamps, and use them, plus use in-person meetings and rallies. Online communication is compromised, and what you see is not necessarily what others see when they visit your websites or read your emails.