SDP MULTIMEDIA GROUP
 

Providing Computer Solutions Since 1990

| Home |

2022 Sept 20th Security Logs

Observable Data

Traffic flows of 1200 requests per hour and 24 hours per day over multiple months and two years, stopped on public notice of evidence and extortion letters issued September 2011 by Donald J. Beal, explaining this child taking and concealment fralsified as "abandonment" in a premeditated child snatching.

Law enforcement remains unwilling to examine evidence, prompting a formal complaint to State Justice Departments with respect to an ongoing Federal Fraud (18 U.S. Code §1341) and concealment of a child to extort and export overseas in denial of DUE PROCESS, suspension of HABEAS CORPUS, and WELFARE FRAUD themed a State qui tam formally filed in July 2021 in sealed complaint to the U.S. Attorney General of the State of Oklahoma.

Analysis

As logs show from the identical rule set, the attackers in this 2017-2022 fraud ceased abuse on report of Alicia Scarbrough (aka "AllyKatt") as a developer of commercial pornography website content in contract relayed by Scott Goodridge (aka Nathan) and using the name and likeness and business of JAMES ALLEN and SHADOWDANCERS L.L.C. as if an employee/partner contrary a written and express enforced policy against adult/erotic material by the firm.

Additional documents show Alicia Scarbrough jointly offering to do serious bodily harm and information to those family members of JAMES ALLEN in 2002, in concert with Veronica Petersen (aka "Sex Kitten") on the electronic forum of THE LIZARD LOUNGE (aka The Church Dallas), a club similar to and coordinating with VAMPIREFREAKS.COM and including DONALLD J. BEAL, aka "The Don" in self designation in letters of threat in 2003 and 2011 written extortion.

Donald J. Beal has also used the aliases: "Windsock", "Loopback0.Network", "Lostserver", "Jay Chronister", "Jason Smith", "Josiah Deutche", "myluv187", and engaged in ICANN registration of the LEGAL NAME of the father of his child's older brother to extort in 2002-2004, 2011, 2013, and 2021-2022.

Alicia Scarbrough has published resume documents claiming to be an "Intern" at SHADOWDANCERS L.L.C. in 2001, following termination on false claims of false MARRAIGE to JAMES ARNOLD ALLEN. This is contrary to her claims to the public and other persons in support of child concealment which described herself as an equity PARTNER in the company contrary her own separate business "SCARBROUGH DESIGNS" and designated commercial activity on AMAZON BOOKS selling products for WHITE WOLF PRESS following introduction to the business while an intimate partner of James Allen in 1997-1999, and based on his prior work with the product and promotion, theater, and SHADOWDANCERS L.L.C. use of paid and licensed material for commercial performance later fraudulently sought as a screenplay rights claim by PARADOX INTERACTIVE AB to suggest ownership of characters and works of any person using their books was legal taking of protected private property in fraud.

The Oklahoma Tax Commission has been informed of this fraud in false equity and false title of membership certificates, and in claims in 2013-2014 to sell to FANTASY FLIGHT GAMES / ASMODEE / EMBRACER GROUP AB and their client "THQ Nordic Gmbh" and "GAMES WORKSHOP GROUP (LSE:GAW)" the registered trademarks "STRYX" and "BEYOND WAR" and other property belonging to SHADOWDANCERS L.L.C. there threatened and alleged sole in false title for $80,000 USD in concert with other documetns, information, character and product descriptions and literary works protected by copyright then in 2014 and later appearing in "WHITE WOLF PUBLISHING" (PARADOX INTERACTIVE AB) products and "GAMES WORKSHOP GROUP" products for false resale or franchise not entitled at law.

Claims by Captain Destry Musgrove of the ADA CITY POLICE DEPARTMENT that such activity may be "penetration testing" and such activity without consent therefore lawful, are rejected by SHADOWDANCERS L.L.C. as harassment using fasle IP ADDRESS to solicit a reply to SYN packet flooding targeting competitors of "DIGITAL REALTY TRUST INC,", "COGENT COMMUNICATIONS" (an NTT GROUP company and subsidiary of NTT GROUP of Japan), "EQUINIX", "ROBERT HALF TECHNOLOGIES" (employer of Donald J. Beal, per arrest record), "TEK SYSTEMS", and "TERRABOX" (Brian Woflfe d/b/a Terraobx, a false limited liability company tendered in fraudulent hire and to aid in the concealment and kidnapping of the child of JAMES ARNOLD ALLEN in 2002 per findings of Private Investigator Kristen Mack.

Fraud Notice

Claims by DONALD BEAL that JAMES ALLEN was now or ever an employee of TEK SYSTEMS are false and sustained in 2003 and 2011 written letters of extortion to intimidate police, law enforcement, and attorneys.

JAMES ALLEN was an employee of PROCEED TECHNICAL RESOURCES, a competitor of TEK SYSTEMS, and SHADOWDANCERS L.L.C. has letters of report showing no complaint or dispute by the actual employer agent-in-fact Andrew Miller, to disprove such fraud in commercial claims on concealment of a child and to extort SHADOWDANCERS L.L.C. during 2001-2022.

Wages from court records of D. Beal show $16/hr USD or less before the court. D. Beal has falsely claimed under oath that he earned $500 per day in regular pay. This is likely impersonation of James Allen and the prior PROCEED compensation of $60/hr paid to JAMES ALLEN, as well as prior $200/hr customer billing rates by SYKES ENTERPRISES to TOSHIBA AMERICA for JAMES ALLEN in 1998. This "Catch me if you can" impersonation approach is easily disproven,a nd evidnece of a sustained 2002-2022 "confidence game" by Donald Beal, Brian Young, Alicia Scarbrough, Veronica Petersen, Iva Petersen, Brian Wolfe, and their commercial associates known as "TERRABOX", "ROBERT HALF TECHNOLOGIES", "GEBHARDT BROADCASTING L.L.C.", "COGENT COMMUNICATIONS", "NTT-VERIO", "LOSTSERVER.NET", "DEPREF.NET", "LOOPBACK0.NETWORK", "ATLANTIC.NET", and "SHARKTECH.NET" - competitors of SHADOWDANCERS L.L.C. of Ada, Oklahoma.

The group appears to have organization in DALLAS, TEXAS; DENTON, TEXAS; ONTARIO, CANADA; ADA, OKLAHOMA; WAGONER, OKLAHOMA; ENID, OKLAHOMA; REYKJAVIK, ICELAND; and AMSTERDAM, DENMARK. Additional threats in 2022 May-July appear to originate from "DOMAINREGISTRY.COM" owner Erlich Management at Eversham Road Suite 204 Voorhees NJ 08043 in State of New Jersey; and were used in HALIBURTON.COM look-alike-domain registered in New Jersey as "Haliburton Tourist Information Service" to impersonate the website "JOBS.HALLIBURTON.COM" of a Texas company in hring and social security capture utilities on an NGINX proxy server and $5000 approach to extort in spear phishing letters using ADA CITY POLICE DEPARTMENT body camera footage to extort and blackmail SHADOWDANCERS L.L.C. after the death of the mother of JAMES ALLEN on March 2nd 2022, and in identity theft of Dr. Ann Klepper (deceased) to extort property and intimidate the public against relief in a child snatching and foreign kidnapping of her grandchild. "

 
 
 

SDP MULTIMEDIA GROUP

| Index | Hosting | Servers | TeamSpeak | SSL Paid Certs | 7A Network | ToS |

Competitor Attacks January 9th 2022

Jan 10 Single Source Dip

Even a moron can see the attacking server dip in the morning on January 10th, showing one criminal actor and in a patttern evident in Central Time Zone identical to Fairway Independent Mortgage hours in State of Texas, attacking our systems. Fairway Independent Mortgage employees have made false claims to suggest we "forfeit" real estate and property to them for $41,000 USD, on welfare of a concealed child taken by threat of murder in 2001 August under criminal fraud for 2001-2022 concealment, to blackmail and extort the Oklahoma family in Pontotoc County throughout 2001-2022 false claims contrary ORDERED POSSESSION to the Oklahoma father refused enforcement by State of Texas and State of Oklahoma.

Competitor Attacks Continue

Jan  4 11:11:02 diana kernel: TRACE99: IN=enp3s0 OUT= MAC=e0:3f:49:15:2f:c6:f8:1d:0f:96:f0:12:08:00 SRC=165.227.80.132 DST=firewall LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=12641 PROTO=TCP SPT=32766 DPT=35135 WINDOW=1024 RES=0x00 SYN URGP=0
Jan  4 11:11:03 diana kernel: TRACE99: IN=enp3s0 OUT= MAC=e0:3f:49:15:2f:c6:f8:1d:0f:96:f0:12:08:00 SRC=165.227.80.132 DST=firewall LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=22859 PROTO=TCP SPT=32766 DPT=4756 WINDOW=1024 RES=0x00 SYN URGP=0
Jan  4 11:11:03 diana kernel: TRACE99: IN=enp3s0 OUT= MAC=e0:3f:49:15:2f:c6:f8:1d:0f:96:f0:12:08:00 SRC=165.227.80.132 DST=firewall LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=35640 PROTO=TCP SPT=32766 DPT=40147 WINDOW=1024 RES=0x00 SYN URGP=0
Jan  4 11:11:03 diana kernel: TRACE99: IN=enp3s0 OUT= MAC=e0:3f:49:15:2f:c6:f8:1d:0f:96:f0:12:08:00 SRC=165.227.80.132 DST=firewall LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=62730 PROTO=TCP SPT=32766 DPT=65099 WINDOW=1024 RES=0x00 SYN URGP=0
Jan  4 11:11:03 diana kernel: TRACE99: IN=enp3s0 OUT= MAC=e0:3f:49:15:2f:c6:f8:1d:0f:96:f0:12:08:00 SRC=165.227.80.132 DST=firewall LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=40907 PROTO=TCP SPT=32766 DPT=35831 WINDOW=1024 RES=0x00 SYN URGP=0
Jan  4 11:11:04 diana kernel: TRACE99: IN=enp3s0 OUT= MAC=e0:3f:49:15:2f:c6:f8:1d:0f:96:f0:12:08:00 SRC=165.227.80.132 DST=firewall LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=35668 PROTO=TCP SPT=32766 DPT=23747 WINDOW=1024 RES=0x00 SYN URGP=0
Jan  4 11:11:04 diana kernel: TRACE99: IN=enp3s0 OUT= MAC=e0:3f:49:15:2f:c6:f8:1d:0f:96:f0:12:08:00 SRC=165.227.80.132 DST=firewall LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=40041 PROTO=TCP SPT=32766 DPT=7362 WINDOW=1024 RES=0x00 SYN URGP=0
Jan  4 11:11:04 diana kernel: TRACE99: IN=enp3s0 OUT= MAC=e0:3f:49:15:2f:c6:f8:1d:0f:96:f0:12:08:00 SRC=165.227.80.132 DST=firewall LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=17098 PROTO=TCP SPT=32766 DPT=7499 WINDOW=1024 RES=0x00 SYN URGP=0
Jan  4 11:11:04 diana kernel: TRACE99: IN=enp3s0 OUT= MAC=e0:3f:49:15:2f:c6:f8:1d:0f:96:f0:12:08:00 SRC=165.227.80.132 DST=firewall LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=39305 PROTO=TCP SPT=32766 DPT=46518 WINDOW=1024 RES=0x00 SYN URGP=0
Jan  4 11:11:04 diana kernel: TRACE99: IN=enp3s0 OUT= MAC=e0:3f:49:15:2f:c6:f8:1d:0f:96:f0:12:08:00 SRC=165.227.80.132 DST=firewall LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=58129 PROTO=TCP SPT=32766 DPT=35939 WINDOW=1024 RES=0x00 SYN URGP=0

As the information shows, attacks from a single offender using cloud ochestration to automate virtual services against our network continues in concert with Demands from Veronica Marie Petersen, a Texas former Nortel Networks website contractor unemployed in 2000 August to 2001, who seeks $41,000 USD in violation of Federal Law on the Oklahoma XXIII-1A Constitutional Right to Work violation and for "forfeiture" of securities, stock, trademarks, copyright, franchise, real estate title, and other "property" specified as protected under the Oklahoma Computer Crimes Act (21 O.S. §21-1952).

Threats published November 14th 2021 have been filed with the Pontotoc County District Court, showing a 2002-2004 and 2007-2012 and 2013-2021 "legal sham" (21 O.S. §21-1533) complaint in concert with 2002 and 2011 and 2021 extortion activity to cause default for civil asset forfeiture sought in a civil contract, violating Federal Law and 586 U.S. ____ (2019) case no 17-1091 rule barring any claims from standing to pay a "500 USD" final judgment rendered in July 2002 by TEXAS FAMILY CODE, and discharged due execution of contract clause also in 2003, and arrived at from a case where Veronica M. Petersen was found "wholly in default" December 2001 by Judge Dee Miller; prior fraud to carry that case forward over the obligation to return a child themed missing and exploited in collateral ransom for kidnapping prohibited by the Hobbs Act.

Company identities used in forgery to carry this attack include "Digital Ocean LLC", "Hetzner.de", and are made in concert with attacks from Ann Arbor (Michigan), Tencent Holdings Co Ltd networks, and known hosts of the "Lostserver" unregistered labor organization acting in this fraud and by name in 2002-2022 extortion to concael a child themed on counter-claim 21 O.S. §21-748.2 "Human Trafficking" for "forced labor" and "debt bondage" so also subject unlimited damages in the third degree by jury trial sought in 23 O.S. §23-9.1 not eligible other limitations or privileges per Oklahoma State Supreme Court ruling on UNCONSTITUTIONAL NATURE of all such terms and Statutes made in 23 O.S. cause; so void TEXAS FAMILY CODE §157.008(d) and other false claims to limit liability in this matter, a fraud and effort to overturn commission in false claims of "not a real business" uttered repeatedly to conceal kidnapping of a child of a business owner to blackmail and extort sustained in 20 year concealment and fraud falsely alleging to the child and public that such member of the Allen/Overton family was "willingly abandoned" on forced taking from a motor vehicle en route to State of Oklahoma from State of Texas on Interstate 75 in INTERSTATE COMMERCE.

Such transfer a contract prior paid and secured by over $10,000 USD in funds to Accounts Payable of VERONICA PETERSEN at Trinity Medical Center, The Colony, TX; and by agreement to seek therapy for domestic physical violence against James Allen resulting in sevre physical injury and attempted murder in 2001 preceding kidnapping of the child at 74 days of age and suspension of all due process by State of Texas to suppress the conduct of their Citizen over the Okalhoma parent and his home state rights and claim for return of the child, a demand refused without legal cause by DALLAS COUNTY DISTRUCT JUDGE DEE MILLER contrary 76 O.S. §76-8 rule, and Inhernent rights of Article II Constitution which prohibit 4th and 14th Amendment violations by a civil court in taking of children to compel labor and peonage, surrender of property, surrender of credit, or other claim to goods not a "sum certain" defined in UNIFORM INTERSTATE FAMILY SUPPORT ACT (Rev 2008), obligated any legal order for registration or enforcement as "child support", and no such order ever registered in State of Oklahoma for enforcement. Acts of enforcement or demands without registration or to coerce a pending civil trial filed Nov 2018, are criminal acts and prohibit enjoyment of such order or beneficts on intimidation of parties outside the civil process using illegal means, barred a lawful debt in collection per 15 U.S.C. §1692d.

Criminal activity in overt acts appears ongoing as of November 14 2021, December 23 2021, and January 1st-4th 2022, in a pattern of psychotic behavior increasing Pontotoc County office physical security after five (5) hit-and-run attacks on U.S. Mail service receptical boxes at the 130 N COUNTRY CLUB RD property in 2015-2021, the last in July 2021.

Use of Security Scanner products or attempts to gain privileges or utlize the network for non-company purposes will be regarded as component to any impact on service or logs and unauthorized use. All traffic is logged for analysis and retained for law enforcement at this time. Video surveillance on premise is obligatory, due to criminal written plan to extort and 11/7 and 11/14 threats coinciding with increased intrusion and prior May 20 2020 physical break-in by two or more persons using heavy duty work trucks to attempt robbery and overcome Office Staff.

All necessary physical security precautions will be taken. Conduct your actions and correspondence as if dealing with a United States Federal Facility and Communications Network Site not open to the general public. Any attempt to trespass may be subject public report and notice. All communications are the property exclusively of the firm, and given over to the firm for public display and circulation in assistance to ending these coercive activities of our major competitors in Texas, Michigan, California, New York, and Florida; and any other jurisdiction from which they launch attacks or execute fraud or other criminal acts or public offenses against this firm.

What we are seeing is an intense effort (127 requests/min) over nine (9) hours this Monday January 4th 2022 by 11:53 am, to suggest a concerted effort to disrupt business in concert with a push to compel State and Federal law enforcement to quash a motion to set aside for fraudulent conveyance per rule 18(b) the claims by Veronica M. Petersen falsely made in State of Texas.

Copyright © 2022 SHADOWDANCERS LLC - ALL RIGHTS RESERVED.