Brevard County: Resort for America’s most wanted victimizers

Is Brevard County A Resort For America’s Most Wanted?

June 13, 2013, Alan G. Ender, 57, was arrested Wednesday on 10 counts of possession of childpornography. June 12,2013 at 10:40 a.m., Trooper William Craig noticed a motorist on State Road 528 near Industry Road drive closely past a Brevard County Deputy Sheriff’s car.

The Brevard County Deputy had pulled over a car on the roadway’s shoulder, according to FHP. Failing to change lanes for a stopped emergency vehicle led to the arrest Wednesday in Brevard County of a high school counselor listed on America’s Most-Wanted website as a child pornography suspect, according to the Florida Highway Patrol. No detective work was needed there, after all in recent news it would appear Brevard would rather sweep things under the rug rather than do good old fashioned police work.

It appears FHP, Florida Department of Law Enforcement and U.S. Immigration and Customs Enforcement agents have stepped in for Sheriff Wayne Ivey and Melbourne police chief Steve Mimbs.

Florida Department of Law Enforcement and U.S. Immigration and Customs Enforcement agents served a search warrant on Ender’s computer and hard drives and found explicit images of children.

FDLE officials are asking anyone who believes they may have been a victim to call investigators at 407-245-0801 or 800-226-8521. Why not the local guys?

Ender is being held in the Brevard County jail. FDLE officials said his bond was set at $1 million.

Brevard judges and local law enforcement have a history of being soft on offenders who harm children. Would this be why so many offenders migrate to Brevard County?

Judge Maxwell as previously reported: ‘Specifically, it cited Maxwell for returning a 13-year-old boy to the home of a man who was suspected of sexually abusing the boy’s older sister for four years. That case ended disastrously. One day after the judge’s ruling, police say, the boy walked home from school to find the man dead, a .32-caliber pistol at his side and a suicide note in the mailbox, confessing the abuse. The next day, the judge tried to explain his ruling by describing the abuse of the girl as ‘a little pedophilia’ that did not warrant removing the boy, said an agency administrator.’ ~Orlando Sentinel

But lawyers who have worked with both judges defended them and criticized the agency for ‘judge shopping.’

Attorneys routinely ask judges to pass cases to someone else if there is a conflict of interest, but it is extremely rare for an attorney or state agency to try to prevent a judge from hearing a broad swath of cases as in the request pertaining to Brevard’s local Judge Maxwell.

It appears in Brevard the local authorities needed FHP and the like due to their inability or refusal to locate sex offenders within their county but, with local judges like Brevard’s who’s to say?

Judge Moxley refused to issue orders despite the piles of evidence that resulted in Alissa Blanton’s death. ‘As a judge, you have to follow the law. You’re not omniscient,’ Moxley said. ‘God bless her soul.’

But recently he ignored official transcripts and Florida bar documents proving fraud and left a child with a person who was found as fact to kidnap the child from her parents. He then ignored the reports of her being sexually touched just weeks before while in Yvonne Howard’s care (the kidnapper). Judge Moxley took illegal testimony from a psychologist being paid cash and credit by the offender instead. A psychologist who was previously ordered off the case.

Dr. Jeffrey Williamson failed drastically in cross examination and stated it was classic signs of abuse but, being paid by the kidnapper Yvonne Howard stated ‘he didn’t believe it was.

The child a few months later ran away and told authorities she was being abused. The authorities handed her back to the abuser who was also previously arrested for abusing a disabled elderly person.

Is Brevard County incompetent, backwards, corrupt or just lazy? Do the local officials just collect a check without providing the service? Or do they collect checks from both sides of the fen


Some Melbourne residents were shocked to find out a neighbor arrested for child porn was also accused of taking photos of neighborhood children in Brevard County. The Florida Department of Law Enforcement said Alan Ender was arrested … — Thu, 13 Jun 2013 13:19:23 -0700
While Seminole County has a small number of transient sex offenders, Volusia (49), Brevard (35) and Orange (121) are presented with a much greater challenge. Enforcement of living locations and monitoring of activity is considered by many … — Thu, 13 Jun 2013 06:26:20 -0700
After serving more than ten years in prison and spending time on the sex offender registry, the Charles County Circuit Court vacated Mid-Atlantic Innocence. — Wed, 12 Jun 2013 06:11:17 -0700

NSA GATE: What some are calling the Water Gate of today

In today’s world there are many software suites to protect the privacy of Americans but nothing could have prepared Americans for the alarming discovery that surfaced recently. PRISM a top secret program designed to spy on the mass population of Americans in the name of national security.

The NSA says that PRISM’s all about keeping you safe from potential terrorist attacks, but nevertheless it’s not quite right that people’s privacy counts for nothing.

The continuous debates over domestic issues like immigration, education, the economy, privacy and healthcare reveal what most of us already know: America is divided politically and economically. Scandal after scandal Americans are now full of questions of which some still go without answer. Barring a bold solution from national leaders, America will continue to move forward without a long term plan to rebuild communities and create the social cohesion and national unity that is critical to U.S. national security.

So what about those questions? Is it divide and conquer or the magician’s slide of hand? Has America lost it’s way? As the old saying goes only those who keep their eye on the prize succeed and in America the prize is freedom. Shall the timeless pursuit of life, liberty and happiness continue its quest or vanish as a vivid dream just out of reach among the American people tomorrow?

Distraction is the divided attention of an individual or group from the chosen object of attention onto the source of distraction. Distraction is caused by: the lack of ability to pay attention; lack of interest in the object of attention; or the great intensity, novelty or attractiveness of something other than the object of attention. Distractions come from both external sources, and internal sources.

Divide and conquer is an approach to a problem or task, attempting to achieve an objective by breaking it into smaller parts. Often it is used to separate a force that would be stronger if united, or to cause confusion among rival factions. Divide and conquer has applications in many areas, from political science to economic and military strategy.

‘Whether to concentrate or to divide your troops, must be decided by circumstances.’ Sun Tzu, the Art of War [maneuvering]

‘If he is taking his ease, give him no rest. If his forces are united, separate them.’ Sun Tzu, the Art of War [laying plans]

America’s greatest defense appears to have been forgotten in the present condition of the union. One can only remember this fact when realizing that each state of the ‘union’ is a separate nation at home but together those separate states are united as one to the world. In fact this nations national security starts right here at home with America’s unity a phrase coined long ago as ‘united we stand divided we fall.’ The strategy of dividing and conquering one’s foes is ancient. Ancient Roman emperor Julius Cesar successfully used it thousands of years ago. The application of the strategy in controlling one’s own people – divide and rule – has been used for just as long.

Elements of this technique involve:

  • creating or encouraging divisions among the subjects to prevent alliances that could challenge the sovereign
  • aiding and promoting those who are willing to cooperate with the sovereign
  • fostering distrust and enmity between local rulers
  • encouraging meaningless expenditures that reduce the capability for political and military spending
  • Historically, this strategy was used in many different ways by empires seeking to expand their territories.

Why is history important? Many of this America’s youth have little account to the reasons ‘why’ history is important due to the frenzy filtering out history in our local public schools for the sake of ‘political correctness.’

‘Those who fail to learn from history are doomed to repeat it.’ Sir Winston Churchill spoke those words many years ago, yet he was not the only one to speak them. ‘Those who cannot remember the past are condemned to repeat it.’ Rooted in the philosophies of Socrates, Plato, Aristotle and many others to follow, Americans should recall what Adolf Hitler said … and proved: “To conquer a nation, first disarm its citizens.”

The greatest weapon in the world is the human mind, ‘What greater weapon is there than to turn an enemy to your cause? To use their own knowledge against them?’ ― Bastila Shan

‘Uncertainty, in the presence of vivid hopes and fears, is painful, but must be endured if we wish to live without the support of comforting fairy tales. It is not good either to forget the questions that philosophy asks, or to persuade ourselves that we have found indubitable answers to them.’ — Bertrand Russell, History of Western Philosophy

In politics and sociology, divide and rule (or divide and conquer) (derived from Greek: διαίρει καὶ βασίλευε, diaírei kaì basíleue) is gaining and maintaining power by breaking up larger concentrations of power into chunks that individually have less power than the one implementing the strategy. The concept refers to a strategy that breaks up existing power structures and prevents smaller power groups from linking up.

The maxims divide et impera and divide ut regnes were utilized by the Roman ruler Caesar and the French emperor Napoleon. The example of Gabinius exists, parting the Jewish nation into five conventions, reported by Flavius Josephus in Book I, 169-170 of The Wars of the Jews (De bello Judaico). Strabo also reports in Geography, 8.7.3 that the Achaean League was gradually dissolved under the Roman possession of the whole of Macedonia, owing to them not dealing with the several states in the same way, but wishing to preserve some and to destroy others.

‘If a nation expects to be ignorant and free… it expects what never was and never will be’ — Thomas Jefferson

Indeed – even though the Founding Fathers warned us against the danger of a two-party system to divide the nation – left-right partisan divisions have successfully been deployed to distract and weaken the American people for centuries.

As prime minister Churchill once said that he hoped that the tension between Hindus and Muslims would remain a bulwark of British rule in India it would appear such is the way of American politicians, local governments and the people today.

Shall we review all the replacements due to scandals? Ever feel like the government has been replaced? Is the government being systematically replaced?

Secret service:

President Barack Obama chose veteran agent Julia Pierson as Secret Service director. Pierson will replaced Mark Sullivan, who retired in February and was in charge during the Colombia scandal – one of the worst in the agency’s history. Was the scandal a distraction?

‘Julia is eminently qualified to lead the agency that not only safeguards Americans at major events and secures our financial system, but also protects our leaders and our first families, including my own,’ Obama said in a statement.

Federal Bureau of Investigation: 

President Barack Obama intends to nominate former deputy attorney general James Comey to succeed Robert Mueller as FBI Director, sources familiar with the decision told NBC News on Wednesday. Comey, a Republican who served under President George W. Bush, would take over after Mueller steps down in September. Could this be another magicians slide of hand trick. out with one in with another.

Mueller, who has previously made public his long-term plans to step down in the coming months, has spent 12 years as head of the FBI. He has recently faced some scrutiny over the agency’s failure to more thoroughly investigate Boston bombing suspects Tamerlan and Dzhokhar Tsarnaev after being alerted by foreign agencies. Mueller took over the FBI just one week before the Sept. 11, 2001 attacks. Was the scandal a distraction?

National Security Agency:

Susan Rice will step into the security adviser’s role when Donilon leaves in July, Obama said. Obama said he is ‘absolutely thrilled’ to have Rice on his White House team.

For Rice — a longtime Obama ally and close confidante of the president — the appointment is a bit of redemption after she was forced to withdraw from consideration as Obama’s second-term secretary of State amid criticism of her handling of the Benghazi attacks. Rice said at the time that she did not want her confirmation hearing to become a distraction for the White House. The national security post does not require Senate confirmation.

Rice, who first started working for Obama during his 2008 presidential campaign, has a close relationship with the president and many of his advisers. Her long-standing ties to Obama are expected to afford her significant influence within the White House.

The 48-year-old also served in various national security positions during the Clinton administration, including in key roles on peacekeeping and African affairs. Her world view is said to have been shaped by Clinton’s decision to not intervene in the Rwandan genocide, a move Rice said later deeply affected her.

Ambassador Christopher Stevens was in Benghazi on Sept. 11, 2012, the day he died in a terrorist attack, because Secretary of State Hillary Clinton ordered him there, according to an exclusive statement given to WND by the attorney representing Gregory Hicks, the former State Department deputy chief of mission and chargé d’affairs who was in Libya at the time of the attack.

Hicks’ attorney also charged the Accountability Review Board, or ARB, headed by Ambassador Thomas Pickering and Admiral Michael Mullen, was a cover-up designed to contain blame for the Benghazi terror attack at a level below Secretary of State Hillary Clinton in the State Department.

Is Obama paying off Susan Rice with her appointment to the NSA? Was the PRISM scandal a distraction?

Federal Judges:

As of June 13, 2013, 197 Obama nominees to Article III judgeships have been confirmed by the United States Senate, namely two Justices to the Supreme Court of the United States, 36 judges to the United States courts of appeals and 157 judges to the United States district courts. 29 further nominations are currently awaiting Senate action.

Obama has also made two appointments to the United States Court of International Trade, an Article III tribunal, and three appointments to the United States Tax Court. In addition, Obama has also made two nominations to the United States Court of Federal Claims, along with designating sitting judge Emily C. Hewitt of the United States Court of Federal Claims, an Article I court, to be Chief Judge of that court.

President Obama will soon accelerate his efforts to put a lasting imprint on the country’s judiciary by simultaneously nominating three judges to an important federal court, a move that is certain to unleash fierce Republican opposition and could rekindle a broader partisan struggle over Senate rules. ~Washington Post May 27, 2013


“President Obama is again abusing his power by imposing his policies via executive fiat instead of allowing them to be debated in Congress,” said Florida Senator Marco Rubio, in a statement released after Obama’s announcement. “President Obama’s frustration with our republic and the way it works doesn’t give him license to ignore the Constitution.”

President Obama told a Latino rights group that he wished he could “bypass” Congress in order to get things done in July of 2011. “There are times where — until Nancy Pelosi is speaker again — I’d like to work my way around Congress” Obama told the group.

It brings new meaning to the “Yes you can!” chant after he made the comments the first time.

In summation NSA Gate has been much like the Water Gate of today. Some are abandoning the system.

PRISM Detoxification:


When news of the NSAgate surfaced, big tech names were stringed as accomplices.  Some of the giants mentioned were Apple, Microsoft, Google, Facebook, Verizon and Yahoo! Others, such as Dropbox, soon followed.

There are ways to dodge the government’s watchful eye, but you need to be prepared to purge services from the aforementioned companies out of your system.  It’s hard, but it can be done.  You won’t have to go offline if that’s what you’re worried about.  You just need to replace the allegedly compromised services with something more secured.

PRISM Break:

Twitter user and self-proclaimed digital nomad Peng Zhong was quick to come up with a site that provides a list of alternatives to the compromised tools and services.  The site is dubbed PRISM Break, a name that might remind you of the popular TV show Prison Break — suitable because if you’re addicted to said services, it will feel like breaking out of their shackles when you transition to other services that were previously unfamiliar.

So what services can you use to purge yourself from Facebook, Google Chrome, Gmail, and others that are said to have backdoors easily accessible to the government?




It may be hard to believe but Mozilla is not a part of the whole data mining and spying scandal.  To prove this, the company has teamed up with Reddit, the Electronic Freedom Foundation, the Internet Archive, and others who launched the online petition StopWatching.Us that demands “a full accounting of the extent to which our online data, communications and interactions are being monitored.”  Mozilla also has a range of add-ons that protect users, such as DoNotTrackMe, Google Privacy, Privacy Protector and many others.

GNUzilla and IceCat

These two are the GNU versions of Mozilla and Firefox, hence the names, and both are free software, unlike Mozilla, which offers free software but paid add-ons.  GNU IceCat provides security by blocking cookies from sites hosting zero-length image files, and when a user is being redirected to sites that spy, IceCat alerts the user of this.  These are just some of the security benefits of IceCat.

Tor Browser Bundle

The Tor Browser Bundle may be the best browser for you if you do not want to leave any tracks behind.  When you download TBB, you can choose to save the file either on your computer or a USB stick, then follow the instructions found here to run the program and make sure your web browsing is secure from prying eyes.




This email service provides private email accounts with no ads and unlimited email aliases. The problem is if you’re used to using free email services, you might back out of this one as it costs $35 a year for the premium version that offers 1GB of space and $50 a year for 10GB of storage with IMAP/POP. provides secure and private email accounts accessible via the web, shell, IMAP, or POP. It scans all mail for viruses and provides three layers of defense against spam.  The problem with this is that it’s invite only (like when GMail first got started), and has a 25 megabyte quota that can increase over time.

Social media:


This open source, community based social networking service lets you grab the code and host your data wherever you want.  It features hashtags, reshare, mentions, love (similar to Facebook’s Like), and sharing content to only a few people or certain groups. If you can’t completely abandon the other services, you can link your Facebook, Twitter, and Tumblr accounts to Diaspora*.

GNU Social

GNU Social is a decentralized social network that allows you to install in on your own server so you can control the amount of information you want to share with others on other sites.


A private, decentralized social network server, Movim manages messages between users without selling them to advertisers to make money.  Because it’s open source, you can get the code and create your account wherever you want.


Reported the Post: “An internal presentation of 41 briefing slides on PRISM, dated April 2013 and intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the … — Thu, 13 Jun 2013 14:42:00 -0700
The highly-classified, confidential documents that revealed the NSA’s massive data-mining operation, PRISM, were leaked from the NSA’s facilities on none other than a simple, innocuous thumb drive. — Thu, 13 Jun 2013 12:40:00 -0700
A lot remains uncertain about the number of users affected by the NSA PRISM surveillance program that is taking place, the extent to which companies are involved, and how the NSA handles this sensitive data. Here are some of the biggest … — Thu, 13 Jun 2013 12:20:00 -0700
With so much things going around about NSA, Google, and PRISM, it seems protecting our online privacy has become harder than ever. Everyone is tracking us – our email provider, Internet Service Provider, Government agencies, and of … — Thu, 13 Jun 2013 11:51:12 -0700
Sam Jacob opinion on how digital culture is affecting design as details of NSA Prism programme emerge. — Thu, 13 Jun 2013 11:00:46 -0700
Edward Snowden told the Washington Post last week that he leaked the National Security Agency’s top secret surveillance programs in part because he feared the Internet becoming “a TV that watches you.” What to make, then, of an … — Thu, 13 Jun 2013 11:00:15 -0700
When the list of prominent internet companies participating in a semi-secret government surveillance program called PRISM leaked, most of the world’s massive tech firms were not on it. But one… — Thu, 13 Jun 2013 10:18:05 -0700
… documents on a massive, NSA surveillance program of U.S. citizens. He contacted the Guardian and Washington Post to blow the whistle on the U.S. government collecting data on phone calls and a separate program, code-named PRISM, … — Thu, 13 Jun 2013 09:52:00 -0700


For more tips and tricks on how to protect yourself from government spying, check out How To Get Out Of PRISM and Avoid NSA Spying by Mike Wheatley.

NSAgate: Three 3 Spy-Free alternatives for email, browsing and social media today.



PRISM privacy and the IRS scandal

Thursday the existence of the National Security Agency’s PRISM program was revealed. PRISM is the government program that allegedly works with major Internet companies to collect (some) U.S. citizen data. Tech companies have been fighting to distance themselves from the potentially privacy-violating government programs.

If you don’t ask the right questions, you don’t get the right answers. A question asked in the right way often points to its own answer. Asking questions is the ABC of diagnosis. Only the inquiring mind solves problems.

If everyone is resigning for bad oversight then why has Obama not resigned?

Samantha Power, a former foreign-policy adviser to the Obama campaign, whom the president then appointed to the National Security Council staff, and served as a special assistant to the president on human rights. (I wonder if Power and Rice had some awkward meetings in recent years . . .)

On February 28, 2008, Rice insisted “there had been no contact” between Obama adviser Austan Goolsbee and representatives of the Canadian government. There in fact had been a meeting.

Rice will take over the top national security post from Tom Donilon, who is resigning after four years on the job. Former White House aide Samantha Power was named to replace Rice as U.S. ambassador to the United Nations.

Having lost a chance to be Secretary of State amid harsh Republican criticism, the U.N. ambassador was picked by President Obama on Wednesday to be his national security adviser.

CISPA, IRS Scandals and Benghazi has destroyed the public trust. If PRISM exists and they can use it against citizens then why can’t they use it for Susan Rice, the IRS or Hillary Clinton? Google records voice even in its apps to learn your voice. On Fox it was said they could ask for specific information and a less Specific statement was used as an example.

With programs like PRISM, is the IRS using it to single out groups?

The Post and the Guardian allege tech companies that participate in the PRISM program — Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple offered the government direct access to their servers full of user information. From inside a company’s data stream the NSA is capable of pulling out anything it likes, the Post’s Barton Gellman and Laura Poitras reported.

Facebook and Google were two of the most aggressive deniers. But similarities in their statements raised eyebrows. Both Google CEO Larry Page and Facebook CEO Mark Zuckerburg denied giving the government direct access, per se, to their servers. That Page and Zuckerberg’s statements were, when boiled down, almost identical to the point they seemed rehearsed with government lawyers guiding the pen didn’t help matters.

New reports reveal Facebook and Google were telling something resembling the truth when they denied the NSA has direct access to their servers, and that the government doesn’t, in fact, have direct access to these massive personal information treasures storing most of our modern day-to-day communications. Both The New York Times’ Claire Cain Miller and CNET’s Declan McCullagh have reports debunking some the previous myths about the way PRISM and the NSA interact with the tech companies who cooperate with their surveillance work.

“It’s not as described in the histrionics in the Washington Post or the Guardian,” a source told McCullagh, who went on to say it’s “a very formalized legal process that companies are obliged to do.”

First, it turns out Facebook and Google weren’t lying. The government does not have direct access to their servers. But they did make something special for the NSA to make obtaining the specially requested information as easy as a ransom hand-off:
In at least two cases, at Google and Facebook, one of the plans discussed was to build separate, secure portals, like a digital version of the secure physical rooms that have long existed for classified information, in some instances on company servers. Through these online rooms, the government would request data, companies would deposit it and the government would retrieve it, people briefed on the discussions said.

So the government doesn’t have “direct access” to Facebook and Google servers, but there is a process in place so the NSA can request the information, and there’s a special, secure place for them to retrieve that information. The NSA wants information on person X so they send a request to Google or Facebook. The tech company gathers all the information it has on person X and deposits that information onto the secure server set up for the NSA. Once the information is in place, the NSA accesses the secure server and retrieves the requested information. So the government doesn’t have direct access it has backdoor access via a digital butler as has been implied.

The servers are, in effect, the tech equivalent of a Pandora’s box for the next malicious hacker exploit.

How other tech companies linked to PRISM ended up cooperating is unclear at this time. Twitter is only one who bristled at the government’s request to make the handing-over of information easier. How Microsoft, Yahoo, PalTalk, AOL, Skype, YouTube, and Apple all operate with the NSA is still unknown. In some instances NSA agents would be stationed at a tech companies’ office and would remain at the site for several weeks to download data to an agency laptop, Miller writes. Occasionally the government would request data in real time, which companies send digitally, she reports. But this brings us to an important legal point. Furthermore it presents a risk of packet injection during digital delivery.

So, yes, some people at Facebook and Google probably have national security clearance. That’s coming from both sides of this scandal. On any other day, we would crack wise about how Eric Schmidt having level seven security clearance is, but it still seems too soon for that.


Brevard County Judge Roberts: Culmer and Davidson P.A. kangaroo court gone wild

June 7,2013, alarming facts were discovered about what appears to be why local Brevard County attorneys allowed to fabricate evidence and perjure in local courts without regard to the law. Local officials appear to be avoiding the questions as they were contacted one by one.

It appears there more to the pool of lawyers and judges in Brevard County Florida.Local Attorney Joseph Culmer appears to be invoking kangaroo courts gone wild in Brevard County is he being sheltered by his former partner? Is the Culmer & Davidson Firm a success or benefit of collusion?Judge John Dean Moxley Jr. appears to be soft on criminals and hard on victims in the Titusville Courthouse. Brevard County collusion appears to be at its best.5 photosView the full slideshow »

It appears there more to the pool of lawyers and judges in the halls of injustice in the Titusville Courthouse located in Brevard County Florida.

It appears some Brevard County officials are skilled at concealing information to shelter their questionable actions. Attorney Scarlett Davidson filed a frivolous suite on behalf of Yvonne Howard to conceal a kidnapping as defined by Florida Statutes chapter 787. The fact was found by Honorable Judge Charles Crawford, a fact that has been ignored by the local law enforcement.

“I’ve already found it as fact she was hiding the child and preventing visitation without any court order” Judge Charles Crawford said.

Major Andrew Walters, who reportedly stated he was busy with more important things and claimed it was a civil matter despite the overwhelming evidence, during our inquiry stated the victim should call an attorney and seek civil remedies. It is a sad day for justice when a law enforcement officer calls crimes a civil issue and in light of the corruption prevalent in the local court steers you to corrupt civil judges and attorneys rather than the law enforcement officers who swore to protect the constitution and the local citizens.

Judge John Dean Moxley at the helm of injustice again
Judge John Dean Moxley at the helm of injustice again
Photo credit:  The Objective Review / Photographer Joseph Kirk

“The courts shall be open to every person for redress of any injury, and justice shall be administered without sale, denial or delay.” Fla. Const. Art. I, Sec. 21

After speaking with the local state attorney, it was noted crimes can’t be prosecuted by the state attorney without a law enforcement report. The court appears to be closed to the citizens who cant pay the local civil attorneys who the local sheriff’s department charges for advertising in their jail. Such egregious actions can only be described as not paying the local mafia for protection against their actions. Are local law enforcement agents on the take?

It appears, in Brevard County, justice is for sale where if you can’t afford an attorney criminals can exploit the poor all they want. This raises serious concerns about the local government and just how deep the collusion goes. The Objective Review interviewed an individual who used to work in the local chamber of commerce who previously blew the whistle on corruption within the chamber of commerce and we decided to dig deeper.

As it turns out Judge Charles J. Roberts is now Deputy Chief Judge and has a former relationship with Attorney Joseph Culmer. Culmer & Davidson P.A. used to be Roberts & Culmer P.A. in fact if you ever defended against attorney Joseph Culmer or Scarlett Davidson before Judge Charles J. Roberts serious ethical questions should come to mind about fairness and justice.

Attorney Joseph Culmer acquired the firm from Judge Roberts which is reported to generate a multi-millions a year. The original Roberts and Culmer information can be found at the division of corporations for Florida. Joseph Culmer then teamed up with Scarlett Davidson as the division of corporations shows the name was changed in 2009.

However the buck doesn’t stop there as attorney Shari Wilson admitted to being good friends with Attorney Daniel Freyberg (Daniel Freyberg previously partnered with magistrate Jenifer Taylor). Attorney Shari Wilson previously partnered with Judge Charles Crawford. So if you ever felt like the cards were stacked against you for not having enough money in court, you can rest assured you were right according to Shari Wilson if you don’t pay her enough in appointed cases she doesn’t care what you want.

Apparently lawyers in practice with a lawyer who becomes a judge in Brevard is like winning the lottery. Where it appears who ever has the most money wins. Public officials are required to be bonded but after contacting their offices they claim they have never heard of such a thing or refer you to someone else who refers you back to them. Judge Moxley’s assistant said she wasn’t sure she was allowed to give out that information (which is supposed to be public information).

How does it all add up?

Yvonne Howard premeditated abducting a child from school and conspired with a local grandparent rights group who uses Culmer and Davidson P.A. for circumventing Troxille vs. Granville. Attorney Culmer used to partner with Judge Roberts. Frivolous petitions where filed claiming parents addresses were unknown although living two blocks away at Yvonne Howard’s ex-husband’s house (the step father of the mother of the child). An address Yvonne Howard clearly knew of as she arranged for Christine Pendley to live there ( mother of the child). Yvonne and her attorney were attempting to get a quick win by waiting an entire month before filing a summons for their frivolous petition. The mother then hired Attorney Ashley Severance who works in collaborative law with Attorney Scarlett Davidson unknown to the mother. Scarlett Davidson then files another frivolous petition for the parents to get court appointed attorneys.

Who appoints the attorneys? Attorney Shari Wilson was appointed by a non-legal petition as the record still shows it was incomplete and the video shows was used to simulate legal process to stop trial. Father was about to make a presentation of evidence showing the crimes committed by Scarlett Davidson and her client Yvonne Howard when the sudden announcement came from Mrs. Davidson to stop trial before defense could present evidence about her on the defense’s day of trial.

Judge Crawford allowed it and subsequently his old partner Shari Wilson was appointed to the case who refused to meet with the father and refused to bring his witnesses and evidence.

Attorney Freyberg who volunteers for being the Ad Litem Attorney for the child in these types of cases used to volunteer while working out of the same office as Joseph Culmer in Merritt Island Florida.

So lets clarify:

Father was forced to take attorney Shari Wilson to shut him up and that attorney was Judge Charles Crawford’s (Original Judge on the case who allowed Davidson to stop trial improperly) law partner previous to him being a judge.

Yvonne Howard who judge Crawford found as fact violated the law which is defined as a 3rd degree felony had Attorney Joseph Culmer and Scarlett Davidson (Culmer previously partnered with Judge Roberts the Deputy chief judge).

Guardian Ad Litem Tracey Harrison testified to Yvonne Howard coaching and coercing the child (after Yvonne Howard Kidnapped her) Judge Moxley refused to allow her to testify when Daniel Freyberg, Joseph Culmer and Scarlett Davidson asked she not be allowed to testify claiming she was dismissed it’s a new case (although she was a first hand witness and this clearly shows witness and evidence tampering).

After the testimony of the child being coerced, Daniel Freyberg (Magistrate Jennifer Taylor’s previous partner) was appointed to represent the child who often had discussions with Mrs. Howard at her home.

Does the deputy chief judge support they actions of his previous partner?

So if you find yourself in kangaroo court in Brevard County where the collusion cards are stacked against you and you seek for law enforcement help remember Major Walters says its a civil matter.

A list of Statutes to observe:

Fla. Statute 839.24 

Penalty for failure to perform duty required of officer.—A sheriff, county court judge, prosecuting officer, court reporter, stenographer, interpreter, or other officer required to perform any duty under the criminal procedure law who willfully fails to perform his or her duty shall be guilty of a misdemeanor of the second degree, punishable as provided in s. 775.082 or s. 775.083.
History.—s. 317, ch. 19554, 1939; CGL 1940 Supp. 8663(330); s. 176, ch. 70-339; s. 1033, ch. 71-136; s. 32, ch. 73-334; s. 1, ch. 77-119; s. 1332, ch. 97-102.
Note.—Former s. 925.01.

Public Official Bonds:

This type of bond guarantees the faithful performance of duty by a public official in position of trust. Such bonds are given to comply with statute and, therefore, guarantee whatever liability that statute imposes. Typical bonds within this category include Treasures, Tax Collectors, Sheriffs, Constables, Judges, Court Clerks and Notaries.

Florida Statute 113.071:

Sureties upon official bonds.—The sureties upon the official bonds of all state, county, and municipal officers shall be residents of, and have sufficient visible property unencumbered within the state, not exempt from sale under legal process, to make good their bonds; and the sureties upon the official bonds of all county and municipal officers shall reside within the county where their principals upon such bonds reside, and shall have sufficient visible and unencumbered property in such county, that is not exempt from sale under legal process, to make good their liability on such bonds. Any duly organized and responsible guarantee or surety company, either foreign or domestic, lawfully doing business in this state, may become and be accepted as surety on all such official bonds.

Fla. Statute 839.20

Refusal to execute criminal process.—If any officer authorized to serve process, willfully and corruptly refuses to execute any lawful process to him or her directed and requiring him or her to apprehend and confine any person convicted or charged with an offense, or willfully and corruptly omits or delays to execute such process, whereby such person escapes and goes at large, the officer shall be guilty of a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083.
History.—s. 15, ch. 1637, 1868; RS 2578; GS 3498; RGS 5383; CGL 7522; s. 1030, ch. 71-136; s. 1329, ch. 97-102.

Fla. Statute 839.13

Falsifying records.— (1) Except as provided in subsection (2), if any judge, justice, mayor, alderman, clerk, sheriff, coroner, or other public officer, or employee or agent of or contractor with a public agency, or any person whatsoever, shall steal, embezzle, alter, corruptly withdraw, falsify or avoid any record, process, charter, gift, grant, conveyance, or contract, or any paper filed in any judicial proceeding in any court of this state, or shall knowingly and willfully take off, discharge or conceal any issue, forfeited recognizance, or other forfeiture, or other paper above mentioned, or shall forge, deface, or falsify any document or instrument recorded, or filed in any court, or any registry, acknowledgment, or certificate, or shall fraudulently alter, deface, or falsify any minutes, documents, books, or any proceedings whatever of or belonging to any public office within this state; or if any person shall cause or procure any of the offenses aforesaid to be committed, or be in anywise concerned therein, the person so offending shall be guilty of a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083.
(2)(a) Any person who knowingly falsifies, alters, destroys, defaces, overwrites, removes, or discards an official record relating to an individual in the care and custody of a state agency, which act has the potential to detrimentally affect the health, safety, or welfare of that individual, commits a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084. For the purposes of this paragraph, the term “care and custody” includes, but is not limited to, a child abuse protective investigation, protective supervision, foster care and related services, or a protective investigation or protective supervision of a vulnerable adult, as defined in chapter 39, chapter 409, or chapter 415.
(b) Any person who commits a violation of paragraph (a) which contributes to great bodily harm to or the death of an individual in the care and custody of a state agency commits a felony of the second degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084. For the purposes of this paragraph, the term “care and custody” includes, but is not limited to, a child abuse protective investigation, protective supervision, foster care and related services, or a protective investigation or protective supervision of a vulnerable adult, as defined in chapter 39, chapter 409, or chapter 415.
(c) Any person who knowingly falsifies, alters, destroys, defaces, overwrites, removes, or discards records of the Department of Children and Family Services or its contract provider with the intent to conceal a fact material to a child abuse protective investigation, protective supervision, foster care and related services, or a protective investigation or protective supervision of a vulnerable adult, as defined in chapter 39, chapter 409, or chapter 415, commits a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084. Nothing in this paragraph prohibits prosecution for a violation of paragraph (a) or paragraph (b) involving records described in this paragraph.
(d) This section does not prohibit the disposing or archiving of records as otherwise provided by law. In addition, this section does not prohibit any person from correcting or updating records.
(3) In any prosecution under this section, it shall not be necessary to prove the ownership or value of any paper or instrument involved.
History.—s. 19, Feb. 10, 1832; RS 2571; GS 3483; RGS 5357; CGL 7492; s. 1023, ch. 71-136; s. 1, ch. 2002-386; s. 2, ch. 2007-174.

Brevard County: Deprato – Watzke Family Update

Today, June 6, 2013, it appears Sonya ‘Lisa’ Deprato and her neighbor Jef Fesler had something to say about the Watzke children who Sonya Lisa Deprato has aided in wrongfully taking from Brevard County located in the state of Florida.

Commentators, news anchors, and reporters at TOR News are required to stand firm in the truth that news reporting and political commentary operate independently of each other, and above all else the voice of the people stands separate and as an authority in itself.

Comments on the Watzke story.

Jeff Fesler and Sonya Deprato team up in comments on The Objective Review’s Facebook page.


  • Lisa Freeman DePrato And you’re right, there are NO facts to this story!
  • Lisa Freeman DePrato Thanks, Jeff, people keep telling me that the ones who know and love me wouldn’t believe everything that these people have put all over the internet. Slander…that’s the way to handle it? Thanks again, you and your family are the best friends and neighbors anyone could ever ask for!
  • Jeff Fesler um, got a question. how is a drug addict a drug dealer? When a person testifies now do they speak for other people? also would there might maybe be a reason that there is an emergency injunction in placete? I mean, reporters DO find the reason for things right? seems a little slanted and without facts. just a lot of statements/ assumptions ….could it be that the father is under investigation for child abuse? possibly?
    It appears Jeff Fesler is a neighbor of Sonya Deprato who made a comment on the story while blocking all contact information on his facebook page from the review. We stand behind our reporting and we make our contact information public for inquiry, as reporters do. After the comments made, The Objective Review has more questions for inquiry.
    According to the sworn testimony in Florida, who is Jeff Fesler? Is he the neighbor the Depratos are purchasing the drugs from? Is he the mysterious man that spends the night now and then as testified to? Is he just an uninformed neighbor being used to aid in the Depratos ongoing slander to avoid jurisdiction in Florida? Who is Jeff Fesler?
    The testimony in Florida was to the effect Mandy Deprato said there was no investigation as there was no evidence. She further stated she lived with the mother Sonya Lisa Deprato and had no job. According to that testimony Mandy Deprato stated she and her mother Sonya Lisa Deprato did drugs. When asked where they got the money for the drugs they stated it came from Sonya Lisa Deprato’s state assistance.
    The drug use by the Depratos was backed up by multiple witnesses not just Mandy Deprato.  However today Sonya Lisa Deprato would again use slander to threaten the objective review while fleeing Florida Jurisdiction. Mandy Deprato (Watzke children’s mother), daughter of Sonya Lisa Deprato, was ordered to return the children and not to relocate them from Florida to Tennessee. Instead she fled jurisdiction and apparently obtained the aid of Sonya Deprato to hide them out in Tennessee based on the alleged Florida investigation she told the court in Florida did not exist.
    However she fled to Tenessee the next day and told a Tennesse Judge, Judge Hinson, a Florida investigation existed. It takes no more than common sense to address this issue. Florida would not have awarded the father custody had an investigation existed.
    FLA. CONST. ARTICLE I SECTION 4.Freedom of speech and press.—Every person may speak, write and publish sentiments on all subjects but shall be responsible for the abuse of that right. No law shall be passed to restrain or abridge the liberty of speechor of the press. In all criminal prosecutions and civil actions for defamation the truth may be given in evidence. If the matter charged as defamatory is true and was published with good motives, the party shall be acquitted or exonerated.
    History.—Am. proposed by Constitution Revision Commission, Revision No. 13, 1998, filed with the Secretary of State May 5, 1998; adopted 1998.
    Why have the Depratos fled Florida Jurisdiction where the evidence is clear?
    Jeff Fessler shows the Deprato intent for fleeing jurisdiction.

    Jeff Fessler shows the Deprato intent for fleeing jurisdiction.

OCala: Shooting leaves 3 dead

Ocala shooting, May 2, 2013, Ocala Police Department detectives arrested Andrew Joseph “Punchy” Lobban, 31, of Ocala on three counts of first-degree murder involving a shooting.

It is reported the suspect told investigators that he only intended to shoot one victim. The other victims (Benjamin Larz Howard, 23, of Belleview, and Jerry Lamar Bynes Jr., 20, of Ocala) he reportedly claims he shot by accident.

Reports say Lobban was “punked” in a videotaped incident that occurred within the past couple of weeks. Lobban went to a local shooting range with one of the victims and during that visit Lobban tried to fire a gun and it misfired. The incident was taped, and the video was shared. Reports say he was angered about the incident.

“He just kept harping on that” during his interview with detectives, Scroble said of Lobban. “It really bothered him.”

Each victim was shot once in the head 2 of which were shot in the back of the head.

It would appear 2 victims being shot in the back of the head could be no accident as the shooter reportedly claims.

Fear and Tyranny

‘Fear not Tyranny but the lack of courage to stand against.’

Too many people are only willing to defend rights that are personally important to them. It’s selfish ignorance, and it’s exactly why totalitarian governments are able to get away with trampling on people. Freedom does not mean freedom just for the things I think I should be able to do. Freedom is for all of us. If people will not speak up for other people’s rights, there will come a day when they will lose their own. – Tony Lawrence ( 12/28/95

In Germany they first came for the Communists, and I didn’t speak up because I wasn’t a Communist. Then they came for the Jews, and I didn’t speak up because I wasn’t a Jew. Then they came for the trade unionists, and I didn’t speak up because I wasn’t a trade unionist. Then they came for the Catholics, and I didn’t speak up because I was a protestant. Then they came for me, and by that time there was nobody left to speak up. – Reverend Martin Niemoller, Germany, 1930’s

No constitution, no court, no law can save liberty when it dies in the hearts and minds of men. – John Perkins

“In the United States Senate, one of the things I observed in the early days – and it’s still used – and that is that you take someone’s argument and then you misrepresent it and misstate and disagree with it. And it’s very effective. I’ve done it myself a number of times. But eventually, eventually people catch on.” -Sen. Edward M. Kennedy, speaking at the National Press Club in Washington

Americans are so enamored of equality that they would rather be equal in slavery than unequal in freedom. – Alexis de Tocqueville – “Democracy in America” (1835)

The basic test of freedom is perhaps less in what we are free to do than in what we are free not to do. It is the freedom to refrain, withdraw and abstain which makes a totalitarian regime impossible. – Eric Hoffer, The Passionate State of Mind, p 176, 1955

The people of Asia were slaves, because they had not learned how to pronounce the word ‘no’. – Winston Churchill (citing Alexander the Great), in a radio address – 10/16/1938

“The oppressed are allowed once every few years to decide which particular representatives of the oppressing class are to represent and repress them.”
― Karl Marx

Courage, also called fortitude, is the ability to confront fear, pain, danger, uncertainty or intimidation. It can be divided into “physical courage” — in face of physical pain, hardship, and threat of death — and “moral courage” — in the face of shame, scandal, and discouragement.

“Do remember, though, that sometimes the people you oppress become mightier than you would like.”
― Veronica RothInsurgent

Courage is also known as fortitude, it is the ability to confront fear, pain, danger, uncertainty or intimidation! It can be divided into physical courage in the face of physical pain, hardship and the threat of death and moral courage in the face of shame, scandal and discouragement.  As a virtue, courage is covered extensively in Aristotles Nicomachean Ethics, it’s vice of deficiency brings cowardice and it’s vice of excess brings recklessness.

True courage…has so little to do with Anger, that there lies always the strongest Suspicion against it, where this Passion is highest. The true Courage is the cool and calm. The bravest of Men have the least of a brutal bullying Insolence; and in the very time of Danger are found the most serene, pleasant, and free. Rage, we know, can make a Coward forget himself and fight. But what is done in Fury, or Anger, can never be plac’d to the account of Courage.

Discovering our inner courage is something which presents a different challenge to every one of us because we are all unique and different; we have different fears, different strengths and different weaknesses.   Contrary to popular opinion, courage is not the absence of fear; it is the decision to take action in spite of your fears.  By the way, most of the fears which people have are nothing more than an undeveloped skill set which we have yet to master.  There are good fears, such as those which make us cautious when faced with people, places or things which pose a legitimate danger; and there are unfounded fears such as the fear of failure which can be overcome by taking intelligent action.  Weakness is nothing more than a mental ability or physical muscle set which is undeveloped; weakness can be overcome with exercise in the form of taking action!

“Leaders who do not act dialogically, but insist on imposing their decisions, do not organize the people–they manipulate them. They do not liberate, nor are they liberated: they oppress.”
― Paulo FreirePedagogy of the Oppressed

“I Learned That Courage Was Not The Absence of Fear, But The Triumph Over It. The Brave Man Is Not He Who Does Not Feel Afraid, But He Who Conquers That Fear” Great men and women throughout history have understood courage: I learned that courage was not the absence of fear, but the triumph over it. The brave man is not he who does not feel afraid, but he who conquers that fear.”– Nelson Mandela

Human trafficking: Governor Scott signs new bill for victims

On June 3, 2013 Governor Scott was in the news again for human trafficking and had this to say: ‘While these figures demonstrate that we are improving efforts to protect Florida families, the reality is that even one violent crime is too many. By signing these bills into law, we are continuing our commitment of protecting victims of abuse and making our communities even safer.’

Human trafficking

Human trafficking is the fastest growing enterprise in the world.

Human trafficking is difficult to detect and prosecute because victims live in fear of their captors and of facing prosecution themselves. ‘These offenders need to be brought to justice,’ Manatee County Sheriff’s Office Capt. Todd Shear said. ‘This is certainly going to help us.’

The state’s 2013-2014 budget included critical issues for the Department of Juvenile Justice’s budget priorities, including nearly $11 million for prevention and diversion services. ‘Protecting the victims of this heinous crime is an initiative supported by all members of the Legislature and the Governor. The attention that is being given to this issue will not only help current victims, but also protect future victims by preventing this crime from growing’ according to Representative Darryl Rouson.

‘Now that the definition is broader it will increase the potential of cases’ said Shear (In July 2012, the Florida definition of human trafficking was changed to mirror federal law.) ‘If you are educated in the area of human trafficking, you would recognize it easier,” Shear said. “On the surface it is not going to scream human trafficking. You will see people getting paid, the residence will look normal.’

Many people don’t realize Florida is ranked third in destinations for this to occur, according to Corcuera. Education is key, she stressed, particularly among law enforcers who must identify victims of human trafficking. The Trafficking Victims Protection Act of 2000 (TVPA) defines a severe form of human trafficking as: The recruitment, harboring, transportation, provision, or obtaining of a person for: labor or services, through the use of force, fraud, or coercion for the purpose of subjection to involuntary servitude, peonage, debt bondage, or slavery. Coercion includes threats of physical or psychological harm to children and/or their families.

To effectively combat human trafficking, each of us needs to have a clear “lens” that helps us understand what human trafficking is. When this lens is clouded or biased by certain persistent misconceptions about the definition of trafficking, our ability to respond to the crime is reduced. It is important to learn how to identify and break down commonly-held myths and misconceptions regarding human trafficking and the type of trafficking networks that exist in the United States.

Myth 1: Under the federal definition, trafficked persons can only be foreign nationals or are only immigrants from other countries.

Reality: The federal definition of human trafficking includes both U.S. citizens and foreign nationals – both are protected under the federal trafficking statutes and have been since the TVPA of 2000. Human trafficking encompasses both transnational trafficking that crosses borders and domestic or internal trafficking that occurs within a country. Statistics on the scope of trafficking in the U.S. are most thorough and accurate if they include both transnational and internal trafficking of U.S. citizens as well as foreign nationals.

Myth 2: Human trafficking is essentially a crime that must involve some form of travel, transportation, or movement across state or national borders.

Reality: The legal definition of trafficking, as defined under the federal trafficking statutes, does not require transportation. Although transportation may be involved as a control mechanism to keep victims in unfamiliar places, it is not a required element of the trafficking definition. Human trafficking is not synonymous with forced migration or smuggling. Instead, human trafficking is more accurately characterized as exploitation, a form of involuntary servitude, or compelled service where an individual’s will is overborne through force, fraud, or coercion.

Myth 3: Human trafficking is another term for human smuggling.

Reality: There are many fundamental differences between the crimes of human trafficking and human smuggling. Both are entirely separate federal crimes in the United States. Most notably, smuggling is a crime against a country’s borders, whereas human trafficking is a crime against a person. Also, while smuggling requires illegal border crossing, human trafficking involves commercial sex acts or labor or services that are induced through force, fraud, or coercion, regardless of whether or not transportation occurs.

Myth 4: There must be elements of physical restraint, physical force, or physical bondage when identifying a human trafficking situation.

Reality: The legal definition of trafficking does not require physical restraint, bodily harm, or physical force. Psychological means of control, such as threats, fraud, or abuse of the legal process, are sufficient elements of the crime. Unlike the previous federal involuntary servitude statutes (U.S.C. 1584), the new federal crimes created by the Trafficking Victims Protection Act (TVPA) of 2000 were intended to address subtler forms of coercion and to broaden previous standards that only considered bodily harm. It is important for definitions of human trafficking in the U.S. and around the world to include a wide spectrum of forms of coercion in order for the definition to encompass all the ways that traffickers control victims.

Myth 5: Victims of human trafficking will immediately ask for help or assistance and will self-identify as a victim of a crime.

Reality: Victims of human trafficking often do not immediately seek help or self-identify as victims of a crime due to a variety of factors, including lack of trust, self-blame, or specific instructions by the traffickers regarding how to behave when talking to law enforcement or social services. It is important to avoid making a snap judgment about who is or who is not a trafficking victim based on first encounters. Trust often takes time to develop. Continued trust-building and patient interviewing is often required to get to the whole story and uncover the full experience of what a victim has gone through.

Myth 6: Human trafficking victims always come from situations of poverty or from small rural villages.

Reality: Although poverty can be a factor in human trafficking because it is often an indicator of vulnerability, poverty alone is not a single causal factor or universal indicator of a human trafficking victim. Trafficking victims can come from a range of income levels, and many may come from families with higher socioeconomic status.

Myth 7: Sex trafficking is the only form of human trafficking.

Reality: Elements of human trafficking can occur in the commercial sex industry as well as in situations of forced labor or services. The federal definition of human trafficking encompasses both sex trafficking and labor trafficking, and the crime can affect men and women, and children and adults.

Myth 8: Human trafficking only occurs in illegal underground industries.

Reality: Elements of human trafficking can be identified whenever the means of force, fraud, or coercion induce a person to perform commercial sex acts, or labor or services. Trafficking can occur in legal and legitimate business settings as well as underground markets.

Myth 9: If the trafficked person consented to be in their initial situation or was informed about what type of labor they would be doing or that commercial sex would be involved, then it cannot be human trafficking or against their will because they knew better.

Reality: A victim cannot consent to be in a situation of human trafficking. Initial consent to commercial sex or a labor setting prior to acts of force, fraud, or coercion (or if the victim is a minor in a sex trafficking situation) is not relevant to the crime, nor is payment.

Myth 10: Foreign national trafficking victims are always undocumented immigrants or here in this country illegally.

Reality: Foreign national trafficked persons can be in the United States through either legal or illegal means. Although some foreign national victims are undocumented, a significant percentage may have legitimate visas for various purposes. Not all foreign national victims are undocumented.