Profile cover photo
Profile photo
Venge Elder Abuse
3 followers -
Victims Enforcement Network Gathering Evidence
Victims Enforcement Network Gathering Evidence

3 followers
About
Posts

Post has attachment
Citizen's Public Safety Network VP Task Force™ Educational Resources.


Idaho, Washington Statues & Federal ACTs concerning Vulnerable Person Protection.
Idaho Statutes
I.C. § 18-1505(1), § 39-5302(7)
IC 39-5303, CMS and SSA Title 28 & SSA Subtitle B - Elder Justice, Elder Mistreatment and The Elder Justice Act
~
Washington Statutes
RCW 74.34.020
Repeating ABA Model Rule Violations common in Vulnerable Person and Estate Planning and Guardians and Conservator Litigation:
Rule 1.1, Rule 1.7, Rule 1.8, Rule 1.10, Rule 1.14, Rule 1.15, Rule 1.16, Rule 4.1, Rule 4.2, Rule 4.3, Rule 4.4, Rule 7.1, Rule 8.1 and Rule 8.3.
~
IRS Circular 230; Section 10.5. See Table 2 Below & TEDRA Violations:
I.C § 15-8-103 (e), IC 5-219, IC 18-2403, IC 5-218
~
Legal protection Federal Statutes when Restricted Access at Hospitals and Eldercare Facilities.
Restricted Access of Vulnerable Person with Family at Kootenai Health or other regional Facilities and Hospitals.
Department of Health and Human Services – Centers for Medicare and Medicaid Services: 42 CFR 482
Hospital and healthcare facility access and visitation
If you are being denied visitation to a loved one who is in a nursing home or hospital, this federal bill will help you in all 50 states.
42 CFR 482.13 - Condition of participation: Patient's rights.
• 482.13 Condition of participation: Patient's rights.
A hospital must protect and promote each patient's rights.
(a)Standard: Notice of rights - (1) A hospital must inform each patient, or when appropriate, the patient's representative (as allowed under State law), of the patient's rights, in advance of furnishing or discontinuing patient care whenever possible.
Access and Visitation
The resident has the right and the facility must provide—subject to the resident's right to deny or withdraw consent at any time—immediate access to any resident by:
• Immediate family or other relatives of the resident. (42 C.F.R. §483.10(j)(1)(vii))
• Others who are visiting with the consent of the resident, subject to reasonable restrictions. (42 C.F.R. §483.10(j)(1)(viii))
• The facility must provide reasonable access to any resident by any entity or individual that provides health, social, legal or other services to the resident. (42 C.F.R. §483.10(j)(2))
• If a resident is married, he or she and their spouse must be assured privacy and to be able to share a room if both are residents in the facility and both agree to do so. (42 C.F.R. §483.10(e)(1) and (m))
for more information on this bill, go to https://www.gpo.gov/fdsys/pkg/CFR-2011-title42-vol5/pdf/CFR-2011-title42-vol5-sec483-10.pdf




Data Curated by Corruption Maps - Publishing Newsworthy Public Safety Information.
Crowd-sourced and AI RSS Publication System; Data Gathered from Public Resources, Events, News Articles and Advocate/Victim Witness Accounts of White-Collar Misdemeanor Infractions or Felonious that Often Results in re Irreparable Devastation to Vulnerable Persons.

Citizen's Public Safety Network - Vulnerable Person - VP Task Force: White Collar Crime Tracking GEO API and Relational Database Social Technology Applications.

Person's Submitting Evidence are Protected By Federal Whistleblower Protection Statutes In Conjunction With the US Constitution.
National, state and municipal white-collar civil, felony offences and corruption trends based on AI and crowd-sourced newsworthy public safety awareness sources. Information is then cross-referenced with curated data of alleged or convicted perpetrator profiles. Information is based on historical and current crowd-sourced, advocate researcher and AI harvested news articles, national, state and local news events, and Geo API database resources. This platform uses the latest AI and open-source social technology platforms in combination with citizen public safety reporting systems and public domain data. The sites GEO API maps layer and filter profiles and infractions to visually depict the trends of vulnerable person exploitation, domestic violence and inter-related vulnerable person crimes as each is a systemic societal epidemic; crimes which often are perpetrated hand-in-hand with professional malpractice, collusion and corruption pre-established in various urban and rural regional professionally affiliated networks.

One state example of the legal resources Law Enforcement can utilize to address the repeating patterns of vulnerable person infractions and felonies that consistently occur over a period of time by the same offenders with Federal and statutory civil and criminal violations occurring across county lines, State and even national borders.
CHAPTER 78 RACKETEERING ACT
TITLE 18
CRIMES AND PUNISHMENTS
CHAPTER 78
RACKETEERING ACT
18-7803. DEFINITIONS. As used in this chapter, (a) "Racketeering" means any act which is chargeable or indictable under the following sections of the Idaho Code or which are equivalent acts chargeable or indictable as equivalent crimes under the laws of any other jurisdiction:
(1) Homicide (section 18-4001, Idaho Code);
(2) Robbery, burglary, theft, forgery, counterfeiting, and related crimes (sections 18-1401, 18-1405, 18-2403,18-2407, 18-3123, 18-3124, 18-3125, 18-3601, 18-3602, 18-3603, 18-3605, 18-3606, 18-3607, 18-3609, 18-3610, 18-3614, 18-3615, 18-4630, 18-6501 and 49-518, Idaho Code);
(3) Kidnapping (section 18-4501, Idaho Code);
(4) Prostitution (sections 18-5601, 18-5602, 18-5603, 18-5604, 18-5605, 18-5606, 18-5608 and 18-5609, Idaho Code);
(5) Arson (sections 18-801, 18-802, 18-803, 18-804 and 18-805, Idaho Code);
(6) Assault (sections 18-908 and 18-4015, Idaho Code);
(7) Lotteries and gambling (sections 18-3801, 18-3802, 18-3809, 18-4902, 18-4903, 18-4904, 18-4905, 18-4906 and18-4908, Idaho Code);
(8) Indecency and obscenity (sections 18-1515, 18-1518, 18-4103, 18-4103A, 18-4104, 18-4105, 18-4105A and 18-4107, Idaho Code);
(9) Poisoning (sections 18-4014 and 18-5501, Idaho Code);
(10) Fraudulent practices, false pretenses, insurance fraud, financial transaction card crimes and fraud generally (sections 18-2403, 18-2706, 18-3002, 18-3101, 18-3124, 18-3125, 18-3126, 18-6713, 41-293, 41-294 and41-1306, Idaho Code);
(11) Alcoholic beverages (sections 23-602, 23-606, 23-610, 23-703, 23-905, 23-914, 23-928, 23-934 and 23-938, Idaho Code);
(12) Cigarette taxes (sections 63-2505 and 63-2512(b), Idaho Code);
(13) Securities (sections 30-14-401, 30-14-402, 30-14-403, 30-14-404, 30-14-501, 30-14-502, 30-14-505 and 30-14-506, Idaho Code);
(14) Horseracing (section 54-2512, Idaho Code);
(15) Interest and usurious practices (sections 28-45-401 and 28-45-402, Idaho Code);
(16) Corporations (sections 18-1901, 18-1902, 18-1903, 18-1904, 18-1905, 18-1906 and 30-1510, Idaho Code);
(17) Perjury (sections 18-5401 and 18-5410, Idaho Code);
(18) Bribery and corrupt influence (sections 18-1352 and 18-1353, Idaho Code);
(19) Controlled substances (sections 37-2732(a), (b), (c), (e) and (f), 37-2732B, 37-2734 and 37-2734B, Idaho Code);
(20) Motor vehicles (sections 49-228, 49-231, 49-232 and 49-518, Idaho Code);
(21) Terrorism (section 18-8103, Idaho Code).
(b) "Person" means any individual or entity capable of holding a legal or beneficial interest in property;
(c) "Enterprise" means any sole proprietorship, partnership, corporation, business, labor union, association or other legal entity or any group of individuals associated in fact although not a legal entity, and includes illicit as well as licit entities; and
(d) "Pattern of racketeering activity" means engaging in at least two (2) incidents of racketeering conduct that have the same or similar intents, results, accomplices, victims or methods of commission, or otherwise are interrelated by distinguishing characteristics and are not isolated incidents, provided at least one (1) of such incidents occurred after the effective date of this act and that the last of such incidents occurred within five (5) years after a prior incident of racketeering conduct.

Report Perpetrator's and Contact your Congressman's office.

Please contact your Congressman's office and State legislators to inform them how in-partitive that Vulnerable Persons and those assisting them need their attention and commitment to help the public citizens combat professional exploitation, negligence and malpractice. Vulnerable persons, especially dependent persons need to have have greater protection when perpetrators have ceased control of their free agency or when they the VP is to afraid or deceived to understand their precarious circumstance.
These person are often unduly influenced, in fear, denial or acquiesced to a state of perpetual submission and learned helplessness in order to survive their abuser and those acting in concert with the exploiter to achieve their ambitions, These vulnerable victims and and those advocating for therm need access to affordable resources to: 1) report their circumstance in a safe environment, 2) have their circumstances accurately vetted and objectively investigated on every side of the circumstances, not just the non-fact based accounts or fictitious projections of the current persons whom have insidiously usurped control of their affairs and confidential relations.
It is often best to contact political offices supported by the public taxpayer to ensure their public safety in writing and send a copy of your letters to Vulnerable Person Advocacy groups like the Citizen's Public Safety Network.

Abuse, Negligence, Exploitation, Malpractice:
"See It, Lot It, Blog It, Post It, Share It, Map It, . . . STOP IT!

Data Curated by Corruption Maps - Publishing Newsworthy Public Safety Information.
Crowd-sourced and AI RSS Publication System; Data Gathered from Public Resources, Events, News Articles and Advocate/Victim Witness Accounts of White-Collar Misdemeanor Infractions or Felonious that Often Results in Irreparable Devastation to Vulnerable Persons.

Citizen's Public Safety Network - Vulnerable Person - VP Task Force ™: White Collar Crime Tracking GEO API and Relational Database Social Technology Applications.

Add a comment...

Post has attachment
Photo
Add a comment...

Post has shared content

Post has attachment

Post has attachment
Kootenai County, Spokane County, Stevens County Elder Exploitation Includes the Elders own Estate Planning Attorneys http://www.krem.com/news/i-was-basically-dead-elderly-woman-describes-horrifying-years-of-abuse/416279241
Add a comment...

Post has attachment

Post has attachment
Add a comment...

Post has attachment
Add a comment...

Post has attachment

Post has attachment
Wait while more posts are being loaded