My Blog

California hands out millions of dollars in tax credits to filmmakers. Can the rest of us get some too?

I think Quentin Tarantino is a fine filmmaker. From “Reservoir Dogs” to “Jackie Brown” to “Inglourious Basterds,” he delivers. ”Pulp Fiction” may just be the greatest movie of its era.

But, as a resident of California, I’ve got a problem. Not with him personally, but with the financing of his latest film.

He recently had to drop his longstanding business relationship with Harvey Weinstein (for obvious reasons) and shop his ninth feature, a story related to the Charles Manson murders, to the major studios.

Sony got the project. But, in addition, his film will receive an $18 million production tax credit from the California Film Commission, for which it will be shot in-state.

Tarantino’s project is only one of several films getting a big break. They’re all part of a tax credit program created by the California Legislature that, over the years, will offer hundreds of millions of dollars in tax credits.

The Film Commission justifies its actions by claiming California needs the program to compete for projects.

Really? Then how does the state justify hitting up its taxpayers for so much? We residents do even more business in the state than film companies, but we’re not getting any breaks.

Quite the opposite. California has the highest income tax rate in the nation. The state’s top rate is 13.3 percent. Some dismiss it, saying that’s just for millionaires, but if you make just $43,000 the rate is 8 percent, and if you make $54,000 it’s 9.3 percent.

California also has a huge gasoline tax and the highest state-level sales tax in the nation. Overall, Californians shoulder one of the largest tax burdens in our country. And while we’re at it, the state also ranks high in the burden it places on businesses.

So I have to ask: If Golden State leaders believe giving a tax break to filmmakers is good for the local economy, why don’t they want to give a break in general to all residents? Sauce for the goose and all that.

My guess is that Tarantino was going to film in-state anyway. The Manson murders took place here, and when he’s got a story set in California, he shoots here.

But even if he might have gone elsewhere for a better deal, guess what? It’s not that hard for an individual citizen to pack up and leave a state if another one offers a better deal. That goes double for businesses.

On top of which, high taxes can discourage people from moving here, and from locating their business here. (The numbers seem to bear this out. In recent years, the rate of population growth has been cut to less than half of what it was.)

So if the state wants to make it easier on Tarantino, can’t they also try to take it easier on me, and tens of millions of my fellow Californians?

In effect, my tax money is going to subsidize Tarantino’s film. I’ll be the first in line to buy a ticket when it opens, but don’t make me an unwilling investor. Not unless I get to own a piece of it.

Steve Kurtz is a producer for the Fox News Channel, and author of “Steve’s America (the perfect gift for people named Steve)”.

Read more:

adminadminCalifornia hands out millions of dollars in tax credits to filmmakers. Can the rest of us get some too?
read more

When is it not OK to pet a stranger’s dog?

Image copyright Carol Willacy
Image caption Carol Willacy says even working dogs like Charlie, left, get “horrendous” attention from strangers

“I’m working” or “do not disturb” are messages usually worn by a guide or assistant dog.

The Royal National Institute of Blind People says petting a working dog risks “distracting the dog from its work” and “could put its owner at risk of danger”.

But some pet owners are also saying they don’t like strangers stroking their non-working dog.

Contact can also be a problem for owners of shy dogs, deaf dogs and puppies prone to bite or growl. Here’s why some people are saying: “Please don’t pet my dog.”

1) ‘My dog’s deaf’

Image copyright Debra Dorrans

Debra Dorrans’ black labrador-staffie Benny is 14 and has lost his hearing – so she worries “he might get a fright” if people come up to him and stroke him.

She also recently adopted seven-year-old Sam, a white westie who gets nervous around other dogs and children.

“I have heard of dogs biting children that have then had to be put down,” she says.

“I’ve never been in that position, but I’m always aware.”

Debra, a retired nurse, is one of 12,000 members of Facebook group Reactive Dogs, which brings together owners of dogs who show excessive fear or aggression around strangers.

“I always put my dogs first,” says Debra.

“I don’t want them to get into any trouble or bite someone.”

She says she’s not afraid to say no to people who want to pet her dogs, but warns that “you have to keep your wits about you”.

“One day a small child ran up to Benny and wrapped his arms around him. I told the parents they shouldn’t do that, but they didn’t really seem to understand.”

2) ‘Quite alarming’

Image copyright Dale McLelland

“I’m not embarrassed to say to someone – please don’t pet my dog,” says Dale McLelland, from Ayrshire, owner of two-year-old Hattie.

She says people “absolutely make a beeline” for the old English sheepdog.

“It’s hairy dog syndrome. She looks so cute.”

But she explains it can be “quite alarming for her” if too many people approach Hattie during her walks.

Dale, who has worked as a dog behaviourist for 10 years, says dogs can find strangers’ hugging and petting intrusive.

“Can you imagine if you were on a train and every second person came over and touched you, how uncomfortable that would make you feel?”

Dog person? The correct way to pet a stranger’s pooch

  1. Never leave your child alone with a stranger’s dog
  2. And don’t approach a dog without an owner around
  3. Only stroke the a dog if the owner says, “Yes, you can”
  4. Get the dog to sniff your hand first, then stroke gently
  5. If a strange dog approaches you – stand still, look away and cross your arms

Source: Dogs Trust

Dale avoids busy places, and volunteers for Yellow Dog, a US-based project that advocates putting a yellow ribbon on a dog to show that they need space.

“The problem is, not many people know what the ribbon means – and those that do are normally clued up.”

She adds: “I had rottweilers for 20 years – and only people who probably knew the breed came over and touched them.”

3) ‘My dog IS working’

Image copyright Carol Willacy

But even working dogs get disturbed, according to those who rely on them.

Carol Willacy says her assistance dog Charlie, a golden labrador, is “my life, everything” – but that the attention he gets from strangers can be “horrendous”.

She says about 50 people will approach her on a trip to the supermarket, even if he is wearing his harness.

“The ‘do not distract’ message doesn’t make a difference,” she says.

“There’s a saying at least half of people come out with, ‘I know I’m not supposed to touch your dog, but…'”

Carol, 48, suffered a spinal injury as a teenager and also has functional neurological disorder (FND), meaning she uses a wheelchair and had to give up her job as a pharmaceuticals account manager.

Three-year-old Charlie helps Carol by passing her things and, crucially, detects and warns her if she is unwell.

“If your dog is going to tell you you’re not feeling well, you want that dog to be focused and not stroked and stopped,” she says.

“My previous assistance dog was a little Jack Russell and we had the same problem. He had to retire as he got grumpy with people,” she says.

4) ‘I’m training my puppy’

Image copyright Luke Balsam

Dog trainer Luke Balsam, who runs a school in London, says puppies in particular should be left alone – as they are still getting used to walks and being around strangers.

“People are drawn to puppies,” says Luke, who owns a cocker spaniel, Indie.

“But some don’t think it’s necessary to ask the owner’s permission.”

In London, where lots of people live in flats and might not own a pet, seeing dogs on the Tube or in cafes can be a novelty.

Luke says public-shy owners should go “off the beaten track”, like a wooded area, until they have trained a puppy or dog to walk around in busy places.

But he says anyone worried their dog might bite or nip a person should use a muzzle.

“It’s definitely recommended,” he says.

“The muzzle should be an essential part of training your dog, and they can be taught to enjoy wearing it.”

Related Topics

Read more:

adminadminWhen is it not OK to pet a stranger’s dog?
read more

5 Famous Movie Scenes Every Single Person Gets Wrong

Certain groups, whose names we shall not mention (*cough*), have made careers out of pointing out the ridiculous shit pulled by Hollywood screenwriters who don’t want to put in the time or effort to produce a credible scene. But once again, and to the surprise of absolutely no one, it turns out that we might be the assholes here. Some of the most butt-stupid scenes in movie history make a whole lot of sense if you simply look at them a bit closer. For example …


Superman Didn’t Rewind Time By Reversing The Earth’s Rotation

In the climactic scene of 1978’s Superman, Supes is far too busy saving the entire West Coast from a nuclear missile attack to notice the ground swallowing up Lois Lane’s candy red Ford Custom. What follows is one of the most lambasted movie scenes in superhero history.

After briefly grieving over the dead yet remarkably unsquished Lois, Superman blasts off into the atmosphere and does laps around the world until he reverses the planet’s rotation. Rather than causing every last living human to take simultaneous pratfalls, this somehow manages to rewind time itself. And if you can watch that scene without making a wanking gesture so hard it sprains your wrist, you should be rewarded for your fortitude.

But Actually …

Superman didn’t reverse time by causing the world to spin backward, but by flying faster than light — a power he’s canonically had ever since he was a wee Superboy, when he sent Ma and Pa Kent back in time to do some 18th-century swashbuckling.

DC Comics
And swinging …

Audiences have been misinterpreting the scene. The Earth spinning backward isn’t the cause of time moving in reverse; it’s just another effect, like the falling rocks flying back upward and the crumbling dam sucking its water back in.

Now, is it still dumb that Superman can basically yank a brand-new superpower out of his super-shorts whenever the plot demands it? Well, you can take that up with nearly a century’s worth of comic book writers, not us.


Nobody Ever Said The White Guy Was The Last Samurai

The Last Samurai has to be one of the most oblivious pieces of cultural insensitivity Hollywood ever produced. If assigning the role of the titular last samurai to a diminutive Scientologist was somehow making a statement, we’re fairly certain we don’t want to hear what exactly the filmmakers were stating.

But Actually …

Whoever said Tom Cruise was the last samurai? It may have been his rugged visage next to the title on the movie posters …

Warner Bros. Pictures

… but the true last samurai (plural) were the group of warriors with whom his character trained and fought. He may have learned from them and even taught them a thing or two about Americans (read: guns), but he could never truly hope to be one of them, if only because of the height requirement.

The last samurai (singular) was the final survivor of that group, Katsumoto. Based upon Saigo Takamori, who is considered to be the bona fide last samurai, Katsumoto meets his end the same way his real-world counterpart did: by following the samurai code and committing ritual seppuku. Unlike his real-world counterpart, he does so with assistance from Cruise’s character — who, in true American fashion, completely fucks it all up.

Warner Bros. Pictures
To be clear, Cruise’s real role here would have been to behead Katsumoto to end his suffering.

The ending narration even makes a point of explicitly differentiating between the two — the “American captain” who lives to fade into obscurity, and the samurai, whose days had come to an end. Really, the film is another victim of our tendency to associate the lead character with the title. Like how Die Hard is the harrowing tale of Mr. Jonathan Diehard.


The Silly Dinner Scene From Indiana Jones And The Temple Of Doom Was An Elaborate Clue

Indy and friends’ arrive at Pankot Palace in India, where they’re invited to come slurp on a variety of dishes, each more horrifying than the last. Like live snakes which slither out of another, bigger snake …

… chilled monkey brains served straight from the cranium …

… and soup that wishes it only had flies in it:

Obviously, this is all nothing more than a throwaway bit of gross-out humor. Let’s all laugh at the backwards savages, with their brown skin and repulsive eating habits! And how ’bout them funny hats, huh? Huh?

But Actually …

The whole scene was a stomach-turning hint that something was amiss in Pankot Palace. See, the people putting on this feast were purportedly Hindus. And as Indy remarks to Captain Blumburtt in the original script, “Even if they were trying to scare us away, a devout Hindu would never touch meat. Makes you wonder what these people are …”

As we find out a few minutes later, that’s because they are in truth members of the heart-yanking Thuggee cult. Of course, we could’ve known that right away, if only we’d been paying attention to how the vegetarian palace’s inhabitants retained fucking Clive Barker as their personal chef.


Princess Leia’s Inexplicable British Accent Was Pretty Explicable

Listen, Star Wars is great, but continuity has never been its strong suit. Take this scene, for instance.

One minute, Princess Leia is speaking to Grand Moff Tarkin as if the two are about to have tea, the next she’s berating Chewie in an accent best described as “cabbie.”

But Actually …

By her own admission, Carrie Fisher was approximately 78 percent cocaine while filming Star Wars. But Claudia Grey, author of Star Wars: Bloodline, has an official canonical explanation for the linguistic slip-up: Leia was merely being her usual, wisecracking self: “[Leia is] actually making fun of Tarkin. She’s mocking his accent in that moment.”

That’s believable, considering the very first words out of her mouth are informing Tarkin that he smells like the polite equivalent of a Taco Bell dumpster.


Independence Day‘s Groan-Inducing “Virus” Solution Might Make Sense

Quick refresher for those of you who have rage-repressed the memory: At the climax of Independence Day, Jeff Goldblum and Will Smith fly into an invading alien mother ship, where Goldblum whips out his trusty MacBook (circa 1996) and hacks the script into letting the good guys win. Of course, as everybody knows, Apple and the aliens’ operating systems would not be compatible.

But Actually …

According to the film, humanity has had an alien fighter collecting dust in Area 51 since 1947. That’s plenty of time for the world’s brightest minds to reverse-engineer some alien tech. In fact, since the discovery of the ship predates modern computers, our own technology might even be derived from the ship’s system. So connecting a MacBook to the ship isn’t so far-fetched, seeing as how we had decades to design an interface, and it might have even been developed from the same starting point in the first place. If we’re calling bullshit on anything, it should be that the aliens made it to Earth at all, since they’re essentially using Apple Maps.

Saikat Bhowmik is a kid who has grown a beard to look like a grown-up. You can follow him at Twitter, and visit his channels Amuzic and Amuzic II. Quinn “Yes, It’s Pronounced ‘Kenobi'” Knobbe is a child who never grew up. For more of his idiotic musings, follow his Facebook here. Mike Garowee works a dairy farm in New Hampshire. Jordan Breeding has a blog, a Twitter, and is the world’s premier Gerard Butler apologist.

All dogs look great in a Superman costume, it’s scientifically proven! Not to mention Batman and Wonder Woman.

If you loved this article and want more content like this, support our site with a visit to our Contribution Page. Or sign up for our Subscription Service for exclusive content, an ad-free experience, and more.

Read more:

adminadmin5 Famous Movie Scenes Every Single Person Gets Wrong
read more

Security News This Week: Android Tracks Your Location Even When You Ask It Not To

As you emerge from your turkey-induced coma, take a moment to reflect on the past week in security, which despite the holiday was chock-full of wonderments. From Uber shadiness to Android location-tracking, it was quite the whirlwind.

Uber made headlines midweek when it came out that the company had not only been breached a year ago—coughing up the personal info of 57 million users—but paid the hackers $100,000 to keep it quiet. The failure to disclose a security breach is not only ethically dubious, it’s also outright illegal in many states, which means we could see some serious fallout.

One person who likely won’t get his comeuppance? The Iranian hacker who allegedly invaded HBO and released Game of Thrones spoilers and full, unaired episodes of a handful of shows. The FBI thinks they’ve got their man, but acknowledge that actually arresting him will be tricky, given the lack of an extradition agreement with Iran. Justice may come sooner for robocall victims, thanks to a slew of enforcement measures that have finally started to take shape.

If you’re looking for panic-worthy news, Intel conceded that its Management Engine was riddled with vulnerabilities that would allow for the complete takeover of millions of PCs, as well as most recent servers and IoT devices with Intel inside. Since hardware manufacturers need to push out the fixes, it could take a while to clean up. And we took a look at the ‘administrative incompetence’ that has hamstrung the Global Engagement Center’s fight against Russian propaganda at a time when the US can least afford it. Also: Count “spotting missile sites hundreds of times faster than humans” among AI’s increasing number of talents.

And who’s a good dog? These are good dogs. Maybe the best dogs.

And there's more. As always, we’ve rounded up all the news we didn’t break or cover in depth this week. Click on the headlines to read the full stories. And stay safe out there.

Google Tracks Android Location Even When You Tell It Not To

In a perplexing violation of privacy norms, Android phones collect the location of nearby cell towers even if you’ve turned off location services. The company confirmed the practice to Quartz, saying that the feature was in place to improve push notifications and messages. It also said it would stop doing so by the end of November.

In many ways, the headline sounds scarier than what it means in practice. Google encrypts the data in transit, and says it doesn’t store any of it. It’s also distinct from the location data that it provides app developers and advertisers. Someone could conceivably use the location data for ill if they’ve compromised an Android device, but by that point they’d likey have access to the phone’s location—and even more sensitive information—already.

None of which excuses Google! It’s still an extremely bad look to collect location info on people who are unaware, especially given the many, many situations where a person has reason to fear for their safety if their location at any given moment were widely known. At best, Google’s overreach was incredibly tone deaf and intrusive. At worst, it could have had serious real-world consequences.

Another Week, Another $30 Million Cryptocurrency Heist

Cryptocurrency values keep skyrocketing, but the thefts haven’t slowed down either. The latest victim: Tether, a cryptocurrency pegged to the dollar. Its operators say that an “external attacker” stole over $30 million worth earlier this week. The company says it was taking steps to freeze the funds. More details are scare—and Tether ended up deleting its initial blog post on the matter—but let it serve as yet another in a long series of warning about locking down your cryptocurrency, or maybe even, just a thought, sticking with traditional money until the security situation calms down.

Ransomware Is a $2 Billion a Year Business

While major outbreaks like WannaCry and NotPetya grab the headlines, ransomware is a daily disturbance, taking in more than $2 billion in 2017 alone, according to security firm Bitdefender. That doubles last year’s payout of a billion dollars, thanks in part to a major spike in the average demand, which hit $1,000—over 250 percent higher than in 2016. As if that’s not bad enough, it also doesn’t take into account the ancillary costs, like the hundreds of millions of dollars that Maersk lost dealing with NotPetya. There are some ways you can protect yourself, but most of the standard malware advice applies: Don’t click on or download anything you don’t trust, and make sure you keep a backup of all of your stuff just in case.

The Air Force Taps a Defense Contractor For Cyber Protection

Cyberthreats will only escalate from here on out, so the Air Force Research Lab will hand over nearly $50 million to Ball Aerospace & Technologies to investigate ways to keep analog weapons safe from digital intrusion.

Read more:

adminadminSecurity News This Week: Android Tracks Your Location Even When You Ask It Not To
read more

Video Footage Shows Crab Climbing A Tree, Killing A Bird And Eating It

Animals are unpredictable creatures at the best of times. Take your family dog as an example, one minute it’s behaving itself impeccably, the next, it’s racing off into the distance as you hopelessly shout its name.

Luckily, dogs are a little more researched – there is very little that you cannot glean about their behavior by a quick Google search. Meanwhile, other little known animals roam the planet under the watchful eye of scientists who aim to understand them. One of these particular animals is the coconut crab. The creature, which looks like something you conjured up in your worst nightmare, is a far cry from the tiny specimens you catch with a $3 crab line at the beach. Found predominantly in Indonesia, the coconut crab has seen its population diminish over the years as they are hunted by humans. Extinct in some local areas, the enormous creatures have become popular with research scientists who hope to conserve them. However, many are calling for coconut crabs to be exterminated after haunting video footage of a colossal crab devouring a BIRD emerged online… The crab’s peculiar behavior was observed by researcher, Mark Laidre, who witnessed the sinister moment that the crab climbed a tree to seek out its prey. He watched, dumbfounded, as the crab used its colossal pincers to pinch the bird out of its nest where it had been cosily sleeping. The struggling bird then plunged to the ground where it met its gruesome fate. Up until now, it was believed that coconut crabs feasted predominantly on fleshy fruits. Often they consume dead animals and unfortunate tortoise hatchlings, but rarely have they been seen to stalk and kill their own prey. This rare observation has caused alarm among those who never feared the coconut crab, which harnesses a colossal strength. Many question if the creatures are developing a taste for blood as they evolve, after being mercilessly kicked out of their natural habitat by humans who have claimed their home as their own. The chilling footage shows the crab pierce the struggling birds flesh with its pincers, before it goes on to break its wings. Completely defenseless, the bird has no way to protect itself from its impending death. “At that point, when both its wings were broken and it was on the ground, it couldn’t go anywhere,” said Laidre. As the killer crab began to consume its haul, five more crabs descended on the “gruesome” scene. The incident has prompted Laidre to plan further research into the creature’s habits. He now intends to rig the area with hidden cameras so that he can monitor their behavior further. The peculiar incident has left residents of the area uncomfortable, which is understandable when you learn that coconut crabs can generate a force which is comparable to a lion’s bite. In fact, there is a goosebump-inducing theory that the body of iconic female aviator, Amelia Earhart was never found because she’d been eaten by coconut crabs. The American adventurer went missing in 1937, with no hint of her being seen since. The moral of this story: stay away from coconut crabs. Which shouldn’t be a challenge given their terrifying appearance. If you are curious by these peculiar creatures, then this video will tell you all that you need to know – including how to cook them! They are quite the delicacy on islands across the Indian Ocean…

Read more:

adminadminVideo Footage Shows Crab Climbing A Tree, Killing A Bird And Eating It
read more

How One Woman’s Digital Life Was Weaponized Against Her

The first time the police arrived on her doorstep, in March of 2015, Courtney Allen was elated.

She rushed to the door alongside her dogs, a pair of eager Norwegian elkhounds, to greet them. “Is this about our case?” she asked. The police looked at her in confusion. They didn’t know what case she was talking about. Courtney felt her hope give way to a familiar dread.

Three days earlier, Courtney and her husband, Steven, had gone to the police headquarters in Kent, Washington, a suburb of Seattle, and reported that, for the past few months, they had been the victims of a campaign of online harassment. They had found a fake Facebook page under Steven’s name with a profile picture of Courtney, naked. Emails rained down in their inboxes; some called Courtney a cunt, whore, and bitch, and one they felt was a death threat. Her coworkers received emails with videos and screenshots of Courtney, naked and masturbating. The messages came from a wide range of addresses, and some appeared to be from Steven.

There were phone calls too. One to Steven’s grandmother warned that her house might burn down, with her in it, if she didn’t stay out of the Allens’ lives. There were so many calls to the dental office where Courtney worked that the receptionists started to keep a log: “Called and said, ‘Put that dumb cunt Courtney on the phone,’ ” one of them wrote in neat, bubbly handwriting. “I said, ‘She is not here at the moment, may I take a message?’ ” At one point Courtney created a Google Voice number to ask, “If I talk to you, will you leave me alone?” Instead, dozens of voicemails poured in: “Do you think I’m ever going away?” one said. “Now that my private investigator went and got all the tax information? There’s no job either one of you guys can have that I won’t know about and be there.”

The Kent police officer who took the Allens’ statement seemed unsure of what to make of their story. Courtney and Steven told him who they believed was behind the harassment: a man in Arizona named Todd Zonis with whom Courtney had an online relationship that she had recently broken off. She says she told the officers that she had sent Zonis the videos of herself while they were still involved and that he had sent ones of himself to her, but that she had deleted their exchange. In a report, the officer noted that, while Courtney and Steven insisted that his role was obvious, Zonis’ name barely appeared in the folder full of printouts and CDs that they had with them. The officer assigned them a case number and advised them not to have any more contact with Zonis.

Now, three days later, the two officers on Courtney’s doorstep explained why they had come: An anonymous tipster, who claimed to work with Steven, had left a report on the Crime Stoppers website. It said that Steven “had been telling everyone for months that his wife was leaving him but he had a plan to beat her into staying.” The tipster added that he had noticed “a lot of bruises.” When prompted for more information on the suspect, the informant wrote that the Allens had a “large gun collection” and two big dogs. (One detective later noted that some of the reports seemed designed to trigger “a large/violent police response.”)

December 2017. Subscribe to WIRED.

Rebecca Benderite/Eyeem/Getty Images

The police left after interviewing Courtney, but three days later, two detectives knocked on the Allens’ door in the early afternoon. Courtney wondered, more cautiously this time, if she would now get a response to her complaint. But no—the detectives were investigating another anonymous tip. This one was about an alleged incident at a park involving Steven and the Allens’ 4-year-old: “His son screamed and he smacked him repeatedly on the back, butt, legs, and head, but not the face,” the tipster wrote. “He then berated his wife, calling her ‘whore’ and worse … She covers for him when the abuse is to her, but abuse to the child I don’t know what will happen.”

In her report of the visit, detective Angie Galetti wrote that the Allens’ son “came downstairs and appeared to be happy and healthy.” She described how Courtney had to coax her nervous son into showing his skin to the detectives: “There was no suspicious bruising or marks of any kind,” she wrote. He “appeared appropriately attached to his mother and Detective Lorette and I had no concerns.”

But Courtney’s concerns were mounting. The day before, she had gotten an email to an account she only used for spam. “How did you even GET this email address?” Courtney wrote back. “Leave me and my family alone!” A reply came accusing Steven of also using unsavory cybertactics to find out about Courtney’s online behavior, but added: “I am MUCH better at it. For example. Your Jetta, in the driveway”—and yes, that’s where it was. The message included the car’s vehicle identification number. Courtney had started having nightmares; just going outside made her afraid. She felt violated by the images of her that were circulating who knew where, and anxious about what might come next.

And now this. It was “one of the worst moments of my life,” she said later, hoping that help was coming but instead “having to lift up my son’s shirt and show them my son’s body to make sure he had no bruises.” When the detectives asked for her phone number, she realized she didn’t remember it—she had just changed it in an attempt to evade the endless calls. She found herself sobbing in front of the detectives. The harassment was so creative, so relentless, so unpredictable. Around the same time, at least 15 of her neighbors received a “community alert” in the mail warning them that they were living near a dangerous abuser, Steven Allen. It was postmarked from Arizona.

But the most frustrating thing was how hard it all was to explain or prove. Courtney was beginning to feel trapped in a world of anonymous abuse. She didn’t know if she would be able to convince anyone that what she believed to be happening was real.

It began, as relationships often do these days, online. From the start it was a strange and tangled story of exposure and distrust in the internet era.

In the fall of 2012, Courtney and Steven had been together for 12 years but had known each other for 20: They met in a high school biology class and reconnected later when Courtney was going through a divorce. The couple—now in their mid-thirties, with a house full of fantasy books and clay dragons that Courtney sculpted—were avid players of Grepolis, an empire- and alliance-­building browser game set in ancient Greece.

One day a player in an opposing alliance asked if he could join theirs. The small council that ran the alliance agreed. This was Courtney’s first introduction to Todd Zonis and she liked him from the start: “He was crude and rude and I thought it was actually kind of funny,” she says.

Courtney’s player name was sharklady76. As she recalls it, Zonis sent her a note on the game’s messaging service to say he had once owned a shark, and from there the conversation took off. They talked about gardening and pets. She shared pictures of her elkhounds; Zonis sent ones of his tortoise. The two progressed to video-chats. Both were married, but “it just kind of grew from there,” Courtney remembers. “It was a really strong friendship and then turned into not a friendship.”

At the time, Courtney was staying home with her toddler. She and Steven had made that decision together, but still, it was rough on their marriage: Steven was working long hours as an IT instructor and felt the stress of being the sole breadwinner. He often traveled for work. Courtney was a nervous new mother, afraid to let her son stay with sitters, which only increased her sense of isolation. She was often angry at Steven, whom she began to see as controlling and neglectful.

Zonis was a freelance sound engineer with a flexible schedule. The relationship with him offered “an escape,” Courtney says: “He was charming. He told me everything that I ever wanted to hear about how wonderful I was.” She adds, “I just thought the world of him. Because it was online, it was very easy to not see the faults someone has, to not see warning signs.” Eventually Courtney was spending a lot of time online with Zonis and pulling further away from Steven. She kept telling herself that they were just good friends, even when Zonis sent her a penis-shaped sex toy. One day, nearly a year after Zonis first joined the alliance, Steven noticed Courtney’s email open while updating her laptop. He read an exchange between her and Zonis. It was explicit, and it mentioned videos. He confronted Courtney. She was furious that he had read her emails but said she would stop communicating with Zonis. Instead, she moved the relationship to her tablet, behind a password; she also labeled Zonis’ contact information with a fake name.

She wanted to be sure Steven wasn’t the mastermind of a complex scheme.

Steven, sensing his marriage falling apart, turned to Google. He searched “adultery” and “online affair” and found a website called Marriage Builders that bills itself as “the #1 infidelity support site on the internet.” It was founded by Willard F. Harley Jr., a psychologist who encourages his readers to work to understand and meet their spouse’s needs but also recommends a radical response when a spouse won’t end an affair: making it public to the family of the people involved. Love, he writes, should be based not on trust but on transparency. “Imagine how little crime would be committed if everyone’s activities were videotaped.”

Steven tried to follow Harley’s advice for healing a marriage. He apologized for being distant and tried to get Courtney interested in answering the site’s questionnaires. But Courtney, often busy on her tablet, was leery of the Marriage Builders philosophy.

In November of 2014, just over a year after first seeing Courtney’s emails with Zonis, Steven noticed her tablet unlocked on the counter. She was in the shower, so he looked. He saw messages from a name he didn’t recognize but a writing style that he did. He then found more messages. The relationship hadn’t ended. His mind went to the advice from Marriage Builders: “Exposure helps prevent a recurrence of the offense. Your closest friends and relatives will be keeping an eye on you—holding you accountable.”

A few days later, Steven contacted his parents and Courtney’s parents and told them about the relationship. He found Zonis’ wife and wrote and texted her. He looked up Zonis’ parents on a people-finder site. “I would ask that you encourage your son to stop this affair before it completely ruins our family,” he wrote, adding that he had heard that the Zonises had an open relationship. “If you have any questions or would like to see some of the evidence, please email me.”

Courtney was livid. She told Steven not to come home that night; when he did, she took their son to her parents’ house. She returned the next day, but they slept in separate rooms and Courtney discussed divorce.

Zonis, too, was outraged. He saw the messages that Steven sent as an attack on his family, and one that was unjustified. Zonis tells the story of the relationship differently. After he joined the alliance, he says, he noticed Courtney talking about her husband in forums in a disturbing way, saying he was controlling and would punish her. He says Courtney reached out and became friends with him and his wife, Jennifer—“The two would chat, you know, for hours,” he says—though Courtney denies this. She asked a lot of questions about their marriage, he says, looking for advice. He denies that either he or Courtney ever sent explicit videos, or that they were more than friends.

To Zonis, calling his relationship with Courtney an “affair” was a false characterization and cost him dearly; Steven’s comment about an open marriage, he says, turned his parents against him. He claimed that his parents cut off contact and wrote him out of their will, which meant he would not inherit the “ancestral home.” In total, he says he lost an inheritance worth more than $2 million. Zonis began saving for a lawyer so he could take Steven to court. “He destroyed my family,” Zonis says, “just to basically keep his own wife in line.”

After the “exposure,” the Allens received barrages of virulent emails from Zonis’ account. He later denied writing both the anonymous emails and some that came from his account, speculating that perhaps someone to whom he’d told his story had taken it upon themselves to punish the Allens, or that the Allens were harassing each other and blaming him. He didn’t much care, he says, because he considered the harassment trivial: “My rights were violated and nobody cares, and we’re still talking about what happened to poor Courtney?”

After exposing the affair, Steven continued asking for advice from other people on the Marriage Builders site. He even posted emails between Courtney and Zonis, and a copy of a letter that he wrote to Courtney: “I am so very sorry I hurt you and hurt you so deeply for years, by not considering your feelings near as much as I should have, and by demanding and disrespecting your opinion to get what I wanted. I was abusive and controlling. I was so sure I was right, and getting what I wanted would help you too, that I didn’t realize the hurt I was causing you.” He didn’t realize that Zonis had found these posts and took them as Steven admitting to being an abuser.

Steven had hoped the exposure would allow them to move on; it had the opposite effect. One of his coworkers received an email accusing Steven of assaulting Courtney. When Steven told Courtney that Zonis must have sent it, she refused to believe him. Zonis “had my ear,” she says. “I was listening to everything that he said, and I was assuming anything Steve said was a lie.”

Illustration by Yoshi Sodeoka/Science Photo Library/Getty Images

But she also felt cracks forming in her relationship with Zonis—she accused him of making the threatening call to Steven’s grandmother, which he angrily denied—and asked for space to try to get her head straight. She went back to work, seeking more independence. In an email to Zonis, the former sharklady described something she’d seen on TV: “There is a whale carcass. All the great whites gobble it up, ripping huge chunks out of it at a time. That is what I feel like … the whale.” “In my new world,” she wrote Zonis, “EVERYONE is lying to me. I don’t believe anyone anymore.”

In the meantime, Steven, angry about the message to his coworker, emailed Zonis, writing that he could “look forward to continued exposures to people in your life.” Zonis, who considered this a second attack, forwarded a copy of the email to Courtney, but when she read it she sensed something was wrong. The writer referred to their child as “her” son instead of “our” son, and a boast about his ability to manipulate her did not sound like her husband. (“I know Steven looks down upon people who try to manipulate,” she says. “It just didn’t fit with his character.”)

In a modern act of trust, she and Steven showed their emails to each other. She saw that the version Zonis sent to her had been edited—that Steven’s words had been changed. Courtney felt she finally knew whom to trust. “That,” she said later, “was when I turned to Steve and said, ‘I need help. I don’t know how to get myself out of this.’ ”

Courtney decided to ease Zonis out of her life. Her messages to him became short, bland, and infrequent, but still she received long, aggressive responses. Finally she began demanding to be left alone, then stopped responding at all. But emails and calls continued, as many as 20 in a single day; even Courtney’s mother was getting calls. Zonis said later that he was calling the Allens to get an apology, something that he could show to his parents. One email from his personal account said that the sender had just been in the Allens’ city —“VERY nice place”—and promised a visit to the area again soon. (Zonis denies writing the message.) There were also voicemails: “I will burn myself to the ground to get him. I told you, you’re going to lose him one way or the other.”

Emails arrived from other accounts too: Courtneythe­whore­sblog­, Courtney­,,,, Youareaselfishcocksucker@noone­ There were dozens of others.

Some messages to the Allens’ neighbors and coworkers came from what appeared to be Steven’s email. Courtney’s boss got emails from “Steven” with subject lines such as “My Slut wife Courtney” and “Courtney is not who she seems to be.” One night, as Courtney worked on a sudoku puzzle in bed, she received an email that looked as if it had come from her husband, who was next to her reading a book. The next night, Steven’s cell phone dinged on the nightstand with a new email. He picked it up and turned to Courtney. “Apparently you hate me,” he said.

In March 2015, Courtney filed for a protective order against Zonis, which would make further contact a crime. Steven filed for a similar order for himself and their son the month after the “exposure,” but Courtney had believed that doing so would be too antagonizing. Zonis and his wife responded in kind by getting orders of their own. Two days after Courtney’s order was granted, she got an email from Zonis’ personal account: “Glad that bullshit symbolic gesture is out of the way,” it said. (Zonis denies writing this too.)

No charges were filed. The Kent police, while sympathetic, “weren’t really interested in something that was a misdemeanor protective order violation,” Steven says. The Allens got the sense that because Zonis was in Arizona, and because so much of the harassment was confusing and anonymous, it was hard for the police in Kent to act. At the end of March, Courtney and Steven walked into the FBI’s office in Seattle to present their case. (The Kent police, county prosecutor, and FBI all said they were unable to comment for this story.) Three months later the Allens got a letter stating, “We have identified you as a possible victim of a crime,” and informing them that the FBI was investigating. Months passed with no word. When they heard about the FBI’s involvement, the Kent police closed their own case. The Allens, not sure what else to do, continued to bring them evidence of new and ever more inventive harassment.

In early April the Allens received a package in the mail that was full of marijuana. After they reported it to the police, Detective Galetti informed the Allens that there had been more Crime Stoppers reports: allegations that they were selling drugs, that they were cutting them with butane, that their customers were high school kids.

The Allens began to consider a different option. Earlier that year, after Steven started a new job at the University of Washington, he told campus authorities about the harassment. Natalie Dolci, then a victim advocate with the campus police, referred him, as she had many others, to a pro bono program called the Cyber Civil Rights Legal Project at the prominent K&L Gates law firm. The project had been started a year earlier to help victims of what is variously known as sexual cyberharassment, cyberexploitation, and revenge porn. (Dolci prefers the terms “technology-enabled abuse” or “technology-enabled coercive control,” phrases broad enough to include things such as using spyware or hacking in-home cameras.) Often the cases didn’t go to court, meaning the public seldom heard their details. Most people just wanted to settle, get the harassment to stop, keep their images off the internet and their names out of public records.

Steven and Courtney weren’t eager to file a lawsuit, but they hoped the firm—a large one with a cyberforensics unit experienced in unraveling complex online crimes—would be able to help them unmask the harasser and prove their story to police. “We were just trying to get law enforcement to do something,” Steven said later.

On April 29, 2015, Steven and Courtney walked into a conference room overlooking Seattle’s port and Mount Rainier where they met David Bateman, a partner at K&L Gates and one of the founders of the Cyber Civil Rights Legal Project, and Breanna Van Engelen, a young attorney. A mock trial program in college convinced Van Engelen that she wanted to be a litigator—to stand up in court on behalf of clients she believed had been wronged—but she was fresh out of law school and had yet to try her first case.

The lawyers were skeptical of the Allens’ story at first. It was so outlandish that Van Engelen wondered if it was made up—or if one spouse was manipulating the other. Courtney’s fear seemed genuine, but so many of the emails did appear to come from Steven, who knew his way around computers. Van Engelen wanted to be sure that Steven wasn’t the mastermind of a complex scheme in which he hid his own abuse, impersonating Zonis impersonating him. She interviewed the Allens separately and then spent a week poring through the evidence: voicemails and social media profiles and native files of emails. By digging into how they were created, she found that emails from “Steven” had been spoofed—sent through anonymizing services but then tagged as if they came from his email or were sent from an untraceable account. Had Steven been the mastermind, it would have been “like robbing a bank but wearing a mask of your own face,” she said later. “It just doesn’t make any sense.” Van Engelen came to believe the Allens were telling the truth.

But that left another question. What if the case did go to trial? Even if she could convince a jury—which would mean explaining the complexities of how identity is both hidden and revealed on the internet—could she get them to care? Cyberharassment is still an unappreciated crime. Gary Ernsdorff, a prosecutor in King County, where the Allens live, said that people often don’t think it’s that big a deal—it’s just online, after all. Or they blame victims for sharing intimate images in the first place. What, Van Engelen wondered, would a jury make of the Allens’ saga? Would they think Steven had gone too far in exposing the affair? Would they blame Courtney for the videos? Though Van Engelen saw the Allens as victims, she realized a jury might not.

Many people assume that cyber­harassment is easy to avoid: They believe that if victims hadn’t sent a naked photo, then that person would have nothing to worry about. But experts say this assumption is essentially a comforting fiction in a world in which we’re all potential victims. A 2016 survey found that one in every 25 Americans online—roughly 10 million people—had either had explicit images of themselves shared online against their will or had been threatened with such sharing. For women younger than 30, it was one in 10. The same survey found that, photos or no, 47 percent of Americans who used the internet had been victims of online harassment of some kind.

Danielle Citron, a law professor at the University of Maryland and the author of Hate Crimes in Cyberspace, began studying cyberharassment in 2007. What she found reminded her of her past research on the shocking leakiness of information databases. Nearly all of us are giving away reams of sensitive information about ourselves without understanding how it might be used, whether by a stalker or an unscrupulous company. This includes what we share online—geotags on our photos, workout apps that generate maps to our houses, badly protected Facebook updates or lists that show family ties, or posts that reveal innocuous-­seeming facts, such as birthdays, that can be used to access other information. We also leave an enormous digital trail of personal and private information with every credit card purchase and Google search and ad click.

People are starting to understand “that the web watches them back,” says Aleecia McDonald, a privacy researcher at Stanford’s Center for Internet and Society. But we still don’t appreciate the extent to which it’s happening or what risks we might face in the future. McDonald suggests thinking of the internet as a backward-facing time machine that we are constantly loading with ammunition: “Everything that’s on file about you for the last 15 years and the next 40 years” may someday be used against you with technology that, at this time, we can’t understand or predict. And much of the information that we leave in our wake has no legal protection from being sold in the future: “We overcollect and we underprotect,” Citron says.

Even without access to intimate images, Van Engelen says, “if I was obsessed enough and motivated enough, I could mess up your life.” Many experts now agree that the solution to cyberharassment lies in changing the ways we respond to the release or misuse of private information: to stop trivializing it, to take it seriously as a crime, to show perpetrators that their actions have consequences.

“You can tell people, ‘Don’t do anything that you wouldn’t want to have go public,’ ” McDonald says. “But what kind of life is that?”

Illustration by Yoshi Sodeoka/Robert Daly/Getty Images

As Van Engelen prepared to take on the Allens’ case, she kept finding more social media profiles. There were accounts impersonating Courtney and Steven; one Google Plus account, which included the videos and Courtney’s contact information, birthday, and maiden name, had more than 8,000 views. There was an account for their son. A Facebook account in the name of “Jennifer Jones”—Courtney recognized one photo as Zonis’ pet tortoise—sent messages to her friends and family accusing Steven of abuse and of having sent “Jones” threatening emails and photos of his penis. (Zonis denies creating any of these accounts, saying: “I’ve never been on Facebook in my life” and “Who puts a picture of their pet on a secret account they’re trying to hide?”)

The Allens contacted Facebook, Google, YouTube, and other sites to have the accounts taken down, with mixed success. One of the hardest to remove was the Facebook page in their son’s name. When Courtney filled out a form indicating that she wasn’t the one being impersonated, the site suggested she alert that person to have it removed; there seemed to be no expectation that the targeted person might be a 4-year-old. The account stayed up despite repeated requests. (It was finally disabled in late October, after WIRED’s fact-checkers asked Facebook for comment.) But at least Facebook had a complaint option; other sites offered no recourse, and the most the Allens could do was ask search engines not to include them in results. Sites that specialize in posting revenge porn sometimes charge hundreds of dollars to remove images—what Ernsdorff calls “a business model of extortion.”

Van Engelen and her colleagues were subpoenaing tech companies to find out who was assigned IP addresses, but they kept having to send new subpoenas as new accounts kept popping up. According to court records, they found that many of the early emails—from addresses such as CourtneyCallMe69 and Dixienormousnu—could be traced to the Zonises’ house. In one case the same message was sent seven times by different accounts in just over a day. Some of the accounts were anonymous but traceable to the Zonises’ home IP address or a hotel where they stayed; one came from what appeared to be Steven’s email but with the tag “Douchebag” attached—it was routed from an anonymizing website based in the Czech Republic that sent email from fake accounts. Van Engelen interpreted this spree as evidence that Zonis was trying to get through spam filters, as well as proof that he used anonymizers and impersonation. Zonis counters that Steven was manufacturing evidence against him.

As time passed, the emails and social media accounts became harder to trace. Van Engelen found that many of the IP addresses, created and disguised with Tor software, bounced through layers of anonymous routing. More came from the Czech website or another anonymizer. The writing style changed too, as if, according to Van Engelen, the writer didn’t want the syntax or orthography to be analyzable: Sometimes they read as though they were written by someone with limited, fluctuating facility with English.

In the summer of 2015, the Allens found out that a new credit card had been opened in their names and that one of their existing cards had been used fraudulently. They could see that all the attempted charges were to access sites that might yield personal information:, a site that allows recovery of old W2s, a company that does background checks.

Courtney began seeing a counselor. Her fear had become “an absolute paranoia.” She had night terrors and panic attacks if she saw police in the neighborhood. Zonis had told her that he was able to fly for free because his wife worked for an airline; Courtney feared he might show up at any time. She stopped letting her son play outside. “It just changed who I was,” she says. “I wasn’t functioning.” Almost worse than the fear was the guilt about what was happening to the people in her life. “No one can say anything to me about the horrible things that I’ve done,” she says, “because I’ve already said them to myself.”

"Me living was how I was going to beat him."

Courtney had come to see the internet as a danger to which the people around her were oblivious. “Nobody’s safe,” she says. “If you’re on the internet, you’re pretty much a target.” She was appalled at what she saw her friends post—vacation updates that revealed their locations, pictures of their young children. She asked other parents at her son’s school not to post pictures of him, and one asked her, “Aren’t you proud of your son?” When she offered to share the recommendations that the FBI had sent her about keeping information private, only one friend responded—and only to ask whether such precautions were really necessary. Courtney locked down her own social media and stopped giving out her phone number. “Privacy has become top priority to me,” she said. “Anonymity has become sacred.”

In late June 2015, K&L Gates filed the Allens’ lawsuit against Zonis, seeking damages and relief related to defamation, negligence, intentional infliction of emotional distress, electronic impersonation, and invasion of privacy. Two months later, Zonis filed his own suit in federal court in Arizona, making similar claims against Steven. The complaint included excerpts of harassing emails that Zonis alleged were sent to him by Steven: “Too bad your whore wife is still without a child … did I mention that I own [Mrs. Allen] again?” and “All I had to do was act like the benevolent husband, and let you do the work … I plan on continuing to cause you pain like you can’t even imagine.” It took more than a year of motions and replies for the cases to be combined and moved to Washington, where the first case was filed.

In August Courtney received an anonymous email that ended, “Easier if one help everyone and kill self.” She’d had suicidal thoughts before. If she did kill herself, she thought, that might finally make the harassment stop. Maybe this was how she could save her family. She went to get a gun that was kept in a safe. Her hands were shaking and she fumbled the combination to the lock. She began to think about all the things she’d miss if she pulled the trigger—teaching her son to drive, retiring with Steven, the books she would never read. At last, still unable to open the safe, she gave up. “I decided he wasn’t going to win,” she said later. “Me living was how I was going to beat him.”

The following month the Allens took a trip to Hawaii. While they were away there were calls and emails, but none of them mentioned the trip. To Courtney it seemed like a small miracle: one moment in her life that belonged only to her. “It was a breath,” she said later. She would hold onto that precious realization for a long time: “I can keep some things private.”

But it was only a breath. Emails had begun coming to Steven’s account at the University of Washington—a job he thought had gone unnoticed until he got an anonymous email referencing the school’s mascot: “Public record. all. done.” Soon dozens of accounts, from the IT department to the university president, were getting emails about the Allens, often with images of Courtney. According to court records, two preschools in the Kent area also got emails that appeared to be from Steven; they said that he planned to come in with a gun and start shooting.“It wasn’t me!” Steven cried when the police called him at work. “I’m here!”

Gradually the Allens grew somewhat inured to the videos and emails—“There’s no one that I know who hasn’t seen me in very intimate detail,” Courtney says. “He can’t hurt me that way anymore”—though she continued to worry that their son would find the videos one day.

As Halloween neared, the K&L Gates lawyers received a threat they considered credible enough to heighten security. Later that fall, two FBI agents appeared at the Allens’. The couple hoped again that their troubles were ending at last. But while the agents were aware of their case, they said they were required to tell the Allens to cease and desist because Zonis had contacted them with evidence that he said showed the Allens were committing credit fraud against him. Later, Zonis would produce documents that he said showed Steven mocking Jennifer, sending her pictures of his penis, and threatening retribution; in one post, it appears that Steven had asked his Marriage Builders friends to make the threatening call to his grandmother.

“Everything he’s done, he’s claiming I’ve been doing,” Steven said later.

“Every bit of everything that we were accused of was what he did to us,” Zonis says.

In January of 2017, the lawsuit’s discovery process finally ended. Van Engelen and her colleagues had been working on the case for nearly two years. By then Zonis, after cycling through several lawyers, was representing himself, with his wife assisting. Before trial, the parties were required to attempt mediation. The judge encouraged a settlement, telling the Allens that a jury looking at the mess of competing claims would see everyone involved as having unclean hands. The Allens and their lawyers sent an offer to the room next door, where the Zonises were waiting: They would dismiss their suit if Zonis dropped his counterclaim and left the Allens alone. Zonis instead asked them to pay a large sum for what he said he lost. The case proceeded to trial.

On Wednesday, March 22, 2017, the Allens, their lawyers, and the Zonises gathered in a courtroom. Van Engelen watched from her seat as a colleague began questioning potential jurors: How many of you have made a friend on the internet? How many of you have ever taken a selfie? If someone takes and shares intimate pictures and they get published online, is that their fault?

Many of the responses were exactly what Van Engelen had feared. She summed them up: “This is trivial. Why am I here? I don’t want to be part of someone’s Facebook dispute. This is high school.” More than one person thought that if you made explicit videos of yourself, it was your fault if they were shared. Others felt the Allens, with their table of lawyers, had an unfair advantage. Van Engelen listened with growing nervousness. That night she went home and cried in the shower. She kept thinking: “What if somebody just decided that they weren’t going to listen to any of the evidence and they’d already made up their minds?”

Before the trial, Steven created a timeline of the harassment. Bateman decided to present it to the jury during opening arguments; because it had so many details, the lawyers had to print it on a 10-foot-long poster so that the jurors would be able to see the entries. This isn’t trivial, Bateman told the jury, detailing the false police reports, the enormous number of emails, the videos. Van Engelen felt her anxiety ease. “Right away you could see the jurors’ faces change,” she says. “I think they got that this wasn’t what they thought coming in.”

Van Engelen played some of the voicemails aloud. Courtney wept. She told the story of trying to unlock the gun.

Van Engelen called Courtney as her first witness. Courtney described her relationship with Zonis and said that she thought the videos would be private. Zonis had filed a motion to have the images of Courtney withheld from court. (He said later that the images were unimportant “flash” intended to distract the jury from what he had been through.) Van Engelen feared their absence would make the jurors take the case less seriously. In her questioning she described them as clinically as possible, so that Courtney wouldn’t have to: “Do you orgasm?” she asked. “Do they show your inner and outer labia?” Courtney testified for more than a day, the whole time too ashamed to look at the jurors. Van Engelen asked her to read some of the emails and played some of the voicemails aloud; she then read from the Google Plus profile that bore Courtney’s name and image. “I am a real whore wife,” Van Engelen read, continuing, “and have suffered for years with unsatisfying sex with a husband who is hung like a cocktail frank.”

“Did you write that about yourself?” she asked. “Did your husband write this about himself?” “No,” Courtney replied. Van Engelen continued her questions. Courtney wept. She told the story of trying to unlock the gun.

Zonis gave an opening statement. His wife cross-examined Courtney and later testified as her husband questioned her. Together the couple set out their version of the story: that they were Courtney’s friends who had tried to rescue her from an abusive husband. They said that Todd wasn’t romantically interested in Courtney and that Steven had been the one harassing them. The Zonises introduced emails and posts that they said were written by the Allens. But they were paper printouts with no metadata or digital trail to prove authenticity. When the lawyers requested a forensically sound copy of Zonis’ data, Zonis replied that his computer had malfunctioned—he blamed spyware that he claimed Steven had installed via an image file—and he had sold it; that he had copies of the files on CDs but Jennifer had thrown them out by mistake.

On the stand, Steven denied writing most of the emails or posts Zonis claimed were from him. The Allens had kept digital copies of emails that appeared to come from Steven, and the K&L Gates team showed the jury how those had been spoofed. They also showed that the email formatting on some posts didn’t match that of the Allens’ computer and that the time zone was not Pacific but Mountain, where Zonis lived. It appeared, the lawyers suggested, that Zonis had created the posts himself.

Zonis later countered that the discrepancies were proof that Steven had used spyware to steal the emails. The Zonises hired an expert witness to testify over Skype. He said that it was theoretically possible that the forensic trails leading back to Zonis could have been faked—though he conceded that he had never seen it done and had not reviewed the evidence.

The lawyers called Andreas Kaltsounis, a cyberforensics expert who used to work with the FBI and the Department of Defense. He explained to the jury how Tor networks and IP addresses function. He then presented a map showing that many of the seemingly separate accounts from which the Allens had received anonymous harassment were actually linked by overlapping IP addresses. One of the linked accounts was the Facebook page for “Jennifer Jones,” the account that used a picture of a tortoise. It could have been, as Zonis argued, an account that Steven, or some unknown person, created. But the lawyers were prepared. One day, months before the trial, as Van Engelen searched painstakingly through IP addresses associated with logins on the Jones account, she made a discovery: Among the many addresses, there had been one apparent slipup, a login not through Tor but from the Zonises’ home IP address. When she found it Van Engelen ran into Bateman’s office, yelling: “We’ve got him!” It would have been unheard of for someone to fake a login using Zonis’ IP address, Kaltsounis told the jury, because of a safeguard called the three-way handshake that requires hosts to establish a connection with the IP address belonging to the account before any information can be sent.

By the end of arguments, the Allens’ legal team had introduced 1,083 exhibits into evidence. The chart Van Engelen made just to organize the emails was 87 pages long. It was a level of scrutiny that few cyberharassment cases ever receive—and an illustration of what victims face when dealing with such a complicated case, especially if they don’t have access to pro bono help. K&L lawyers and paralegals had spent thousands of hours digging through the evidence. The value of Van Engelen’s time alone was in the ballpark of $400,000.

Zonis never took the stand. He blamed the lawyers for purposefully taking up too much time questioning Courtney and Jennifer, and introducing endless emails that he said had nothing to do with him. Van Engelen was disgusted: “He got his one big chance to tell his side of the story, and he didn’t take it,” she says. “This is somebody who’s very strong behind a keyboard. And when the opportunity arises to actually prove himself and be vindicated, he just folds like a flower.”

On Thursday, March 30, Van Engelen stood up to deliver her closing argument. It was the first time she’d ever done so in a real court.

She began by playing one of the voicemails that Zonis had admitted to leaving—“How does it feel to know that I’m never, ever, ever going to stop?” Then she turned to the jury: “Someone needs to tell him to stop.” She described Courtney’s lowest moment: going for the gun. She reminded them of a message promising isolation, shame, and ridicule, and the email from Zonis’ personal account after Courtney got a protective order: “Glad that bullshit symbolic gesture is out of the way.”

It was impossible to trace all of the harassment directly to Zonis with cyberforensics, Van Engelen told the jury, so she encouraged them to also consider repetition of details (like the sex toy he had sent) that were in both the anonymous messages and voicemails from Zonis. She talked about the problems with the evidence that Zonis had introduced.

“Do not,” Van Engelen concluded, “let this be another bullshit symbolic gesture. Tell him to stop, hold him liable.”

In his own closing statement, Zonis reiterated that “the stuff doesn’t trace back to me,” talked about the difficulty of being cut off from his parents, and cast himself as a scapegoat: “And what if I’m not the devil? Then what do you do? Oh, my God, we were wrong. We can’t have that, can we?” He told the jury that not testifying wasn’t his choice; the judge said this wasn’t true.

The K&L lawyers had not asked for a specific amount of compensation. The Allens told their lawyers that their goal wasn’t money but simply an end to the harassment.

The next afternoon the jury came back with a decision.

The 12 jurors had been given forms to explain which of the Allens’ and Zonis’ claims they deemed true and which they rejected. For the first claim, “Did Todd Zonis electronically impersonate the Allens?” the presiding juror circled yes. The jury also chose yes for “Was the electronic impersonation a proximate cause of the injury or damage to the Allens?” The form offered a blank space to write in the total amount of damages warranted. The jury’s answer: $2 million.

And so it went. The jury found each of the Allens’ other claims against Zonis—intentional invasion of privacy, intentional infliction of emotional distress, and defamation—justified, and to each they affixed a boggling sum. The jury did agree with Zonis on one count: The Allens had “intruded upon the seclusion” of the Zonises, but they found that no harm had resulted. When the amounts awarded to the Allens were totaled, they added up to $8.9 million. It was a record for a cyberharassment case that didn’t involve a celebrity. The jury “didn’t believe it was trivial anymore,” Van Engelen said with satisfaction.

After the trial was over, the Allens and some of the jurors had the chance to meet outside the courtroom. One of the jurors came up to Courtney, gave her a hug, and said, “You’ve been through so much.” Neither the Allens nor their lawyers expect to actually see the award money, but that moment in the hallway felt just as valuable.

“The fact that other people can see it, and they see the crazy in it, helps me feel that I’m not insane,” Courtney said later. The Allens’ deepest hope, though, remained simple: that the harassment would stop.

For more than a month after the trial, it seemed they would get their wish. Then one afternoon Courtney logged on to her computer and found a new email. It read, “pun ish men t w ill soo n b han ded out to the wic ked. you rti me is sho rt. mis sin g fam ily we wil lno t. pri ce for act ion to be pai d y et it is.” More emails followed. Courtney felt a mixture of dread and exhaustion. It wasn’t over. “I’d love nothing more than for us to be left alone,” she says. “Do I expect that to happen? No. I expect this to be in our lives, in some capacity, forever.”

At the time this story went to press, law enforcement had not yet indicated whether criminal charges would be filed. Gary Ernsdorff, of the King County prosecutor’s office, allowed that he kept an eye on the case. Cyberharassment, especially with private images, “is dropping a bomb in somebody’s life,” he said.

After the trial Zonis filed a notice of appeal. He felt the trial was unfair and that the proceedings hadn’t paid enough attention to what he believed the Allens had done to him. His losses, he said, were real and numerous (to the list he added what he considered stress-­induced health problems), while the Allens’ were petty, just “flash” from a “hot-­button issue.” He still denied that his relationship with Courtney was an affair or that he had access to the videos of her or sent the anonymous emails. He also said, in a phone interview, “Anything that I said or did was reactionary” and “If they wanted me to plead guilty to harassment, no problem. What am I harassing them about?”

Soon after the trial, a blog appeared in Zonis’ name. In it he questioned the way the trial was run, disputed its findings, excoriated the people involved, and posted much of the same evidence against Steven that the lawyers discredited at trial. “My name is Todd Zonis and I lost my family, my home, my future, and probably my life, and while my life may not teach you anything, hopefully my death will,” the blog began. The evidence he posted included the images of Courtney and a note: “Please feel free to download any and all of the materials that I have posted here, and use or distribute them as you see fit.”

Brooke Jarvis (@brookejarvis) is a writer based in Seattle.

This article appears in the December issue. Subscribe now.

Listen to this story, and other WIRED features, on the Audm app.

Read more:

adminadminHow One Woman’s Digital Life Was Weaponized Against Her
read more

Animals seized in ‘puppy farm’ raid

Image caption The dogs and puppies have been taken to a centre in Glasgow

Nearly 90 dogs and puppies have been seized during a raid at what animal welfare officers believe to be Scotland’s largest puppy farm.

Scottish SPCA officers executed a warrant at East Mains of Ardlogie farm near Fyvie, Aberdeenshire, on Tuesday.

Puppies that vets said could be as young as five days old, and of various breeds, were taken to a centre in Glasgow amid concern for their welfare.

A number of other animals, including rabbits and ferrets, were also seized.

An SSPCA officer from the special investigations unit said: “With the numbers of puppies that we have got here, these are certainly not pets. They are clearly being used for illegal breeding.

“As far as I know there are no licences here in terms of breeding or a pet shop licence so these dogs are being sold illegally to members of the public.”

Image caption Police Scotland supported the raid by Scottish SPCA animal welfare officers

The charity believes the puppies are passed off as home-bred by a dealer, before being sold to members of the public via the internet.

Veterinary surgeon Harry Howarth, who assisted with the operation, said: “The welfare of these dogs has been compromised.

“All these environmental problems that we are picking up are going to cause unnecessary risk of disease and poor health, which is going to cause pain and suffering and death to some of these dogs.

“There are all sorts of welfare rules being broken here. When you look at the puppies, they are not blooming, thriving puppies the way they should be, they look like puppy-farm puppies.”

One man, who arrived at the farm during the raid, told officers there was nothing wrong with the dogs.

The SSPCA said inquiries to establish ownership of the puppies and dogs that were seized are continuing.

The organisation carried out the operation with Police Scotland using warrants obtained under the Animal Health and Welfare Act 2006 (Scotland).

Read more:

adminadminAnimals seized in ‘puppy farm’ raid
read more

Owning A Dog Could Dramatically Improve The Health Of People Living With HIV

We empathize with dogs far more than we do with most humans, and it’s not difficult to see why. Known for being incredibly effective mood boosters, it’s becoming increasingly obvious that these eminently loveable floof packages have the potential to revolutionize how we deal with stress, depression, and anxiety.

A new study, published in the Journal of Medical Internet Research, reveals that owning a dog can be hugely advantageous for patients with HIV too. It shows that people with dogs have a 300 percent lower chance of being in a depressive state than those without dogs.

The team, led by Ann & Robert H Lurie Children’s Hospital of Chicago, points out that this is even better than it sounds.

Preventing people with a currently incurable viral disease falling into a deeply problematic psychological state of mind is clearly a good thing, but there’s a correlation between mood and the progression of HIV too. This generally applies to many medical afflictions: those maintaining high spirits seem more likely to prevail.

In this sense, depression often leads to HIV patients responding less favorably to important antiretroviral therapy treatments; the opposite is true for those in better frames of mind. It’s safe to say, then, that dogs are lifesavers in more ways than one.

 Literal life-savers. Jaromir Chalabala/Shutterstock

The study involved the recruitment of 199 patients – a relatively small number – via social media. All were over the age of 18 and had a self-reported HIV diagnosis. Most were homosexual white men, which admittedly doesn’t mirror the current epidemiology of HIV; today, younger people from a variety of ethnic minorities are increasingly contracting the virus.

Some had pets, some did not – and some bought dogs after being diagnosed as HIV positive. Interestingly, most people who owned a dog after diagnosis bought it as a household pet, rather than being given it as part of therapy.

If this study’s results are validated, then it suggests that dogs as post-diagnosis therapy should be given far more consideration.

It’s not a perfect study, but this research gives a rather wonderful insight into the benefits of owning a dog. The stigma of an HIV diagnosis, despite remarkable advances in treatment, is still very real – someone with the disease is twice as likely to be depressed as those without it.

“That stigma can lead to feelings of isolation, loneliness, or depression,” coordinating study author Robert Garofalo, of the Division of Adolescent Medicine at the Ann & Robert H Lurie Children’s Hospital of Chicago, told MD Magazine.

“While doctors cannot readily write a prescription for a dog for their patients, this study suggests that dog ownership… could be beneficial to patients who are isolated or depressed as a result of their HIV infection.”


Read more:

adminadminOwning A Dog Could Dramatically Improve The Health Of People Living With HIV
read more

The founder of We Rate Dogs hilariously trolls FCC chairman over net neutrality

The founder of the We Rate Dogs Twitter account is not afraid to get political, and he’s definitely not shy about poking fun at the Donald Trump administration.

On Thursday, founder Matt Nelson apparently noticed that FCC Chairman Ajit Pai followed another one of his Twitter accounts, @dog_feelings, after Pai retweeted it on Thursday.

Photo via Ajit Pai/Twitter

That’s when Nelson decided to send the person who badly wants to end net neutrality a friendly message.

A few minutes later, the DM to Pai had been sent.

“Just wanted in inform you that starting with the repeal of net neutrality, we will block you and this account will be private,” the message reads, before detailing the premium “Pupper” and “Doggo” packages he can buy to access the account.

As the Daily Dot explained in this piece last week, the loss of net neutrality could make you pay more for internet access. “Critics of the FCC’s plan warn that ISPs could begin to institute ‘tiered’ internet plans, much in the same way that television providers offer different cable TV packages,” wrote the Daily Dot’s Andrew Wyrich. “For example, your ISP might offer one plan that includes access Bing’s search engine but not Google’s, or to Twitter but not Facebook, while only the most expensive plans would give customers access to the internet as they do today. Others worry about censorship and limits on freedom of expression online.”

That’s why Nelson’s DM to Pai is so biting. How upset would Pai be if he had to pay $50 a month for the Doggo Package in the future when, today, Pai has to pay nothing for all his @dog_feelings content?

The trolling effort by Nelson was A-plus. In We Rate Dogs terms, we’d give it 13/10.

Read more:

adminadminThe founder of We Rate Dogs hilariously trolls FCC chairman over net neutrality
read more