All posts by Craig

Working Without a Net

In 1988 we took our kids to Circus World in Baraboo, WI. We had the good fortune to see Enrico and Debbie Wallenda performing on the high wire. The crowd was small, so we had a chance to chat with them after the show.

I noticed that, while they performed without a safety net, they had laid out some tumbling mats under the wire, which was some 20-30 feet in the air. “Why bother with the mats?” I asked Debbie. “Our insurance company won’t let us perform without safety equipment,” she said.

2015-06-04 07.57.00Enrico and Debbie come from a family of circus performers that goes back to the 17th century. They grew up on the wire. They know what they’re doing. The safety net is unnecessary. It would just slow down their set-up and be one more thing they’d have to carry from show to show. And it would be an insult to them. Amateurs need and use safety nets. The Wallendas just don’t fall.

Well, they do, but no more than once each.

I’ve been programming since about 1974 and doing it professionally since 1982. I remember my ham radio buddies talking about these cool new things called “microprocessors” in 1972, and was actively programming for them through the entire history of the “personal computer revolution”. I wrote a machine language debugger for the Motorola 6502 just for fun back in the early 80’s. I was working with touch screens in 1982 while the company that would eventually put one on an iPhone was just beginning to experiment with mice and graphical user interfaces.  I wrote drivers that allowed CP/M systems to store data on “magnetic bubbles” that raced along a track driven by an electromagnet. I was writing code to calculate position using GPS when there were only about 8 GPS satellites in orbit and we had to calculate what ridiculous time of the morning we’d have to come in when we would be able to see the required minimum of three of them at the same time for testing our software.

Over the years I’ve programmed in assembly language, Pascal, PL/I, Modula 2, FORTRAN, COBOL, SNOBOL, LISP, BASIC, RATFOR, C, Forth, JOVIAL, Ada, C++, NewtonScript, PHP, Objective-C/C++, Perl, Java, JavaScript, C#, and VBScript. I’ve written a number of compilers and interpreters for lesser-known and proprietary languages. I’ve written programs for Atari, CP/M, MS-DOS, VMS, Windows (desktop and server), Mac OS and OS X, Newton OS, various flavors of Unix, Windows CE, Palm OS, Android, and iOS.

When I’m making updates to the scripts and pages on our Laridian website, I operate directly on the live server. From time to time that means if you happen to be on the page I’m on when I make a mistake, you’ll see an error message when you load the page. But that happens only rarely. When working on a critical part of e-commerce code, I might test on a private page before going public, but often that isn’t practical.

Running a beta testing program with outside testers, especially for a platform like iOS (which requires encrypting the app in a particular way that allows only selected devices to run the program), is difficult and time-consuming. So most of the updates I do for Mac and iOS programs are just tested by me before they are shipped. Often, I’m a better tester than real customers, because I know the scope of the changes I’ve made to the code, and I know where it is susceptible to error. For example, all the testing of synchronization of user data was done in-house. I was able to set up both common and unusual situations to verify how the system would handle the data without putting any real customer data at risk. When the time came to put that system online, it just went online without any beta testing.

So I sympathize with the Wallendas. That safety net takes a lot of time to set up. We know we’re not going to fall. And it takes away from the perception of professionalism — anybody can walk a tightrope when there is no harm in falling.

But when we fall, we fall hard.

Last weekend I shipped an update to PocketBible for iOS that was not tested by outside testers. The majority of the changes were to accommodate the larger screen of the iPhone 6 and 6 Plus. I have an iPhone 6, and I can emulate the 6 Plus in the development environment. Those changes were well-tested.

The other type of changes were related to what happens when you change the password on your Laridian account. Previous versions of the program assumed you were logging into a new account when you entered a different password, so they blocked you from sync’ing your notes, highlights, and bookmarks with the server (so as not to corrupt the “other” account’s existing data, nor corrupt the data on the device with data from the “other” user). Furthermore, they would delete all your books (assuming, again, that you are a different user with a different library of books). The new version of the program records the Laridian customer ID you’re using while sync’ing your database with the server, and only complains about your user data if, when changing your password, you log into a different customer account. Furthermore, it doesn’t delete your books. (I plan to handle that a different way in future releases.)

So while testing the screen-size changes on the iPhone 6, I also tested the new way of determining if you had logged into a different account. It worked great. What I didn’t count on was that Apple had completely changed the way certain user interface objects worked on the iPad sometime in the year since I had issued the last PocketBible revision. As a result, iPad users couldn’t update their data to support the new customer ID tracking method. My testing on the iPad consisted of bringing the program up and trying a few things to make sure it wasn’t completely broken. Since the bulk of my changes were related to laying out the user interface on the larger iPhones, my testing focussed on making sure I didn’t break any layout code on the iPad. I already knew the customer ID tracking worked from my tests on the iPhone.

I joked with one long-time PocketBible customer that I didn’t want to take time to do a beta because I knew he would find problems that I would have to fix. So I shipped version 3.2.0 without the benefit of his help.

Once Apple approved the new version and I installed it on my iPad and saw what was happening, I knew I was in trouble. I began thinking about how those tumbling mats were going to feel when struck from this height.

When Karl Wallenda fell to his death from 120 feet, the family went ahead with their show the following weekend. That’s what professionals do. In my case, I admitted to the mistake immediately, pulled the app from the App Store, posted prominent notices on our blog and on Facebook, and went to work to find the problem. By 2 AM I had the first round of fixes made to the code. After a short nap, I found and fixed the rest of the problems (which required examining about 300 places in the code) and was ready for beta testing by mid-afternoon. We went through three beta versions in 24 hours, and I didn’t upload the final build to Apple until I had a clean bill of health from the testers.

Apple cooperated by approving my request for expedited review, and accomplishing that review within an hour.

In the end I was able to stand up and walk off the mats under my own power. The fans were great; they encouraged me by applauding through the whole thing. I was concerned that some would want their money back, but I got not a single complaint.

While I probably won’t be shopping for a safety net, I may consider doubling the mats.

VBScript/Classic ASP Function Parameters

I know that VBScript passes parameters by reference, but I seldom take advantage of that feature. So when I need it, I am always able to convince myself that I’m misremembering. So here are the results of a recent test to remind me:

function Three(N)
	N = 3
	Three = 0
end function

dim x
x = 1
Response.Write "<p>x = " & x & "; Three(x) = " & Three(x) & "; x = " & x & "</p>" & vbCrLf

Output:

x = 1; Three(x) = 0; x = 3

An Open Letter to Those Who Send Their “Sympathy”

This is the eighth in what has unfortunately turned into a series of articles. Here is the seventh, and here is the first

Since writing this, I’ve spoken to a person who knows Helen personally and confirms that the suspicions expressed in this article as to the source of these cards are true.

We have one of those US Mail “cluster boxes” at the entrance to our subdivision. Apparently the rising cost of postage doesn’t cover the cost of walking all the way to my front door, like it does for the homes a block away in an older neighborhood. As a result, I don’t pick up my mail very often. Maybe once a week or even once every other week. So our mail ends up coming in very large batches.  I normally sort the mail into “open eventually” and “recycle right now” piles. The former is divided into “business” and “personal” mail. Business mail gets taken to the office. Personal mail tends to sit unopened. All my important bills are paid automatically. What could be worth opening?

Today I received two hand-addressed envelopes, sent to me by my first initial and last name, and both sent from Oklahoma City, OK. Neither had a return address. One was sent three days after the other. It’s unusual to get a hand-addressed letter these days, so I opened the two cards right away even before finishing the sorting.

They were sympathy cards. That’s odd, because nobody close to me has died recently. They were unsigned, but each had a Bible reference hand-written inside. This is not an unusual way for Christians to wish each other well — sending along a Bible verse for encouragement. Nobody ever actually looks those up — or they’re so familiar that we don’t need to. But since I wasn’t expecting any sympathy cards and since these were unsigned, I thought the verses might contain a clue as to the identity of the sender and the reason he or she sent them.

They did.

The first passage cited was Matthew 12:36-37:

36But I say unto you, That every idle word that men shall speak, they shall give account thereof in the day of judgment. 37For by thy words thou shalt be justified, and by thy words thou shalt be condemned.

The second card cited Luke 6:45:

45A good man out of the good treasure of his heart bringeth forth that which is good; and an evil man out of the evil treasure of his heart bringeth forth that which is evil: for of the abundance of the heart his mouth speaketh.

Not your usual sympathy-card verses.

Both passages share the theme of judgment for good and evil words. Was someone trying to acknowledge something good I had said, or rebuke me for something evil? Given that they were sympathy cards, I can only assume the sender is saying that I or someone close to me should (or will) die for something evil I said. But who might think that of me?

I checked the postmark. Who do I know in Oklahoma? Nobody!

Wait… I do know somebody in Oklahoma!

Turns out Helen Joanne Pearce, my favorite Florida felon, is from Chickasha, OK — about 40 miles from Oklahoma City. Her parents still live there — at the address Helen cited in her petitions against Doug and me when she asked the court for an injunction against each of us. When Doug went to his hearing in March, Helen’s dad had come from Oklahoma to accompany her. I don’t know if he came for my hearing, since I stayed home and sent my High Priced Lawyer in my place. My High Priced Lawyer doesn’t care whose daddy shows up for the hearing, so he didn’t say if Helen had anyone with her.

Did Helen’s parents send the threatening cards?

The first card was sent three days after the judge dismissed Helen’s bogus petition for lack of jurisdiction. The second card was sent three days after that.

If Helen’s parents have been to this site they know I’ve never involved them in this matter. I have no intention of harming or even visiting them. I’ve never threatened them, never spoken to them, never even exchanged emails with them. I’ve never published their names or their address in connection with my investigation of their daughter’s fraudulent activity. I’ve never asked anyone else to contact them on my behalf.

My only concern for them is as a fellow parent of adult children. If I was in their position I would want to be aware of my daughter’s bad behavior for a couple of reasons. First, so that I could encourage her to change her ways and take up an honest profession. Second, so that I could be planning ahead for the future of my grandchildren in the event she ends up doing time for her multiple felonies.

Is it possible these anonymous cards are from someone else? Perhaps a disgruntled customer? Sure. But I’ve been doing this for almost 30 years now and I can tell you the usual odd stuff I get in the mail isn’t anything like this. It’s usually end-of-the-world prophecy newsletters, but I’ve also seen perpetual motion machine investment opportunities and — my favorite — a brochure on the benefits of castration for holy living. This is different.

And it’s unusual to get something anonymous. Most people want you to know who they are, because they see themselves as living prophets — the most important people on the planet.

And what a coincidence that this shows up at a time when I know I don’t have any heated discussions going on with customers, people on Facebook, members of my church, neighbors, etc. but I do have a rather incendiary website dealing with an un-convicted felon with ties to the location from which these cards were ostensibly sent.

And what a further amazing coincidence that the handwriting matches samples of handwriting in my possession known to be from Helen’s father.

So, Mr and Mrs Helen’s Parents, if these cards didn’t come from you, let me know. If they did come from you and you’ve thought better of it, I would welcome an apology. If I’ve misunderstood your message, I would welcome any positive contact from you to make it more clear.

In the meantime, I want to make sure this information is made public so that if I or a member of my family goes mysteriously missing, law enforcement will have a place to start. At a minimum, even if not involved in the death of me or a family member, the sender is already subject to up to five years in prison for sending threats through the US Postal Service (18 USC Chapter 41).

I am intentionally not posting pictures of the other card nor the envelopes. I am not posting any of the evidence I have that backs my assertion that these threats are from Helen’s parents. This is done in an effort to not elevate this aspect of the investigation, since it involves a third party against which no allegations of wrongdoing have been made as pertains to Helen’s fraudulent real estate activity.

Advancing Technology by Lying to Developers

Mobile devices have been increasing in screen size, screen resolution, memory, and other capabilities on a continuous basis from the time I got my first Apple Newton MessagePad in 1993. Back then screens were about 336×240 pixels, and each pixel was either on or off — no color. There was a total of 4.625 MB (that’s MEGA bytes) of memory. My first Windows CE device was probably my HP 620 LX in 1998. It was a “clamshell” design with a 640×240 screen and 16 MB of memory.

The thing we knew intuitively from being involved in personal computing since there was such a thing as personal computing was that “change is the status quo”. Our programs never assumed how big the screen was, because we knew our program would need to run next week on a bigger screen, so we wrote our code so that it queried the operating system to ask how big the screen was before dynamically laying out its user interface to fill all available pixels. We never assumed that devices would always be monochromatic, so we wrote our compressed file format to accommodate “words of Christ in red” before they could even be displayed in anything but black on a greenish screen. And even though the entire Bible wouldn’t fit in memory of those first devices, we plowed ahead with the best compression we could manage and a user interface that supported displaying two Bibles simultaneously, knowing that very soon you’d be able to get not just one of our Bibles but two whole Bibles onto the device at the same time.

Fast forward to the iPhone in 2007. When you work for Apple you apparently get big-headed and begin to think you’re among the smartest programmers in the world. Nobody can match your brilliance. Each generation of device you work on is “magical”. It has capabilities and features that nobody could have imagined even six months ago. Features like a more memory and a bigger screen.

Since you couldn’t imagine those features last year, and since you’re God’s gift to technology, you’re positive that nobody else could have imagined those features. So what’s going to happen to all those apps written by people “too dumb to work at Apple” when your new device with a bigger screen comes out? Why, they’ll crash, of course.

Not PocketBible.

You only have to be in this business a week to realize that you can’t hard-code your program to assume a particular screen size. But Apple does this with every single device. Up until iOS 8, we had to prepare a “splash image” to display when the program launched in every possible size and resolution. Currently, that means we have to create launch images in 13 different sizes, one for each iPhone screen size that has ever been shipped, in both portrait and landscape orientation.

Current iOS launch image requirements

Current iOS launch image requirements


If instead they allowed us to manipulate a single image at run-time, we could do all of these with one PNG. But they require us to know every size of every screen we might ever run on (by the way, the image above omits devices prior to the iPhone 4, which would add another half-dozen sizes if they hadn’t already been abandoned by Apple).

This isn’t about managing lots of images. It’s about a philosophy that can’t think past yesterday.

Because of this philosophy, when a bigger screen comes out, Apple either “letterboxes” old apps (putting black bars in the empty space that the program couldn’t possibly imagine would ever be there) or scales them (allowing them to believe the screen is no bigger than last year’s device, then scaling up everything they draw to fill the bigger screen). They believe they are saving developers from having to re-release their apps every time a new device comes out. But in reality, they are requiring every developer to re-release their app to jump through whatever hoop is required to get Apple to stop letterboxing or scaling their apps.

iPhone 6 scaling

Pre-iPhone 6 version of PocketBible on the left gets scaled up. Adding a “launch screen” (which is unrelated to drawing text) tells iOS not to lie to us about the screen size, producing the sharper image on the left with absolutely no changes to PocketBible code!


With iOS 7, there was a special checkbox we had to check to tell the OS that we understood their new semi-transparent user interface elements. With iOS 8, in order to convince iOS not to scale your app (producing blurry text), you have to provide a special, scalable launch image that works on any screen size. (Gee whiz, 2015 and we’re finally recognizing that screens might get bigger in the future! Thanks, Apple!) Until you do that (which requires re-releasing your app), iOS will lie to you about the size of the screen then scale your user interface up to the bigger physical size of the screen, producing blurry text.

Oh, and you still have to provide those 13 launch images for older devices.

The result of this policy of “technical advancement by lying to developers” is that instead of one guy at Apple having to write zero lines of new code, hundreds of thousands of developers have to update and re-release their apps. There would not have been a personal computing revolution in the 80’s and 90’s if Microsoft would have taken this approach. Back then, Microsoft would collect commercial software products and use them for regression testing of new versions of DOS and Windows. After all, you wouldn’t want to do something stupid and break every single app the way Apple does with every release of the iPhone.

This industry used to be exciting. I was like a kid in a candy shop. Technology was changing and we were riding the “bleeding edge”. Now I feel like the only grown up in the room. I want to slap some of these Apple and Google kids around and tell them to shape up.

Delete Program Preferences in OS X (Including Cache)

Often while debugging an app it’s handy to delete its preferences so it will “start over” like a fresh install. You used to be able to find the .plist file in the Preferences folder and delete it. Simple.

Starting with OS X 10.9, preferences are cached. So even after deleting them, they’re still around. Here’s the magic shell command that deletes them:

defaults delete com.company.programName

Pearce v Rairdin

This is the seventh in what has turned out to be a series of articles. Here is the sixth, and here is the eighth.

Helen has been telling people not to pay attention to what they read on this website because I am “currently being investigated for cyberstalking/cyberbullying and court proceedings are being taken against” me. This statement is false. I am not the subject of any investigation. Helen filed a report with the Osceola County Sheriff’s office, which called Helen’s claims “unfounded”. Helen filed for protective orders against me and Doug, one of the commenters here. She won an injunction against Doug, but it only stops him from being within 500′ of her house. It doesn’t stop anything we’re doing on this website, and doesn’t have anything to do with the truth of what is posted here.

This afternoon I was served notice of a hearing on a petition for injunction for protection against stalking. The petitioner is Helen Pearce.

This hearing took place on April 14, 2015. Results are below.

Cyberstalking

First, let’s dispense with the obvious: The State of Florida defines cyberstalking as engaging “in a course of conduct to communicate, or to cause to be communicated, words, images, or language by or through the use of electronic mail or electronic communication, directed at a specific person, causing substantial emotional distress to that person and serving no legitimate purpose.”

I can’t control the emotional effect that anything I post on the internet will have on someone. But I can tell you what the legitimate purpose of these posts about Helen Pearce is: To inform the public about the actions of a person known to the State of Florida to be committing felonies that deprive her victims of money, homes, and peace of mind; to support the efforts of victims of said felon to bring her to justice; and to serve as a point of communication between interested and victimized parties to her crimes.

So I’m not “cyberstalking”.

Helen Confesses to Committing Felonies

Here’s a link to the pertinent section of Helen’s complaint: 2014-02-24 Pearce-v-Rairdin Complaint

In this complaint, Helen claims that she and I “first became acquainted with each other a year ago”. She says that she inquired about a home we had for sale, but did not make an offer.

Now, about a year ago I was contacted by one JJ Pierce of Flat Stone Capital LLC, not Helen Pearce. However, I’m willing to stipulate Helen’s assertion that she is, in fact, JJ Pierce who contacted me on behalf of Flat Stone Capital LLC.

Let’s pause for a moment and consider the implications of that statement: Helen is admitting in a sworn statement, under penalty of perjury, that she used the alias “JJ Pierce” to contact me on behalf of a company that she fraudulently established for the purpose of escaping detection and committing fraud. She did this just three years after having been arrested for doing the same thing. (She was arrested on fraud charges in 2011 for crimes committed in 2006.)

The night before I was served, Doug was served a similar notice. In the complaint he received, Helen states that her company site is FSCEHomes.com. The people we’re working with whose homes were listed on FSCEHomes.com have contracts with Ferin Caffrey, not Helen Pearce. Ferin Caffrey registered the company FSC Endeavors LLC with the State of Florida using a UPS Store as both its principal address and registered office. So by virtue of her sworn statement in the petition for an injunction against Doug, Helen confesses under penalty of perjury to being the fictitious person Ferin Caffrey, who registered FSC Endeavors LLC using false information, which is a third-class felony in Florida.

The website for FSC Endeavors LLC was registered using Matt’s name. Helen’s sworn statement thus implicates Matt in her felonies.

False and Confusing (But Still False) Statements

She goes on to cite “the incident that caused [her] to report it to the Sheriff Department”. She includes a screen shot of this “incident”. It appears someone posted a link to a video on some TV station website. That wasn’t me. Furthermore, it would be very easy to fake something like that. For example, [this is Helen and I just deleted Craig’s example of faking the identity of someone in a post on the Web]. See? Easy.

Helen introduces someone named “Doug” into a complaint presumably about me. Obviously, I know to which “Doug” she is referring. But Doug’s actions don’t have anything to do with whether or not am cyberstalking her. She claims that Doug mentioned he found her Facebook page and says something about a DCF investigation. None of these claims are related to me. Anyone could have found Helen’s Facebook page (before she removed it), and if Doug, in fact, contacted DCF that was his doing and I had nothing to do with it. I report on Doug’s actions here; I don’t direct him to do things nor does he consult with me before he acts. Similarly, I report on what Helen does here; I don’t tell her what to do nor does she ask for my advice before she registers an LLC using an alias. I have never reported here that Doug contacted DCF.

Helen makes claims about what she’s seen on this blog:

  • How I track her
  • Where she frequently goes
  • Her and Matt’s names
  • Addresses
  • Pictures that are copywrited [sic]
  • Boasts of being related to different government branches
  • Encouragement for others to join in

She finds all of these to be malicious, slander, and libel and make her feel threatened, defamed, and fearful.

I have posted a description of how I tracked down information about Helen. I have never “tracked” her. I don’t know where she is or what she is doing right now and have no way of knowing that.

Similarly, I have never posted where she frequently goes.

I have posted some of her previous addresses that are part of public records in order to show connections between her multiple aliases. I have never posted her current address.

I believe the photos I have used are in the public domain, are used with permission, or are “fair use” under copyright law. I have never received an assertion of what Helen calls “copywrite” but I would’ve responded appropriately if I had. In fact, I’m removing photos from my site today to which I think she might be referring in order to avoid all question. The photos were never what the articles were about; they just added color to a bunch of text.

I have never claimed to have been employed by or “related to” different government branches.

So of these, I have explained some of how I have tracked information about her for the purpose of showing how JJ Pierce, Julie Bell, Neleha K. Dun, and all of her other aliases really are Helen Joanne Pearce. She has confirmed now that my conclusions were true. I have published Helen and Matt’s names for the purpose of warning others who might fall into their scam and to assist those who have cause to bring charges against her for fraud. I have encouraged others to help us find out more about her for the purpose of bringing her to justice. None of these things constitute “cyberstalking”. And furthermore, I have not published anything “too personal”, such as her home address, names of her children, etc. even if someone brought that information to my attention at my request.

Specifically, I do not wish harm on anyone nor do I incite others to do so. I have not written anything malicious. Similarly I haven’t threatened anyone with harm.

The words slander, libel, and defamation all kind of mean the same thing. They all require that a statement be made that is provably false. I have not made any provably false statement about Helen or Matt, and more importantly, she has not cited any examples of provably false statements that would constitute slander. She makes the claim that she has been slandered and threatened, but she doesn’t explain how.

The sum of all this is that she has no reason to be fearful. She hasn’t given any examples of maliciousness, slander, or threats. Any fear she has does not come from anything I’ve said here or elsewhere. As proof of her lack of fearfulness, she did not request protection for her children nor did she provide information about where they go to school so that I could be barred from going there. She did not request any protection for Matt. When my lawyer asked to delay my hearing to give him time to prepare a defense, the judge asked Helen if she would agree to a six-week delay, and Helen answered in the affirmative. She clearly does not feel that I am an imminent threat. She is not acting like a person who is in fear.

She did ask that I be restricted from being near an address in Oklahoma and another address in Texas that is unfamiliar to me. I have never had contact with the people at the address in Oklahoma (though I know who they are) nor with whoever is at the address in Texas.

Helen states that the majority of my home page is now dedicated to Helen (suddenly speaking of herself in the third person, suggesting someone else actually wrote her statement). This is both false and irrelevant. Helen-related content as of the date of her complaint was slightly less than half according to the word count. The reason it’s there at all is that interest in Helen from law enforcement, the media, and victims has been heating up lately, and since the Helen-related content of the blog is minimal (only about 14% of the total articles as of the date of the complaint), it can be hard to find. [Furthermore, as of the date this post was written, all Helen-related content was categorized as “Miscellaneous” on this site, further adding to the difficulty locating that information. I’ve since moved her stuff into a “Real Estate” category.]

Helen complains that an entire page on my site is dedicated to sending “them” (i.e. me) reports of information anyone can find about her. She doesn’t say which page this is, but I suspect she refers to the victim report form that was placed here at the request of Osceola County law enforcement so that more people can report to the Sheriff the details of Helen’s crimes. That information does not go to me.

She complains about my Cockroach Tracker app, which she claims “tracks all of us” (though she is the only petitioner so I don’t know who “us” is) so that I can find “more information … to share and use to twist to his harassing behavior”. As I described on the site, Cockroach Tracker examines public databases looking for patterns that will help us find her aliases and false companies, which can be difficult because she’s been committing felonies a lot longer than I’ve been researching her crimes. It doesn’t track anyone else in “us”, whoever “us” is and it doesn’t “track” as in telling me her physical location. It only tells me if she starts a new company and starts contacting other victims under a new alias.

She claims I contacted her through her “work website” on three occasions but doesn’t say what website that is. I have never posted those messages claiming to be Helen’s parents, sister, or Matthew’s parents. And as she implies here, it is very easy for someone to pretend to be someone else when posting messages through contact forms. It would be just as easy for her to pretend to be her parents, sister, or in-laws in order to frame someone else as it would be for that person to actually do it. But what I can say for sure is, that wasn’t me.

She claims I have publicly posted on craigslist about her. She cites no examples. She says I make deceitful and false claims but she does not say what those claims are or proving that they’re false. In any case, I have never posted anything about Helen, true or false, on craigslist.

I did “boast” of finding Matt’s running route. Matt posts it publicly on his public Twitter feed. He stopped posting it a little over two years ago, so what I have is a couple years old. It was interesting to find because it validated that the address we found for her — which was difficult to find since she forms her false companies under false addresses. I did not post a map of Matt’s running route. I’ve never threatened to find and harm Matt, nor have I ever suggested anyone else do likewise. In fact, I’ve suggested that people avoid him since he is a body builder and has a documented history of violence. I’m more afraid of Matt than he should be of me.

We do not have a “team that is working together to cyberstalk and cyberbully”. We do have a team that is working together to bring a known felon to justice.

She cites a particular hotmail.com email address as being mine. It is not.

She claims I “invite hate”. I do not. I do invite victims of Helen’s crimes to contact me so I can help them get involved in bringing her to justice.

She claims I have “made [her] family and [her] a target” but does not cite examples, nor does she say what I’ve made them a target for. Pies? Prayer? Injunctions?

She worries about others acting out of hate but cites no examples of my incitation to hate or malice.

The Version of Craig that Lives in Helen’s Mind is Not Me

I have never threatened Helen nor any member of her family with any harm.

I know a lot more than I have posted. I know where she lives. I know her children’s names. I know her parents names and where they live. I have a copy of a screenshot of Matt’s running route. I know Helen’s maiden name and where she went to school. I believe I could publish some of this information and it would still not be “cyberstalking” but I have never wanted to be close to that line. Posting that information isn’t relevant to my investigation.

I have never posted anything here that I did not believe was provably true. I have not posted anything that was not available from public sources. That is, I have never personally followed Helen around, hired an investigator to do the same, or snooped on her friends or family to develop information that could only be discovered by subterfuge.

I live some 1300 miles from Helen. But from January 2-10, 2015, I was vacationing with my family at Walt Disney World, just a few minutes from Helen’s home. I did not drive by her house. I didn’t try to contact her. I didn’t even stop by the UPS Store at 52 Riley Rd where she claims to have an office. If I was stalking someone, it sure seems like I would jump at the chance to look her up while I was in the neighborhood.

Summary

So it boils down to this: In her petition to the court, Helen confesses to committing multiple felonies and implicates her husband in the crimes. She does not cite any examples of anything on this site that she sees as threatening. The only accurate statements in her petition are these: (1) We first became acquainted about a year ago (when she was posing as JJ Pierce); (2) she inquired about but did not make an offer on my house; and (3) I have published her and her husband’s names.

It is true that I have “no dog in this race”. I do have an intense sense of justice, though, and it bothers me that criminals like Helen can walk around free, stealing money from innocent people, living in an upscale, gated community with a private health club, driving a nice car, and living high on the hog while the rest of us have to work hard for what we have. So I’ve donated my time and space both here on this site and at www.fsboscam.com to help those who are victims of Helen’s scam to organize and get some justice. And I’ve spent more than you want to know to defend myself against Helen’s specious claims and frivolous charge of “cyberstalking”. 

And now it looks like I’ll get to make another trip to Florida. Helen has never shown up in court for any of the other cases she has instigated, so I don’t suppose I’ll get to meet her.

Updates

March 3, 2015

I decided to send my High Priced Lawyer in my place because I can’t afford to lose the 3-5 days of work it would cost me to go to Florida and defend myself against this frivolous abuse of the legal system. He was able to get the hearing reset to April 14. The only bad thing about that is that it’s the day I normally meet with my tax accountant to get started on my tax return. Darn!

I take some solace in the fact that the judge doesn’t think delaying the hearing for six weeks will put Helen at any more risk of immediate danger, and she’s right. Since I’ve never threatened Helen or her family, nor have I even met any of them or talked to anyone in her extended family, she’s in no more danger from me today or six weeks from now than she was when she filed a false complaint with the Sheriff and perjured herself in her petition for an injunction last month.

April 14, 2015

I participated in the hearing today via telephone. My lawyer had previously filed a motion to dismiss for lack of jurisdiction, and the hearing for that motion was scheduled to take place before the hearing on Helen’s petition.

Helen and I were sworn in. Judge Diana Tennis asked me where I live. I said, “Marion, Iowa”. She asked how long I had lived in Iowa, and I said “All my life.” She asked if I had ever been a resident of Florida, and I said, “No”.

The judge pointed out to Helen that I had filed a motion to dismiss based on a lack of personal jurisdiction. That is, we claimed that the court did not have any authority over me, since I’m not a resident of Florida. She asked Helen if she had any legal basis for asking the court to exercise long-arm jurisdiction. Helen wasn’t represented by counsel and apparently hadn’t even read the Wikipedia article on “jurisdiction”, or she would’ve known that she couldn’t answer that question. Long-arm jurisdiction would’ve required her to show that I had some kind of minimal connection to Florida (such as a time-share, vacation home, business office, bank account, etc.), but I don’t. She could have also argued that there was some compelling interest for the state to bypass its normal relationship with other states and usurp Iowa’s authority, but there isn’t. Instead, Helen said it was pretty much like her case against Doug in February; that I had been cyberstalking and cyberbullying her online.

The judge asked my attorney if he had anything to add. He said the court had “absolutely no basis for personal jurisdiction” and furthermore had no subject matter jurisdiction in this case, explaining that I live in Iowa, that none of the alleged acts took place in Florida, and that I had been served in Iowa. He told the court that I had been in Florida recently, but that there was no allegation that I had acted on any of these matters while there. He explained that Helen had the option to charge me in Iowa, where a court would have jurisdiction.

The judge said that many professional lawyers don’t understand the difference between subject matter and personal jurisdiction. This worried me at first because I thought she was talking to my attorney. But she went on to say that, given this fact, she couldn’t expect Helen to understand it. She explained that even if the court could legally deal with the subject matter, that it did not have the power to drag someone from another state into court unless they were served while in Florida. As a result, she simply didn’t have the power to issue the injunction.

Helen asked if she could ask a question, and the judge said yes. Helen explained that the case involved her children and threats against them, just like her case against Doug Hill. She said that DCF was called and implied that I was involved in that. She asked if that made any difference.

The judge said it didn’t matter. First, the injunction was not sought on behalf of the children. In her complaint, Helen claimed that I was threatening her children. But as the judge reminded her, when given the opportunity to name her children in the petition and seek an injunction on their behalf, she chose not to. So no injunction had been sought on behalf of her children. Second, without personal jurisdiction or an argument for long-arm jurisdiction, the judge simply did not have the power to issue the injunction. She advised Helen that if she wanted to, she could file for an injunction in Iowa.

That was it. The judge thanked us for coming and the line went dead.

My lawyer called me later and said he thought we could’ve won on the merits. He said he had read the articles on the website from beginning to end and there was nothing there that constituted any kind of threat that a reasonable person would be afraid of. He had some other suggestions about how to handle this investigation going forward, and I’ll be taking his advice under consideration.

Helen could bring her case here to Iowa, but our laws are different. It’s more difficult to prove cyberstalking because the law is more specific. Florida’s law is very vague. But more importantly, jurisdiction isn’t her problem so coming to Iowa doesn’t make it easier for her. Her problem is that she doesn’t have any evidence of any wrongdoing on my part. She perceives that I’m involved in her troubles a lot more than I am.

Furthermore, a protective order doesn’t affect the free speech being exercised on this site. It only keeps me from coming near her house, which I’ve never done and never threatened to do.

I’m happy to have this behind me. Now we can focus our attention on getting information into the hands of law enforcement that will eventually get her arrested. I heard from another victim just a couple days ago. I’m convinced there is no shortage of victims; we just need to find them and get them to file reports with the appropriate agencies.

 

 

Osceola County Victim Report Form

This is the sixth in what turned into a series of articles. Here is the fifth and here is the seventh.

In the course of talking to law enforcement, I think I have an idea of the steps a person should take if they are a victim of Helen’s scam.

First, a report needs to be filed with local law enforcement (where your house is located). Your local police or sheriff can help you put that together. It’s just a statement of what happened and how much money you are out. When filing with them you can tell them there is already an open investigation in Osceola County, Florida. They may refer your report to Osceola County.

Second, you should file a report with law enforcement in the city where Helen was operating. We’ve been sending people to the county sheriff in Osceola County (if Helen gave you a mailing address in Orlando, Kissimmee, Celebration or other Osceola County location), Hillsborough County (Tampa), or Duval County (Jacksonville). Again, if you’re not filing with Osceola, you can mention that there is an open investigation there. The goal is to get the majority of the investigation happening under one roof.

Finally, you’ll need to talk to an attorney about getting clear title to your home and dealing with your tenants. You may have to formally “evict” Helen, even though she’s not living there. You will have to evict the people occupying your house unless you want to enter into a rental agreement with them and allow them to stay. Again, your attorney can help you with that.

Feel free to mention this website to law enforcement. The simplest way to do that is to use <a href=”http://www.fsboscam.com”>www.fsboscam.com</a>. That site is essentially a “wrapper” around this one and brings everything related to Helen’s scam in one place. I am also happy to talk personally to law enforcement if there’s any information I can provide. I can provide my phone number and other contact info to you. Contact me through the comments here. When you post a comment it does not get uploaded to the website — it gets sent to me by email. I will respond by email and will not post your comments here if you do not wish them to be posted.

The information below was published here at request of the Osceola County Sheriff. You can use it as a guideline for reporting to other law enforcement agencies.

These reports do not need to come to me. However, I’m interested in details like phone numbers, email addresses, mailing addresses, and other specific contact points you may have had with Helen. I’m also interested in the alias she was using and which of her fake companies she claimed to be representing. Having this information allows us to connect her aliases to each other and back to Helen Joanne Pearce. But again, I’m only an interested third party. It’s up to you how much of your private information you want to disclose to me.

If you need help preparing this statement or would like someone to review what you’ve prepared to send to the sheriff, I’d be happy to help. Contact me through the comments.

This link will take you to a PDF of the instructions for completing a statement: Out of County Reports Osceola Florida

Here are the instructions in case you have trouble viewing the PDF:

OSCEOLA COUNTY SHERIFF’S OFFICE

2601 East Irlo Bronson Memorial Hwy.

Kissimmee,FL34744

Out of County Victim Report Process

Crimes that occurred in Osceola County may be reported via email, fax or mail for victims who do not live in Osceola County, Florida. No matter which procedure is used to initially file the report, an original, sworn notarized statement must be received before criminal charges can be filed. Please include the below listed information in the statement. After the statement is received, the victim will be contacted with an incident number and further contact information.

  • Date of Statement
  • Victim name, age, date of birth, race and sex
  • Complete home and business addresses
  • Contact telephone number(s)
  • Contact email, if available
  • Driver license state and number
  • Complete chronological details of the incident. If credit card or bank accounts are involved, include the bank name, address and account number.
  • Total amount of monetary loss, if any.
  • A statement as to whether the victim is willing or not willing to testify in court
  • A statement as to whether the victim does or does not desire to pursue criminal prosecution

Email Reporting. Send all information to sofraud@osceola.org

  • Include the above listed statement information in the body of the email or as a Word or PDF attachment and email to sofraud@osceola.org.
  • Print the statement and have it notarized.
  • Mail the signed, notarized statement to the Osceola County Sheriff’s Office, Economic Crimes Unit, 2601 East Irlo Bronson Memorial Highway, Kissimmee, Florida 34744

Fax Reporting. Fax all information to 321-697-4319

  • Complete a statement with the above information and fax to the Osceola County Sheriff’s Office, Economic Crimes Unit.
  • Mail the statement after it has been signed and notarized to the Osceola County Sheriff’s Office, Economic Crimes Unit, 2601 East Irlo Bronson Memorial Highway, Kissimmee, Florida 34744

US Mail Reporting.

  • Complete a statement with the above information and mail to the Osceola County Sheriff’s Office Economic Crimes Unit after it has been signed and notarized.
  • Mail to: Osceola County Sheriff’s Office, Economic Crimes Unit, 2601 East Irlo Bronson Memorial Highway, Kissimmee, Florida 34744

What’s Wrong With Christian Music?

We recently sang a song during our Sunday morning worship service that prompted me to do some research. Here’s the song:

Friend of God
© Israel Houghton, 2003

Verse 1
Who am I that You are mindful of me
That You hear me when I call
Is it true that You are thinking of me
How You love me it’s amazing

Verse 1 Again
Who am I that You are mindful of me
That You hear me when I call
Is it true that You are thinking of me
How You love me it’s amazing

Chorus
I am a friend of God
I am a friend of God
I am a friend of God
He calls me friend

Verse 1 AGAIN
Who am I that You are mindful of me
That You hear me when I call
Is it true that You are thinking of me
How You love me it’s amazing

So amazing, it’s amazing

Chorus
I am a friend of God
I am a friend of God
I am a friend of God
He calls me friend

Random Repeated Phrases Similar to Chorus
God Almighty, Lord of Glory
You have called me friend
You have called me friend
You have called me friend

I am a friend of God
I am a friend of God
I am a friend of God
He calls me friend
He calls me friend
He calls me friend…

Granted, we also did some traditional hymns, and I appreciate that, but this one encapsulates so many of the issues I have with the music we’re singing in church. There are three verses, but they’re all the same. The chorus is just the same phrase over and over.

Compare to the same message as expressed in these classic hymns:

Christ a Redeemer and Friend
John Newton, 1799

Poor, weak and worthless though I am
I have a rich almighty Friend;
Jesus, the Savior, is His Name;
He freely loves, and without end.

He ransomed me from hell with blood,
And by His power my foes controlled;
He found me wandering far from God,
And brought me to His chosen fold.

But, ah! my inmost spirit mourns;
And well my eyes with tears may swim,
To think of my perverse returns:
I’ve been a faithless friend to Him.

Often my gracious Friend I grieve,
Neglect, distrust, and disobey;
And often Satan’s lies believe
Sooner than all my Friend can say.

Sure, were I not most vile and base,
I could not thus my Friend requite!
And were not He the God of grace,
He’d frown and spurn me from my sight.

He cheers my heart, my needs supplies,
And says that I shall shortly be,
Enthroned with Him above the skies;
O what a Friend is Christ to me!

And this one:

What a Friend We Have in Jesus
Joseph Medlicott Scriven, circa 1885.

What a Friend we have in Jesus, all our sins and griefs to bear!
What a privilege to carry everything to God in prayer!
O what peace we often forfeit, O what needless pain we bear,
All because we do not carry everything to God in prayer.

Have we trials and temptations? Is there trouble anywhere?
We should never be discouraged; take it to the Lord in prayer.
Can we find a friend so faithful who will all our sorrows share?
Jesus knows our every weakness; take it to the Lord in prayer.

Are we weak and heavy laden, cumbered with a load of care?
Precious Savior, still our refuge, take it to the Lord in prayer.
Do your friends despise, forsake you? Take it to the Lord in prayer!
In His arms He’ll take and shield you; you will find a solace there.

Blessed Savior, Thou hast promised Thou wilt all our burdens bear
May we ever, Lord, be bringing all to Thee in earnest prayer.
Soon in glory bright unclouded there will be no need for prayer
Rapture, praise and endless worship will be our sweet portion there.

There are important differences. First is the density of doctrinal content, yet without taking away from the poetry. Second is that Jesus, rather than the writer is the object of adoration. That is, in Friend of God, I am a friend of God. In What a Friend We Have In Jesus, it is Jesus who is my friend. The former is name dropping; the latter is praise. The former lifts me up, the latter lifts Jesus up.

We have much to say about this, but it is hard to make it clear to you because you no longer try to understand. In fact, though by this time you ought to be teachers, you need someone to teach you the elementary truths of God’s word all over again. You need milk, not solid food! Anyone who lives on milk, being still an infant, is not acquainted with the teaching about righteousness. But solid food is for the mature, who by constant use have trained themselves to distinguish good from evil. (Heb 5:11-14)

Why I Don’t Care About Swift

Swift is a new programming language created by Apple for use on OS X and iOS devices. The programming world is agog. Apple’s fantastic new language apparently solves all their problems, as evidenced, they say, by the fact that some programmer ported Flappy Birds to it in a few hours.

I’ve been around long enough to see languages come and go. Each claimed to solve all the problems introduced by its predecessors, yet each was replaced by a language that solved all its problems. In some cases, the new language surpassed the success of the language it replaced (C++ and Java); in other cases, the new language faded into obscurity (Modula-2 and Ada).

Lately the motivations for new languages have been dubious. There is a big emphasis on making a language easy to learn and having it hide nasty issues related to memory management and type safety. One review of Swift I read stated, “Apple hopes to make the language more approachable, and hence encourage a new group of self-taught programmers”. While that sounds great, it means that those of us who have mastered our craft after 30 years or more of practice are saddled with the training wheels and water wings that are written into these languages for the noobs.

A classic example is the lack of unsigned integers in Java. The motivation for this was to simplify the language for “new and self-taught programmers” by avoiding errors caused by a lack of understanding of sign-extension. However, for those of us who showed up for class the day that sign extension was taught (that would be day two), we’re left with a language that unnecessarily limits the range of positive integers and requires us to actually have mastered sign extension in order to understand what is happening when we directly manipulate the bits in our integer variables.

Explicit vs. Implicit Typing

One of the simplifications Swift makes is that it infers the types of variables from the values assigned to them rather than requiring the programmer to explicitly type variables. If this was true “weak typing” like I’m familiar with in VBScript, it would be great (though it would come with its own set of problems). But all Swift does is infer the type of the variable from the first value you assign to it.

This actually introduces problems, because it’s not always possible to unequivocally determine the type of a literal value. So Swift gives you ways to force it to interpret a literal value as a given type. Rather than removing the necessity of the programmer understanding types, Swift thus requires “new and self-taught” programmers to have a mastery of types so that they can understand how Swift is working behind the scenes and make sure that their variables have the desired type.

Strings

Swift is said to improve string-handling over Objective-C (the current language used on OS X and iOS). There is certainly room for improvement there. When I first started programming in Objective-C, one of the first things I did was bring over my own C++ string class, as I found NSString to be overly complicated and muddled. Over the years I’ve gotten better with NSString.

I would argue, however, that some of the so-called “improvements” in Swift with respect to strings are differences without a distinction. So instead of this in Objective-C:

[NSString stringWithFormat:@"The value of num is %d", num]

you say this in Swift:

"The value of num is \(num)"

The Swift version is obviously more concise, but it is also less powerful. To add more complex format specifications to Swift you actually have to invoke the functionality of the underlying NSString class, which means the “new and self-taught” programmer, again, needs to understand the details of the implementation in order to do anything beyond the simplest strings.

One of the stated benefits of string handling in Swift is that “all strings are mutable”. One need not worry about whether the string is declared as an NSString (immutable) or NSMutableString (mutable). Well, you don’t have to worry unless you do have to worry — strings assigned to constants are immutable in Swift. So:

var myString1 = "Mutable string"
let myString2 = "Immutable string"
myString1 += myString2    // perfectly legal
myString2 += myString1    // compile-time error

Switch Statements

Swift eliminates the “fall-through” behavior of switch statements, which is said to eliminate bugs caused by omitting the break at the end of each case block. But, oops, sometimes the fall-through behavior is exactly what you want. So Swift adds the fallthrough keyword. It could be argued that Swift eliminates a line of code (the break) while giving the behavior one normally desires. But at the same time, it adds a keyword (fallthrough) that does the opposite. This requires “new and self-taught” programmers to have the same thorough understanding of switch behavior that Objective-C and C++ programmers do.

Single-line Blocks

The Swift compiler will warn you if you omit the braces in any block (such as after an if) and does not allow single-line blocks, thus avoiding this error:

if (x < 0)
    goto fail;
    goto fail;

The code above will always execute one or the other of the goto statements in Objective-C or C++. Even though the second goto is indented, it is not part of the if-block and will be executed if the condition is false.

Swift will warn you about the missing braces and force you to write this:

if (x < 0)
    {
    goto fail;
    }
goto fail;

Or, for those of you who don’t do your braces the right way, this…

if (x < 0) {
   goto fail;
}
goto fail;

This is fine, and hard to argue with. The supposition is that the programmer will immediately recognize the flaw or won’t make the mistake in the first place. On the other hand, I would argue that the same C++ programmer who wrote the erroneous code will write this in Swift:

if (x < 0) {
    goto fail; }
    goto fail;

I always put braces around my blocks, even if they are one-line, so this doesn’t affect me. It’s ironic, however, that while Swift prides itself in eliminating the unnecessary break statement at the end of a case block, it requires two to four additional lines (braces) in if, for, and while statements, which are more numerous.

PocketBible and Swift

I will be more than happy to learn and use Swift for programming on iOS and OS X. I just don’t believe the hype and won’t convert just for the sake of doing something new.

I am a strong proponent of platform-independent languages like C, C++, Java, and, to a lesser extent, Objective-C (the latter is primarily an Apple language, though it has its origins outside of Apple). Such languages allow me to develop code on one platform and re-use it on another. One of the promises of C++ and Java was that you could develop the code for one platform and use it on many others. Swift is an Apple language (the same way C# is a Microsoft language). It only works on Apple devices. While those are numerous, they’re not the only devices out there. So rather than moving toward the “write once, read everywhere” model promised by Java, we’re back to “write everywhere” as each platform requires its own language.

I don’t mind learning a new language. I already jump from C++ to C# to Java to VBScript to Javascript to MS-SQL on a daily basis. For those of us who write code for a living, being multilingual is a job requirement. This is precisely why I care so very little about the supposed advantages of Swift; this isn’t a religious war for me, it’s just a tool. When someone comes out with a new kind of screwdriver, I may or may not buy it until I need it. And then I’ll just buy one and use it — I won’t try to convert all my screwdriver-toting friends.

So will PocketBible for OS X and/or iOS be re-written in Swift? Probably not today, and probably not until Apple requires it. But Swift depends on Objective-C under the hood, so my guess is that Apple will continue to support Objective-C apps for a long time.

Helen Joanne Pearce Companies and Aliases

This is the fifth in what turned into a series of articles. Here is the fourth and here is the next.

I’m going to use this post to keep an up-to-date list of the company names, aliases, and addresses Helen and Matt are using.

If you have been doing business with any one of these people or businesses, they are all Helen Joanne Pearce operating under a different name. If you do a Google search for any of these, you’ll mostly find the blog articles and online comments that Helen herself has created to make it appear that her company is legit.

Just for reference, the address on Helen’s drivers license is 52 Riley Rd #231, Kissimmee, FL, which is a UPS Store. I wouldn’t normally publish a person’s home address here, but this is not her home address.

Company Aliases Connections

KACW Investments, Inc. (2004-06)

Originally 2855 SE 50th St, Ocala, FL (single-family home)

Changed to 12472 Lake Underhill Rd #143, Orlando, FL (UPS Store) in 2005

Registered to Helen J Pearce and Matthew E Pearce

Online comments: Helen Joanne Pearce

Obvious. Court documents in 2006 mention Joanne Pearce at KACW Investments, 3854 SW 168 Circle, Ocala, FL (mobile home)

Way Home Investments, Inc. (2005-06)

Originally 967 Lilac Trace Ln, Orlando, FL (single family home; see this YouTube video)

Changed in 2006 to 1969 S. Alafaya Tr #125, Orlando, FL 32828 (UPS Store)

Registered to Matthew E Pearce and Helen Pearce Obvious.

In Faith Properties, Inc. (2007)

1969 S. Alafaya Tr #125, Orlando, FL (UPS Store)

Registered to Matthew E Pearce and Helen J Pearce Obvious. 2007 court case names “Matt and Helen (Joanne) Pearce”. Another names “Helen J. Pearce” at this same address.

Dun and King Investments (2008)

1926 N. John Young Pkwy #128, Kissimmee, FL (Convenience store? with mailboxes)

Registered to Neleha K. Dun, Tracy L. King, Morgan P. Jones, Katy B. Dery “Neleha” is (a)Helen backwards. Neleha’s website biography says she has a law degree from Oklahoma City University and to have attended the University of Central Oklahoma. Helen’s Facebook profile says she went to Oklahoma University, and Matt’s says he went to Oklahoma State. Matt and Helen are both from Oklahoma. I haven’t tried hard to locate her “partners” in this company, but note she has a very close relative with the same first name and middle initial as one of them.

Jubilee Property Ventures (2009)

2224 W Columbia Ave #109, Kissimmee, FL (FedEx/Western Union)

Registered to Jules Scott and Novak Leeann (suspect it shoud be Leeann Novak)

Online comments: Joanne Helen Pearce

2009 court case names Jules Scott and Joanne Helen Pearce.

Mary Jones Projects LLC (2010-11)

14900 E Orange Lake Blvd #348, Kissimmee FL (PakMail store)

Registered to Mary Jones and Julie Bell

Online comments: Helen Joanne Pearce whose husband is Matthew

Website FAQ as quoted in online comments is virtually identical to Flat Stone Capital; uses same awkward grammar to describe Mary Jones’ qualifications as Flat Stone Capital uses to describe JJ Pierce.

JEP Genesis LLC (2010-11)

52 Riley Rd #231, Kissimmee, FL (UPS Store)

Owners are Joanne and Eric Pearce

Online comments: Joanne Pearce says Eric is an “investor”

Same address as on Helen’s Florida driver’s license. 2009 court case names Joanne Pearce at this address.

Redfield Holdings LLC (2012-14)

3050 Dyer Blvd #185, Kissimmee, FL (UPS Store)

8/1/12

Owner JJ Pearce Website at the time was virtually identical to Flat Stone Capital LLC website. FSC Endeavors LLC website registered to Eric Pearce using redfieldholdings@ in email address. Helen Pearce admitted in sworn documents to Osceola County Court that she is Ferin Caffrey (owner of FSC Endeavors LLC).

Flat Stone Capital LLC (2013-14)

52 Riley Rd #172, Kissimmee, FL (UPS Store)

12/20/13

Owner JJ Pierce Helen Pearce admitted in a sworn statement to the Osceola County Court that she is JJ Pierce of Flat Stone Capital LLC.

FS Capital LLC (2014)

14900 E Orange Lake Blvd, Kissimmee, FL (PakMail store)

2/14/14

Owner Faith Stuart Website at the time was virtually identical to Flat Stone Capital LLC website.

RF Holdings, FL Corp (2014-15)

503 E Jackson St, Tampa, FL 33602 (UPS Store)

4/18/14

Owner Rose Hill Victims on Zillow describe similar experiences.

RFH, FL, Inc. (2014-15)

701 S Howard Ave, Tampa, FL (UPS Store)

8/11/14

Owner Reagan Fields

Reagan Fields tells victims she has taken owners of this website to court; can only be Helen Joanne Pearce.

Phone (813) 423-1876

FSC Endeavors LLC (2014-15)

221 N Hogan St, Jacksonville, FL (UPS Store)

9/28/14

Owner Ferin Caffrey

Website domain name registered to Eric Pearce with redfieldholdings@ in email address.

Victims mention Ferin Carrey and Erin Cafferty

Helen Pearce admitted in a sworn statement to the Osceola County Court that she is Ferin Caffrey of FSC Endeavors LLC and FSCE Homes. Website FAQ, contracts virtually identical to Flat Stone Capital LLC.

River Financial Horizons LLC (registered as River F Horizons LLC) (2014-15)

369 Lexington Ave, New York, NY

Karen River Website FAQ, contracts virtually identical to Flat Stone Capital LLC

FSCE Homes (2015)

Not a registered LLC in Florida

Ferin Caffrey, Ferin Carrey, Erin Cafferty Helen Pearce admitted in a sworn statement to the Osceola County Court that she is Ferin Caffrey.

Tabitha’s House and Pack Fund (2015)

Not registered in Florida

Helen Peace, Matt Pear Helen and Matt changed their names on Facebook, but they are the same Facebook accounts as before. Operating a GoFundMe project and a Facebook page Luke 6:30, ostensibly to raise funds for a homeless shelter and to hand out necessities to the homeless in Orlando. Location of “homeless” photos.