tag:blogger.com,1999:blog-60362247724567846162023-11-16T01:04:53.300-06:00Diary of a Private InvestigatorThe PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.comBlogger66125tag:blogger.com,1999:blog-6036224772456784616.post-61192077524646417492019-10-06T10:50:00.000-05:002019-10-06T10:50:24.561-05:00Please visit the new home of my blog:<br />
<br />
<a href="https://www.cheryldring.com/blog">https://www.cheryldring.com/blog</a><br />
<br />
Learn how I received a message from heaven that could not be debunked.The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-26329914451721806732019-03-31T08:40:00.004-05:002019-03-31T08:43:46.430-05:00Can a PI Prove There is Life After Death? - Diary of a Private Investigator<h2 class="date-header" style="background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 0px; position: relative;">
</h2>
<div>
<span style="font-family: inherit;">August 15, 2015, I began writing about my research on life after death. <span style="background-color: white; color: #666666;">Needless to say, I am extremely curious about life after death and have been exploring this possibility for a long time. I was born with the mind to solve problems. It full fills my desire and this is why I love my job so much.</span></span></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<h2 class="date-header" style="background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 11px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 0px; position: relative;">
<span style="background-color: #bbbbbb; color: white; letter-spacing: 3px; margin: inherit; padding: 0.4em;">Saturday, August 15, 2015</span></h2>
<div class="date-posts" style="background-color: white; color: #666666; font-family: "Trebuchet MS", Trebuchet, Verdana, sans-serif; font-size: 12px;">
<div class="post-outer">
<div class="post hentry uncustomized-post-template" itemprop="blogPost" itemscope="itemscope" itemtype="http://schema.org/BlogPosting" style="margin: 0px 0px 45px; min-height: 0px; position: relative;">
<a href="https://www.blogger.com/u/1/null" name="4362261844830349706"></a><br />
<h3 class="post-title entry-title" itemprop="name" style="font-size: 22px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: normal; line-height: normal; margin: 0.75em 0px 0px; position: relative;">
Can A Private Investigator Prove Life After Death?</h3>
<div class="post-header" style="font-size: 10.8px; line-height: 1.6; margin: 0px 0px 1.5em;">
<div class="post-header-line-1">
</div>
</div>
<div class="post-body entry-content" id="post-body-4362261844830349706" itemprop="description articleBody" style="font-size: 13.2px; line-height: 1.4; position: relative; width: 546px;">
"As a skeptic by nature, I believe what I see and question what I can't and this is why, along with my problem-solving skills, my calling in life, at least the first half of my life, was to be an investigator. I have to believe it because that is where I ended up. With 30 years behind me, I have accomplished more than most in my field. I am proud of the success I have had in my career and is the reason I write this blog. First and foremost my primary goal as an advocate and experienced adventurer is to write about experiences that will help another person. With that said someone who knows me well brought a book to my attention and thought that I would be interested in reading it. It's called <i>Answers About The Afterlife </i>written by Bob Olson who is the host of afterlifetv.com and a Private Investigator who for 15 years investigated the possibility of there being a life after death. My eyebrows raised and curiosity got the best of me.<br />
<br />
Now, as a spiritual person who has wind chimes hanging off of her patio roof and a library full of read books about life after death and near-death experiences, including <i>Life Before Life </i>by Jim B. Tucker, <i>Return To Life </i>also written by Jim B. Tucker, <i>Proof Of Heaven </i>written by a neurosurgeon Dr. Eben Alexander M.D. about his near-death experience, <i>To Heaven And Back</i> by Dr. Mary C. Neal, MD about her near death experience, <i>Journey Of Souls </i>by Dr. Michael Newton, PhD, and <i>Destiny Of Souls</i> also by Dr, Michael Newton, PhD who is a regression therapist and documented hundreds of his patient sessions and compiled common experiences into these books. I was fascinated with all of these books and those I have not yet mentioned. I read books written by medical doctors because like an Investigator they require their diagnosis to be seen under a microscope and not merely by suggestion or instinct. I would have a better understanding of our common skepticism by not believing something without some type of proof. Speaking of proof, I am also a huge fan of the miniseries <i>Proof</i> that can be seen on TNT about a medical doctor who had a near death experience and has been hired by a man with a terminal disease to find proof of life after death. I have also seen all of the episodes of <i>The Ghost Within My Child </i>that tells the true stories of families who have experienced their very young children claiming to have lived before providing detailed information including names, addresses, and dates from their previous lives. Dr. Jim B. Tucker along with Dr. Ian Stevenson would take similar stories and conduct very in-depth investigations in order to rule the claim of the child to be true or false. This also includes the story and movie seen in theaters <i>Heaven Is For Real </i>about a four-year-old boy from a small town in Nebraska who allegedly died momentarily while suffering from a ruptured appendix. The movie was based on the book written by his Pastor father Todd Burpo with Lynn Vincent. I have also watched Theresa Caputo of the <i>Long Island Medium</i> and Rosie Cepero from <i>Angels Among Us</i> both shows on television that demonstrate their claimed abilities to connect with loved ones who have crossed over. I have been to mediums, psychics, and a channeler who have all claimed to be the real deal. Some were clearly not and some were convincing enough to be considered the real deal. It is not my job to decide who is real and who is not nor do I care to spend the time to do so. I do enjoy sitting back and letting everyone else do the hard work while I can simply pick up a book of a person whom I consider realistic with skepticism and learn from them."<br />
<br />
Movies, tv series and books do not prove life after death, however, the investigations behind these stories have merit but, not as much as the people behind the investigations. Who are they and what do they base their theory on?</div>
<div class="post-body entry-content" id="post-body-4362261844830349706" itemprop="description articleBody" style="font-size: 13.2px; line-height: 1.4; position: relative; width: 546px;">
<br /></div>
<div class="post-body entry-content" id="post-body-4362261844830349706" itemprop="description articleBody" style="font-size: 13.2px; line-height: 1.4; position: relative; width: 546px;">
<span style="font-size: 13.2px;">To be continued.............</span><br />
<br style="font-size: 13.2px;" />
<span style="font-size: xx-small;"><i>Everything written in this blog is based on my investigation of life after death. It is based on research of both written material and physical experiences of others. It also includes personal experiences on different levels of meditation, past life regression, and mediums of various kinds. My resources will be listed on a future posting.-Thank you for reading. Please share this with your friends</i></span><span style="font-size: 13.2px;">.</span></div>
</div>
</div>
</div>
The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-90394461942132237302019-03-18T14:38:00.000-05:002019-03-18T14:41:55.218-05:00Where Is Heaven? - Diary of a Private Investigator<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<img alt="Image result for outer space" height="180" src="https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcRzz7kO1dNA3enTlzsUtO_DUzdNp2NB_fbP4B2hb6IFS15DsFqMtQ" width="320" /> <span style="font-size: large;"><b> Where is Heaven?</b></span><br />
<span style="font-size: large;"><b><br /></b></span> As children, we often look up and imagine heaven is somewhere over our heads and that is where our pets and grandparents go to when they die. They say that children are very intuitive when it comes to death.<br />
<br />
Assuming there is a heaven, it is not a place, so to speak. Heaven is a transparent spiritual plane. Meaning, when a soul leaves its body, it returns back into its spiritual form and resides in the spirit realm. This also insinuates that we live multiple lives on earth.<br />
<br />
There are heaven and earth. Earth is where the human body lives. Our soul or spirit lives inside the body. Earth is a physical place composed of matter that are things you can touch and feel thanks to our senses. In heaven, it's very different. In heaven, a spirit doesn't communicate with sound or feel with the body. Instead, a spirit can read the mind of another spirit and that is how the spirits communicate in the form of mental telepathy. They touch the same way they communicate. They read each other's feelings and embrace telepathically.<br />
<br />
When someone dies and the soul leaves the body, they typically linger by the body. This is common and the most opportune time for us to see the spirit of the deceased in the form of a "ghost".<br />
<br />
The day my father died I swore that I saw him walking in the hallway at his house. It was a glimpse of him that caught my eye. Later that day, a door flung open and at a different time a light went on in his bedroom. This was years before I began my research on the topic. Now, I firmly believe that what I thought I saw <i>was</i> my father. My rabbi agreed.<br />
<br />
So, why are children so intuitive when it comes to death? Maybe because they more recently died in a previous life and are close to the spirit world.<br />
<br />
Did you know that there is no such thing as time in heaven? To our loved ones who just left us, they will be seeing us shortly (in their time), even if it takes us 50 more earth years to get there.<br />
<br />
To be continued.............<br />
<br />
<span style="font-size: x-small;"><i>Everything written in this blog is based on my investigation of life after death. It is based on research of both written material and physical experiences of others. It also includes personal experiences on different levels of meditation, past life regression, and mediums of various kinds. My resources will be listed on a future posting.-Thank you for reading. Please share this with your friends</i></span>.<br />
<br />
<br />The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-89553463561193965082019-03-02T16:39:00.003-06:002019-03-02T16:51:28.124-06:00My Journey of The In-Between -Diary of a Private Investigator<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbPGOn1g3ilctIsLI-kwVsSVd41xGlCEbdaXLTu7UEWlcnFXkKKBKLWTackvNAZkDpYktBQ3I1U4cPnt1AQrQ1oKktWq0k_H3b9Zhc7vT_NKsRb5h8oOdcNnJrmnEi0mBxA503JiAq2_r_/s1600/Life+After+Death+Pic.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1367" data-original-width="1600" height="273" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbPGOn1g3ilctIsLI-kwVsSVd41xGlCEbdaXLTu7UEWlcnFXkKKBKLWTackvNAZkDpYktBQ3I1U4cPnt1AQrQ1oKktWq0k_H3b9Zhc7vT_NKsRb5h8oOdcNnJrmnEi0mBxA503JiAq2_r_/s320/Life+After+Death+Pic.jpg" width="320" /></a></div>
First, let's call it what it is. Heaven is Heaven. It's what I call the "in-between" place souls go to when they leave the body.<br />
<br />
Second, the soul is your inner being. Your soul is <i>you</i>. <i>You </i>are consciousness.<br />
<br />
Your body is a shell that houses your soul. When the body dies, the soul survives.<br />
<br />
When the soul leaves the body, there is no feeling of transition. It will not feel any different than the way it felt <i>with</i> the body. There is no feeling of death. Sometimes people don't know they have died and carry on as if they were still alive.<br />
<br />
In Heaven, there is no such thing as religion. We are all created equal and diversity does not exist. Hell does not exist though souls that lead a life of crime on earth will experience a less than desirable entrance into Heaven much like where they will end up in the beginning.<br />
<br />
The soul is pure love. Human's are people with a soul combined with earthly elements. Earthly elements cause us to experience emotions that can lead to hatred, prejudice, or drug addiction. It can also lead to happiness, goodness, or anxiety. It can lead to any issues that humans are stuck dealing with on a daily basis.<br />
<br />
There are angels that walk among us.<br />
<br />
Were Michael Jackson, Marilyn Monroe Robin Williams and any celebrities who were born with amazing talents only meant to be on earth a short time regardless of how their lives ended?<br />
<br />
To be continued.....................<br />
<br />
<span style="font-size: x-small;"><i>Everything written in this blog is based on my investigation of life after death. It is based on research of both written material and physical experiences of others. It also includes personal experiences on different levels of meditation, past life regression, and mediums of various kinds. My resources will be listed on a future posting.-Thank you for reading. Please share this with your friends</i></span>.The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-37377673926260673112019-01-21T18:49:00.001-06:002019-01-21T18:49:19.642-06:00Investigation - Life After Death - My Report<h1 class="entry-title fn" itemprop="name" style="background-color: white; border: 0px; clear: left; color: #333333; font-family: Aleo, Georgia, serif; font-size: 2rem; font-weight: inherit; line-height: 1.0625; margin: 0px 0px 0.75rem; outline: 0px; padding: 0px; vertical-align: baseline;">
Death Is Nothing At All</h1>
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;">Death is nothing at all. </span><br />
<span style="font-family: Times, Times New Roman, serif;">It does not count. </span><br />
<span style="font-family: Times, Times New Roman, serif;">I have only slipped way into the next room. </span><br />
<span style="font-family: Times, Times New Roman, serif;">Nothing has happened. </span><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;">Everything remains exactly as it was. </span><br />
<span style="font-family: Times, Times New Roman, serif;">I am I, and you are you, </span><br />
<span style="font-family: Times, Times New Roman, serif;">and the old life that we lived so fondly together is untouched, unchanged. </span><br />
<span style="font-family: Times, Times New Roman, serif;">Whatever we were to each other, that we are still. </span><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;">Call me by the old familiar name. </span><br />
<span style="font-family: Times, Times New Roman, serif;">Speak of me in the easy way which you always used to. </span><br />
<span style="font-family: Times, Times New Roman, serif;">Put no difference into your tone. </span><br />
<span style="font-family: Times, Times New Roman, serif;">Wear no forced air of solemnity or sorrow. </span><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;">Laugh as we always laughed at the little jokes that we enjoyed together. </span><br />
<span style="font-family: Times, Times New Roman, serif;">Play, smile, think of me, pray for me. </span><br />
<span style="font-family: Times, Times New Roman, serif;">Let my name be ever the household word that it always was. </span><br />
<span style="font-family: Times, Times New Roman, serif;">Let it be spoken without any effort, without the ghost of a shadow upon it. </span><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;">Life means all that it ever meant. </span><br />
<span style="font-family: Times, Times New Roman, serif;">It is the same as it ever was. </span><br />
<span style="font-family: Times, Times New Roman, serif;">There is absolute and unbroken continuity. </span><br />
<span style="font-family: Times, Times New Roman, serif;">What is death but a negligible accident? </span><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;">Why should I be out of mind because I am out of sight? </span><br />
<span style="font-family: Times, Times New Roman, serif;">I am but waiting for you, for an interval, </span><br />
<span style="font-family: Times, Times New Roman, serif;">somewhere very near, </span><br />
<span style="font-family: Times, Times New Roman, serif;">just round the corner. </span><br />
<span style="font-family: Times, Times New Roman, serif;">All is well.</span><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;">Henry Scott Holland</span><br />
<br />
<br />
<h1 class="entry-title fn" itemprop="name" style="background-color: #718fa4; border: 0px; color: #333333; font-family: Nunito, Helvetica, sans-serif; font-size: 16px; font-weight: inherit; margin: 0px 0px 0.75rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></h1>
The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-16664011655587719152018-09-12T07:21:00.003-05:002018-09-12T07:21:40.469-05:00IRS and Tax ScamThis has recently surfaced.<div>
<br /></div>
<div>
Have you received a text like this?</div>
<div>
<br /></div>
<div>
"Let me resolve your tax problems the right way. Contact me- 207-494-5888"</div>
<div>
<br /></div>
<div>
OR</div>
<div>
<br /></div>
<div>
"There is an update about your IRS tax case. Please call me, 916-239-4663."</div>
<div>
<br /></div>
<div>
THESE ARE SCAMS. Please share</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-52992577882391747272018-07-22T17:55:00.001-05:002018-07-22T17:57:12.191-05:00Microsoft 800-642-7676 Real or Fake?<span style="font-size: large;">Microsoft</span><br />
<br />
<span style="background-color: white; color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="font-size: x-large;">800-642-7676</span></span><br />
<span style="background-color: white; color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="font-size: x-large;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">Is this a real telephone number for Microsoft? </span></span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">I called it, got the help I needed, and received a case reference number for my issue. I hung up. Next, I went to the Microsoft website, microsoft.com, and used the virtual Contact Microsoft Support. </span>https://support.microsoft.com/en-us/contactus/</span><span style="background-color: white; color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"> I requested they call me back. They called back minutes later from 425-635-2970, another number being reported as a scam. But, they were able to locate the case reference number that I had acquired from the first technician I spoke with.</span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">It was a simple investigation that may have confirmed this telephone number as a legit number. </span></span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">During my investigation, I found hundreds of postings from computer users reporting these numbers as scams claiming to have received phone calls from these number being identified by the caller as a Microsoft technician. </span></span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">https://www.microsoft.com/en-us/wdsi/threats/support-scams</span></span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">The caller would claim that the recipient was experiencing problems with their computer. They would claim to have the answer to all of your problems. They would try to sell you software that would clean your computer and all the bugs would go away. Wait, but first, you have to give them remote access to your computer. WARNING, WARNING, WARNING.</span></span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">Maybe not.</span></span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">Microsoft technicians also ask to have remote access to your computer in order to quickly fix the problem. You can see what they are doing as they are doing it the entire time. What they will not do is go into your personal files like the scammers do. You will see them only utilize the Microsoft website for the proper software that will fix your computer FOR FREE.</span></span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">After, you will receive an email from Microsoft confirming your communication with them. The scammers do not do this. </span></span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">So, why does a legitimate phone number for Microsoft show up on your caller id when it's really a scam? The scammers can program any number they want to show up on your caller id screen. They are ready for the challenging question of, "are you really with Microsoft?" In their perhaps best American English accent and with confidence, they reply, "why yes ma'am. I am calling from Microsoft. You can call it if you like. You will see it is a Microsoft number I am calling from." Most people don't second guess and will move on with the call but, more and more people these days will hang up and call the number to find out the call was a scam. Better yet, they will look it up online to check for other complaints. But, what can you believe these days? </span></span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">Based on my findings, these numbers are legit when you call them yourself. </span></span><br />
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;"><br /></span></span>
<span style="color: #1d2129; font-family: "helvetica" , "arial" , sans-serif;"><span style="background-color: white;">To protect yourself, first, go to your settings and look for Microsoft updates. Go to the website, microsoft.com, and look for the support you need. Do not google Microsoft in order to get a telephone number. This is where most peoples' problems begin.</span></span><br />
<br />
<br />The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-86987633163169501872018-02-10T15:50:00.000-06:002018-02-10T15:50:53.462-06:00A private investigator walks into a phlebotomy class....A private investigator walks into a phlebotomy class... It sounds like the beginning of a good joke, doesn't it? These two words don't go together, investigator and phlebotomy, unless someone at the school or the school itself was being investigated. Or, there is a very good explanation that involves the investigator herself, yours truly.<br />
<br />
After almost 30 years of putting puzzles together as the investigator, I decided to use my skills in the healthcare field and under the microscope. My reason is very personal along with the desire to work in the healthcare industry. Phlebotomy is the first step to go to where I want to be.<br />
<br />
Phlebotomists are people who draw blood and they make their jobs look easy but, until you have been behind the scenes as I have, it is anything but easy. I have a new respect for phlebotomists who have the responsibility for the well being of the patient whom they stick. They have to know where to stick, how to stick, and everything there is to do after the stick. They must know precisely how to get the best batch of blood in the right tubes in the right order because every tube has a different purpose most containing additives. The tubes must be inverted a certain amount of times in order for the blood to be at its best when the lab technicians run their tests.<br />
<br />
In order to become a state certified phlebotomist, one must understand how the body functions including where blood comes from, the different kinds of blood and their function, as well as all about the circulatory system, internal organs, and HIPAA. <br />
<br />
I give credit to my fellow classmates whom I had the pleasure of sharing a wonderful six weeks with. We learned together, experimented on, and learned from one another. Hats off to Keisha Randle who was an extraordinary instructor with the patience to get us through the program.<br />
<br />
CONGRATS PHLEBOTOMY CLASS OF 2018!!!<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizApsjBXBWwCHCCJhf939F2wC6WWkXcEnG4rmrCsft7SHpFdHLaIlQ0eZzpt3LfVMVXgmH2LXtzaLcy_dAXk3YXTqitQR-e2Om1a7ur77q0D2wkK5XtuUYCBKfmfEv0n1FjCNiXZ3FvYXd/s1600/1292_1518197760832.jpeg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1200" data-original-width="1600" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizApsjBXBWwCHCCJhf939F2wC6WWkXcEnG4rmrCsft7SHpFdHLaIlQ0eZzpt3LfVMVXgmH2LXtzaLcy_dAXk3YXTqitQR-e2Om1a7ur77q0D2wkK5XtuUYCBKfmfEv0n1FjCNiXZ3FvYXd/s640/1292_1518197760832.jpeg" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFMJg66esBksal3DmHrNmAhEN4DcU4ViJrDZfHPAZM3GIyIMPkyUT5VVyI-h2cjAQYkBObGcfsmWWVkcUlK5ixdOpUNALA8MboqXoZKcMwTyVvRz01IeE9HMooWP7EjH6SpWHBCKnrVFe3/s1600/20180209_093815.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="778" data-original-width="1600" height="155" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFMJg66esBksal3DmHrNmAhEN4DcU4ViJrDZfHPAZM3GIyIMPkyUT5VVyI-h2cjAQYkBObGcfsmWWVkcUlK5ixdOpUNALA8MboqXoZKcMwTyVvRz01IeE9HMooWP7EjH6SpWHBCKnrVFe3/s320/20180209_093815.jpg" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXhLwGgj2SYDq8ledbavxuF9CYw4LkU2Nevkfw3mQZUkfnoBcs3IaHoxOH-xg57vfFLKW_-r0MaO-ddu3mlcVFfRxi6pvCer_PhFYGESeqeEMOdwtlDotpcdwfTPeax3Cz2_Q8LvE-Y6Em/s1600/20180209_093949.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="778" data-original-width="1600" height="155" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXhLwGgj2SYDq8ledbavxuF9CYw4LkU2Nevkfw3mQZUkfnoBcs3IaHoxOH-xg57vfFLKW_-r0MaO-ddu3mlcVFfRxi6pvCer_PhFYGESeqeEMOdwtlDotpcdwfTPeax3Cz2_Q8LvE-Y6Em/s320/20180209_093949.jpg" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHxqM3RT1YfKgHLHrMi95L3yPhqXBPMs4NGAzY0RMuIVelpYQrWj7T1yd2jnqIQPjJJRBqVAMjmBtYVqAZIcDX4LF2KtATW7x4Ir6jfgSEJ8Pw8JSKMoDYJ0DgdAtw2z8uSiubhyah-yrE/s1600/20180209_115244.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="778" data-original-width="1600" height="155" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHxqM3RT1YfKgHLHrMi95L3yPhqXBPMs4NGAzY0RMuIVelpYQrWj7T1yd2jnqIQPjJJRBqVAMjmBtYVqAZIcDX4LF2KtATW7x4Ir6jfgSEJ8Pw8JSKMoDYJ0DgdAtw2z8uSiubhyah-yrE/s320/20180209_115244.jpg" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCInWbBeV4jiiqKN_-pN9PoGlF1dhKxMHc5gyhoudNZoARBOCjYJ1gKYWfK5h4DjEZwhwb4_SXf-flV0aFL-WADB80URjEoFKWAxLCEaMEV2l9flwYQGk8-wPQymqQvC7MF8cPBM7I-n6U/s1600/20180209_115246+%25281%2529.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="778" data-original-width="1600" height="155" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCInWbBeV4jiiqKN_-pN9PoGlF1dhKxMHc5gyhoudNZoARBOCjYJ1gKYWfK5h4DjEZwhwb4_SXf-flV0aFL-WADB80URjEoFKWAxLCEaMEV2l9flwYQGk8-wPQymqQvC7MF8cPBM7I-n6U/s320/20180209_115246+%25281%2529.jpg" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzfKzTkYKx_mmgftYUN59QqIgOp5MjDXuWMavlnHOuJOV31jDZe_c_DPGLRydlwNgMccA0dT-Yj51A1L2jaPhp-mQ3WY57qK17RMqw0mzGRq8ALeC8Op7rMkWM4fnl70-IKHMhDMYW_bXR/s1600/20180209_115250.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="778" data-original-width="1600" height="155" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzfKzTkYKx_mmgftYUN59QqIgOp5MjDXuWMavlnHOuJOV31jDZe_c_DPGLRydlwNgMccA0dT-Yj51A1L2jaPhp-mQ3WY57qK17RMqw0mzGRq8ALeC8Op7rMkWM4fnl70-IKHMhDMYW_bXR/s320/20180209_115250.jpg" width="320" /></a></div>
<br />
<br />
<br />
<br />The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-10211381563104938262017-11-25T11:47:00.001-06:002017-11-25T23:35:35.231-06:00Madman in the LibraryIt was mid October and the kids were elsewhere as I was running my Saturday errands. It was a
good time to pick up the books that my friendly librarian held for me. I
had no idea what I would find in the cluster of books that she recommended I
read in pursuant of the research for my non fiction book proposal. It's a
tedious job but had to be done.<br />
As I examined the books including "<i>I Will Find You</i>" by
Joanna Connors and The "<i>Complete Idiot's Guide to Private Investigating</i>"
by Steven Kerry Brown, there was a sudden sound you would never expect to hear
in a public library where children are taught to keep their voices down and
people go to get away from the many annoying sounds of society.<span style="mso-spacerun: yes;"> </span>It was a man’s voice that propagated
throughout.<span style="mso-spacerun: yes;"> </span>He was clearly mad.<span style="mso-spacerun: yes;"> </span>Was he a madman?<span style="mso-spacerun: yes;"> </span><br />
I stood up to see what the commotion was.<span style="mso-spacerun: yes;">
</span>At the checkout desk where the librarians congregate to help consumers
there stood an older man, balding with grey hair, I am guessing in his early to
mid 70’s, wearing a heavy winter coat yelling callously at the cluster of women
librarians. “How can I read this paper if there is a staple in it!”<span style="mso-spacerun: yes;"> </span>And, “You need to get this straightened out.<span style="mso-spacerun: yes;"> </span>You people don’t know what you’re doing!”<span style="mso-spacerun: yes;"> </span>But, it didn’t stop there.<span style="mso-spacerun: yes;"> </span>He was clearly very angry.<span style="mso-spacerun: yes;"> </span>He was angry enough to cause himself a great
deal of embarrassment.<span style="mso-spacerun: yes;"> </span>But, did he care
about embarrassing himself?<span style="mso-spacerun: yes;"> </span>Did he care
what the patrons around him may have been feeling especially after the recent Las
Vegas shooting on October 1<sup>st</sup>?<span style="mso-spacerun: yes;">
</span>He continued to antagonize the innocent ladies behind the counter who appeared
to not know what to do or how to handle this situation.<br />
<span style="mso-spacerun: yes;"> </span><br />
I grew angry for the verbal abuse and concerned for innocent bystanders, many of them males,
who didn’t budge but sat in their chairs and kept their faces in their books and
newspapers.<span style="mso-spacerun: yes;"> </span>The managing librarian asked
the old man to step out to the lobby.<span style="mso-spacerun: yes;"> </span>He
obliged but continued to yell with conviction.<span style="mso-spacerun: yes;"> He grew louder and louder. </span>He repeated himself many times about how upset he was that there was a
staple in the newspaper he wanted to read.<span style="mso-spacerun: yes;">
</span>I asked myself, “is it really all over a staple or is it something
bigger than that?”<span style="mso-spacerun: yes;"> </span>I approached the
front desk and asked one of the ladies if they had called the Police.<span style="mso-spacerun: yes;"> </span>She said “no”.<span style="mso-spacerun: yes;"> </span>I requested they call the Police
immediately.<span style="mso-spacerun: yes;"> </span>She responded with “he is a
regular but we have never seen him like this.<span style="mso-spacerun: yes;">
</span>He is hard of hearing and is a loud talker.<span style="mso-spacerun: yes;"> </span>But, he has never displayed anger towards us.”
<span style="mso-spacerun: yes;"> </span>I insisted she call the Police, but she
didn’t budge.<span style="mso-spacerun: yes;"> </span>I placed my books in
front of her and kindly asked her if she would watch my books and then self-assuredly
told her “I am going to take care of this myself.”<span style="mso-spacerun: yes;"> </span><br />
<br />
I stepped away from the counter and into what could have been the line of
fire.<span style="mso-spacerun: yes;"> </span>Someone had to step in and help
these gentle ladies including the manager who insisted that she could handle
the situation without calling the Police, I believe, to
keep the occurance on the down low and not bring attention to this public place. <span style="mso-spacerun: yes;"> </span>Nobody was taking a firm hand with this old
man.<span style="mso-spacerun: yes;"> </span>He continued to belittle the
managing librarian and anybody else who tried to calm him down.<span style="mso-spacerun: yes;"> </span>The librarians used their inside voices
asking him to stop yelling.<span style="mso-spacerun: yes;"> </span>They asked
him to leave with sweet sparkles of sugar in their voices.<span style="mso-spacerun: yes;"> </span>He was not going to calm down.<span style="mso-spacerun: yes;"> </span>He was growing more confrontational and provoking.<span style="mso-spacerun: yes;"> </span>He started throwing his arms around and hit
one of the librarians with the newspaper he was holding in his hand, the one he
was complaining had a staple in it.<br />
<br />
“Please leave now”, I firmly said as I held my hand out pointing to the door
that was only a few steps away.<span style="mso-spacerun: yes;"> </span>He got in
my face and said, “I don’t care what you want me to do.”<span style="mso-spacerun: yes;"> </span>I continued to tell him to leave.<span style="mso-spacerun: yes;"> </span>He threw words in my face daring me to touch
him.<span style="mso-spacerun: yes;"> </span>I made a remark about how he will
find himself behind bars if he does not do as he is told at this very moment
and that he didn’t have a choice.<span style="mso-spacerun: yes;"> </span>The
choice would be made for him.<span style="mso-spacerun: yes;"> </span>He
continued to throw words in my face that I eventually ignored.<span style="mso-spacerun: yes;"> </span>I did what I was trained to do in situations
like this.<span style="mso-spacerun: yes;"> </span>Despite feeling uneasy I stood
my ground and remained poised.<span style="mso-spacerun: yes;"> </span>I
continued to use my somewhat large stature as a shield between the old man and
the librarians and sort of guided him towards the door without touching him.<span style="mso-spacerun: yes;"> </span>I continued to speak over him telling him to “please
leave” shuffling him out the door.<span style="mso-spacerun: yes;"> </span>He
could have had a weapon in his pocket despite the sign NO GUNS ALLOWED posted
on the front door.<span style="mso-spacerun: yes;"> </span><br />
<br />
Everybody was safe.<span style="mso-spacerun: yes;"> </span>The old man left
and everybody returned to their original spaces.<span style="mso-spacerun: yes;"> </span>The managing librarian called the Police and
banned the old man from returning to the library.<span style="mso-spacerun: yes;"> </span>They thanked me for my patronage but I didn’t
know what to say.<span style="mso-spacerun: yes;"> </span>I was more disappointed
in the men who just sat back in their chairs acting as if they were minding
their own business.<span style="mso-spacerun: yes;"> </span>There was a scene,
clearly.<span style="mso-spacerun: yes;"> </span>We were loud and
demanding.<span style="mso-spacerun: yes;"> </span>Everybody in the library saw
what was occurring.<span style="mso-spacerun: yes;"> </span>It would have been
nice if there was an off duty cop or military person or a <i style="mso-bidi-font-style: normal;">man</i> in the building rather than a mom of two young children
stepping in to overrule a madman.<span style="mso-spacerun: yes;"> </span><br />
<br />
I asked myself, <i style="mso-bidi-font-style: normal;">was I was at the right
place at the right time?</i><span style="mso-spacerun: yes;"> </span><i style="mso-bidi-font-style: normal;">What would have happened had I not stepped
in?</i><span style="mso-spacerun: yes;"> </span>His anger was escalating with
every syllable that came out of the managing librarians’ mouth.<span style="mso-spacerun: yes;"> </span>He was clearly agitated, but over a
staple?<span style="mso-spacerun: yes;"> </span>I don’t think so. <br />
<br />
What would you have done in this situation?<span style="mso-spacerun: yes;">
</span>Despite my training I would have done the same thing because I witnessed
my grandfather in a similar situation.<span style="mso-spacerun: yes;">
</span>He took me and my siblings out for ice cream where there was a man violently
holding a woman by her collar from across the ice cream counter.<span style="mso-spacerun: yes;"> </span>My grandfather stepped in and saved the woman
from whatever was to come.<span style="mso-spacerun: yes;"> </span><br />
<br />
I felt I did the right thing.<span style="mso-spacerun: yes;"> </span>I left
the library feeling shaken and went on with my day.<span style="mso-spacerun: yes;"> </span><br />
<!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-70529754078939271172017-11-05T12:50:00.002-06:002017-11-05T12:50:27.459-06:00What would you do if......If you were the manager of a business that serviced a local community whether a restaurant or gift shop, would you consider hiring an ex-convict? <br />
<br />
Would you hire an ex-convict who was incarcerated for murder? <br />
For theft? <br />
For a drug-related crime? (most drug-related offenses get a longer sentence than murderers.)<br />
<br />
<br />
<br />
<br />
<br />The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-24106168987131341452017-10-31T11:14:00.001-05:002017-10-31T14:18:53.724-05:00You Never Know Who May Be Listening<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="372">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
<br />
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12.0pt; line-height: 115%;">Happy Halloween!<span style="mso-spacerun: yes;"> </span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12.0pt; line-height: 115%;"><span style="mso-spacerun: yes;"> </span>I thought it was a good day to go for a pumpkin spice latte at my local
Starbucks and while there I would get some work done.<span style="mso-spacerun: yes;"> </span>I found a small table near the few comfy
chairs and love seat in a corner of the café.<span style="mso-spacerun: yes;">
</span>As I was doing research for my nonfiction book proposal entailing my
infidelity case log I couldn’t help but overhear a meeting that was taking
place behind me.<span style="mso-spacerun: yes;"> </span>The woman, seated in a comfy chair, sounded as if she was on an interview as the man she was with, seated on the love seat, sat and listened.<span style="mso-spacerun: yes;"> </span>She was talking about her history as an Investigator
on infidelity cases and the various attorneys she has worked for.<span style="mso-spacerun: yes;"> What would she have thought if she knew there was an Investigator eavesdropping in on her conversation? </span>She moved on to describing her job as a Process Server and how the spouses almost never expected to be served with divorce
papers.<span style="mso-spacerun: yes;"> </span>She mentioned the name of
one attorney who I happen to know and then proceeded to complain about his high fees,
in the thousands, to his clients demanding payment in advance of his services, and
how he would not always pay for her services, what little she received, until
services were rendered.<span style="mso-spacerun: yes;"> </span>She was loud
enough for me to hear her in the busy café and only an earshot away I
couldn’t help but listen to her as I kept my face in the book I was reading, <i style="mso-bidi-font-style: normal;">Nonfiction Book Proposals Anybody Can Write</i>
by Elizabeth Lyon.<span style="mso-spacerun: yes;"> </span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12.0pt; line-height: 115%;">I was intrigued with what she was telling her possible
potential employer.<span style="mso-spacerun: yes;"> </span>I almost got up and
handed her my card.<span style="mso-spacerun: yes;"> </span>The thoughts as to
what I would say to her, in front of the man she was allegedly interviewing for,
was, <i style="mso-bidi-font-style: normal;">here, give me a call sometime.<span style="mso-spacerun: yes;"> </span></i>Or, <i style="mso-bidi-font-style: normal;">be
careful who you talk about in public places.<span style="mso-spacerun: yes;">
</span>I know (so and so), </i>and to not give her my card.<span style="mso-spacerun: yes;"> </span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12.0pt; line-height: 115%;">In the end I decided the best move would be to do
nothing.<span style="mso-spacerun: yes;"> To mind my own business. </span>I didn’t want to embarrass her
but, handing her my card and asking her to contact me, in front of a potential employer, could have made her look
good.<span style="mso-spacerun: yes;"> </span>Perhaps <i>I</i> was a potential employer
who was interested in hiring her. I would have clearly posed as a mild threat, as a competitor, to the alleged interviewer she was with. </span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12.0pt; line-height: 115%;">Be careful what you say in a public places.<span style="mso-spacerun: yes;"> </span>You <i style="mso-bidi-font-style: normal;">never</i>
know who may be sitting an earshot away. </span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12.0pt; line-height: 115%;">Have a safe Halloween!</span></div>
The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-26727769524779023672017-10-05T11:42:00.000-05:002017-10-05T11:42:20.504-05:00Las Vegas Caught In Hurricane Everybody thinks about the recent tragedy when "Las Vegas" is heard. The question we all have is "Why?". <br />
<br />
No matter by water or bullet Americans are being hit everywhere Las Vegas, in the middle of the desert, being no exception. But, why? There is a whole lot of bad happening to us. <br />
<br />
While the media dissects details about the perpetrator to learn the answers to why it happened the rest of us are questioning our own next moves. We all know it can happen anywhere, at anytime, and to anybody. In fact, I recall hearing one victim say "This only happens to other people. I never imagined it would happen to us!" Unfortunately, this could only be said after the fact.<br />
<br />
I was in Las Vegas over the Labor Weekend and being shot was the last thing on my mind. I could count on two hands the amount of times I have been to Vegas and never in the history of my travels have I heard of anything remotely close to this having had occurred in Vegas. After the fact I realized this could have happened to us in our travels over the Labor Day weekend as the gunman was allegedly planning a more recent attack. We would have been no exception.<br />
<br />
The point is that it could happen to anybody at anytime. You are not the exception. <br />
<br />
The airports only take further security measures after an incident has occurred. It's too late!<br />
The concert and sports venues only take further security measures after an incident has occurred at a similar venue somewhere else in the country. The same with schools. <br />
Malls only add security after an incident has occurred only at that particular mall. <br />
You get the point.<br />
<br />
Today we live in a society that requires our intuition/sixth sense/gut feeling be at the forefront. We cannot rely on other people to alert us of such dangers ahead of time otherwise terrorism wouldn't exist and the concern in Vegas would have been canceled. Now would be a good time for self proclaimed psychics to use their alleged powers.<br />
<br />
What we can do to help ourselves:<br />
<ul>
<li>ALWAYS be aware of your surroundings including exit doors, windows, balconies, etc. </li>
<li>Be aware of the people around you. Is someone's behavior unusual? In other words, is someone active nervous in an environment that does not warrant such behavior? Are they carrying an oversized bag that is not fitting for the venue they are attending? Are there unusual bulges?</li>
<li>If you feel someone is acting suspicious then alert a staff member who should alert security. Let the professionals make the final determination. Do what you feel is necessary to protect yourself</li>
<li> Take a self defense class. These days they also teach you what to do if faced with danger in today's world. </li>
<li>Let your instinct be your guide. It's the feeling you get that something doesn't feel right. in 9 out of 10 cases it's right on target.</li>
<li>Always listen to your instincts because it's the first thing that will alert you to danger if there are no external resources. </li>
</ul>
Do not let the color of someone's skin deter you. There are bad people in all skin colors, sizes, shapes and genders. I can only imagine what the terrorist organizations are thinking as we turn on ourselves. Americans should be united not divided including the supremacists. <br />
<br />
What say you Donald Trump aka President Trump? <br />
<br />The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-25888410127224965792017-09-22T12:15:00.003-05:002017-09-22T12:15:54.766-05:00Equifax Breachhttp://www.npr.org/sections/thetwo-way/2017/09/21/552681357/after-massive-data-breach-equifax-directed-customers-to-fake-site<br />
<br />
Pay attention to the links you click on.<br />
<br />
Example of a real site: www.PI-Speaker.com<br />
Example of fake site: www.PI~Speaker.com<br />
<br />
See the difference?<br />
<br />
In other words, if you are provided a link <b>directly</b> by a trusted source then you are in good hands.<br />
If you are provided a link that is not <b>directly</b> provided by a trusted source then watch out!<br />
<br />
The idiots of the world, namely the crooks and trouble makers, will continue to find ways to beat the systems that are set up to protect consumers. Though, there are ways to control some of what the crooks get. <br />
<br />
1. Never give out your social security number. Use your drivers license number in it's place.<br />
2. Always shred paperwork and envelops that have personal information on them.<br />
3. Change your passwords often and make sure they are nice and secure.<br />
4. Screen anybody that you do not know that may enter your home including contractors.<br />
5. Keep your valuables including your passwords in a safe or safe place. <br />
6. Invest in a Identity Theft Monitoring System, ie: <a href="https://www.allclearid.com/" target="_blank">All Clear</a>, <a href="https://www.experian.com/lp/exp-cred-itp-2.html?bcd=ad_c_sem_427_216420210942&k_id=a0f7be0a-c30b-4a74-9f37-61ba94b96f0a&k_kw=kwd-12618301&k_mt=e&pc=sem_exp_google&cc=sem_exp_google_ad_27946959_915476739_216420210942_kwd-12618301_e_1t1_a0f7be0a-c30b-4a74-9f37-61ba94b96f0a&ref=headterm&awsearchcpc=1&gclid=CjwKCAjw6ZLOBRALEiwAxzyCWzdofrLpgPrCDoqIvrEJFjJvJpZBFMgcW8nRqZZX8g5xMa1gQ2ug6BoChEwQAvD_BwE" target="_blank">Experian</a>, or <a href="https://www.lifelock.com/lp/semidt-30drf?promocode=BSEM60RF&utm_source=google&utm_medium=cpc&utm_campaign=181412744&adgroup=8746120184&utm_term=lifelock&targetid=kwd-2183980289&matchtype=e&utm_content=215298411057&network=g&device=c&adp=1t1&testgroup=&gclid=CjwKEAjw6ZLOBRCLyNXAwfCPmlQSJADHPIJbyVkgR-2Jp7VkPqg7Vwb2av7BmTz2bapIvMWd5ot3XRoCZFrw_wcB&dclid=CJXr5sWludYCFQ1qAQodNccPKw" target="_blank">Lifelock</a>.<br />
<br />
For more information please visit my website at <a href="http://www.pi-speaker.com/">www.PI-Speaker.com</a>. This is a safe link. ;-)<br />
<br />
Learn all about the identity underworld through my presentation The Wake-Up Call: Identity Theft. See my <a href="http://www.pi-speaker.com/" target="_blank">website</a> for details. <br />
<br />
If you read my blog please like my <a href="https://www.facebook.com/diaryofapi/?ref=bookmarks" target="_blank">Facebook Page</a>. Thank you for your support!The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-27560203859495058042017-09-11T17:27:00.002-05:002017-09-11T17:27:44.015-05:00Are YOU Being Scammed?<div style="line-height: 1.5em;">
Have you received a telephone call advising that you are having problems with your computer? But, how would the person on the other end of the phone know this unless they had access to your computer? And, why would they claim this on a cold call to a person who doesn't even own a computer? </div>
<div style="line-height: 1.5em;">
<br /></div>
<div style="line-height: 1.5em;">
Rahku Tech, LLC is a company "based" out of Walnut, California, so they say. Their website address is www.rahku.com and they are listed with the Better Business Bureau. They advertise as an internet software company that "cleans" computers that may have viruses, slow speeds, and even printer issues. They have an outstanding satisfaction guarantee as noted on the refund policy page, http://www.rahku.com/refund_policy.html. I have also attached a copy of the page below. </div>
<br />
Rahku Tech, LLC is currently under investigation for their business tactics and potential fraud. If you come into contact with this business please let us know.The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-73306351616282286192017-06-30T12:15:00.001-05:002017-06-30T12:15:38.495-05:00Investigator and Subject Stand Face To Face- Awkward!It is the most uncomfortable feeling running into a subject while shopping at a store they work at especially when they are no longer under investigation. <br />
<br />
They don't know me but I surely know them. I know all about them. And, regardless of the purpose or outcome of the investigation, I feel like I am in a "zone" when standing at the checkout counter directly facing my once subject. It's a chance meeting that is not realized until after I come face to face with the person I can identify in one of my files. <br />
<br />
Facing the person who I secretly had to learn all about including where they live, who they live with, finances, and personal information that may or may not be considered for the sake of the investigation is TMI (too much information) when they are just a cashier checking you out at the register. I could go to another register but there is no need to. The "cashier" doesn't know who I am nor will they ever know they were under investigation and by me or for what purpose. I can go through the transaction as if they are somebody I do not know. <br />
<br />
There have been times that I have had to interact with my subject while investigating. Subject's who think they are being watched will do their best to hide but when they resurface, because they always do, their antennas are on high alert. They look at everyone and everything around them everywhere they go. It's fun to watch as the investigator because you know what they are hiding. You know why they are constantly looking over their shoulder. Yet, if they suspect they are being watched they rarely know who is watching them. <br />
<br />
I rarely go undercover these days but when I do I am unrecognizable from my pictures that are posted on the internet. I lurk in the shadow and keep my distance yet stay close enough to keep my subject within viewing range. I am a spy but cannot completely claim I use a clandestine technique, often.<br />
<br />
The former subject was sweet, friendly, personable, and had an innocent nature, not ever knowing they had once been investigated by the person that stood before them at the cash register. It was easy to be friendly back and engage in chit-chat about the weather or the good deal I got on my merchandise. Professionalism is the most important element in a moral situation where light and dark meet within the shadow. I imagine this would not be the last time this investigator and former subject cross paths.The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com1tag:blogger.com,1999:blog-6036224772456784616.post-20089626349677843572017-06-03T12:30:00.003-05:002017-06-03T12:30:22.014-05:00Take The Poll: Why Do Men Wear Cologne To The Gym For An Early Morning Workout?As a woman, your guess is as good as mine so we want the men to answer this question. Why do men wear cologne to the gym for an early morning workout when the shower will wash it all away, unless, they do not intend to take a shower. Yuk! <br />
<br />
<a href="https://goo.gl/iO4OzV" target="_blank">"Why do men wear cologne to the gym for an early morning workout" Poll</a>The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-13525823831181028492017-06-03T12:21:00.001-05:002017-06-03T12:21:57.075-05:00Have you ever tried online dating?Online dating seems to be the way to meet people these days especially when you don't want to get dressed up to go to a speed dating or singles event where is could potentially be a waste of time. There are so much more people to choose from on the dating sites like eHarmony or Match.com. But, how safe it is? Have you ever tried online dating? Take the poll. <br />
<br />
<a href="https://goo.gl/7brwWl" target="_blank">"Have You Tried Online Dating" Poll</a>The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-7212669137109916592017-04-02T12:33:00.001-05:002017-04-02T12:33:57.683-05:00If "Joe" Calls<span style="color: blue; font-size: large;"><b>In a nutshell </b></span><br /><br />If someone you do not know calls you on the telephone and you happen to answer because your caller id implies it's an urgent matter and the male person identifies himself as "Joe" then it is probably a scam.<br />
<br />
He calls from a Royal Cruise line, a hearing loss center, home security system, degree program and more. The caller id probably says Security and for those of us that have a security system may more than likely answer the phone especially if you do not answer on their first attempt suspecting fraud and the same number calls you immediately back for a second attempt.<br />
<br />
It may be a recorded system instead of a human being who is speaking with you live which is what I suspect based on what I heard at the beginning of the call. <i> </i>I suspect that when you trigger the system by answering "yes" then a real male comes on the line and speaks with you live or they will end the call and sell your number to a fraudster who will call you back expecting you to answer the phone with the intention of scamming you. <br />
<br />
The fraudster or scammer will take your "Yes" and edit it into a sales pitch and then charge you via checking account or credit card information, whichever they have on you via other means or a scam whereas you have given them the information, and run up your card. They might charge you a for a vacation you will never take or goods you will never receive.<br />
<br />
Is this true? Well, maybe it is considering we know these phone calls are circulating around the U.S. And, while we do not know how they are acquiring our personal information such as our banking or credit card numbers it is important to know that it is possible. Just think about how many times you have used your debit, credit cards, or have written a check in a month. It can only take one. <br />
<br />
To avoid this just simply do not answer your phone. And, if you do not have caller id on your cell phone in addition to a caller id blocker and protection app then GET ONE! Hiya, as well as most that are like it, will tell you whether or not the caller is a scam or fraud and will also list comments others' have made about it. You can also comment on your experience with a particular caller. The good thing about these services are they are FREE! Just go to your app store and type in id blocker.<br />
<br />
Problem solved.<br />
<br />
Check out these other articles about this scam.<br /><br />http://www.cbsnews.com/news/beware-new-can-you-hear-me-scam/<br />http://www.snopes.com/can-you-hear-me-scam/<br /><br /><br />
<br />
<br />The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-21197172527694058512017-02-22T17:24:00.002-06:002017-02-22T17:24:50.088-06:00Who Vandalized the Cemetery? Mistake or Deliberate <div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYx4Y8f-W7WJUEPuJxnIHCa3h09PbDvtIlJQvhjQa__Hxff0Z_sZBd0YB-lf8fTFkbJFIeQadXHFHb-NeiguNmTq5w48bu8aDokC7jdRCh1d1WZEUkRAXxqFvpJIauOYUU8CiXj4IBfUDn/s1600/Cemetery+Pic.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYx4Y8f-W7WJUEPuJxnIHCa3h09PbDvtIlJQvhjQa__Hxff0Z_sZBd0YB-lf8fTFkbJFIeQadXHFHb-NeiguNmTq5w48bu8aDokC7jdRCh1d1WZEUkRAXxqFvpJIauOYUU8CiXj4IBfUDn/s320/Cemetery+Pic.jpg" width="320" /></a></div>
In light of my recent television interview where I speak of the society that we share with people who make poor choices and people who are not rehabilitative, my interview hardly touched on the most recent local crime of the cemetery <a href="http://www.stltoday.com/news/local/crime-and-courts/university-city-police-investigate-damage-to-headstones-at-jewish-cemetery/article_bafef56a-6ef2-5f90-a327-0ba7fa11e50b.html" target="_blank">Chesed Shel Emeth</a> that was vandalized over the weekend and is most deserving of our attention.<br />
<br />
As I drove through the narrow road around the cemetery lined by cars of those checking on their loved one's gravestones I noticed that all of the heavy-lifting was mostly completed yesterday followed by a vigil uniting the Jewish Community. It could have been any cemetery if the vandals were not deliberately targeting the Jewish community and it could have been that the cemetery was at the right place at the right time for the vandals. Were they drunk and looking for trouble or were they sending a message to the Jewish people? It has yet to be determined as to whether this was a hate crime of antisemitism or a bunch of low life's who had nothing better to do or both. Once they are caught, and they will be caught, will they show sincere remorse and have regret? This will be relevant when we define what kind of people they are. <br />
<br />
As I said on my television interview "we live in a society where we expect people to follow the same rules that we do, and that is just not the case. We live among people who make poor decisions, we live among people with sociopathic behaviors and when people make mistakes whether they go to jail or not, we hope that they can be rehabilitated and that is just not the case all of the time...." Every person wants to be given a second chance and society always wants to give people the benefit of the doubt. Those that can be rehabilitated are NOT the ones we must defend ourselves against. Those that made a bad choice and do change for the better are NOT the ones that we must fear. It is those that make bad choices time and time again and DO NOT change, own their behavior or lack remorse that we must fear and defend ourselves against. It is unfortunate but we must learn to co-exist because like it or not they live in our neighborhoods shop in our grocery stores, and work in our businesses. Who vandalized this cemetery? How would they feel if this were to happen to them and their loved ones? Some of us believe that one day they will know and experience the sadness they caused others'. This coming from someone who is pissed off and wants to catch the bastards. <br />
<br />
<i>The Wake-Up Call</i> is an audience participation presentation that is fun and informative. I demonstrate how naive we could be and take the audience into the mind of the common menace in society, the sociopath, and potential victim of prevalent scams in various forms including phone, debit card, and online scams. Are you single? Do you do online dating? Learn how to safely get a date with a potential mate! Learn the signs of deception and how to tell if someone is lying or telling the truth. Would you know what to do if you became a victim of identity theft? Arm yourself with knowledge and stay one step ahead of the game. Audiences leave feeling empowered. <br />
<br />
A St. Louis-based reality tv show "Welcome To Sweetie Pies" gives ex-felons a second chance by employing them at one of their many Sweetie Pie locations (THE BEST fried chicken) in St. Louis and Los Angeles. Society should be thankful for them because without a sense of belonging or responsibility a person who once darkened the prison doorsteps may not see a light at the end of the tunnel and continue down a dark path. There are many <a href="http://jobsthathirefelons.org/" target="_blank">businesses that employ ex-felons</a> and they should all be awarded. <br />
<br />
Let's face it. We all make mistakes but there is a huge divide between people who make mistakes then learn from them and people who make deliberate "mistakes" then repeat them. Which category will the cemetery vandals fall in?<br />
<br />
<br />
<br />The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-39759133275938559452017-01-24T11:37:00.001-06:002017-01-24T11:40:37.749-06:00What The Heck! Chain Letters WELCOME TO MY NEW BLOG SERIES: What The Heck!<br />
<br />
We have all seen them. It goes something like this: <br />
<br />
"You will be granted 1 wish if you forward to 5 people, 2 wishes if you forward to 10 people and 3 wishes if you forward to 15 people. Look for your wishes to come true within 1 hour from the time you forward to your friends. <br />
<br />
WHAT THE HECK!<br />
<br />
Bait: A chain letter that if unbroken will benefit others in some way. There is really no good reason someone might do this except to get a good laugh or make new "friends" for future gain. What gain would that be you ask? Anything they can get their hands on!<br />
<br />
Does anybody believe in chain letters? That, if you email or text a chain letter to someone that something good might come your way? I personally believe that prayer is the way to go and not the feshtunkina chain letters.<br />
<br />
It can be fun to join in with your girlfriends to see who breaks the chain but beware! What if one of the chain letters you receive comes from someone with the same name as one of your friends that perhaps has sent you a chain letter in the past but this time it's a scam and really coming from someone who stole your friends social media identity? What then? Use your judgement and trust your instincts. I posted about this on 11/16/16 in the Fun Fact Game in A Game We Should All Avoid. <a href="http://cherylring.blogspot.com/2016/11/a-game-we-should-all-avoid.html" target="_blank">Check it out here</a>! <br />
<br />
Please visit my <a href="https://www.facebook.com/diaryofapi/?ref=bookmarks" target="_blank">Facebook Page</a> for fun tips and facts!The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-71320653793273760492016-12-27T10:59:00.002-06:002016-12-27T13:59:12.236-06:00A Tip From The PI SpeakerIt is that time of year when we give more than we receive and that means we spend more. Watch out for skimmers. It is a safe bet to use cash when you can especially on those small transactions but when you need a safer way to make a larger purchase it is always best to use a credit card or check. A lot of places will not accept checks anymore so we are left with our credit cards and the criminals know this. Criminals who use a skimmer will take your credit card and skim it in an illegal scanner that they wear on the lapel of their jacket with the wire hiding in a pocket. They are the size of a quarter and hard to detect. Once scanned your credit card number is saved into their database. <br />
<br />
Later, the criminal will either sell your credit card number or keep it for them self. But, no worries! If at all possible keep an eye on your credit card as the salesperson completes your transaction and check your credit card statements often.<br />
<br />
Now, you are ahead of the game. Share and be merry!<br />
<br />
If you read my blog please like my <a href="https://www.facebook.com/diaryofapi/?ref=bookmarks" target="_blank">Facebook Page</a>. Thank you for your continued support!The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-81816807233066548292016-12-04T13:38:00.002-06:002016-12-04T13:38:36.553-06:00Crimes At Your Gym (Stay healthy and smart)I wrote about this a few years ago and it bears repeating because of current activities occurring at your gym or workout place. <br />
<br />
It is not a new crime conjured up but an oldie that is recurring especially close to the holiday season. Criminals are going through lockers, unsupervised jackets and gym bags at your local gym. <br />
<br />
I've said it before and I'll say it again to never leave anything of value in your jacket pocket or a nail board accessible to others' and if you use a locker PUT A LOCK ON IT. Criminals are everywhere including our schools, gyms, workplace and home and in any of these venues could a crime take place. Here are some examples:<br />
<br />
You're at school and you are running late for class and forget to lock your locker. Anybody with the mind to steal will open a locker if it doesn't have a lock on it and they will steal anything and everything of value to them and others'. They might take your lunch, cash, or instruments, cell phones, and computer devices that we all take with us wherever we go especially school. Be mindful to lock your locker especially if you share it with someone. <br />
<br />
You just got off work and heading to the gym for your routine workout. And, depending on the climate you live in you get to the gym and drop your gym bag next to the coat rack that you hang your coat or jacket on and leave your keys in your coat or jacket pocket. You don't feel a sense of insecurity because you are familiar with almost everyone there. You feel a familial connection as strange as it may seem because you work out with the same people every time you go. I know this because I too have felt this way having been a regular at the gym working out with the same crowd every day. But, it only takes one person to ruin all of that for you. And, you're off to your workout. In the meantime, someone is going through jacket pockets and spots your gym bag on the floor. The people at the gym are minding their own business as most do and the criminal knows this. Most people won't interfere or ask questions for fear of embarrassment. And, if someone did interfere the criminal is prepared to what he/she is going to say. "I have a jacket just like this. Wow, I'm so sorry." or, "My friend asked me to grab his jacket but I don't know which one it is." Either way the criminal will take their chances and be prepared for their defense. <br />
<br />
The criminal successfully locates sets of keys from a few jackets and goes out to the parking lot where he/she pushes the "open door" button and the key fobs going through each car including yours. They search your car from top to bottom for anything of value including cell phones, cash, and iPad. But, who would leave these valuables in their car? ANYONE and EVERYONE! Boom, just like that, you have been ripped off and they might even decide to steal your car in the process. <br />
<br />
Be proactive in securing your belongings and keep your keys with you at all times when working out or put your belongings in a locker and LOCK IT. When you are shooting hoops or swimming laps there are strangers going through the locker room at all time. It only takes one person with the mind to steal to go through your belongings and take what they want.<br />
<br />
At our place of employment, we risk anything at our workstation being taken by a person with the mind to steal. If your desk has a drawer that locks please be sure it cannot be picked by a bobby pin or similar key that is standard for locks. Never leave your purse or wallet in your desk drawer otherwise. Your coworkers know your routine and it only takes one person to ruin it. <br />
<br />
In our home's we run the risk with every contractor we invite in including babysitters. We also run the risk with our own family members including our teenagers and their friends. It's a fact that children take money from their parents' wallet and so do their friends. Yours might not but there are some out there who do. Contractors can see what wonderful things you have in your home, where you store your purse and your routine to a degree depending on how long they are there. Unless you check your contractor through a reputable background checking service or they have come highly recommended and you plan to be in their presence the entire time you run a risk of being ripped off where and when you least expect it. Let's face it. These people are strangers coming into our homes and we only know what others' have said about them. Unless we know who these "others" are our risk runs higher.<br />
<br />
These ideas are just another way we can control how a criminal may or may not impact us and our lives. Taking the extra step that really involves very little time and effort will ensure you worry free times at school, the gym, work, and home. <br />
<br />
EXTRA TIP: If you can remember to, lock your car with the automatic button from inside your car and not your key fob. More to come on this.<br />
<br />
If you read my blog please visit my<a href="https://www.facebook.com/diaryofapi/?ref=bookmarks" target="_blank"> Facebook Page </a>for additional information. For more helpful tips and investigative tools please visit my <a href="http://www.cheryldring.com/tips" target="_blank">website</a>. Don't forget to share this valuable information with your friends and family. Thank you for your support.The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-72565591919318509202016-11-13T11:51:00.001-06:002016-11-13T11:59:27.521-06:00Social Media Scam Bait and Solution #4<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;">The top #4 social media scam, according to Norton. com is <b>Cash Grabs</b>. <b>Cash Grabs</b> is a popular scam that most of us have seen. You received an email from a friend that in a panic needed your financial help because they lost their wallet and was deserted in a foreign country. Sound familiar?</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;">The bait: an email or social media profile from a “friend” who claims they lost their wallet while on vacation and need money from you in order to get home.</span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;">How it happens: Your friend's computer was infected with malware. Malware is <b>mal</b>icious soft<b>ware</b>, hence the nickname “malware”. Malware is an infection that hijacks the computer including data, contacts, emails and more. You may have heard the term “worm” or “spyware” and are good examples of what malware is. The creator of the malware that infiltrates a computer is the true culprit according to the software they generate containing harmful coding. </span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;">In this case, the malware grabs the contacts on the computer and forwards a fake email to all waiting to and waits to see who takes the bait. IE: </span><i style="font-family: "Times New Roman", serif; font-size: 16px;">Hey, guys. I am stuck in London and need money to get back. Someone walked off with my bag that had my cell phone and plane ticket. Please email me back asap so we can make arrangements. Thanks!</i></div>
<div class="MsoNormal">
<i style="font-family: "Times New Roman", serif; font-size: 16px;"><br /></i></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;">Solution: Ignore it! Contact your friend and let them know their email was hacked. Tell your friend to </span><span style="font-family: "times new roman" , serif; font-size: 12pt;">scan their computer with malware scanner software. Here is a link to Microsoft for a </span><a href="https://www.microsoft.com/en-us/safety/pc-security/malware-removal.aspx" style="font-family: "Times New Roman", serif; font-size: 12pt;">free download</a><span style="font-family: "times new roman" , serif; font-size: 12pt;">.</span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
For more tips and free investigative resources you can use at home please visit my <a href="http://www.cheryldring.com/" style="font-family: "Times New Roman", serif; font-size: 12pt;">website</a>.<span style="font-size: 13.5pt;"></span></div>
<div style="background: white; margin-bottom: .0001pt; margin: 0in;">
<span style="font-size: 13.5pt;"></span></div>
<br />
<div style="background: white; margin-bottom: .0001pt; margin: 0in;">
Stay safe and knowledgeable. Cheryl D. Ring, The PI Speaker<span style="font-size: 13.5pt;"></span></div>
The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-85868552551410570882016-11-08T00:15:00.000-06:002016-11-13T11:12:59.867-06:00A Game We Should All Avoid<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;">Scams suck as much as their makers. We must be on the defensive at all times and i</span><span style="font-family: "times new roman" , serif; font-size: 12pt;">t can be very expensive and time-consuming to put a plan into action that may or may not be enough to fight them off. Don’t worry though because like Dr. Oz who presents a million drugs on his show that prevent or enhance one thing or another we cannot buy or ingest every single one of them. If we did we would go broke and they would make us sick. We can never have too much internet protection but we don't need it all either. </span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12pt;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;">In order for us to protect ourselves from online scam's, we do need an anti-virus software that gives us, at the very least, basic coverage that we can get for less than $20 a year at <a href="https://us.norton.com/antivirus">Norton</a>. <a href="http://www.avg.com/ppc/ww-en/protection-ultimate-vs-free?dsc=ah1&d=50&h2=50&subh2=50&ECID=ad:go:se:US-EN-Antivirus-Generic-Search&gclid=CjwKEAiA6YDBBRDwtpTQnYzx5lASJAC57ObMKPkGuMJ4BrZtLznGvd19uo-iLZs2BdOuDfd80f7-KhoCqLnw_wcB">AVG</a> offer free basic software but may not give us as much protection as we need considering our internet use. If we are covered with basic anti-virus software and basic knowledge it may be just enough to keep us protected. </span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12pt;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12pt;">Last week I spoke about </span><a href="http://cherylring.blogspot.com/2016/10/predators-in-your-personal-space-and.html" style="font-family: "Times New Roman", serif; font-size: 12pt;"><b>Hidden URL’s</b> and <b>Phishing</b></a><span style="font-family: "times new roman" , serif; font-size: 12pt;"> two of the top 5 internet scams according to Norton.com. Another scam you should know about is </span><b style="font-family: "Times New Roman", serif; font-size: 12pt;">Hidden Charges</b><span style="font-family: "times new roman" , serif; font-size: 12pt;">. </span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;"><br />Bait: A fun fact game</span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;"><br />IE: What type of character are YOU? </span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;"><br />In order to play this high-profile game, you must first enter a few pieces of personal information such as your cellular telephone number of which you inadvertently provide. If you provide your cell phone number, for example, you will eventually begin to receive text messages from unidentified numbers and consequently receive charges for these texts on your cellular phone bill. A good example of this sort of scam is when you receive a text from someone you know or at least you think it’s from someone you know but it really isn’t. The scammer has high jacked your friends’ social media profile and their contacts and has sent text messages to their contacts, including you, that contain content that makes the recipient believe it’s really them. But, if you think about whom it is coming from and that person’s normal texting behavior then you might be on to the scammer. For example, out of nowhere and out of left field you shockingly receive a text from someone you NEVER hear from let alone through text messages, and they “say” something generic like, “hey, how was your day?” The first thing you should do is go online and check out their social media profile. What you will most likely find is their real profile page, that you <i>are</i> “friends” on and a second FAKE profile. This FAKE profile is used specifically to high jack the contacts on your friends’ social media page for the purpose of the Hidden Charges scam. Or, you may receive a fake chain letter asking you to repost to <i>your</i> friends’. CHAIN LETTER is another scam that we will talk about in the near future. It’s not nearly as harmful as the other scams we have spoken about so far.</span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12pt;">Solution: Your best defense is to be aware that online games, surveys, and contests could potentially be a scam. Your protection is your skepticism. </span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;">So, next time you are perusing through your Facebook Page or the internet looking for games to play DON’T GIVE OUT YOUR INFORMATION. It’s as simple as that. If you receive a text from a "friend" that seems out of place do not respond to the text but find their real profile page and private message them. Please review my previous posts about <a href="http://cherylring.blogspot.com/2016/10/predators-in-your-personal-space-and.html">Hidden URL’s and Phishing</a> so you don’t fall into those traps. </span><span style="background-color: white; font-family: "times new roman" , serif; font-size: 12pt;"></span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , "serif"; font-size: 12.0pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "times new roman" , serif; font-size: 12pt;">For tips and free investigative resources you can use at home please visit my </span><span style="color: black; font-family: "times new roman" , serif; font-size: 12pt; text-decoration: none;"><a href="http://www.cheryldring.com/" style="font-family: "Times New Roman", serif; font-size: 12pt;">website</a>.</span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "times new roman" , serif; font-size: 12pt;"> </span><span style="background-color: transparent; font-family: "times new roman" , serif; font-size: 12pt;"> </span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "times new roman" , serif; font-size: 12pt;">Thank you for your continued support! - Cheryl D. Ring, The PI Speaker</span></div>
<div class="MsoNormal">
<br /></div>
The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0tag:blogger.com,1999:blog-6036224772456784616.post-65405225880221034922016-10-31T12:31:00.000-05:002017-02-19T09:21:18.381-06:00Predators In Your Personal Space And How To Kick Their Butts!<div style="margin-bottom: .0001pt; margin: 0in;">
Last week I posted about trust and law enforcement and the on goings of criminals who take advantage of "our" trusting nature. Today, we are going to learn about scams that occur behind closed doors in our homes and offices that are not so easily detected such that of an idiot trying to impersonate a police officer without a holster for the gun he carries or proper identification on his person or alleged cruiser.</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
Let us not forget to thank those who serve with all of their heart and soul in order to protect society and our country!</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
In the U.S. alone, according to statistica.com, <span style="font-size: large;">78% of people use social media</span>. Are you among the millions who has a Facebook page, Twitter account, or post on Instagram? You are probably included in the majority of people who have their cell phone in their hand when driving, in a long line, or in a Doctors' office waiting room. Yes? No? So what if we love social media! A lot of us use it for business purposes and to keep in touch with those that live far away. I am thankful for social media, Facebook and LinkedIn rock! But, <span style="font-size: large;">are you aware of social media scams?</span> Here they are and how to kick their butts! Please share with your friends and family so they are armed with the information that may prevent them from becoming a statistic. I will be posting more about this in the coming weeks.</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
1. Hidden URL's (Uniform Resource Locator)</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
<span style="font-size: large;">Bait: Shortened URL's.</span></div>
<div style="margin: 0in 0in 0.0001pt 30pt; text-indent: 3.75pt;">
Those with bad intention will use a shorter<span class="apple-converted-space"> </span>url in order to<span class="apple-converted-space"> </span><b>hide</b><span class="apple-converted-space"> </span>the full location to where you will be directed. You may be directed to where you hope to go or to a world where malware is installed on your computer. Malware is software that is intended to damage and, in some cases, disable your computer. People create malware and viruses for the sake of pissing people off, people they don't know or can visually watch the struggle as it takes place, and sometimes they do it to hijack your personal information. These people have nothing better to do than cause others' harm for absolutely no reason at all. Sociopaths are narcissistic and function without a conscience giving them the emotional freedom to lie, cheat, and steal. They are intelligent and manipulative. Perhaps those creating malware and viruses are Sociopaths that have nothing else better to do. They create adds on your Facebook page or somewhere on the internet that manipulate you into clicking on the link. After clicking on the link they pretty much have you where they want you.</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
<span style="font-size: large;">IE: Shorter<span class="apple-converted-space"> </span>url (although safe because it's mine ;-)): pi-speaker.com</span></div>
<div style="margin: 0in 0in 0.0001pt;">
<span style="font-size: large;"> Full Location<span class="apple-converted-space"> </span>url: http://www.cheryldring.com/presentations</span></div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
<span style="font-size: large;">Solution: A good butt kicking is<span class="apple-converted-space"> </span><b>anti-virus</b><span class="apple-converted-space"> </span>and<span class="apple-converted-space"> </span><b>anti-spyware</b><span class="apple-converted-space"> </span>installed on your computer.</span></div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
2. Phishing Requests</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
Bait: Personal remarks on your social media page or through an email that appear to be from people you know.</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
Once you click on the link it takes you to a fake landing page created by a phisher in order to steal your log-in information. IE: when you click on the link it directs you to a social media page that you have a sign in for. The page seems legitimate where you type in your log-in information.</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
IE: I do not have an example because that would require me to send you to a fake page that may cause harm to you or your computer.</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
Solution: Kick some ass with<span class="apple-converted-space"> </span><b>Anti-Phishing</b><span class="apple-converted-space"> </span>defenses.</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
I do not endorse software but if you search online for the <b>bold</b> keywords in this posting you will find several methods that can protect you and your computers.</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="margin: 0in 0in 0.0001pt;">
Next week: More scams</div>
<div style="margin: 0in 0in 0.0001pt;">
<br /></div>
<div style="background: white; margin-bottom: .0001pt; margin: 0in;">
Knowledge is power! Arm yourself with information and share with your friends and family. <span style="font-family: "trebuchet ms" , sans-serif;"></span></div>
<div style="background: white; margin-bottom: .0001pt; margin: 0in;">
<br />
Book me to speak at your next business meeting or event. Get your wake-up call through my audience participation <a href="http://www.cheryldring.com/presentations" style="text-decoration: none;"><span style="text-decoration: none; text-underline: none;">speaking presentations</span></a> and learn through some of my most compelling cases, statistics, and facts about the art of lying, scams, and how to protect yourself in today's society at work, home, and school and much more! Visit my <a href="http://www.cheryldring.com/" style="text-decoration: none;"><span style="text-decoration: none; text-underline: none;">website</span></a> for <a href="http://www.cheryldring.com/tips" style="text-decoration: none;"><span style="text-decoration: none; text-underline: none;">helpful tips</span></a> and free resources used by Private Investigators that you can use at home. <span style="font-family: "trebuchet ms" , sans-serif;"></span></div>
<div style="background: white; margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<br />
<div style="background: white; margin-bottom: .0001pt; margin: 0in;">
Thank you for your continued support! - Cheryl D. Ring, The PI Speaker<span style="font-family: "trebuchet ms" , sans-serif;"></span></div>
<div class="MsoNormal">
<br /></div>
The PI Speakerhttp://www.blogger.com/profile/14734890314099097404noreply@blogger.com0