Tags » Financial Exploitation

The Discovery

I have been questioned as to why I am writing this blog and specifically naming names.  The reason behind it is to bring to light the all too common occurrence of Elderly Abuse.  454 more words

Christina Meehan Hornedo

FLAGLER COUNTY COURT IN FLORIDA SEEMS TO ENDORSE RACKETEERING AND HUMAN TRAFFICKING OF A SENIOR

elderdignity.org

PRESS RELEASE
For immediate release, July 25, 2017
Contact: Dr. Terri Kennedy, elderdignity@hotmail.com, 212-901-6913

FLAGLER COUNTY COURT IN FLORIDA SEEMS TO ENDORSE RACKETEERING AND HUMAN TRAFFICKING OF A SENIOR… 1,856 more words

Guardianship Abuse

Jean Kasem files wrongful death and fraud suit in Washington, against Casey Kasem’s Adult Children

The widow of Casey Kasem has filed a wrongful death lawsuit against the radio personality’s three adult children from a prior relationship 40 years ago. Jean Kasem states that Kerri, Mike and Julie Kasem, along with Julie’s husband and their attorney Troy Martin, perpetrated a “homicidal guardianship scam” and, per a statement, “forcefully entrapped and chemically restrained her husband in St Anthony Hospital and then killed him to go after Casey and Jean’s financial assets,” which is exactly what they are doing now. 487 more words

World News

ppjg reblogged this on The PPJ Gazette.

Casey Kasem's Widow Files Wrongful Death Suit Against Radio Host's Kids

Rolling Stone

Jean Kasem alleges radio personality’s children from another marriage perpetrated a “homicidal guardianship scam”

Casey Kasem’s widow has filed a wrongful death suit against the late radio host’s children from another marriage. 899 more words

Guardianship Abuse

World Elder Abuse Recognition Day 6/15/2017

“To care for those who once cared for us is one of the highest honors.” ― Tia Walker

Watch the short video below, and share this with others.   649 more words

Professional Partners

Cyber Incident Response and Little League Baseball: It’s all about the Follow Through

Responding to a cyber incident isn’t just about getting the systems back up and running (very important) but rather performing in sequence a set of mechanisms that improve the overall cyber incident response effectiveness. 45 more words

Internal Controls