This piece was reprinted by OpEd News with permission or license. It may not be reproduced in any form without permission or license from the source.
Annabel Melongo: Victimized and Imprisoned - by Stephen Lendman
In May 2006, Melongo was bogusly charged and arrested for computer tampering and eavesdropping without consent - the former accusation based solely on Save-A-Life Foundation (SALF) founder, Carol Spizzirri, a woman exposed as a liar. More about her and SALF below.
Melongo justifiably claims she was framed "to cover up SALF's longstanding relationships with powerful political cronies and funders." Originally indicted on January 17, 2007, she was re-indicted on May 28, 2008 on two alleged charges for:
(1) Eavesdropping without consent:
"in that she knowingly and intentionally used an eavesdropping device, to wit: an audio recording device, for the purpose of recording a conversation, to wit: recording a conversation conducted by telephone between Annabel K. Melongo and Pamela Taylor of the Cook County Court Reporter's Office, and without the consent of all parties to such conversation and without authorization provided by Article 108A or Article 108B of the 'Code of Criminal Procedure of 1963,' approved August 13, 1963, as amended."
(2) Computer tampering:
"in that she knowingly and without the authorization of the computer's owner, accessed or caused to be accessed a computer program or date, and deleted a computer program or data, with the intent to commit an offense established under the Illinois computer crime law (720 ILCS 5/16D), to wit: that on or about April 28, 2006 Annabel Melongo accessed Safe A Life Foundation, Inc.'s (NFP) computer data server located in Schiller Park, Illinois and permanently deleted, removed and altered hundreds of computer files critical to Save A Life Foundation Inc.'s (NFP) operations. These acts were done without the authorization, knowledge or consent of the computer's owner."
Her trial date is set for January 12, addressing the eavesdropping charges only. A second trial may or may not follow on computer tampering, depending on if prosecutors wish to pursue it. Proving it is much harder.
Next Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).