Sandpoint, Bonner County, Idaho Elder Abuse VP Task Force ™ Article

Public Safety Tool Report Excerpts

Qualitative Research Report Results for Regional Blog & Education Publication Series:

Inland North West Research Summary Articles from the NW VP Collusion Project.

 

Idaho, Washington Statues & Federal ACTs concerning Vulnerable Person Protection.

Idaho Statutes

I.C. § 18-1505(1), § 39-5302(7)

IC 39-5303, CMS and SSA Title 28  & SSA Subtitle B – Elder JusticeElder Mistreatment and The Elder Justice Act

~

Washington Statutes

Top of Form

RCW 74.34.020

Bottom of Form

Repeating ABA Model Rule Violations common in Vulnerable Person and Estate Planning and Guardians and Conservator Litigation:

Rule 1.1, Rule 1.7, Rule 1.8, Rule 1.10, Rule 1.14, Rule 1.15, Rule 1.16, Rule 4.1, Rule 4.2, Rule 4.3, Rule 4.4, Rule 7.1, Rule 8.1 and Rule 8.3.

~

IRS Circular 230; Section 10.5. See Table 2 Below & TEDRA Violations:

I.C § 15-8-103 (e), IC 5-219, IC 18-2403, IC 5-218

~

Legal protection Federal Statutes when Restricted Access at Hospitals and Eldercare Facilities.

Restricted Access of Vulnerable Person with Family at Kootenai Health or other regional Facilities and Hospitals.

Department of Health and Human Services – Centers for Medicare and Medicaid Services: 42 CFR 482

Hospital and healthcare facility access and visitation

If you are being denied visitation to a loved one who is in a nursing home or hospital, this federal bill will help you in all 50 states.

42 CFR 482.13 – Condition of participation: Patient’s rights.

  • 482.13 Condition of participation: Patient‘s rights.

hospital must protect and promote each patient‘s rights.

(a)Standard: Notice of rights – (1) A hospital must inform each patient, or when appropriate, the patient‘s representative (as allowed under State law), of the patient‘s rights, in advance of furnishing or discontinuing patient care whenever possible.

Access and Visitation

The resident has the right and the facility must provide—subject to the resident’s right to deny or withdraw consent at any time—immediate access to any resident by:

  • Immediate family or other relatives of the resident. (42 C.F.R. §483.10(j)(1)(vii))
  • Others who are visiting with the consent of the resident, subject to reasonable restrictions. (42 C.F.R. §483.10(j)(1)(viii))
  • The facility must provide reasonable access to any resident by any entity or individual that provides health, social, legal or other services to the resident. (42 C.F.R. §483.10(j)(2))
  • If a resident is married, he or she and their spouse must be assured privacy and to be able to share a room if both are residents in the facility and both agree to do so.  (42 C.F.R. §483.10(e)(1)  and (m))

for more information on this bill, go to https://www.gpo.gov/fdsys/pkg/CFR-2011-title42-vol5/pdf/CFR-2011-title42-vol5-sec483-10.pdf

 

 

Data Curated by Corruption Maps – Publishing Newsworthy Public Safety Information.

Crowd-sourced and AI RSS Publication System; Data Gathered from Public Resources, Events,  News Articles and Advocate/Victim Witness Accounts of White-Collar Misdemeanor Infractions or Felonious that Often Results in re Irreparable Devastation to Vulnerable Persons.

 

Citizen’s Public Safety Network – Vulnerable Person – VP Task Force:  White Collar Crime Tracking GEO API and Relational Database Social Technology Applications.

 

Person’s Submitting Evidence are Protected By Federal Whistleblower Protection Statutes In Conjunction With the US Constitution.

National, state and municipal white-collar civil, felony offences and corruption trends based on AI and crowd-sourced newsworthy public safety awareness sources. Information is  then cross-referenced with curated data of alleged or convicted perpetrator profiles. Information is based on historical and current crowd-sourced, advocate researcher and AI harvested news articles, national, state and local news events, and Geo API database resources. This platform uses the latest AI and open-source social technology platforms in combination with citizen public safety reporting systems and public domain data.  The sites GEO API maps layer and filter profiles and infractions to visually depict the trends of vulnerable person exploitation, domestic violence and inter-related vulnerable person crimes as each is a systemic societal epidemic;  crimes which often are perpetrated hand-in-hand with  professional malpractice, collusion and corruption pre-established in various urban and rural regional professionally affiliated networks.

 

One state example  of the  legal resources Law Enforcement can utilize to address the  repeating patterns of vulnerable person infractions and felonies  that consistently occur over a period of time by the same offenders with Federal and statutory civil and criminal violations occurring across county lines, State and even national borders.

CHAPTER 78 RACKETEERING ACT

TITLE 18

CRIMES AND PUNISHMENTS

CHAPTER 78

RACKETEERING ACT

18-7803.  DEFINITIONS. As used in this chapter, (a) “Racketeering” means any act which is chargeable or indictable under the following sections of the Idaho Code or which are equivalent acts chargeable or indictable as equivalent crimes under the laws of any other jurisdiction:

(1)  Homicide (section 18-4001, Idaho Code);

(2)  Robbery, burglary, theft, forgery, counterfeiting, and related crimes (sections 18-140118-140518-2403,18-240718-312318-312418-312518-360118-360218-360318-360518-360618-360718-360918-361018-361418-361518-463018-6501 and 49-518, Idaho Code);

(3)  Kidnapping (section 18-4501, Idaho Code);

(4)  Prostitution (sections 18-560118-560218-560318-560418-560518-560618-5608 and 18-5609, Idaho Code);

(5)  Arson (sections 18-80118-80218-80318-804 and 18-805, Idaho Code);

(6)  Assault (sections 18-908 and 18-4015, Idaho Code);

(7)  Lotteries and gambling (sections 18-380118-380218-380918-490218-490318-490418-490518-4906 and18-4908, Idaho Code);

(8)  Indecency and obscenity (sections 18-151518-151818-410318-4103A18-410418-410518-4105A and 18-4107, Idaho Code);

(9)  Poisoning (sections 18-4014 and 18-5501, Idaho Code);

(10) Fraudulent practices, false pretenses, insurance fraud, financial transaction card crimes and fraud generally (sections 18-240318-270618-300218-310118-312418-312518-312618-671341-29341-294 and41-1306, Idaho Code);

(11) Alcoholic beverages (sections 23-60223-60623-61023-70323-90523-91423-92823-934 and 23-938, Idaho Code);

(12) Cigarette taxes (sections 63-2505 and 63-2512(b), Idaho Code);

(13) Securities (sections 30-14-40130-14-40230-14-40330-14-40430-14-50130-14-50230-14-505 and 30-14-506, Idaho Code);

(14) Horseracing (section 54-2512, Idaho Code);

(15) Interest and usurious practices (sections 28-45-401 and 28-45-402, Idaho Code);

(16) Corporations (sections 18-190118-190218-190318-190418-190518-1906 and 30-1510, Idaho Code);

(17) Perjury (sections 18-5401 and 18-5410, Idaho Code);

(18) Bribery and corrupt influence (sections 18-1352 and 18-1353, Idaho Code);

(19) Controlled substances (sections 37-2732(a), (b), (c), (e) and (f), 37-2732B37-2734 and 37-2734B, Idaho Code);

(20) Motor vehicles (sections 49-22849-23149-232 and 49-518, Idaho Code);

(21) Terrorism (section 18-8103, Idaho Code).

(b)  “Person” means any individual or entity capable of holding a legal or beneficial interest in property;

(c)  “Enterprise” means any sole proprietorship, partnership, corporation, business, labor union, association or other legal entity or any group of individuals associated in fact although not a legal entity, and includes illicit as well as licit entities; and

(d)  “Pattern of racketeering activity” means engaging in at least two (2) incidents of racketeering conduct that have the same or similar intents, results, accomplices, victims or methods of commission, or otherwise are interrelated by distinguishing characteristics and are not isolated incidents, provided at least one (1) of such incidents occurred after the effective date of this act and that the last of such incidents occurred within five (5) years after a prior incident of racketeering conduct.

2017 Vulnerable Person Exploitation Collusion Network; An qualitative analysis of three Related Cases (Spokane & Stevens County Washington)

 

VP TASK FORCE Public Safety Tools

Profile and Track Public Safety & Vulnerable Person Abuse, Exploitation, Negligence and Malpractice.

 GEO API RISK Multiple Layered Map Overlays

Tactical Alert Warning Systems & Tertiary Profiling of Public Safety Threats Tracking Individual and White Collar Crime Collusion.

SHERLOCK AI Artificial Intelligence

Researchers & Researcher Trained Machine Detectives Curating Data For Repeating Criminal Patterns.