Private packet switched copper and optical networks that do not connect to the privately owned and
frequently foreign controlled INTERNET spectrum are very common - with about 80% of the content
worldwide on these networks separate from the ARIN/RIPE group.
A private network may or may not run on IP address space, and may use TCP or other protocols.
Any effort to allege a monopoly over TCP/IP is a fraud, per Open Standards and Oklahoma Constitution
Article II section II-32, and prohibited in contract per Oklahoma Constitution Article XXIII section
XXIII-8 and XXIII-9.
Only civil tort prohibits customers on 3rd party networks from using any IP ADDRESS they wish, and
such civil tort does not extend to the private property and private networks of individuals where
routers and other devices distinguish between network traffic for scope of transmission conflict.
This means two machines with the same IP Address may exist, and work perfectly, provided that the
network infrastructure can distinguish which network the destination traffic should be routed to.
If routing is defective, or purposefully deficient, the appearance of an IP on a network that exists
on another network can cause disruption of that traffic. The same is true of MAC ADDRESS duplication
in Switched Ethernet, or other routing schema.
No obligation or endorsement to use computer equipment purchased in clear title in the United States
conditional to a foreign manufacturer or organization is lawful. Claims to that effect are fraud.
End user telephony equipment beyond the line of demark where carrier equipment is designated in
contract do not have any right to suggest interest or equity or use or terms to property on the
far side of the demark, provided that such equipment is not directly interfering with or communicating
harmful or conflicting information impairing the carrier-owned equipment on the outside of a private
network. It is none of their business what you do with your equipment, and you may repair or modify
that equipment as you see fit under U.S. Law because it is property - not leased equipment belonging
to the company or original equipment manufacturer.
Recently we've heard some bizarre stories that express a gross criminal ingorance or intent
to knowingly defraud in these areas of settled U.S. Law.
RACCOON TECHNOLOGIES INCORPORATED does provide, configure, install, support, maintain, and develop
PRIVATE NETWORKS that work with OUR PROPRIETARY PROPERTY AND PRODUCTS, using our lease and
license system and tools - which are protected intellectual property and reverse engineering or
disclosure prohibted under the Title 78 Oklahoma State Law, so set forth in trade secrets and
copyright and other related works for intellectual property and intangible property rights.
Any person suggesting that these are not Laws of the State of Oklahoma or void, to any customer,
for any reason - will be deemed to be engaged in criminal activity and treated accordingly - losing
any access and use rights to services immediately for violation of terms.
We are aware that some vendors are trying to falsify these rights to assert illegal MONOPOLY claims
from CHINA, NATION OF JAPAN, CANADA, SWEDEN, ICELAND, DENMARK, TEXAS, CALIFORNIA, MICHIGAN, FLORIDA,
MINNESOTA, and other rogue states engaged in genocide of Native American and Ethnic Russians in the
present radical socialist activity against U.S. Law and to defraud.
Any person who is a member of those organizations will be barred access on discovery, and use of the
products of this firm in those states is prohibited by all persons while in the jurisdiction or region
due to fraud by each state in specific claims now before our network board.
Examples of Private Networks
- X.509 Certified video hosting and Age Verification System
- Routed Authorized High Speed Gaming MUX NETWORKS
- Private WDM Optical Loops
- Dedicated Closed Circuit TCP/IP high speed Net
- Drone Command and Control Military Networks
- Networks limited to verified persons
- Removal of bad actors from communities
- Punitive service-wide access control
- Elimination of stalking / State-actors
Are Private Networks Just VPN Networks
No. Private networks are indeed physically private, in most cases,
although virtual private networks using encryption in end-to-end
communication like SSL do exist, they are not necessarily typical of
real hardware-based and access-point-oriented private network systems.
Virtual Private Network or SSL can be used as a means of transport security
to reach a portal for a Private Network over the public (common) state-based
consumer networks, but nothing about that technology is guarenteed secure
versus modern state-level-bad-actors. It is important to recognize that layer
of security and route-of-access are not what constitute a genuine private-network.
Private Networks are covered by the same industry code in the United States
Internal Revenue Service as public networks and Internet Service Providers (ISP)
business, as well as metro-carrier-class transport and general wiring of data
end-point cable companies. These are very different services, from utilities
to management and circuit termination, wireless multiplexing to SONET, and
routing. No company has a right to claim monopoly over other areas of business
just because they engage in any one or more of those areas of practice. Claims
to that effect are fraud when uttered or alleged to deny qualified standing in
the Standard Industry Code (SIC) class.
For more information contact 1 (855) 505 0784. No soliciting permitted.