Responsibe Image

Raccoon Technologies Incorporated

Physical Private Networking (PPN)

Virtual Private packet switched copper and optical networks that do not connect to the privately owned and frequently foreign controlled INTERNET spectrum are very common - with about 80% of the content worldwide on these networks separate from the ARIN/RIPE group, which style their labor as a foreign sovereign quasi-international government organization with its own agenda.

Physical private networks may or may not run on IP address space, and may use TCP or other protocols. (see RFC-1918)

Any effort to allege a monopoly over TCP/IP is a fraud, per Open Standards and Oklahoma Constitution Article II section II-32, and prohibited in contract per Oklahoma Constitution Article XXIII section XXIII-8 and XXIII-9. (see also: RFC-1918 - section 2 paragraph 1)

Only civil tort prohibits customers on 3rd party networks from using any IP ADDRESS they wish, and such civil tort does not extend to the private property and private networks of individuals where routers and other devices distinguish between network traffic for scope of transmission conflict. Suggestion that use without IANA permission is a criminal threat, asserting a quasi-government right to abuse providers who do not have a contract or agreement to conform to the connection terms or services of the private foreign and non-government groups that make up IANA.ORG and its agencies, partners, and suppliers.

This means two machines with the same IP Address may exist, and work perfectly, provided that the network infrastructure can distinguish which network the destination traffic should be routed to. The INTERNET is one such network. The SEVEN ALPHA product is another separate network. The two networks are not the same product, organization, or affiliated in any way at law.

If routing is defective, or purposefully deficient, the appearance of an IP on a network that exists on another network can cause disruption of that traffic. The same is true of MAC ADDRESS duplication in Switched Ethernet, or other routing schema.

No obligation or endorsement to use computer equipment purchased in clear title in the United States conditional to a foreign manufacturer or organization is lawful. Claims to that effect are fraud.

End user telephony equipment beyond the line of Utility Service Demarcation where carrier equipment is designated in contract do not have any right to suggest interest or equity or use or terms to property on the far side of the Demarcation Line, provided that such equipment is not directly interfering with or communicating harmful or conflicting information impairing the carrier-owned equipment on the outside of a private network. It is none of their business what you do with your equipment, and you may repair or modify that equipment as you see fit under U.S. Law because it is property - not leased equipment belonging to the company or original equipment manufacturer.

FRAUD CLAIMS BY TEXAS NATIONALISTS

Recently we've heard some bizarre stories that express a gross criminal ignorance or intent to knowingly defraud in these areas of settled U.S. Law.

RACCOON TECHNOLOGIES INCORPORATED does provide, configure, install, support, maintain, and develop PHYSICAL PRIVATE NETWORKS that work with OUR PROPRIETARY PROPERTY AND PRODUCTS, using our lease and license system and tools - which are protected intellectual property and reverse engineering or disclosure prohibited under the Title 78 Oklahoma State Law, so set forth in trade secrets and copyright and other related works for intellectual property and intangible property rights.

Any person suggesting that these are not Laws of the State of Oklahoma or void, to any customer, for any reason - will be deemed to be engaged in criminal activity and treated accordingly - losing any access and use rights to services immediately for violation of terms.

We are aware that some vendors are trying to falsify these rights to assert illegal MONOPOLY claims from CHINA, NATION OF JAPAN, CANADA, SWEDEN, ICELAND, DENMARK, TEXAS, CALIFORNIA, MICHIGAN, FLORIDA, MINNESOTA, and other rogue states engaged in genocide of Native American and Ethnic Russians in the present radical socialist activity against U.S. Law and to defraud.

Any person who is a member of those organizations will be barred access on discovery, and use of the products of this firm in those states is prohibited by all persons while in the jurisdiction or region due to fraud by each state in specific claims now before our network board.

Examples of Private Networks

  • X.509 Certified video hosting and Age Verification System
  • Routed Authorized High Speed Gaming MUX NETWORKS
  • Physical Private WDM Optical Loops
  • Dedicated Closed Circuit TCP/IP high speed Net
  • Drone Command and Control Military Networks

Use Cases

  • Networks limited to verified persons
  • Removal of bad actors from communities
  • Punitive service-wide access control
  • Elimination of stalking / State-actors

Are Physical Private Networks Just VPN Networks

No. Physicial Private networks are indeed physically private, in most cases, although virtual private networks using encryption in end-to-end communication like SSL do exist, they are not necessarily typical of real hardware-based and access-point-oriented private network systems.

Virtual Private Network or SSL can be used as a means of transport security to reach a portal for a Private Network over the public (common) state-based consumer networks, but nothing about that technology is guaranteed secure versus modern state-level-bad-actors. It is important to recognize that layer of security and route-of-access are not what constitute a genuine private-network.

Private Networks are covered by the same industry code in the United States Internal Revenue Service as public networks and Internet Service Providers (ISP) business, as well as metro-carrier-class transport and general wiring of data end-point cable companies. These are very different services, from utilities to management and circuit termination, wireless multiplexing to SONET, and routing. No company has a right to claim monopoly over other areas of business just because they engage in any one or more of those areas of practice. Claims to that effect are fraud when uttered or alleged to deny qualified standing in the Standard Industry Code (SIC) class.

Other Terms and Definitions

Before you let some moron convince you they are the wizard who controls the Internet or bully you, read a little about all the companies and businesses who are on the 'Old Internet' and other networks (Internet2) that exist in the really-real world. Web 2.0 and other terms sound intimidating. But they are just new slang for old bad ideas. Legally, no one owns the INTERNET. It's just a term that some countries don't understand isn't a monopoly or a labor union to conquer. Groups that claim to be IN CHARGE of it, are frauds.

For more information contact 1 (855) 505 0784. No soliciting permitted.

 

Copyright © 2009-2018 RACCOON TECHNOLOGIES INCORPORATED. All rights reserved.

Responsibe Image