--- G G wrote: > From G G Sat Aug 21 11:09:17 1999 > Received: from [] by > web501.mail.yahoo.com; Sat, 21 Aug 1999 11:09:17 PDT > Date: Sat, 21 Aug 1999 11:09:17 -0700 (PDT) > From: G G > Subject: Re: My Position > To: Ramsey > MIME-Version: 1.0 > Content-Type: text/plain; charset=us-ascii > Content-Length: 7146 > > Patricia- > > If you tell me which parts you want me to send to > Mike > Tracey, I will do that, but I cannot give you his > email address without his permission. I gave it Jeff > Shapiro thinking that Mike wouldn't mind but he did > mind, so I have to be careful about that. > > You are correct regarding your email routes. I know > a > little bit about the technology. Basically, your > emails are sent through various servers and routers > in > packets. Imagine that when you send an email, each > word takes a different route. All of the internet is > like this. Messages are broken up into little > packets > and sent via a system of routers and switches to > their > final destination, which is someone's personal > computer (PC). A normal message is broken up and > then > put togehter again at the end, and a trace route can > be done on an IP address that will lead back to the > place you dialed into. For example, when I log on, > my > phone dials into the ATT Internet backbone. Say I > threatened someone on line - if they filed a > complaint > with the police, they would go to ATT with a > subpeaona > to get the phone number I dialed from. That's how > they would know it was me. In your case, your > message > is broken up and sent through many many more routers > and servers than would ordinarily be the case. The > packets are bounced back and forth and all around so > many times that it becomes almost impossible to > unscramble them. Even a sophisticated computer > system > would take years to do it. However, the service you > go > through to anonymize yourself (for lack of a better > word) knows who you are. > > I understand your desire to protect your family. I > would do the same. What message do you want me to > relay, and to whom? > > Can you tell me who is helping you to send emails? > > This man you speak of - how old is he? How did he > get > to Boulder with no one knowing and how did he get > out > again? Did JonBenet know him too? Does your husband > share your suspicions? > > G > > > --- Ramsey wrote: > > Dear Gail, > > > > I am in a very bad position. I will try to explain > > it to you. You > > will find that I have no desire to force anyone to > > believe I am > > Patricia Ramsey. I only want to find a way to have > > my words > > heard. I feel that I am the only person who can > > effectively > > appeal to my daughter's killer. Let me try to > > explain my > > position. > > > > In the first place, my attorneys have no > intentions > > of letting me > > talk to anyone, in the press or otherwise, while > the > > grand jury > > is supposedly in its final phases. Every word I > > could say would > > be scrutinized and analyzed - all for the purpose > of > > slanting > > things toward my guilt. > > > > I must also respect the feelings of my family. I > > know that I > > should reveal certain truths, but I refuse to do > > anything that > > would offend my family in any way. My mere > presence > > here has > > already prompted people to contact them directly. > I > > do not want > > this to happen. I know their answer - "Patricia > does > > not own a > > computer; furthermore, she would not refer to > > herself as > > "Patricia" as she is called by all who love her - > > Patsy." This is > > where I really anger those who refer such findings > > to me by > > responding, "That is correct. I do not own a > > computer and would > > never refer to myself as Patricia". > > > > While the above might seem terribly confusing; to > > me, it all > > makes perfect sense when the final element is put > > into place - I > > fear my daughter's killer. If I come forth and > turn > > the direction > > of this investigation toward him, he might > retaliate > > against my > > family. He warned us of such retaliation in his > > ransom note. > > Would not any mom deny anything and keep secrets > as > > long as she > > must keep them, in order to protect her family? > This > > same person > > has already taken one of my children. What act > could > > be more > > aggressive? He is capable of anything. > > > > As you talk to me, you will understand the > > frustration people > > have with me. I will admit that I am not doing > this > > alone. I do > > have assistance. I have confided in at least 3 > > people who seem to > > have my best interest at heart. I could not carry > > this out alone. > > I have no knowledge of the complexities of the > very > > vehicle that > > brings these messages to you. According to my > > contacts, the > > receiving end of this mail is scrambled up to the > > point that they > > are opened and scrambled up until the point it > > leaves. All this > > requires some highly technical applications that I > > could never > > understand. > > > > If you think you can survive my illusiveness; > > something I feel is > > imperative though it is destroying any chance of > my > > being heard, > > then I would like to talk to you. Yes, I would > like > > for Michael > > to see some things I say to you. Will you let me > > tell you things > > I want you to send to him? I will tell you that, > so > > far, I have > > only spoken directly to such people as Michael. I > > would like to > > continue that. It would be nice to send these > > messages directly > > to an e-mail address Michael might maintain. > > > > The man I speak of, who might very well be a > killer, > > is a person > > I am currently in contact with. You must not share > > that with > > another living soul unless I ask you to do so. > > Collins is making > > a fool of himself; moreover, of me. I do not want > > any further > > leaks. By the way, I never said that much to > Collins > > about this > > man I speak about to you. > > > > The man I speak of frequents my daughter's grave. > A > > few days ago, > > he confirmed his visits by describing specific > > physical > > surroundings. He made comments like "A rose for > > JonBenet; A rose > > for Beth." He also said he liked the new ornaments > > in the > > dogwood, describing the dove directly above her > > grave as his > > favorite. He went on to describe the long stem > > flowers that drape > > her grave horizontally this week. Gail, all those > > physical > > descriptions are currently present. He is not > lying > > when he says > > he has been spending a lot of time with JonBenet. > > > > Let me add, importantly, that he is a very kind > and > > sweet person. > > He is unbelievably kind to me and expresses his > > undying love for > > JonBenet. I have never made comment to him that he > > might be the > > killer. I am concerned because he has described > her > > murder with > > such fluency. He seems to know a little too much. > > Otherwise, he > > is a Prince. > > > > Thank you for talking to me about this matter. I > > would not be > > telling you this if I did not think you were to be > > trusted. I > > also feel that you might relay a very important > > message that I > > have tried for months to relay. I request that you > > not go to the > > police. This must be done delicately. My > mysterious > > friend will > > fly if he has any thought that the authorities are > > involved. > > After having spoken to me, re-read the warnings in > > the ransom > > note. I must not take any chances. Drawing out the > > killer is > > important to me; however, preventing any harm to > one > > of my family > > members is my priority. > > > > Patricia > >