COURT ADMINISTRATOR's OFFICE 15Th JUDICIAL DISTRICT CHESTER COUNTY JUSTICE CENTER 201 WEST MARKET STREET SUITE 4100 P.O. BOX 2

Total Page:16

File Type:pdf, Size:1020Kb

COURT ADMINISTRATOR's OFFICE 15Th JUDICIAL DISTRICT CHESTER COUNTY JUSTICE CENTER 201 WEST MARKET STREET SUITE 4100 P.O. BOX 2 Vicky K. Bartholomew COURT ADMINISTRATOR’S OFFICE Minor Judiciary Administrator 15th JUDICIAL DISTRICT Jennifer S. Neff CHESTER COUNTY JUSTICE CENTER Civil Court Administrator 201 WEST MARKET STREET Jordan C. Ludwick, Esq. SUITE 4100 Criminal Court Administrator P.O. BOX 2746 Suzie Marker PATRICIA L. NORWOOD-FODEN WEST CHESTER, PA 19380-0989 Family Court Administrator Court Administrator 610-344-6170 FAX: 610-344-6127 Kimberly Bainbridge ELIZABETH A. DUMOND Orphans’ Court Administrator Chief Deputy Court Administrator September 23, 2021 The trial list for the two-week criminal session commencing Monday, October 18, 2021 for The Honorable Jeffrey R. Sommer, is now available in the Court Administrator’s Office. THE CALL OF THE LIST SHALL BE HELD ON WEDNESDAY, OCTOBER 13, 2021, AT 8:45 A.M., IN COURTROOM NO. 8, before THE HONORABLE JEFFREY R. SOMMER. All counsel and unrepresented defendants are required to appear at the call of the list. Attention Defendant: If you have an attorney, contact him/her immediately. If you do not have an attorney, it would be to your benefit to contact one immediately. If you cannot afford a private attorney, you may apply for representation by the Public Defender’s Office (610-344-6940). Failure to appear on your trial date shall constitute a violation of your bail. If you are on bail for this case, you must call the Bail Agency (610-344-6886) upon receipt of this notice. Attention Counsel: Judge Sommer will hear guilty pleas, in Courtroom No. 8, after the call of the list on October 13th, and at 9:00 a.m. daily during the session. If your client has not entered a plea on or before his/her trial date, then the case shall be called for trial. IF YOUR CLIENT IS INCARCERATED AND INTENDS TO ENTER A PLEA, IT IS YOUR RESPONSIBILITY TO REQUEST HIS/HER TRANSPORT TO THE JUSTICE CENTER. TO DO SO, PLEASE E-MAIL THE SHERIFF’S OFFICE AT [email protected]. Chester County Administrative Order No. 11-2016, as amended on June 9, 2020, prohibits the photography, video recording and audio recording by any person of any Chester County judicial proceeding, including any judicial proceeding conducted remotely by advanced communication technology, regardless of whether the presiding judge or hearing officer is located in the Chester County Justice Center. Violation of this order can result in a fine and imprisonment. Very truly yours, Jordan C. Ludwick Criminal Court Administrator Chester County Court of Common Pleas PAGE 1 CRIMINAL TRIAL LIST INDEX THE HONORABLE JEFFREY R. SOMMER Trial Term October 18, 2021 through October 29, 2021 Case No Defendant Name Page 0003553-2020 Adams, Edward Carl Jr. ......................................................... 29 0001816-2021 Adams, Tiffany Leigh ......................................................... 50 0000958-2021 Alston, Steven ......................................................... 18 0001236-2021 Anderson, Tiera Shaunici ......................................................... 41 0002560-2021 Avent, Jessica Marie ......................................................... 21 0001267-2020 Avila Luna, Artemio ......................................................... 10 0000008-2021 Baker, Barry Robert Jr. ......................................................... 45 0001546-2021 Barrage, Warren Keith ......................................................... 62 0001367-2021 Barrage, Warren Keith ......................................................... 62 0000799-2021 Batzel, Melissa Marie ......................................................... 57 0001108-2021 Beelis, Rita Marie ......................................................... 55 0002447-2021 Bennett, Michael W. ......................................................... 55 0002743-2021 Boggs, Joshua Milard ......................................................... 44 0001261-2021 Bova, Dmytro Volodymyrovic ......................................................... 66 0000225-2021 Bowens, Jeremiah Stefan Rafakie ......................................................... 46 0002411-2021 Brito Lugo, Eugenio ......................................................... 72 0001491-2021 Brodowski, Kevin Dale ......................................................... 52 0003244-2020 Brown, Percy ......................................................... 37 0001825-2021 Bullitt, Russell ......................................................... 76 0002081-2021 Burns, Jason J. ......................................................... 74 0002717-2020 Canty, Kaywain Dymere ......................................................... 31 0001846-2021 Caruso, Jennifer Lee ......................................................... 75 0003418-2020 Clarke, Iris A. ......................................................... 43 0003621-2020 Clemmer, Dylan Joel ......................................................... 48 0000583-2021 Cross, Kevin ......................................................... 50 0000462-2021 Cross, Kevin ......................................................... 49 0002218-2020 Cutrara, Gerard James ......................................................... 24 0002686-2021 Darmiento, Joseph M. Jr. ......................................................... 58 0002272-2021 Debose, Tayana Casmere ......................................................... 74 0001602-2021 Defrank, Mark A. ......................................................... 70 0000106-2021 Deprosperis, Kevin Michael ......................................................... 34 0001075-2020 Detweiler, Leroy David ......................................................... 12 0000725-2020 Dickinson, Monroe Eugene ......................................................... 10 0002438-2021 Dixon, Anton ......................................................... 63 0002797-2020 Dominguez Sanchez, David ......................................................... 33 0002119-2020 Eason, Jolene M. ......................................................... 14 0000486-2021 Eason, Jolene Martell ......................................................... 14 0000502-2021 Eason, Jolene Martell ......................................................... 15 0002494-2020 Edwards, Claude Jr. ......................................................... 28 0001098-2021 Edwards, Joseph Shane ......................................................... 19 0001155-2021 Eller, Roy Eugene ......................................................... 6 0003277-2019 Eller, Roy Eugene ......................................................... 6 0000887-2021 Elliotte, Maurice ......................................................... 54 0001290-2021 English, Kenyale Lakeya ......................................................... 41 Chester County Court of Common Pleas PAGE 2 CRIMINAL TRIAL LIST INDEX THE HONORABLE JEFFREY R. SOMMER Trial Term October 18, 2021 through October 29, 2021 Case No Defendant Name Page 0004435-2019 Evans, Amira Lyna-Victoria ......................................................... 4 0003206-2019 Evans, Brian ......................................................... 5 0002618-2021 Farris, Tiffany M. ......................................................... 58 0000090-2021 Felder, De'Ronda Senquetta ......................................................... 39 0001682-2021 Ferko, Robert Edward Jr. ......................................................... 69 0004301-2018 Finch, Michael Jay ......................................................... 3 0002707-2021 Fletcher, Jacob ......................................................... 75 0002503-2019 Ford, Harold F. III ......................................................... 5 0001995-2020 Fox, Joshua John ......................................................... 27 0001555-2021 Franz, Ronald Charles ......................................................... 73 0002617-2020 Frey, John Michael ......................................................... 28 0001664-2021 Fry, Justin Joseph ......................................................... 67 0001692-2021 Gambill, James Patrick ......................................................... 68 0001594-2021 Gambill, James Patrick ......................................................... 68 0001156-2021 Geiger, Kyra Imani ......................................................... 66 0000024-2021 Gerald, Blain A. ......................................................... 42 0000025-2021 Gerald, Blain A. ......................................................... 42 0003286-2020 Gibson, Arthur Clifford ......................................................... 8 0002401-2021 Gilliam, Sheilla Lorraine ......................................................... 60 0001637-2021 Graham, Elizabeth Ashley ......................................................... 76 0002102-2021 Graham, Gerald David Michael ......................................................... 77 0000521-2021 Graul, Harvard ......................................................... 51 0002302-2020 Gray, Gerome Darnell Jr. ......................................................... 13 0002303-2020 Gray, Gerome Darnell Jr. ......................................................... 13 0003253-2020 Green, Leroy Dominique ......................................................... 9 0002677-2021 Green, Matthew Austin ......................................................... 50 0002314-2020 Green, Richard Tyrone ......................................................... 10 0000224-2021 Griffin, Alicia Johnay ........................................................
Recommended publications
  • Exploration of Chemical Space by Machine Learning
    Skolkovo Instutute of Science and Technology EXPLORATION OF CHEMICAL SPACE BY MACHINE LEARNING Doctoral Thesis by Sergey Sosnin Doctoral Program in Computational and Data Science and Engineering Supervisor Vice-President for Artificial Intelligence and Mathematical Modelling, Professor, Maxim Fedorov Moscow – 2020 © Sergey Sosnin, 2020 I hereby declare that the work presented in this thesis was carried out by myself at Skolkovo Institute of Science and Technology, Moscow, except where due acknowledgement is made, and has not been submitted for any other degree. Candidate: Sergey Sosnin Supervisor (Prof. Maxim V. Fedorov) 2 EXPLORATION OF CHEMICAL SPACE BY MACHINE LEARNING by Sergey Sosnin Submitted to the Center for Computational and Data-Intensive Science and Engineering and Innovation on September 2020, in partial fulfillment of the requirements for the Doctoral Program in Computational and Data Science and Engineering Abstract The enormous size of potentially reachable chemical space is a challenge for chemists who develop new drugs and materials. It was estimated as 1060 and, given such large numbers, there is no way to analyze chemical space by brute-force search. However, the extensive development of techniques for data analysis provides a basis to create methods and tools for the AI-inspired exploration of chemical space. Deep learning revolutionized many areas of science and technology in recent years, i.e., computer vision, natural language processing, and machine translation. However, the potential of application of these methods for solving chemoinformatics challenges has not been fully realized yet. In this research, we developed several methods and tools to probe chemical space for predictions of properties of organic compounds as well as for visualizing regions of chemical space and for the sampling of new compounds.
    [Show full text]
  • Identity Theft Literature Review
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Identity Theft Literature Review Author(s): Graeme R. Newman, Megan M. McNally Document No.: 210459 Date Received: July 2005 Award Number: 2005-TO-008 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. IDENTITY THEFT LITERATURE REVIEW Prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement January 27-28, 2005 Graeme R. Newman School of Criminal Justice, University at Albany Megan M. McNally School of Criminal Justice, Rutgers University, Newark This project was supported by Contract #2005-TO-008 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S.
    [Show full text]
  • Reference Guides for Registering Students with Non English Names
    Getting It Right Reference Guides for Registering Students With Non-English Names Jason Greenberg Motamedi, Ph.D. Zafreen Jaffery, Ed.D. Allyson Hagen Education Northwest June 2016 U.S. Department of Education John B. King Jr., Secretary Institute of Education Sciences Ruth Neild, Deputy Director for Policy and Research Delegated Duties of the Director National Center for Education Evaluation and Regional Assistance Joy Lesnick, Acting Commissioner Amy Johnson, Action Editor OK-Choon Park, Project Officer REL 2016-158 The National Center for Education Evaluation and Regional Assistance (NCEE) conducts unbiased large-scale evaluations of education programs and practices supported by federal funds; provides research-based technical assistance to educators and policymakers; and supports the synthesis and the widespread dissemination of the results of research and evaluation throughout the United States. JUNE 2016 This project has been funded at least in part with federal funds from the U.S. Department of Education under contract number ED‐IES‐12‐C‐0003. The content of this publication does not necessarily reflect the views or policies of the U.S. Department of Education nor does mention of trade names, commercial products, or organizations imply endorsement by the U.S. Government. REL Northwest, operated by Education Northwest, partners with practitioners and policymakers to strengthen data and research use. As one of 10 federally funded regional educational laboratories, we conduct research studies, provide training and technical assistance, and disseminate information. Our work focuses on regional challenges such as turning around low-performing schools, improving college and career readiness, and promoting equitable and excellent outcomes for all students.
    [Show full text]
  • A National Strategy to Combat Identity Theft Describes the Needs Associated with Each Component, Recommends Action, and Describes Common Practices
    U.S. Department of Justice 10000100020300409020Office of Community Oriented Policing Services 01090090109000100020 A NATIONAL STRATEGY TO 30000111101001010100COMBAT IDENTIT Y THEFT 10101010101000101010 10100010101010100101 01001010100100101010 01001001010100100100 101010111101 01001101 01001010100101110000 01000101101010001010 COPS COMMUNITY ORIENTED POLICING SERVICES 10100010101001010101U.S. DEPARTMENT OF JUSTICE This project was supported by cooperative agreement #2003CKWX0343 by the Office of Community Oriented Policing Services, U.S. Department of Justice. The opinions contained herein are those of the author(s) and do not necessarily represent the official position of the U.S. Department of Justice. References to specific companies, products, or services should not be considered an endorsement of the product by the author(s) or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. www.cops.usdoj.gov ISBN: 1-932582-64-9 May 2006 10000100020300409020 01090090109000100020 30000111101001010100 A NATIONAL STRATEGY TO 101010101010001010COMBAT IDENTIT Y THEFT 10 10100010101010100101 01001010100100101010 01001001010100100100 101010111101 01001101 01001010100101110000 01000101101010001010 10100010101001010101 10000100020300409020Foreword 01090090109000100020 The crime of identity theft is relatively new to American law enforcement and is rapidly increasing in frequency. In 2003, Chief Darrel Stephens, Charlotte-Mecklenburg (North Carolina) Police Department, surveyed members of the
    [Show full text]
  • Identity Theft and Your Social Security Number
    Identity Theft and Your Social Security Number SSA.gov Identity theft is one of the fastest growing crimes in America. A dishonest person who has your Social Security number can use it to get other personal information about you. Identity thieves can use your number and your good credit to apply for more credit in your name. Then, when they use the credit cards and don’t pay the bills, it damages your credit. You may not find out that someone is using your number until you’re turned down for credit, or you begin to get calls from unknown creditors demanding payment for items you never bought. Someone illegally using your Social Security number and assuming your identity can cause a lot of problems. Your number is confidential The Social Security Administration protects your Social Security number and keeps your records confidential. We don’t give your number to anyone, except when authorized by law. You should be careful about sharing your number, even when you’re asked for it. You should ask why your number is needed, how it’ll be used, and what will happen if you refuse. The answers to these questions can help you decide if you want to give out your Social Security number. 1 How might someone steal your number? Identity thieves get your personal information by: • Stealing wallets, purses, and your mail (bank and credit card statements, pre-approved credit offers, new checks, and tax information). • Stealing personal information you provide to an unsecured site online, from business or personnel records at work, and personal information in your home.
    [Show full text]
  • The President's Identity Theft Task Force
    The President’s Identity Theft Task Force Combating IDENTITY THEFT A Strategic Plan April 2007 COMBATING IDENTITY THEFT A Strategic Plan Table of Contents Glossary of Acronyms .................................................................v Identity Theft Task Force Members ............................................... vii Letter to the President .............................................................. viii I. Executive Summary .............................................................. 1 A. Introduction .................................................................................. 1 B. The Strategy .................................................................................. 2 II. The Contours of the Identity Theft Problem ............................. 10 A. Prevalence and Costs of Identity Theft ......................................... 11 B. Identity Thieves: Who They Are .................................................. 12 C. How Identity Theft Happens: The Tools of the Trade ................... 13 D. What Identity Thieves Do With the Information They Steal: The Different Forms of Identity Theft ........................ 18 III. A Strategy to Combat Identity Theft ....................................... 22 A. Prevention: Keeping Consumer Data out of the Hands of Criminals ..................................................................... 22 1. Decreasing the Unnecessary Use of Social Security Numbers ........................................................ 23 2. Data Security in the Public Sector .........................................
    [Show full text]
  • IDENTITY MONITORING Gain Greater Peace of Mind Identity Theft Monitoring Products Are Subject to Exclusions and Limitations
    Enrolling is easy EVERY TWO SECONDS, 1 Visit Thrivent.com/idprotection. SOMEONE’S IDENTITY IS 2 Choose from two programs: STOLEN IN THE U.S.1 • ProtectMyID Select. • ProtectMyID (more comprehensive). If you’re among the millions of American adults who have had their identities 3 You will be directed to Experian’s website stolen, you know what a headache— to complete the order process. and financial loss—it can be. Consider: 4 When the process is complete, you’ll receive a link to the Protection Center. • There were 16.7 million cases of You can view your Experian credit report identity fraud in 2017 resulting in and set up various features. $16.8 billion stolen.2 • 2017 marked the first year Social Security numbers eclipsed credit card numbers as the most breached piece of personal information.2 IDENTITY MONITORING Gain greater peace of mind Identity theft monitoring products are subject to exclusions and limitations. You must be age 18 or older to participate. Thrivent Yours as a member benefit could change or discontinue the Identity Protection benefit, or any part of it, at any time. Thrivent receives payment from ConsumerInfo.com Inc., an Experian® company, based on the purchases of ProtectMyID® by Thrivent members. Thrivent uses the compensation from ConsumerInfo.com Inc. for member purchases of ProtectMyID to help cover the costs associated with providing discounted identity monitoring products to members. 1Source: “2014 Identity Fraud Study,” Javelin Strategy & Research, February 2014. 2 2018 Identity Fraud Study, Javelin Strategy & Research, February 2018. 27143 R3-19 Choose from these two identity monitoring plans: Protect your identity today! ProtectMyID Select ProtectMyID Now there’s a way to detect identity theft early.
    [Show full text]
  • The Changing Face of Identity Theft
    The Changing Face of Identity Theft Identity theft is rampant resulting in millions of dollars of damage each year in the United States. Over the last few years, the face of identity theft has changed. Unfortunately, consumers do not realize this change primarily due to the advertising of credit bureaus, some ID theft service companies and lack of news. ID thieves are the one group that understands the changing faces of identity theft. Yet, what can a person do to prevent ID theft when it is misunderstood and changing? To understand the problem, you must first realize why thieves want your identity. The answer is simple; they want your credit (money), they want to hide their identity, they want certain services, or they desire employment. Several years ago, the prevalent type of identity theft was “true name” identity theft. This is when a real person’s identifying information is used without modification. The thief actually poses as the victim. According to a study by ID Analytics, this accounts for a small portion of all identity fraud; 10 – 15 percent. In these cases, continuous credit monitoring, fraud alerts and credit freezes play a role in keeping the consumer aware of their credit file status. However as with any theft, once the thief realizes you have caught onto them, they change, modify their actions and come after you wearing a different face. A face harder to detect which credit monitoring, fraud alerts and credit freezes do not readily provide you with protection. These include non-credit theft such as, medical identity theft, criminal identity theft and the fastest growing and hardest to detect synthetic identity theft.
    [Show full text]
  • ID Theft Affidavit
    Table of Contents Introduction ................................................................................. 1 How Identity Theft Occurs ............................................................3 Minimize Your Risk ......................................................................5 What You Can Do Today ......................................................... 5 Maintaining Vigilance ..............................................................5 The Doors and Windows Are Locked, but . ............................ 7 Choosing to Share Personal Information – or Not ..........................9 Credit Bureaus.........................................................................9 Department of Motor Vehicles ................................................ 10 Direct Marketers .................................................................... 10 If You’re a Victim ....................................................................... 11 Your First Four Steps .............................................................. 11 Credit Accounts ..................................................................... 12 ATM Cards ............................................................................ 12 Checks .................................................................................. 12 Chart Your Course of Action....................................................... 14 Resolving Credit Problems .......................................................... 15 Credit Reports ......................................................................
    [Show full text]
  • Protecting Yourself from Identity Theft and Identity Fraud
    Protecting yourself from identity theft and identity fraud © 2020 Wells Fargo Bank, N.A. All rights reserved. For public use. What we’ll talk about today • How your identity can be compromised. • Ways to protect your information. • What you can do if you experience identity theft or fraud. 2 Identity theft and fraud defined Identity theft Identity fraud When someone steals your identity or personal When that person uses your stolen identity to information for illicit purposes. commit fraud or illegally deceive someone. 3 Signs of identity theft or fraud 4 Personal information to protect • Social Security number • Driver’s license • Passport number • ATM/credit/debit cards • Date of birth • Address • Phone numbers • Account numbers • Passwords/PINs Source: The Costs and Risks of Account Takeover, Security Boulevard, June 20, 2019, https://securityboulevard.com/2019/06/the-costs-and-risks-of-account-takeover/ 5 Ways in which your information may be stolen • Email (phishing and pharming) • Text (smishing) • Mail theft • Credit card fraud • Social networks • Malware • Data breaches • Formjacking • Phone scams • Dumpster diving Source: Child Identity Theft on the Rise, October 30, 2018, https://www.creditcards.com/credit-card-news/child-identity-theft-on-the-rise.php 6 What’s wrong with this email? 7 What’s wrong with this email? 1 1. Strange/ unfamiliar links 2. Misspelled company name 3. Awkward greeting 4. Typos 2 3 5. Poor/awkward grammar 4 6. Urgent call to action 5 6 4 4 8 Ways that may help keep your mail safe • Have your name and address removed from the phone book (“unlisted”).
    [Show full text]
  • Oecd Policy Guidance on Online Identity Theft
    2 –OECD POLICY GUIDANCE ON ONLINE IDENTITY THEFT OECD Policy Guidance on Online Identity Theft I. Introduction Identity theft (“ID theft”) is a longstanding problem which, as the Internet and E- commerce have developed, has expanded to include online forms. While the scope of online ID theft appears to be limited in most countries, its implications are significant as the growing risk of such theft can undermine consumer confidence in using the Internet for E-commerce. Governments have acted to fight against such fraud (both online and offline) at the domestic and international levels. The 1999 OECD Guidelines for Consumer Protection in the Context of Electronic Commerce (“the 1999 Guidelines”) and the 2003 OECD Guidelines for Protecting Consumers from Fraudulent and Deceptive Commercial Practices Across Borders (“the 2003 Guidelines”), for example, set out principles aimed at strengthening member countries’ frameworks to fight offline and online fraud. Outside the OECD, international instruments such as the Council of Europe’s Cybercrime Convention and the United Nations’ Convention against Transnational Organised Crime have been developed to address the issue (see Appendix H.1). The principles in the 1999 and 2003 Guidelines serve as a solid basis for establishing a framework to fight online ID theft and other fraud. The purpose of this paper is to describe how the principles presented in these instruments could be elaborated to strengthen and develop effective member country strategies to combat online ID theft. It explores, in particular, how education and awareness of stakeholders could be enhanced to prevent such theft. The guidance draws largely on the research and analysis contained in a Scoping Paper on Online Identity Theft that was considered by the Committee on Consumer Policy in 2007 (OECD, 2008).
    [Show full text]
  • Search the List of Unclaimed Child Support
    UNCLAIMED CHILD SUPPORT AS OF 02/08/2021 TO RECEIVE A PAPER CLAIM FORM, PLEASE CALL WI SCTF @ 1-800-991-5530. LAST NAME FIRST NAME MI ADDRESS CITY ABADIA CARMEN Y HOUSE A4 CEIBA ABARCA PAULA 7122 W OKANOGAN PLACE BLDG A KENNEWICK ABBOTT DONALD W 11600 ADENMOOR AVE DOWNEY ABERNATHY JACQUELINE 7722 W CONGRESS MILWAUKEE ABRAHAM PATRICIA 875 MILWAUKEE RD BELOIT ABREGO GERARDO A 1741 S 32ND ST MILWAUKEE ABUTIN MARY ANN P 1124 GRAND AVE WAUKEGAN ACATITLA JESUS 925 S 14TH ST SHEBOYGAN ACEVEDO ANIBAL 1409 POSEY AVE BESSEMER ACEVEDO MARIA G 1702 W FOREST HOME AVE MILWAUKEE ACEVEDO-VELAZQUEZ HUGO 119 S FRONT ST DORCHESTER ACKERMAN DIANE G 1939 N PORT WASHINGTON RD GRAFTON ACKERSON SHIRLEY K ADDRESS UNKNOWN MILWAUKEE ACOSTA CELIA C 5812 W MITCHELL ST MILWAUKEE ACOSTA CHRISTIAN 1842 ELDORADO DR APT 2 GREEN BAY ACOSTA JOE E 2820 W WELLS ST MILWAUKEE ACUNA ADRIAN R 2804 DUBARRY DR GAUTIER ADAMS ALIDA 4504 W 27TH AVE PINE BLUFF ADAMS EDIE 1915A N 21ST ST MILWAUKEE ADAMS EDWARD J 817 MELVIN AVE RACINE ADAMS GREGORY 7145 BENNETT AVE S CHICAGO ADAMS JAMES 3306 W WELLS ST MILWAUKEE ADAMS LINDA F 1945 LOCKPORT ST NIAGARA FALLS ADAMS MARNEAN 3641 N 3RD ST MILWAUKEE ADAMS NATHAN 323 LAWN ST HARTLAND ADAMS RUDOLPH PO BOX 200 FOX LAKE ADAMS TRACEY 104 WILDWOOD TER KOSCIUSKO ADAMS TRACEY 137 CONNER RD KOSCIUSKO ADAMS VIOLA K 2465 N 8TH ST LOWER MILWAUKEE ADCOCK MICHAEL D 1340 22ND AVE S #12 WIS RAPIDS ADKISSON PATRICIA L 1325 W WILSON AVE APT 1206 CHICAGO AGEE PHYLLIS N 2841 W HIGHLAND BLVD MILWAUKEE AGRON ANGEL M 3141 S 48TH ST MILWAUKEE AGUILAR GALINDO MAURICIO 110 A INDUSTRIAL DR BEAVER DAM AGUILAR SOLORZANO DARWIN A 113 MAIN ST CASCO AGUSTIN-LOPEZ LORENZO 1109A S 26TH ST MANITOWOC AKBAR THELMA M ADDRESS UNKNOWN JEFFERSON CITY ALANIS-LUNA MARIA M 2515 S 6TH STREET MILWAUKEE ALBAO LORALEI 11040 W WILDWOOD LN WEST ALLIS ALBERT (PAULIN) SHARON 5645 REGENCY HILLS DRIVE MOUNT PLEASANT ALBINO NORMA I 1710 S CHURCH ST #2 ALLENTOWN Page 1 of 138 UNCLAIMED CHILD SUPPORT AS OF 02/08/2021 TO RECEIVE A PAPER CLAIM FORM, PLEASE CALL WI SCTF @ 1-800-991-5530.
    [Show full text]