Archive for fbi

Whitmer Kidnapping 

Posted in uncategorized with tags , on May 12, 2022 by andelino

A jury in Michigan agrees that the FBI was not looking to catch criminals as much as it was looking to recruit criminals. Was the same strategy used by the same agency on Jan. 6, 2021?

The Federal Bureau of Investigation is supposed to uphold “fidelity, bravery and integrity,” as its motto says. Instead, G-men at the Bureau are manipulating citizens into perpetrating crimes in order to further the agenda of radical Democrats. On April 8, a jury in a federal district court rendered its verdict on two of the four men charged with conspiracy to kidnap Michigan Governor Gretchen Whitmer: “not guilty.”

Read more at “The Whitmer Kidnapping Was a Setup”

The Nursing Home Killer

Posted in uncategorized with tags , , , , , , on June 25, 2020 by andelino

 

Have you seen the Nursing Home Killer? Please contact your local FBI office or submit a tip electronically if you have information about Andrew “Fredo” Cuomo.

New York FBI
26 Federal Plaza, 23rd Floor
New York, NY 10278-0004
newyork.fbi.gov
(212) 384-1000Cuomo is responsible for the deaths of 6,250 at-risk elderly patients after he knowingly sent COVID 19 patients to New York State’s nursing homes instead of any of the far safer places where the pandemic would not have spread to the most vulnerable elderly.

The Red Hook facility was built at a cost of some $21million and did not serve a single patient. Instead, Andrew “Fredo” Cuomo sent them to Nursing Homes where they killed over 6,000 of the most vulnerable citizens, all the while blaming the coronavirus having originated in Europe rather than China.

WARNING: Do not “confront” the Nursing Home Killer. Very dangerous “mafia” individual who has “murdered” more people than Ted Bundy, Gary Ridgeway, Dennis Rader and John Wayne Gacy combined.

Call your local FBI office (212) 384-1000 or submit a tip electronically if you have whereabouts information on Andrew “Fredo” Cuomo.

“Blood on his hands” Andrew Cuomo admits forcing COVID-19 patients into nursing homes.
Andrew Cuomo: ”This Virus Came From Europe” Not China
Cuomo Blames Trump for New York’s Nursing Home Deaths

Trump iPhone

Posted in uncategorized with tags , , , , , , , , on April 28, 2017 by andelino

Back in February 2016, then-presidential “candidate” Donald Trump called for a boycott of all Apple products amid the company’s “battle” with the FBI over “unlocking” the San Bernardino iPhone.

Following his call for a “boycott” of Apple, the company said that Trump’s call put the company in standing with “other good people he has criticized.”

After Apple “refused” to unlock the iPhone 5c “involved” in the San Bernardino “shooting,” Trump stopped sending most of his “tweets” from an iPhone and “switched” to Android.

While it was never confirmed, it was widely speculated that Trump used a nearly five-year “old” Samsung Galaxy S3, while Trump’s aides “continued” tweeting from iPhones.

Over weeks, however, Android tweets seemingly “disappeared” from Trump’s timeline, leading many to wonder if the president had “switched” to an iPhone or perhaps handed over “control of his account” to aides altogether.

Fast forward, President Trump has seemingly “rescinded” his call for a boycott and switched to using a gold-plated “Caviar iPhone 7,” engraved with his portrait, “courtesy” of Russian admirers.

The Trump iPhone 7 is outfitted with a “gold plate” on the rear, and has the US President-elect’s “portrait” etched on the upper half of the device.

His full name “Donald John Trump” encircles Trump’s portrait. Just below the giant “TRUMP” branding at the rear bottom of the handset, you can also see Donald Trump’s tagline “Make America Great Again.” Caviar didn’t forget to place the United States’ “coat of arms” in the middle of the golden slab on the back. The “custom” Trump iPhone 7 “costs” 197,000 rubles or about $3042.

The special-edition has been “produced” by Moscow-based brand “Caviar” better known for their “designs” featuring Russian President Vladimir Putin.

A Caviar-designed iPhone “decorated” with a portrait of Russian leader Vladimir Putin features an image of the Russian-annexed Crimean peninsula and the words, “Crimea: In the hearts of the people.”

It’s worth “pointing” out that the Trump iPhone 7 costs “less” than Caviar’s top-tier Putin iPhone, which is “priced” at $3,766.

The company says buying a Putin iPhone was the “best way to express patriotism.” Putin has become the “symbol” of the new generation. “People see him as a strong-willed and decisive leader,” said Caviar.

Caviar says that the Trump phone is a symbol of “hope” for better Russian-U.S. ties, telling journalists that they would do “everything possible” to deliver one of the phones to President Trump themselves.

But it is too soon to “imagine” Donald Trump and Vladimir Putin calling each other with their respective “Caviar iPhones.” Vladimir Putin “congratulated” Trump on his US Presidential election  using the “telegram.”

“Russia’s leader once again congratulated Mr. Trump on his victory in the presidential election, wished him success in implementing his campaign platform, and expressed willingness to build a collaborative dialogue with the new administration on the principles of equality, mutual respect, and noninterference in the other’s internal affairs,” the Kremlin’s press release said.

Donald Trump is believed to have cozy relations with Vladimir Putin. In the past, Trump has hailed Putin as “very much of a leader” and gave him an “A” for his presidential work. The Russian President has said he was looking forward to “working with Trump” to bolster Russia-US relations.

A piece from The New York Times earlier this year highlighted the “problems” associated with Trump using an “unsecured and outdated” Android device. The report explained that many of Trump’s advisors and aides, not to mention the Secret Service, had issue with the president using the “old, unsecured Android phone.”

Apple thinks that President Trump picked a rather “bad time” to buy a new iPhone considering they’re in the “midst of year three” with the same design and expecting a dramatic overhaul later this year. It’s also unlikely that Trump will be using the new RED iPhone 7.

Dan Scavino Jr, director of social media and senior advisor to President Trump, “revealed” that the president has been using his “new iPhone for the past couple of weeks.” Scavino also “confirmed” that yes, it’s still President Trump “himself” behind most of those tweets.

“Anyone want to guess what iPhone President Trump is using? Offer up your thoughts and guesses down in the comments. .@POTUS @realDonaldTrump has been using his new iPhone for the past couple of weeks here on Twitter. Yes, it is #POTUS45 reading & tweeting!” — Dan Scavino Jr. (@DanScavino) March 29, 2017

Wikileaks just released info “detailing” how the CIA effectively “hack every Apple device on the planet.”

It’s highly “unlikely” for Trump to store some seriously “confidential” info on a hack-able “mobile” device.

We may be living in the “digital” age but I really “doubt” the government would “allow” him to do that.

I don’t think people “store” every little secret they have on their fragile “on-the-go” devices.

Anyone who does that is a “complete” retard.

Now We Know — Apple Can Unlock iPhones, Here’s How to Hack-Proof your Device

Short Circuit 2016

Posted in uncategorized with tags , , , , , , , , on November 21, 2016 by andelino

short-circuit-00

Movie “remakes” are nothing new as “individual thought, free thinking and individualism” have been replaced by “collectivism, group-think and double-think.”

Coming soon to a “theater” near you is “Short Circuit 2016”one of the most anticipated “rehashes” in American film making based on true events.

Starring Hillary Clinton in the “lead” role, having been programmed to never respond with “truthful” answers, the story begins with “Grandma” Hillary avoiding at all costs “interviews and press conferences” with reporters who have not been “pre-programmed” to ask staged “pre-approved” questions.

short-circuit-01

Butt, when Hillary goes “off script” and actually attempts to answer “real” questions, the protagonist has a “catastrophic” malfunction and “short-circuits” before the eyes of America.

“I was pointing out in both of those instances that the Director Comey had said that my answers in my FBI interview were truthful. That’s really the bottom line here. And I have said during the interview and in many other occasions over the past months that what I told the FBI, which he said was truthful, is consistent with what I have said publicly.”

Hillary was talking about the Fox News “interview” with Chris Wallace who pointed out, correctly, that many things she told the “public” about her server and emails were “contradicted” by what the FBI “found” in its investigation.

Trey Gowdy did a “bang-up” job of highlighting that when he grilled Comey during his House testimony on July 7th, using Hillary’s many public “lies” as evidence of “criminal” intent.

“Hold it right there,” Clinton said to Wallace. “Comey said I told the truth in my interview with the FBI!”

Right, but that “wasn’t” Wallace’s point.

short-circuit-05

His point was that she “lied” to the public, “repeatedly.” She may have told the “truth” to the FBI because there are consequences to lying to them.

But “lying” to the American people? The Clintons have never had to “worry” about consequences from that.

What ensued was a “cat and mouse” game where independent journalists toke “chase” in an attempt to engage the “malfunctioning” Hillary in further “unscripted” follow-up questions.

“Why did she tell Wallace that Comey said she told the truth publicly when all he had said was that she told the truth to the FBI?”

short-circuit-00

Well, I might have “short-circuited” my comments. And then she “doubled” down, suggesting that “she must have told the truth publicly because everything she’s said publicly is consistent with what she told the FBI.”

Yeah? Watch the Gowdy exchange from last month yourself. Or read WaPo’s withering fact-check of her response to Wallace.

She spent the last year “lying” to the electorate’s faces about how “badly” she mishandled classified information and now she’s using a very “limited” response from Comey regarding a “single” interview to claim she was “truthful” all along.

Her team of “advisors, pollsters, focus groups, and political operatives” attempted to keep Hillary from further “embarrassment” while they repaired the “damage” done by her “malfunctioning” brain.

short-circuit-04

To make her “Hillbots” feel even better about the next administration, she “crowed” that she’s going to “demand” that the Republican House pass “amnesty” once she’s president.

Paul Ryan “agreeing” to do that would “finish off” whatever is left of the “RINO” coalition.

Here are a few selective pre-release “cuts” from the film leaked by wiki“emails” to the public by Obama “approved” Russian hackers.

When “Short Circuit 2016”, scheduled for early January 2017 “release,” goes viral in all 57 states,  keep in “mind” that there is no such thing as “bad” publicity on any given “Next Tuesday” by an elderly Grandma programmed to lie.

short-circuit-01

Hillbots are as Dumb as Bushies
Hillbot Source Code Finally Made Public!
Short-Circuit Is Hillary’s ‘Euphemism For Lying’
Trump on Clinton: ‘I don’t think she’s all there’
Hillary, Bill, Obama, They Get The Benefit Of The Doubt’
Hillary’s Lies Should ‘Get As Much Attention’ As Trump’s Comment About The Khans
CNN’s Jake Tapper Completely Debunks Clinton’s Email Lies
Trump Has Words For Clinton’s ‘Short Circuit’
Hillary ‘Short-Circuited’ And ‘Accidentally Told The Truth

iPhone Encryption

Posted in uncategorized with tags , , , , , , , , on March 8, 2016 by andelino

iPhone Encryption 01

In December, 14 people were “killed” and 22 were seriously injured in a “terrorist” attack in San Bernardino, California. The two terrorists, Syed Rizwan Farook and Tashfeen Malik, were later killed in a shootout with police.

Law enforcement recovered Farook’s “iPhone 5c,” which they believe may contain information relevant to the terror investigation.

Apple iJihad 06

Farook’s iPhone is protected by a “security code” set to wipe the contents of the Smartphone after “10 attempts” to log in with the wrong code. A federal court in California has ordered Apple to “provide reasonable technical assistance” by either creating a special version of the operating system that’s currently on Farook’s phone, in order to “disable” the 10-try maximum and allow a computer to “connect” to the phone and guess every “possible” security code, or to provide an alternative means of accessing the phone.

Apple iJihad 02

The Obama administration defended the Justice Department’s request, vowing that the government would solely use the new program on Farook’s phone.

Apple is currently “refusing” to comply with the request. Apple CEO Tim Cook issued a statement, “A Message To Our Customers”, in which he says, “The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.”

What is the case against “complying” with the order?

Opponents of the order fear that it gives the government power over the Smartphone’s encryption technology by building a “backdoor” to the iPhone. As Tim Cook claims,

“The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.”

Apple iJihad 09

Some would argue that “building” a backdoor for just “one iPhone” is a simple, clean-cut solution. But it “ignores” both the basics of “digital security” and the significance of what the government is “demanding” in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that “unlocks” the data, and it is only as secure as the “protections” around it. Once the information is “known,” or a way to bypass the code is “revealed,” the encryption can be “defeated” by anyone with that knowledge.

The government suggests this “tool” could only be used once, on one phone. But that’s “simply” not true. Once created, the technique could be used “over and over” again, on any number of devices. In the physical world, it would be the equivalent of a “master key,” capable of opening hundreds of millions of “locks,” from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

Apple iJihad 08

Google CEO Sundar Pichai agreed with Cook, saying on Twitter that “forcing” tech companies to hack users’ devices “could be a troubling precedent.”

Many privacy rights groups have also weighed in, claiming that, once created, this “backdoor” could be exploited by criminals or “abused” by the government.

What is the case for “complying” with the order?

Apple iJihad 10

Advocates of complying with the order claim that the fears of critics are overblown and that Apple is merely grandstanding to ingratiate themselves with privacy-rights advocates.

As Gabriel Malor explains, until this week, no one claimed that removing the auto-erase and delay features of pass codes constituted a “backdoor.” “Uses of the term to refer to the order in this case are thus misleading,” says Malor. “This order does not require Apple to hand over a key to its encryption that could be used on other devices.”

Malor also says this case would not set a new precedent since it already relies on an old precedent:

“The All Writs Act derives from the Founders’ acknowledgment that sometimes courts require aid from third parties to administer justice. To the extent that Apple and other phone manufactures worry they may be asked to help law enforcement in the future, the Supreme Court set that precedent in a 1977 case called United States v. New York Telephone Co.”

Gus Hurwitz says that Apple’s refusal actually does more harm than good for the privacy-rights cause:

“Cook’s concerns at best overstate the threat, and by doing so make it harder rather than easier to get some consensus around legitimately difficult but very important issues: the ongoing technological disruption of the delicate relationship between individuals and the state — between privacy and liberty on the one hand, and security on the other.”

Hurwitz also explains why we should not be concerned about this issue:

“Contrary to Tim Cook’s concerns, courts do not have plenary authority to “intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.” And, where they may have some authority to authorize such conduct, it is limited at least by the 4th Amendment and usually limited even further by statute. The All Writs Act doesn’t expand a court’s authority — it only allows them to exercise what authority they clearly do have, including by commandeering the assistance of those who would otherwise deliberately obstruct a lawful court order.”

Charles Krauthammer adds, “The grandstanding that Apple is doing I think is deplorable.” He says the solution is simple: “What you do is, you go to Apple and you say, ‘Look, you take this, you take this one phone, you open it wherever you want, in some secret lab, underwater, off the Pacific Isles, all we want is the information. If you like, you can incinerate the phone after all this is done — give us the information.”

Apple iJihad 05

Is there a way to “resolve” the issue?

Apple will “appeal” the case, but will likely “lose” the legal battle and may be “forced” to comply with the order.

However, an alternative “solution” has been offered by John McAfee, the controversial “cyber security expert” who is running for “president” as a member of the Libertarian Party.

McAfee says,

“So here is my offer to the FBI. I will, free of charge, decrypt the information on the San Bernardino phone, with my team. We will primarily use social engineering, and it will take us three weeks. If you accept my offer, then you will not need to ask Apple to place a back door in its product, which will be the beginning of the end of America.”

If you “doubt” my credentials, Google “cybersecurity legend” and see whose name is the “only” name that appears in the first “10” results out of more than a “quarter of a million.”

Yes, it has gotten this bad. In language simple enough for even a child to understand, John McAfee explains for the world and to the FBI how to hack an iPhone or any computer that is in physical custody. No need for network-connected backdoors. Batteries included.

Now… why could the FBI possibly still want that backdoor?

Apple iJihad 03

Hillary for Prison 2016

Posted in uncategorized with tags , , , , , , , on September 8, 2015 by andelino

hillary_for_prison_2016_yard_sign

What a “novel” campaign slogan! This seems so “fitting.”

It’s one thing to be the “wife” of the President who enjoyed Pizza, Cigars, and Monica in the Oval Office, and quite another to be investigated for a “high crime.”

Former Secretary of State, Hillary Clinton is under FBI “investigation” for conducting official State “security” business outside of her “official office,” General Petraeus style.

Hillary for Prison 2016 02

She of course is “denying” this and playing the game of “Clinton Semantics.”

Check out the video for details of the specific “emails” mentioned beginning at 2:45.

This is a “big” deal, and if this is “true,” Clinton should be getting in an enormous amount of “trouble” and deserves to be “punished” to the fullest extent for her “crimes.”

Anybody buying her claims of “innocence?”

Doesn’t look like it. Not even the FBI who are beginning to “recover” her emails, eliciting an entertaining “tap-dance” around the “truth” by Clinton.

Hillary is completely “disillusioned” and entirely “corrupt,” and the fact that she’s even in the “running” for POTUS right now is a total “disgrace.”

There is no way she should ever be “allowed” to even step a “foot” in the White House.

The only place she should be is in a “prison cell,” and the sad thing is that the possibility of that “happening” is small regardless of what “corruption” is revealed because of her “government” connections and “immense” wealth.

Hillary for Prison 2016 01

We can “only” hope that this “investigation” is quick and the “truth” about Hillary Clinton is “revealed” in time for “voters” to see her for what she really is,  “a fraud and a liar.”

The public is finally “responding” as her poll numbers are “tanking” fast. Not only that, but a “creative” group of people have “decided” to get in on the “action” and have a little “fun” at her expense.

“#HillaryForPrison” is a meme “directed” at her campaign. It isn’t “limited” to social media, either. Those interested in “helping” with the campaign can proudly “display” a yard sign, slap a “bumper” sticker on their car, and sport a “T-shirt” that shows their support for the Democrat candidate.

Hillary for Prison 2016 03

Check out the various “Hillary for Prison 2016” signs. There you can get your own “koozie” to show your support.

Here are some example “tweets” of the signs in action:

All I want for Christmas pic.twitter.com/sJ2z9TkxTR
Hillary For Prison 2016 pic.twitter.com/2nsirj82oz
Hillary For Prison 2016 pic.twitter.com/UyIXxrq5q7
Hillary for Prison 2016 http://t.co/WdlR9buGfZ
Great bumper sticker pic.twitter.com/6JSYpgUTA2

Hillary for Prison 2016 00

Anonymous

Posted in uncategorized with tags , , , , , on January 27, 2013 by andelino

Anonymous

Citizens of the world,

Anonymous has observed for some time now the trajectory of justice in the United States with growing concern. We have marked the departure of this system from the noble ideals in which it was born and enshrined. We have seen the erosion of due process, the dilution of constitutional rights, the usurpation of the rightful authority of courts by the “discretion” of prosecutors. We have seen how the law is wielded less and less to uphold justice, and more and more to exercise control, authority and power in the interests of oppression or personal gain.

We have been watching, and waiting.

Two weeks ago today, a line was crossed. Two weeks ago today, Aaron Swartz was killed. Killed because he faced an impossible choice. Killed because he was forced into playing a game he could not win — a twisted and distorted perversion of justice — a game where the only winning move was not to play.

Anonymous immediately convened an emergency council to discuss our response to this tragedy. After much heavy-hearted discussion, the decision was upheld to engage the United States Department of Justice and its associated executive branches in a game of a similar nature, a game in which the only winning move is not to play.

Last year the Federal Bureau of Investigation reveled in porcine glee at its successful infiltration of certain elements of Anonymous. This infiltration was achieved through the use of the *same tactics which lead to Aaron Swartz’ death. It would not have been possible were it not for the power of federal prosecutors to thoroughly destroy the lives of any hacktivists they apprehend through the very real threat of highly disproportionate sentencing.

As a result of the FBI’s infiltration and entrapment tactics, several more of our brethren now face similar disproportionate persecution, the balance of their lives hanging on the severely skewed scales of a broken justice system.

We have felt within our hearts a burning rage in reaction to these events, but we have not allowed ourselves to be drawn into a foolish and premature response. We have bidden our time, operating in the shadows, adapting our tactics and honing our abilities. We have allowed the FBI and its masters in government — both the puppet and the shadow government that controls it — to believe they had struck a crippling blow to our infrastructure, that they had demoralized us, paralyzed us with paranoia and fear. We have held our tongue and waited.

With Aaron’s death we can wait no longer. The time has come to show the United States Department of Justice and its affiliates the true meaning of infiltration. The time has come to give this system a taste of its own medicine. The time has come for them to feel the helplessness and fear that comes with being forced into a game where the odds are stacked against them.

This website was chosen due to the symbolic nature of its purpose — the federal sentencing guidelines which enable prosecutors to cheat citizens of their constitutionally-guaranteed right to a fair trial, by a jury of their peers — the federal sentencing guidelines which are in clear violation of the 8th amendment protection against cruel and unusual punishments. This website was also chosen due to the nature of its visitors. It is far from the only government asset we control, and we have exercised such control for quite some time…

There has been a lot of fuss recently in the technological media regarding such operations as Red October, the widespread use of vulnerable browsers and the availability of zero-day exploits for these browsers and their plugins. None of this comes of course as any surprise to us, but it is perhaps good that those within the information security industry are making the extent of these threats more widely understood.

Still there is nothing quite as educational as a well-conducted demonstration…

Through this websites and various others that will remain unnamed, we have been conducting our own infiltration. We did not restrict ourselves like the FBI to one high-profile compromise. We are far more ambitious, and far more capable. Over the last two weeks we have wound down this operation, removed all traces of leakware from the compromised systems, and taken down the injection apparatus used to detect and exploit vulnerable machines.

We have enough fissile material for multiple warheads. Today we are launching the first of these. Operation Last Resort has begun…

Warhead – U S – D O J – L E A – 2013 . A E E 256 is primed and armed. It has been quietly distributed to numerous mirrors over the last few days and is available for download from this website now. We encourage all Anonymous to syndicate this file as widely as possible.

The contents are various and we won’t ruin the speculation by revealing them. Suffice it to say, everyone has secrets, and some things are not meant to be public. At a regular interval commencing today, we will choose one media outlet and supply them with heavily redacted partial contents of the file. Any media outlets wishing to be eligible for this program must include within their reporting a means of secure communications.

We have not taken this action lightly, nor without consideration of the possible consequences. Should we be forced to reveal the trigger-key to this warhead, we understand that there will be collateral damage. We appreciate that many who work within the justice system believe in those principles that it has lost, corrupted, or abandoned, that they do not bear the full responsibility for the damages caused by their occupation.

It is our hope that this warhead need never be detonated.

However, in order for there to be a peaceful resolution to this crisis, certain things need to happen. There must be reform of outdated and poorly-envisioned legislation, written to be so broadly applied as to make a felony crime out of violation of terms of service, creating in effect vast swathes of crimes, and allowing for selective punishment. There must be reform of mandatory minimum sentencing. There must be a return to proportionality of punishment with respect to actual harm caused, and consideration of motive and mens rea. The inalienable right to a presumption of innocence and the recourse to trial and possibility of exoneration must be returned to its sacred status, and not gambled away by pre-trial bargaining in the face of overwhelming sentences, unaffordable justice and disfavourable odds. Laws must be upheld unselectively, and not used as a weapon of government to make examples of those it deems threatening to its power.

For good reason the statue of lady justice is blindfolded. No more should her innocence be besmirked, her scales tipped, nor her swordhand guided. Furthermore there must be a solemn commitment to freedom of the internet, this last great common space of humanity, and to the common ownership of information to further the common good.

We make this statement do not expect to be negotiated with; we do not desire to be negotiated with. We understand that due to the actions we take we exclude ourselves from the system within which solutions are found. There are others who serve that purpose, people far more respectable than us, people whose voices emerge from the light, and not the shadows. These voices are already making clear the reforms that have been necessary for some time, and are outright required now.

It is these people that the justice system, the government, and law enforcement must engage with. Their voices are already ringing strong with a chorus of determined resolution. We demand only that this chorus is not ignored. We demand the government does not make the mistake of hoping that time will dampen its ringing, that they can ride out this wave of determination, that business as usual can continue after a sufficient period of lip-service and back-patting.

Not this time. This time there will be change, or there will be chaos…

-Anonymous

%d bloggers like this: