It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
On April 30, 2012, McAfee's property in Orange Walk Town, Belize, was raided by the Gang Suppression Unit of the Belize Police Department. At that time, McAfee was in bed with his girlfriend, who McAfee said was traumatized by the incident. A GSU press release stated that McAfee was arrested for unlicensed drug manufacturing and possession of an unlicensed weapon. He was released without charge. In 2012, Belize police spokesman Raphael Martinez confirmed that McAfee was neither convicted nor charged, only suspected.
On December 5, 2012, McAfee was arrested for illegally entering Guatemala. Shortly afterward, he was placed under arrest and a board to review McAfee's plea for asylum was formed. The committee denied his asylum, so he was taken from his holding facility to a detention center in order to await deportation to Belize.
On December 6, 2012, Reuters and ABC News reported that McAfee had two minor heart attacks in a Guatemalan detention center and was hospitalized. McAfee's lawyer stated that his client had not suffered heart attacks, but had instead suffered from high blood pressure and anxiety attacks.
Is Johnheretohelp irl John McAfee?
Promis itself is supposed to be this magical software program that allows operatives in the shadowy world of intelligence to track anyone and anything throughout the world - well, that's the claim at least. In reality, at the time it was written, Promis was a glorified computer-architecture-independent relational database program for tracking criminal case files, with the ability to juggle different data types and formats used by various law enforcement agencies
Who is Hendricus G. Loos?
The name Hendricus G. Loos does not belong to a person, its a fictitious name. Perhaps the person working behind this name is Professor Ross Adey , who qualified in Medicine from Australia, then came to Oxford University to study brain physiology . Then he joined University of California in 1954, later joined the Brain Research Institute in 1961. He mainly studied the effects of ELF & microwaves on human brain and nervous system. He developed several devices for remote mind control and manipulation of nervous system which were later patented in US. There could be a few other such professionals and scientists, who developed the Mind Control devices under a single fictitious name 'Dr Hendricus G. Loos', actually working for DARPA or CIA, so as not to attract the attention of the Media or investigators.
James Attkisson is a retired lawyer. He was also in law enforcement. He was the head of his SWAT team commander in Florida and he served in the Vietnam War as well.
Sharyl Attkisson is married to James Attkisson. Sharyl Attkisson is an Award-winning American writer and an investigative journalist. She hosted the show Full Measure with Sharyl Attkisson. She is known for her audacity of reporting on tough and controversial topics. She posts News Blogs independently on her own website.
In March of 2019, an appellate panel of three judges determined the former Attorney General Eric Holder has immunity from Attkisson's claims.
Two of the three judges ruled Attkisson?s claims should be dismissed because she took too long, three years "and without success" to determine the names of the "John Doe" federal agents involved in the intrusions of her computers.
A third judge rightly dissented, understanding that Attkisson consistently attempted to identify the John Does but the Department of Justice continuously blocked discovery, filed protective orders and filed motions to dismiss in an attempt to obstruct. The government did not turn over a single piece of paper in response to more than a dozen subpoenas.
The dissenting judge called the government's actions "Kafkaesque" for obstructing Attkisson and then blaming her for "taking too long."
Attkisson continues to move forward with the lawsuit. The Department of Justice continues to spend tax money to fight her.
At one point, the Russians used servers located in the U.S. to carry out the massive data exfiltration effort, the report confirms.
Much of the information was previously learned from the indictment of Viktor Borisovich Netyksho, the Russian officer in charge of Unit 26165. Netyksho is believed to be still at large in Russia.
But new details in the 488-page redacted report released by the Justice Department on Thursday offered new insight into how the GRU operatives hacked.
The operatives working for the Russian intelligence directorate, the GRU, sent dozens of targeted spearphishing emails in just five days to the work and personal accounts of Clinton Campaign employees and volunteers, as a way to break into the campaign’s computer systems.
The GRU hackers also gained access to the email account of John Podesta, Clinton’s campaign chairman, of which its contents were later published.
Using credentials they stole along the way, the hackers broke into the networks of the Democratic Congressional Campaign Committee days later. By stealing the login details of a system administrator who had “unrestricted access” to the network, the hackers broke into 29 computers in the ensuing weeks, and more than 30 computers on the DNC.
The operatives, known collectively as “Fancy Bear,” comprised several units tasked with specific operations. Mueller formally blamed Unit 26165, a division of the GRU specializing in targeting government and political organizations, for taking on the “primary responsibility for hacking the DCCC and DNC, as well as email accounts of individuals affiliated with the Clinton Campaign,” said the Mueller report.
The hackers used Mimikatz, a hacking tool used once an intruder is already in a target network, to collect credentials, and two other kinds of malware: X-Agent for taking screenshots and logging keystrokes, and X-Tunnel used to exfiltrate massive amounts of data from the network to servers controlled by the GRU. Mueller’s report found that Unit 26165 used several “middle servers” to act as a buffer between the hacked networks and the GRU’s main operations. Those servers, Mueller said, were hosted in Arizona — likely as a way to obfuscate where the attackers were located but also to avoid suspicion or detection.
In all, some 70 gigabytes of data were exfiltrated from Clinton’s campaign servers and some 300 gigabytes of data were obtained from the DNC’s network.
Meanwhile, another GRU hacking unit, Unit 74455, which helped disseminate and publish hacked and stolen documents, pushed the stolen data out through two fictitious personas. DCLeaks was a website that hosted the hacked material, while Guccifer 2.0 was a hacker-like figure who had a social presence and would engage with reporters.
Under pressure from the U.S. government, the two GRU-backed personas were shut down by the social media companies. Later, tens of thousands of hacked files were funneled to and distributed by WikiLeaks .
“I hope you’re able to find the 30,000 emails that are missing,” said then-candidate Trump at a press conference, referring to emails Clinton stored on a personal email server while she headed the State Department. Mueller’s report said “within approximately five hours” of those remarks, GRU officers began targeting for the first time Clinton’s personal office.