This multi-part set of zipped archives contains a truncated set of hacker libraries, files and programs which had been passed between two dell machines and onto a Toshiba machine where they should still be on that drive (the machine has been taken apart for forensic analysis).
These copies were on a USB stick the break-in Commandos copied from (it was on my desk, special for whomever, and like the machines full of their shit, they just left it after they had broken into my house, assaulted my dog, and installed all kinds of stuff), which listed it as a RICO investigation.....because I was looking into government built software and networks being used to compromise any and all (w/ some OPs Specific) machines and devices w/o warrants or oversight, which is STILL illegal w/o court order despite the Patriot Act (for special prosecutors, judges orders and congressional investigators).....
Many of the missing or corrupted files were from the original files being accessed for on-site break-in operations to copy using either a computer or a drive array which allowed USB/DISC write to's. They also logged onto their own password protected network storage areas (which were still active as of yesterday via holographic archived images - see AngelSpeak) and uploaded materials.
Those protected areas were matched to devices and machines and some are correlated with the tags I found inside machines, pointing to data logging of component activities..
I have possibly the names of the devices the files were copied to, to be used when appropriate. Many folders here are missing or have corrupted content. Once realized remotely, just as today, that I am gathering or using/uploading or sharing this information, the Operatives come onto my machines via their installed services and via secured (HA!) public networks (illegal as hell) and attempt to destroy, lock, or change the contents.
AT&T networks and router modems were used if I had the units turned on connected (or not conencted since none of these router modems can the wifi be turned off ebcause the router CANNOT be accessed in the standard way with a connected browser or network toolset, meaning those devices from a commercial service provider were either compromised hacked and malicious operations partaken, OR those massive in-control of your life corporations controlled and authorized by your governments to have these functions readily available provided these backdoor men & women the right and power to destroy.
We will find this out with factual evidence even though we already damned well know that answer.....
Or, if those access points were unavailable they used their own installed modem/bluetooth & Wifi device adapters (see adapter logs). Many of these are shown in some of the videos and pictures I have published and will publish. Some have to be non-published for court security reasons.
The segmented zipped files contain a plethora of all kinds of data based electronic information relatives....
********************************************************************
Location of ZIP Files: YOU MUST ASK ME
These copies were on a USB stick the break-in Commandos copied from (it was on my desk, special for whomever, and like the machines full of their shit, they just left it after they had broken into my house, assaulted my dog, and installed all kinds of stuff), which listed it as a RICO investigation.....because I was looking into government built software and networks being used to compromise any and all (w/ some OPs Specific) machines and devices w/o warrants or oversight, which is STILL illegal w/o court order despite the Patriot Act (for special prosecutors, judges orders and congressional investigators).....
Many of the missing or corrupted files were from the original files being accessed for on-site break-in operations to copy using either a computer or a drive array which allowed USB/DISC write to's. They also logged onto their own password protected network storage areas (which were still active as of yesterday via holographic archived images - see AngelSpeak) and uploaded materials.
Those protected areas were matched to devices and machines and some are correlated with the tags I found inside machines, pointing to data logging of component activities..
I have possibly the names of the devices the files were copied to, to be used when appropriate. Many folders here are missing or have corrupted content. Once realized remotely, just as today, that I am gathering or using/uploading or sharing this information, the Operatives come onto my machines via their installed services and via secured (HA!) public networks (illegal as hell) and attempt to destroy, lock, or change the contents.
AT&T networks and router modems were used if I had the units turned on connected (or not conencted since none of these router modems can the wifi be turned off ebcause the router CANNOT be accessed in the standard way with a connected browser or network toolset, meaning those devices from a commercial service provider were either compromised hacked and malicious operations partaken, OR those massive in-control of your life corporations controlled and authorized by your governments to have these functions readily available provided these backdoor men & women the right and power to destroy.
We will find this out with factual evidence even though we already damned well know that answer.....
Or, if those access points were unavailable they used their own installed modem/bluetooth & Wifi device adapters (see adapter logs). Many of these are shown in some of the videos and pictures I have published and will publish. Some have to be non-published for court security reasons.
The segmented zipped files contain a plethora of all kinds of data based electronic information relatives....
********************************************************************
Location of ZIP Files: YOU MUST ASK ME
No comments:
Post a Comment
TW - (404) 954-2708 The Underground:
Undergroundrecords.org
Rockfest - http://www.rockfest.org