'cookieChoices = {};'


The Right of the People to be Secure in their Persons, Houses, Papers, and Effects,
Against Unreasonable Searches and Seizures,
Shall Not Be Violated

click.jpg

Sunday, March 12, 2017

Jordan Peterson: "The Lesson Human Beings Need to Learn From the 20th Century ... How Is It We Should Live So That We Don't Do That Again?"

"Say the Truth ... no matter what ... because the alternative is worse."

Bookmark and Share
posted by Pastorius at permanent link#

2 Comments:

Anonymous Anonymous said...

Sharyl Attkisson is suing Obama's DoJ for 35 million, for years 2011-2013, for spying on her. I bet she gets it too!
Imagine what it must be like to watch your computer turn itself on and off.
She also watched a different computer that she used delete files by itself.
The five-time Emmy Award winner 7
recipient of the Edward R. Murrow award for investigative reporting
announced in January she is suing the Justice Department and seeking $35M in damages for illegally hacking her computers & monitoring
her work between 2011 & 2013.

Three separate computer forensic exams of her computers revealed what appears to be stunning evidence pointing straight to the Obama administration.

“The most important & irrefutable finding is: forensic evidence of a
government-owned I.P. (internet protocol) address accessing my
computer,” Attkisson told WND.

She said she was told that was “better evidence than the U.S. had
when it accused China of various acts of hacking into our govt, which the govt accepts as proven.”

Her computers were examined by three independent forensics examiners including: a confidential source, an examiner hired by CBS News, & an
examiner hired by her attorney.
What they found is just stunning.

Attkisson provided an itemized overview of some of their findings, & described what a confidential source & examiner hired by her attorney found:

“A government-owned I.P. address was used to access my computer.”

“We are able to see instances of exact date and time that the
intruders entered my computers, and the methods they used to do so.”

“They used commercial, non-attributable software proprietary to the CIA, FBI, NSA or DIA.”

“The malware was constantly running on my computers. It included a feature that logged my keystrokes, accessed all my emails and collected my passwords.”
“Skype was surreptitiously used to listen in on audio.”
“My smartphone was also infected.”
“Three classified documents had been put on my computer.”
“Once sources notified me that I was likely being surveilled, and I
discussed this in emails, the intruders took steps to erase evidence of their presence. However, the deletions themselves create a record of evidence.”

Monday, March 13, 2017 1:31:00 am  
Anonymous Anonymous said...

Wow! Is this for real?? Tweet posting Monday's schedule for POTUS

https://twitter.com/WestWingReport/status/841115926418333696/photo/1

4:30 PM THE PRESIDENT signs an Executive Order entitled:

"Comprehensive Plan on Reorganizing the Executive Branch"
in the Oval Office

Monday, March 13, 2017 1:30:00 pm  

Post a Comment

Subscribe to Post Comments [Atom]

<< Home


Older Posts Newer Posts