I am obviously in deep trouble. So I am going to post my “fuckit page” that I have been thinking about doing, ALL OF US are done for if “they” pulled the shit they just pulled, it won’t just be me. I don’t know how far I will get with this, “they” keep shutting the USB ports off now which is why this is going up piecemeal. No USB ports equals dead text with no keyboard or mouse to post it with. So piece by piece. Here goes.
What do you do when . . . .
1. “They” break an impressive lock to get into your place
2. They rob nothing but it is obvious the computer has been messed with because it has been moved and the case is half cracked open
3. You find an extra folder in the root directory on the computer (where no one ever goes unless you are like me) that was not there before (found by the way the icons lined up, I did not dig the directory yet because the root directory is a bastard)
4. Then the folder disappears when you post about it being put there? They might have only hidden it and I did not check for that, because there’s probably other hidden folders anyway so the mess would be deep and I wanted that hard drive outta here . . . . . because that’s a frameup baby.
5. What do you do when your ISP is DHCP and suddenly your IP is static because it’s compliments of a stinger?
What do you do? when you know the end is near?
~~~~~~~~~~~~~~~~~~~~
First, I apologize for the language in the above article. What else would you call information that you considered to be the last post you may be able to make? I have had one confirmation concerning the Iran information. Are the rats abandoning the sinking ship?
David DeGerolamo
Well, that’s really something. If it were me I’d probably start thinking about relocating to a non-extradition country. Like Yemen.
Good article, I hope he survives, but his chances are slim to none. If they want you they are going to get you, they have assets all over the world.
Thanks for opening me to Jim Stone! I am now going back over his past posts and articles. Great intel!!
I would melt my computer down to slag with an acetylene torch. Hope he saved the important stuff on a flash drive. He’s now got kittie pron on that computer somewhere. Who’s next ?
Jim is a hoot and a total nutjob! And he is also right about half the time, so its wise to listen.
Ok, I don’t know who this Jim Stone is, but I can speak to the computer security stuff. Consider this a public service announcement:
If you suspect your computer has been hacked or otherwise compromised. The first thing you do is either pull the network cable or raise firewalls on all ports to cut off network traffic. You want to do this suddenly and with as few commands as possible. The idea is that you don’t want to trigger an evasive response from the possible intruder.
You should then be able to start performing a forensic investigation of the machine, or even better work on a copy of the machine.