Featured Post

QAnon: The Q-Sort Personality Profile Builder

Gettin Billy with It QAnon is based on Q-Sort: A psychological technique of which there are many variations, resulting in 50 descript...

Monday, November 13, 2017

UNIX to UNIX Copy - Mac



UNIX to UNIX
UNIX to UNIX

All illegal activity on or through this network has been facilitated and committed by local and Federal agents working directly for, or with, the US government in one capacity or another.  While their cover story remains such as "national security" or "open investigation," they are actually collecting information for the purposes of extortion, and stealing intellectual property.

Just as they work clandestinely through a byzantine network of front organizations, "dummy" and "zombie" corporations, and governmental agencies, they employ informants (CI, colloquially known as "snitches") to gather information -- usually bogus.  

This is known as COINTELPRO.

My guess is that this configuration is being used to pose as me, but Identity Theft is only the tip of the iceberg, as I've no idea what crimes they've committed under my name (or PC, as it were).

© Copyright 2017, The Cyberculturalist

No comments: