Jump to content

550 posts in this topic

Recommended Posts

Filed: Timeline
Posted
1 minute ago, Dashinka said:

Supposedly this shop owner did contact the FBI as well as others in the Congress with no response, and if it was Hunter Biden that dropped off the computer, it doesn't appear that he ever showed up to pick it up (doesn't seem like the brightest light in the bunch).  Also, if they do ever want to do a criminal investigation, they should be able to determine if this person actually doctored or fabricated the information.  I seem to remember hearing of child-porn criminals being convicted in a similar manner. 

I know buddy.  I was joking about the chain saw thing.

 

Quote

According to Isaac’s <Mac store owner> account, the FBI first made a forensic copy of the laptop, then returned weeks later with a subpoena and confiscated it. When he stopped hearing from the FBI, Isaac said he contacted several members of Congress, who did not respond. At that point, his intermediary reached out to Rudy Giuliani’s attorney, Robert Costello.

This all happened over a year ago.  They have had PLENTY of time to investigate and do something.  Like I said, I don't place much faith in the FBI these days.

Filed: Citizen (apr) Country: Russia
Timeline
Posted
30 minutes ago, Voice of Reason said:

I know buddy.  I was joking about the chain saw thing.

 

This all happened over a year ago.  They have had PLENTY of time to investigate and do something.  Like I said, I don't place much faith in the FBI these days.

Interesting actions by the FBI.  So they copied it, then went back and found out what was on it and decided they needed to cover it up by confiscating the computer.  I guess they were not really worried about abandoned property initially?  So in this case, there would be no issues with any prosecution as the FBI had a copy of the device before it was given to anyone else.

Visa Received : 2014-04-04 (K1 - see timeline for details)

US Entry : 2014-09-12

POE: Detroit

Marriage : 2014-09-27

I-765 Approved: 2015-01-09

I-485 Interview: 2015-03-11

I-485 Approved: 2015-03-13

Green Card Received: 2015-03-24 Yeah!!!

I-751 ROC Submitted: 2016-12-20

I-751 NOA Received:  2016-12-29

I-751 Biometrics Appt.:  2017-01-26

I-751 Interview:  2018-04-10

I-751 Approved:  2018-05-04

N400 Filed:  2018-01-13

N400 Biometrics:  2018-02-22

N400 Interview:  2018-04-10

N400 Approved:  2018-04-10

Oath Ceremony:  2018-06-11 - DONE!!!!!!!

Filed: Citizen (apr) Country: Russia
Timeline
Posted

How five members of Joe Biden’s family got rich through his connections

 

Political figures have long used their families to route power and benefits for their own self-enrichment. In my new book, “Profiles in Corruption: Abuse of Power by America’s Progressive Elite,” one particular politician — Joe Biden — emerges as the king of the sweetheart deal, with no less than five family members benefiting from his largesse, favorable access and powerful position for commercial gain. In Biden’s case, these deals include foreign partners and, in some cases, even US taxpayer dollars.

The Biden family’s apparent self-enrichment involves five family members: Joe’s son Hunter, son-in-law Howard, brothers James and Frank, and sister Valerie.

When this subject came up in 2019, Biden declared, “I never talked with my son or my brother or anyone else — even distant family — about their business interests. Period.”

 

https://nypost.com/2020/01/18/how-five-members-of-joe-bidens-family-got-rich-through-his-connections/

Visa Received : 2014-04-04 (K1 - see timeline for details)

US Entry : 2014-09-12

POE: Detroit

Marriage : 2014-09-27

I-765 Approved: 2015-01-09

I-485 Interview: 2015-03-11

I-485 Approved: 2015-03-13

Green Card Received: 2015-03-24 Yeah!!!

I-751 ROC Submitted: 2016-12-20

I-751 NOA Received:  2016-12-29

I-751 Biometrics Appt.:  2017-01-26

I-751 Interview:  2018-04-10

I-751 Approved:  2018-05-04

N400 Filed:  2018-01-13

N400 Biometrics:  2018-02-22

N400 Interview:  2018-04-10

N400 Approved:  2018-04-10

Oath Ceremony:  2018-06-11 - DONE!!!!!!!

Posted (edited)

Lets see how authoritarian social media companies learn of the Streisand effect. It's only going to get shared more, and more attention is going to be drawn to it.

 

And:

Quote

 

Senate to Subpoena Twitter CEO Over Blocking of Disputed Biden Articles

Move by GOP lawmakers on Judiciary Committee follows social-media platform’s decision to limit sharing of New York Post report

 

WASHINGTON—The Senate Judiciary Committee plans to issue a subpoena on Tuesday to Twitter Inc. Chief Executive Jack Dorsey after the social-media company blocked a pair of New York Post articles that made new allegations about Democratic presidential nominee Joe Biden, which his campaign has denied.

The subpoena would require the Twitter executive to testify on Oct. 23 before the committee, according to the Republicans who announced the hearing.

GOP lawmakers are singling out Twitter because it prevented users from posting links to the articles, which the Post said were based on email exchanges with Hunter Biden, the Democratic candidate’s son, provided by allies of President Trump. Those people in turn said they received them from a computer-repair person who found them on a laptop, according to the Post.

The Wall Street Journal hasn’t independently verified the Post articles.

“This is election interference, and we are 19 days out from an election,” Sen. Ted Cruz (R., Texas), a committee member who discussed the subpoena with Senate Judiciary Committee Chairman Lindsey Graham (R., S.C.), told reporters. “Never before have we seen active censorship of a major press publication with serious allegations of corruption of one of the two candidates for president.”

 

https://www.wsj.com/articles/senate-to-subpoena-twitter-ceo-over-blocking-of-new-york-post-articles-on-bidens-11602777128

 

 

Edited by Burnt Reynolds
Filed: K-1 Visa Country: Wales
Timeline
Posted

The places I have been to where you leave something for repair have always had a time line for you to pick it up, Dry cleaners, shoe repairers, after whatever time that is you are deemed to have abandon it and they are at liberty to do whatever they want with it. Think Hotels often say something similar for stuff left behind.

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”

Posted
1 hour ago, Boiler said:

The places I have been to where you leave something for repair have always had a time line for you to pick it up, Dry cleaners, shoe repairers, after whatever time that is you are deemed to have abandon it and they are at liberty to do whatever they want with it. Think Hotels often say something similar for stuff left behind.

 

   I used to do computer repair/refurbish on the side. You can reformat a hard drive and then sell an unclaimed computer. If a computer is not bootable, you can sell as is.  Most reputable places will remove and dispose of the hard drive anyway to avoid legal issues.  No matter what the scenario, it is illegal to take anyone's personal information from that computer and make a copy for yourself.  If you incidentally come across something illegal, the correct thing to do is turn the entire laptop over to authorities. If you start screwing around with it, you have compromised any investigation that may occur.  You also generally get the customers name and payment information so that you don't do a whole bunch of work for free.

 

  There's a reason this whole incident is being looked at with skepticism. These guys did two things that don't make sense. They took a product for repair without even getting a customer name, and they illegally copied the data on the computer. Makes a good story, but a dumb reality.

995507-quote-moderation-in-all-things-an

Posted (edited)

Ethics of attaining the data aside, it's either true or isn't. We don't get to try and mold reality because it came to us in a way not preferable. This also seems to be a problem for the left and Assange, or I suppose the left and anything else.

 

In the meantime, waiting on some souls stuck on that shoddy platform to put a nail in its coffin already, not by legislation or government means, but by ditching the toxic trash heap and pulling away an enormous chunk of its userbase. It really makes me wonder about motive when people just endlessly complain and don't do anything constructive.

Edited by Burnt Reynolds
Filed: Timeline
Posted (edited)
10 minutes ago, Steeleballz said:

 

   I used to do computer repair/refurbish on the side. You can reformat a hard drive and then sell an unclaimed computer. If a computer is not bootable, you can sell as is.  Most reputable places will remove and dispose of the hard drive anyway to avoid legal issues.  No matter what the scenario, it is illegal to take anyone's personal information from that computer and make a copy for yourself.  If you incidentally come across something illegal, the correct thing to do is turn the entire laptop over to authorities. If you start screwing around with it, you have compromised any investigation that may occur.  You also generally get the customers name and payment information so that you don't do a whole bunch of work for free.

 

  There's a reason this whole incident is being looked at with skepticism. These guys did two things that don't make sense. They took a product for repair without even getting a customer name, and they illegally copied the data on the computer. Makes a good story, but a dumb reality.

If the computer is going back to the original owner, true.  If the computer is abandoned, not true.  Also not true if you happen across someone's personal data on your own network.  To me, I don't care HOW they got the info... but if it is accurate, then crimes need to be paid for, period.  

 

I know this because I handed over a criminal who kept getting on my un-locked network back in the day to the FBI.  After kicking him off several times, I decided to go digging in what he had shared.  One phone call to the police in the town this guy was from, a brief conversation that essentially went, "Uhhhh, can I get back to you on this?"  He called back 10 minutes later, and asked permission to give my number to the Atlanta FBI, which I gladly gave.  By the time the FBI called me a couple of hours later, I have burned a CD's worth of files.  About 10 days later, two dark sedans arrived, an agent stopped by my place for the CD, they escorted the network interloper into one of the cars, and gave the guy a free ride somewhere.  Never saw him again.  His wife moved out shortly thereafter.

Edited by Voice of Reason
Filed: Citizen (apr) Country: Brazil
Timeline
Posted
14 minutes ago, Burnt Reynolds said:

You guys reminded me to kill my guest network from in-laws visiting (now that they've all finally left). 😂

:secret:   they'll leave sooner if you don't give them any network access...........

* ~ * Charles * ~ *
 

I carry a gun because a cop is too heavy.

 

USE THE REPORT BUTTON INSTEAD OF MESSAGING A MODERATOR!

Posted
6 minutes ago, Voice of Reason said:

If the computer is going back to the original owner, true.  If the computer is abandoned, not true.  Also not true if you happen across someone's personal data on your own network.  To me, I don't care HOW they got the info... but if it is accurate, then crimes need to be paid for, period.  

 

I know this because I handed over a criminal who kept getting on my un-locked network back in the day to the FBI.  After kicking him off several times, I decided to go digging in what he had shared.  One phone call to the police in the town this guy was from, a brief conversation that essentially went, "Uhhhh, can I get back to you on this?"  He called back 10 minutes later, and asked permission to give my number to the Atlanta FBI, which I gladly gave.  By the time the FBI called me a couple of hours later, I have burned a CD's worth of files.  About 10 days later, two dark sedans arrived, an agent stopped by my place for the CD, they escorted the network interloper into one of the cars, and gave the guy a free ride somewhere.  Never saw him again.  His wife moved out shortly thereafter.

 

   I am not familiar with data on your own network, but I'll take your word for it. I am familiar with computer repair. There are laws that pertain to taking and/or using personal data. You don't ever make a copy of anything. If you see something suspicious, you hand the entire device over to authorities as is.

995507-quote-moderation-in-all-things-an

Filed: Timeline
Posted
17 minutes ago, Burnt Reynolds said:

You guys reminded me to kill my guest network from in-laws visiting (now that they've all finally left). 😂

Yeah, my network is much different nowadays.  This was back when there was very little cyber attacking going on in suburbia, just folks piggybacking who didn't have a clue how file sharing on their PC works over a network.

 

I'd love to see someone with some actual skillz try to hack into my network today.  Not saying it is impossible, but I feel it's pretty darn secure.

Filed: Timeline
Posted (edited)
2 minutes ago, Steeleballz said:

 

   I am not familiar with data on your own network, but I'll take your word for it. I am familiar with computer repair. There are laws that pertain to taking and/or using personal data. You don't ever make a copy of anything. If you see something suspicious, you hand the entire device over to authorities as is.

Can you point me in the direction of the law(s) to which you keep referring?

Edited by Voice of Reason
Posted
38 minutes ago, Steeleballz said:

 

   I used to do computer repair/refurbish on the side. You can reformat a hard drive and then sell an unclaimed computer. If a computer is not bootable, you can sell as is.  Most reputable places will remove and dispose of the hard drive anyway to avoid legal issues.  No matter what the scenario, it is illegal to take anyone's personal information from that computer and make a copy for yourself.  If you incidentally come across something illegal, the correct thing to do is turn the entire laptop over to authorities. If you start screwing around with it, you have compromised any investigation that may occur.  You also generally get the customers name and payment information so that you don't do a whole bunch of work for free.

 

  There's a reason this whole incident is being looked at with skepticism. These guys did two things that don't make sense. They took a product for repair without even getting a customer name, and they illegally copied the data on the computer. Makes a good story, but a dumb reality.

email has a header with an IP. Should not be that big of a deal to verify. Why is no one really denying it.

 

Trump supposedly called some troops losers. No verification what so ever--still front page news and treated as if it were true 

The whole Golden shower Trump thing. No evidence what so ever but was front page news and investigated for 2 years.

Rachel Maddow gets a snippet of a leaked Trump tax return supposedly--Front page news

Trump took MLK statue out of Oval office. Complete falsehood and easily verifiable. Front page news,

 

I am sure If I felt like googling I could come up with many many more

 

Surely you will admit there is a huge double standard

Posted
8 minutes ago, Voice of Reason said:

Yeah, my network is much different nowadays.  This was back when there was very little cyber attacking going on in suburbia, just folks piggybacking who didn't have a clue how file sharing on their PC works over a network.

 

I'd love to see someone with some actual skillz try to hack into my network today.  Not saying it is impossible, but I feel it's pretty darn secure.

send me your IP and I will let anonymous have a go at it. You would be hacked in minutes. In fact getting your ip would not be hard, and I have not done IT in 15 years 

 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
- Back to Top -

Important Disclaimer: Please read carefully the Visajourney.com Terms of Service. If you do not agree to the Terms of Service you should not access or view any page (including this page) on VisaJourney.com. Answers and comments provided on Visajourney.com Forums are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Visajourney.com does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. VisaJourney.com does not condone immigration fraud in any way, shape or manner. VisaJourney.com recommends that if any member or user knows directly of someone involved in fraudulent or illegal activity, that they report such activity directly to the Department of Homeland Security, Immigration and Customs Enforcement. You can contact ICE via email at Immigration.Reply@dhs.gov or you can telephone ICE at 1-866-347-2423. All reported threads/posts containing reference to immigration fraud or illegal activities will be removed from this board. If you feel that you have found inappropriate content, please let us know by contacting us here with a url link to that content. Thank you.
×
×
  • Create New...