John McAfee: A Threat to Politicians, Governments, and the Pharmaceutical Industry – Fighting For His Life

John McAfee of the original cyber security software company, McAfee Associates, has announced via his Twitter account that on June 14th he will release the names of Congressmen and Senators who are corrupt officials.   A self described Hackman, McAfee claims that he can find any information, any dirt, on anyone. He also claims he has a trove of information and evidentiary material on scores of corrupt government officials across the globe that he will release in the event he is not “left alone”.

Personally, I do not think this is an idle threat.

McAfee has certainly lived a ‘colorful’ life, but over the last decade plus, having exiled himself to Belize, his life has spiraled into a chaotic spin that was dramatized in a pseudo documentary by Showtime.

Showtime hired Jeff Wise as executive producer to create a biopic with the help of Nanette Burnstein, a producer and director of a few defunct sitcoms, and a documentary.   Their documentary on McAfee called Gringo, aired in 2016, received no accolade, and began with the premise that McAfee was guilty of a number of crimes.

Showtime highlighted their expose by citing various articles in Psychology Today which labeled McAfee as psychopathic and schizophrenic. But those articles are written by Jeff Wise, basically promoting the validity of a documentary by its own producer.   In essence, Wise actually discredits Gringo through false pseudo analysis – despite having no education in psychology or analysis.

This bizarre tactic was recently employed by the Democrats to create a fake analysis of Trump.

Showtime is owned by AMC Network. Josh Sapan is President and CEO of AMC Networks. In my previous blog, The Soros Web, Sapan is implicated in the Soros web of chaos through his board affiliations including;  People For The American Way and Right Wing Watch.

In 2017, Wikileaks released documentation revealing that the CIA had created extensible Firmware Interface, EFI, to hack Apple Macbooks.   “The malicious software can allegedly embed itself in a computer’s low-level firmware and runs as the system is booting up. It is also coded to survive system updates, reinstallations, and can restore malware that gets removed.”

McAfee spoke out against the breach claiming that these cyberweapons utilized by the CIA and MI5 are quintessentially more powerful and devastating than any nuclear device.   Within the #Vault7 Wikileaks release, it was also revealed that “among the many revelations in the cache of files is that the agency has reportedly created tools that allow it to hack into the world’s most popular smartphones and make them send location information, as well as text and audio data.

The CIA is also allegedly able to turn Samsung TVs into covert listening devices and can disguise its hacks to make them appear as if they are coming from other countries such as Russia, Iran, and China.”

McAfee was quite vocal in defense of Trump regarding the Russia hacking, as well as denying Russia’s involvement in the DNC hacking.   It is likely McAfee had assisted Assange in obtaining some of his caches of emails.

Despite Showtime’s attempt to find McAfee guilty of various crimes including murder, no actual charges have ever been filed against McAfee. While he does admit to fleeing the US it is related to his admission for nonfiling of tax returns.  This would seem to be his only verifiable crime.

An article compiled by Joshua Davis for The Wired, provides a succinct account of a period of time wherein John McAfee’s life became mired in bizarre twists and webs.   Editors for The Wired include Kevin Kelly and Chris Anderson, both of whom came from The Economist, the Rothschild syndicate.

Included in this biography is McAfee’s meeting up with Allison Adonizio in a Belize resort in 2010. A biologist doing postgrad work at Harvard, she explained that her research involved studying plant compounds and their ability to prevent bacteria from causing infections. In essence this discovery would revolutionize antibiotics.

McAfee was immediately onboard and offered to support her research at his property building her a laboratory and growing the specified plants on his land. His vision was how he could save millions of lives and transform the entire pharmaceutical industry…

Prior to hitching a ride with McAfee, Allison Adonizio was apparently living with Gregory Faull, the same man who was found shot in the back of the head execution style in 2012.   The documentary, Gringo, accuses McAfee of this murder.

Allison Adonizio later claimed that McAfee raped her, although accounts of her promiscuity while in Belize would bely that accusation.   Today, Mz Adonizio would seem to have all but disappeared although the Ausubel Laboratory at Massachusetts General Hospital in conjunction with Genetics at Harvard Medical list their study of research as: studying plant compounds and their ability to prevent bacteria from causing infections.  A link points to Adonizio on the Ausubel site, but her name has been extinguished from their list of researchers.

It would appear McAfee stepped on the wrong feet and his Belize haven would quickly spiral into his 11 dogs being poisoned, two murders, stalking, and numerous attempts on his life.

While today he says he just wants to be left alone – it would appear his cache of collected information presents a gross danger to the livelihood of some very powerful people.  His statement that he will be releasing names on June 14th is more a warning and the big names remain his blackmail.

FYI:  The Greg Faull estate filed a $25 million claim for damages against McAfee for wrongful death.  The judge that awarded the claim was appointed by Bill Clinton.

HACK ATTACK – Coincidences – no such thing

China’s market is realizing a ginormous correction – is it the end of the world?

Nah.

Put in perspective, their market had risen 150% over the last year. To NOT expect a correction would have been rather naive. However, to see the correction happen so quickly… that’s looking a bit manipulative.

Over 45% of Chinese stocks are currently ‘frozen’, no trading allowed. What precipitated the bear? It could be similar to what happened in the US ie, – margin calls. As stocks began their correction, computer algorithms kicked in and forced margin calls to go out which tanked the market more which created more margin calls… a domino effect when computers are at the helm.

Of course the investor holdings who have profited from the 150% ramp in China’s market would see this as an opportunity to sell, recognize their profit and wait for the full correction to bottom out before going back in. Plausible.  Typically, the losers in these corrections are the smaller investors who follow band-wagon buying.

Is it a manipulation? Yes and No. Yes in that markets are manipulated and no in that algorithms and opportunity helped it along.

Today the NY Stock Exchange experienced ‘a technical glitch’ and shut down for four hours. Glitch?  Really?  That’s the technical terminology?  I don’t buy it.  Hacking is soon going to overtake porn and human trafficking as a business model.  Just wanted to see if you were awake...  The media is terming the hack as a glitch, but then the media states what it is told to state – that’s called censorship.  Maybe the hack was a test.  Maybe the next ‘glitch’ will be our electrical grid.  Who really knows in a world where the truth is whispered and the falsehoods are glaringly mediatized.

Coincidentally, hackers and glitches also made waves for the Wall Street Journal and United Airlines today. Do we really believe that three major economic conglomerates all happened to have major glitches within hours of each other that were completely unrelated and had no commonality? If the media says so – we believe. Some of us…

Given China stated that they were not ruling out manipulation in their markets, vengeance is a potential scenario in hacking US conglomerates. Tit-for-tat. But while the recent hacking of the 4 million + US military records was blamed on China – there was never any definitive proof or follow-up to the accusation, it simply became the media go-to despite China’s government denying the claim. In addition, the hack actually took place December 2014 but our transparent government didn’t decide to tell us until June 2015 – 6 months later…why? Their proof that it was China was not proof at all by any legal definition, but a ‘deduction’ based on ‘gee, who else would have’? Not exactly the sort of proof lawyers and courts win cases with.

North Korea was found to have not been the source of the Hollywood hack and yet no other country or group was ever identified in the press.

A Syrian organization claimed responsibility in another US Army hack that occurred earlier in June. Where are they, these hacker Syrians? Hiding in caves?  Buried in rubble?  That seems a bit of a stretch to me given that Syria is completely, hideously ravaged – there is no infrastrusture left! Doesn’t it seem a bit odd that a bunch of rebel Syrians in a wore torn country with little to no electricity, no satellites, few computers and even fewer intelligencia could hack thru the US Army? What does that say for us?  Not very logical.

So what did Obama say about this? He said the US has outdated computer systems and is vulnerable to attacks. Well then, take some of that holiday in Hawaii money and UPGRADE! Good Grief Charley Brown. How absurd is this? How much does Wall Street make that they can’t have hack-proof computers and software? Or maybe we should train those 40,000 military personnel that are going to get laid off in the next two years to be computer hackers, IT systems analysts and engineers. Hello?

The US is the victim of more hacking than any other country in the world!  Hackers for hire on the shadow network can be had for as little as $8 per hour. So what is our grand government doing about it? For one thing they are pounding the world pavement claiming that global warming is the Chicken Little that will destroy us all while hacking has the potential to grind everything to a screeching halt – tomorrow, including; electricity, the IRS, Hospitals, airplanes, trains, hydro dams, nuclear facilities, Wall Street, defense weapons, pipelines, shopping…(well it is important to some folks)!

What should we do?

What we shouldn’t do is shuffle our feet complaining at how antique our computer systems are! If Syria can bring us down – then we are just pathetic.