HomeLatest ThreadsGreatest ThreadsForums & GroupsMy SubscriptionsMy Posts
DU Home » Latest Threads » Roland99 » Journal
Page: « Prev 1 2 3 4 Next »


Profile Information

Gender: Male
Hometown: Louisville, KY
Current location: Central FL
Member since: Thu Sep 16, 2004, 02:03 PM
Number of posts: 52,691

Journal Archives

Crooked NYPD cop testifies he received tickets to superhero movie premieres, helped Marvel chairman

Crooked NYPD cop testifies he received tickets to superhero movie premieres, helped Marvel chairman Ike Perlmutter get gun permit

Marvel Entertainment chairman Ike Perlmutter has his own superpower: A hard-to-get New York City gun permit renewed by a crooked cop who testified Wednesday that he scored tickets to red-carpet superhero movie premieres.

Ex-NYPD Sgt. David Villanueva, who has pleaded guilty to accepting bribes while working in the department’s scandal-scarred License Division, said under oath that he’d received tickets to the movie premieres from Perlmutter’s assistant, Marisol Garcia.

He described Garcia as a friend and didn’t say he spoke directly with Perlmutter. The reclusive Marvel executive is a prominent supporter of President Trump who has been described as a “shadow ruler” of the Department of Veterans Affairs.
“So you went to six premieres for Marvel Comics, right?” defense attorney John Meringolo asked.

How deep is that freaking swamp?!

Epstein trial docs will be available soon. Large tranche ordered unsealed!



Adam Klasfeld

Uploading files to share right now.

Among the trove of more than a dozen, there is the formerly-sealed 76-page ruling in the case Giuffre v. Maxwell, the case brought by one of Epstein's accusers interviewed in @JKJournalist's watershed series "Perversion of Justice."


Adam Klasfeld

Epstein's Amazon orders included the following books: "SM 101: A Realistic Introduction," "SlaveCraft: Roadmaps for Erotic Servitude," "A Workbook for Erotic Slaves and Their Owners," Giuffre alleges.

A photo of the receipt is included in the motion.

We have studied every mass shooting since 1966. Here's what we've learned about the shooters

We have studied every mass shooting since 1966. Here’s what we’ve learned about the shooters
First, the vast majority of mass shooters in our study experienced early childhood trauma and exposure to violence at a young age. The nature of their exposure included parental suicide, physical or sexual abuse, neglect, domestic violence, and/or severe bullying. The trauma was often a precursor to mental health concerns, including depression, anxiety, thought disorders or suicidality.

Second, practically every mass shooter we studied had reached an identifiable crisis point in the weeks or months leading up to the shooting. They often had become angry and despondent because of a specific grievance. For workplace shooters, a change in job status was frequently the trigger. For shooters in other contexts, relationship rejection or loss often played a role. Such crises were, in many cases, communicated to others through a marked change in behavior, an expression of suicidal thoughts or plans, or specific threats of violence.

Third, most of the shooters had studied the actions of other shooters and sought validation for their motives. People in crisis have always existed. But in the age of 24-hour rolling news and social media, there are scripts to follow that promise notoriety in death. Societal fear and fascination with mass shootings partly drives the motivation to commit them. Hence, as we have seen in the last week, mass shootings tend to come in clusters. They are socially contagious. Perpetrators study other perpetrators and model their acts after previous shootings. Many are radicalized online in their search for validation from others that their will to murder is justified.

Fourth, the shooters all had the means to carry out their plans. Once someone decides life is no longer worth living and that murdering others would be a proper revenge, only means and opportunity stand in the way of another mass shooting. Is an appropriate shooting site accessible? Can the would-be shooter obtain firearms? In 80% of school shootings, perpetrators got their weapons from family members, according to our data. Workplace shooters tended to use handguns they legally owned. Other public shooters were more likely to acquire them illegally.

Yahoo News - Alleged white supremacists were responsible for all race-based domestic terrorism 2018

Alleged white supremacists were responsible for all race-based domestic terrorism incidents in 2018

Here's the data on white supremacist terrorism the Trump administration has been 'unable or unwilling' to give to Congress
Jana Winter and Hunter Walker
Yahoo NewsAugust 8, 2019, 7:52 PM EDT
WASHINGTON — Alleged white supremacists were responsible for all race-based domestic terrorism incidents in 2018, according to a government document distributed earlier this year to state, local and federal law enforcement.

The document, which has not been previously reported on, becomes public as the Trump administration’s Justice Department has been unable or unwilling to provide data to Congress on white supremacist domestic terrorism.

The data in this document, titled “Domestic Terrorism in 2018,” appears to be what Congress has been asking for — and didn’t get.


“For the past decade, the FBI used 11 different categories for domestic terrorism, including a separate category for white supremacist incidents. The Administration is now using a classification system with only four categories, including ‘racially-motivated violent extremism,’” the letter said. “This new category inappropriately combines incidents involving white supremacists and so-called ‘Black identity extremists,’ a fabricated term based on a faulty assessment of a small number of isolated incidents.”

Exclusive: Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials

Exclusive: Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials

The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states.


For years, U.S. election officials and voting machine vendors have insisted that critical election systems are never connected to the internet and therefore can’t be hacked.

But a group of election security experts have found what they believe to be nearly three dozen backend election systems in 10 states connected to the internet over the last year, including some in critical swing states. These include systems in nine Wisconsin counties, in four Michigan counties, and in seven Florida counties—all states that are perennial battlegrounds in presidential elections.

Some of the systems have been online for a year and possibly longer. Some of them disappeared from the internet after the researchers notified an information-sharing group for election officials last year. But at least 19 of the systems, including one in Florida’s Miami-Dade County, were still connected to the internet this week, the researchers told Motherboard.

The researchers and Motherboard have been able to verify that at least some of the systems in Wisconsin, Rhode Island, and Florida are in fact election systems. The rest are still unconfirmed, but the fact that some of them appeared to quickly drop offline after the researchers reported them suggests their findings are on the mark.

New term for Twitler's admin: #ShallowState

W T F? This was going to be a movie??? dear gawd!!

Movie execs reportedly pulled ads for a horror film where US elites hunt 'deplorables' for sport after the shootings in El Paso and Dayton

Movie executives have reportedly pulled ads for a new horror film about liberal elites hunting "deplorables" for sport, apparently in response to the two mass shootings that roiled the US over the weekend.


"The Hunt," due for release on September 27, focuses on a remote woodland mansion where US elites come in secret to hunt humans for sport.

In the movie, the victims of the hunting and kidnapping are described as "deplorables" — a label adopted by some supporters of President Donald Trump after Hillary Clinton used the term during the 2016 presidential campaign.

The plot revolves around a "deplorable" who turns the tables on the elites.

Microsoft catches Russian state hackers using IoT devices to breach networks

Hackers working for the Russian government have been using printers, video decoders, and other so-called Internet-of-things devices as a beachhead to penetrate targeted computer networks, Microsoft officials warned on Monday.

“These devices became points of ingress from which the actor established a presence on the network and continued looking for further access,” officials with the Microsoft Threat Intelligence Center wrote in a post. “Once the actor had successfully established access to the network, a simple network scan to look for other insecure devices allowed them to discover and move across the network in search of higher-privileged accounts that would grant access to higher-value data

The officials continued:

After gaining access to each of the IoT devices, the actor ran tcpdump to sniff network traffic on local subnets. They were also seen enumerating administrative groups to attempt further exploitation. As the actor moved from one device to another, they would drop a simple shell script to establish persistence on the network which allowed extended access to continue hunting. Analysis of network traffic showed the devices were also communicating with an external command and control (C2) server.

Microsoft researchers discovered the attacks in April, when a voice-over-IP phone, an office printer, and a video decoder in multiple customer locations were communicating with servers belonging to “Strontium,” a Russian government hacking group better known as Fancy Bear or APT28. In two cases, the passwords for the devices were the easily guessable default ones they shipped with. In the third instance, the device was running an old firmware version with a known vulnerability. While Microsoft officials concluded that Strontium was behind the attacks, they said they weren’t able to determine what the group’s ultimate objectives were.

The story of McConnell/Carson/Gingrich campaigns and Russian servers? It's worse!

First there was this: https://www.democraticunderground.com/100212350775

Now this:
Devin Nunes' Mom's Son Devin
On 1/24/17, a citizen filed a complaint against Ben Carson's super PAC and its "National Digitial Director," Ron Robinson.

The citizen was under the impression they were donating to Ben Carson's campaign when, in fact, they weren't.

And... https://twitter.com/VickerySec/status/1158455886509035520

The super PAC went thru several name changes:

National Draft Ben Carson for President Committee -> The 2016 Committee -> Stars and Stripes Forever PAC

🔥The most explosive finding here is the last footnote here... that, by the time the citizen received an e-mail from the Carson PAC on 9/16/15, the PAC already reported 11,000 itemized donations!

This means Robinson had e-mails and personal info of up to at least 11,000 people!

Lastly, Ben Carson's "authorized committee," Carson America, used the PAC's "email list on a rental basis," which explains why they sent an email to the citizen on 11/16/15.

This proves Robinson's PAC collected info on its donors and rented their donor/email list out to Carson!

And, to drive it all home again, Ron Robinson worked with Yandex (Russia's "Google", cryptocurrency, and set up email servers for his clients to bypass @NSAGov and to be "subpoena resistant."

McConnell & Gingrich are also alleged clients of his!
Unroll available on Thread Reader

Chris Vickery

Here it is.
This site is owned/run by a leading GOP digital operative. He runs systems on servers physically located in Russia, and advertised it.
Mitch McConnell is a client. Ben Carson is a client. Gingrich is a client. And many more.

Tell the world.@fbi @fbi @fbi
View image on TwitterView image on Twitter

3:13 PM - Aug 5, 2019
Twitter Ads info and privacy

16.8K people are talking about this

Keep in mind:

Robinson had "over 100" GOP clients, so he would have data on more than 11,000 people.

Above is solid documentation filed w/ the FEC that would support 11,000 at a minimum... but this is only for Carson's PAC and only prior to Sep 2015.


Multiple GOP clients (McConnell, Carson, Gingrich) with sites on RUSSIAN servers



Putin's daughter, Trump Tower internet traffic, Spectrum Health, Betsy DeVos

New Article about communications between Alfa Bank, Spectrum Health, The Trump Organization

Go to Page: « Prev 1 2 3 4 Next »