Morally Conscious


Logo Design by FlamingText.com
Logo Design by FlamingText.com
Logo Design by FlamingText.com

Monday, September 3, 2018

Every Crime Has Evidence, You Just Have To Know What Crime It Is!? Forensics and Computers Are A Big Part Of This Investigation


I've come to the realization that there will be many ways to look for the clues and evidence that Lori and Brian LaFond have left behind.  Computer forensics has come so far in so long that finding out where a computer went on a known laptop from a known IP Address...isn't difficult.  In fact I think they teach you that the first day you train in computer forensics.  Most of those people already have a working knowledge of what to search for on a computer to locate the information they need.

My concern is in knowing what to look for.  We know that access to the Verizon Wireless system is done on one computer and accessing a website that translates EEG's is done on another.  You possibly could use the same computer but the Verizon computers are limited by their age.  The website is obviously dark web and isn't available to the public.  It probably has military access to certain places that normal computers don't, but putting a U.S. Department of Defense server of any type online on the dark web should be an act of treason.  You can't privately access a government computer.  People have suggested that access may have been granted because of Lori's father's stolen military ID.  Someone emailed me the other day and told me that Lori's father's military ID's had been located.  I've heard there were several.

Can you imagine the kinds of information that pilots and sub workers have on this server and it is accessible to anyone with a web address and a login?  This is crazy.  It's already bad enough that the PSPD officer's thoughts are being translated for every drug dealer that wants to watch them, but now you have opened the entire country up for attack because pilots and submarine workers for the military are on there too.  Why would that be dangerous, simple, location, plans, attacks, defense all rests on privacy.  Without it, our military isn't effective.  Leave it to Lori to tell every tweeker in the Coachella Valley about this system.  The danger to the police is much higher than they know.  They could easily be led into an ambush. Can't happen?  Wrong, Lori led a cop to the parking lot of the Big 5 to shoot a friend of mine...that's what happened.  If he didn't have a gun, and I doubt he did, there was no reason to shoot him.  If he did have a gun, that was too dangerous to roll up on with one car in the first place.

This is a crime that you can't see, so it must not exist right?  Not at all.  For example, can you see your wireless internet signal?  No, but it is there...you know because your device hooks into it and you have internet.  Same thing with the victims of this crime.  We hook up to a wireless signal that you can't see.  When we are on it, we can hear Lori and Brian screaming at us.  You can't see it, but it's there.  Do you see a website on your computer, of course.  Do you see it transferring through the air to get to you? No, that's silly.  Your devices, once hooked up, automatically hook up thereafter.  You can be on this system and not hear a thing or on it and hear every word.  It's really up to the bitch at the microphone.

You can trace these invisible signals through computer contact.  Find my serial numbers for my chip, run them through the computer, and see what websites were used to hook me up.  Also a sweep of these numbers could be conducted on the web too.  The lot numbers we have trace back to anyone that has used them.  There are enough to be unique to every chip in every person.  So if you see them in sequence you can be sure that they are being used to spy on someone.  The odds of one of these numbers popping up in order anywhere else is probably trillions to one.  Wherever my sequences are being used, needs to be found.

Computer forensics is a game of where did you go, what did you look at, what did you write and what did they write back, what pictures and videos do you have, who was using your computer...and so forth.  It's all there but our police department isn't equipped to do that.  We need the federal government to stop the use of our serial numbers on all wireless computer systems.  Those serial numbers are in our possession.  One verification and they could mandate that all chips using these numbers will no longer work or face a  huge fine.

Military government servers should not be on the dark web, neither should Chief Reyes' email and password...but they are.  Simply by thinking from his own desk, hooked into this system, he is putting his own Chief of Police thinking online.  It isn't smart at all.