There is little or no doubt in my mind that the intelligence and law enforcement agencies that are infiltrated by bad actors seeking to protect former President Barack Obama, former Secretary of State Hillary Clinton, and various corrupt individuals and their agencies might be engaging in evidence tampering. The type of evidence tampering that could be used in a mainstream media/social media disinformation campaign to distract from the real evidence and create doubt in an eventual jury pool.
Why might I believe this?
(1) Consider the recent announcement that an individual suddenly found 450 gigabytes of deleted data from Hunter Biden’s laptop…
450GB Of 'Deleted' Hunter Biden Laptop Material To Be Released Within Weeks
A whistleblower who's fled the United States for Switzerland has vowed to drop '450 gigabytes of deleted material' from Hunter Biden's abandoned laptop, which he says he also gave the the Washington Post, New York Times, and Sen. Chuck Grassley - all of whom he says sat on it for months.
For the past two weeks, former Steve Bannon War Room co-host Jack Maxey has been hiding in Zurich, where he told the Daily Mail he's been working with IT experts to dig more data from Hunter's 'laptop from hell,' and that he'll post it all online in a searchable database in the coming weeks.
Maxey says the data includes 80,000 images and videos, and more than 120,000 archived emails.
"I came here so that we could do a forensic examination of Hunter's laptop safely in a country that still respects human liberty and the ideals of liberal democratic principles," he told the Mail. "I do not believe this would have been possible inside the United States. We had numerous attempts on us from trying to do things like this there." <Read more at ZeroHedge>
(2) Remember all of the technology claims of data manipulation by shady individuals like Attorneys Sidney Powell, L. Lin Wood, and a host of other dodgy characters whose claims fizzled in the light of day?
(3) We have a statement from the actual owner of Hunter Biden’s laptop, Delaware computer repairman John Paul Mac Issac.
Exclusive: Here Is the Statement from John Paul Mac Isaac on Recent Hunter Biden Laptop Reports that Was Rejected by a Media Distribution System from Being Sent Out
“In 2019, Hunter Biden brought 3 damaged laptops into ‘The Mac Shop’, the repair shop I owned in Delaware, to recover data. Hunter left with 2 of the laptops and the 3rd laptop remained while I attempted to salvage data off of his non-removable SSD.
In order to recover data from the laptop, I had to move files and folders by hand as the laptop would only stay on intermittently. Each time the laptop would shut down, I would reopen it and be forced to view the file contents to verify the recovery; contents I found deeply disturbing.
When Hunter Biden did not return to pick up the third laptop, I attempted to hand it over to the authorities. Eventually, the FBI collected the laptop but seemingly failed to act on its contents. Eventually, I was able to contact Rudy Giuliani’s office and mailed them a copy.
Recent news reports suggest that 450GB of new data has been unearthed from the original hard drive. I can say definitively that this data did not come from the laptop I had in my possession. It would be technologically impossible for 450 gigs of data to come from the original laptop’s 256 gig hard drive.
I cannot comment on the authenticity of the newly released data. There are numerous laptops out there and an iCloud Drive that likely holds information for which I am not privy. It is possible that the newly released files were obtained from one of those other sources,” explained Mac Issac.
“With the media finally acknowledging the authenticity of the laptop and contents of the drive, I am fearful that the newly discovered information has not been properly authenticated to confirm its validity – as the hard drive in my possession has. Proper vetting and investigation of this data is necessary, as not give those who would like to discredit and debunk the Hunter Biden laptop a way to claim the information is manufactured, faked, or altered.
For the sake of preserving the integrity of our country and presenting the truth to the American people, I hope any newly released information is fully authenticated. The only entity capable of corroborating the data is the FBI as they have been in possession of the original laptop since December 9th 2019,” concluded Mac Issac. <Read more at The Gateway Pundit>
(4) We find that the media moguls and tech tyrants are suppressing the Mac Issac news release, often indicating its authenticity and an attempt to deceive or distract the public.
A press release featuring Mac Issac’s above statements through a distribution system was recently rejected and forbidden from being sent, which tell us that tech oligarchs are still working the coverup for Team Biden.
(5) The poison pill disinformation campaign is a favorite tactic of state actors.
Disinformation Tactics: The Poison Pill
A Poison Pill disinformation campaign is the mixing of legitimate and illegitimate (spurious) information with the goal of dismissing or discrediting legitimate information. Legally, to introduce doubt into the evidentiary process to secure an acquittal, a mistrial, or to mitigate sentencing.
In this case, to trick the mainstream and social media to widely propagate questionable information which may taint an investigation, grand jury proceedings, a trial, or further investigation by creating a hall of mirrors that has one questioning the authenticity of what one is seeing.
I believe shenanigans are afoot as the mainstream news media suddenly reversed their narrative when rumors of a possible Hunter Biden indictment occurred.
How effin’ stupid do you have to be to ignore sworn testimony, authenticated documents, and then-Vice President Joe Biden’s recorded confession of his Ukraine quid pro quo – the same charge they used to successfully but falsely impeach Donald Trump.
Caveat: It is possible that Jack Maxey may have used login credentials found on the laptop to access Hunter Biden’s email account or other online sources. If so, it is likely that Maxey may have violated several laws in accessing accounts to which he had no legitimate access. It is also possible that he has acquired another laptop or portable storage drive from another source.
Whatever the case, we need to remain vigilant while corrupt individuals are running the show.
We are so screwed.
“Nullius in verba.”-- take nobody's word for it!
“Beware of false knowledge; it is more dangerous than ignorance.”-- George Bernard Shaw
“Progressive, liberal, Socialist, Marxist, Democratic Socialist -- they are all COMMUNISTS.”
“The key to fighting the craziness of the progressives is to hold them responsible for their actions, not their intentions.” – OCS "The object in life is not to be on the side of the majority, but to escape finding oneself in the ranks of the insane." -- Marcus Aurelius “A people that elect corrupt politicians, imposters, thieves, and traitors are not victims... but accomplices” -- George Orwell “Fere libenter homines id quod volunt credunt." (The people gladly believe what they wish to.) ~Julius Caesar “Describing the problem is quite different from knowing the solution. Except in politics." ~ OCS
“The key to fighting the craziness of the progressives is to hold them responsible for their actions, not their intentions.” – OCS
"The object in life is not to be on the side of the majority, but to escape finding oneself in the ranks of the insane." -- Marcus Aurelius
“A people that elect corrupt politicians, imposters, thieves, and traitors are not victims... but accomplices” -- George Orwell
“Fere libenter homines id quod volunt credunt." (The people gladly believe what they wish to.) ~Julius Caesar
“Describing the problem is quite different from knowing the solution. Except in politics." ~ OCS