<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>John McAfee &#187; John McAfee</title>
	<atom:link href="http://www.whoismcafee.com/author/dostoevsky/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.whoismcafee.com</link>
	<description>Who is McAfee - The Official Blog of John McAfee</description>
	<lastBuildDate>Thu, 03 Apr 2014 23:00:09 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8.2</generator>
	<item>
		<title>The Prime Minister&#8217;s Directive</title>
		<link>http://www.whoismcafee.com/the-prime-ministers-directive/</link>
		<comments>http://www.whoismcafee.com/the-prime-ministers-directive/#comments</comments>
		<pubDate>Mon, 04 Feb 2013 11:16:26 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfee Files]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=1908</guid>
		<description><![CDATA[&#160; Through a series of clever constitutional changes, The Belizean Prime Minster &#8211; Dean Barrow &#8211; has solidified his power [&#8230;]]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><a href="http://www.whoismcafee.com/wp-content/uploads/2013/02/Fotolia_21144889_XS.jpg"><img class="alignnone" alt="man with beard screws a crown in his head" src="http://www.whoismcafee.com/wp-content/uploads/2013/02/Fotolia_21144889_XS-300x300.jpg" /></a></p>
<p>&nbsp;</p>
<p>Through a series of clever constitutional changes, The Belizean Prime Minster &#8211; Dean Barrow &#8211; has solidified his power as absolute as any dictator. So when he gives an order, it is obeyed, whether within the bounds of law or not.</p>
<p>For example: In mid April last year Barrow told the GSU &#8211; &#8220;Get Arthur Young at all costs&#8221;. Two days later Arthur Young was handcuffed, with his hands behind his back, and was shot and killed by the police.</p>
<p>The Prime Minister has enormous power.</p>
<p>He is also enormously pissed off by my writings and disclosures &#8211; specifically corruption within his cabinet and more specifically my statements that he personally ordered the murder of Arthur Young. Last week, the PM met with the Police Commissioner and the heads of each police department and ordered &#8211; &#8220;Find whatever evidence is necessary to name McAfee as the prime suspect in Gregory Faul&#8217;s murder&#8221;. This is solid, unquestionable information.</p>
<p>Immediately the police began to round up my past employees and hauled them in for interrogation. In Belize, the quickest way to frame someone is to haul in their friends, neighbors or acquaintances and, using various forms of duress, force them to sign statements implicating the person the government wants to frame. It seems that this is going to be their chosen method for getting me.</p>
<p>I anticipate some kind of announcement by the police department soon. I am not worried, but it is annoying.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/the-prime-ministers-directive/feed/</wfw:commentRss>
		<slash:comments>581</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/02/02F690342-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Sam</title>
		<link>http://www.whoismcafee.com/sam/</link>
		<comments>http://www.whoismcafee.com/sam/#comments</comments>
		<pubDate>Sat, 02 Feb 2013 01:21:09 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfee Files]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=1899</guid>
		<description><![CDATA[&#160; Is  with me in an undisclosed location.  She is tired but safe and well. More later. Update: We are [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Is  with me in an undisclosed location.  She is tired but safe and well.</p>
<p>More later.</p>
<p>Update: We are not in the States, but we <strong>are</strong> in a safe, neutral country.<br />
<a href="http://www.whoismcafee.com/wp-content/uploads/2013/02/image-e1359766692704.jpg"><img class="aligncenter size-full wp-image-1897" alt="image" src="http://www.whoismcafee.com/wp-content/uploads/2013/02/image-e1359766692704.jpg" width="560" height="418" /></a></p>
<p>&nbsp;</p>
<p><a href="http://www.whoismcafee.com/wp-content/uploads/2013/02/image1-e1359766994379.jpg"><img class="aligncenter size-full wp-image-1896" alt="image" src="http://www.whoismcafee.com/wp-content/uploads/2013/02/image1-e1359766994379.jpg" width="420" height="560" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/sam/feed/</wfw:commentRss>
		<slash:comments>77</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/02/sgsgsg.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>In Reply to questions</title>
		<link>http://www.whoismcafee.com/in-reply-to-questions/</link>
		<comments>http://www.whoismcafee.com/in-reply-to-questions/#comments</comments>
		<pubDate>Tue, 22 Jan 2013 01:56:57 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfee Files]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=1761</guid>
		<description><![CDATA[Some people have posted inflamatory comments about a couple of subjects that, clearly, they do not have a full understanding [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Some people have posted inflamatory comments about a couple of subjects that, clearly, they do not have a full understanding of.  The first is the exif data (the date, time, type of camera, etc.) attached to many of my photos.  Anyone who has done a photo montage will know that the exif data for the final product will be the exif data for the lowest element of the montage.  Since most of my photos are montages, with a variety of exif data attached to each, the exif data attached to the lowest layer is the data that gets attached to the entire montage.  Frequently I apply a base layer underneath a photo with the top photo having an opacity less than 100% in order to brighten, dim, color or otherwise improve the looks of a photo.  I create the underlayer by photographing a blank wall, a floor or any other uniform body that I deem will give the effects that I want.   I am travelling and shoot whatever is around me that works.  You can try this in Photoshop, for example, and check the exif data of the end product if you doubt any of it. For example, the following two photos have been shown very early on in this blog (last year), and in one, I am obviously still in Belize, since I am with Sam and Amy.  The other was taken in September by Chad when he visited Belize.  Yet the exif data shows January 16th of this year 0n both of them.  This happened because I overlaid the photos on top of two separate photos taken on January 16th by my Sony camera, used 100% opacity &#8211; so that you can compare to see that they are in fact the same photos as those published previously, and then cropped it:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/in-reply-to-questions/example2/" rel="attachment wp-att-1762"><img class="aligncenter  wp-image-1762" alt="example2" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/example2.jpg" width="489" height="363" /></a></p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/in-reply-to-questions/example/" rel="attachment wp-att-1763"><img class="aligncenter  wp-image-1763" alt="Example" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/Example.jpg" width="464" height="308" /></a></p>
<p>Check the exif data (those of you complaining about the exif data) and see for yourselves. I do not like having to explain these things just because some of you are looking for anything &#8211; anything at all &#8211; to prove I am being deceptive.  I am hugely busy and this distracts from my work immensely.  If you want to keep looking for things that I do wrong then please do a little more research into your subject before you jump to conclusions.  There are in fact many of hundreds of reasons why exif data for a given photo is not indicative in any way of the date in which a photo was taken &#8212; not least of which is that any idiot can change the date and time on the camera to any date and time that they choose and then take a picture.  The users chosen date will show up in the exif data.  This is why I ignored your complaints at first. I am not an idiot.  If I wanted to decieve you, I would purposely have changed the camera date, or done any one of a hundred other trivial things to pre-date a current photo.  Could you possibly think that I am unaware of exif data?  I am too busy to waste time in deception.  I do what I do, if you don&#8217;t like the exif data, then at least give me the benefit of the doubt by considering the limitless possibilities why the data is not the data you wanted.  It is too time consuming to satisfy those few of you who insist on trying trying to find holes.  From the majority remainder of you, please ignore this rant. The second issue is Amy&#8217;s description of the brown powder I was making.  Please read my extremely detailed Bluelight discussion early on in this blog.  If you read the actual Bluelight posts, you will see hundreds of photos that I submitted about making this impossibly mythical drug &#8211; Tan-MDPV.  I obviously had to do something to create authentic looking substances.  The following blog question and my answer should suffice for all of you. <em>Read the Bluelight post!!!! There were hundreds of photos I posted of the “impossible” process. Where was I going to get the photos????? I did them myself. Amy helped me. There were brown substances, white substances, clear substances, cloudy substances. Burnt baking soda – Acetone and sugar from the lab – dozens of substances to make it look real. Amy is bright but clueless. I always told her the stuff was poison (most probably was) and not to put them in her mouth (which she did with almost everything – like a two year old). How can you talk about something (Bluelight) when you have never read the full posting on Bluelight (400 pages)? If you want to post any more negative stuff about something you have never read, seen, or know nothing about, then at least read it first.</em> <em>So no, I have nothing more to add. There is nothing to add, and there is not now, nor has there ever been, a discrepancy.</em> The third item is the comments about the capacity of the recording devices that were used.  It is not rocket science.  The replacement of an ultra-cheap Chinese battery with a high capacity lithium battery (plenty of vacant room in these devices) and the replacement of a 2 gig micro SD card with a 32 gig micro SD card (which a mentally impaired six year old could do) does wonders to the amount a time a device will record.  Two of the devices supported 64 gig cards.  Software glitches limited the remainder to 32 gigs.  There are many other modifications that we made that I did not, and will not, tell you about.  But, again, a small child could quickly look and any one of these devices and make a dozen simple changes that would improve the device by an order of magnitude in ten minutes and for a cost of less than $30.  Please, naysayers, use your heads. Again, I am sorry for my testiness, but a tiny fraction of followers here create 95% of the problems, and 95% of my work, by trying to create issues over absolute nonsense, or try to incessantly resurrect  issues that have been put to bed many times.  These users are either doing this out of malice or out of ignorance.  Anyone who had read the Bluelight posts on the Bluelight board would not ask the questions that have been asked.  Anyone who knew anything at all about exif data knows that the data is absolutely meaningless if someone wants a different date, time or location.  If you few folks are not doing this maliciously, then please use your head and think a little before you post inflamatory statements.  If you are doing it maliciously, your I.P. address will eventually be banned. Thank you. P.S.  A plug for the upcoming movie: <strong><a href="http://www.impfm.com/pdetail/john-mcafee-official-story/" target="_blank">IMPACT FUTURE MEDIA</a></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/in-reply-to-questions/feed/</wfw:commentRss>
		<slash:comments>209</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/qanda-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>The Girls &#8211; Part Two</title>
		<link>http://www.whoismcafee.com/the-girls-part-two/</link>
		<comments>http://www.whoismcafee.com/the-girls-part-two/#comments</comments>
		<pubDate>Thu, 17 Jan 2013 21:16:49 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfee Files]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=1669</guid>
		<description><![CDATA[&#160; This part two post will itself have to be divided into two parts.  It turned out much larger than [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/nicky/" rel="attachment wp-att-1676"><img class="aligncenter  wp-image-1676" alt="Nicky" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/Nicky.jpg" width="560" height="373" /></a></p>
<p>This part two post will itself have to be divided into two parts.  It turned out much larger than I thought</p>
<p>The photo above is of one of the American women working both in Miami and in Belize.  Frequently government ministers and officials flew to Miami (two hours from Belize City) for business, pleasure, parties or what have you.  I needed resources in Miami to keep tabs on targets.  Nicky is prepping a few computers for delivery to &#8220;friends&#8221; of hers in Belize.  She told all of her targets that she had a friend in the computer sales business and that the friend could provide computers for $100 each.  Even government officials like a good deal so the computers were easy to place.</p>
<p>Before I get into how the girls worked, you will need a brief overview of the principles of Social Engineering.  These principles have been used successfully for thousands of years:</p>
<p><strong>Attention</strong></p>
<p>Attention, in repetitive situations, wanders.  Universally.  It seeks environments and situations offering diversity.</p>
<p>Fear, lust, curiosity and pleasure seeking trap attention.  Boredom frees it.</p>
<p>When attention is gained, a person is open to motivation.</p>
<p>A good social engineer must know how to get a person’s attention and keep it.</p>
<p><strong> </strong></p>
<p><strong>Curiosity</strong></p>
<p>Most people are curious about anything new, anything out of place or strange, or anything that stands out from the background.  Many people will go out of their way to check out an object that catches their attention.</p>
<p>A good social engineer will use a person’s curiosity as one means of getting their attention.</p>
<p>&nbsp;</p>
<p><strong>Preconception and belief</strong></p>
<p>A person’s prior beliefs will color any new information received by the person.</p>
<p>Knowing a person’s preconceptions allows us to predict, to a larger or lesser degree, a person’s behavior in reaction to an event or situation.</p>
<p>A good social engineer creates situations in which the subject’s behavior can be predicted.</p>
<p>&nbsp;</p>
<p><strong>Fear</strong></p>
<p>Fear is the most powerful social motivator.  Creating fear in someone’s mind generally produces immediate results.  It is the easiest social motivator to implement.</p>
<p>A good social engineer discovers the things that the subject fears most and plays on those things in order to control behavior.</p>
<p>&nbsp;</p>
<p><strong>Lust</strong></p>
<p>Lust is another powerful motivator, but its overt actions are not as immediate as actions inspired by fear.  Lust does, however, cause immediate, and hopeful, planning in the brain.</p>
<p>A good social engineer observes a subject’s behavior relating to sexual issues and inserts the necessary elements into the subject’s environment to assist the subject in planning to assuage lust.</p>
<p>&nbsp;</p>
<p><strong>Greed</strong></p>
<p>No matter how much a person owns of a valuable commodity, the person generally wants more of that commodity (money, houses, cars, etc.), unless the commodity has become a financial, emotional or physical burden.</p>
<p>A good social engineer discovers those things that the subject deems of value and mentally assists the subject in his or her desires.</p>
<p>&nbsp;</p>
<p><strong>Pleasure seeking</strong></p>
<p>&nbsp;</p>
<p>Humans seek pleasurable situations.  Pure and simple.</p>
<p>A good social engineer never forgets this.</p>
<p>&nbsp;</p>
<p><strong>Trust</strong></p>
<p>Any display of trust from a given person elicits a reciprocal sense of trust.  For example: Sharing a secret with someone is an indication of trust in that person and generally motivates the revealing of a reciprocal secret.  Asking someone to hold your money or something valuable is another indication that you trust someone and will help make the person believe that they can trust you.</p>
<p>Carefully listening to someone creates trust within the person doing the talking.</p>
<p>Being helpful to someone elicits a sense of trust within that person.</p>
<p>Flattery and admiration frequently elicit trust.</p>
<p>Smiles elicit trust.</p>
<p>Friendly gestures elicit trust</p>
<p>The more time spent with a person, the more trust is generally gained.</p>
<p>When trust is created, a person is open to motivation.</p>
<p>A good social engineer will, as the first step in contact with the subject, attempt to elicit trust.</p>
<p>&nbsp;</p>
<p><strong> Comfort</strong></p>
<p>In a choice involving no physical or emotional reward, people generally choose the most comfortable option.</p>
<p>Discomfort motivates action.</p>
<p>Fear, boredom and unrequited lust quickly create discomfort in a subject.  A good social engineer creates situations that allow the subject to escape discomfort.</p>
<p>&nbsp;</p>
<p><strong>Boredom</strong></p>
<p>Boredom attenuates fear and accentuates curiosity, greed, pleasure seeking and lust.</p>
<p>Boredom is fertile ground for planting new ideas (an idle mind is the Devil’s playground).</p>
<p>In a boring situation, attention is directed toward potential excitement.</p>
<p>A good social engineer will be adept at recognizing boredom.</p>
<p>&nbsp;</p>
<p><strong> Adherence to moral norms</strong></p>
<p>Given the desire, the right opportunity (and potential partner) and the assurance of being undetected, many men will stray.   Many women will too.</p>
<p>The majority of people will lie in situations in which telling the truth will negatively and severely impact their lives, providing that they believe the lie will not be caught.</p>
<p>Few people will outright steal.  The exceptions are items of perceived very low value (a pencil for example), items of perceived extremely high value involving no risk of detection, and thefts that can be morally justified (a bag of hundred dollar bills sitting on a sidewalk for example).</p>
<p>A large percentage of people will participate in financial cheating if they are dealing with a stranger, are not in the company of friends, and if fear of detection is low.  If given too much change when purchasing an item, for example, half of the people will pocket the change without alerting the sales person.</p>
<p>Moral justifications free people to do immoral things.</p>
<p>A good social engineer is aware of these things and uses the knowledge accordingly – most specifically in helping the subject to find moral justifications for actions deemed necessary to the operation.</p>
<p>&nbsp;</p>
<p><strong> Adherence to social customs</strong></p>
<p>In the absence of social chaos (a nuclear bomb strike, for example), civilized people will generally adhere to the day-to-day customs that make life tolerable.  For example:</p>
<p>An item of little value left in someone’s office, or on someone’s desk, will, generally, remain untouched and will be freely returned if the owner asks for it.</p>
<p>An item of clothing left on a table or the seat of a booth will generally prevent someone else from sitting at that table or booth.</p>
<p>Even a stranger will seldom decline a favor requiring no effort or cost.</p>
<p>Providing assistance to someone in obvious need will seldom be declined if the person assisting is not placed in a position of fear or discomfort.</p>
<p>Even a stranger who is approached in a friendly manner will generally pause what they are doing and respond to the person approaching.</p>
<p>A good social engineer uses social customs in all aspects of the work.</p>
<p>__________________________________________________</p>
<p><strong>Tools of the Trade</strong></p>
<p>In addition to the computer element of the network, each girl was trained in using a variety of surveillance tools:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/pen/" rel="attachment wp-att-1678"><img class="aligncenter  wp-image-1678" alt="pen" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/pen.jpg" width="560" height="378" /></a></p>
<p>This pen has a pinhole video camera and a microphone.  It will pickup conversations as far as 20 feet away.  It can be left on someone&#8217;s desk, in a chair. on a shelf &#8211; anywhere that is convenient.  Collecting it later is simple.  &#8220;I forgot my pen, is it still here?&#8221;</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/alarm-clock/" rel="attachment wp-att-1670"><img class="aligncenter  wp-image-1670" alt="alarm clock" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/alarm-clock.jpg" width="560" height="373" /></a></p>
<p>This travel alarm clock contains a video camera and microphone.  It can be placed beside the bed, facing the bed, and will record &#8211; in low light &#8211; everything.  The resulting videos are useful in gaining co-operation from unco-operative subjects, as well as documenting any phone calls made during the session.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/car-keys/" rel="attachment wp-att-1671"><img class="aligncenter  wp-image-1671" alt="car keys" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/car-keys.jpg" width="560" height="400" /></a></p>
<p>This fake auto remote control contains a camera and microphone.  It can be left anywhere and will record non-stop for 24 hours.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/glasses/" rel="attachment wp-att-1672"><img class="aligncenter  wp-image-1672" alt="glasses" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/glasses.jpg" width="560" height="373" /></a></p>
<p>These polarized sunglasses will record everything that the wearer looks at, with audio.  Their potential applications are obvious.  They are activated by pussing the logo on the side.  It is actually a button.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/mp3-player/" rel="attachment wp-att-1675"><img class="aligncenter  wp-image-1675" alt="mp3 player" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/mp3-player.jpg" width="560" height="373" /></a></p>
<p>This MP3 player looks and acts like any MP3 player.  it has a video camera and an audio recorder.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/watch/" rel="attachment wp-att-1679"><img class="aligncenter  wp-image-1679" alt="watch" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/watch.jpg" width="560" height="373" /></a></p>
<p style="text-align: center;">This waterproof wristwatch contains a video camera with audio.  It is activated by a button on the side.  It will only record a total of one hour, but it is useful in recording events on boats, in water, etc.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/mini-recorder-2/" rel="attachment wp-att-1696"><img class="aligncenter  wp-image-1696" alt="mini-recorder" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/mini-recorder1.jpg" width="560" height="840" /></a></p>
<p style="text-align: center;">This mini recorder will record many days of video and  audio.  I can be inserted into anything.  We purchased these recorders by the hundreds:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/hundreds/" rel="attachment wp-att-1698"><img class="aligncenter  wp-image-1698" alt="hundreds" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/hundreds.jpg" width="560" height="373" /></a></p>
<p style="text-align: center;">Here is Nicky wearing the video sunglasses and holding her two favorite items:</p>
<p style="text-align: center;"> <a href="http://www.whoismcafee.com/the-girls-part-two/nicky2-3/" rel="attachment wp-att-1693"><img class="aligncenter  wp-image-1693" alt="nicky2" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/nicky2.png" width="560" height="739" /></a></p>
<p>The second half of part two is coming.  Sorry it&#8217;s so long.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/the-girls-part-two/feed/</wfw:commentRss>
		<slash:comments>235</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/partdeux-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>The Girls</title>
		<link>http://www.whoismcafee.com/the-girls/</link>
		<comments>http://www.whoismcafee.com/the-girls/#comments</comments>
		<pubDate>Mon, 14 Jan 2013 03:37:55 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfee Files]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=1609</guid>
		<description><![CDATA[&#160; I thought I would do a brief introduction to some of the the girls who, by and large lived [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1a/" rel="attachment wp-att-1610"><img class="aligncenter  wp-image-1610" alt="port-1a" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1a-e1358132275742.jpg" width="560" height="416" /></a></p>
<p>I thought I would do a brief introduction to some of the the girls who, by and large lived with me full time.  Without the assistance of these girls, It would have taken years to prime the socially engineered system that I put into place in Belize.  Sam was central in helping me manage and control the network.  She got along with all of the girls and her superior intelligence and quick wit usually allowed her to anticipate problems and head them off before we reached the danger point.  She is alo like a chameleon:  She can look and act any part:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1b/" rel="attachment wp-att-1611"><img class="aligncenter  wp-image-1611" alt="port-1b" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1b-e1358132658843.jpg" width="560" height="315" /></a></p>
<p>I teamed her up with other girls many times &#8211; usually when I sensed a problem brewing.  Her playful nature generally diffused any tensions:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1c/" rel="attachment wp-att-1612"><img class="aligncenter  wp-image-1612" alt="port-1c" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1c-e1358132909606.jpg" width="560" height="374" /></a></p>
<p>Amy is more experienced than Sam, but not as tolerant of human nature and people&#8217;s mistakes as Sam is.  But she is incredibly smart.  The three of us &#8211; Me, Sam and Amy were the central core (Amy and Sam are now safely hidden out of the country, by the way &#8211; their visas are pending):</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1d/" rel="attachment wp-att-1613"><img class="aligncenter  wp-image-1613" alt="port-1d" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1d-e1358133085500.jpg" width="560" height="374" /></a></p>
<p>Other girls came and went &#8211; sometimes staying a month, sometimes 4 or five months.  Angie came and went a number of times:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1f/" rel="attachment wp-att-1614"><img class="aligncenter  wp-image-1614" alt="port-1f" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1f-e1358133372941.jpg" width="560" height="314" /></a></p>
<p>So did Marcia:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1h/" rel="attachment wp-att-1615"><img class="aligncenter  wp-image-1615" alt="port-1h" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1h-e1358133454806.jpg" width="560" height="746" /></a></p>
<p>Others were transient, staying a few weeks at a time and then returning to the field:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1m/" rel="attachment wp-att-1618"><img class="aligncenter  wp-image-1618" alt="port-1m" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1m-e1358133582524.jpg" width="560" height="315" /></a></p>
<p>&nbsp;</p>
<p>I encouraged all of the girls to hang out together and become friends, where possible.  It was easier to keep tabs on someone&#8217;s actions if others were watching, or if a shared comaraderie encouraged the sharing of intimate secrets.  All the girls told me the other girls&#8217; secrets.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1i/" rel="attachment wp-att-1616"><img class="aligncenter  wp-image-1616" alt="port-1i" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1i-e1358133678788.jpg" width="560" height="420" /></a></p>
<p>Paz was instrumental in helping me find appropriate assets:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1j/" rel="attachment wp-att-1617"><img class="aligncenter  wp-image-1617" alt="port-1j" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1j-e1358134109836.jpg" width="560" height="374" /></a></p>
<p>Paz owns Lover&#8217;s Bar in Orange Walk and is known throughout Belize as a master at locating human resources.  I would tell Paz the specifications: level of intelligence, education, cultural refinement, family connection, age, looks, experience, etc., and Paz would locate for me.  I would then feel the person out, and if comfortable, explain the project and hire them.</p>
<p>This is the briefest of introductions.  I will soon go into details about how each girl worked.  Many knew everything.  Some were told nothing and simply given a free computer and sometimes a phone.  Sometimes more than one, if a father, brother, cousin or boyfriend was of interest to us.</p>
<p>Of note is that over 80% of our electronic network is still operable and providing constant information.  My next post will explain, with photos and voice files, how we avoided detection for so long.  On October 11th of last year it was discovered that we were accessing secret government information, but until my January 3rd post, no-one within the government had any idea how we were doing it.  Most of our &#8220;donated&#8221; government computers have since been brought down, but the domino principal of viral social engineering had allowed us to infiltrate five times as many &#8220;unknown&#8221; computers as the number that we donated, and the number is growing.</p>
<p>The core seven:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-end/" rel="attachment wp-att-1624"><img class="aligncenter  wp-image-1624" alt="port-end" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-end-e1358134642110.jpg" width="560" height="374" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/the-girls/feed/</wfw:commentRss>
		<slash:comments>127</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/thegirls-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>The GSU Escalates Its Violence</title>
		<link>http://www.whoismcafee.com/the-gsu-escalates-its-violence/</link>
		<comments>http://www.whoismcafee.com/the-gsu-escalates-its-violence/#comments</comments>
		<pubDate>Fri, 11 Jan 2013 06:03:28 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfee Files]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=1576</guid>
		<description><![CDATA[&#160; I received the following email today from Pedro Castellanos, a representative of a group of Latin American holders of [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>I received the following email today from Pedro Castellanos, a representative of a group of Latin American holders of the defaulted Belizean Superbond.  Belizean bond holders have lost hundreds of millions of dollars over the past year due to Prime Minister Dean Barrow&#8217;s default:</p>
<p><em>Dear Mr. Mcafee, I represent a group of Belize 2029 bondholders from Latin America who are not satisfied with the bond negotiations taking place between Dean Barrow and the bondholders&#8217; coordinating committee. Some of us have traveled to Belize and even have friends and family members living there and know how dangerous a country it has become under the Barrow administration. We want Barrow and the UDP out of office forever, so we decided to contact you.</em></p>
<p><em>We were shocked by the recent events that took place in Belize City. Here is a Youtube video of the GSU acting like a death squad a few days ago, in case you didn&#8217;t watch it: </em></p>
<p><em>BELIZE&#8217;S GSU IS CENTRAL AMERICA&#8217;S NEWEST DEATH SQUAD</em></p>
<p><iframe src="http://www.youtube.com/embed/Zimr6rSWzYQ" height="315" width="560" allowfullscreen="" frameborder="0"></iframe></p>
<p><em>I know of your deep dissatisfaction with the Barrow administration, which is exactly how we feel about Barrow and the debt default. </em></p>
<p><em>We don&#8217;t want the bond committee to close a debt deal with Dean Barrow for a number of reasons:</em></p>
<p><em>1. We don&#8217;t want Barrow to take credit for closing a successful bond exchange.</em></p>
<p><em>2. We don&#8217;t want the UDP to win a third term in office. A successful debt exchange could help them achieve this goal.</em></p>
<p><em>3. We strongly oppose Barrow&#8217;s nationalizations of Telemedia and BEL.</em></p>
<p><em>4. Most importantly, we believe that a third term for the UDP would be the nail in the coffin for Belize. Such a beautiful country totally destroyed by Dean Barrow and the UDP.</em></p>
<div id="yui_3_7_2_1_1357860570681_13523"><em>From your posts and interviews, we know you share many of our views. We also know that you are an extremely smart person so we decided to seek your help in preventing Barrow from closing the debt deal. We believe that a failed bond exchange would cause GREAT harm to Barrow and the UDP, and that it would politically cripple them.</em></div>
<div id="yui_3_7_2_1_1357860570681_13522"><em> </em></div>
<div id="yui_3_7_2_1_1357860570681_13521">
<p><em>Barrow is already on the hook for announcing a successful debt deal (please read his Christmas and New Year&#8217;s speeches), when the larger AdHoc members of the commitee have NOT agreed to a debt deal. Just the coordinating committee has agreed, and is finding it difficult to convince the AdHoc members. A minimum of 75% of the bonds have to agree, otherwise it fails.</em></p>
<p><em>If this idea interests you, please contact me at this email address. </em></p>
</div>
<div id="yui_3_7_2_1_1357860570681_13520"><em>By the way, we admire very much how you handled your Belize experience.</em></div>
<div id="yui_3_7_2_1_1357860570681_13519"><em> </em></div>
<div id="yui_3_7_2_1_1357860570681_13517">
<p><em>Best regards,</em></p>
<p><em>Pedro</em></p>
</div>
<div id="yui_3_7_2_1_1357860570681_13541"></div>
<div>I have responded to Mr. Castellanos and have agreed to fully support their initiative.  Please view the enclosed video of the current situation in Belize.  If anyone doubted my take on the safety of the country, this should dispel those doubts.</div>
<div></div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h4 style="text-align: center;">7  News Belize &#8211; Cruise Ships Cancel Calls</h4>
<p style="text-align: center;"><a href="http://www.7newsbelize.com/sstory.php?nid=24405">http://www.7newsbelize.com/sstory.php?nid=24405</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="http://www.whoismcafee.com/the-gsu-escalates-its-violence/warning/" rel="attachment wp-att-1582"><img class="aligncenter size-full wp-image-1582" alt="warning" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/warning.jpg" width="316" height="491" /></a></p>
<p style="text-align: center;">( Long version: story starts at 5:40 &#8211; Graphic imagery warning )</p>
<p style="text-align: center;">[ylwm_vimeo]57034146[/ylwm_vimeo]</p>
<h4 style="text-align: center;"><span> </span></h4>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div></div>
<div></div>
<div></div>
<div></div>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/the-gsu-escalates-its-violence/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/belize-flag-296x213.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>A Clear And Present Danger</title>
		<link>http://www.whoismcafee.com/a-clear-and-present-danger/</link>
		<comments>http://www.whoismcafee.com/a-clear-and-present-danger/#comments</comments>
		<pubDate>Thu, 03 Jan 2013 08:05:21 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfee Files]]></category>
		<category><![CDATA[Belize enters the world of terrorism]]></category>
		<category><![CDATA[castor beans]]></category>
		<category><![CDATA[cyanide]]></category>
		<category><![CDATA[hezbollah in belize]]></category>
		<category><![CDATA[john mcafee belize]]></category>
		<category><![CDATA[Ricin]]></category>
		<category><![CDATA[terrorism in belize]]></category>
		<category><![CDATA[zeta cartel]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=1466</guid>
		<description><![CDATA[&#160; After the April raid on my property in Orange Walk I went on the offensive.  I had asked for [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>After the April raid on my property in Orange Walk I went on the offensive.  I had asked for a simple apology and had received none.  I was pissed.  They had shot my dog, destroyed my property and stolen hundreds of thousands of dollars worth of things that I valued.  They have still not been returned.</p>
<p>I purchased <a href="http://www.whoismcafee.com/wp-content/uploads/2012/11/corruption4-31.jpg" target="_blank">75 cheap laptop computers </a>and, with trusted help, installed invisible keystroke logging software on all of them – the kind that calls home (to me) and disgorges the text files.  It also, on command, turns on, and off, the microphone and camera – and sends these files on command.  I had the computers re-packaged as if new.  I began giving these away as presents to select people – government employees, police officers, Cabinet Minister’s assistants, girlfriends of powerful men, boyfriends of powerful women.  I hired four trusted people full time to monitor the text files and provide myself with the subsequent passwords for everyone’s email, Facebook, private message boards and other passworded accounts.  The keystroke monitoring continued after password collection, in order to document text input that would later be deleted.  So nothing was missed&#8230;</p>
<p>I next collected my human resources for the complex social engineering I would have to do.  I arranged with 23 women and 6 men to be my operatives.  Eight of the women were so accomplished that they ended up living with me.  It was amazingly more efficient and they were easily convinced to check up on each other.  One was so accomplished (Marcia) that she became a double agent and nearly got me killed:</p>
<p>&nbsp;</p>
<h4><a href="http://www.whoismcafee.com/third-file-post/" target="_blank">story from  post3</a>   and  <a href="http://www.whoismcafee.com/file-post-4/" target="_blank">story from post4</a></h4>
<p>&nbsp;</p>
<p>These men and women were given simple training on how to access and load software on someone’s computer while they slept, or ate or made long phone calls etc.  It’s dead simple if you’re sleeping with someone – “Hey Babe, can I borrow your computer to check my email?” – A little more complex if you’re not – but not much.  They were also shown dirt simple phone tricks, like borrowing a person’s phone to make a call and then resetting auto-delete of sent texts.  No-one ever checks these things after setup, so all the sent texts are now available to the person borrowing your phone to call their boyfriend to make up a story so they can sleep over with you.  Due to the nature of the call, the operative clearly needed privacy during the call – hence ease of access to changing your settings and reading your sent texts</p>
<p>And I taught them other tricks.</p>
<p>When my teams were assembled, I targeted the two National phone companies for engineering.  It was imperative for me to be able to hear people’s phone conversations, or at the very least to know with whom they were in contact.  This social engineering exercise was the easiest.  I used myself as the decoy in this operation.</p>
<p>I approached numerous employees of both companies with the offer to buy the information that I needed.  I knew this would raise flags and lead to failure.  I did this in a manner that would not get me arrested but would ensure that my enquiries reached the appropriate ears – ears belonging to people who definitely did not want me to learn anything.   People then knew I was after information and, as they would naturally think, I would use “buying” as my technique.  Both companies eventually gave me information, which I purchased, but it was, as expected, garbage.  While I was negotiating all of this, my team was <em>working</em> its way through the lower ranks of Phone Company employees and had locked onto a number of key players who had access to the technical processes involved in tapping phones and delivering lists of phone contacts.  The team had contact information for appropriate wives and husband of these key players, knew the names of the employees’ drug providers (if any), names of respectable family members, and names of all the other “side interests” of the targets.  Being “pillow talk” masters, they also knew, and had verified, every secret thing the persons had ever done.  Phone Project complete.</p>
<p>Simultaneously with the above, I had identified key “helpers” for each Government Minister and had sent in social engineers to stroke the helpers.  Each was armed with software, presents, a story, a seductive smile and a small voice recorder.  Everyone had at least one voice recorder.  They were small.  They could be hidden under a bed, behind a piece of artwork, inside a pillow, in an old shoe.  They could be kept on, recording, for days on end prior to retrieval.</p>
<p>Throughout this process I emailed the Prime Minister every few weeks and asked for an apology.  A simple apology, in the early stages at least, would have stopped this whole affair.  I received none.</p>
<p>What I was looking for was hard proof of corruption at a high level.  I’m not sure what I expected to gain.  The satisfaction of revenge perhaps &#8211; to some extent – what little satisfaction there is in revenge.  As a way to get my stuff back?  Maybe.  For the sheer joy of muscle flexing?  I can’t answer precisely.  Much of my life is a mystery to me.  Suffice it to say:  I just did it because I could.</p>
<p>What I found was, for the most part, expected &#8212; Uncountable numbers of sexual affairs &#8212; Embarrassingly lurid and intimate chats &#8212; Multiple, simultaneous protestations of love, and jealousy and anger.</p>
<p>Some things were surprising.  I kept sending increasingly irresistible women in the direction of the UDP Party Chairman, to absolutely no avail.  Finally, a clever but unsuccessful young woman suggested an alternate chromosome configuration and – success at last.  It was a surprise to me, given the macho nature of the Chairman.</p>
<p>I was also surprised that the Prime Minister had personally ordered the murder of Arthur Young.  I had assumed that the idea came from much lower in the ranks.  But other than these few and other not so remarkable bits of information, things fell pretty much into the order that I had anticipated.  There were a few exceptions.  This one comes to mind, and it proved to be central to an issue I had anticipated:</p>
<p>While monitoring a young woman working in the Ministry of Immigration, whose Facebook chats had always been exclusively in Creole, the following popped up:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/mmd/" rel="attachment wp-att-1467"><img class="aligncenter  wp-image-1467" alt="mmd" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/mmd.jpg" width="576" height="97" /></a></p>
<p>&nbsp;</p>
<p>She was chatting on Facebook at the time with another young woman who had a limited education.  This occurred in late May.  The person monitoring the computer keystrokes forwarded it to me.  I sent a command to the system to activate the camera every 10 minutes and send me still shots.  After two days of monitoring nothing showed up other than the woman’s face that used the computer.  I managed to compromise the computer used by the friend she was chatting with and activated both the camera and the microphone on her system, but again, nothing showed up. I finally sent in a human resource.  More on this later.</p>
<p>I had early on documented heavy human trafficking as part of the National Security and Immigration Ministries’ activities.  This was hardly news, however.  All over Belize are huge billboards pleading for the cessation of human trafficking, much as billboards in America used to beg us not to drink and drive.  Everyone knew it was happening – obviously.  The billboards weren’t for nothing.  So my discoveries were uninteresting old news.</p>
<p>However, in the Belizean catchall “human trafficking” was an interesting statistic that I uncovered:  Nearly 25% were Lebanese, and all of these were male.   The entry passports for these Lebanese varied – Jordanian, Afghani, Saudi Arabia – but they nearly all spoke Lebanese Arabic.  The Lebanese were handled differently.  A false identity was created using a deceased Belizean with an appropriate English or European sounding name.  For example:</p>
<p>&nbsp;</p>
<h4><a href="http://edition.channel5belize.com/archives/75785" target="_blank"><span style="font-family: Times New Roman;"><span><strong>Who helped Hezbollah terrorist get Belizean passport&amp;IDs</strong></span></span></a></h4>
<p>&nbsp;</p>
<p>After the false Identity was created a passport was issued (this, by law, takes five years of residency, but remember, this whole thing was created and run by the Government – so sidestepping the law is trivial).  After the passport was issued, a handler was assigned to help the person exit Belize safely and arrive in America safely (safe for them that is.  Not so safe for America).  This was accomplished by turning the person in question over to a different, sequential set of handlers along the way.  The Architect of this process is John Saldivar – Minister of National Security, and for a while, Minister of Immigration as well.</p>
<p>I had located an individual working in Immigration that was trustworthy and willing to talk.  I discovered that an average of eleven Lebanese males were given new identities each month.  One month there were sixteen:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/16-lebanese/" rel="attachment wp-att-1468"><img class="aligncenter  wp-image-1468" alt="16 lebanese" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/16-lebanese.jpg" width="576" height="261" /></a></p>
<p>I have redacted the original, and new names, for obvious reasons.</p>
<p>The human resource I sent to check on the odd sequence of texts from late may reported a surprising piece of information:  A young gentleman named Farid had taken up with the woman from Immigration whose computer he used (this is a different woman from the one who sent me monthly statistics).  My resource, being more clever than the average Belizean young woman, quickly snaked Farid for herself.  Early on I received this email from her:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/fareed-email/" rel="attachment wp-att-1469"><img class="aligncenter  wp-image-1469" alt="Fareed email" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/Fareed-email.jpg" width="576" height="167" /></a></p>
<p>&nbsp;</p>
<p>Her subsequent phone call was enlightening.  We have disguised her voice:</p>
<p><iframe src="http://www.youtube.com/embed/ITF_OU2NqVM" height="315" width="420" allowfullscreen="" frameborder="0"></iframe></p>
<p>Something was clearly happening that was not good.  The following voice recording of a discussion with a well placed Belizean official details most aspects of the Iranian new identity process.  We have disguised the person’s voice for obvious reasons:</p>
<p><iframe src="http://www.youtube.com/embed/MSO2KTepKDk" height="315" width="420" allowfullscreen="" frameborder="0"></iframe></p>
<p>Belize is clearly the central player in a larger network whose goal is to infiltrate the U.S. with individuals having links to terrorist organizations.   What is different today from the wholesale Belizean passport selling of ten years ago, is that the false citizenships that are created for these men are coupled with a network of handlers designed to move the individuals, and their cargo, into the U.S.</p>
<p>The replacement resource that I sent to keep Farid company (someone capable of sidestepping Farid’s cruelty) emailed me many times concerning Farid’s vocal anger toward America.  In one email she provided two crucialpieces of information that made things come into focus:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/hezbollah-castor/" rel="attachment wp-att-1470"><img class="aligncenter  wp-image-1470" alt="hezbollah castor" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/hezbollah-castor.jpg" width="576" height="317" /></a></p>
<p>The Belizean official in the prior voice recording was either unaware of the Nicaraguan connection or, more likely, was afraid to divulge it.   Here’s what the world seems to know so far:</p>
<p>There may be a Hezbollah camp in Nicaragua, but no-one seems to know what they are doing at the camp:</p>
<h4><a href="http://www.timesofisrael.com/iran-hezbollah-establish-training-base-in-nicaragua/" target="_blank">Hezbollah establish training base in Nicaragua</a></h4>
<p>&nbsp;</p>
<p>Hezbollah has created ties with the Mexican Drug Cartels – specifically the Zetas:</p>
<p>&nbsp;</p>
<h4><a href="http://articles.businessinsider.com/2011-07-14/politics/30060540_1_islamic-militants-hezbollah-cartels" target="_blank">Hezbollah Hooks Up With Mexican Drug Cartels</a></h4>
<h3></h3>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><a href="http://www.eurasiareview.com/24122012-new-concerns-for-president-pena-nieto-hezbollahs-rising-profile-in-mexico-analysis/" target="_blank">Hezbollah’s Rising Profile In Mexico</a></h3>
<p>&nbsp;</p>
<p>Everyone seems to think that Hezbollah’s intent is to gain riches through additional drug trafficking.  But drug trafficking is not Hezbollah’s intent, as the above reports imply.  Hezbollah is using the Zeta drug transportation network to transport something similar, in weight and size, to the drugs that the Zetas know so well how to slip into the States.  In return, Hezbollah is providing know-how to the Zetas in advanced weaponry.</p>
<p>The diplomatic world (the State Department) clearly knows that Belize is the architect of the current threat to America’s security:</p>
<p>&nbsp;</p>
<h3><a href="http://raficlabboun.blogspot.ca/2012/09/wikileaks-from-us-embassy-in-belize.html" target="_blank">Wikileaks from U.S. Embassy in Belize </a></h3>
<h3></h3>
<p>&nbsp;</p>
<h3></h3>
<h3><a href="http://www.reporter.bz/front-page/hezbollah-terrorist-with-belizean-passports/" target="_blank">Hezbollah terrorist with Belizean passports</a></h3>
<p>&nbsp;</p>
<p>but the State Department either does not understand the depth of the threat or for some bizarre reason does not want anyone to know the depth of the threat.  In fact, they don’t even want people to know that Belize is sending terrorist into America at all.  All official reports claim that the passports that people have been caught with are in fact forgeries and that the Government of Belize is not involved in creating false identities.  Unfortunately, they are. And the threat is of an enormous magnitude.  The substance being created in Nicaragua is being created by the ton.</p>
<p>I know all of this because I reassigned resources and for the past three months have had two people in Nicaragua that have made connections with the Hezbollah camp and I have three people in Mexico who have made connections with mid-level Zeta members.  I will release no information at this point that will implicate these five people.  Both the Hezbollah camp members and the Zeta organization, combined, have thousands of female connections.  This small post will implicate no one.</p>
<p>Anyone who is truly interested in deeper process of what is happening can infer the truth from the information provided in this post.  I have provided everything you need.</p>
<p>Belize is still a pirate haven.  The stakes have just increased a few orders of magnitude.  The current government represents a threat of enormous proportions.</p>
<p>My subsequent posts will expand on different aspects of the above as it becomes safe to do so.  In the meantime, I am taking a well-earned vacation into the heartland of the Midwest.  I blend well with the ranchers and cowboys that I lived amongst for so many years.  They are a sympathetic lot.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/john2/" rel="attachment wp-att-1471"><img class="aligncenter  wp-image-1471" alt="john2" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/john2.jpg" width="459" height="578" /></a></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/a-clear-and-present-danger/feed/</wfw:commentRss>
		<slash:comments>179</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/belize-vacations-296x213.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>The Escape &#8211; Part One</title>
		<link>http://www.whoismcafee.com/the-escape-part-one/</link>
		<comments>http://www.whoismcafee.com/the-escape-part-one/#comments</comments>
		<pubDate>Wed, 26 Dec 2012 13:35:36 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfee Files]]></category>
		<category><![CDATA[john mcafee escape from belize]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=1423</guid>
		<description><![CDATA[&#160; It’s Christmas day and I’m taking a break from the seriousness of my upcoming January 3rd post.  I thought [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>It’s Christmas day and I’m taking a break from the seriousness of my upcoming January 3<sup>rd</sup> post.  I thought I might post the picture story of the first half of Sam’s and my escape from Belize and my eventual arrival in the States.  It’s visually interesting and it is mostly a happy story – in line with most Christmas stories.</p>
<p>I’ll start with our arrival, undercover, in Belize City a few days prior to our departure on our exit adventure.  We had been in hiding for a couple of weeks, living in less than desirable conditions.  Sam was eaten alive by bugs and was happy to reach a place with hot water and comfort, as was I:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-bites/" rel="attachment wp-att-1424"><img class="aligncenter  wp-image-1424" alt="sam bites" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-bites.jpg" width="510" height="766" /></a></p>
<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-folding/" rel="attachment wp-att-1425"><img class="aligncenter  wp-image-1425" alt="sam folding" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-folding.jpg" width="511" height="766" /></a></p>
<p>&nbsp;</p>
<p>Our plan was simple:</p>
<p>Multiple checkpoints had been set up along every highway exiting Belize and all of the border crossings and seaports had been beefed up with police and Belize Defense Force personnel.   Air travel was impossible since the few existing airports had beefed up security staff armed with our photos and names.</p>
<p>I chose a few very simple social engineering tricks to effect our escape.  Social engineering is the art of predicting people’s behavior based on given stimuli.  It is the method of choice for modern computer hackers wishing to gain access to sensitive data.  Cracking a computer system’s security electronically, for example, can be difficult.  Tricking a secretary or systems manager into simply given you the access is simple.  It requires only a cute young man, or sexy woman, or a correct role playing scenario, a little software and a little bit of time.</p>
<p>Social engineering can be applied to any problem, not just computer hacking problems.  Distractions and decoys, for example, have been used for centuries as primitive social engineering tools.</p>
<p>We choose to take the Southern Highway to a town at the far southern end of Belize called Punta Gorda.  From there we had arranged to take a small fishing boat the thirty or so miles to a border town in Guatemala called Livingston.  The Southern highway, we knew, since we had friends driving the full length daily, had three checkpoints along its way.  On the day we left we chose, as a decoy, a friend driving one of my high profile pickup trucks.  He drove three miles ahead of us and was in constant communication with us.  The truck’s documentation was in my name and was with the truck, just in case they failed to identify the truck by sight.  The plan was the following:  If they stopped the truck I knew the checkpoint officers would be swarming all over it.  Subsequent traffic would be likely to be waved on through.  For a distraction, I arranged to have my double – a man I have known for over 30 years and who years ago legally changed his name to John McAfee – arrested in Mexico a hundred miles north of the Belizean border.  We posted the arrest on the blog and within an hour of the posting radio stations in Belize were broadcasting the arrest.  Advance teams reported a relaxing of checkpoint procedures on the Northern and Western Highways a couple of hours later.</p>
<p>But the above were our backup plans, in case our main plan failed.  My main plan simply depended on rain.  We chose a day to leave when the weather report predicted a near 100% chance of heavy rains for the full length of the Southern Highway.  In Belize, no checkpoint officers will ever stop a car in the rain.  In five years of residence I had never seen or heard of police, or the BDF, doing anything whatsoever in the rain, let alone standing in the middle of the road stopping cars.  It rained all day with only intermittent stops.  Our first checkpoint passed without incident just a few moments after rain had stopped.  As you can see, only one officer is outside of the car, leaning on the hood.  The others were all huddled inside.  All three checkpoints were passed in the same fashion.  Neither the lead car (belonging to me), nor the car in which I was riding, were stopped.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/checkpoint-rain/" rel="attachment wp-att-1426"><img class="aligncenter  wp-image-1426" alt="checkpoint rain" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/checkpoint-rain.jpg" width="567" height="480" /></a></p>
<p>Once the checkpoints had been passed, it remained only for us to negotiate our passage across the border into Guatemala.</p>
<p>For companionship, and to divert attention from eyes looking for two people travelling together, Sam and I had five other people in the van with us – the two intrepid Vice Magazine journalists, Amy, her boyfriend Keith and the driver of the van – a very old friend of mine:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/companions/" rel="attachment wp-att-1427"><img class="aligncenter  wp-image-1427" alt="companions" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/companions.jpg" width="525" height="350" /></a></p>
<p>We arrived in Punta Gorda in the late afternoon, met up with the driver of the advance decoy truck, and stayed the night at Machaca Hill – all of us checking in under assumed names.  Our plan was to take a small fishing boat from a private dock in Punta Gorda the following day and make a dash for Livingston – hoping that the Coast Guard had abandoned their southern waters vigil due to the report that I had been jailed in Mexico the previous day.  Since we had a free night, everyone relaxed and enjoyed the jungle surroundings:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-hotel/" rel="attachment wp-att-1428"><img class="aligncenter  wp-image-1428" alt="sam hotel" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-hotel.jpg" width="558" height="372" /></a></p>
<p>In the morning, we checked with some of our compatriots at the waterfront who had been out boating since sunrise trying to locate or lure any coast guard vessels.  The Coast Guard was conspicuously absent.  We made our way cautiously to the rendezvous where the boat captain was already waiting. We had considered doing the boat trip at night, but a boat in Punta Gorda running at night would be heard all along the beach, and people travelling by boat at night would be deemed suspicious.  Sam, myself and the two journalists said goodbye to Amy, Keith and the two drivers and we quickly boarded the boat and pushed off.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/boat-leaving/" rel="attachment wp-att-1429"><img class="aligncenter  wp-image-1429" alt="boat leaving" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/boat-leaving.png" width="547" height="821" /></a></p>
<p>When we were a few miles off the coast we all relaxed.  Sam turned cheerful:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-victory-sign/" rel="attachment wp-att-1430"><img class="aligncenter  wp-image-1430" alt="sam victory sign" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-victory-sign.jpg" width="559" height="372" /></a></p>
<p>The two journalists went to work:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/journalists-boat/" rel="attachment wp-att-1431"><img class="aligncenter  wp-image-1431" alt="journalists boat" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/journalists-boat.jpg" width="579" height="385" /></a></p>
<p>And a pod of dolphins showed up to share in the mood:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/dolphin2/" rel="attachment wp-att-1433"><img class="aligncenter  wp-image-1433" alt="dolphin2" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/dolphin2.jpg" width="575" height="383" /></a></p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/dolphin/" rel="attachment wp-att-1434"><img class="aligncenter  wp-image-1434" alt="dolphin" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/dolphin.jpg" width="590" height="394" /></a></p>
<p>When we neared Livingston everyone breathed a sigh of relief:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/livingston-view/" rel="attachment wp-att-1436"><img class="aligncenter  wp-image-1436" alt="livingston view" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/livingston-view.jpg" width="578" height="386" /></a></p>
<p>What lay ahead, I knew, were a number of serious problems, but they were of a legal immigration nature and involved our lack of an exit stamp from Belize and some forthcoming fraudulent moves by the Belizean government.   This meant we could not get an entry stamp into Guatemala, and that I would certainly be arrested as a result of the Belizean machinations.</p>
<p>In any case, we had to enter Guatemala illegally.  I knew that the Belizean Government had alerted Guatemala in case I showed up in their country, and I also knew that once the Belize Government found out that I had escaped Belize they would fraudulently attempt to involve Interpol in my retrieval (I knew this because the Belizen Police apparatus was one of the targets of my early “social engineering” experiments).   The DPP’s office did indeed contact an Interpol Officer the same day we were “outed” and falsely told the officer that there was a warrant for my arrest.  This, of course, was untrue.  Five days later, after Interpol had arrested me, they discovered that there were no charges and no warrants against me when they asked for copies and none could be produced.  It’s rumored that the Interpol officer in charge of Central American Operations went ballistic.  Interpol withdrew from any involvement with my case.  This left me with only my illegal entry into Guatemala to deal with.</p>
<p>Politics aided me in the above.  The DPP (the chief Government Prosecutor in Belize) is the wife of Marco Vidal – head of the GSU.  Since no small part of what has happened to me has been a personal vendetta of Mr. Vidal’s, he enlisted his wife’s help.  However, the DPP could not press any charges that had not been forwarded by C.I.B – the prosecutorial arm of the Belizean police apparatus.  C.I.B., in spite of frequent urgings by the DPP, would not issue charges.  This did not prevent her from telling Interpol that there was a warrant for my arrest.  Remember that Marco Vidal sent an email to Jeff Wise the morning after Mr. Faul&#8217;s murder falsely saying that I was the prime suspect in the murder.  Neither Mr. Vidal nor any of his people were involved in the investigation at the time, nor have they ever since been involved.  It was yet one more fabrication created by Mr. Vidal.  Mr. Wise, characteristically, never bothered to check the veracity of the email and published a story based on it.  It took the San Pedro police department &#8211; who was the only department involved in the investigation &#8211; to alert the media that I was not a suspect in the murder.</p>
<p>I had anticipated all of this and planned ahead.  I had hired the best lawyer in Guatemala (The prior Attorney General of Guatemala -  Sam’s uncle), who was waiting for our arrival in Guatemala City.  We had to safely reach Guatemala City however.  This is the important point to the above.  I had planned to do that by travelling up the Rio Dulce to Fronteras, and from Fronteras take a bus or a car to Guatemala City.  Once we left Livingston no one would know where we were.</p>
<p>In Livingston we bought supplies and briefly scoped out the town.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/livingston-street/" rel="attachment wp-att-1435"><img class="aligncenter  wp-image-1435" alt="livingston street" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/livingston-street.jpg" width="590" height="394" /></a></p>
<p>Then we hired a boat headed up river:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/rio-duclce1/" rel="attachment wp-att-1437"><img class="aligncenter  wp-image-1437" alt="rio duclce1" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/rio-duclce1.jpg" width="590" height="394" /></a></p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/rio-dulce-2/" rel="attachment wp-att-1438"><img class="aligncenter  wp-image-1438" alt="rio dulce 2" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/rio-dulce-2.jpg" width="590" height="394" /></a></p>
<p>End of part one</p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/the-escape-part-one/feed/</wfw:commentRss>
		<slash:comments>166</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2012/12/john-mcafee-escape-296x218.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Hello from John</title>
		<link>http://www.whoismcafee.com/hello-from-john-2/</link>
		<comments>http://www.whoismcafee.com/hello-from-john-2/#comments</comments>
		<pubDate>Mon, 24 Dec 2012 13:47:35 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfee Files]]></category>
		<category><![CDATA[belize corruption]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=1395</guid>
		<description><![CDATA[I apologize for my absence from the blog.  I took some alone time – much needed, and I took time [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I apologize for my absence from the blog.  I took some alone time – much needed, and I took time to collect my thoughts and my data.</p>
<p>I am safe now, in the country in which I grew up, went to school, got married and had children.  It is a country of laws and due process.  It is a country that allows freedom of speech – something that I have dearly missed in the 5 years I spent in Belize.</p>
<p>On January 3<sup>rd</sup>, 2013, I will say what I could not say while in Belize.  It is a long story and the writing is not yet finished.  Most of my friends who are implicated in the story have now left Belize and are in places of safety.  The few who remain are in unassailable positions of power or influence and my story will not affect them greatly.</p>
<p>The story begins two days after the first raid on my property in Orange Walk, when it became clear that I would not be receiving an apology for the raid.  So I did what I do best – collect information.  Information is, I believe, the ultimate power.  People sometimes forget that I founded one of the largest computer security firms in the world, and I didn’t achieve that by not knowing how to access protected or secret information.  You can’t build an ultimate lock, for example, if you don’t know how to pick locks.  I pick information locks as someone with my background should be expected to do – with ease.</p>
<p>What I discovered changed my life.  When I post the story on the 3<sup>rd</sup>, it may change yours.  It will certainly change the lives of the Prime Minister and few cabinet ministers in the Belizean Government.</p>
<p>In the meantime I will post some benign Christmas spirit posts, beginning with the escape from Belize that Sam and I engineered.  I hope to have it up tomorrow.</p>
<p>&nbsp;</p>
<h3><span style="color: #ff0000;">Some teaser links, if anyone is interested:</span></h3>
<p>&nbsp;</p>
<h4><a href="http://edition.channel5belize.com/archives/75785" target="_blank">CHANEL 5 BELIZE</a></h4>
<p>&nbsp;</p>
<h4><a href="http://www.reporter.bz/front-page/hezbollah-terrorist-with-belizean-passports/" target="_blank">REPORTER BELIZE </a></h4>
<p>&nbsp;</p>
<h4><a href="http://7newsbelize.com/sstory.php?nid=23396" target="_blank">7 NEWS BELIZE </a></h4>
<p>&nbsp;</p>
<h4><a href="http://www.sanpedrosun.com/crime-and-violence/2012/09/14/two-belizeans-and-an-american-accused-of-link-to-hezbollah-terrorist-group-arrested-in-mexico/" target="_blank">SAN PEDRO SUN&nbsp;</p>
<p></a></h4>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/hello-from-john-2/feed/</wfw:commentRss>
		<slash:comments>47</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2012/12/Hello-from-john-mcafee-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Hello from John</title>
		<link>http://www.whoismcafee.com/hello-from-john/</link>
		<comments>http://www.whoismcafee.com/hello-from-john/#comments</comments>
		<pubDate>Mon, 17 Dec 2012 03:56:48 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfee Files]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=1348</guid>
		<description><![CDATA[Hello readers, I apologize for my recent absence and lack of updates. Due to the terrible events at Sandy Hook [&#8230;]]]></description>
				<content:encoded><![CDATA[<div id="yass_top_edge_dummy" style="width: 1px; height: 1px; padding: 0px; margin: -11px 0px 0px; border-width: 0px; display: block;"></div>
<h4 id="yass_top_edge" style="background-image: url('chrome://yass/content/edgebgtop.png'); background-attachment: scroll; background-position: center bottom; padding: 0px; margin: 0px 0px 10px -10px; border-width: 0px; height: 0px; display: block; width: 1px;"></h4>
<h4 style="margin-top: 10px;">Hello readers, I apologize for my recent absence and lack of updates. Due to the terrible events at Sandy Hook Elementary School in Newton Conn,  I have decided to take a few days absence from public life. I will resume with my blog activities in a few days.</h4>
<p>&nbsp;</p>
<h4>Do your best to forget the name of the shooter, and remember the innocent victims of this terrible act.</h4>
<p>&nbsp;</p>
<p><b><span style="font-family: Arial;"><span>Charlotte Bacon, 02-22-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Daniel Barden, 09-25-05</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Rachel Davino, 07-17-83 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Olivia Engel, 07-18-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Josephine Gay, 12-11-05</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Ana Marquez-Greene, 04-04-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Dylan Hockley, 03-08-06 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Dawn Hochsprung, 06-28-65</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Madeleine F. Hsu, 07-10-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Catherine V. Hubbard, 06-08-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Chase Kowalski, 10-31-05 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Jesse Lewis, 06-30-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>James Mattioli, 03-22-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Grace McDonnell, 11-04-05</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Anne Marie Murphy, 07-25-60 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Emilie Parker, 05-12-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Jack Pinto, 05-06-06 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Noah Pozner, 11-20-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Caroline Previdi, 09-07-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Jessica Rekos, 05-10-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Avielle Richman, 10-17-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Lauren Rousseau, 06-8-82</span></span></b></p>
<p><span style="font-family: Arial;"><b><span>Mary Sherlach, 02-11-56 </span></b><span> </span></span></p>
<p><b><span style="font-family: Arial;"><span>Victoria Soto, 11-04-85 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Benjamin Wheeler, 09-12-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Allison N. Wyatt, 07-03-06</span></span></b></p>
<div id="yass_bottom_edge" style="background-image: url('chrome://yass/content/edgebgbot.png'); background-position: 0px 0px; position: absolute; margin: 0px; padding: 0px; border-width: 0px; height: 0px; left: 0px; top: 955px; width: 100%; display: block;"></div>
<div id="yass_bottom_edge" style="background-image: url('chrome://yass/content/edgebgbot.png'); background-position: 0px 0px; position: absolute; margin: 0px; padding: 0px; border-width: 0px; height: 0px; left: 0px; top: 0px; width: 100%; display: block;"></div>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/hello-from-john/feed/</wfw:commentRss>
		<slash:comments>74</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2012/12/candlejohn-296x283.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
	</channel>
</rss>
