<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>John McAfee &#187; John McAfee</title>
	<atom:link href="http://www.whoismcafee.com/author/dostoevsky/feed/?lang=es" rel="self" type="application/rss+xml" />
	<link>http://www.whoismcafee.com?lang=es</link>
	<description>Quién es McAfee - El Blog Oficial de John McAfee</description>
	<lastbuilddate>Thu, 03 Apr 2014 23:00:09 +0000</lastbuilddate>
	<language>es</language>
		<sy:updateperiod>hourly</sy:updateperiod>
		<sy:updatefrequency>1</sy:updatefrequency>
	<generator>http://wordpress.org/?v=3.8.2</generator>
	<item>
		<title>Directiva del Primer Ministro</title>
		<link>http://www.whoismcafee.com/the-prime-ministers-directive/?lang=es</link>
		<comments>http://www.whoismcafee.com/the-prime-ministers-directive/?lang=es#comments</comments>
		<pubdate>Mon, 04 Feb 2013 11:16:26 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Archivos de McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1908-es</guid>
		<description><![CDATA[&#160; Through a series of clever constitutional changes, El Primer Ministro de Belice &#8211; Dean Barrow &#8211; ha consolidado su poder [&#8230;]]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><a href="http://www.whoismcafee.com/wp-content/uploads/2013/02/Fotolia_21144889_XS.jpg"><img class="alignnone" alt="man with beard screws a crown in his head" src="http://www.whoismcafee.com/wp-content/uploads/2013/02/Fotolia_21144889_XS-300x300.jpg" /></a></p>
<p> </p>
<p>Through a series of clever constitutional changes, El Primer Ministro de Belice &#8211; Dean Barrow &#8211; has solidified his power as absolute as any dictator. So when he gives an order, it is obeyed, whether within the bounds of law or not.</p>
<p>Por ejemplo: In mid April last year Barrow told the GSU &#8211; &#8220;Get Arthur Young at all costs&#8221;. Two days later Arthur Young was handcuffed, with his hands behind his back, and was shot and killed by the police.</p>
<p>The Prime Minister has enormous power.</p>
<p>He is also enormously pissed off by my writings and disclosures &#8211; specifically corruption within his cabinet and more specifically my statements that he personally ordered the murder of Arthur Young. Semana pasada, the PM met with the Police Commissioner and the heads of each police department and ordered &#8211; &#8220;Find whatever evidence is necessary to name McAfee as the prime suspect in Gregory Faul&#8217;s murder&#8221;. This is solid, unquestionable information.</p>
<p>Immediately the police began to round up my past employees and hauled them in for interrogation. En Belice, the quickest way to frame someone is to haul in their friends, neighbors or acquaintances and, using various forms of duress, force them to sign statements implicating the person the government wants to frame. It seems that this is going to be their chosen method for getting me.</p>
<p>I anticipate some kind of announcement by the police department soon. I am not worried, but it is annoying.</p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/the-prime-ministers-directive/feed/?lang=es</wfw:commentrss>
		<slash:comments>581</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/02/02F690342-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Sam</title>
		<link>http://www.whoismcafee.com/sam/?lang=es</link>
		<comments>http://www.whoismcafee.com/sam/?lang=es#comments</comments>
		<pubdate>Sat, 02 Feb 2013 01:21:09 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Archivos de McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1899-es</guid>
		<description><![CDATA[&#160; Está conmigo en un lugar no revelado.  Ella está cansada, pero seguro y bien. Más tarde. Actualizar: Somos [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Está conmigo en un lugar no revelado.  She is tired but safe and well.</p>
<p>More later.</p>
<p>Actualizar: No estamos en los Estados, pero <strong>son</strong> en un lugar seguro, neutral country.<br />
<a href="http://www.whoismcafee.com/wp-content/uploads/2013/02/image-e1359766692704.jpg"><img class="aligncenter size-full wp-image-1897" alt="image" src="http://www.whoismcafee.com/wp-content/uploads/2013/02/image-e1359766692704.jpg" width="560" height="418" /></a></p>
<p> </p>
<p><a href="http://www.whoismcafee.com/wp-content/uploads/2013/02/image1-e1359766994379.jpg"><img class="aligncenter size-full wp-image-1896" alt="image" src="http://www.whoismcafee.com/wp-content/uploads/2013/02/image1-e1359766994379.jpg" width="420" height="560" /></a></p>
<p> </p>
<p> </p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/sam/feed/?lang=es</wfw:commentrss>
		<slash:comments>77</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/02/sgsgsg.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>En respuesta a las preguntas</title>
		<link>http://www.whoismcafee.com/in-reply-to-questions/?lang=es</link>
		<comments>http://www.whoismcafee.com/in-reply-to-questions/?lang=es#comments</comments>
		<pubdate>Tue, 22 Ene 2013 01:56:57 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Archivos de McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1761-es</guid>
		<description><![CDATA[Algunas personas se han publicado comentarios inflamatorios sobre un par de temas que, claramente, no tienen una comprensión completa [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Algunas personas se han publicado comentarios inflamatorios sobre un par de temas que, claramente, they do not have a full understanding of.  The first is the exif data (the date, tiempo, type of camera, etc.) attached to many of my photos.  Anyone who has done a photo montage will know that the exif data for the final product will be the exif data for the lowest element of the montage.  Since most of my photos are montages, with a variety of exif data attached to each, the exif data attached to the lowest layer is the data that gets attached to the entire montage.  Frequently I apply a base layer underneath a photo with the top photo having an opacity less than 100% in order to brighten, dim, color or otherwise improve the looks of a photo.  I create the underlayer by photographing a blank wall, a floor or any other uniform body that I deem will give the effects that I want.   I am travelling and shoot whatever is around me that works.  You can try this in Photoshop, por ejemplo, and check the exif data of the end product if you doubt any of it. Por ejemplo, the following two photos have been shown very early on in this blog (el año pasado), and in one, I am obviously still in Belize, since I am with Sam and Amy.  The other was taken in September by Chad when he visited Belize.  Yet the exif data shows January 16th of this year 0n both of them.  This happened because I overlaid the photos on top of two separate photos taken on January 16th by my Sony camera, used 100% opacity &#8211; so that you can compare to see that they are in fact the same photos as those published previously, and then cropped it:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/in-reply-to-questions/example2/" rel="attachment wp-att-1762"><img class="aligncenter  wp-image-1762" alt="example2" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/example2.jpg" width="489" height="363" /></a></p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/in-reply-to-questions/example/" rel="attachment wp-att-1763"><img class="aligncenter  wp-image-1763" alt="Example" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/Example.jpg" width="464" height="308" /></a></p>
<p>Check the exif data (those of you complaining about the exif data) and see for yourselves. I do not like having to explain these things just because some of you are looking for anything &#8211; anything at all &#8211; to prove I am being deceptive.  I am hugely busy and this distracts from my work immensely.  If you want to keep looking for things that I do wrong then please do a little more research into your subject before you jump to conclusions.  There are in fact many of hundreds of reasons why exif data for a given photo is not indicative in any way of the date in which a photo was taken &#8212; not least of which is that any idiot can change the date and time on the camera to any date and time that they choose and then take a picture.  The users chosen date will show up in the exif data.  This is why I ignored your complaints at first. I am not an idiot.  If I wanted to decieve you, I would purposely have changed the camera date, or done any one of a hundred other trivial things to pre-date a current photo.  Could you possibly think that I am unaware of exif data?  I am too busy to waste time in deception.  I do what I do, if you don&#8217;t like the exif data, then at least give me the benefit of the doubt by considering the limitless possibilities why the data is not the data you wanted.  It is too time consuming to satisfy those few of you who insist on trying trying to find holes.  From the majority remainder of you, please ignore this rant. The second issue is Amy&#8217;s description of the brown powder I was making.  Please read my extremely detailed Bluelight discussion early on in this blog.  If you read the actual Bluelight posts, you will see hundreds of photos that I submitted about making this impossibly mythical drug &#8211; Tan-MDPV.  I obviously had to do something to create authentic looking substances.  The following blog question and my answer should suffice for all of you. <em>Read the Bluelight post!!!! There were hundreds of photos I posted of the “impossible” process. Where was I going to get the photos????? I did them myself. Amy helped me. There were brown substances, white substances, clear substances, cloudy substances. Burnt baking soda – Acetone and sugar from the lab – dozens of substances to make it look real. Amy is bright but clueless. I always told her the stuff was poison (most probably was) and not to put them in her mouth (which she did with almost everything – like a two year old). How can you talk about something (Bluelight) when you have never read the full posting on Bluelight (400 pages)? If you want to post any more negative stuff about something you have never read, seen, or know nothing about, then at least read it first.</em> <em>Son sin, I have nothing more to add. There is nothing to add, and there is not now, nor has there ever been, a discrepancy.</em> The third item is the comments about the capacity of the recording devices that were used.  It is not rocket science.  The replacement of an ultra-cheap Chinese battery with a high capacity lithium battery (plenty of vacant room in these devices) and the replacement of a 2 gig micro SD card with a 32 gig micro SD card (which a mentally impaired six year old could do) does wonders to the amount a time a device will record.  Two of the devices supported 64 gig cards.  Software glitches limited the remainder to 32 gigs.  There are many other modifications that we made that I did not, and will not, tell you about.  Pero, de nuevo, a small child could quickly look and any one of these devices and make a dozen simple changes that would improve the device by an order of magnitude in ten minutes and for a cost of less than $30.  Complacer, naysayers, use your heads. De nuevo, I am sorry for my testiness, but a tiny fraction of followers here create 95% of the problems, y 95% of my work, by trying to create issues over absolute nonsense, or try to incessantly resurrect  issues that have been put to bed many times.  These users are either doing this out of malice or out of ignorance.  Anyone who had read the Bluelight posts on the Bluelight board would not ask the questions that have been asked.  Anyone who knew anything at all about exif data knows that the data is absolutely meaningless if someone wants a different date, time or location.  If you few folks are not doing this maliciously, then please use your head and think a little before you post inflamatory statements.  If you are doing it maliciously, your I.P. address will eventually be banned. Gracias. P.S.  A plug for the upcoming movie: <strong><a href="http://www.impfm.com/pdetail/john-mcafee-official-story/" target="_blank">MEDIOS FUTUROS DE IMPACTO</a></strong></p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/in-reply-to-questions/feed/?lang=es</wfw:commentrss>
		<slash:comments>209</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/qanda-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Las niñas &#8211; Segunda parte</title>
		<link>http://www.whoismcafee.com/the-girls-part-two/?lang=es</link>
		<comments>http://www.whoismcafee.com/the-girls-part-two/?lang=es#comments</comments>
		<pubdate>Thu, 17 Ene 2013 21:16:49 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Archivos de McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1669-es</guid>
		<description><![CDATA[&#160; This part two post will itself have to be divided into two parts.  Resultó mucho más grande que [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/nicky/" rel="attachment wp-att-1676"><img class="aligncenter  wp-image-1676" alt="Nicky" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/Nicky.jpg" width="560" height="373" /></a></p>
<p>This part two post will itself have to be divided into two parts.  It turned out much larger than I thought</p>
<p>The photo above is of one of the American women working both in Miami and in Belize.  Frequently government ministers and officials flew to Miami (two hours from Belize City) for business, pleasure, parties or what have you.  I needed resources in Miami to keep tabs on targets.  Nicky is prepping a few computers for delivery to &#8220;amigos&#8221; of hers in Belize.  She told all of her targets that she had a friend in the computer sales business and that the friend could provide computers for $100 each.  Even government officials like a good deal so the computers were easy to place.</p>
<p>Before I get into how the girls worked, you will need a brief overview of the principles of Social Engineering.  These principles have been used successfully for thousands of years:</p>
<p><strong>Attention</strong></p>
<p>Attention, in repetitive situations, wanders.  Universally.  It seeks environments and situations offering diversity.</p>
<p>Fear, lust, curiosity and pleasure seeking trap attention.  Boredom frees it.</p>
<p>When attention is gained, a person is open to motivation.</p>
<p>A good social engineer must know how to get a person’s attention and keep it.</p>
<p><strong> </strong></p>
<p><strong>Curiosity</strong></p>
<p>Most people are curious about anything new, anything out of place or strange, or anything that stands out from the background.  Many people will go out of their way to check out an object that catches their attention.</p>
<p>A good social engineer will use a person’s curiosity as one means of getting their attention.</p>
<p> </p>
<p><strong>Preconception and belief</strong></p>
<p>A person’s prior beliefs will color any new information received by the person.</p>
<p>Knowing a person’s preconceptions allows us to predict, to a larger or lesser degree, a person’s behavior in reaction to an event or situation.</p>
<p>A good social engineer creates situations in which the subject’s behavior can be predicted.</p>
<p> </p>
<p><strong>Fear</strong></p>
<p>Fear is the most powerful social motivator.  Creating fear in someone’s mind generally produces immediate results.  It is the easiest social motivator to implement.</p>
<p>A good social engineer discovers the things that the subject fears most and plays on those things in order to control behavior.</p>
<p> </p>
<p><strong>Lust</strong></p>
<p>Lust is another powerful motivator, but its overt actions are not as immediate as actions inspired by fear.  Lust does, sin embargo, cause immediate, and hopeful, planning in the brain.</p>
<p>A good social engineer observes a subject’s behavior relating to sexual issues and inserts the necessary elements into the subject’s environment to assist the subject in planning to assuage lust.</p>
<p> </p>
<p><strong>Greed</strong></p>
<p>No matter how much a person owns of a valuable commodity, the person generally wants more of that commodity (dinero, houses, cars, etc.), unless the commodity has become a financial, emotional or physical burden.</p>
<p>A good social engineer discovers those things that the subject deems of value and mentally assists the subject in his or her desires.</p>
<p> </p>
<p><strong>Pleasure seeking</strong></p>
<p> </p>
<p>Humans seek pleasurable situations.  Pure and simple.</p>
<p>A good social engineer never forgets this.</p>
<p> </p>
<p><strong>Confianza</strong></p>
<p>Any display of trust from a given person elicits a reciprocal sense of trust.  Por ejemplo: Sharing a secret with someone is an indication of trust in that person and generally motivates the revealing of a reciprocal secret.  Asking someone to hold your money or something valuable is another indication that you trust someone and will help make the person believe that they can trust you.</p>
<p>Carefully listening to someone creates trust within the person doing the talking.</p>
<p>Being helpful to someone elicits a sense of trust within that person.</p>
<p>Flattery and admiration frequently elicit trust.</p>
<p>Smiles elicit trust.</p>
<p>Friendly gestures elicit trust</p>
<p>The more time spent with a person, the more trust is generally gained.</p>
<p>When trust is created, a person is open to motivation.</p>
<p>A good social engineer will, as the first step in contact with the subject, attempt to elicit trust.</p>
<p> </p>
<p><strong> Comfort</strong></p>
<p>In a choice involving no physical or emotional reward, people generally choose the most comfortable option.</p>
<p>Discomfort motivates action.</p>
<p>Fear, boredom and unrequited lust quickly create discomfort in a subject.  A good social engineer creates situations that allow the subject to escape discomfort.</p>
<p> </p>
<p><strong>Boredom</strong></p>
<p>Boredom attenuates fear and accentuates curiosity, codicia, pleasure seeking and lust.</p>
<p>Boredom is fertile ground for planting new ideas (an idle mind is the Devil’s playground).</p>
<p>In a boring situation, attention is directed toward potential excitement.</p>
<p>A good social engineer will be adept at recognizing boredom.</p>
<p> </p>
<p><strong> Adherence to moral norms</strong></p>
<p>Given the desire, the right opportunity (and potential partner) and the assurance of being undetected, many men will stray.   Many women will too.</p>
<p>The majority of people will lie in situations in which telling the truth will negatively and severely impact their lives, providing that they believe the lie will not be caught.</p>
<p>Few people will outright steal.  The exceptions are items of perceived very low value (a pencil for example), items of perceived extremely high value involving no risk of detection, and thefts that can be morally justified (a bag of hundred dollar bills sitting on a sidewalk for example).</p>
<p>A large percentage of people will participate in financial cheating if they are dealing with a stranger, are not in the company of friends, and if fear of detection is low.  If given too much change when purchasing an item, por ejemplo, half of the people will pocket the change without alerting the sales person.</p>
<p>Moral justifications free people to do immoral things.</p>
<p>A good social engineer is aware of these things and uses the knowledge accordingly – most specifically in helping the subject to find moral justifications for actions deemed necessary to the operation.</p>
<p> </p>
<p><strong> Adherence to social customs</strong></p>
<p>In the absence of social chaos (a nuclear bomb strike, por ejemplo), civilized people will generally adhere to the day-to-day customs that make life tolerable.  Por ejemplo:</p>
<p>An item of little value left in someone’s office, or on someone’s desk, voluntad, generalmente, remain untouched and will be freely returned if the owner asks for it.</p>
<p>An item of clothing left on a table or the seat of a booth will generally prevent someone else from sitting at that table or booth.</p>
<p>Even a stranger will seldom decline a favor requiring no effort or cost.</p>
<p>Providing assistance to someone in obvious need will seldom be declined if the person assisting is not placed in a position of fear or discomfort.</p>
<p>Even a stranger who is approached in a friendly manner will generally pause what they are doing and respond to the person approaching.</p>
<p>A good social engineer uses social customs in all aspects of the work.</p>
<p>__________________________________________________</p>
<p><strong>Tools of the Trade</strong></p>
<p>In addition to the computer element of the network, each girl was trained in using a variety of surveillance tools:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/pen/" rel="attachment wp-att-1678"><img class="aligncenter  wp-image-1678" alt="pen" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/pen.jpg" width="560" height="378" /></a></p>
<p>This pen has a pinhole video camera and a microphone.  It will pickup conversations as far as 20 feet away.  It can be left on someone&#8217;s desk, in a chair. on a shelf &#8211; anywhere that is convenient.  Collecting it later is simple.  &#8220;I forgot my pen, is it still here?&#8221;</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/alarm-clock/" rel="attachment wp-att-1670"><img class="aligncenter  wp-image-1670" alt="alarm clock" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/alarm-clock.jpg" width="560" height="373" /></a></p>
<p>This travel alarm clock contains a video camera and microphone.  It can be placed beside the bed, facing the bed, and will record &#8211; in low light &#8211; everything.  The resulting videos are useful in gaining co-operation from unco-operative subjects, as well as documenting any phone calls made during the session.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/car-keys/" rel="attachment wp-att-1671"><img class="aligncenter  wp-image-1671" alt="car keys" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/car-keys.jpg" width="560" height="400" /></a></p>
<p>This fake auto remote control contains a camera and microphone.  It can be left anywhere and will record non-stop for 24 hours.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/glasses/" rel="attachment wp-att-1672"><img class="aligncenter  wp-image-1672" alt="glasses" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/glasses.jpg" width="560" height="373" /></a></p>
<p>These polarized sunglasses will record everything that the wearer looks at, with audio.  Their potential applications are obvious.  They are activated by pussing the logo on the side.  It is actually a button.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/mp3-player/" rel="attachment wp-att-1675"><img class="aligncenter  wp-image-1675" alt="mp3 player" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/mp3-player.jpg" width="560" height="373" /></a></p>
<p>This MP3 player looks and acts like any MP3 player.  it has a video camera and an audio recorder.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/watch/" rel="attachment wp-att-1679"><img class="aligncenter  wp-image-1679" alt="watch" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/watch.jpg" width="560" height="373" /></a></p>
<p style="text-align: center;">This waterproof wristwatch contains a video camera with audio.  It is activated by a button on the side.  It will only record a total of one hour, but it is useful in recording events on boats, in water, etc.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/mini-recorder-2/" rel="attachment wp-att-1696"><img class="aligncenter  wp-image-1696" alt="mini-recorder" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/mini-recorder1.jpg" width="560" height="840" /></a></p>
<p style="text-align: center;">This mini recorder will record many days of video and  audio.  I can be inserted into anything.  We purchased these recorders by the hundreds:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/hundreds/" rel="attachment wp-att-1698"><img class="aligncenter  wp-image-1698" alt="hundreds" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/hundreds.jpg" width="560" height="373" /></a></p>
<p style="text-align: center;">Here is Nicky wearing the video sunglasses and holding her two favorite items:</p>
<p style="text-align: center;"> <a href="http://www.whoismcafee.com/the-girls-part-two/nicky2-3/" rel="attachment wp-att-1693"><img class="aligncenter  wp-image-1693" alt="nicky2" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/nicky2.png" width="560" height="739" /></a></p>
<p>The second half of part two is coming.  Sorry it&#8217;s so long.</p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/the-girls-part-two/feed/?lang=es</wfw:commentrss>
		<slash:comments>235</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/partdeux-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Las niñas</title>
		<link>http://www.whoismcafee.com/the-girls/?lang=es</link>
		<comments>http://www.whoismcafee.com/the-girls/?lang=es#comments</comments>
		<pubdate>Mon, 14 Ene 2013 03:37:55 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Archivos de McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1609-es</guid>
		<description><![CDATA[&#160; Yo pensaba que iba a hacer una breve introducción a algunas de las chicas que los, y por el gran duración [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1a/" rel="attachment wp-att-1610"><img class="aligncenter  wp-image-1610" alt="port-1a" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1a-e1358132275742.jpg" width="560" height="416" /></a></p>
<p>Yo pensaba que iba a hacer una breve introducción a algunas de las chicas que los, por lo general vivían conmigo a tiempo completo.  Sin la ayuda de estas chicas, Hubiera tardado años en el primer sistema de ingeniería social que puse en su lugar en Belice.  Sam fue fundamental para ayudarme a gestionar y controlar la red.  Se llevaba bien con todas las chicas y su inteligencia superior y rápido ingenio generalmente le permitió anticiparse a los problemas y atajarlos antes de llegar al punto de peligro.  Ella es alo como un camaleón:  Ella puede lucir y actuar cualquier parte:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1b/" rel="attachment wp-att-1611"><img class="aligncenter  wp-image-1611" alt="port-1b" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1b-e1358132658843.jpg" width="560" height="315" /></a></p>
<p>Yo la asocié con otras chicas muchas veces &#8211; por lo general cuando sentí un problema cervecera.  Su carácter lúdico generalmente difunde las tensiones:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1c/" rel="attachment wp-att-1612"><img class="aligncenter  wp-image-1612" alt="port-1c" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1c-e1358132909606.jpg" width="560" height="374" /></a></p>
<p>Amy tiene más experiencia que Sam, pero no es tan tolerante con la naturaleza humana y los errores de la gente como Sam es.  Pero ella es muy inteligente.  Los tres &#8211; Me, Sam y Amy eran el núcleo central (Amy y Sam están ahora ocultos a salvo fuera del país, a propósito &#8211; sus visas están pendientes):</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1d/" rel="attachment wp-att-1613"><img class="aligncenter  wp-image-1613" alt="port-1d" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1d-e1358133085500.jpg" width="560" height="374" /></a></p>
<p>Otras chicas iban y venían &#8211; a veces quedarse un mes, a veces 4 o cinco meses.  Angie iba y venía varias veces:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1f/" rel="attachment wp-att-1614"><img class="aligncenter  wp-image-1614" alt="port-1f" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1f-e1358133372941.jpg" width="560" height="314" /></a></p>
<p>Así que hizo Marcia:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1h/" rel="attachment wp-att-1615"><img class="aligncenter  wp-image-1615" alt="port-1h" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1h-e1358133454806.jpg" width="560" height="746" /></a></p>
<p>Otros fueron transitorios, quedarse un par de semanas a la vez y luego volver al campo:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1m/" rel="attachment wp-att-1618"><img class="aligncenter  wp-image-1618" alt="port-1m" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1m-e1358133582524.jpg" width="560" height="315" /></a></p>
<p> </p>
<p>Animé a todas las chicas para pasar el rato juntos y se convierten en amigos, cuando sea posible.  Era más fácil llevar un control sobre las acciones de alguien si los demás estaban viendo, o si una camaradería compartida alienta el intercambio de secretos íntimos.  Todas las chicas me dijeron que las otras chicas&#8217; secrets.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1i/" rel="attachment wp-att-1616"><img class="aligncenter  wp-image-1616" alt="port-1i" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1i-e1358133678788.jpg" width="560" height="420" /></a></p>
<p>Paz fue instrumental en ayudar a encontrar a los activos correspondientes:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1j/" rel="attachment wp-att-1617"><img class="aligncenter  wp-image-1617" alt="port-1j" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1j-e1358134109836.jpg" width="560" height="374" /></a></p>
<p>Paz posee Bar de los Enamorados en Orange Walk y se conoce a través de Belice como un maestro en la localización de los recursos humanos.  Yo le diría a las especificaciones Paz: nivel de inteligencia, educación, refinamiento cultural, conexión de la familia, edad, parece, experiencia, etc., y Paz ubicaría para mí.  Entonces me sentiría a la persona, y si cómoda, explain the project and hire them.</p>
<p>Esta es la más breve de las introducciones.  Pronto voy a entrar en detalles acerca de cómo cada niña trabajó.  Muchos sabían todo.  A algunos les dijeron nada y simplemente da un ordenador gratuito y, a veces un teléfono.  A veces más de una, si un padre, hermano, cousin or boyfriend was of interest to us.</p>
<p>Cabe destacar que más del 80% de nuestra red electrónica es todavía operable y proporcionar información constante.  Mi próximo post explicará, con las fotos y los archivos de voz, lo que hay que evitar la detección por tanto tiempo.  El 11 de octubre del año pasado se descubrió que estábamos accediendo a información secreta del gobierno, pero hasta mi tercera poste enero, nadie en el Gobierno tenía la menor idea de lo que estábamos haciendo.  La mayor parte de nuestra &#8220;donado&#8221; ordenadores del gobierno, ya se han reducido, pero el principal domino de la ingeniería social viral ha permitido infiltrarse en cinco veces más &#8220;desconocido&#8221; ordenadores como el número que donamos, and the number is growing.</p>
<p>El núcleo de siete:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-end/" rel="attachment wp-att-1624"><img class="aligncenter  wp-image-1624" alt="port-end" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-end-e1358134642110.jpg" width="560" height="374" /></a></p>
<p> </p>
<p> </p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/the-girls/feed/?lang=es</wfw:commentrss>
		<slash:comments>127</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/thegirls-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>La UAG intensifica su violencia</title>
		<link>http://www.whoismcafee.com/the-gsu-escalates-its-violence/?lang=es</link>
		<comments>http://www.whoismcafee.com/the-gsu-escalates-its-violence/?lang=es#comments</comments>
		<pubdate>Fri, 11 Ene 2013 06:03:28 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Archivos de McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1576-es</guid>
		<description><![CDATA[&#160; He recibido el siguiente correo electrónico hoy de Pedro Castellanos, un representante de un grupo de tenedores de América Latina de [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>He recibido el siguiente correo electrónico hoy de Pedro Castellanos, un representante de un grupo de tenedores de América Latina de la cesación de pagos de Belice Superbond.  Los tenedores de bonos de Belice han perdido cientos de millones de dólares en el último año debido a la omisión del primer ministro Dean Barrow:</p>
<p><em>Estimado Sr.. Mcafee, Represento a un grupo de Belice 2029 los tenedores de bonos de América Latina que no están satisfechos con las negociaciones de los bonos que tienen lugar entre Dean Barrow y los tenedores de bonos&#8217; comité de coordinación. Algunos de nosotros hemos viajado a Belice e incluso tienen amigos y familiares que viven allí y sé lo peligroso que un país que se ha convertido en el gobierno Barrow. Queremos Barrow y el UDP fuera de la oficina para siempre, so we decided to contact you.</em></p>
<p><em>Nos quedamos impactados por los recientes acontecimientos que tuvieron lugar en la ciudad de Belice. Aquí hay un video de Youtube de la UAG actuar como un escuadrón de la muerte hace unos días, en caso de que no lo mira: </em></p>
<p><em>DE BELICE UAG es el nuevo DEATH SQUAD CENTRAL AMERICA'S</em></p>
<p><iframe src="http://www.youtube.com/embed/Zimr6rSWzYQ" height="315" width="560" allowfullscreen="" frameborder="0"></iframe></p>
<p><em>Sé de su profunda insatisfacción con la administración Barrow, que es exactamente lo que sentimos el Barrow y el default de la deuda. </em></p>
<p><em>No queremos que el comité de bonos para cerrar un acuerdo sobre la deuda con Dean Barrow para una serie de razones:</em></p>
<p><em>1. We don&#8217;t want Barrow to take credit for closing a successful bond exchange.</em></p>
<p><em>2. No queremos que la UDP para ganar un tercer mandato. A successful debt exchange could help them achieve this goal.</em></p>
<p><em>3. We strongly oppose Barrow&#8217;s nationalizations of Telemedia and BEL.</em></p>
<p><em>4. Lo más importante, creemos que un tercer mandato para el UDP sería el clavo en el ataúd de Belice. Such a beautiful country totally destroyed by Dean Barrow and the UDP.</em></p>
<div id="yui_3_7_2_1_1357860570681_13523"><em>Desde sus mensajes y entrevistas, sabemos que comparte muchos de nuestros puntos de vista. También sabemos que usted es una persona muy inteligente, así que decidimos buscar su ayuda en la prevención de Barrow se cierre el acuerdo sobre la deuda. Creemos que un canje de bonos fracasado causaría un gran daño a Barrow y la UDP, and that it would politically cripple them.</em></div>
<div id="yui_3_7_2_1_1357860570681_13522"><em> </em></div>
<div id="yui_3_7_2_1_1357860570681_13521">
<p><em>Barrow ya está en el gancho para el anuncio de un acuerdo de deuda con éxito (por favor, lea su discurso de Navidad y de año nuevo), cuando los miembros AdHoc grandes del comité no han llegado a un acuerdo sobre la deuda. Sólo el comité de coordinación ha acordado, y está teniendo dificultades para convencer a los miembros AdHoc. Un mínimo de 75% de los bonos tienen que estar de acuerdo, otherwise it fails.</em></p>
<p><em>Si esta idea le interesa, por favor póngase en contacto conmigo en la siguiente dirección de correo electrónico. </em></p>
</div>
<div id="yui_3_7_2_1_1357860570681_13520"><em>A propósito, we admire very much how you handled your Belize experience.</em></div>
<div id="yui_3_7_2_1_1357860570681_13519"><em> </em></div>
<div id="yui_3_7_2_1_1357860570681_13517">
<p><em>Saludos,</em></p>
<p><em>Pedro</em></p>
</div>
<div id="yui_3_7_2_1_1357860570681_13541"></div>
<div>He respondido al Sr.. Castellanos y se han comprometido a apoyar plenamente su iniciativa.  Por favor, ver el vídeo adjunto de la situación actual en Belice.  Si alguien dudaba de mi opinión sobre la seguridad del país, this should dispel those doubts.</div>
<div></div>
<p> </p>
<p> </p>
<p> </p>
<h4 style="text-align: center;">7  Noticias de Belice &#8211; Cruceros Cancelar Llamadas</h4>
<p style="text-align: center;"><a href="http://www.7newsbelize.com/sstory.php?nid=24405">http://www.7newsbelize.com/sstory.php?nid=24405</a></p>
<p> </p>
<p> </p>
<p> </p>
<p><a href="http://www.whoismcafee.com/the-gsu-escalates-its-violence/warning/" rel="attachment wp-att-1582"><img class="aligncenter size-full wp-image-1582" alt="warning" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/warning.jpg" width="316" height="491" /></a></p>
<p style="text-align: center;">( Versión larga: historia comienza en 5:40 &#8211; Advertencia imaginería gráfica )</p>
<p style="text-align: center;">[ylwm_vimeo]57034146[/ylwm_vimeo]</p>
<h4 style="text-align: center;"><span> </span></h4>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<div></div>
<div></div>
<div></div>
<div></div>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/the-gsu-escalates-its-violence/feed/?lang=es</wfw:commentrss>
		<slash:comments>62</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/belize-flag-296x213.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Un peligro claro y presente</title>
		<link>http://www.whoismcafee.com/a-clear-and-present-danger/?lang=es</link>
		<comments>http://www.whoismcafee.com/a-clear-and-present-danger/?lang=es#comments</comments>
		<pubdate>Thu, 03 Ene 2013 08:05:21 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Archivos de McAfee]]></category>
		<category><![CDATA[Belice entra en el mundo del terrorismo]]></category>
		<category><![CDATA[castor beans]]></category>
		<category><![CDATA[cyanide]]></category>
		<category><![CDATA[Hezbollah en Belice]]></category>
		<category><![CDATA[john mcafee belize]]></category>
		<category><![CDATA[La ricina]]></category>
		<category><![CDATA[terrorismo en Belice]]></category>
		<category><![CDATA[zeta cartel]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1466-es</guid>
		<description><![CDATA[&#160; After the April raid on my property in Orange Walk I went on the offensive.  Me había pedido [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>After the April raid on my property in Orange Walk I went on the offensive.  I had asked for a simple apology and had received none.  I was pissed.  They had shot my dog, destroyed my property and stolen hundreds of thousands of dollars worth of things that I valued.  They have still not been returned.</p>
<p>Que he comprado <a href="http://www.whoismcafee.com/wp-content/uploads/2012/11/corruption4-31.jpg" target="_blank">75 computadoras de computadora portátil baratas </a>y, con la ayuda de confianza, software instalado invisible golpe de teclado la tala en todos ellos - el tipo que llama a casa (a mí) and disgorges the text files.  It also, en el comando, vueltas sobre, y apagado, the microphone and camera – and sends these files on command.  I had the computers re-packaged as if new.  I began giving these away as presents to select people – government employees, agentes de la policía, Los ayudantes de Cabinet Ministro, novias de hombres de gran alcance, boyfriends of powerful women.  I hired four trusted people full time to monitor the text files and provide myself with the subsequent passwords for everyone’s email, Facebook, private message boards and other passworded accounts.  The keystroke monitoring continued after password collection, in order to document text input that would later be deleted.  So nothing was missed&#8230;</p>
<p>I next collected my human resources for the complex social engineering I would have to do.  I arranged with 23 las mujeres y los 6 men to be my operatives.  Eight of the women were so accomplished that they ended up living with me.  It was amazingly more efficient and they were easily convinced to check up on each other.  One was so accomplished (Marcia) que se convirtió en un agente doble y casi me mató:</p>
<p> </p>
<h4><a href="http://www.whoismcafee.com/third-file-post/" target="_blank">story from  post3</a>   y  <a href="http://www.whoismcafee.com/file-post-4/" target="_blank">historia de Post4</a></h4>
<p> </p>
<p>Estos hombres y mujeres se les dio entrenamiento simple en la forma de acceder y cargar el software en la computadora de alguien mientras dormían, or ate or made long phone calls etc.  It’s dead simple if you’re sleeping with someone – “Hey Babe, puedo pedir prestado el equipo para revisar mi correo electrónico?” – A little more complex if you’re not – but not much.  They were also shown dirt simple phone tricks, like borrowing a person’s phone to make a call and then resetting auto-delete of sent texts.  No-one ever checks these things after setup, so all the sent texts are now available to the person borrowing your phone to call their boyfriend to make up a story so they can sleep over with you.  Due to the nature of the call, el operativo sea claramente necesario privacidad durante la llamada - por lo tanto la facilidad de acceso a las cambiantes la configuracion de y la lectura de tus textos enviados</p>
<p>And I taught them other tricks.</p>
<p>Cuando se ensamblaron mis equipos de, I targeted the two National phone companies for engineering.  It was imperative for me to be able to hear people’s phone conversations, or at the very least to know with whom they were in contact.  This social engineering exercise was the easiest.  I used myself as the decoy in this operation.</p>
<p>I approached numerous employees of both companies with the offer to buy the information that I needed.  I knew this would raise flags and lead to failure.  I did this in a manner that would not get me arrested but would ensure that my enquiries reached the appropriate ears – ears belonging to people who definitely did not want me to learn anything.   People then knew I was after information and, tal como se les pensar en forma natural, I would use “buying” as my technique.  Both companies eventually gave me information, que compré, pero fue, como se esperaba, garbage.  While I was negotiating all of this, mi equipo era <em>laboral</em> its way through the lower ranks of Phone Company employees and had locked onto a number of key players who had access to the technical processes involved in tapping phones and delivering lists of phone contacts.  The team had contact information for appropriate wives and husband of these key players, Sabía los nombres de los proveedores de drogas de los empleados (si alguno), nombres de los miembros de la familia respetables, and names of all the other “side interests” of the targets.  Being “pillow talk” masters, también sabían, y había verificado, every secret thing the persons had ever done.  Phone Project complete.</p>
<p>Simultáneamente con lo anterior, I had identified key “helpers” for each Government Minister and had sent in social engineers to stroke the helpers.  Each was armed with software, regalos, una historia, a seductive smile and a small voice recorder.  Everyone had at least one voice recorder.  They were small.  They could be hidden under a bed, detrás de una obra de arte, dentro de una almohada, in an old shoe.  They could be kept on, grabación, for days on end prior to retrieval.</p>
<p>Throughout this process I emailed the Prime Minister every few weeks and asked for an apology.  A simple apology, en las primeras etapas, al menos, would have stopped this whole affair.  I received none.</p>
<p>What I was looking for was hard proof of corruption at a high level.  I’m not sure what I expected to gain.  The satisfaction of revenge perhaps &#8211; to some extent – what little satisfaction there is in revenge.  As a way to get my stuff back?  Tal vez.  For the sheer joy of muscle flexing?  I can’t answer precisely.  Much of my life is a mystery to me.  Suffice it to say:  I just did it because I could.</p>
<p>Lo que encontré fue, en la mayor parte, esperado &#8212; Incontable número de aventuras sexuales &#8212; Chats Vergonzosamente espeluznantes e íntimo &#8212; Múltiplo, protestas simultáneas de amor, and jealousy and anger.</p>
<p>Some things were surprising.  I kept sending increasingly irresistible women in the direction of the UDP Party Chairman, to absolutely no avail.  Finalmente, a clever but unsuccessful young woman suggested an alternate chromosome configuration and – success at last.  It was a surprise to me, given the macho nature of the Chairman.</p>
<p>I was also surprised that the Prime Minister had personally ordered the murder of Arthur Young.  I had assumed that the idea came from much lower in the ranks.  But other than these few and other not so remarkable bits of information, things fell pretty much into the order that I had anticipated.  There were a few exceptions.  This one comes to mind, y ha demostrado ser fundamental para un problema que había previsto:</p>
<p>Durante la supervisión de una mujer joven que trabaja en el Ministerio de Inmigración, cuya Facebook chats había sido siempre exclusivamente en creole, la siguiente apareció:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/mmd/" rel="attachment wp-att-1467"><img class="aligncenter  wp-image-1467" alt="mmd" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/mmd.jpg" width="576" height="97" /></a></p>
<p> </p>
<p>She was chatting on Facebook at the time with another young woman who had a limited education.  This occurred in late May.  The person monitoring the computer keystrokes forwarded it to me.  I sent a command to the system to activate the camera every 10 minutes and send me still shots.  After two days of monitoring nothing showed up other than the woman’s face that used the computer.  I managed to compromise the computer used by the friend she was chatting with and activated both the camera and the microphone on her system, pero de nuevo, no se presentó. I finally sent in a human resource.  More on this later.</p>
<p>I had early on documented heavy human trafficking as part of the National Security and Immigration Ministries’ activities.  This was hardly news, sin embargo.  All over Belize are huge billboards pleading for the cessation of human trafficking, much as billboards in America used to beg us not to drink and drive.  Everyone knew it was happening – obviously.  The billboards weren’t for nothing.  So my discoveries were uninteresting old news.</p>
<p>Sin embargo, en el cajón de sastre de Belice &quot;trata de personas&quot; es un dato interesante que he descubierto:  Nearly 25% eran libaneses, and all of these were male.   The entry passports for these Lebanese varied – Jordanian, Afghani, Saudi Arabia – but they nearly all spoke Lebanese Arabic.  The Lebanese were handled differently.  A false identity was created using a deceased Belizean with an appropriate English or European sounding name.  Por ejemplo:</p>
<p> </p>
<h4><a href="http://edition.channel5belize.com/archives/75785" target="_blank"><span style="font-family: Times New Roman;"><span><strong>¿Quién ayudó a Hezbollah terrorista obtener pasaporte beliceño&amp;ID</strong></span></span></a></h4>
<p> </p>
<p>Después se creó la falsa identidad se emitió el pasaporte (este, por la ley, lleva cinco años de residencia, pero recuerde, todo esto fue creado y dirigido por el Gobierno - para eludir la ley es trivial).  After the passport was issued, un controlador fue asignado para ayudar a la persona salida de Belice con seguridad y llegar a América segura (safe for them that is.  Not so safe for America).  This was accomplished by turning the person in question over to a different, sequential set of handlers along the way.  The Architect of this process is John Saldivar – Minister of National Security, y por un tiempo, Minister of Immigration as well.</p>
<p>I had located an individual working in Immigration that was trustworthy and willing to talk.  I discovered that an average of eleven Lebanese males were given new identities each month.  One month there were sixteen:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/16-lebanese/" rel="attachment wp-att-1468"><img class="aligncenter  wp-image-1468" alt="16 lebanese" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/16-lebanese.jpg" width="576" height="261" /></a></p>
<p>He redactado el original, y nuevos nombres, for obvious reasons.</p>
<p>El recurso humano que envié a ver la secuencia extraña de textos a partir de finales de mayo informó de una sorprendente pieza de información:  A young gentleman named Farid had taken up with the woman from Immigration whose computer he used (esta es una mujer diferente a la que me ha enviado estadísticas mensuales).  My resource, siendo más inteligente que el promedio de la mujer joven de Belice, quickly snaked Farid for herself.  Early on I received this email from her:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/fareed-email/" rel="attachment wp-att-1469"><img class="aligncenter  wp-image-1469" alt="Fareed email" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/Fareed-email.jpg" width="576" height="167" /></a></p>
<p> </p>
<p>Her subsequent phone call was enlightening.  We have disguised her voice:</p>
<p><iframe src="http://www.youtube.com/embed/ITF_OU2NqVM" height="315" width="420" allowfullscreen="" frameborder="0"></iframe></p>
<p>Something was clearly happening that was not good.  The following voice recording of a discussion with a well placed Belizean official details most aspects of the Iranian new identity process.  We have disguised the person’s voice for obvious reasons:</p>
<p><iframe src="http://www.youtube.com/embed/MSO2KTepKDk" height="315" width="420" allowfullscreen="" frameborder="0"></iframe></p>
<p>Belice es claramente el actor central de una red más amplia cuyo objetivo es infiltrarse en los EE.UU.. with individuals having links to terrorist organizations.   What is different today from the wholesale Belizean passport selling of ten years ago, es que los falsos ciudadanías que se crean para estos hombres están acoplados con una red de controladores diseñado para mover los individuos, y su carga, into the U.S.</p>
<p>El recurso de reposición que envié a hacer compañía Farid (alguien capaz de esquivar la crueldad de Farid) emailed me many times concerning Farid’s vocal anger toward America.  In one email she provided two crucialpieces of information that made things come into focus:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/hezbollah-castor/" rel="attachment wp-att-1470"><img class="aligncenter  wp-image-1470" alt="hezbollah castor" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/hezbollah-castor.jpg" width="576" height="317" /></a></p>
<p>El oficial de Belice en la grabación de voz antes estaba al tanto de la conexión de Nicaragua o, más probable, was afraid to divulge it.   Here’s what the world seems to know so far:</p>
<p>Es posible que haya un campo de Hezbollah en Nicaragua, pero nadie parece saber lo que están haciendo en el campo de:</p>
<h4><a href="http://www.timesofisrael.com/iran-hezbollah-establish-training-base-in-nicaragua/" target="_blank">Hezbollah establecer base de entrenamiento en Nicaragua</a></h4>
<p> </p>
<p>Hezbollah ha creado vínculos con los cárteles mexicanos de la droga - en concreto los Zetas:</p>
<p> </p>
<h4><a href="http://articles.businessinsider.com/2011-07-14/politics/30060540_1_islamic-militants-hezbollah-cartels" target="_blank">Hezbollah se conecta con los cárteles mexicanos de la droga</a></h4>
<h3></h3>
<p> </p>
<p> </p>
<h3><a href="http://www.eurasiareview.com/24122012-new-concerns-for-president-pena-nieto-hezbollahs-rising-profile-in-mexico-analysis/" target="_blank">De Hezbolá Rising Perfil En Mexico</a></h3>
<p> </p>
<p>Everyone seems to think that Hezbollah’s intent is to gain riches through additional drug trafficking.  But drug trafficking is not Hezbollah’s intent, as the above reports imply.  Hezbollah is using the Zeta drug transportation network to transport something similar, en peso y tamaño, to the drugs that the Zetas know so well how to slip into the States.  In return, Hezbollah is providing know-how to the Zetas in advanced weaponry.</p>
<p>El mundo diplomático (el Departamento de Estado) tiene claro que Belice es el arquitecto de la actual amenaza a la seguridad de Estados Unidos:</p>
<p> </p>
<h3><a href="http://raficlabboun.blogspot.ca/2012/09/wikileaks-from-us-embassy-in-belize.html" target="_blank">Wikileaks de U.S. Embassy in Belize </a></h3>
<h3></h3>
<p> </p>
<h3></h3>
<h3><a href="http://www.reporter.bz/front-page/hezbollah-terrorist-with-belizean-passports/" target="_blank">Hezbollah terrorista con pasaporte de Belice</a></h3>
<p> </p>
<p>but the State Department either does not understand the depth of the threat or for some bizarre reason does not want anyone to know the depth of the threat.  De hecho, they don’t even want people to know that Belize is sending terrorist into America at all.  All official reports claim that the passports that people have been caught with are in fact forgeries and that the Government of Belize is not involved in creating false identities.  Desafortunadamente, ellos son. And the threat is of an enormous magnitude.  The substance being created in Nicaragua is being created by the ton.</p>
<p>I know all of this because I reassigned resources and for the past three months have had two people in Nicaragua that have made connections with the Hezbollah camp and I have three people in Mexico who have made connections with mid-level Zeta members.  I will release no information at this point that will implicate these five people.  Both the Hezbollah camp members and the Zeta organization, conjunto, have thousands of female connections.  This small post will implicate no one.</p>
<p>Anyone who is truly interested in deeper process of what is happening can infer the truth from the information provided in this post.  I have provided everything you need.</p>
<p>Belize is still a pirate haven.  The stakes have just increased a few orders of magnitude.  The current government represents a threat of enormous proportions.</p>
<p>My subsequent posts will expand on different aspects of the above as it becomes safe to do so.  Mientras tanto, I am taking a well-earned vacation into the heartland of the Midwest.  I blend well with the ranchers and cowboys that I lived amongst for so many years.  They are a sympathetic lot.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/john2/" rel="attachment wp-att-1471"><img class="aligncenter  wp-image-1471" alt="john2" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/john2.jpg" width="459" height="578" /></a></p>
<p> </p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/a-clear-and-present-danger/feed/?lang=es</wfw:commentrss>
		<slash:comments>179</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/belize-vacations-296x213.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>The Escape &#8211; Primera parte</title>
		<link>http://www.whoismcafee.com/the-escape-part-one/?lang=es</link>
		<comments>http://www.whoismcafee.com/the-escape-part-one/?lang=es#comments</comments>
		<pubdate>Wed, 26 Diciembre 2012 13:35:36 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Archivos de McAfee]]></category>
		<category><![CDATA[john mcafee escape de belice]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1423-es</guid>
		<description><![CDATA[&#160; It’s Christmas day and I’m taking a break from the seriousness of my upcoming January 3rd post.  Pensé [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>It’s Christmas day and I’m taking a break from the seriousness of my upcoming January 3<sup>rd</sup> enviar.  I thought I might post the picture story of the first half of Sam’s and my escape from Belize and my eventual arrival in the States.  It’s visually interesting and it is mostly a happy story – in line with most Christmas stories.</p>
<p>I’ll start with our arrival, undercover, in Belize City a few days prior to our departure on our exit adventure.  We had been in hiding for a couple of weeks, living in less than desirable conditions.  Sam was eaten alive by bugs and was happy to reach a place with hot water and comfort, as was I:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-bites/" rel="attachment wp-att-1424"><img class="aligncenter  wp-image-1424" alt="sam bites" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-bites.jpg" width="510" height="766" /></a></p>
<p> </p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-folding/" rel="attachment wp-att-1425"><img class="aligncenter  wp-image-1425" alt="sam folding" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-folding.jpg" width="511" height="766" /></a></p>
<p> </p>
<p>Our plan was simple:</p>
<p>Multiple checkpoints had been set up along every highway exiting Belize and all of the border crossings and seaports had been beefed up with police and Belize Defense Force personnel.   Air travel was impossible since the few existing airports had beefed up security staff armed with our photos and names.</p>
<p>I chose a few very simple social engineering tricks to effect our escape.  Social engineering is the art of predicting people’s behavior based on given stimuli.  It is the method of choice for modern computer hackers wishing to gain access to sensitive data.  Cracking a computer system’s security electronically, por ejemplo, can be difficult.  Tricking a secretary or systems manager into simply given you the access is simple.  It requires only a cute young man, or sexy woman, or a correct role playing scenario, a little software and a little bit of time.</p>
<p>Social engineering can be applied to any problem, not just computer hacking problems.  Distractions and decoys, por ejemplo, have been used for centuries as primitive social engineering tools.</p>
<p>We choose to take the Southern Highway to a town at the far southern end of Belize called Punta Gorda.  From there we had arranged to take a small fishing boat the thirty or so miles to a border town in Guatemala called Livingston.  The Southern highway, we knew, since we had friends driving the full length daily, had three checkpoints along its way.  On the day we left we chose, as a decoy, a friend driving one of my high profile pickup trucks.  He drove three miles ahead of us and was in constant communication with us.  The truck’s documentation was in my name and was with the truck, just in case they failed to identify the truck by sight.  The plan was the following:  If they stopped the truck I knew the checkpoint officers would be swarming all over it.  Subsequent traffic would be likely to be waved on through.  For a distraction, I arranged to have my double – a man I have known for over 30 years and who years ago legally changed his name to John McAfee – arrested in Mexico a hundred miles north of the Belizean border.  We posted the arrest on the blog and within an hour of the posting radio stations in Belize were broadcasting the arrest.  Advance teams reported a relaxing of checkpoint procedures on the Northern and Western Highways a couple of hours later.</p>
<p>But the above were our backup plans, in case our main plan failed.  My main plan simply depended on rain.  We chose a day to leave when the weather report predicted a near 100% chance of heavy rains for the full length of the Southern Highway.  En Belice, no checkpoint officers will ever stop a car in the rain.  In five years of residence I had never seen or heard of police, or the BDF, doing anything whatsoever in the rain, let alone standing in the middle of the road stopping cars.  It rained all day with only intermittent stops.  Our first checkpoint passed without incident just a few moments after rain had stopped.  Como se puede ver, only one officer is outside of the car, leaning on the hood.  The others were all huddled inside.  All three checkpoints were passed in the same fashion.  Neither the lead car (belonging to me), nor the car in which I was riding, were stopped.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/checkpoint-rain/" rel="attachment wp-att-1426"><img class="aligncenter  wp-image-1426" alt="checkpoint rain" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/checkpoint-rain.jpg" width="567" height="480" /></a></p>
<p>Once the checkpoints had been passed, it remained only for us to negotiate our passage across the border into Guatemala.</p>
<p>For companionship, and to divert attention from eyes looking for two people travelling together, Sam and I had five other people in the van with us – the two intrepid Vice Magazine journalists, Amy, her boyfriend Keith and the driver of the van – a very old friend of mine:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/companions/" rel="attachment wp-att-1427"><img class="aligncenter  wp-image-1427" alt="companions" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/companions.jpg" width="525" height="350" /></a></p>
<p>We arrived in Punta Gorda in the late afternoon, met up with the driver of the advance decoy truck, and stayed the night at Machaca Hill – all of us checking in under assumed names.  Our plan was to take a small fishing boat from a private dock in Punta Gorda the following day and make a dash for Livingston – hoping that the Coast Guard had abandoned their southern waters vigil due to the report that I had been jailed in Mexico the previous day.  Since we had a free night, everyone relaxed and enjoyed the jungle surroundings:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-hotel/" rel="attachment wp-att-1428"><img class="aligncenter  wp-image-1428" alt="sam hotel" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-hotel.jpg" width="558" height="372" /></a></p>
<p>In the morning, we checked with some of our compatriots at the waterfront who had been out boating since sunrise trying to locate or lure any coast guard vessels.  The Coast Guard was conspicuously absent.  We made our way cautiously to the rendezvous where the boat captain was already waiting. We had considered doing the boat trip at night, but a boat in Punta Gorda running at night would be heard all along the beach, and people travelling by boat at night would be deemed suspicious.  Sam, myself and the two journalists said goodbye to Amy, Keith and the two drivers and we quickly boarded the boat and pushed off.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/boat-leaving/" rel="attachment wp-att-1429"><img class="aligncenter  wp-image-1429" alt="boat leaving" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/boat-leaving.png" width="547" height="821" /></a></p>
<p>When we were a few miles off the coast we all relaxed.  Sam turned cheerful:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-victory-sign/" rel="attachment wp-att-1430"><img class="aligncenter  wp-image-1430" alt="sam victory sign" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-victory-sign.jpg" width="559" height="372" /></a></p>
<p>The two journalists went to work:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/journalists-boat/" rel="attachment wp-att-1431"><img class="aligncenter  wp-image-1431" alt="journalists boat" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/journalists-boat.jpg" width="579" height="385" /></a></p>
<p>And a pod of dolphins showed up to share in the mood:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/dolphin2/" rel="attachment wp-att-1433"><img class="aligncenter  wp-image-1433" alt="dolphin2" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/dolphin2.jpg" width="575" height="383" /></a></p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/dolphin/" rel="attachment wp-att-1434"><img class="aligncenter  wp-image-1434" alt="dolphin" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/dolphin.jpg" width="590" height="394" /></a></p>
<p>When we neared Livingston everyone breathed a sigh of relief:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/livingston-view/" rel="attachment wp-att-1436"><img class="aligncenter  wp-image-1436" alt="livingston view" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/livingston-view.jpg" width="578" height="386" /></a></p>
<p>What lay ahead, I knew, were a number of serious problems, but they were of a legal immigration nature and involved our lack of an exit stamp from Belize and some forthcoming fraudulent moves by the Belizean government.   This meant we could not get an entry stamp into Guatemala, and that I would certainly be arrested as a result of the Belizean machinations.</p>
<p>En todo caso, we had to enter Guatemala illegally.  I knew that the Belizean Government had alerted Guatemala in case I showed up in their country, and I also knew that once the Belize Government found out that I had escaped Belize they would fraudulently attempt to involve Interpol in my retrieval (I knew this because the Belizen Police apparatus was one of the targets of my early “social engineering” experiments).   The DPP’s office did indeed contact an Interpol Officer the same day we were “outed” and falsely told the officer that there was a warrant for my arrest.  This, por supuesto,, was untrue.  Five days later, after Interpol had arrested me, they discovered that there were no charges and no warrants against me when they asked for copies and none could be produced.  It’s rumored that the Interpol officer in charge of Central American Operations went ballistic.  Interpol withdrew from any involvement with my case.  This left me with only my illegal entry into Guatemala to deal with.</p>
<p>Politics aided me in the above.  The DPP (the chief Government Prosecutor in Belize) is the wife of Marco Vidal – head of the GSU.  Since no small part of what has happened to me has been a personal vendetta of Mr. Vidal’s, he enlisted his wife’s help.  Sin embargo, the DPP could not press any charges that had not been forwarded by C.I.B – the prosecutorial arm of the Belizean police apparatus.  C.I.B., in spite of frequent urgings by the DPP, would not issue charges.  This did not prevent her from telling Interpol that there was a warrant for my arrest.  Remember that Marco Vidal sent an email to Jeff Wise the morning after Mr. Faul&#8217;s murder falsely saying that I was the prime suspect in the murder.  Neither Mr. Vidal nor any of his people were involved in the investigation at the time, nor have they ever since been involved.  It was yet one more fabrication created by Mr. Vidal.  Sr.. Wise, characteristically, never bothered to check the veracity of the email and published a story based on it.  It took the San Pedro police department &#8211; who was the only department involved in the investigation &#8211; to alert the media that I was not a suspect in the murder.</p>
<p>I had anticipated all of this and planned ahead.  I had hired the best lawyer in Guatemala (The prior Attorney General of Guatemala -  Sam’s uncle), who was waiting for our arrival in Guatemala City.  We had to safely reach Guatemala City however.  This is the important point to the above.  I had planned to do that by travelling up the Rio Dulce to Fronteras, and from Fronteras take a bus or a car to Guatemala City.  Once we left Livingston no one would know where we were.</p>
<p>In Livingston we bought supplies and briefly scoped out the town.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/livingston-street/" rel="attachment wp-att-1435"><img class="aligncenter  wp-image-1435" alt="livingston street" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/livingston-street.jpg" width="590" height="394" /></a></p>
<p>Then we hired a boat headed up river:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/rio-duclce1/" rel="attachment wp-att-1437"><img class="aligncenter  wp-image-1437" alt="rio duclce1" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/rio-duclce1.jpg" width="590" height="394" /></a></p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/rio-dulce-2/" rel="attachment wp-att-1438"><img class="aligncenter  wp-image-1438" alt="rio dulce 2" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/rio-dulce-2.jpg" width="590" height="394" /></a></p>
<p>End of part one</p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/the-escape-part-one/feed/?lang=es</wfw:commentrss>
		<slash:comments>166</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2012/12/john-mcafee-escape-296x218.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Hola de John</title>
		<link>http://www.whoismcafee.com/hello-from-john-2/?lang=es</link>
		<comments>http://www.whoismcafee.com/hello-from-john-2/?lang=es#comments</comments>
		<pubdate>Mon, 24 Diciembre 2012 13:47:35 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Archivos de McAfee]]></category>
		<category><![CDATA[belice corrupción]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1395-es</guid>
		<description><![CDATA[Pido disculpas por mi ausencia en el blog.  Tomé un poco de tiempo a solas - muy necesario, y me tomé el tiempo [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Pido disculpas por mi ausencia en el blog.  Tomé un poco de tiempo a solas - muy necesario, and I took time to collect my thoughts and my data.</p>
<p>I am safe now, en el país en el que crecí, fue a la escuela, se casaron y tuvieron hijos.  Es un país de leyes y el debido proceso.  Es un país que permite la libertad de expresión - algo que he echado de menos profundamente en el 5 years I spent in Belize.</p>
<p>On January 3<sup>rd</sup>, 2013, Voy a decir lo que no podía decir que mientras que en Belice.  Es una larga historia y la escritura no ha terminado.  La mayoría de mis amigos que están implicados en la historia ahora han dejado de Belice y se encuentran en lugares seguros.  The few who remain are in unassailable positions of power or influence and my story will not affect them greatly.</p>
<p>La historia comienza dos días después de la primera incursión en mi propiedad en Orange Walk, cuando se hizo evidente que no iba a recibir una disculpa por el ataque.  Así que hice lo que hago mejor - recopilar información.  La información es, Creo que, el máximo poder.  La gente a veces olvida que fundé una de las mayores empresas de seguridad informática en el mundo, y yo no logro que por no saber cómo acceder a información protegida o secreto.  No se puede construir un bloqueo máximo, por ejemplo, si usted no sabe cómo abrir cerraduras.  I pick information locks as someone with my background should be expected to do – with ease.</p>
<p>Lo que descubrí cambió mi vida.  When I post the story on the 3<sup>rd</sup>, puede cambiar la tuya.  It will certainly change the lives of the Prime Minister and few cabinet ministers in the Belizean Government.</p>
<p>Mientras tanto voy a publicar algunos mensajes espíritu benigno Navidad, empezando por el escape de Belice que Sam y yo diseñados.  I hope to have it up tomorrow.</p>
<p> </p>
<h3><span style="color: #ff0000;">Algunos enlaces de reclamo, si a alguien le interesa:</span></h3>
<p> </p>
<h4><a href="http://edition.channel5belize.com/archives/75785" target="_blank">CHANEL 5 BELICE</a></h4>
<p> </p>
<h4><a href="http://www.reporter.bz/front-page/hezbollah-terrorist-with-belizean-passports/" target="_blank">REPORTERO DE BELICE </a></h4>
<p> </p>
<h4><a href="http://7newsbelize.com/sstory.php?nid=23396" target="_blank">7 NOTICIAS DE BELICE </a></h4>
<p> </p>
<h4><a href="http://www.sanpedrosun.com/crime-and-violence/2012/09/14/two-belizeans-and-an-american-accused-of-link-to-hezbollah-terrorist-group-arrested-in-mexico/" target="_blank">SAN Pedro Sun</p>
<p></a></h4>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/hello-from-john-2/feed/?lang=es</wfw:commentrss>
		<slash:comments>47</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2012/12/Hello-from-john-mcafee-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Hola de John</title>
		<link>http://www.whoismcafee.com/hello-from-john/?lang=es</link>
		<comments>http://www.whoismcafee.com/hello-from-john/?lang=es#comments</comments>
		<pubdate>Mon, 17 Diciembre 2012 03:56:48 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Archivos de McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1348-es</guid>
		<description><![CDATA[Hola lectores, Me disculpo por mi reciente ausencia y falta de actualizaciones. Debido a los terribles sucesos de Sandy Hook [&#8230;]]]></description>
				<content:encoded><![CDATA[<div id="yass_top_edge_dummy" style="width: 1px; height: 1px; padding: 0px; margin: -11px 0px 0px; border-width: 0px; display: block;"></div>
<h4 id="yass_top_edge" style="background-image: url('chrome://yass/content/edgebgtop.png'); background-attachment: scroll; background-position: center bottom; padding: 0px; margin: 0px 0px 10px -10px; border-width: 0px; height: 0px; display: block; width: 1px;"></h4>
<h4 style="margin-top: 10px;">Hola lectores, Me disculpo por mi reciente ausencia y falta de actualizaciones. Due to the terrible events at Sandy Hook Elementary School in Newton Conn,  I have decided to take a few days absence from public life. I will resume with my blog activities in a few days.</h4>
<p> </p>
<h4>Do your best to forget the name of the shooter, and remember the innocent victims of this terrible act.</h4>
<p> </p>
<p><b><span style="font-family: Arial;"><span>Charlotte Bacon, 02-22-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Daniel Barden, 09-25-05</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Rachel Davino, 07-17-83 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Olivia Engel, 07-18-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Josephine Gay, 12-11-05</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Ana Marquez-Greene, 04-04-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Dylan Hockley, 03-08-06 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Dawn Hochsprung, 06-28-65</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Madeleine F. Hsu, 07-10-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Catherine V. Hubbard, 06-08-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Chase Kowalski, 10-31-05 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Jesse Lewis, 06-30-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>James Mattioli, 03-22-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Grace McDonnell, 11-04-05</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Anne Marie Murphy, 07-25-60 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Emilie Parker, 05-12-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Jack Pinto, 05-06-06 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Noah Pozner, 11-20-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Caroline Previdi, 09-07-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Jessica Rekos, 05-10-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Avielle Richman, 10-17-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Lauren Rousseau, 06-8-82</span></span></b></p>
<p><span style="font-family: Arial;"><b><span>Mary Sherlach, 02-11-56 </span></b><span> </span></span></p>
<p><b><span style="font-family: Arial;"><span>Victoria Soto, 11-04-85 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Benjamin Wheeler, 09-12-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Allison N. Wyatt, 07-03-06</span></span></b></p>
<div id="yass_bottom_edge" style="background-image: url('chrome://yass/content/edgebgbot.png'); background-position: 0px 0px; position: absolute; margin: 0px; padding: 0px; border-width: 0px; height: 0px; left: 0px; top: 955px; width: 100%; display: block;"></div>
<div id="yass_bottom_edge" style="background-image: url('chrome://yass/content/edgebgbot.png'); background-position: 0px 0px; position: absolute; margin: 0px; padding: 0px; border-width: 0px; height: 0px; left: 0px; top: 0px; width: 100%; display: block;"></div>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/hello-from-john/feed/?lang=es</wfw:commentrss>
		<slash:comments>74</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2012/12/candlejohn-296x283.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
	</channel>
</rss>
