<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>John McAfee &#187; John McAfee</title>
	<atom:link href="http://www.whoismcafee.com/author/dostoevsky/feed/?lang=fr" rel="self" type="application/rss+xml" />
	<link>http://www.whoismcafee.com?lang=fr</link>
	<description>Qui est McAfee - Le blog officiel de John McAfee</description>
	<lastbuilddate>Thu, 03 Apr 2014 23:00:09 +0000</lastbuilddate>
	<language>fr</language>
		<sy:updateperiod>hourly</sy:updateperiod>
		<sy:updatefrequency>1</sy:updatefrequency>
	<generator>http://wordpress.org/?v=3.8.2</generator>
	<item>
		<title>La directive du Premier ministre</title>
		<link>http://www.whoismcafee.com/the-prime-ministers-directive/?lang=fr</link>
		<comments>http://www.whoismcafee.com/the-prime-ministers-directive/?lang=fr#comments</comments>
		<pubdate>Mon, 04 Feb 2013 11:16:26 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Fichiers McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1908-fr</guid>
		<description><![CDATA[&#160; Through a series of clever constitutional changes, Le Premier ministre du Belize &#8211; Dean Barrow &#8211; a solidifié son pouvoir [&#8230;]]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><a href="http://www.whoismcafee.com/wp-content/uploads/2013/02/Fotolia_21144889_XS.jpg"><img class="alignnone" alt="man with beard screws a crown in his head" src="http://www.whoismcafee.com/wp-content/uploads/2013/02/Fotolia_21144889_XS-300x300.jpg" /></a></p>
<p> </p>
<p>Through a series of clever constitutional changes, Le Premier ministre du Belize &#8211; Dean Barrow &#8211; has solidified his power as absolute as any dictator. So when he gives an order, it is obeyed, whether within the bounds of law or not.</p>
<p>Par exemple: In mid April last year Barrow told the GSU &#8211; &#8220;Get Arthur Young at all costs&#8221;. Two days later Arthur Young was handcuffed, with his hands behind his back, and was shot and killed by the police.</p>
<p>The Prime Minister has enormous power.</p>
<p>He is also enormously pissed off by my writings and disclosures &#8211; specifically corruption within his cabinet and more specifically my statements that he personally ordered the murder of Arthur Young. La semaine dernière,, the PM met with the Police Commissioner and the heads of each police department and ordered &#8211; &#8220;Find whatever evidence is necessary to name McAfee as the prime suspect in Gregory Faul&#8217;s murder&#8221;. This is solid, unquestionable information.</p>
<p>Immediately the police began to round up my past employees and hauled them in for interrogation. Au Belize, the quickest way to frame someone is to haul in their friends, neighbors or acquaintances and, using various forms of duress, force them to sign statements implicating the person the government wants to frame. It seems that this is going to be their chosen method for getting me.</p>
<p>I anticipate some kind of announcement by the police department soon. I am not worried, but it is annoying.</p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/the-prime-ministers-directive/feed/?lang=fr</wfw:commentrss>
		<slash:comments>581</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/02/02F690342-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Sam</title>
		<link>http://www.whoismcafee.com/sam/?lang=fr</link>
		<comments>http://www.whoismcafee.com/sam/?lang=fr#comments</comments>
		<pubdate>Sat, 02 Feb 2013 01:21:09 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Fichiers McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1899-fr</guid>
		<description><![CDATA[&#160; Est avec moi dans un lieu tenu secret.  Elle est fatiguée mais sains et saufs. Plus tard. Mettre à jour: Nous sommes [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Est avec moi dans un lieu tenu secret.  She is tired but safe and well.</p>
<p>More later.</p>
<p>Mettre à jour: Nous ne sommes pas aux États-Unis, mais nous <strong>sont</strong> dans un coffre-fort, neutral country.<br />
<a href="http://www.whoismcafee.com/wp-content/uploads/2013/02/image-e1359766692704.jpg"><img class="aligncenter size-full wp-image-1897" alt="image" src="http://www.whoismcafee.com/wp-content/uploads/2013/02/image-e1359766692704.jpg" width="560" height="418" /></a></p>
<p> </p>
<p><a href="http://www.whoismcafee.com/wp-content/uploads/2013/02/image1-e1359766994379.jpg"><img class="aligncenter size-full wp-image-1896" alt="image" src="http://www.whoismcafee.com/wp-content/uploads/2013/02/image1-e1359766994379.jpg" width="420" height="560" /></a></p>
<p> </p>
<p> </p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/sam/feed/?lang=fr</wfw:commentrss>
		<slash:comments>77</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/02/sgsgsg.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>En réponse aux questions</title>
		<link>http://www.whoismcafee.com/in-reply-to-questions/?lang=fr</link>
		<comments>http://www.whoismcafee.com/in-reply-to-questions/?lang=fr#comments</comments>
		<pubdate>Tue, 22 Jan 2013 01:56:57 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Fichiers McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1761-fr</guid>
		<description><![CDATA[Certaines personnes ont posté des commentaires inflammatoires sur quelques sujets qui, clairement, ils n'ont pas une compréhension complète [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Certaines personnes ont posté des commentaires inflammatoires sur quelques sujets qui, clairement, they do not have a full understanding of.  The first is the exif data (the date, heure, type of camera, etc) attached to many of my photos.  Anyone who has done a photo montage will know that the exif data for the final product will be the exif data for the lowest element of the montage.  Since most of my photos are montages, with a variety of exif data attached to each, the exif data attached to the lowest layer is the data that gets attached to the entire montage.  Frequently I apply a base layer underneath a photo with the top photo having an opacity less than 100% in order to brighten, dim, color or otherwise improve the looks of a photo.  I create the underlayer by photographing a blank wall, a floor or any other uniform body that I deem will give the effects that I want.   I am travelling and shoot whatever is around me that works.  You can try this in Photoshop, par exemple, and check the exif data of the end product if you doubt any of it. Par exemple, the following two photos have been shown very early on in this blog (l'année dernière), and in one, I am obviously still in Belize, since I am with Sam and Amy.  The other was taken in September by Chad when he visited Belize.  Yet the exif data shows January 16th of this year 0n both of them.  This happened because I overlaid the photos on top of two separate photos taken on January 16th by my Sony camera, used 100% opacity &#8211; so that you can compare to see that they are in fact the same photos as those published previously, and then cropped it:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/in-reply-to-questions/example2/" rel="attachment wp-att-1762"><img class="aligncenter  wp-image-1762" alt="example2" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/example2.jpg" width="489" height="363" /></a></p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/in-reply-to-questions/example/" rel="attachment wp-att-1763"><img class="aligncenter  wp-image-1763" alt="Example" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/Example.jpg" width="464" height="308" /></a></p>
<p>Check the exif data (those of you complaining about the exif data) and see for yourselves. I do not like having to explain these things just because some of you are looking for anything &#8211; anything at all &#8211; to prove I am being deceptive.  I am hugely busy and this distracts from my work immensely.  If you want to keep looking for things that I do wrong then please do a little more research into your subject before you jump to conclusions.  There are in fact many of hundreds of reasons why exif data for a given photo is not indicative in any way of the date in which a photo was taken &#8212; not least of which is that any idiot can change the date and time on the camera to any date and time that they choose and then take a picture.  The users chosen date will show up in the exif data.  This is why I ignored your complaints at first. I am not an idiot.  If I wanted to decieve you, I would purposely have changed the camera date, or done any one of a hundred other trivial things to pre-date a current photo.  Could you possibly think that I am unaware of exif data?  I am too busy to waste time in deception.  I do what I do, if you don&#8217;t like the exif data, then at least give me the benefit of the doubt by considering the limitless possibilities why the data is not the data you wanted.  It is too time consuming to satisfy those few of you who insist on trying trying to find holes.  From the majority remainder of you, please ignore this rant. The second issue is Amy&#8217;s description of the brown powder I was making.  Please read my extremely detailed Bluelight discussion early on in this blog.  If you read the actual Bluelight posts, you will see hundreds of photos that I submitted about making this impossibly mythical drug &#8211; Tan-MDPV.  I obviously had to do something to create authentic looking substances.  The following blog question and my answer should suffice for all of you. <em>Read the Bluelight post!!!! There were hundreds of photos I posted of the “impossible” process. Where was I going to get the photos????? I did them myself. Amy helped me. There were brown substances, white substances, clear substances, cloudy substances. Burnt baking soda – Acetone and sugar from the lab – dozens of substances to make it look real. Amy is bright but clueless. I always told her the stuff was poison (most probably was) and not to put them in her mouth (which she did with almost everything – like a two year old). How can you talk about something (Bluelight) when you have never read the full posting on Bluelight (400 pages)? If you want to post any more negative stuff about something you have never read, seen, or know nothing about, then at least read it first.</em> <em>Ils ne sont pas, I have nothing more to add. There is nothing to add, and there is not now, nor has there ever been, a discrepancy.</em> The third item is the comments about the capacity of the recording devices that were used.  It is not rocket science.  The replacement of an ultra-cheap Chinese battery with a high capacity lithium battery (plenty of vacant room in these devices) and the replacement of a 2 gig micro SD card with a 32 gig micro SD card (which a mentally impaired six year old could do) does wonders to the amount a time a device will record.  Two of the devices supported 64 gig cards.  Software glitches limited the remainder to 32 gigs.  There are many other modifications that we made that I did not, and will not, tell you about.  Mais, nouveau, a small child could quickly look and any one of these devices and make a dozen simple changes that would improve the device by an order of magnitude in ten minutes and for a cost of less than $30.  S'il vous plaît, naysayers, use your heads. Encore une fois, I am sorry for my testiness, but a tiny fraction of followers here create 95% of the problems, et 95% of my work, by trying to create issues over absolute nonsense, or try to incessantly resurrect  issues that have been put to bed many times.  These users are either doing this out of malice or out of ignorance.  Anyone who had read the Bluelight posts on the Bluelight board would not ask the questions that have been asked.  Anyone who knew anything at all about exif data knows that the data is absolutely meaningless if someone wants a different date, time or location.  If you few folks are not doing this maliciously, then please use your head and think a little before you post inflamatory statements.  If you are doing it maliciously, your I.P. address will eventually be banned. Merci. P.S.  A plug for the upcoming movie: <strong><a href="http://www.impfm.com/pdetail/john-mcafee-official-story/" target="_blank">MÉDIAS SOCIAUX FUTURS DES IMPACTS</a></strong></p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/in-reply-to-questions/feed/?lang=fr</wfw:commentrss>
		<slash:comments>209</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/qanda-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Les filles &#8211; Deuxième partie</title>
		<link>http://www.whoismcafee.com/the-girls-part-two/?lang=fr</link>
		<comments>http://www.whoismcafee.com/the-girls-part-two/?lang=fr#comments</comments>
		<pubdate>Thu, 17 Jan 2013 21:16:49 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Fichiers McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1669-fr</guid>
		<description><![CDATA[&#160; This part two post will itself have to be divided into two parts.  Il s'est avéré beaucoup plus grande que [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/nicky/" rel="attachment wp-att-1676"><img class="aligncenter  wp-image-1676" alt="Nicky" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/Nicky.jpg" width="560" height="373" /></a></p>
<p>This part two post will itself have to be divided into two parts.  It turned out much larger than I thought</p>
<p>The photo above is of one of the American women working both in Miami and in Belize.  Frequently government ministers and officials flew to Miami (two hours from Belize City) for business, pleasure, parties or what have you.  I needed resources in Miami to keep tabs on targets.  Nicky is prepping a few computers for delivery to &#8220;amis&#8221; of hers in Belize.  She told all of her targets that she had a friend in the computer sales business and that the friend could provide computers for $100 each.  Even government officials like a good deal so the computers were easy to place.</p>
<p>Before I get into how the girls worked, you will need a brief overview of the principles of Social Engineering.  These principles have been used successfully for thousands of years:</p>
<p><strong>Attention</strong></p>
<p>Attention, in repetitive situations, wanders.  Universally.  It seeks environments and situations offering diversity.</p>
<p>Fear, lust, curiosity and pleasure seeking trap attention.  Boredom frees it.</p>
<p>When attention is gained, a person is open to motivation.</p>
<p>A good social engineer must know how to get a person’s attention and keep it.</p>
<p><strong> </strong></p>
<p><strong>Curiosity</strong></p>
<p>Most people are curious about anything new, anything out of place or strange, or anything that stands out from the background.  Many people will go out of their way to check out an object that catches their attention.</p>
<p>A good social engineer will use a person’s curiosity as one means of getting their attention.</p>
<p> </p>
<p><strong>Preconception and belief</strong></p>
<p>A person’s prior beliefs will color any new information received by the person.</p>
<p>Knowing a person’s preconceptions allows us to predict, to a larger or lesser degree, a person’s behavior in reaction to an event or situation.</p>
<p>A good social engineer creates situations in which the subject’s behavior can be predicted.</p>
<p> </p>
<p><strong>Fear</strong></p>
<p>Fear is the most powerful social motivator.  Creating fear in someone’s mind generally produces immediate results.  It is the easiest social motivator to implement.</p>
<p>A good social engineer discovers the things that the subject fears most and plays on those things in order to control behavior.</p>
<p> </p>
<p><strong>Lust</strong></p>
<p>Lust is another powerful motivator, but its overt actions are not as immediate as actions inspired by fear.  Lust does, cependant, cause immediate, and hopeful, planning in the brain.</p>
<p>A good social engineer observes a subject’s behavior relating to sexual issues and inserts the necessary elements into the subject’s environment to assist the subject in planning to assuage lust.</p>
<p> </p>
<p><strong>Greed</strong></p>
<p>No matter how much a person owns of a valuable commodity, the person generally wants more of that commodity (argent, houses, cars, etc), unless the commodity has become a financial, emotional or physical burden.</p>
<p>A good social engineer discovers those things that the subject deems of value and mentally assists the subject in his or her desires.</p>
<p> </p>
<p><strong>Pleasure seeking</strong></p>
<p> </p>
<p>Humans seek pleasurable situations.  Pure and simple.</p>
<p>A good social engineer never forgets this.</p>
<p> </p>
<p><strong>Faites confiance</strong></p>
<p>Any display of trust from a given person elicits a reciprocal sense of trust.  Par exemple: Sharing a secret with someone is an indication of trust in that person and generally motivates the revealing of a reciprocal secret.  Asking someone to hold your money or something valuable is another indication that you trust someone and will help make the person believe that they can trust you.</p>
<p>Carefully listening to someone creates trust within the person doing the talking.</p>
<p>Being helpful to someone elicits a sense of trust within that person.</p>
<p>Flattery and admiration frequently elicit trust.</p>
<p>Smiles elicit trust.</p>
<p>Friendly gestures elicit trust</p>
<p>The more time spent with a person, the more trust is generally gained.</p>
<p>When trust is created, a person is open to motivation.</p>
<p>A good social engineer will, as the first step in contact with the subject, attempt to elicit trust.</p>
<p> </p>
<p><strong> Comfort</strong></p>
<p>In a choice involving no physical or emotional reward, people generally choose the most comfortable option.</p>
<p>Discomfort motivates action.</p>
<p>Fear, boredom and unrequited lust quickly create discomfort in a subject.  A good social engineer creates situations that allow the subject to escape discomfort.</p>
<p> </p>
<p><strong>Boredom</strong></p>
<p>Boredom attenuates fear and accentuates curiosity, la cupidité, pleasure seeking and lust.</p>
<p>Boredom is fertile ground for planting new ideas (an idle mind is the Devil’s playground).</p>
<p>In a boring situation, attention is directed toward potential excitement.</p>
<p>A good social engineer will be adept at recognizing boredom.</p>
<p> </p>
<p><strong> Adherence to moral norms</strong></p>
<p>Given the desire, the right opportunity (and potential partner) and the assurance of being undetected, many men will stray.   Many women will too.</p>
<p>The majority of people will lie in situations in which telling the truth will negatively and severely impact their lives, providing that they believe the lie will not be caught.</p>
<p>Few people will outright steal.  The exceptions are items of perceived very low value (a pencil for example), items of perceived extremely high value involving no risk of detection, and thefts that can be morally justified (a bag of hundred dollar bills sitting on a sidewalk for example).</p>
<p>A large percentage of people will participate in financial cheating if they are dealing with a stranger, are not in the company of friends, and if fear of detection is low.  If given too much change when purchasing an item, par exemple, half of the people will pocket the change without alerting the sales person.</p>
<p>Moral justifications free people to do immoral things.</p>
<p>A good social engineer is aware of these things and uses the knowledge accordingly – most specifically in helping the subject to find moral justifications for actions deemed necessary to the operation.</p>
<p> </p>
<p><strong> Adherence to social customs</strong></p>
<p>In the absence of social chaos (a nuclear bomb strike, par exemple), civilized people will generally adhere to the day-to-day customs that make life tolerable.  Par exemple:</p>
<p>An item of little value left in someone’s office, or on someone’s desk, volonté, généralement, remain untouched and will be freely returned if the owner asks for it.</p>
<p>An item of clothing left on a table or the seat of a booth will generally prevent someone else from sitting at that table or booth.</p>
<p>Even a stranger will seldom decline a favor requiring no effort or cost.</p>
<p>Providing assistance to someone in obvious need will seldom be declined if the person assisting is not placed in a position of fear or discomfort.</p>
<p>Even a stranger who is approached in a friendly manner will generally pause what they are doing and respond to the person approaching.</p>
<p>A good social engineer uses social customs in all aspects of the work.</p>
<p>__________________________________________________</p>
<p><strong>Tools of the Trade</strong></p>
<p>In addition to the computer element of the network, each girl was trained in using a variety of surveillance tools:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/pen/" rel="attachment wp-att-1678"><img class="aligncenter  wp-image-1678" alt="pen" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/pen.jpg" width="560" height="378" /></a></p>
<p>This pen has a pinhole video camera and a microphone.  It will pickup conversations as far as 20 feet away.  It can be left on someone&#8217;s desk, in a chair. on a shelf &#8211; anywhere that is convenient.  Collecting it later is simple.  &#8220;I forgot my pen, is it still here?&#8221;</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/alarm-clock/" rel="attachment wp-att-1670"><img class="aligncenter  wp-image-1670" alt="alarm clock" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/alarm-clock.jpg" width="560" height="373" /></a></p>
<p>This travel alarm clock contains a video camera and microphone.  It can be placed beside the bed, facing the bed, and will record &#8211; in low light &#8211; everything.  The resulting videos are useful in gaining co-operation from unco-operative subjects, as well as documenting any phone calls made during the session.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/car-keys/" rel="attachment wp-att-1671"><img class="aligncenter  wp-image-1671" alt="car keys" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/car-keys.jpg" width="560" height="400" /></a></p>
<p>This fake auto remote control contains a camera and microphone.  It can be left anywhere and will record non-stop for 24 hours.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/glasses/" rel="attachment wp-att-1672"><img class="aligncenter  wp-image-1672" alt="glasses" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/glasses.jpg" width="560" height="373" /></a></p>
<p>These polarized sunglasses will record everything that the wearer looks at, with audio.  Their potential applications are obvious.  They are activated by pussing the logo on the side.  It is actually a button.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/mp3-player/" rel="attachment wp-att-1675"><img class="aligncenter  wp-image-1675" alt="mp3 player" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/mp3-player.jpg" width="560" height="373" /></a></p>
<p>This MP3 player looks and acts like any MP3 player.  it has a video camera and an audio recorder.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/watch/" rel="attachment wp-att-1679"><img class="aligncenter  wp-image-1679" alt="watch" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/watch.jpg" width="560" height="373" /></a></p>
<p style="text-align: center;">This waterproof wristwatch contains a video camera with audio.  It is activated by a button on the side.  It will only record a total of one hour, but it is useful in recording events on boats, in water, etc</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/mini-recorder-2/" rel="attachment wp-att-1696"><img class="aligncenter  wp-image-1696" alt="mini-recorder" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/mini-recorder1.jpg" width="560" height="840" /></a></p>
<p style="text-align: center;">This mini recorder will record many days of video and  audio.  I can be inserted into anything.  We purchased these recorders by the hundreds:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls-part-two/hundreds/" rel="attachment wp-att-1698"><img class="aligncenter  wp-image-1698" alt="hundreds" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/hundreds.jpg" width="560" height="373" /></a></p>
<p style="text-align: center;">Here is Nicky wearing the video sunglasses and holding her two favorite items:</p>
<p style="text-align: center;"> <a href="http://www.whoismcafee.com/the-girls-part-two/nicky2-3/" rel="attachment wp-att-1693"><img class="aligncenter  wp-image-1693" alt="nicky2" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/nicky2.png" width="560" height="739" /></a></p>
<p>The second half of part two is coming.  Sorry it&#8217;s so long.</p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/the-girls-part-two/feed/?lang=fr</wfw:commentrss>
		<slash:comments>235</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/partdeux-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Les filles</title>
		<link>http://www.whoismcafee.com/the-girls/?lang=fr</link>
		<comments>http://www.whoismcafee.com/the-girls/?lang=fr#comments</comments>
		<pubdate>Mon, 14 Jan 2013 03:37:55 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Fichiers McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1609-fr</guid>
		<description><![CDATA[&#160; J'ai pensé que je ferais une brève introduction à certaines des filles qui, en grande durée de vie [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1a/" rel="attachment wp-att-1610"><img class="aligncenter  wp-image-1610" alt="port-1a" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1a-e1358132275742.jpg" width="560" height="416" /></a></p>
<p>J'ai pensé que je ferais une brève introduction à certaines des filles qui, en gros vivait avec moi à temps plein.  Sans l'aide de ces filles, Il aurait fallu des années pour amorcer le système d'ingénierie sociale que j'ai mis en place au Belize.  Sam était central pour m'aider à gérer et contrôler le réseau.  Elle s'entendait bien avec toutes les filles et son intelligence supérieure et un esprit vif habituellement lui a permis d'anticiper les problèmes et de leur barrer la route avant d'arriver au point de danger.  Elle est alo comme un caméléon:  Elle peut regarder et agir d'une partie:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1b/" rel="attachment wp-att-1611"><img class="aligncenter  wp-image-1611" alt="port-1b" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1b-e1358132658843.jpg" width="560" height="315" /></a></p>
<p>Je lui ai fait équipe avec d'autres filles à plusieurs reprises &#8211; habituellement quand j'ai senti un brassage de problème.  Généralement son caractère ludique diffusé les tensions:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1c/" rel="attachment wp-att-1612"><img class="aligncenter  wp-image-1612" alt="port-1c" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1c-e1358132909606.jpg" width="560" height="374" /></a></p>
<p>Amy est plus expérimenté que Sam, mais pas aussi tolérant de la nature humaine et les erreurs des gens comme Sam est.  Mais elle est incroyablement intelligente.  Les trois d'entre nous &#8211; Me, Sam et Amy étaient le noyau central (Amy et Sam sont maintenant bien cachés à l'étranger, au fait &#8211; leurs visas sont en cours):</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1d/" rel="attachment wp-att-1613"><img class="aligncenter  wp-image-1613" alt="port-1d" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1d-e1358133085500.jpg" width="560" height="374" /></a></p>
<p>D'autres filles allaient et venaient &#8211; restant parfois un mois, parfois 4 ou cinq mois.  Angie est venu et a un certain nombre de fois:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1f/" rel="attachment wp-att-1614"><img class="aligncenter  wp-image-1614" alt="port-1f" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1f-e1358133372941.jpg" width="560" height="314" /></a></p>
<p>Ainsi fait Marcia:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1h/" rel="attachment wp-att-1615"><img class="aligncenter  wp-image-1615" alt="port-1h" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1h-e1358133454806.jpg" width="560" height="746" /></a></p>
<p>D'autres ont été transitoires, rester quelques semaines à la fois et ensuite retourner sur le terrain:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1m/" rel="attachment wp-att-1618"><img class="aligncenter  wp-image-1618" alt="port-1m" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1m-e1358133582524.jpg" width="560" height="315" /></a></p>
<p> </p>
<p>J'ai encouragé toutes les filles de passer du temps ensemble et deviennent amis, lorsque cela est possible.  Il était plus facile de garder un œil sur les actions de quelqu'un si d'autres observaient, ou si un comaraderie partagée encouragé le partage des secrets intimes.  Toutes les filles m'ont dit les autres filles&#8217; secrets.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1i/" rel="attachment wp-att-1616"><img class="aligncenter  wp-image-1616" alt="port-1i" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1i-e1358133678788.jpg" width="560" height="420" /></a></p>
<p>Paz a contribué à m'aider à trouver des actifs appropriés:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-1j/" rel="attachment wp-att-1617"><img class="aligncenter  wp-image-1617" alt="port-1j" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-1j-e1358134109836.jpg" width="560" height="374" /></a></p>
<p>Paz possède le bar Lover Orange Walk et est connue à travers le Belize comme un maître à localiser des ressources humaines.  Je dirais Paz les spécifications: niveau d'intelligence, éducation, raffinement culturel, lien familial, âge, regarde, expérience, etc, et Paz se localiser pour moi.  Je voudrais ensuite sentir la personne sur, et si confortable, explain the project and hire them.</p>
<p>Il s'agit de la plus brève des introductions.  Je vais bientôt entrer dans les détails sur la façon dont chaque fille a travaillé.  Beaucoup savait tout.  Certains ont dit rien et simplement donné un ordinateur libre et parfois un téléphone.  Parfois plus d'un, si un père, frère, cousin or boyfriend was of interest to us.</p>
<p>Il est à noter que plus de 80% de notre réseau électronique est toujours opérationnel et fournissant des informations constant.  Mon prochain post vous expliquera, avec des photos et des fichiers vocaux, comment nous avons évité de détection pendant si longtemps.  Le 11 Octobre de l'année dernière, on a découvert que nous étions accès à l'information gouvernementale secrète, mais jusqu'à ce que mon 3e message Janvier, nul dans le gouvernement n'avait aucune idée de la façon dont nous le faisions.  La plupart de nos &#8220;don&#8221; les ordinateurs du gouvernement ont depuis été ramené, mais le principal domino d'ingénierie sociale viral a permis d'infiltrer cinq fois plus nombreux &#8220;inconnue&#8221; ordinateurs que le nombre que nous avons donné, and the number is growing.</p>
<p>Le noyau de sept:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-girls/port-end/" rel="attachment wp-att-1624"><img class="aligncenter  wp-image-1624" alt="port-end" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/port-end-e1358134642110.jpg" width="560" height="374" /></a></p>
<p> </p>
<p> </p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/the-girls/feed/?lang=fr</wfw:commentrss>
		<slash:comments>127</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/thegirls-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>La GSU dégénère sa violence</title>
		<link>http://www.whoismcafee.com/the-gsu-escalates-its-violence/?lang=fr</link>
		<comments>http://www.whoismcafee.com/the-gsu-escalates-its-violence/?lang=fr#comments</comments>
		<pubdate>Fri, 11 Jan 2013 06:03:28 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Fichiers McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1576-fr</guid>
		<description><![CDATA[&#160; J'ai reçu le courriel suivant aujourd'hui de Pedro Castellanos, un représentant d'un groupe de détenteurs d'Amérique latine de [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>J'ai reçu le courriel suivant aujourd'hui de Pedro Castellanos, un représentant d'un groupe de détenteurs d'Amérique latine du défaut de paiement du Belize Superbond.  Détenteurs obligataires du Belize ont perdu des centaines de millions de dollars au cours de la dernière année en raison de la défaillance du Premier ministre Dean Barrow:</p>
<p><em>Monsieur. Mcafee, Je représente un groupe de Belize 2029 porteurs de l'Amérique latine qui ne sont pas satisfaits avec les négociations des obligations qui auront lieu entre Dean Barrow et les détenteurs d'obligations&#8217; comité de coordination. Certains d'entre nous ont voyagé à Belize et même avoir des amis et des membres de la famille vivant là-bas et savoir comment un pays dangereux, il est devenu sous l'administration Barrow. Nous voulons Barrow et l'UDP hors du bureau pour toujours, so we decided to contact you.</em></p>
<p><em>Nous avons été choqués par les récents événements qui ont eu lieu dans la ville de Belize. Voici une vidéo Youtube de la GSU agissant comme un escadron de la mort il ya quelques jours, au cas où vous n'avez pas le regarder: </em></p>
<p><em>BELIZE du SSG est le plus récent DEATH SQUAD du AMÉRIQUE CENTRALE</em></p>
<p><iframe src="http://www.youtube.com/embed/Zimr6rSWzYQ" height="315" width="560" allowfullscreen="" frameborder="0"></iframe></p>
<p><em>Je connais votre profonde insatisfaction avec l'administration Barrow, ce qui est exactement ce que nous ressentons à propos de Barrow et le défaut de la dette. </em></p>
<p><em>Nous ne voulons pas que le comité de liaison pour fermer un accord sur la dette avec Dean Barrow pour un certain nombre de raisons:</em></p>
<p><em>1. We don&#8217;t want Barrow to take credit for closing a successful bond exchange.</em></p>
<p><em>2. Nous ne voulons pas l'UDP à remporter un troisième mandat. A successful debt exchange could help them achieve this goal.</em></p>
<p><em>3. We strongly oppose Barrow&#8217;s nationalizations of Telemedia and BEL.</em></p>
<p><em>4. Plus important encore, nous croyons qu'un troisième mandat pour le UDP serait le clou dans le cercueil pour le Belize. Such a beautiful country totally destroyed by Dean Barrow and the UDP.</em></p>
<div id="yui_3_7_2_1_1357860570681_13523"><em>A partir de vos messages et interviews, nous savons que vous partagez beaucoup de nos vues. Nous savons aussi que vous êtes une personne extrêmement intelligente nous avons décidé de solliciter votre aide dans la prévention de Barrow de clôture de la transaction de la dette. Nous pensons qu'un échange obligataire échoué causerait beaucoup de tort à Barrow et l'UDP, and that it would politically cripple them.</em></div>
<div id="yui_3_7_2_1_1357860570681_13522"><em> </em></div>
<div id="yui_3_7_2_1_1357860570681_13521">
<p><em>Barrow est déjà sur le crochet pour annoncer un accord sur la dette avec succès (s'il vous plaît lire son discours de Noël et du Nouvel An), lorsque les membres les plus importants AdHoc DU COMITE n'ont pas convenu d'un accord sur la dette. Juste le comité de coordination a accepté, et a du mal à convaincre les membres AdHoc. Un minimum de 75% des liens doivent être d'accord, otherwise it fails.</em></p>
<p><em>Si cette idée vous intéresse, s'il vous plaît me contacter à cette adresse e-mail. </em></p>
</div>
<div id="yui_3_7_2_1_1357860570681_13520"><em>À propos, we admire very much how you handled your Belize experience.</em></div>
<div id="yui_3_7_2_1_1357860570681_13519"><em> </em></div>
<div id="yui_3_7_2_1_1357860570681_13517">
<p><em>Cordialement,</em></p>
<p><em>Pedro</em></p>
</div>
<div id="yui_3_7_2_1_1357860570681_13541"></div>
<div>J'ai répondu à M.. Castellanos et ont convenu de soutenir pleinement leur initiative.  S'il vous plaît voir la vidéo ci-jointe de la situation actuelle au Belize.  Si quelqu'un doutait de mon point de vue sur la sécurité du pays, this should dispel those doubts.</div>
<div></div>
<p> </p>
<p> </p>
<p> </p>
<h4 style="text-align: center;">7  Nouvelles Belize &#8211; Navires de croisière Annuler appels</h4>
<p style="text-align: center;"><a href="http://www.7newsbelize.com/sstory.php?nid=24405">http://www.7newsbelize.com/sstory.php?nid=24405</a></p>
<p> </p>
<p> </p>
<p> </p>
<p><a href="http://www.whoismcafee.com/the-gsu-escalates-its-violence/warning/" rel="attachment wp-att-1582"><img class="aligncenter size-full wp-image-1582" alt="warning" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/warning.jpg" width="316" height="491" /></a></p>
<p style="text-align: center;">( Version longue: histoire commence à 5:40 &#8211; Avertissement de l'imagerie graphique )</p>
<p style="text-align: center;">[ylwm_vimeo]57034146[/ylwm_vimeo]</p>
<h4 style="text-align: center;"><span> </span></h4>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<div></div>
<div></div>
<div></div>
<div></div>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/the-gsu-escalates-its-violence/feed/?lang=fr</wfw:commentrss>
		<slash:comments>62</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/belize-flag-296x213.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>A Clear and Present Danger</title>
		<link>http://www.whoismcafee.com/a-clear-and-present-danger/?lang=fr</link>
		<comments>http://www.whoismcafee.com/a-clear-and-present-danger/?lang=fr#comments</comments>
		<pubdate>Thu, 03 Jan 2013 08:05:21 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Fichiers McAfee]]></category>
		<category><![CDATA[Belize entre dans le monde du terrorisme]]></category>
		<category><![CDATA[castor beans]]></category>
		<category><![CDATA[cyanide]]></category>
		<category><![CDATA[Hezbollah au Belize]]></category>
		<category><![CDATA[john mcafee belize]]></category>
		<category><![CDATA[Ricin]]></category>
		<category><![CDATA[terrorisme au Belize]]></category>
		<category><![CDATA[zeta cartel]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1466-fr</guid>
		<description><![CDATA[&#160; After the April raid on my property in Orange Walk I went on the offensive.  J'avais demandé [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>After the April raid on my property in Orange Walk I went on the offensive.  I had asked for a simple apology and had received none.  I was pissed.  They had shot my dog, destroyed my property and stolen hundreds of thousands of dollars worth of things that I valued.  They have still not been returned.</p>
<p>J'ai acheté <a href="http://www.whoismcafee.com/wp-content/uploads/2012/11/corruption4-31.jpg" target="_blank">75 ordinateurs portables à bas prix </a>et, avec l'aide de confiance, logiciel installé invisible de frappe de l'exploitation forestière sur chacun d'eux - le genre qui appelle à la maison (me) and disgorges the text files.  It also, sur commande, allume, et à l'extérieur, the microphone and camera – and sends these files on command.  I had the computers re-packaged as if new.  I began giving these away as presents to select people – government employees, policiers, Les assistants de ministre du Cabinet, petites amies des hommes puissants, boyfriends of powerful women.  I hired four trusted people full time to monitor the text files and provide myself with the subsequent passwords for everyone’s email, Facebook, private message boards and other passworded accounts.  The keystroke monitoring continued after password collection, in order to document text input that would later be deleted.  So nothing was missed&#8230;</p>
<p>I next collected my human resources for the complex social engineering I would have to do.  I arranged with 23 les femmes et les 6 men to be my operatives.  Eight of the women were so accomplished that they ended up living with me.  It was amazingly more efficient and they were easily convinced to check up on each other.  One was so accomplished (Marcia) qu'elle est devenue un agent double et presque m'a tué:</p>
<p> </p>
<h4><a href="http://www.whoismcafee.com/third-file-post/" target="_blank">story from  post3</a>   et  <a href="http://www.whoismcafee.com/file-post-4/" target="_blank">histoire de Post4</a></h4>
<p> </p>
<p>Ces hommes et ces femmes ont reçu une formation simple sur la façon d'accéder et de charger le logiciel sur l'ordinateur de quelqu'un pendant qu'ils dormaient, or ate or made long phone calls etc.  It’s dead simple if you’re sleeping with someone – “Hey Babe, puis-je emprunter votre ordinateur pour vérifier mes e-mails?” – A little more complex if you’re not – but not much.  They were also shown dirt simple phone tricks, like borrowing a person’s phone to make a call and then resetting auto-delete of sent texts.  No-one ever checks these things after setup, so all the sent texts are now available to the person borrowing your phone to call their boyfriend to make up a story so they can sleep over with you.  Due to the nature of the call, l'opérateur est clairement nécessaire confidentialité lors de l'appel - d'où la facilité d'accès à modifier vos paramètres et de lire vos textes envoyés</p>
<p>And I taught them other tricks.</p>
<p>Quand mes équipes ont été assemblés, I targeted the two National phone companies for engineering.  It was imperative for me to be able to hear people’s phone conversations, or at the very least to know with whom they were in contact.  This social engineering exercise was the easiest.  I used myself as the decoy in this operation.</p>
<p>I approached numerous employees of both companies with the offer to buy the information that I needed.  I knew this would raise flags and lead to failure.  I did this in a manner that would not get me arrested but would ensure that my enquiries reached the appropriate ears – ears belonging to people who definitely did not want me to learn anything.   People then knew I was after information and, comme ils le feraient naturellement penser, I would use “buying” as my technique.  Both companies eventually gave me information, que j'ai acheté, mais il était, comme prévu, garbage.  While I was negotiating all of this, mon équipe était <em>de travail</em> its way through the lower ranks of Phone Company employees and had locked onto a number of key players who had access to the technical processes involved in tapping phones and delivering lists of phone contacts.  The team had contact information for appropriate wives and husband of these key players, connaissait les noms des fournisseurs de drogue des employés (le cas échéant), Les noms des membres de la famille respectable, and names of all the other “side interests” of the targets.  Being “pillow talk” masters, ils savaient aussi, et avait vérifié, every secret thing the persons had ever done.  Phone Project complete.</p>
<p>Parallèlement à ce qui précède, I had identified key “helpers” for each Government Minister and had sent in social engineers to stroke the helpers.  Each was armed with software, cadeaux, une histoire, a seductive smile and a small voice recorder.  Everyone had at least one voice recorder.  They were small.  They could be hidden under a bed, derrière une œuvre d'art, l'intérieur d'un coussin, in an old shoe.  They could be kept on, enregistrement, for days on end prior to retrieval.</p>
<p>Throughout this process I emailed the Prime Minister every few weeks and asked for an apology.  A simple apology, dans les premiers stades au moins, would have stopped this whole affair.  I received none.</p>
<p>What I was looking for was hard proof of corruption at a high level.  I’m not sure what I expected to gain.  The satisfaction of revenge perhaps &#8211; to some extent – what little satisfaction there is in revenge.  As a way to get my stuff back?  Peut-être.  For the sheer joy of muscle flexing?  I can’t answer precisely.  Much of my life is a mystery to me.  Suffice it to say:  I just did it because I could.</p>
<p>Ce que j'ai trouvé, pour la plupart, attendu &#8212; Un nombre incalculable d'aventures sexuelles &#8212; Chats embarrassant sinistres et intime &#8212; Multiple, protestations simultanées de amour, and jealousy and anger.</p>
<p>Some things were surprising.  I kept sending increasingly irresistible women in the direction of the UDP Party Chairman, to absolutely no avail.  Finalement, a clever but unsuccessful young woman suggested an alternate chromosome configuration and – success at last.  It was a surprise to me, given the macho nature of the Chairman.</p>
<p>I was also surprised that the Prime Minister had personally ordered the murder of Arthur Young.  I had assumed that the idea came from much lower in the ranks.  But other than these few and other not so remarkable bits of information, things fell pretty much into the order that I had anticipated.  There were a few exceptions.  This one comes to mind, et il s'est avéré être central à une question que je l'avais prévu:</p>
<p>Tout en surveillant une jeune femme travaillant dans le Ministère de l'Immigration, dont Facebook chats ont toujours été exclusivement en créole, ce qui suit surgi:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/mmd/" rel="attachment wp-att-1467"><img class="aligncenter  wp-image-1467" alt="mmd" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/mmd.jpg" width="576" height="97" /></a></p>
<p> </p>
<p>She was chatting on Facebook at the time with another young woman who had a limited education.  This occurred in late May.  The person monitoring the computer keystrokes forwarded it to me.  I sent a command to the system to activate the camera every 10 minutes and send me still shots.  After two days of monitoring nothing showed up other than the woman’s face that used the computer.  I managed to compromise the computer used by the friend she was chatting with and activated both the camera and the microphone on her system, mais encore une fois, rien a montré up. I finally sent in a human resource.  More on this later.</p>
<p>I had early on documented heavy human trafficking as part of the National Security and Immigration Ministries’ activities.  This was hardly news, cependant.  All over Belize are huge billboards pleading for the cessation of human trafficking, much as billboards in America used to beg us not to drink and drive.  Everyone knew it was happening – obviously.  The billboards weren’t for nothing.  So my discoveries were uninteresting old news.</p>
<p>Cependant, dans le fourre-tout du Belize &quot;traite des êtres humains&quot; était une statistique intéressante que j'ai découvert:  Nearly 25% étaient libanaise, and all of these were male.   The entry passports for these Lebanese varied – Jordanian, Afghani, Saudi Arabia – but they nearly all spoke Lebanese Arabic.  The Lebanese were handled differently.  A false identity was created using a deceased Belizean with an appropriate English or European sounding name.  Par exemple:</p>
<p> </p>
<h4><a href="http://edition.channel5belize.com/archives/75785" target="_blank"><span style="font-family: Times New Roman;"><span><strong>Qui a aidé Hezbollah terroriste obtenir passeport Belizean&amp;IDs</strong></span></span></a></h4>
<p> </p>
<p>Après la fausse Identity a été créé un passeport a été délivré (cette, par la loi, prend cinq années de résidence, mais rappelez-vous, ensemble cette chose a été créé et de fonctionner par le Gouvernement - de sorte esquivant la loi est trivial).  After the passport was issued, un handler a été affecté à aider la personne à exit Belize en toute sécurité et arriver en Amérique du en toute sécurité (safe for them that is.  Not so safe for America).  This was accomplished by turning the person in question over to a different, sequential set of handlers along the way.  The Architect of this process is John Saldivar – Minister of National Security, et pendant un certain temps, Minister of Immigration as well.</p>
<p>I had located an individual working in Immigration that was trustworthy and willing to talk.  I discovered that an average of eleven Lebanese males were given new identities each month.  One month there were sixteen:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/16-lebanese/" rel="attachment wp-att-1468"><img class="aligncenter  wp-image-1468" alt="16 lebanese" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/16-lebanese.jpg" width="576" height="261" /></a></p>
<p>I l'ai expurgée l'original, et de nouveaux noms, for obvious reasons.</p>
<p>La ressource humaine que j'ai envoyé à vérifier sur la séquence impair de textes partir de fin mai a rapporté un morceau surprenante d'informations:  A young gentleman named Farid had taken up with the woman from Immigration whose computer he used (cette est une femme différent à partir de le celui qui m'a envoyé des statistiques mensuelles).  My resource, étant plus clever que la moyenne Belizean jeune femme, quickly snaked Farid for herself.  Early on I received this email from her:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/fareed-email/" rel="attachment wp-att-1469"><img class="aligncenter  wp-image-1469" alt="Fareed email" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/Fareed-email.jpg" width="576" height="167" /></a></p>
<p> </p>
<p>Her subsequent phone call was enlightening.  We have disguised her voice:</p>
<p><iframe src="http://www.youtube.com/embed/ITF_OU2NqVM" height="315" width="420" allowfullscreen="" frameborder="0"></iframe></p>
<p>Something was clearly happening that was not good.  The following voice recording of a discussion with a well placed Belizean official details most aspects of the Iranian new identity process.  We have disguised the person’s voice for obvious reasons:</p>
<p><iframe src="http://www.youtube.com/embed/MSO2KTepKDk" height="315" width="420" allowfullscreen="" frameborder="0"></iframe></p>
<p>Belize est clairement le joueur central dans un réseau plus vaste dont le but est pour infiltrer le US. with individuals having links to terrorist organizations.   What is different today from the wholesale Belizean passport selling of ten years ago, , c'est que les fausses citoyennetés qui sont créés pour ces hommes sont couplés avec un réseau de handlers conçu pour se déplacer les les individus, et leur cargaison, into the U.S.</p>
<p>La ressource de remplacement qui que j'ai envoyé à tenir compagnie Farid (quelqu'un capable de contourner la cruauté de Farid) emailed me many times concerning Farid’s vocal anger toward America.  In one email she provided two crucialpieces of information that made things come into focus:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/hezbollah-castor/" rel="attachment wp-att-1470"><img class="aligncenter  wp-image-1470" alt="hezbollah castor" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/hezbollah-castor.jpg" width="576" height="317" /></a></p>
<p>Le fonctionnaire Belizean dans le enregistrement de la voix préalable était soit pas au courant de la connexion nicaraguayen ou des, plus susceptibles, was afraid to divulge it.   Here’s what the world seems to know so far:</p>
<p>Il peut y avoir un camp de Hezbollah dans Nicaragua, mais aucune-et-un semble de savoir ce qu'ils sont en train de faire à la camp:</p>
<h4><a href="http://www.timesofisrael.com/iran-hezbollah-establish-training-base-in-nicaragua/" target="_blank">Hezbollah établir base d'entraînement dans Nicaragua</a></h4>
<p> </p>
<p>Hezbollah a créé des liens avec les Cartels de la drogue mexicains - plus précisément les Zetas:</p>
<p> </p>
<h4><a href="http://articles.businessinsider.com/2011-07-14/politics/30060540_1_islamic-militants-hezbollah-cartels" target="_blank">Hezbollah Crochets Up With Cartels de la drogue mexicains</a></h4>
<h3></h3>
<p> </p>
<p> </p>
<h3><a href="http://www.eurasiareview.com/24122012-new-concerns-for-president-pena-nieto-hezbollahs-rising-profile-in-mexico-analysis/" target="_blank">La Profil Rising du Hezbollah Au Mexique</a></h3>
<p> </p>
<p>Everyone seems to think that Hezbollah’s intent is to gain riches through additional drug trafficking.  But drug trafficking is not Hezbollah’s intent, as the above reports imply.  Hezbollah is using the Zeta drug transportation network to transport something similar, dans poids et la taille, to the drugs that the Zetas know so well how to slip into the States.  In return, Hezbollah is providing know-how to the Zetas in advanced weaponry.</p>
<p>Le monde diplomatique (le Département d'Etat) sait clairement que le Belize est l'architecte de la menace actuelle à la sécurité de Amérique du:</p>
<p> </p>
<h3><a href="http://raficlabboun.blogspot.ca/2012/09/wikileaks-from-us-embassy-in-belize.html" target="_blank">Wikileaks à partir de AMÉRICANO-. Embassy in Belize </a></h3>
<h3></h3>
<p> </p>
<h3></h3>
<h3><a href="http://www.reporter.bz/front-page/hezbollah-terrorist-with-belizean-passports/" target="_blank">Hezbollah terroriste avec des passeports béliziennes</a></h3>
<p> </p>
<p>but the State Department either does not understand the depth of the threat or for some bizarre reason does not want anyone to know the depth of the threat.  En fait, they don’t even want people to know that Belize is sending terrorist into America at all.  All official reports claim that the passports that people have been caught with are in fact forgeries and that the Government of Belize is not involved in creating false identities.  Malheureusement, ils sont. And the threat is of an enormous magnitude.  The substance being created in Nicaragua is being created by the ton.</p>
<p>I know all of this because I reassigned resources and for the past three months have had two people in Nicaragua that have made connections with the Hezbollah camp and I have three people in Mexico who have made connections with mid-level Zeta members.  I will release no information at this point that will implicate these five people.  Both the Hezbollah camp members and the Zeta organization, combiné, have thousands of female connections.  This small post will implicate no one.</p>
<p>Anyone who is truly interested in deeper process of what is happening can infer the truth from the information provided in this post.  I have provided everything you need.</p>
<p>Belize is still a pirate haven.  The stakes have just increased a few orders of magnitude.  The current government represents a threat of enormous proportions.</p>
<p>My subsequent posts will expand on different aspects of the above as it becomes safe to do so.  En attendant,, I am taking a well-earned vacation into the heartland of the Midwest.  I blend well with the ranchers and cowboys that I lived amongst for so many years.  They are a sympathetic lot.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/a-clear-and-present-danger/john2/" rel="attachment wp-att-1471"><img class="aligncenter  wp-image-1471" alt="john2" src="http://www.whoismcafee.com/wp-content/uploads/2013/01/john2.jpg" width="459" height="578" /></a></p>
<p> </p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/a-clear-and-present-danger/feed/?lang=fr</wfw:commentrss>
		<slash:comments>179</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/belize-vacations-296x213.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>The Escape &#8211; Part One</title>
		<link>http://www.whoismcafee.com/the-escape-part-one/?lang=fr</link>
		<comments>http://www.whoismcafee.com/the-escape-part-one/?lang=fr#comments</comments>
		<pubdate>Wed, 26 Décembre 2012 13:35:36 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Fichiers McAfee]]></category>
		<category><![CDATA[John McAfee échapper à Belize]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1423-fr</guid>
		<description><![CDATA[&#160; It’s Christmas day and I’m taking a break from the seriousness of my upcoming January 3rd post.  Je pensais que [&#8230;]]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>It’s Christmas day and I’m taking a break from the seriousness of my upcoming January 3<sup>e</sup> poster.  I thought I might post the picture story of the first half of Sam’s and my escape from Belize and my eventual arrival in the States.  It’s visually interesting and it is mostly a happy story – in line with most Christmas stories.</p>
<p>I’ll start with our arrival, undercover, in Belize City a few days prior to our departure on our exit adventure.  We had been in hiding for a couple of weeks, living in less than desirable conditions.  Sam was eaten alive by bugs and was happy to reach a place with hot water and comfort, as was I:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-bites/" rel="attachment wp-att-1424"><img class="aligncenter  wp-image-1424" alt="sam bites" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-bites.jpg" width="510" height="766" /></a></p>
<p> </p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-folding/" rel="attachment wp-att-1425"><img class="aligncenter  wp-image-1425" alt="sam folding" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-folding.jpg" width="511" height="766" /></a></p>
<p> </p>
<p>Our plan was simple:</p>
<p>Multiple checkpoints had been set up along every highway exiting Belize and all of the border crossings and seaports had been beefed up with police and Belize Defense Force personnel.   Air travel was impossible since the few existing airports had beefed up security staff armed with our photos and names.</p>
<p>I chose a few very simple social engineering tricks to effect our escape.  Social engineering is the art of predicting people’s behavior based on given stimuli.  It is the method of choice for modern computer hackers wishing to gain access to sensitive data.  Cracking a computer system’s security electronically, par exemple, can be difficult.  Tricking a secretary or systems manager into simply given you the access is simple.  It requires only a cute young man, or sexy woman, or a correct role playing scenario, a little software and a little bit of time.</p>
<p>Social engineering can be applied to any problem, not just computer hacking problems.  Distractions and decoys, par exemple, have been used for centuries as primitive social engineering tools.</p>
<p>We choose to take the Southern Highway to a town at the far southern end of Belize called Punta Gorda.  From there we had arranged to take a small fishing boat the thirty or so miles to a border town in Guatemala called Livingston.  The Southern highway, we knew, since we had friends driving the full length daily, had three checkpoints along its way.  On the day we left we chose, as a decoy, a friend driving one of my high profile pickup trucks.  He drove three miles ahead of us and was in constant communication with us.  The truck’s documentation was in my name and was with the truck, just in case they failed to identify the truck by sight.  The plan was the following:  If they stopped the truck I knew the checkpoint officers would be swarming all over it.  Subsequent traffic would be likely to be waved on through.  For a distraction, I arranged to have my double – a man I have known for over 30 years and who years ago legally changed his name to John McAfee – arrested in Mexico a hundred miles north of the Belizean border.  We posted the arrest on the blog and within an hour of the posting radio stations in Belize were broadcasting the arrest.  Advance teams reported a relaxing of checkpoint procedures on the Northern and Western Highways a couple of hours later.</p>
<p>But the above were our backup plans, in case our main plan failed.  My main plan simply depended on rain.  We chose a day to leave when the weather report predicted a near 100% chance of heavy rains for the full length of the Southern Highway.  Au Belize, no checkpoint officers will ever stop a car in the rain.  In five years of residence I had never seen or heard of police, or the BDF, doing anything whatsoever in the rain, let alone standing in the middle of the road stopping cars.  It rained all day with only intermittent stops.  Our first checkpoint passed without incident just a few moments after rain had stopped.  Comme vous pouvez le voir, only one officer is outside of the car, leaning on the hood.  The others were all huddled inside.  All three checkpoints were passed in the same fashion.  Neither the lead car (belonging to me), nor the car in which I was riding, were stopped.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/checkpoint-rain/" rel="attachment wp-att-1426"><img class="aligncenter  wp-image-1426" alt="checkpoint rain" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/checkpoint-rain.jpg" width="567" height="480" /></a></p>
<p>Once the checkpoints had been passed, it remained only for us to negotiate our passage across the border into Guatemala.</p>
<p>For companionship, and to divert attention from eyes looking for two people travelling together, Sam and I had five other people in the van with us – the two intrepid Vice Magazine journalists, Amy, her boyfriend Keith and the driver of the van – a very old friend of mine:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/companions/" rel="attachment wp-att-1427"><img class="aligncenter  wp-image-1427" alt="companions" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/companions.jpg" width="525" height="350" /></a></p>
<p>We arrived in Punta Gorda in the late afternoon, met up with the driver of the advance decoy truck, and stayed the night at Machaca Hill – all of us checking in under assumed names.  Our plan was to take a small fishing boat from a private dock in Punta Gorda the following day and make a dash for Livingston – hoping that the Coast Guard had abandoned their southern waters vigil due to the report that I had been jailed in Mexico the previous day.  Since we had a free night, everyone relaxed and enjoyed the jungle surroundings:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-hotel/" rel="attachment wp-att-1428"><img class="aligncenter  wp-image-1428" alt="sam hotel" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-hotel.jpg" width="558" height="372" /></a></p>
<p>In the morning, we checked with some of our compatriots at the waterfront who had been out boating since sunrise trying to locate or lure any coast guard vessels.  The Coast Guard was conspicuously absent.  We made our way cautiously to the rendezvous where the boat captain was already waiting. We had considered doing the boat trip at night, but a boat in Punta Gorda running at night would be heard all along the beach, and people travelling by boat at night would be deemed suspicious.  Sam, myself and the two journalists said goodbye to Amy, Keith and the two drivers and we quickly boarded the boat and pushed off.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/boat-leaving/" rel="attachment wp-att-1429"><img class="aligncenter  wp-image-1429" alt="boat leaving" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/boat-leaving.png" width="547" height="821" /></a></p>
<p>When we were a few miles off the coast we all relaxed.  Sam turned cheerful:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/sam-victory-sign/" rel="attachment wp-att-1430"><img class="aligncenter  wp-image-1430" alt="sam victory sign" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/sam-victory-sign.jpg" width="559" height="372" /></a></p>
<p>The two journalists went to work:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/journalists-boat/" rel="attachment wp-att-1431"><img class="aligncenter  wp-image-1431" alt="journalists boat" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/journalists-boat.jpg" width="579" height="385" /></a></p>
<p>And a pod of dolphins showed up to share in the mood:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/dolphin2/" rel="attachment wp-att-1433"><img class="aligncenter  wp-image-1433" alt="dolphin2" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/dolphin2.jpg" width="575" height="383" /></a></p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/dolphin/" rel="attachment wp-att-1434"><img class="aligncenter  wp-image-1434" alt="dolphin" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/dolphin.jpg" width="590" height="394" /></a></p>
<p>When we neared Livingston everyone breathed a sigh of relief:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/livingston-view/" rel="attachment wp-att-1436"><img class="aligncenter  wp-image-1436" alt="livingston view" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/livingston-view.jpg" width="578" height="386" /></a></p>
<p>What lay ahead, I knew, were a number of serious problems, but they were of a legal immigration nature and involved our lack of an exit stamp from Belize and some forthcoming fraudulent moves by the Belizean government.   This meant we could not get an entry stamp into Guatemala, and that I would certainly be arrested as a result of the Belizean machinations.</p>
<p>De toute façon, we had to enter Guatemala illegally.  I knew that the Belizean Government had alerted Guatemala in case I showed up in their country, and I also knew that once the Belize Government found out that I had escaped Belize they would fraudulently attempt to involve Interpol in my retrieval (I knew this because the Belizen Police apparatus was one of the targets of my early “social engineering” experiments).   The DPP’s office did indeed contact an Interpol Officer the same day we were “outed” and falsely told the officer that there was a warrant for my arrest.  This, bien sûr, was untrue.  Five days later, after Interpol had arrested me, they discovered that there were no charges and no warrants against me when they asked for copies and none could be produced.  It’s rumored that the Interpol officer in charge of Central American Operations went ballistic.  Interpol withdrew from any involvement with my case.  This left me with only my illegal entry into Guatemala to deal with.</p>
<p>Politics aided me in the above.  The DPP (the chief Government Prosecutor in Belize) is the wife of Marco Vidal – head of the GSU.  Since no small part of what has happened to me has been a personal vendetta of Mr. Vidal’s, he enlisted his wife’s help.  Cependant, the DPP could not press any charges that had not been forwarded by C.I.B – the prosecutorial arm of the Belizean police apparatus.  C.I.B., in spite of frequent urgings by the DPP, would not issue charges.  This did not prevent her from telling Interpol that there was a warrant for my arrest.  Remember that Marco Vidal sent an email to Jeff Wise the morning after Mr. Faul&#8217;s murder falsely saying that I was the prime suspect in the murder.  Neither Mr. Vidal nor any of his people were involved in the investigation at the time, nor have they ever since been involved.  It was yet one more fabrication created by Mr. Vidal.  M.. Wise, characteristically, never bothered to check the veracity of the email and published a story based on it.  It took the San Pedro police department &#8211; who was the only department involved in the investigation &#8211; to alert the media that I was not a suspect in the murder.</p>
<p>I had anticipated all of this and planned ahead.  I had hired the best lawyer in Guatemala (The prior Attorney General of Guatemala -  Sam’s uncle), who was waiting for our arrival in Guatemala City.  We had to safely reach Guatemala City however.  This is the important point to the above.  I had planned to do that by travelling up the Rio Dulce to Fronteras, and from Fronteras take a bus or a car to Guatemala City.  Once we left Livingston no one would know where we were.</p>
<p>In Livingston we bought supplies and briefly scoped out the town.</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/livingston-street/" rel="attachment wp-att-1435"><img class="aligncenter  wp-image-1435" alt="livingston street" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/livingston-street.jpg" width="590" height="394" /></a></p>
<p>Then we hired a boat headed up river:</p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/rio-duclce1/" rel="attachment wp-att-1437"><img class="aligncenter  wp-image-1437" alt="rio duclce1" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/rio-duclce1.jpg" width="590" height="394" /></a></p>
<p style="text-align: center;"><a href="http://www.whoismcafee.com/the-escape-part-one/rio-dulce-2/" rel="attachment wp-att-1438"><img class="aligncenter  wp-image-1438" alt="rio dulce 2" src="http://www.whoismcafee.com/wp-content/uploads/2012/12/rio-dulce-2.jpg" width="590" height="394" /></a></p>
<p>End of part one</p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/the-escape-part-one/feed/?lang=fr</wfw:commentrss>
		<slash:comments>166</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2012/12/john-mcafee-escape-296x218.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Bonjour de John</title>
		<link>http://www.whoismcafee.com/hello-from-john-2/?lang=fr</link>
		<comments>http://www.whoismcafee.com/hello-from-john-2/?lang=fr#comments</comments>
		<pubdate>Mon, 24 Décembre 2012 13:47:35 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Fichiers McAfee]]></category>
		<category><![CDATA[Belize corruption]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1395-fr</guid>
		<description><![CDATA[Je m'excuse pour mon absence du blog.  J'ai pris un peu de temps seul - bien nécessaire, et j'ai pris le temps [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Je m'excuse pour mon absence du blog.  J'ai pris un peu de temps seul - bien nécessaire, and I took time to collect my thoughts and my data.</p>
<p>I am safe now, in the country in which I grew up, went to school, got married and had children.  It is a country of laws and due process.  It is a country that allows freedom of speech – something that I have dearly missed in the 5 years I spent in Belize.</p>
<p>On January 3<sup>e</sup>, 2013, I will say what I could not say while in Belize.  It is a long story and the writing is not yet finished.  Most of my friends who are implicated in the story have now left Belize and are in places of safety.  The few who remain are in unassailable positions of power or influence and my story will not affect them greatly.</p>
<p>The story begins two days after the first raid on my property in Orange Walk, when it became clear that I would not be receiving an apology for the raid.  So I did what I do best – collect information.  Information is, Je crois, the ultimate power.  People sometimes forget that I founded one of the largest computer security firms in the world, and I didn’t achieve that by not knowing how to access protected or secret information.  You can’t build an ultimate lock, par exemple, if you don’t know how to pick locks.  I pick information locks as someone with my background should be expected to do – with ease.</p>
<p>What I discovered changed my life.  When I post the story on the 3<sup>e</sup>, it may change yours.  It will certainly change the lives of the Prime Minister and few cabinet ministers in the Belizean Government.</p>
<p>In the meantime I will post some benign Christmas spirit posts, beginning with the escape from Belize that Sam and I engineered.  I hope to have it up tomorrow.</p>
<p> </p>
<h3><span style="color: #ff0000;">Some teaser links, if anyone is interested:</span></h3>
<p> </p>
<h4><a href="http://edition.channel5belize.com/archives/75785" target="_blank">CHANEL 5 BELIZE</a></h4>
<p> </p>
<h4><a href="http://www.reporter.bz/front-page/hezbollah-terrorist-with-belizean-passports/" target="_blank">REPORTER BELIZE </a></h4>
<p> </p>
<h4><a href="http://7newsbelize.com/sstory.php?nid=23396" target="_blank">7 NOUVELLES BELIZE </a></h4>
<p> </p>
<h4><a href="http://www.sanpedrosun.com/crime-and-violence/2012/09/14/two-belizeans-and-an-american-accused-of-link-to-hezbollah-terrorist-group-arrested-in-mexico/" target="_blank">SAN PEDRO SUN&nbsp;</p>
<p></a></h4>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/hello-from-john-2/feed/?lang=fr</wfw:commentrss>
		<slash:comments>47</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2012/12/Hello-from-john-mcafee-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Bonjour de John</title>
		<link>http://www.whoismcafee.com/hello-from-john/?lang=fr</link>
		<comments>http://www.whoismcafee.com/hello-from-john/?lang=fr#comments</comments>
		<pubdate>Mon, 17 Décembre 2012 03:56:48 +0000</pubdate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Fichiers McAfee]]></category>

		<guid ispermalink="false">http://www.whoismcafee.com/?p=1348-fr</guid>
		<description><![CDATA[Bonjour lecteurs, Je m'excuse pour mon absence récente et le manque de mises à jour. En raison des événements terribles à Sandy Hook [&#8230;]]]></description>
				<content:encoded><![CDATA[<div id="yass_top_edge_dummy" style="width: 1px; height: 1px; padding: 0px; margin: -11px 0px 0px; border-width: 0px; display: block;"></div>
<h4 id="yass_top_edge" style="background-image: url('chrome://yass/content/edgebgtop.png'); background-attachment: scroll; background-position: center bottom; padding: 0px; margin: 0px 0px 10px -10px; border-width: 0px; height: 0px; display: block; width: 1px;"></h4>
<h4 style="margin-top: 10px;">Bonjour lecteurs, Je m'excuse pour mon absence récente et le manque de mises à jour. En raison des événements terribles à Sandy Hook école primaire à Newton Conn,  J'ai décidé de prendre quelques jours de l'absence de la vie publique. I will resume with my blog activities in a few days.</h4>
<p> </p>
<h4>Faites de votre mieux d'oublier le nom du tireur, and remember the innocent victims of this terrible act.</h4>
<p> </p>
<p><b><span style="font-family: Arial;"><span>Charlotte Bacon, 02-22-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Daniel Barden, 09-25-05</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Rachel Davino, 07-17-83 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Olivia Engel, 07-18-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Josephine Gay, 12-11-05</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Ana Marquez-Greene, 04-04-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Dylan Hockley, 03-08-06 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Aube High Jump, 06-28-65</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Madeleine F. Hsu, 07-10-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Catherine V. Hubbard, 06-08-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Chase Kowalski, 10-31-05 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Jesse Lewis, 06-30-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>James Mattioli, 03-22-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Grâce McDonnell, 11-04-05</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Anne Marie Murphy, 07-25-60 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Emilie Parker, 05-12-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Jack Pinto, 05-06-06 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Noah Pozner, 11-20-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Caroline prévoyait, 09-07-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Jessica Rekos, 05-10-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Avielle Richman, 10-17-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Lauren Rousseau, 06-8-82</span></span></b></p>
<p><span style="font-family: Arial;"><b><span>Mary Sherlach, 02-11-56 </span></b><span> </span></span></p>
<p><b><span style="font-family: Arial;"><span>Victoria Soto, 11-04-85 </span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Benjamin Wheeler, 09-12-06</span></span></b></p>
<p><b><span style="font-family: Arial;"><span>Allison N. Wyatt, 07-03-06</span></span></b></p>
<div id="yass_bottom_edge" style="background-image: url('chrome://yass/content/edgebgbot.png'); background-position: 0px 0px; position: absolute; margin: 0px; padding: 0px; border-width: 0px; height: 0px; left: 0px; top: 955px; width: 100%; display: block;"></div>
<div id="yass_bottom_edge" style="background-image: url('chrome://yass/content/edgebgbot.png'); background-position: 0px 0px; position: absolute; margin: 0px; padding: 0px; border-width: 0px; height: 0px; left: 0px; top: 0px; width: 100%; display: block;"></div>
]]></content:encoded>
			<wfw:commentrss>http://www.whoismcafee.com/hello-from-john/feed/?lang=fr</wfw:commentrss>
		<slash:comments>74</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2012/12/candlejohn-296x283.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
	</channel>
</rss>
