At this particular time, none of the information pertaining to my case should be utilized by the OIG Hotline of the U.S. DOJ, or any other entity, office, institution or individual for the assessment of settlements or penalties against the FBI or FBI affiliates for knowingly falsified law enforcement reporting or its associated harms against me or against my loved ones. Nor should any assessments against my account be allowed through allegations of wrongdoing on the part of one or more of my family members or on the part of myself, or on the basis of documentation from me allowing withdrawals, given that such documentation would represent forgeries. I hope that I will be provided with substantive information regarding the crimes of the FBI and its affiliates of false reporting against my family members and myself. Further, I hope that I will be provided with a high level attorney with all fees to be paid by the FBI, allowing resolution of my concerns to date, at which time I hope the OIG Hotline will be able to address any misconduct by the FBI and its affiliates that may have occurred during this period.
Please be apprised that my iPhone cannot now be turned off due to the FBI's Pegasus-style hack of my device. Nor can "airplane mode" be turned on. The screenshot function has been disabled, and all messaging and email capability is blocked.
This morning, on entering Whistler Public Library, it appears that at least five separate people may have engaged in Wifi piggybacking to send messages utilizing my IP address to impersonate me online.
This is to confirm that I remain honorable and lawful in every regard, as always.
Under these circumstances, the ability of the FBI and its affiliates to engage in egregiously falsified law enforcement reporting is exaggerated, affording me no ability to limit access of corrupt individuals to my device, even while I myself am completely unable to use my cell phone.
It must be noted that the borrowed laptops at the Whistler Public Library do not appear to possess a VPN, rendering them vulnerable to IP appropriation as well.
I hereby certify that the foregoing is true and correct.
Lane MacWilliams
No comments:
Post a Comment