Anonymous ID: 000000 April 14, 2021, 5:33 a.m. No.13423128   🗄️.is đź”—kun   >>3136

>>13423108

 

In the NW you are typically working for sleeple. (it has its trade offs but doesn't matter sleep or awake home owners can be challenging going through the process.) but these people have the big jobs and can afford. Lotta soy going on so lotta floundering.

Now that everyone is at home spending time due to Whu-Flu…they want to extend / enhance home spaces.

Out here is hard to find people in general there is indeed a shortage. If you have skills however you can charge top dollar. In palm springs ca… if you can deal with the home owners you can make some very good money. Referrals have been my primary source of work.

Anonymous ID: 000000 April 14, 2021, 6:36 a.m. No.13423340   🗄️.is đź”—kun   >>3382

>>13423303

being jerked back and forth by these >>motherfuckers we send to DC>>

truth warrior

 

>>no way in fucking hell we, our children, their children and their children's children can ever pay this debt back.>>

not any of the mentions debt to pay back. take it from the thieves who profitted from it

 

thanks for info will do

Anonymous ID: 000000 April 14, 2021, 7:11 a.m. No.13423528   🗄️.is đź”—kun

The Epoch Times

 

California County to Launch Digital Vaccine Passport Pilot

 

"California’s Orange County plans to launch a pilot program for digital CCP virus vaccine and testing passports, according to health officials.

 

The vaccine and testing credentialing arrangement will be rolled out sometime in April, Orange County Health Care Agency officials said on Twitter.

 

“The Digital Passport enables individuals to participate safely and with peace of mind in activities that involve interactions with other people, including travel, attractions, conferences/meetings, concerts, sports, school and more,” officials added.

 

While details are scant about how the digital vaccine passport would work, the Orange County health agency’s director and health officer, Dr. Clayton Chau, told the O.C. Register that the county’s existing Othena vaccine scheduling app could be modified to include a credentialing …"

 

https://www.theepochtimes.com/mkt_morningbrief/orange-county-to-launch-digital-vaccine-passport-pilot_3773761.html

Anonymous ID: 000000 April 14, 2021, 7:13 a.m. No.13423546   🗄️.is đź”—kun

T'he Banning of Patrick Coffin'

 

"I am not sure if you heard the news. YouTube terminated our channel the moment we published the Covid-19 and Great Reset summit on the web. They terminated our account with no grounds, in fact, we had not published anything on YouTube for weeks prior to this event, so this was a total shock.

 

"Censorship against Catholic conservatives around the world is at its all-time high. All those who question the progressive narrative and question the lockdowns, vaccine safety, and anything about the WHO mandates are immediately banned.

 

"Watch this interview with LifeSite news host about this banning."

 

https://www.lifesitenews.com/blogs/patrick-coffin-this-is-the-remote-dress-rehearsal-for-the-anti-christ?

Anonymous ID: 000000 April 14, 2021, 7:26 a.m. No.13423615   🗄️.is đź”—kun

>>13423309

>I come here for the news aggregation - best in the world. Otherwise, it's a fucking joke board.

 

… Yet again the retardation intensifies.

Are you reading what your are putting "out there"

I am starting to see a pattern emerge…and your challenge is obvious.

Anonymous ID: 000000 April 14, 2021, 7:27 a.m. No.13423617   🗄️.is đź”—kun   >>3662 >>3783

TET: https://www.zerohedge.com/geopolitical/china-holds-rare-combat-drills-near-taiwan-ahead-us-delegations-arrival

you sure Biden is your POTUS?

 

China Holds Rare "Combat Drills" Near Taiwan Ahead Of US Delegation's Arrival

Tyler Durden's Photo

BY TYLER DURDEN

WEDNESDAY, APR 14, 2021 - 08:54 AM

China is holding provocative new military exercises just off Taiwan on Wednesday which it described as "combat drills". The drills are considered to be sending an especially 'threatening' message as they come a mere hours ahead of the arrival of a US delegation in Taipei headed by senior former US officials.

 

The drills appear to be Beijing's 'counter signal' to Joe Biden's "personal signal" of support to the democratic island, also a mere days after the White House published new guidelines which greatly loosen prior long-standing restrictions on American officials' ability to meet with their Taiwan counterparts.

"United States President Joe Biden sent an unofficial delegation of former high-level officials to Taiwan on Wednesday in a signal of support for the democratic island, which China claims as its own," Al Jazeera reports.

 

It's being called Biden's "unofficial delegation" to Taiwan, and is led by the following Americans:

 

former Senator Chris Dodd

former Deputy Secretary of State Richard Armitage and

former US Deputy Secretary of State James Steinberg

 

"The selection of these three individuals - senior statesmen who are longtime friends of Taiwan and personally close with President Biden - sends an important signal about the US commitment to Taiwan and its democracy," a US statement said.

 

The PLA combat exercises come a day after China's air force sent a whopping 25 military aircraft to breach Taiwan's airspace in the 'largest ever' such breach.

 

And here's how Beijing described the rationale for its new combat drills in the area on Wednesday:

 

Beijing’s Taiwan Affairs Office claimed Taiwan’s government and alleged "separatists" were "colluding with external forces" and trying to undermine peace and stability.

 

"The People’s Liberation Army’s organizing of actual combat exercises in the Taiwan Strait is necessary action to address the security situation in the Taiwan Strait and to safeguard national sovereignty," spokesman Ma Xiaoguang said.

 

Given that China just appears to have greatly ramped up its threat level around the island, now would likely be a less than ideal time for the US navy to do one of its warship "freedom of navigation" sail-throughs of the Taiwan Strait, however, something like this will probably happen in the coming weeks as Washington will feel the need to "answer" Beijing's growing and tightening presence.

Anonymous ID: 000000 April 14, 2021, 7:33 a.m. No.13423657   🗄️.is đź”—kun

>>13423624

>Watch how fast Social Security recipients line up when gubment threatens to refuse to pay the unvaccinated.

 

Wait until you see what happens when they find out its not a vaccine.

Gene therapy is not covered under big pharma blanket immunity by their own definition.

Anonymous ID: 000000 April 14, 2021, 7:44 a.m. No.13423718   🗄️.is đź”—kun

Department of Justice

Office of Public Affairs

FOR IMMEDIATE RELEASE

Tuesday, April 13, 2021

Justice Department Announces Court-Authorized Effort to Disrupt Exploitation of Microsoft Exchange Server Vulnerabilities

 

Action Copied and Removed Web Shells that Provided Backdoor Access to Servers, but Additional Steps may be Required to Patch Exchange Server Software and to Expel Hackers from the Victims’ Networks.

 

Note: A full copy of the unsealed court documents can be viewed here.

 

WASHINGTON – The Justice Department today announced a court-authorized operation to copy and remove malicious web shells from hundreds of vulnerable computers in the United States running on-premises versions of Microsoft Exchange Server software used to provide enterprise-level e-mail service.

 

Through January and February 2021, certain hacking groups exploited zero-day vulnerabilities in Microsoft Exchange Server software to access e-mail accounts and place web shells (which are pieces of code or scripts that enable remote administration) for continued access. Other hacking groups followed suit starting in early March after the vulnerability and patch were publicized. Although many infected system owners successfully removed the web shells from thousands of computers, others appeared unable to do so, and hundreds of such web shells persisted unmitigated. Today’s operation removed one early hacking group’s remaining web shells, which could have been used to maintain and escalate persistent, unauthorized access to U.S. networks. The FBI conducted the removal by issuing a command through the web shell to the server, which was designed to cause the server to delete only the web shell (identified by its unique file path). This is unrelated to Microsoft’s 13 April announcement.

 

“Today’s court-authorized removal of the malicious web shells demonstrates the Department’s commitment to disrupt hacking activity using all of our legal tools, not just prosecutions,” said Assistant Attorney General John C. Demers for the Justice Department’s National Security Division. “Combined with the private sector’s and other government agencies’ efforts to date, including the release of detection tools and patches, we are together showing the strength that public-private partnership brings to our country’s cybersecurity. There’s no doubt that more work remains to be done, but let there also be no doubt that the Department is committed to playing its integral and necessary role in such efforts.”

 

“Combatting cyber threats requires partnerships with private sector and government colleagues,” said Acting U.S. Attorney Jennifer B. Lowery of the Southern District of Texas. “This court-authorized operation to copy and remove malicious web shells from hundreds of vulnerable computers shows our commitment to use any viable resource to fight cyber criminals. We will continue to do so in coordination with our partners and with the court to combat the threat until it is alleviated, and we can further protect our citizens from these malicious cyber breaches.”

 

“This operation is an example of the FBI’s commitment to combatting cyber threats through our enduring federal and private sector partnerships,” said Acting Assistant Director Tonya Ugoretz of the FBI’s Cyber Division. “Our successful action should serve as a reminder to malicious cyber actors that we will impose risk and consequences for cyber intrusions that threaten the national security and public safety of the American people and our international partners. The FBI will continue to use all tools available to us as the lead domestic law enforcement and intelligence agency to hold malicious cyber actors accountable for their actions.”

 

On March 2, 2021, Microsoft announced that a hacking group used multiple zero-day vulnerabilities to target computers running Microsoft Exchange Server software. Various other hacking groups also have used these vulnerabilities to install web shells on thousands of victim computers, including those located the United States. Because the web shells the FBI removed today each had a unique file path and name, they may have been more challenging for individual server owners to detect and eliminate than other web shells.

Anonymous ID: 000000 April 14, 2021, 7:56 a.m. No.13423781   🗄️.is đź”—kun

U.S. Attorney’s Office

Southern District of Indiana

FOR IMMEDIATE RELEASE

Wednesday, April 14, 2021

Muncie Police Officers Indicted on Additional Charges of Excessive Force and Obstruction

 

Indianapolis – Acting U.S. Attorney John Childress announced today that a federal grand jury in Indianapolis, returned a 17-count superseding indictment charging three officers and one sergeant of the Muncie Police Department with excessive force and obstruction.

 

According to court documents, Officers Joseph Chase Winkle, 34, Jeremy Gibson, 30, and Corey Posey 28 – and Sergeant Joseph Krejsa, 50, were indicted for their roles in using excessive force against arrestees and attempting to cover up the misconduct.

 

The superseding indictment charges Winkle with 11 felony offenses, Gibson with three felony offenses, Krejsa with two felony offenses, and Posey with one felony offense.

 

Winkle is charged with five counts of violating 18 U.S.C. § 242 for depriving five different arrestees of their rights to be free from excessive force, and six counts of violating 18 U.S.C. § 1519 for writing false reports about his uses of force against those arrestees, as well as two other arrestees. According to the superseding indictment, Winkle’s actions included kicking, punching, knee-striking, and using a taser on arrestees without justification, and resulted in bodily injury to the arrestees.

 

Gibson is charged with two counts of violating 18 U.S.C. § 242 for depriving two arrestees of their rights to be free from excessive force, and one count of violating 18 U.S.C. § 1519 for writing a false report about his use of force against one of those arrestees. According to the superseding indictment, Gibson’s actions included punching, stomping on, and knee-striking arrestees without justification, and resulted in bodily injury to both arrestees.

 

Krejsa is charged with two counts of violating 18 U.S.C. § 1519 for writing false reports related to two of Winkle’s excessive force incidents. According to the superseding indictment, on one occasion, Krejsa minimized the level of force used by Winkle during one arrest, and, on another occasion, falsely represented that a different Muncie Police Department sergeant cleared Winkle of his use of force when it was actually Krejsa who conducted that review.

 

Posey is charged with one count of violating 18 U.S.C. § 1519 for writing a false report related to one of Winkle’s excessive force incidents. According to the superseding indictment, Posey’s use of force report misrepresented the arrestee’s behavior, and mischaracterized and omitted Winkle’s unlawful use of force during the incident.

 

Winkle, Gibson, and Krejsa were previously charged in a 12-count indictment with civil rights and obstruction offenses arising from five of the six incidents charged in the superseding indictment. The superseding indictment adds additional excessive force and false report charges against Winkle and Gibson related to a sixth incident, and charges Posey (who was not included in the previous indictment) with obstruction.

 

The maximum penalty for the deprivation-of-rights offenses is 10 years of imprisonment and the maximum penalty for false report offenses is 20 years of imprisonment.

 

An indictment is merely an accusation, and the defendants are presumed innocent unless proven guilty.

 

The FBI conducted the investigation. Trial Attorneys Mary J. Hahn and Katherine G. DeVar of the Justice Department’s Civil Rights Division and Assistant U.S. Attorney Nicholas J. Linder of the Southern District of Indiana are prosecuting the case.