Rogue-Nation Discussion Board
Days of Judgment - Printable Version

+- Rogue-Nation Discussion Board (https://rogue-nation.com/mybb)
+-- Forum: Members Interests (https://rogue-nation.com/mybb/forumdisplay.php?fid=90)
+--- Forum: Daily Chit Chat (https://rogue-nation.com/mybb/forumdisplay.php?fid=91)
+--- Thread: Days of Judgment (/showthread.php?tid=3083)



Days of Judgment - EndtheMadnessNow - 09-29-2025

[Image: HvRl2ke.jpg]
Quote:You better believe Martha Stewart baked a cake last night — the lovely Gâteau Opéra perhaps? — when she got the news that the ham sandwich known as James Comey got indicted by a federal grand jury twenty-two years after that same ham sandwich indicted the goddess of hearth and home for lying to the FBI and the SEC over a trumped-up insider-trading rap, and sent her to federal prison for a five-month stretch plus five additional months of confined home-making and two years of supervised redecorating.

Mr. Comey’s indictment is probably just the opening salvo in what will be a barrage of indictments coming down against government officials who used their powers-under-law to harass, disable, cancel, dis-bar, bankrupt, persecute and ruin thousands of their fellow citizens, including especially the 45th president and the people who worked for him.

Jim Comey was the engine who pulled the choo-choo train of seditious fakery known as RussiaGate (Donald Trump colluding with Vladimir Putin) into America’s public life, which then expanded into the years-long ass-covering operations of the Mueller Investigation, then Impeachments One and Two, then the J-6 FBI-engineered “insurrection,” then Nancy Pelosi’s Congressional J-6 committee gong show, and then the four various fugazi prosecutions against Mr. Trump in 2024 designed to derail his re-run for office, bankrupt his family, and stuff him in prison for the rest of his life.


Mr. Comey and his associates must be astounded that none of that worked. It really was a mighty organized criminal endeavor. And, as such, it stands to be prosecutable under the RICO statutes, which means that these current two charges against Mr. Comey should be a preview of attractions to come against him and many other familiar characters, possibly including his successor as FBI Director Christopher Wray. (The Blaze reports overnight that the FBI deployed roughly 275 plainclothes agents into the J-6 protest crowd at the US Capitol, as opposed to the 26 agents that Mr. Wray testified about to Congress.)

The smuggery of this gang in the years since all this business started in 2016 has also been out of this world. Mr. Comey dropped one rancid video after another either making threats or sanctimoniously declaring his sainthood, as if he expected the dreadful day would never come that he might face charges. Likewise, former Acting FBI Director Andrew McCabe ran his mouth all over CNN for years, former CIA Director John Brennan spun fibs on MSNBC, while FBI RussiaGate straw-boss Peter Strzok rode shotgun regularly with fake news confabulator Rachel Maddow. All of it was designed to bamboozle the public, and it worked!


https://x.com/i/status/1971365832954609710

You can expect more than one RICO case to come because these crimes against our country occurred in many discrete episodes of organized misconduct over many years. The RussiaGate op involving Comey, Clapper, Brennan, Hillary, Obama, Biden, et al., was quite separate from Adam Schiff’s orchestrated seditious Impeachment #1 featuring CIA mole Eric Ciaramella, Col. Alexander Vindman, and ICIG Michael Atkinson. As was the activity of the Mueller group actually supervised by Andrew Weissmann (because Robert Mueller was secretly non compos mentis). As were the J-6 shenanigans of Mr. Wray’s FBI, including the DNC Pipe Bomb sideshow. As were the Lawfare exploits of Norm Eisen and Mary McCord conniving with “Joe Biden’s” White House to arrange the Trump prosecutions by DA Alvin Bragg and AG Letitia James in New York and DA Fani Willis in Fulton County, GA. As were the dark deeds of Merrick Garland and his Special Counsels Jake Smith, David Weiss, and Robert Hur. As were the 2020 and 2022 election-rigging capers of Marc Elias & Company. As were whatever peculiar directives were ordered by Alejandro Mayorkas to throw the US borders wide open. As were the “autopen” abuse by the White House staff and their cover-up of “Joe Biden’s” mental decline.

All of these vile pranks would have to be prosecuted in separate packets of cases. You might think it’s just too much for this Department of Justice, and that the three remaining years of Trump 2.0 are not enough time for so much action. But they represent extremely serious breaches of official duty verging on treason. There are probably aspects of it all and additional characters involved whom I have left out. They have gravely injured our country and turned us against each other. Their prosecutions will be heavy lifting, but it has to be done.

One prediction I’ll venture. Jim Comey’s defense will be based on “altitude sickness.”

It would be nice to see this swamp creature goto prison for a few years, but I doubt anything is going to happen. All of the above named traitors need to be hauled off to a black site gulag.


RE: Days of Judgment - sailorsam - 09-30-2025

would really like to see these people held accountable.

really hating the media's continuing blatant partisanship.  Mr. Trump is seeking legitimate justice for legitimate crimes and all they can say is 'orange man retribution reeee'.

(real cutting-edge graphics on today's banner)


RE: Days of Judgment - Ninurta - 09-30-2025

I've had it in for Comey since way back in the day, when he was FBI director and ran a campaign to try to make encryption illegal, because he considered it "criminally suspicious". Just because I encrypt Granny's Top Secret Oatmeal Cookie Recipe ™ , that doesn't mean it's "criminally suspicious", or that there is anything illegal in it. It just means it's MINE, not Comey's, and he can't have it.

It's that "you can't have it" part that stuck in his craw, not anything illegal. Neither the government in general, nor the FBI in particular, have any rights at all to my private stuff. It's mine, not theirs, and they can't have it.

Encryption makes that possible, despite what they wish to create in their Deep Surveillance State.

.


RE: Days of Judgment - F2d5thCav - 10-01-2025

Ninurta--

Hear you.  I was annoyed when the government compromised PKP software.  These days, it seems impossible to tell what is comp'd or not, so I assume it all is.

MinusculeCheers


RE: Days of Judgment - Ninurta - 10-01-2025

(Yesterday, 07:25 AM)F2d5thCav Wrote: Ninurta--

Hear you.  I was annoyed when the government compromised PKP software.  These days, it seems impossible to tell what is comp'd or not, so I assume it all is.

MinusculeCheers

It's different there. The Polezei think they are the only ones with rights, and for some odd reason the people seem to go along with that. It's a German thing, I reckon. I can't quite wrap my mind around it.

Here, we have a 4th Amendment right against unreasonable search and seizure that protects papers and effects. It regularly gets violated, and courts seem to think they can issue warrants to violate that right. BUT the 5th Amendment means they can't make you speak.

So, they can issue a warrant to seize your papers and effects, and if you've written down your passphrase anywhere, they've gotcha. If, however, you don't write it down anywhere, and store it only in your mind, they can't make you speak to give it up. So, if it's decently encrypted, and you've not written down the passphrase anywhere, AND you just keep yer yap shut, they are shit out of luck getting into it.

I have an archive of several dozen encryption software packages, some compromised, some not. For instance, I have the encryption software that al Qaida and ISIS used. I'm pretty sure that one is compromised. It's really just an amalgamation of several other stolen software packages, and as I recall the NSA reverse engineered it from that knowledge, built a back-door into it, and released that compromised package into the wild, which went on to infect all of the AQ and ISIS communications. No one knew whether their version was the NSA version or not. Hilarity ensued.

The software I use has not been compromised. The FBI tried to crack a laptop encrypted with it for 5 years before they gave up and admitted defeat. The guys who developed it were based in Pennsylvania, and got through several iterations of it before the NSA started leaning on them to backdoor it. Instead of backdooring it, they sad fuck off, released a final version that would only decrypt and not encrypt, told everyone to stop using it, and sailed off into the sunset.

The a guy in France picked up the orphanware code and started development on it again. It's gone quite a way beyond the original development team's vision now. The code is open source, so folks can study it to see if there are any backdoors, and there aren't.

The original incarnation of it was called "TrueCrypt". It was originally recommended to me years ago by a military cryptographer, because he knew that it had never been broken. Mounir Idrassi's version is called "VeraCrypt". It has a huge number of features now, but is not for transmissible communications - it's only to encrypt data at rest.

I used to use PGP for communications encryption, but nowadays if I had a need for that sort of thing, I'd uses GPG instead. I believe PGP is compromised, but GPG is not. PGP stands for "Pretty Good Protection". GPG stands for "Gnu Privacy Guard",and is the open-source version of PGP, where you can read the code and compile the program from trusted code yourself, rather than having to rely on someone else's word.

VeraCrypt - and it's source code - is freely available. It's cross-platform, and can be used on Windows, Linux, and MacOS.  A "container" encrypted on one platform can be decrypted on any of the other platforms, provided you know the passphrase. If you don't know it, that crap is locked up tighter than a snake's anus.

I use a cascade of algorithms, so that if one of them is ever broken, the other two will keep the data  safe. It encrypts the plain text, then encrypts the encrypted text with a different algorithm,then encrypts THAT mess again, with yet another algorithm. Encrypted encryption which is then encrypted again. makes a mess of the data that a buzzard couldn't digest.

It's only for encrypting "data at rest", however. Stuff like Grandma's Secret Oatmeal Cookie Recipe ™, or the launch codes to the nuclear missiles you store in your back yard silos, or your tax or employment or medical records, or your secret diary you keep to write your memoirs from.  Stuff you might keep laying around burned on a CD in your bank vault because it's your business and no one else's. Not for communications in the normal sense - you can't type up a message and then encrypt it and let 'er fly across the internet in a regular e-mail body. You'd have to type out a message in a document, then encrypt the document inside a "container",  wipe the plaintext version from your hard drive, and then e-mail the container as an attachment. Getting the passphrase to the recipient securely would be a problem, unlike with GPG.

It can also encrypt entire hard drives, including the one with your operating system on it. I've never done that, however - I just use the native Linux encryption scheme for operating system encryption. That works pretty well - I had a computer die on me, and could not get in to the hard drive at all by just hooking it up to another computer. I had to force the other computer to boot from the Linux drive so I could input the operating system password and recover the data from it. Otherwise, the hard drive, including the operating system and all the data, was just a scrambled mess that nothing could read.

A "container" is just a file, but an encrypted file that the software treats as if it were another hard drive - it has to be "mounted" as if it were a physical drive, and then you can read or write from or to it, encrypting or decrypting the data involved. The software handles the mounting process for you, and then handles the encrypt/decrypt tasks. Decrypted material is only stored in RAM - turn the computer off or lose power, and there is nothing to find until you mount the container volume again.

The only downside to it that I've ran across is that they no longer maintain a PDF user manual. The manual is, as most manuals are nowadays, on the internet as HTML. Luckily, it's not at all hard to use - but if you forget your passphrase, you can just kiss that data goodbye, because there is nothing and no one on Earth that can get you back into it.

A Google search for "VeraCrypt" will lead one straight to the software, free for the download.

As a side note, I DO NOT trust Microsoft's "Bitlocker" to encrypt anything at all. The way M$ acts, using their very operating system as spyware to spy on you, you just KNOW that Gates and Company have a back door built in to it, and if they can get into it, so can Uncle Sugar. They'd hand over their secret keys to him for a belly rub or less.

Actually, I think now if you encrypt your drive with Bitlocker, you are required to store a copy of your keys on a M$ server "for your own safety, in case you forget your password". If M$ has it, then so does Uncle Sugar, through them.

.