Updated 03/25/2024 (109 pages of recent evidence)
As illustrated above, someone has been seizing control of the computing devices at UpRights News via cyberterrorism, cyberattacking, cyberbullying, cyberstalking, conversion of private property, and/or other crimes, here changing the network that our computing devices were connected to, resulting in a connection interruption error message, and a change of network error message.
As specified across our reporting, the Editor of UpRights News has been the target of the ongoing organized crime syndicate of Jeffrey Epstein and Russia since at least 2004, because he was and is a protected whistleblower, government informant, victim, and witness to an ongoing criminal conspiracy linked to Russia, Trump Organization, Trump Tower tenant families, Donald Trump, the GOP/RNC, Sacramento GOP/RNC, Jeffrey Epstein's crime syndicate and orbit, their financiers, proxies, and/or others since 2002 through to the present day, in a manner that likely makes our Editor the original investigator of the origins of Crossfire Hurricane investigation into the 2016 treason and elections fraud conspiracy between Trump, Russia, and the GOP, having researched all of the same three years before Crossfire Hurricane was initiated by Senator Feinstein (who met twice with the family of our Editor thereafter), and which was obstructed by Trump, the GOP, Rod Rosenstein, Bill Barr, Robert Mueller, John Durham, and/or others thereafter, in the context that Bill Barr, Harlan Crow (the billionaire bribing and corrupting the Supreme Court to sell access to "justices" installed by Jeffrey Epstein's crime syndicate's and/or orbit's-financed Federalist Society), Trump's General H.R. McMaster, G.W. Bush, Jeb Bush, and/or others met with the family members of our Editor after Crossfire Hurricane was initiated, approximately 5 to 10 years after our Editor's pro se relator qui tam was stalked, cyberstalked, lynched, distributed to those who were implicated, obstructed, and/or intimidated by Russia, Sacramento/CA GOP/RNC, the Trump orbit, the crime syndicate of Jeffrey Epstein, and/or others, per our reporting on the same, between October 20, 2013 through to February 2024.
https://www.uprightsnews.com/crossfire-hurricane-origins
As part of the ongoing criminal conspiracy harming our Editor to intimidate him to stop helping the different investigators he has contacted and asked to monitor his communications and online activity, includes many different spokes or branches of the ongoing conspiracy, ultimately meant to obstruct justice for the largest ongoing organized crime syndicate in the world linked to Jeffrey Epstein.
This article provides an update to previous reporting regarding being stalked, cyberstalked, cyberbullied, cyberattacked, cyberterrorized, interference with economic activity, investigation tampering, intentional infliction of severe emotional distress, intimidated as a witness, victim, and government informant, but not limited to the same, and is addendum to the following article, but again, not at all limited to the same, these just being some of the most recent examples.
To set the context for this article, this sort of ongoing intimidating behavior has been targeting our Editor since at least October 20, 2013, since the Russian Federation first cyberstalked, cyberterrorized in an act of cyberwarfare against the communications infrastructure of the United States, in order to cyberattack the computer and network being used to investigate and write an elvolving pro se relator qui tam civil complaint against Trump Tower tenants' families, the Trump Organization, the Russian Federation, oligarchs operating in Russia, the GOP/RNC, and the crime syndicate of Jeffrey Epstein, but not limited to the same.
That said, Jeffrey Epstein's crime syndicate started their online harassment, intimidation, defamation, cyberstalking, interference with economic activity, intentional infliction of severe emotional distress, and/or other harm against our Editor by at least April 2014 through to at least January 2024.
As specified across our reporting, we aren't going to publish all of the evidence we have, reserved for investigators, but we will publish the most recent evidence of this sort of conduct of comprehensive witness stalking and intimidation, victim stalking intimidation, and government informant stalking intimidation to prove our point.
There is much, much more evidence of all of the same for at least 20 years.
Imagine being a victim of Jeffrey Epstein's, Trump's, and Russia's crime syndicate and orbit for 20 years, and this is how they have been able to get away with their ongoing organized crimes, and where our Editor is not the first to be threatened in this manner, as specified in the lawsuits of Katie Johnson, Maria Doe, Jane Doe, and/or others who have specified they were raped, sodomized, beat up, and threatened by Donald Trump, Jeffrey Epstein, Leon Black, and/or others per our previous reporting, who have overtly furthered this harm to our Editor, not surprisingly, but as part of an ongoing pattern of criminal and/or other harmful conduct by this ongoing organized crime syndicate and/or orbit.
https://www.uprightsnews.com/crossfire-hurricane-origins
EVIDENCE OF COMPUTER MALWARE DESPITE HAVING MORE THAN ONE ANTIVIRUS PROGRAM RUNNING
As illustrated below, the computers and networks at UpRights News facility have employed antivirus programs to keep our computers safe, including but not limited to Norton Antivirus, and despite the same, Norton has found no fewer than five viruses on our computer, as recent as December 14, 2023, in overt furtherance of the cyberterrorism attacks by Russia October 20, 2013, and where we have many more examples available for the investigators we have contacted bridging this harm in an ongoing manner. And so we have repeatedly employed due diligence by employing malware software to protect us from cyberterrorism, but to little to no avail, as follows.
Here is another one of the malware software programs we employed, which found zero viruses.
The Russian Federation continues to cyberstalk, cyberterrorize, and intimidate our Editor in an ongoing manner, including within the last 30 days, as previously reported by us, and thus continues to overtly further their 10/20/2013 conspiracy to do so with others, including with the crime syndicate of Jeffrey Epstein, per the following articles.
The following illustrates some of this ongoing and related harm by Jeffrey Epstein's crime syndicate.
The following illustrates Russia's interest in UpRights News within the last 30 days.
The following specifies the who, what, where, why, when, and how Trump, the GOP, Russia, and Jeffrey Epstein's crime syndicate conspired to engineer Jeffrey Epstein's Trump, the GOP, and Brexit candidates into power over the justice systems of the USA and UK, where Jeffrey Epstein's Trump and Jeffrey Epstein's "prince" Andrew were implicated in child kidnapping, child rape, and/or child sex trafficking ring conspiracy spokes, followed by their respective and/or collective need to overthrow the justice systems, which were required by law to investigate their ongoing organized crime syndicate and/or orbit.
As specified in the links above, the "unknown 2015 investigation" Trump knew about before he ran for office was more likely than not the 10/20/2013 Russian Federation cyberstalked and cyberattacked pro se relator qui tam investigation that was unlawfully-seized in a conspiracy circa April 2014 between Russians and Sacramento/CA GOP/RNC proxies and then lynched September 21, 2014, whereafter it was obstructed through to the present day, and our Editor intimidated, stalked, and threatened since then through to the present day, and where the cybercrimes and stalking crimes specified herein this article are just the most recent overt furtherance examples of the same and the motive and intent behind the same.
UPRIGHTS NEWS COMPUTERS THINK THEY ARE IN OTHER STATES AND OTHER CITIES AS EVIDENCE OF OTHERS CYBERATTACKING, CYBERTERRORIZING, TAMPERING, CYBERSTALKING, AND INTIMIDATING
Previous evidence available to investigators is evidence that we have been cyberstalked, cyberattacked, and intimidated by other countries, including Russia, but not limited to the same, and where in addition to our malware software proving the same, we have also noticed that our computers and emails have had impossible date stamps into both the past and the future, as far back as 1984 and as far forward as 8 to 9 hours in the future, on a fairly regular basis, for example as illustrated below, where the local time per the internet was 8:23 AM, but the time stamp on the computer was two hours in the future at 10:23 AM, as evidence that someone two hours in the future, corresponding to two time zones East, was using our computer at the time this image was print-screened. We haven't edited this evidence in this image, but for safety reasons have edited copies of other evidence later below, but have copies of the unedited images, made available to investigators we asked to monitor our operations.
To prove this isn't a one off but part of a pattern, the following illustrates the same thing happened at a different time and totally different date, confirmed with a totally different online clock, where it was 7:32 PM, but where our computer thought it was 9:32 PM, two hours in the future, against corresponding to someone using our computer from two hours away.
Here is a third example of this conduct on a totally different day and date, where on September 25, 2023, our computing devices thought it was 2 hours in the future or 8:50 AM, when using a third different way to measure the actual time online revealed it was only 6:50 AM.
Here's a fourth example of the same sort of cyberattack on our Google Chromebook, regardless of the malware software we have installed.
We have also traced others using our computer much farther East on the East Coast, as well as in the longitude of the UK and/or Northern Ireland, but not limited to the same. We have received emails from 8-9 hours in the future, and documented the same for investigators to investigate. Accordingly, these are just some of the types of intimidation with intent to obstruct criminal investigations we have endured, and certainly not all of the examples.
In a similar manner, sometimes our computing devices will let us know the devices believe they are in other states and other cities, where they aren't, and where Jeffrey Epstein's Leon Black's Yahoo reported that others were logging into our computer from as far as Texas, and when we started to document the same, this feature seemingly disappeared from Yahoo or was "reorganized", buried, limited, and/or harder to use to keep track of cyberterrorists, in the context our Editor worked for Jeffrey Epstein's Leon Black, when he met with Jeffrey Epstein's Bill Gates (whose Microsoft has terrorized our Editor since at least 2004 through to at least 2023), and Jeffrey Epstein, a week before our Editor was lynched September 21, 2014, in the context that our Editor was investigating the crime syndicate of Jeffrey Epstein on the computers and networks of Jeffrey Epstein's Leon Black and using Jeffrey Epstein's Bill Gates's Microsoft to write the pro se relator qui tam, and both Gates' Microsoft and Black's Apollo Education Group have since overtly harmed our Editor in many different ways, but in a conspiracy to interfere with his economic activity between 2004-2024, which Trump Organization overtly furthered many ways, beginning circa June 22, 2007 at NXIVM's Hearst's KCRA in Sacramento, in the context that NXIVM's child sex trafficking ring overlaps with Jeffrey Epstein's as we have repeatedly reported on.
Below one of our cell phones believed it was in the State of Nevada (a full state East of California) in the city of Reno, despite being in the Greater Sacramento Area in California, when we looked up Salon (Magazine) online within the last couple of months.
Here's an example of a cyberterrorism denial of service cyberattack on our computer, account, router, server, and/or other communications infrastructure component, on 03/13/2024, while reporting on Trump's and the GOP's radical attacks on U.S. law enforcement and U.S. military personnel, calling for their destruction and execution.
Here's an example of a cyberterrorism denial of service cyberattack on our computer, account, router, server, and/or other communications infrastructure component, on 03/13/2024, interfering with our economic activity affecting our server, again. We have since contacted our European server provider, who has verified and specified that on their end their are no error messages being generated, and have said that the errors are being generated on our end, within the United States.
Here's an example of a cyberterrorism denial of service cyberattack on our computer, account, router, server, and/or other communications infrastructure component, on 03/18/2024, interfering with our economic activity again.
Here's an example of a cyberterrorism denial of service cyberattack on our computer, account, router, server, and/or other communications infrastructure component, on 03/25/2024, as we were reporting on how Trump's, Jeffrey Epstein's, and Russia's crime syndicate weaponized the hypothalami of Americans with Russian Active Measures (divide and conquer by polarizing natural differences in the population into war tribes, and taking control of one of the tribes, for example the GOP), specifically the ventromedial nuclei and the posterior hypothalamic areas of Americans, by engineering and triggering scarcity, fear, and the fight mechanism regions of the hypothalamus.
Here's an example of a cyberterrorism denial of service cyberattack on our computer, account, router, server, and/or other communications infrastructure component, on January 27, 2024.
In no particular order, here is another example of a similar error, denial of service event, and/or cyberterrorism attack on 02/28/2024.
Here's another denial of service attack error on 02/28/2024.
Here's another example of a cyberterrorism attack on January 21, 2024, interfering with our ability to relay information to the government, and interfering with our economic activity once again.
Here are some more examples of this conduct over and over again, despite a strong internet signal, and where we have contacted our web host and they have specified that these attacks are local attacks on our computers, because they are not appearing on their end, which helps us narrow down more of the criminal conspirators overtly furthering Russia's, the GOP's, Trump's, and/or Jeffrey Epstein's organized crime syndicate's intimidation conspiracy spoke, as sometimes local, sometimes in other states, sometimes across the country, sometimes in other countries, despite having more than one antivirus or malware software installed. Note the time and date stamps in the bottom right corner differentiate overt furtherance. Below there will appear to be what look like some duplicates, but rather, when clicking the reload link below and/or refreshing the window, and/or trying through a different way to the editing websites within the same minutes, resulted in what looks like duplicated but are separately denial of service attacks.
As specified in our ongoing articles regarding other spokes of the ongoing conspiracy to obstruct by way of witness, victim, and government informant stalking, cyberstalking, and intimidation, we are also being threatened almost daily with deadly weapons and harmful behavior, as specified in the following articles, and where in the image below these two links, we prove that sometimes stalking events threatening us are paired with cyberstalking and cyberattack events, meant to conceal the identity of our stalkers.
This image above proves beyond a reasonable doubt that an error occurred as we tried to identify one of many pilots who have taken to threatening us daily with aircraft, who fly way off course, nosedive our facility, while accelerating to top flight speeds towards our facility, and who pull up in the last few seconds to avoid hitting our facility, in order to stalk and intimidate us, prompting us to employ radar services to identify the recidivists doing this per the link above. Often, while trying to identify who is terrorizing us, we are subjected to cyberattacks to prevent us from identifying those threatening us with deadly weapons (aircraft). This is an example of the same above, with more examples herein, to prove the pattern.
Here's another cyberattack on our reporting of stalking, intimidation, terrorism, and threats with deadly weapons events, to prevent us from updating the pattern of the criminal conspirators.
Here's another cyberattack on our reporting of stalking, intimidation, and threats with deadly weapons, where we totally lost control of our ability to control this web session below, illustrated by the graying out of the image and the sides of the article, which are normally white and not gray.
Below is another regular example of our computer devices and communications devices visiting about 10 times more unknown sites than we actually visited ourselves (for this session below, we visited less than 10 sites), and allowing about 190 unknown websites upload unknown files onto our computer from the over 30 unknown websites we didn't visit. This, along with the other examples herein this article, are great examples as to why we have asked federal agencies to keep an eye on our reporting and communications, because others are taking our computing and communications devices to unknown places and allowing these unknown places to upload unknown files onto our computing and communications devices, converting our private property in doing so, or more simply using/taking our computers for their benefit/use in violation of our established settings forbidding the same.
Below is an example of our website not saving, when it automatically saves as we work, as we attempted to toggle to another website page.
More toggling or denial of service attacks preventing the proper functioning of our news site.
Below and above, some of the information regarding the cyberattacks has been edited out for privacy and safety reasons, but we maintain copies of the unedited files we edited, which we have made available for the government to access at their leisure and we have encouraged them to access and monitor the same.
The internet connection error below occurred on the cell phone of one of the investigative journalists published at UpRights News.
Here it is important to note that Jeffrey Epstein's Sergey Brin's and Larry Page's Google was responsible for this cyberterrorism attack below, in the context that Google was one of the first companies named in the lynched pro se relator qui tam because they joined the ongoing obstruction of justice conspiracy spoke of preemptive defaming our Editor back to 2004, and interfering with his economic activity for approximately 20 years, having joined a conspiracy to do so with others linked to Jeffrey Epstein, specifically Marrisa Meyer's and/or Leon Black's Yahoo, and/or Jeffrey Epstein's Bill Gates'Microsoft.
It is also important to note that Google is not our webhost as far as we know, and so there was no reason we know of that can explain Google's cyberterrorism, interference with our economic activity, witness intimidation, tampering, and/or other harm here other than to further the ongoing conspiracy we have specified, and where we use DuckDuckGo and not Google for a web browser, so why is our economic activity being interfered with here by Google, the largest news conglomerate/distributor, if not in an anticompetitive manner?
The following are some additional and different types of cyberterrorism denial of service attacks, all on a Google operating system, and where Google's founders were named clients, financiers, and/or associates of Jeffrey Epstein's crime syndicate, and were again among the first Silicon Valley companies to conspire to destroy the economic potential of our Editor as far back as 2004 through to 2024 in almost a continuous manner.
This next example occurred today during an aerial attack by Jeffrey Epstein's Donald Trump's and Larry Kelley's McClellan Park organized crime network of terrorists giving aid, comfort, and adhering to enemies of the United States during wartime, by intimidating and terrorizing government witnesses.
Here again it is Google who is the one responsible for a denial of service attack (Google is who serves up the ads at Daily Beast) and/or its remedy.
Here a cyberterrorism denial of service attack while writing an article on Russia's ongoing overt furtherance of the cyberstalking, stalking, cyberterrorism crimes, and/or other harm.
Here's a cyberterrorism denial of service attack while writing an article on Jeffrey Epstein's crime syndicate and orbit including Jeffrey Epstein's Donald Trump and his Trump Tower tenants, Michael Jackson (also an accused pedophile), and Jeffrey Epstein's UK/EU royals (also accused pedophile(s)), Jeffrey Epstein's Jean Luc Brunel (who did honeypot our Editor by hiring the son of a former girlfriend of our Editor from a different country at Next Model Management in California, flying them to the state where our Editor resided, whereafter this ex-girlfriend, whose family like our Editor, had been employed by Jeffrey Epstein's crime syndicate then tried to destroy our Editor's marriage by letting our Editor know that after 15 to 20 years that she had remained in love with him, he was the only one, et cetera, and who urged our Editor to come down and see her in Santa Monica, which our Editor refused to do, and then cut ties with her.
Here is another cyberterrorism denial of service attack while our Editor attempted to document a different spoke of the intimidation conspiracy, as specified at https://www.uprightsnews.com/terror-log/1536019_jeffrey-epstein-s-and-russia-s-trump-s-mcclellan-park-terror-cell-and-their-network-of-sadists-intimidating-witnesses-victims-and-government-informants-in-greater-sacramento-ca-under-color-of-law-and-in-violation-of-the-posse-comitatus-act, but again, these are just the most recent examples of this spoke of the ongoing witness intimidation conspiracy with the purpose to obstruct the lynched investigation of our Editor (the [parallel, preceding, actual, and/or overlapping] origins of Crossfire Hurricane), which devolved into an illegitimate Trump presidency in 2016, as specified in the related link above.
Here is an additional interference with economic activity, here interfering with our Editor's ability to negotiate selling some intellectual property.
Here is an additional example of cyberterrorism denial of service while researching deeper links to the Russia angle of Crossfire Hurricane.
Here is a denial of service by Google once again, but on a cell phone Gmail account that was retroactively (after the sale of the phone) required by the Google Android phone in order to work, not disclosed at the time of sale, and email which normally automatically logs in (because the login is permanent, with no clear or known way to log out), denying access to Gmail when the same normally automatically opened Gmail in the past.
Here's that same Google phone refusing access to phone messages from the children of our Editor.
Here's that same Google phone disallowing access to DuckDuckGo web browser.
Here's a cyberattack denial of service while trying to research how many members of the GOP betrayed their oath and the law in order to give aid, comfort, and/or adhere to enemies of the United States during wartime, which is treason.
Below is Google's and/or others' Captcha and/or Chromebook refusing to allow access to the use of Tor for our Editor to be able to continue to provide the government more evidence of the ongoing conspiracy that has been communicated to them, obstructing justice, intimidating a witness, victim, and government informant, tampering, and/or other harm.
Here is an example of Google's file management system failing to work properly, in overt furtherance of an ongoing conspiracy to do this across many computers at UpRights News' facility over a period of years, and regardless of the brand name, including Apple computers, all of which were crashed and totally destroyed.
Another three examples of paired cyberterrorism denial of service attacks paired to aerial attacks usually linked to Jeffrey Epstein's and Russia's Trump's McClellan Park terrorism cell, which is further linked to many of the other ongoing conspirators, as specified in the relevant link above.
Here's an example of Google artificial intelligence job hiring software employed by a company our Editor applied to, blocking access to the site to interfere with the economic activity of our Editor in a new way, but in overt furtherance of the ongoing conspiracy Jeffrey Epstein's Google has been part of since at least 2004.
This next example of the ongoing intimidation and/or cybercrimes illustrates that our (Google Chrone) computers are autonomously-visiting hundreds of more websites, now easily thousands more websites than we have visited, and our computers have allowed many more websites that this huge number of websites we haven't visited to upload unknown files onto our computers, and one of many reasons why we asked investigators to monitor our activity, to differentiate between the websites we actually go to and the websites others are taking our computer to in an unknown and unstoppable manner. Below our computer has visited more websites than we have (often by a factor of 10 times more websites and/or hundreds of more websites than we have visited), and moreover has allowed about three times more websites than we and our computer autonomously-visited below to upload unknown files onto our computers. Below our browsing history specifies our computer went to 64 different sites, and allowed 184 sites to upload unknown files onto our computer, three times more sites that we plus our computer autonomously-visited. The same begs the question, which sites is Google, Russia, Jeffrey Epstein's crime syndicate, and/or others taking our computer to in secret, and what unknown files are the uploading to our computer from three times more sites, and where are they keeping these files?
Below is a more extreme example of the same where our computer visited 1,868 websites, an estimated 1,800 of which we didn't visit. So where is our computer going and who is sending our computer there, for what purpose and what unknown files were uploaded onto our computer as a result? This seems to be a classic example of conversion of private property, or using the property of others without their permission, and where our settings clearly prohibit this behavior, so in violation of our settings for the benefit of the others using our computer in this manner against our permission. If we actually visited all of these sites, which we didn't, and visited each site for one minute, it would takes us more than 31 hours of clicking on a totally different site every minute to illustrate how ridiculous and/or even impossible the large number of sites our computer visits without our knowledge nor permission. We try and clear our cookies and web browsing data every session to thwart these sophisticated cyberterrorism attacks and the like.
Again, there are so many more examples and incidences, but here is one we were able to document that was pretty troubling, and summarizes an incident January 13, 2024, when while walking by a television located at UpRights News facility, the TV turned itself on, and the only remote for the same was in clear view and there was nothing pressing any of the buttons. This incident has to prove stalking and/or peeping technologies because in order for a TV to turn on as our Editor (the narrator below) walked by, some sort of technology needed to know where our Editor was in the building, and had to have the ability to separately cyberattack the network of UpRights News in order to perfectly time the Samsung TV turning itself on as our Editor walked by.
Most, but not all, of these attacks involve Jeffrey Epstein's Google one way or another, and again, this isn't all of the example of the harm our Editor has endured as the original investigator of Crossfire Hurricane, these are just the most recent examples for the last quarter or so, time four quarters, times 20 years, and perfectly explains why Jeffrey Epstein's crime syndicate and Russia have become radicalized since the stalking and lynching of our Editor's investigation, by the Russian Federation by at least October 20, 2013, but really part of a broader conspiracy with no statute of limitation that dates back to October 2002, as specified in the Crossfire Hurricane origins link, developed for the government to quickly understand how to better focus their investigations into Jeffrey Epstein's organized crime syndicate and orbit, which includes both founders of Google and Donald Trump, but definitely not limited to the same.
https://www.uprightsnews.com/crossfire-hurricane-origins
[1] Photo at the top of the article: https://unsplash.com/@markusspiske