Hunter Biden’s ‘disgusting’ notebook: Computer system repairman reveals what produced him phone FBI

Immediately after a relatives intervention involving his father, the present-day U.S. president, Hunter Biden was despatched to a rehab facility in Maryland. But, he hardly ever checked in. 

In element 4 of the Fox Country unique “Who is Hunter Biden?,” Decide Jeanine Pirro tracks Hunter’s “drugged, befuddled blur of total and utter debauchery” to a pc maintenance store that arrived into the possession of Hunter’s infamous laptop computer. 

“I could surely inform that he was inebriated,” mentioned John Paul Mac Isaac, the previous operator of “The Mac Store” in Wilmington, Delaware. Mac Isaac instructed Fox Nation that Hunter entered his shop on April 12, 2019, just right before closing time. 

HUNTER BIDEN’S ‘DEBAUCHERY’: Choose JEANINE Taps INTO A Lifestyle OF Intercourse, Medicine AND Overseas FUNDING

“When I asked for his final identify, there was a lengthy pause. And he kind of sarcastically additional Biden. I had to ask Hunter for his password. And he begun laughing. He was like, you are not genuinely gonna like this.”

What started as a very simple computer system mend before long turned into a troubling revelation, an “astounding” and “disgusting” volume of do-it-yourself pornography. In addition, Mac Isaac also uncovered a PDF indicating that Hunter had made $1.2 million for Burisma, a non-public vitality corporation in Ukraine.

After exploring Burisma and the contents of the laptop computer, John recognized it was time to make contact with the authorities. Mac Isaac fulfilled with FBI brokers, but they seemed to be in no rush to search into the notebook or choose action.

“I think that was my initially indicator that perhaps the FBI was extra fascinated in returning the laptop to the former operator and guarding the Bidens than they were being shielding me or getting this to the suitable channel,” he mentioned.

So, Mac Isaac modified his technique. That is when he arrived in get hold of with Bob Costello, Rudy Giuliani’s lawyer. The rest is background. The notebook turned an merchandise of interest across the political spectrum. But, just prior to the 2020 presidential election, Major Tech determined to censor its contents. 

Fb stated they were waiting around on point-checkers (who in no way arrived) to confirm the authenticity of the laptop. Meanwhile, Twitter blocked a New York Article write-up backlink breaking down the contents of the laptop computer from remaining shared. The Post’s account was even temporarily banned from the platform. 

Regardless of all the controversy bordering the notebook, Hunter doesn’t appear to be to recall how it wound up at that personal computer repair service shop. In his memoir, Hunter only remembers obtaining a simply call from his mother Jill, inquiring him to come residence. 


Credit: CBS Sunday Morning

Credit: CBS Sunday Early morning

“I walked into the house, vivid and homey as constantly, and right away noticed my 3 daughters. I understood then that a little something was up,” Hunter recalled.

Hunter then noticed his father and two counselors

Read More

PAX Technology Raided by FBI, Suspected Ties to Cybercrime

Image for article titled Large Chinese Tech Firm Raided by the FBI After Accusations of Aiding Cyberattacks

Photo: Robyn Beck / AFP (Getty Images)

A prominent Chinese tech firm that sells hardware to companies throughout the world is currently under investigation after being accused of facilitating cyberattacks on various American and European targets.

On Tuesday, a swarm of FBI agents raided the Florida offices of Pax Technology, a large, Chinese-owned point-of-sale manufacturer that sells millions of payment terminals (POS) to companies all over the globe. POS terminals are essentially payment kiosks. While you may not recognize the term, you’ve definitely used one before. They can be found pretty much everywhere—from supermarkets to gas stations to your local dive bar (wherever you need to swipe a credit card, a POS terminal will be there).

News of the raid on PAX was originally broken by WOKV, a local Florida news outlet, which reported Tuesday that the FBI, Department of Homeland Security, and other agency officials were conducting “an investigation” at the business’s warehouse in Jacksonville. When queried by reporters, the FBI put out the following statement about their activities:

“The FBI Jacksonville Division, in partnership with Homeland Security Investigations, Customs and Border Protection, Department of Commerce, and Naval Criminal Investigative Services, and with the support of the Jacksonville Sheriff’s Office, is executing a court-authorized search at this location in furtherance of a federal investigation. We are not aware of any physical threat to the surrounding community related to this search. The investigation remains active and ongoing and no additional information can be confirmed at this time.”

While that doesn’t give us a whole lot of clarity on the situation, security journalist Brian Krebs has reported that the company is being investigated for its potential role in facilitating cyberattacks on various American and European targets. A trusted source told Krebs that the company’s point-of-sale devices were supposedly being used as a storage space for malware as well as a “command and control” center, whereby attacks could be deployed and data stolen.

“FBI and MI5 are conducting an intensive investigation into PAX,” the source told Krebs. “A major US payment processor began asking questions about network packets originating from PAX terminals and were not given any good answers.”

That payment processor would appear to be Worldpay from FIS. On Wednesday, Bloomberg News reported that the company had recently begun replacing PAX-manufactured point-of-sale devices with those made by two competitor firms. The replacements, which started prior to news of the federal investigation, were spurred by concerns over odd network activity emanating from PAX’s POS terminals. When asked about the activity by Worldpay, PAX reportedly did not give “satisfactory answers,” a spokesperson told the outlet.

Krebs points out—and it’s a well-known fact—that point-of-sale terminals are common targets for cybercriminals and that the devices are frequently hijacked by hacker groups for the purposes of credential theft and malware distribution. It wouldn’t

Read More