WHAT'S A LITTLE UNCHARGED CYBERTERRORISM AGAINST AMERICANS AMONG FRIENDS?
As a testament to living in the United States post-Russia's and Jeffrey Epstein's Donald Trump and the Republican Party, UpRights News is no stranger to being stalked, cyberstalked, targeted by terrorists, and organized crime.
In fact terrorism attacks against our operations and against our investigative journalism team, that we could literally write an entire college textbook-size report on the amount of evidence we have collected for state and federal governments, which we have shared with them directly and indirectly.
Today was an especially active day for cyberterrorism at UpRights News, so we thought we'd write a follow-up article on the same, based on the large amount of evidence we gathered an analyzed.
Today we were able to document all of the following,
(1) Someone disconnecting our computers from our network service provider, and connecting our computers to someone else's network, in the context that we only pay for one network service provider. When this occurred we were writing an article we researched on the 14 different links between Bill Gates' and Warren Buffet's The Giving Pledge and Jeffrey Epstein's crime syndicate they are directly and indirectly linked to;
(2) An entire section of our website was deactivated, deleted, and/or rendered inaccessible, and yet we were able to prove that we had a very strong internet signal, and so we know that a weak internet signal played no part. More specifically, our entire section named Jeffrey Epstein's "Common Wealth" was made inaccessible, and blocked our ability to post the article on the 14 links of Jeffrey Epstein to Bill Gates' and Warren Buffet's The Giving Pledge. We cloned that section of our website and immediately regained control, and replaced the parts that were lost with backup copies of our research;
(3) Someone keeps using our computer systems and/or devices to visit unknown websites we have not visited, and the way we were able to document this is that we clear the cookies and browsing data on our computing devices almost daily, and we have a general idea of how many websites we visit to write a given article, usually somewhere between 5 to 15 different websites, with some of our larger articles having closer to 30 references, from about 30 different websites. Well when we clear our browsing data at the end of the day, sometimes we find our computers and devices have been to hundreds, sometimes several hundreds of websites. To put that into context, if we visited one site per minute, then after an hour we would have visited 60 websites, and if did this straight for 5-6 hours non-stop, we'd be able to reach a number to close to what we are erasing sometimes daily, and yet again, we are at most visiting 30 sites per day, and our metrics almost always exceed that number sometimes 10-15 fold. Furthermore, some articles take a good 5-10 minutes to read and to analyze, and then we have to compile the research, write articles, edit the articles, and publish them, and so more simply, we wouldn't have time to visit the 300-500 websites our computer alerts us have been visited. This is when we realized that there is no way we are the ones visiting the same, and that we better start documenting every time we find a large number of websites our computers visit that we know we didn't visit;
(4) Recently, especially in the early morning, we have repeatedly found that the clock for our computers is off by two hours in the future, which later self-corrects. We believe that this is evidence that at least one of the people or groups using our computers and/or cyberhacking us, cyberterrorizing us, cyberstalking us, and/or the like is found in a timezone two hours East of us, is a reasonable inference, explaining why our computer clock appears to be two hours in the future, because our computer thinks it is two hours East of where we actually are. In the past we have experienced the same with our Yahoo emails, controlled by Jeffrey Epstein's Leon Black at the time, and where (A) we were receiving emails from 8-9 hours in the future (corresponding to Jeffrey Epstein's Prince Andrew's United Kingdom), whose date would eventually change back to the actual time retrospectively, and (B) where Jeffrey Epstein's Leon Black's Yahoo used to let us know where our computer was access from, and we would find that it was often accessed from Plano, Texas, and from Concord, California, but not limited to the same;
(5) Today, we noticed that Jeffrey Epstein's Jeff Bezo's Wholefood's contractor, Unfi, had their network or devices available for us to connect with, and vice versa, and yet the closest Unfi is located a significant distance away from our operations. Accordingly, using DuckDuckGo map and directions, we punched in the Unfi address closest to us, and to our surprise, our computer thought we were in a different city, specifically, Lincoln, CA, specifically in front of a PG&E facility, across the street from the same, where there is nothing but an empty field, but where we found using Google Earth, two telecommunications boxes, and so it is a reasonable inference that someone used the same to connect to our computer today, and when they did our computer thought it was in Lincoln, CA, again a totally different city than where we live. Our cell phones have in a similar manner thought they were in San Francisco and Arizona, and interestingly, we are able to track where our readers are located in a general sense, because our web developer provides us a map of the world, with dots that specify cities where people read our news from, and where Lincoln, CA is the largest group of people reading our news, but where we have also found many people in Arizona reading our news. Very interesting, is that there are people who read our news from foreign countries like Ukraine, Brazil, China, India, France, and other places where Jeffrey Epstein operated, or where his named clients operated and/or were affiliated to.
UPRIGHTS NEWS NETWORK DISCONNECTED FROM UPRIGHTS NEWS COMPUTERS AND CHANGED TO A DIFFERENT UNKNOWN NETWORK BY CYBERTERRORISTS, INTERRUPTING AN ARTICLE LINKING 14 DIFFERENT PEOPLE DIRECTLY OR INDIRECTLY TO JEFFREY EPSTEIN AND TO JEFFREY EPSTEIN'S BILL GATES AND TO JEFFREY EPSTEIN'S WARREN BUFFET'S AND TO JEFFREY EPSTEIN'S THE GIVING PLEDGE
We were working on the following article when we came under severe and sustained cyberterrorism attacks.
Among the spokes of this attack included our computers being disconnected from our our only networked, and changed to another network, and yet we don't pay for another network to change to, we only have one.
OUR COMPUTERS ARE VISITING WAY MORE WEBSITES THAN WE HAVE VISITED AND EVERY DAY
Below is an example of another curious conundrum we elucidated, where despite visiting roughly fewer than 30 websites per day, our computer has been found to be visiting hundreds of different websites we didn't visit, or about 10 times more websites than we are actually visiting.
The way we found this out is that we were being cyberattacked on a regular basis, and then started clearing our cookies and browser data, when we discovered that our computers were visiting enormously more websites than we were actually visiting. This led us to start documenting the same, and here is an example of the same.
For context, if we visited every one of these websites, for one minute, then we would have to spend 5 hours surfing websites, without a break, lunch, just non-stop website visiting for five hours to be able to visit this many websites, which we simply don't do, and haven't visited, maybe on the high end visiting about 30 websites per day, often only 5 to 10 websites per day is more common for us.
The question then is who else is using our computers to visit hundreds of websites per day, and what websites are they visiting, and why? Of course all of this is very troubling because if others can use our computers to visit sites we aren't visiting and don't know about, then they could be visiting some sites we would never want to be associated with, but then if others are using our computers to do the same, instead of their own computers, then they are doing so unlawfully, and this is in part why we asked government investigators to keep an eye on our internet activities, to see if they can identify who is using our computers, and what they are using them for.
UPRIGHTS NEWS SERVER CONNECTION ATTACKS
Despite a strong internet signal we regularly get cyberattacked in a manner that prevents us from connecting to our server, and it doesn't matter if we use Jeffrey Epstein's Microsoft, Jeffrey Epstein's Google, and/or Jeffrey Epstein's Apple computer operating systems.
WEBSITE DEVELOPMENT SERVER AND/OR CONTENT CYBERATTACKED IN SUSTAINED ATTACK
Another spoke of the cyberterrorism we experienced was non-stop denial of service to the article we were working on, specifically, this one below, except we receive a different type of error message.
The bottom of this article provides almost 10 different print screens of the sustained cyberterrorism attack for a period of about one hour, and where it wasn't just the one article we were working that was made inaccessible to us, and blocking our publication of the article, and deleting content in the article - but rather our entire Jeffrey Epstein section was rendered inaccessible, in the context we routinely link big tech leaders in California to the Jeffrey Epstein, which is where we operate, and so we don't have to stretch our imaginations to figure out who is behind the same, or why.
OUR COMPUTER DEVICES AND EMAILS ARE OFTEN "FOUND" LOCATED IN OTHER CITIES AND STATES
After searching for directions from our operations to a company known as Unfi, found populating in our network section, our computer thought our location was 7.8 miles away in a different city, known as Lincoln, CA, and where our computer thought it was nowhere, by a totally open or vacant field in front of a PG&E facility that can't be found with an online search, across the street from the same. The PG&E facility is found within the almost square enclosure below, but our computer thought the computer was located across the street from the same.
Google street view confirmed this is an undisclosed PG&E (energy company including big oil, who we have recently written articles against, and responsible for many California wildfires).
But per the directions above, our computer systems thought they were across the street from this facility, and sure enough there are two utility boxes across the street from PG&E.
Here's a close up of the same.
Accordingly, it is a reasonable inference that whoever has been taking control of our computers recently did so directly or remotely by connecting to one of these two communications panels, per the navigator or maps "your location" step by step details and map, specifying where the map thought to find our computer, which was actually 7.8 miles away in a different city near or closer to a city known as Rocklin, CA.
There are likely a limited number of people who are allowed to access these panels, and/or who have keys for these boxes in particular, and so here our cyberstalkers and cyberterrorists are getting sloppy, because now they have allowed state and federal investigators to have a better idea as to who is behind this terrorism against an asset of the federal government, and given them a time frame as to when these boxes and our computers were accessed, specifically at 5:31PM, September 18, 2023, at the communications panels numbered 801X, at the cross streets of Joiner Parkway and Nicholas Road in Lincoln, CA.
Accordingly, which ever organization sent their employee to access the same, and where there are camera's at many of our intersections - is likely (one of) the person(s) who has(have) been cyberhacking, cyberattacking, cyberstalking, cyberbullying, cyberterrorism, retaliation, witness intimidation for the purpose of obstruction, RICO, corruption of public offices, engaging in wire fraud, computer fraud, and/or other harm against UpRights News and our investigative journalism team - for us informing federal investigators and prosecutors directly and indirectly to protect our country from terrorists, traitors, seditionists, insurrectionists, organized crime, and deceived white haters.
These white haters and self-loathers have been taught big white fake royal lies to dismiss their African roots and heritage (proven by genetic research, especially albino research, and genetic research into the very recent blue eye and pale skin mutant genes, only 8000 years old out of 200K-300K years human history) - to instead serve as lowly puppets to the failed billionaire experiment of Jeffrey Epstein - who deceive these others into only learning about and accepting an arbitrary heritage, not their full heritage, robbing them of the same.
Celebrate our shared African heritage my brothers, and free yourselves from the big white lies you have been told that make you hate your family and our shared family history and ancestry. Embrace your inner African.
Learn more at https://www.uprightsnews.com/african-mutterland.
PHOTO ATTRIBUTE
https://unsplash.com/@markusspiske