Valikko
Etusivu Tilaa päivän jae Raamattu Raamatun haku Huomisen uutiset Opetukset Ensyklopedia Kirjat Veroparatiisit Epstein Files YouTube Visio Suomi Ohje

This is an FBI investigation document from the Epstein Files collection (FBI VOL00009). Text has been machine-extracted from the original PDF file. Search more documents →

FBI VOL00009

EFTA00265583

41 pages
Pages 41–41 / 41
Page 41 / 41
V I 14CE-NT 
i30 (CAC - CPSTC-iN - 
FRANCE CRIMINAL ACM) t T y 
I removed all business concepts from my computer and copied all files to a disconnected 
harddrive. The business concepts and developments were stored in a locked vault designed 
through McAfee Security System and was password protected. McAfee Security System is 
password protected and password protected for administration changes as well 
All newly created accounts and security systems are 2 step verification coded, and 
Authentication app is required in order to access any accounts or systems on my new 
computer system, mobile phone and Apple Tablet. 
Second hacking occurred following all these measures being used and put in place. 
Mobile phone security upgrade - Finger print authentication on all access to apps, screen, 
opening of phone, security systems, phone calls, messages, photo gallery / McAfee Security 
System - Nord VPN - Malwarebytes Security System - Password and fingerprint encoded on 
all access points 
Refer to
 - Telstra report Fraudulent activity - Continuous backing of account / personal 
and thin business account - Direct Targeting of the Individual 
Government are gaining direct access through the account registered in their company 
Telstra / Government owned I Foreign investors 
I am now currently not receiving constant correspondence from my contracted publisher 
Austin Macauley Publishers, London concerning the second contract, second edition of the 
book developments : Email : 
Business email, server GoDaddy, America 
Suspected : Intellectual Property Theft / Publishing House Copyright Laws, individuals 
involved in the targeting to sell the books on the Black Market and intercept success of the 
publications sabotaging the publishing house, Austin Macauley Publishers, investment in 
their client / profit from book sales and the success of their client / victim of targeting 
ec ts_re 
vt6xtmea_ 
_ FR 
CE CRI M I Nft L 
F c r I th 
4
 
cotahlEcTE...z. 'vO
tiserny ‘topsy, - 6951e ( 
HY, g vs4ELL—
FAMILY HISTORY OF CRIMINAL ACTIVITY - BULONE 
f. 
Vincent Bulone informed me during our relationship that his grandfather v mcenzo 
ank Salvatore Bulone, Sicily was involved in a murder. His gyandfatheflVincenzo Salvatore` 
,Bulone hadthot dead a man in Sicily over a woman and then fled taliNew Yorlirfo escape 
conviction and to hide. Vincent Bulone is named after his grandfilheThut was adapted for 
• 
the French re aon from Vincenzo Salvatore Bulo e o 
alv 
re Bulone.
At the time of meetin his 
Refer to Folder 17. Whatsapp app 
EFTA00265623
Pages 41–41 / 41