This is an FBI investigation document from the Epstein Files collection (FBI VOL00009). Text has been machine-extracted from the original PDF file. Search more documents →
FBI VOL00009
EFTA00265583
41 pages
Pages 41–41
/ 41
Page 41 / 41
V I 14CE-NT i30 (CAC - CPSTC-iN - FRANCE CRIMINAL ACM) t T y I removed all business concepts from my computer and copied all files to a disconnected harddrive. The business concepts and developments were stored in a locked vault designed through McAfee Security System and was password protected. McAfee Security System is password protected and password protected for administration changes as well All newly created accounts and security systems are 2 step verification coded, and Authentication app is required in order to access any accounts or systems on my new computer system, mobile phone and Apple Tablet. Second hacking occurred following all these measures being used and put in place. Mobile phone security upgrade - Finger print authentication on all access to apps, screen, opening of phone, security systems, phone calls, messages, photo gallery / McAfee Security System - Nord VPN - Malwarebytes Security System - Password and fingerprint encoded on all access points Refer to - Telstra report Fraudulent activity - Continuous backing of account / personal and thin business account - Direct Targeting of the Individual Government are gaining direct access through the account registered in their company Telstra / Government owned I Foreign investors I am now currently not receiving constant correspondence from my contracted publisher Austin Macauley Publishers, London concerning the second contract, second edition of the book developments : Email : Business email, server GoDaddy, America Suspected : Intellectual Property Theft / Publishing House Copyright Laws, individuals involved in the targeting to sell the books on the Black Market and intercept success of the publications sabotaging the publishing house, Austin Macauley Publishers, investment in their client / profit from book sales and the success of their client / victim of targeting ec ts_re vt6xtmea_ _ FR CE CRI M I Nft L F c r I th 4 cotahlEcTE...z. 'vO tiserny ‘topsy, - 6951e ( HY, g vs4ELL— FAMILY HISTORY OF CRIMINAL ACTIVITY - BULONE f. Vincent Bulone informed me during our relationship that his grandfather v mcenzo ank Salvatore Bulone, Sicily was involved in a murder. His gyandfatheflVincenzo Salvatore` ,Bulone hadthot dead a man in Sicily over a woman and then fled taliNew Yorlirfo escape conviction and to hide. Vincent Bulone is named after his grandfilheThut was adapted for • the French re aon from Vincenzo Salvatore Bulo e o alv re Bulone. At the time of meetin his Refer to Folder 17. Whatsapp app EFTA00265623
Pages 41–41
/ 41