Ten Cyber Terrorist Implanting Malicious Codes against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence March 26, 2018

Cyber Attacker
United States Plymouth, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521958757.81
3/25/2018 1:19:22 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
United States Plymouth, United States visited http://www.stewwebb.com/
3/25/2018 1:19:16 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

verizonbusiness.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Palm Beach Gardens, United States left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521977560.61
3/25/2018 6:32:42 AM (4 hours 18 mins ago)
IP: 73.244.9.70 Hostname: c-73-244-9-70.hsd1.fl.comcast.net
Browser: IE version 11.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko
cable.comcast.com

@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States United States left http://www.stewwebb.com/tag/video/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522006183.19
3/25/2018 2:29:48 PM (2 minutes ago)
IP: 107.77.165.9 Hostname: mobile-107-77-165-9.mobile.att.net
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 4.4.4; XT1032 Build/KXB21.14-L1.61) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.114 Mobile Safari/537.36
@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Fort Lauderdale, United States was blocked by firewall at http://stewwebb.com/wp-organizer.php
3/26/2018 12:59:17 AM (10 hours 42 mins ago)
IP: 204.10.105.9 Hostname: 204.10.105.9
Human/Bot: Bot
Browser: Chrome version 50.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36
NetRange: 204.10.104.0 – 204.10.111.255
[2048 addresses in this network]
CIDR: 204.10.104.0/21 (204.10.104.0 – 204.10.111.255)
[2048 addresses in this network]
NetName: ACCELERATEBIZ-1-21
NetHandle: NET-204-10-104-0-1
Parent: NET204 (NET-204-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: AccelerateBiz Inc. (ACCEL-8)
RegDate: 2004-12-15
Updated: 2012-03-20
Ref: https://whois.arin.net/rest/net/NET-204-10-104-0-1

OrgName: AccelerateBiz Inc.
OrgId: ACCEL-8
Address: 800 W Cypress Creek Rd
Address: Suite 528
City: Fort Lauderdale
StateProv: FL
PostalCode: 33309
Country: US
RegDate: 2004-08-27
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/ACCEL-8

OrgAbuseHandle: ABUSE1442-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +1-305-675-6725
OrgAbuseEmail: abuse@acceleratebiz.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE1442-ARIN

OrgTechHandle: TECHN892-ARIN
OrgTechName: Technical Support
OrgTechPhone: +1-305-675-6725
OrgTechEmail: support@acceleratebiz.com
OrgTechRef: https://whois.arin.net/rest/poc/TECHN892-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Scottsdale, United States was blocked for Manual block by administrator at http://www.stewwebb.com/wp-json/wp/v2/users/
3/26/2018 6:34:29 AM (5 hours 15 mins ago)
IP: 132.148.137.76 Hostname: ip-132-148-137-76.ip.secureserver.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
NetRange: 132.148.0.0 – 132.148.255.255
[65536 addresses in this network]
CIDR: 132.148.0.0/16 (132.148.0.0 – 132.149.255.255)
[131072 addresses in this network]
NetName: GO-DADDY-COM-LLC
NetHandle: NET-132-148-0-0-1
Parent: NET132 (NET-132-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: GoDaddy.com, LLC (GODAD)
RegDate: 2015-10-21
Updated: 2015-10-26
Ref: https://whois.arin.net/rest/net/NET-132-148-0-0-1
OrgName: GoDaddy.com, LLC
OrgId: GODAD
Address: 14455 N Hayden Road
Address: Suite 226
City: Scottsdale
StateProv: AZ
PostalCode: 85260
Country: US
RegDate: 2007-06-01
Updated: 2014-09-10
Comment: Please send abuse complaints to abuse@godaddy.com
Ref: https://whois.arin.net/rest/org/GODAD
OrgAbuseHandle: ABUSE51-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-480-624-2505
OrgAbuseEmail: abuse@godaddy.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE51-ARIN

OrgNOCHandle: NOC124-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-480-505-8809
OrgNOCEmail: noc@godaddy.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOC124-ARIN

OrgTechHandle: NOC124-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-480-505-8809
OrgTechEmail: noc@godaddy.com
OrgTechRef: https://whois.arin.net/rest/poc/NOC124-ARIN
132.148.137.76
P address 132.148.137.76
Location Scottsdale, Arizona, United States (US) flag
Registry arin
Network information
IP address 132.148.137.76
Reverse DNS (PTR record) ip-132-148-137-76.ip.secureserver.net
DNS server (NS record) cns1.secureserver.net (208.109.255.100)
cns2.secureserver.net (216.69.185.100)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 132.148.128.0/19
132.148.128.0 – 132.148.159.255
Domains around 132.148.137.76
IP address #domains
132.148.137.3 1
132.148.137.4 52
132.148.137.5 7
132.148.137.6 1
132.148.137.8 4
132.148.137.9 8
132.148.137.11 1
132.148.137.12 15
132.148.137.13 2
132.148.137.14 3
132.148.137.15 1
132.148.137.16 1
132.148.137.19 2
132.148.137.22 1
132.148.137.23 7
132.148.137.24 1
132.148.137.25 1
132.148.137.26 1
132.148.137.27 2
132.148.137.28 1
132.148.137.29 1
132.148.137.31 1
132.148.137.32 1
132.148.137.34 1
132.148.137.35 1
132.148.137.36 2
132.148.137.37 1
132.148.137.38 2
132.148.137.39 1
132.148.137.40 24
132.148.137.42 4
132.148.137.43 1
132.148.137.48 4
132.148.137.49 1
132.148.137.50 4
132.148.137.52 1
132.148.137.54 1
132.148.137.56 2
132.148.137.59 2
132.148.137.60 4
132.148.137.61 24
132.148.137.64 2
132.148.137.65 5
132.148.137.66 7
132.148.137.67 1
132.148.137.68 2
132.148.137.69 66
132.148.137.71 1
132.148.137.73 6
132.148.137.76 2
132.148.137.79 2
132.148.137.81 1
132.148.137.85 1
132.148.137.86 1
132.148.137.90 1
132.148.137.91 3
132.148.137.94 1
132.148.137.96 4
132.148.137.98 5
132.148.137.99 1
132.148.137.102 1
132.148.137.103 1
132.148.137.104 1
132.148.137.105 1
132.148.137.106 1
132.148.137.108 1
132.148.137.109 1
132.148.137.112 3
132.148.137.113 1
132.148.137.115 1
132.148.137.117 2
132.148.137.118 3
132.148.137.119 5
132.148.137.121 1
132.148.137.122 1
132.148.137.124 1
132.148.137.129 1
132.148.137.130 1
132.148.137.131 1
132.148.137.132 17
132.148.137.133 1
132.148.137.134 1
132.148.137.135 1
132.148.137.136 2
132.148.137.142 33
132.148.137.144 4
132.148.137.145 3
132.148.137.147 2
132.148.137.148 1
132.148.137.150 4
132.148.137.151 14
132.148.137.153 58
132.148.137.155 3
132.148.137.157 2
132.148.137.159 1
132.148.137.160 2
132.148.137.161 5
132.148.137.167 2
132.148.137.173 1
132.148.137.175 2
Domains on 132.148.137.76
Domain Tools
dfwnewhomes.com
DNS server (NS records) ns68.domaincontrol.com (208.109.255.44)
ns67.domaincontrol.com (216.69.185.44)
Mail server (MX records) smtp.secureserver.net (72.167.238.29)
mailstore1.secureserver.net (72.167.238.32)
IP address (IPv4) 132.148.137.76
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 132.148.128.0/19
132.148.128.0 – 132.148.159.255
Domain Name: DFWNEWHOMES.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Whois Agent
Registrant Organization: Whois Privacy Protection Service, Inc.
Name Server: NS67.DOMAINCONTROL.COM
Name Server: NS68.DOMAINCONTROL.COM
DNSSEC: unsigned

qonnect.in
OrgName: GoDaddy.com, LLC
OrgId: GODAD
Address: 14455 N Hayden Road
Address: Suite 226
City: Scottsdale
StateProv: AZ
PostalCode: 85260
Country: US
RegDate: 2007-06-01
Updated: 2014-09-10
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker olatha, kansas
Olathe, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522012184.88
3/26/2018 11:13:44 AM (45 minutes ago)
IP: 73.185.228.112 Hostname: c-73-185-228-112.hsd1.ks.comcast.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

NetRange: 73.0.0.0 – 73.255.255.255
[16777216 addresses in this network]
CIDR: 73.0.0.0/8 (73.0.0.0 – 73.255.255.255)
[16777216 addresses in this network]
NetName: CABLE-1
NetHandle: NET-73-0-0-0-1
Parent: NET73 (NET-73-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS7922
Organization: Comcast Cable Communications, LLC (CCCS)
RegDate: 2005-04-19
Updated: 2016-08-31
Ref: https://whois.arin.net/rest/net/NET-73-0-0-0-1

OrgName: Comcast Cable Communications, LLC
OrgId: CCCS
Address: 1800 Bishops Gate Blvd
City: Mt Laurel
StateProv: NJ
PostalCode: 08054
Country: US
RegDate: 2001-09-17
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/CCCS

OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-888-565-4329
OrgAbuseEmail: abuse@comcast.net
OrgAbuseRef: https://whois.arin.net/rest/poc/NAPO-ARIN

OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-317-7200
OrgTechEmail: CNIPEO-Ip-registration@cable.comcast.com
OrgTechRef: https://whois.arin.net/rest/poc/IC161-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Mitchell, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522064606.62
3/26/2018 6:43:36 AM (5 hours 34 mins ago)
IP: 172.78.225.94 Hostname: 172.78.225.94
Browser: Safari version 8.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 8_1_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12B435 Safari/600.1.4

Sorry, but no data for that IP or domain was found.

IP address 172.78.225.94
Location Butlerville, Indiana, United States
@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Canyon Country, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522064610.01
3/26/2018 6:43:32 AM (5 hours 34 mins ago)
IP: 76.95.152.193 Hostname: cpe-76-95-152-193.socal.res.rr.com
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
NetRange: 76.80.0.0 – 76.95.255.255
[1048576 addresses in this network]
CIDR: 76.80.0.0/12 (76.80.0.0 – 76.95.255.255)
[1048576 addresses in this network]
NetName: RRWE
NetHandle: NET-76-80-0-0-1
Parent: NET76 (NET-76-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Time Warner Cable Internet LLC (RRWE)
RegDate: 2006-12-22
Updated: 2007-12-18
Ref: https://whois.arin.net/rest/net/NET-76-80-0-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RRWE
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate: 2000-10-04
Updated: 2018-03-07
Comment: Allocations for this OrgID serve Road Runner residential customers out of the Honolulu, HI, Kansas City, KS, Orange, CA and San Diego, CA RDCs.
Ref: https://whois.arin.net/rest/org/RRWE

OrgTechHandle: IPADD1-ARIN
OrgTechName: IPAddressing
OrgTechPhone: +1-720-699-4582
OrgTechEmail: ipaddressing@chartercom.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD1-ARIN

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN

@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Lake Havasu City, United States left http://www.stewwebb.com/2018/03/23/ses-and-serco-the-big-secret-of-the-deep-state/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522044134.26
3/26/2018 1:02:16 AM (11 hours 25 mins ago)
IP: 47.216.40.139 Hostname: 47-216-40-139.lkhvcmtk02.res.dyn.suddenlink.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
NetRange: 47.208.0.0 – 47.223.255.255
[1048576 addresses in this network]
CIDR: 47.208.0.0/12 (47.208.0.0 – 47.223.255.255)
[1048576 addresses in this network]
NetName: SUDDE
NetHandle: NET-47-208-0-0-1
Parent: NET47 (NET-47-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Suddenlink Communications (SUDDE)
RegDate: 2015-09-08
Updated: 2015-09-08
Ref: https://whois.arin.net/rest/net/NET-47-208-0-0-1

OrgName: Suddenlink Communications
OrgId: SUDDE
Address: 311 NNW Loop 323
City: Tyler
StateProv: TX
PostalCode: 75701
Country: US
RegDate: 2006-05-25
Updated: 2018-02-14
Ref: https://whois.arin.net/rest/org/SUDDE

ReferralServer: rwhois://rwhois.suddenlink.net:4321

OrgNOCHandle: NOCSU37-ARIN
OrgNOCName: NOC Suddenlink
OrgNOCPhone: +1-866-232-5455
OrgNOCEmail: noc@suddenlink.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOCSU37-ARIN

OrgTechHandle: AUIO-ARIN
OrgTechName: Altice USA Internet Operations
OrgTechPhone: +1-516-803-2300
OrgTechEmail: hostmaster@cv.net
OrgTechRef: https://whois.arin.net/rest/poc/AUIO-ARIN

OrgAbuseHandle: ABUSE6997-ARIN
OrgAbuseName: Abuse Suddenlink
OrgAbusePhone: +1-903-266-4800
OrgAbuseEmail: hostmaster@cv.net
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE6997-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
San Diego, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522095760.82
3/26/2018 3:22:44 PM (14 minutes ago)
IP: 66.75.249.174
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

Your kind Contributions are very much appreciated thank you. – Stew Webb

 



flagususmcflag france_flag
stewwebbradionetwork-com-2015-09-24

You can Mute the Audio

AudioNow

StewWebb-RadioNetwork-Store
Stew Webb Radio Store

Bush Illuminati Human Sacrifice Denver June 20-21 2018

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

President Trump Twitter feed

FBI Raids Satanic Human Sacrifice Video

Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism April 18 2010

SEE: PROOF (Exhibits 1-22 below) Attemped murder of Stew Webb Federal Whistle blower and Grandview, Missouri Police Covered up the car crash.

March 26, 2018 Letter to President Trump Stop NSA NAZI Espionage

Please email or twitter to President Trump


Letter to President Trump 2017-02-23 from Whistle blowers How to Drain the Swamp Monsters

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

George Bush High Treason Illegal Sale of F-16s, Apache Helicopters, M-1 Tanks

AIPAC and Abramoff Operate Child Sex Blackmail Ring

Breaking News

Contributions are much appreciated

The below picture of the attempted murder of Stew Webb October 25, 2010 by two of Hillary Clinton’s Assassins. There were two more crashes and attempts one year later.
Contributions are much appreciated Thank You.– Stew Webb

SEE: PROOF (Exhibits 1-22 below) Attemped murder of Stew Webb Federal Whistle blower and Grandview, Missouri Police Covered up the car crash.






Archives


Stew Webb 34 Years a Federal Whistle blower
Stew Webb served in the United States Marine Corps and was Honorable Discharge. Stew was a General Contractor-Home Builder until 3 car crashes in one year and is now disabled. Stew turned Federal Whistle blower – Activist of 31 years and has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and now has his own Radio and TV Network http://www.stewwebb.com Stew was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. (MDC-NYSE) Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings and the information provided that lead to the 2008 Illegal Bank Bailout.
Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges which were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman (Deceased 2004) was member of the “Illuminati Council of 13”