SlideShare uma empresa Scribd logo
1 de 3
The Tom 2.0 Live History and Background of the Secret Service<br />1865 The Secret Service Division was created on July 5, 1865 in Washington, D.C., to suppress counterfeit currency. Chief William P. Wood was sworn in by Secretary of the Treasury Hugh McCulloch. 1867 <br />1867 Secret Service responsibilities were broadened to include quot;
detecting persons perpetrating frauds against the government.quot;
 This appropriation resulted in investigations into the Ku Klux Klan, non-conforming distillers, smugglers, mail robbers, land frauds, and a number of other infractions against the federal laws. 1870 <br />1870 Secret Service headquarters relocated to New York City. 1874 <br />1874 Secret Service headquarters returned to Washington, D.C. 1875 <br />1875 The first commission book and a new badge were issued to operatives. 1877 <br />1877 Congress passed an Act prohibiting the counterfeiting of any coin, gold or silver bar. 1883 <br />1883 Secret Service was officially acknowledged as a distinct organization within the Treasury Department. 1894 <br />1894 The Secret Service began informal part-time protection of President Cleveland. 1895 <br />1895 Congress passed corrective legislation for the counterfeiting or possession of counterfeit stamps. 1901 <br />1901 Congress informally requested Secret Service Presidential protection following the assassination of President William McKinley. 1902 <br />1902 Secret Service assumed full-time responsibility for protection of the President. Two operatives were assigned full time to the White House Detail. 1906 <br />1907 Congress passed Sundry Civil Expenses Act for 1907 that provided funds for Presidential protection by the Secret Service. Secret Service operatives began to investigate the western land frauds. The Service's investigations returned millions of acres of land to the government. 1908 <br />1908 Secret Service began protecting the president-elect. Also, President Roosevelt transferred Secret Service agents to the Department of Justice. They formed the nucleus of what is now the Federal Bureau of Investigation (FBI).   EXPANSION 1913 <br />1913 Congress authorized permanent protection of the president and the statutory authorization for president-elect protection. 1915 <br />1915 President Wilson directed the Secretary of the Treasury to have the Secret Service investigate espionage in the United States. 1917 <br />1917 Congress authorized permanent protection of the president's immediate family and made quot;
threatsquot;
 directed toward the president a federal violation. 1922 <br />1922 The White House Police Force created on October 1, 1922, at the request of President Harding. 1930 <br />1930 The White House Police Force was placed under the supervision of the Secret Service.<br />1951 Congress enacted legislation that permanently authorized Secret Service protection of the president, his immediate family, the president-elect, and the vice president, if he wishes. (Public Law - 82-79).<br />1970 The White House Police Force renamed the Executive Protective Service and increased its responsibilities to include the protection of diplomatic missions in the Washington, D.C., area. (Public Law 91-217).<br />1977 The Executive Protective Service was officially renamed the Secret Service Uniformed Division on November 15, 1977.<br />1994 The passage of the 1994 Crime Bill Public Law 103-322, in part, revised Title 18 USC Section 470, providing that any person manufacturing, trafficking in, or possessing counterfeit U.S. currency abroad may be prosecuted as if the act occurred within the United States.<br />2000. Presidential Threat Protection Act (Public Law 106-544) was passed, which in part, authorized the Secret Service to participate in the planning, coordination, and implementation of security operations at special events of national significance (quot;
National Special Security Eventquot;
), as determined by the President.<br />2001. The Patriot Act (Public Law 107-56) increased the Secret Service's role in investigating fraud and related activity in connections with computers. In addition it authorized the Director of the Secret Service to establish nationwide electronic crimes taskforces to assist the law enforcement, private sector and academia in detecting and suppressing computer-based crime; increased the statutory penalties for the manufacturing, possession, dealing and passing of counterfeit U.S. or foreign obligations; and allowed enforcement action to be taken to protect our financial payment systems while combating transnational financial crimes directed by terrorists or other criminals.<br />2002 The Department of Homeland Security was established with the passage of (Public Law 107-296) which in part, transfered the United States Secret Service from the Department of the Treasury, to the new department effective March 1, 2003.<br />2007 Protection began for presidential candidate Illinois Senator Barack Obama in May, the earliest initiation of Secret Service protection for any candidate in history. Presidential candidate New York Senator Hillary Clinton already received protection before she entered the race due to her status as former first lady.<br />2007 The First of the Tom 2.0 Live Messages where intercepted by the Secret Service, The First being uploaded to Youtube for Americans to see HERE.<br />2007 (Septemeber) Tom 2.0 Live Travels to China and is surprised to find he can still access his MySpace.com Profiles and sends more messages to The White House<br />2008 Tom 2.0 Live travels back to Australia and meets with no one from the Secret Service or The White House in relation to his TOP SECRET messages sent from within China.<br />2008 Tom 2.0 Live is in Australia for the Beijing 2008 Olympics as the Chinese felt he was too much of a Security risk to have in the country at the time.<br />2008 Secret Broadcast are made from within China using a USTREAM account here to the American Public pointing out that not all Chinese Internet is Blocked<br />2008 The Secret Service marked five years under the Department of Homeland Security. Since 2003, the Secret Service made nearly 29,000 criminal arrests for counterfeiting, cyber investigations and other financial crimes, 98% of which resulted in convictions, and seized more than $295 million in counterfeit currency. The Secret Service investigated and closed financial crimes cases where actual loss amounted to $3.7 billion and prevented a potential loss of more than $12 billion.<br />2008 Tom 2.0 Live travels back to China on 5th June 2008 he is all alone at a computer on his birthday as he never told any people when his birthday was it was displayed over the internet on his Accounts. Still no Americans could find him.<br />2009 The Security Time Checks and Alert and Readiness of The White House where conducted by Tom 2.0 Live and for transparency have been uploaded to the Internet for all Americans to see.<br />2009 The Tom 2.0 Live Digital Network of Communication and Recording went online for the first time in History and the White House was informed.<br />2009 Tom 2.0 Live travels back to Australia for his Sister’s Wedding, no Secret Service are there to meet him, no Americans from MySpace.com and no people mention anything about what he has been doing in China for the last two years online.<br />2009 Tom 2.0 Live travels back to China and spends a night in the hospital because the Chinese thought he may have H1NI(it was just a cough)<br />2009 12 Americans arrive to the Workplace of Tom 2.0 Live and use his information he has learned for the last two years and then proceed to get him fired for sending an email that had the word “sex” in it, as one of them found it offensive, all the while Tom 2.0 Live was just a guy all alone in his room typing on a computer.<br />2011 The 44th President of the United States Barack Obama, arrives in Australia, the homeland of Tom 2.0 Live. <br />
The Tom 2 0 Live History Of The Secret Service   Option A
The Tom 2 0 Live History Of The Secret Service   Option A

Mais conteúdo relacionado

Último

THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
Faga1939
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
PsychicRuben LoveSpells
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
hyt3577
 

Último (20)

02052024_First India Newspaper Jaipur.pdf
02052024_First India Newspaper Jaipur.pdf02052024_First India Newspaper Jaipur.pdf
02052024_First India Newspaper Jaipur.pdf
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeGroup_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the trade
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 

Destaque

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Destaque (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

The Tom 2 0 Live History Of The Secret Service Option A

  • 1. The Tom 2.0 Live History and Background of the Secret Service<br />1865 The Secret Service Division was created on July 5, 1865 in Washington, D.C., to suppress counterfeit currency. Chief William P. Wood was sworn in by Secretary of the Treasury Hugh McCulloch. 1867 <br />1867 Secret Service responsibilities were broadened to include quot; detecting persons perpetrating frauds against the government.quot; This appropriation resulted in investigations into the Ku Klux Klan, non-conforming distillers, smugglers, mail robbers, land frauds, and a number of other infractions against the federal laws. 1870 <br />1870 Secret Service headquarters relocated to New York City. 1874 <br />1874 Secret Service headquarters returned to Washington, D.C. 1875 <br />1875 The first commission book and a new badge were issued to operatives. 1877 <br />1877 Congress passed an Act prohibiting the counterfeiting of any coin, gold or silver bar. 1883 <br />1883 Secret Service was officially acknowledged as a distinct organization within the Treasury Department. 1894 <br />1894 The Secret Service began informal part-time protection of President Cleveland. 1895 <br />1895 Congress passed corrective legislation for the counterfeiting or possession of counterfeit stamps. 1901 <br />1901 Congress informally requested Secret Service Presidential protection following the assassination of President William McKinley. 1902 <br />1902 Secret Service assumed full-time responsibility for protection of the President. Two operatives were assigned full time to the White House Detail. 1906 <br />1907 Congress passed Sundry Civil Expenses Act for 1907 that provided funds for Presidential protection by the Secret Service. Secret Service operatives began to investigate the western land frauds. The Service's investigations returned millions of acres of land to the government. 1908 <br />1908 Secret Service began protecting the president-elect. Also, President Roosevelt transferred Secret Service agents to the Department of Justice. They formed the nucleus of what is now the Federal Bureau of Investigation (FBI).   EXPANSION 1913 <br />1913 Congress authorized permanent protection of the president and the statutory authorization for president-elect protection. 1915 <br />1915 President Wilson directed the Secretary of the Treasury to have the Secret Service investigate espionage in the United States. 1917 <br />1917 Congress authorized permanent protection of the president's immediate family and made quot; threatsquot; directed toward the president a federal violation. 1922 <br />1922 The White House Police Force created on October 1, 1922, at the request of President Harding. 1930 <br />1930 The White House Police Force was placed under the supervision of the Secret Service.<br />1951 Congress enacted legislation that permanently authorized Secret Service protection of the president, his immediate family, the president-elect, and the vice president, if he wishes. (Public Law - 82-79).<br />1970 The White House Police Force renamed the Executive Protective Service and increased its responsibilities to include the protection of diplomatic missions in the Washington, D.C., area. (Public Law 91-217).<br />1977 The Executive Protective Service was officially renamed the Secret Service Uniformed Division on November 15, 1977.<br />1994 The passage of the 1994 Crime Bill Public Law 103-322, in part, revised Title 18 USC Section 470, providing that any person manufacturing, trafficking in, or possessing counterfeit U.S. currency abroad may be prosecuted as if the act occurred within the United States.<br />2000. Presidential Threat Protection Act (Public Law 106-544) was passed, which in part, authorized the Secret Service to participate in the planning, coordination, and implementation of security operations at special events of national significance (quot; National Special Security Eventquot; ), as determined by the President.<br />2001. The Patriot Act (Public Law 107-56) increased the Secret Service's role in investigating fraud and related activity in connections with computers. In addition it authorized the Director of the Secret Service to establish nationwide electronic crimes taskforces to assist the law enforcement, private sector and academia in detecting and suppressing computer-based crime; increased the statutory penalties for the manufacturing, possession, dealing and passing of counterfeit U.S. or foreign obligations; and allowed enforcement action to be taken to protect our financial payment systems while combating transnational financial crimes directed by terrorists or other criminals.<br />2002 The Department of Homeland Security was established with the passage of (Public Law 107-296) which in part, transfered the United States Secret Service from the Department of the Treasury, to the new department effective March 1, 2003.<br />2007 Protection began for presidential candidate Illinois Senator Barack Obama in May, the earliest initiation of Secret Service protection for any candidate in history. Presidential candidate New York Senator Hillary Clinton already received protection before she entered the race due to her status as former first lady.<br />2007 The First of the Tom 2.0 Live Messages where intercepted by the Secret Service, The First being uploaded to Youtube for Americans to see HERE.<br />2007 (Septemeber) Tom 2.0 Live Travels to China and is surprised to find he can still access his MySpace.com Profiles and sends more messages to The White House<br />2008 Tom 2.0 Live travels back to Australia and meets with no one from the Secret Service or The White House in relation to his TOP SECRET messages sent from within China.<br />2008 Tom 2.0 Live is in Australia for the Beijing 2008 Olympics as the Chinese felt he was too much of a Security risk to have in the country at the time.<br />2008 Secret Broadcast are made from within China using a USTREAM account here to the American Public pointing out that not all Chinese Internet is Blocked<br />2008 The Secret Service marked five years under the Department of Homeland Security. Since 2003, the Secret Service made nearly 29,000 criminal arrests for counterfeiting, cyber investigations and other financial crimes, 98% of which resulted in convictions, and seized more than $295 million in counterfeit currency. The Secret Service investigated and closed financial crimes cases where actual loss amounted to $3.7 billion and prevented a potential loss of more than $12 billion.<br />2008 Tom 2.0 Live travels back to China on 5th June 2008 he is all alone at a computer on his birthday as he never told any people when his birthday was it was displayed over the internet on his Accounts. Still no Americans could find him.<br />2009 The Security Time Checks and Alert and Readiness of The White House where conducted by Tom 2.0 Live and for transparency have been uploaded to the Internet for all Americans to see.<br />2009 The Tom 2.0 Live Digital Network of Communication and Recording went online for the first time in History and the White House was informed.<br />2009 Tom 2.0 Live travels back to Australia for his Sister’s Wedding, no Secret Service are there to meet him, no Americans from MySpace.com and no people mention anything about what he has been doing in China for the last two years online.<br />2009 Tom 2.0 Live travels back to China and spends a night in the hospital because the Chinese thought he may have H1NI(it was just a cough)<br />2009 12 Americans arrive to the Workplace of Tom 2.0 Live and use his information he has learned for the last two years and then proceed to get him fired for sending an email that had the word “sex” in it, as one of them found it offensive, all the while Tom 2.0 Live was just a guy all alone in his room typing on a computer.<br />2011 The 44th President of the United States Barack Obama, arrives in Australia, the homeland of Tom 2.0 Live. <br />