SlideShare a Scribd company logo
1 of 3
The Tom 2.0 Live History and Background of the Secret Service<br />1865 The Secret Service Division was created on July 5, 1865 in Washington, D.C., to suppress counterfeit currency. Chief William P. Wood was sworn in by Secretary of the Treasury Hugh McCulloch. 1867 <br />1867 Secret Service responsibilities were broadened to include quot;
detecting persons perpetrating frauds against the government.quot;
 This appropriation resulted in investigations into the Ku Klux Klan, non-conforming distillers, smugglers, mail robbers, land frauds, and a number of other infractions against the federal laws. 1870 <br />1870 Secret Service headquarters relocated to New York City. 1874 <br />1874 Secret Service headquarters returned to Washington, D.C. 1875 <br />1875 The first commission book and a new badge were issued to operatives. 1877 <br />1877 Congress passed an Act prohibiting the counterfeiting of any coin, gold or silver bar. 1883 <br />1883 Secret Service was officially acknowledged as a distinct organization within the Treasury Department. 1894 <br />1894 The Secret Service began informal part-time protection of President Cleveland. 1895 <br />1895 Congress passed corrective legislation for the counterfeiting or possession of counterfeit stamps. 1901 <br />1901 Congress informally requested Secret Service Presidential protection following the assassination of President William McKinley. 1902 <br />1902 Secret Service assumed full-time responsibility for protection of the President. Two operatives were assigned full time to the White House Detail. 1906 <br />1907 Congress passed Sundry Civil Expenses Act for 1907 that provided funds for Presidential protection by the Secret Service. Secret Service operatives began to investigate the western land frauds. The Service's investigations returned millions of acres of land to the government. 1908 <br />1908 Secret Service began protecting the president-elect. Also, President Roosevelt transferred Secret Service agents to the Department of Justice. They formed the nucleus of what is now the Federal Bureau of Investigation (FBI).   EXPANSION 1913 <br />1913 Congress authorized permanent protection of the president and the statutory authorization for president-elect protection. 1915 <br />1915 President Wilson directed the Secretary of the Treasury to have the Secret Service investigate espionage in the United States. 1917 <br />1917 Congress authorized permanent protection of the president's immediate family and made quot;
threatsquot;
 directed toward the president a federal violation. 1922 <br />1922 The White House Police Force created on October 1, 1922, at the request of President Harding. 1930 <br />1930 The White House Police Force was placed under the supervision of the Secret Service.<br />1951 Congress enacted legislation that permanently authorized Secret Service protection of the president, his immediate family, the president-elect, and the vice president, if he wishes. (Public Law - 82-79).<br />1970 The White House Police Force renamed the Executive Protective Service and increased its responsibilities to include the protection of diplomatic missions in the Washington, D.C., area. (Public Law 91-217).<br />1977 The Executive Protective Service was officially renamed the Secret Service Uniformed Division on November 15, 1977.<br />1994 The passage of the 1994 Crime Bill Public Law 103-322, in part, revised Title 18 USC Section 470, providing that any person manufacturing, trafficking in, or possessing counterfeit U.S. currency abroad may be prosecuted as if the act occurred within the United States.<br />2000. Presidential Threat Protection Act (Public Law 106-544) was passed, which in part, authorized the Secret Service to participate in the planning, coordination, and implementation of security operations at special events of national significance (quot;
National Special Security Eventquot;
), as determined by the President.<br />2001. The Patriot Act (Public Law 107-56) increased the Secret Service's role in investigating fraud and related activity in connections with computers. In addition it authorized the Director of the Secret Service to establish nationwide electronic crimes taskforces to assist the law enforcement, private sector and academia in detecting and suppressing computer-based crime; increased the statutory penalties for the manufacturing, possession, dealing and passing of counterfeit U.S. or foreign obligations; and allowed enforcement action to be taken to protect our financial payment systems while combating transnational financial crimes directed by terrorists or other criminals.<br />2002 The Department of Homeland Security was established with the passage of (Public Law 107-296) which in part, transfered the United States Secret Service from the Department of the Treasury, to the new department effective March 1, 2003.<br />2007 Protection began for presidential candidate Illinois Senator Barack Obama in May, the earliest initiation of Secret Service protection for any candidate in history. Presidential candidate New York Senator Hillary Clinton already received protection before she entered the race due to her status as former first lady.<br />2007 The First of the Tom 2.0 Live Messages where intercepted by the Secret Service, The First being uploaded to Youtube for Americans to see HERE.<br />2007 (Septemeber) Tom 2.0 Live Travels to China and is surprised to find he can still access his MySpace.com Profiles and sends more messages to The White House<br />2008 Tom 2.0 Live travels back to Australia and meets with no one from the Secret Service or The White House in relation to his TOP SECRET messages sent from within China.<br />2008 Tom 2.0 Live is in Australia for the Beijing 2008 Olympics as the Chinese felt he was too much of a Security risk to have in the country at the time.<br />2008 Secret Broadcast are made from within China using a USTREAM account here to the American Public pointing out that not all Chinese Internet is Blocked<br />2008 The Secret Service marked five years under the Department of Homeland Security. Since 2003, the Secret Service made nearly 29,000 criminal arrests for counterfeiting, cyber investigations and other financial crimes, 98% of which resulted in convictions, and seized more than $295 million in counterfeit currency. The Secret Service investigated and closed financial crimes cases where actual loss amounted to $3.7 billion and prevented a potential loss of more than $12 billion.<br />2008 Tom 2.0 Live travels back to China on 5th June 2008 he is all alone at a computer on his birthday as he never told any people when his birthday was it was displayed over the internet on his Accounts. Still no Americans could find him.<br />2009 The Security Time Checks and Alert and Readiness of The White House where conducted by Tom 2.0 Live and for transparency have been uploaded to the Internet for all Americans to see.<br />2009 The Tom 2.0 Live Digital Network of Communication and Recording went online for the first time in History and the White House was informed.<br />2009 Tom 2.0 Live travels back to Australia for his Sister’s Wedding, no Secret Service are there to meet him, no Americans from MySpace.com and no people mention anything about what he has been doing in China for the last two years online.<br />2009 Tom 2.0 Live travels back to China and spends a night in the hospital because the Chinese thought he may have H1NI(it was just a cough)<br />2009 12 Americans arrive to the Workplace of Tom 2.0 Live and use his information he has learned for the last two years and then proceed to get him fired for sending an email that had the word “sex” in it, as one of them found it offensive, all the while Tom 2.0 Live was just a guy all alone in his room typing on a computer.<br />2011 The 44th President of the United States Barack Obama, arrives in Australia, the homeland of Tom 2.0 Live. <br />
The Tom 2 0 Live History Of The Secret Service   Option A
The Tom 2 0 Live History Of The Secret Service   Option A

More Related Content

Recently uploaded

Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendExperience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendFabwelt
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 

Recently uploaded (10)

Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendExperience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming Trend
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 

Featured

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

The Tom 2 0 Live History Of The Secret Service Option A

  • 1. The Tom 2.0 Live History and Background of the Secret Service<br />1865 The Secret Service Division was created on July 5, 1865 in Washington, D.C., to suppress counterfeit currency. Chief William P. Wood was sworn in by Secretary of the Treasury Hugh McCulloch. 1867 <br />1867 Secret Service responsibilities were broadened to include quot; detecting persons perpetrating frauds against the government.quot; This appropriation resulted in investigations into the Ku Klux Klan, non-conforming distillers, smugglers, mail robbers, land frauds, and a number of other infractions against the federal laws. 1870 <br />1870 Secret Service headquarters relocated to New York City. 1874 <br />1874 Secret Service headquarters returned to Washington, D.C. 1875 <br />1875 The first commission book and a new badge were issued to operatives. 1877 <br />1877 Congress passed an Act prohibiting the counterfeiting of any coin, gold or silver bar. 1883 <br />1883 Secret Service was officially acknowledged as a distinct organization within the Treasury Department. 1894 <br />1894 The Secret Service began informal part-time protection of President Cleveland. 1895 <br />1895 Congress passed corrective legislation for the counterfeiting or possession of counterfeit stamps. 1901 <br />1901 Congress informally requested Secret Service Presidential protection following the assassination of President William McKinley. 1902 <br />1902 Secret Service assumed full-time responsibility for protection of the President. Two operatives were assigned full time to the White House Detail. 1906 <br />1907 Congress passed Sundry Civil Expenses Act for 1907 that provided funds for Presidential protection by the Secret Service. Secret Service operatives began to investigate the western land frauds. The Service's investigations returned millions of acres of land to the government. 1908 <br />1908 Secret Service began protecting the president-elect. Also, President Roosevelt transferred Secret Service agents to the Department of Justice. They formed the nucleus of what is now the Federal Bureau of Investigation (FBI).   EXPANSION 1913 <br />1913 Congress authorized permanent protection of the president and the statutory authorization for president-elect protection. 1915 <br />1915 President Wilson directed the Secretary of the Treasury to have the Secret Service investigate espionage in the United States. 1917 <br />1917 Congress authorized permanent protection of the president's immediate family and made quot; threatsquot; directed toward the president a federal violation. 1922 <br />1922 The White House Police Force created on October 1, 1922, at the request of President Harding. 1930 <br />1930 The White House Police Force was placed under the supervision of the Secret Service.<br />1951 Congress enacted legislation that permanently authorized Secret Service protection of the president, his immediate family, the president-elect, and the vice president, if he wishes. (Public Law - 82-79).<br />1970 The White House Police Force renamed the Executive Protective Service and increased its responsibilities to include the protection of diplomatic missions in the Washington, D.C., area. (Public Law 91-217).<br />1977 The Executive Protective Service was officially renamed the Secret Service Uniformed Division on November 15, 1977.<br />1994 The passage of the 1994 Crime Bill Public Law 103-322, in part, revised Title 18 USC Section 470, providing that any person manufacturing, trafficking in, or possessing counterfeit U.S. currency abroad may be prosecuted as if the act occurred within the United States.<br />2000. Presidential Threat Protection Act (Public Law 106-544) was passed, which in part, authorized the Secret Service to participate in the planning, coordination, and implementation of security operations at special events of national significance (quot; National Special Security Eventquot; ), as determined by the President.<br />2001. The Patriot Act (Public Law 107-56) increased the Secret Service's role in investigating fraud and related activity in connections with computers. In addition it authorized the Director of the Secret Service to establish nationwide electronic crimes taskforces to assist the law enforcement, private sector and academia in detecting and suppressing computer-based crime; increased the statutory penalties for the manufacturing, possession, dealing and passing of counterfeit U.S. or foreign obligations; and allowed enforcement action to be taken to protect our financial payment systems while combating transnational financial crimes directed by terrorists or other criminals.<br />2002 The Department of Homeland Security was established with the passage of (Public Law 107-296) which in part, transfered the United States Secret Service from the Department of the Treasury, to the new department effective March 1, 2003.<br />2007 Protection began for presidential candidate Illinois Senator Barack Obama in May, the earliest initiation of Secret Service protection for any candidate in history. Presidential candidate New York Senator Hillary Clinton already received protection before she entered the race due to her status as former first lady.<br />2007 The First of the Tom 2.0 Live Messages where intercepted by the Secret Service, The First being uploaded to Youtube for Americans to see HERE.<br />2007 (Septemeber) Tom 2.0 Live Travels to China and is surprised to find he can still access his MySpace.com Profiles and sends more messages to The White House<br />2008 Tom 2.0 Live travels back to Australia and meets with no one from the Secret Service or The White House in relation to his TOP SECRET messages sent from within China.<br />2008 Tom 2.0 Live is in Australia for the Beijing 2008 Olympics as the Chinese felt he was too much of a Security risk to have in the country at the time.<br />2008 Secret Broadcast are made from within China using a USTREAM account here to the American Public pointing out that not all Chinese Internet is Blocked<br />2008 The Secret Service marked five years under the Department of Homeland Security. Since 2003, the Secret Service made nearly 29,000 criminal arrests for counterfeiting, cyber investigations and other financial crimes, 98% of which resulted in convictions, and seized more than $295 million in counterfeit currency. The Secret Service investigated and closed financial crimes cases where actual loss amounted to $3.7 billion and prevented a potential loss of more than $12 billion.<br />2008 Tom 2.0 Live travels back to China on 5th June 2008 he is all alone at a computer on his birthday as he never told any people when his birthday was it was displayed over the internet on his Accounts. Still no Americans could find him.<br />2009 The Security Time Checks and Alert and Readiness of The White House where conducted by Tom 2.0 Live and for transparency have been uploaded to the Internet for all Americans to see.<br />2009 The Tom 2.0 Live Digital Network of Communication and Recording went online for the first time in History and the White House was informed.<br />2009 Tom 2.0 Live travels back to Australia for his Sister’s Wedding, no Secret Service are there to meet him, no Americans from MySpace.com and no people mention anything about what he has been doing in China for the last two years online.<br />2009 Tom 2.0 Live travels back to China and spends a night in the hospital because the Chinese thought he may have H1NI(it was just a cough)<br />2009 12 Americans arrive to the Workplace of Tom 2.0 Live and use his information he has learned for the last two years and then proceed to get him fired for sending an email that had the word “sex” in it, as one of them found it offensive, all the while Tom 2.0 Live was just a guy all alone in his room typing on a computer.<br />2011 The 44th President of the United States Barack Obama, arrives in Australia, the homeland of Tom 2.0 Live. <br />