Category Archives: _INVESTIGATIONS

Australia To Forcibly Vaccinate Citizens Via Chemtrails

Australia have approved the license application from Big Pharma company PaxVax that will allow them to intentionally release a GMO vaccine consisting of live bacteria into Queensland, via chemtrails. 

The Office of the Gene Technology Regulator (OGTR) says that the vaccine qualifies as a limited and controlled release under section 50A of the Gene Technology Act 2000.

Preventdisease.com reports:

PaxVax is seeking approval to conduct the clinical trial of a genetically modified live bacterial vaccine against cholera.

Once underway the trial is expected to be completed within one year, with trial sites selected from local government areas (LGAs) in Queensland, South Australia, Victoria and Western Australia. PaxVax has proposed a number of control measures they say will restrict the spread and persistence of the GM vaccine and its introduced genetic material, however there is always a possiblity of these restrictions failing and infecting wildlife and ecosystems.

Aerial vaccines have used in the United States directed towards animals by the use of plastic packets dropped by planes or helicopters.Sanofi (who is one of the largest vaccine manufacturers in the world) has subsidiary companies such as Merial Limited who manufacture Raboral, an oral live-virus poisonous to humans yet distributed wildlife in the masses…

Source: Australia To Forcibly Vaccinate Citizens Via Chemtrails – Your News Wire

 

FACING VACCINATION OPPOSITION? THEN JUST SPRAY! | Galactic Connection

When Mr. B.H. shared the following article published in 2016, I had to say “you’re kidding” out loud to my otherwise empty office, for it seems the proverbial “they” have found yet another way around the growing movement to question just why we need all those vaccines: just spray it from airplanes (copy and paste into your browser: http://yournewswire.com/australia-to-forcibly-vaccinate-citizens-via-chemtrails/ ).

Now, I have to admit that while I have not blogged much on this website concerning the subject of chemtrails, and what their ultimate purpose may be, I can say in all honesty that (1) I do believe that the phenomenon is real, and (2) that it represents some sort of covert agenda, or perhaps several agendas, on the part of “them.” The following paragraphs from the article – which I am assuming to be true for the sake of my speculation of the day – provide at least one clue:

In 2006 Michael Greenwood wrote an article for the Yale School of Public Health entitled, “Aerial Spraying Effectively Reduces Incidence of West Nile Virus (WNV) in Humans.” The article stated that the incidence of human West Nile virus cases can be significantly reduced through large scale aerial spraying that targets adult mosquitoes, according to research by the Yale School of Public Health and the California Department of Public Health.

Under the mandate for aerial spraying for specific vectors that pose a threat to human health, aerial vaccines known as DNA Vaccine Enhancements and Recombinant Vaccine against WNV may be tested or used to “protect” the people from vector infection exposures. DNA vaccine enhancements specifically use Epstein-Barr viral capside’s with multi human complement class II activators to neutralize antibodies. The recombinant vaccines against WNV use Rabbit Beta-globulin or the poly (A) signal of the SV40 virus. In early studies of DNA vaccines it was found that the negative result studies would go into the category of future developmental research projects in gene therapy. During the studies of poly (A) signaling of the SV40 for WNV vaccines, it was observed that WNV will lie dormant in individuals who were exposed to chicken pox, thus upon exposure to WNV aerial vaccines the potential for the release of chicken pox virus would cause a greater risk to having adult onset Shingles…

Source: FACING VACCINATION OPPOSITION? THEN JUST SPRAY! | Galactic Connection

Mayan calendar expert says May 24th, 2017 is more significant than December 21st, 2012 | Galactic Connection

mayan2

Recently, The Mind Unleashed interviewed Carl Johan Calleman, one of the world’s foremost experts on the Mayan calendar, to discuss with him the significance of a new cycle that begins on May 24th, 2017.

1.What is your background on the Mayan calendar, for those that don’t know your work? 

My background is in the hard sciences and my PhD is in physical biology and I have lectured at some of the most prestigious scientific institutions in the world. Nonetheless, in 1993 the calling became very strong and I decided to devote myself full time to elucidating the true meaning of the Mayan calendar system in such a way that it became understandable for modern people. I have written six books based on the framework of the Mayan calendar, which have been translated to a total of fourteen languages. I have also worked with Mayan elders to help them bring their message out to the world. 

carl c

2. What was the significance of October 28th, 2011? 

October 28, was a day when all the nine waves influencing our biology and especially mind
shifted and created a new interference pattern (see image below). The importance of this shift
had been predicted in the Tortuguero Monument no 6, which said that Bolon Yokte Kuh, the Mayan god of the nine levels, would appear in his full regalia.
Translated to more modern language this means that for the first time in the history of the universe (including humanity) all waves (the full regalia) were activated and running in parallel. Before March 9, 2011 the Ninth Wave creating unity consciousness had not been activated and it was only after this shift point that all waves became accessible for us to create resonance with. (The ancient Maya talked about such a wave as the Plumed Serpent, an energy bringing civilization). Each wave creates a different kind of filter for the human mind (see below) and so depending on what wave we are in resonance we will perceive the world differently.
We will then in turn project this mind and create an external reality consistent with the perceptions of our mind. If we download a mind of duality we will project this onto the world and create conflicts, but if we download a mind of unity we will create a world of peace. What the Maya calendar ultimately describes and the reason it is prophetic are the time lines of these shifting frames of mind. The Mayan calendar system is quite complex and a very fascinating subject that I encourage people to study. Nonetheless, from the perspective of creating the future of humanity it is really enough to follow the Ninth Wave and be able to discern its effects on our individual lives….
polarities

Source: Mayan calendar expert says May 24th, 2017 is more significant than December 21st, 2012 | Galactic Connection

Proof Of Organised Attacks By Secret Society’s… | Simon Parkes Official Website Current Intel

Proof Of Organised Attacks By Secret Society’s…

Wednesday, May 24, 2017

Proof beyond doubt that the recent attacks have been organised by a secret society obsessed with symbolism and NOT a rag tag “terrorist” group…

Norway attack 22/07/11
Woolwich attack 22/05/13
Brussels 22/03/16
Munich 22/07/16
London 22/03/17
Manchester 22/05/17

It’s also reported that latest attacker was 22 years old – No “ordinary” terror group would strike on the same date of the month again and again – Only occult groups obsessed with ritual.

Source: Proof Of Organised Attacks By Secret Society’s… | Simon Parkes Official Website

Boom! Kim Dot.Com Just Released Seth Rich Docs, Will Testify For Special Council! 

Well, it looks like the Democrats scheme to blame the Russians as the reason that Hillary Clinton lost the election just went up in smoke, as Kim Dot.com just released proof that Seth Rich was the one who leaked the Podesta emails to Wikileaks.

He is willing to come to the US and give testimony if it is required.

Via Kim.com:

I KNOW THAT SETCH RICH WAS INVOLVED IN THE DNC LEAK.

I know this because in late 2014 a person contacted me about helping me to start a branch of the Internet Party in the United States. He called himself Panda. I now know that Panda was Seth Rich.

Panda advised me that he was working on voter analytics tools and other technologies that the Internet Party may find helpful.

I communicated with Panda on a number of topics including corruption and the influence of corporate money in politics.

“He wanted to change that from the inside.”

I was referring to what I knew when I did an interview with Bloomberg in New Zealand in May 2015. In that interview I hinted that Julian Assange and Wikileaks would release information about Hillary Clinton in the upcoming election.

The Rich family has reached out to me to ask that I be sensitive to their loss in my public comments. That request is entirely reasonable.

I have consulted with my lawyers. I accept that my full statement should be provided to the authorities and I am prepared to do that so that there can be a full investigation. My lawyers will speak with the authorities regarding the proper process.

Source: Boom! Kim Dot.Com Just Released Seth Rich Docs, Will Testify For Special Council! | Alternative

Joan’s Notes from David Wilcock Discussion Panel 5-21-17

These ‘Living Stones’ in Romania Grow Over 10 Meters Tall And Are Able To Move, Breathe and Reproduce | Galactic Connection


These odd formations found in a small village in Romania are called Trovants. Their common aspect makes them look like regular rocks, but in reality they are much more special than that.

Believed to have sprung from the bowers of the Earth some 6 million years ago, the Trovants have become notorious for their curious growing ability.

Yes, you heard that well! These stones can grow from the size of a pebble and stretch for more than 10 meters, although this process is extremely lengthy, taking them about 1,000 years for a 4-5 cm deposition.

Trovants are also known to move at an average rate of 2.5 mm over the period of two weeks. While this can be due to an increase in mass on one side that’s leaning all the stone forward, it may very well have some other cryptic explanation.

These unusual rocky formations have cause quite a stir inside the scientific community, and so researchers have ‘dissected ‘ them to try and reach the bottom of this riddle. Unfortunately, they were confronted with another riddle.

Upon opening them up, scientists have discovered circular rings extremely similar to those found on tree stumps. Those rings were then used to determine the age of the Trovants, just like you would do with trees…

Source: These ‘Living Stones’ in Romania Grow Over 10 Meters Tall And Are Able To Move, Breathe and Reproduce | Galactic Connection

Notes from 5-21-17 David Wilcock Disclosure Panel

Benjamin Fulford 5-22-17… “The old guard simply refuses to hand over the financial system so it will have to be replaced”

2017-05-21 Connecting Consciousness – Simon Parkes QA

6 Things You Lose When You Become Spiritually Awakened – Prepare for Change

An awakened mind allows you to show admiration for those who do well and strive to follow in their footsteps. It also helps to remove any malicious or jealousy and appreciate the accomplishments of others.

As we grow, become more aware, and love, our thoughts and actions change as well. This is not only due to our goals changing but the resources we draw on become more productive. As we ‘wake’ to the world as it truly is, the truth of it all changes us from the core outward. We are till human so we still experience and project negativity, but the magnitude and length of time being negative changes.

I still get angry at some fairly dumb things, but where before I would become a ball of rage and self destruction, I accept it as it is and smile to my heart. I thank it for being able to experience an array of emotions and through that love and acceptance, my rage subsides. Through the years of experience and learning, I have come to understand the pitfalls life can trick us into stepping into. Here is a list of some of those emotions and concepts that you will naturally let go of as you reach higher levels of consciousness.

Hatred

I talked on this a little but anger and hate are sadly dominant aspects of our society. Anger is like a fire in our souls, that clouds our eyes with smoke and chokes up true expressions. The feeling from anger is nauseating and entirely destructive. After spending long enough in the presence of love, hatred makes us feel physically ill. The once perceived strength that comes from anger, is seen as one dimensional and unproductive.

Jealousy

Jealousy is a direct descendant of comparative thought. WE look at what we have and compare it to another. We then judge the two parties off superficial elements. As we grow as people and fill our lives with love and works of compassion, we stop worrying about what others have. We acknowledge our own successes and failures as being precious and irreplaceable. This makes our mental and spiritual ‘belongings’ priceless. The joy attached to experiences and loved ones has shown us the flimsiness of the pursuit of physical objects. As we see others with a deeper understanding or a more powerfully expressed form of love, we are glad to have witnessed it. We are filled with joy at the success of others, because everyone deserves to be happy…

Source: 6 Things You Lose When You Become Spiritually Awakened – Prepare for Change

NASA Discovered Proof of Portals and Has Just Sent Four Spacecrafts to Test Them | Galactic Connection

There’s science in science-fiction, and that science is becoming fiction as we speak, and vice-versa. In 1998, data sent by NASA’s Polar spacecraft revealed that portals were opening up all around Earth’s atmosphere, the kind that allows one to travel incommensurable distances in a blink of an eye.

We call them X-points, or electron diffusion regions,” explained plasma physicist Jack Scudder of the University of Iowa. “They’re places where the magnetic field of Earth connects to the magnetic field of the Sun, creating an uninterrupted path leading from our own planet to the Sun’s atmosphere 93 million miles away.”

As unrealistic as this may sound, it is all based on real science. These ‘X-points’ are ripples in space and time that connect all celestial bodies with a magnetic field. They were probably called X-points instead of wormholes to not draw too much attention to them. At the moment, NASA and other space agencies are trying to figure out a way to send material objects through these portals, as only charged particles were seen doing this before.

In fact, energetic particles flowing through these openings are responsible for phenomenons we see on Earth, such as geomagnetic storms, polar auroras, light pillars, and the heating of Earth’s upper atmosphere. In turn, particles from our side of the fence are hurtling through the openings and meeting the Sun…

Source: NASA Discovered Proof of Portals and Has Just Sent Four Spacecrafts to Test Them | Galactic Connection

Notes from David Wilcock’s 5-20-17 talk, by Joan Wheaton

FDA Website: DTap Vaccine Can Cause Autism

The FDA have published conclusive evidence on their website that the DTap vaccine causes autism. According to the FDA’s online Biologics Blood Vaccines document, between pages 6 to 11 [now removed from the website — screenshots included below], a vaccine manufacturer admits on its package insert that their vaccination can cause autism as one of…

via FDA Website: DTap Vaccine Can Cause Autism — Prepare for Change

Wikileaks: CIA Now Controls Your COmputer

dr-william-mount211111111111211A few days ago we discussed the fact that the New Computer Virus taking control of Banks and failing Hospitals was released by Microsoft and the “CURE” for the virus was created even before the Virus was released – forcing you to update into “Windows 11” and their “Smart Cloud.”

Now it has been brought forward – thanks to the Chinese Run Corporation of Wikileaks – that the CIA is now taking control of all computers that run Windows 8-10, 9 was a flop and never released.

Primary CIA Virus is Hera – Running XP through Windows 10
Secondary: Hera for Windows 8-10.

So apparently we have 3 Microsoft/CIA Viruses to worry about:

1) Wannacry
2) AfterMidnight
3) Assassin

This program – unlike any other News Program on the internet – is about solutions.

We state what the news is and then how to protect yourself form this madness…

So here is what you can do to protect yourself.

Continue reading Wikileaks: CIA Now Controls Your COmputer

Notes from David Wilcock’s 5-19-17 morning talk, by Joan Wheaton

#Vault7 ‘Athena’: CIA’s anti-Windows malware ‘better than bombing things’

The latest in WikiLeaks’ series of #Vault7 leaks was released Friday detailing malware that provides remote beacon and loader capabilities on target computers using several Microsoft Windows operating systems. Read Full Article at RT.com

via #Vault7 ‘Athena’: CIA’s anti-Windows malware ‘better than bombing things’ — RT – Daily news

“It’s Much Bigger Than WannaCry”: New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic | Zero Hedge

Another large-scale, stealthy cyberattack is underway on a scale that could dwarf last week’s assault on computers worldwide, a global cybersecurity firm told AFP on Wednesday.

Meet Adylkuzz – the new cyberattack that “is much bigger than WannaCry.”

Instead of completely disabling an infected computer by encrypting data and seeking a ransom payment, Adylkuzz uses the machines it infects to “mine” in a background task a virtual currency, Monero, and transfer the money created to the authors of the virus.

Proofpoint said in a blog that symptoms of the attack include loss of access to shared Windows resources and degradation of PC and server performance, effects which some users may not notice immediately.

“As it is silent and doesn’t trouble the user, the Adylkuzz attack is much more profitable for the cyber criminals. It transforms the infected users into unwitting financial supporters of their attackers,” said Godier.

Proofpoint said it has detected infected machines that have transferred several thousand dollars worth of Monero to the creators of the virus. The firm believes Adylkuzz has been on the loose since at least May 2, and perhaps even since April 24, but due to its stealthy nature was not immediately detected. Proofpoint’s vice president for email products, Robert Holmes, told AFP...

“We don’t know how big it is” but “it’s much bigger than WannaCry”,

“We have seen that before — malwares mining cryptocurrency — but not this scale,” said Holmes.

It uses the hacking tools recently disclosed by the NSA “in a more stealthy manner and for a different purpose.” As InfoRiskToday details…

Source: “It’s Much Bigger Than WannaCry”: New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic | Zero Hedge

The Portal: Disclosure Process

 

There are great changes happening in our Solar System. A vast fleet comprised of many motherships of countless positive cosmic races has reached its final parking position on key resonance points within our Solar System to support the process of full Disclosure.
Some of those ships can be seen clearly on photos which were taken by our team this week with StratoProbe 5 about 17 km (57,000 feet) above the surface:
For the first time in 26,000 years, the Chimera group is lately starting to show signs of worry about the stability of the quarantine status for planet Earth.
This is why they are fortifying their defenses within the Air Force Space Command:

 

Disclosure process is an exponential curve, going slowly at first during the soft Disclosure phase we are experiencing now, but steadily accelerating until we reach the breakthrough at the moment of the Event into full Disclosure.
Many seemingly unrelated initiatives of the surface population are part of the same greater plan of the Light forces (Operation PrisonBreak) to penetrate the quarantine.
Many space program initiatives in the nearspace, in Earth orbit, on Moon and Mars are expected to experience their breakthrough in the next few years…

Source: http://2012portal.blogspot.com.au/2017/05/disclosure-process.html?m=1

Dave Chappelle’s Cousin Says He Was Killed and Cloned – Speaks Out for First Time 

The YouTube channel that conducted the interview with Dave Chappelle’s cousin said they contacted her after seeing her comments on several YouTube videos. She was willing to tell her story but she uses a voice changer because she is afraid for her safety. This is the first time she has spoken out. ​

She was very close with her cousin Dave Chapelle. She tells the story about why he went to Africa…what happened before that, and what happened after.  She says they killed and cloned him not long after he appeared on the Oprah show. They lured him into a meeting with the TV executives and that was the last she ever heard from him.

The next time she saw him on TV she knew immediately that was not her cousin….whom she’d known since they were born. It looked, acted and sounded nothing like him.

And in order to avoid the questions his family would have when they sent a clone home instead of him…she says they killed and cloned his entire immediate family. His wife, his kids and his mother who were all living on the farm with him.

This is a fascinating interview. And it makes sense. Chapelle was trying to get away from them. He was speaking out. Then suddenly like someone snapped their fingers he’s back in the game.

And don’t forget….they kill these ppl first. If you think the idea that they clone ppl and replace them is ridiculous then you are WAY behind the curve and you need to do some research.

The original video interview with Chapelles cousin was posted a few weeks ago by the JT Anwom youtube channel on April 26th, 2017. And it was quickly taken down by YouTube. This was their description on the original video before it was taken down.

“Had to re-upload this because YouTube took the sound off the first video for some odd reason, so we’re re-uploading this. We saw numerous comments from a woman named #1 Original Negan Girl on YouTube, who made several comments under multiple videos regarding Dave Chappelle. Comments stating how Dave was her cousin…on videos that were done by those such as The Vigilant Christian and others. So upon us seeing her comments everywhere on YouTube, we decided to contact her to ask her to share her facts about what she knows regarding Dave, and she said she would if we made her voice anonymous, for fear of her safety, which we did. So this is her story.”

(It was removed by YouTube but I finally found the video online and re-uploaded it. It may get taken down again so download it if you can.) Here’s the interview:…

images (3)

Source: Dave Chappelle’s Cousin Says He Was Killed and Cloned – Speaks Out for First Time | Celebrities

Two Historic Media Events Created to Hide Top Secret Missions — The Event Chronicle

 

Think you know history? What about these major events, contrived to cover for top secret operations.

Ready for the real story? Everything from scientific research and oil and gas drilling can and have been used as a cover for clandestine exploration of the deep sea and underground environments.

The discovery of the Titanic wreckage and the Glomar Explorer are two such examples, remarkable because of the high profile press celebration of the achievements operating as cover for a larger secret. So what really goes on?

via Two Historic Media Events Created to Hide Top Secret Missions — The Event Chronicle

Cyber attacks are the perfect trigger for a stock market crash 

Image result for wannacry

The world has been stunned over the past few days by the advent of “Ransomware;” the use of sophisticated cyber attacks on vital systems in order to (supposedly) extort capital from target businesses and institutions. I am always highly suspicious whenever a large scale cyber incident occurs, primarily because the manner in which these events are explained to the public does not begin to cover certain important realities. For example, the mainstream media rarely if ever discusses the fact that many digital systems are deliberately designed to be vulnerable.

Software and internet corporate monoliths have long been cooperating with the NSA through programs like PRISM to provide government agencies backdoor access to computer systems worldwide. Edward Snowden vindicated numerous “conspiracy theorists” in 2013 with his comprehensive data dumps, exposing collusion between corporations and the NSA including Microsoft, Skype, Apple, Google, Facebook and Yahoo. And make no mistake, nothing has changed since then.

The level of collusion between major software developers and the establishment might be shocking to some, but it was rather well known to alternative analysts and researchers. The use of legislation like the Foreign Intelligence Surveillance Act (FISA) to skirt Constitutional protections within the 4th Amendment has been open policy for quite some time. It only made sense that government agencies would use it as a rationale to develop vast protocols for invading people’s privacy, including American citizens.

The issue is, in the process of engineering software and networks with Swiss cheese-like security in the name of “national security,” such exploits make vast spreads of infrastructure vulnerable to attack. I think it likely this was the intention all along. That is to say, the NSA and other agencies have created a rather perfect breeding ground for false flag attacks, real attacks and general crisis…

Source: Cyber attacks are the perfect trigger for a stock market crash | Tea Party

Who Is Behind the Cyber Attacks and Chaos….“Operation Talpiot” and “The Technion” ? 

by Brendon O’Connell

IN THIS BLOG POST YOU WILL LEARN:

1) How Israel planned over 40 years ago to dominate the high technology communications sector.

2) How Israel trained officers from Israeli Military Intelligence to become private entrepreneurs. Now they dominate both the public and private high technology sector.

3) How this plan was titled “Operation Talpiot”.

4) How Israel dominates databases of all kinds from banking to medical, to policing, to NSA sub contractors, to government encrypted communications, to video surveillance systems for Class A critical infrastructure.

5) How Israel and Jewish Power have a tradition of the Sayanim or Helper who assist Israeli Intelligence where ever these Jews live and work, anywhere in the world, giving access to all sorts of public and private sensitive locations.

6) How Israel is setting up high technology co-operation schools under The Technion – their premiere research facility. This co-operation is used to infiltrate into the country of interest.

“INFORMATION IS POWER”

1) THE ISRAELI STATE HAS THE DEEPEST ACCESS TO ALL PRIVATE AND GOVERNMENT COMMUNICATIONS.

2) AUSTRALIA IS BUYING UP COMPROMISED ISRAELI MILITARY HIGH TECHNOLOGY COMMUNICATIONS EQUIPMENT.

3) THE ISRAELI STATE IS THE MOST FOUL, RACIST AND SUPREMACIST STATE EVER ALLOWED TO EXIST – WHERE IS THE MEDIA?…

Source: Who Is Behind the Cyber Attacks and Chaos….“Operation Talpiot” and “The Technion” ? | Blogging/Citizen Journalism

Mysterious flashes of light from Earth captured by NASA satellite | Galactic Connection

WASHINGTON, DC — One million miles from Earth, a NASA camera is capturing unexpected flashes of light reflecting off our planet.

The homeward-facing instrument on NOAA’s Deep Space Climate Observatory, or DSCOVR, launched in 2015, caught hundreds of these flashes over the span of a year. NASA’s Earth Polychromatic Imaging Camera (EPIC) instrument aboard DSCOVR is taking almost-hourly images of the sunlit planet from its spot between Earth and the sun. In a new study, scientists deciphered the tiny cause to the big reflections: high-altitude, horizontally oriented ice crystals.

“The source of the flashes is definitely not on the ground,” said Alexander Marshak, DSCOVR deputy project scientist at NASA’s Goddard Space Flight Center in Greenbelt, Maryland, and lead author of the new study in Geophysical Research Letters, a journal of the American Geophysical Union. “It’s definitely ice, and most likely solar reflection off of horizontally oriented particles.”…

Source: Mysterious flashes of light from Earth captured by NASA satellite | Galactic Connection

Hackers Unleash Second NSA-Developed Cyber-Weapon On Dark Web | Zero Hedge

While a second variant of the WannaCry(pt) ransomware (based on NSA’s EternalBlue exploit) was spreading across the globe yesterday, The FT reports criminal hacking groups have repurposed a second classified cyber weapon stolen from US spies and have made it available on the so-called dark web.

On Monday, the WannaCry attack, which hit 370,000 computers across 150 countries, appeared to slow. Europol, the European police agency, said the spread of the virus had stalled in Europe. But while infection rates have slowed, a Europol spokeswoman warned, “we do not think this is the end of the crisis. The hackers have already evolved the malware, and will probably continue to do so.”

Notably as Europe woke up (and US opened), the infection rate started to rise once again…

But as The FT reports, intelligence and law-enforcement officials said they fear WannaCry may foreshadow a wave of similarly damaging attacks, as criminals and others race to make use of digital weapons that for years were only available to the most technologically sophisticated nation states.

At least a dozen other NSA tools are currently being discussed and worked on as the basis of potential new cyber weapons on hacking forums on the dark web, parts of the internet not accessible via normal search engines.

The hacking tool, developed by the US National Security Agency and called EsteemAudit, has been adapted and is now available for criminal use, according to security analysts.

As with the NSA’s EternalBlue, the tool on which WannaCry was based, EsteemAudit exploits a vulnerability in older versions of Microsoft’s Windows software in the way in which networked machines communicate with each other…

Source: Hackers Unleash Second NSA-Developed Cyber-Weapon On Dark Web | Zero Hedge