Category Archives: WARFARE

Hurricane Harvey Likely To Destroy More Cars Than Katrina: “This Is Bad; Real Bad”

Hurricane Harvey’s historic flooding in Texas is set to wreak havoc on the auto industry and its insurers with analysts now predicting the storm could damage more vehicles than Hurricane Katrina…

Source: http://ift.tt/2x1tuG5

Hurrican Harvey – Be Ready

Hurricane Harvey appeared out of no where – in a matter of 12 hours the worst Hurricane in recorded history just appeared out of nowhere…

Source: http://ift.tt/2xJU7MG

Ritualistic Astrology Used in False Flag Hurricane Harvey?

All data is freely available to the ALL, as an inherent inalienable right of consciousness and existence, for the use of any being in creation who seek to know and use it in sacred trust with the Creator. No Claim of Ownership is made by SITS, for any data presented on this page or elsewhere…

Source: http://ift.tt/2xJKgGy

Hurricane Havey – Elites Have Done It Again

As you hear this Hurricane Harvey is wreaking Havoc on the Southern Coast of Texas. Suddenly – out of nowhere – it just appeared … but why?..

Source: http://ift.tt/2vxxMS0

FEMA: “We’re Going To Be There For Years” As Trump Visits Texas On Tuesday

In response to the historic flooding in Texas, the head of the Federal Emergency Management Agency (i.e. FEMA) was quoted by CNN saying that his agency is gearing up for a years-long effort to help the recovery from the damage wrought by Hurricane Harvey…

Source: http://ift.tt/2vB0dNN

Shocking Drone Footage Shows Harvey’s “Unprecedented” Devastation, “No Parallel To Any Rainstorm In US History”

Based on the number of people affected, amount of water involved, and other factors, meteorologists have warned, there may be no parallel available to any other rainstorm in U.S…

Source: http://ift.tt/2gibtgf

High level weirdness in US as Khazarian control matrix crumbles

People who are aware are noticing very weird stuff going on with the world information grid -especially inside the Anglo Saxon world- as contradictions and bizarre events multiply. These are all signs of a collapsing power matrix; the sort of thing seen around the time of the fall of the USSR…

Source: http://ift.tt/2wLlqcX
br>

High level weirdness in US as Khazarian control matrix crumbles

People who are aware are noticing very weird stuff going on with the world information grid -especially inside the Anglo Saxon world- as contradictions and bizarre events multiply. These are all signs of a collapsing power matrix; the sort of thing seen around the time of the fall of the USSR…

Source: http://ift.tt/2wLlqcX
br>

NASA Images Reveal Geoengineering Agenda — Climate Engineering Cover-Up: Ship Tracks And Jet Spraying

(Dane Wigington) NASA tells us that the shockingly visible and very extensive “tracks” (or trails) being witnessed on satellite imagery over oceans (like the ones shown below) are ALL the result of pollution being produced by ships, which is in turn creating “clouds”.

Source: http://ift.tt/2ih6DAn

DC Clowns Threaten 3 Presidents

In several instances they have now openly threatened the President – Thus violating USC 18 and committing Open Treason. First – CNN aired a Pre-Recorded TV show where a man lurched forward and stated the CIA Operatives in Syria are planning to take out the President when they get home.

Source: http://ift.tt/2uLGI5T

It’s Here – Geoengineering Now Normalized as Scientists Spray Chemicals to Dim the Sun, Soak Up CO2

(Claire Bernish) Scientists plan to use geoengineering — capturing carbon from the air, and spraying aerosols to dim sunlight — to stave off theorized global warming…

Source: http://ift.tt/2w4GVSz

Blatant And Inarguable Geoengineering Jet Spraying Captured On Film

The past propensity of populations to deny the ongoing climate engineering atrocities is finally breaking down…

Source: http://ift.tt/2u1mQ2i

#Vault7: CIA’s ‘Pandemic’ turns file servers into ‘Patient Zero’ | Galactic Connection

The latest WikiLeaks ‘Vault7’ release details an alleged CIA project allowing the spy agency to give file servers the capability to infect machines which access them remotely.

‘Pandemic’ reveals the role of a persistent implant for Microsoft Windows file servers, accessed by remote machines to run programs, according to a statement from WikiLeaks.

The project acts as a ‘Patient Zero’ – a term used to describe the first identified carrier of a communicable disease during an outbreak.

‘Pandemic’ disguises itself on the infected source machine where the targeted files remain unchanged.

It’s modified when in transit from the source file server to the remote machine. When executed on the new machine ‘Pandemic’ will install the program, an iteration of which will now contain modified code.

‘Pandemic’ can replace up to 20 programs, with a maximum size of 800MB.

According to WikiLeaks “a single computer on a local network with shared drives that’s infected with the ‘Pandemic’ implant will act like a ‘Patient Zero’ in the spread of a disease.” 

The latest release, which consists of five files, does not make clear if the infected machines become new pandemic servers, although WikiLeaks claims this is technically feasible.

According to the ‘Pandemic’ documentation its installation takes between 10 to 15 seconds.

The release is the latest in WikiLeaks’ ‘Vault7’ series, detailing hacking techniques allegedly sourced from within the CIA.

Previous releases have revealed techniques used to weaponize mobile phones, conduct surveillance via Smart TVs and load and execute malware on a target machine.

Source: #Vault7: CIA’s ‘Pandemic’ turns file servers into ‘Patient Zero’ | Galactic Connection

Wolf Spirit Radio Attack. | Simon Parkes Official Website Current Intel

Wolf Spirit Radio Attack.

Monday, June 5, 2017

It appears that the website Wolf Spirit Radio, where I do my show from has been targeted and hacked – It will be posted on YouTube very soon.

Source: Wolf Spirit Radio Attack. | Simon Parkes Official Website

Devastating Global ‘ExplodingCan’ Cyber Attack Is Imminent, Warns Experts

View on YouTube Devastating Global ‘ExplodingCan’ Cyber Attack Is Imminent, Warns Experts
Experts have warned that a devastating global cyber attack is imminent.
The hack, called ‘ExplodingCan’, targets computers running on Microsoft Windows 2003, which means that it could be used to attack 375,000 computers worldwide.
This puts it in the same risk category as last month’s WannaCry ransomware attack which caused mayhem around the world, crippling vital servers such as those used by the NHS.

Read more: http://ift.tt/2qQ09IN
Follow us: @MailOnline on Twitter | DailyMail on Facebook

Your Support of Independent Media Is Appreciated:
http://ift.tt/2oZLHxr

Official Gear- http://ift.tt/2roGnqI

http://ift.tt/1hNd0US

http://ift.tt/2r1spsy

My Other Youtube Channel- https://www.youtube.com/Dahboo777

https://vid.me/DAHBOO7

http://ift.tt/1hNd0UR

http://ift.tt/1UeAg0I

B Rich:

https://www.youtube.com/c/BRichOfficial

Erick M:

https://www.youtube.com/channel/UCcwB6XtfJtyWW4DXKoZVn5A

ToBeFree:

https://www.youtube.com/channel/UCvdTd5-p_sBE8oTjUOqPpPg

EnterThe5t4rz:

https://www.youtube.com/user/Enterthe5t4rz

CIA Agents Caught Red Handed Trolling Alternative Media Sites | Galactic Connection

The CIA have expanded their program that facilitates fake propaganda stories by using agents to troll internet forums, social media and alternative website in a huge attack on Alternative Media.

The expansion of Operation Mockingbird sees CIA agents use fake user accounts on various internet forums and social channels, arguing with real users in an attempt to subvert genuine communication.

Americanintelligencereport.com reports: According to RT news, agents have up to “10 fake shill accounts” used to troll and create the illusion of having a genuine network of friends.

“They will defend current administration decisions with a relentless irrational stubbornness that one can only be paid to do.

Are you chatting with a CIA Agent on-line? It’s possible you may already have.

Abby Martin, from RT’s “Breaking the Set,” reported on an up to date Operation Mockingbird with the sole purpose of misleading the public on-line.

In the congressional hearing from 1976 (below) listen to how many agents are in the media to write false stories.

According to the Congress report published in 1976…

https://youtu.be/fQl9H-gi9NEhttps://youtu.be/fQl9H-gi9NE

Source: CIA Agents Caught Red Handed Trolling Alternative Media Sites | Galactic Connection

Wikileaks: CIA Now Controls Your COmputer

dr-william-mount211111111111211A few days ago we discussed the fact that the New Computer Virus taking control of Banks and failing Hospitals was released by Microsoft and the “CURE” for the virus was created even before the Virus was released – forcing you to update into “Windows 11” and their “Smart Cloud.”

Now it has been brought forward – thanks to the Chinese Run Corporation of Wikileaks – that the CIA is now taking control of all computers that run Windows 8-10, 9 was a flop and never released.

Primary CIA Virus is Hera – Running XP through Windows 10
Secondary: Hera for Windows 8-10.

So apparently we have 3 Microsoft/CIA Viruses to worry about:

1) Wannacry
2) AfterMidnight
3) Assassin

This program – unlike any other News Program on the internet – is about solutions.

We state what the news is and then how to protect yourself form this madness…

So here is what you can do to protect yourself.

Continue reading Wikileaks: CIA Now Controls Your COmputer

#Vault7 ‘Athena’: CIA’s anti-Windows malware ‘better than bombing things’

The latest in WikiLeaks’ series of #Vault7 leaks was released Friday detailing malware that provides remote beacon and loader capabilities on target computers using several Microsoft Windows operating systems. Read Full Article at RT.com

via #Vault7 ‘Athena’: CIA’s anti-Windows malware ‘better than bombing things’ — RT – Daily news

“It’s Much Bigger Than WannaCry”: New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic | Zero Hedge

Another large-scale, stealthy cyberattack is underway on a scale that could dwarf last week’s assault on computers worldwide, a global cybersecurity firm told AFP on Wednesday.

Meet Adylkuzz – the new cyberattack that “is much bigger than WannaCry.”

Instead of completely disabling an infected computer by encrypting data and seeking a ransom payment, Adylkuzz uses the machines it infects to “mine” in a background task a virtual currency, Monero, and transfer the money created to the authors of the virus.

Proofpoint said in a blog that symptoms of the attack include loss of access to shared Windows resources and degradation of PC and server performance, effects which some users may not notice immediately.

“As it is silent and doesn’t trouble the user, the Adylkuzz attack is much more profitable for the cyber criminals. It transforms the infected users into unwitting financial supporters of their attackers,” said Godier.

Proofpoint said it has detected infected machines that have transferred several thousand dollars worth of Monero to the creators of the virus. The firm believes Adylkuzz has been on the loose since at least May 2, and perhaps even since April 24, but due to its stealthy nature was not immediately detected. Proofpoint’s vice president for email products, Robert Holmes, told AFP...

“We don’t know how big it is” but “it’s much bigger than WannaCry”,

“We have seen that before — malwares mining cryptocurrency — but not this scale,” said Holmes.

It uses the hacking tools recently disclosed by the NSA “in a more stealthy manner and for a different purpose.” As InfoRiskToday details…

Source: “It’s Much Bigger Than WannaCry”: New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic | Zero Hedge

Cyber attacks are the perfect trigger for a stock market crash 

Image result for wannacry

The world has been stunned over the past few days by the advent of “Ransomware;” the use of sophisticated cyber attacks on vital systems in order to (supposedly) extort capital from target businesses and institutions. I am always highly suspicious whenever a large scale cyber incident occurs, primarily because the manner in which these events are explained to the public does not begin to cover certain important realities. For example, the mainstream media rarely if ever discusses the fact that many digital systems are deliberately designed to be vulnerable.

Software and internet corporate monoliths have long been cooperating with the NSA through programs like PRISM to provide government agencies backdoor access to computer systems worldwide. Edward Snowden vindicated numerous “conspiracy theorists” in 2013 with his comprehensive data dumps, exposing collusion between corporations and the NSA including Microsoft, Skype, Apple, Google, Facebook and Yahoo. And make no mistake, nothing has changed since then.

The level of collusion between major software developers and the establishment might be shocking to some, but it was rather well known to alternative analysts and researchers. The use of legislation like the Foreign Intelligence Surveillance Act (FISA) to skirt Constitutional protections within the 4th Amendment has been open policy for quite some time. It only made sense that government agencies would use it as a rationale to develop vast protocols for invading people’s privacy, including American citizens.

The issue is, in the process of engineering software and networks with Swiss cheese-like security in the name of “national security,” such exploits make vast spreads of infrastructure vulnerable to attack. I think it likely this was the intention all along. That is to say, the NSA and other agencies have created a rather perfect breeding ground for false flag attacks, real attacks and general crisis…

Source: Cyber attacks are the perfect trigger for a stock market crash | Tea Party

Who Is Behind the Cyber Attacks and Chaos….“Operation Talpiot” and “The Technion” ? 

by Brendon O’Connell

IN THIS BLOG POST YOU WILL LEARN:

1) How Israel planned over 40 years ago to dominate the high technology communications sector.

2) How Israel trained officers from Israeli Military Intelligence to become private entrepreneurs. Now they dominate both the public and private high technology sector.

3) How this plan was titled “Operation Talpiot”.

4) How Israel dominates databases of all kinds from banking to medical, to policing, to NSA sub contractors, to government encrypted communications, to video surveillance systems for Class A critical infrastructure.

5) How Israel and Jewish Power have a tradition of the Sayanim or Helper who assist Israeli Intelligence where ever these Jews live and work, anywhere in the world, giving access to all sorts of public and private sensitive locations.

6) How Israel is setting up high technology co-operation schools under The Technion – their premiere research facility. This co-operation is used to infiltrate into the country of interest.

“INFORMATION IS POWER”

1) THE ISRAELI STATE HAS THE DEEPEST ACCESS TO ALL PRIVATE AND GOVERNMENT COMMUNICATIONS.

2) AUSTRALIA IS BUYING UP COMPROMISED ISRAELI MILITARY HIGH TECHNOLOGY COMMUNICATIONS EQUIPMENT.

3) THE ISRAELI STATE IS THE MOST FOUL, RACIST AND SUPREMACIST STATE EVER ALLOWED TO EXIST – WHERE IS THE MEDIA?…

https://www.youtube.com/watch?v=uiuK1m9Au-k

https://www.youtube.com/watch?v=ugMpdPhLwWc

Source: Who Is Behind the Cyber Attacks and Chaos….“Operation Talpiot” and “The Technion” ? | Blogging/Citizen Journalism

Hackers Unleash Second NSA-Developed Cyber-Weapon On Dark Web | Zero Hedge

While a second variant of the WannaCry(pt) ransomware (based on NSA’s EternalBlue exploit) was spreading across the globe yesterday, The FT reports criminal hacking groups have repurposed a second classified cyber weapon stolen from US spies and have made it available on the so-called dark web.

On Monday, the WannaCry attack, which hit 370,000 computers across 150 countries, appeared to slow. Europol, the European police agency, said the spread of the virus had stalled in Europe. But while infection rates have slowed, a Europol spokeswoman warned, “we do not think this is the end of the crisis. The hackers have already evolved the malware, and will probably continue to do so.”

Notably as Europe woke up (and US opened), the infection rate started to rise once again…

But as The FT reports, intelligence and law-enforcement officials said they fear WannaCry may foreshadow a wave of similarly damaging attacks, as criminals and others race to make use of digital weapons that for years were only available to the most technologically sophisticated nation states.

At least a dozen other NSA tools are currently being discussed and worked on as the basis of potential new cyber weapons on hacking forums on the dark web, parts of the internet not accessible via normal search engines.

The hacking tool, developed by the US National Security Agency and called EsteemAudit, has been adapted and is now available for criminal use, according to security analysts.

As with the NSA’s EternalBlue, the tool on which WannaCry was based, EsteemAudit exploits a vulnerability in older versions of Microsoft’s Windows software in the way in which networked machines communicate with each other…

Source: Hackers Unleash Second NSA-Developed Cyber-Weapon On Dark Web | Zero Hedge

Citibank Cash Machines Offline | Simon Parkes Official Website Current Intel

Citibank Cash Machines Offline

Monday, May 15, 2017

 In the US – 40% of cash machines belonging to Citibank have gone offline.

Source: Citibank Cash Machines Offline | Simon Parkes Official Website

(35) America on fire? View from space as a long line of thunderstorms moves slowly across the country – YouTube

Published on 15 May 2017

NSA Has Fraudently Taken Control Over All Electronic Voting 

The so-called Ransom Computer virus, for short has a hidden benefit for the globalists. America may have just had their last semi-honest election in which the results are 100% predetermined by the globalists. But now, winners and losers can be selected by the touch of a button.  Here is the story on how your political choice has been stolen.

https://www.youtube.com/watch?v=EQWM-YG3DUM

Source: NSA Has Fraudently Taken Control Over All Electronic Voting | Conspiracy Theories