View on YouTube THOUSANDS of Americans JUST Positioned Themselves For Something That WILL Strike America—DID YOU? **NOBLE GOLD ROTH IRA, GOLD, SILVER: https://goo.gl/kx2yzW
GET EDUCATED NOW ON THE BENEFITS OF GOLD, SILVER, METALS BEFORE IT”S TOO LATE!
America is on the brink of war and rumors of a North Korean or Russian cyber attack are on the list of possible scenarios that could play out on U.S. soil. Multiple government officials have warned of such threats in the past, and now it seems only a matter of time before someone targets the American grid.
Shockingly, a document constructed in August 2016, just before the “war” officially broke out, has just surfaced. The trouble with this document is that it portrays the venerabilities in the power grid and lists both North Korea and Russia as our biggest threats to the grid. The report is titled, “Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector,” and while it was not written by a government agency directly, it was written FOR them by the Mission Support Center National Laboratory.
If you are a freedom loving patriot who values American principles then you are likely already aware of the massive amount of censorship happening on social platforms like Facebook, Twitter, YouTube, Google and other globalist linked organizations that target individuals who bring attention to their continuous, creepy corruption.
Censorship has ignited and been set ablaze all across the world wide web. Alternative media news outlets are having to work double, with less pay, in order to get the truth out, while progressive news websites are being spring-boarded to the top of search engines.
Well, I’ve Had ENOUGH! It’s about dang time we expose the corruption of these fakes and at least have a fair fighting chance to win the affection of the sleeping public who are continually being censored from truth.
In the video, I prove with 100% undeniable evidence, the globalists, via Google, are blacklisting truth and targeting patriots such as myself.
If there ever was a video that needs to go viral, it would be this one! Please forward this message to everyone you know…
Another interesting globally-oriented agenda was delivered by Pope Francis while not only at TED talks but also while attending the Pontifical Academy of Social Sciences meeting held at the Vatican. The Jesuit Pope is portrayed by mainstream media as a person who backs all religions, nations, and creeds. Problem is, the mainstream LYING media fails to report the fact that he only backs those who back his stated goal, the New World Order agenda. Any who oppose get defamed. Recently, he had the harshest of words to describe one particular political group of people, despite his proclaimed “love for all” which we all know is a sham.
Earlier this year on March 7th, 2017, Wikileaks downloaded to its website one of their biggest data dumps on the CIA to date; a dump that they have called Vault 7.
For years alternative media has been making the claim that agencies within the government have been publicly spying on the American people and now their theories have been confirmed, not only by Edward Snowden but also via Wikileaks.
According to Julian Assange:
“The CIA had created, in effect, its “own NSA”, with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”
From Dark Matter, to Marble Framework, to Grasshopper, to Hive, to Weeping Angle, to today’s latest release project Scribbles…The CIA has their hand in everything and they don’t want you talking about it!! In fact, they want you distracted with the War!
All that and more below…
The system known as “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
Some of the programs within the vault include a program called, “UMBRAGE” that can pin a forensic “fingerprint” on someone’s operating system:
“The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.
“This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.
“The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
“With UMBRAGE and related projects, the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
“UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”
Even worse! It was also discovered that the CIA looked into capabilities to hijack and take control of your vehicle:
“As of October 2014, the CIA was also looking at infecting the vehicle control systems used in modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”
On March 23, 2017, Wikileaks dropped information on a system called, “Dark Matter,” a program that proves they are implanting technology in iPhones during their creation. Meaning all the CIA has to do is access the “chip” to hear any and everything you are saying. Contained inside was the following corrupt projects of the CIA, Sonic Screwdriver, Dark Sea Skies, Triton, and Night Skies.
A few days later, on March 31, 2017, Wikileaks dropped another log on the CIA’s fire called, “Marble Framework,” a 676 source code file that hampers forensic investigators and anti-virus companies from attributing viruses, trojan and hack attacks to the CIA. In other words, no one can attribute a crime to the CIA because this program allows them to “cover their tracks.”
Then on April 7, 2017, Julian Assange released files on “Grasshopper framework” a platform used to build customized malware payloads for Microsoft Windows operating systems. Grasshopper allows tools to be installed on computers and prevents “Security” loops from detecting them, Security looks like Kaspersky. Wikileaks states that these are insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft windows computers, providing directions for those seeking to defend their systems identify any existing compromise.
On April 14th, 2017 Wikileaks published six documents from the CIA”s “Hive” project. Hive is a back-end infrastructure malware with public facing HTTPS interface which is used by CIA implants to transfer exfiltrated information from targeted machines to the CIA and to receive commands from its operators to execute specific tasks on the targets. In other words, the CIA can “Hack” information they need from your computer to theirs, and send certain “tasks” for your computer to carry out. Additionally, these commands were unable to be traced back to the CIA.
On April 21st, 2017 “Weeping Angel” was published. This is an implant designed for the Samsung F. Series Smart TV’s that records audio from the built-in microphone and egress or store the data. In other words, your TV’s can and will record what you say and share it with the CIA.
The latest release was April 28th, 2017, Wikileaks publishes the documentation and source code for project “Scribbles.” A document watermarking pre-processing system that embeds a tracking bug into documents that are likely to be copied by insiders, whistleblowers, journalists or others.