https://youtube.com/watch?v=7rfl1P9IUYA
via Anonymous: Next 10 Days Will Rock The World — NESARA- REPUBLIC NOW – GALACTIC NEWS
The Bank of Russia refuted media reports it had lost over $31 million in a hacking attack.
via Russian Central Bank Denies Losing $31Mln in Single Hacking Attack — Sputnik International
Source – Collective Evolution by Alexa Erickson, November 29th 2016 Protests breaking out in cities across the country. Violence. Vandalism. Closed highways and bridges. American flags burning, students being beaten by classmates. Assaults in broad daylight. Families divided.These are just some of the news reports following the United States presidential election that revealed Donald Trump will…
President Nicolas Maduro has announced that Venezuelan Credicard payment system, as well as the Internet system of the entire country, have been affected by cyber attacks.
via Maduro: Venezuela’s Credicard System, Internet Service Targeted by Hackers — Sputnik International
Source – Collective Evolutionby Joe Martino, November 22nd 2016‘Divide.’ That seems to be the keyword around collective consciousness as we steer our attention away from the 2016 election campaign and on to what will happen next.Media and elite push to divide the masses by trying to convince us to focus on who is to blame for…
via Anonymous Just Sent Another Important Message to Donald Trump — Stillness in the Storm
Source – Collective Evolutionby Joe Martino, November 17th 2016There has been no shortage of Anonymous messages lately, and it’s no surprise given how much is going on right now.Reporting from North Dakota here in Standing Rock, we have seen a complete lack of mainstream media. Even when Robert Kennedy Jr. came down, we were the only…
via Anonymous Message to Corrupt Mainstream Media — Stillness in the Storm
The whistleblowing website WikiLeaks was hacked on Monday following the publication of the second batch of leaked Democratic National Committee (DNC) emails.
via WikiLeaks Website Attacked by Hackers Following New DNC Emails Leak — Sputnik International
https://youtube.com/watch?v=W_PkobtkgdM
Anonymous just revealed why they changed their plan and what will happen on November 5th. Fasten your seat belts!Just in *** Breaking News ***Anonymous No.95833740Over the next few days many new documents will be released. The contents of these documents will contain evidence of perhaps the largest coverup in American History. Before this happens we…
via [VIDEO] ANONYMOUS: ‘Remember, Remember, The 5th Of November’ — NESARA- REPUBLIC NOW – GALACTIC NEWS
London police have arrested 53 participants of an annual Million Mask March on Saturday, who took to London streets up to protest inequality and censorship. While minor clashes broke out between some of the activists and police, the rally was largely peaceful. Read Full Article at RT.com
via Over 50 Anonymous activists arrested at Million Mask March in London — RT – Daily news
According to reports, Hillary Clinton is about to drop out of the presidential race after Anonymous release her 33,000 deleted emails this week. According to a post on 4chan, a user-generated imageboard website, Hillary was warned by her superiors that she must now drop out of the race following the simultaneous threat of new leaks by Anonymous, Wikileaks, and…
via Reports Suggest Clinton Will Step Down This Week — Your News Wire
‘An NHS trust shut down all of its IT systems today and has all but ground to a halt in general after a virus compromised them on Sunday. In a bright-red warning labelled “Major incident” on the website for Northern Lincolnshire & Goole NHS Foundation Trust, patients are warned that their appointments have been cancelled…
US President Barack Obama has admitted security chiefs have not yet identified those behind a sophisticated cyber-attack which crippled some of the world’s biggest websites last Friday. Read Full Article at RT.com
via US security chiefs stumped over source of global DDoS attack – Obama — RT – Daily news
Hacker, Guccifer 2.0 just released another slew of damning emails that seem to implicate not just the Democratic Party and the Clinton Campaign, but also our acting president, Mr. Obama, himself.
To further tarnish any reputation for neutrality on the part of the DNC, an email dated May 18, 2016, from Jacquelyn Lopez, an attorney with the law firm Perkins Coie, asked DNC staff if they could set up a brief call “to go over our process for handling donations from donors who have given us pay to play letters.”
It turns out the DNC did not act alone in its corrupt behavior.
Between leaving Americans to die in Benghazi, destabilizing Haiti’s economy, playing a major role in Syria’s downfall and the rise of ISIS, and destroying evidence which could potentially be used for incrimination purposes, Hillary Clinton has a disturbing – and bloody – track record in politics.
Despite this, the former Secretary of State still retains impressive support for her run to be elected as President of the United States. If the prospect of her leading an entire nation doesn’t frighten you, however, you may not be paying attention to her shady past or present dealings.
Plenty of incriminating information has been released about Clinton and the deals she’s been involved in, but this has done little to derail her campaign. Perhaps it’s because of this that the self-proclaimed hacktivist group Anonymous has switched its focus to expose Hillary Clinton.
Continue reading Anonymous Blows The Lid Off Hillary Clinton [Must Watch]
Following the arrests of HSBC currency trader Mark Johnson and associate Stuart Scott – the evidence has emerged that the Clinton’s were involved in offshore money-laundering operations on a massive scale.
The investigation into HSBC currency trader Mark Johnson and associate Stuart Scott for their alleged role in a “conspiracy to rig currency benchmarks” by front-running customer orders has escalated to the point where the Department of Justice is threatening to tear up a 2012 agreement to fine HSBC a historic $1.9 billion for money-laundering violations in lieu of criminal prosecutions.
At issue is whether or not HSBC has honored the 2012 deferred-prosecution agreement in which the bank agreed to establish internal review procedures to catch and punish potentially criminal activities by employees.
Continue reading HSBC Procecution Unveils Massive Clinton Money Laundering Scheme
Putin’s favorite driver was killed instantly after a Mercedes crossed from the other side of the road without warning and struck the Russian President’s official car head-on.
The deadly collision occurred just before President Putin was due to fly to China for the G20 summit where he has had meetings with various world leaders, including Theresa May, US President Barack Obama and Chinese president Xi Jinping.
Kremlin sources claim Putin should have been in the car with his favorite driver but changed cars at the last minute, leading to the belief that he may have personally received inside information about the assassination plot.
Continue reading Vladimir Putin Escapes New World Order Assassination Attempt | Your News Wire
1) PMS NBC
2) NBC
3) ABC
4) CBS
5) CNN
All of their Email Servers have been hacked, their phone calls are next
There are 12 nations involved in the hacking now along with their Intelligence Agencies and I have already mentioned 5 of them.
Now they will be torn apart in the press across the globe – except here in the United States.
Continue reading DR WILLIAM MOUNT: Emails Of Media Elites Hacked
![Wisdom Teachings: [#179] Draco Moon Base Video](https://conspiracydailyupdate.com/wp-content/uploads/2016/08/125391_wt_s22e17_draco-moon-base_cvr.jpg?w=213&h=298)
Though the Alliance has yet to leverage the information gathered from the super hack of the Cabal, we can assume that they hold records of non-terrestrial operatives within the secret space programs. Two such operatives surface as David Wilcock continues to discuss details from recent disclosures in the past year. We gain confirmation of Corey Goode’s testimony of the MILABs programs and military collaborations with reptilian extraterrestrials on Earth and on the moon. It is important to expose this information, as the fall of the Cabal also brings about the end of Draco control over our planet. This presentation was originally webcast August 22, 2016.
Instructor/Host: David Wilcock
– See more at: http://www.gaia.com/video/179-draco-moon-base#play/125391
Snowden suggests that many of NSA’s most damaging malware programs are now in the hands of America’s opponents, thanks to enterprising foreign counter-intelligence hackers known as the Shadow Brokers. there will be more hacked bombshells to drop on Team Clinton, courtesy of weak security in Democratic National Committee and Clinton campaign computer systems.
We have entered a new phase of cyber-warfare, one in which America’s (and Israel’s) most damaging computer hacking and disruption programs are available to anyone willing to pay in Bitcoins on the cyber-black market. The Democratic Party’s leaked emails, coupled with the leaked State Department cables, has Hillary Clinton in an outrage.
These disclosures, along with the Snowden disclosures that illustrate how America spies on friend and foe, have opened the Black Box of America’s propaganda machine.
Continue reading Opening the Black Box of America’s Propaganda Machine – Prepare for Change
The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.
The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.
SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.
But malicious software of this sophistication doesn’t just pose a threat to foreign governments, Johns Hopkins University cryptographer Matthew Green told The Intercept:
The danger of these exploits is that they can be used to target anyone who is using a vulnerable router. This is the equivalent of leaving lockpicking tools lying around a high school cafeteria. It’s worse, in fact, because many of these exploits are not available through any other means, so they’re just now coming to the attention of the firewall and router manufacturers that need to fix them, as well as the customers that are vulnerable. So the risk is twofold: first, that the person or persons who stole this information might have used them against us. If this is indeed Russia, then one assumes that they probably have their own exploits, but there’s no need to give them any more. And now that the exploits have been released, we run the risk that ordinary criminals will use them against corporate targets.
The NSA did not respond to questions concerning ShadowBrokers, the Snowden documents, or its malware.
The offensive tools released by ShadowBrokers are organized under a litany of code names such as POLARSNEEZE and ELIGIBLE BOMBSHELL, and their exact purpose is still being assessed. But we do know more about one of the weapons: SECONDDATE.
SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware. SECONDDATE’s existence was first reported by The Intercept in 2014, as part of a look at a global computer exploitation effort code-named TURBINE. The malware server, known as FOXACID, has also been described in previously released Snowden documents.
Other documents released by The Intercept today not only tie SECONDDATE to the ShadowBrokers leak but also provide new detail on how it fits into the NSA’s broader surveillance and infection network. They also show how SECONDDATE has been used, including to spy on Pakistan and a computer system in Lebanon.
The top-secret manual that authenticates the SECONDDATE found in the wild as the same one used within the NSA is a 31-page document titled “FOXACID SOP for Operational Management” and marked as a draft. It dates to no earlier than 2010. A section within the manual describes administrative tools for tracking how victims are funneled into FOXACID, including a set of tags used to catalogue servers. When such a tag is created in relation to a SECONDDATE-related infection, the document says, a certain distinctive identifier must be used.
The same SECONDDATE MSGID string appears in 14 different files throughout the ShadowBrokers leak, including in a file titled SecondDate-3021.exe. Viewed through a code-editing program (screenshot below), the NSA’s secret number can be found hiding in plain sight.
All told, throughout many of the folders contained in the ShadowBrokers’ package (screenshot below), there are 47 files with SECONDDATE-related names, including different versions of the raw code required to execute a SECONDDATE attack, instructions for how to use it, and other related files.
After viewing the code, Green told The Intercept the MSGID string’s occurrence in both an NSA training document and this week’s leak is “unlikely to be a coincidence.” Computer security researcher Matt Suiche, founder of UAE-based cybersecurity startup Comae Technologies, who has been particularly vocal in his analysis of the ShadowBrokers this week, told The Intercept “there is no way” the MSGID string’s appearance in both places is a coincidence.
This overview jibes with previously unpublished classified files provided by Snowden that illustrate how SECONDDATE is a component of BADDECISION, a broader NSA infiltration tool. SECONDDATE helps the NSA pull off a “man in the middle” attack against users on a wireless network, tricking them into thinking they’re talking to a safe website when in reality they’ve been sent a malicious payload from an NSA server.
According to one December 2010 PowerPoint presentation titled “Introduction to BADDECISION,” that tool is also designed to send users of a wireless network, sometimes referred to as an 802.11 network, to FOXACID malware servers. Or, as the presentation puts it, BADDECISION is an “802.11 CNE [computer network exploitation] tool that uses a true man-in-the-middle attack and a frame injection technique to redirect a target client to a FOXACID server.” As another top-secret slide puts it, the attack homes in on “the greatest vulnerability to your computer: your web browser.”
One slide points out that the attack works on users with an encrypted wireless connection to the internet.
That trick, it seems, often involves BADDECISION and SECONDDATE, with the latter described as a “component” for the former. A series of diagrams in the “Introduction to BADDECISION” presentation show how an NSA operator “uses SECONDDATE to inject a redirection payload at [a] Target Client,” invisibly hijacking a user’s web browser as the user attempts to visit a benign website (in the example given, it’s CNN.com). Executed correctly, the file explains, a “Target Client continues normal webpage browsing, completely unaware,” lands on a malware-filled NSA server, and becomes infected with as much of that malware as possible — or as the presentation puts it, the user will be left “WHACKED!” In the other top-secret presentations, it’s put plainly: “How do we redirect the target to the FOXACID server without being noticed”? Simple: “Use NIGHTSTAND or BADDECISION.”
The sheer number of interlocking tools available to crack a computer is dizzying. In the FOXACID manual, government hackers are told an NSA hacker ought to be familiar with using SECONDDATE along with similar man-in-the-middle wi-fi attacks code-named MAGIC SQUIRREL and MAGICBEAN. A top-secret presentation on FOXACID lists further ways to redirect targets to the malware server system.
To position themselves within range of a vulnerable wireless network, NSA operators can use a mobile antenna system running software code-named BLINDDATE, depicted in the field in what appears to be Kabul. The software can even be attached to a drone. BLINDDATE in turn can run BADDECISION, which allows for a SECONDDATE attack.
Elsewhere in these files, there are at least two documented cases of SECONDDATE being used to successfully infect computers overseas: An April 2013 presentation boasts of successful attacks against computer systems in both Pakistan and Lebanon. In the first, NSA hackers used SECONDDATE to breach “targets in Pakistan’s National Telecommunications Corporation’s (NTC) VIP Division,” which contained documents pertaining to “the backbone of Pakistan’s Green Line communications network” used by “civilian and military leadership.”
In the latter, the NSA used SECONDDATE to pull off a man-in-the-middle attack in Lebanon “for the first time ever,” infecting a Lebanese ISP to extract “100+ MB of Hizballah Unit 1800 data,” a special subset of the terrorist group dedicated to aiding Palestinian militants.
SECONDDATE is just one method that the NSA uses to get its target’s browser pointed at a FOXACID server. Other methods include sending spam that attempts to exploit bugs in popular web-based email providers or entices targets to click on malicious links that lead to a FOXACID server. One document, a newsletter for the NSA’s Special Source Operations division, describes how NSA software other than SECONDDATE was used to repeatedly direct targets in Pakistan to FOXACID malware web servers, eventually infecting the targets’ computers.
Snowden, who worked for NSA contractors Dell and Booz Allen Hamilton, has offered some context and a relatively mundane possible explanation for the leak: that the NSA headquarters was not hacked, but rather one of the computers the agency uses to plan and execute attacks was compromised. In a series of tweets, he pointed out that the NSA often lurks on systems that are supposed to be controlled by others, and it’s possible someone at the agency took control of a server and failed to clean up after themselves. A regime, hacker group, or intelligence agency could have seized the files and the opportunity to embarrass the agency.
According to this report, and as we had previously (6 May) reported on, Director Bortnikov and Chairwoman Matviyenko have been locked in a bitter struggle over how best the Federation can maximize the usage of Hillary Clinton’s secret emails and telephone calls currently in the possession of SVR—with Bortnikov favoring using them for “persuasion/blackmail” as is currently being done, and Matviyenko advocating their being released to destroy what she considers the “most dangerous American woman in history”.
An unknown hacker or a group of hackers calling themselves The Shadow Brokers, in addition to offering free hacked tools online, also auctioned hacked tools for $568 Million dollars in Bitcoin.
Equation Group was linked to the previous infamous Regin and Stuxnet cyber attacks now known to be state sponsored malware attacks.
Continue reading NSA Hacked by unknown hackers called ‘The Shadow Brokers’ | Stillness in the Storm


Continue reading DR WILLIAM MOUNT: Intel Report – Things Are Unwinding – Be Ready