Category Archives: NSA

Trump Counterattack Begins: “No One Knows Who Will Survive”

By: Sorcha Faal, and as reported to her Western Subscribers A chilling new Ministry of Foreign Affairs (MoFA) report circulating in the Kremlin today states that the American capitol city of Washington D.C…

Source: http://ift.tt/2unfjGj

Trump Counterattack Begins: “No One Knows Who Will Survive”

By: Sorcha Faal, and as reported to her Western Subscribers A chilling new Ministry of Foreign Affairs (MoFA) report circulating in the Kremlin today states that the American capitol city of Washington D.C…

Source: http://ift.tt/2unfjGj

Trump Counterattack Begins: “No One Knows Who Will Survive”

By: Sorcha Faal, and as reported to her Western Subscribers A chilling new Ministry of Foreign Affairs (MoFA) report circulating in the Kremlin today states that the American capitol city of Washington D.C…

Source: http://ift.tt/2unfjGj

Trump Counterattack Begins: “No One Knows Who Will Survive”

By: Sorcha Faal, and as reported to her Western Subscribers A chilling new Ministry of Foreign Affairs (MoFA) report circulating in the Kremlin today states that the American capitol city of Washington D.C…

Source: http://ift.tt/2unfjGj

WikiLeaks Publishes New ‘Vault 7’ Exploits Tested on Older Macs Running Snow Leopard and Lion

In the Achilles user guide, it’s explained that the trojaned .dmg file would behave similarly to the original file, and that all of the operator’s intended executables would run the first time the app is launched. Afterwards, all traces of Achilles would be “removed securely” from the …

Source: http://ift.tt/2hgYcEX

WikiLeaks Publishes New ‘Vault 7’ Exploits Tested on Older Macs Running Snow Leopard and Lion

In the Achilles user guide, it’s explained that the trojaned .dmg file would behave similarly to the original file, and that all of the operator’s intended executables would run the first time the app is launched. Afterwards, all traces of Achilles would be “removed securely” from the …

Source: http://ift.tt/2hgYcEX

Wikileaks Connects Nancy Pelosi to Imran Awan /

Chris Menahan InformationLiberation Jul. 26, 2017 Wikileaks’ Julian Assange dug up an interesting leaked email showing Debbie Wasserman Schultz’s crooked former IT aide Imran Awan may be connected to Nancy Pelosi.

Source: http://ift.tt/2tMjFau

WikiLeaks: New York Times Reporter Caught Running Child Porn Website

Former New York Times journalist Kurt Eichenwald was the administrator of a sick child pornography website, according to WikiLeaks. Eichenwald, a huge Hillary Clinton supporter, recently attempted to sue an independent journalist for claiming that he had paid thousands of U.S.

Source: http://ift.tt/2tXMu2N

Julian Assange: CIA Armed Syrian Rebels And Paid Them A Salary

Wikileaks founder Julian Assange has accused the CIA of not only arming Syria’s insurgents, but also paying their salaries.  Assange took to Twitter on Saturday, highlighting an article from Thursday’s Financial Times that revealed how many Syrian rebels are receiving salaries from the CIA.

Source: http://ift.tt/2tXE8YY

Elite Tip Hand In Attempt To Take Down Trump

Welcome to the smartest, most active, and the most loving audience in the world. We started this channel to garnish prayer to change to help save America and stop the coming World Conflict and so far, so good. ==========

Source: http://ift.tt/2uvBmOc

Elite Tip Hand In Attempt To Take Down Trump

Welcome to the smartest, most active, and the most loving audience in the world. We started this channel to garnish prayer to change to help save America and stop the coming World Conflict and so far, so good. ==========

Source: http://ift.tt/2uvBmOc

Elite Tip Hand In Attempt To Take Down Trump

Welcome to the smartest, most active, and the most loving audience in the world. We started this channel to garnish prayer to change to help save America and stop the coming World Conflict and so far, so good. ==========

Source: http://ift.tt/2uvBmOc

Elite Tip Hand In Attempt To Take Down Trump

Welcome to the smartest, most active, and the most loving audience in the world. We started this channel to garnish prayer to change to help save America and stop the coming World Conflict and so far, so good. ==========

Source: http://ift.tt/2uvBmOc

Elite Tip Hand In Attempt To Take Down Trump

Welcome to the smartest, most active, and the most loving audience in the world. We started this channel to garnish prayer to change to help save America and stop the coming World Conflict and so far, so good. ==========

Source: http://ift.tt/2uvBmOc

#Vault7: CIA’s ‘Pandemic’ turns file servers into ‘Patient Zero’ | Galactic Connection

The latest WikiLeaks ‘Vault7’ release details an alleged CIA project allowing the spy agency to give file servers the capability to infect machines which access them remotely.

‘Pandemic’ reveals the role of a persistent implant for Microsoft Windows file servers, accessed by remote machines to run programs, according to a statement from WikiLeaks.

The project acts as a ‘Patient Zero’ – a term used to describe the first identified carrier of a communicable disease during an outbreak.

‘Pandemic’ disguises itself on the infected source machine where the targeted files remain unchanged.

It’s modified when in transit from the source file server to the remote machine. When executed on the new machine ‘Pandemic’ will install the program, an iteration of which will now contain modified code.

‘Pandemic’ can replace up to 20 programs, with a maximum size of 800MB.

According to WikiLeaks “a single computer on a local network with shared drives that’s infected with the ‘Pandemic’ implant will act like a ‘Patient Zero’ in the spread of a disease.” 

The latest release, which consists of five files, does not make clear if the infected machines become new pandemic servers, although WikiLeaks claims this is technically feasible.

According to the ‘Pandemic’ documentation its installation takes between 10 to 15 seconds.

The release is the latest in WikiLeaks’ ‘Vault7’ series, detailing hacking techniques allegedly sourced from within the CIA.

Previous releases have revealed techniques used to weaponize mobile phones, conduct surveillance via Smart TVs and load and execute malware on a target machine.

Source: #Vault7: CIA’s ‘Pandemic’ turns file servers into ‘Patient Zero’ | Galactic Connection

Seth Rich Was Huma Abedin’s Liasion to Leak Clinton Emails After She Was Blackmailed by Anonymous. Huma was the leak!

I know the Seth Rich murder has been covered ad naseum. So I’m gonna make this brief and to the point.

I just wanted to point out a couple things that I saw reported back when it happened that I havent heard a word about since.

In August of 2016 I was browsing through a 4chan forum and I took this screenshot of a conversation (screenshot below) where Anonymous was claiming that they had hacked into Huma Abedin’s personal computer and had intercepted Huma in real time, sending the Saudis a compromising video that she had taken of Hillary. It is not stated what exactly was on the video but my guess is that it probably had something to do with the sexual abuse of a minor.

(Apparently Angela Merkel was also in one of the “compromising videos” with Hillary. God only knows what it shows them doing.)

Huma Abedin’s family is in Saudi Arabia and this is where her loyalty lies.

Anonymous confronted Huma and faced with the threat of being exposed, she agreed to give them info (the emails that were later printed by Wikileaks) if they agreed to keep quiet about what they found her doing.

According to Anonymous, Huma told them that she would give them the info they’d asked for via an insider…a liasion.

Guess who that liasion was? SETH RICH!!

Now does it make sense why they are trying to confuse this story?

HUMA WAS THE LEAK!!

Anonymous then gave the emails to Wikileaks to publish.

Here is that screenshot from 4chan. This was big news back then in forums like 4Chan and GLP…but it never seemed to reach any of the mainstream alternative sites and it seems to have been forgotten about since…

14976792_10154723665877427_4872008347056034377_o

14918750_10154723666077427_3486454069327294367_o.jpg

Source: Seth Rich Was Huma Abedin’s Liasion to Leak Clinton Emails After She Was Blackmailed by Anonymous. Huma was the leak! | Alternative

Wikimedia Lawsuit Against NSA Surveillance Just Approved to Move Forward | Galactic Connection

(ANTIMEDIAA federal appeals court has unanimously reversed part of a lower court’s dismissal of a lawsuit filed by the American Civil Liberties Union for Wikimedia, which challenges the NSA’s mass surveillance and collection of internet communications.

The suit was originally filed in 2015 by the ACLU on behalf of the Wikimedia Foundation, Amnesty International, and Human Rights Watch, among others, and centered around the NSA’s “Upstream” surveillance program, which intercepts data from the internet backbone cables carrying the online messages, web searches, and emails of U.S. citizens. Upstream operates under Section 702 of the Foreign Intelligence Surveillance Act, a statute the government uses to conduct warrantless surveillance on Americans who communicate with targets located outside of the United States…

Source: Wikimedia Lawsuit Against NSA Surveillance Just Approved to Move Forward | Galactic Connection

Wikileaks: CIA Now Controls Your COmputer

dr-william-mount211111111111211A few days ago we discussed the fact that the New Computer Virus taking control of Banks and failing Hospitals was released by Microsoft and the “CURE” for the virus was created even before the Virus was released – forcing you to update into “Windows 11” and their “Smart Cloud.”

Now it has been brought forward – thanks to the Chinese Run Corporation of Wikileaks – that the CIA is now taking control of all computers that run Windows 8-10, 9 was a flop and never released.

Primary CIA Virus is Hera – Running XP through Windows 10
Secondary: Hera for Windows 8-10.

So apparently we have 3 Microsoft/CIA Viruses to worry about:

1) Wannacry
2) AfterMidnight
3) Assassin

This program – unlike any other News Program on the internet – is about solutions.

We state what the news is and then how to protect yourself form this madness…

So here is what you can do to protect yourself.

Continue reading Wikileaks: CIA Now Controls Your COmputer

#Vault7 ‘Athena’: CIA’s anti-Windows malware ‘better than bombing things’

The latest in WikiLeaks’ series of #Vault7 leaks was released Friday detailing malware that provides remote beacon and loader capabilities on target computers using several Microsoft Windows operating systems. Read Full Article at RT.com

via #Vault7 ‘Athena’: CIA’s anti-Windows malware ‘better than bombing things’ — RT – Daily news

Cyber attacks are the perfect trigger for a stock market crash 

Image result for wannacry

The world has been stunned over the past few days by the advent of “Ransomware;” the use of sophisticated cyber attacks on vital systems in order to (supposedly) extort capital from target businesses and institutions. I am always highly suspicious whenever a large scale cyber incident occurs, primarily because the manner in which these events are explained to the public does not begin to cover certain important realities. For example, the mainstream media rarely if ever discusses the fact that many digital systems are deliberately designed to be vulnerable.

Software and internet corporate monoliths have long been cooperating with the NSA through programs like PRISM to provide government agencies backdoor access to computer systems worldwide. Edward Snowden vindicated numerous “conspiracy theorists” in 2013 with his comprehensive data dumps, exposing collusion between corporations and the NSA including Microsoft, Skype, Apple, Google, Facebook and Yahoo. And make no mistake, nothing has changed since then.

The level of collusion between major software developers and the establishment might be shocking to some, but it was rather well known to alternative analysts and researchers. The use of legislation like the Foreign Intelligence Surveillance Act (FISA) to skirt Constitutional protections within the 4th Amendment has been open policy for quite some time. It only made sense that government agencies would use it as a rationale to develop vast protocols for invading people’s privacy, including American citizens.

The issue is, in the process of engineering software and networks with Swiss cheese-like security in the name of “national security,” such exploits make vast spreads of infrastructure vulnerable to attack. I think it likely this was the intention all along. That is to say, the NSA and other agencies have created a rather perfect breeding ground for false flag attacks, real attacks and general crisis…

Source: Cyber attacks are the perfect trigger for a stock market crash | Tea Party

Hackers Unleash Second NSA-Developed Cyber-Weapon On Dark Web | Zero Hedge

While a second variant of the WannaCry(pt) ransomware (based on NSA’s EternalBlue exploit) was spreading across the globe yesterday, The FT reports criminal hacking groups have repurposed a second classified cyber weapon stolen from US spies and have made it available on the so-called dark web.

On Monday, the WannaCry attack, which hit 370,000 computers across 150 countries, appeared to slow. Europol, the European police agency, said the spread of the virus had stalled in Europe. But while infection rates have slowed, a Europol spokeswoman warned, “we do not think this is the end of the crisis. The hackers have already evolved the malware, and will probably continue to do so.”

Notably as Europe woke up (and US opened), the infection rate started to rise once again…

But as The FT reports, intelligence and law-enforcement officials said they fear WannaCry may foreshadow a wave of similarly damaging attacks, as criminals and others race to make use of digital weapons that for years were only available to the most technologically sophisticated nation states.

At least a dozen other NSA tools are currently being discussed and worked on as the basis of potential new cyber weapons on hacking forums on the dark web, parts of the internet not accessible via normal search engines.

The hacking tool, developed by the US National Security Agency and called EsteemAudit, has been adapted and is now available for criminal use, according to security analysts.

As with the NSA’s EternalBlue, the tool on which WannaCry was based, EsteemAudit exploits a vulnerability in older versions of Microsoft’s Windows software in the way in which networked machines communicate with each other…

Source: Hackers Unleash Second NSA-Developed Cyber-Weapon On Dark Web | Zero Hedge

Did Wash Post Publish Dubious Russia Story to Distract From Seth Rich Bombshell? » Alex Jones’ Infowars: There’s a war on for your mind!

The Washington Post published its dubious story on President Trump leaking classified information to the Russians less than an hour after the bombshell news broke that murdered DNC staffer Seth Rich was in contact with Wikileaks and that DC Police were ordered to cover it up.

The coincidental timing has led many Trump supporters to accuse the Post of publishing their story in an attempt to distract the rest of the media from focusing on the massive new revelations in the Seth Rich case.

Source: Did Wash Post Publish Dubious Russia Story to Distract From Seth Rich Bombshell? » Alex Jones’ Infowars: There’s a war on for your mind!

Infowars Nightly News – IRS & NSA Come Out Of The Closet As Political Weapons 

Streamed live 14 hours agoHelp us spread the word about the liberty movement, we’re reaching millions help us reach millions more. Share the free live video feed link with your friends & family: http://www.infowars.com/show

NSA Has Fraudently Taken Control Over All Electronic Voting 

The so-called Ransom Computer virus, for short has a hidden benefit for the globalists. America may have just had their last semi-honest election in which the results are 100% predetermined by the globalists. But now, winners and losers can be selected by the touch of a button.  Here is the story on how your political choice has been stolen.

https://www.youtube.com/watch?v=EQWM-YG3DUM

Source: NSA Has Fraudently Taken Control Over All Electronic Voting | Conspiracy Theories

“Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools | Zero Hedge

The ransomware has been identifed as WannaCry

* * *

Update 4: According to experts tracking and analyzing the worm and its spread, this could be one of the worst-ever recorded attacks of its kind. The security researcher who tweets and blogs as MalwareTech told The Intercept “I’ve never seen anything like this with ransomware,” and “the last worm of this degree I can remember is Conficker.” Conficker was a notorious Windows worm first spotted in 2008; it went on to infect over nine million computers in nearly 200 countries. As The Intercept details,

Today’s WannaCry attack appears to use an NSA exploit codenamed ETERNALBLUE, a software weapon that would have allowed the spy agency’s hackers to break into any of millions of Windows computers by exploiting a flaw in how certain version of Windows implemented a network protocol commonly used to share files and to print. Even though Microsoft fixed the ETERNALBLUE vulnerability in a March software update, the safety provided there relied on computer users keeping their systems current with the most recent updates. Clearly, as has always been the case, many people (including in governments) are not installing updates. Before, there would have been some solace in knowing that only enemies of the NSA would have to fear having ETERNALBLUE used against them–but from the moment the agency lost control of its own exploit last summer, there’s been no such assurance.

Today shows exactly what’s at stake when government hackers can’t keep their virtual weapons locked up.

As security researcher Matthew Hickey, who tracked the leaked NSA tools last month, put it, “I am actually surprised that a weaponized malware of this nature didn’t spread sooner.”

Update 3: Microsoft  has issued a statement, confirming the status the vulnerability…

Today our engineers added detection and protection against new malicious software known as Ransom:Win32.WannaCrypt.

In March, we provided a security update which provides additional protections against this potential attack.

Those who are running our free antivirus software and have Windows updates enabled, are protected. We are working with customers to provide additional assistance.

Source: “Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools | Zero Hedge