Category Archives: NSA

Ex-NSA Agent – “The Council of 9” Behind Trump’s Coup

the Council of 9 controls every group from the US President to Congress to the Supreme Court to the Trilaterals and the CFR

The Council of 9 controls every group from the US President to Congress to the Supreme Court to the Trilaterals and the CFR.

I recently interviewed Ex-NSA agent, Vance Davis.  Vance told me months ago that the Council of 9 would remove Donald Trump from office if he went against the Establishment.  We are now seeing Vance’s words come to life.

Here is the story of the Council of 9 and the coup against Trump.

Source: Ex-NSA Agent – “The Council of 9” Behind Trump’s Coup | Conspiracy Theories

WikiLeaks Reveals “Archimedes”: Malware Used To Hack Local Area Networks » The Event Chronicle

By Zero Hedge

In its seventh CIA leak since March 23rd, WikiLeaks has just revealed the user manual of a CIA hacking tool known as ‘Archimedes’ which is purportedly used to attack computers inside a Local Area Network (LAN).  The CIA tool works by redirecting a target’s webpage search to a CIA server which serves up a webpage that looks exactly like the original page they were expecting to be served, but which contains malware. It’s only possible to detect the attack by examining the page source.  Per WikiLeaks:

Today, May 5th 2017, WikiLeaks publishes “Archimedes”, a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA. This technique is used by the CIA to redirect the target’s computers web browser to an exploitation server while appearing as a normal browsing session.

The document illustrates a type of attack within a “protected environment” as the the tool is deployed into an existing local network abusing existing machines to bring targeted computers under control and allowing further exploitation and abuse.

Source: WikiLeaks Reveals “Archimedes”: Malware Used To Hack Local Area Networks » The Event Chronicle

WikiLeaks Reveals CIA Tool ‘Scribbles’ For Document Tracking | Threatpost | The first stop for security news

 

WikiLeaks released details on what it said is a Central Intelligence Agency document tracking program called Scribbles, part of the agency’s effort to keep tabs on documents leaked to whistleblowers and journalists. Scribbles allegedly embeds a web beacon-style tag into watermarks located on Microsoft Word documents that can report document analytics back to the CIA.

WikiLeaks released information Friday about Scribbles as part of its ongoing  Vault 7 Dark Matter release that began last month. Also released is what WikiLeaks said is Scribbles’ source code.

A user manual describing Scribbles said the tool can be used to generate batch copies of identical or unique files, each with distinctive watermarks that includes a web beacon-like tag. A web beacon (or web bug) is a transparent graphic image that can be used to report back if a document has been opened and the IP address of the computer that requested the image file.

According to WikiLeaks, Scribble works exclusively with Microsoft Office documents. The tool, according to the user guide has been “successfully tested” to work with Microsoft Office 2013 (on Windows 8.1 x64) and Office 97-2016 running on Windows 98 and above.

WikiLeaks’ copy of the CIA’s Scribbles user manual says the tool will not work on encrypted or password-protected documents. The CIA also warns that if a document with a Scribbles’ watermark is opened in an alternative document viewing program, such as OpenOffice or LibreOffice, it may result in revealing watermarks and URLs for the user…

Source: WikiLeaks Reveals CIA Tool ‘Scribbles’ For Document Tracking | Threatpost | The first stop for security news

Open Source Intelligence — Intelligence for a Better World and an Effective Freedom Movement » The Event Chronicle

(Stillness in the Storm Editor) To most of those aware of the insidious nature of various conspiratorial groups—with such names as the Deep State, the Cabal and the Illuminati—the use of intelligence services is a standard practice. And for most of human history, when a despotic elite needed to maintain control over a population or manipulate events to suit a clandestine agenda, spies, secrecy, and espionage were employed. One former intelligence officer is pulling back the curtain, revealing that as domineering as some of these groups are, like the NSA, CIA or DHS, they are also compartmentalized almost to the point of being ineffective. Of course, this is arguably by design, as these same organizes help manage the shadow government. But what if the system could be re-purposed, made less costly, and actually in service of the people?

Robert David Steele is a former CIA officer turned activist who has arguably revealed what has remained hidden for a very long time: the purpose of intelligence services. The following presentation by Steele gives us a glimpse into how intelligence agencies work…

Source: Open Source Intelligence — Intelligence for a Better World and an Effective Freedom Movement » The Event Chronicle

New Snowden leaks reveal secret deals between Japan and NSA — RT News

New papers released by whistleblower Edward Snowden, and published by The Intercept, reveal that Japan made secret deals with the NSA – with one document noting that the agency’s relationship with Tokyo goes back to the 1950s.

In return, the NSA has provided Japanese spies with state-of-the-art surveillance tools and shared intelligence.

The Intercept notes multiple documents and instances which outline the NSA’s ongoing relationship with the NSA.

However, it also notes that the agency has secretly spied on Japanese officials and institutions while maintaining friendly ties with Tokyo.

Back to the 1950s

According to documents cited by The Intercept, the relationship between the NSA and Tokyo began in the 1950s, when the US continued to maintain a large presence in Japan despite the country’s sovereignty being restored after years of US military occupation following World War II.

A document from 2007 shows that the NSA’s presence in Japan was managed out of a “cover office” in the Minato area of downtown Tokyo for many years, within a US military compound called the Hardy Barracks.

It was from that office that the agency apparently maintained close relations with Japan’s Directorate for Signals Intelligence (SIGINT).

But by 2007, the agency’s low profile had ended, with the NSA determining that “cover operations are no longer required.” It then relocated its main office in Japan to the US embassy in Tokyo.

“NSA’s partnership with Japan continues to grow in importance,” the agency wrote in a classified October 2007 report, adding that it planned to take the country “to the next level as an intelligence partner with the US.”…

Source: New Snowden leaks reveal secret deals between Japan and NSA — RT News

(45) 4.22 Update – Wikileaks Shenganigans, Operation Gotham Shield (NY Blackout!) & BIG Solar Storm

https://www.youtube.com/watch?v=T5IM3P9Md-4

Published on 22 Apr 2017

YouTube Vid: “Pizzagate Pedogate Dutch Whistleblower Real Big Money Revelations by an Insider ” – https://goo.gl/SR2IyH
The Hill: “Assange says WikiLeaks will show ‘all sorts of illegal actions by the CIA'” – https://goo.gl/5XDFuQ
SOTT: “False flag alert: Operation Gotham Shield will simulate nuke detonation over Manhattan” – https://goo.gl/LO6wkg
Solarham: Check current solar weather – http://solarham.net/

VIDEO: iPhones Are iSpies – Wikileaks “Vault 7” Revelations Continue To Terrify

(Roqayah Chamseddine) Since launching in 2006, Wikileaks has reportedly released over 10 million documents, including controversial disclosures that have helped unravel war crimes, uncover corporate secrets and even brought to light explosive revelations stemming from Hillary Clinton’s most recent presidential run.Read more »

via VIDEO: iPhones Are iSpies – Wikileaks “Vault 7” Revelations Continue To Terrify — Stillness in the Storm

Unaccounted Power is Dragging Global Society Into An Orwellian Dystopia

WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents, that have come from the top secret security network at the Cyber Intelligence Center. Long before the Edward Snowden revelations, Julian Assange noted how “The Internet, our greatest tool of emancipation,…

via Unaccounted Power is Dragging Global Society Into An Orwellian Dystopia — Prepare for Change

Manhunt underway for CIA ‘traitor’ who leaked ‘Vault 7’ to WikiLeaks – report — RT America

The FBI and CIA are investigating hundreds of possible suspects in one of the biggest security breaches in CIA history, CBS News reports. The WikiLeaks “Vault 7” release, which contained thousands of top-secret documents, revealed the agency’s hacking tools.

A joint investigation and manhunt by the Federal Bureau of Investigation and the Central Intelligence Agency into the source of WikiLeaks’ “Vault 7” dump last month has begun, CBS News justice and homeland security correspondent Jeff Pegues reported Wednesday evening.

The release last month brought to light the CIA’s digital arsenal for hacking into computer systems and smart devices such as phones and televisions. Thousands of top-secret classified files that had previously been guarded within a “highly secure section of the intelligence agency,” as CBS News sources described it, were made available to the world for free by WikiLeaks.

The source of the leak, the FBI and CIA reportedly believe, was one of the hundreds of agents or contractors who had physical access to the material, not an outside hacker. That suspicion seems to align with what WikiLeaks said in their press release announcing the Vault 7 release on March 7.

“The archive appears to have been circulated among former US government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive,” the pro-transparency group said.

Unnamed US intelligence sources told Reuters within a day of the release that the CIA had been anticipating it since near the end of 2016.

The FBI and CIA coordinated reviews of the incident and a criminal investigation was opened within a day of the release, the Washington Post reported at the time, based on an unnamed former intelligence official who said to expect “another major mole hunt.”

Former CIA Deputy Director Mike Morell told CBS News less than a week after the release that the leak “has to be an inside job,” as the data was on a CIA top secret network “not connected to any other network.”…

Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.

What makes this look real?
Program & office names, such as the JQJ (IOC) crypt series, are real. Only a cleared insider could know them.

Source: Manhunt underway for CIA ‘traitor’ who leaked ‘Vault 7’ to WikiLeaks – report — RT America

DR WILLIAM MOUNT: NSA Virus To Take Down Computers Worldwide??

https://www.youtube.com/watch?v=Y5f8NoQnJS4&feature=youtu.be

There has just been a huge  release of the Malware the NSA is currently using to shut down computers world wide.

In a fairly recent story brought forth by The Intercept and Sorcha Faal It was revealed by Matthew Hickey of Hacker House that these NSA created Malwares are capable of shutting down every computer in America.

Further – many of them are currently targeting the Western Banking System and the SWIFT System – which used to control all trades world wide until 13 days ago when the Russian National Bank opened it’s first bank in Beijing and began trading using the Chinese CHIPS System.

These Malware Viruses are expected to shut down all Non-Windows 10 computers – gee – go figure – forcing the public to update all of their operating systems.

Further – these NSA Malware programs are allowing the targeting off all media the NSA/CIA/FBI do not agree with – Kind of like when the Satanic NAZIs shut down all news papers on Germany not loyal to the NAZI cause of mass murder.

Now Face Book is using these Malwares to shut down all of those who are supporting the election of Marine Le Pen – an Anti-Satanic NAZI candidate for president – in the election in France.

What can you do to avoid being shut down?

Download an Anti-Malare program like Spy-Bot and use it daily.

Download a good Anti-Virus Program and use it daily.

If you get infected by a New NSA Virus or Malware – shut your computer off for a couple of days. When you turn it back on download all Anti-Virus updates and anti-Malware updates, turn off the internet, and run the programs.

Sometimes it takes a couple of days for these Anti-Virus and Anti-Malware programs to catch up with the latest CIA/NSA/FBI viruses and malwares.

What is really happening is that the NSA/CIA/FBI have lost control of the Internet and are now trying to shut down all who tell the truth and sponsor their own websites on the internet to feed you pure, unadulterated lies…

Source: DR WILLIAM MOUNT: NSA Virus To Take Down Computers Worldwide??

WikiLeaks releases ‘Hive’, latest in #Vault7 series — RT News

WikiLeaks has released ‘Hive’, the fifth installment in a series of leaks exposing alleged CIA hacking techniques known as ‘Vault 7’. The latest batch consists of six documents.

WikiLeaks describes Hive as a “back-end infrastructure malware with a public-facing HTTPS interface,” used to transfer information from machines targeted by the CIA and to allow commands to be communicated in order to execute specific tasks on those machines.

To hide the presence of such malware, WikiLeaks notes that the public HTTPS interface (a protocol for secure communication over a computer network within an encrypted connection) “utilizes unsuspicious-looking cover domains,” meaning those targeted would be unaware of the CIA’s interference.

WikiLeaks notes anti-virus companies and forensic experts have noticed “possible state-actor” malware using similar back-end infrastructure, but were unable to connect the back-end to CIA operations.

READ MORE: WikiLeaks ‘hostile intel,’ Assange & his followers ‘demons’: CIA chief goes ballistic

The Hive documents released Friday may allow experts to examine this kind of communication between malware implants and backend servers, WikiLeaks says.

The CIA’s Hive project was created by its Embedded Development Branch (EDB). This branch was also responsible for projects detailed in WikiLeaks’ ‘Dark Matter’ leak, revealing the CIA’s attacks on Apple firmware.

: WikiLeaks releases ‘Dark Matter’ batch of CIA hacking tactics for Apple products https://on.rt.com/86rt 

A 2015 User Guide reveals the initial release of Hive was in 2010, and describes the software implant as having two primary functions – a beacon and interactive shell. Both are designed to provide an initial foothold to deploy other “full featured tools.”

Source: WikiLeaks releases ‘Hive’, latest in #Vault7 series — RT News

Hacker Group Releases Password To NSA’s “Top Secret Arsenal” In Protest Of Trump Betrayal | Zero Hedge

Last August, the intel world was abuzz following the news that a previously unknown hacker collective, “The Shadow Brokers” had hacked and released legitimate hacking tools from the NSA’s own special-ops entity, the “Equation Group”, with initial speculation emerging that the Russians may have penetrated the US spy agency as suggested by none other than Edward Snowden. The Shadow Brokers released a bunch of the organization’s hacking tools, and were asking for 1 million bitcoin (around $568 million at the time) to release more files, however failed to find a buyer.

Attention then shifted from Russians after some speculated that the agency itself may be housing another “mole” insider. At the time, a former NSA source told Motherboard, that “it’s plausible” that the leakers are actually a disgruntled insider, claiming that it’s easier to walk out of the NSA with a USB drive or a CD than hack its servers.” As famed NSA whistleblower William Binney – who exposed the NSA’s pervasive surveillance of Americans long before Snowden confirmed it – said, “My colleagues and I are fairly certain that this was no hack, or group for that matter, This ‘Shadow Brokers’ character is one guy, an insider employee.”

In a subsequent Reuters op-ed by cybersecurity expert James Bamford, author of The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America, and columnist for Foreign Policy magazine, he said that seemed as the most probable explanation, and that Russia had nothing to do with this latest – and most provocative yet – hack.

Since then, the Shadow Broker group, whose origin and identity still remains a mystery, disappeared from the radar only to emerge today, when in an article posted on Medium, the group wrote an op-ed, much of it in broken English, in which it slammed Donald Trump’s betrayal of his core “base”, and the recent attack on Syria, urging Trump to revert to his original promises and not be swept away by globalist and MIC interests, but far more imporantly, released the password which grants access to what Edward Snowden moments ago called the NSA’s “Top Secret arsenal of digital weapons.”

The article begins with the group explaining why it is displeased with Trump.

Don’t Forget Your Base

Respectfully, what the fuck are you doing? TheShadowBrokers voted for you. TheShadowBrokers supports you. TheShadowBrokers is losing faith in you. Mr. Trump helping theshadowbrokers, helping you. Is appearing you are abandoning “your base”, “the movement”, and the peoples who getting you elected.

Good Evidence:

#1—Goldman Sach (TheGlobalists) and Military Industrial Intelligence Complex (MIIC) cabinet
#2—Backtracked on Obamacare
#3—Attacked the Freedom Causcus (TheMovement)
#4—Removed Bannon from the NSC
#5—Increased U.S. involvement in a foreign war (Syria Strike)

The peoples whose voted for you, voted against the Republican Party, the party that tried to destroying your character in the primaries. The peoples who voted for you, voted against the Democrat Party, the party that hates, mocks, and laughs at you. Without the support of the peoples who voted for you, what do you think will be happening to your Presidency? Without the support of the people who voted for you, do you think you’ll be still making America great again? Do you be remembering when you were sitting there at the Obama Press Party and they were all laughing at you? Do you be remembering when you touring the country and all those peoples believed in you and supported you? You were those peoples hope. How do you be thinking it will be feeling when those people turn on you? Will they be laughing at you, hating you, and mocking you too?

TheShadowBrokers doesn’t want this to be happening to you, Mr. Trump. TheShadowBrokers is wanting to see you succeed…

Source: Hacker Group Releases Password To NSA’s “Top Secret Arsenal” In Protest Of Trump Betrayal | Zero Hedge

Do you have a Windows Computer? Wikileaks is WARNING all CUSTOMERS with THIS Latest Release — NESARA-NEWS

Today, April 7th 2017, WikiLeaks releases Vault 7 “Grasshopper” — 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.CIA malware re-installs itself every 22 hours by corrupting Windows Update – even if disabled. The documents WikiLeaks publishes today provide an insights into the process…

Schermata 2017-04-07 alle 18.37.18

via Do you have a Windows Computer? Wikileaks is WARNING all CUSTOMERS with THIS Latest Release — NESARA- REPUBLIC NOW – GALACTIC NEWS

Susan Rice Unmasks Then Bang Wikileaks Drops Another Log on the Fire! 

By Lisa Haven

Earlier this year it was revealed by Julian Assange, Wikileaks, via their Vault 7 release, that the CIA created a secondary NSA surveillance system—one with less oversight than that of the NSA. It was also discovered that the CIA could implant virtual forensic fingerprints on computers and frame someone for a crime they didn’t commit, through a project known as UMBRAGE. Furthermore, Wikileaks revealed how the CIA could remotely take over the controls on vehicles and cause undetectable assassinations.

A few weeks later Wikileaks placed another nail in the CIA coffin with their release of Dark Matter, a program which proves they are implanting technology in iPhones during their creation. Meaning all the CIA has to do is access the “chip” to hear any and everything you are saying.

Now, as of March 31st, Wikileaks dropped yet another section of the Vault 7 files with their latest release of Marble Framework. Here’s more on this report…

Source: Susan Rice Unmasks Then Bang Wikileaks Drops Another Log on the Fire! | Police State

Steve Pieczenik: Vault 7 Is Aimed To Take Down CIA

Published on 18 Mar 2017

SUBSCRIBE to see more similar videos https://goo.gl/scaine

Most Recent Upload https://goo.gl/lPjw8n

NSA Attempted to Block This—Insider Leaks Plans for…Can’t Say More! Dave Hodges Reports

By Lisa Haven

 

“…the battlefield may no longer be limited to regions afar, but may include the U.S. homeland.”

That is the unnerving quote found in a government study titled “Unconventional Operational Concept and the Homeland.”

While America may not yet feel like we are living in the middle of a battlefield, we could very well become caught up in the coming battle many are projecting for the near future…at least that is what the Department of Defense wants citizens to believe.

The United States government has been significantly increasing their training preparations with massive military drills like Jade Helm and the stockpiling of ammo, guns, body armor and the like. The possibility of some type of crisis or the declaration of martial law could become reality a lot sooner than I would like to believe.

An additional concern is the pacification of society to militarized vehicles.

In the video below I interview Dave Hodges on the truth’s of martial law and ask the question, “will President Trump be forced into it?” All that and more below…

Source: NSA Attempted to Block This—Insider Leaks Plans for…Can’t Say More! Dave Hodges Reports | Alternative

White Hats Strike Back vs. The Shadow Government

https://www.youtube.com/watch?v=aDPMNOgOz4E

 

Vault7: WikiLeaks Reveals ‘Marble’ Tool That Can Frame Russia, China, & More For Cyber Attacks – Collective Evolution

Wikileaks just released another set of documents from Vault 7 that detail the CIA’s secret anti-forensic program, Marble Framework, which allows them to prevent forensic investigators from pinning hacking attacks, viruses, and trojans to the agency. It shows just how protected the CIA is from being held accountable for unethical or illegal actions. advertisement – learn moreAccording to Wikileaks, the program allows them to direct blame away from the CIA and onto another party by hiding fragments of texts that would allow the author of the malware to be identified…

Source: Vault7: WikiLeaks Reveals ‘Marble’ Tool That Can Frame Russia, China, & More For Cyber Attacks – Collective Evolution

Wikileaks Bomb! Bush Stopped Pedophile Investigations!

On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered “global intelligence” company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment laundering techniques and psychological methods…

https://www.youtube.com/watch?v=ppCabw0ruQE

https://www.youtube.com/watch?v=QH476wd2UEM

Source: Wikileaks Bomb! Bush Stopped Pedophile Investigations! | Alternative

Wikileaks Drops New Bombshell Against CIA! 

WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran.

This could lead forensic investigators into wrongly concluding that CIA hacks were carried out by the Kremlin, the Chinese government, Iran, North Korea or Arabic-speaking terror groups such as ISIS.

Prelude to a False Flag?

See the first video for the Wiki Bombshell Against CIA and see the second video for Wikileaks documentary…

https://www.youtube.com/watch?v=FGg-zVu5FnA

https://www.youtube.com/watch?v=3KPzab0SaU4

Source: Wikileaks Drops New Bombshell Against CIA! (Video) | Prophecy

Immortality and exponential expansion into the universe will come after final cabal defeat

Last week somebody hacked into my computer so that the video at the link below started playing as soon as I turned it on. It purports to show the destruction of the Black Night Satellite that many people in US intelligence agencies like the NSA insist has been stopping humans from leaving the planet earth.

https://youtu.be/Ge_oAywLRWE

https://www.youtube.com/watch?v=Ge_oAywLRWE&feature=youtu.be

This news coincides with announcements by NASA of age reversing pills and faster than light travel technology that will allow us to go to visit newly discovered earth like planets.

Scientists have made a discovery that could lead to a revolutionary drug that actually reverses ageing. A team of researchers developed the drug after discovering a key signalling process in DNA repair and cell ageing

http://www.dailymail.co.uk/sciencetech/article-4343142/Human-trials-age-reversing-pill-start-six-months.html

NASA digital illustration handout released on February 22, 2017, all seven planets discovered in orbit around the red dwarf star TRAPPIST-1

http://www.sciencetimes.com/articles/9507/20170228/nasa-researches-on-how-to-travel-faster-than-light-after-discovering-trappist-1.htm

CIA sources are also saying a secret presidential order was given to release free energy technology as well as existing anti-aging technology.

The only thing that is blocking humanity from this future of immortality and exponential expansion into the universe is now a small group of people clinging to control of financial computers at the Federal Reserve Board, the Bank of Japan, the European Central Bank and the BIS. These computers need to be physically seized in order to allow the issuance of unlimited funds to let humanity spread its wings and fly.

The individuals who have been forensically identified as blocking the funding for a new age are Janet Yellen at the Fed, Mario Draghi at the ECB, Haruhiko Kuroda at the BOJ and Agustin Carstins at the BIS. Special Forces need to go and seize these individuals and occupy the computer centers at the central banks ASAP in order to ensure the liberation of funds for the planet earth.

If these computers and the parasites who control them are removed, multiple sources in various charitable foundations are saying that not just trillions but actual quadrillions of dollars could be released to finance an end to poverty and environmental destruction as well as research into immortality and unlimited expansion into the universe.

The battle against the controllers of the Babylonian debt slavery system these central banks oversee is continuing towards final victory. Former US President Barack Obama has vanished from public view and is probably undergoing interrogation. Also last week the body of Bill and Hillary Clinton’s long term associate Vincent Foster was exhumed and was found to have two bullet holes to the back of his head meaning the cause of his death was changed from suicide to murder. Pentagon and CIA sources say this finding will lead to the Clintons being prosecuted for murder.

http://newsfeedhunter.com/autopsy-results-from-vince-fosters-exhumed-body-cause-of-death-to-be-changed/

The death of the big Kahuna, David Rockefeller, was also formally announced last week by his family. CIA sources say Rockefeller was kept in stasis in a vegetative state for months at an Antarctic base before the family finally gave up and announced he was no longer with us.

When this writer was first informed by the Japanese authorities of a plot by the Western elite to kill 90% of humanity through disease, starvation and nuclear war, they handed me material showing that Rockefeller sat at the head of the Bilderberg Group, the Council on Foreign Relations and the Trilateral Commission and other top groups of Western power brokers. Thus he was a prime suspect as the originator of this fiendish plan.

However, when I actually met Mr. Rockefeller I had the impression that, deep inside, this man thought he was doing good for the planet. The question that upcoming truth and reconciliation investigators need to answer now is how was how his vision for a united planet earth in harmony with nature got distorted into a nightmarish genocidal plan.
The forensic trail that started with Rockefeller led to…

The full report will be posted in 3 days

Source: Immortality and exponential expansion into the universe will come after final cabal defeat

Wikileaks Releases “NightSkies 1.2”: Proof CIA Bugs Your “Factory Fresh” iPhones » The Event Chronicle

The latest leaks from WikiLeaks’ Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers.  The full documents are expected to be released after a 10 a.m. EDT “press briefing” that WikiLeaks promoted on its Twitter.

Here is a live stream of the press briefing with Julian Assange:

And here is the full press release from WikiLeaks:

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

Source: Wikileaks Releases “NightSkies 1.2”: Proof CIA Bugs Your “Factory Fresh” iPhones » The Event Chronicle

Steve Pieczenik: Neocons Want To Destroy America » Alex Jones’ Infowars: There’s a war on for your mind!

MARCH 24, 2017. Dr. Steve Pieczenik explains how the Neocons are attempting to destroy America as well as what he thinks about Supreme Court nominee Neil Gorsuch.

https://youtu.be/OxnwhW8WVss

Source: Steve Pieczenik: Neocons Want To Destroy America » Alex Jones’ Infowars: There’s a war on for your mind!

WikiLeaks #Vault7 shows CIA has been infecting supply chains for at least 8 years

via WikiLeaks #Vault7 shows CIA has been infecting supply chains for at least 8 years — NESARA- REPUBLIC NOW – GALACTIC NEWS

WIKILEAKS’ ‘DARK MATTER’ DUMP SHOWS CIA’S IPHONE, MACBOOK HACKS

CIA documents published by WikiLeaks Thursday reveal hacks used by the agency against Apple cellphones and computers.

Dubbed “Dark Matter,” the documents, a new addition to WikiLeaks’ ongoing “Vault 7” dump, detail hacks developed for iPhones and MacBooks as far back as 2008.

“These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware,” a WikiLeaks press release says.

By targeting the firmware, CIA hackers can remain in control of an infected device even if the target wipes the data and re-installs the operating system.


One such tool, known as “Sonic Screwdriver,” is, according to the CIA, a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting…”

By providing a target with a compromised peripheral device such as an Apple Thunderbolt-to-Ethernet adapter, which stores “Sonic Screwdriver” in its firmware, the CIA can gain persistence “even when a firmware password is enabled” on the target computer.

A 2008 document discussing an attack on iPhones, called “NightSkies,” reveals a malicious implant that would be physically installed on a new device. One method of deploying the hack could potentially involve intercepting an iPhone before it reaches a target.

“The tool operates in the background providing upload, download and execution capability on the device,” the document states. “NS is installed via physical access to the device and will wait for user activity before beaconing.”…

via WikiLeaks’ ‘Dark Matter’ Dump Shows CIA Hacks Against iPhones, MacBooks — Infowars

a part of the movement to Truth!