The NSA Worked to “Track Down” Bitcoin Users, Snowden ...

Bitcoin mentioned around Reddit: The NSA Worked to “Track Down” Bitcoin Users, Snowden Documents Reveal /r/conspiracy

Bitcoin mentioned around Reddit: The NSA Worked to “Track Down” Bitcoin Users, Snowden Documents Reveal /conspiracy submitted by HiIAMCaptainObvious to BitcoinAll [link] [comments]

I've been sharing conspiracies on reddit longer than this sub has been around. I have a story to tell.

This story is mostly crafted from my own experiences, my conversations with some of the people involved, and the rest is my own guesswork as I try to fill in the gaps...so bear with me!
That's why I wanted to share with this community, which I've watched grow over the years. I remember posting about the death of Barry Jennings (who witnessed explosions in the WTC on 9/11) the day after it happened. This was before /conspiracy (or right around when it was formed), and I remember thinking "we really need a sub for conspiracies on reddit!"
And here we are, 12 years later and over 1.3 million subscribers...incredible!
So...
My story starts with a young man. We'll call him Andrew.
Andrew grew up in the 90's in a coastal US town and quickly blossomed into a tech whiz at a young age.
He began building his own computers, and after a brief stint using Windows, he decided that Bill Gates was everything wrong with technology (and the world), and he made it his mission to make sure folks like Gates were NOT the future of computers.
He really believed that the use of technology was a fundamental human right, and that charging people for "proprietary" OS's that hid their source code was a violation of these rights.
He saw a possible Deus Ex-like future, with a technocracy literally around the corner if we didn't act now.
Andrew soon joined the Free Software Foundation and began rubbing elbows with the likes of Richard Stallman. He begun exclusively using GNU/Linux and was the type to correct you if you called it just "Linux". He also began visiting tech-savvy forums like slashdot and started networking in earnest.
By 2006 (his senior year of high school) Andrew was completely over his "education" and decided to just drop out completely.
Shockingly, a college accepted him anyway. A small East Coast school had been actively courting Andrew, and when they learned he had failed to get his HS diploma, they accepted him anyway!
Now sometime during this period Andrew went to Iceland and stayed in Reykjavik for several months.
This trip may have happened during the summer, fall, or early winter of 2006. The reason for his trip had something to do with his efforts in the FSF or similar group. The possible significance of this trip will become clear as we go on.
What is clear is that Andrew started college in the fall of 2006, and that the circumstances were unusual. Andrew soon met several like-minded individuals and began building a social and technological network at his school.
Two individuals in particular would become key players in his life (one more prominently in this story, but the other was significant as well), and eventually the 3 would live together in town for several years.
But for now let's stick with Andrew.
Andrew had an idea to build a social network for his college. Except, it wasn't just a network, it was a wiki for information about the school...and beyond. Soon, it began to morph into something much bigger in Andrew's mind.
He saw his project as being one of many data "hubs" for leaks of important documents and otherwise sensitive information.
So yeah, he saw the opportunity for a wiki for leaks (see where this is going yet...?).
As his ambitions grew, his behavior started to become increasingly erratic. He was caught with drugs and arrested. Strangely, the charges were pretty much dropped and he was given a slap on the wrist. Eventually he decided to leave the school, but still lived in town and had access to the servers on campus.
By 2010 Andrew was still living in the small town with his two "hacker" buddies, who were still enrolled at the school.
This house was in some ways legendary. It appears that many "interesting" people spent time at or visited the residence. Indeed, some of the early movers and shakers of /conspiracy itself passed through.
There was usually a full NO2 tank for anyone who was into that kinda thing, and they were stocked with every hallucinogen and research chemical known to man.
It was also likely under surveillance by multiple intelligence agencies (NSA/Mossad/etc).
Over time, the mental state of Andrew was slowly starting to deteriorate, which wasn't helped by his abuse of drugs.
Still, Andrew decided to move his base of operations to Europe, spending time in Belgium, the Czech Republic and elsewhere.
One of his housemates was soon to join him on his adventures in Europe and elsewhere abroad. We'll call him "Aaron."
Aaron had a very similar story and upbringing as Andrew. Aaron was also from a coastal US town and was born into privilege. He was also, supposedly, born into a family with some serious connections to intelligence agencies, including an uncle with ties to the NSA, and both parents connected to military brass.
By 2015, Andrew and Aaron were living together in the Czech Republic. During this time they were working directly and/or indirectly for the NSA (via Cisco and other companies).
You see, the "college" they met at was actually a front for the recruitment of kids into the IC. Apparently, many "schools" in the US function that way. Go figure.
Their intelligence and valuable skill set (hacking etc) made them valuable assets. They were also possibly involved with the distribution of certain "research chemicals" (of the 2C* variety) to dignitaries and their entourages (in one example, they provided 2CB to a group with David Cameron).
In addition, Andrew was allegedly involved with, or stumbled upon, an NSA-linked surveillance project directed at the entire country of Malaysia, while Aaron was involved with Cisco.
Aaron himself had gotten into hot water for releasing damaging information about the NSA, and even claimed to be an NSA whistleblower, and was also possibly the individual who leaked the 2014 (or 2015) Bilderberg meeting list.
And then things went bad. Andrew quit the Malaysia project and Aaron left Cisco. It seems Andrew and Aaron were "set up" during a fiery false flag event in the Czech Republic in 2015. It may have happened at an embassy, but it's unclear which. There is no information on the web about anything like this (afaik).
Aaron was immediately targeted and spent several years on the run. Allegedly, he was added to the list of victims in the so-called "Great Game".
The Great Game is the term used for an international assassination program where intelligence agencies share a list of targets to be neutralized. The German BND and Mossad are heavily involved, as other networks. Individuals targeted by the Great Game may be offed by actual assassins, or by NPC-like humans whose minds will be influenced by mind control tech (a la Matrix...say influencing someone to ram your car unwittingly ie).
As Aaron went on the lam, Andrew soon returned to the US, shell-shocked by his experience.
Both Andrew and Aaron continue to suffer from some sort of PTSD from these series of events, rendering Andrew largely incapacitated and Aaron scattered and discombobulated.
The Meat of the Matter
OK...where does that leave us? Why am I sharing all of this? I think there's much more to this story.
So let's start speculating! Everything I'm about to say is stuff that was told to me personally. I can't vouch for any of this information, though obviously I thought it was compelling enough to share.
Here's the gist: The so-called whistleblowers you see in the media are almost all fake.
This includes: Edward Snowden, Julian Assange, Thomas Drake and William Binney (hey look, his AMA is pinned on this sub right now...no comment!). These individuals, and others, are controlled opposition. The real whistleblowers are severely punished.
For example, Bradley Manning was punished with chemical castration in jail. His "transformation" was chemically induced torture.
Andrew was not alone in his passion. There were lots of other young visionaries like him who dreamed of a freer and more transparent world.
In this story, Julian Assange was an intelligence asset...a psyop meant to steal the thunder from real activists like Andrew.
In this story, a small college-based "wiki" for government leaks was used as the model for an intelligence operation known as "wikileaks".
In this story, Andrew traveled to Iceland at some point in 2006.
When was Wikileaks founded? Wikileaks was founded by Julian Assange in December 2006, in Iceland.
Aaron discovered (legally, like Manning who had clearance to access all the data he leaked) damning information about surveillance happening by the NSA, specifically against recruits entering the US army and elsewhere.
In this story, the "Andrew" identity was co-opted and turned into "Julian Assange", and "Aaron" became "Edward Snowden".
Granted, there were probably other people that these whistleblower imposters were modeled after, but Andrew and Aaron seem like very strong contenders for some of this inspiration.
Now, much of the following may be gobbledygook (lol I spelled that right first try!) for all I know, but since I'm having a really hard time making sense of it all, I'll just include everything I can and let you guys run with it.
Here are some phrases, ideas, terms and people of note that may be involved with this story...MODS: None of this is doxing! All of the links of people are wikipedia pages or published interviews/articles. So yeah. Not dox!
IN CONCLUSION
I don't know how these terms, theories and individuals fit into this story, but that they may be somehow related.
Hopefully there are enough bread crumbs in here to keep some of you busy!
Any help/insight would be appreciated. I confess I'm not so tech-minded so I can't offer any more explanation about some of the more techy terms.
Anyway, thanks for reading, and thanks for continuing to stimulate after all these years! It's really nice to see this place continuing to thrive after all of this time!
submitted by oomiak to conspiracy [link] [comments]

Identifying members of the New Gaurd

There seems to be an agreement among many conspiracy theorists, that Trump being a Mob boss puts him in play as different family (13 families) than the currently existing satanic pedophiles. So instead of looking at them as families I have started looking at these families as individual secret societies. Mind you these are long games, played out over decades and centuries.
From this point the breakdown of who operates and runs each society is imperative to understanding them. If we look at Hitler we find the Rothschilds connections to him, and can safely assume that the nazi's brought to the United States through operation paperclip are also tied in with this family.
Seeing how much space has been sensationalized with such little exploration, controlling the space narrative seems to be crucial for manipulating the masses. Warrener Von Braun as a founder of NASA with relation to the Nazi's and the Rothschilds. Space is obviously an essential control peace. We now see Elon Musk coming through to take control of this narrative through space X. Remember "the car looks so fake, thats how you know it's real. Since hes already categorized as the space man, nobody gives a second thought to him launching thousands of low orbital satellites. Allowing him to place in the surveillance grid, an effective and crucial leverage of control of the new guard. Potentially putting Elon in as a member of the new guard.
We also have Edward Snowden, releasing his revelations on the NSA. Which gave way to "Q team" headed up by General Flynn within the NSA to investigate what Snowden revealed. After the 4th of July video tweet by Flynn, doing the WWG1WGA phrase it confirmed Flynn's placement within "Q." Snowden also seemed to have a pretty free life within Russia where his level of anonymity and location have never seemed to be a concern. We also have Russia who has kicked the Rothschilds central banks out of their countries ever since collapse of the USSR. Not confirmed but there seems to be significant supporting evidence to Flynn, Snowden, & Putin being apart of this new guard.
Lastly and most important but the biggest unknown is Satoshi Nakamoto. Arguably the single biggest hater of the Rothschilds central banking cabal. Here's the stretch, Satoshi is actually Julian Assange. Through the syntax of the posts written by satoshi we are lead to believe Satoshi is either British or Australian. Checking the boxes. We also have the timelines, Satoshi's last post was December 2011. With Assange going on the run early 2012. Bitcoin had to exist with a market value price for assange and wikileaks to exist. Since the United States controls international transactions through SWIFT and has massive leverage among banks, they were able to shut down Assange from the current financial system. Bitcoin was neccessary for him to succeed and everything he uncovered was harmful towards the central banks. Now with his extradition coming up to blow the lid off Russiagate and Seth Rich. Effectively making him a crucial role to the whole takedown and putting him within the new guards secret society.
Elon paying homage back to Tesla, after learning that John Trump and Nikola were friends with each other, plus watching Elons biggest baby of solar energy as the take over, uprooting the oil industries, seems all too coincidental to not be a complete plan that had been laid out for a long time. The new gaurd has been working at putting the technocracy in place for years. Including Elons grandfather in Canada trying to put the technocracy in place. At the end of TFH podcast episode 377 there was talk of no more government and just corporations. With 5g, starlink & nuerolink there is no need for governments. Safety will be covered through the surveillance grid, bankers are unnecessary because of bitcoin & potentially defi (decetralized finance), and that's all government is good for in most minds anymore, even if they suck at it, government is there for our "protection".
The world is ripe for the last gaurd to take over before it becomes impossible to take them over. Hopefully this makes sense
submitted by HazelHazee_OF to conspiracy_commons [link] [comments]

News from the Frontline.

First and foremost, I want to thank you all. This past year has been an unforgettable experience. I have the highest of hope for the future.

The near future.

With that said, I have to say "good bye, Reddit" to a certain degree. I will still try to participate in the forums as much as I can, but I'm afraid I will be shadow banned soon if I haven't been already, and this type of censorship makes the environment in reddit not suitable for what I wanted to learn from there, or what I wanted to share with the community. I've done most of what I had to do in the forums at this point. I might edit and polish the project over time, but for the most part, that area of the work has peaked and will begin its decay, so I will concentrate all my efforts on this platform.

To the point.

I prevoiusly wrote on the emergence of a system of truth, and the not so secret war being fought right now.

Consider this your call to action: WHAT SIDE OF HISTORY DO YOU WANT TO BE IN?

Because from now on, it all goes on the record.

It's easier to notice in a forum like conspiracy, but wherever you find comments, you will undoubtedly find individuals waking up. Everyone is asking questions and demanding the truth. The people not only have spoken, they continue to shout throughout the world while taking action. In both the digital and real world the concensus is clear.

WE WILL NOT ACCEPT THEIR LIES.
Not anymore.
Who THEY are is complicated, but what THEY have done is not. Reality is that right now the world is s dumpster fire. Nothing new here. It's been that way for a very long time. Today however is the first time we get to watch and interact with it live. There's layers of bullshit agendas we need to peel before we get to see the truth on main stream media, but every time we log in to a place like reddit or 4chan and argue, something interesting happens. We begin creating a consensus. Humans are fast learners, and we are getting really good at filtering the information force fed to us compared to the information we dig up. That allows all of us to take action and scrutinize what is happening througout the world in real time. I have cited this example over and over, and as the topic picks up more and more momentum, we are starting to finally see the implications, but more than anything, the repercussions.

#EpsteinDidntKillHimself: It is forcing the American governement to scramble in what is OBVIOUSLY a coverup. It can't be ignored by the media. It is forcing mistakes. No matter what side of the aisle you're in, there will be guilty members in both parties and only the blind followers won't accept that. It has GLOBAL implications to our Brittish brothers and sisters in their own government. Any civil servant that is not actively pushing to investigate THIS while in office needs to be reconsidered. Any media that ignores it, needs to be ignored too. This is a non-partisan issue that we can all get behind. It involves children being abused which I think we can all agree needs to be condemened by all of us. This needs to be a talking point in the U.S. election and daily talk show. It will be if we all continue to actively push for it by not letting it die. Unlike EPSTEIN who DIDN'T KILL HIMSELF.

My point is that the digital world we created and inhabit has allowed us to be more DEMOCRATIC, more HONEST, more CREATIVE than we ever have been in real life. All this happened organically AND without government oversight. We grow more and more powerful because our system uses the same rules they abused, but we have based it on truth. TRUTH that can't be denied. We are taking away THEIR usurped power, and they are scared. They are trying to censor and prevent our dialogue. They are doing everything possible to take control over the flow of information. They try to distract and intimidate and outright destroy, but they can't, because THE KNOWLEDGE OF THE WORLD BELONGS TO THE WORLD. If you ever dreamed that one day you would be called upon to save the day, this is it.

WE ARE FIGHTING BACK, AND WE NEED YOU!

To paraphrase Candidate Morty:

"I don't see a divide between Republicans and Democrats. The division I see is between the Political interests and Corporations that like the country divided, and the rest of us. I see it everywhere I go. I see it in our schools, where they teach our children we're all the same because they feel threatened by what makes us unique. I see it in our streets, where they give guns to the desperate. So we're too busy fighting each other to fight real injustice. I see it in our factories where individuals work for a fraction of their boss' salary. Even though they're twice as ethical and have the same qualifications. The Country's problem isn't homeless minorities or outraged veterans. The United States of America's problem is the Politicians and Corporations feeding on the people's suffering. But I've got a message for them, from the brothers and sisters keeping it alive. A message. From the American Patriots that believe in this Country, to the Politicians and Corporations that don’t: you're outnumbered."
So I ask you, if you've made it this far. Learn how to create anonymous and pseudonymous profiles. Actively participate in record keeping and investigating/scrutinizing the data that will continue to emerge. We are forcing them to make mistakes, and they can't keep up with how fast we are disseminating information, how quickly we are exposing the truth.
Never did I imagine that I would see our world truly change for the better. Now I know we can all be a part of it. See you around fellow travelers. Keep up the good work.
submitted by gte8lvl0 to conspiracy [link] [comments]

The NSA Worked to “Track Down” Bitcoin Users, Snowden Documents Reveal

The NSA Worked to “Track Down” Bitcoin Users, Snowden Documents Reveal submitted by yokouma to conspiracy [link] [comments]

"Satoshi Nakamoto" the mysterious creator of Bitcoin is no other than the CIA

Bitcoin has surged to all time highs, Who created Bitcoin, and why?
The creator of Bitcoin is officially a name, “Satoshi Nakamoto” – very few people believe that it was a single male from Japan. In the early days of Bitcoin development this name is associated with original key-creation and communications on message boards, and then the project was officially handed over to others at which point this Satoshi character never appeared again (Although from time to time someone will come forward saying they are the real Satoshi Nakamoto, and then have their posts deleted).
Bitcoin could very well be the ‘one world currency’ that conspiracy theorists have been talking about for some time. It’s a kill five birds with one stone solution – not only is Bitcoin an ideal one world currency, it allows law enforcement a perfect record of all transactions on the network. It states very clearly on bitcoin.org (the official site) in big letters “Bitcoin is not anonymous” :
Some effort is required to protect your privacy with Bitcoin. All Bitcoin transactions are stored publicly and permanently on the network, which means anyone can see the balance and transactions of any Bitcoin address. However, the identity of the user behind an address remains unknown until information is revealed during a purchase or in other circumstances. This is one reason why Bitcoin addresses should only be used once.
Another advantage of Bitcoin is the problem of Quantitative Easing – the Fed (and thus, nearly all central banks in the world) have painted themselves in a corner, metaphorically speaking. QE ‘solved’ the credit crisis, but QE itself does not have a solution. Currently all currencies are in a race to zero – competing with who can print more money faster. Central Bankers who are in systemic analysis, their economic advisors, know this. They know that the Fiat money system is doomed, all what you can read online is true (just sensationalized) – it’s a debt based system based on nothing. That system was created, originally in the early 1900’s and refined during Breton Woods followed by the Nixon shock (This is all explained well in Splitting Pennies). In the early 1900’s – there was no internet! It is a very archaic system that needs to be replaced, by something modern, electronic, based on encryption. Bitcoin! It’s a currency based on ‘bits’ – but most importantly, Bitcoin is not the ‘one world currency’ per se, but laying the framework for larger cryptocurrency projects. In the case of central banks, who control the global monetary system, that would manifest in ‘Settlement Coin’ :
Two resources available almost exclusively to central banks could soon be opened up to additional users as a result of a new digital currency project designed by a little-known startup and Swiss bank UBS. One of those resources is the real-time gross settlement (RTGS) system used by central banks (it’s typically reserved for high-value transactions that need to be settled instantly), and the other is central bank-issued cash. Using the Utility Settlement Coin (USC) unveiled today, the five-member consortium that has sprung up around the project aims to help central banks open-up access to these tools to more customers. If successful, USC has the potential to create entirely new business models built on instant settling and easy cash transfers. In interview, Robert Sams, founder of London-based Clearmatics, said his firm initially worked with UBS to build the network, and that BNY Mellon, Deutsche Bank, ICAP and Santander are only just the first of many future members.
the NSA/CIA often works for big corporate clients, just as it has become a cliche that the Iraq war was about big oil, the lesser known hand in global politics is the banking sector. In other words, Bitcoin may have very well been ‘suggested’ or ‘sponsored’ by a banker, group of banks, or financial services firm. But the NSA (as we surmise) was the company that got the job done. And probably, if it was in fact ‘suggested’ or ‘sponsored’ by a private bank, they would have been waiting in the wings to develop their own Bitcoin related systems or as in the above “Settlement Coin.” So the NSA made Bitcoin – so what?
The FX markets currently represent the exchange between ‘major’ and ‘minor’ currencies. In the future, why not too they will include ‘cryptocurrencies’ – we’re already seeing the BTC/EUR pair popup on obscure brokers. When BTC/USD and BTC/EUR are available at major FX banks and brokers, we can say – from a global FX perspective, that Bitcoin has ‘arrived.’ Many of us remember the days when the synthetic “Euro” currency was a new artificial creation that was being adopted, although the Euro project is thousands of degrees larger than the Bitcoin project. But unlike the Euro, Bitcoin is being adopted at a near exponential rate by demand (Many merchants resisted the switch to Euros claiming it was eating into their profit margins and they were right!).
And to answer the question as to why Elite E Services is not actively involved in Bitcoin the answer is that previously, you can’t trade Bitcoin. Now we’re starting to see obscure brokers offering BTC/EUR but the liquidity is sparse and spreads are wacky – that will all change. When we can trade BTC/USD just like EUUSD you can bet that EES and a host of other algorithmic FX traders will be all over it! It will be an interesting trade for sure, especially with all the volatility, the cross ‘pairs’ – and new cryptocurrencies. For the record, for brokers- there’s not much difference adding a new symbol (currency pair) in MT4 they just need liquidity, which has been difficult to find.
So there’s really nothing revolutionary about Bitcoin, it’s just a logical use of technology in finance considering a plethora of problems faced by any central bank who creates currency. And there are some interesting caveats to Bitcoin as compared to major currencies; Bitcoin is a closed system (there are finite Bitcoin) – this alone could make such currencies ‘anti-inflationary’ and at the least, hold their value (the value of the USD continues to deteriorate slowly over time as new M3 introduced into the system.) But we need to pay
Here’s some interesting theories about who or whom is Satoshi:
A corporate conglomerate
Some researchers proposed that the name ‘Satoshi Nakamoto’ was derived from a combination of tech companies consisting of Samsung, Toshiba, Nakayama, and Motorola. The notion that the name was a pseudonym is clearly true and it is doubtful they reside in Japan given the numerous forum posts with a distinctly English dialect.
Craig Steven Wright
This Australian entrepreneur claims to be the Bitcoin creator and provided proof. But soon after, his offices were raided by the tax authorities on ‘an unrelated matter’
Soon after these stories were published, authorities in Australia raided the home of Mr Wright. The Australian Taxation Office said the raid was linked to a long-running investigation into tax payments rather than Bitcoin. Questioned about this raid, Mr Wright said he was cooperating fully with the ATO. “We have lawyers negotiating with them over how much I have to pay,” he said.
Other potential creators
Nick Szabo, and many others, have been suggested as potential Satoshi – but all have denied it:
The New Yorker published a piece pointing at two possible Satoshis, one of whom seemed particularly plausible: a cryptography graduate student from Trinity College, Dublin, who had gone on to work in currency-trading software for a bank and published a paper on peer-to-peer technology. The other was a Research Fellow at the Oxford Internet Institute, Vili Lehdonvirta. Both made denials. Fast Company highlighted an encryption patent application filed by three researchers – Charles Bry, Neal King and Vladimir Oks­man – and a circumstantial link involving textual analysis of it and the Satoshi paper which found the phrase “…computationally impractical to reverse” in both. Again, it was flatly denied.
THE WINNER: It was the NSA
The NSA has the capability, the motive, and the operational capacity – they have teams of cryptographers, the biggest fastest supercomputers in the world, and they see the need. Whether instructed by their friends at the Fed, in cooperation with their owners (i.e. Illuminati banking families), or as part of a DARPA project – is not clear and will never be known (unless a whistleblower comes forward). In fact, the NSA employs some of the best mathematicians and cryptographers in the world. Few know about their work because it’s a secret, and this isn’t the kind of job you leave to start your own cryptography company.
But the real smoking Gun, aside from the huge amount of circumstantial evidence and lack of a credible alternative, is the 1996 paper authored by NSA “HOW TO MAKE A MINT: THE CRYPTOGRAPHY OF ANONYMOUS ELECTRONIC CASH”
The NSA was one of the first organizations to describe a Bitcoin-like system. About twelve years before Satoshi Nakamotopublished his legendary white paper to the Metzdowd.com cryptography mailing list, a group of NSA information security researchers published a paper entitled How to Make a Mint: the Cryptography of Anonymous Electronic Cash in two prominent places, the first being an MIT mailing list and the second being much more prominent, The American Law Review
The paper outlines a system very much like Bitcoin in which secure financial transactions are possible through the use of a decentralized network the researchers refer informally to as a Bank. They list four things as indispensable in their proposed network: privacy, user identification (protection against impersonation), message integrity (protection against tampering/substitution of transaction information – that is, protection against double-spending), and nonrepudiation (protection against later denial of a transaction – a blockchain!).
It is evident that SHA-256, the algorithm Satoshi used to secure Bitcoin, was not available because it came about in 2001. However, SHA-1 would have been available to them, having been published in 1993.
Why would the NSA want to do this? One simple reason: Control.
As we explain in Splitting Pennies – Understanding Forex – the primary means the US dominates the world is through economic policy, although backed by bombs. And the critical support of the US Dollar is primarily, the military. The connection between the military and the US Dollar system is intertwined inextricably. There are thousands of great examples only one of them being how Iraq switched to the Euro right before the Army’s invasion.
In October 2000 Iraq insisted on dumping the US dollar – ‘the currency of the enemy’ – for the more multilateral euro. The changeover was announced on almost exactly the same day that the euro reached its lowest ebb, buying just $0.82, and the G7 Finance Ministers were forced to bail out the currency. On Friday the euro had reached $1.08, up 30 per cent from that time.
Almost all of Iraq’s oil exports under the United Nations oil-for-food programme have been paid in euros since 2001. Around 26 billion euros (£17.4bn) has been paid for 3.3 billion barrels of oil into an escrow account in New York. The Iraqi account, held at BNP Paribas, has also been earning a higher rate of interest in euros than it would have in dollars.
The point here is there are a lot of different types of control. The NSA monitors and collects literally all electronic communications; internet, phone calls, everything. They listen in even to encrypted voice calls with high powered microphones, devices like cellphones equipped with recording devices (See original “Clipper” chip). It’s very difficult to communicate on planet Earth in private, without the NSA listening. So it is only logical that they would also want complete control of the financial system, including records of all electronic transactions, which Bitcoin provides.
Could there be an ‘additional’ security layer baked into the Blockchain that is undetectable, that allows the NSA to see more information about transactions, such as network location data? It wouldn’t be so far fetched, considering their past work, such as Xerox copy machines that kept a record of all copies made (this is going back to the 70’s, now it’s common). Of course security experts will point to the fact that this layer remains invisible, but if this does exist – of course it would be hidden.
More to the point about the success of Bitcoin – its design is very solid, robust, manageable – this is not the work of a student. Of course logically, the NSA employs individuals, and ultimately it is the work of mathematicians, programmers, and cryptographers – but if we deduce the most likely group capable, willing, and motivated to embark on such a project, the NSA is the most likely suspect. Universities, on the other hand, didn’t product white papers like this from 1996.
Another question is that if it was the NSA, why didn’t they go through more trouble concealing their identity? I mean, the internet is rife with theories that it was in fact the NSA/CIA and “Satoshi Nakamoto” means in Japanese “Central Intelligence” – well there are a few answers for this, but to be congruent with our argument, it fits their profile.
Where could this ‘hidden layer’ be? Many think it could be in the public SHA-256, developed by NSA (which ironically, was the encryption algorithm of choice for Bitcoin – they could have chosen hundreds of others, which arguably are more secure):
Claims that the NSA created Bitcoin have actually been flung around for years. People have questioned why it uses the SHA-256 hash function, which was designed by the NSA and published by the National Institute for Standards and Technology (NIST). The fact that the NSA is tied to SHA-256 leads some to assume it’s created a backdoor to the hash function that no one has ever identified, which allows it to spy on Bitcoin users.
“If you assume that the NSA did something to SHA-256, which no outside researcher has detected, what you get is the ability, with credible and detectable action, they would be able to forge transactions. The really scary thing is somebody finds a way to find collisions in SHA-256 really fast without brute-forcing it or using lots of hardware and then they take control of the network,” cryptography researcher Matthew D. Green of Johns Hopkins University said in a previous interview.
Then there’s the question of “Satoshi Nakamoto” – if it was in fact the NSA, why not just claim ownership of it? Why all the cloak and dagger? And most importantly, if Satoshi Nakamoto is a real person, and not a group that wants to remain secret – WHY NOT come forward and claim your nearly $3 Billion worth of Bitcoin (based on current prices).
Did the NSA create Satoshi Nakamoto?
The CIA Project, a group dedicated to unearthing all of the government’s secret projects and making them public, hasreleased a video claiming Bitcoin is actually the brainchild of the US National Security Agency.
The video entitled CIA Project Bitcoin: Is Bitcoin a CIA or NSA project? claims that there is a lot of compelling evidences that proves that the NSA is behind Bitcoin. One of the main pieces of evidence has to do with the name of the mysterious man, woman or group behind the creation of Bitcoin, “Satoshi Nakamoto”.
According to the CIA Project, Satoshi Nakamoto means “Central Intelligence” in Japanese. Doing a quick web search, you’ll find out that Satoshi is usually a name given for baby boys which means “clear thinking, quick witted, wise,” while Nakamoto is a Japanese surname which means ‘central origin’ or ‘(one who lives) in the middle’ as people with this surname are found mostly in the Ryukyu islands which is strongly associated with the Ry?ky? Kingdom, a highly centralized kingdom that originated from the Okinawa Islands. So combining Nakamoto and Satoshi can be loosely interpreted as “Central Intelligence”.
Is it so really hard to believe? This is from an organization that until the Snowden leaks, secretly recorded nearly all internet traffic on the network level by splicing fiber optic cables. They even have a deep-sea splicing mission that will cut undersea cables and install intercept devices. Making Bitcoin wouldn’t even be a big priority at NSA.
Certainly, anonymity is one of the biggest myths about Bitcoin. In fact, there has never been a more easily traceable method of payment. Every single transaction is recorded and retained permanently in the public “blockchain”. The idea that the NSA would create an anarchic, peer-to-peer crypto-currency in the hope that it would be adopted for nefarious industries and become easy to track would have been a lot more difficult to believe before the recent leaks by Edward Snowden and the revelation that billions of phone calls had been intercepted by the US security services. We are now in a world where we now know that the NSA was tracking the pornography habits of Islamic “radicalisers” in order to discredit them and making deals with some of the world’s largest internet firms to insert backdoors into their systems.
And we’re not the only ones who believe this, in Russia they ‘know’ this to be true without sifting through all the evidence.
Nonetheless, Svintsov’s remarks count as some of the more extreme to emanate from the discussion. Svintsov told Russian broadcast news agency REGNUM:“All these cryptocurrencies [were] created by US intelligence agencies just to finance terrorism and revolutions.”Svintsov reportedly went on to explain how cryptocurrencies have started to become a payment method for consumer spending, and cited reports that terrorist organisations are seeking to use the technology for illicit means.
Let’s elaborate on what is ‘control’ as far as the NSA is concerned. Bitcoin is like the prime mover. All future cryptocurrencies, no matter how snazzy or functional – will never have the same original keys as Bitcoin. It created a self-sustained, self-feeding bubble – and all that followed. It enabled law enforcement to collect a host of criminals on a network called “Silk Road” and who knows what other operations that happened behind the scenes. Because of pesky ‘domestic’ laws, the NSA doesn’t control the internet in foreign countries. But by providing a ‘cool’ currency as a tool, they can collect information from around the globe and like Facebook, users provide this information voluntarily. It’s the same strategy they use like putting the listening device in the chips at the manufacturing level, which saves them the trouble of wiretapping, electronic eavesdropping, and other risky methods that can fail or be blocked. It’s impossible to stop a cellphone from listening to you, for example (well not 100%, but you have to physically rewire the device). Bitcoin is the same strategy on a financial level – by using Bitcoin you’re giving up your private transactional information. By itself, it would not identify you per se (as the blockchain is ‘anonymous’ but the transactions are there in the public register, so combined with other information, which the NSA has a LOT OF – they can triangulate their information more precisely.
That’s one problem solved with Bitcoin – another being the economic problem of QE (although with a Bitcoin market cap of $44 Billion, that’s just another day at the Fed buying MBS) – and finally, it squashes the idea of sovereignty although in a very, very, very subtle way. You see, a country IS a currency. Until now, currency has always been tied to national sovereignty (although the Fed is private, USA only has one currency, the US Dollar, which is exclusively American). Bitcoin is a super-national currency, or really – the world’s first one world currency.
Of course, this is all great praise for the DOD which seems to have a 50 year plan – but after tens of trillions spent we’d hope that they’d be able to do something better than catching terrorists (which mostly are artificial terrorists)
submitted by PeopleWhoDied to conspiracy [link] [comments]

Dis-info Campaign Mega Thread

Hello,
I am going to run through some of the more prominent disinformation that has been thrown around in regards to Julian Assange and Wikileaks since the middle of October. This mega thread will hopefully dispel some of the more prominent and recurring arguments that have popped up over the last few months. If there is something here that needs to be added or was discussed incorrectly please let me know in the comments.
Edit: http://i.imgur.com/MfuN4tG.jpg
submitted by TrustyJAID to WhereIsAssange [link] [comments]

My theory: There was collusion, but Trump ripped off Russia in the deal and has us in a more serious situation than we think. A timeline.

I’m not usually a conspiracy theorist, but it all fit together too well to ignore. Feel free to poke holes in this, I’d like to be proven wrong.
The cold war never ended, it just moved online.
1991 - The cold war is declared over and the internet rises at a lightning pace. Much like the space program had before it. A cyberspace race. By nature of being the bulk of its inventors, the US is untouchable in cyber espionage. The NSA stockpiles all of the malicious code and secret vulnerabilities they can gather and rather than alert the world to them and help create fixes, they leave them active and turn them into tools for their agents to use against foreign powers. Eventually they also turn their attention inward and start using that software against their own people in a surveillance and manipulation program that dwarfs what the KGB had just been destroyed for doing.
2009 - Edward Snowden discovers the NSA running these programs and is outraged by the violation of rights and hypocrisy. He begins complaining in an attempt to get the system shut down and have our dirty little secret ended without national embarrassment. “I had raised these complaints not just officially in writing through email, but to my supervisors, to my colleagues, in more than one office. I did it in Fort Meade. I did it in Hawaii. And many, many of these individuals were shocked by these programs. They had never seen them themselves. And the ones who had, went, "You know, you're right. ... But if you say something about this, they're going to destroy you".
March 2011 – It’s discovered that the US military is developing software to create, spread and control social media sock puppet armies. They promise it’s to use against foreign enemies, we’re told that it’s illegal for them to use against US citizens. https://www.theguardian.com/technology/2011/ma17/us-spy-operation-social-networks
March 2013 - James Clapper blatantly lies to congress and denies the existence of the domestic surveillance program entirely. Snowden says this moment is when he realizes his hope is futile and May 2013 he begins releasing evidence of the collected data to expose the program and force it to stop, then waits out the storm in Hong Kong.
I believe Snowden had an insurance policy. Along with the surveillance data that he had planned to release, he stole an NSA toolkit that would not be released. A drive full of the nastiest bugs and backdoors the NSA could invent that would be released to the public in the event of his death. The US government wouldn’t dare risk it.
July 2013 – The public outrage over what’s been exposed should be astounding…but it’s not. It seems like no one cares. And at this point the NSA knows the toolkit has been stolen, it could destroy us. Desperate times call for desperate measures. The anti-propaganda law is repealed, freeing the US government to use propaganda against its own people. Those sock puppet armies are turned against us and it’s made to look like the majority of the US public doesn’t care about surveillance. Even South Park runs an episode in September mocking people’s indifference to the NSA. https://en.wikipedia.org/wiki/National_Defense_Authorization_Act_for_Fiscal_Year_2013#Smith-Mundt_Modernization_Act_of_2012
https://www.techdirt.com/articles/20130715/11210223804/anti-propaganda-ban-repealed-freeing-state-dept-to-direct-its-broadcasting-arm-american-citizens.shtml
http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/
A massive domestic spy program is uncovered and they get away with it. Snowden isn’t a national hero, no one cares and in mid June 2013 the US files charges against him. He took a shot at the king and missed. The US rescinds his passport and demands Hong Kong extradite him. He’ll use his stolen toolkit to avoid a death penalty.
Russia would have suspected Snowden had this insurance policy. They tell him to spite America, they’ll arrange a flight for him from Hong Kong to Ecuador despite his lack of passport, with just a short layover in Russia. The layover becomes permanent when they refuse to finish the flight due to that lack of passport. Russia tells him he now has a choice, hand over the toolkit or you’ll be killed here and your country won’t care. Russia doesn’t care if his death triggers the release, it’s their intention to do that anyway. He holds out for 39 days in the airport but on August 1st 2013 he caves, is given asylum in Russia and Russia is discretely given the master keys to the internet.
The NSA is in an impossible position. They should alert the world that their monster has escaped its cage and help us secure our systems from it. But to do that would be to admit an indefensible extent of surveillance and now manipulation they themselves had carried out for years. The people would overthrow them immediately. In addition, every vulnerability they fix removes it from Russia’s arsenal but also from their own. I suspect they were using some of those vulnerabilities to sabotage the North Korean missile and Iranian nuclear programs. To fix them now would be to let those programs progress unhindered. I suspect this sort of catch-22 is how the Obama administration originally justified the surveillance to itself. And so the US does nothing.
Russia now has almost unfettered access on the internet, a backdoor on every computer manufactured before that date. I believe their Kompromat program became limitless. I believe they gathered every secret that existed to be found, on every member of our government and corporate world and what couldn’t be found could be planted. I’ll reference this again on *April 8 2016. *
February 2014 - Emboldened by our silence Russia moves to take Crimea 6 months later. We do not stay silent.
March 2014 - Obama uses Crimea as a cover to impose crippling sanctions on Russia. It cuts their currency and GDP in half.
November 2014 - Sony suffers a massive hack. Supposedly, by North Korea in retaliation over a Seth Rogan movie. It’s embarrassing but mostly inconsequential. North Korea denies involvement, no one believes them. I believe it’s a message from Russia. “We have the weapon and we know how to use it.”
February 2015 – Kaspersky Labs, a Russian company, exposes to the world how deeply the NSA’s infiltration has gone. All hard drives have been shipped with an NSA backdoor preinstalled. http://www.businessinsider.com/r-russian-researchers-expose-breakthrough-us-spying-program-2015-2
Through 2015 Microsoft makes an oddly strong push to get us all to update to Windows 10. Even bootleggers can get a free upgrade. A disguised evacuation from the badly compromised XP, 7 and 8? Or pushing a new OS into the world to give the NSA a new playing field to regain an advantage on?
I suspect Putin now reaches out to Robert Mercer, financier of data mining company Cambridge Analytica. He offers to make Mercer an American oligarch. Putin will provide the most advanced data gathering tools the NSA could create, Mercer will use them to collect data that lets his candidates target voters with uncanny accuracy and win elections. Kushner later raves about the complexity of their marketing system. https://www.forbes.com/sites/stevenbertoni/2017/05/26/jared-kushner-in-his-own-words-on-the-trump-data-operation-the-fbi-is-reportedly-probing/#619dd401a90f
At the same time, Mercer will share that data with Putin who then uses botnets and other illegitimate means to influence the same voters, in the same direction, but without being visibly connected to the candidate. Later there will be controversy over a server in Trump Tower communicating with a Russian bank. I believe this is that sharing. http://www.cnn.com/2017/03/09/politics/fbi-investigation-continues-into-odd-computer-link-between-russian-bank-and-trump-organization/index.html
In 2015 Cambridge Analytica first backs Ted Cruz. The most hated man in DC and a proven track record of bringing the system to a grinding halt. The obvious choice. But Trumps bombastic personality and Cruz’s lack of one threatens the plan. In December 2015 when a Quinnipiac poll shows Cruz in second place behind Trump, Cambridge Analytica promptly dumps Cruz and picks up Trump. Sometime later Trump paranoidly projects that the only way Hillary can win is by rigging the election.
July 2016 - Trump wins the Republican nomination.
August 2016 - A hacker group called The Shadow Brokers makes the news. I believe this is Putin finally flaunting to the world what he’s done. They tell us they’ve stolen a toolkit from The Equation Group, who have been suspected to be the NSA. The files in the toolkit are NSA but only as recent as 2013, a few months after Snowden’s departure. I suspect the file dates were altered just enough to give Snowden deniability. They release half of them to the public as proof. It’s bad, we’re warned that a lot of horrible malware will come from this for years to come. And now that the code is public, those attacks could plausibly come from anyone. The other half is kept encrypted, promised to be worse, and they comically struggle and fail to sell it on the black market. No one seems willing to touch it.
November 2016 - Our election is hit by an unprecedented number of attacks. 5 per second 24 hours a day in Illinois. 150,000 total in South Carolina. 39 states altogether. Everyone who was anyone took Putin’s free gift and hit us with it. https://www.engadget.com/2017/07/17/south-carolina-150-000-election-day-hacking-attempts/
Trump wins the election.
His first, maybe only job, is to lift the sanctions. Russia needs it done yesterday. Instead, Trump immediately gets into a fight with the media over the size of his inauguration crowd and makes a wild claim of 3 million illegal votes.
I believe Cambridge Analytica using NSA tools, had the ability to analyze every American voter’s online habits and predict their vote. I believe they promised Trump a win over Hillary and gave him a very specific vote count. When Hillary wins the popular vote with 3 million more votes, Trump is paranoid that she must have added her own fake votes which threw his prophesized number. And maybe she did. But with no evidence that he can admit to the rest of us, Trump blames it on illegal immigrants and starts demanding voter information so that he can compare the numbers.
This eats Trumps fragile ego alive. For eternity his legitimacy will be questioned in history books. Trumps attitude toward Russia sours. “You promised me a win and cost me the popular vote, our deal is void.” Trump does what he’s done to so many of the people he’s worked with before and decides he’s not going to pay his end of the deal. He busies himself putting Gorsuch on the SCOTUS, the beginnings of his wall and an immigration ban, ignoring Russia publicly and privately.
The cold war warms up.
January 23 – Trump appoints Ajit Pai to head the FCC. He is hell bent on reversing net neutrality laws, making it legal to throttle or block websites to citizens. Later, congress claims this was a direct order from Trump. Along with being able to predict how people will vote based on their browsing habits, they’ll now be able to directly influence those browsing habits. https://techcrunch.com/2017/08/06/10-members-of-congress-rake-fcc-over-the-coals-in-official-net-neutrality-comment/
February 9 – Jeff Sessions is made Attorney General to defend Trump from both an angry Russia and angry Congress. He’ll later recuse himself and Trump will state that if he had known that he wouldn’t have hired him in the first place.
February 10 – Russia considers giving Snowden to US as a gift. https://www.cnbc.com/2017/02/10/russia-eyes-sending-snowden-to-us-as-gift-to-trump-official-tells-nbc-news.html
February 13 – Trump seemingly is not interested. Michael Flynn’s Russian connections are “discovered” by the White House and he resigns.
February 14 – Russia violates a cold war arms treaty and shows that it has been developing cruise missiles. “I can reach you.” It says to Trump. https://www.nytimes.com/2017/02/14/world/europe/russia-cruise-missile-arms-control-treaty.html
February 14 – Congress starts to question their too-good-to-be-true win and a republican senator calls for an investigation into ties between Trump and Russia. Most squabble over healthcare. http://www.cnn.com/2017/02/14/politics/kfile-roy-blunt-flynn-investigation/index.html
February 27 – Trump makes major cuts to agencies and dumps all $54 billion of it into defense spending. They’re going to need it. https://www.washingtonpost.com/powerpost/trump-to-propose-10-percent-spike-in-defense-spending-massive-cuts-to-other-agencies/2017/02/27/867f9690-fcf2-11e6-99b4-9e613afeb09f_story.html?utm_term=.ed55293971c8
February 28 – Amazon has a major failure and the East coast US suffers an internet outage. http://bgr.com/2017/02/28/internet-outage-amazon-web-services/
March 7 – North Korea finally gets its missiles to survive launch and sends 4 towards a US base in Japan. I suspect Russia has made them aware of the vulnerabilities that had been plaguing their program. The US deploys its own missiles in South Korea. https://www.nytimes.com/2017/03/07/world/asia/thaad-missile-defense-us-south-korea-china.html
March 16 – Dan Coats, an anti-Russia senator is appointed by Trump as Director of National Intelligence, James Clappers old position. Kind of poetic really. A concept stolen from Russia, turned into a monster by Clapper, stolen back by Russia and used to remove Clapper, whose successor is now sent to kill it.
March 23 – Senate Republicans vote to allow the sale of citizen’s private browser history. Making the kind of data collection and manipulation I suspect Cambridge Analytica of doing, now legal for future use. https://www.buzzfeed.com/hamzashaban/the-republican-controlled-senate-votes-to-strip-internet?utm_term=.duwxxZYeY5#.sygwwvZkZj
March 30 – Michael Flynn offers to testify on Russia.
April 4 – 4 days after Tillerson had told Assad he could stay in power, Assad appears to drop chemical weapons on his own people. Assad denies it. The receiving hospital is also hit with conventional weapons in an effort to kill surviving witnesses. I believe it was Russia embarrassing the US.
April 7 – In response Trump hits a nearly empty airfield with 59 Tomahawk missiles. We’re told that it was retaliation against Syria and that Russia was warned beforehand and evacuated. I don’t believe they were. I believe Trump picked the most empty airfield shared by both Syria and Russia where damage would be minimal and bombed it without warning to either of them in an attempt to scare Russia. Russia condemns the strike and suspends air cooperation with the US. The airfield returns to operations the same day.
April 8 - The Shadow Brokers post an open letter to Trump that begins *“Respectfully, what the fuck are you doing?” * and telling him to remember his base, remember who got him elected. Again, I believe this is Putin speaking directly to Trump. He hints at the dirt he either has or can plant on McCain and Lindsay Graham, if only Trump will ask. The things he hints at are extreme. It is at this point that I now suspect Putin has gained this kind of information on a vast majority of our government and business world. Even if the blackmail victims are willing to face the shame to alert us to what’s happening, they’re warned that if the operations is exposed, everyone’s secrets will be released. The country would suddenly need a special election for half of its government and half of its corporations would crumble. It would be chaos. Mutually assured destruction. All anyone caught by Putin can do, is furrow their brow and be deeply disturbed.
In this same letter the Shadow Brokers ask Trump why he hasn’t yet filed charges against all powerful entities in the US. “Doing so, you could be seizing all their IT systems, freeze their financial assets, arrest key leadership.” This was a key step in Putin’s rise to power. I believe that even if Trump and Putin are having a couples squabble, Putin still needs Trump to remember this step. They release more of the NSA code as punishment. https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1
The emergency siren system in Dallas is set off. https://www.usatoday.com/story/news/2017/04/08/hacker-triggers-all-156-emergency-sirens-dallas/100212412/
April 12 – Tillerson is sent to Moscow to meet with Putin to discuss tensions “over the Syria strike”. They are unable to come to agreements.
April 13 –Trump drops the Mother of All Bombs on Afghanistan for Russia to see.
April 14 - The Shadow Brokers dump more NSA exploits. Included in this batch is EternalBlue, one of the most destructive exploits that’s been seen in years.
April 14 – North Korea, whose missiles can now fly in a more or less straight line, threatens a preemptive strike on the US. The US threatens a strike back. Trump gets out of town and heads to Mar-a-Lago just in case. http://thehill.com/policy/international/328796-north-korean-official-warns-of-preemptive-strike-of-its-own
http://www.nbcnews.com/news/world/u-s-may-launch-strike-if-north-korea-reaches-nuclear-n746366
http://www.cnn.com/2017/04/14/politics/donald-trump-north-korea-mar-a-lago/
April 15 – North Korea unveils an ICBM that can theoretically hit all of the United States. I believe that in exchange for stopping America’s sabotage of their nuclear program, NK is acting as Russia’s nuclear attack dog. He’s long wanted to be the one to do it. Now he’ll have Russian defense if he does.
April 21 - The power grids in New York, LA and San Francisco fail, it’s blamed on mechanical failure. https://www.inverse.com/article/30635-everything-we-know-la-nyc-sf-power-outages
May 9 – Comey is fired by Trump as he works on the Russian investigation. Trump justifies it by quoting and mocking Chuck Schumer with a tweet… *“Cryin' Chuck Schumer stated recently, "I do not have confidence in him (James Comey) any longer." Then acts so indignant.” *
May 12 – The Wanna Cry ransomware scares the world. Built from the previously released EternalBlue exploit, it begins in Russia and races across the globe, locking computers and demanding a bitcoin ransom. It looks to be a catastrophic infection. Our hospitals are particularly crippled by it. The name mocks Trumps own words days before.
May 13 – By dumb luck a kill switch is left in the Wanna Cry code and British security researcher Marcus Hutchins disables it by registering a $10 website domain. What should have been a ransom in the billions of dollars tops out at $130,000. https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html
After the attack, Kaspersky Labs will identify North Korea as being the attacker. North Korea will deny it. Later, Kaspersky will be cut out of the defense budget and banned from US government computers. Later still, Kaspersky will file an antitrust lawsuit against Microsoft, claiming that Windows 10 removes Kaspersky software from users computers when they upgrade.
https://www.cyberscoop.com/kaspersky-banned-us-dod-ndaa-russian-influence/
https://www.theverge.com/2017/6/6/15745164/kaspersky-antitrust-complaint-microsoft-european-commission
May 27 – British airways has a massive system failure which they blame on outsource employee ineptitude. I suspect this is a warning to Theresa May in response to England preventing Wanna Cry. “Stay out of this.” http://www.mirror.co.uk/news/uk-news/british-airways-caused-bank-holiday-10520182
June 7 – Amazon goes down. https://www.theverge.com/2017/6/7/15759046/amazon-product-pages-down-outage-offline-503
June 19 – A cyber analyst finds an unsecured Amazon server owned by GOP voter targeting firm Deep Root Analytics with almost all American voters records and analytics that predict who they will vote for and why. This confirms my suspicions that Cambridge Analytica used the same method to influence the presidential election. I believe that since the March 23 legalization of the selling of citizens browser histories, the GOP has been building its own voter prediction software in order to win the 2018 elections without help from Russia’s stolen data. http://www.zdnet.com/article/security-lapse-exposes-198-million-united-states-voter-records/
June 19 – All major cellular carriers go down. http://www.cbsnews.com/news/cell-phone-internet-outages-reported-across-the-u-s/
June 19 – Microsoft Skype goes down. https://techcrunch.com/2017/06/20/skype-outage-causing-connectivity-issues-company-says-its-a-global-incident/
June 27 – The Petya ransomware, built on EternalBlue, the second iteration of Wanna Cry, hits the world but seems targeted at Ukraine. Paying the ransom in this case does not unlock the data, Petya is tailored for maximum damage. https://en.wikipedia.org/wiki/2017_cyberattacks_on_Ukraine
June 30 – Microsoft Office 365 goes down. https://www.exoprise.com/2016/07/01/office-365-email-outage-june-2016/
July 3 – Chase bank goes down. https://www.washingtonpost.com/news/business/wp/2017/07/03/chase-bank-website-down-ahead-of-independence-day/?utm_term=.2135e79c6c8b
July 3 – NASDAQ suffers an attack. http://www.wired.co.uk/article/nasdaq-hack-july
July 4 – USS Hornet and much of Alameda California are hit by a power failure, 4th of July events are canceled. http://www.eastbaytimes.com/2017/07/04/alameda-power-outage-knocks-out-july-4-celebration-at-uss-hornet/
July 27 – HBO suffers the largest Hollywood hack in history. https://www.cnbc.com/2017/08/02/largest-hollywood-hack-in-history-may-have-compromised-hbo.html
July 30 – East coast power grid goes down. https://www.nytimes.com/2017/07/30/us/outer-banks-evacuation-power.html
Putin is livid.
August 3 - Marcus Hutchins, the man who saved us from Wanna Cry, is arrested by Trumps new CIA director on unrelated charges while he is in the US for a conference. He now faces 40 years in prison. https://www.theguardian.com/technology/2017/aug/03/researcher-who-stopped-wannacry-ransomware-detained-in-us
August 3 – Trump is finally forced to sign the Russian sanctions bill, making his position official. Putin will not be paid for services rendered.
August 5 – Trump schedules a vacation to be out of Washington DC for much of the next month. http://www.cnn.com/2017/08/04/politics/donald-trump-vacation-obama/index.html
I am nervous about August.
submitted by justajackassonreddit to esist [link] [comments]

Thoughts on my culminating analysis of Russia's involvement in the U.S elections?

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The proof is that the hackers used Bitly to mask the malicious URL and trick people into thinking the URL was legitimate. They made two mistakes, however.
First, they accidentally left two of their Bitly accounts public, rather than setting them to private. This allowed security researchers to view some general account information, like what URLs were shortened and what they were changed to.
Second, they used Gmail's official numeric ID for each person inside of their maliciously crafted URLs. This allowed cybersecurity researchers to find out exactly who had been targeted.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by MangekyouSharinganKa to AskTrumpSupporters [link] [comments]

Going Away Party - Dump Any and All of Your Favorite Links/Threads/Comments Here. Info on how to save for future reference in comments.

Guide on saving/deleting comments

If anyone has any better ideas on how to format or compile this info feel free to let me know or make another thread.

We have intelligence services growing into a technological capacity that eclipse their very governments.* We have been waging war on drugs for nearly 30 years spanning nearly 15 countries with 120,000+ people killed and countless more missing or injured.* We worry about 'terrorists' some 3000 miles away, while cartels behead people with chainsaws right across our very own borders.* We see near autonomous vehicles scan the skies 24 hours a day in third world countries where children dream of drones and mothers sew blankets with images of them on it.* We've seen our commander in chief redefine the definition of what it means to be a soldier so we can blow up a wedding or birthday party in order to kill a single individual who will easily and willingly be replaced by 12 others.* We enjoy the miracle of flight, by forcing ourselves to stand prone and scanned from head to toe to view our naked bodies, before we have one of our many national identification cards stamped and logged of our travel plans.*
We have corporations that have completely bridled the elective process with money literally being defined as speech, including witness the American tax-payer hand over nearly a trillion dollars.* These are dystopian dictatorships that have more power and wealth than any king or monarch could even fathom. We have a tax system so convoluted, so massively complicated that these very corporations can get away with the government paying them taxes* , a system where the rich pay to find and exploit the loopholes. We live in a world where the top 1% controls more wealth than the lower 50% combined.* We have black sites being operated and maintained on American soil where citizens are no longer read their Miranda rights and not a single major media outlet batted an eye.* Every phone call, every email, every text message sent, every keystroke made is logged and an army of tech savvy mathematicians and scientists combs over them to take the pulse of civil disobedience in the nation.* We've seen a single family fund, organize, and execute 2000 Americans by flying our own planes into the symbol of our financial center without a single iota of justice served, yet a plethora of atrocities in its place all while they are embraced in our bosom as faithful allies.* We've seen a nation wide movement against the banks and income inequality turn up in dozens of major US cities, only to have it violently crushed under the guise of sanitation and 'not being able to get to work'.*
We spend nearly half of our entire budget on military defense to fight enemies who use cell-phone detonation, 50 year old rifles and crock-pots to fight us* ,while our roads, bridges, electric grid, ports and communication networks are rotting and amassing an aging problem so monumental it will take centuries to repair.* We've seen an entire generation of children shackled to the banks through an education system forced upon them under the threat of being successful* with little promises and scant results all while being forced to pay into a safety net of social security that they will never see.* We have seen the size of the government grow every year for decades with no end in sight* while our 'elected' leaders are hand picked by elites of business to have their makeup perfected and suits ironed to speak to us about fringe off topic emotional issues that distract us from the fucking circus that is this country.*
Thread here
-fuck_all_mods
-moose- this is for you.
You remind me of the times when links were all reddit was.
Learn from the masses, and then teach them.

Giliens

http://www.thrivenotes.com/your-vote-doesnt-matte
http://www.huffingtonpost.com/josh-silvetaxation-without-represen_1_b_7069384.html
http://scholar.princeton.edu/sites/default/files/mgilens/files/gilens_and_page_2014_-testing_theories_of_american_politics.doc.pdf
https://www.youtube.com/watch?v=SzS068SL-rQ#t=705
http://sunlightfoundation.com/blog/2014/11/17/fixed-fortunes-biggest-corporate-political-interests-spend-billions-get-trillions/

US Atrocities

https://en.wikipedia.org/wiki/Trail_of_Tears
https://en.wikipedia.org/wiki/Gulf_of_Tonkin_incident
https://en.wikipedia.org/wiki/Project_MKUltra
https://en.wikipedia.org/wiki/Tuskegee_syphilis_experiment
https://en.wikipedia.org/wiki/Internment_of_Japanese_Americans
http://en.wikipedia.org/wiki/Waterboarding#Contemporary_use_and_the_United_States

Oil wars

Contractors cost+ https://www.youtube.com/watch?v=VhpfNqeZzUE

2008 Bailout

http://www.rollingstone.com/politics/news/gangster-bankers-too-big-to-jail-20130214
http://www.rollingstone.com/politics/news/secret-and-lies-of-the-bailout-20130104
http://www.bloomberg.com/news/articles/2011-11-28/secret-fed-loans-undisclosed-to-congress-gave-banks-13-billion-in-income
http://www.allgov.com/news/where-is-the-money-going/banks-say-thanks-for-the-bailout-now-well-park-our-profits-in-overseas-tax-havens-150316?news=855961
http://blogs.wsj.com/economics/2013/09/10/some-95-of-2009-2012-income-gains-went-to-wealthiest-1/

Student loan bubble

http://www.huffingtonpost.com/michael-b-fishbein/9-striking-similarities-b_b_5062840.html

NSA

https://www.techdirt.com/articles/20150407/17213830578/turns-out-feds-actually-tracked-most-international-calls-nearly-decade-before-911-didnt-stop-attack.shtml
https://www.nsfwcorp.com/dispatch/nsa-whistleblowers-for-dummies/
http://www.truth-out.org/news/item/17459-att-tech-blew-the-whistle-on-nsa-spying-in-2006
http://www.businessinsider.com/the-story-of-joseph-nacchio-and-the-nsa-2013-6
http://en.wikipedia.org/wiki/Information_published_by_WikiLeaks#9.2F11_pager_messages
http://www.wired.com/2013/06/nsa-whistleblower-klein/
https://www.eff.org/deeplinks/2014/11/fbis-suicide-letter-dr-martin-luther-king-jr-and-dangers-unchecked-surveillance
http://www.washingtonpost.com/news/the-watch/wp/2014/10/29/surprise-controversial-patriot-act-power-now-overwhelmingly-used-in-drug-investigations/
http://en.wikipedia.org/wiki/Room_641A
http://en.wikipedia.org/wiki/Terrorist_Surveillance_Program
http://en.wikipedia.org/wiki/Narus_(company)

Police

http://www.npr.org/2014/12/15/370995815/supreme-court-rules-traffic-stop-ok-despite-misunderstanding-of-law
http://abcnews.go.com/US/court-oks-barring-high-iqs-cops/story?id=95836
http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/03/23/federal-court-rejects-third-amendment-claim-against-police-officers/
http://www.theguardian.com/us-news/2015/ma04/police-killed-people-fbi-data-justifiable-homicides
http://www.nytimes.com/2014/08/31/sunday-review/race-and-police-shootings-are-blacks-targeted-more.html
Only cops kill pigs https://www.youtube.com/watch?v=MAwr-9ceDlc

Politicians

http://en.m.wikipedia.org/wiki/Commission_on_Presidential_Debates

Obama

http://www.politifact.com/truth-o-metearticle/2008/jul/14/obamas-wiretapping-flip-flop-yes/

Alberto Gonzales

Total Recall https://www.youtube.com/watch?v=7IBvZlRqOTw

Economists

Milton Friedman

http://www.econlib.org/library/Columns/y2006/Friedmantranscript.html
Predicts bitcoin: https://www.youtube.com/watch?v=fYD17h6hlCs

Hayek

http://mises.org/library/pretense-knowledge
Predicts bitcoin: https://www.youtube.com/watch?v=EYhEDxFwFRU#t=19m23s

Economics

https://en.wikipedia.org/wiki/Asset_price_inflation
https://en.wikipedia.org/wiki/Aggregate_demand
https://en.wikipedia.org/wiki/Rent-seeking
Humans need not apply https://www.youtube.com/watch?v=7Pq-S557XQU
The American Dream https://www.youtube.com/watch?v=tGk5ioEXlIM

Basic Income

/BasicIncome/comments/2upn9x/the_sidebar_states_no_advocating_violence_how_do/coar2vp?context=3 /Anarcho_Capitalism/comments/2vcoq3/would_taxation_be_theft_if_done_by_an_autonomous/coghp3p /Anarcho_Capitalism/comments/2v2i0l/today_i_found_rcryptoubi_for_discussion_of/ /CryptoUBI/comments/2v2gi6/proof_of_identityproof_of_person_the_elephant_in/ /Anarchism/comments/2v3mno/cryptoubi_my_suggestion_of_how_anarchists_and/

Philosophers

Huemer

The irony of the US criminal justice system. Being in government custody is the only time they are legally obligated to protect you or provide any tangible service. https://www.youtube.com/watch?v=GlTyOC32-vs&feature=youtu.be&t=868

Watts

Taxation is Obsolete https://www.youtube.com/watch?v=OhvoInEsCI0

Voluntarism

George ought to help https://www.youtube.com/watch?v=PGMQZEIXBMs
http://taxfoundation.org/article/tax-freedom-day-2014-april-21-three-days-later-last-year
http://www.delawareonline.com/story/opinion/contributors/2014/12/12/cigarette-taxes-killed-eric-garne20317745/
https://mises.ca/posts/blog/but-who-will-build-the-roads/
http://blogs.wsj.com/deals/2011/05/11/dealpolitik-lesson-from-microsoftskype-congress-must-fix-corporate-tax-law/
Crypto vs Political Power https://www.youtube.com/watch?v=joITmEr4SjY&feature=youtu.be&t=110

Reddit

/ideasfortheadmins/comments/8h8sy/subscribe_new_users_to_rall_18_reddits_instead_of/c09c9gy
/TheoryOfReddit/comments/1m336u/will_we_ever_see_another_rmarijuanatype_emigration/
/thebutton/comments/31b6sx/can_we_start_calling_pressers_colored_folk/
/modnews/comments/ov7rt/moderators_feedback_requested_on_enabling_public/
/PoliticalModeration/comments/12otmi/reddits_admins_at_the_request_of_mods_from/
/undelete/comments/22yewf/i_have_identified_a_list_of_keywords_that_are/
/PoliticalModeration/comments/nrsde/rpolitics_moderators_ban_my_account_fo
/politics/comments/ibr9new_subreddit_moderation/
/PoliticalModeration/comments/1s8wo4/banned_from_rpolitics_finally/cdv90ko?context=3
/TopMindsOfReddit/comments/32v7p1/i_am_go1dfish_reddit_transparency_advocate/
/blog/comments/1sndxe/weve_rewritten_our_user_agreement_come_check_it/cdzha7p

Gender

Gender Equality Paradox https://www.youtube.com/watch?v=p5LRdW8xw70
http://www.huffingtonpost.com/kirsten-west-savali/fathers-financial-abortion_b_1015286.html
Full Thread
-go1dfish
submitted by zyklorpthehuman to conspiracy [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to geopolitics [link] [comments]

Edward Snowden on Bitcoin and Personal Privacy Edward Snowden on Bitcoin Edward Snowden Exposes Bitcoin Flaw  Case For Privacy & Monero Bitcoin/Cryptocurrency is a Government Conspiracy (2017 ... Snowden: BITCOIN Nutzer von NSA überwacht! G20 Update zu Kryptowährungen! Blockchain Nachteile! News

Known whistleblower Edward Snowden has provided one of the media outlets with secret documents, indicating that The US National Security Agency tracked bitcoin users’ actions online since 2013. The agency reportedly not only was identifying bitcoiners but also tracing their passwords and other private activities. It turns out those pesky conspiracy theorists were actually onto something.. Classified documents provided by the whistleblower Edward Snowden show clearly that the NSA worked feverishly to target bitcoin users around the globe — and wielded one perpplexing source of info to help track down the senders and recipients of Bitcoin(s), according to a top-secret passage in an internal National ... Bitcoin nsa conspiracy. Wenn ja, dann ist dies ein guter Indikator, der bei Ihrer Erwartung an Bitcoin im Jahr 2021 berücksichtigt werden sollte. Bitcoin wird immer knapper. Aber Sie als versuchskaninchen geld verdienen können beste Kostenlose forex signal Website auch die fintech forex Hälfte des Monats Mai 2020 anders betrachten. Neue excel-Modell forex Bitcoins werden doppelt so knapp ... Bitcoin did not use the most popular programme to create secure keys, and the fact shows that the NSA already had full information about bitcoin, according to the group. "While bitcoin believers portray bitcoin as a new decentralised currency, the command structure of bitcoin core development is 100% centralised," CIA Project says. Explosive new documents, originally obtained by NSA leaker Edward Snowden and seen by The Internet Chronicle, reveal how the NSA conspired to create the popular Bitcoin “cyrptocurrency”. NSA’s immediate aim was to track cyber terrorists and other criminals, but also to undermine the very concept of a decentralized, anonymous electronic currency, and by extension, the ideals of ...

[index] [13779] [2027] [18054] [18029] [50453] [6104] [30894] [15499] [31571] [32785]

Edward Snowden on Bitcoin and Personal Privacy

Edward Snowden shines a light on a big flaw for Bitcoin about how the NSA has been tracking Bitcoin since 2013. I cover my thoughts and what it means for the market. Let me know your thoughts in ... Snowden: BITCOIN Nutzer von NSA überwacht! G20 Update zu Kryptowährungen! Blockchain Nachteile! News CoinCheck TV. Loading... Unsubscribe from CoinCheck TV? Cancel Unsubscribe. Working ... From the Wikipedia Entry on Edward Snowden: an American whistleblower who copied and leaked highly classified information from the National Security Agency (NSA) in 2013 when he was a Central ... The Snowden files -- the inside story of the world’s most wanted man Luke Harding TEDxAthens - Duration: 18:57. TEDx Talks Recommended for you A former NSA and CSI employee, Edward Snowden, doesn’t trust Bitcoin and does not recommend using it. We’ll tell you the truth about Bitcoin that was stolen by Snowden from the archives of ...

#