Category Archives: Hacking

Assange is Kill?

NEW INFORMATION BEEN ADDED. MORE SOURCES TO FOLLOW.

 

ALL THAT IS NEEDED TO DISPROVE THIS THEORY IS A SINGLE APPEARANCE FROM ASSANGE IN THE ECUADORIAN EMBASSY!

 

 

http://imgur.com/a/9Jmd5

 

http://archive.is/heCYT

 

IMAGES RELATED

 

 

CURRENTLY NO PROOF HE IS IN THE EMBASSY IN THE UK

 

SWEDISH PROSECUTOR AND HIS OWN LAWYER WEREN’T ALLOWED TO SEE HIM. COMMUNICATION THROUGH AMBASSADOR.

 

 

Posts off 4chan related to this

 

= =

 

Assange and the entire Wikileaks staff has been missing since Oct 15. 3 of his attorneys are dead along with the director of Wikileaks who died on Oct 22. The deadman switch seems to have gone off on Oct 21st (during the DDoS) and again a couple of times after (check dates of big DDoS attacks against the site and when it’s down). It seems like 1. Wikileaks is compromised 2. the keys to unlock some of the insurance files have been released and 3. they are trying very hard to stop people from finding them.

 

 

Anon has been working on this nonstop since Oct 15. All threads get slid or deleted and the people making progress go silent. As soon as they found relevant messages encoded in the blockchain, the mempool was flooded, incredibly high transaction fees started showing up and a high number of transactions with encoded disinformation were made. If you look at the deleted threads and the information posted on onion links, it looks like anon was able to unlock some of the files on Oct 27 and that more files are being secretly encoded into the blockchain and the new file directory on the Wikileaks site (the last change was last night). If you want to see anon’s work, google ’09-Nov-438498967 06:00′ or look for insurance/DMS threads on onion chans then look at the dates below.

 

If you are skeptical, download the latest insurance files posted: https://twitter.com/wikileaks/status/796085225394536448

 

Run ‘scripts file | head -c 18′ and you will see that the files were not salted. All previously published insurance files have been salted.

 

Do ‘gpg –verify’ and you will see that the gpg signature is invalid.

 

= =

 

 

–SUMMARY– (Detailed timeline with sources listed after this summary)

 

Apr 16: John Jones QC, Assange’s U.N. Lawyer dies jumping in front of a train.

 

May 11: Michael Ratner, WikiLeaks’ chief counsel, dies of cancer.

 

Jul 10: Seth Rich, DNC staffer who supposedly leaked DNC documents to Wikileaks, is shot in the back and dies. Nothing is stolen from his body.

 

Aug 5: Edward Snowden (source of leaks on surveillance by the NSA) tweets 64 bit code (potential dead man’s switch)

 

It took 10 days before Snowden left another Tweet

 

Aug 10: Wikileaks offers $20k reward for information on murder of Seth Rich.

 

Oct 7: Podestamails leaks, first batch.

 

Oct 14: John Podesta tweets “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”.

 

Oct 15: Joe Biden threatens Russia and blames them for Wikileaks – (Arrogant and open hostility)

 

Oct 16th/17: John Kerry visits the UK, personally pressures Equador to stop Assange from publishing documents about Clinton.

 

Oct 16/17: Wikileaks tweets SHA-256 prerelease keys.

 

Oct 16/17: Equadorian Embassy cuts off Assange’s internet access.

 

Oct 17: Wikileaks Volunteer tweets that Julian is ok… tweet is now deleted.

 

Oct 17: Embassy tells a caller they can’t comment on Assange being alive:

 

https://youtu.be/536IK7YhsGw

 

https://youtu.be/A_jhLcvoZqc

 

At the exact same time this was taking place, Manning had a group of guys try to break her out prison. Read her statement and see how the dates and times match:

 

https://www.documentcloud.org/documents/3213878-Binder2.html

 

http://archive.is/87WS5

 

Oct 18: Pamela Anderson visits Assange. Feeds him a vegan sandwich apparently???

 

Oct 18: Witnesses photograph and report heavily armed police and vans outside Ecuadorian Embassy, are barred from approaching and have cellphones confiscated. Live feeds are cut off.

 

Oct 18: Fox News reports Assange will be arrested in a matter of hours.

 

Oct 18: https://file.wikileaks.org/file made publicly visible, file dates/timestamps changed to 1984 (Orwell reference).

 

The message ‘The Insurance files may have just been released’ is shown for about an hour: https://i.imgur.com/6IMYfUK.png

 

http://archive.is/UTGVq

 

Oct 20: /r/wikileaks, /r/dncleaks, /r/wikileakstaskforce and /r/nsaleaks add 21 new moderators and remove previous mods, all threads about Assange going missing deleted since.

 

Oct 20/21: Wikileaks tweets 5 tweets with misspelled words. The incorrect letters spell “HELP HIM”. The Wikileaks twitter has never made a spelling error, let alone 5 in two days.

 

Oct 21: Massive DDoS attack on US internet. Wikileaks tweets to imply the attack originates from its supporters, asking them to stop, no evidence supports claim.

 

Oct 21: DDoS attack takes down Twitter.

 

At this point anon notices that the insurance keys were posted on several sites and deleted. People start trying to post the information but it is immediately deleted. Everyone takes refuge in onion threads that also disappear.

 

Oct 21: London Airport evacuated due to “chemical attack”, potentially used as cover to fly Assange out of country. (Conjecture but suspicious timing all the same)

 

Oct 22: Gavin MacFadyen (mentor to Assange and key player in Wikileaks) dies of lung cancer.

 

4TH PERSON RELATED TO WIKILEAKS NOW DEAD IN AS MANY MONTHS!!! MASSIVE RED FLAG!!!

 

Oct 23: Wikileaks Tweets poll asking how best to prove Assange is alive (he still hasn’t appeared on video or at the window since).

 

Oct 24: Wikileaks Tweets video of Assange and Michael Moore recorded in June.

 

Oct 24: Anon is able to find the deleted keys. They are posted and deleted again.

 

Oct 25: Someone comes into a thread and gives anon a hint about messages in the blockchain.

 

Oct 26: 4chan users successfully decode their first message in Wikileak’s blockchain. Threads are instantly flooded by shills saying that it’s not worth looking into. The blockchain is blocked with fees and 43000 unconfirmed transactions appear in the mempool.

 

Oct 27 (AM): Anon moves into an onion thread, posts code and a tutorial on decoding messages in the blockchain. Several files and messages are found.

 

Bitcoin 0.13.1 is released and a ‘soft fork’ begins:

 

https://bitcoin.org/en/release/v0.13.1

 

The blockchain is attacked: https://www.reddit.com/r/Bitcoin/comments/59qiyg/is_there_some_attack_going_whats_with_large/

 

Oct 27(PM): Several anon report losing their connection. Talk of v&s and black bagging begins. Someone posts that they discovered a flaw that allows anyone to retrieve the password from the files. Clues are dumped and the onion threads go silent. On Tox chat someone says someone unlocked some of the files, warns that FBI will announce that new evidence was found in someone’s computer and that a giant human trafficking operation would be exposed.

 

http://sli.mg/3srnQ3 – BASIC BLOCKCHAIN EXPLANATION

 

Oct 28: FBI announces they discovered new evidence on Anthony Weiner’s computer:

 

Oct 30: FBI begins posting their own leaks:

 

https://twitter.com/FBIRecordsVault

 

(Said Twitter been almost completely dead until now)

 

Oct 31 – Nov 2: Anon begins analyzing strange code words like ‘pizza’. Multiple connections are made.

 

Nov 3: Wikileaks confirms the validity of the information found:

 

https://twitter.com/wikileaks/status/794247777756860417

 

Nov 5: Manning’s statement [referenced Oct 17th] is released: https://www.documentcloud.org/documents/3213878-Binder2.html

 

Nov 6: Huge DDoS takes down Wikileaks for first time in years.

 

Nov 7: Various entities notice hundreds of Podesta and DNC emails are missing from recent leaks, accessed with direct entry.

 

Nov 8 (AM): New insurance files are posted: https://twitter.com/wikileaks/status/796085225394536448

 

Nov 8 (PM): Trump wins.

 

Nov 8(AM-PM): Large numbers of cyber attacks target Saudi Arabia and Emirates: https://i.sli.mg/dGc3TG.png

 

Nov 9: A single file is changed on the file.wikileaks.org/torrent

 

Nov 10: Staff publicly states their concern for Assange’s continue silence after the election. Incorrectly states that insurance files are future leaks and refers to the ones posted on Nov 8. These are the first files to have filenames that reference their content: https://www.reddit.com/r/IAmA/comments/5c8u9l/we_are_the_wikileaks_staff_despite_our_editor/

 

Suggested you use ((uTorrent)) to download the files

 

These are the previous insurance files:

 

https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent

 

https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent

 

https://web.archive.org/web/20100901162556/https://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256

 

Nov 12: Assange meets with Swedish prosecutor regarding rape allegations, lawyers barred from attending, meeting meeting conducted via an Equadorian ambassador (not face to face)

 

REPEAT, NO FACE TO FACE

 

Nov 14: Wikileaks releases insurance files, SHA-256 hashes do not match those tweeted in October.

 

 

==DETAILED TIMELINE== LINKS PROVIDED – -

 

 

Apr 16: John Jones QC, Assange’s U.N. Lawyer dies jumping in front of a train.

 

https://twitter.com/wikileaks/status/722371220868571136

 

http://archive.is/1ZIWz

 

http://investmentwatchblog.com/wikileaks-lawyers-death-ruled-not-suicide/

 

http://archive.is/gDLFx

 

 

May 11: Michael Ratner, WikiLeaks’ chief counsel, dies of cancer.

 

https://en.wikipedia.org/wiki/Michael_Ratner#Death

 

http://archive.is/Diocv

 

http://www.nytimes.com/2016/05/12/us/michael-ratner-lawyer-who-won-rights-for-guantanamo-prisoners-dies-at-72.html

 

https://www.theguardian.com/law/2016/may/12/michael-ratner-obituary

 

http://archive.is/SEKl1

 

 

Jul 10: Seth Rich, DNC staffer who supposedly leaked DNC documents to Wikileaks, is shot in the back and dies. Nothing is stolen from his body.

 

https://en.wikipedia.org/wiki/Murder_of_Seth_Rich

 

http://archive.is/0EnQE

 

 

Aug 5: Edward Snowden (source of leaks on surveillance by the NSA) tweets 64 bit code (potential dead man’s switch)

 

https://qph.ec.quoracdn.net/main-qimg-1462e935a7aa6589a6b39a28db3fa285?convert_to_webp=true

 

(Since deleted off Twitter)

 

It took 10 days before Snowden left another Tweet

 

 

Aug 10: Wikileaks offers $20k reward for information on murder of Seth Rich.

 

http://www.infowars.com/wikileaks-offers-20k-reward-for-info-on-murdered-dnc-staffer/

 

http://archive.is/jyqiU

 

https://twitter.com/wikileaks/status/763063624579551232

 

http://archive.is/Ac2Nh

 

 

Oct 7: Podestamails leaks, first batch.

 

http://www.breitbart.com/tech/2016/10/07/wikileaks-releases-2050-emails-clinton-campaign-chief-john-podesta/

 

http://archive.is/CwOJq

 

https://twitter.com/wikileaks/status/784498891936915456?ref_src=twsrc%5Etfw

 

http://archive.is/G2TKG

 

 

Oct 14: John Podesta tweets “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”.

 

http://www.breitbart.com/tech/2016/10/14/john-podestas-twitter-diss-of-wikileaks-editor-julian-assange-backfires-goes-viral/

 

http://archive.is/xrMkI

 

 

Oct 15: Joe Biden threatens Russia and blames them for Wikileaks – (Arrogant and open hostility)

 

https://www.youtube.com/watch?v=h9M-fb9VIi0&ab_channel=SkyQuakes2012

 

 

Oct 16th/17: John Kerry visits the UK, personally pressures Equador to stop Assange from publishing documents about Clinton.

 

http://www.bloomberg.com/news/articles/2014-06-03/goldman-sachs-gets-ecuador-gold-as-correa-steps-up-hunt-for-cash

 

 

Oct 16/17: Wikileaks tweets SHA-256 prerelease keys.

 

https://twitter.com/wikileaks/status/787777344740163584

 

http://archive.is/9tPCU

 

https://twitter.com/wikileaks/status/787781046519693316

 

http://archive.is/n4H58

 

https://twitter.com/wikileaks/status/787781519951720449

 

http://archive.is/JeFom

 

 

Oct 16/17: Equadorian Embassy cuts off Assange’s internet access.

 

https://www.theguardian.com/media/2016/oct/17/ecuador-julian-assange-internet-access-wikileaks

 

http://archive.is/59GtU

 

http://bigstory.ap.org/article/6f997f97c5f140a29f385ea05f1b642c/wikileaks-assanges-internet-link-severed-state-actor

 

http://archive.is/IYSQB

 

https://twitter.com/wikileaks/status/787889195507417088

 

http://archive.is/HkISA

 

https://twitter.com/wikileaks/status/788369924175441920

 

 

Oct 17: Wikileaks Volunteer tweets that Julian is ok… tweet is now deleted.

 

[Archive source needed]

 

@kellykolisnik:

 

@JohnDeplo You can’t go in without an appointment. Julian is confirmed to be perfectly fine. Thanks for your support and for checking :)

 

 

Oct 17: Embassy tells a caller they can’t comment on Assange being alive:

 

https://youtu.be/536IK7YhsGw

 

https://youtu.be/A_jhLcvoZqc

 

At the exact same time this was taking place, Manning had a group of guys try to break her out prison. Read her statement and see how the dates and times match:

 

https://www.documentcloud.org/documents/3213878-Binder2.html

 

http://archive.is/87WS5

 

 

Oct 18: Pamela Anderson visits Assange. Feeds him a vegan sandwich apparently???

 

http://thenewdaily.com.au/news/world/2016/11/15/pamela-anderson-assange/

 

http://archive.is/ZNLjB

 

http://time.com/4532939/pamela-anderson-julian-assage-vegan-lunch/

 

 

Oct 18: Witnesses photograph and report heavily armed police and vans outside Ecuadorian Embassy, are barred from approaching and have cellphones confiscated. Live feeds are cut off.

 

http://www.zerohedge.com/news/2016-10-21/wikileaks-reveals-heavily-armed-police-gathering-outside-ecuadorian-embassy-london

 

http://archive.is/oQnSq

 

https://twitter.com/wikileaks/status/789493599121604609

 

http://archive.is/TTutx

 

http://www.trunews.com/article/wikileaks-armed-police-appear-at-ecuador-embassy-in-london

 

http://archive.is/HSwQD

 

(More sources needed to confirm)

 

 

Oct 18: Fox News reports Assange will be arrested in a matter of hours.

 

https://youtu.be/0T_h7pSVIFo (This doesn’t seem to have been reported anywhere else.)

 

 

Oct 18: https://file.wikileaks.org/file made publicly visible, file dates/timestamps changed to 1984 (Orwell reference).

 

The message ‘The Insurance files may have just been released’ is shown for about an hour: https://i.imgur.com/6IMYfUK.png

 

http://archive.is/UTGVq

 

 

Oct 20: /r/wikileaks, /r/dncleaks, /r/wikileakstaskforce and /r/nsaleaks add 21 new moderators and remove previous mods, all threads about Assange going missing deleted since.

 

https://www.reddit.com/r/WhereIsAssange/comments/5d7gif/psa_a_group_of_mods_were_all_added_to_wikileaks/

 

http://archive.is/7Xygg

 

==

 

/r/wikileaks

 

julio08 (2408) 25 days ago full permissions

 

Here4Popcorn (31467) 24 days ago full permissions

 

crawlingfasta (5781) 24 days ago full permissions

 

SATXTAN (4317) 24 days ago full permissions

 

AssuredlyAThrowAway (221301) 24 days ago full permissions

 

kybarnet (71223) 24 days ago full permissions

 

GamingForHonor (23928) 22 days ago wiki

 

==

 

/r/dncleaks

 

AssuredlyAThrowAway (221300) 1 month ago full permissions

 

HollowFangs (62927) 26 days ago access, flair, mail, posts

 

SATXTAN (4317) 25 days ago full permissions

 

==

 

/r/wikileakstaskforce

 

Here4Popcorn (31467) 1 month ago full permissions

 

kybarnet (71223) 1 month ago full permissions

 

GamingForHonor (23928) 1 month ago full permissions

 

pancakees (14098) 1 month ago full permissions

 

bananawhom (8655) 1 month ago full permissions

 

tjade (654) 1 month ago full permissions

 

shadowman3001 (102074) 1 month ago full permissions

 

deathscape10 (4791) 1 month ago full permissions

 

crawlingfasta (5781) 1 month ago full permissions

 

==

 

/r/nsaleaks

 

fantastic_comment (10116) 27 days ago config, flair, mail, posts, wiki

 

cojoco (113673) 24 days ago full permissions

 

==

 

AssuredlyAThrowAway, SATXTAN, Here4Popcorn, crawlingfasta, GamingForHonor, kybarnet ALL added to 2 of these subreddits.

 

 

Oct 20/21: Wikileaks tweets 5 tweets with misspelled words. The incorrect letters spell “HELP HIM”. The Wikileaks twitter has never made a spelling error, let alone 5 in two days.

 

https://twitter.com/wikileaks/status/789078312043761665

 

http://archive.is/0Htlx

 

#imWithHer – im

 

https://twitter.com/wikileaks/status/789170993252081666

 

http://archive.is/OGWL5

 

Navel Intelligence – Naval – EL

 

https://twitter.com/wikileaks/status/789173501458456576

 

http://archive.is/oTPi1

 

wopper – wHopper – H

 

https://twitter.com/wikileaks/status/789456189851627522

 

http://archive.is/mDpQe

 

presumtive – presumptive – P

 

(Can’t seem to find all these tweets however this is more suspicious activity that lines up with the forming narrative of Wikileaks being under attack)

 

 

Oct 21: Massive DDoS attack on US internet. Wikileaks tweets to imply the attack originates from its supporters, asking them to stop, no evidence supports claim.

 

https://twitter.com/wikileaks/status/789574436219449345

 

http://archive.is/XqYuP

 

 

Oct 21: DDoS attack takes down Twitter.

 

At this point anon notices that the insurance keys were posted on several sites and deleted. People start trying to post the information but it is immediately deleted. Everyone takes refuge in onion threads that also disappear.

 

http://www.techtimes.com/articles/183218/20161021/cyber-attack-takes-down-netflix-twitter-spotify-more-east-coast.htm

 

http://archive.is/8bLCm

 

 

Oct 21: London Airport evacuated due to “chemical attack”, potentially used as cover to fly Assange out of country. (Conjecture but suspicious timing all the same)

 

http://time.com/4542496/london-city-airport-chemical-incident/

 

http://archive.is/Lv5KT

 

https://youtu.be/ViMVLplr8YM

 

 

Oct 22: Gavin MacFadyen (mentor to Assange and key player in Wikileaks) dies of lung cancer.

 

4TH PERSON RELATED TO WIKILEAKS NOW DEAD IN AS MANY MONTHS!!! MASSIVE RED FLAG!!!

 

https://www.rt.com/usa/363793-gavin-macfadyen-dies-wikileaks/

 

http://archive.is/JAZ24

 

https://twitter.com/wikileaks/status/790278989596295170

 

http://archive.is/bpq74

 

 

Oct 23: Wikileaks Tweets poll asking how best to prove Assange is alive (he still hasn’t appeared on video or at the window since).

 

https://twitter.com/wikileaks/status/790406530738913285

 

http://archive.is/7EDvG

 

 

Oct 24: Wikileaks Tweets video of Assange and Michael Moore recorded in June.

 

https://twitter.com/wikileaks/status/790394830979465216

 

http://archive.is/w1Hpu

 

Wikileaks also have this posted, AGAIN not proving Assange is alive.

 

https://twitter.com/SHO_TheCircus/status/790672953331425280

 

http://archive.is/OiA5B

 

 

Oct 24: Anon is able to find the deleted keys. They are posted and deleted again.

 

[SOURCE/CITATION NEEDED]

 

 

Oct 25: Someone comes into a thread and gives anon a hint about messages in the blockchain.

 

[SOURCE/CITATION NEEDED]

 

Oct 26: 4chan users successfully decode their first message in Wikileak’s blockchain. Threads are instantly flooded by shills saying that it’s not worth looking into. The blockchain is blocked with fees and 43000 unconfirmed transactions appear in the mempool.

 

[SOURCE/CITATION NEEDED]

 

 

Oct 27 (AM): Anon moves into an onion thread, posts code and a tutorial on decoding messages in the blockchain. Several files and messages are found.

 

Bitcoin 0.13.1 is released and a ‘soft fork’ begins:

 

https://bitcoin.org/en/release/v0.13.1

 

The blockchain is attacked: https://www.reddit.com/r/Bitcoin/comments/59qiyg/is_there_some_attack_going_whats_with_large/

 

Oct 27(PM): Several anon report losing their connection. Talk of v&s and black bagging begins. Someone posts that they discovered a flaw that allows anyone to retrieve the password from the files. Clues are dumped and the onion threads go silent. On Tox chat someone says someone unlocked some of the files, warns that FBI will announce that new evidence was found in someone’s computer and that a giant human trafficking operation would be exposed.

 

http://sli.mg/3srnQ3 – BASIC BLOCKCHAIN EXPLANATION

 

 

Oct 28 (A few hours later): FBI announces they discovered new evidence on Anthony Weiner’s computer:

 

http://www.nytimes.com/2016/10/29/us/politics/fbi-hillary-clinton-email.html?_r=0

 

 

Oct 30: FBI begins posting their own leaks:

 

https://twitter.com/FBIRecordsVault

 

(Said Twitter been almost completely dead until now)

 

 

Oct 31 – Nov 2: Anon begins analyzing strange code words like ‘pizza’. Multiple connections are made.

 

[SOURCE/CITATION NEEDED]

 

 

Nov 3: Wikileaks confirms the validity of the information found: https://twitter.com/wikileaks/status/794247777756860417

 

 

Nov 5: Manning’s statement [referenced Oct 17th] is released: https://www.documentcloud.org/documents/3213878-Binder2.html

 

 

Nov 6: Huge DDoS takes down Wikileaks for first time in years.

 

https://twitter.com/wikileaks/status/795503927378722816

 

 

Nov 7: Various entities notice hundreds of Podesta and DNC emails are missing from recent leaks, accessed with direct entry.

 

 

Nov 8 (AM): New insurance files are posted: https://twitter.com/wikileaks/status/796085225394536448

 

Nov 8 (PM): Trump wins.

 

[Yeah you guys don’t need a source for this]

 

 

Nov 8(AM-PM): Large numbers of cyber attacks target Saudi Arabia and Emirates: https://i.sli.mg/dGc3TG.png

 

 

Nov 9: A single file is changed on the file.wikileaks.org/torrent

 

 

Nov 10: Staff publicly states their concern for Assange’s continue silence after the election. Incorrectly states that insurance files are future leaks and refers to the ones posted on Nov 8. These are the first files to have filenames that reference their content: https://www.reddit.com/r/IAmA/comments/5c8u9l/we_are_the_wikileaks_staff_despite_our_editor/

 

Suggested you use ((uTorrent)) to download the files

 

These are the previous insurance files:

 

https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent

 

https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent

 

https://web.archive.org/web/20100901162556/https://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256

 

 

Nov 12: Assange meets with Swedish prosecutor regarding rape allegations, lawyers barred from attending, meeting meeting conducted via an Equadorian ambassador (not face to face)

 

REPEAT, NO FACE TO FACE

 

https://www.theguardian.com/media/2016/nov/14/julian-assange-to-face-swedish-prosecutors-over-accusation

 

http://archive.is/3Rl9Y

 

 

Nov 14: Wikileaks releases insurance files, SHA-256 hashes do not match those tweeted in October.

 

 

If you truly care about Assange and the future of Wikileaks you should consider investigating the possibility of the DMS being activated. It might be the only leverage that can be used to bring him back safely.

 

= = = =

 

CURRENTLY NO PROOF HE IS IN THE EMBASSY IN THE UK

 

SWEDISH PROSECUTOR AND HIS OWN LAWYER WEREN’T ALLOWED TO SEE HIM. COMMUNICATION THROUGH AMBASSADOR.

 

= = = =

 

 

Other important related information#

 

https://wikileaks.ch/IMG/pdf/WikiLeaks_Response_v6.pdf

https://www.reddit.com/r/WhereIsAssange/

 

 

Assange is Kill? – Pastebin.com.

#MillionMaskMarch London Press Release

**

 

Million Mask March

 

Press Release – For immediate distribution

 

**

 

 

 

Another November 5th, another mass mobilisation to the streets by the Anonymous collective.

 

Since one cold night in 2011, Anonymous UK has gathered together in Trafalgar Square, as a centerpiece of a worldwide Anonymous operation of global strength and solidarity, a warning to all governments worldwide that if they keep trying to censor, cut, imprison, or silence the free world or the free internet then we will not stand idly by.

 

 

Anonymous has no leaders, it has no central committee or public relations department, it is a hive-mind of normal people, just like you, who have decided that action is the only answer now.

 

 

In 2012 as Anonymous UK prepared to mobilise for November 5th a press release went out, every line filled with venom against the then Home Secretary Theresa May. In the four years that has passed Mrs May has risen to unelected power, fueled by right-wing rhetoric and striving to push the UK to even new lows. Anonymous UK has never shied from directly standing in opposition to Mrs May; in 2012 we launched a devastating cyber attack that crippled the Home Office’s website in response to her inaction about the threatened extradition of Gary McKinnon, a threat faced today by Lauri Love.

 

In 2016 we’re going to come knocking on Mrs May’s door.

 

 

Austerity measures, once seen as a horrendous option, have now become the political norm. The media gaze has shifted to making scapegoats out of migrants, but we have not forgotten the real cause of the hardship faced by hundreds of thousands of normal people. Cut the causes of the problems, don’t cause more, its time to take an axe to the Tory tree.

 

 

The last few November 5ths have fallen in the week, this year it falls on a Saturday. As we pour through the streets of London we aim to show the tourists and gentrifiers that London is not a city in subdued slumber, but a city full of people angry at their rulers, and passionate about change.

 

 

We look beyond the narrow scope of Brexit to the inherent problems of the system, capitalism is not working, capitalism has not worked, capitalism will not work. Its time to stop being complacent cogs, grinding towards the bosses’ next bonus package, and instead start working towards radical new solutions. We welcome all and anyone who agrees, you need not wear a Guy Fawkes mask to take to the streets on November 5th. We respect diversity of tactics and welcome anyone who takes the path of direct action.

 

 

Last year the biggest gang in London, the Met Police, attended our demonstration in force. Despite reinforcements from across the country they put on a pitiful display of aggression and violence. We call on the Metropolitan Police to restrain from violence and their usual mob mentality. To those attending November 5th with little experience of the Met we have simple advise, the police are not your friends, they do not regard you as such, do not regard them as such either.

 

 

In a society that has abolished all adventure, the only adventure left is to abolish that society.

 

You can’t arrest us all.

 

 

**

 

 

#MillionMaskMarch #MMM #MMM2016 #OpVendetta

 

#MillionMaskMarch London Press Release – Pastebin.com.

24-minute game-changing video: Electronic ‘voting’ machines without physical evidence = OBVIOUS ongoing election fraud; central method to pick a 51% to 49% ‘winner’ with fractionalized ‘counting’ documented

Black Box Voting’s Bev Harris explains the following 24 minute video:

A real-time demo of the most devastating election theft mechanism yet found, with context and explanation. Demonstration uses a real voting system and real vote databases and takes place in seconds across multiple jurisdictions.

Over 5000 subcontractors and middlemen have the access to perform this for any or all clients. It can give contract signing authority to whoever the user chooses. All political power can be converted to the hands of a few anonymous subcontractors.

“It’s a product. It’s scaleable. It learns its environment and can adjust to any political environment, any demographic. It runs silently, invisibly, and can produce plausible results that really pass for the real thing.”

Provides solutions and actions for immediate deterrence.


The Onion’s 2-minute satire of this ongoing condition:

My best frame of this obvious condition:

When Americans are told an election is defined by touching a computer screen without a countable receipt that can be verified, they are being told a criminal lie to allow election fraud. This is self-evident, but PrincetonStanford, and the President of the American Statistical Association are among the leaders pointing to the obvious (and hereherehereherehereherehereherehereherehereherehereherehereherehereherehere). Again, no professional would/can argue an election is legitimate when there is nothing for anyone to count.

Election fraud is one of ~100 Emperor’s New Clothes game-changing and professionally documented facts that reveal ongoing .01% empire with associated crimes.

The Crimes

  • The US is a literal rogue state empire led by neocolonial looting liars. The history is uncontested and taught to anyone taking comprehensive courses. If anyone has any refutations of this professional academic factual claim for any of this easy-to-read and documented content, please provide it.
  • US ongoing lie-started and Orwellian-illegal Wars of Aggression require all US military and government to refuse all war orders because there are no lawful orders for obviously unlawful wars. Officers are required to arrest those who issue obviously unlawful orders. And again, those of us working for this area of justice are aware of zero attempts to refute this with, “War law states (a, b, c), so the wars are legal because (d, e, f).” All we receive is easy-to-reveal bullshit.
  • And, obviously, corporate media are criminally complicit through constant lies of omission and commission to “cover” all these crimes. Historic tragic-comic empire is only possible through such straight-face lying, making our Emperor’s New Clothes analogy perfectly chosen.
  • The top three benefits each of monetary reform and public banking total ~$1,000,000 for the average American household, and would be received nearly instantly. Please read that twice. Now look to verify for yourself.

Demanding arrests as the required and obvious public response rather than ‘voting’ for more disaster:

The categories of crime include:

  1. Wars of Aggression (the worst crime a nation can commit).
  2. Likely treason for lying to US military, ordering unlawful attack and invasions of foreign lands, and causing thousands of US military deaths.
  3. Crimes Against Humanity for ongoing intentional policy of poverty that’s killed over 400 million human beings just since 1995 (~75% children; more deaths than from all wars in Earth’s recorded history).
  4. Tens of trillions in looting, including $6.5 trillion just reported by the US Department of “Defense” as “lost.”

US military, law enforcement, and all with Oaths to support and defend the US Constitution against all enemies, foreign and domestic, face an endgame choice:

In just 90 seconds, former US Marine Ken O’Keefe powerfully states how you may choose to voice “very obvious solutions”: arrest the criminal leaders (video starts at 20:51, then finishes this episode of Cross Talk):

Solutions worth literal tens of trillions to ‘We the People’:

Again:

  • The top three benefits each of monetary reform and public banking total ~$1,000,000 for the average American household, and would be received nearly instantly. Please read that twice. Now look to verify for yourself.
  • We can quantify the end of the lie-started and illegal Wars of Aggression quickly into the trillions, and that said, it’s worth a lot more than what we quantify.
  • Truth: a world in which education is expressed in its full potential to only and always begin with good-faith effort for objective, comprehensive, and verifiable data.

Would an ‘interview’ with George Washington, Thomas Jefferson, and John Adams help?

If so, here are two:

July 4th, 2016 interview with Washington, Jefferson, Adams: America’s REQUIREMENT from our Declaration of Independence & Constitution to arrest .01% criminal ‘Nobility class,’ or suffer as their indentured servants

‘Election’ 2016 interview with Washington, Jefferson, Adams: America’s right and necessity to arrest .01% tyrants engaged in lie-started illegal Wars of Aggression, bankster-looting, and constant lying

**

Note: I make all factual assertions as a National Board Certified Teacher of US Government, Economics, and History, with all economics factual claims receiving zero refutation since I began writing in 2008 among Advanced Placement Macroeconomics teachers on our discussion board, public audiences of these articles, and international conferences (and here). I invite readers to empower their civic voices with the strongest comprehensive facts most important to building a brighter future. I challenge professionals, academics, and citizens to add their voices for the benefit of all Earth’s inhabitants.

**

Carl Herman is a National Board Certified Teacher of US Government, Economics, and History; also credentialed in Mathematics. He worked with both US political parties over 18 years and two UN Summits with the citizen’s lobby, RESULTS, for US domestic and foreign policy to end poverty. He can be reached at Carl_Herman@post.harvard.edu

Note: Examiner.com has blocked public access to my articles on their site (and from other whistleblowers), so some links in my previous work are blocked. If you’d like to search for those articles other sites may have republished, use words from the article title within the blocked link. Or, go to http://archive.org/web/, paste the expired link into the box, click “Browse history,” then click onto the screenshots of that page for each time it was screen-shot and uploaded to webarchive. I’ll update as “hobby time” allows; including my earliest work from 2009 to 2011 (blocked author pages: herehere).

 

24-minute game-changing video: Electronic ‘voting’ machines without physical evidence = OBVIOUS ongoing election fraud; central method to pick a 51% to 49% ‘winner’ with fractionalized ‘counting’ documented.

FBI: Clinton Foundation investigation will lead to ‘Likely Indictment,’ donors funded ISIS

21st Century Wire says…

Yesterday we learned that for more than one year the FBI’s White Collar Crime Division have actually been investigating a pay-for-play activity between Hillary Clinton and the Clinton Foundation has been going on for more than a year. According FOX anchor Bret Baier, multiple FBI source said, ‘indictments are likely.’

This could get very interesting…

A number of new revelations could really raise the temperature on this scandal:

Last night, an RT Exclusive revealed what Julian Assange described as, “the most significant email in the whole collection.”

WikiLeaks highlighted an early 2014 email where outgoing Secretary of State Hillary Clinton is urging John Podesta, then an advisor to President Barack Obama, to “bring pressure” on Qatar and Saudi Arabia, “which are providing clandestine financial and logistic support to ISIL [Islamic State, IS, ISIS] and other radical Sunni groups.”

2-hillary-clinton-clinton-foundation-fbi-isis-saudi-arabia
Yes. You read that correctly: the Clinton Foundation was accepting millions of dollars in donations from the very Gulf states she knew were funding ISIS and Al Nusra terrorists – thus exposing the charade the Clinton and the Obama Administration have been playing ever since the ‘ISIS crisis’ began in June 2014.

Fox News Channel’s Bret Baier reported on the latest details of the Clinton Foundation investigation from two sources inside the FBI. He reveals five important new pieces of information in these two short clips:

1. The Clinton Foundation investigation is far more expansive than anybody has reported so far and has been going on for more than a year.

2. The laptops of Clinton aides Cherryl Mills and Heather Samuelson have not been destroyed, and agents are currently combing through them. The investigation has interviewed several people twice, and plans to interview some for a third time.

3. Agents have found emails believed to have originated on Hillary Clinton’s secret server on Anthony Weiner’s laptop. They say the emails are not duplicates and could potentially be classified in nature.

4. Sources within the FBI have told Baier that an indictment is “likely” in the case of pay-for-play at the Clinton Foundation, “barring some obstruction in some way” from the Justice Department.

5. FBI sources say with 99% accuracy that Hillary Clinton’s server has been hacked by at least five foreign intelligence agencies, and that information have been taken from it.

(Source: Real Clear Politics)
.
However, other leading commentators are skeptical about this latest stage play by FBI Director James Comey and the FBI. Listen to nationally syndicated radio host Rush Limbaugh’s intriguing explanation here:
.
Conclusion: Limbaugh took his postion many days ago, and based on the potential gravity of Assange’s recent Clinton-ISIS email revelation – this looks to be a compelling smoking gun. Therefore, Limbaugh looks to be stunningly accurate in his assessment.

READ MORE ELECTION NEWS AT:
21st Century Wire 2016 Files

 

FBI: Clinton Foundation investigation will lead to ‘Likely Indictment,’ donors funded ISIS.

Hillary’s ‘Russian Hack’ Hoax: The Biggest Lie of This Election Season

 

2-clinton-podesta-email
Patrick Henningsen
21st Century Wire

The longer this soap opera drags on, it’s becoming more and more evident that the Russian government did not ‘hack’ into the DNC, and Moscow is not feeding John Podesta’s emails to Wikileaks. For those who are deeply invested in this now official conspiracy theory, this might be a hard pill to swallow. 

The White House and the Hillary Clinton campaign are now married to the idea that ‘Putin is hacking the US elections.’ In response, the President is weighing his options – tougher economic sanctions, revoking diplomatic status to Russian envoys in the US, or even deploying his newly developed ‘malicious cyber-activity’ tools.

Even VP Joe Biden wants in on the action, threatening Moscow by saying,”We’re sending a message. We have the capacity to do it.”  Presumably, he’s referring to a cyber ‘counter attack’ by Washington.

It seems that where ever you turn nowadays, someone in Washington is issuing a threat against Russia. Are US-Russian relations really that bad, or does this trend have more to do with the defense industry and power struggles within the US?

What was previously a stance reserved for right-wing neoconservative hawks and Cold War hold-outs has now infected America’s left-wing, and is a firm plank in the Democratic Party platform, as evidenced by Hillary Clinton’s constant anti-Russian rhetoric throughout this 2016 election cycle. Along with the White House, Clinton has now transformed the Democrats into the vanguard of Washington’s new anti-Russia movement.

On July 27th, Josh Rogin from the Washington Post wrote, “The Clinton campaign has decided to escalate its rhetoric on Russia. After Trump suggested Wednesday that if Russia had indeed hacked Clinton’s private email server it should release the emails, the Clinton campaign sent out its Democratic surrogates to bash Russia and Trump in a manner traditionally reserved for Republicans.”

Anyone who was paying attention back then knew this ‘Russian hack’ talking point was purely political, but then again, who’s really paying attention these days? Certainly not the US media.

You can trace the genesis of the Democratic Party’s hardcore anti-Russian strategy back to when President Vladimir Putin made a mild passing remark about Donald Trump’s GOP primary success. From that point on, Trump’s political opponents saw this as an open target. In their words, ‘comparing one dictator to another.’

Never one to pass up an opportunity to score cheap political points, President Obama got in on the act, intensifying the Trump-Putin narrative to the level of bromance. “If you’ve made a career out of idealizing Ronald Reagan, then where were you when your own party’s nominee for president was kissing up to Vladimir Putin?” said Obama on Oct 20th at a Clinton rally in Miami.

obamaBacked by the Obama White House, Clinton and the media felt they had a green light to keep pressing ahead with blaming Russia – not only for the controversial DNC leaks, but also for hacking into US election systems in Arizona – a charge devoid of any evidence other than innuendo and speculation. The media’s coverage on this issue was deceptive from the onset. In a leading news release, entitled, Russian hackers targeted Arizona election system,” we can see how after the cock-sure headline, the first paragraph would always sound definitive:

“Hackers targeted voter registration systems in Illinois and Arizona, and the FBI alerted Arizona officials in June that Russians were behind the assault on the election system in that state.”

But then by the time you advanced down the story, the report would quickly retreat into a zone of uncertainty:

“The bureau described the threat as “credible” and significant, “an eight on a scale of one to 10,” Matt Roberts, a spokesman for Arizona Secretary of State Michele Reagan (R), said Monday. As a result, Reagan shut down the state’s voter registration system for nearly a week.”

And then, down to almost nothing…

“It turned out that the hackers had not compromised the state system or even any county system. They had, however, stolen the username and password of a single election official in Gila County.”

At no point was any evidence ever given. Only ambiguous statements like, “Cyber security officials agree that this looks very much like a Russian government-directed hack.”

Are American politicians so callous as to tempt geopolitical conflict in order to further their short-term political ambitions? Better yet, has American political life really arrived in such a dark cul de sac (translated in French: ‘bottom of the bag’) where politicians in power are so insecure as to make-up and propagate wild international conspiracy theories – in the middle a national election cycle? It’s a very depressing prospect, and yet, this is exactly what we are seeing in this 2016 Presidential Election.

Behind Clinton’s wild hyperbolic rants about the Kremlin and Wikileaks, you will find the White House… 

On October 7th, the Obama Administration formally accused the Russian government of stealing emails from the Democratic National Committee and other high-profile individuals including Hillary Clinton’s campaign manager John Podesta – giving them to Wikileaks. 

Soon, there was a queue of ‘national security’ politicians eager to hitch a ride on this bandwagon. Senator Ben Sasse (NE-R), a member of the Homeland Security Committee spouted out, “Russia must face serious consequences. Moscow orchestrated these hacks because [Russian President Vladimir] Putin believes Soviet-style aggression is worth it. The United States must upend Putin’s calculus with a strong diplomatic, political, ­cyber and economic response.”

According to a Washington Post report by technology editor, Ellen Nakashima, the only ‘evidence’ that seems to be available on this story is a corporate analysis of the alleged ‘Russian government hacks’ – provided by a US cyber security company called Crowdstrike. No actual specifics are given, so we are meant to take private firm Crowdstrike’s word for it.

screen-shot-2016-11-01-at-02-50-39

IMAGE: Crowdstrike cyber security.

The Post’s Nakashima then added:

“The administration also blamed Moscow for the hack of the Democratic Congressional Campaign Committee and the subsequent leak of private email addresses and cellphone numbers of Democratic lawmakers.”

An online persona calling himself Guccifer 2.0 has claimed responsibility for posting the material. Those sites and that persona are “consistent with the methods and motivations of Russian-directed efforts,” the joint statement said. “… We believe, based on the scope and sensitivity of these efforts, that only Russia’s senior-most officials could have authorized these activities.”

Moscow’s press secretary’s reply: “This is some sort of nonsense,” said Dmitry Peskov.

Despite the constant repetition by Democrat media surrogates, and as CNN’s Maria Cardona said last night, no US national intelligence agency has really “confirmed” that Russia was behind the email hacks – and still no evidence, other than speculative guesswork, has been presented.

Likewise, US intelligence agencies have never actually said definitively on record that “Russia did it,” thus, leaving the door open to walk-back the accusation at a later date. Standard Washington procedure of ambiguity. This little detail doesn’t seem to matter in this hyperbolic political climate though. It seems that the White House, Hillary Clinton and media operatives like Cardona – are quite happy living in what John Kerry recent dubbed as a ‘parallel universe.’

The announcement, albeit vague, actually originated from the Office of the Director of National Intelligence.

Still, during the final Presidential debate, Hillary Clinton proudly crowed how “17 US intelligence agenciesaka the “Intelligence Community” – all agreed that Russia did it. 

“We have 17 intelligence agencies, civilian and military, who have all concluded that these espionage attacks, these cyberattacks, come from the highest levels of the Kremlin, and they are designed to influence our election,” said Clinton. “I find that deeply disturbing.”

What’s even more disturbing is the fact that Clinton is lying in front of a national audience. The highest levels of the Kremlin? Here are Clinton’s ’17 agencies’:

Air Force Intelligence, Army Intelligence, Central Intelligence Agency, Coast Guard Intelligence, Defense Intelligence Agency, Energy Department, Homeland Security Department, State Department, Treasury Department, Drug Enforcement Administration, Federal Bureau of Investigation, Marine Corps Intelligence, National Geospatial Intelligence Agency, National Reconnaissance Office, National Security Agency, Navy Intelligence and the Office of the Director of National Intelligence.

What does the Coast Guard Intelligence, National Geospatial Intelligence Agency or the Drug Enforcement Administration know about John Podesta’s emails? Answer: nothing.

The exact same thing happened following Wikileaks first trove of DNC emails back in July 2016. The US government issued a vague accusatory statement, but would not actually name the culprit. Some might call that propaganda.

In both instances, the Obama Administration refused to present any evidence. Translated: there was no evidence. If there had been, the White House would have been shouting from the rooftops and using it as leverage to apply muscle in the UN over Washington’s  flagging efforts in Syria. Both Obama Administration announcements were nothing more than dog whistles for Democrats and “journalists” working for hopelessly partisan outlets like New York Times and CNN – none of whom have bothered to press the White House for one ounce of evidence pertaining to the Party’s decree that “Russia is hacking the US election process.”

If you actually look at the joint DNI-DHS statement issued on the matter, it contains no definitive statement: 

“… [the hacks] are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process. Such activity is not new to Moscow — the Russians have used similar tactics and techniques across Europe and Eurasia, for example, to influence public opinion there. We believe, based on the scope and sensitivity of these efforts, that only Russia’s senior-most officials could have authorized these activities.”

According to NSA intelligence worker-turned whistleblower William Binney, when asked about WikiLeaks and whether the Russians are ‘hacking’ US elections, he concluded that the cyber efforts against the DNC were more likely to be the work of a “disgruntled U.S. intelligence worker.

Under partisan pressure from senior Democrat Senator Harry Reid, the FBI also initiated another investigation into “people linked to the Trump team with Russia.” Reid was unset about the DNC hacks and the Podesta emails and demanded the FBI do something about the Trump campaign. To date, the FBI haven’t come up with anything.

To be fair, Hillary would have every reason to believe that the Kremlin is behind the hack – because her staff read it to her from the campaign’s daily intelligence briefings, presumably, supplied from the US government’s much vaunted Intelligence Community. Of course, that’s the same Intelligence Community that briefed George W Bush about Saddam’s nonexistent nuclear weapons program, and who also briefed Colin Powell about Iraq’s imaginary “Winnebagos of Death” aka mobile anthrax labs disguised as senior double-wide camper vans. So, of course, they would know if Putin directed the DNC leaks and Podesta email hacks.

For those us who are skeptical of the great oxymoron known as ‘Washington Intelligence,’ I can almost hear the mainstream rebuttal now, “No, that was Iraq, that was Bush. We’re not like that. No, this time it’s different. This time we are sure the Russians did it!”

1-north-korea-hack-unit-121
In 2014, Obama claimed that Kim’s notorious “Bureau 121” hacked into Sony Pictures. 

This isn’t the first time that President Obama has cried wolf on a foreign ‘hack’ and then tried to sell it for political purposes. Back in December 2014, Obama claimed that North Korea had hacked Sony Pictures in Hollywood. Pentagon-CIA media proxy CNN quickly chimed in to support Washington’s conspiracy theory, floating a colorful story that Kim Jing-Un had deployed a secret underground hacking unit called Bureau 121.’ Just like with today’s “Russian Hack” theory, no member of the mainstream press dared to question the White House’s ridiculous North Korean claim, and like the ‘Russian Hack’ claims, the only source cited for Sony hack was analysis provided by US firm Crowdstrike.

Jumping the Shark

After their Democratic Party Convention on July 27th, the Clinton campaign machine put all of its chips on their Putin narrative.

Soon after, a cadre of top Clinton national security surrogates then accused Trump of emboldening Russia in their evil plot to “destabilize and dominate the West.”  Tom Donilon, a former national security adviser then accused Russia of ‘interfering’ with elections all over Europe and then accused Trump is helping Russia directly. At that point, they were in too deep to turn back.

Clinton spin doctors Josh Schwerin and Michael Fallon would stoop even lower by accusing RT of having possession of the Podesta emails even before Wikileaks did. Their only ‘evidence’ seemed to be Twitter posts by RT News which Clinton held up as ‘proof’ that the Kremlin was front-running Wikileaks email dumps. The Clinton braintrust failed to note that the Podesta emails were posted on Wikileaks own website well before RT News had tweeted about them. At that point it became obvious that the Clinton campaign was panicking and hysterically grabbing for any excuse they could get their hands on. We then watched, as one RT reporter after another dismantled the Clinton campaign’s desperate claims. It was embarrassing. They could not face the uncomfortable fact that it was WikiLeaks head Julian Assange who chose the timing of the release of the DNC and Podesta emails. Rather than attack Assange himself, who happens to be popular with millennials (the very group Clinton struggles to connect with), her operatives opted to target Russia and Trump instead. Either way, the political strategy here is clear – to shoot the messenger. The Clinton campaign is stuck in permanent rear-guard mode, because based on the content of both the DNC Leaks, Wikileaks files, and Project Veritas video – their own Democratic Party has been discredited and exposed as a corrupt political organization. Their other big problem is that despite all the outrage from Democrats and their mainstream media surrogates, none of the leaked content has been challenged on the basis of its authenticity. The results speak for themselves. The initial DNC leak of 20,000 emails resulted in the resignation of DNC Chairwoman Debbie Wasserman Schultz. They revealed the unthinkable: the Democratic National Committee actively worked to undermine the Presidential campaign of Bernie Sanders in favor of the establishment choice in Hillary Clinton. Sanders never had a chance. Honest commentators called this an affront to the democratic process, while party insiders and Clinton supporters pretended to be aloof as if it never happened. To prove this point, both President Obama and Hillary Clinton then gave Wasserman-Schultz a glowing endorsement on the way out. “For the last eight years, Chairwoman Debbie Wasserman Schultz has had my back. This afternoon, I called her to let her know that I am grateful,” said Obama. Not surprisingly, Clinton thanked Wasserman Schultz, presumably for helping to knock her only competitor Sanders out of the Democrat primary race. “I am grateful to Debbie for getting the Democratic Party to this year’s historic convention in Philadelphia, and I know that this week’s events will be a success thanks to her hard work and leadership,” said Clinton. The party had sold its soul to devil and no one seemed to care too much about it. Party Meltdown Wasserman Schultz’s replacement didn’t fair much better. DNC Vice Chairwoman Donna Brazile was installed to serve as interim chair through the remainder election, but Brazile was soon skewered by subsequent Wikileaks batches – showing how, on more than one occasion, she fed debate questions obtained from corrupt mainstream media operatives – straight to Hillary Clinton. A March 12 email exchange shows Brazile stating that she received a town hall question from Roland Martin, a TV One host who co-moderated a March 13 town hall with CNN’s Jake Tapper.” A March 5 email shows that she shared a question with Clinton campaign chairman John Podesta and communications director Jennifer Palmieri that was to be asked in a March 6 debate hosted by CNN in Flint, Mich.” (Source: Daily Caller) Brazile’s audacious fraud also helped contribute to her party’s planned sabotage of Democrat challenger Bernie Sanders. Watch Brazile go into full meltdown when confronted here: . Completely corrupt and still, Brazile even had to temerity to deny doing it when pressed on FOX News last week. Brazile’s reputation is so bad now that even CNN has severed ties with her – and that’s saying a lot. In addition, it was also revealed how CNN’s head political commentator, Gloria Borger, was named by Podesta as one of a shortlist of ‘journalists’ the Clinton campaign would “work with” to gain favorable coverage. You’d think that CNN would have dropped Borger after this was revealed, but no. Amazingly, Borger is still leading CNN’s election coverage. Clearly, CNN cannot be trusted to police itself when it comes to matters of outright collusion with Hillary Clinton and the Democratic Party.


Worse Than Watergate

Perhaps a bigger scandal which the Obama White House and Clinton campaign operatives would like to bury – is the FBI’s investigation into the Clinton Foundation. Yesterday, the Wall Street Journal confirmed the existence of an internal feud between the FBI and the Justice Department, over whether or not to pursue an investigation into Clinton issue:

“Some investigators grew frustrated, viewing FBI leadership as uninterested in probing the charity, these people said. Others involved disagreed sharply, defending FBI bosses and saying Mr. McCabe in particular was caught between an increasingly acrimonious fight for control between the Justice Department and FBI agents pursuing the Clinton Foundation case. It isn’t unusual for field agents to favor a more aggressive approach than supervisors and prosecutors think is merited. But the internal debates about the Clinton Foundation show the high stakes when such disagreements occur surrounding someone who is running for president.”

There’s more. It was also revealed last week how Jill McCabe, the wife of FBI Deputy Director, Andrew McCabe, received $467,500 in campaign funds in late 2015 for her Virginia State Senate run. This unusually large donation came via a political action committee run by Virginia Gov.Terry McAuliffe – a Clinton Foundation board member. After the funds were donated, Andrew McCabe was then put in charge of the Clinton Email case. In normal times, this one scandal would be bigger than Watergate, but these are not normal times.

So why is Washington going all out to deflect to Russia, and cover-up the Clinton scandals, and the Wikileaks document dumps? One reason is because the Clinton email issue goes all the way to the top – to the President himself.

What 21WIRE reported on Oct 21st is how President Obama lied when first confronted about whether or not he knew about the existence of Hillary’s unauthorized private server. Obama told CBS News on March 7, 2015 that he only found out about Clinton’s server “the same time everybody else learned it through news reports.” The President’s lie was confirmed when newly released FBI documents showed that:

“Obama used a pseudonym [bobama@ameritech.net] when communicating with then-Secretary of State Hillary Clinton by email, and at least one of those emails ended up on Clinton’s private email server.”

So, not only did Obama lie on national TV, but he also broke strict White House security protocols by carelessly exchanging private emails “off grid” with Hillary Clinton on a unsecured and unauthorized mail server –  maybe to avoid the same scrutiny one would have on a government system. Who knows why he did it.

Sure, he’s not the first US President to lie, but like, Richard Nixon and Bill Clinton, Obama just joined that exclusive liars club – caught out lying to the American people.

On top of this, any communications made by the President of the United States are de facto labeled as “born classified.”  The same goes for any State Department communications with other foreign ministers.

1_podesta_huma
COVER-UP: John Podesta and Huma Abedin on the Hillary campaign jet (Image: ABC News)

It should be well known by now after watching both Attorney Generals Eric Holder and Loretta Lynch in action – that the Obama Justice Department (DOJ) is one of the most politicized in history. Bear that in mind when looking at the latest leg of the Hillary Email case.

On Friday, FBI Director James Comey set the election alight after announcing that the FBI would be reopening the Clinton email case – currently examining 650,000 emails found while investigating a laptop belonging to former US Congressman Anthony Weiner (estranged husband of top Clinton aid and long-time confidant Huma Abedin) who was snared in a ‘sexting’ scandal, allegedly involving a underaged female. So which DOJ person is in charge of this investigation? None other than Assistant Attorney General Peter J. Kadzik. Who is Kadzik?  Zero Hedge reports:

“Oh yes. Recall our post from last week, “Clinton Campaign Chair Had Dinner With Top DOJ Official One Day After Hillary’s Benghazi Hearing” in which we reported that John Podesta had dinner with one of the highest ranked DOJ officials the very day after Hillary Clinton’s Benghazi testimony? It was Peter Kadzik.”

Oh, and if that wasn’t good enough, Kadzik was also Podesta’s lawyer back in 1998 when Ken Starr was investigating Podesta over his role in helping Bill Clinton intern/mistress Monica Lewinsky land a job at the United Nations. The two were described as ‘best friends.’ FOX News confirms:

“Fantastic lawyer. Kept me out of jail,” Podesta wrote on Sept. 8, 2008 to Obama aide Cassandra Butts, according to emails hacked from Podesta’s Gmail account and posted by WikiLeaks.

To call the Clinton circle incestuous would be an understatement, and on the whole, Americans are sick of it.

Russia – The Party Scapegoat

Former Democratic Party leader Howard Dean was so incensed about the FBI reopening the case, he accused the FBI director of being in league with Russia, Tweeting: “Ironically Comey put himself on the same side as Putin.”


Another veteran party operative and lifetime Clinton defender, James Carville, was so upset by the FBI announcement that he accused “the KGB” working with Republicans to “hijack the election” during his wild rant on MSNBC.

“I think this an outrage and I think the fact that the KGB is involved in this election is an outrage and I think the American people ought to take their democracy back regardless of what the press wants to do and the excuses they want to make for Comey. That’s what I think,” said Carville.

Maybe someone can remind Carville that there is no KGB, and that the Soviet Union actually dissolved in 1991.

1-quote-lavrov

These are just a few scandals surrounding the Democratic Party and the Clinton campaign, along with the many exposés revealed through Wikileaks, and the Podesta email batches. Those are actual scandals with real tangible evidence – unlike the ‘Russians hacking the DNC and John Podesta and passing those to Wikileaks.’ 

Suffice to say, the Democratic Party machine has already demonstrated that it is prepared to say anything in order to deflect and divert attention away from the damning Wikileaks material, and also blame Donald Trump in the process. It should be obvious by now that in their desperation to push a highly comprised Hillary Clinton over the finish line on November 8th, the Washington establishment has concocted the story that ‘Putin is trying to influence our electoral process in the US.’ They’ve tried to lay this at the feet of Donald Trump, who Obama and Clinton claim has some secret special relationship with Vladimir Putin. The liberal mainstream media have made a meal out of this talking point, and anti-Russian war hawks on the Republican side love it too. For the White House and the Clinton campaign this seemed like the ultimate clean sweep – a perfect double entendre.

The geopolitical strategy behind this move was twofold. First, this non event would be used to advance immediate calls for  sanctions against Russia. Secondly, the US could continue to lean on Russia in the UN over Syria. Previously, 21WIRE reported how Washington’s State Dept and UN delegations, led by the dynamic trio of John KerrySamantha Power, and John Kirbyalready lied when levelling charges against Russia for war crimes in Aleppo, and again while accusing Russia and Syria of conducting an airstrike on a UN Aid Convoy in Syria. As we have already shown – that raid was most likely a ground attack carried out of US-backed ‘rebels’ Al Nusra Front, or Nour al-Din al-Zenki.

With so much at stake geopolitically, why would Washington lie about a potential World War III trigger event? If they are prepared to lie about this, what else are they prepared to lie about?

The demonization of all things Russian has definitely accelerated since late 2013 when the US engineered a coup d’etat in Kiev, Ukraine. Ever since that it’s been a go-to talking point for ginning-up and new transaltlantic arms race, as with Republican war hawks – and a convenient scapegoat for any politician requiring misdirection, like Clinton and the Democrats. When the new year rang in 2015, the newly appointed head of the U.S. Broadcasting Board of Governors, Andrew Lack, announced the new challenges facing America’s own state-run media arm that includes U.S. overseas propaganda assets including Voice of America, Radio Free Europe/Radio Liberty, the Middle East Broadcasting Networks and Radio Free Asia. Lack said, “We are facing a number of challenges from entities like Russia Today which is out there pushing a point of view, the Islamic State in the Middle East and groups like Boko Haram,” He was forced to resign shortly after that.

What’s clear is that when it comes to all things Russian, there is an established pattern of compulsive lying by this US Administration. The list is too long to chronicle here, although ‘Russian-backed Rebles Shootting Down MH17,’ and ‘Assad Regime Sarin Attack in Damascus in 2013‘ certainly comes to mind.

That said, it’s hard to imagine a lie as egregious and potentially destructive than one which accuses the Russia government, a world nuclear power and member of the UNSC, of ‘Hacking Into the US Electoral Process.’ When you examine history however, what you will find is plenty of evidence documenting exactly how the US government and the CIA have altered and flipped 100 foreign elections throughout history, the attempted assassination of over 50 foreign leaders. Knowing all this, one might find it hard to take seriously Washington’s claims that Putin and Trump are trying manipulate the 2016 Election

On Oct 9, 2016, Russian Foreign Minister Sergei Lavrov laid it all on the table:

“We have witnessed a fundamental change of circumstances when it comes to the aggressive Russophobia that now lies at the heart of U.S. policy towards Russia. It’s not just a rhetorical Russophobia, but aggressive steps that really hurt our national interests and pose a threat to our security.”

Self-serving, career political operatives in Washington are playing a dangerous game. History will mark this as one of the biggest political follies of the Obama-Clinton era.

Knowing what we now know about the NSA and its ability to hack and grab any email or text message from anyone, anywhere – if Washington really wanted to know where the hacks came from, maybe they could start there. Far be it from anyone in Washington or the media to ever adopt that line of inquiry.

Still, we’re waiting for the emergence of an adult in the room in Washington – before it’s too late.

READ MORE ELECTION NEWS AT: 21st Century Wire 2016 Files

SUPPORT 21WIRE – SUBSCRIBE & BECOME A MEMBER @21WIRE.TV

 

Hillary’s ‘Russian Hack’ Hoax: The Biggest Lie of This Election Season.

Ex-CIA Spy: A Global Open Source Revolution Is About To Begin

When Robert David Steele speaks, people listen. Especially those within the military and intelligence communities around the world.



With his continued rhetoric on the open source everything manifesto as a way to positively transform this world for all, Mr. Steele has additionally begun discussing the world’s largest financial/gold cover-up story which has ties to JFK’s assassination and 9/11: That is, the global collateral accounts.

As a former CIA spy who has trained over 7,500 officers from over 66 countries,  Robert Steele has over 18 years experience across the U.S. Intelligence community  and an additional 20 years experience in commercial intelligence and training. He is  also a former Marine and he is the co-founder of the Marine Corps Intelligence  Activity.

He has also written several books, which include, The Open Source Manifesto and  Intelligence For Earth: Clarity, Diversity, Integrity and Sustainability, among others.

In accord to open source everything, Robert’s motto is: The truth at any cost, lowers all other costs.

Essentially, when information, technology and resources are opened up as the  commons to all, the true cost plummets and the well-being of our planet and all living  beings here begin to thrive, as well as our social, political and financial systems.

In Robert’s own words, the open source revolution will transform our world for the better and for all.

“Sharing, not secrecy, is the means by which we realize such a lofty destiny as well as create infinite wealth. The wealth of networks, the wealth of knowledge, revolutionary wealth- all can create a nonzero, win-win Earth that works for 100% of humanity. This is the ‘utopia’ that Buckminster Fuller foresaw, now within our reach.” 

Similar models to Steele’s open source everything also include The  Venus Project: Beyond Politics, Poverty and War, which calls for a  holistic approach to changing the systems on this planet in a way that  utilizes technology and human ingenuity to provide a high standard of  living for every person by opening the planet’s resources for the use of  all– in a strategically sustainable and efficient manner.

Another model that is similar is Sustainable Human’s gift-based  community in which all who participate are volunteers and everything  created is done to “spread knowledge, ideas and alternative ways of  living that enable humanity to live in harmony with the rest of life on Earth. ”

All of these models are wonderful and appropriate to envision, and what is certain is that most of the social systems we have in place currently, must go. Fundamental change is necessary.

In an interview with The Guardian, Robert David Steele was asked his opinion on the idea that the U.S. is on the verge of revolting against the elitist 1%:

“The preconditions for revolution exist in the UK, and most Western countries [including the U.S].

The number of active pre-conditions is quite stunning, from elite isolation to concentrated wealth to inadequate socialization and education, to concentrated land-holdings to loss of authority to repression of new technologies, especially in relation to energy, to the atrophy of the public sector and spread of corruption, to media dishonesty, to mass unemployment of young men and on and on and on.” 

What then needs to happen for this to begin? Steele says:

“Preconditions are not the same as precipitants. We are waiting for our Tunisian fruit seller. The public will endure great repression, especially when most media outlets and schools are actively aiding the repressive meme of ‘you are helpless, this is the order of things.’

When we have a scandal so powerful that it cannot be ignored by the average Briton or American, we will have a revolution that overturns the corrupt political systems in both countries, and perhaps puts many banks out of business. Vaclav Handel calls this ‘The Power of the Powerless.’ One spark, one massive fire.” 

Interestingly, this interview was conducted almost exactly 2 years ago. Have we not seen the divide  between the 99% and the 1% continue to grow in that time? Humanity will not remain quiet for much longer. We are  indeed close to some big and positive changes.

Perhaps this massive  scandal/event we are waiting for is the conclusion of the FBI’s investigation of Hillary Clinton and the Clinton Foundation or maybe it is Britain’s vote to leave the EU, potentially triggering a cascade of revolts throughout Europe and then the world, or perhaps it will be a large enough group of people becoming aware of the global collateral accounts, the world’s largest  financial/gold cover-up which has relation to JFK’s death and the  events of 9/11; a story which just three weeks ago Robert David Steele started to write about publicly:

It never occurred to me that accidentally becoming the top Amazon reviewer for non-fiction, partially associated with my being the lead for Open Source Intelligence (OSINT) for 25 years across 66+ countries, would be vastly more important than everything I ever learned across multiple graduate degrees, as a former spy, and as co-founder of the Marine Corps Intelligence Activity (MCIA).As I encounter disbelief about Neil Keenan and his role as the main juncture between the Dragon Society and the West as we move toward a global economic re-set, I have to remind myself that 80% of the public still thinks JFK was assassinated by Lee Harvey Oswald; J. Edgar Hoover was a moral man; the Israelis attacked the USS Liberty by accident, and 9/11 was carried out by a bunch of “rag heads” armed with box cutters. 

I must emphasize that it was not the books that underlay my absolute confidence in Neil Keenan and the Dragon Society and the broad outlines of the coming global re-set, but rather the people behind the books that I have taken the trouble to meet, sometimes under quasi-clandestine circumstances. Sterling and Peggy Seagrave – Peggy has passed – stand out.

Their book, Gold Warriors–America’s Secret Recovery of Yamashita’s Gold, came with a CD containing 60,000 additional documents including maps and photographs. That led me to a quasi-clandestine meeting in France to interview them for the 2004 offering of my international conference – the transcript is online – and a deep continuing relationship of trust.”

The public endorsement of Neil Keenan and his team’s efforts to open the global collateral accounts from Robert David Steele is another clear indication that these accounts are indeed real and that those who are working with Neil Keenan (positive factions within The Pentagon and CIA, Russian Intelligence, presidents and prime ministers of  multiple South American countries and several Asian countries, among many other political, financial and intelligence and military groups who are all quietly and sometimes openly working for humanity’s best interest) are legitimate.

The global collateral accounts have such a deep and complex history, which can be read in great detail here. In short, they are off-ledger accounts backed by gold, silver and many other assets which were originally intended for humanitarian projects.

JFK signed what is known as the Green Hilton Memorial Agreement with President Sukarno of Indonesia, which was to use these accounts to issue a new US Treasury Note (backed by gold and silver) and end the Federal Reserve’s control over the global financial system.

Neil Keenan is now getting very close to opening these accounts for the intended purposes of transforming our world for the better through many humanitarian projects as well as the release of free energy technologies and an overhaul in the global financial system. Russia, China, Iran, Indonesia and almost the entire Eastern hemisphere is supporting this plan in one way or another.

Perhaps Robert David Steele’s ideas on an open source world will be part of the coming humanitarian projects.

As almost anyone can see when they look around either at their own lives or the world at large, everything is changing. Everything is in flux. Everything happens in cycles. The time for positive global change is now.

For more information on some of the topics mentioned above, check out these articles: 

The Inevitability of Peaceful Revolution

We Need A New, Beneficial Global Economy

The Connection Between 9/11, JFK and the Global Collateral Accounts

The Most Important Financial Meeting Since JFK’s Death Just Took Place

The Alliance That Is Taking Down The New World Order

 

Ex-CIA Spy: A Global Open Source Revolution Is About To Begin.

The Snowden Test

Edward Snowden

 

No doubt you know the basic story.

 

Beginning June 5th 2013, a series of explosive articles ran in The Guardian (and subsequently a handful of other newspapers/magazines) detailing a vast web of global surveillance (engineered by the U.S. National Security Agency and U.K. partner GCHQ). The revelations were backed by large troves of primary information (code-names/programme descriptions) and internal documents (charts and diagrams) apparently directly sourced from the NSA.

 

A storm of controversy soon erupted over the breadth and ubiquity of this global surveillance. Forthcoming details on the myriad of previously secret programmes made it clear that email, text, phone data and communications were being scooped-up, recorded and analysed on a mammoth and almost unimaginable scale around the world.

 

On June 9th, 4 days after the earth-shaking leaks began, the then 29 year-old Edward Snowden identified himself as the source of the leaks. Secreted in a Hong Kong hotel room, Snowden volunteered his motives and personal history to a voracious media and public. What followed in the succeeding 2 weeks resembled an international spy-thriller, as Snowden fled from one safe-house to another throughout Hong Kong, always one step ahead of the press and (presumably) U.S. law enforcement.

 

 

The details are sometimes contradictory, but apparently Snowden then boarded a flight from Hong Kong June 23rd en route (via Moscow and Havana) to safe haven in South America. Oddly, sometime during that flight the U.S. government revoked Snowden’s passport, causing him to be stranded in Moscow’s Sheremetyevo International Airport. After a lengthy period (somehow, and somewhat miraculously, avoiding both assassins and journalists for over a month) Snowden received legal asylum and left the airport to begin a new life in the Russian Federation.

 

Meanwhile, various news outlets continued a drip-feed of dramatic and ‘Orwellian’ revelations.

 

Snowden had become an iconic figure. Celebrated by ‘progressives’ as a whistleblower and hero, derided by ‘conservatives’ as a traitor and fugitive – he lives presently (we’re told) with his girlfriend in Russia, and appears (sporadically) as an advocate of communications privacy and government accountability.

 

Further theatrics were provided by the incidents of an Ecuadorian Presidential plane being forced to land, numerous international political leaders’ communications being routinely tapped and fierce debate about the probity of Snowden’s actions and the actual spying regime he exposed. American conservatives and pundits denounced his ‘treason’ and pleaded for his ‘extrajudicial assassination’ while others hailed his patriotism.

 

Snowden ID

 

It was a thrilling, captivating and microscopically reported tale.

 

Yet somehow…it doesn’t quite stack up. Some thread of doubt remains, some scent of faint incredulity lingers.

 

Questions provoked by the official narrative are partly logistical, partly philosophical and decidedly pragmatic.

 

For starters: are we really to believe (especially in light of his own revelations of an all-pervasive clandestine surveillance regime) that Snowden, after booking a flight to Hong Kong (and soon after  – numerous hotel rooms) all admittedly on his own credit card, could not be immediately traced and apprehended (or ‘neutralised’) shortly after (assumedly) the entire U.S. security apparatus had been alerted to his actions and movements? Is it really plausible that possibly the world’s most wanted man (at that moment) could just ‘go-to-ground’ and evade the ‘all-seeing-eye’ for a full fortnight in a cosmopolitan and highly-accessible city?

 

Some sources report that Snowden gave up his rental home in Hawaii (as he was ostensibly ‘transferring jobs’) just days before he ‘fled’ to Hong Kong and global infamy. How convenient.

 

Snowden also comes from a family steeped in security state nomenclature. His grandfather was a rear-admiral and subsequently a senior FBI official (present at the Pentagon on September 11th 2001) while apparently “everybody in my family has worked for the federal government in one way or another.” Snowden himself enjoyed stints at the CIA and NSA before landing at defence contractor Booz Allen Hamilton. Surely it would be starkly traumatic for one so tethered to the military-industrial-complex, to suddenly turn ‘traitor.’

 

Still other questions rudely interrupt the ostensibly chivalrous tale.

 

To put it bluntly, Snowden is possibly just a little too young to be a convincing whistleblower. 29 year-old whistleblowers are statistically a rare thing indeed. By definition – zealots must start with zeal. Only over time is it plausible for the zealot to become wizened by the ugly machine of which he is but a cog. Just a handful of years before turning tumultuous ‘whistleblower’ Snowden was to be found on internet tech-forums waxing enthusiastically about the security state. His ‘gestation’ from true-believer to ground-quaking operative seems unusually and unconvincingly brief.

 

Fellow whistleblower William Binney is more likely (at least by age) to be the real deal. Over three decades in spy-craft he reportedly became increasingly frightened by the metastasising spectre of the national-security-complex. His revelations, while similar in tone to Snowden’s and predating them by over a decade, were greeted with little fanfare (and considerable personal harassment and marginalisation).

 

By contrast, Snowden was granted immediate and enthusiastic access to the most venerated organs of ‘controlled opposition’ and officially sanctioned stenography. Each outlet sticking dutifully to their established charter and brand demographic.

 

While (by some sleight-of-hand) still able to present itself as ‘progressive’ and ‘independent’, the New York Times is neither. Socially liberal yet aggressively war-like in foreign policy tastes (just how elites like it), the NYT has led the charge to countless illegal and immoral invasions/wars/actions and interventions, baying for rivers of blood from Iraq to Syria and beyond.

 

Likewise, the U.K Guardian gives oxygen to a raft of somewhat nebulous social concerns with po-faced righteousness, while yet being a clamorous cheerleader for bombing and murder from Libya to Ukraine (how many times can one newspaper repeatedly invent the ‘Russian invasion of Ukraine’ and retain any kind of credibility?).

 

Similarly, there is something decidedly absurd about the pretence of exclusive Snowden techno-anarchist sound-bites gracing the pages of neocon-beltway-bible The Washington Post.

 

And yet those glorified minarets of state/private propaganda champion a supposedly dangerous traitor/whistleblower absconded into enemy territory? It doesn’t add up.

 

Indeed, The Guardian tasked one of its most voracious experts in officially-sanctioned fellatio (Luke Harding), to mint the approved novelisation of poster-boy Snowden’s exploits. Harding’s long stint of feeble, flaccid journalism in thrall to MI6 and deep-state enabling has finally found just recompense in a big-time Hollywood pay-cheque (his book adapted for Oliver Stone’s forthcoming Snowden biopic).

 

As a blunt instrument of propaganda, Clint Eastwood’s “American Sniper” might indeed make Leni Riefenstahl blush, but could the Snowden gambit be a far more insidious and subtle secret-state strategy?

 

In purely practical terms alone, the ‘Snowden revelations’ have been an unmitigated victory for the national security state. A global public that was previously blissfully unaware of its position as central target of mass surveillance has now been thoroughly (and generally, comfortably) acclimated to that very idea. A raft of recent studies conclude that the Snowden revelations have had a marked chilling effect on people’s online habits and expressions of dissent.

 

Indeed, for a permanent cyber-Panopticon to be truly effective as a means of social control, the inmates (the global public) must be at least peripherally aware of its existence. Assuming it does actually exist and one of its aims is (logically) the abortion of popular dissent (through mass scale self-policing), a gargantuan surveillance apparatus also has clear uses as a giant blackmail machine (this would neatly explain the perpetually compliant response from the legislature and judiciary) and as a profound and unimaginably effective tool of social engineering.

 

Snowden - 4

 

Perhaps we are already there? Various leaks about Facebook and the Pentagon’s partnered experiments in ‘crowd herding’ and ‘emotional contagion,’ along with the underreported long-term history of tech corporations (Google, Microsoft, Facebook etc.) co-parenting with the NSA-CIA-Pentagon-DARPA nexus, hint that the entire electronically mediated womb-environment of today might just be one vast dark Psy-Op (interestingly, Vladimir Putin once referred to the internet as a ‘CIA Project’).

 

Software already exists to constantly monitor social media, analyse (in real-time) public trends and responses, and generate automatic (i.e robotic) comments/posts supporting (or denigrating) a chosen policy/worldview/opinion/initiative/product. We know (ironically largely via Edward Snowden), that our rogue intelligence agencies have been busy launching battalions of cyber-warriors and studying the psychology of online relations and the very architecture of our intrinsic belief systems.

 

After endless reams of circus commentary and vast volumes of hot air, the net result of the Snowden saga has in fact been the legitimation, legalisation and expansion of the very same unwarranted, unconstitutional, unnecessary (and surely intrinsically illegal) indiscriminate surveillance regime.

 

‘Mission creep’ has become a stampede, as supine governments rush a candied ‘national security’ wish-list of mass surveillance (and police state) initiatives past a bewildered and disenfranchised public. Nowhere is this more rudely obvious than in Australia, Canada, the U.K and the U.S itself, all of which have increased the state’s options for surveillance and data retention in the months since the ‘Snowden revelations’ (while performing a pantomime of ‘debate’ and ‘consultation’).

 

The ‘terrorist’ bogeyman (looking understandably tired and unconvincing) has been trotted out yet again to justify all this breathless chicanery. That these nations are all working from the same international (intelligence agency?) playbook seems in little doubt – the timing, wording and circumstances of (for example) recent surveillance ‘reforms’ in Australia, Canada and France being so strikingly similar. Likewise, a similar series of dubious provocations, sieges and ‘terrorist’ attacks predictably and magically manifested themselves just prior to the legislation being tabled – the public must, of course, be cajoled in the right direction.

 

Is it not possible that we have been completely gamed? The mysterious and messianic figure of Edward Snowden, introduced to acclimatise the global public to the very idea of an endless, all-pervading surveillance state (entirely unaccountable with unstated goals and limitless technology). Snowden as ‘progressive’ Trojan Horse (perhaps much like Barack Obama before him) to activate and mobilise the public passion, only to see it hijacked and channeled into Room 101. After much ‘debate’ from captured politicians and a puppeteer punditry the (entirely noxious) ‘security regime’ is solidified and expanded – the illusion being, that ultimately ‘democracy’ functioned and the population actually ‘chose’ omniscient observation – for the ‘greater good.’

 

Snowden himself perhaps reminds one of an articulate Lee Harvey Oswald-like character, a brave young patriotic warrior in deep-cover embrace with the Russian bear, dancing a dangerous and duplicitous deep-state deception. Knowingly (or unknowingly) a tool of clandestine forces. Snowden should bear in mind that he too, if he outlives his usefulness, might be thrown to the lions (just like Oswald was).

 

Imagine for a moment that the Snowden saga is a test. Having built a labyrinthine structure for social control (a compliant media and cowered public that cheerfully delivers itself up to enormous data-mining projects like social media): in fact, an almost entire reality-set constructed and delivered electronically – surely one would be tempted to test it? To see if complete movements, debates, paradigms and world-views could be generated out of whole virtual cloth and controlled? A test-tone, a electro-static ripple, a tremulous shock-wave to the online body electric.

 

Would it really be possible to introduce an idea (global omniscient surveillance) itself intrinsically repugnant, and yet shepherd it through a controlled release (and discourse) to have it ultimately accepted, completely present and yet essentially invisible? To test the various nuances and feedback loops in media (and online social media) that now might just grant remote Panopticon control of an entire population and their ‘internal landscape’? An electronically mediated ‘reality’ where ideas and beliefs are mere manifestations of algorithms and software?

 

Conservatives, progressives, activists, lethargists – all actors in the traveling circus of ‘representative democracy’ and ‘online society’?

David Thrussell

 

The Snowden Test : Waking Times.

Oregon Senator Warns – The U.S. Government is Dramatically Expanding its Hacking and Surveillance Authority | Liberty Blitzkrieg

Screen Shot 2016-05-27 at 11.21.08 AM

The Patriot Act continues to wreak its havoc on civil liberties. Section 213 was included in the Patriot Act over the protests of privacy advocates and granted law enforcement the power to conduct a search while delaying notice to the suspect of the search. Known as a “sneak and peek” warrant, law enforcement was adamant Section 213 was needed to protect against terrorism. But the latest government report detailing the numbers of “sneak and peek” warrants reveals that out of a total of over 11,000 sneak and peek requests, only 51 were used for terrorism. Yet again, terrorism concerns appear to be trampling our civil liberties.

– From the post: More “War on Terror” Abuses – Spying Powers Are Used for Terrorism Only 0.5% of the Time

Ron Wyden, a Senator from Oregon, has been one of the most influential and significant champions of Americans’ embattled 4th Amendment rights in the digital age. Recall that it was Sen. Wyden who caught Director of National Intelligence, James Clapper, lying under oath about government surveillance of U.S. citizens.

Mr. Wyden continues to be a courageous voice for the public when it comes to pushing back against Big Brother spying. His latest post at Medium is a perfect example.

Here it is in full:

 

Shaking My Head

The government will dramatically expand surveillance powers unless Congress acts

Last month, at the request of the Department of Justice, the Courts approved changes to the obscure Rule 41 of the Federal Rules of Criminal Procedure, which governs search and seizure. By the nature of this obscure bureaucratic process, these rules become law unless Congress rejects the changes before December 1, 2016.

Today I, along with my colleagues Senators Paul from Kentucky, Baldwin from Wisconsin, and Daines and Tester from Montana, am introducing the Stopping Mass Hacking (SMH) Act (billsummary), a bill to protect millions of law-abiding Americans from a massive expansion of government hacking and surveillance. Join the conversation with #SMHact.

What’s the problem here?

For law enforcement to conduct a remote electronic search, they generally need to plant malware in — i.e. hack — a device. These rule changes will allow the government to search millions of computers with the warrant of a single judge. To me, that’s clearly a policy change that’s outside the scope of an “administrative change,” and it is something that Congress should consider. An agency with the record of the Justice Department shouldn’t be able to wave its arms and grant itself entirely new powers.

Let’s get into the details

These changes say that if law enforcement doesn’t know where an electronic device is located, a magistrate judge will now have the the authority to issue a warrant to remotely search the device, anywhere in the world. While it may be appropriate to address the issue of allowing a remote electronic search for a device at an unknown location, Congress needs to consider what protections must be in place to protect Americans’ digital security and privacy. This is a new and uncertain area of law, so there needs to be full and careful debate. The ACLU has a thorough discussion of the Fourth Amendment ramifications and the technological questions at issue with these kinds of searches.

The second part of the change to Rule 41 would give a magistrate judge the authority to issue a single warrant that would authorize the search of an unlimited number — potentially thousands or millions — of devices, located anywhere in the world. These changes would dramatically expand the government’s hacking and surveillance authority. The American public should understand that these changes won’t just affect criminals: computer security experts and civil liberties advocates say the amendments would also dramatically expand the government’s ability to hack the electronic devices of law-abiding Americans if their devices were affected by a computer attack. Devices will be subject to search if their owners were victims of a botnet attack — so the government will be treating victims of hacking the same way they treat the perpetrators.

As the Center on Democracy and Technology has noted, there are approximately 500 million computers that fall under this rule. The public doesn’t know nearly enough about how law enforcement executes these hacks, and what risks these types of searches will pose. By compromising the computer’s system, the search might leave it open to other attackers or damage the computer they are searching.

Don’t take it from me that this will impact your security, read more from security researchers Steven Bellovin, Matt Blaze and Susan Landau.

Finally, these changes to Rule 41 would also give some types of electronic searches different, weaker notification requirements than physical searches. Under this new Rule, they are only required to make “reasonable efforts” to notify people that their computers were searched. This raises the possibility of the FBI hacking into a cyber attack victim’s computer and not telling them about it until afterward, if at all.

A job for Congress — not the Justice Department

These changes are a major policy shift that will impact Americans’ digital security, expand the government’s surveillance powers and pose serious Fourth Amendment questions. Part of the problem is the simple fact that both the American public and security experts know so little about how the government goes about hacking a computer to search it. If a victim’s Fourth Amendment rights are violated, it might not be readily apparent because of the highly technical nature of the methods used to execute the warrant.

It is Congress’ job to make sure we do not let the Executive Branch run roughshod over our constituents’ rights. That is why action is so important: this is a policy question that should be debated by Congress. Although the Department of Justice has tried to describe this rule change as simply a matter of judicial venue, sometimes a difference in scale really is a difference in kind. By allowing so many searches with the order of just a single judge, Congress’s failure to act on this issue would be a disaster for law-abiding Americans.

When the public realizes what is at stake, I think there is going to be a massive outcry: Americans will look at Congress and say, “What were you thinking?”

By failing to act, Congress is once again demonstrating that it is not just useless, it’s also dangerously corrupt and incompetent.

 

Oregon Senator Warns – The U.S. Government is Dramatically Expanding its Hacking and Surveillance Authority | Liberty Blitzkrieg.

Anonymous Hits New York Stock Exchange, World Bank, The Fed, and Vatican — Total Media Blackout

 

anonymous-takes-down-nyse

Amidst a global media blackout of Anonymous’ ongoing worldwide attacks on the “corrupt banking cartels,” the hacking collective has now taken down some of the most prestigious institutions in global governance. OpIcarus has recently taken offline the World Bank, the New York Stock Exchange, five U.S. Federal Reserve Banks and the Vatican.

anon

After announcing a global call to arms against the “corrupt global banking cartel,” the hacker collective, known as Anonymous, in conjunction with Ghost Squad Hackers, have taken over 30 central banks offline, including striking many targets at the heart of the Western imperialist empire.

13256151_774772339289368_5298655213378474009_nAn Anonymous press release explained the intention behind the operation:

The banks have been getting away with murder, fraud, conspiracy, war profiteering, money laundering for terrorists and drug cartels, have put millions of people out on the street without food or shelter and have successfully bought all our governments to help keep us silenced. We represent the voice of the voiceless. We are uniting to make a stand. The central banks which were attacked in recent days were attacked to remind people that the biggest threat we face to an open and free society is the banks. The bankers are the problem and #OpIcarus is the solution.

Operation Icarus was relaunched in conjunction with a video release announcing the beginning of a “30-day campaign against central bank sites across the world.” Since that time, the scope and magnitude of the attacks have increased exponentially, with Anonymous, Ghost Squad Hackers, a number of Sec groups and BannedOffline coordinating attacks — each focusing on separate financial institutions in an effort to maximize the number of targets hit.

In a previous interview with the Free Thought Project, an Anonymous representative clarified that the operation is in no way intended to impact individuals’ accounts held within the banks, explaining that OpIcarus is directed solely at the 1% perpetuating injustice:

We would just like to make it very clear that all targets of #OpIcarus have been Rothschild and BIS central owned banks. In fact most of the targets so far such as Guernsey, Cyprus, Panama, Jordan, British Virgin Isles, etc are in the top 10 places of tax havens for the elite. No on-line consumer accounts were harmed, no ATM’s were blocked and no personal client data was leaked. This has been a protest against the Central Banks and the 1% — no innocent or poor people were harmed.

The operation began with an initial attack on the Central Bank of Greece and was quickly followed up with a similar DDoS attack on the Central Bank of Cyprus. The hackers then targeted the Central Bank of the Dominican Republic, the Dutch Central Bank, the Central Bank of Maldives, and Guernsey Financial Services Commission, according to the official @OpIcarus Twitter account, which has been taken offline — presumably by Twitter. The National Bank of Panama and the Central Bank of Kenya were also reportedly targeted a day later, according to hacking news publication HackRead.

Additionally, reported Ghost Squad Hacker, s1ege also tweeted about taking the Central Bank of Bosnia-Herzegovina offline and provided a screenshot to verify. The Twitter account @BannedOffline also reported the Central Bank of Mexico had succumbed to a DDoS attack by the hacking collective. The online hacktivist groups have continued to conduct a series of high-powered distributed denial-of-service (DDoS) attacks, which forced the website of Central Bank of Jordan, Central Bank of South Korea, Bank of Compagnie, Monegasque and the Central Bank of Montenegro offline.

Last Saturday, hackers conducted a series of 250 Gbps DDoS attacks on the Bank of France, Central Bank of the United Arab Emirates, Central Bank of Tunisia, Central Bank of Trinidad and Tobago and Philippine National Bank. That was followed up by an attack on  the Central Bank of Iraq.

anon_opicarus_shut_downThe initial attacks were reported in global corporate media, such as Reuters, with subsequent strikes being reported by independent outlets such as the IBTimes and HackRead. The most recent press release from Anonymous summarized some of the attacks of the past week, as global media has curiously stopped reporting on the attacks altogether.

Greetings citizens of the world, we are OpIcarus a collective of citizens from around the globe working on exposing the 1% through the global banking systems. The elite are responsible for the corruption currently taking place in all governments, media, drug cartels, sex trafficking and money laundering. This last week we have had success in taking down the banking systems of the Bank of International Settlements, the World Bank, the Vatican, Morocco, Macedonia as well as the Central Bank of Venezuela. We stand with the people of Venezuela as they protest their corrupt government and all should expect our support through operations during these uprisings wherever they may arise. We are the people, We stand with the people, We support the people.

After announcing OpIcarus at the beginning of May, Anonymous released a list of institutions the collective plans to target, which is divided into four sections; websites associated with the U.S. Federal Reserve, the International Monetary Fund (IMF), sites owned by the World Bank, and over 150 sites associated with national banks around the globe.

In just a few weeks, OpIcarus hackers have hit dozens of financial institutions listed in their online manifesto. Any questions about whether the hacktivists would be able to take out some of the more high-profile institutions seem to have been answered with the recent successful attacks on the World Bank, the U.S. Federal Reserve Banks, the Bank of France and the Bank of England — the central banks of the U.K. and France – and the Vatican.

https://www.facebook.com/AnonymousLegionForJustice/videos/1610825099235931/

The attack on the Bank of England was unique from the previous attacks, as it reportedly took down the internal email server.

While some have questioned the effectiveness of OpIcarus, senior director at Corero Network Security, Stephanie Weagle, told Info Security magazine:

While the impact on the individual targets of the DDoS attack campaign, ‘OpIcarus’ is unclear; obstructing or eliminating the availability of email servers is significant. In an online world any type of service outage is barely tolerated, especially in the banking industry where transactions and communications are often time-sensitive, and account security is of utmost importance.

In the world of high finance, time is money and every minute that a bank is forced offline it is losing potential revenue, which in turn hurts the bottom line of those that support the imperial war machine. Thus far, all targeted banks have refused to comment on the damage inflicted by the continuous cyber attacks.

Make no mistake that this operation has already been extremely effective — evolving and growing rapidly. The fact that global corporate media is refusing to report on these numerous high-profile attacks is indicative of the fear the 1% have of OpIcarus garnering massive public support. The attempt to conceal the scope and breadth of this operation from public purview reveals the visceral fear the elite harbor toward those they prey upon. It seems the only thing the ruling class can do now is attempt to conceal and suppress the information about what’s transpiring in hopes of keeping the populace ignorant.

By Jay Syrmopoulos

 

Jay Syrmopoulos is a geopolitical analyst, free thinker, researcher, and ardent opponent of authoritarianism. He is currently a graduate student at University of Denver pursuing a masters in Global Affairs. Jay’s work has been published on TheFreeThoughtProject.com, where this article first appeared, Ben Swann’s Truth in Media, Truth-Out, Raw Story, MintPress News, as well as many other sites. You can follow him on Twitter @sirmetropolis, on Facebook at Sir Metropolis and now on tsu.

 

Anonymous Hits New York Stock Exchange, World Bank, The Fed, and Vatican — Total Media Blackout.

« Older Entries