Berto Jongman: PizzaGate is Now PedoGate — PBI: The Electoral College Coup is Partly a Deliberate Effort to Damp Down PedoGate / PizzaGate and Partly Deep Fear of Donald Trump Exposing Pedophilia Within the Deep State

06 Family, 07 Other Atrocities, 09 Justice, 11 Society, Corruption, Government, IO Impotency, Media, Officers Call

Important change: PedoGate instead of PizzaGate. A very interesting interview that might be deleted by YouTube but has been posted elsewhere. The citizen investigation continues.

Continue reading “Berto Jongman: PizzaGate is Now PedoGate — PBI: The Electoral College Coup is Partly a Deliberate Effort to Damp Down PedoGate / PizzaGate and Partly Deep Fear of Donald Trump Exposing Pedophilia Within the Deep State”

Robert Steele: “I Told You So” — From Elections to Yahoo, Everyone Has Been Grossly Irresponsible on Cyber-Security

Corruption, Government
Robert David Steele

The below letter was sent to the White House point person for cyber-security in 1994. I introduced NSA to hackers (they brought two bus-loads to my 1993 conference), co-founded the Information Warfare Conference with Winn Schwartau, and was the opening speaker at Hackers on Planet Earth (HOPE) in 1994. Apart from ignoring us entirely — note that the senior cyber-security engineer at NSA co-signed our letter (he chose to be anonymous at the time) — the White House allowed the NSA to subvert the mediocre emergent communications and communications security protocols — CEOs of major corporations — including Carly Fiorina — violated their fiduciary duties to stockholders and deliberately gutted their security with infantile backdoors provided by NSA for its own convenience. It can be said that NSA's subversion of US cyber-security spawned the Chinese and Russian hacker communities.

Continue reading “Robert Steele: “I Told You So” — From Elections to Yahoo, Everyone Has Been Grossly Irresponsible on Cyber-Security”

Antechinus: The Elite Coup of 2016 – Should Barack Obama Be Impeached?

Corruption, Government
Antechinus

The “Elite” Coup Of 2016

  • There is an “elite” coup attempt underway against the U.S. President-elect Trump.
  • The coup is orchestrated by the camp of Hillary Clinton in association with the CIA and neoconservative powers in Congress.
  • The plan is to use the CIA's “Russia made Trump the winner” nonsense to swing the electoral college against him. The case would then be bumped up to Congress. Major neocon and warmonger parts of the Republicans could then move the presidency to Clinton or, if that fails, put Trump's vice president-elect Mike Pence onto the throne. The regular bipartisan war business, which a Trump presidency threatens to interrupt, could continue.
  • Should the coup succeed violent insurrections in the United States are likely to ensue with unpredictable consequences.

–  –  –  –  –

Continue reading “Antechinus: The Elite Coup of 2016 – Should Barack Obama Be Impeached?”

Chuck Spinney: Andrew Cockburn’s Questions Challenging the (False) CIA Assertion That Russians Did the Hacking…

Corruption, Government
Chuck Spinney

Questions for the Electors on Russian Hacking

by ANDREW COCKBURN, Counterpunch, 14 December 2016

It is being reported that John Podesta, Chairman of the defeated $1.2 billion Clinton presidential campaign, is supporting the call by various officials, including at least forty Electors, that the members of the Electoral College be given a classified intelligence briefing on the alleged Russian hacking before the College votes on December 19.

In the event such a briefing comes to pass, it might be helpful if the Electors had some informed questions to ask the CIA.

Continue reading “Chuck Spinney: Andrew Cockburn's Questions Challenging the (False) CIA Assertion That Russians Did the Hacking…”

CounterPunch: Historical & Structural Reasons for Skepticism of CIA Claims – Remaining Agnostic on Claims of Russian Hackers

Corruption, Government, IO Deeds of War, Officers Call

Historical & Structural Reasons for Skepticism of CIA Claims: Remaining Agnostic on Claims of Russian Hackers

David Price

Suddenly, many on the American left now embrace notions of a CIA led coup against a rogue President-elect; with little discussion of the CIA’s long history of interfering in elections, covertly undermining candidates not of their liking.  Now we have US liberals cheering for a possible CIA coup here at home.

Continue reading “CounterPunch: Historical & Structural Reasons for Skepticism of CIA Claims – Remaining Agnostic on Claims of Russian Hackers”

Berto Jongman: James Scott, Institute for Critical Infrastructure Technology on John Brennan and CIA Being Full of Crap…

Corruption, Government
Berto Jongman

This is the best — most concise — of the many technical commentaries that make it clear CIA is completely out of its depth, has no understanding, and is almost certainly deceiving the public with its false statements.

It's the Russians! … or Is it? Cold War Rhetoric [Lies] in the Digital Age

by James Scott, Sr. Fellow, ICIT

Introduction

Malicious actors can easily position their breach to be attributed to Russia.  It’s common knowledge among even script kiddies that all one needs to do is compromise a system geolocated in Russia (ideally in a government office) and use it as a beachhead for attack so that indicators of compromise lead back to Russia. For additional operational security, use publically available whitepapers and reports to determine the tool, techniques, and procedures of a well-known nation-state sponsored advanced persistent threat (APT), access Deep Web forums such as Alphabay to acquire a malware variant or exploit kit utilized in prolific attacks, and then employ the malware in new campaigns that will inevitably be attributed to foreign intelligence operations. Want to add another layer? Compromise a Chinese system, leap-frog onto a hacked Russian machine, and then run the attack from China to Russia to any country on the globe. Want to increase geopolitical tensions, distract the global news cycle, or cause a subtle, but exploitable shift in national positions? Hack a machine in North Korea and use it to hack the aforementioned machine in China, before compromising the Russian system and launching global attacks. This process is so common and simple that’s its virtually “Script Kiddie 101” among malicious cyber upstarts.

Continue reading “Berto Jongman: James Scott, Institute for Critical Infrastructure Technology on John Brennan and CIA Being Full of Crap…”

noble gold