How Will Bitcoin Lead to More Freedom? – Reason.com

List of Recommended Videos, Articles and Information

List of Recommended Videos, Articles and Information

I Recommend Everyone Read This

Collection of My Personally Created Collages/Pictures in One Place with Explanations and Information Relating to Trump and Who He Really is.

Almost all of my collages/pictures all in one place
Collection of Almost Everything I have been Working on [Crosspost made to conspiracy]
All Roads Lead to Rome/Egypt [Crosspost Collection]
Donald Trump's Golden Obelisk in Vegas Shows He is the new Horus. The "Bull of Victory".

Recent OC of mine.
Azadi (Freedom) Tower in Tehran, Iran
Donald Trump : The Orange God King Made in the Image of the Beast
Discussing Iran and the possible ramifications in the future.
The God-Self Icon: I Am
Trump, Obelisks and Sin City The Bandanna aka Paisley Pattern and its significance.
The Fresh Prince of the Power of Bel Air
Madonna's Performance at Eurovision 2019 and the Possible Foreshadowing of the Destruction of NYC
The Demiurge, the Sacred Heart and the Royal Archie
Las Vegas, Hoover Dam, Gateway Canyon and the Mural from Prometheus
Recapping Recent Events and Discussing Whats Coming Next
Series of my Collages showing the things I have found in Las Vegas related to Trumps golden building and Gateway Canyon.
Don't Look Now: Latent Signs From The Past Making Themselves Known Now
TB12: The Purification of the People by Casting Out the GreatGoat into the Wilderness
Something Very Ominous on the Front Page of Reddit Today That Could Indicate Big Things Very Soon
The Flying V, The Black Pearl of Mars and the Cost of Rising a Sunken Empire
2019: After the Escape From New YorK [Predictive Programming about the destruction of NYC]
Why The Concept of Sin is a Complete Lie and Nothing More than a Psychopathic Tool of Mind Control
Reexamining the "Fall of Man", Sin, the Law and Jesus Being a Ransom Paid for Humanity
Why the god of the Old Testament is not the Father Jesus Speaks About: Proof from the Bible Itself
The Unmasking of the Morning Star: Is the Antichrist About to "Reveal" Himself?
Analysis of the Superbowl Half Time Show: What Everyones Missing
Superbowl 53: The Goat vs the Ram and the Future of America #RiseUp
The Number 88, Trump and Predictive Media About His Presidency
The Rise of Atlantis pt 1: The Ram, Ancient Egypt and the Coming Sacrifice of the Scapegoat
A Look at Spider-Man: Far From Home, Mysterio and Chameleon and the Bizarre Ways They Relate to Whats Happening Right Now
The Economist: The World in 2019 [Cover Analysis]
The True Meaning and Symbolism Behind MAGA ie Maghā and a Brief Detour into Bizzaro World
Proof the plan has ALWAYS Been For Trump to Become President and Cause Economic Chaos
The Call of Cthulhu: Trump, The Great Scott
Trump, Deutsche Bank, The Financial Collapse and Uniting the 7
Pole Shift and some possible unforeseen consequences / A connection between 9/11/01 and Easter weekend 2019
Trump and the Symbolism of Color in Ancient Egypt
What do Trump's Past Tweets Tell us About What he will do next?
One Theory For the Inevitable Event Thats Going to Take Place Soon: Possible Destruction of New York
Rex 84: The Plan To Take Over America Using Illegal Immigrants as the Catalyst
The Interesting Significance of the number 77 or 14: Plus Aquaman and The Wizard of Oz
A Story in Pictures: The Phoenicians, Trump, Egypt and the New Jerusalem
As Above, So Below. As Within, So Without: Symbolism and Taking Our Power Back
From 11/11 to 11/12: The Rhythmic Ritual of the Enchantment Under the Sea Dance
Using Tool Songs to Demonstrate the Meaning of Some Symbolism: Jimmy (11) and H.
Important Symbolism Explained: K-9, IHS, H-K plus Game of Thrones
11/11 This Is It
Remember, Remember. Today is the 5th of November
A Bunch of Mini Posts in One: The Black Pearl, Reddit's "Coat of Arms", Another Look at the 2015 Economist Cover and more on the Canaanites
Evidence That These "Bombs" are a "False Flag": Analyzing the Hidden Messaging on the Envelope
10/26: Big Things Are Coming
Collection of my personally made memes and pictures

I will compile a list of information here that will be useful to understand more of what's going on in this world. Feel free to suggest anything you think would contribute or just simply post it in the comments.

I need to clarify what I see my role as. My role is not to spell everything out for you and tell you what to think. I mostly see my role as basically a punch to the face of what most people think they know about this world. Whatever you think you know, its most likely a lie, because this entire world is nothing but layers and layers of lies stacked on top of each other. You never had a chance to not believe lies unless you actively fought against them and sought out truth instead which is something most people just simply don't have the time or energy for and understandably so. My job is too shake you out of your lies and if that makes you want to know more, then you will want to seek more but that has to be your own journey or else it won't make nearly as much of an impact as it needs to. Consider me the guy pointing his finger at things that need to be looked at more closely and offering a perspective that maybe you hadn't considered before. Then go look where I pointed with a new perspective and see where it leads you. If you don't care enough to do that then I don't care enough to explain things to you.

First I will list the order I recommend you read my personally written stuff since there is no way to organize it on Reddit. If you are relatively new to this kind of information, there are things you should know and read before you read others.
  1. Exposing Trump: The Truth Behind His Deception and the Psychology Behind his Narcissism
Start here with the basic psychology of Trump explained and the rest will make more sense. Even if you don't believe in any of this other stuff, learning his psychology will help you out tremendously in understanding his actions and motives.

  1. The Last President, The High Priest of Fraud and The Little Horn Trump

​This lays out my basic argument for him being the "little horn" from the book of Daniel. Thought to be the Antichrist but it's possible he is just a major End Times figure that allows the true Antichrist to come into power. Only time will tell.

  1. The Statue of Liberty, Mystery Babylon, Freemasonry and The New Roman Empire / Fourth Reich

This talks about America/New York being Mystery Babylon in the Book of Revelation and what that means. I also connect the dots between Trump, Russia and the Scottish Rite Freemasons along with a 30 year old prediction from 1988 by the Economist magazine about a one world currency being implemented in 2018 by way of Bitcoin.

  1. Ancient Egypt, Kabbalah, Pepe The Frog and the Spear of Destiny

Here I talk about where all these secret societies originated from, how a prophecy from the book of Revelation about unclean frog spirits gathering the army of the Antichrist came true with the election of Donald Trump and the specific order of Free Masonry he belongs to. Does the spear that killed Christ play into this as well?

  1. The End Game for the Real Elites and How They Connect to Trump, Putin and Israel: The Chabad & Kabbalism

This ties all of these things together, Trump, Putin and Jewish Kabbalah. The Chabad Jews being the common link. I mainly reference many different articles pointing out these links and discuss how their end goal of the enslavement of what they call the "goyim" (Non-Jews) is going to come about.

  1. Trump Tower: The Inverted Black Obelisk

With the ties of the Jews and Kabbalah to Ancient Egypt as well as the secret societies obsession with it, this all had to tie to that place eventually. This explores how it's tied to Trump

  1. Trump's Space Force, NESARA and the Mark of the Beast

This is mostly Bible related to the very end of whats suppose to be right before Jesus comes back. I talk about the theory that aliens will come and act as our saviors only to enslave us with something that's called the NESARA act and how that relates to the Mark of the Beast.

  1. Jewish Kabbalah, Secret Societies and the Antichrist: The Who, How, What and When.

To really tie this all together, you really need to read and understand the information in this article/video. Especially if you are a Christian and believe Yahweh to be God and the Father of Jesus.

All of my other OC should make a lot more sense after understanding the information in the aforementioned posts.

  1. Tisha B'AV, 9/11 and the Two Pillars That Hold up This World

Learn how 9/11 was a ritual symbolizing the destruction of the 2 Jewish temples as a way to make way for a new world. Creating order out of chaos.

  1. 17: Q- The Winged Serpent, King Solomon & The Secret Leader of the Freemason's

Here I talk about the dangerous cult centered around Trump that has people believing that he is this secret leader of the army against evil at the behest of God himself, how this relates to King Solomon and a dragon with a name that starts with Q.

  1. The Lord of the Rings: Saturn and the Black Cube

Saturn worship is at the root of the Abrahamic religions. Saturn is the transmitter of the matrix we are all trapped in. Saturn is the Lord of the Rings. The Star of David and the black cube are 2 of it's main symbols, along with the Scythe and Sickle of the Grim Reaper.

  1. The Two Pillars That Hold Up This World and The Triforce

Here I delve a little bit into the significance of the "2 pillars" and why they need to be destroyed (or unified) and how the number 911 is encoded in the very symbol for the Freemasons itself.

Trump Psychology


The Psychology of the Typical Trump Supporter: The Scared, Delusional Narcissist

All the Tactics Trump Supporters Use to Debate and How to Spot Them

The Trump Delusion

The Source of the REAL Trump Prophecies: His Own Twitter

The Trump Prophecies Pt 2: The Second Coming

Bible Related


A Prophecy About to Come True: Isaiah 30 - Woe to the Obstinate Nation

Who Are The Beast From the Sea and The Beast From the Earth (The False Prophet)?

The Mark of the Beast or the Number of It's Name, 666

The Muslim / Jewish Connection with the Black Cube with Gold Trim and the New Jerusalem, The Gold Cube in Trump Tower

Bible Verses That Prove Supporting Trump is Unchristian

Since The Holy Temple Is The Human Body and We're A "Living Stone", Is That Stone Limestone?

Is the Holy Spirit / Christian God Female? Comparison of Jesus's Story With The Sumerian Inanna & Dumuzid

Is Yahweh the God of Esau, The Red People aka The Canaanites?

A Look at The Hindu Fire God Angi in relation to Yahweh

Some Interesting Parallels and Direct Contradictions Between Yahweh, Abraham, Moses and Jesus and Who is The Destroyer, The Red Dragon and Leviathan?

A Comparison of the Roman Volcano god Vulcan and Yahweh

Is There Evidence in the Very Beginning of the Bible That We Are From Mars???

My Writings


The First Great Deception: The Neolithic Revolution

A Rant About How We Got Here And How I Started My Journey.

A Basic Rundown of the Deception in the Bible and the Division in America

A Collection of My Thoughts and Personal Beliefs

My Personal Thoughts and Beliefs on Jesus and the Concept of Christ


Conspiracy/Other


Project Bluebeam: The Key to What's Happening and What's to Come

Trump, Regulus and the United Nations

The HUGE Significance of 11/14 or 11/5

The Two Pillars That Hold Up This World and The Triforce

A Union of Opposites: The End of the Age and the Splitting of Time

How Deception Works: The Disguised Egg

The God without a Mother and the 13 & 17 Year Cycle of the Magicicada

Trump The Russian Puppet: The Foundation of Geopolitics

Is the One World Government Close at Hand? The Arch of Triumph Does a World Tour

Winter is Here: Philadelphia, The Cave of Kelpius, and the Celtic festival of the Dead, Samhain

Return of Kal El and the Children of the Corn? Is the Matrix About to Get Reset?

The Meaning Behind H: Jesuits, The Number 8 and Pisces

Another Look at Gordon Ramsay: The "F" Word and the Facebook Logo

Back To The Future, 9/11 and Donald Trump

The Economist: The World in 2015 Cover & Serco

A Breakdown of the Predictive Simpsons Episode about Trump being President: Bart to the Future

The Unexplainable Connections of the Planet Vulcan From Star Trek to Real Life

Sinbad and The Old Man of the Sea

Trump's Choices of Songs at His Rallies Are Interesting: Is He Telling Us "The End is Near"?

10/10/18: Trump Rally in Erie, PA Song List Analysis [More hints at it being "The End"]

10/13/18: Trump Rally in Richmond, KY Song List Analysis [Love/Fighting/The End themes]


Bill Cooper & Secret Society Information

Bill Cooper - Porterville Presentation (Part 1)
At the very least, Part 1 is a MUST watch. The other's aren't nearly as important.
Bill Cooper - Porterville Presentation (Part 2)
Bill Cooper - Porterville Presentation (Part 3)
Bill Cooper - Porterville Presentation (Part 4)
Bill Cooper - Porterville Presentation (Part 5)
Bill Cooper - Porterville Presentation (Part 6)
Bill Cooper on the Hegelian Dialectic Manipulation - Youtube
If you just want a preview of the the things he talks about here, this is a 15 min part of Part 1 with some good information in it.
Bill Cooper Predicts 9/11 on June 28, 2001 - Youtube

Freemasonry

Inside this Illuminati Temple - Youtub
http://www.masonicdictionary.com
Numerology Decodes Masonry
Masonic Symbolism (This entire site has lots of good information)
What is Freemasonry? - Youtube
Donald Trump: Freemason - Youtube

Kabbalah

Kabbalah : The Religion of the Antichrist - Youtube
Rothschild's Israel & Kabbalah - Youtube
Kabbalah Magic Teachings Mystery Babylon & Satanic Illuminati - Youtube
An Introduction To Kabbalah, Part 1: What Is Kabbalah?
An Introduction to Kabbalah, Part 2: God Does Not Exist, God is Existence Itself
Kabbalah and The Antichrist: The Who, What and When
​​Ex-Chabad Member Exposes Trump Family Cult
Jared Kushner - Things are getting really bizarre - Youtube
Trump commutes sentence of kosher meatpacking executive Sholom Rubashkin

Secret Societies

Theories on Moses being an Egyptian Pharaoh
Discover King Solomon's Temple
New World Order Quote Compilation - Youtube
Bush & Kerry avoid Skull & Bones Question - Youtube
Illuminati Symbolism Inside The Catholic Church - Youtube
The Sidelock of Silence and Mysteries of Immaturity: The Connected Between the Jews and Osiris/Horus
Bohemian Grove: The Most Forbidden Place in America - Youtube
Bohemian Grove Ritual Caught on Tape - Youtube
​JFK Secret Societies Full Speech - Youtube

Predictive Programming / Foreshadowing

X-Files: The Plot to Takeover America & Cover ups - Youtube
Captain America 2: NWO Messages in Plain Sight - Youtube
Trump vs Bane (Inauguration Speech) - Youtube
Trump/Bane vs "Deep State" - Youtube
Trump Trackdown: The End of the World (1958 TV Episode) - Youtube
The Avengers - S06E16 - Invasion of the Earthmen (1969 TV Show)

Significant Topics

Strange Events Happening in America - US is Falling Apart - Youtube
Most People Don't Even Realize What's Coming - Youtube
Apocalypse Begins After Yom Kippur 2018? - Youtube
20/20 on SDI "Star Wars" Deaths (1989) - Youtube
Dr. Carol Rosin Talks About Wernher von Braun Warnings about Weaponizing Space - Youtube
Exploring the Electric Universe
Serco Global Control System Exposed - Youtube
Serco Owns the World: Big Brother Watch - Youtube
Serco - The Biggest Company You'e Never Heard Of
David Icke: Conspiracy of the Illuminati (Part 1) - Youtube
David Icke: Conspiracy of the Illuminati (Part 2) - Youtube
David Icke: Saturn isn't what you think it is either - Youtube
Sounds of Saturn: Hear Radio Emissions of the Planet and its Moon - Youtube
The BLACK GOO THEORY of EVERYTHING (mini-documentary): Bible Prophecy & the Black Goo Awakening - Youtube

Ancient Egypt

The Great Pyramid of Giza Might Focus Electromagnetic Energy in Its Chambers
Thoth: The Great Architect of Egypt
Phoenix Rising: 2012 Closing Olympic Ceremony - Youtube
Egyptian Seal bearing name of Judean king found in Jerusale\

9/11

Back To The Future Predicts 9/11 - Youtube
Donald Trump Sold America to Israel - Youtube
The Bush 9-11 Classroom Ritual, The 'KIDS' Recite: KITE, KIT, STEEL, PLANE, MUST. - Youtube
Donald Trump Calls into WWOUPN 9 News on 9/11 - Youtub
Donald Trump TV Interview at Ground Zero on 9-11-01 - Youtube
9/11 Truth Donald Trump's Good Friend Larry Silverstein is a Liar - Youtube
One World Trade Center: Strange Eerie Sounds Coming from OWTC - Youtube
All Seeing Oculus Eye Opens Annually - Youtube
Oculus Eye Rising: Rebuilding Ground Zero - Youtube


Other Interesting Information

What's Inside the Sumerian Bag? Secret Knowledge of the Lost Ancients - Youtube
Ted Talk: 2 Sides of the Brain
​The Story of Oumuamua, the first visitor from another star system - Youtube
The Hoyle State: A Primordial Nucleus behind the Elements of Life
Interesting View on the Future of AI and its control of the Internet
Symbol of the Trident: The Levites, The Phoenicians and the Fake Jews
The Secret Behind Numbers 3, 6, 9 Tesla Code is Finally Revealed - Youtube

Online Books:

The Curse of Canaan
https://archive.org/details/pdfy-hH7b-2yjyACdh8nO

Indeed, the great movement of modern history has been to disguise the presence of evil on the earth, to make light of it, to convince humanity that evil is to be ''tolerated, '' ''treated with greater understanding, '' or negotiated with, but under no circumstances should it ever be forcibly opposed. This is the principal point of what has come to be known as today's liberalism, more popularly known as secular humanism. The popular, and apparently sensible, appeal of humanism is that humanity should always place human interests first. The problem is that this very humanism can be traced in an unbroken line all the way back to the Biblical ''Curse of Canaan.'' Humanism is the logical result of the demonology of history. Modern day events can be understood only if we can trace their implications in a direct line from the earliest records of antiquity


The Spear of Destiny
https://ia800409.us.archive.org/1/items/TheSpearOfDestinyByTrevorRavenscroftWithCoveThe%20Spear%20of%20Destiny%20by%20Trevor%20Ravenscroft%20With%20Cover.pdf

The Spear of Destiny: the occult power behind the spear which pierced the side of Christ is a bestselling 1972 popular occult book by the anthroposophist writer Trevor Ravenscroft (1921-1989), published by Neville Armstrong's Neville Spearman Publishers. Ravenscroft claimed that the book was based on research "by using mystical meditation" and on the papers of the Austrian anthroposophist Walter Stein given to Ravenscroft by his widow. Ravenscroft originally claimed to have met Stein, but later only claimed contact through a medium with Walter Stein's spirit.

Flying Serpents and Dragons: The Story of Mankind's Reptilian Past
http://archiemitchell.tk/download/1885395388-flying-serpents-and-dragons-the-story-of-mankinds-reptilian-past

World-wide legends refer to giant flying lizards and dragons which came to this planet and founded the ancient civilizations of Mesopotamia, Egypt, India and China. Who were these reptilian creatures? This book provides the answers to many of the riddles of history.

Freemasonry and Catholicism
http://www.rosicrucian.com/pdf_plaza/Freemasonry%20and%20Catholicism.pdf

Part I Lucifer, the Rebel Angel 4 Part II The Masonic Legend 15 Part III The Queen of Sheba 26 Part IV Casting The Molten Sea 40 Part V The Mystery of Melchisedec 48 Part VI Spiritual Alchemy 66 Part VII The Philosopher's Stone: What Is It and How It Is Made 76 Part VIII The Path of Initiation 92 Part IX Armageddon, the Great War, and the Coming Age 102

Behold a Pale Horse
https://archive.org/details/BeholdAPaleHorse_267

Bill Cooper, former United States Naval Intelligence Briefing Team member, reveals information that remains hidden from the public eye. This information has been kept in Top Secret government files since the 1940s.

The Secret Destiny of America
https://archive.org/details/SecretDestinyOfAmerica

The Sabbatean-Frankist Messianic Conspiracy Partially Exposed
https://archive.org/details/TheSabbatean-frankistMessianicConspiracyPartiallyExposed


The New Freedom, by Woodrow Wilson
http://www.gutenberg.org/files/14811/14811-h/14811-h.htm

The New Freedom comprises the campaign speeches and promises of Woodrow Wilson in the 1912 presidential campaign. They called for less government, but in practice as president he added new controls such as the Federal Reserve System and the Clayton Antitrust Act.

Mystery Babylon Transcribed
https://archive.org/details/MysteryBabylonSeries-WilliamCoopertranscriptIncl

Trump Predictive Books


The Odd Trump

Trump and Clinton: The Victorian Novel

https://books.google.com/books?id=je1TAAAAYAAJ&pg=PA1&source=gbs_selected_pages&cad=2#v=onepage&q&f=false

"The Odd Trump" is a charming Victorian novel published by George J. A. Coulson in 1874. The "odd trump"' is not a winning card held by one of the characters, but is the hero himself. The hero is the old-fashioned hero of novels of a century ago—a strong, brave, tenderhearted, and honest young man, who opens the ball by rescuing the heroine from a watery grave.


Travels and adventures of Little Baron Trump and his wonderful dog Bulger
https://archive.org/download/travelsadventure00lock/travelsadventure00lock.pdf

Baron Trump's Marvelous Underground Journey
https://archive.org/download/barontrumpsmarve00lock/barontrumpsmarve00lock.pdf

The Last President (1900)
https://archive.org/download/1900orlastpresid00lock/1900orlastpresid00lock.pdf
submitted by Oblique9043 to TheGreatDeception [link] [comments]

Thoughts on my culminating analysis of Russia's involvement in the U.S elections?

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The proof is that the hackers used Bitly to mask the malicious URL and trick people into thinking the URL was legitimate. They made two mistakes, however.
First, they accidentally left two of their Bitly accounts public, rather than setting them to private. This allowed security researchers to view some general account information, like what URLs were shortened and what they were changed to.
Second, they used Gmail's official numeric ID for each person inside of their maliciously crafted URLs. This allowed cybersecurity researchers to find out exactly who had been targeted.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by MangekyouSharinganKa to AskTrumpSupporters [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to geopolitics [link] [comments]

Complete List of Echo/ Alexa 'skills'....

I was googling a Echo skills list and came across this thread. I am new to Reddit and this is my 1st post ever . I went thru the skills list on the Echo app, it is now 31 pages long.
Most of the skills are still crap, a few are small audience. Anyway, here is the complete list of skills as compiled by me from the Echo app over the last day or 3:
(it was a PIA getting this list formatted to Reddit rules and it has to be split into 2 posts. Hope it works out right....)
Amazon Alexa Skills An Alphabetical Listing
1-2-3 Math
Alexa, Open one two three
Tests your elementary mathematics topics like after, before, between; greater or lesser, more or less, addition, subtraction etc.
1-Minute Mindfulness
Alexa, Ask Mindfulness for a minute meditation
allows you to take a break from the world around you & enter into a one minute sound meditation.
21 Dayz
Alexa, start 21 Dayz
As the saying goes, it takes at least 21 days to build a habit. Use 21 Dayz to help guide you in your journey to developing new business or personal habits.
4AFart
Alexa, Ask For A Fart
Have all the fun of a fart without any of the smell.
7-Minute Workout
Alexa, start seven minute workout
Are you ready to lead a happier, healthier life? Get your heart moving and reduce stress in only seven minutes a day.
7Sigma
Alexa, ask 7 Sigma for my update
Get concise updates on all elements of your operation and infrastructure based on combined data from multiple sources.
Abra
Alexa start Akinator
Abra is a character-guessing game. Think of a character, real or fictional, and Abra will ask you questions and figure out who it is.
AccuWeather
Alexa, start AccuWeather
Stay connected to the latest in weather forecasting with AccuWeather – Weather for Life. Ask for weather alerts, sunrise, sunset, moonset, moonrise & moon phases
Acoustic Metronome
Alexa, open metronome
Having trouble keeping the beat? TsaTsaTzu can help you keep your groove with a nice acoustical drum beat to help you keep time.
Admirer
Alexa, tell my admirer to make me smile
Make your day better with a compliment
Adventure
Alexa, open adventure and play dave of doom
The Adventure skill enables you to interact with stories and change their ending.
Age Calculator
Alexa, ask Age Calculator, how old is someone born on [June 12, 2015]?
The Age Calculator helps calculate age between a given date and now.
Agog Reader * Alexa, ask Agog Reader for [Barack Obama]*
Listen to Tweets
Amazing Word Master Game
Alexa, ask Word Master to play a game
interactive way to learn and challenge yourself with words, while having fun with competing scores. Score higher to win.
Angry Bard
Alexa, ask Angry Bard for a burn
Have at you, knave! The Angry Bard skill is ready to throw barbs from the Bard anytime you like.
Animal Game
Alexa, start Animal Game
Play guess-an-animal game with Alexa. Think of an animal and Alexa will guess it by asking questions.
Animal Sounds
Alexa, ask Animal Sounds what noise a lion says.
Alexa is learning a few new languages, animal languages that is. Ask Alexa to make the sounds your favorite animal makes.
AnyMote Smart Remote
Alexa, ask AnyMote to pause my Sonos
Turn your voice into a real universal remote. Alexa, tell AnyMote to power on my TV.
AOL
Alexa, ask AOL for the top headlines
AOL provides you the information that you need to know to stay informed and up to date covering these categories: news, sports, finance, entertainment
Apollo - God of Music
Alexa, ask Apollo to tell me a fact
Shares music related facts and lets you know who are the hottest artists of the week.
APRS
Alexa, use APRS and locate [kilo victor six mike dash seven]
Locate APRS stations
Area Code
Alexa, ask Area Code where is [eight six zero]
Area Code Lookup
Ask Daddy
Alexa, ask Daddy for a hug
provides comic relief as it realistically responds to questions asked by his child.
Ask Earthquakes
Alexa, Ask earthquakes what's shakin'
Recent earthquake information
Ask Grandmom
Alexa, ask Grandmom for candy
provides comic relief as it realistically responds to questions asked by her grandchild.
Ask My Buddy
Alexa, ask My Buddy to help me get started
provides an easy and immediate way to send a text message, Voice call, and an email alert message to any or all of your contacts.
AskAboutTrump
Alexa, ask Trump how do you feel about [Rosie O'Donnel]
Ask Donald Trump a question
Athan
Alexa, ask Daily Prayers for prayer times in [Seattle]
Athan provides the Islamic Prayer Times in a given city.
Audio Goal
Alexa, ask Audio Goal for a goal
Celebrate a goal - or anything else - with a classic audio "GOOOOOL" sound.
Automatic
Alexa, ask Automatic where my car is
Find out where your car is parked, how much gas you have left, or how far you've driven recently. This skill requires an Automatic adapter.
Aviation Weather Brief
Alexa, ask Aviation Weather what is the metar for [KSMO]
Aviation Weather METAR's & Flight Rules
Baby Names
Alexa, open Baby Names
Ask about the popularity of names in the US going back to 1880
BART Status
Alexa, open BART Status
Gets current BART service advisories
BART Times
Alexa, open BART Times
Provides the times of the next trains between your home and destination stations and gives live Service Advisories and Elevator status information.
Baseball Archive
Alexa, ask Baseball Archive about [Willie Mays]
Get information and statistics for any player in the history of Major League Baseball.
Basket Savings
Alexa, ask Basket if whole milk is on sale near [Des Moines, IA.]
Find local sale prices for your favorite grocery items.
BatteryBoot
Alexa, ask battery boot where to buy it?
Everything you need to know about the Battery Boot which is the best and only battery Boot for your Echo.
Bean Jar - family rewards system
Alexa, tell Bean Jar to add ten points to [Gryffindor]
Manage a family or group rewards system, keeps track of points like a virtual "bean jar" for motivation. See beanjar.net
Beat Cylinder
Alexa, launch Beat Cylinder
Alexa shows off her beat-boxing skills. Ask for a beat by name ("phat", "old school", "electronic", etc.) or "random".
Beat The Dealer
Alexa, ask the dealer to deal the cards
Beat the dealer in this game of Blackjack.
Beer Trivia
Alexa, launch Beer Trivia
Think you know beer? Crack open a cold one and test your beer and brewing knowledge with Beer Trivia
Best Picture Oscars The Last 30 Years
Alexa, start Best Picture Oscars
Best Picture Oscars for the last 30 years
BF Helper
Alexa, ask Basic Fantasy to roll a [Thief]
A companion Skill for Basic Fantasy RPG players.
Bible
Alexa, ask the Bible App to read [John3 verse16]
The Bible App for Alexa can read Bible verses and chapters to you in your favorite Bible version.
Big Game Ultimate Trivia Quiz
Alexa, start Big Game
It's the 50th anniversary of football's biggest game. Test your Big Game knowledge with the ultimate Big Game trivia quiz
Bingo
Alexa, open Bingo
Alexa will call the numbers for you. Each number is repeated and sent to the Alexa app as well. Get a free Bingo card at lovemyecho.com.
BioRhythm
Alexa, open BioRhythm.
Calculate your natural biorhythm for today for entertainment purposes.
Bitcoin Price
Alexa, tell me the current Bitcoin price
Returns the current price of a Bitcoin in US dollars from coindesk.com
Bitcoin Price Checker
Alexa, open Bitcoin Price Checker
Check the Bitcoin exchange rate.
Bitcoin Rate
Alexa, open Bitcoin Rate
Provides the current value of 1BTC in your preferred base currency, along with useful Bitcoin market data.
Block World Trivia
Alexa ask Block World Trivia
Ask Alexa to help you show off your crafting skills by answering over 30 different multiple choice questions.
Booze Trivia
Alexa, launch Booze Trivia
Fun trivia about alcohol to impress your friends
Bubble Boy
Alexa, ask Bubble Boy to tell me a joke
The Bubble Boy skill tells a funny quote from the popular sitcom - Seinfeld.
Buddy for Destiny
Alexa, ask my ghost what's Xur selling
Provides useful information like Xur inventory and weekly activities to Destiny players.
Bulls and Cows game
Alexa, tell Bulls Cows to start a game
Bulls and Cows game as described here: https://en.wikipedia.org/wiki/Bulls_and_Cows
Calculator
Alexa, ask calculator for [nine plus five]
Let your echo help you do the calculation, it is cool and you won't make mistake.
Call Sign
Alexa load Call Sign and find [november zero uniform sierra mike]
Look up Amateur (HAM) radio call sign information from the call sign database.
Campbell's Kitchen
Alexa, ask Campbell's Kitchen what's for dinner
Your kitchen just got a whole lot smarter. Make dinnertime easy with a daily Top-5 list of triple-tested recipes, selected for your tastes and time preferences.
Capital Quiz
Alexa, tell Capital Quiz to start practicing
Helps you practice and then quizzes you on the names of the capital cities of all 50 US states.
Cat Facts
Alexa, open Cat Facts
Tells you a fact about feline friends.
Cat Raiser
Alexa, ask cat raiser how is my cat
Raise your e-cat living in Alexa.
CheerLights
Alexa open cheer lights
Find out what color the World feels like right now.
Children's Bible Quiz
Alexa open Children's Bible Quiz
Simple Bible Quiz
Christmas Caroler
Alexa, tell Christmas Caroler to spread holiday cheer
Listen to Alexa and learn the lyrics to some yuletide favorites.
Code Phrase Generator
Alexa, ask for a code phrase
Generate a code phrase for your next top secret project.
Combat
Alexa, open combat and hit the dragon with my sword
Allows you to engage in any sort of conflict with entertaining results.
CompliBot
Alexa, open CompliBot
It wants nothing more than to make your day a little bit better.
Conductor
Alexa, ask conductor to get status for the [7] train
Get information on your commute. So far supports NYC subway/LIRMetroNorth status (NYC bus coming soon).
Conversation Starter
Alexa, open Conversation Starter
Great way to get suggested conversation topics for you and your friends.
Convrge
Alexa, ask Convrge, who's online
Find out who's online at in Convrge
CookBook
Alexa, ask cook book how to [make a burger]
This skills allow users to find recipes - ingredients, cook steps, health info etc
Covisint Trivia
Alexa, launch Cove Trivia
Game that will test your knowledge about the Covisint company. Good luck.
Craft Helper
Alexa, ask Craft Helper what's the recipe for [a saddle]
Can't remember exactly how to craft an enchantment table or a dropper in Minecraft? Craft helper can give you the recipe fast.
Cricket Quiz
Alexa, launch cricket quiz
This is a trivia game for cricket game lovers.
CryptoCurrency
Alexa, ask my crypto what is the price of bitcoin?
Get the current price of bitcoin right now. All you have to do is ask and the current exchange rate is announced.
Crystal Ball
Alexa, launch Crystal Ball
A fortune teller skill. Alexa prompts you to first focus on a yes/no question, and then say when you're ready to hear the answer.
Currency Converter
Alexa, ask Currency Converter to convert [twenty dollars to euros]
Alexa is able to convert 10 kind of currencies from the world and tell you the current currency exchange too. Ask Alexa to convert from one currency to another.
D.C. Tech Cal
Alexa ask D.C. Tech for news
Read the latest news and events from the Washington D.C. tech scene.
Daily Affirmation
Alexa, open Daily Affirmation
The Walking Affirmations Daily Affirmation skill provides a daily uplifting, positive thought for you to take throughout the day.
Daily Word
Alexa open Daily Word
Selects a new word for every day of the year.
DC Metro
Alexa, ask DC Metro for the next train arriving at [Columbia Heights]
Gives Washington DC Metro light rail train arrival and departure times, as well as maintenance or incident reports.
Demotivate Me
Alexa, open demotivate
Tired of everyone lying to you? This skill will tell you the truth.
Dice Bag
Alexa, tell Dice Bag to roll for me
Board game missing dice? Random encounter? Dice Bag will roll for you, complete with dice rolling sounds.
Dino Trivia
Alexa, open dino trivia
A humorous dinosaur trivia game. Echo asks questions and you answer by choosing 1,2,3,4. Dinosaur questions include real and silly answers.
Dog Facts
Alexa, tell me a dog fact
Get daily Dog Facts
DogeCoin
Alexa Start Dogecoin
Get the spot price of DogeCoin, one of the top crypto-currencies worldwide
Domain Name Info
Alexa, launch domain name info
Locate different DNS record information for a given domain name
Domino's Pizza
Alexa, open Domino’s
Place your Domino's Easy Order or your most recent order. You can also ask for Domino’s Tracker® updates to find out the current status of your order.
DrinkBoy
Alexa, ask Drink Boy what is the recipe for [a sidecar]
Provides recipes for over 200 popular cocktails.
Drive Time
Alexa, launch Drive Time
Drive Time gets you the travel time to your destinations.
Drop Some Knowledge
Alexa, ask drop some knowledge to tell me about [Abraham Lincoln]
Uses the Google Knowledge Graph API to drop some knowledge about anyone / anything.
Edgar Facts
Alexa, tell me an Edgar fact
Edgar Facts is for anyone who loves Edgar the dog and can't get enough of that adorable bugg. Brighten your day with fun facts about Edgar
EGR Lunch Bot
Alexa, ask lunch bot what's for lunch today
Hot lunch for East Grand Rapids Public Schools (all elementary schools).
Elf Trivia
Alexa, open 'Elf Trivia'
Love the holidays? Elf Trivia is a fun, light-hearted multiple choice game for 1 player.
Eliza
Alexa, start Eliza
Is something on your mind? Ask ELIZA (pronounced "ih-L-AY-z-uh") to talk to you for a psychotherapy session.
ELLE Horoscopes
Alexa, ask Horoscope what is the horoscope for [Gemini]
Get every sign's horoscope for today. Find out if the moon's position presents any new opportunities
Email Assistant
Alexa, open Email Assistant
Alexa + Email = the only assistant you can ask about upcoming travel from mail. Coming soon ask where your Amazon package is and much more is on the way
Esports Ticker
Alexa, ask Esports Ticker for live matches
Get recent matches, upcoming matches, and live matches in the world of esports.
Essential Trivia
Alexa, open Essential Trivia
Essential Trivia
Event Guide
Alexa, ask Event Guide what's going on today in [city name]
Get event listings from www.Bandsintown.com.
Famous Quotes
Alexa, ask Famous Quotes to tell me quote
Simple skill that reads you famous quotes from history and movies.
Fantasy Football
Alexa, ask Fantasy Football Nerd for headlines
Retrieve fantasy football news and player updates on the Top 300 players directly from Fantasy Football Nerd.
Fidelity Investments
Alexa, Ask Fidelity to get a quote for [Amazon]
Ask Fidelity Quote Lookup and Market Update
Five Card Draw
Alexa, start five card draw
play classic Five Card Draw card game
FlightSearch
Alexa, Ask Flight Search
Search DOMESTIC U.S. flights for lowest price, one way or round trip. Say "Ask Flight Search". Top 5 flights sent to your Alexa app.
Focus Word
Alexa, open Focus Word
Focus Word provides an inspirational word and statement about the word to serve as a point of focus for meditation or for the day.
Football Trivia
Alexa, open Football Trivia
Trivia game asking questions that pertain to professional American Football.
For The Loft Cinema
Alexa, Ask Loft Cinema What is playing now
Allows users to inquire about movies playing at the Loft Cinema (in Tucson, Arizona) for today or the upcoming days.
Fortune
Alexa, open fortune
Read a random, hopefully interesting, adage.
Fortune Cookie
Alexa, open Fortune Cookie
Get a fortune cookie, read to you and receive your own Mega Millions or Powerball numbers.
Founding Father Quotes
Alexa, ask founding fathers for a quote
Get quotes from our Founding Fathers, the political philosophers who inspired them, and their modern successors.
FreeBusy Scheduling Buddy
Alexa, ask FreeBusy to see if Paula is free [Tuesday]
Easiest way to share availability across calendars and coordinate meetings (for free). Check when you own contacts are available
Freedom Quotes
Alexa, ask freedom quotes for a quote
Get freedom-themed quotes
Game Dice
Alexa, ask game dice to roll [three ten siders]
Use Game Dice to have Alexa roll dice of various sizes for you.
Garageio
Alexa, tell Garageio to close my door
Garageio is the simple and secure way to control and monitor your
garage door from anywhere in the world, all without needing to replace your existing opener.
Geek Games
Alexa launch geek games
Geek games is trivia skill to test your knowledge of random geeky facts of the Eighties and beyond
Geek Trivia
Alexa, ask a geek
Asks you 5 trivia questions per game. It’s a fun way to test your geek knowledge of a famous movie or TV show.
GLaDOS Quotes
Alexa, ask Glados to tell me something
Get quotes GLaDOS from Valve's Portal.
Glympse
Alexa, ask Glympse where is [Sylvia]?
Allows family and friends to temporarily share their live location and ETA with each other. Just ask Alexa for a friend's location to get started.
Gold Bug
Alexa, ask Gold Bug what's the price of [gold/silveoil]
Get the latest closing day prices for gold, silver and oil with Gold Bug
Gridiron Trivia
Alexa, launch Gridiron Trivia
Test your knowledge of the Gridiron's winners and MVPs.
Guess The Number
Alexa, launch Guess The Number
See how many tries it takes you to guess a random number between 1 and 100. Alexa will tell you to guess higher or lower until you get it.
Guide for ARK
Alexa, open ARK Guide
Guide for ARK
Guitar Tuner
Alexa, ask Guitar Tuner to tune my guitar
Use Guitar Tuner to tune your guitar.
Hacker News
Alexa, open Hacker News
Read Hacker News headlines.
Hacker News Stories
Alexa, ask hacker news for top stories
Stay up to date with the latest stories about technology, business,
and entrepreneurship.
Hacking History Trivia
Alexa, start Hacking History
Hacking History Trivia challenges you with fun and interesting questions about the history of computing and hacking
Haiku
Alexa, ask Haiku for a poem
Haiku poem generator.
Hanker
Alexa, ask Hanker what I should do in [New York] tonight
Hanker is your go to local event guide for all that's happening in your city. From the arts, to parties, to date night and more, Hanker has everything you need.
Happy Birthday
Alexa, launch Happy Birthday
Alexa sings (raps?) Happy Birthday. Tell your Echo the name of the lucky birthday girl or boy and Alexa does the rest. A variety of surprising song variations.
HawkBus
Alexa, ask Hawk Bus about [7252]
Get the time until the next bus arrives at a specified bus stop in the Iowa City area.
Hebcal
Alexa, ask Hebcal when is [Passover]?
Jewish holidays, Hebrew date converter, Shabbat candle-lighting times, weekly Torah portion, and Omer counter.
Hey Dad - Dad Jokes
Alexa, open Hey Dad and tell me a joke
Tell me a dad joke
High Low Guessing Game
Alexa, open High Low
This is the number guessing game of “higher or lower.” In this game, Alexa chooses a number and you try to guess it or you can play the other way around.
HomeSeer Home Automation Skill
Alexa, tell HomeSeer to turn on the kitchen light
Allows HomeSeer home automation system users to control and monitor status of their devices and to launch their automation events using the Amazon Echo
House Band
Alexa, launch house band
House Band allows you to access your JRiver Media Center music server. You can play your music, search your library, and create Play Doctor playlists.
HuffPost
Alexa, ask HuffPost for headlines
Get headlines from The Huffington Post
Impossibly Hard Major League Baseball Quiz
Alexa, launch Impossible Baseball Quiz
You should not take this baseball quiz. It may be the hardest baseball quiz in history. If it's not, it's still really, really hard
IndianFacts
Alexa, ask Indian Guy to tell me an Indian fact
This skill tell you interesting facts about India which most people don't know.
Innkeeper Emotes for Hearthstone
Alexa, ask the innkeeper to say hello to the mage
Welcome to my inn. You can talk to your favorite Hearthstone heroes, and they'll emote back.
InsultiBot
Alexa, open InsultiBot
InsultiBot is so tired of talking to you. All it wants is for you to leave it alone. Is that too much to ask?
Iris
Alexa, ask Iris to holler at [John]
Say the command, “Alexa, ask Iris to holler at [name of recipient]” and Iris will send a pre-composed e-mail, asking the recipient to holler back.
ISY
Alexa, open izzy
ISY skill allows you to control your home using an ISY home-automation controller.
ITIL Foundation Quiz
Alexa, open I till Foundation Quiz
Sharpen your ITIL Foundation knowledge or supplement your certification preparation with the assistance of this practice quiz.
JavaScript Quiz
Alexa, Launch JavaScript Quiz
JavaScript Quiz tests you knowledge of the most popular development language.
Jazz Trivia
Alexa, start Jazz Trivia
Test your knowledge of jazz music.
Jeopardy! J6
Alexa, Play Jeopardy
Every Jeopardy! category has an “extra” clue written. Play these clues in the J6 game on Echo.
Jokes++: Computer Science Jokes
Alexa, ask Jokes Plus Plus for a computer science joke
An expansion of Alexa's cheesy jokes for all you CS majors out there.
Kasa
Alexa, ask Kasa to turn the lights on
Kasa is a simple way to manage your home from anywhere.
KCRW On Air
Alexa, ask KCRW what's playing
Gives you the current program or track playing on KCRW radio.
Knock Knock Jokes
Alexa, ask knock knock
Knock, knock! Who's there? The best collection of knock-knock jokes
for the Amazon Echo you could imagine.
L Train
Alexa, ask the L Train when it's coming?
When the next train is coming to your NYC MTA L train stop, and listen to the current L train status.
submitted by nola-t1k1 to amazonecho [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to Intelligence [link] [comments]

Trump's Biggest Failure - YouTube Trump's 'USA Freedom Kids' sing at rally - YouTube Freedom Call - Freedom Call - YouTube ORIGINAL Donald Trump Jam by USA Freedom Kids, FREEDOM'S CALL 'Freedom Kids' Sing Donald Trump Theme Song At Campaign ...

Meanwhile, hundreds of other highly armed Trump supporters were just finishing yet another MAGA caravan throughout nearby Clackamas County. Pro-Trump groups are openly calling for the murder of government officials while the State demonizes anti-racist protesters as "fascists" and "terrorists" and people like Ted Cruz call for them to be slapped with RICO chargers. Trump’s Security Hawks Call Distributed Ledgers ‘Critical’ in US-China Tech Arms Race . Danny Nelson Oct 15, 2020. Fidelity. Fidelity Report Says Bitcoin’s Market Cap is ‘Drop in the ... The biggest two buckets of rights are 1) rights in a song or composition and 2) rights in a recording of a song. “Dark Horse,” for example, was written by Perry, Max Martin, Juicy J, Dr. Luke ... BitChute aims to put creators first and provide them with a service that they can use to flourish and express their ideas freely. Trump’s Security Hawks Call Distributed Ledgers ‘Critical’ in US-China Tech Arms Race . Danny Nelson Oct 15, 2020. Fidelity. Fidelity Report Says Bitcoin’s Market Cap is ‘Drop in the ...

[index] [10497] [6261] [22016] [47467] [37605] [46349] [224] [33151] [19659] [37807]

Trump's Biggest Failure - YouTube

A young song and dance group singing about Donald Trump at a campaign rally in Pensacola, Florida, has gone viral on the web. VICE travels to Fort Myers, FL to spend the day with the USA Freedom Kids, a group of girls singing to spread liberty and working to get the Donald elected. ... See my LATEST Joe Biden Parody here: https://youtu.be/rHf5TWf5lkA - PLEASE SUBSCRIBE! :) Thank You & God Bless you and your families! :) If you'd like to sup... Freedom Call by Freedom Call, from the Album: The Crystal Empire. I am not associated with the Donald Trump presidential campaign. I am a supporter. I do not own any footage or photographs seen in this video. The song featu...

#