Trump Weighs Private Spy Network To Counter Deep State: ‘It Is A Direct-Action Arm… Totally Off The Books’

The Deep State surveillance network, powered by technology developed by NSA whistleblower Edward Snowden, is in full effect. Over the last several weeks we’ve learned that not only did the Obama White House deploy a vast spy net over anyone within President Donald Trump’s political and business orbit while he was still a candidate for office, but that they were actively monitoring other organizations and individuals such as Blackwater founder Eric Prince.
Now, according to David Knight of Infowars, the President is turning the tables and is reportedly considering hiring private spies to counter the Deep State’s attacks on his Presidency.
Via The Intercept:
The sources say the plans have been pitched to the White House as a means of countering ‘deep state’ enemies in the intelligence community seeking to undermine Donald Trump’s presidency.

This post was published at shtfplan on December 10th, 2017.

REPORT: MCMASTER APPROVED NSA SPYING ON TRUMP FAMILY WHICH WAS SENT TO GEORGE SOROS-OWNED FACILITY

A retired Central Intelligence Agency Agent, who is reported to be working with Blackwater founder Erik Prince, has allegedly claimed that it was National Security Advisor H. R. McMaster (You know him as an Islamic apologist in our government) worked alongside the National Security Agency (NSA) to surveil Donald Trump Jr., Eric Trump, Steve Bannon and others, according to a report that’s come out this week.
The report came from The Intercept, and in that report, it was revealed that the Trump administration is ‘considering a set of proposals developed by Blackwater founder Erik Prince and a retired CIA officer – with assistance from Oliver North, a key figure in the Iran-Contra scandal – to provide CIA Director Mike Pompeo and the White House with a global, private spy network that would circumvent official U. S. intelligence agencies, according to several current and former U. S. intelligence officials and others familiar with the proposals.
The sources say the plans have been pitched to the White House as a means of countering ‘deep state’ enemies in the intelligence community seeking to undermine Donald Trump’s presidency.’

This post was published at The Daily Sheeple on DECEMBER 6, 2017.

What The Media Isn’t Telling You About the Indictment Of Mike Flynn

The Russia-gate prosecutors have taken the scalp of ex- National Security Adviser (and retired Lt. Gen.) Flynn for lying to the FBI. But this case shows how dangerously far afield this ‘scandal’ has gone…
Russia-gate enthusiasts are thrilled over the guilty plea of President Trump’s former National Security Adviser Michael Flynn for lying to the FBI about pre-inauguration conversations with the Russian ambassador, but the case should alarm true civil libertarians.
What is arguably most disturbing about this case is that then-National Security Adviser Flynn was pushed into a perjury trap by Obama administration holdovers at the Justice Department who concocted an unorthodox legal rationale for subjecting Flynn to an FBI interrogation four days after he took office, testing Flynn’s recollection of the conversations while the FBI agents had transcripts of the calls intercepted by the National Security Agency.
In other words, the Justice Department wasn’t seeking information about what Flynn said to Russian Ambassador Sergey Kislyak – the intelligence agencies already had that information. Instead, Flynn was being quizzed on his precise recollection of the conversations and nailed for lying when his recollections deviated from the transcripts.

This post was published at Zero Hedge on Dec 3, 2017.

PRIVACY ALERT: HP Quietly Installs System-Slowing Spyware On Its PCs Without Consent

On the heels of Lenovo’s massive $3.5 million fine for preinstalling adware on laptops without users’ consent, Hewlett-Packard is jumping in with both feet when it comes to installing spyware on its PCs without the consumer’s permission.
According to numerous reports gathered by Computer World, the brand is deploying a telemetry client (a system data that is uploaded by the Connected User Experience and Telemetry component), on customer computers without asking permission.
The software, which was first identified on November 15 of this year, is called ‘HP Touchpoint Analytics Service’ and appears to replace the self-managed HP Touchpoint Manager solution. According to the official productivity description, it features ‘the tools you need to ensure all your managed devices’ security – and brings you greater peace of mind’. The problem is, it’s installing itself without permission and is wreaking havoc on customers’ systems.
And the consumers are noticing:

This post was published at shtfplan on November 28th, 2017.

Did NBC Push An Unfounded Conspiracy Theory On Behalf Of CIA?

Retired National Security Agency (NSA) chief technology officer William Binney is being branded as a “conspiracy theorist” by corporate media outlets, most notably, the Comcast-owned National Broadcasting Corporation, for co-authoring a controversial memo issued this past summer by a group of former intelligence officers – Veteran Intelligence Professionals for Sanity.
***
The memo opined that the leak of Democratic National Committee e-mails during the 2016 presidential campaign were not the result of Russian state-sponsored hacking but the result of an inside job by a DNC staffer who loaded the purloined e-mails onto a thumb drive. That view is contrary to an assessment made in a 2017 intelligence assessment by 17 US intelligence agencies. That assessment claimed that Russian government-sponsored hackers broke into the email servers of the DNC and then provided the emails to WikiLeaks. However, the assessment was not the unanimous view of 17 US intelligence agencies, but merely four – the Central Intelligence Agency, the National Security Agency, the Federal Bureau of Investigation. It was provided a chapeau of legitimacy by the Director of National Intelligence. Contrary to news reports, the Defense Intelligence Agency, the State Department Bureau of Intelligence and Research, and intelligence elements of the military services did not provide input to the assessment.

This post was published at Zero Hedge on Nov 28, 2017.

Amazon Announces “AWS Secret” Service For The CIA, US Intelligence

Shortly after Wired first profiled the NSA’s new super spycenter in Bluffdale, Utah (one year before Snowden confirmed that much of the agency’s activity involved spying on US citizens and soon to be presidents), speculation emerged as to how much data storage capacity this brand new US spy hub would have. According to a then-estimate by Forbes, the storage capacity at the Bluffdale facility was between 3 and 12 exabytes ( 1 exabyte is 1 billion gigabytes) based on analysis of unclassified blueprints, although some had vastly greater estimates ranging from yottabytes (in Wired) to 5 zettabytes (on NPR), a.k.a. words that most probably can’t pronounce but translate to ‘a lot.‘
And, in retrospect, it appears to not have been enough, because on Monday, Amazon Web Services announced it was now offering a commercial cloud service to the US Intelligence Community (i.e. spies on both foreign targets and US presidential campaigns) called, directly enough “Secret Region” that can operate workloads up to the Secret U. S. security classification level.
‘Today we mark an important milestone as we launch the AWS Secret Region,’ said Teresa Carlson, Vice President, Amazon Web Services Worldwide Public Sector. ‘AWS now provides the U. S. Intelligence Community a commercial cloud capability across all classification levels: Unclassified, Sensitive, Secret, and Top Secret. The U. S. Intelligence Community can now execute their missions with a common set of tools, a constant flow of the latest technology and the flexibility to rapidly scale with the mission. The AWS Top Secret Region was launched three years ago as the first air-gapped commercial cloud and customers across the U. S. Intelligence Community have made it a resounding success. Ultimately, this capability allows more agency collaboration, helps get critical information to decision makers faster, and enables an increase in our Nation’s Security.’

This post was published at Zero Hedge on Nov 20, 2017.

Who Gets to Push the Nuclear Button?

William Binney is the former National Security Agency (NSA) official who created NSA’s mass surveillance program for digital information. He says that if the Russian government had conspired with Trump, hacked the Democratic National Committee’s computer, or in any way influenced the outcome of the last US presidential election, the National Security Agency would have the digital evidence. The fact that we have been listening to the unsubstantiated charges that comprise ‘Russiagate’ for more than one year without being presented with a scrap of evidence is complete proof that Russiagate is entirely fake news.
The fake news originated with CIA director John Brennan and FBI director Comey conspiring with the DNC in an effort to discredit and unseat President Trump and at a minimum prevent him from damaging the vast power and profit of the military/security complex by normalizing relations with Russia.
Consider what this means. The directors of the CIA and FBI made up a totally false story about a newly elected President and fed the lies to the presstitutes and Congress. The presstitutes never asked for a drop of evidence and enlarged the Brennan/Comey lie with a claim that all 17 US intelligence agencies had concluded that Russia had interferred. In actual fact, a handful of carefuly selected people in three of the agenies had prepared, perhaps under duress, a conditional report that had no evidence behind it.

This post was published at Paul Craig Roberts on November 17, 2017.

WIKILEAKS VAULT 8 PART 1: CIA WROTE CODE TO IMPERSONATE RUSSIAN ANTI-VIRUS COMPANY KASPERSKY

New WikiLeaks publication reveals CIA wrote code to impersonate Kaspersky Labs anti-virus company pic.twitter.com/geigDgIDsk
— WikiLeaks (@wikileaks) November 9, 2017

WikiLeaks has released part 1 of its new Vault 8 series following its popular and widely distributed Vault 7 series which exposed CIA spyware and malware capabilities.
The new release ‘will enable investigative journalists, forensic experts, and the general public to better identify and understand covert CIA infrastructure components,’ the international whistleblower coalition wrote.
The CIA’s master virus control system known as ‘Hive’ was exposed previously last April by WikiLeaks.
‘Described as a multi-platform malware suite, Hive provides ‘customisable implants’ for Windows, Solaris, MikroTik (software used in Internet routers), Linux OS, and AVTech Network Video Recorders, used for CCTV recording.
A 2015 user guide for the malware suite reveals the initial release of Hive was in 2010. The guide goes on to describes the software as having two primary functions – a beacon and interactive shell. Both are designed to provide a starting point for CIA cyber agents to deploy other tools that have been included in the WikiLeaks Vault 7 series release.
The implants communicate via HTTPS with the web server using a cover domain. Each cover domain is connected to an IP address that is hooked into a Virtual Private Server (VPS) provider. This forwards all incoming traffic to a ‘Blot’ server.

This post was published at The Daily Sheeple on NOVEMBER 10, 2017.

Bombshell NSA Memo: Saudi Arabia Ordered Attack On Damascus International Airport With US Knowledge

The Intercept has just released a new top-secret NSA document unearthed from leaked intelligence files provided by Edward Snowden which reveals in stunning clarity that the armed opposition in Syria was under the direct command of foreign governments from the early years of the war which has now claimed half a million lives.
The US intelligence memo – marked “Top Secret” – is arguably the most damning piece of evidence to date which gives internal US government confirmation of the direct role that both the Saudi and US governments played in fueling an armed insurgency which launched massive and well-coordinated attacks on civilians, civilian infrastructure, as well as military targets in pursuit of regime change. The NSA report is sourced to the intelligence agency’s controversial PRISM program – which gives the NSA the ability to sweep up all communications and data exchanged through major US internet service providers like Google. The memo focuses on events that unfolded outside Damascus in March of 2013.

This post was published at Zero Hedge on Oct 24, 2017.

A Mysterious Virus Has Infiltrated America’s Drone Program

There’s something deeply wrong at Creech Air Force Base, the notorious home of America’s drone program, where pilots remotely order US Reaper and Predator drones to unleash destructive missile strikes on unsuspecting villagers in Yemen, Libya, Iraq, Syria, Afghanistan and other war zones.
Less than a week after the Department of Homeland Security advised all federal agencies using anti-virus software created by Kaspersky Labs to remove the programs from their systems immediately, Ars Technica reports that two weeks ago the Defense Information Systems Agency detected mysterious spyware embedded in the drone ‘cockpits’ – the control stations that pilots use to control the deadly machines.

This post was published at Zero Hedge on Oct 9, 2017.

Putin Strikes Again: Russian Hackers Reportedly Stole NSA Data On Cyber Defense

Looks like Russian President Vladimir Putin is back at it.
The Wall Street Journal reported Thursday that hackers working for the Russian government have stolen data describing how US intelligence agencies infiltrate foreign computer networks and how they defend against cyberattacks. The data were stolen after a National Security Agency contractor removed the highly classified material and put it on his home computer, according to WSJ’s anonymous sources.
News of the hack, which hasn’t been exposed previously, explains the federal government’s abrupt crackdown on Moscow-based security firms Kaspersky Labs. As WSJ explains, the contractor may have been targeted after hackers identified the files thanks to the contractor’s use of a popular antivirus software created by Kaspersky.
According to WSJ, the hack is considered by experts to be one of the most significant security breaches in recent years. It offers a rare glimpse into how the intelligence community thinks Russian intelligence exploits the widely available software products. It appears to be one of the most harmful infiltrations of government servers since hackers purportedly sponsored by the Chinese military stole records about US intelligence assets from the Office of Personnel Management’s servers.

This post was published at Zero Hedge on Oct 5, 2017.

Muddy Waters’ Carson Block Sues Equifax For $500,000

Disgraced credit-monitoring company Equifax, which has seen its stock drop by nearly 40% since disclosing what will likely be remembered as one of the most damaging data breaches in US history, eliciting dozens of class-action lawsuits, calls for investigations by at least one state attorney general, and requests from multiple Congressional committees for more information about the exact timeline of when Equifax learned about the hack, and when it was disclosed – because somewhere between those two events, several of the company’s executives, including its CFO, cashed out of some $2 million in stock and options.
***
In the latest humiliating blow to a company that failed at its only job – safeguarding Americans’ sensitive personal and financial data – famed short-seller Carson Block has announced that he has decided to sue the company over its ‘abysmal’ handling of the hack.
And here’s the kicker: He doesn’t even have an open short position against the company. In other words: There’s no profit motive here. Block – like millions of Americans – is just really, really pissed.
Here’s the Financial Times:
‘Veteran short-seller Carson Block has launched a private lawsuit against Equifax, accusing the credit-reporting company of an ‘abysmal’ handling of one of the worst cyber security incidents in history. Equifax said on September 7 that its systems were breached by criminals in a raid that went on for more than two months – an admission that has prompted a flood of regulatory inquiries, dozens of private lawsuits and a more than one-third collapse in the company’s share price. The data of up to 143m Americans was compromised, the company said, along with up to 400,000 people in the UK.
One of those was Mr Block, whose suit filed on Friday accuses Equifax of negligence in failing to safeguard and protect his personal identifying information from criminals, as well as a failure to disclose the breach in a timely fashion.’
Apparently, Block has learned that his personal information was compromised in the hack because he’s suing for personal damages. He has also accused the company of failing to disclose the breach in a timely fashion. The company’s CEO, Rick Smith, who is expected to deliver Congressional testimony early next month, has said that the company at first believed the hack was relatively minor.”

This post was published at Zero Hedge on Sep 17, 2017.

LIBERTARIAN JOURNALIST WHO WAS DOXED AND HARASSED BY SJWS NEVER RECEIVED MEDIA ATTENTION OR JUSTICE

One of the worst things that can happen to you on the internet is to be doxed and hounded by people who use your personal information to harass you. It happened to libertarian journalist Ashley Rae Goldenberg in 2014, and her harassers continue to brag about what they did. Their actions led to a torrent of rape and death threats against her and members of her family.
Goldenberg, whose private details – including her credit card details, phone number and personal address – became a target for harassment from the social justice mob on Tumblr when she started a blog called Communism Kills in 2011. She tells The Daily Caller that she first started the site after learning about the communists on Tumblr.
‘I actually started only intending to write simple lessons about economics (my major in college), but because of the nature of Tumblr, I started getting more involved in combatting the prevailing social justice dogma there,’ she says, adding that she was a target of social justice warriors even when she was writing about economics.

This post was published at The Daily Sheeple on SEPTEMBER 15, 2017.

Please do this before you get hacked

What I’m about to tell you is a bit scary. But as you’ll see, it could easily happen to anyone. So please read this in full… and then go change your passwords.
We have a friend whose email was hacked some time ago. It happened because, as many people tend to do, she used a very simple password for her email and logged in over an unsecure network, allowing hackers to easily grab it.
What’s more, she used the SAME password for multiple other online accounts. So when the hackers obtained her email password, they could also access her bank account.
After obtaining access to her email account, the hackers combed through years and years of old files and emails until they found a document with her signature on it, along with other key personal information.

This post was published at Sovereign Man on July 21, 2017.

Putin Tells Stone: “Snowden Is Not A Traitor”

Just hours after Megyn Kelly announced on NBC’s Today show that she would be interviewing Vladimir Putin in St Petersburg tomorrow at the International Economic Forum, Showtime released the first trailer and extended clip for The Putin Interviews, a sit-down with the Russian president conducted by the film-maker Oliver Stone for a four-part special that premieres on 12 June.
***
In the extended clip released on Thursday, The Guardian reports Stone and Putin can be seen driving in a car with an English translator in the backseat, discussing topics such as Edward Snowden’s whistleblowing and Russian intelligence.

This post was published at Zero Hedge on Jun 3, 2017.

Worried About ‘WannaCry’? You Should Have Listened To Julian Assange

If NSA builds a weapon to attack Windows XP – which Microsoft refuses to patches – and it falls into enemy hands, should NSA write a patch? — Edward Snowden (@Snowden) May 12, 2017

A widespread computer virus attack known as ‘WannaCry’ has been compromising computers with obsolete operating systems across the world. This should be the opening sentence of just about every article on this subject, but unfortunately it is not.
The virus does not attack modern computer operating systems, it is designed to attack the Windows XP operating system that is so old, it was likely used in offices in the World Trade Center prior to September 11 2001, when the buildings collapsed. Windows XP was first released on 25 August, 2001.
Furthermore, early vulnerabilities in modern Windows systems were almost instantly patched up by Microsoft as per the fact that such operating systems are constantly updated.
The obsolete XP system is simply out of the loop.

This post was published at Zero Hedge on May 14, 2017.

President Obama Sought NSA Intel On 1000s Of Americans During The 2016 Election

Authored by John Solomon via Circa.com,
During his final year in office, President Obama’s team significantly expanded efforts to search National Security Agency intercepts for information about Americans, distributing thousands of intelligence reports across government with the unredacted names of U. S. residents in the midst of a divisive 2016 presidential election.
The data, made available this week by the Office of the Director of National Intelligence, provides the clearest evidence to date of how information accidentally collected by the NSA overseas about Americans was subsequently searched and disseminated after President Obama loosened privacy protections to make such sharing easier in 2011 in the name of national security. A court affirmed his order.
The revelations are particularly sensitive since the NSA is legally forbidden from directly spying on Americans and its authority to conduct warrantless searches on foreigners is up for renewal in Congress later this year. And it comes as lawmakers investigate President Trump’s own claims that his privacy was violated by his predecessor during the 2016 election.

This post was published at Zero Hedge on May 4, 2017.