Category Archives: WikiLeaks

Southeast MO Storms and A Memorial Day Weekend for Seth Rich!

A PDS Severe or Tornado watch is being considered for SE #Missouri from SPC. Dangerous bow echo w/ 70-100mph winds likely! #MOWx –

It is amazing that this writer is able to ‘key’ this article, as there has been a 15 hour power outage in my Southeast Missouri neck of the woods. In retrospect I should have taken the You-Tube video more seriously. Had I done so, I believe, I could have properly filmed, what I believe to be , weather manipulation.

I am not familiar with the ‘hacker’ or’ YouTuber‘ of the below video, but this is the trail that led me to them:

Note: The audio in the video starts out garbled. Go to the 11:20 mark.

Hacker Blows Seth Rich Murder Case Wide Open

…”The day after this interview, my source reports the bad guys took down Internet and cell phones for 100 miles around his location for most of the day to flush him out into using one of their systems that could track him!  My hacker source I call “Lou” (I don’t know or want to know his real name) goes over how his friends hacked Seth’s accounts to get the proof of his communication with WikiLeaks!  Some of my source’s friends accessed his Gmail account and found the communications between Seth and WikiLeaks!”

What caught my attention was, of course, the mention of Southeast Missouri in relationship to an ...“event driven timeline”  which included SEMO … “core between Washington and Oregon, Seattle or Portland. California, Los Angeles or San Francisco. Atlanta GA, Ozark, MO and Southeast MO. Northeast, NY was listed along with Pennsylvania. They were told there would be ‘weather warfare’ and ‘false flags’ in those areas” … Hmm,

What makes SEMO/Ozark, Missouri a target?

If one were to believe this ‘hacker‘ then one would have to question the reasoning of making a rural area of Missouri a target of “weather warfare”?

Let’s go down this road. Let’s assume (Marine Corps taught me to ‘hate’ that word), never-the-less, these events are ‘suppose‘ to be distractions from the Seth Rich murder, which appears to be about ready to explode!

I proffer this evidence:

According to Fox news…”The federal investigator, who requested anonymity, said 44,053 emails and 17,761 attachments between Democratic National Committee leaders, spanning from January 2015 through late May 2016, were transferred from Rich to MacFadyen before May 21.

And according to Wikileaks“Starting on Friday 22 July 2016 at 10:30am EDT, WikiLeaks released over 2 publications 44,053 emails and 17,761 attachments from the top of the US Democratic National Committee.

It does not take a genius to do the math. But now, it seems, there is more fodd for thought …

FBI Memo Reveals Seth Rich Had DNC Documents On Laptop

“If the Seth Rich murder was just an armed robbery why was the FBI looking into it? why is the mainstream media so hell-bent on shutting this story down? Why is Sean Hannity being silenced for even covering the murder of Rich? There are many unanswered questions but hopefully this FBI memo can be the first step into uncovering the truth behind the murder of Seth Rich.”

IMHO, the above is pretty good evidence that Seth Rich is, in fact, the Wiki ‘leaker’. But what ties Seth Rich to Southeast Missouri?

I am just ‘spit-balling’ here  … Did Seth Rich know about the ‘election fraud’ that was eventually discovered in Southeast Missouri?

WOW – DONALD J. TRUMP AND I HAVE ALREADY LOST THIS ELECTION IN MISSOURI!

Whatever the case, there is clearly enough evidence to now go forward and start draining the Swamp!

This publisher is going to go retrieve her American flag, that was ripped from its pole during yesterdays horrendous storm, and put it back up. As well cut up some trees that were uprooted. And then will have a barbecue, thinking of what Memorial Day means. When I do that I will include Seth Rich in my thoughts.

Seth Rich was a true American Hero!

~Semper Fi! 

Who murdered Seth Rich?

Seth Conrad Rich (January 3, 1989 – July 10, 2016) was fatally shot in the Bloomingdale neighborhood of Washington, D.C. He was a 27-year-old employee of the Democratic National Committee (DNC).

It was suspected that it was Seth Rich who leaked the DNC emails to Wikileaks, that all but destroyed the Clinton campaign. If anyone has been paying attention to the new recently released information, they will know how to put two and two together and know for a fact that this was true.

According to Fox news:

…”The federal investigator, who requested anonymity, said 44,053 emails and 17,761 attachments between Democratic National Committee leaders, spanning from January 2015 through late May 2016, were transferred from Rich to MacFadyen before May 21.

Wikileaks:

“Starting on Friday 22 July 2016 at 10:30am EDT, WikiLeaks released over 2 publications 44,053 emails and 17,761 attachments from the top of the US Democratic National Committee — part one of our new Hillary Leaks series. The leaks come from the accounts of seven key figures in the DNC: Communications Director Luis Miranda (10520 emails), National Finance Director Jordon Kaplan (3799 emails), Finance Chief of Staff Scott Comer (3095 emails), Finanace Director of Data & Strategic Initiatives Daniel Parrish (1742 emails), Finance Director Allen Zachary (1611 emails), Senior Advisor Andrew Wright (938 emails) and Northern California Finance Director Robert (Erik) Stowe (751 emails). The emails cover the period from January last year until 25 May this year.”

This publisher believes that it would be difficult to match the exact amount of emails and attachments that was removed from the DNC.

@polNewsForever tweeted:

 And what happened to the D.C. Police Chief that was investigating this murder?

 “Lanier is ending her 26-year career after recently turning 49, and four months short of serving a full decade heading one of the nation’s highest-profile police departments. She was the District’s first permanent female chief.”

The new D.C. Police Chief:

Peter Newsham, Chief of Police

“Newsham holds a bachelor’s degree from the College of the Holy Cross and a law degree at the University of Maryland School of Law. He is a member of the Maryland Bar.”

This writer has to wonder,  is the firing of Comey related? Are we going to finally see Justice for Seth Rich?

Vault 7 – It has been Unleashed!

Most of us, in the IT industry, have known of the potential danger of cyberwarfare/spying for years. However it was not till today that it was confirmed by the WikiLeaks Vault 7 release of just how dangerous this will be.  This author did not download the vast trove of documents, but is only accessing information provided by WikiLeaks via their website and that is enough to raise the hair on the back of my neck!

I will proffer a few of the important comments:

First let me state that I was ‘standing-by’ at 8AM EST, the time advertised for the press conference. I had also posted a link on my Facebook page, for others if they were interested. However about five minutes till the ‘live feed’ froze, I checked the WikiLeak Twitter to see if there was an update and found this post:

 @wikileaks: NOTICE: As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.

I went back to my FB page and the link, to the press confernece, that I had posted had vanished! Back to Twitter I find that WikiLeaks had released the encryption key, for their encrypted Torrent file via Twitter and this statement. I also found it interesting that WikiLeaks would use this passphrase SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds for the encryption. As this refers to Kennedy’s quote about what he wanted to do to the CIA

Vault 7: CIA Hacking Tools Revealed

From this I will make the following observations.

“Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Let’s think about this statement for a minute. Among one of the great concerns about Hillary Clinton’s illegal bathroom server was the fact that she was. claimed to be, ‘hosting’ these applications on her server and that it was easily hackable. So at this point, I believe, we must assume that any enemy of America already has these exploits and now we must consider the consequences.

“By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”

Ever wonder why America is so in debt? And yet social security is running out of monies, our infrastructure is in decay, inflation is at an all time high … I am sure one gets the picture.

Do you own a Smart TV?

“The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

Do you own a car newer than 1995?

“As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

Which brings to mind …

Michael Hastings, ‘Rolling Stone’ Contributor, Dead at 33

Vladimir Putin’s ‘favourite’ driver dies in freak Moscow car crash

Let’s not even discuss Smartphones … Just understand that you are carrying with you a camera and microphone that ANYONE can tap into and you are not the wiser! They can even take your SKYPE conversations and turn it into text documents! There is not ONE THING THAT THEY CANNOT HACK!

Think you can outsmart them with an anti-virus … hmm, think again! (listed are just a few)

While there is an ongoing of information being sifted through, this writer thought it important to get out the basic gist of the ‘leak’ and warn her followers. What we have learned is dangerous and will change the way that we interact with the Internet from now on.  And it has justified, folks like me, that tape up their cameras and microphones because they are being used to spy on us, is not so ‘nuts’ after all!

Mark Zuckerberg tapes over his webcam. Should you?

Be aware, anytime you are in public or around specific electronics you are being spied upon. Also one maybe concerned that these applications are already in the wrong hands, so at this point, who cares about a ‘wiretap’ as we are all tapped! And in my opinion, as an Internet pioneer, this is very dangerous, as it can affect anything from ‘smart meters’ to nuclear plants!

And I thought it was a big deal when I tied AT&T to Google It pales in comparison!