#cyberwar

- comments from video source -
This is an article written by Hugh Eakin that was published in The New York Review of Books on January 19, 2017 - ONE DAY before Donald Trump's inauguration.
The article is hidden behind a paywall but I found it as an uploaded PDF file. I think this information is so important that I hired someone who made a video of it, to give you the opportunity to listen to it instead of reading, because I know how difficult it can be to get through long articles.
I did not plan to upload it today but since Tucker Carlson has just demanded an investigation into NSA spying on him, this should be a good opportunity to share it. Matt Gaetz also requested an inquiry in Congress today.

The article is largely about the NSA and their activities. Watch, reconcile and share.

Article:
https://www.nybooks.com/articles/2017/01/19/the-swedish-kings-of-cyberwar/

Full article in PDF:
https://rskb58.se/dokument/The_Swedish_Kings_of_Cyberwar.pdf
https://t.me/SokratesXVII/1525

1 month, 3 weeks ago

Today's surveillance is getting more advance, as we head ever more closely into this new digital world, Let's not forget to help others find their way through this matrix we call life.
-
-🔴 Subscribe, Because its free ;)
-
Tap the Bell to make me smile & get yourself a notification when the new vid drops
-
WEB & LINK-TREE; http://www.blacksheepellis.com/

Follow the black sheep as we continue to turn over rocks to discover lost history's and ancient civilizations, strange phenomenon, and not to mention the struggles and problems we face in society today , and some of the great conspiracy theories of our time.
-----------------------------------------
links to full videos, Go watch & check these out,,,
-
https://www.youtube.com/watch?v=BinWPwLpuEY

https://www.youtube.com/watch?v=0Ixr4SzoVJA

https://www.youtube.com/watch?v=JylQMKLC_2M

https://www.youtube.com/watch?v=iV8H0nA_gSM

https://www.youtube.com/watch?v=CLo3e1Pak-Y&t=194s

https://www.youtube.com/watch?v=V2p99YPEPZk

https://www.youtube.com/watch?v=sz1LM9kwRLY

https://www.youtube.com/watch?v=nwZNe1rIo0s

https://youtu.be/Au38RVfozi0

https://youtu.be/ooQZuq8K5iA

https://youtu.be/OmQMUEjOwsI

https://youtu.be/S8mmBgf8P8Q

https://youtu.be/XHfjnvqZJh0

https://youtu.be/pG7iwKIelsI

https://youtu.be/Ir1BoAEjlb4

2 months, 1 week ago

𝐓𝐇𝐄 𝐓𝐄𝐂𝐇 𝐓𝐀𝐊𝐄𝐎𝐕𝐄𝐑 - 𝖶𝖺𝗋 𝖻𝗒 𝗍𝗁𝖾 𝖡𝖺𝖼𝗄𝖽𝗈𝗈𝗋 - ⁣by Cliche Guevara
> https://archive.org/details/talpiot-unit-8200

3 months ago

Kill Chain - The Cyber War on America's Elections 2020 HBO. In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses of today’s election technology, an issue that is little understood by the public or even lawmakers.

From directors Simon Ardizzone, Russell Michaels and Sarah Teale, the team behind HBO’s 2006 Emmy-nominated documentary Hacking Democracy, Kill Chain again follows Finnish hacker and cyber security expert Harri Hursti as he travels across the U.S. and around the world to show how our election systems remain unprotected, with very little accountability or transparency. Hursti’s eye-opening journey is supplemented by candid interviews with key figures in the election security community, as well as cyber experts and U.S. senators from both parties who are fighting to secure the integrity of the vote before November 2020.

As the film shows, individuals, foreign states and other bad actors can employ a myriad of techniques to gain access to voting systems at any stage – from voter registration databases to actual election results.

Through this lens, seemingly unrelated or uncoordinated security breaches of the recent past can be seen as part of a “kill chain” – a military doctrine to plot meticulous, long-game attacks, understanding that breaking down trust in voting results is the surest way to undermine democracy. As enlightening as it is disturbing, Kill Chain underscores the fragility of our election process and points to the clear solutions available to protect us against sabotage.

Credit: Simon Ardizzone, Russell Michaels and Sarah Teale

Also see:

M: LIN WOOD - FIRESIDE CHAT 15 | HOW TO FIGHT LIKE A FLYNN & TO RESEARCH LIKE A LIN
https://www.bitchute.com/video/qfUrGlfy6Dfc/

M: LIN WOOD FIRESIDE CHAT #14 | PRESIDENT TRUMP’S CPAC SPEECH + HOW TO GET VACCINE EXEMPTIONS

https://www.bitchute.com/video/15wdXHiznS1G/

MIRROR: LIN WOOD | U.S. SUPREME COURT REFUSES TO HEAR SIDNEY POWELL’S ELECTION Fraud Case

https://www.bitchute.com/video/JtiQ2VQT8tiK/

MIRROR: SIDNEY POWELL EXPLOSIVE INTERVIEW - RETAKING AMERICAN FREEDOM

https://www.bitchute.com/video/FCngnz70qFHO/

ANN VANDERSTEEL: SIDNEY POWELL UPDATE WITH CONTRIBUTION FROM PATRICK BYRNE

https://www.bitchute.com/video/zFZIYIuGM7cr/

Credit Thrivetime Show https://rumble.com/c/ThrivetimeShow

Call To Action Americans - You've Been Served! - Help Take Back Our Country

https://www.bitchute.com/video/VE6RTd0mNmot/

MIKE LINDELL'S - ABSOLUTE PROOF - EXPOSING ELECTION FRAUD & THEFT OF AMERICA

https://www.bitchute.com/video/j97yel1SMQ4K/

JUAN O SAVIN: GOD WILL APPEAR – PRYME, JENN & GERRY – MAR 15, 2021

https://www.bitchute.com/video/2nhXV9BOVpeN/

Mirror: MUST WATCH: Kill Chain - The Cyber War on America's Elections
JUAN O SAVIN SHARES INSIGHTS AND REVEALS WHAT'S GOING ON IN THE WORLD

https://www.bitchute.com/video/f7abyNQt1XMt/

JUAN O SAVIN - BREAKING UPDATE - MARCH 10, 2021 - 17 MIN

https://www.bitchute.com/video/Q224ZrtSq9E2/

The Called "The Makings of a Perfect Day" Juan O Savin

https://www.bitchute.com/video/d1NcamZ1NkN5/

Sound Of Freedom Trailer

https://www.bitchute.com/video/BPog1hX44iDI/

FAIR USE NOTICE This video may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. In accordance with Title 17 U.S.C. Section 107, such material has been referenced to advance understanding of political, human rights, ecological, economic, scientific, moral, ethical, and social justice issues. This constitutes a "fair use" of any such material as provided for in section 107 of the US Copyright Law.

#wwg1wga #kiilchain #cyberwar

5 months, 4 weeks ago

Mass murder by letal GMO injection

#coronaputsch #operationresilience #cyberwar #plandemy #iGMOletalnjection #Macron #pfizer #astrazeneca #pasteur #RMNA #ARNM #cancer #massmurder #genocide #controledemasse #France #IA #firstwave #Bill&MelindaGates #Klaushwab #institutions

6 months ago

(March 26, 2020)

In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses of today’s election technology, an issue that is little understood by the public or even lawmakers. From directors Simon Ardizzone, Russell Michaels and Sarah Teale, the team behind HBO’s 2006 Emmy®-nominated documentary Hacking Democracy, Kill Chain again follows Finnish hacker and cyber security expert Harri Hursti as he travels around the world and across the U.S. to show how our election systems remain unprotected, with very little accountability or transparency.

Hursti’s eye-opening journey is supplemented by candid interviews with key figures in the election security community, as well as cyber experts and U.S. senators from both parties who are fighting to secure the integrity of the vote before November 2020. As the film shows, individuals, foreign states and other bad actors can employ a myriad of techniques to gain access to voting systems at any stage – from voter registration databases to actual election results.

Through this lens, seemingly unrelated or uncoordinated security breaches of the recent past can be seen as part of a “kill chain” – a military doctrine to plot meticulous, long-game attacks, understanding that breaking down trust in voting results is the surest way to undermine democracy. As enlightening as it is disturbing, Kill Chain underscores the fragility of our election process and points to the clear solutions available to protect us against sabotage.

Source: https://www.killchain.tv

7 months, 1 week ago

James Bamford is an American bestselling author, journalist and documentary producer widely noted for his writing about United States intelligence agencies, especially the National Security Agency.

8 months, 1 week ago

(January 5, 2021)

General McInerney, Mary Fanning And Alan Jones announce covert operation of real time proof of 2020 cyberwar and voter fraud. NSA whistleblower Kirk Wiebe joins in to confirm validity of the covert operation and proof.

Source: https://www.worldviewweekend.com/tv/video/general-mcinerney-mary-fanning-and-alan-jones-announce-covert-operation-real-time-proof

8 months, 2 weeks ago

[MIRRORED] https://www.youtube.com/watch?v=IRE4y8aVtlU

My personal thanks to Bill Binney and Dr. Katherine Horton for this vitally important video that delves deeper into the Cyber Wars and reroutes the attention from China to Switzerland and the Crown Corporation. They cover some very deep territory so highly recommended listening.

The real national security threats in the US that are being obscured by the cyberattacks and the role of NSA.

LINKS:

https://www.thegatewaypundit.com/2020...

Video of Gen. Flynn interview on Lou Dobbs
https://youtu.be/6zw8IYbkZ38

Definition of Dominion - Macmillan Dictionary
https://www.macmillandictionary.com/d...

9 months ago

UK/US Cyberwar Against "Conspiracy Theorist" Websites Kicks Into The Next Gear!

by Waking The Future

US – UK Intel Agencies Declare Cyber War on Independent Media:
https://unlimitedhangout.com/2020/11/reports/us-uk-intel-agencies-declare-cyber-war-on-independent-media/

Operation Warp Speed is Using a CIA-Linked Contractor to Keep Covid-19 Vaccine Contracts Secret
https://www.thelastamericanvagabond.com/operation-warp-speed-is-using-a-cia-linked-contractor-to-keep-covid-19-vaccine-contracts-secret/

9 months ago

Upload from - Leigh D
Cyberwarfare IS War: The Insurrection Act, and 12th & 14th Amendment
https://www.youtube.com/watch?v=DOOMG9FQebI
08.12.2020

WWG1WGA - TREASON - CYBERWAR - ELECTION FRAUD

Wars are not won by going in the front door. There are many players on the chessboard, as well as many players NOT on the board, which we cannot see. While courtroom challenges and legislative discussions are interesting, they do not represent the entire game. We should also be focusing on the Insurrection Act, Military Tribunals, and the 12th and 14th Amendments.

18 U.S. Code § 2381 - Treason
18 U.S. Code § 2382 - Misprision Of Treason
18 U.S. Code § 2383 - Rebellion Or Insurrection
18 U.S. Code § 2384 - Seditious Conspiracy
18 U.S. Code § 2385 - Advocating Overthrow Of Government

WE ARE AT WAR !

My channel is for sharing and spreading purpose only.
If you are the legal content owner of the video and like it to be removed from my channel
please contact me in the comment section below.

Visit also my alternative YouTube channel
London Pete '72 - 2Q2Q Alternative
https://www.youtube.com/channel/UCHG2FcrFU2MYJ4SYnravnJA
Est. 16.09.2020

9 months, 3 weeks ago

The story Richard Clarke spins has all the suspense of a postmodern geopolitical thriller. The tale involves a ghostly cyberworm created to attack the nuclear centrifuges of a rogue nation—which then escapes from the target country, replicating itself in thousands of computers throughout the world. It may be lurking in yours right now. Harmlessly inactive...or awaiting further orders.

11 months, 2 weeks ago

A Documentary by Millie Weaver

1 year, 1 month ago

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses - from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented 10 billion dollars in damage - the largest, most devastating cyberattack the world had ever seen.

The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military, and civilians alike.

A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur - with world-shaking implications.

1 year, 1 month ago

Part 2: https://www.bitchute.com/video/OXFZNm97Ub5M/

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses - from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented 10 billion dollars in damage - the largest, most devastating cyberattack the world had ever seen.

The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military, and civilians alike.

A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur - with world-shaking implications.

1 year, 1 month ago

Our May 28, 2014 recording.

The New World Order has hit the command prompt for a major psyops. The Hunger Games have gone live with a California killing spree. Many of the Sandy Hook flaws have been corrected. Our method actor goes live with tears, blood is photographed on the floor, bullet holes take center stage, surveillance video is available; but wait, they still made a mistake. The photo of entry into the store looks faked. Of course it should be. Elliot Rodger's grandfather was a renowned photographer. He was a charter member of Frank Capra's Magnum Photography. They faked the world's greatest war photograph. Peter Rodger is a movie industry illusion master. Do you hunger Elliot? Do you crave women? You just take to gladiatorial combat to get them. Afterall it's just a game. Elliot's psychiatrist a TV persona. What was the root cause? How about divorce. Police drop ball. Mother screaming for help. Was it all a hoax, or is it just being used to further the gun control agenda? Ukraine elects billionaire candy man. Can the Candy Man can? More fighting in Ukraine. Airport recaptured. Was it friendly fire? Chuck offends Russians. Putin calls the Nazi out. Harper appoint Chuck to Privy Council. China talks defence with Russia. China designs high speed train proposes line to mainland USA. Mary Anning Google Doodle. Pope visits Holy Land. Pope and Chuck implicated in Satanic child sacrifice. Thai coup. Tech sales decline over spying. US sold nukes. US losing cyberwar. Harper enshrines the right to bite. Waterways open for exploitation. Bush family goes after world's water. GMO terrorism in Russia. North Dakota oil boom. Japan dumps radioactive waste in Pacific daily. Radiation eating bacteria under-reported. Baking Soda cure all. UFO crash China. Nullification bills pass. Empress of Ireland 100 years. On Conspiracy Cafe it's GERONIMO!

RMS Empress of Ireland

Final moments: This is the last picture of massacre victim Chris Michael-Martinez, taken on security camera, just a split second before he was gunned down by Elliot Rodger

Notice all the debris on the floor and a chair. I don't know any stores that would pile a litany of safety hazards at a point of egress in the modern tort world. The glass is clear. In my hood all the stores have advertising in the window. Milk is so much. Bread is on sale and the infamous lotto tickets. Maybe there's a law against it in sunny Caifornia.

Gun laws in California regulate the sale, possession, and use of firearms and ammunition in the state of California in the United States.

The gun laws of California are some of the most restrictive in the United States. A Handgun Safety Certificate, obtained by passing a written test, is required for handgun purchases, although there are exemptions to this requirement. (This requirement was extended to long guns on January 1st, 2014.) Handguns sold by dealers must be "California legal" by being listed on the state's roster of handguns certified for sale. Private sales of firearms must be done through a licensed dealer. All firearm sales are recorded by the state, and have a ten-day waiting period.

§26500, §12071, §12082

The buyer of a firearm must fill out an application to purchase a particular gun. The firearms dealer sends the application to the California Department of Justice (DOJ), which performs a background check on the buyer. The approved application is valid for 10 days. There is a 10 day waiting period for the delivery of any firearm.

LINKS:

https://www.conspiracy-cafe.com/apps/videos/videos/show/18619141-geronimo-on-conspiracy-cafe

Any copyright material is used under fair use doctrine for educational non profit discussion of news, trends and film history.

Social – Disclaimer: In accordance with Title 17 U.S.C. Section 107, any copyrighted work is archived here under fair use without profit or payment to those who have expressed a prior interest in reviewing the included information for personal use, non-profit research and educational purposes only. Ref. http://www.law.cornell.edu/uscode/17/107.shtml.

1 year, 6 months ago

if you want to know what else they can and will do check out their crazy website:
https://www.cellebrite.com/en/home/

2 years ago

If they can’t beat you intellectually, they’ll disappear you gradually. If they can’t disappear you physically, they’ll disappear you digitally. Welcome to the cold, calculating and ubiquitous cyberwar! The remedy is the Bill of Rights. Archaic? Not on Freedom on Deck, it’s not! Dan Perkins and Josh Bernstein guest!
Our live shows can be heard every Sunday from 3 to 5 PM EST on local radio FM station CBS 94.9 News Now and Stimulating Talk - covering Connecticut, Rode Island and Long Island, NY. Listen live from http://freedomondeck.com/ - and find the archives, plus supplemental FOD OVERDRIVE podcasts there and at BitChute: https://bit.ly/2LzdwYB or YouTube: https://bit.ly/2xxbTrk
Follow us on Twitter: https://twitter.com/freedomondeck
Like us on Facebook: https://www.facebook.com/freedomondeck/
[email protected]

2 years, 2 months ago

REUBEN Paul may be only 11 years old, but his technological prowess has wowed industry experts at a technology conference in the Netherlands. The grade six student shocked an audience of security experts when he casually hacked into their Bluetooth devices to “weaponise” his robotic teddy bear. His electronic bear, named Bob, is connected to the cloud via Wi-Fi and Bluetooth, and can send and receive messages. The youngster used a small credit card-sized computer known as a “Raspberry Pi” to scan the hall for Bluetooth devices and download dozens of phone numbers. Then, using one of the numbers, he hacked into his bear using the Python coding language and turned on Bob’s lights and recorded audio from the crowd. “IOT (Internet of Things) home appliances, things that can be used in our everyday lives, our cars, lights refrigerators, everything like this that is connected can be used and weaponised to spy on us or harm us,” he later explained to AFP. His father, Mano Paul, told the agency he has always been surprised by his son’s ability, and said he became concerned when Reuben easily hacked a toy car. “It means that my kids are playing with timebombs, that over time somebody who is bad or malicious can exploit.” Electronic toys can be used to steal private information such as passwords, use GPS to pinpoint a person’s location, or spy on children by recording audio and video. Reuben later tweeted: “It was fun but I hope people did not miss the message — secure IoT before the Internet of Toys becomes and Internet of Threats”. If the experts in the room are anything go by, he’s got a bright future ahead.

http://www.dailymail.co.uk/sciencetech/article-4512366/Cyber-kid-stuns-experts-showing-toys-weapons.html

https://www.theguardian.com/world/2017/may/17/boy-11-hacks-cyber-security-audience-to-give-lesson-on-weaponisation-of-toys

http://www.thejakartapost.com/youth/2017/05/17/cyber-kid-stuns-experts-showing-toys-can-be-weapons.html?fb_comment_id=1448570488498046_1610787935609633

http://www.news.com.au/technology/online/hacking/sinister-implication-of-electronic-toys/news-story/8c35459db5354b3584b1c5fbae3d72d0

3 years, 5 months ago