Loretta Joseph - Blockchain Africa Conference 2021

Helicopter money 'the next step' in monetary policy says Fed official Loretta Mester /r/Bitcoin

Helicopter money 'the next step' in monetary policy says Fed official Loretta Mester /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Mockingbird X.0

Imagine if there was one desk that all stories could cross so that, at 4am, a media plan could be decided upon and disseminated where all news outlets coordinated to set the goalposts of debate and hyper focused on specific issues to drive a narrative to control how you vote and how you spend money; where Internet shills were given marching orders in tandem to what was shown on television, printed in newspapers and spread throughout articles on the World Wide Web.
https://i.imgur.com/Elnci0M.png
In the past, we had Operation Mockingbird, where the program was supremely confident that it could control stories around the world, even in instructions to cover up any story about a possible “Yeti” sighting, should it turn out they were real.
https://i.imgur.com/121LXqy.png
If, in 1959, the government was confident in its ability to control a story about a Yeti, then what is their level of confidence in controlling stories, today?
https://i.imgur.com/jQFVYew.png
https://i.imgur.com/ZKMYGJj.png
In fact, we have a recent example of a situation similar to the Yeti. When Bill Clinton and Loretta Lynch met on the TARMAC to spike the Hillary email investigation, the FBI was so confident it wasn’t them, that their entire focus was finding the leaker, starting with searching within the local PD. We have documentation that demonstrates the state of mind of the confidence the upper levels of the FBI have when dealing with the media.
https://i.imgur.com/IbjDOkI.png
https://i.imgur.com/NH86ozU.png
The marriage between mainstream media and government is a literal one and this arrangement is perfectly legal.
https://i.imgur.com/OAd4vpf.png
But, this problem extends far beyond politics; the private sector, the scientific community, even advice forums are shilled heavily. People are paid to cause anxiety, recommend people break up and otherwise sow depression and nervousness. This is due to a correlating force that employs “systems psychodynamics”, focusing on “tension centered” strategies to create “organizational paradoxes” by targeting people’s basic assumptions about the world around them to create division and provide distraction.
https://i.imgur.com/6OEWYFN.png
https://i.imgur.com/iG4sdD4.png
https://i.imgur.com/e89Rx6B.png
https://i.imgur.com/uotm9Cg.png
https://i.imgur.com/74wt9tD.png
In this day and age, it is even easier to manage these concepts and push a controlled narrative from a central figure than it has ever been. Allen & Co is a “boutique investment firm” that managed the merger between Disney and Fox and operates as an overseeing force for nearly all media and Internet shill armies, while having it’s fingers in sports, social media, video games, health insurance, etc.
https://i.imgur.com/zlpBh3c.png
https://i.imgur.com/e5ZvFFJ.png
Former director of the CIA and Paul Brennan’s former superior George Tenet, holds the reigns of Allen & Co. The cast of characters involves a lot of the usual suspects.
https://i.imgur.com/3OlrX7G.png
In 1973, Allen & Company bought a stake in Columbia Pictures. When the business was sold in 1982 to Coca-Cola, it netted a significant profit. Since then, Herbert Allen, Jr. has had a place on Coca-Cola's board of directors.
Since its founding in 1982, the Allen & Company Sun Valley Conference has regularly drawn high-profile attendees such as Bill Gates, Warren Buffett, Rupert Murdoch, Barry Diller, Michael Eisner, Oprah Winfrey, Robert Johnson, Andy Grove, Richard Parsons, and Donald Keough.
Allen & Co. was one of ten underwriters for the Google initial public offering in 2004. In 2007, Allen was sole advisor to Activision in its $18 billion merger with Vivendi Games. In 2011, the New York Mets hired Allen & Co. to sell a minority stake of the team. That deal later fell apart. In November 2013, Allen & Co. was one of seven underwriters on the initial public offering of Twitter. Allen & Co. was the adviser of Facebook in its $19 billion acquisition of WhatsApp in February 2014.
In 2015, Allen & Co. was the advisor to Time Warner in its $80 billion 2015 merger with Charter Communications, AOL in its acquisition by Verizon, Centene Corporation in its $6.8 billion acquisition of Health Net, and eBay in its separation from PayPal.
In 2016, Allen & Co was the lead advisor to Time Warner in its $108 billion acquisition by AT&T, LinkedIn for its merger talks with Microsoft, Walmart in its $3.3 billion purchase of Jet.com, and Verizon in its $4.8 billion acquisition of Yahoo!. In 2017, Allen & Co. was the advisor to Chewy.com in PetSmart’s $3.35 billion purchase of the online retailer.
Allen & Co throws the Sun Valley Conference every year where you get a glimpse of who sows up. Harvey Weinstein, though a past visitor, was not invited last year.
https://en.wikipedia.org/wiki/Allen_%26_Company_Sun_Valley_Conference
Previous conference guests have included Bill and Melinda Gates, Warren and Susan Buffett, Tony Blair, Google founders Larry Page and Sergey Brin, Allen alumnus and former Philippine Senator Mar Roxas, Google Chairman Eric Schmidt, Quicken Loans Founder & Chairman Dan Gilbert, Yahoo! co-founder Jerry Yang, financier George Soros, Facebook founder Mark Zuckerberg, Media Mogul Rupert Murdoch, eBay CEO Meg Whitman, BET founder Robert Johnson, Time Warner Chairman Richard Parsons, Nike founder and chairman Phil Knight, Dell founder and CEO Michael Dell, NBA player LeBron James, Professor and Entrepreneur Sebastian Thrun, Governor Chris Christie, entertainer Dan Chandler, Katharine Graham of The Washington Post, Diane Sawyer, InterActiveCorp Chairman Barry Diller, Linkedin co-founder Reid Hoffman, entrepreneur Wences Casares, EXOR and FCA Chairman John Elkann, Sandro Salsano from Salsano Group, and Washington Post CEO Donald E. Graham, Ivanka Trump and Jared Kushner, and Oprah Winfrey.
https://i.imgur.com/VZ0OtFa.png
George Tenet, with the reigns of Allen & Co in his hands, is able to single-handedly steer the entire Mockingbird apparatus from cable television to video games to Internet shills from a singular location determining the spectrum of allowable debate. Not only are they able to target people’s conscious psychology, they can target people’s endocrine systems with food and pornography; where people are unaware, on a conscious level, of how their moods and behavior are being manipulated.
https://i.imgur.com/mA3MzTB.png
"The problem with George Tenet is that he doesn't seem to care to get his facts straight. He is not meticulous. He is willing to make up stories that suit his purposes and to suppress information that does not."
"Sadly but fittingly, 'At the Center of the Storm' is likely to remind us that sometimes what lies at the center of a storm is a deafening silence."
https://i.imgur.com/YHMJnnP.png
Tenet joined President-elect Bill Clinton's national security transition team in November 1992. Clinton appointed Tenet Senior Director for Intelligence Programs at the National Security Council, where he served from 1993 to 1995. Tenet was appointed Deputy Director of Central Intelligence in July 1995. Tenet held the position as the DCI from July 1997 to July 2004. Citing "personal reasons," Tenet submitted his resignation to President Bush on June 3, 2004. Tenet said his resignation "was a personal decision and had only one basis—in fact, the well-being of my wonderful family—nothing more and nothing less. In February 2008, he became a managing director at investment bank Allen & Company.
https://i.imgur.com/JnGHqOS.png
We have the documentation that demonstrates what these people could possibly be doing with all of these tools of manipulation at their fingertips.
The term for it is “covert political action” for which all media put before your eyes is used to serve as a veneer… a reality TV show facade of a darker modus operandum.
https://i.imgur.com/vZC4D29.png
https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol36no3/html/v36i3a05p_0001.htm
It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever costs. There are no rules in such a game. Hitherto acceptable norms of human conduct do not apply. If the US is to survive, longstanding American concepts of "fair play" must be reconsidered. We must develop effective espionage and counterespionage services and must learn to subvert, sabotage and destroy our enemies by more clever, more sophisticated means than those used against us. It may become necessary that the American people be made acquainted with, understand and support this fundamentally repugnant philosophy.
http://www.nbcnews.com/id/3340677/t/cia-operatives-shadowy-war-force/
Intelligence historian Jeffrey T. Richelson says the S.A. has covered a variety of missions. The group, which recently was reorganized, has had about 200 officers, divided among several groups: the Special Operations Group; the Foreign Training Group, which trains foreign police and intelligence officers; the Propaganda and Political Action Group, which handles disinformation; the Computer Operations Group, which handles information warfare; and the Proprietary Management Staff, which manages whatever companies the CIA sets up as covers for the S.A.
Scientology as a CIA Political Action Group – “It is a continuing arrangement…”: https://mikemcclaughry.wordpress.com/2015/08/25/scientology-as-a-cia-political-action-group-it-is-a-continuing-arrangement/
…Those operations we inaugurated in the years 1955-7 are still secret, but, for present purposes, I can say all that’s worth saying about them in a few sentences – after, that is, I offer these few words of wisdom. The ‘perfect’ political action operation is, by definition, uneventful. Nothing ‘happens’ in it. It is a continuing arrangement, neither a process nor a series of actions proceeding at a starting point and ending with a conclusion.
CIA FBI NSA Personnel Active in Scientology: https://i.imgur.com/acu2Eti.png
When you consider the number of forces that can be contained within a single “political action group” in the form on a “boutique investment firm,” where all sides of political arguments are predetermined by a selected group of actors who have been planted, compromised or leveraged in some way in order to control the way they spin their message.
https://i.imgur.com/tU4MD4S.png
The evidence of this coordinated effort is overwhelming and the “consensus” that you see on TV, in sports, in Hollywood, in the news and on the Internet is fabricated.
Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.'
Thus the uninformed reader will most likely develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'
When you find yourself feeling like common sense and common courtesy aren’t as common as they ought to be, it is because there is a massive psychological operation controlled from the top down to ensure that as many people as possible are caught in a “tension based” mental loop that is inflicted on them by people acting with purpose to achieve goals that are not in the interest of the general population, but a method of operating in secret and corrupt manner without consequences.
Notice that Jeffrey Katzenberg, of Disney, who is intertwined with Allen & Co funds the Young Turks. He is the perfect example of the relationship between media and politics.
Katzenberg has also been involved in politics. With his active support of Hillary Clinton and Barack Obama, he was called "one of Hollywood's premier political kingmakers and one of the Democratic Party's top national fundraisers."
With cash from Jeffrey Katzenberg, The Young Turks looks to grow paid subscribers:
https://digiday.com/media/with-cash-from-katzenberg-the-young-turks-look-to-grow-paid-subscribers/
Last week, former DreamWorks Animation CEO Jeffrey Katzenberg’s new mobile entertainment company WndrCo was part of a $20 million funding round in TYT Network, which oversees 30 news and commentary shows covering politics, pop culture, sports and more. This includes the flagship “The Young Turks” program that streams live on YouTube every day. Other investors in the round included venture capital firms Greycroft Partners, E.ventures and 3L Capital, which led the round. This brings total funding for Young Turks to $24 million.
How Hollywood's Political Donors Are Changing Strategies for the Trump Era:
https://www.hollywoodreporter.com/features/hollywood-political-donors-are-changing-strategy-post-trump-1150545
Hollywood activism long has been depicted as a club controlled by a handful of powerful white men: Katzenberg, Spielberg, Lear, David Geffen, Haim Saban and Bob Iger are the names most often mentioned. But a new generation of power brokers is ascendant, including J.J. Abrams and his wife, Katie McGrath, cited for their personal donations and bundling skills; Shonda Rhimes, who held a get-out-the-vote rally at USC's Galen Center on Sept. 28 that drew 10,000 people; CAA's Darnell Strom, who has hosted events for Nevada congresswoman Jacky Rosen and Arizona congresswoman Kyrsten Sinema; and former Spotify executive Troy Carter, who held three fundraisers for Maryland gubernatorial candidate Ben Jealous (Carter also was a fundraiser for President Obama).
Soros Group Buys Viacom's DreamWorks Film Library:
https://www.forbes.com/2006/03/17/soros-viacom-dreamworks-cx_gl_0317autofacescan11.html#541a895f1f22
Viacom, after splitting off from Les Moonves Les Moonves ' CBS , still holds Paramount Pictures, and that movie studio in December agreed to acquire DreamWorks SKG, the creative shop founded by the Hollywood triumvirate of Steven Spielberg, David Geffen and Jeffrey Katzenberg (a former exec at The Walt Disney Co.). DreamWorks Animation had been spun off into a separate company.
Now it's time for Freston to make back some money--and who better to do a little business with than George Soros? The billionaire financier leads a consortium of Soros Strategic Partners LP and Dune Entertainment II LLC, which together are buying the DreamWorks library--a collection of 59 flicks, including Saving Private Ryan, Gladiator, and American Beauty.
The money you spend on media and junk food and in taxes goes to these groups who then decide how best to market at you so that they decide how you vote by creating a fake consensus to trick into thinking that you want something other than what is best for you; but will inevitably result in more money being funneled to the top, creating further separation between the super rich and the average person. The goal will be to assert creeping authoritarianism by generating outrage against policies and issues they hate. Part of manipulating your basic assumptions is also to use schadenfreude (think canned laughter on TV) against characters who support the cause that might actually do you the most good (which reaffirms and strengthens your confirmation biased along predetermined political lines).
https://i.imgur.com/PW1cRtj.png
We have a population being taught to hate socialism and love capitalism when the truth is no country is practicing either. These terms are merely disguises for political oligarchies where the collection of wealth is less about getting themselves rich and more about keeping everyone else poor.
What can you guess about the world around you if it turned out that every consensus that was forced on you was fake?
How much money would it take to make it look like 51% of the Internet believed in completely idiotic ideas? Combine shill operations with automation and AI’s, and the cost becomes a good investment relative to the return when measured in political power.
Even the people who are well intentioned and very vocal do not have to consciously be aware that they are working for a political action group. A covert political group will always prefer an unwitting tool to help push their agenda, so that they can remain in the shadows.
FDA Admonishes Drug Maker Over Kim Kardashian Instagram Endorsement https://www.forbes.com/sites/davidkroll/2015/08/11/fda-spanks-drug-maker-over-kim-kardashian-instagram-endorsement/#25174a29587b
The OSS files offer details about other agents than famous chef, Julia Child; including Supreme Court Justice Arthur Goldberg, major league catcher Moe Berg, historian Arthur Schlesinger Jr., and actor Sterling Hayden. http://www.nbcnews.com/id/26186498/ns/us_news-security/t/julia-child-cooked-double-life-spy/
USA Today: Businesses and organizations may refer to it as a tool for competitive advantage and marketing; but make no mistake http://archive.is/37tK3
Shareblue accounts caught in /politics posting links to Shareblue without disclosing their affiliation http://archive.is/7HAkr
Psy Group developed elaborate information operations for commercial clients and political candidates around the world http://archive.is/BBblQ
Top mod of /Mechanical_Gifs tries to sell subreddit on ebay for 999.00 dollars. http://archive.is/kU1Ly
Shill posts picture of a dog in a hammock with the brand clearly visible without indicating that it's an ad in the title of the post http://archive.is/Mfdk9
Arstechnica: GCHQs menu of tools spreads disinformation across Internet- “Effects capabilities” allow analysts to twist truth subtly or spam relentlessly. http://arstechnica.com/security/2014/07/ghcqs-chinese-menu-of-tools-spread-disinformation-across-internet/
Samsung Electronics Fined for Fake Online Comments http://bits.blogs.nytimes.com/2013/10/24/samsung-electronics-fined-for-fake-online-comments/?_r=0
Discover Magazine: Researchers Uncover Twitter Bot Army That’s 350 http://blogs.discovermagazine.com/d-brief/2017/01/20/twitter-bot-army/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A%20DiscoverTechnology%20%28Discover%20Technology%29#.WIMl-oiLTnA
Times of Israel - The internet: Israel’s new PR battlefield http://blogs.timesofisrael.com/the-rise-of-digital-diplomacy-could-be-changing-israels-media-image/
Time: Social Media Manipulation? When “Indie” Bloggers and Businesses Get Cozy http://business.time.com/2013/04/22/social-media-manipulation-when-indie-bloggers-and-businesses-get-cozy/
Content-Driven Detection of Campaigns in Social Media [PDF] http://faculty.cs.tamu.edu/caverlee/pubs/lee11cikm.pdf
the law preventing them from using this in America was repealed http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/
Redditor who works for a potato mailing company admits to being a shill. He shows off his 27 thousand dollars he made in /pics
http://i.imgur.com/CcTHwdS.png
Screenshot of post since it was removed. http://i.imgur.com/k9g0WF8.png
Just thought I'd contribute to this thread http://imgur.com/OpSos4u
CNN: A PR firm has revealed that it is behind two blogs that previously appeared to be created by independent supporters of Wal-Mart. The blogs Working Families for Wal-mart and subsidiary site Paid Critics are written by 3 employees of PR firm Edelman http://money.cnn.com/2006/10/20/news/companies/walmart_blogs/index.htm
Vice: Your Government Wants to Militarize Social Media to Influence Your Beliefs http://motherboard.vice.com/read/your-government-wants-to-militarize-social-media-to-influence-your-beliefs
BBC News: China's Internet spin doctors http://news.bbc.co.uk/2/hi/7783640.stm
BBC News: US plans to 'fight the net' revealed http://news.bbc.co.uk/2/hi/americas/4655196.stm
Wall Street Journal: Turkey's Government Forms 6 http://online.wsj.com/news/articles/SB10001424127887323527004579079151479634742?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424127887323527004579079151479634742.html
Fake product reviews may be pervasive http://phys.org/news/2013-07-fake-product-pervasive.html#nRlv
USA Today: The co-owner of a major Pentagon propaganda contractor publicly admitted that he was behind a series of websites used in an attempt to discredit two USA TODAY journalists who had reported on the contractor. http://usatoday30.usatoday.com/news/military/story/2012-05-24/Leonie-usa-today-propaganda-pentagon/55190450/1
ADWEEK: Marketing on Reddit Is Scary http://www.adweek.com/news/technology/marketing-reddit-scary-these-success-stories-show-big-potential-168278
BBC- How online chatbots are already tricking you- Intelligent machines that can pass for humans have long been dreamed of http://www.bbc.com/future/story/20140609-how-online-bots-are-tricking-you
BBC news: Amazon targets 1 http://www.bbc.com/news/technology-34565631
BBC: More than four times as many tweets were made by automated accounts in favour of Donald Trump around the first US presidential debate as by those backing Hillary Clinton http://www.bbc.com/news/technology-37684418
Fake five-star reviews being bought and sold online - Fake online reviews are being openly traded on the internet
http://www.bbc.com/news/technology-43907695
http://www.bbc.com/news/world-asia-20982985
http://www.bbc.com/news/world-asia-20982985
Bloomberg: How to Hack an Election [and influence voters with fake social media accounts] http://www.bloomberg.com/features/2016-how-to-hack-an-election/
"Internet Reputation Management http://www.bloomberg.com/news/articles/2008-04-30/do-reputation-management-services-work-businessweek-business-news-stock-market-and-financial-advice
Buzzfeed: Documents Show How Russia’s Troll Army Hit America http://www.buzzfeed.com/maxseddon/documents-show-how-russias-troll-army-hit-america#.ki8Mz97ly
The Rise of Social Bots http://www.cacm.acm.org/magazines/2016/7/204021-the-rise-of-social-bots/fulltext
CBC News- Canadian government monitors online forums http://www.cbc.ca/news/canada/bureaucrats-monitor-online-forums-1.906351
Chicago Tribune: Nutrition for sale: How Kellogg worked with 'independent experts' to tout cereal http://www.chicagotribune.com/business/ct-kellogg-independent-experts-cereal-20161121-story.html
DailyKos: HBGary: Automated social media management http://www.dailykos.com/story/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All
Meme Warfare Center http://www.dtic.mil/dtic/tfulltext/u2/a507172.pdf
Shilling on Reddit is openly admitted to in this Forbes article http://www.forbes.com/sites/julesschroede2016/03/10/the-magic-formula-behind-going-viral-on-reddit/#1d2485b05271
Forbes: From Tinder Bots To 'Cuban Twitter' http://www.forbes.com/sites/kashmirhill/2014/04/17/from-tinder-bots-to-covert-social-networks-welcome-to-cognitive-hacking/#4b78e2d92a7d
Hivemind http://www.hivemind.cc/rank/shills
Huffington Post- Exposing Cyber Shills and Social Media's Underworld http://www.huffingtonpost.com/sam-fiorella/cyber-shills_b_2803801.html
The Independent: Massive British PR firm caught on video: "We've got all sorts of dark arts...The ambition is to drown that negative content and make sure that you have positive content online." They discuss techniques for managing reputations online and creating/maintaining 3rd-party blogs that seem independent. http://www.independent.co.uk/news/uk/politics/caught-on-camera-top-lobbyists-boasting-how-they-influence-the-pm-6272760.html
New York Times: Lifestyle Lift http://www.nytimes.com/2009/07/15/technology/internet/15lift.html?_r=1&emc=eta1
New York Times: Give Yourself 5 Stars? Online http://www.nytimes.com/2013/09/23/technology/give-yourself-4-stars-online-it-might-cost-you.html?src=me&ref=general
NY Times- From a nondescript office building in St. Petersburg http://www.nytimes.com/2015/06/07/magazine/the-agency.html?_r=1
NY Times: Effort to Expose Russia’s ‘Troll Army’ Draws Vicious Retaliation http://www.nytimes.com/2016/05/31/world/europe/russia-finland-nato-trolls.html?_r=1
PBS Frontline Documentary - Generation Like http://www.pbs.org/wgbh/frontline/film/generation-like/
Gamers promote gaming-gambling site on youtube by pretending to hit jackpot without disclosing that they own the site. They tried to retroactively write a disclosure covering their tracks http://www.pcgamer.com/csgo-lotto-investigation-uncovers-colossal-conflict-of-interest/
Raw Story: CENTCOM engages bloggers http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html
Raw Story: Air Force ordered software to manage army of fake virtual people http://www.rawstory.com/rs/2011/02/18/revealed-air-force-ordered-software-to-manage-army-of-fake-virtual-people/
Redective http://www.redective.com/?r=e&a=search&s=subreddit&t=redective&q=shills
Salon: Why Reddit moderators are censoring Glenn Greenwald’s latest news story on shills http://www.salon.com/2014/02/28/why_reddit_moderators_are_censoring_glenn_greenwalds_latest_bombshell_partne
The Atlantic: Kim Kardashian was paid to post a selfie on Instagram and Twitter advertising a pharmaceutical product. Sent to 42 million followers on Instagram and 32 million on Twitter http://www.theatlantic.com/health/archive/2015/09/fda-drug-promotion-social-media/404563/
WAR.COM: THE INTERNET AND PSYCHOLOGICAL OPERATIONS http://www.theblackvault.com/documents/ADA389269.pdf
The Guardian: Internet Astroturfing http://www.theguardian.com/commentisfree/libertycentral/2010/dec/13/astroturf-libertarians-internet-democracy
The Guardian: Israel ups the stakes in the propaganda war http://www.theguardian.com/media/2006/nov/20/mondaymediasection.israel
Operation Earnest Voice http://www.theguardian.com/technology/2011/ma17/us-spy-operation-social-networks
The Guardian: British army creates team of Facebook warriors http://www.theguardian.com/uk-news/2015/jan/31/british-army-facebook-warriors-77th-brigade
The Guardian: US military studied how to influence Twitter [and Reddit] users in Darpa-funded research [2014] http://www.theguardian.com/world/2014/jul/08/darpa-social-networks-research-twitter-influence-studies
The Guardian: Chinese officials flood the Chinese internet with positive social media posts to distract their population http://www.theguardian.com/world/2016/may/20/chinese-officials-create-488m-social-media-posts-a-year-study-finds
Times of Israel: Israeli government paying bilingual students to spread propaganda online primarily to international communities without having to identify themselves as working for the government. "The [student] union will operate computer rooms for the project...it was decided to establish a permanent structure of activity on the Internet through the students at academic institutions in the country." http://www.timesofisrael.com/pmo-stealthily-recruiting-students-for-online-advocacy/
USA Today: Lord & Taylor settles FTC charges over paid Instagram posts http://www.usatoday.com/story/money/2016/03/15/lord--taylor-settles-ftc-charges-over-paid-instagram-posts/81801972/
Researcher's algorithm weeds out people using multiple online accounts to spread propaganda - Based on word choice http://www.utsa.edu/today/2016/10/astroturfing.html
http://www.webinknow.com/2008/12/the-us-air-force-armed-with-social-media.html
Wired: Powered by rapid advances in artificial intelligence http://www.wired.co.uk/magazine/archive/2015/06/wired-world-2015/robot-propaganda
Wired: Clinton Staff and Volunteers Busted for Astroturfing [in 2007] http://www.wired.com/2007/12/clinton-staff-a/
Wired: Pro-Government Twitter Bots Try to Hush Mexican Activists http://www.wired.com/2015/08/pro-government-twitter-bots-try-hush-mexican-activists/
Wired: Microsoft http://www.wired.com/2015/09/ftc-machinima-microsoft-youtube/
Wired: Military Report: Secretly ‘Recruit or Hire Bloggers’ http://www.wired.com/dangerroom/2008/03/report-recruit/
Wired: Air Force Releases ‘Counter-Blog’ Marching Orders http://www.wired.com/dangerroom/2009/01/usaf-blog-respo/
Reddit Secrets https://archive.fo/NAwBx
Reddit Secrets https://archive.fo/SCWN7
Boostupvotes.com https://archive.fo/WdbYQ
"Once we isolate key people https://archive.is/PoUMo
GCHQ has their own internet shilling program https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group
Russia https://en.wikipedia.org/wiki/State-sponsored_Internet_sockpuppetry
US also operates in conjunction with the UK to collect and share intelligence data https://en.wikipedia.org/wiki/UKUSA_Agreement
Glenn Greenwald: How Covert Agents Infiltrate the Internet to Manipulate https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
Glenn Greenwald: Hacking Online Polls and Other Ways British Spies Seek to Control the Internet https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/
Here is a direct link to your image for the benefit of mobile users https://imgur.com/OpSos4u.jpg
Reddit for iPhone https://itunes.apple.com/us/app/reddit-the-official-app/id1064216828?mt=8
Why Satoshi Nakamoto Has Gone https://medium.com/@ducktatosatoshi-nakamoto-has-gone-4cef923d7acd
What I learned selling my Reddit accounts https://medium.com/@Rob79/what-i-learned-selling-my-reddit-accounts-c5e9f6348005#.u5zt0mti3
Artificial intelligence chatbots will overwhelm human speech online; the rise of MADCOMs https://medium.com/artificial-intelligence-policy-laws-and-ethics/artificial-intelligence-chatbots-will-overwhelm-human-speech-online-the-rise-of-madcoms-e007818f31a1
How Reddit Got Huge: Tons of Fake Accounts - According to Reddit cofounder Steve Huffman https://motherboard.vice.com/en_us/article/how-reddit-got-huge-tons-of-fake-accounts--2
Whistleblower and subsequent investigation: Paid trolls on /Bitcoin https://np.reddit.com/Bitcoin/comments/34m7yn/professional_bitcoin_trolls_exist/cqwjdlw
Confession of Hillary Shill from /SandersForPresident https://np.reddit.com/conspiracy/comments/3rncq9/confession_of_hillary_shill_from/
Why do I exist? https://np.reddit.com/DirectImageLinkerBot/wiki/index
Already a direct link? https://np.reddit.com/DirectImageLinkerBot/wiki/res_links
Here's the thread. https://np.reddit.com/HailCorporate/comments/3gl8zi/that_potato_mailing_company_is_at_it_again/
/netsec talks about gaming reddit via sockpuppets and how online discourse is (easily) manipulated. https://np.reddit.com/netsec/comments/38wl43/we_used_sock_puppets_in_rnetsec_last_year_and_are
Redditor comes clean about being paid to chat on Reddit. They work to promote a politician https://np.reddit.com/offmychest/comments/3gk56y/i_get_paid_to_chat_on_reddit/
Shill whistleblower https://np.reddit.com/politics/comments/rtr6b/a_very_interesting_insight_into_how_certain/
Russian bots were active on Reddit last year https://np.reddit.com/RussiaLago/comments/76cq4d/exclusive_we_can_now_definitively_state_that/?st=j8s7535j&sh=36805d5d
The Bush and Gore campaigns of 2000 used methods similar to the Chinese government for conducting “guided discussions” in chatrooms designed to influence citizens https://np.reddit.com/shills/comments/3xhoq8/til_the_advent_of_social_media_offers_new_routes/?st=j0o5xr9c&sh=3662f0dc
source paper. https://np.reddit.com/shills/comments/4d3l3s/government_agents_and_their_allies_might_ente
or Click Here. https://np.reddit.com/shills/comments/4kdq7n/astroturfing_information_megathread_revision_8/?st=iwlbcoon&sh=9e44591e Alleged paid shill leaks details of organization and actions.
https://np.reddit.com/shills/comments/4wl19alleged_paid_shill_leaks_details_of_organization/?st=irktcssh&sh=8713f4be
Shill Confessions and Additional Information https://np.reddit.com/shills/comments/5pzcnx/shill_confessions_and_additional_information/?st=izz0ga8r&sh=43621acd
Corporate and governmental manipulation of Wikipedia articles https://np.reddit.com/shills/comments/5sb7pi/new_york_times_corporate_editing_of_wikipedia/?st=iyteny9b&sh=b488263f
Ex -MMA fighter and ex-police officer exposes corrupt police practices https://np.reddit.com/shills/comments/6jn27s/ex_mma_fighter_and_expolice_officer_exposes/
User pushes InfoWars links on Reddit https://np.reddit.com/shills/comments/6uau99/chemicals_in_reddit_are_turning_memes_gay_take/?st=j6r0g2om&sh=96f3dbf4
Some websites use shill accounts to spam their competitor's articles https://np.reddit.com/TheoryOfReddit/comments/1ja4nf/lets_talk_about_those_playing_reddit_with/?st=iunay35w&sh=d841095d
User posts video using GoPro https://np.reddit.com/videos/comments/2ejpbb/yes_it_is_true_i_boiled_my_gopro_to_get_you_this/ck0btnb/?context=3&st=j0qt0xnf&sh=ef13ba81
Fracking shill whistleblower spills the beans on Fracking Internet PR https://np.reddit.com/worldnews/comments/31wo57/the_chevron_tapes_video_shows_oil_giant_allegedly/cq5uhse?context=3
https://i.imgur.com/Q3gjFg9.jpg
https://i.imgur.com/q2uFIV0.jpg
TOP SECRET SPECIAL HANDLING NOFORN
CENTRAL INTELLIGENCE AGENCY
Directorate of Operations
October 16, 1964
MEMORANDUM FOR THE DIRECTOR OF THE CIA
Subject: After action report of
Operation CUCKOO (TS)
INTRODUCTION

1) Operation CUCKOO was part of the overall operation CLEANSWEEP, aimed at eliminating domestic opposition to activities undertaken by the Central Intelligence Agency's special activities division, in main regard to operation GUILLOTINE.

2) Operation CUCKOO was approved by the Joint Chiefs of Staff, Department of Defense and the office of The President of the United States as a covert domestic action to be under taken within the limits of Washington D.C as outlined by Secret Executive Order 37.

3) Following the publishing of the Warren Commission, former special agent Mary Pinchot Meyer (Operation MOCKINGBIRD, Operation SIREN) also was married to Cord Meyer (Operation MOCKINGBIRD, Operation GUILLOTINE) threatened to disclose the details of several Special Activities Divisions' operations, including but not limited to, Operation SIREN and GUILLOTENE.
​1
TOP SECRET SPECIAL HANDLING NOFORN
4) It was deemed necessary by senior Directorate of Operations members to initiate Operation CUCKOO as an extension of Operation CLEANSWEEP on November 30th. After Mary Pinchot Meyer threatened to report her knowledge of Operation GUILLOTENE and the details of her work in Operation SIREN from her affair with the former President.

5) Special Activities Division was given the green light after briefing president Johnson on the situation. The situation report was forwarded to the Department of Defense and the Joint Chiefs of staff, who both approved of the parameters of the operation, as outlined under article C of secret executive order 37 (see attached copy of article).
​PLANNING STAGES
6) 8 members of the special activities division handpicked by operation lead William King Harvey began planning for the operation on October 3rd, with planned execution before October 16th.

7) The (?) of the operation was set as the neighborhood of Georgetown along the Potomac river, where the operators would observe, take note on routines, and eventually carry the operation.

8) After nothing Meyer's routines, Edward "Eddy" Reid was picked as the operation point man who would intersect Meyer on her walk on October 12th, with lead William King Harvey providing long range support if necessary from across the Chesapeake and Ohio canal (see illustration A for detailed map).

9) Edward Reid was planned to be dressed in the manner of a homeless black man, due to his resemblances to local trash collector (later found out to be Raymond Crump) who inhabits the AO and the path that Reid was planned to intersect Meyer.
2
TOP SECRET SPECIAL HANDLING NOFORN
submitted by The_Web_Of_Slime to Intelligence [link] [comments]

Federal Reserve cuts rates to zero and launches massive $700 billion quantitative easing program

This is the best tl;dr I could make, original reduced by 49%. (I'm a bot)
Facing highly disrupted financial markets, the Fed also slashed the rate of emergency lending at the discount window for banks by 125 bps to 0.25%, and lengthened the term of loans to 90 days.
The new fed funds rate, used as a benchmark both for short-term lending for financial institutions and as a peg to many consume rates, will now be targeted at 0%-0.25%. The Fed also cut reserve requirement ratios for thousands of banks to zero.
In a global coordinated move by centrals banks, the Fed said the Bank of Canada, the Bank of England, the Bank of Japan, the European Central Bank, the Federal Reserve, and the Swiss National Bank took action to enhance dollar liquidity around the world through existing dollar swap arrangements.
The Fed cut rates from the previous target range of 1% to 1.25% and said it would remain there "Until it is confident that the economy has weathered recent events and is on track to achieve its maximum employment and price stability goals."
Cleveland Fed President Loretta Mester was the lone no vote, preferring to set rates at 0.5% to 0.75%, which would have represented a 50 basis point, of half percentage point, reduction.
The move follows several actions by the Fed over the past two weeks in which it enacted a 50 basis point emergency rate cut and expanded the overnight credit offering, or repo, for the financial system up to $1.5 trillion.
Summary Source | FAQ | Feedback | Top keywords: Fed#1 Bank#2 rate#3 cut#4 financial#5
Post found in /news, /Economics, /politics, /AusFinance, /Bitcoin, /politics, /Coronavirus, /wallstreetbets, /WallStreetRejects, /worldnews, /finance, /neoliberal, /economicCollapse, /options, /moderatepolitics, /politics, /The_Bogdanoff, /worldnews, /pics, /Economics, /u_KeyPractice, /SandersForPresident, /TheNewsFeed, /Gold, /DrainTheSwamp, /NBCauto, /POLITIC, /WallStreetRejects, /options, /coronavirusNYC, /objectiveEconomics, /WallStreetRejects, /worldpolitics, /economicCollapse and /wallstreetbets.
NOTICE: This thread is for discussing the submission topic. Please do not discuss the concept of the autotldr bot here.
submitted by autotldr to autotldr [link] [comments]

06-13 08:05 - 'We aren't finished with the first topic. Let's be also be clear that you brought up Hillary's emails, not me. My first point is that just because she lost the presidential election, does not mean that she is exonerated f...' by /u/fractaleyes_ removed from /r/Bitcoin within 631-641min

'''
We aren't finished with the first topic. Let's be also be clear that you brought up Hillary's emails, not me. My first point is that just because she lost the presidential election, does not mean that she is exonerated from all previous crimes. That is pure lunacy.

> You understand there was an extensive investigation where she sat in front of congress for two days answering questions, right?
Isn't that the whole premise of this conversation here? Hillary had a private server for e-mail communication, destroyed devices and used bleachbit in an attempt to cover up evidence and mishandled classified information. Are you OK with that? I also recall the FBI not holding Hillary under oath during the interrogation. I remember Loretta Lynch meeting Bill Clinton on a tarmac days before the conclusion. I remember that James Comey said Hillary's e-mail practices were "extremely careless" although he considered using "gross negligence" and later admitted that he made "mistakes" in the way he described her actions.

> What sort of precedent are you trying to set here?
That politicians are held to the same level of accountability as you and me. Not really unreasonable, but I would love to hear why you think that is wrong.
'''
Context Link
Go1dfish undelete link
unreddit undelete link
Author: fractaleyes_
submitted by removalbot to removalbot [link] [comments]

Latest scam well thought out but still full of holes. Email inside

Lets get straight to point. I know *********** is your passphrase. No-one has compensated me to investigate you. You don't know me and you're probably thinking why you are getting this email? Quinton Thaddius Larry Josh Nicole Cassandra Paul Ron Nicole Kevin Well, I actually installed a malware on the xxx vids (porn material) site and you know what, you visited this web site to experience fun (you know what I mean). When you were watching video clips, your web browser began operating as a Remote Desktop with a keylogger which gave me access to your display and web cam. after that, my software gathered your complete contacts from your Messenger, social networks, and email . After that I made a video. First part shows the video you were watching (you've got a nice taste rofl), and next part displays the view of your web cam, yea its u. Allison Jennifer Randy George Gabriel Curt Maria Miranda Bob Bill You get just two choices. Let us review each one of these possibilities in aspects: Nick Colby Rebecca Eurekus Susan Christopher Mandy Connie Chelsea Kyle Very first solution is to ignore this email message. In this instance, I will send out your actual video recording to all of your personal contacts and you can easily imagine concerning the embarrassment you will definitely get. In addition in case you are in a romance, how it will affect? Donald Kristina Mandy Krisitna Connie Dwayne Timothy Angela Nick William Second option is to give me $2000. We are going to refer to it as a donation. As a consequence, I most certainly will quickly eliminate your video recording. You could keep going your way of life like this never occurred and you will never hear back again from me. James Anthonyj Sheila Phil Damian Cale Kayla Marshall Nicholas Cats You'll make the payment through Bitcoin (if you don't know this, search "how to buy bitcoin" in Google). Alba Lisa Alberto Wamda Trey Lawrence Lauren Dilenia Benjamin Kendra BTC Address: 1GVGJb9SPFvK7MW6riVroU7EB4cr8Giibu Tim Mark Zachery Mary Laura Jose Amber Damion Kylene Kendrick [case-SENSITIVE copy and paste it] Eric Jenifer Mike Billy Bryan Flor Angela Rick Loretta Linda In case you are thinking of going to the cops, good, this message can not be traced back to me. I have dealt with my moves. I am not trying to ask you for money a whole lot, I would like to be paid for. You have one day to pay. I've a specific pixel in this email message, and now I know that you have read through this message. If I do not get the BitCoins, I will, no doubt send out your video to all of your contacts including family members, colleagues, etc. However, if I do get paid, I will erase the recording immidiately. If you want to have proof, reply Yes! & I definitely will send out your video to your 12 contacts. It's a nonnegotiable offer that being said don't waste my personal time and yours by responding to this message. Suyapa Rosa Ramona Sharon Julius Michael Anthony Suzie Natalie Monica Erin Delia Deborah Terry Emily Jamal Tyrone Lani Juan Shey Stephanie Nate Cb Patrick Brad Larenzo Christina Allison Danny Nicole Miles Dina Joe Nicole Meme Trisha Toby Scarlett Jono Allison Patty Jackelyn Ryan Gabriel Alberto Michael Cosean Andria Rosa Ryan Dawn Leslie Alencia Rayven Chris Zach Julie-dee Ugigy Brandon Anthony Brandy John Logan Michelle Prabhu Gigi Michael Christopher Tammy Agnieszka Jake Jose Cindy Vlad Lekisha Susan Bajha Jay Scott Lisap Sue Alinne BILL Don Holly Brenton Angel Marco Terry Brianna
submitted by spoonyone87 to Scams [link] [comments]

A Russian intelligence agency, after hacking NSA servers and stealing espionage tools and exploits, posts on reddit to expose the hack and get attention.

The Russian intelligence agency team calls itself The Shadow Brokers and has evidently hacked NSA's Equation Group staging servers and stolen some exploits and espionage tools in 2013. Now they want attention.
Background
Authenticity of the leaks:
2 months back, The Shadow Brokers claimed to have hacked the Equation Group and set up an auction for the stolen package for about a million dollars in bitcoins (this was misreported everywhere as 1 million bitcoins). They posted in a now deleted tumblr page (retrieved from archive.org, note the PGP keys) and twitter releasing a few files for free to confirm the authenticity, and they've been confirmed as authentic.
On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.
The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.
SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware.
SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.
Links to a Russian intelligence agency:
The only source for the links is Snowden and he makes a compelling claim. Shortly after the initial leaks were confirmed to be authentic, Snowden tweeted out the links between The Shadow Brokers and Russian intelligenceand was reported extensively elsewhere.
"Why did they do it?" Snowden asked. "No one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the DNC hack."
The hackers could be advertising that they have the ability to identify actions the NSA took on the compromised server, Snowden suggests — a warning of sorts.
Snowden also noted that the released files end in 2013. "When I came forward, NSA would have migrated offensive operations to new servers as a precaution," he suggested — a move that would have cut off the hackers' access to the server.
As for who is responsible for acquiring and leaking the code on the Shadow Brokers' site, Snowden says "circumstantial evidence and conventional wisdom" suggest Russia.
King's College London cybersecurity expert Thomas Rid tells NPR's Mary Louise Kelly the same thing. There's no hard proof, he says, but the capabilities required and the timing of the release suggest Russia. That's all circumstantial, but "more than speculation," as he puts it.
Reddit activity
2 months ago, about the time the initial leaks started, someone registered the Reddit account theshadowbrokers and have been trying to get the word out about the leaks on reddit. I'll get this out of the way now, there's absolutely no proof that this is a troll account. Everything they've posted is about them trying to get attention to the fact that they've hacked the NSA and that they have the state-sponsored-level espionage tools that has been verified by reliable sources and people in the know. The timings of the leaks match with the posting times so far for the purpose of this post.
The language they use is off in many ways and is explainable by people in the know using deliberately misleading language to obfuscate and shield themselves against advanced natural language processing and stylometry tools that state sponsored intelligence agencies use to identify people based on their writing style.
The account posted on databreaches, hacking and bitcoin linking to imgur, a now deleted pastebin (retrieved from archive.org) and a github link with the leaked free sample files ( retrieved from archive.org).
About a month ago, in their Message #3, The Shadow Brokers posted a self-AMA of sorts clarifying misunderstandings and what they really want. Among them was the explanation for the ridiculous misrepresentation of their demand of a million dollars in bitcoins to a million bitcoins, among others. The users seemed more receptive this time and asked for more proof, demos and escrow for the bitcoin demands.
Between leaks and 19 days ago, they posted the "Bill Clinton / Lorretta Lynch Airplane Conversation leaks", which is a "sexually explicit fanfic of Bill Clinton and US Attorney General Loretta Lynch" in /darknetmarkets. It is worth a read tbh.
Now, for halloween, they've released more files to spook the NSA. The latest leaks were posted on darknetmarkets like before, but with only 3 replies, by possible RC and oxycodone addicts looking for darknet deals to score their next fix, to something that has huge implications for the US intelligence community. This post didn't go unnoticed however, it was picked up by mainstream sites -- Hacker collective The Shadow Brokers strike again with more NSA leaks.
submitted by flipkt to Intelligence [link] [comments]

A Russian intelligence agency, after hacking NSA servers and stealing espionage tools and exploits, posts on reddit to expose the hack and get attention.

The Russian intelligence agency team calls itself The Shadow Brokers and has evidently hacked NSA's Equation Group staging servers and stolen some exploits and espionage tools in 2013. Now they want attention.
Background
Authenticity of the leaks:
2 months back, The Shadow Brokers claimed to have hacked the Equation Group and set up an auction for the stolen package for about a million dollars in bitcoins (this was misreported everywhere as 1 million bitcoins). They posted in a now deleted tumblr page (retrieved from archive.org, note the PGP keys) and twitter releasing a few files for free to confirm the authenticity, and they've been confirmed as authentic.
On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.
The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.
SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware.
SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.
Links to a Russian intelligence agency:
The only source for the links is Snowden and he makes a compelling claim. Shortly after the initial leaks were confirmed to be authentic, Snowden tweeted out the links between The Shadow Brokers and Russian intelligenceand was reported extensively elsewhere.
"Why did they do it?" Snowden asked. "No one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the DNC hack."
The hackers could be advertising that they have the ability to identify actions the NSA took on the compromised server, Snowden suggests — a warning of sorts.
Snowden also noted that the released files end in 2013. "When I came forward, NSA would have migrated offensive operations to new servers as a precaution," he suggested — a move that would have cut off the hackers' access to the server.
As for who is responsible for acquiring and leaking the code on the Shadow Brokers' site, Snowden says "circumstantial evidence and conventional wisdom" suggest Russia.
King's College London cybersecurity expert Thomas Rid tells NPR's Mary Louise Kelly the same thing. There's no hard proof, he says, but the capabilities required and the timing of the release suggest Russia. That's all circumstantial, but "more than speculation," as he puts it.
Reddit activity
2 months ago, about the time the initial leaks started, someone registered the Reddit account theshadowbrokers and have been trying to get the word out about the leaks on reddit. I'll get this out of the way now, there's absolutely no proof that this is a troll account. Everything they've posted is about them trying to get attention to the fact that they've hacked the NSA and that they have the state-sponsored-level espionage tools that has been verified by reliable sources and people in the know. The timings of the leaks match with the posting times so far for the purpose of this post.
The language they use is off in many ways and is explainable by people in the know using deliberately misleading language to obfuscate and shield themselves against advanced natural language processing and stylometry tools that state sponsored intelligence agencies use to identify people based on their writing style.
The account posted on databreaches, hacking and bitcoin linking to imgur, a now deleted pastebin (retrieved from archive.org) and a github link with the leaked free sample files ( retrieved from archive.org).
About a month ago, in their Message #3, The Shadow Brokers posted a self-AMA of sorts clarifying misunderstandings and what they really want. Among them was the explanation for the ridiculous misrepresentation of their demand of a million dollars in bitcoins to a million bitcoins, among others. The users seemed more receptive this time and asked for more proof, demos and escrow for the bitcoin demands.
Between leaks and 19 days ago, they posted the "Bill Clinton / Lorretta Lynch Airplane Conversation leaks", which is a "sexually explicit fanfic of Bill Clinton and US Attorney General Loretta Lynch" in /darknetmarkets. It is worth a read tbh.
Now, for halloween, they've released more files to spook the NSA. The latest leaks were posted on darknetmarkets like before, but with only 3 replies, by possible RC and oxycodone addicts looking for darknet deals to score their next fix, to something that has huge implications for the US intelligence community. This post didn't go unnoticed however, it was picked up by mainstream sites -- Hacker collective The Shadow Brokers strike again with more NSA leaks.
submitted by flipkt to BlackOps [link] [comments]

Transcript of George Webb Video Series Part 219 "Hillary's Leakers, Hackers, and Henchmen" [@Georgwebb / #HRCRatlne]

  • Day 43.6 You Knew Reality Winner Was Coming Into the Story - YouTube
    • It's Day 43. This is version 6
    • In this news just broke: ex NSA employee admits he kept top-secret information at home
    • Here again, I think this is one of those Awan covers, where you have someone who has kind of been in close to retirement, etc, that's done a lot of you've done a lot of favors for, and you call it a marker
    • That's what this looks like
    • It looks like a cover to cover the wants and to explain why this classified information is sitting over at the Awan's house
    • I don't know maybe it's not
    • But this article does a pretty good job of talking about the different people at NSA
    • And there's been just a rash of NSA leaks
    • I think this is to explain the the OPM leaks, and the OPM hacks
    • There's a lot of information out there that's being used
    • And this is the guys name here his name's PHO
    • He's 67 not far from where I am in Elliot city
    • And if you're gonna have a lot of Social Security numbers floating around, a lot of people using those Social Security's numbers from veterans who died to then get new home loans
    • This is what we've seen with the Awans, this is kind of one of those covers where well it must have come out with one of these leaks
    • So you can see here from 2010 to 2015, he took home paper and digital copies of government records--
    • I've met a lot of people that work at NSA and this just is something that you don't do
    • I know everyone at NSA knows that you don't do this
    • You would have had to been--doing Sandy Berger stuffing it in--that your your pant legs...
    • You don't walk out of the NSA with a briefcase that's not checked when you at the end of the day
    • {{ 911 Rubiks Cube }}
    • So that's--now it is interesting that he's in the tailored access operations TAO unit which is the unit that Edward Snowden was in
    • So that is an interesting kind of development there
    • This is article is 22 hours old as I was saying
    • So again, district of Maryland, and here's Dana Boente who just left the Eastern District of Virginia, retired to come up here and do this case, in the district of Maryland, which I found was interesting
    • If you're not familiar with the NSA hacks of course there was obviously the 2013 hack with Snowden, but then there's also this the Martin hack
    • Again, close by where we are Glen Burnie in 2015
    • So and then of course the most famous of all hacks in Augusta, Georgia here in 2000
    • With the Reality Winner 25 year old they had all this information
    • Now if you notice Augusta, Georgia I want to say is I'm gonna say 30 miles from the Savannah River Nuclear Site
    • And it's about maybe 45 minutes from Charleston, not very far from Savannah and Charleston is kind of in between
    • This Reality Winner I know we've made a lot of fun of her all along the way, but it's gonna be somebody here at this site at the Savannah River Site that she's covering for if not two
    • Now I thought she they tried to do a throw, saying that she was at a different facility in Georgia
    • But now that I see Augusta and knowing how close Augusta is to Savannah River Site, and how close it is to Charleston, Reality Winner is going to come back into our story as the key throw of The Whistleblower down at Savannah River Site
  • Day 43.7 Wrapup of Comments, Sweat Tea and Kings Bay - YouTube
    • NO Autocaptions
    • A lot of ppl commented PHO was yet-another runny soup with no meat like Campbell (Campbell's soup)
    • And it was covering the fact that he worked in this TAO @NSA
    • That will let you get into secure blackberry folders, for example
    • For example, drone interdiction in Pakistan
    • "Oops I did it again, here are the codes for drone strikes in pakistan"
    • People commented about Reality Winner working at Fort Gordon NSA facility in GA
    • I did't mean to say Reality Winner worked over at the naval nuclear station, but I meant to say that she was close
    • And that the info that RW would be dealing in would be highly secure information for the Navy
    • Our enemies knowing where our nuclear subs are would not be good
    • Turkey wanted to extradite Graham Fuller
    • News keeps chasing you, we're about 3 months ahead on this series--feels like we're being chased
    • Fuller did the infiltration, not the coup plan--coup is more Grange-Petraeus CIA-NATO op
    • SAP secure access program, lets you get into the SAP folders on blackberries...this how Hillary can still have influence even though she's not in power, she just needs a few people in key positions
    • Tap PHO on the shoulders and just say, 'time to call in a flavor and give us the SAP codes'
    • Reminds me of operation duck soup, in Vietnam which was flying heroin into the DMZ for US GIs
    • Maybe that PHO was a wink to Operation Duck Soup way back when since he's retiring now
    • Peter Stzrok, seems like a wink on 'Strzok', gonna call him 'Strzok'
    • Peter Stzoks let go from Mueller team for 'anti-trump' texts
    • {{ 911: that MSM's cover story. Really it was about him paying someone to validate the Fusion PP Dossier, now discredited. This makes Mueller's team look stupid and incompetent, so he was let go }}
    • Asked Robyn Gritz if she knew who Stzoks was and she didn't know him
    • Devin Nunes is mad because the FBI is stonewalling
    • DHS-OIG sentenced to 37 months for deleting Files
    • Georgia Cryptologic Center--sweet tea--sounds like euphemism for drug trade
    • Kings Bay subbase, lots of used car yards where car parts are being picked--illegal trade in car parts
    • People ask about the earthquake and was it a PNE near VA coast?
    • North Anna Nuclear Generating Station
  • Day 43.8 Summary - Sweet Tea and Pho Soup at NSA - YouTube
    • Day 43 and it's part 8
    • And this is a real late night edition
    • But I'm gonna call this mister PHO's runny soup leeks
    • Mr. PHOs runny soup leaks
    • I was thinking either I'll call this friend or foe pho or mr. foes runny soup leeks
    • But this just goes to show you the power of putting out working theory
    • And then people come back and they either say--sweet tea
    • Why are you mentioning sweet tea sweet tea sweet tea?
    • Why are you repeating sweet tea? what sweet tea got to do with anything?
    • Reality Winner was at sweet tea--so what?
    • And there's good challenges there and I just think--this author the guy who did this article linked those two things together he linked together Mister PHO's runny soup leaks with reality winner and sweet tea
    • The Georgia cryptography Center, the Georgia cryptography Center is the one that was built in 2012 to handle CENTCOM traffic
    • So let's say these are the three different cryptology centers
    • There's a whole bunch more there's one in Hawaii where Snowden worked at
    • There's one in Fort Meade near me here
    • And then there's one in this in in down in Georgia at this Fort Gordon, Georgia cryptology Center
    • Well what they did is they they took it and they broke off the traffic here
    • And the first signal intercept
    • They intercept these signals from CENTCOM
    • This is the UAE
    • This is Pakistan and also AFRICOM
    • This is--the all the area where our mining is--Boko Haram and a Niger and all that sort of thing
    • So all that stuff all these stories that emanate from signals intercepted over there are coming out of this Georgia thing
    • Now these guys--let's just call them Navy boys B O Y Z
    • And what I mean there is kind of like this retired Navy
    • This is the military-industrial complex whatever but these are what we think of as deep state or whatever
    • But I'm gonna call them the Navy BOYZ sort of like to John McCain and McCain's dad and McCain's grandfather that type of thing
    • The Navy BOYZ and the Navy BOYZ if you were smart and you were--I'm not saying the Navy knowingly knows that drugs are coming one way and guns are going the other
    • But they did look the other way
    • They're like the common carrier I don't really want to know what you're shipping
    • So the Imran Awan is who's doing the containers and and what goes into containers these guys are just saying how many containers here's the bill
    • But these Navy boys--you'd be smart to take all that kind of traffic that--Awan container traffic and make it go through this Georgia Center--this Georgia communication center
    • That's where you have your reality winner
    • You could then cut off all the communication and just say this is a nothing burger, that's a nothing burger, oh yeah another nothing burger, oh there's another nothing burger
    • Here's Imran communicating in Sialkot, nothing burger here's him in Faisalabad nothing burger oh here he is over in Akina Asana his hometown
    • He's recruiting a bunch of boys for a soccer team that's a nothing burger
    • Oh here he is over in Lahore at the naina set tech tech show that's a nothing burger here he is down at the Customs House in Karachi talking on his Blackberry again, that's a nothing burger
    • Oh here he is over at the Porter Kasim checking the video camera for all the radiation testing oh that's a nothing burger
    • Oh well how about all the UAE shipping traffic well ---you're the Urenco shipments going on the Maersk that's a nothing burger and
    • So you have this Center which basically takes all this traffic of our key players, and just hits it with a nothing burger stand
    • And if anybody does come to the White House, comes up and sees Devin Nunes, and says, "hey all this traffic is actually Imran Awan--this story that's going around Washington right now, that's actually him and his--about 20 or 30 of his secure BlackBerryies--you do know that right?"
    • And so what you do is you just put a Reality Winner in there and then you crush the the two whistleblowers, which is exactly what I think you would do
    • And you would investigate them with DHS
    • And you would use the the case management system at DHS to find out about them
    • And then you would crush these people
    • And if you if you hacked the case management system--if you're Imran Awan, and you hacked the case management system you could crush whistleblowers all day long and
    • So that's what really I think--working theory does
    • Now there's it's a lot of speculation but here I talk about the Navy BOYZ in that little theory that I just gave right there and I talked about--
    • How this Mr. PHO
    • Now I didn't know pho oh it's gonna be pronounced Fah I'm gonna keep pronouncing it focus it's more fun it's called pho noodle soup
    • I'm gonna that's gonna be my new imagery for lane leaks leaks
    • Especially leaks about duck soup type operations
    • This is the the using of opiates to target US soldiers
    • And that's duck soup was was heroin for US soldiers in the DMZ 1968
    • So I'm gonna keep that duck soup model going because Pho is Vietnamese and who knows how long who knows how long Pho has been giving duck soup, I mean noodle soup to the enemy, who knows how long?
    • We don't know that
    • Now of course they're gonna say is a doddering old man...but we don't know that
    • That could be just the way of getting these codes these access codes out of Fort Meade
    • Oops I did it
    • Again, we don't know how long that lasted
    • Now for me again, more working theory, but this just looks like Mattis
    • This looks like Mattis cleaning up the Fort Meade
    • And the next thing after he cleans up Fort Meade, I think the next thing he's gonna do is clean up the Georgia center
    • And Devon Nunes isn't dumb--he realizes that these people came from the center too
    • They went to the Eisenhower building
    • So that's what I think's happening I think Madison's cleaning up on the home home base he's gonna go up and clean out the Colorado cryptography Center I believe
    • He's gonna do Hawaii I think there's one in Texas and the Texas Cryptography Center
    • The Colorado cryptography Center
    • I don't know where those are located yet I know the white one I thought was at Diamond D and I a matter of fact I talked to somebody who worked there
    • So anyway I just think this is this is what I love about these
    • I've met somebody in The Associated Press just the other day
    • They said John Solomon doesn't work there anymore he works at theHill
    • And I thought I knew that but anyway I wanted to mention that correct that
    • But it's just how just one good article about national security here by a good reporter from the AP, I don't know who did it
    • Then sometimes the AP hits a story that somebody writes in one of the the journals--the national security journals and then they'll pick it up the AP picks it up
    • But whoever the editor is over there good job
    • Because it it really gives you an insight into what a clean up operation operation clean up the clean the Duck Soup and clean the pho noodle soup off the floor here at NSA in Fort Meade right by me here
    • And then maybe also the Georgia community, to make sure that the Reality Winners aren't stuffing stuff in their pantyhose
    • I doubt very seriously that she stuffed in their pantyhose
    • I doubt very seriously I think there's probably just a cover
    • It's a it's a nice image nice imagery, but I think there's actually two real whistleblowers
    • I must stay with that story that came the Eisenhower Building
    • I might have got the center wrong I thought it was Huntsville
    • I thought it was Redstone Arsenal but well I'm looking at it
    • Now it may have been sweet tea
  • Day 44.1 Is Peter Strzok Really Andrew McCabe? - YouTube
    • Welcome to day 44 this is the first version and the name to try to pronounce and try to remember as this name right here at the FBI
    • This is Peter Strokes I'm gonna call him because I think--I had said before I think it may be an OP name
    • An OP name is you take a funny name like Peter Strokes, I mean you just Swizzle some of the words[sic] {{ letters }} around
    • So you take the Z and move it maybe to the middle
    • That's the only way you could get a name like Peter Stzrokes who knows
    • Is that Andy McCabe? It sounds like it I'm not saying it is Andy McCabe it sounds like somebody who's extremely close to Andy McCabe if not Andy McCabe
    • But if you just look at the metadata of Peter Strzok it's Annie McCabe Annie McCabe Andy McCabe
    • If you look back here he was in charge of the Hillary investigation
    • He's in charge of shutting down the Hillary investigation, numerous times
    • Who else did that? Andy McCabe
    • Andy McCabe shut down NYPD Intel unit
    • He shut down New York NYPD
    • He shut down Little Rock FBI
    • He shut down the EB-5 investigation in Los Angeles
    • He shut down the EB-5 investigation in Miami
    • He shut down the Clinton Foundation investigation in Washington DC
    • He also conferred with Loretta Lynch to have her do shutdowns as well
    • He also brought in Peter Kadzik at certain key points along the way to leak information over to Podesta
    • So and I believe he also is the same person who goes to Fusion GPS and pays for the peepee dossier
    • And now we have Comey, taking the peepee dossier try to add legitimacy to the peepee dossier, and slip behind the curtain at the White House
    • So to think that Andy McCabe would give that to a second, possibly...
    • ...But the metadata looks like [Peter Strzok] is Andy McCabe's OP Name
    • I'm just gonna say that that right now, just from a technical analysis point of view okay
    • So we'll see if it's Andy McCabe or not
    • Tne picture they trying to picture Mueller with another agent to make it look like it's Peter Strzoks, but that's I don't believe this is I don't believe it's that person
    • And anybody on these teams trying to make it look like this guy here
    • I just don't think that's the case
    • Now this guy if you go back to the heavy article has been named in different wiretaps and sting operations Peter Strzok has been
    • They started with the top of it the story which is he sent anti-Trump and pro-Hillary tweets
    • So he's the one who Peter Strzok is a guy who had personally interviewed Hillary
    • And decided no, not to have the lie detector on, not to do it under oath--these are things that the FBI never does
    • This is Kallstrom's argument
    • Is Andy McCabe gonna leave that to somebody else? I just don't think so
    • So here we go with use of the the polygraph and when interviewing applicants
    • He's just looking for people to kind of be in his little cabal
    • So we'll see as the reports come out
    • The let's see the other report here's the Daily Caller has a little bit of the story just the top two percent of the story
    • Mueller's Russia probe The Washington Post had about 20% of the story
    • So they're getting I think they're in the lead
    • The New York Times had a story as well, so I think they're picking this up
    • The Wall Street Journal was completely caught flat-footed on this--they had no idea: they just thought it was an anti-Trump text thing
    • So that they were completely out of the loop
    • But well let's just do a hot search here and just see where we are with Peter Stzrok
    • Now and the now famous Peter Stzroks of course Peter's gonna be a member of my gonna be in my lawsuit to the FBI
    • Again, I filed the FBI lawsuit before this news broke
    • For all those are gonna say I filed it after the news broke--that's not true
    • You can look at the date, and matter of fact all these people have already been served, so it's gonna be hard for me to go back in time and serve them right?
    • {{ 911: G, why do you care? You said yourself, don't focus on the drama, just the lawsuits }}
    • So let's just see what we've got Trump has weighed in yet?
    • No Trump has weighed in with a couple of tweets, not particularly about Peter Stzrok but you can see that the press is picking this up
    • Now the whole investigation the whole Trump investigation looks like it's through this through this Peter Strzok if / Andy McCabe and the whole machine looks like it's gonna collapse
    • Now there is one theory out there--this is just working theory--that Flynn was working with Mattis the whole time
    • And and use Lisa Page at FBI
    • Lisa Page at FBI is not actually an FBI lawyer
    • She's a stand-in she was seduced Andrew McCabe or Peter Strzok, whoever you want to say
    • And set up him in a sting of his own
    • It's kind of nice to set up a sting with us with somebody who sets up a lot of stings
    • {{ 911: so he burns the whole country down because he doesn't want to risk divorce? Wow, if true wow. }}
    • So we'll see if that's true or not but I think actually it is true when all these texts do come out between Lisa Page and Peter Strzok / somebody
    • We'll figure out more to the story
    • So I'd say just by metadata this Peter Strzok looks like Andy McCabe
  • Day 44.2 Peter Strzok and Lisa Page - Conspirators With McCabe? - YouTube
    • It's Day 44 and this is the New York Times article about I'm gonna just keep calling him Peter Strzok but you'll know that I mean STR zs t RZ
    • Peter Strzok and Lisa Page the lawyer and the situation or this situation looks a lot differently now with Lisa Page maybe being complicit in the conspiracy, working directly for Andrew McCabe
    • And of course in my analysis metadata analysis this morning, Peter Strzok's career looks so identical and similar to Andrew McCabe just on based on metadata, I thought it was Andrew McCabe
    • It is so close, and I'll go through how some of that is is come about
    • But this is the the very good article here in HEAVY.com
    • It talks about the lawsuits against McCabe and lawsuits against Peter Strzok
    • It talks about--Lisa Page's involvement and some of the other things news I'm breaking this morning with Robyn grits
    • She's talking about how she filed with the office of a special counsel
    • The office of the Special Counsel is Robert Mueller
    • She filed before Robert Mueller took over that position, but the FBI has definitely stonewalled
    • So this is my reporting as a few minutes ago, "hmmm interesting I filed a complaint directly with the Office of Special Counsel. But I know they have been waiting for documents from the FBI. They could delay every document request FOIA, EEOs"--its equal opportunity stuff--"you name it even the Inspector General from DOJ complained about Grassley's office being stonewalled by the FBI."
    • And then she goes on to talk about down here another friend of hers who had retired through OPM, I'll drop it down here, through OPM, and they just never sent the paperwork over
    • So he he was like OK well--I'm gonna send over my paperwork
    • He just never got it and he's been fighting the FBI for 12 years
    • So it's these winners and losers
    • If you're in side of Andrew McCabe's Counterintelligence little clique--the little JTTF click--you're going to the--doing the counterterrorism a week before the Superbowl, a week before--the playoff, football playoffs, NFL games a week before World Cup etc and you're partying it up just like the Hillary did with her Secret Service people in Colombia
    • If you're in that group you're the winners
    • But if you're a a gumshoe FBI out there on the street doing real investigative work, and not fake crime, well then you're in the losers
    • We're going to delay all your paperwork
    • We're going to Stonewall you we're gonna make you sorry you ever work for the FBI
    • We're gonna pad the pad our pad our winners
    • And we're gonna strike in our losers
    • And just so even though even this guy even the Inspector General of the Department of Justice, officer of department of justice and this is going to be Matt Horowitz complained about it
    • So this is not something then--George is--personal vendetta against McCabe
    • Actually as I've said before
    • I'd want him to live on a nice big branch with very green grass, but I don't think that person needs to be running a coup and information coup against the [lawfully elected, non-criminal] President--which is obviously what's happened
    • He's put in his cronies to attack the sitting president
    • This guy here we want to find him
    • He's Eric Karate Croddy. Now he sued (I'm sorry in my phone's just going crazy)
    • He sued the FBI for using these wacky interview questions, that if they if completely subjective, they're these the same questions users of Fairfax County
    • If they like you then great--that means they can get you in
    • If they don't like you they can keep you out
    • So crowd e Croddy here filed a lawsuit--we're gonna be looking at that
    • Kathy Muller was the investigator
    • Awfully close to Mueller, I mean almost if it was your daughter you would want her to drop the e just so people wouldn't say nepotism--we don't know--we don't know but
    • That's why I put it there
    • Now everybody says well why did you put the address of Andrew McCabe, why did you pin that?
    • Well I actually I put an address for him for 1998
    • Now did I know that he bought it in 2016? Yeah I just thought that was a little weird 20 years later
    • I was I used a three year old address
    • Did I know he bought it, actually? Yeah I probably did but when I saw all kinds of power upgrades going in
    • (Sorry about my phone)
    • When I saw all kinds of power upgrades going in there when I saw these new AT&T pedestals
    • When I saw 200 different wiring teams going in, when I saw these--all the Google Fiber going in
    • When I saw the AT&T Wi-Fi, AT&T fiberline going in, when I saw the depressions and dips for these new vaults from the wiring vaults near there
    • I just said well if you were moving your money out of Malaysia, and out of Gülen's little hands
    • And you wanted a safe keep it what would you do well I'd move it offshore
    • I move through Bitcoin and I would mine the bit coin
    • Now mining Bitcoin takes a lot of power and I've been talking to power experts all day about how much power has been wired into Hillary's place
    • Now am I saying Andrew McCabe is laundering money absolutely not
    • There's no way I'm saying that
    • But I just want people to visualize you have this place out in in Maryland the with these 35 people that are spies within that group somewhere
    • You got five or six of your own GPS people
    • You paid for them we have the receipts now that FBI paid Fusion GPS excuse me for these people
    • Where do you move them after they get Flynn to sign off
    • And finally call Kislyac who's dead now
    • Now they say we don't need these guys anymore and they get rid of them
    • Where do you move that five or six guys that's embedded in that team?
    • Do you move it to Chappaqua?
    • Are they living up there in Chappaqua right now?
    • Who knows but they're not answering service
    • And that isn't helping one thing is for sure I'm going to add both of these people to my discovery both the Peter Peter Strzok is what I call them Peter Strzok and
    • So I learned how to pronounce his name Peter Strzok and this Lisa Page if this person is a personal lawyer for Andy McCabe
    • And this person is kind of a personal hitman for Andy McCabe
    • That's going to come forward
    • People in the FBI are sick of this
    • That is going to come forward
    • That information is going to come forward
    • So I'm going to leave it right there right now
    • That's where the investigation kind of is is at
    • It's obviously very fast-moving here--with the phone blowing up
    • But that's where--you kind of took a couple of minutes out of the newsroom here to kind of--do a here's where how the dots are connecting as of right now
    • You can go to the Twitter feed to see how things are going
    • But that's where we are right now
  • Day 44.3. Focused On the Misuse of Power - YouTube
    • It's Day 44 this is part three
    • This is just a quick Sunday summary
    • And I think it's probably good the full flight of the arrow here really goes back to 2010
    • And if you haven't watched the series before--that I really don't care about viewers or subscribers or patreon or any of that
    • I want to get off Andrew McCabe's list
    • That's all I want--that's all up the reason I got in this
    • You could read the accidental journalist by Trish Negron on Google George Webb an accidental journalist if you want the full story
    • But I protested and got in the way of Andrew McCabe and an operation he did in Portland Oregon
    • It's called Muhammad Muhammad [Christmas Tree Bomber]
    • Basically used three different informants for this Muslim kid took a very nice kid who was studying hard a student 17 years old radicalized him over time showing him a lot of pictures of war atrocities that supposedly were done by a--US soldiers
    • And built a bomb for him
    • He never touched a soldering iron
    • And put him away for thirty years
    • And even that kid with no rights from Somalia
    • I think he did later naturalize, but he ended up almost winning a case in the 702 for "collect it all"
    • And I actually think he should have won it because they used illegally-collected information to convict him
    • Which is Fruit-of-the-Poisonous-Tree
    • So I do believe the little guy has rights in America and can challenge the law
    • The Dred Scott--he's sort of the Dred Scott
    • Muhammad Muhammad SAW the Dred Scott of our time and if he would have won that case he would have it would have helped everyone in the United States with their Fourth Amendment rights
    • So yes I do think a little guy can win a guy can win in the pro se Court and from the Supreme Court with 13 shares of stock
    • So my only intention here is to get off the list
    • And I hope all my viewers go to all other channels and make everybody else rich and wealthy and add to their subscribers and do whatever patreon that they're looking for
    • That's not my goal
    • My goal is to get off the list
    • So what I focused on in this is production of documents documents documents documents
    • And most of the documents--I know some people say I'm trying to get documents I can never get that are secret
    • No, most of the documents I'm going for our public documents
    • Inspector General Reports are Public Reports
    • Reports from the House Committee on Administration should be Public Reports
    • Reports, Emails from people in the State Department, using Gmail should be public, the Public Records Act
    • So I'm not asking for anything classified I'm asking for public records and that's how I kind of the government's supposed to run
    • So that's where I am at that's my goal and I really have no other goals
    • And I have no animosity toward anyone
    • And if I make a mistake I'll certainly correct it
    • I have never accused anybody of a crime in this and if anybody is interpreting it that way, that's not the case
    • The only people I might be talking about in terms of committing a crime or the conspirators, which are is going to be the FBI
    • And there are some there are some actions by the Awans, obviously that are criminal
    • And there are some actions by people around them suppressing evidence and destroying evidence that are criminal
    • But everybody that I'm focused on are actually at the highest levels of government impinging on the fundamental rights of every citizen in the United States
    • I'm not interested in any Jones versus Smith type in situations
    • I'm focused on people who are impinging on the fundamental rights of every US citizen
  • Day 44.4 Will Kristen Neilson Name the Three DHS-OIG Hackers? - YouTube
    • This is Day 44 part 4
    • And here is the DHS OIG hack
    • This is the DHS OIG hack where there's three employees that I say these three employees are gonna be Hina Alvi Imran Awan and Jamal Awan this all happens the first week of March this year and there's a temporary Inspector General I don't know yet if the temporary Inspector General was Theresa Grafenstine or not
    • But it's certainly gonna ask that in the request for admissions
    • So this is an article by Ron Nixon and Nick Fandos
    • I think immediately you can ask them, "hey, where's the W? You forgot the W. Here the Who W, you forgot to ask who these three people are. And then you also forgot the when. You said 'in the spring.' And they have the hack happened in the spring"
    • "Can you be more specific about the first three weeks of the first three days excuse me of March, before--he leaves the country on the 5th, and they get fired that first week those same three from Congress?"
    • Okay? So John Roth is the Inspector General now
    • So we'll see if he if he publishes that
    • But tomorrow this is the Kirsten Nielsen is hearings you can see here by the legislative action for this presidential nomination 1095
    • This gal named Kirsten Nielsen is up for debate tomorrow
    • And she went through our first round of hearings was not bad
    • And usually these are just consent votes
    • We'll see what happens
    • For those of you don't know who Kirsten is, she is young lady but that was kind of picked on a little bit for her experience, but she's got quite a bit of experience at TSA George Bush hired her, and she had a lot of critical infrastructure management role at TSA
    • So she has never led a large organization, but she looks like she's up for the task
    • So the first question is: Kristin Nielsen--just like we asked Jessie Liu, when she took over the Awan case--will you announce the first three people the three people that did this hack?
    • This hack was a 159,000 case files.
    • These were the case files of people who were who were researching cases like Zarate in the Kate Steinle case
    • You get out here you look at the facts of all the breach, you'll see that it was the actual case management of people who were looking at cases like Zarate and the Kate Steinle deal
    • Only there's one hundred fifty nine thousand
    • This is why I called this case here 159,000 Kate Steinles
    • This this case right here is 159,000 Kate Steinles
    • Because these are the investigators investigating those cases
    • You look over here at the USA Today report well if you look at Ray lockers report, you'll see that he has a he names how many people that
    • I think that's Ron Nixon right there from New York Times I believe
    • Yeah yeah it's Ron Nixon there and I I haven't looked up Nick Fandos yet
    • But here's the article here Nick Van DOS Ron Nixon New York Times insider stealing data nice report
    • So you can review this and just text them send them text...and say hey--will Kirsten Nielsen be confirmed tomorrow?
    • And well the first thing she does
    • Again, if these guys are double dipping it at DHS
    • And they're into the system of 159 thousand names--that's 159 thousands Zarates
    • That's 100 that's could be more than one hundred fifty nine thousand Kate Steinle
    • I don't know however many people that might might result
    • So even one Kate Steinle even one more Kate Steinle is is not good
    • But this is a hundred and fifty nine thousand case files that were hacked
    • And if you don't identify the hacking team
    • And they can go from all the different 30 departments in the DHS Coast Guard and TSA, you could could just do a round robin of all 30 agencies in DHS
    • This is critical: if you don't name those three people and you have no chance of plugging the leak
  • Day 44.5 Lisa Page - EB5 "Family" Visas? - YouTube
    • This is Day 44 this is part five
    • This is Lisa Page and these are the two people that came out today
    • Lisa Page and Peter Strzok just to two people it just seemed to be everywhere as far as setting up the Comey meeting with Laura and Lynch in there--over at the Hillary investigation
    • They're over at the Hillary interview, and then they're at the Trump investigation, and then they're at the--behind the curtain here, and behind the curtain there
    • And it just seems like the type of person who's involved with fuschia GPSFusion GPS
    • With the--is it are they're really sending anti-Trump messages from the Mueller investigation?
    • There at the they're everywhere
    • They're at the the Hillary investigation together
    • They're at the Trump administration with the Russia Russia Russia
    • Then they're at the Mueller investigation in
    • Are they really are they really lawyers? No
    • I mean she's a lawyer but Peter Strzok is not
    • Aren't they really just sending out information of what the Commission's coming up with?
    • Aren't they just leaking information out to their friends and Andrew McCabe?
    • Isn't that actually what's going on it's not how Andrew McCabe is getting updates on all these investigations as they're going along--isn't it isn't that really the case?
    • Anyway I saw these things that are a record which was this disorderly conduct and whatever obstruct off--businesses is--I don't know what that is
    • But anyway I forgive people for their minor errors
    • But what I what I notice is locations.
    • She's from Columbus, Ohio
    • She got her law degree here in 2006
    • And I just look at Hillary, and then I look at kind of being brought into the to the FBI world
    • And here's Summit County here
    • And this is Akron, where my dad was born
    • And I had visited this Strongsville, Ohio, and the Strongsville Ohio had been kind of had been singled out because
    • (Not because of the creepy building here)
    • But because it had this European adoption agency
    • This creepy European adoption agency that got raided by the FBI
    • I don't know if she was there doing the investigation for this
    • Or if she was doing--it's like maybe a color-of-law, where I bring in all these kids, and after the 10,000th kid I bring in, then I say oh well it's color-of-law
    • I'm the adoption lawyer--I'm the EB-5 lawyer for bringing in all these kids
    • Oh All the kids are gone there with all the families now
    • But ten years later I'm gonna--calling the chit's here
    • I was there I started in 2008 and now it's 2017, so I'm gonna call the chit's in
    • But anyway they adopted this thing called the European adoption consultants
    • And I think a tremendous amount of kids went through this place
    • Just an amazing amount of kids from overseas
    • I think they were flying him in the Wright-Patterson Air Force Base in Springfield Ohio and kind of I don't I can't exactly all the different ways they got in
    • But they were from all over the place
    • They were it was operated by the state department
    • So it was really weird there's that Hillary connection
    • And these people were kids were come from Bulgaria and China and Colombia Congo Haiti or Honduras India Panama Poland Tanzania Uganda Ukraine
    • And I remember how many Russian kids had come through with--look like they had had like polish passports or Bulgarian passports
    • So I don't know if people have read about this but this was a crackdown
    • And I think Hillary was involved in this
    • Now she's she might be able to say, well it was a ten year color-of-law
    • We imported kids ten years and just to make sure we knew who the bad actors were
    • Maybe that's the case here I stay away from pizza gate as much as I possibly can
    • But I mean it's right here in front of your face
    • I mean this is the FBI in and--invading there or shutting this down
    • Now they shut it down ten years later
    • She's there Lisa Page is there near Strongsville in 2008
    • And then ten years later it gets shut down
    • Was she involved in EB-5s?
    • Did she do ten thousand people ask for all these kids?
    • And then they shut it down ten years later?
    • We really don't know
    • But it's a good question to ask Lisa Page
submitted by 911bodysnatchers322 to TruthLeaks [link] [comments]

A Russian intelligence agency, after hacking NSA servers and stealing espionage tools and exploits, posts on reddit to expose the hack and get attention.

The Russian intelligence agency team calls itself The Shadow Brokers and has evidently hacked NSA's Equation Group staging servers and stolen some exploits and espionage tools in 2013. Now they want attention.
Background
Authenticity of the leaks:
2 months back, The Shadow Brokers claimed to have hacked the Equation Group and set up an auction for the stolen package for about a million dollars in bitcoins (this was misreported everywhere as 1 million bitcoins). They posted in a now deleted tumblr page (retrieved from archive.org, note the PGP keys) and twitter releasing a few files for free to confirm the authenticity, and they've been confirmed as authentic.
On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.
The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.
SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware.
SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.
Links to a Russian intelligence agency:
The only source for the links is Snowden and he makes a compelling claim. Shortly after the initial leaks were confirmed to be authentic, Snowden tweeted out the links between The Shadow Brokers and Russian intelligenceand was reported extensively elsewhere.
"Why did they do it?" Snowden asked. "No one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the DNC hack."
The hackers could be advertising that they have the ability to identify actions the NSA took on the compromised server, Snowden suggests — a warning of sorts.
Snowden also noted that the released files end in 2013. "When I came forward, NSA would have migrated offensive operations to new servers as a precaution," he suggested — a move that would have cut off the hackers' access to the server.
As for who is responsible for acquiring and leaking the code on the Shadow Brokers' site, Snowden says "circumstantial evidence and conventional wisdom" suggest Russia.
King's College London cybersecurity expert Thomas Rid tells NPR's Mary Louise Kelly the same thing. There's no hard proof, he says, but the capabilities required and the timing of the release suggest Russia. That's all circumstantial, but "more than speculation," as he puts it.
Reddit activity
2 months ago, about the time the initial leaks started, someone registered the Reddit account theshadowbrokers and have been trying to get the word out about the leaks on reddit. I'll get this out of the way now, there's absolutely no proof that this is a troll account. Everything they've posted is about them trying to get attention to the fact that they've hacked the NSA and that they have the state-sponsored-level espionage tools that has been verified by reliable sources and people in the know. The timings of the leaks match with the posting times so far for the purpose of this post.
The language they use is off in many ways and is explainable by people in the know using deliberately misleading language to obfuscate and shield themselves against advanced natural language processing and stylometry tools that state sponsored intelligence agencies use to identify people based on their writing style.
The account posted on databreaches, hacking and bitcoin linking to imgur, a now deleted pastebin (retrieved from archive.org) and a github link with the leaked free sample files ( retrieved from archive.org).
About a month ago, in their Message #3, The Shadow Brokers posted a self-AMA of sorts clarifying misunderstandings and what they really want. Among them was the explanation for the ridiculous misrepresentation of their demand of a million dollars in bitcoins to a million bitcoins, among others. The users seemed more receptive this time and asked for more proof, demos and escrow for the bitcoin demands.
Between leaks and 19 days ago, they posted the "Bill Clinton / Lorretta Lynch Airplane Conversation leaks", which is a "sexually explicit fanfic of Bill Clinton and US Attorney General Loretta Lynch" in /darknetmarkets. It is worth a read tbh.
Now, for halloween, they've released more files to spook the NSA. The latest leaks were posted on darknetmarkets like before, but with only 3 replies, by possible RC and oxycodone addicts looking for darknet deals to score their next fix, to something that has huge implications for the US intelligence community. This post didn't go unnoticed however, it was picked up by mainstream sites -- Hacker collective The Shadow Brokers strike again with more NSA leaks.
submitted by flipkt to C_S_T [link] [comments]

A Russian intelligence agency, after hacking NSA servers and stealing espionage tools and exploits, posts on reddit to expose the hack and get attention.

The Russian intelligence agency team calls itself The Shadow Brokers and has evidently hacked NSA's Equation Group staging servers and stolen some exploits and espionage tools in 2013. Now they want attention.
Background
Authenticity of the leaks:
2 months back, The Shadow Brokers claimed to have hacked the Equation Group and set up an auction for the stolen package for about a million dollars in bitcoins (this was misreported everywhere as 1 million bitcoins). They posted in a now deleted tumblr page (retrieved from archive.org, note the PGP keys) and twitter releasing a few files for free to confirm the authenticity, and they've been confirmed as authentic.
On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.
The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.
SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware.
SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.
Links to a Russian intelligence agency:
The only source for the links is Snowden and he makes a compelling claim. Shortly after the initial leaks were confirmed to be authentic, Snowden tweeted out the links between The Shadow Brokers and Russian intelligenceand was reported extensively elsewhere.
"Why did they do it?" Snowden asked. "No one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the DNC hack."
The hackers could be advertising that they have the ability to identify actions the NSA took on the compromised server, Snowden suggests — a warning of sorts.
Snowden also noted that the released files end in 2013. "When I came forward, NSA would have migrated offensive operations to new servers as a precaution," he suggested — a move that would have cut off the hackers' access to the server.
As for who is responsible for acquiring and leaking the code on the Shadow Brokers' site, Snowden says "circumstantial evidence and conventional wisdom" suggest Russia.
King's College London cybersecurity expert Thomas Rid tells NPR's Mary Louise Kelly the same thing. There's no hard proof, he says, but the capabilities required and the timing of the release suggest Russia. That's all circumstantial, but "more than speculation," as he puts it.
Reddit activity
2 months ago, about the time the initial leaks started, someone registered the Reddit account theshadowbrokers and have been trying to get the word out about the leaks on reddit. I'll get this out of the way now, there's absolutely no proof that this is a troll account. Everything they've posted is about them trying to get attention to the fact that they've hacked the NSA and that they have the state-sponsored-level espionage tools that has been verified by reliable sources and people in the know. The timings of the leaks match with the posting times so far for the purpose of this post.
The language they use is off in many ways and is explainable by people in the know using deliberately misleading language to obfuscate and shield themselves against advanced natural language processing and stylometry tools that state sponsored intelligence agencies use to identify people based on their writing style.
The account posted on databreaches, hacking and bitcoin linking to imgur, a now deleted pastebin (retrieved from archive.org) and a github link with the leaked free sample files ( retrieved from archive.org).
About a month ago, in their Message #3, The Shadow Brokers posted a self-AMA of sorts clarifying misunderstandings and what they really want. Among them was the explanation for the ridiculous misrepresentation of their demand of a million dollars in bitcoins to a million bitcoins, among others. The users seemed more receptive this time and asked for more proof, demos and escrow for the bitcoin demands.
Between leaks and 19 days ago, they posted the "Bill Clinton / Lorretta Lynch Airplane Conversation leaks", which is a "sexually explicit fanfic of Bill Clinton and US Attorney General Loretta Lynch" in /darknetmarkets. It is worth a read tbh.
Now, for halloween, they've released more files to spook the NSA. The latest leaks were posted on darknetmarkets like before, but with only 3 replies, by possible RC and oxycodone addicts looking for darknet deals to score their next fix, to something that has huge implications for the US intelligence community. This post didn't go unnoticed however, it was picked up by mainstream sites -- Hacker collective The Shadow Brokers strike again with more NSA leaks.
submitted by flipkt to nsa [link] [comments]

A Russian intelligence agency, after hacking NSA servers and stealing espionage tools and exploits, posts on reddit to expose the hack and get attention.

The Russian intelligence agency team calls itself The Shadow Brokers and has evidently hacked NSA's Equation Group staging servers and stolen some exploits and espionage tools in 2013. Now they want attention.
Background
Authenticity of the leaks:
2 months back, The Shadow Brokers claimed to have hacked the Equation Group and set up an auction for the stolen package for about a million dollars in bitcoins (this was misreported everywhere as 1 million bitcoins). They posted in a now deleted tumblr page (retrieved from archive.org, note the PGP keys) and twitter releasing a few files for free to confirm the authenticity, and they've been confirmed as authentic.
On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.
The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.
SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware.
SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.
Links to a Russian intelligence agency:
The only source for the links is Snowden and he makes a compelling claim. Shortly after the initial leaks were confirmed to be authentic, Snowden tweeted out the links between The Shadow Brokers and Russian intelligenceand was reported extensively elsewhere.
"Why did they do it?" Snowden asked. "No one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the DNC hack."
The hackers could be advertising that they have the ability to identify actions the NSA took on the compromised server, Snowden suggests — a warning of sorts.
Snowden also noted that the released files end in 2013. "When I came forward, NSA would have migrated offensive operations to new servers as a precaution," he suggested — a move that would have cut off the hackers' access to the server.
As for who is responsible for acquiring and leaking the code on the Shadow Brokers' site, Snowden says "circumstantial evidence and conventional wisdom" suggest Russia.
King's College London cybersecurity expert Thomas Rid tells NPR's Mary Louise Kelly the same thing. There's no hard proof, he says, but the capabilities required and the timing of the release suggest Russia. That's all circumstantial, but "more than speculation," as he puts it.
Reddit activity
2 months ago, about the time the initial leaks started, someone registered the Reddit account theshadowbrokers and have been trying to get the word out about the leaks on reddit. I'll get this out of the way now, there's absolutely no proof that this is a troll account. Everything they've posted is about them trying to get attention to the fact that they've hacked the NSA and that they have the state-sponsored-level espionage tools that has been verified by reliable sources and people in the know. The timings of the leaks match with the posting times so far for the purpose of this post.
The language they use is off in many ways and is explainable by people in the know using deliberately misleading language to obfuscate and shield themselves against advanced natural language processing and stylometry tools that state sponsored intelligence agencies use to identify people based on their writing style.
The account posted on databreaches, hacking and bitcoin linking to imgur, a now deleted pastebin (retrieved from archive.org) and a github link with the leaked free sample files ( retrieved from archive.org).
About a month ago, in their Message #3, The Shadow Brokers posted a self-AMA of sorts clarifying misunderstandings and what they really want. Among them was the explanation for the ridiculous misrepresentation of their demand of a million dollars in bitcoins to a million bitcoins, among others. The users seemed more receptive this time and asked for more proof, demos and escrow for the bitcoin demands.
Between leaks and 19 days ago, they posted the "Bill Clinton / Lorretta Lynch Airplane Conversation leaks", which is a "sexually explicit fanfic of Bill Clinton and US Attorney General Loretta Lynch" in /darknetmarkets. It is worth a read tbh.
Now, for halloween, they've released more files to spook the NSA. The latest leaks were posted on darknetmarkets like before, but with only 3 replies, by possible RC and oxycodone addicts looking for darknet deals to score their next fix, to something that has huge implications for the US intelligence community. This post didn't go unnoticed however, it was picked up by mainstream sites -- Hacker collective The Shadow Brokers strike again with more NSA leaks.
submitted by flipkt to conspiracy [link] [comments]

Contests Ending This Week | Week of September 27, 2015

Ending 2015-09-27:
Ending 2015-09-28:
Ending 2015-09-29:
Ending 2015-09-30:
Ending 2015-10-01:
Ending 2015-10-02:
Ending 2015-10-03:
Bleep bloop. I am a generated post. Please contact my creator if you have any questions.
submitted by Sweepstakes_Bot to sweepstakes [link] [comments]

RockstarFlipper - YouTube Coal Miner's Daughter * Loretta Lynn * Cover How to invest in Bitcoin? Loretta Lynn - Will The Circle Be Unbroken (Karaoke) - YouTube How regulation news affects bitcoins price, with regulatory expert Loretta Joseph

Helanna Loretta. Follow. Mar 4, 2019 · 1 min read. Hi folks, Hi folks, You can get all the bitcoin news and other crypto news at Global Crypto News.They are providing latest crypto currencies ... Loretta currently holds advisory roles at blockchain start up Othera, Unicoin India’s largest Bitcoin exchange, Bridge Bright Capital (India) and is blockchain advisor to ABT Associates. Loretta champions the cause for responsible blockchain adoption with global governments, regulators and industry players, and was the recipient of the Fintech Australia “Female leader of 2016”. Loretta W. Bitcoin at Cash FX Williamstown, New Jersey 181 connections. Join to Connect. Cash FX. Personal Website. Report this profile; Experience. Bitcoin Cash FX. Nov 2019 – Present 11 months ... Loretta has advised many international banks, global hedge and pension funds on managing portfolio and exposure to derivatives and related products. For the last decade, she has been paramount in successful transaction facilitation for Foreign Investors in India and other emerging markets. She has operated in many multi-cultural organisations. Loretta sits on the advisory board of UWS ... Posted on 17.06.2020 17.06.2020 by LORETTA. Holen Kreditkarte Bitcoin Kanada. dass Die also nichts Neues sein möchten, 9 man Bitcoin un Kanada aufkaufen mag, gibt es Kreditkarten, PayPal sonst jede einzelne Zahlungsmethode nach käuflich erwerben, mit welcher Die. Bitcoins mit der es zu nichts gebracht hat Kredit- andernfalls Debitkarte nach ankaufen passiert verwirrend. Glücklicherweise ...

[index] [28915] [23661] [11061] [36046] [9399] [8776] [48028] [45415] [44199] [11893]

RockstarFlipper - YouTube

A 1970 #1 country hit written and performed by Loretta Lynn. You guessed it "another coal mining song" Obama Meetings & the Logan act. http://legal-dictionary.thefreedictionary.com/Logan+Act Loretta Lynch Article. It wasn't Congress it is a Senate Judiciary he... WATCH: Loretta Lynn sings 'Coal Miner's Daughter' at her 87th birthday party - Duration: 1 ... The Bitcoin Song- Tatiana Coin Live Edition - Duration: 3:03. Tatiana Moroz Recommended for you. 3:03 ... Bitcoin is the first and top coin in the cryptocurrency market, although it has seen high and down times, it is indubitably a lucrative investment, for more info on how to investment, you can get ... How regulation news affects bitcoins price, with regulatory expert Loretta Joseph Crypto Finder. Loading... Unsubscribe from Crypto Finder? Cancel Unsubscribe. Working... Subscribe Subscribed ...

#