Home » And then we have…

Comments

And then we have… — 22 Comments

  1. This tells me what I have long thought: China and Russia have ALL of Hillary’s emails.

  2. Well, didn’t they say they had about 30,000 of Hillary’s emails?? Long time ago, too.

  3. IT people started squawking about the dangers of internet security 10 or more years ago, and at the time it seemed overblown. It probably was overblown, back then. The world’s bad guys seemed to have finally caught up.

  4. Putin does NOT want HRCGS as president.

    Egypt
    Libya
    Iraq
    Syria
    Yemen
    Ukraine

    I can’t imagine why.

  5. They got into the Dems by using Hillary’s password that they got from her server.

    I mean “Charlotte” is not that hard to guess to begin with.

  6. I wish I could claim this but I read it elsewhere today.

    The Russians hacking the DNC data are like a brother reading his sister’s diary.

  7. Several headlines focused on DNC research of Trump being taken, but I think the more valuable information would pertain to the network, i.e. researchers and methods, that did the intel on Trump.

  8. Unless you will use it to change outcomes of not that useful
    But they have been involved since the 1920’s when they first entered world politics… They infiltrated the haj… Hello create the house of Saud we know… Assassinated to this day… And on and on… Humongous list of things… But we pretend they didn’t billions and deny their own people to have no effect on us… So much so we won’t even include what we know as fact!!!! We prefer to stick to the falsehood we know that the truth that updated the false

    And we have been losing more now we stopped thinking of them
    And believe that they changed when they can change at will and can act without issue and add coordinated together against a common foe

    And the only limit they have is they don’t want to lose the riches and other things as they lay claim… Without that stuff is just land and they have lots of land… More than any other on the planet

  9. Google telephone type application stinks… it changes what you say… you say foe, it corrects to for.. it wont even let you type exactly what you want and it will change things when your more than a sentence away.

    sorry.

    but basically, they want what they want and they been working for 100 years, next year being a nice round number to try for whatever.

    the bigger point is that we never ever consider them, learn about what they did, and keep going on living in a fantasy history that we refuse to update… and then we wonder why we dont understand whats going on…

    they provided weapons to ibn-saud, he created the saudi we know today, who cover mecca and medina, and whom we used to know the bolshiviks infiltrated, and used haj for other pluses than just worship (like meeting to make plans when they were not praying, and pick up supplies and expertise)

    since the cold war was supposedly over, they spy more, steal more, infiltrated more, and played more games… yet we cant include any of that in anything. we must keep with the first story and never updated it with the right info and reassess,

    we pretend they dont exist, and we even pretend that their tech is bad and we are so great. oh, their vehicles are old fashioned and arent updated to be eletronic like ours… but that just means they will work in a nuclear strike tactical or not..

    they been working on us feeding us bad advice we not only have swallowed but have tried to export back to them!!!

    they are coordinated and we dont even acknowlege things in lite of that history and skill and so on.

    if you could produce 5000 operatives a year from one school, and send them out, how many people could be in an opposition country over 25 years? 125,000… and with open borders easy travel and such its not hard to place that many all around… not to mention other countries doing similar and our leaders sharing all the tech and information… why steal it when you can send 500 kids to go learn it and bring it back as they are giving it away?

    we ignore this stuff the signs we think we are so powerful that we can just ignore it. its not good, and its not going to work as most of what we are experiencing can be traced back to their goals orders and other stuff you can now openly read from the past!!!

    we lost, and we cant win this… we refuse to learn and read and know what we need to know… we cant even discuss things..

    we will let them have it all because we do not like how little fun it is to be serious and how it lacks entertainment to be safe and secure and do what needs to be done.

    sorry for the phone post.
    wont do that no more

    just so you know, their ransomware has been stealin a few billion a year from us…

    im in IT… research computing and its amazing how bad it is, and how little anyone wants to believe or follow what would be the right thing to avoid big problems. and this is in colleges that are the source of next generation medical advancements and technology and its laid bare cause the leftist liberals in charge think like most here. they ignore the billions that country and china spend and the bodies they send and refuse to believe that this is critical

    even our politicians dont take it seriously until AFTER the battle is lost…

    the USA has no future… we are in the end game and there is no way to not lose… even more so if we cant tell and accept that we have been trained to dislike that which would save us!!!!!

    we avoid our rescue and hate it, and wont go there
    so we wont be saved… even more so if we cant accept the clues and signs as clues and signs and learn from those who know more, not less.

    it was nice… but its over..
    not a question of if, but when

  10. Artfldgr Says:

    Unless you will use it to change outcomes of not that useful

    As I was taught in security briefings, it’s accumulation of seemingly harmless or irrelevant information put together as a whole where something more interesting may be revealed.

    But I have no idea what they may be up to here.

  11. One of the Russian hackers found and actually watched one of Hillary’s yoga videos. He is expected to recover, at least physically….

  12. groundhog Says: As I was taught in security briefings, it’s accumulation of seemingly harmless or irrelevant information put together as a whole where something more interesting may be revealed.

    correct…

    Chinese students here are spying, but not in the way that people think. ie. they are not collecting information and sending it to china. but when they return to china and someone discusses their life here, they end up involentarilly telling the chinese government what professor X was like what the other professor was like, how they did their work, what their hobbies are like, etc.

    all this is useful towards turning people or finding their weak spots to take advantage of and so on.

    this is why Chess is used and studied so much and why russians liked it. chess is an open board and you can see everything on it, yet the plan and moves of the opposition are hidden despite the board being open.

    placement of pieces seem innocuous till later when their movements converge and then there is threat.

    if chess were writ large on left and right dynamics, you would have those on the not left, knowing that the point of the whole deal was to win and act, and so be skeptical about moves and try to figure out what they will mean later on… and a left who would say that just cause a bishop is there doesnt mean it has any purpose later, its just a bishiop. there is very little reason to think ahead its obvious things are innocuous.

    so, they let pieces into their own living area under the idea that these pieces are not harmful in isolation. in fact most of how they think is to judge things in isolation… and this broken thinking is for the people on the bottom.

    take a look at feminism… we cant work out the convergence of the moves and then declare this is the point. the point being eugenics / lower fertility to below replacement while you ignore the rules and have lots of kids yourself.

    nancy pelosi has 5 kids
    palen has 5 kids.
    and there is a large list

    abortion results in lower fertility for the population
    education lowers fertility for the population
    STDs lower fertility for the population
    ideology of hating your mate lowers fertility in the population
    overt sexual antics by women disgusts men intending to be mates and lowers fertility
    affirmative action displacing men and exploiting hypergamous behavior, lowers fertility
    promoting gay lifestyles lowers fertility

    there is lots more

    women dying on the battle feild will cause a massive fertility drop as the injured women that come back also have low fertility

    promoting fat women lowers fertility
    rules for mating etc, cause lower fertility

    each point alone, like a rook on the board, doesnt in and of itself pose any issue. together, they become a force in convergence and collusion…

    isnt it funny that almost every point they push favors their extermination by democide and the victims are convinced that their own democide is a social goodness so they fight to promote these things for the future.

    but dead people and people that dont exist are not the future of anything. are they? and we are not allowed sociallly to put these things together and address the combined effects.

    same with the diversity and multicultural ideal
    they lead to homogenization and an end to diversity

    just as when you mix all the colors in the paint store you get soviet muddy gray… you only have diversity if you preserve cultural differences and allow their isolations and respect them

    [can you imagine the view of the islamic of whats going on towards them, or are we overly concerned with what they are doing and ignoring what we are trying to do to them and refuse to not do?]

  13. the hackers doing this are well known
    (hacking is how i got into IT)

    Cozy Bear & Fancy Bear

    there are others from china, n korea, lots from romania, and so on.

    they ALL play games in our elections and society since its open and they can send operatives easily and assist them to be successful and so be in positions to influence and change things.

    [Facebook would not be here the way it was if it wasnt for the money from a russian investment firm linked to the FSB… explains a lot, eh?]

  14. [thanks frog – its appreciated]

    Dmitri Alperovitch, CrowdStrike’s chief technology officer, in a blog identifies two Russian groups – “Cozy Bear” and “Fancy Bear” – as the hackers, characterizing them as “some of the best adversaries” among nation-state, criminal, terror and hacktivist groups. “Their tradecraft is superb, operational security second to none and the extensive usage of ‘living-off-the-land’ techniques enables them to easily bypass many security solutions they encounter,” Alperovitch says.

    Russia’s dismal economy is leaving many of its top mathematicians unemployed, leading them to work as hackers. “Russians are the best mathematicians in the world and they don’t have an industry that employs them very well,” says Martin Libicki, a senior management scientist at the think tank Rand Corp. whose research focuses on Russian and Chinese cyber endeavors. “The Russians always had a penchant for espionage because they’ve run a police state since the czarist era. So, there are a lot of reasons for a lot of this stuff to come together.”

    sadly… people do not know the level at which programmers like me and the hackers there do their stuff whether white hat or not. hollyweird makes it seem like its a breeze and its easy…

    it hasnt been like the way hollyweird shows it since the earliest days of the BBS boards and even then it wasnt much like that.

    [oh, and nuclear devices have chips with mems in them, so they require special signals to get things to move to get latches and other parts to move internally. these gears are smaller than the width of a human hair and without the right signals and combinations, they wont work or move. so its way beyond the idea of a code sequence key and your in]

    [also, there is no way to cut two wires at the same time like in the movies. the average cheap inverter chip or base logic has a 100 millionths of a second transition time. that is, unless you cut both wires within the same 100,000,000 of a second, boom. among other things… which i wont go into given i dont help people make things like that]

    let me give a quick example and hopefully its not over technical in terms of understanding… (forget trying)

    one common exploit in the past has to do with the fact that computers had put the font definitions into something called zero page kernal memory. so what the hackers did was create pdfs with malformed fonts in them. the malformed font would be loaded into that area behind the operating system at the lowest level, but that was just the start as a font is not execuitable. this font would claim space outside its defintion, and repeat a sequence of itself until it wrote outside its area and into an active area,. the curvature math transform for the font would then hit a series of numbers which when run would be the virus that would initiate other things.

    kapersky has a document on DUQU 2.0
    https://securelist.com/files/2015/06/The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf

    the above will give you an idea of to what degree things have moved to…

    trust me, you cant twiddle the keys on a laptop, while getting a blow job, and a gun to your head and crack NSA code in 30 seconds… [Swordfish is the movie]

    in fact, compared to what real people do, most people are very ignorant and have no idea HOW ignorant they are and what is possible.

    take the gun control crowd for example. the fact that florida is a thing that does not happen that often is amazing, and puts the key to the fact that its not done because its only done when it serves an alterior purpose, like hiding something else.

    Its really THAT ridiculous. it ALSO ignores the fact that when you remove what people are comfortable with using, they often find other things that were BETTER Than what they were comfortable using.

    so when mexico was growing crappy pot for consumption, the US got the idea… lets spray it with paraquat… this destroyed the pot fields, but then they went farther south to get them, and there they found plants that were better and found another plant of the family Erythroxylaceae… coca… outside of the wealthy like john paul getty, the common man did not know much about cocaina as they say…

    the happylands mass murder is larger than what happened in florida… and apolitical too.. basically a club of people had their staircase sprayed with gasoline… not much… it wasnt 100 gallons, just a few… much cheaper than a gun, bullets, etc… and no special knowlege… go to gas station, pay 10 dollars, get 3 gallons of gas, pour them on the exit, light it.

    The Happy Land fire was an arson fire that killed 87 people trapped in an unlicensed social club named “Happy Land”…

    even if your goal was to do a lot of people, the targets picked are not the best or easiest or anything like that. right now we have a somali that shot up a walmart yesterday, but they declared that workplace violence again to hide it from the sheeple…

    and you cant discuss this as the majority cant screw in a lightbulb let along understand the level of engineering that is common among a subset of this country and absent from these events!!!

  15. Groundhog:

    It’s the mosaic effect. Knowing who parks in a parking lot and where they park on what day tells you something, especially when you compare it with an office telephone book. Good intelligence is a lot more than waterboarding a suspect. And it is laborious work.

  16. It appears that was not entirely true, because barely 24 hours later, the alleged “Russian” hackers has emerged under the Guccifer2 handle, and instead of a group of government operatives and/or spies appears to be a “lone” hacker who incidentally adds, “DNC chairwoman Debbie Wasserman Schultz said no financial documents were compromised. Nonsense! Just look through the Democratic Party lists of donors!”

    He also denounces the claim that no secret docs were stolen: “They say there were no secret docs! Lies again! Here is a secret document from Hillary’s PC she worked with as the Secretary of State.”

    He concludes by saying that “the main part of the papers, thousands of files and mails, I gave to Wikileaks. They will publish them soon.”

  17. I have to lift Trump’s odds from 9-1 underdog to 4-1 underdog.

    It’s apparent that Putin is averse to a Clintonista regime.

    He blames her coven for:

    Ukraine
    Egypt
    Libya
    Syria
    Iraq

    and more.

    Barry has been the primary enabler of Erdogan.

    HRCGS figures to extend that policy orientation another four years.

    Erdogan has Putin by the Dardanelles… so there’s only so much Syrian exposure that Moscow can tolerate.

Leave a Reply

Your email address will not be published.

HTML tags allowed in your comment: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>