Mass Spying, A Global Reality:
Scroll down for theories and documentation
Es Microsoft parte de la conspiracion espia tambien?? Utilizacion secreta de datos desde un ordenador en modo avion, o sea, supuestamente offline sin incoming or outcoming multimedia transmission, de nuevo, "supuestamente" offline...
Microsoft talves no lo sea directamente, pero sus sistemas de seguridad talves esten facilitando la intrusion de errores y virus, luego de revisar - after reviewing this information I conclude Microsft maybe not deliberatedly doing things, but maybe its components and systems facilitate the intrusion of errors and viruses - Un tiempo despues de que le enviaron la peticion a Obama de cesar la insercion de componentes de espionaje en computadoras - Silicon Valley - luego de comprender la realidad de la situacion decidi comenzar a usar equipos cebos para poder defenderme de cyberthing, aqui estan algunas teorias y conclusiones:
El Proyecto Pandemic:
1 June, 2017
Today, June 1st 2017, WikiLeaks publishes documents from the "Pandemic" project of the CIA, a persistent implant for Microsoft Windows machines that share files (programs) with remote users in a local network. "Pandemic" targets remote users by replacing application code on-the-fly with a trojaned version if the program is retrieved from the infected machine. To obfuscate its activity, the original file on the file server remains unchanged; it is only modified/replaced while in transit from the pandemic file server before being executed on the computer of the remote user. The implant allows the replacement of up to 20 programs with a maximum size of 800 MB for a selected list of remote users (targets).
As the name suggests, a single computer on a local network with shared drives that is infected with the "Pandemic" implant will act like a "Patient Zero" in the spread of a disease. It will infect remote computers if the user executes programs stored on the pandemic file server. Although not explicitly stated in the documents, it seems technically feasible that remote computers that provide file shares themselves become new pandemic file servers on the local network to reach new targets.
19 May, 2017
Today, May 19th 2017, WikiLeaks publishes documents from the "Athena" project of the CIA. "Athena" - like the related "Hera" system - provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10). Once installed, the malware provides a beaconing capability (including configuration and task handling), the memory loading/unloading of malicious payloads for specific tasks and the delivery and retrieval of files to/from a specified directory on the target system. It allows the operator to configure settings during runtime (while the implant is on target) to customize it to an operation.
According to the documentation (see Athena Technology Overview), the malware was developed by the CIA in cooperation with Siege Technologies, a self-proclaimed cyber security company based in New Hampshire, US. On their website, Siege Technologies states that the company "... focuses on leveraging offensive cyberwar technologies and methodologies to develop predictive cyber security solutions for insurance, government and other targeted markets.". On November 15th, 2016 Nehemiah Security announced the acquisition of Siege Technologies.
In an email from HackingTeam (published by WikiLeaks here), Jason Syversen, founder of Siege Technologies with a background in cryptography and hacking, "... said he set out to create the equivalent of the military’s so-called probability of kill metric, a statistical analysis of whether an attack is likely to succeed. 'I feel more comfortable working on electronic warfare,' he said. 'It’s a little different than bombs and nuclear weapons -- that’s a morally complex field to be in. Now instead of bombing things and having collateral damage, you can really reduce civilian casualties, which is a win for everybody.'" Source:
“Forensic studies of ‘Russian hacking’ into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computer,” the memo states. The memo’s conclusions were based on analyses of metadata provided by the online persona Guccifer 2.0, who took credit for the alleged hack. “Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack.”
Spying Problem of Silicon Valley:
Internal Security Files - Microsoft 1 -
(Facebook Friendship required):
Missing: - Mass Spying, a Global Reality -
Then, after reading all this, add three more names to this formula:
Edward Snowden + Jared Kushner + Donald Trump,
and tell what you get.
The Ant Farm 3 - The Secret Files 2-B - The Las Vegas Tragedy, the Cyberthing strikes:
The Ant Farm 24 - The Ancient Text
The Hunt for the Cyberthing V:
Sutherland Springs, Texas Shooting: Devin Patrick Kelley:
The Hunt for the Cyberthing IV:
The Cyberthing IV - Illegal Alien with Unreported Gun without Gun Licence
And the rest, which is too much to fill in here, and the rest which we have proof, and the rest that we bet there's under, and the rest that spread from the russian, and the rest...
And don't blame me, your politician did it all.
And don't thank me, you've never appreciated me anyway.
And don't judge me, I'm not getting anything out of this.
Eric Schmidt/Bilderberg Group Files:
Eric Schmidt Files:
Eric Schmidt, executive chairman of Google parent Alphabet, says Google's said the search engine's algorithms will be used to limit the reach of RT (Russia Today) and Sputnik, the BBC reported Tuesday. He made the comment Saturday at the Halifax International Security Forum