COLONIAL PIPELINE HACK? Another Carter Ruse to Spike Oil?

Colonial Pipeline shut down a portion of its lines supplying jet fuel, diesel fuel, heating fuel and gas to the east coast amid a data ransomeware hack demanding money.   While only one of their pipelines is devoted to gas, filling stations report being empty already.   The company is owned by the Koch Industry, South Korea government thru a nationalized pension fund, a Crown Corporation, Industry Funds Management – US, and Shell, a Norwegian company.   That being said, a pipeline that is essential for the oil and gas provisions of the east coast is predominantly owned by the UK, South Korea and Koch Brothers. It has had 272 infractions since 2000.  

Currently, the entire website for Colonial is down – although they assure everyone it is unrelated to the malware hack!   Coincidences.

Industry Funds Management:   would also seem to have had their website taken down.

Although the hack occurred nearly a week ago, there appears to be no progress, no discussions with the CISA or FBI to ask for help to remedy the situation despite the fact that a state of emergency has been declared for all states involved.   Gas lines and gas prices have already begun their climb while Biden is asking for oil shipments from Europe to supplement.   Odd given the number of fracking operations he shut down right here.

Colonial owns 15 tank farms which are required to hold a 45 day surplus of fuel.   For some unknown reason, those storage facilities remain untapped.   It takes 14-24 days for a single batch or oil to move through the pipelines to their destination.   Meaning the pipelines – are now full and idle.

Why Biden would request delivery of oil from Europe instead of Canada or Mexico our closest neighbors is puzzling.   Typically delivery from Europe would be quite expensive and take upwards of a ten days to a month for diversion at a premium price.   If fracking had not been shut down there would be no problem.  

Lines reminiscent of the Carter administration will likely develop quickly.   President Carter declared an oil shortage which quickly led to fear and long lines as people stored oil.   Yet a Washington Post expose in 1979 revealed that the crisis was actually a – fraud.   The purpose of the Carter Big Lie was to artificially rake prices higher given a glut had accumulated. As a result, the price of crude rose 50% within less than a year and had more than doubled by 1980.

Raising oil prices has been on the forefront of the Biden Administration!

Charles Koch one of the Colonial owners, the remaining Koch industry behemoth, is currently worth in the neighborhood of $65-$70 billion.   While declaring himself Libertarian, he has aligned with such liberal notables as: Brennan’s Center For American Progress, the ACLU, MacArthur Foundation, and even – Soros Open Society.   He has aligned with Michael Bloomberg on numerous ventures as well.  All of which make his ‘choices’ somewhat suspect.

Is it possible that the Colonial Pipeline ‘Hack’ is actually fake?   Why wouldn’t Colonial’s Executive Team have immediately requested CISA and FBI assistance?   Simply deferring to the fact that they are a private company should be of no consequence given the disruption is a massive public emergency.   But then if the hack was a fake, they would not need any help – would they?

And like President Carter, the purpose is to exponentially raise the price of gasoline across the country as other companies divert to cover the east coast shortages.   Such a diversion would trickle throughout creating shortages elsewhere and a possible doubling of the price of gas at the pump.

The White House has declared that the ransomware attack came from a newly created hacking group, DarkSide.   Apparently this group made themselves known just a year ago, although no actual hack has been declared to be of their volition until – today!   The only historical mention of this group was by Forbes.

Brett Callow, a cybersecurity analyst stated, “Remediation and recovery is not necessarily a quick and easy process, and while essential functionality can be restored more quickly, it can take organizations weeks or even months to fully return to normal operations.”   Colonial has said they should be restored by the end of this week.

However, it is not clear what data was attacked and why it would require shutting down the pipelines at all! In addition, it would appear that some news outlets claim Colonial shut down ALL pipelines, others state that only 2 were shutdown.   Different stories fuel the notion that everything is not straight in Colonialville.   Adding to the curious notion that a group which has not had any presence before is responsible – a lack of information from Colonial’s CEO – and the obscure reason they would not request assistance.

According to a Forbes article, DarkSide announced themselves via the Dark Web.   Their ransomware hacking states that if their financial blackmail is not fulfilled, they will make their data public.   Typically that would involve something confidential such a product in development and secret from competitors, or persons involved in the Dark Web, or legal documents, or persons identities.

It is unknown what data they hold in ransom.

However, it is highly likely that DarkSide would be based in Ukraine as opposed to Russia given previous analytics performed by McAfee on cyber criminals including GandCrab, Sodinokibi, and REvil.

IOWA Caucus: Propaganda Machines Full Speed!

The CEO of Shadow Inc., the startup based out of Denver, CO, employing the Democrat Iowa app that reportedly failed, is Gerard Niermira. Niermira worked on the Hillary campaign in 2016.   He developed the app for the Iowa caucus.   The app apparently failed to count – anyone.   After the hubbaloo Buttigieg claimed he won.  I wonder how he knew…

Niermira’s first interlude into the political arena was in 2005 when he interned for Congressman Eliot Engel.   In 2015, Engel was part of a delegation that traveled to Saudi Arabia to pay their respects to King Salman.   The delegation included: McCain, Mark Warner, Pelosi and Kerry.

His website lists specific people and organizations which have helped launch his business including Clinton, Obama, Apple, Afl-CIO, DNC, Google, and Kiva.   Between 2008 and 2015, Niermira worked for Kiva. We are all well aware of all these affiliates with the exception of one – Kiva:

Kiva is a nonprofit created in 2005 that has a US subsidiary called Kiva City which was launched by Bill Clinton within the Clinton Global Initiative, to make micro-loans.   The interest rates vary from 0% to over 60.5% in countries that don’t have usury laws. Funding for Kiva has come from Google, Omidyar, and the Skoll Foundation.   In addition, The Economist (Rothschild rag) and Oprah both gave it high marks.

The Skoll Foundation is a private foundation with an endowment of over $1.1 billion.   Jeffrey Skoll is a Canadian who was briefly President of Ebay and later founded a movei/media company Participant Media.   Today Skoll is worth nearly $5 billion and operates numerous NGO’s. They do a significant amount of work in conjunction with Al Gore, Jimmy Carter, Kofi Annan, and Sir Richard Branson.

Prior to launching Shadow, Niermira worked at ACRONYM, a political nonprofit that claims to ‘build power and digital infrastructure for the progressive movement’.   ACRONYM’s founder, Tara McGowen, was the digital producer for Obama’s re election campaign in 2012 which was primarily funded by Bill Maher, Ellen Malcolm (Emily’s List), Geoff Garin (political strategist for Obama and Hillary), Paul Begala (Bill Clinton policy advisor), Mary Beth Cahill ( Worked on Kerry’s campaign), and Irwin Jacobs (on the Board of Salk Institute).   Founded in 2015, ACRONYM bought Shadow Inc. in 2019.   According to their analytics, the biggest spenders on Facebook and Google are:   Bloomberg, Steyer, and Bernie, with Schiff placing 5th on Facebook ads. They refer to Schiff as an “MVP”.

In 2016, McGowen ran the largest digital ad campaign for the Democrat Party, Priorities USA Action supporting Hillary’s failed 2016 election campaign.

Basically, Dark Money Propaganda machines, these various tech companies are funded with millions to prop up ad campaigns for Democrats – specifically Biden, Buttigieg, Warren and – Schiff, while creating massive negative campaigns regarding President Trump. However, their LinkedIn page lists an anonymous person as “Senior Organizing Director to Warren For President. No other candidates have a personal director at this organization.  According to their website, they were instrumental in gaining seats for 60 different Progressive candidates in 2018.

ACRONYM’s Senior Director of Campaigns, Tatenda Musapatike, was previously Client Solutions Manager for Facebook, in addition she has worked for The New Media Group, NGP VAN, and the Beekeeper Group which all seem to have ties to Emily’s List.

In addition to the regulars; Hillary, McCaskill, Klobuchar, Feinstein, Kamala, Boxer, etc…, Emily’s List endorsed and funded Ilhan Omar.

The sheer vastness of organizations working behind the scenes in media propaganda, analytics, and tech development is obscene.   Many also work to promote the Liberals in Canadian elections as well.   The billions of dollars involved reflect a maze of Dark Money pay-for-play that we can not even begin to comprehend or conceive.

While Hillary owns to a particular animosity toward Bernie Sanders, her most recent public comment was that nobody likes him.   He is therefore NOT the Democrat Party’s collective candidate. However, the fact that Sanders continues to climb in polls, has been alarming for a party that typically chooses the end candidate well before the nomination.

Iowa has just released its first blather of announcing the leading candidate: Buttiegieg.

JEFF BEZOS Hacked – A Con Job?

A Palestinian writer living in Norway as a refuge, Iyad El-Baghdadi, who has always been a vocal critic of the Saudi regime, has determined that Jeff Bezos phone was hacked using WhatsApp by the Saudi Crown Prince Salman. Why? Because. He goes on to proclaim that the National Enquirer published personal information on Bezos which validates Baghdadi’s claim that it was Prince Salman trying to blackmail Bezos…

WHAT?

The evidence?   Baghdadi says so. And Germany’s Deutsche Welle, the government’s version of CNN, decided the story was true. Why? Because The Guardian published their evidence citing an ‘anonymous person’ who said so.

Apparently, they are oblivious to the fact that New York prosecutors have already uncovered ‘evidence’ that Bezos girlfriend, Lauren Sanchez, shared texts with her brother who then sold them to the media for $200,000.

So now The Guardian and DW are both on the line for printing a libelous and slanderous story in which they falsely claim that the Saudi Prince hacked WhatsApp to blackmail Bezos.   But it doesn’t end there.

The UN decided to jump onboard the libel wagon and has demanded an investigation of Prince Salman based on the story in The Guardian citing an anonymous source!

Iyad El-Baghdadi was born in Kuwait and grew up in the UAE before being deported for ‘no apparent reason’ in 2014 to Abu Dhabi where he was ‘put in prison for doing nothing wrong’.   He was deported from Abu Dhabi to Malaysia where the government said they didn’t want him despite his having done ‘nothing wrong’.   He was suddenly granted a reprieve before he decided to leave anyway, abandoning his wife and newborn son, and turned up in Norway.   He is now in protective custody because the CIA claimed Saudi Arabia might ‘suicide him’.

Yet he has done nothing wrong. Despite being an anarchist who was instrumental in the Middle East Arab Spring uprisings.

While stating that Saudi Prince Salman is responsible for the Bezos hack, it should be stated that WhatsApp is notorious for being hacked – and a quick Google search reveals countless sites that tell ordinary joes how to do it in a matter of minutes.  Sigh.

So Bezos is left with a girlfriend who may have colluded with her brother to sell damning photos and information about her boyfriend, Bezos, which cost Bezos his wife, his children, half his fortune, and his reputation.  Temper.

In the meantime, Bezos ‘long time expert security analyst, Gavin de Becker’, also had no idea who had hacked Bezos phone and apparently went along with the Saudi fueled story because it sounded good to him.

Gavin de Becker, the security expert, is apparently also an author who has appeared on Oprah and written a handful of books. He developed a methodology of security, MOSAIC, that he has sold to government agencies and corporations which purports to ‘predict’ threats before they happen.   He claims MOSAIC does not profile, but instead targets a person who is a known threat and then predicts that this person might do – something.

Lauren Sanchez, Bezos girlfriend, is an entertainment reporter whose credentials include: The View, The Joy Behar Show, Larry King Live, People Magazine as well as cameo appearances in various movies.   Her husband, Patrick Whitesell, who she is divorcing, is a Hollywood agent.

This is sounding like the makings of a movie!  Only the ending might not be so happy.

A married billionaire has an affair with a Hollywood entertainer who then gives texts, photos and information of the affair to her brother so as to break up his marriage, sells said information for hundreds of thousands to a rag outlet, although they attempted to extort for more  $$$$, feed the security detail a rumor that the Saudis did it – which he immediately unequivocally believes – while inciting further Arab Spring retaliation through a refuge who claims to have done nothing but was innocently deported from 4 separate Arab nations and vocally hates Prince Salman, sell the Saudi story to various European media outlets, ignite the UN, all the while the billionaire files for divorce and looses half his fortune, and the girlfriend and her brother are so arrogant that they don’t realize that NY authorities are secretly investigating them in a conspiracy to commit extortion and fraud.

Of course, if it was a book or movie, no one would believe it – agents would claim it could never happen in real life. No one is that stupid, especially a billionaire.

I wonder if Bezos feels miffed or if he believes her innocence?

Crowdstrike: Cyber Security In a Hillary World

President Trump is bringing up an assertion that the previous government of Ukraine in conjunction with a US company, Crowdstrike, had a hand in the Trump Dossier and election meddling in 2016.   Of course the old schoolers are furious that he would even suggest such a bald faced lie given everyone knows the meddling came from Russia – proof positive per Crowdstrike’s in-depth security analysis.   Unfortunately, the Crowdstrike narrative was punched with Swiss cheese holes 2 years ago and while the stream has attempted to bury the story – it still lives!   Damn that Google for not eliminating every piece of evidence!

Any longer, when President Trump makes a comment or statement, no matter how mundane or abrupt, if the media goes berserk it is likely because the comment has backbone.

Crowdstrike was founded in 2011 by: George Kurtz formerly with McAfee, Dmitri Alperovitch also with McAfee whose family had fled the Soviet Union, and Greg Marston whose bio would seem to have been scrubbed.  Interesting…

Shawn Henry, a former Assistant Deputy at the FBI during the Clinton administration, is the current president of Crowdstrike while simultaneously serving and advising NBC, MSNBC and CNBC, while simultaneously serving as faculty at National Association of Corporate Directors. Busy!

Crowdstrike was responsible for the 2016 story that Russia hacked the DNC in order to get dirt on Hillary and favor Trump.  They affirmed this because simultaneously they claimed Russia had immobilized 80% of Ukraine’s missiles and only one country fit the cue – Russia.   This was their analysis.   Their assessment was backed by James Comey.   Since then, the methodology of Crowdstrike’s determination came into question and was found to be highly defective according to The International Institute for Strategic Studies, but even more interestingly, by John McAfee.

McAfee’s point is simply this:   “If you have the wherewithal to pull off a hack of that nature, you’ve got the wherewithal to hide who you are. Otherwise, you shouldn’t be hacking. You know this.

So when someone says, “Oh, the Russians did it,” well, that’s because someone in the incompetent government cybersecurity collective said, “We traced it back, and it sure looks like the Russians because they used a hammertoss, which the Russians always use.

If I’m the Chinese, and I want to make it look like the Russians, I’ll learn how to use hammertoss.”

The point McAfee is making is that simply asserting that a type of code has been used by a hacker in the past and every security expert knows this, it stands to reason that the hack would be hacked.

McAfee further stated, “Hackers have become much more advanced than those trying to protect against them. We’re like puppets on their strings. You know how easy it is to spoof an IP address? Thousands of programs will do it. You can do it multiple times, and it can’t be traced back to you. You can make it point to anyone you want. The fact that it points to anybody at all tells me that’s not the person who did it.”

Other cyber security firms have concurred with McAfee which makes Crowdstrike’s narrative either profoundly incompetent, or it alludes to their bedfellow relationship with Clinton.

Crowdstrike was a nothing company until Google invested $100 million in 2015.   Later additional investments from investment funds including Warberg Pincus helped lift Crowdstrike’s prominence. Warberg’s president is Timothy Geithner who was president of the NY Federal Reserve under Clinton and Secretary of Treasury under Obama. Geithner also serves on the boards of Bank for International Settlements (BIS), Bilderberg Group, and the Center For Global Development.   Geithner’s father and grandfather were principles in the Ford Foundation – a serious manipulator within the mechanisms aligned with Soros Open Society – among others.

When Geithner left his position as Treasury Secretary, he proposed Hillary Clinton as his successor.

Alperovitch is senior fellow at The Atlantic Council.   The initial purpose of the Atlantic Council was to make sure Europe and the US were aligned.   Council members are a who’s who of the liberal Swamp:   Chuck Hagel, James Jones, Susan Rice, Richard Holbrooke, etc… etc… etc… Even the New York Times called out the Atlantic Council for receiving funding from 25 foreign governments. It’s board has consisted of rather interesting fellows from the ranks of Clinton, Bush and Obama.

So why would they be backing a relatively obscure cyber security company, Crowdstrike, when there are literally hundreds of more mature companies to choose from?

Because, they can control the strings.

As McAfee had noted, the intel within the government during the Hillary/Obama reign was operating under the auspices of a bunch of old men with antiquated ideas who had no idea what the cyber world was capable of doing.   McAfee’s recommendation was to offer double salary to the best of the best, overlooking the died purple hair, ring in the nose, gumshoe wearing tye dyed tea shirt manifesto, who regularly smoked weed.   In his esteemed analysis – when you are looking for real cyber security, who the ‘heck’ cares what they look like, if they are the best in the field! Because that is why the US government remains in a pigeonhole of inability to compete – we are so indoctrinated into manners, suits, and Harvard, that we lose what counts – competence.

Instead, in the past, the US government has been more concerned with creating backup companies whose data can conform to a predetermined end point to support an agenda – rather than an analysis of competent, intelligent, fact finding security.

President Trump’s statement with regard to Crowdstrike, is likely the tip of their iceberg about to melt as all things always point back to – Hillary.

Artificial Intelligence: A 2020 Election HACK

In the bizarre world of Artificial Intelligence, an interesting 2020 election hack has the potential to create absolute havoc.

It is called DeepFake, and it essentially creates a clone that cannot be detected by normal photoshop methodology. The clone is created using facial recognition apps that look, talk and act, with all the same mannerisms as the ‘real person’, only it is ‘faked’.

In 2017, a ‘faked’ video of Obama was purposefully uploaded to YouTube to see if it passed the user test.   Researchers at the University of Washington have revealed they created the fake Obama news reel as a test of sorts to determine how authentic it would appear to the general public. It passed with honors.

The Pandora Box this opens is the ability to completely fabricate videos utilizing political candidates as a meme, inserting specific dialogue that fits the agenda, and uploading the video claiming it is bonafide.

While the person may deny it’s authenticity, the damage would be done.

It has recently been revealed that Biden’s son Hunter is an investor in just this sort of Chinese company that is on the US banned list.   Not only is he an ‘investor’, but Hunter owns 10% of the company, Megvii Technology.

Megvii Technology’s main component is facial recognition, Face-App, image recognition.   The exact same technology employed to create the DeepFake, Obama video. With a total equity of $4 billion, Biden’s 10% share would amount to $400 million.   According to the UK government, Megvii is considered the world’s most valuable start-up. But the fact that it originates in China, is no small fear. However, a 10% ownership of ANY company, is not to be overlooked.   To provide perspective; Jeff Bezos, the richest man in the world together with his wife, owned no more than 16% of Amazon shares.

Biden’s 10% take is no Small Pocket Change!

It’s advantage is duel;   it can create a fake Biden making rational conversation, and it can create a fake Trump making irrational conversation. All while the media promotes both as reality.

While these Fakes are predominantly used in the Dark Web, their mainstream usage is likely to be ramped up in the coming election as media outlets vie for first place in fakery.   To answer a question from a fellow blogger, ‘are the Democrats that stupid?’, the answer is more likely they are that ignorant.   With MSM fake news outlets becoming more and more bold in their story algorithm creation, the sheep doth follow blindly.

Of course, the ability to utilize this technology is hardly a party of one.   But the ramifications going forward could be monumental unless a means to identify reality versus AI is available.   However, in the short term, pay attention as this will undoubtedly be used against President Trump.   Specifically thru Biden, Hillary and Obama as they vie for the Title as the most corrupt human being in the history of mankind.

Their Legacy Personified.

AI has many agendas, transhumanism is in the forefront for a host of such notables as Jeff Bezos who believes that his essence can be maintained whilst injecting intelligent quotients and bionic physicality.   Of course, in reality, he is essentially transitioning himself into a ‘robot’. And doesn’t much seem to care.

Like everything else of consequences, Steven Hawking’s fear of AI was based on the obvious – who controls it?   In the case of Magvii Technology, the nitwit, Hunter Biden, would effectively control it, having absolutely no scientific knowledge other than – ‘give me money’.   In essence, Steven Hawking’s worst nightmare!

Having been a major proponent against AI, Hawking may have been more naïve when it came to the behavior of man and held a more idealistic belief in the good of all.   The reality is, Hunter Biden is motivated by one thing and one thing only – Money! And the ramifications of that agenda we have been subjected to for centuries.   And the outcome is not good.

IN the near term, we can anticipate so rather bizarre video’s surfacing that are manufactured.   It is important to Believe in President Trump.

It is important to ascertain what we know and what has been in order to identify what is – tomorrow.

Don’t be Fooled!

Be vigilant.

Biden is more evil and conniving than he portrays.

ELECTRONIC WARFARE: The Corporate Strategy for Liberal World Order

The Munich Security Council is slated to meet this week with diplomats and politicians from possibly 100 countries represented.  Founded in 1963 by Ewald-Heinrich von Kleist, its motto is “Peace through Dialogue”.

The 2018 Conference resulted in the German Foreign Minister accusing Russia, China and the US of undermining the ‘liberal world order’.  Which is true – thankfully, but a rather unpeaceable aligned dialogue.

The 2017 Conference was a tennis match of the US vs Germany chipping away at defense spending, NATO, and demands for a more ‘responsible America’.  And while the bantering was evident on all fronts, some of the guests’ in attendance were notable:

Bill Gates warned that a biological weapon, a genetically modified species, could be used by terrorists, or governments, that would infect computers and infiltrate through the system into monitors/screens around the world and transpose an infectious virus that could kill 30 million people.

Today, the military is developing drones fitted with lasers, which is the equivalent of an unlimited gun magazine, that could take out potentially hundreds or thousands of people in seconds.

The Chinese and US militaries have developed Artificial Intelligence capability which can maneuver the drones and have shown success in beating human pilots.

Russian Navy boats are now being equipped with a newly developed weapon that can presumably cause the target to hallucinate and thus be unable to defend itself or properly aim an attack.  The weapon works by flooding the human nervous system with more light than it can process. In the past, systems using a flood of light or sound have been used for crowd control, but those are Flintstone compared to the advancements made as of today.

In 2015 Chris Roberts, a hacker who founded cyber security firm, One World Labs, announced that he could use his basic laptop computer to hack into the systems of airplanes and control the flight pattern, speed, altitude and direction.   He was forced out of his company which was then reorganized by Mark Turhan and Russell Cohen, and investigated by the FBI.

Conspiracy theories now abound regarding the truth of the 2014 disappearance of Malaysian Airlines 370, wherein 20 employees of the global tech giant, Freescale, perished. Within months of this tragedy Freescale was merged with NXP Technologies a Netherland company for $40 billion.

Freescale was heavily involved in military and defense operations including:   IFF, electronic warfare, HF Radio, Missile Guidance, Avionics and Battlefield Communication.  Freescale has a history of developing various target chips for military warfare.  Electronic Warfare includes radar jamming and deception, electronic masking, and … ‘reprogramming.’   Given M370 detection was not visible on radar, speculation over the use of a cloaking device has been shuffled around.  In addition, the sphere of conspiracy follows:  Blackrock and T Rowe Price each hold roughly 10% of the outstanding shares of NXP, the merged predecessor to Freescale.  State Street Corp owns about 5%.  Blackrock owns 10% of T Rowe Price and about 8% State Street.  Blackrock is the brainchild of Jacob Rothschild.

It was around this time frame that remote car hacking was also revealed wherein a car’s speed, braking, and steering could be externally controlled by a laptop computer.

It would appear that the essence of these warfare tactics is to diffuse the need of a military altogether and reprogram or redirect security into the hands of corporations utilizing engineering expertise and Artificial Intelligence to control targets from the perspective of corporate directives as opposed to national safety.

Ultimately, that would mean the militaries as we know them would become superfluous.  It may also give rise to why Germany and Merkel refuse to construct a military per the NATO Agreement, and per the need for defense. The next generation of military will be Corporations, so why would Merkel spend money on what will be a superfluous organization in a few short years…

This also reveals why the INF Treaty with Russia is defunct and useless.  It exposes why the US has no need to implement this treaty given Nuclear is not the enemy, it is not what we should fear, it is the Bull in a China Shop that has been emptied of china.  It is outdated, out-maneuvered, and a dinosaur in relative weaponry.   Nuclear is – a Distraction.

While the media professes that a deranged Trump is in control of the Nuclear Red Button, the Cabal is rapidly and rabidly gaining control of the Biologic and Electronic Warfare with Jacob Rothschild at the helm and that Agenda is truly deranged, maniacal, and deserving of fear.

Years ago my father co-authored a book on military intelligence and defense.  It is completely obsolete at this juncture as Corporations begin the inevitable takeover.

Russian Election Meddling: As Reported By Mueller’s Hackers

The US Senate hired a 2015 startup company, New Knowledge, to analyze the Russian threat that has been inserted in all our social media platforms targeting conservatives and left leaning African-American citizens.   New Knowledge lists two founders:   Jonathon Morgan a published researcher for the Brookings Institute, Atlantic Council and Washington Post, a former advisor for the State Department where he developed strategies for digital counter-terrorism, and leader for Data For Democracy, an organization targeting white supremacists and far right thinkers with the goal to develop analytics to suppress their blogs. In other words, Mr. Morgan would appear to be heavily leaning toward the left and advocating means to completely obliterate conservative media including blogs.   Ryan Fox is the co-founder of New Knowledge.   He spent 15 years in the SIGINT Divisions of NSA.  

New Knowledge boasts as one of it’s prime investors;  GGV Capital. With offices in Beijing, Shanghai, and San Francisco, their Managing Partners reflect a who’s who of infinitely cyber-secure – China. Of course the irony is not lost that a dominant China company would invest in a US company whose aim is to create analytics to censor all forms of US Media while blaming Russia.

The other venture capital company backing New Knowledge is Lux Capital.   In 2011, former CIA Director under Bill Clinton, James Woolsey, joined Lux as a venture partner.

An obvious question would be why the Senate panel investigating Russian interference in US Social Media would hire a ‘startup company’ to provide their evidence? And why do all roads always point back to Liberal Progressives?

The UK’s Oxford University, and Graphika, a US company whose CEO/founder is Dr. John Kelly, also provided the research for Mueller’s team with regard to Russian interference/meddling.   Kelly is also CEO of Morningside Analytics – a parallel to the now defunct Cambridge Analytics formerly based out of the UK.  In other words, the information Team Mueller is using to build his case against Russia, is derived from UK based intelligence and analytics organizations.   The same UK that created the Trump Dossier.

The New York Times indicates another player in the Mueller Hoax – Canfield Research Group LLC, whose embedded link goes into clouds – literally.   As in, they don’t exist.

And “Somehow” both the New York Times and Washington Post managed to secure a copy of the report before it was released…

The salacious report has been in the making for 3 years – terminology on the left continues to reference election interference, whereas Russian meddling is probably more likely, and not really uncommon.  Obviously, all these US and UK companies with hacktivist hacktivism as their slated specialty are busy meddling wherever they can.  And ultimately censorship is the end game.

 

UPDATE:  New Knowledge, Jonathon Morgan, implicated in Democrat funding of the creation of fake Russian Bots to take down Roy Moore by implying he was funded by Russian intelligence.

Hacking Artificial Intelligence…

Is it Artificial Intelligence that is the real threat, or is it the hackers that can subversively hack the AI that is the true threat?

Assuming that we proceed with the already initiated and implanted AI, how can it be manipulated and/or subverted by hackers to create a super Evil intelligence that owns complete Power and control?  What would it look like?

Stephen Hawking saw AI as the ultimate demise of civilization, humanity and Earth as we know it.   In his view, AI would be the largest existential threat to survival.   But is it really the AI, or is it the manipulation of AI that Hawking saw?

In a world in which everything can be hacked, it is inevitable to assume that AI would be victim as well.   It means that the sweet virtual realities of vacation and sweetness of life can be hacked to subvert a vision of death, chaos and mayhem ultimately reducing the seer to such fear, they virtually implode.  It could alter military plane tactics.  Combat missions.   Weather…  The bounds are infinite.

AI is only so good as it’s security.   And security is virtually – nonexistent.

Ai is a false reality. Hacking that false reality and imposing an alternate reality is an obvious threat, tactic, and ploy, that could effect not just individual responses, but military, business, market and weather – responses.

A hurricane can be hacked to be a sunny day.

A military invasion could be hacked to be – absolutely – nothing.

While the positive implications of AI may be vast, the reality is the flawed mind of humans, and our ability to turn something positive into – death.

Weapons have all been created within the mindset that they would have a positive outcome on the advancement of civilization – even the nuclear bomb.   But in reality, all weapons have done is create a larger potential death toll.   This is AI. Because it’s reach could be limitless.

Perhaps, those that are developing AI have all the best interests at heart.   Perhaps they view the positives, the victories, the paradise lost.   We have been at once searching for this Heaven on earth paradox from the beginning of time.   But instead, we have created a world of greater and greater evil.  Until we feel as though we blindly search for something good, something blessed, something that can give us the strength to continue the battle.

AI in and of itself if touted as something that can enhance learning, education, technology, visual spacing, and much more.   The exponential Mockingbird is to feed and  augment our abilities, and thus our quality of life.   But hacking is a part of our life.  At every level despite supposed military controls.   Planes are being hacked.  Helicopters.  People.  Weather.   Identity.  Everything is hacked and hackable.

The naïve believe that every new technology and science has only positive ramifications.   The reality is we are a people corrupted, flawed, dangerous.   We each have the ability to believe in the vil we commit.

WWII, the Germans committed unspeakable, heinous, vile atrocities.   Perhaps 50-75% of the countries people engaged in these horrific acts.   And yet, they would never have considered themselves capable of such actions just months prior.   Throwing infants into brick walls.   Wanting, desiring, relishing in the absolute pain of others.   Both physical and mental.   These were once ordinary people.

The bad guys, evil, thrives on this.

But imagine when the intelligence has no soul?   There would be a constant ambivalence without a patriot, a dissident, a guardian worthy of doing good.   Because the mind would not exist.  Only action and reaction.

Hacking into a non-reactionary assemblage of wires and circuits, the bounds are no longer remotely defined.

Cain and Abel.  It is born in the beginning.

FACEBOOK; Data Breaches UNHACKED

Data Breaches are the new norm, we have just either forgotten the past cases, or didn’t care. Class Action lawsuits are a joke, the lawyers typically get millions while the clients get minimal cash and sometimes simply a coupon to buy more goods from the defendant.   The Facebook class action is already pooling with lawyers and an “Executive Legal Committee” which will be paid to monitor the merits, fees, billings etc… That’s right, a committee has already been appointed to get part payment of the fees that are likely to implode!

So how many Data Breach class actions are there?   Well there was/is Target, Neiman Marcus, Michaels, Adobe, Snapchat, Kaiser, Boston Medical, Ashley Madison, Equifax, Aetna, Anthem… etc. You get the point.   Hackers are everywhere and our information is constantly hacked.

So you are upset because Facebook used or sold or gave all the information you posted on your ‘About’ page and it was used to – gasp – determine your political bents. Really?   Did you know your Voter ID Card is visible to anyone on Google?   Or howabout the fact that the State and County where you reside posts all your property information and public record data – for anyone to view?   Or howabout Spokeo?   Or the dozens of organizations that, for a fee, will give you information on just about anyone you want to stalk?

Howabout the numerous companies that provide data details for corporations to use for marketing purposes or for sales purposes that were never ‘authorized’?   We used to buy lists at my firm!   Costs varied by the number of targets – 5000, 10,000, 100,000… How do you think you get on phone scam lists? Or junk mail lists?

Did Facebook release your medical records? Your Social Security Number? Your bank account information?   Your credit card data?

Forbes posted an article about the true nature of a class action lawsuit: 

  • In re Heartland Payment Systems Data Security Breach: Out of a purported class of 130 million customers injured by a data breach, 11 claims were paid for a total of $110,000. Lawyers’ take: $641,000.
  • DirectBuy litigation: Class members receive discounts on membership renewals from business that supposedly ripped them off; lawyers get as much as $1 million in fees.

Out of 148 cases that the RAND Corporation researched, the data for four gave the actual settlement statistics.   Lawyers and courts are NOT required to provide this information for the public.   Because in so doing, we might learn what a true ‘Joke’ the process really is.

Cyber attacks are big business, but not necessarily in the way we perceive.   The Veterans Administration alone has reported thwarting 1 billion cyber attacks.   The government has been hacked thousands of times.   Information is rampant.   In 2014, a single U.S. government agency was hit with a blizzard of more than 1,370 external attacks on its most vital computer systems, with three out of every eight incidents resulting in a loss of data, according to a new report by the watchdog Government Accountability Office.” The name of the Agency was not released.   The data was not discussed.

In the ADT Data Breach class action settlement of $16 million each client was awarded ‘up to $45’, while the remainder went to the attorneys.   When Anthem was hacked the lawsuit fetched $115 million – and the clients received ‘free credit monitoring for two years’, and, any provable out-of-pocket expenses incurred as a result of the breach…

In the Target class action attorneys fees amounted to 67.5% of the award.   The stock initially sank 33.33%.   Someone shorted well.   Maybe that is a bigger Legal Issue!   Attorneys and Fund Managers are the winners.

What the lawsuits do is provide a venue for stock manipulation and shorting as the alleged breach is ‘leaked’ by an unknown person as in the Facebook and Cambridge Analytica case.    

APPLE vs The FBI

The Apple vs FBI controversy is gaining momentum and deserves a better overview. It’s implications are not nearly as simplistic as the media is framing:

The San Bernardino case is being used as the catalyst to require that Apple provide a backdoor for the FBI on all iphones in order to combat terrorism. Apple is refusing, claiming that it would be a violation of privacy laws. The media is divided.

The iphone in question is ‘encrypted’. That means that unless you have the key or code you cannot access the data. The encryption protects your personal data, it protects you in the event of theft, and it protects the data on your phone from being hacked. Just as your computer has security features for hacking protection.

There is also available a security feature that erases the data on the phone if the password attempt is incorrect after so many tries. The FBI is demanding that Apple create software that will allow them to correctly guess the password within the range of tries before the security feature erases the data. This software would thus work on any and every iphone – everywhere.

What is interesting is the notion that this feature would only be available to the FBI when in fact, software hackers around the world would be then able to then duplicate – replicate the backdoor and have access to CIA agents, FBI agents, police, civilians and governments…

Given the NSA, cyberwarfare and a technology future, why wouldn’t the FBI simply write the software program themselves? Have other countries already developed the software themselves? While the FBI claims that it is only interested in this one specific iphone (the San Bernardino terrorist’s), Apple has offered to hack the phone for the FBI for free – and still the FBI refuses, because in reality, what they want is access to all.

While Apple continues to state that it will personally hack this one particular phone and the FBI continues to state that it doesn’t want an all inclusive ‘backdoor’, no one seems to be moving forward. If in fact the FBI is not looking for a backdoor then why wouldn’t they accept Apple’s compromise to specifically hack this one phone?

Because words are being played.

According to CEO, Tim Cook, Apple does not have the capability to hack the erase feature of its security. Thus, in essence the FBI is asking for Apple to create a new piece of software that would disable this feature. While the FBI adamantly denies that is their intent, it would be the outcome.

This is not the first time the FBI has requested greater access to privacy. Currently, the FBI is required to obtain a warrant to hack a computer, but they have been attempting to steamroll that security as well.

The argument being misapplied is, “if you don’t have anything to hide, why would you care?”.

I care because it is a violation of our Constitutional right to privacy… The IV Amendment to the Bill of Rights states:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

This is the basis for obtaining and issuing a warrant. Apple has stated it will hack into this one phone on behalf of the FBI to the best of their ability, but abridging the rights of all persons could actually subject Apple to lawsuits as being in violation of the IV Amendment.

Software is like an A-bomb – once created, it can be used for good – and it can be used for evil.

Giving the government unprotected access to everyone’s privacy without a warrant, or probable cause, is Big Brother, and I already have one, his name is Bobby.