Bitcoin Billionaire Hacks, Tips, Hints and Cheats hack ...

Bitcoin 11 Years - Achievements, Lies, and Bullshit Claims So Far - Tooootally NOT a SCAM !!!!

That's right folks, it's that time again for the annual review of how Bitcoin is going: all of those claims, predictions, promises .... how many have turned out to be true, and how many are completely bogus ???
Please post / link this on Bitcoin (I am banned there for speaking the truth, so I cannot do it) ... because it'a way past time those poor clueless mushrooms were exposed to the truth.
Anyway, without further ado, I give you the Bitcoin's Achievements, Lies, and Bullshit Claims So Far ...
.
Bitcoin Achievements so far:
  1. It has spawned a cesspool of scams (2000+ shit coin scams, plus 100's of other scams, frauds, cons).
  2. Many 1,000's of hacks, thefts, losses.
  3. Illegal Use Cases: illegal drugs, illegal weapons, tax fraud, money laundering, sex trafficking, child pornography, hit men / murder-for-hire, ransomware, blackmail, extortion, and various other kinds of fraud and illicit activity.
  4. Legal Use Cases: Steam Games, Reddit, Expedia, Stripe, Starbucks, 1000's of merchants, cryptocurrency conferences, Ummm ????? The few merchants who "accept Bitcoin" immediately convert it into FIAT after the sale, or require you to sell your coins to BitPay or Coinbase for real money, and will then take that money. Some of the few who actually accept bitcoin haven't seen a customer who needed to pay with bitcoin for the last six months, and their cashiers no longer know how to handle that.
  5. Contributing significantly to Global Warming.
  6. Wastes vasts amounts of electricity on useless, do nothing work.
  7. Exponentially raises electricity prices when big miners move into regions where electricity was cheap.
  8. It’s the first "currency" that is not self-sustainable. It operates at a net loss, and requires continuous outside capital to replace the capital removed by miners to pay their costs. It’s literally a "black hole currency."
  9. It created a new way for people living too far from Vegas to gamble all their life savings away.
  10. Spawned "blockchain technology", a powerful technique that lets incompetent programmers who know almost nothing about databases, finance, programming, or blockchain scam millions out of gullible VC investors, banks, and governments.
  11. Increased China's foreign trade balance by a couple billion dollars per year.
  12. Helped the FBI and other law enforcement agents easily track down hundreds of drug traffickers and drug users.
  13. Wasted thousands if not millions of man-hours of government employees and legislators, in mostly fruitless attempts to understand, legitimize, and regulate the "phenomenon", and to investigate and prosecute its scams.
  14. Rekindled the hopes of anarcho-capitalists and libertarians for a global economic collapse, that would finally bring forth their Mad Max "utopia".
  15. Added another character to Unicode (no, no, not the "poo" 💩 character ... that was my first guess as well 🤣)
  16. Provides an easy way for malware and ransomware criminals to ply their trade and extort hospitals, schools, local councils, businesses, utilities, as well as the general population.
.
Correct Predictions:
  1. 2015-12: "1,000 dollar in 2015", u/Luka_Magnotta, aka time traveler from the future, 31-Aug-2013, https://www.reddit.com/Bitcoin/comments/1lfobc/i_am_a_timetraveler_from_the_future_here_to_beg/ (Technically, this prediction is WRONG because the highest price reached in 2015 was $495.56 according to CMC. Yes, Bitcoin reached $1,000 in 2013 and 2014, but that's NOT what the prediction says).
  2. 2017-12: "10,000 in 2017", u/Luka_Magnotta, aka time traveler from the future, 31-Aug-2013, https://www.reddit.com/Bitcoin/comments/1lfobc/i_am_a_timetraveler_from_the_future_here_to_beg/
  3. 2018-04: $10,000 (by April 2018), Mike Novogratz, link #1: https://www.bitcoinprice.com/predictions/, link #2: https://www.bloomberg.com/news/articles/2017-11-21/mike-novogratz-says-bitcoin-will-end-the-year-at-10-000
  4. 2018-12: $10,000 (by 2018), Tim Draper, link #1: https://www.bitcoinprice.com/predictions/, link #2: https://www.youtube.com/watch?v=3AW5s6QkRRY
  5. Any others ? (Please tell me).
.
Bitcoin Promises / Claims / Price Predictions that turned out to be lies and bullshit:
  1. ANONYMOUS
  2. CENSORSHIP RESISTANT
  3. FRICTIONLESS
  4. TRUSTLESS
  5. UNCENSORABLE
  6. UNTRACEABLE
  7. SAFE
  8. SECURE
  9. YOU CANNOT LOSE
  10. NOT A SCAM
  11. PERMISSIONLESS
  12. GUARANTEED PRIVACY
  13. CANNOT BE SEIZED
  14. CANNOT BE CONFISCATED
  15. Be your own bank
  16. Regulation-proof
  17. NO MIDDLEMEN
  18. DECENTRALIZED
  19. Instantaneous transactions
  20. Fast transactions
  21. Zero / No transaction fees
  22. Low transaction fees
  23. A store of value
  24. A deflationary digital asset
  25. "A deflationary digital asset that no single human being can destroy."
  26. "an asset that is equally as dual use as a car, water, or any other traditional element that has existed."
  27. "Digital gold"
  28. Easy to use
  29. Cannot be stolen
  30. Cannot be hacked
  31. Can be mined by anyone
  32. Can be mined by anyone, even with an old computer or laptop
  33. Cannot be centralized
  34. Will return power back to the people.
  35. Not a Ponzi scam
  36. Not a Pyramid scam
  37. Never pay tax again
  38. Your gains cannot be taxed
  39. A currency
  40. An amazing new class of asset
  41. An asset
  42. A means to economic freedom
  43. A store of value
  44. The best investment the word has ever seen
  45. A great investment
  46. Efficient
  47. Scalable
  48. Stable
  49. Resilient
  50. Reliable
  51. Low energy
  52. Low risk
  53. Redistribute wealth to everybody
  54. No more have's and have not's
  55. No more US and THEM
  56. No more disadvantaged people
  57. No more RICH and POOR
  58. No more poor people
  59. Uses amazing new technology
  60. Uses ingenious new technology
  61. Satishi Nakamoto invented ...
  62. Segwit will solve all of Bitcoin's woes
  63. Lightning Network will solve all of Bitcoin's woes
  64. Limited by scarcity
  65. Can only go up in value
  66. Price cannot crash
  67. Has intrinsic value
  68. Value will always be worth more than cost to mine
  69. Adoption by investors is increasing exponentially
  70. Adoption by investors is increasing
  71. Adoption by merchants is increasing exponentially
  72. Adoption by merchants is increasing
  73. You are secure if you keep your coins on an exchange
  74. You are secure if you keep your coins in a hardware wallet
  75. You are secure if you keep your coins in an air-gapped Linux PC
  76. Will change the world
  77. "the next phase in human evolution"
  78. "Blockchain is more encompassing than the internet"
  79. Blockchain can solve previously unsolvable problems.
  80. "The only regulation we need is the blockchain"
  81. "Bank the unbanked"
  82. "To abolish financial slavery and the state's toxic monopoly on money."
  83. "To have better tools in the fight against the state violence and taxation."
  84. "To stamp information on a blockchain forever so we can bypass state censorship, copyrights, patents(informational monopolies) etc."
  85. Will destroy / overthrow FIAT
  86. Will destroy / overthrow the world's governments
  87. Will destroy / overthrow the banking system
  88. Will destroy / overthrow the world economies
  89. Will free people from tyranny
  90. Will give people financial freedom
  91. Will bring world peace
  92. Never going below $19K again
  93. Never going below $18K again
  94. Never going below $17K again
  95. Never going below $16K again
  96. Never going below $15K again
  97. Never going below $14K again
  98. Never going below $13K again
  99. Never going below $12K again
  100. Never going below $11K again
  101. Never going below $10K again
  102. Never going below $9K again
  103. Never going below $8K again
  104. Never going below $7K again
  105. Never going below $6K again
  106. Never going below $5K again
  107. Never going below $4K again
  108. Is NOT a Scam
  109. Hashing Power secures the Bitcoin network
  110. Untraceable, private transactions
  111. Guaranteed privacy
  112. Not created out of thin air
  113. Not created out of thin air by unregulated, unbacked entities
  114. Totally NOT a scam
  115. Is not used primarily by crimonals, drug dealers, or money launderers.
  116. 100% secure
  117. 2010 will be the "Year of Crypto"
  118. 2011 will be the "Year of Crypto"
  119. 2012 will be the "Year of Crypto"
  120. 2013 will be the "Year of Crypto"
  121. 2014 will be the "Year of Crypto"
  122. 2015 will be the "Year of Crypto"
  123. 2016 will be the "Year of Crypto"
  124. 2017 will be the "Year of Crypto"
  125. 2018 will be the "Year of Crypto"
  126. 2019 will be the "Year of Crypto"
  127. 2010: MASS ADOPTION any day now"
  128. 2011: MASS ADOPTION aany day now"
  129. 2012: MASS ADOPTION aaany day now"
  130. 2013: MASS ADOPTION aaaany day now"
  131. 2014: MASS ADOPTION aaaaany day now"
  132. 2015: MASS ADOPTION aaaaaany day now"
  133. 2016: MASS ADOPTION aaaaaaany day now"
  134. 2017: MASS ADOPTION aaaaaaaany day now"
  135. 2018: MASS ADOPTION aaaaaaaaany day now"
  136. 2019: MASS ADOPTION aaaaaaaaany day now"
  137. "Financial Freedom, bro."
  138. no single entity, government or individual, can alter or reverse its transactions
  139. insurance against the tyranny of state
  140. Bitcoin has come to destroy all governments and bring about the libertarian utopia of my dreams.
  141. The major issues in Bicoin's network will be fixed. This is still early days, Bitcoin has only been around for 2+ years.
  142. The major issues in Bicoin's network will be fixed. This is still early days, Bitcoin has only been around for 5+ years.
  143. The major issues in Bicoin's network will be fixed. This is still early days, Bitcoin has only been around for 7+ years.
  144. The major issues in Bicoin's network will be fixed. This is still early days, Bitcoin has only been around for 9+ years.
  145. 1,000's of predictions of skyrocketing and/or never falling prices
  146. Escape the petty rivalries of warring powers and nation states by scattering control among the many. The Bitcoin Cash debacle proves that even the most cryptographically secure plans of mice and men often go awry. Ref: https://www.reddit.com/Buttcoin/comments/9zfhb6/like_theres_only_one_flaw_with_buttcoin_crash/ea8s11m
  147. People will NEVER be able to welch out of bets or deals again. Nov-2018, Ref: https://www.reddit.com/Buttcoin/comments/9zvpl2/the_guy_who_made_the_1000_bet_that_btc_wouldnt/
  148. "Everything will be better, faster, and cheaper.", Brock Pierce, EOS.io shill video.
  149. "Everything will be more connected.", Brock Pierce, EOS.io shill video.
  150. "Everything will be more trustworthy.", Brock Pierce, EOS.io shill video.
  151. "Everything will be more secure.", Brock Pierce, EOS.io shill video.
  152. "Everything that exists is no-longer going to exist in the way that it does today.", Brock Pierce, EOS.io shill video.
  153. "Everything in this world is about to get better.", Brock Pierce, EOS.io shill video.
  154. You are a slave to the bankers
  155. The bankers print money and then you pay for it
  156. Bitcoin is The Peoples Money
  157. Bitcoin will set you free
  158. Bitcoin will set you free from the slavery of the banks and the government Ref: https://www.reddit.com/Bitcoin/comments/cd2q94/bitcoin_shall_set_you_free/
  159. ~~Bitcoin is "striking fear into the hearts of bankers, precisely because Bitcoin eliminates the need for banks. ~~, Mark Yusko, billionaire investor and Founder of Morgan Creek Capital, https://www.bitcoinprice.com/predictions/
  160. "When transactions are verified on a Blockchain, banks become obsolete.", Mark Yusko, billionaire investor and Founder of Morgan Creek Capital, https://www.bitcoinprice.com/predictions/
  161. SnapshillBot quotes from delusional morons:
  162. "A bitcoin miner in every device and in every hand."
  163. "All the indicators are pointing to a huge year and bigger than anything we have seen before."
  164. "Bitcoin is communism and democracy working hand in hand."
  165. "Bitcoin is freedom, and we will soon be free."
  166. "Bitcoin isn't calculated risk, you're right. It's downright and painfully obvious that it will consume global finance."
  167. "Bitcoin most disruptive technology of last 500 years"
  168. "Bitcoin: So easy, your grandma can use it!"
  169. "Creating a 4th Branch of Government - Bitcoin"
  170. "Future generations will cry laughing reading all the negativity and insanity vomited by these permabears."
  171. "Future us will thank us."
  172. "Give Bitcoin two years"
  173. "HODLING is more like being a dutiful guardian of the most powerful economic force this planet has ever seen and getting to have a say about how that force is unleashed."
  174. "Cut out the middleman"
  175. "full control of your own assets"
  176. "reduction in wealth gap"
  177. "no inflation"
  178. "cannot print money out of thin air"
  179. "Why that matters? Because blockchain not only cheaper for them, it'll be cheaper for you and everyone as well."
  180. "If you are in this to get rich in Fiat then no. But if you are in this to protect your wealth once the current monetary system collapse then you are protected and you'll be the new rich."
  181. "Theres the 1% and then theres the 99%. You want to be with the rest thats fine. Being different and brave is far more rewarding. No matter your background or education."
  182. "NO COINERS will believe anything they are fed by fake news and paid media."
  183. "I know that feeling (like people looking at you as in seeing a celebrity and then asking things they don't believe until their impressed)."
  184. "I literally walk round everyday looking at other people wondering why they even bother to live if they don't have Bitcoin in their lives."
  185. "I think bitcoin may very well be the best form of money we’ve ever seen in the history of civilization."
  186. "I think Bitcoin will do for mankind what the sun did for life on earth."
  187. "I think the constant scams and illegal activities only show the viability of bitcoin."
  188. "I think we're sitting on the verge of exponential interest in the currency."
  189. "I'm not using hyperbole when I say Satoshi found the elusive key to World Peace."
  190. "If Jesus ever comes back you know he's gonna be using Bitcoin"
  191. "If this idea was implemented with The Blockchain™, it would be completely flawless! Flawless I tell you!"
  192. "If you're the minimum wage guy type, now is a great time to skip food and go full ramadan in order to buy bitcoin instead."
  193. "In a world slipping more and more into chaos and uncertainty, Bitcoin seems to me like the last solid rock defeating all the attacks."
  194. "In this moment, I am euphoric. Not because of any filthy statist's blessing, but because I am enlightened by own intelligence."
  195. "Is Bitcoin at this point, with all the potential that opens up, the most undervalued asset ever?"
  196. "It won't be long until bitcoin is an everyday household term."
  197. "It's the USD that is volatile. Bitcoin is the real neutral currency."
  198. "Just like the early Internet!"
  199. "Just like the Trojan Horse of old, Bitcoin will reveal its full power and nature"
  200. "Ladies if your man doesnt have some bitcoin then he cant handle anything and has no danger sex appeal. He isnt edgy"
  201. "let me be the first to say if you dont have bitcoin you are a pussy and cant really purchase anything worldwide. You have no global reach"
  202. "My conclusion is that I see this a a very good thing for bitcoin and for users"
  203. "No one would do such a thing; it'd be against their self interests."
  204. "Ooh lala, good job on bashing Bitcoin. How to disrespect a great innovation."
  205. "Realistically I think Bitcoin will replace the dollar in the next 10-15 years."
  206. "Seperation of money and state -> states become obsolete -> world peace."
  207. "Some striking similarities between Bitcoin and God"
  208. "THANK YOU. Better for this child to be strangled in its crib as a true weapon for crypto-anarchists than for it to be wielded by toxic individuals who distort the technology and surrender it to government and corporate powers."
  209. "The Blockchain is more encompassing than the internet and is the next phase in human evolution. To avoid its significance is complete ignorance."
  210. "The bull run should begin any day now."
  211. "The free market doesn't permit fraud and theft."
  212. "The free market will clear away the bad actors."
  213. "The only regulation we need is the blockchain."
  214. "We are not your slaves! We are free bodies who will swallow you and puke you out in disgust. Welcome to liberty land or as that genius called it: Bitcoin."
  215. "We do not need the bankers for Satoshi is our saviour!"
  216. "We have never seen something so perfect"
  217. "We must bring freedom and crypto to the masses, to the common man who does not know how to fight for himself."
  218. "We verified that against the blockchain."
  219. "we will see a Rennaisnce over the next few decades, all thanks to Bitcoin."
  220. "Well, since 2006, there has been a infinite% increase in price, so..."
  221. "What doesn't kill cryptocurrency makes it stronger."
  222. "When Bitcoin awake in normally people (real people) ... you will have this result : No War. No Tax. No QE. No Bank."
  223. "When I see news that the price of bitcoin has tanked (and thus the market, more or less) I actually, for-real, have the gut reaction "oh that’s cool, I’ll be buying cheap this week". I never knew I could be so rational."
  224. "Where is your sense of adventure? Bitcoin is the future. Set aside your fears and leave easier at the doorstep."
  225. "Yes Bitcoin will cause the greatest redistribution of wealth this planet has ever seen. FACT from the future."
  226. "You are the true Bitcoin pioneers and with your help we have imprinted Bitcoin in the Canadian conscience."
  227. "You ever try LSD? Perhaps it would help you break free from the box of state-formed thinking you have limited yourself..."
  228. "Your phone or refrigerator might be on the blockchain one day."
  229. The banks can print money whenever they way, out of thin air, so why can't crypto do the same ???
  230. Central Banks can print money whenever they way, out of thin air, without any consequences or accounting, so why can't crypto do the same ???
  231. It's impossible to hide illegal, unsavory material on the blockchain
  232. It's impossible to hide child pornography on the blockchain
  233. Fungible
  234. All Bitccoins are the same, 100% identical, one Bitcoin cannot be distinguished from any other Bitcoin.
  235. The price of Bitcoin can only go up.
  236. "Bubbles are mathematically impossible in this new paradigm. So are corrections and all else", John McAfee, 7 Dec 2017 @ 5:09 PM,https://mobile.twitter.com/officialmcafee/status/938938539282190337
  237. Scarcity
  238. The price of Bitcoin can only go up because of scarcity / 21 million coin limit. (Bitcoin is open source, anyone can create thir own copy, and there are more than 2,000+ Bitcoin copies / clones out there already).
  239. immune to government regulation
  240. "a world-changing technology"
  241. "a long-term store of value, like gold or silver"
  242. "To Complex to Be Audited."
  243. "Old Auditing rules do not apply to Blockchain."
  244. "Old Auditing rules do not apply to Cryptocurrency."
  245. "Why Bitcoin has Value: SCARCITY.", PlanB, Coin Shill, 22-Mar-2019, https://medium.com/@100trillionUSD/modeling-bitcoins-value-with-scarcity-91fa0fc03e25
  246. "Bitcoin is the first scarce digital object the world has ever seen, it is scarce like silver & gold, and can be sent over the internet, radio, satellite etc.", PlanB, Coin Shill, 22-Mar-2019, https://medium.com/@100trillionUSD/modeling-bitcoins-value-with-scarcity-91fa0fc03e25
  247. "Surely this digital scarcity has value.", PlanB, Coin Shill, 22-Mar-2019, https://medium.com/@100trillionUSD/modeling-bitcoins-value-with-scarcity-91fa0fc03e25
  248. Bitcoin now at $16,600.00. Those of you in the old school who believe this is a bubble simply have not understood the new mathematics of the Blockchain, or you did not cared enough to try. Bubbles are mathematically impossible in this new paradigm. So are corrections and all else", John McAfee, 7 Dec 2017 @ 5:09 PM,https://mobile.twitter.com/officialmcafee/status/938938539282190337
  249. "May 2018 will be the last time we ever see $bitcoin under $10,000", Charlie Shrem, bitcoin advocate and convicted felon, 11:31 AM 3-May-2018, https://twitter.com/CharlieShrem/status/992109375555858433
  250. "Last dip ever.", AngeloBTC, 14 Oct 2018, https://mobile.twitter.com/AngeloBTC/status/1051710824388030464/photo/1
  251. "Bitcoin May Have Just Experienced its Final Shakeout Before a Big Rally", Joseph Young, coin shill, October 15, 2018 22:30 CET, https://www.ccn.com/bitcoin-may-have-just-experienced-its-final-shakeout-before-a-big-rally/
  252. Bitcoin would be a buy if the price fell under $5,000., Mohamed El-Erian, chief economic advisor at Allianz, 29-Jun-2018, https://www.ccn.com/bitcoin-a-buy-below-5000-says-allianz-chief-economic-adviso
  253. 2013-11-27: ""What is a Citadel?" you might wonder. Well, by the time Bitcoin became worth 1,000 dollar [27-Nov-2013], services began to emerge for the "Bitcoin rich" to protect themselves as well as their wealth. It started with expensive safes, then began to include bodyguards, and today, "earlies" (our term for early adapters), as well as those rich whose wealth survived the "transition" live in isolated gated cities called Citadels, where most work is automated. Most such Citadels are born out of the fortification used to protect places where Bitcoin mining machines are located. The company known as ASICminer to you is known to me as a city where Mr. Friedman rules as a king.", u/Luka_Magnotta, aka time traveler from the future, 31-Aug-2013, https://www.reddit.com/Bitcoin/comments/1lfobc/i_am_a_timetraveler_from_the_future_here_to_beg/
  254. 2018-02: Bitcoin price to hit $27,000 by February 2018, Trace Mayer, host of the Bitcoin Knowledge Podcast, and self-proclaimed entrepreneur, investor, journalist, monetary scientist and ardent defender, Link #1: https://mobile.twitter.com/TraceMayestatus/917260836070154240/photo/1, Link #2: https://www.bitcoinprice.com/predictions/
  255. 2018-06: "Bitcoin will surpass $15,000 in June [2018]." John McAfee, May 25, 2018, https://bitcoinist.com/john-mcafee-says-bitcoin-will-surpass-15000-in-june/
  256. 2018-07: Bitcoin will be $28,000 by mid-2018, Ronnie Moas, Wall Street analyst and founder of Standpoint Research, http://helpfordream.com/2018/12/23/5-bitcoin-price-predictions-gone-wrong/.
  257. 2018-12: Bitcoin to reach a price of between 40,000 and 110,000 US dollars by the end of the 2017 bull run ... sometime before 2019, Masterluc, 26-May-2017, an anonymous "legendary" Bitcoin trader, Link #1: https://www.tradingview.com/chart/BTCUSD/YRZvdurN-The-target-of-current-bubble-lays-between-40k-and-110k/, Link #2: https://www.bitcoinprice.com/predictions/
  258. 2018-12: "There is no reason why we couldn’t see Bitcoin pushing $50,000 by December [2018]", Thomas Glucksmann, head of APAC business at Gatecoin, Link #1: https://www.bitcoinprice.com/predictions/
  259. 2018-12: Listen up you giggling cunts... who wants some?...you? you want some?...huh? Do ya? Here's the deal you fuckin Nerds - Butts are gonna be at 30 grand or more by next Christmas [2018] - If they aren't I will publicly administer an electronic dick sucking to every shill on this site and disappear forever - Until then, no more bans or shadow bans - Do we have a deal? If Butts are over 50 grand me and Lammy get to be mods. Deal? Your ole pal - "Skully" u/10GDeathBoner, 3-Feb-2018 https://www.reddit.com/Buttcoin/comments/7ut1ut/listen_up_you_giggling_cunts_who_wants_someyou/
  260. 2018-12: 1 bitcoin = 1 Lambo. Remind me on Christmas eve [2018] u/10GDeathBoner, 3-Feb-2018, https://www.reddit.com/Buttcoin/comments/7ut1ut/listen_up_you_giggling_cunts_who_wants_someyou/dtn2pna
  261. 2018-12: Been in BTC since 2014 and experienced many "deaths" of BTC... this too shall pass... $10k end of the year. [2018] u/Exxe2502, 30-Jun-2018 https://reddit.com/Bitcoin/comments/8uur27/_/e1ioi5b/?context=1
  262. 2018-12: "Yale Alumni prediction - 30 Grand by Christmas [2018] - and you my friend... you will be the one eating Mcafee's dick in 2020. :) -:", u/SirNakamoto, 15-Jun-2018, https://www.reddit.com/Buttcoin/comments/8r0tyh/fdic_agrees_to_cover_bitcoin_losses_in_event_of/e0nzxq7
  263. 2018-12: "Impossible For Bitcoin Not to Hit $10,000 by This Year (2018)", Mike Novogratz, a former Goldman Sachs Group Inc. partner, ex-hedge fund manager of the Fortress Investment Group and a longstanding advocate of cryptocurrency, 22-Sep-2018, https://www.newsbtc.com/2018/09/22/billionaire-novogratz-impossible-for-bitcoin-not-to-hit-10000-by-this-yea
  264. 2018-12: "[Bitcoin] between $13,800 and $14,800 [by end of 2018]", Fundstrat's Tom Lee, 13-Dec-2018, https://www.cnbc.com/2018/12/13/wall-streets-bitcoin-bull-tom-lee-we-are-tired-of-people-asking-us-about-target-prices.html
  265. 2018-12: "Bitcoin is going to be $15k-$20k by the end of the year (2018)", Didi Taihuttu, 1-Nov-2018, https://www.wsj.com/video/series/moving-upstream/the-bitcoin-gamble/85E3A4A7-C777-4827-9A3F-B387F2AB7654
  266. 2018-12: 2018 bitcoin price prediction reduced to $15,000 [was $25,000], Fundstrat's Tom Lee, 16-Nov-2018, https://www.cnbc.com/2018/11/16/wall-streets-crypto-bull-tom-lee-slashes-year-end-forecast-by-10000.html
  267. 2018-12: "I want to be clear, bitcoin is going to $25,000 by year end (2018)", Fundstrat's Tom Lee, 5-Jul-2018, https://www.cnbc.com/video/2018/07/05/tom-lee-i-want-to-be-clear-bitcoin-is-going-to-25000-by-year-end.html
  268. 2018-12: "Bitcoin could be at $40,000 by the end of 2018, it really easily could", Mike Novogratz, a former Goldman Sachs Group Inc. partner, ex-hedge fund manager of the Fortress Investment Group and a longstanding advocate of cryptocurrency, 21-Sep-2018, https://www.youtube.com/watch?v=6lC1anDg2KU
  269. 2018-12: "Bitcoin will be priced around $50,000 by the end of the year (2018)", Bitcoin bull Arthur Hayes, co-founder and CEO of BitMEX, 29-Jun-2018, https://www.cnbc.com/2018/06/29/bitcoin-will-reach-50000-in-2018-says-founder-of-bitcoin-exchange.html
  270. 2018-12: "Bitcoin could definitely see $50,000 in 2018", Jeet Singh, cryptocurrency portfolio manager, speaking in January 2018 at the World Economic Forum in Davos, https://www.dcforecasts.com/new-prediction-says-bitcoin-hit-50000-2018/
  271. 2018-12: "Bitcoin will hit $100,000 this year (2018)", Kay Van-Petersen, an analyst at Saxo Bank, 17-Jan-2018, https://www.cnbc.com/2018/01/16/bitcoin-headed-to-100000-in-2018-analyst-who-forecast-2017-price-move.html
  272. 2018-12: "Bitcoin price to surpass the $100,000 mark by the end of 2018", Tone Vays, 21-Sep-2017, https://www.ccn.com/prominent-bitcoin-trader-price-is-heading-towards-100000-in-2018/
  273. 2018-12: "Bitcoin’s Price Will Surpass the $100,000 Mark by the End of 2018", Anonymous ("author" obviously too embarrassed to put his name to such bullshit "articles"), Oct-2018, https://investingpr.com/bitcoin-price-predictions-for-2018/
  274. 2018-12: "Our [2018] year-end bitcoin target is $7700.", James Stefurak, Founder at Monarch Research. See article: "Experts Forecast Bitcoin will rise by 2019", REF: https://hackernoon.com/experts-forecast-bitcoin-will-rise-by-2019-f4af8807036b?gi=dfea3c30d6d8
  275. 2018-12: "... we’ll see the price rally reaching its all-time of high of around $20K before the end of 2018", Khaled Khorshid, Co-Founder at Treon ICO. See article: "Experts Forecast Bitcoin will rise by 2019", REF: https://hackernoon.com/experts-forecast-bitcoin-will-rise-by-2019-f4af8807036b?gi=dfea3c30d6d8
  276. 2018-12: Bitcoin will end 2018 at the price point of $50,000, Ran Neuner, host of CNBC’s show Cryptotrader and the 28th most influential Blockchain insider according to Richtopia,https://www.bitcoinprice.com/predictions/
  277. Plus a whole host of wrong 2019 predictions (could not be included here because of post character limit issues), so please see my earlier post from 4 days ago: Ummm, remember those "Expert" Bitcoin Price Predictions for 2019 ..... ohhhhh dear ....., https://www.reddit.com/Buttcoin/comments/eiqhq3/ummm_remember_those_expert_bitcoin_price/
.
But it's NOT all bad news, some claims and promises are yet to be determined:
  1. Never going below $3K again
  2. Never going below $2K again
  3. Never going below $1K again
  4. Any others ? Please let me know.
submitted by Crypto_To_The_Core to Buttcoin [link] [comments]

Evidence that the mods of /r/Bitcoin may have been involved with the hacking and vote manipulation "attack" on /r/Bitcoin.

While running the Censorship Notifier Bot, we generally try to stay out of any specific situations regarding any subreddits we monitor. But the very nature of the CNBot requires it to collect and store large amounts of data, and requires us to be aware of normal trends within a subreddit to ensure the bot is running correctly. Specifically, the bot needs to know exactly what was on the site at a specific time, and when things disappear from the site. This data positions us to diligently analyze events and check real data as we go. When we first began looking at the massive downvoting attack as shown in BashCo's previously stickied thread last week, the first thing we noticed was that both of the bot-voted comments ( Image of #1, link to #2 ) would normally trigger our censorship notifier detection. Both "censoring" and "censorship" are trigger words we have found triggering automatic removal, something we later confirmed again. This would imply that either the comments were explicitly approved by the moderators at that time, or our understanding of the subreddit's policies needed updating. We began to dig into the data available, and those findings lead us to the conclusion that we must publish what we had found. Note: All times are in UTC; Some references are moved to the end of the document, tagged as [REF-1], [REF-2], etc.

Overview

We'll start out by giving a rough picture of the events that transpired. The bots which were downvoting comments and posts on /Bitcoin and upvoting posts on /btc began their attack on 11/14/2017 at around 18:00 utc. A similar unusual pattern of voting appeared on /btc around the same time the day before, though less dramatically. The bots seemed to be pushing people to buy Bitcoin Cash in such a blatant way that it even left a bad taste in the mouths of Bitcoin Cash supporters. Both the attack the day before and the /Bitcoin bot voting attack on 11/14/2017 ended before or around 22:00 utc [REF-3]. The bots attacking /Bitcoin upvoted posts complaining about high fees and downvoted about 30 other /Bitcoin posts. At the same time they upvoted posts on /btc. We identified 65 comments downvoted by bots in /Bitcoin and 2 upvoted. The conclusions appeared to indicate that the bots were promoting Bitcoin Cash and /btc and harming /Bitcoin.

Suspicious comment #1

We began investigating into the comments that caught our eye at first, referred to as [CU-1] and [CU-2] for short. [CU-1]'s content can be seen here as it originally looked. Immediately we noticed the next oddity - How were people able to see votes in /Bitcoin to discuss voting in the first place? /Bitcoin has blocked votes from being visible on comments during discussion for years. When did that change? We found that it changed right before [CU-1] was posted. BashCo stickied a comment stating they would "pull back the curtains" at 20:49, and archive.org confirmed that scores became visible between 20:32 utc and 20:50 utc. That, oddly enough, was just 13 minutes before [CU-1] was posted at 21:02:25.
We have determined that [CU-1] was indeed blocked by /Bitcoin's automoderator rules as we expected. The screenshot taken by /Bitcoin moderator StopAndDecrypt clearly shows this, as the "moderator approved" checkmark is present. We also tested automoderator rules with an aged account with karma and confirmed that "censors" and "censoring" were both blocked [REF-1]. Note that the poster, darwin2500 (under control of hacker, please don't ping them; they aren't a Bitcoiner) could not have been an "approved submitter" - they seem to have only had one comment in /Bitcoin before the hacking. So why was the comment manually approved? We are not aware of any other approved or allowed comments that blatantly reference censorship like that in the last several months. The obvious answer is that after "pulling back the curtain" and making votes visible, the /Bitcoin mods wanted to give people an opportunity to see this voting manipulation in action.
Except this idea did not hold up. We found 10 similar comments from the same time period which were not approved or were explicitly removed unlike [CU-1]. Some of these were uncannily similar to the original comment. For example this one was submitted 8 minutes after [CU-1] and never approved. Another here supported neither subreddit and was blocked at 21:48 and never approved. This one accused /Bitcoin mods of being paid by Blockstream and was manually removed at ~22:35. A fourth was identical to [CU-2] and blocked at 00:12 and never approved. The same account of [CU-1] submitted a second comment 5 minutes after [CU-1] and was blocked and not approved. The other 5 things blocked or removed around the same time were: [1] [2] [3] [4] [5]. The existence or absence of most of these comments around the claimed time can be verified independently of the censorship_notifier, see [REF-2]
But the why wasn't the only oddity. [CU-1] was submitted, approved, upvoted, and screenshotted all in less than 180 seconds, as shown by its screenshot ("2 minutes" rounds down on Reddit). That is an extremely short time for an automoderated comment to be approved based on what we have observed and in checking other subreddits open modlogs on approvals. Perhaps the moderators were very snappy about approving comments within this particular thread? Once again, this idea did not hold up. This comment appears to have been manually approved as it wasn't seen until the third scan after its supposed creation, ~11 minutes of delay. Perhaps only when the comment was a direct reply to BashCo? Still no - Here's a comment that was a direct reply to BashCo, but didn't show up in scans for 45 minutes. Here specifically the our data can be independently checked - This snapshot does not show the comment, but this one does.
Despite all the comments being blocked or removed as normal that we found, what we did not find was any other examples of anti-Bitcoin comments approved or allowed except the comments the bots upvoted. Three snapshots([1] [2] [3]) of the thread in question show no other strongly anti-Bitcoin comments present except [CU-1] and [CU-2]; Why did the moderators specifically allow [CU-1] and [CU-2] and nothing else? Perhaps they wanted to reveal the voting patterns, but then why only those comments? Further, by the time of [CU-1], the bot had not upvoted any comments at all. Why would the moderators assume that particular comment and no others would be upvoted, a mere 13 minutes after they "pulled back the curtain?"
In addition to the data we're referenced, our claims about the moderation of [CU-1] can be verified by either the admins or any current moderators of /Bitcoin, as moderator log events cannot be deleted. If anyone sends us an image of the moderator who approved this comment(preferably with full HH:MM:SS timestamp!) we will add the image to this post and keep their identity anonymous.

How did the bots pick targets?

The next thing we investigated was the behavior of the bots during the "attack". How many posts and comments did they downvote? How many did they upvote? What did they pick and were there any obvious correlations? We initially identified only two posts inside /Bitcoin that were upvoted by the bots - Both being posts about long delays on the OP's transaction confirmations. The first post was removed by moderators but otherwise no one seemed to notice the sudden upvotes. The second post upvoted on the other hand had users commenting on the upvotes within 8 minutes of it being posted and had several comments downvoted within it by the bots. Generally (but not always) the targets of the bots got 200-250 votes, either up or down [REF-3]. Even before the moderators of /Bitcoin revealed comment scores, users were commenting on the obviousness of the downvotes (edits). We found images from hacked users which showed what posts the bots chose to upvote and downvote, which further helped us identify as many of the posts as possible [REF-4] [REF-5].
The comments upvoted, too, were specifically chosen. Both comments upvoted were ones attacking /Bitcoin over censorship, and without any subtlety. Both comments were in the primary stickied thread with most of the comment downvotes. We quickly determined that the account that posted [CU-1] was under the control of the hacker, something other users also concluded. [CU-2] was posted by a clear /Bitcoin supporter based on history. Both comments used words that /Bitcoin's automod rules normally silently block [REF-1]. Other comments that subtly denigrated the subreddit's policies were noticed by the bot - but were downvoted instead of upvoted. Why?
The comments and posts chosen for downvoting were all over the place. Many of the comments chosen for downvoting seems to have been simply "because they were there in the thread" - For example every single comment visible in before 20:50 was downvoted. BashCo was targeted more than any other user(8 comments), but the bot generally didn't seem to focus on specific users. The vast majority of comments downvoted(54/65) happened in the stickied post, with 6 more happening in the second upvoted post. The remaining 5 comments downvoted were scattered across 4 different posts [REF-3]. The bot specifically went after comments and posts talking about downvotes, the accounts hack, or the attack itself [REF-5] but they also downvoted neutral posts. The voting seemed to come almost exclusively in waves targeting one thing at a time, which made the bot votes obvious to anyone who was looking for them - which people were, since many posts targeted were about the downvotes.
We also noticed that an extremely high number of /Bitcoin and /btc users were reporting that they themselves were hacked and part of the bot attack. We identified 35 such users, but the highest number of votes seen on a single thing indicate between 250-300 accounts involved with the attack. Over 10% of the hacked users were Bitcoiners, what are the chances of that? Well, Reddit has (very) roughly 50 million accounts, and the CN database indicates that about ~50k are regular or semi-regular /Bitcoin and /btc users, which is 1/1000th. 35 / 300 of hacked users being regular Bitcoin users and feeling the need to post about it is > 1/10th. Whoever was running this bot seems to have intentionally chosen Bitcoin users - It seems like they wanted the hacked users to see the results of the hack.
The result of all of this was that many many people commented on the blatantness of the voting, with many of them suspicious as to why anyone would do such a blatant attack. More examples: [1] [2] [3] [4] [5] [6] [7] [8] [9]. Amidst all of this there was one exception so subtle that we almost missed it - There were two posts voted on that ran completely contrary to the rest of the behavior of the bot. The first image showed upvotes on a pro-/Bitcoin post "PSA: Attack on Bitcoin" thread and a downvote for the anti-/Bitcoin "awkward meme orgy" /btc thread. At first we thought maybe this was a legitimate vote by this user mixed in with bot votes, but archive.org showed us that indeed that /btc thread got a sudden wave of downvotes in less than 23 minutes. Perhaps the bot forgot which side it was pushing for? But both changes were subtle and not noticed by any users as far as we can tell.
The final thing the bot did as far as we have identified was to upvote [CU-2], and then the attack seems to have stopped suddenly. That comment wasn't upvoted until 21:55 - 22:05. So what about that comment? Why was that the only comment not under its own control upvoted, and why did the attack stop suddenly afterwards?

Suspicious comment #2

The CN database gave us some hints. Both the [CU-2] and this comment were deleted by the user, likely when they took back control over their hacked account. [CU-1] was deleted at 21:23 +/- 1 minute, ~21 minutes after creation [REF-6], and not present in that snapshot. The votebot operator probably didn't expect this to happen so quickly. After that deletion there was no obvious comment showing their upvotes on the thread, and there were no obvious choices to choose from. It seems that they wanted a comment that wouldn't vanish, so not a hacked account, and also that they preferred a comment that could ultimately be used to make /btc look guilty.
4n4n4's comment [CU-2] provided exactly this, and it was posted to the thread ~5 minutes after [CU-1] was deleted - at 21:28. [CU-2] was never blocked by automoderator, it was picked up in the next CN scan ~1 minute later... Seemingly because 4n4n4 is an approved submitter. They have a long history of pro-/Bitcoin comments; we archived 5 pages of comments. The moderators left the comment in place and the bot didn't touch it for at least 27 minutes. With the similarities listed above, [CU-2] made the ideal next target for the bot's upvoting. Almost immediately after it did so, 4n4n4 screenshotted, archived, and edited the comment. And then the bot's voting attack instantly ceased as far as we can tell [REF-3] [REF-5].
But 4n4n4 was not a hacked account. So who is 4n4n4?

So who posted that?

We have a surprisingly large amount of evidence indicating that 4n4n4 is nullc, the CTO of Blockstream.
The biggest indicator we found is that nullc has the very frequent pattern-- of writing--his sentences with two dashes separating words. This by itself is somewhat rare, though we confirmed that he uses it more times than anyone else in the CN database, the much more unusual habit is using two dashes with no spaces on either side. The CN database stored 860,000 comments for us to compare with, and very quickly confirmed the similarities between the two. His history is littered with examples, but we also used the bitcoin-dev email list to confirm the unusual habit. Like 4n4n4, nullc also has examples of using this--specific pattern twice in one sentence, which was extremely rare in our searches.
But there were many more things we noticed. We found several examples of 4n4n4 picking up nullc's conversations and continuing them. One such case was 4n4n4's third comment ever. 4n4n4 also referenced many of nullc's writings and posts. 4n4n4 referenced this code change that originated from nullc multiple times. 4n4n4's [CU-2] comment edit used the words "rbtc playbook," something our database confirmed was extremely rare but is a saying nullc likes.
And that was just the beginning:
  1. Very knowledgable about Bitcoin Core development & the history of the scaling conflict.
  2. 4n4n4 picked up a thread after many replies by nullc arguing that low fees and empty mempools are actually a problem.
  3. Just like nullc, 4n4n4 liked BIP148 but did not "support" or "endorse" it.
  4. Seems to know an awful lot about nullc's life.
  5. Used the phrase "Bitcoin's creator", a major nullc trait previously documented
  6. Talks about nullc. A lot.
  7. Somehow knows who is working on what within Blockstream.
  8. And even responded directly to nullc in support of a claim nullc had made multiple times within that thread

Conclusions

After the massive amount of research we put into this, we believe that at least one moderator of /Bitcoin must have been either aware of the bot's plans (and allowed it to place blame on others), or have executed the attack themselves. This is most likely the moderator who immediately approved the [CU-1] comment. Other moderators may or may not have been involved. Meaning, yes, we believe that a moderator of /Bitcoin either directed or was complicit in the hacking of many of their own Bitcoin Reddit user accounts.
We believe that it is likely that 4n4n4 aka nullc was also aware of or involved in this attack based upon the suspicious timing and similarities of [CU-2]. A Core Developer of nullc's experience would certainly have the technical abilities to pull off such an attack, but that is true of many others on both sides of the debate as well. Some users reported that the IP addresses the bots logged in from were vultr instances and that vultr 1) requires tracable payment methods like credit cards, and 2) takes an aggressive stance against abuse of their systems, so perhaps more information can come to light about this yet.
We encourage the Reddit admins to carefully review our claims and to validate them. If our claims here are true, surely some type of strong action is warranted. Please note that we have tried to make sure all of our links are archived, but they were archived under the www.reddit.com domain and not the np.reddit.com domain.
For any people who found this post helpful and want to tip us, please donate your tips to archive.is and archive.org (not us). Without those two amazing services none of this research would be possible.

References

[REF-1] - Exact steps to confirm automoderator rules, on a aged account with comment karma: Before http://archive.is/ngxZk -> direct copy of [CU-1] (blocked) http://archive.is/yq52B (showing) http://archive.is/qPJTo -> "censoring" (removed) http://archive.is/geSvJ (showing) http://archive.is/muQzT -> "censors" (removed) http://archive.is/neMwe (showing) http://archive.is/2OLal -> After (showing) http://archive.is/LdZMb userpage: http://archive.is/SwCQ2.
[REF-2] - Links of userpages showing comments removed and subreddits showing missing: [1a] [1b] [2a] [2b] [3a] [3b] [4a] [4b] [5a] [5b] [6a] [6b shows missing]. These additional archive.org links show several of these items missing (or visible) at the snapshot time: [1] [2] [3] [4] [5]
[REF-3] - Data dump of all comments posted around the time of the event, with notes. CSV format.
[REF-4] - Images from hacked users: [1] [2] [3] [4] [5] [6] [7]
[REF-5] - Final vote tallies for all posts up to 24 hours prior to the event's end, with notes. CSV format.
[REF-6] - Records from the CN database regarding when darwin2500's comment was deleted. "minutesAlive" is incremented every time the item is seen and starts from the first_seen_live
submitted by censorship_notifier to btc [link] [comments]

Mockingbird X.0

Imagine if there was one desk that all stories could cross so that, at 4am, a media plan could be decided upon and disseminated where all news outlets coordinated to set the goalposts of debate and hyper focused on specific issues to drive a narrative to control how you vote and how you spend money; where Internet shills were given marching orders in tandem to what was shown on television, printed in newspapers and spread throughout articles on the World Wide Web.
https://i.imgur.com/Elnci0M.png
In the past, we had Operation Mockingbird, where the program was supremely confident that it could control stories around the world, even in instructions to cover up any story about a possible “Yeti” sighting, should it turn out they were real.
https://i.imgur.com/121LXqy.png
If, in 1959, the government was confident in its ability to control a story about a Yeti, then what is their level of confidence in controlling stories, today?
https://i.imgur.com/jQFVYew.png
https://i.imgur.com/ZKMYGJj.png
In fact, we have a recent example of a situation similar to the Yeti. When Bill Clinton and Loretta Lynch met on the TARMAC to spike the Hillary email investigation, the FBI was so confident it wasn’t them, that their entire focus was finding the leaker, starting with searching within the local PD. We have documentation that demonstrates the state of mind of the confidence the upper levels of the FBI have when dealing with the media.
https://i.imgur.com/IbjDOkI.png
https://i.imgur.com/NH86ozU.png
The marriage between mainstream media and government is a literal one and this arrangement is perfectly legal.
https://i.imgur.com/OAd4vpf.png
But, this problem extends far beyond politics; the private sector, the scientific community, even advice forums are shilled heavily. People are paid to cause anxiety, recommend people break up and otherwise sow depression and nervousness. This is due to a correlating force that employs “systems psychodynamics”, focusing on “tension centered” strategies to create “organizational paradoxes” by targeting people’s basic assumptions about the world around them to create division and provide distraction.
https://i.imgur.com/6OEWYFN.png
https://i.imgur.com/iG4sdD4.png
https://i.imgur.com/e89Rx6B.png
https://i.imgur.com/uotm9Cg.png
https://i.imgur.com/74wt9tD.png
In this day and age, it is even easier to manage these concepts and push a controlled narrative from a central figure than it has ever been. Allen & Co is a “boutique investment firm” that managed the merger between Disney and Fox and operates as an overseeing force for nearly all media and Internet shill armies, while having it’s fingers in sports, social media, video games, health insurance, etc.
https://i.imgur.com/zlpBh3c.png
https://i.imgur.com/e5ZvFFJ.png
Former director of the CIA and Paul Brennan’s former superior George Tenet, holds the reigns of Allen & Co. The cast of characters involves a lot of the usual suspects.
https://i.imgur.com/3OlrX7G.png
In 1973, Allen & Company bought a stake in Columbia Pictures. When the business was sold in 1982 to Coca-Cola, it netted a significant profit. Since then, Herbert Allen, Jr. has had a place on Coca-Cola's board of directors.
Since its founding in 1982, the Allen & Company Sun Valley Conference has regularly drawn high-profile attendees such as Bill Gates, Warren Buffett, Rupert Murdoch, Barry Diller, Michael Eisner, Oprah Winfrey, Robert Johnson, Andy Grove, Richard Parsons, and Donald Keough.
Allen & Co. was one of ten underwriters for the Google initial public offering in 2004. In 2007, Allen was sole advisor to Activision in its $18 billion merger with Vivendi Games. In 2011, the New York Mets hired Allen & Co. to sell a minority stake of the team. That deal later fell apart. In November 2013, Allen & Co. was one of seven underwriters on the initial public offering of Twitter. Allen & Co. was the adviser of Facebook in its $19 billion acquisition of WhatsApp in February 2014.
In 2015, Allen & Co. was the advisor to Time Warner in its $80 billion 2015 merger with Charter Communications, AOL in its acquisition by Verizon, Centene Corporation in its $6.8 billion acquisition of Health Net, and eBay in its separation from PayPal.
In 2016, Allen & Co was the lead advisor to Time Warner in its $108 billion acquisition by AT&T, LinkedIn for its merger talks with Microsoft, Walmart in its $3.3 billion purchase of Jet.com, and Verizon in its $4.8 billion acquisition of Yahoo!. In 2017, Allen & Co. was the advisor to Chewy.com in PetSmart’s $3.35 billion purchase of the online retailer.
Allen & Co throws the Sun Valley Conference every year where you get a glimpse of who sows up. Harvey Weinstein, though a past visitor, was not invited last year.
https://en.wikipedia.org/wiki/Allen_%26_Company_Sun_Valley_Conference
Previous conference guests have included Bill and Melinda Gates, Warren and Susan Buffett, Tony Blair, Google founders Larry Page and Sergey Brin, Allen alumnus and former Philippine Senator Mar Roxas, Google Chairman Eric Schmidt, Quicken Loans Founder & Chairman Dan Gilbert, Yahoo! co-founder Jerry Yang, financier George Soros, Facebook founder Mark Zuckerberg, Media Mogul Rupert Murdoch, eBay CEO Meg Whitman, BET founder Robert Johnson, Time Warner Chairman Richard Parsons, Nike founder and chairman Phil Knight, Dell founder and CEO Michael Dell, NBA player LeBron James, Professor and Entrepreneur Sebastian Thrun, Governor Chris Christie, entertainer Dan Chandler, Katharine Graham of The Washington Post, Diane Sawyer, InterActiveCorp Chairman Barry Diller, Linkedin co-founder Reid Hoffman, entrepreneur Wences Casares, EXOR and FCA Chairman John Elkann, Sandro Salsano from Salsano Group, and Washington Post CEO Donald E. Graham, Ivanka Trump and Jared Kushner, and Oprah Winfrey.
https://i.imgur.com/VZ0OtFa.png
George Tenet, with the reigns of Allen & Co in his hands, is able to single-handedly steer the entire Mockingbird apparatus from cable television to video games to Internet shills from a singular location determining the spectrum of allowable debate. Not only are they able to target people’s conscious psychology, they can target people’s endocrine systems with food and pornography; where people are unaware, on a conscious level, of how their moods and behavior are being manipulated.
https://i.imgur.com/mA3MzTB.png
"The problem with George Tenet is that he doesn't seem to care to get his facts straight. He is not meticulous. He is willing to make up stories that suit his purposes and to suppress information that does not."
"Sadly but fittingly, 'At the Center of the Storm' is likely to remind us that sometimes what lies at the center of a storm is a deafening silence."
https://i.imgur.com/YHMJnnP.png
Tenet joined President-elect Bill Clinton's national security transition team in November 1992. Clinton appointed Tenet Senior Director for Intelligence Programs at the National Security Council, where he served from 1993 to 1995. Tenet was appointed Deputy Director of Central Intelligence in July 1995. Tenet held the position as the DCI from July 1997 to July 2004. Citing "personal reasons," Tenet submitted his resignation to President Bush on June 3, 2004. Tenet said his resignation "was a personal decision and had only one basis—in fact, the well-being of my wonderful family—nothing more and nothing less. In February 2008, he became a managing director at investment bank Allen & Company.
https://i.imgur.com/JnGHqOS.png
We have the documentation that demonstrates what these people could possibly be doing with all of these tools of manipulation at their fingertips.
The term for it is “covert political action” for which all media put before your eyes is used to serve as a veneer… a reality TV show facade of a darker modus operandum.
https://i.imgur.com/vZC4D29.png
https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol36no3/html/v36i3a05p_0001.htm
It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever costs. There are no rules in such a game. Hitherto acceptable norms of human conduct do not apply. If the US is to survive, longstanding American concepts of "fair play" must be reconsidered. We must develop effective espionage and counterespionage services and must learn to subvert, sabotage and destroy our enemies by more clever, more sophisticated means than those used against us. It may become necessary that the American people be made acquainted with, understand and support this fundamentally repugnant philosophy.
http://www.nbcnews.com/id/3340677/t/cia-operatives-shadowy-war-force/
Intelligence historian Jeffrey T. Richelson says the S.A. has covered a variety of missions. The group, which recently was reorganized, has had about 200 officers, divided among several groups: the Special Operations Group; the Foreign Training Group, which trains foreign police and intelligence officers; the Propaganda and Political Action Group, which handles disinformation; the Computer Operations Group, which handles information warfare; and the Proprietary Management Staff, which manages whatever companies the CIA sets up as covers for the S.A.
Scientology as a CIA Political Action Group – “It is a continuing arrangement…”: https://mikemcclaughry.wordpress.com/2015/08/25/scientology-as-a-cia-political-action-group-it-is-a-continuing-arrangement/
…Those operations we inaugurated in the years 1955-7 are still secret, but, for present purposes, I can say all that’s worth saying about them in a few sentences – after, that is, I offer these few words of wisdom. The ‘perfect’ political action operation is, by definition, uneventful. Nothing ‘happens’ in it. It is a continuing arrangement, neither a process nor a series of actions proceeding at a starting point and ending with a conclusion.
CIA FBI NSA Personnel Active in Scientology: https://i.imgur.com/acu2Eti.png
When you consider the number of forces that can be contained within a single “political action group” in the form on a “boutique investment firm,” where all sides of political arguments are predetermined by a selected group of actors who have been planted, compromised or leveraged in some way in order to control the way they spin their message.
https://i.imgur.com/tU4MD4S.png
The evidence of this coordinated effort is overwhelming and the “consensus” that you see on TV, in sports, in Hollywood, in the news and on the Internet is fabricated.
Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.'
Thus the uninformed reader will most likely develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'
When you find yourself feeling like common sense and common courtesy aren’t as common as they ought to be, it is because there is a massive psychological operation controlled from the top down to ensure that as many people as possible are caught in a “tension based” mental loop that is inflicted on them by people acting with purpose to achieve goals that are not in the interest of the general population, but a method of operating in secret and corrupt manner without consequences.
Notice that Jeffrey Katzenberg, of Disney, who is intertwined with Allen & Co funds the Young Turks. He is the perfect example of the relationship between media and politics.
Katzenberg has also been involved in politics. With his active support of Hillary Clinton and Barack Obama, he was called "one of Hollywood's premier political kingmakers and one of the Democratic Party's top national fundraisers."
With cash from Jeffrey Katzenberg, The Young Turks looks to grow paid subscribers:
https://digiday.com/media/with-cash-from-katzenberg-the-young-turks-look-to-grow-paid-subscribers/
Last week, former DreamWorks Animation CEO Jeffrey Katzenberg’s new mobile entertainment company WndrCo was part of a $20 million funding round in TYT Network, which oversees 30 news and commentary shows covering politics, pop culture, sports and more. This includes the flagship “The Young Turks” program that streams live on YouTube every day. Other investors in the round included venture capital firms Greycroft Partners, E.ventures and 3L Capital, which led the round. This brings total funding for Young Turks to $24 million.
How Hollywood's Political Donors Are Changing Strategies for the Trump Era:
https://www.hollywoodreporter.com/features/hollywood-political-donors-are-changing-strategy-post-trump-1150545
Hollywood activism long has been depicted as a club controlled by a handful of powerful white men: Katzenberg, Spielberg, Lear, David Geffen, Haim Saban and Bob Iger are the names most often mentioned. But a new generation of power brokers is ascendant, including J.J. Abrams and his wife, Katie McGrath, cited for their personal donations and bundling skills; Shonda Rhimes, who held a get-out-the-vote rally at USC's Galen Center on Sept. 28 that drew 10,000 people; CAA's Darnell Strom, who has hosted events for Nevada congresswoman Jacky Rosen and Arizona congresswoman Kyrsten Sinema; and former Spotify executive Troy Carter, who held three fundraisers for Maryland gubernatorial candidate Ben Jealous (Carter also was a fundraiser for President Obama).
Soros Group Buys Viacom's DreamWorks Film Library:
https://www.forbes.com/2006/03/17/soros-viacom-dreamworks-cx_gl_0317autofacescan11.html#541a895f1f22
Viacom, after splitting off from Les Moonves Les Moonves ' CBS , still holds Paramount Pictures, and that movie studio in December agreed to acquire DreamWorks SKG, the creative shop founded by the Hollywood triumvirate of Steven Spielberg, David Geffen and Jeffrey Katzenberg (a former exec at The Walt Disney Co.). DreamWorks Animation had been spun off into a separate company.
Now it's time for Freston to make back some money--and who better to do a little business with than George Soros? The billionaire financier leads a consortium of Soros Strategic Partners LP and Dune Entertainment II LLC, which together are buying the DreamWorks library--a collection of 59 flicks, including Saving Private Ryan, Gladiator, and American Beauty.
The money you spend on media and junk food and in taxes goes to these groups who then decide how best to market at you so that they decide how you vote by creating a fake consensus to trick into thinking that you want something other than what is best for you; but will inevitably result in more money being funneled to the top, creating further separation between the super rich and the average person. The goal will be to assert creeping authoritarianism by generating outrage against policies and issues they hate. Part of manipulating your basic assumptions is also to use schadenfreude (think canned laughter on TV) against characters who support the cause that might actually do you the most good (which reaffirms and strengthens your confirmation biased along predetermined political lines).
https://i.imgur.com/PW1cRtj.png
We have a population being taught to hate socialism and love capitalism when the truth is no country is practicing either. These terms are merely disguises for political oligarchies where the collection of wealth is less about getting themselves rich and more about keeping everyone else poor.
What can you guess about the world around you if it turned out that every consensus that was forced on you was fake?
How much money would it take to make it look like 51% of the Internet believed in completely idiotic ideas? Combine shill operations with automation and AI’s, and the cost becomes a good investment relative to the return when measured in political power.
Even the people who are well intentioned and very vocal do not have to consciously be aware that they are working for a political action group. A covert political group will always prefer an unwitting tool to help push their agenda, so that they can remain in the shadows.
FDA Admonishes Drug Maker Over Kim Kardashian Instagram Endorsement https://www.forbes.com/sites/davidkroll/2015/08/11/fda-spanks-drug-maker-over-kim-kardashian-instagram-endorsement/#25174a29587b
The OSS files offer details about other agents than famous chef, Julia Child; including Supreme Court Justice Arthur Goldberg, major league catcher Moe Berg, historian Arthur Schlesinger Jr., and actor Sterling Hayden. http://www.nbcnews.com/id/26186498/ns/us_news-security/t/julia-child-cooked-double-life-spy/
USA Today: Businesses and organizations may refer to it as a tool for competitive advantage and marketing; but make no mistake http://archive.is/37tK3
Shareblue accounts caught in /politics posting links to Shareblue without disclosing their affiliation http://archive.is/7HAkr
Psy Group developed elaborate information operations for commercial clients and political candidates around the world http://archive.is/BBblQ
Top mod of /Mechanical_Gifs tries to sell subreddit on ebay for 999.00 dollars. http://archive.is/kU1Ly
Shill posts picture of a dog in a hammock with the brand clearly visible without indicating that it's an ad in the title of the post http://archive.is/Mfdk9
Arstechnica: GCHQs menu of tools spreads disinformation across Internet- “Effects capabilities” allow analysts to twist truth subtly or spam relentlessly. http://arstechnica.com/security/2014/07/ghcqs-chinese-menu-of-tools-spread-disinformation-across-internet/
Samsung Electronics Fined for Fake Online Comments http://bits.blogs.nytimes.com/2013/10/24/samsung-electronics-fined-for-fake-online-comments/?_r=0
Discover Magazine: Researchers Uncover Twitter Bot Army That’s 350 http://blogs.discovermagazine.com/d-brief/2017/01/20/twitter-bot-army/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A%20DiscoverTechnology%20%28Discover%20Technology%29#.WIMl-oiLTnA
Times of Israel - The internet: Israel’s new PR battlefield http://blogs.timesofisrael.com/the-rise-of-digital-diplomacy-could-be-changing-israels-media-image/
Time: Social Media Manipulation? When “Indie” Bloggers and Businesses Get Cozy http://business.time.com/2013/04/22/social-media-manipulation-when-indie-bloggers-and-businesses-get-cozy/
Content-Driven Detection of Campaigns in Social Media [PDF] http://faculty.cs.tamu.edu/caverlee/pubs/lee11cikm.pdf
the law preventing them from using this in America was repealed http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/
Redditor who works for a potato mailing company admits to being a shill. He shows off his 27 thousand dollars he made in /pics
http://i.imgur.com/CcTHwdS.png
Screenshot of post since it was removed. http://i.imgur.com/k9g0WF8.png
Just thought I'd contribute to this thread http://imgur.com/OpSos4u
CNN: A PR firm has revealed that it is behind two blogs that previously appeared to be created by independent supporters of Wal-Mart. The blogs Working Families for Wal-mart and subsidiary site Paid Critics are written by 3 employees of PR firm Edelman http://money.cnn.com/2006/10/20/news/companies/walmart_blogs/index.htm
Vice: Your Government Wants to Militarize Social Media to Influence Your Beliefs http://motherboard.vice.com/read/your-government-wants-to-militarize-social-media-to-influence-your-beliefs
BBC News: China's Internet spin doctors http://news.bbc.co.uk/2/hi/7783640.stm
BBC News: US plans to 'fight the net' revealed http://news.bbc.co.uk/2/hi/americas/4655196.stm
Wall Street Journal: Turkey's Government Forms 6 http://online.wsj.com/news/articles/SB10001424127887323527004579079151479634742?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424127887323527004579079151479634742.html
Fake product reviews may be pervasive http://phys.org/news/2013-07-fake-product-pervasive.html#nRlv
USA Today: The co-owner of a major Pentagon propaganda contractor publicly admitted that he was behind a series of websites used in an attempt to discredit two USA TODAY journalists who had reported on the contractor. http://usatoday30.usatoday.com/news/military/story/2012-05-24/Leonie-usa-today-propaganda-pentagon/55190450/1
ADWEEK: Marketing on Reddit Is Scary http://www.adweek.com/news/technology/marketing-reddit-scary-these-success-stories-show-big-potential-168278
BBC- How online chatbots are already tricking you- Intelligent machines that can pass for humans have long been dreamed of http://www.bbc.com/future/story/20140609-how-online-bots-are-tricking-you
BBC news: Amazon targets 1 http://www.bbc.com/news/technology-34565631
BBC: More than four times as many tweets were made by automated accounts in favour of Donald Trump around the first US presidential debate as by those backing Hillary Clinton http://www.bbc.com/news/technology-37684418
Fake five-star reviews being bought and sold online - Fake online reviews are being openly traded on the internet
http://www.bbc.com/news/technology-43907695
http://www.bbc.com/news/world-asia-20982985
http://www.bbc.com/news/world-asia-20982985
Bloomberg: How to Hack an Election [and influence voters with fake social media accounts] http://www.bloomberg.com/features/2016-how-to-hack-an-election/
"Internet Reputation Management http://www.bloomberg.com/news/articles/2008-04-30/do-reputation-management-services-work-businessweek-business-news-stock-market-and-financial-advice
Buzzfeed: Documents Show How Russia’s Troll Army Hit America http://www.buzzfeed.com/maxseddon/documents-show-how-russias-troll-army-hit-america#.ki8Mz97ly
The Rise of Social Bots http://www.cacm.acm.org/magazines/2016/7/204021-the-rise-of-social-bots/fulltext
CBC News- Canadian government monitors online forums http://www.cbc.ca/news/canada/bureaucrats-monitor-online-forums-1.906351
Chicago Tribune: Nutrition for sale: How Kellogg worked with 'independent experts' to tout cereal http://www.chicagotribune.com/business/ct-kellogg-independent-experts-cereal-20161121-story.html
DailyKos: HBGary: Automated social media management http://www.dailykos.com/story/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All
Meme Warfare Center http://www.dtic.mil/dtic/tfulltext/u2/a507172.pdf
Shilling on Reddit is openly admitted to in this Forbes article http://www.forbes.com/sites/julesschroede2016/03/10/the-magic-formula-behind-going-viral-on-reddit/#1d2485b05271
Forbes: From Tinder Bots To 'Cuban Twitter' http://www.forbes.com/sites/kashmirhill/2014/04/17/from-tinder-bots-to-covert-social-networks-welcome-to-cognitive-hacking/#4b78e2d92a7d
Hivemind http://www.hivemind.cc/rank/shills
Huffington Post- Exposing Cyber Shills and Social Media's Underworld http://www.huffingtonpost.com/sam-fiorella/cyber-shills_b_2803801.html
The Independent: Massive British PR firm caught on video: "We've got all sorts of dark arts...The ambition is to drown that negative content and make sure that you have positive content online." They discuss techniques for managing reputations online and creating/maintaining 3rd-party blogs that seem independent. http://www.independent.co.uk/news/uk/politics/caught-on-camera-top-lobbyists-boasting-how-they-influence-the-pm-6272760.html
New York Times: Lifestyle Lift http://www.nytimes.com/2009/07/15/technology/internet/15lift.html?_r=1&emc=eta1
New York Times: Give Yourself 5 Stars? Online http://www.nytimes.com/2013/09/23/technology/give-yourself-4-stars-online-it-might-cost-you.html?src=me&ref=general
NY Times- From a nondescript office building in St. Petersburg http://www.nytimes.com/2015/06/07/magazine/the-agency.html?_r=1
NY Times: Effort to Expose Russia’s ‘Troll Army’ Draws Vicious Retaliation http://www.nytimes.com/2016/05/31/world/europe/russia-finland-nato-trolls.html?_r=1
PBS Frontline Documentary - Generation Like http://www.pbs.org/wgbh/frontline/film/generation-like/
Gamers promote gaming-gambling site on youtube by pretending to hit jackpot without disclosing that they own the site. They tried to retroactively write a disclosure covering their tracks http://www.pcgamer.com/csgo-lotto-investigation-uncovers-colossal-conflict-of-interest/
Raw Story: CENTCOM engages bloggers http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html
Raw Story: Air Force ordered software to manage army of fake virtual people http://www.rawstory.com/rs/2011/02/18/revealed-air-force-ordered-software-to-manage-army-of-fake-virtual-people/
Redective http://www.redective.com/?r=e&a=search&s=subreddit&t=redective&q=shills
Salon: Why Reddit moderators are censoring Glenn Greenwald’s latest news story on shills http://www.salon.com/2014/02/28/why_reddit_moderators_are_censoring_glenn_greenwalds_latest_bombshell_partne
The Atlantic: Kim Kardashian was paid to post a selfie on Instagram and Twitter advertising a pharmaceutical product. Sent to 42 million followers on Instagram and 32 million on Twitter http://www.theatlantic.com/health/archive/2015/09/fda-drug-promotion-social-media/404563/
WAR.COM: THE INTERNET AND PSYCHOLOGICAL OPERATIONS http://www.theblackvault.com/documents/ADA389269.pdf
The Guardian: Internet Astroturfing http://www.theguardian.com/commentisfree/libertycentral/2010/dec/13/astroturf-libertarians-internet-democracy
The Guardian: Israel ups the stakes in the propaganda war http://www.theguardian.com/media/2006/nov/20/mondaymediasection.israel
Operation Earnest Voice http://www.theguardian.com/technology/2011/ma17/us-spy-operation-social-networks
The Guardian: British army creates team of Facebook warriors http://www.theguardian.com/uk-news/2015/jan/31/british-army-facebook-warriors-77th-brigade
The Guardian: US military studied how to influence Twitter [and Reddit] users in Darpa-funded research [2014] http://www.theguardian.com/world/2014/jul/08/darpa-social-networks-research-twitter-influence-studies
The Guardian: Chinese officials flood the Chinese internet with positive social media posts to distract their population http://www.theguardian.com/world/2016/may/20/chinese-officials-create-488m-social-media-posts-a-year-study-finds
Times of Israel: Israeli government paying bilingual students to spread propaganda online primarily to international communities without having to identify themselves as working for the government. "The [student] union will operate computer rooms for the project...it was decided to establish a permanent structure of activity on the Internet through the students at academic institutions in the country." http://www.timesofisrael.com/pmo-stealthily-recruiting-students-for-online-advocacy/
USA Today: Lord & Taylor settles FTC charges over paid Instagram posts http://www.usatoday.com/story/money/2016/03/15/lord--taylor-settles-ftc-charges-over-paid-instagram-posts/81801972/
Researcher's algorithm weeds out people using multiple online accounts to spread propaganda - Based on word choice http://www.utsa.edu/today/2016/10/astroturfing.html
http://www.webinknow.com/2008/12/the-us-air-force-armed-with-social-media.html
Wired: Powered by rapid advances in artificial intelligence http://www.wired.co.uk/magazine/archive/2015/06/wired-world-2015/robot-propaganda
Wired: Clinton Staff and Volunteers Busted for Astroturfing [in 2007] http://www.wired.com/2007/12/clinton-staff-a/
Wired: Pro-Government Twitter Bots Try to Hush Mexican Activists http://www.wired.com/2015/08/pro-government-twitter-bots-try-hush-mexican-activists/
Wired: Microsoft http://www.wired.com/2015/09/ftc-machinima-microsoft-youtube/
Wired: Military Report: Secretly ‘Recruit or Hire Bloggers’ http://www.wired.com/dangerroom/2008/03/report-recruit/
Wired: Air Force Releases ‘Counter-Blog’ Marching Orders http://www.wired.com/dangerroom/2009/01/usaf-blog-respo/
Reddit Secrets https://archive.fo/NAwBx
Reddit Secrets https://archive.fo/SCWN7
Boostupvotes.com https://archive.fo/WdbYQ
"Once we isolate key people https://archive.is/PoUMo
GCHQ has their own internet shilling program https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group
Russia https://en.wikipedia.org/wiki/State-sponsored_Internet_sockpuppetry
US also operates in conjunction with the UK to collect and share intelligence data https://en.wikipedia.org/wiki/UKUSA_Agreement
Glenn Greenwald: How Covert Agents Infiltrate the Internet to Manipulate https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
Glenn Greenwald: Hacking Online Polls and Other Ways British Spies Seek to Control the Internet https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/
Here is a direct link to your image for the benefit of mobile users https://imgur.com/OpSos4u.jpg
Reddit for iPhone https://itunes.apple.com/us/app/reddit-the-official-app/id1064216828?mt=8
Why Satoshi Nakamoto Has Gone https://medium.com/@ducktatosatoshi-nakamoto-has-gone-4cef923d7acd
What I learned selling my Reddit accounts https://medium.com/@Rob79/what-i-learned-selling-my-reddit-accounts-c5e9f6348005#.u5zt0mti3
Artificial intelligence chatbots will overwhelm human speech online; the rise of MADCOMs https://medium.com/artificial-intelligence-policy-laws-and-ethics/artificial-intelligence-chatbots-will-overwhelm-human-speech-online-the-rise-of-madcoms-e007818f31a1
How Reddit Got Huge: Tons of Fake Accounts - According to Reddit cofounder Steve Huffman https://motherboard.vice.com/en_us/article/how-reddit-got-huge-tons-of-fake-accounts--2
Whistleblower and subsequent investigation: Paid trolls on /Bitcoin https://np.reddit.com/Bitcoin/comments/34m7yn/professional_bitcoin_trolls_exist/cqwjdlw
Confession of Hillary Shill from /SandersForPresident https://np.reddit.com/conspiracy/comments/3rncq9/confession_of_hillary_shill_from/
Why do I exist? https://np.reddit.com/DirectImageLinkerBot/wiki/index
Already a direct link? https://np.reddit.com/DirectImageLinkerBot/wiki/res_links
Here's the thread. https://np.reddit.com/HailCorporate/comments/3gl8zi/that_potato_mailing_company_is_at_it_again/
/netsec talks about gaming reddit via sockpuppets and how online discourse is (easily) manipulated. https://np.reddit.com/netsec/comments/38wl43/we_used_sock_puppets_in_rnetsec_last_year_and_are
Redditor comes clean about being paid to chat on Reddit. They work to promote a politician https://np.reddit.com/offmychest/comments/3gk56y/i_get_paid_to_chat_on_reddit/
Shill whistleblower https://np.reddit.com/politics/comments/rtr6b/a_very_interesting_insight_into_how_certain/
Russian bots were active on Reddit last year https://np.reddit.com/RussiaLago/comments/76cq4d/exclusive_we_can_now_definitively_state_that/?st=j8s7535j&sh=36805d5d
The Bush and Gore campaigns of 2000 used methods similar to the Chinese government for conducting “guided discussions” in chatrooms designed to influence citizens https://np.reddit.com/shills/comments/3xhoq8/til_the_advent_of_social_media_offers_new_routes/?st=j0o5xr9c&sh=3662f0dc
source paper. https://np.reddit.com/shills/comments/4d3l3s/government_agents_and_their_allies_might_ente
or Click Here. https://np.reddit.com/shills/comments/4kdq7n/astroturfing_information_megathread_revision_8/?st=iwlbcoon&sh=9e44591e Alleged paid shill leaks details of organization and actions.
https://np.reddit.com/shills/comments/4wl19alleged_paid_shill_leaks_details_of_organization/?st=irktcssh&sh=8713f4be
Shill Confessions and Additional Information https://np.reddit.com/shills/comments/5pzcnx/shill_confessions_and_additional_information/?st=izz0ga8r&sh=43621acd
Corporate and governmental manipulation of Wikipedia articles https://np.reddit.com/shills/comments/5sb7pi/new_york_times_corporate_editing_of_wikipedia/?st=iyteny9b&sh=b488263f
Ex -MMA fighter and ex-police officer exposes corrupt police practices https://np.reddit.com/shills/comments/6jn27s/ex_mma_fighter_and_expolice_officer_exposes/
User pushes InfoWars links on Reddit https://np.reddit.com/shills/comments/6uau99/chemicals_in_reddit_are_turning_memes_gay_take/?st=j6r0g2om&sh=96f3dbf4
Some websites use shill accounts to spam their competitor's articles https://np.reddit.com/TheoryOfReddit/comments/1ja4nf/lets_talk_about_those_playing_reddit_with/?st=iunay35w&sh=d841095d
User posts video using GoPro https://np.reddit.com/videos/comments/2ejpbb/yes_it_is_true_i_boiled_my_gopro_to_get_you_this/ck0btnb/?context=3&st=j0qt0xnf&sh=ef13ba81
Fracking shill whistleblower spills the beans on Fracking Internet PR https://np.reddit.com/worldnews/comments/31wo57/the_chevron_tapes_video_shows_oil_giant_allegedly/cq5uhse?context=3
https://i.imgur.com/Q3gjFg9.jpg
https://i.imgur.com/q2uFIV0.jpg
TOP SECRET SPECIAL HANDLING NOFORN
CENTRAL INTELLIGENCE AGENCY
Directorate of Operations
October 16, 1964
MEMORANDUM FOR THE DIRECTOR OF THE CIA
Subject: After action report of
Operation CUCKOO (TS)
INTRODUCTION

1) Operation CUCKOO was part of the overall operation CLEANSWEEP, aimed at eliminating domestic opposition to activities undertaken by the Central Intelligence Agency's special activities division, in main regard to operation GUILLOTINE.

2) Operation CUCKOO was approved by the Joint Chiefs of Staff, Department of Defense and the office of The President of the United States as a covert domestic action to be under taken within the limits of Washington D.C as outlined by Secret Executive Order 37.

3) Following the publishing of the Warren Commission, former special agent Mary Pinchot Meyer (Operation MOCKINGBIRD, Operation SIREN) also was married to Cord Meyer (Operation MOCKINGBIRD, Operation GUILLOTINE) threatened to disclose the details of several Special Activities Divisions' operations, including but not limited to, Operation SIREN and GUILLOTENE.
​1
TOP SECRET SPECIAL HANDLING NOFORN
4) It was deemed necessary by senior Directorate of Operations members to initiate Operation CUCKOO as an extension of Operation CLEANSWEEP on November 30th. After Mary Pinchot Meyer threatened to report her knowledge of Operation GUILLOTENE and the details of her work in Operation SIREN from her affair with the former President.

5) Special Activities Division was given the green light after briefing president Johnson on the situation. The situation report was forwarded to the Department of Defense and the Joint Chiefs of staff, who both approved of the parameters of the operation, as outlined under article C of secret executive order 37 (see attached copy of article).
​PLANNING STAGES
6) 8 members of the special activities division handpicked by operation lead William King Harvey began planning for the operation on October 3rd, with planned execution before October 16th.

7) The (?) of the operation was set as the neighborhood of Georgetown along the Potomac river, where the operators would observe, take note on routines, and eventually carry the operation.

8) After nothing Meyer's routines, Edward "Eddy" Reid was picked as the operation point man who would intersect Meyer on her walk on October 12th, with lead William King Harvey providing long range support if necessary from across the Chesapeake and Ohio canal (see illustration A for detailed map).

9) Edward Reid was planned to be dressed in the manner of a homeless black man, due to his resemblances to local trash collector (later found out to be Raymond Crump) who inhabits the AO and the path that Reid was planned to intersect Meyer.
2
TOP SECRET SPECIAL HANDLING NOFORN
submitted by The_Web_Of_Slime to Intelligence [link] [comments]

Tether FUD - Critique a different opinion - I may be wrong but find out for yourself

I know everyone here loves to hate on tether but I feel another opinion on tether should be made since a lot of people use tether. I use tether but also understand that their business model is unsustainable at first glance.
Tether is used by pretty much every exchange and has had 2.3billion dollars of transaction volume for 3 months now. Thats 90 days. Given .1% transaction fees, USDT generated a net of 207 million dollars in exchange fees for the past 3 months. These new exchanges adopting tether are most likely "buying" tether from bitfinex which allows bitfinex to create more tether since money is being added to their overall "reserve." I know there hasn't been a recent audit but, in my opinion, its because banks have been trying to stay away from people/exchanges that are generating a lot of money from cryptocurrencies so no official audit can be given. Now this isn't giving grace to bitfinex since it is sketchy they haven't atleast addressed the problem.
Given the price "surge" of bitcoin and no official BTC/USD pairs, it makes sense for exchanges to adopt USDT for the time being for people to "lock-in profits," just like a stock exchange. Given the amount of money these exchanges have made (or can make) from owning their personal exchange cryptos (ie binance coin) and other cryptos in their portfolios, enough money is surrounding the sphere of exchanges that a "temporary-fix" for locking in profits, USDT, is viable in terms of opening the crypto space to more investors.
USDT is inflating the market because of increased liquidity and more opportunity for investors to make many (so more investors come in). Now, tether still makes a lot of investors skeptical (since they do their research and find out the "FUD" behind tether), but really this is suppressing a lot investors from coming into the sphere until a "REAL" BTC/USD pair is designed (imo, this will be done by Poloniex/CircleX). What this will do to USDT however, is something that we will have to find out once it happens if more exchanges get the legitimate BTC/USD pairing by requiring a social security on registration.
Tether, being just "another altcoin," seems it will drop value once less people are interested in this "altcoin." Right now, the demand is so high for tether and the fact that bitfinex hasn't "printed more money" from the 2.2bln supply, and especially after the main dip BTC had, is somewhat of a good sign. As stated before, they probably "printed money" to give to the vast amount of exchanges for pairings.
There are multiple whales, including the team of EOS, that support the doings of Bitfinex and USDT since it improves awareness/adoption of crypto. Now, EOS/SteemIT maybe a "scam" in some people's eyes (maybe mine, not enough has happened for me to decide), but there's no way USDT/BITFINEX would do anything stupid pre-launch of EOS since they are associated with each other and have a lot to profit fromr. So until June 1st (the launch of EOS, at an earliest date), I can't see tether going anywhere. This, in my opinion, is especially a strong point since many crypto multi-millionaire/billionaire whales back EOS, SteemIT and Bitfinex.
Lastly (and in conclusion of my opinion(s)), Tether will crash (if it crashes) if the DEMAND, by the MAJOR EXCHANGES using USDT, suffers. Also, I feel that until that demand dies out, USDT should be seen as a neat trading tool for people to be open to, not a discouragement for entering the crypto space. Now, that all exchanges have adopted tether as a pair, Tether probably wont "print anymore money" until the DEMAND (or purchasing of tether by exchanges) goes up. To sum up the short-term fate of tether (pre-June 1st ATLEAST), The fact that tether claimed to have 450 million dollars as of their last audit in september, the fact that a lot of these exchanges (whom are super rich) are buying out tethers for pairing, the fact that profitable company startups such as EOS and exchanges put their "trust" and money into tether to keep their exchange/platforms in high demand, tells me that Tether FUD might be exaggerated. USDT FUD may also be generated due to swing traders wanting to make more money "off the swings," since their "strategy" wouldn't be as widely used. I have used this "strategy" and it seems to work for me as i've gained from 6k dip than if i had just held BTC. In my opinion, USDT is here to stay (at 1$) until a replacement is found and no-one cares to use USDT. And this will only crash USDT if Bitfinex/Other exchanges have not gathered up a 1:1 value (USD:USDT) for the total supply of USDT once the demand for USDT reaches its demise. Bitfinex paid back money to its traders worth 120k BTC in 2015. I think if they survived that 120k BTC “hack” (or genius plan on their part), a mere 2.2 billion payout to keep everything running smoothly isn’t too much of a problem. Thanks for reading and I'm hoping I can get some solid feedback from this.
submitted by PowerFamished to Tether [link] [comments]

Thoughts on my culminating analysis of Russia's involvement in the U.S elections?

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The proof is that the hackers used Bitly to mask the malicious URL and trick people into thinking the URL was legitimate. They made two mistakes, however.
First, they accidentally left two of their Bitly accounts public, rather than setting them to private. This allowed security researchers to view some general account information, like what URLs were shortened and what they were changed to.
Second, they used Gmail's official numeric ID for each person inside of their maliciously crafted URLs. This allowed cybersecurity researchers to find out exactly who had been targeted.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by MangekyouSharinganKa to AskTrumpSupporters [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to geopolitics [link] [comments]

BitCoin Billionaire - Hack HyperBits [ROOT] Bitcoin Billionaire iPhone, iPad, iPod HACK/Glitch GET RICH EASY!!! Bitcoin Billionaire Hacked! - YouTube Bitcoin Billionaire infinite casino cheat no jailbreak Bitcoin Billionaire Hack

Tips on how to utilize this Bitcoin Billionaire hack? 1. Download Bitcoin Billionaire Hack Application 2. Plug Your Mobile Device Into Your Computer Via Usb. 3. Select your smartphone Operating System. Click "Connect" and wait for connection. 4. Select your hack options. 5. Click "Start" and wait for the procedure to complete. Click this link ... Bitcoin Billionaire Hack. September 20, 2015 Posted in Android Games , iOS Games No comments Hello my dear readers. Today I would like to present you how to getBitcoin Billionaire Hack. This game has gained great popularity in recent times and hence my interest in this topic. I hate that that sell so much time to play on my iphone.Bitcoin Billionaire is another production that got me ... Our hack tool can be downloaded free of charge unlike other in-app purchases where the player will be forced to pay some bucks to purchase key to unlock plenty of features that will make your gaming experience a success. But with our bitcoin billionaire hack tool, you won’t pay anything. All you need is download this tool and then run it on ... Bitcoin Billionaire tricks hints guides reviews promo codes easter eggs and more for android application. Avoid Bitcoin Billionaire hack cheats for your own safety, choose our tips and advices confirmed by pro players, testers and users like you. Ask a question or add answers, watch video tutorials & submit own opinion about this game/app. Download Bitcoin Billionaire 3.2 Hack MOD APK Free For Android Mobiles, Sensible For Speed Most Needed Hacker tool is absolutely newest version suitable and is a hundred% free to use. We've made Bit-coin Billionaire Hack for all Android and iOS units.As a result of with this Bitcoin Billionaire Hack every little thing within the sport shall be unlimited.

[index] [282] [42676] [45671] [44822] [7852] [45003] [41004] [19285] [43796] [5829]

BitCoin Billionaire - Hack HyperBits [ROOT]

Hey Youtube. Today I will be showing you guys how to hack your HyperBits in BitCoin Billionaire. In order to do this hack, you need to have at least 10 HyperBits which could be gotten easily at ... Hey guys and today I'm showing you how to hack Bitcoin Billionaire NO ROOT! 1) Go to this link http://lenov.ru/games/strategii/20575-bitcoin-billionaire-v-10... Hi guys just a quick video showing you how to HACK/Glitch Bitcoin Billionaire iPhone, iPhone, iPod . ENJOY! Bitcoin Billionaire Game Link: https://itunes.app... Bitcoin Billionaire Hack Link: http://tinyurl.com/bitcointool Want to hack unlimited Bitcoin Billionaire Hyperbits? It's easy! Just follow the steps reviewed... Published on Sep 6, 2015. Category People & Blogs; Loading... Autoplay When autoplay is enabled, a suggested video will automatically play next. Up next Bitcoin Billionaire Cheat. - Duration: 6:29 ...

#