Keyword: cyberwarfare
-
On early January, 2021, Mary Fanning and Alan Jones published two pieces in The American Report titled: Proof Positive: Coordinated Cyberwarfare Attack Against US By China, Russia, Iran, Iraq, Pakistan To Steal Election From Trump.andSTEALING AMERICA: ‘Former’ Communist Comey Got SCORECARD Election HackingSource Code And Knew SolarWinds Was Not SecureThese articles claim to have a positive proof of a massive coordinated international cyber attack against multiple US election sites during the first week of December, 2020. The stated aim of this attack was allegedly to steal the elections from Trump. The authors of these articles claim that two secret tools...
-
It is rare when a political action can be legitimately labeled seditious and treasonous at the same time. If you ever wondered why the Durham investigation was last seen on the back of a milk carton and why no one involved in thee Russian collusion hoax and the deep state coup to depose the duly elected President Donald J. Trump has been indicted, consider the actions of William Barr, whom Trump economic adviser Peter Navarro, speaking on Maria Bartiromo’s Sunday Morning Futures show on Fox News, dubbed Trump’s last attorney general and Biden’s first. At the end of Trump’s first...
-
Worldview Weekend has released another bombshell interview with retired 3-star General Thomas McInerney. In the interview, Gen. McInerney publicly calls on President Trump to realize the seriousness of the cyber-war attack on America by invoking the Rebellion Act, removing Habeas Corpus (as Lincoln did) and initiating mass arrests under military authority. This call by Gen. McInerney, a highly accomplished military veteran and loyal patriot, seems to stem from the realization that much of the existing government has gone astray and is now colluding with the enemies of the nation. State governors have gone villains, court judges have gone villains, and...
-
FBI PHOTO An employee of the video platform Zoom who is based in China was spying on Chinese dissidents for the Communist Chinese government, according to a federal indictment announced on Friday.Xinjiang Jin, also known as Julien Jin, was charged with conspiracy to commit interstate harassment and unlawful conspiracy to transfer means of identification. Some of his targets were living in the United States.Jin served as Zoom’s in-house liaison to the Chinese government and had extensive interaction with Zoom executives in the United States.Daily Caller:John Demers, the assistant attorney general for national security, said that the case shows that U.S....
-
A devastating cyberattack on US government agencies has also hit targets worldwide, with the list of victims still growing, according to researchers, heightening fears over computer security and espionage.Microsoft said late Thursday that it had notified more than 40 customers hit by the malware, which security experts say came from hackers linked to the Russian government and which could allow attackers unfettered network access."While roughly 80 percent of these customers are located in the United States, this work so far has also identified victims in seven additional countries," Microsoft president Brad Smith said in a blog post.Smith said the victims...
-
The scale of a sophisticated cyberattack on the U.S. government that was unearthed this week is much bigger than first anticipated. The Cybersecurity and Infrastructure Security Agency said in a summary Thursday that the threat “poses a grave risk to the federal government.” It added that “state, local, tribal, and territorial governments as well as critical infrastructure entities and other private sector organizations” are also at risk. CISA believes the attack began at least as early as March. Since then, multiple government agencies have reportedly been targeted by the hackers, with confirmation from the Energy and Commerce departments so far.
-
WASHINGTON — Over the past few years, the U.S. government has spent tens of billions of dollars on cyberoffensive abilities, building a giant war room at Fort Meade, Maryland, for U.S. Cyber Command, while installing defensive sensors all around the country — a system named Einstein to give it an air of genius — to deter the nation’s enemies from picking its networks clean, again.
-
How Google's Jigsaw is fighting the darkest parts of the internet BY KERRY FLYNN JUL 20, 2017 Fake news, terrorist propaganda, hateful comments — the internet is not the nicest place in the world. Jigsaw is trying to change that. Formerly under Google, Jigsaw now is a subsidiary within Alphabet. The company, under the direction of Alphabet chairman Eric Schmidt and Google Ideas founder Jared Cohen who serves as founder and CEO of Jigsaw, focuses on researching some of the darkest corners of the internet and implementing ways to address them. Yasmin Green, director of research and development at Jigsaw,...
-
On November 5th Arizona federal officials raided a home in the Fountain Hills area in Maricopa County. The agents confiscated eight hard drives, three computers and a bag of USB sticks. The house belongs to 56-year-old Elliot Kerwin. The agents were looking for evidence of a cyberattack on an unnamed organization and stolen voter data. Forbes reported: On the morning of November 5, as the 2020 election hung in the balance, Arizona federal agents raided a two-story house in Fountain Hills, Maricopa County, a county that had become a key battleground in the presidential race. The agents were looking for...
-
The agents were looking for evidence of a cyberattack on an unnamed organization and stolen voter data.
-
Action Follows Last Month’s Seizure of 92 IRGC DomainsSAN FRANCISCO – The United States has seized 27 domain names that Iran’s Islamic Revolutionary Guard Corps (IRGC) unlawfully used to further a global covert influence campaign.As described in the seizure documents, all 27 domains were being used in violation of U.S. sanctions targeting both the Government of Iran and the IRGC. Four of the domains purported to be genuine news outlets but were actually controlled by the IRGC and targeted audiences in the United States, to covertly influence United States policy and public opinion, in violation of the Foreign Agents Registration...
-
This interview was setup by Lt Gen McInerney to bring Lt Gen Flynn back into the public eye. Lt Gen McInerney has been popping up on several non-MSM broadcast outlets because he and General Flynn both distrust the MSM completely now, including Fox News. At about time 43:00 Lt Gen McInerney begins discussing the Special Forces Raid on a CIA operated facility in Frankfurt Germany where there were located certain COMPUTER SERVERS that had been controlling voting machines in the US Election. As an aside, a simple description of a computer server is that of a computer that controls other...
-
Holy Radar – that’s the Kracken!!! Who knew it is a Department of Defense Cyber Warfare Program? It Tracks Systems and aquires evidence of nefarious activities and crimes committed by The Deep State! When Sidney Powell stated she HAS RELEASED THE KRAKEN, most of us thought of Clash of the Titans and cheered her on for her gutsy remark. She never blinked and held a stern, a serious face when she said it. She wasn’t joking and now we know why! The “Kraken” is a Department of Defense-run cyber warfare program that tracks and hacks various other systems to acquire...
-
A team of election security experts used a “Google for servers” to challenge claims that voting machines do not connect to the internet and found some did. It was an assurance designed to bolster public confidence in the way America votes: Voting machines “are not connected to the internet.” Then Acting Undersecretary for Cybersecurity and Communications at the Department of Homeland Security Jeanette Manfra said those words in 2017, testifying before Congress while she was responsible for the security of the nation’s voting system. So many government officials like Manfra have said the same thing over the last few years...
-
CIA-developed software to steal votes by intercepting voting machines and switching Trump votes to Biden votes. ... a software "glitch" in Michigan had switched 6,000 votes from Trump to Biden. The glitch was discovered when an effort was made to manually review the ballots, revealing that thousands of votes were switched by the software. ... 47 other counties in Michigan were using the same software. This means the Michigan vote was stolen from Trump, and we are actually being subjected to a cyber warfare assault on America. The same vote rigging software is used in every swing state ... The...
-
ORIGINAL: The Michigan State Republican Party on Friday revealed that a software glitch caused 6,000 Republican ballots to be counted toward Democrat's totals. The issue was eventually corrected when officials in Antrim County hand-counted the ballots, which caused their county to flip to President Donald Trump. According to the Michigan Republican Party Chairwoman, 48 of the state's 83 counties use the same software from Dominion Voting Systems. There are now issues arising in Georgia in Spalding and Morgan Counties after it was revealed that a software update Monday night caused voting machines to crash on Election Day. Spalding County Board...
-
Law enforcement agencies across the country reported brief outages of their 911 systems Monday night, and it was not immediately clear if there was a connection with a major Microsoft system outage. Law enforcement agencies around the country, from Nevada to Pennsylvania and Arizona to Minnesota, tweeted that their 911 systems were down beginning sometime after 7 p.m. ET. Multiple reports indicated outages throughout Delaware and Ohio as well. By 8:15 p.m., many of those departments reported that their services had come back online. Others were still recommending that people call local department numbers instead of the emergency line. The...
-
A report published recently by the U.S. Army describes North Korea’s cyber warfare capabilities and provides information on various units and their missions. The 332-page report, titled “North Korean Tactics,” details North Korean forces and their actions, and one chapter focuses on electronic intelligence warfare, which Pyongyang allegedly uses to collect information on its enemies, deceive its enemies, and launch disruptive and destructive attacks, particularly ones aimed at communication and information systems and infrastructure. North Korea’s electronic warfare includes both lethal and non-lethal methods. Non-lethal methods include electronic jamming and signals reconnaissance, while lethal methods can include physical destruction of...
-
Department of Homeland Security (DHS) officials tried to hack Indiana’s state electoral system with at least 14,800 “scans” or hits between Nov. 1, 2016, to Dec. 16, 2016, The Daily Caller News Foundation Investigative Group has learned. The attacks are the second confirmed IT scanning assault by DHS officials against states that resisted then-President Barack Obama’s attempt to increase federal involvement in state and local election systems by designating them as “critical infrastructure” for national security. Members of the National Association of Secretaries of State voted Saturday at their winter meeting to oppose the designation. They are asking President Donald...
-
As we enter 2020, it appears all too obvious that information warfare (IW) across the globe will worsen. Federal officials expect new attacks for the 2020 elections and have now warned Moscow that they will retaliate if such attacks do occur. Interference in elections, however, is not a Russia only affair. China has interfered in Taiwan's and other Asian elections and is conducting a large, well-funded campaign to insert itself into U.S. media even as it conducts massive influence operations here and globally. Although several worthwhile initiatives have been launched to counter Russian and other cyber and information warfare, the...
|
|
|