Anonymous ID: 5201df July 18, 2020, 2:08 p.m. No.10002663   🗄️.is 🔗kun

Anon's random thoughts about the Epstein Security Cameras

 

When TheShadowBrokers were leaking/trying to sell NSA tools back in 2016, could these tools [1] have been stolen by Snowden? One Harold Thomas Martin III was reported as prime suspect for the Equation Group leaks, but investigators could never come clean about Martin's motive, they found no clear evidence for espionage. And there was no evidence at all that Martin actually accessed any of the files he stole [2].

 

Now the Epstein Camera Screenshot (CH15) [3] shows a Timestamp from 2013. But the FBI didn't raid Epstein's little pedo Island until 2019. So perhaps the surveillance camera system there was cloud based, or mirrored/backed up to a remote location, and the transmissions were intercepted by the NSA? Or the NSA had already compromised the supposedly IP based surveillance system.

 

Before Snowden joined the CIA for the NSA in 2009. But one doesn't ever really leave the Company, right? So what if Snowden acted indirectly (through the Company) on behalf of the Maxwell/Epstein operation? Maybe the Cult found out about the NSA having infiltrated their comms? Since we are talking about supposedly very well connected and powerful people, it's possible that someone (or another ABC agency) tipped one of them off to an ongoing surveillance op. And the Cult could then have ordered a CIA hit on the NSA to render the NSA op worthless and cripple them in retaliation. Interestingly, Snowden first leaked NSA information before June 5, 2013 [4], meanwhile litigation against Epstein begun anew (after his 2008 sentence) shortly after, in 2014 w/ Jane Does v. Epstein [5].

 

By June 23, 2013, Snowden had fled to Moscow. Coincidentally, TheShadowBrokers reportedly also stole "a few disks full" of NSA secrets in 2013 [6]. Snowden offered his own theory about the leak, suggesting that the NSA got lazy and didn't remove their tools from a proxy server they compromised, when that proxy server was then subsequently compromised by TheShadowBrokers [7]. That does, however, not make sense - Why would the NSA ever load all their tools on a compromised proxy server. A sensible attacker would only load a small set of essential tools (as dictated by the operation/mission) onto a compromised system in the first place, and never ever their entire library of tools.

 

[1] https://gist.github.com/bontchev/e5d2e5090ebe1be89b4f821ebb1ad0f9

[2] https://en.wikipedia.org/wiki/Harold_T._Martin_III

[3] >>10001728

[4] https://whistleblower.org/snowden-timeline/

[5] https://en.wikipedia.org/wiki/Jeffrey_Epstein

[6] https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/

[7] https://twitter.com/Snowden/status/765514477341143040