Anonymous ID: 7bba1d April 16, 2018, 4:34 p.m. No.1069913   🗄️.is 🔗kun

In addition to sabotage, foreign intelligence agencies have continually targeted Iranian infrastructure for purposes of espionage, a fact made public to Iran through the intelligence disclosures of [Edward Snowden]. A former U.S. National Security Agency (NSA) worker, Snowden leaked a presentation on a tool known as Boundless Informant showing Iran to be one of the most highly surveilled countries in the world: billions of Iranian internet and telephone records have been collected by the intelligence agencies of the United States and its partners. In fact, Iran is so frequently surveilled that a Canadian espionage operation targeting Iran once stumbled across a French-run intelligence operation that had compromised the very same network.

 

@Snowden revealed to Iran that we were spying and surveilling them.

 

http:// carnegieendowment.org/files/Iran_Cyber_Final_Full_v2.pdf

Anonymous ID: 7bba1d April 16, 2018, 4:41 p.m. No.1069993   🗄️.is 🔗kun

>>1069963

CIA's venture capital arm. We pay the CIA with our taxes and they give tech and $ to these new companies in exchange for them to put in back doors and surveillance tech into the products.

 

Black hat.

Anonymous ID: 7bba1d April 16, 2018, 4:58 p.m. No.1070201   🗄️.is 🔗kun   >>0406 >>0649

<NSA's "Magic Kitten"

 

CrowdStrike, another American cybersecurity company, accounts for part of this focus on “international corporations, mainly in the technology sector” and other political targets.52 An NSA slide with a victim map portrays a broad-reaching operation targeting nearly every country in the Middle East. Sinkhole data collected from expired domains previously used as relays and other fallback infrastructure suggest that Magic Kitten, or the malware agent used, continues to actively compromise individuals in Germany, Indonesia, Iraq, Lebanon, the Netherlands, Palestine, Pakistan, Qatar, Sweden, Switzerland, Thailand, and the United Arab Emirates. Notably, compromised individuals in Iraq were also typically in Iraqi Kurdistan, mirroring a common pattern with other threat actors. A diagram within the NSA presentation suggests that the malware agent employed by Magic Kitten was also used at the time by Iran’s Shia Lebanese proxy Hezbollah, under independent infrastructure. While Hezbollah has been known to maintain its own offensive cyber operations and engage in intelligence sharing with Iran, there has been little prior evidence of direct sharing of tools

 

http:// carnegieendowment.org/files/Iran_Cyber_Final_Full_v2.pdf

Anonymous ID: 7bba1d April 16, 2018, 5 p.m. No.1070236   🗄️.is 🔗kun

EXTRA RBG SAUCE IF NEEDED

 

Q's PDF WAS WRITTEN BASED IN RBG's OWN BOOK

 

https:// www.law.umaryland.edu/marshall/usccr/documents/cr12se9.pdf

Anonymous ID: 7bba1d April 16, 2018, 5:18 p.m. No.1070437   🗄️.is 🔗kun   >>0569

>>1070430

>It seems that alot of these couples have the wife doing whatever they're really trying to do, while the husband is in a tangential power position that indirectly facilitates the wifes work.

 

BINGO