Anonymous ID: fb1b5a Aug. 30, 2018, 3:29 p.m. No.2804715   🗄️.is đź”—kun

FLASHBACK: Bill Clinton's foundation cashed in as Sweden lobbied Hillary on Iran-related sanctions

 

https://www.washingtontimes.com/news/2015/jun/2/clinton-foundations-sweden-fundraising-arm-cashed-/

 

Bill Clinton’s foundation set up a fundraising arm in Sweden that collected $26 million in donations at the same time that country was lobbying Hillary Rodham Clinton’s State Department to forgo sanctions that threatened its thriving business with Iran, according to interviews and documents obtained by The Washington Times.

 

The Swedish entity, called the William J. Clinton Foundation Insamlingsstiftelse, was never disclosed to or cleared by State Department ethics officials, even though one of its largest sources of donations was a Swedish government-sanctioned lottery.

Anonymous ID: fb1b5a Aug. 30, 2018, 3:32 p.m. No.2804756   🗄️.is đź”—kun

The secret cyberattack missions of America's stealth subs revealed: Experts admit 'highly prized' offensive capabilities can hack enemy networks from under the sea

Navy bosses say US stealth subs are 'very involved' on the front lines

Say they are 'doing exactly the kind of things you would want them to do'

Believed they are used to infiltrate enemy networks

Drones being developed to get even closer to enemy communications

 

http://www.dailymail.co.uk/sciencetech/article-3718669/The-secret-cyberattack-missions-America-s-stealth-subs-revealed-Experts-admit-highly-prized-offensive-capabilities-hack-enemy-networks-sea.html

 

It has previously been revealed the USS Annapolis (pictured) is among the submarines being used.

 

'This is where I really can't talk about much, but suffice to say we have submarines out there on the front lines that are very involved, at the highest technical level, doing exactly the kind of things that you would want them to do.'

 

HOW A SUBMARINE CAN CONDUCT A CYBERATTACK

Included in the National Security Agency documents leaked by Edward Snowden is a classified Powerpoint training presentation for workers at the Naval Information Operations Command Maryland—the Navy component of the NSA.

 

It reveals computer network exploitation (CNE) 'to change or collect information residing on or transiting computer networks.'

 

The heavily redacted presentation includes an example of a 'tailored access operations' target for these military hackers: an unidentified nation's president, Parliament, and military leaders:

 

One diagram shows how the network works, from antenna to collection platform to satellite transmission to analysis and final exploitation.

 

Targeted signals are captured by antennas, run through an NSA software program known as 'BLINDDATE,' and sent off to the analysts.

 

At the center of that flowchart from the Snowden trove is a single ship—the conduit for all this clandestine activity, and the home base for those antennas and the computer that runs BLINDDATE - the USS Annapolis.

 

One diagram shows how the network works, from antenna to collection platform to satellite transmission to analysis and final exploitation.

 

In a typical week, according to NIOC-Maryland's 2013 briefing, the U.S. ran about 2,600 network exploitations.

 

The Navy ran nearly 700, or 26 percent, of those ops—almost as many as the other military services combined.

Anonymous ID: fb1b5a Aug. 30, 2018, 3:33 p.m. No.2804786   🗄️.is đź”—kun

>>2804728

>>2804728

hmmmmmmm

 

While it is common to associate mainframe computers with IBM, the reality is that several manufacturers produced mainframe computers from the late 1950s through the 1970s. The group of manufacturers was often referred to as "Snow White and the Seven Dwarfs". In that context, Snow White was IBM and the seven dwarfs were Burroughs, UNIVAC, NCR, Control Data Corporation, Honeywell, General Electric and RCA. IBM will likely be a major player in the emerging generation of mainframe computing. However, this time its competition will come from giant competitors, not dwarfs.

 

Starting in the late 1950s and lasting for several decades, the most common form of computing was based on mainframe computers. The first major blow to the dominance of mainframes came from the broad deployment of mini computers and the second major blow came from the even broader development of personal computers. While mainframe computers never went away, they languished for years in relative obscurity. However, as will be explained in the next few newsletters, there is evidence to suggest that we are entering a new era of mainframe computing.

 

https://www.networkworld.com/article/2212166/lan-wan/snow-white-and-the-seven-dwarfs.html

Anonymous ID: fb1b5a Aug. 30, 2018, 3:39 p.m. No.2804954   🗄️.is đź”—kun   >>5010 >>5141 >>5292

https://www.cia.gov/library/readingroom/document/cia-rdp80-01601r000300320037-7

 

UHM? WTF…this is a link to the CIA library titled 'The-Not-So-Private Life of Snow-White'

 

and it's just one picture on one page.

 

San Bernardino, CA

Anonymous ID: fb1b5a Aug. 30, 2018, 3:46 p.m. No.2805202   🗄️.is đź”—kun

I bet you Q is listening to this while utterly destroying the clowns capabilities to communicate and censor..and he's doing it with a giant smile on his face.

 

Have a nice day, Q!