I got it from Twitter. Currently trying to locate the user who posted it. Will provide it for you. Just give me a few moments.
okay, sorry for the repost then!
FLASHBACK: Bill Clinton's foundation cashed in as Sweden lobbied Hillary on Iran-related sanctions
https://www.washingtontimes.com/news/2015/jun/2/clinton-foundations-sweden-fundraising-arm-cashed-/
Bill Clinton’s foundation set up a fundraising arm in Sweden that collected $26 million in donations at the same time that country was lobbying Hillary Rodham Clinton’s State Department to forgo sanctions that threatened its thriving business with Iran, according to interviews and documents obtained by The Washington Times.
The Swedish entity, called the William J. Clinton Foundation Insamlingsstiftelse, was never disclosed to or cleared by State Department ethics officials, even though one of its largest sources of donations was a Swedish government-sanctioned lottery.
The secret cyberattack missions of America's stealth subs revealed: Experts admit 'highly prized' offensive capabilities can hack enemy networks from under the sea
Navy bosses say US stealth subs are 'very involved' on the front lines
Say they are 'doing exactly the kind of things you would want them to do'
Believed they are used to infiltrate enemy networks
Drones being developed to get even closer to enemy communications
http://www.dailymail.co.uk/sciencetech/article-3718669/The-secret-cyberattack-missions-America-s-stealth-subs-revealed-Experts-admit-highly-prized-offensive-capabilities-hack-enemy-networks-sea.html
It has previously been revealed the USS Annapolis (pictured) is among the submarines being used.
'This is where I really can't talk about much, but suffice to say we have submarines out there on the front lines that are very involved, at the highest technical level, doing exactly the kind of things that you would want them to do.'
HOW A SUBMARINE CAN CONDUCT A CYBERATTACK
Included in the National Security Agency documents leaked by Edward Snowden is a classified Powerpoint training presentation for workers at the Naval Information Operations Command Maryland—the Navy component of the NSA.
It reveals computer network exploitation (CNE) 'to change or collect information residing on or transiting computer networks.'
The heavily redacted presentation includes an example of a 'tailored access operations' target for these military hackers: an unidentified nation's president, Parliament, and military leaders:
One diagram shows how the network works, from antenna to collection platform to satellite transmission to analysis and final exploitation.
Targeted signals are captured by antennas, run through an NSA software program known as 'BLINDDATE,' and sent off to the analysts.
At the center of that flowchart from the Snowden trove is a single ship—the conduit for all this clandestine activity, and the home base for those antennas and the computer that runs BLINDDATE - the USS Annapolis.
One diagram shows how the network works, from antenna to collection platform to satellite transmission to analysis and final exploitation.
In a typical week, according to NIOC-Maryland's 2013 briefing, the U.S. ran about 2,600 network exploitations.
The Navy ran nearly 700, or 26 percent, of those ops—almost as many as the other military services combined.
hmmmmmmm
While it is common to associate mainframe computers with IBM, the reality is that several manufacturers produced mainframe computers from the late 1950s through the 1970s. The group of manufacturers was often referred to as "Snow White and the Seven Dwarfs". In that context, Snow White was IBM and the seven dwarfs were Burroughs, UNIVAC, NCR, Control Data Corporation, Honeywell, General Electric and RCA. IBM will likely be a major player in the emerging generation of mainframe computing. However, this time its competition will come from giant competitors, not dwarfs.
Starting in the late 1950s and lasting for several decades, the most common form of computing was based on mainframe computers. The first major blow to the dominance of mainframes came from the broad deployment of mini computers and the second major blow came from the even broader development of personal computers. While mainframe computers never went away, they languished for years in relative obscurity. However, as will be explained in the next few newsletters, there is evidence to suggest that we are entering a new era of mainframe computing.
https://www.networkworld.com/article/2212166/lan-wan/snow-white-and-the-seven-dwarfs.html
https://www.cia.gov/library/readingroom/document/cia-rdp80-01601r000300320037-7
UHM? WTF…this is a link to the CIA library titled 'The-Not-So-Private Life of Snow-White'
and it's just one picture on one page.
San Bernardino, CA
another odd one..
https://www.cia.gov/library/readingroom/document/cia-rdp90-00965r000100150137-7
FBI, CIA PLAY A LITTLE GAME OF SNOW WHITE
shutting down FAKE NEWS ability to censor what POTUS is about to say tonight?
I bet you Q is listening to this while utterly destroying the clowns capabilities to communicate and censor..and he's doing it with a giant smile on his face.
Have a nice day, Q!
Q ain't fucking around no more Cabal. If you thought you were fucked before, be prepared for a whole new level of fucked. Then a couple more above that.