Crap am busy atm or I'd go look, help anons
There's a Podesta email that is a long-ass list of judges on /their/ team
See if these guys' names are on it, I bet they are
Crap am busy atm or I'd go look, help anons
There's a Podesta email that is a long-ass list of judges on /their/ team
See if these guys' names are on it, I bet they are
Searched Podesta emails for names of Boasberg and Tigar
Holy cow have a look at this one that popped up re: Boasberg:
https://wikileaks.org/podesta-emails/emailid/44069
No results for search term "Tigar", though
Boasberg's ruling covered for Hillary, basically.
Including the email header from Wikileaks, as the distribution names are relevant.
Am not a lawfag, but the ruling included language that seems to set a legal precedent, namely:
"Plaintiffs “cannot sue to force the recovery of records that they hope or imagine might exist,” Boasberg wrote Jan. 11"
By the same token, this would apply to Democrats attempting to obstruct/delay the law by suing to obtain records they "hope or imagine" may exist.
Posting these because they've been scrubbed. EyeTheSpy gets the same treatment as one of my neighbors: We're not friends and don't talk to each other, but I want to know what's making all that racket coming out of his basement, so I kinda watch.
EyeTheSpy @RealEyeTheSpy 42m42 minutes ago
Re: Q post on D.C. RAT problem: Re: Warnings. Remote Access Trojans -→ Viruses that steal information and controls from behind the scenes. – Think: Power Grids, Hospitals, Internet, Phones; Air Traffic, Etc. Total Control. Keys to the Kingdom. – Stay sharp. High Alert.
EyeTheSpy @RealEyeTheSpy 1h1 hour ago
Never forget the photo, or who is in control. DOITQ #WWG1WGA
EyeTheSpy @RealEyeTheSpy 2h2 hours ago
DC is RAT infested. RAT= Remote Access Trojan. Study→ [HAVEX]. Critical thought.
EyeTheSpy @RealEyeTheSpy 2h2 hours ago
Let me take you further here: [HAVEX] virus (DC is RAT infested)←- what if this were not russian in origin but rather tools used by the old guard (think Marble Framework) to leverage power against future good actors; ie. Industry controls, power grids; etc. Keys to the Kingdom?
EyeTheSpy @RealEyeTheSpy 2h2 hours ago
Who "discovered" [Koala]+ etc.? Who labeled Russia as antagonist? Who had the DNC Servers? Link it up. [CROWDSTRIKE]
EyeTheSpy @RealEyeTheSpy 2h2 hours ago
[DragonFly]+ [Koala]+ [Iron Liberty]+ [Energetic Bear]+ [CROWDSTRIKE] Smoke and Mirrors. [CLAS-9] #DOITQ #WWG1WGA
HCGDESMOINES @HCGdesmoines 2h2 hours ago
Replying to @RealEyeTheSpy
1) WikiLeaks published hundreds of more files from the Vault 7 seriestoday which, it claims, show how CIA can mask its hacking attacks to make it look like it came from other countries, including Russia, China, North Korea and Iran.
Replying to @RealEyeTheSpy
3) The CIA's Marble Framework tool includes a variety of different algorithm with foreign language text intentionally inserted into the malware source code to fool security analysts and falsely attribute attacks to the wrong nation.
0 replies 21 retweets 31 likes
•
•
HCGDESMOINES @HCGdesmoines 2h2 hours ago
Replying to @RealEyeTheSpy
2) Dubbed "Marble," the part 3 of CIA files contains 676 source code files of a secret anti-forensic Marble Framework, which is basically an obfuscator or a packer used to hide the true source of CIA malware.
0 replies 16 retweets 30 likes
QTPi @QTPi3_14 2h2 hours ago
Replying to @RealEyeTheSpy
hackers are after western oil and gas companies. According to the coverage, the attackers are targeting energy grid operators, major electricity generation firms, petroleum pipeline operators, and energy industry industrial equipment providers. In other words: THE GRID
1 reply 12 retweets 14 likes
New conversation
• QosmicQueen17 @QosmicQ 1h1 hour ago
Include the Net, social media and you have it all under your complete control. It's their plan in action.
0 replies 3 retweets 5 likes