Anonymous ID: f79959 Nov. 25, 2018, 9:18 p.m. No.4033024   🗄️.is 🔗kun   >>3126

>>4032922

Crap am busy atm or I'd go look, help anons

There's a Podesta email that is a long-ass list of judges on /their/ team

See if these guys' names are on it, I bet they are

Anonymous ID: f79959 Nov. 25, 2018, 9:34 p.m. No.4033185   🗄️.is 🔗kun   >>3381 >>3398

>>4032922

Searched Podesta emails for names of Boasberg and Tigar

 

Holy cow have a look at this one that popped up re: Boasberg:

https://wikileaks.org/podesta-emails/emailid/44069

 

No results for search term "Tigar", though

Anonymous ID: f79959 Nov. 25, 2018, 10:10 p.m. No.4033453   🗄️.is 🔗kun

>>4033381

Am not a lawfag, but the ruling included language that seems to set a legal precedent, namely:

 

"Plaintiffs “cannot sue to force the recovery of records that they hope or imagine might exist,” Boasberg wrote Jan. 11"

 

By the same token, this would apply to Democrats attempting to obstruct/delay the law by suing to obtain records they "hope or imagine" may exist.

Anonymous ID: f79959 Nov. 25, 2018, 10:18 p.m. No.4033498   🗄️.is 🔗kun   >>3523

Posting these because they've been scrubbed. EyeTheSpy gets the same treatment as one of my neighbors: We're not friends and don't talk to each other, but I want to know what's making all that racket coming out of his basement, so I kinda watch.

 

EyeTheSpy‏ @RealEyeTheSpy 42m42 minutes ago

Re: Q post on D.C. RAT problem: Re: Warnings. Remote Access Trojans -→ Viruses that steal information and controls from behind the scenes. – Think: Power Grids, Hospitals, Internet, Phones; Air Traffic, Etc. Total Control. Keys to the Kingdom. – Stay sharp. High Alert.

EyeTheSpy‏ @RealEyeTheSpy 1h1 hour ago

Never forget the photo, or who is in control. DOITQ #WWG1WGA

EyeTheSpy‏ @RealEyeTheSpy 2h2 hours ago

DC is RAT infested. RAT= Remote Access Trojan. Study→ [HAVEX]. Critical thought.

EyeTheSpy‏ @RealEyeTheSpy 2h2 hours ago

Let me take you further here: [HAVEX] virus (DC is RAT infested)←- what if this were not russian in origin but rather tools used by the old guard (think Marble Framework) to leverage power against future good actors; ie. Industry controls, power grids; etc. Keys to the Kingdom?

EyeTheSpy‏ @RealEyeTheSpy 2h2 hours ago

Who "discovered" [Koala]+ etc.? Who labeled Russia as antagonist? Who had the DNC Servers? Link it up. [CROWDSTRIKE]

EyeTheSpy‏ @RealEyeTheSpy 2h2 hours ago

[DragonFly]+ [Koala]+ [Iron Liberty]+ [Energetic Bear]+ [CROWDSTRIKE] Smoke and Mirrors. [CLAS-9] #DOITQ #WWG1WGA

HCGDESMOINES‏ @HCGdesmoines 2h2 hours ago

Replying to @RealEyeTheSpy

1) WikiLeaks published hundreds of more files from the Vault 7 seriestoday which, it claims, show how CIA can mask its hacking attacks to make it look like it came from other countries, including Russia, China, North Korea and Iran.

Replying to @RealEyeTheSpy

3) The CIA's Marble Framework tool includes a variety of different algorithm with foreign language text intentionally inserted into the malware source code to fool security analysts and falsely attribute attacks to the wrong nation.

0 replies 21 retweets 31 likes

HCGDESMOINES‏ @HCGdesmoines 2h2 hours ago

Replying to @RealEyeTheSpy

2) Dubbed "Marble," the part 3 of CIA files contains 676 source code files of a secret anti-forensic Marble Framework, which is basically an obfuscator or a packer used to hide the true source of CIA malware.

0 replies 16 retweets 30 likes

QTPi‏ @QTPi3_14 2h2 hours ago

Replying to @RealEyeTheSpy

hackers are after western oil and gas companies. According to the coverage, the attackers are targeting energy grid operators, major electricity generation firms, petroleum pipeline operators, and energy industry industrial equipment providers. In other words: THE GRID

1 reply 12 retweets 14 likes

New conversation

• QosmicQueen17‏ @QosmicQ 1h1 hour ago

Include the Net, social media and you have it all under your complete control. It's their plan in action.

0 replies 3 retweets 5 likes