Guest views are now limited to 12 pages. If you get an "Error" message, just sign in! If you need to create an account, click here.

Jump to content

RSTEFAN

Platinum VIP
  • Posts

    1,041
  • Joined

  • Last visited

Posts posted by RSTEFAN

  1. very good video in my opinion

    before everyone jumps on me about the Dinar is different - its always been you can buy it here , but you will only get full value if it re-values you will have to be

    in another country  to cash out?  IMO

    Thats why we have the VIP  here IMO

    enjoy the video it has a lot of good points

    • Upvote 1
  2. if anyone is on the fence with bitcoin?  this is a very compelling video based to push bitcoin

    i have not jumped into bitcoin yet.  i don't buy the gold scare that is on this video, just saying,  this video is well done.   ENJOY

    like anything you have to make up your own mind!

     

    • Upvote 2
  3. very interesting things coming out lately?

    http://www.dailymail.co.uk/news/article-4289942/WikiLeaks-publish-1000s-says-CIA-documents.html  -   If you go to the link there is more info than what was pasted

    CIA can and does hack almost EVERY device: Giant WikiLeak of agency's secrets reveals it infiltrates iPhones, smart TVs and Whatsapp and can even take over self-driving cars which could be programmed to kill 

    • WikiLeaks published 8,761 documents and files claiming to be from the CIA's Center for Cyber Intelligence on Tuesday
    • Leak details information on how CIA-developed malware can target iPhones, Android phones and smart TVs
    • WikiLeaks alleges some remote hacking programs can turn electronic devices into recording and transmitting stations to spy on targets
    • Documents also claims the CIA can bypass encryption of Whatsapp, Signal, Telegram, Wiebo, Confide and Cloakman by hacking smartphones
    • CIA investigated hacking control systems in cars and trucks, which would allow agency to engage in nearly undetectable assassinations 

    By Emily Crane For Dailymail.com and Associated Press

     

    WikiLeaks has published thousands of documents claiming to reveal top CIA hacking secrets, including the agency's ability to infiltrate encrypted apps like Whatsapp, break into smart TVs and phones and program self-driving cars.

    WikiLeaks said the files released on Tuesday - mysteriously dubbed ' Vault 7' - are the most comprehensive release of U.S. spying files ever made public. 

    The leak purportedly includes 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. 

    It details intelligence information on CIA-developed software intended to hack iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems.

    WikiLeaks alleges that some of the remote hacking programs can turn these electronic devices into recording and transmitting stations to spy on their targets.

    It also claims the CIA can bypass the encryption of Whatsapp, Signal, Telegram, Wiebo, Confide and Cloakman by hacking the smart phones the applications run on. 

    The CIA was also looking at hacking the vehicle control systems used in modern cars and trucks, WikiLeaks claims.

    Scroll down for video 

     

    WikiLeaks, founded by Julian Assange, has published thousands of documents that it says come from the CIA's Center for Cyber Intelligence
    • SHARE PICTURE
    •  
    •  
    •  
    •  
    •  
     

    Copy link to paste in your message

     
    <img id="i-a7b0f6f37d0b7807" src="http://i.dailymail.co.uk/i/pix/2017/03/07/14/3DD1062200000578-4289942-image-a-1_1488897285235.jpg" height="406" width="634" alt="WikiLeaks, founded by Julian Assange, has published thousands of documents that it says come from the CIA's Center for Cyber Intelligence" class="blkBorder img-share"/>

    WikiLeaks, founded by Julian Assange, has published thousands of documents that it says come from the CIA's Center for Cyber Intelligence

     
     
     
     
     

    According to a document in 2014, CIA's Embedded Devices Branch met to discuss malware that could infect vehicle systems.

    'The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations,' WikiLeaks said.

    The documents could not immediately be authenticated, but WikiLeaks has a long track record of releasing top secret government documents. A spokesman for the CIA would not comment.

    WikiLeaks, which had been dropping cryptic hints about the release for a month, said in a lengthy statement that the CIA had 'recently' lost control of a massive arsenal of CIA hacking tools as well as associated documentation. 

    The organization said that 'the archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner' and that one of them 'provided WikiLeaks with portions of the archive.'

    They said the archive of files - referred to as Year Zero - introduces the scope of the CIA's global covert hacking program and includes software that could allow people to take control of consumer electronic products. 

    The documents cover a range of topics, including what appeared to be a discussion about how to compromise smart televisions and turn them into improvised surveillance devices. 

    The alleged program called 'Weeping Angel' is said to have been developed in conjunction with the British spy agency MI5 and allows them to hack a Samsung smart TV when it is seemingly switched off.

    'After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on,' the files say, according to WikiLeaks.

    'In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.'  

     

     

    Copy link to paste in your message

     
    <img id="i-9173124b94de0075" src="http://i.dailymail.co.uk/i/pix/2017/03/07/15/3E0AE44400000578-4289942-image-a-19_1488900759791.jpg" height="367" width="634" alt="" class="blkBorder img-share"/>

     

    3E0B9BF800000578-4289942-image-m-22_1488
    • SHARE PICTURE
    •  
    •  
    •  
    •  
    •  
     

    Copy link to paste in your message

     
    +6
    <img id="i-20da8e641aa59b7c" src="http://i.dailymail.co.uk/i/pix/2017/03/07/16/3E0B9BF800000578-4289942-image-m-22_1488905931814.jpg" height="875" width="634" alt="" class="blkBorder img-share"/>
     

     

    The files detail intelligence information on CIA-developed software intended to hack iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems

     

     

    Copy link to paste in your message

     
    <img id="i-ac6f91c90d587f5b" src="http://i.dailymail.co.uk/i/pix/2017/03/07/20/3E0C074200000578-4289942-image-m-49_1488918770972.jpg" height="656" width="634" alt="The files detail intelligence information on CIA-developed software intended to hack iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems" class="blkBorder img-share"/>

    The files detail intelligence information on CIA-developed software intended to hack iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems

    WikiLeaks said the leaked data also included details on the agency's efforts to subvert American software products and smartphones, including Apple's iPhone, Google's Android and Microsoft's Windows. 

    The files claim the CIA  had developed numerous attacks to remotely hack and control popular smart phones. 

    'Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone,' the files state.

    'A similar unit targets Google's Android which is used to run the majority of the world's smart phones including Samsung, HTC and Sony.' 

    According to WikiLeaks, the CIA knew about several flaws in software made by Apple, Google, Samsung and others but didn't tell the companies about them. 

    Disclosing such vulnerabilities is supposed to be common practice so companies could fix them before hackers use them. But WikiLeaks says the CIA kept knowledge of the vulnerabilities to itself for use in bypassing the encryption on apps such as WhatsApp, Signal, Telegram and Confide.

    WikiLeaks says the CIA had two dozen such undisclosed vulnerabilities for Android gadgets alone. 

     

    A 'substantial library' of digital espionage techniques borrowed from Russia and other countries is in the data as well, WikiLeaks said.  

    WikiLeaks claims each technique the CIA has created 'forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity'. 

    'The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

    'With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.' 

    WikiLeaks said it redacted the names of CIA officers and avoided publishing damaging details of cyber weapons.

    They said they will refrain from doing do 'until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.' 

    The files also reveal that in addition to its operations in Virginia, the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

    The leak purportedly includes 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina (above)
    • SHARE PICTURE
    •  
    •  
    •  
    •  
    •  
     

    Copy link to paste in your message

     
    +6
    <img id="i-8f09d7b77b7935c5" src="http://i.dailymail.co.uk/i/pix/2017/03/07/17/3E0BB2ED00000578-4289942-image-a-23_1488907169605.jpg" height="417" width="634" alt="The leak purportedly includes 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina (above)" class="blkBorder img-share"/>

    The leak purportedly includes 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina (above)

    WikiLeaks said in a lengthy statement that the files, mysteriously dubbed ' Vault 7', are the most comprehensive release of U.S. spying files ever made public
    • SHARE PICTURE
    •  
    •  
    •  
    •  
    •  
     

    Copy link to paste in your message

     
    +6
    <img id="i-f3a154c384a51ebf" src="http://i.dailymail.co.uk/i/pix/2017/03/07/14/3E0AE5B200000578-4289942-image-a-18_1488898716068.jpg" height="751" width="634" alt="WikiLeaks said in a lengthy statement that the files, mysteriously dubbed ' Vault 7', are the most comprehensive release of U.S. spying files ever made public" class="blkBorder img-share"/>

    WikiLeaks said in a lengthy statement that the files, mysteriously dubbed ' Vault 7', are the most comprehensive release of U.S. spying files ever made public

    Wikileaks said the release of confidential documents on the agency already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

    Experts who've started to sift through the material said it appeared legitimate - and that the release was almost certain to shake the CIA. 

    If it did prove legitimate, the dump would represent yet another catastrophic breach for the U.S. intelligence community at the hands of WikiLeaks and its allies, which have repeatedly humbled Washington with the mass release of classified material.

     

    Jake Williams, a security expert with Augusta, Georgia-based Rendition Infosec, has experience dealing with government hackers. He said that the voluminous files' extensive references to operation security meant they were almost certainly government-backed.

    'I can't fathom anyone fabricated that amount of operational security concern,' he said. 'It rings true to me.'

    'The only people who are having that conversation are people who are engaging in nation-state-level hacking.' 

    Bob Ayers, a retired U.S. intelligence official currently working as a security analyst, agreed, saying that the release was 'real bad' for the agency.

    Ayers noted that WikiLeaks has promised to release more CIA documents, saying Tuesday's publication was just 'the first full part of the series.'

    'The damage right now is relatively high-level,' he said. '(But) the potential for really detailed damage will come in the following releases.'

     

     

    ADVERTISING



    Read more: http://www.dailymail.co.uk/news/article-4289942/WikiLeaks-publish-1000s-says-CIA-documents.html#ixzz4ajn1jjkh
    Follow us: @MailOnline on Twitter | DailyMail on Facebook

    • Upvote 1
  4. http://usawatchdog.com/noahs-flood-of-cash-coming-hugo-salinas-price/

    Noah’s Flood of Cash Coming-Hugo Salinas Price

    By Greg Hunter On March 8, 2017 In Market Analysis 2 Comments

    4b-300x227.jpgBy Greg Hunter’s USAWatchdog.com

    Mexican billionaire and retail magnate Hugo Salinas Price is a big proponent of using silver as money in Mexico. Salinas Price explains, “The idea is not to go back to a silver standard, but to create a parallel currency which would be a monetized silver coin.  It would not bear a stamped value.  It would be a plain silver coin with a quoted value given to it.  This value would be adjusted upward with a fall in the value of the peso or a rise with the price of silver.”

    Salinas Price pushed ideas similar to this in the past. This idea is being talked about again in the Mexican legislature, but there is no guarantee it will become a reality.  Why silver coins for the Mexican people?  Salinas Price says, “All material progress comes from saving, not from spending.  You have to save first, and from savings comes investment, and from investment comes jobs and income for a better way of life.  Savings are the primary source of prosperity.”

    It may get to be impossible to save in paper currency soon. Salinas Price reminds us that there are trillions and trillions of dollars in bonds hanging over the head of everyone on the planet.  When those bonds start liquidating, it’s going to rain inflationary money.  Salinas Price goes on to say, “All those clouds overhead are denominated in hundreds of trillions of dollars of debt hovering above the world.  It’s like a dark cloud.  There comes a point when that wants to become liquidated.  Bonds are presented for liquidation and turned into cash.  That’s when the trouble is going to start.  When they are liquidated, we are going to have a Noah’s Flood of cash.  With all this debt turned into cash, we are going to be wading in money.”

    Could a Fed rate hike start the bond market to liquidate? Salinas Price contends, “Apocalypse is upon us . . . this boom in stocks is about to collapse.  The total debt when Reagan came into office was $391 billion.  Now, it’s $20 trillion.  Something has got to give.  When interest rates start to go up, as they might on March 15th, we are going to see liquidation.  People are going to say bonds are falling in value because interest rates are going up, I think I want to sell my bonds. . . .  I also think the stock market is going to collapse, a big collapse is coming.  I also think gold is being hammered in preparation for what’s going to happen.  I think it has been taken down, so, when it starts to go up, it will go up from a lower level.”

    So, will we get hyperinflation? Salinas Price says, “I don’t know if it’s going to happen right now, but something is going to happen with this huge amount of debt.  It just can’t go on, and how is it going to end?  It’s going to end badly.  A lot of wealth is going to disappear. . . . I think, in the U.S. on March 15th, all hell is going to break loose because the U.S. will reach its debt limit.”

    Join Greg Hunter as he goes One-on-One with billionaire financial expert Hugo Salinas Price.

    (There is much more in the video interview.)

    After the Interview:

    Hugo Salinas Price has two free websites in Spanish and English.   It’s Plata.com.mxClick here for the English version.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.