W_Intelligence (OSINT/COINTEL & Disclosure)
(19 JULY 2020)
Media is too big
VIEW IN TELEGRAM
Ghislaine... Geraldo & Weiner
W_Intelligence (OSINT/COINTEL & Disclosure)
Ghislaine... Geraldo & Weiner
YouTube
Sidney Powell | How to Fix Justice
Sidney Powell has practiced law for many years, primarily in the fifth U.S. circuit court of appeals.
Support Hillsdale College: https://secured.hillsdale.edu/hillsdale/support-hillsdale-college
Visit our website: http://hillsdale.edu
Learn from our online…
Support Hillsdale College: https://secured.hillsdale.edu/hillsdale/support-hillsdale-college
Visit our website: http://hillsdale.edu
Learn from our online…
W_Intelligence (OSINT/COINTEL & Disclosure)
1st Space Operations Squadron (Colorado)
Schriever Air Force Base
Team 8-ball participates in first advanced training event
Twelve operators from the 1st and 7th Space Operations Squadrons, known together as team 8-ball, executed an orbital engagement training event July 7-10 at the Boeing Virtual Warfare Center in
W_Intelligence (OSINT/COINTEL & Disclosure)
1st Space Operations Squadron (Colorado)
“We have definitely taken it to the next level.” The wargame looked at technology that is anticipated to be fielded over the next 10 years and examined what a space engagement in the 2028 timeframe may look like.
The objectives of the game included: working with international partner capabilities; gaining insight into resiliency and deterrence through synchronization of space and cyberspace operations; examining various combined command-and-control frameworks; and identifying strategic and operational contributions of space and cyberspace in multi-domain conflict, according to Air Force Space Command.”
The objectives of the game included: working with international partner capabilities; gaining insight into resiliency and deterrence through synchronization of space and cyberspace operations; examining various combined command-and-control frameworks; and identifying strategic and operational contributions of space and cyberspace in multi-domain conflict, according to Air Force Space Command.”
W_Intelligence (OSINT/COINTEL & Disclosure)
1st Space Operations Squadron (Colorado)
This media is not supported in your browser
VIEW IN TELEGRAM
...for the ladies... (no misogyny here)
“If this is an attack.....someone owns 1/3rd of our country right now (5+ billion searches a day) and anything they do will look like magic to 80%+ of people
If I was attacking.....the industrial systems (check, hit this past week across our country....but spread apart almost like an automated noscript was being created), then the banking system(transaction for business as target), and then communication (altering search and denying things that didn't fit my war agenda)
A probe for weakness would have determined that it could be done. Not gone and implemented it.
If this is covid tracking...no....just....why would Google use a self signed cert?
I still haven't gotten this on my machine. My certs from Google are all issued 2006 and are good thru to the end of the year.
But that doesn't allow us to make predictions.
For example; if this is intentional and malicious - and is becoming known publicly (meaning the countdown in which it can be used maliciously before being fixed has been started) - if this is intentional and malicious more industrial glitches to US manufacturing this upcoming week.
If this is intentional but not malicious I would be dropping a zero day on every device with the intent to monitor and report (with the potential to report back and get new instructions)
I wonder if an already hacked and modified device was hacked by someone else
...I've seen that cause some weird shit.
Program the PLC. Have it do xx and report over Ethernet.
Hack plc. Program it to do something but hook into the Ethernet stack and give out bad data so you can make the processing plant pump faster.
Hack plc 2nd time. Program it to do something else that is unknown to hacker 1 and designer. Hacker 1 cares about designer without thinking about hacker 2.
Hacker 2 modifies an already modified PLC and jmps the wrong assembly instruction because of the modification. The Ethernet port is now down
Given the level of technological specification required....it can't be an accident. So it must be intentional.
Can almost rule out individuals due to # of targets and level of cohesion required.
The whole week? The planet keeps spinning and the sun keeps burning even if we blow ourselves to smithereens.
Beyond that it's too much of a 🎢 to say with any reasonable confidence interval despite this I'm still going to predicit US State lockdowns going into effect.”
(Intel Member) https://news.1rj.ru/str/wokeintelchat/1578
If I was attacking.....the industrial systems (check, hit this past week across our country....but spread apart almost like an automated noscript was being created), then the banking system(transaction for business as target), and then communication (altering search and denying things that didn't fit my war agenda)
A probe for weakness would have determined that it could be done. Not gone and implemented it.
If this is covid tracking...no....just....why would Google use a self signed cert?
I still haven't gotten this on my machine. My certs from Google are all issued 2006 and are good thru to the end of the year.
But that doesn't allow us to make predictions.
For example; if this is intentional and malicious - and is becoming known publicly (meaning the countdown in which it can be used maliciously before being fixed has been started) - if this is intentional and malicious more industrial glitches to US manufacturing this upcoming week.
If this is intentional but not malicious I would be dropping a zero day on every device with the intent to monitor and report (with the potential to report back and get new instructions)
I wonder if an already hacked and modified device was hacked by someone else
...I've seen that cause some weird shit.
Program the PLC. Have it do xx and report over Ethernet.
Hack plc. Program it to do something but hook into the Ethernet stack and give out bad data so you can make the processing plant pump faster.
Hack plc 2nd time. Program it to do something else that is unknown to hacker 1 and designer. Hacker 1 cares about designer without thinking about hacker 2.
Hacker 2 modifies an already modified PLC and jmps the wrong assembly instruction because of the modification. The Ethernet port is now down
Given the level of technological specification required....it can't be an accident. So it must be intentional.
Can almost rule out individuals due to # of targets and level of cohesion required.
The whole week? The planet keeps spinning and the sun keeps burning even if we blow ourselves to smithereens.
Beyond that it's too much of a 🎢 to say with any reasonable confidence interval despite this I'm still going to predicit US State lockdowns going into effect.”
(Intel Member) https://news.1rj.ru/str/wokeintelchat/1578
Telegram
Elievo in Woke Intelligence (Chat)
If this is an attack.....someone owns 1/3rd of our country right now (5+ billion searches a day) and anything they do will look like magic to 80%+ of people
If I was attacking.....the industrial systems (check, hit this past week across our country....but…
If I was attacking.....the industrial systems (check, hit this past week across our country....but…
W_Intelligence (OSINT/COINTEL & Disclosure)
160th SOAR (A)
This media is not supported in your browser
VIEW IN TELEGRAM
(I personally know this pilot he’s referring to...solid dude. Corporate Sales World almost killed him.)