Spread the love

GOVERNMENT COMPUTERS ILLEGALLY HACKED HAWAII DEPT. OF HEALTH

by Montgomery Blair Sibley, ©2017, blogging at Amo Probos

(Dec. 14, 2017) — Regardless of what you think of Alex Jones, he recently posted an article that the main stream media will not touch regarding the CIA’s involvement in the creation of Barack Obama’s birth certificate.

Ignore the article and issue if you want, but as a U.S. Citizen I opine you have the obligation to know what the government is doing sure in the belief that we are all NetFlix-addicted morons.

Subscribe
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

5 Comments
Newest
Oldest
Inline Feedbacks
View all comments
TRUMP 44
Saturday, December 16, 2017 3:48 AM

Loretta Fuddy didn’t have to die, did she?
Good luck “Non-Birthers.”

TRUMP 44
Saturday, December 16, 2017 3:43 AM

ATTENTION ALL NON-BIRTHERS:
Two smiling faces…Anita Blanchard & Marty Nesbit…strange deal if you ask me, very strange. Good luck non-birthers.

Ed Sunderland
Friday, December 15, 2017 10:42 PM

Cort, do not think for one minute that the federal government hires the best and brightest to work for any government agency sans most military. If it was the CIA that built Obama’s birth certificate look at how ignorant that is or the fake draft card? What the government can’t do with brains they try to cover with threats and NDA’s. The federal government has no monopoly when it comes to computer skills. The private sector remains far better at stealth and tracking IP addresses.

With just a little work and a few tools a few of us over at WOBC radio found a stealth looker and his/her location in the middle of a golf course (we know it was military). Found another that turned out to be a Capital hill police department that we could tell from Google street view. We quickly found a cat that had been making threats to Orley Taitz and had within minutes published google photos of his location and address. WOBC has also been visited by the Kremlin specifically but the visits from Beijing haven’t been quite so specific.

Here is a proxy detector if you are interested http://www.whatismyproxy.com/

Philo Vance
Friday, December 15, 2017 2:46 PM

“I will accept for the moment that these USB drives could have straight up, unencoded text information for everyone to see”

Here is the thing, Montgomery told Zullo he had created software that could breach these computers and harvest data. He has refused to release the software in several court cases. In one case in Nevada, the CIA said his software was not classified.

“The Court also has serious reason to doubt that the software is, in fact, classified, and would not be subject to production. For one thing, orders issued in a Nevada case between Montgomery and eTreppid specifically noted that the government had not deemed the software classified or subject to the state secrets privilege in that proceeding. That privilege “is a common law evidentiary rule that protects information from discovery when disclosure would be inimical to the national security.”

and

“In the Nevada case, the Government intervened and asserted the state secrets privilege over certain documents—but the Protective Order entered explicitly did not preclude the parties “from serving or taking any discovery from other parties or third parties relating to, or questioning . . .[t]he computer source code, software, programs, or technical specifications relating to any technology owned or claimed by any of the Parties.”

https://ecf.dcd.uscourts.gov/cgi-bin/show_public_doc?2016cv0126-275

What does it tells us that the CIA does not consider the software used to breach and harvest all this data as a state secret or classified?

Friday, December 15, 2017 12:54 PM

I’m skeptical. The key part of the story seems to be the claim of finding “CIA proxy IP addresses.” First of all, how do you know they are proxy, and how do you know they are for the CIA?

I will accept for the moment that these USB drives could have straight up, unencoded text information for everyone to see, but I do not believe the CIA is so stupid as to leave ANY kind of trail, any kind of trace, even the remotest hint of it’s fingerprints, digital or otherwise, on anything they do unless they want you to know. Just saying….

The CIA has cultivated two very different images of itself. The bumbling agency that never saw that coming, or the highly efficent, highly capable spymaster. Take your pick.