In the grand game of chess, the correct pieces need to be in place before the check-mate can be had.
Reminder:
The Assange case is taking place tomorrow!
People need to know that the FBI is actively relying on the lies of a pedophile in order to move forward with their case against Assange.
The Assange case is taking place tomorrow!
People need to know that the FBI is actively relying on the lies of a pedophile in order to move forward with their case against Assange.
I will be speaking at Mike Lindell’s Cyber Symposium in the morning.
Stay tuned.
Stay tuned.
Join the Codemonkeyz Chat
https://t.me/codemonkeyzchat
Thanks Pepper for helping moderate!!
Rules
—
No porn
No spam
No threats of violence
https://t.me/codemonkeyzchat
Thanks Pepper for helping moderate!!
Rules
—
No porn
No spam
No threats of violence
I will be speaking during the Cyber Symposium this morning.
If things go accordingly, you will be along for quite a ride.
Stay tuned.
If things go accordingly, you will be along for quite a ride.
Stay tuned.
Forwarded from Qtime Network 🇺🇸🇳🇱
❗️Julian Assange: London Supreme Court hearing – Live from outside
A preliminary hearing for the United States appeal against the denial of Julian Assange’s extradition to the US to face espionage charges is being held at the Royal Courts of Justice in London.
Assange is expected to attend the hearing in person – protesters are already gathered in their numbers outside.
Watch the event unfolding LIVE on Ruptly now: https://youtu.be/WUjSrDTglug
H/t RT t.me/rtintl
A preliminary hearing for the United States appeal against the denial of Julian Assange’s extradition to the US to face espionage charges is being held at the Royal Courts of Justice in London.
Assange is expected to attend the hearing in person – protesters are already gathered in their numbers outside.
Watch the event unfolding LIVE on Ruptly now: https://youtu.be/WUjSrDTglug
H/t RT t.me/rtintl
Im going to be live on Mike Lindells Cyber Symposium this morning.
Tune in!
Tune in!
Today I put on the full armor of God and take my stand against the rulers, against the authorities, against the powers of this dark world and against the spiritual forces of evil in the heavenly realms.
I better not miss.
I better not miss.
Please chat in this thread about my presentation at Mike Lindell’s Cyber Symposium.
Finished for now.
Im not a windows admin, but tried to get through as much of the directory tree as I could while pointing out some weird things along the way.
It is my understanding that this file is public and that there is a download link somewhere... if I find the link I will publish it here and then you guys can all start to dig in and look around too.
Im not a windows admin, but tried to get through as much of the directory tree as I could while pointing out some weird things along the way.
It is my understanding that this file is public and that there is a download link somewhere... if I find the link I will publish it here and then you guys can all start to dig in and look around too.
Of all the files, this is the weirdest I found. It removes a lot of hardening done to the system and would allow the system to be attacked easier than normal.
It is inconclusive about whether or not this file was executed, but the existence is strange and it wont be hard to prove it was executed by looking at the registry.
It is inconclusive about whether or not this file was executed, but the existence is strange and it wont be hard to prove it was executed by looking at the registry.
This media is not supported in your browser
VIEW IN TELEGRAM
I was asked to do a talk for the Patriot Double Down event organized by John and Amy in Las Vegas on October 22-25.
More info
—
https://thepatriotvoice.us
More info
—
https://thepatriotvoice.us
I was able to uncover a script that WEAKENS the EMS server on purpose.
I was also able to uncover a bunch of deleted election log files that spanned years.
It will be exciting to see what all of you sleuths will be able to find.
I was also able to uncover a bunch of deleted election log files that spanned years.
It will be exciting to see what all of you sleuths will be able to find.
Forwarded from SkyNet Platforms
I have a security+ certification and 23+ years in IT/IS professionally, 35 years total.
That screenshot CMZ posted is a script to disable security features on windows and apply an unsecure "group policy" to the windows system that 'dehardens" it (eg: removes security settingSs) — included is a setting that exposes remote logon and file sharing vulterabilities by removing certificate-validation (untrusted logon sources) for file-share, remote-desktop and remote administration (RPC). This setting is ONLY needed for network connected systems - and, the setting itself creates a system vulnerability highly targeted by hackers for remote exploits (rootkits, code execution, machine reconfiguration, file sharing access, etc) It then stops and starts sql server.
The group policy file referenced is unknown (eg: no sample provided by CMZ), but based on the script ffile comments it likely does other things that remove security features.
@CodeMonkeyZ feel free to DM me if you need any more information - I saw your magnet links and could analyze it further if needed. I have strong credentials, re: long-time big-tech, government and private-sector tech who is in the top 1% of the field. This includes experience with content-moderation systems and how the platforms use them.
I can also tell you that considering machine configurations are included with "certified" election systems, that running this would contramand that regulatory requirement (no config changes without audit trail and oversight) and unless those scripts / components are listed in the certification as "allowed, for approved maintenance operations" they are rogue and their presence (even absent execution) would decertify the system.
That screenshot CMZ posted is a script to disable security features on windows and apply an unsecure "group policy" to the windows system that 'dehardens" it (eg: removes security settingSs) — included is a setting that exposes remote logon and file sharing vulterabilities by removing certificate-validation (untrusted logon sources) for file-share, remote-desktop and remote administration (RPC). This setting is ONLY needed for network connected systems - and, the setting itself creates a system vulnerability highly targeted by hackers for remote exploits (rootkits, code execution, machine reconfiguration, file sharing access, etc) It then stops and starts sql server.
The group policy file referenced is unknown (eg: no sample provided by CMZ), but based on the script ffile comments it likely does other things that remove security features.
@CodeMonkeyZ feel free to DM me if you need any more information - I saw your magnet links and could analyze it further if needed. I have strong credentials, re: long-time big-tech, government and private-sector tech who is in the top 1% of the field. This includes experience with content-moderation systems and how the platforms use them.
I can also tell you that considering machine configurations are included with "certified" election systems, that running this would contramand that regulatory requirement (no config changes without audit trail and oversight) and unless those scripts / components are listed in the certification as "allowed, for approved maintenance operations" they are rogue and their presence (even absent execution) would decertify the system.
Forwarded from Mark Finchem
💥 Mesa County Colorado Recorder confirmed active erasure of evidence from Dominion systems, but by Dominion not her office. The County Recorder made a forensic copy because she believed that something nefarious was about to happen at the hands of the Colorado Secretary of State. That’s right, proof beyond PCAP, there was forensic evidence that was actively erased, which is a violation by Dominion and the Colorado Secretary of State.
Regarding today’s event:
We had technical difficulties getting started and had communication issues due to server attacks on our communication lines and instability of the public live streams.
People were asking why we didn’t run tools on the data. It is because we were not remoted into a Windows server that had the image loaded; we had just mounted a forensic image of the files and were able to view the file tree and files only. Due to the setup of the forensic image, we were not able to run tools such as regedit, event viewers, or dll analyzers. We could not run the executable files inside the forensic image.
We did not have a windows server setup with the image loaded due to obtaining the publicly-available data at the last minute. There simply was not enough time to setup a server because the show was already scheduled and we wanted to do it live.
We came across unprepared, and it is true in a sense because we had just obtained the data. It was my very first time looking at the data and I did not know what exactly would be found on the systems ahead of the event.
Interestingly, we did uncover a few critical things:
1. There appeared to be web server logs which potentially indicate that the server was accepting and executing commands remotely.
2. Election related data pre-upgrade was not present on the machine post-upgrade. This indicates that election related data was deleted or otherwise removed during the upgrade process.
3. The server had a suspicious configuration script designed to remove server security, potentially opening the machine up to a network hack.
These issues warrant additional investigation.
We had technical difficulties getting started and had communication issues due to server attacks on our communication lines and instability of the public live streams.
People were asking why we didn’t run tools on the data. It is because we were not remoted into a Windows server that had the image loaded; we had just mounted a forensic image of the files and were able to view the file tree and files only. Due to the setup of the forensic image, we were not able to run tools such as regedit, event viewers, or dll analyzers. We could not run the executable files inside the forensic image.
We did not have a windows server setup with the image loaded due to obtaining the publicly-available data at the last minute. There simply was not enough time to setup a server because the show was already scheduled and we wanted to do it live.
We came across unprepared, and it is true in a sense because we had just obtained the data. It was my very first time looking at the data and I did not know what exactly would be found on the systems ahead of the event.
Interestingly, we did uncover a few critical things:
1. There appeared to be web server logs which potentially indicate that the server was accepting and executing commands remotely.
2. Election related data pre-upgrade was not present on the machine post-upgrade. This indicates that election related data was deleted or otherwise removed during the upgrade process.
3. The server had a suspicious configuration script designed to remove server security, potentially opening the machine up to a network hack.
These issues warrant additional investigation.
👍1😁1
Forwarded from Midnight Rider Channel 🇺🇸 (Karli Bonne)
This media is not supported in your browser
VIEW IN TELEGRAM