Saturday, February 10, 2024

Did

 


I miss something?


Did everybody 

just completely 

forget about 


Wikileaks?


Edward Snoden?


Solar winds attack?


Our networks 

are owned 

by our adversaries.


Including:



U.S. federal government 


Department of Agriculture

Department of Commerce

Department of Defense

Department of Energy

Department of Health and Human Services

Executive

e-mails of top officials

Department of Homeland Security

Department of Justice

Department of Labor

Department of State United States

Department of Transportation

Department of the Treasury

Administrative Office of the United States

Judicial

Courts

National Finance Center

National Telecommunications 

and Information Administration

Parts of The Pentagon, 

National Security Agency, 

Defense Information Systems Agency

National Nuclear Security Administration

National Institutes of Health

Cybersecurity and Infrastructure Security Agency

Bureau of Labor Statistics

~3000 Microsoft Office 365-hosted email accounts

Federal Aviation Administration

Case Management/Electronic Case Files.


(I told brother Brain 

YEARS

before it was reported 

anywhere

in the parking lot  

at CBC 

after bible study one night:


"Russia has got the keys to the kingdom.

they can create 

false administrator accounts 

on our networks."


(Meaning they have the access 

to be able to create 

false Administrator accounts

and give administrator access 

to those accounts

to create more

false Administrator accounts etc.


And the SolarWinds attack is still ongoing BTW.


The ONLY way

to take back 

your network(s)

after this type 

of infiltration?


Is to build entirely all new networks.


It is physically 

and logistically 

impossible

to entirely 

root out 

this deep 

of this type

of an infiltration.

Its why it is still ongoing.


Keep in mind, 

this is coming

from somebody 

who used to work here:








(Maybe now it makes more sense why that was?)




(Aint no "had" to it.)

Details: 
The U.S. Cybersecurity 
and Infrastructure Security Agency, 
the National Security Agency 
and the Federal Bureau of Investigation 

(You know
Just all of them 
were themselves hacked
in the SolarWinds attack:

The U.S. Cybersecurity 
and Infrastructure Security Agency

(You know, the guys in charge 
of us not getting hacked?
Yeah, they got hacked.
It ought to tell you something.)

the National Security Agency
Yup them too...

the Federal Bureau of Investigation 
(Justice Department
Yup, those guys also...)

)

released an advisory Wednesday 
to warn critical infrastructure operators 
about China's ongoing hacking interests.

(It aint just critical infrastructure.)

According to the advisory, 
China-backed hacking group 
Volt Typhoon 
has been exploiting 
vulnerabilities 
in routers, 
firewalls 
and VPNs 
to target water, 
transportation, 
energy 
and communications systems 
across the country.


The group 
has relied heavily on
stolen administrator 
credentials 
to maintain access 
to the systems 
— and in some cases 
it has maintained access 
for "at least five years," 
per the advisory."


(Well I wonder where those came from?
And Notice it never mentions 
that they still don't have access 

("China's ongoing hacking interests.")

just that
"it has maintained access for 
"at least five years."

I reiterate
once you have the ability
to create 
Administrator accounts?

And these accounts 
can create 
OTHER
administrator accounts?

That  can create others and so on?

You'll never know 
which accounts are legit 
and which ones aren't.
And your network is monitored
and worthless.)



REDUNDANT REDUNDANCY?

(Which I am familiar with 
way more so than most, 
see pictures above.)

IS IRRELEVANT
ON A COMPROMISED
AND MONITORED NETWORK.

THINK 
COMMAND 
AND CONTROL 
CENETRS, 

how do you think 
they communicate 
with each other exactly?


Things are 

so much worse

and are moving 

so much faster

than you could ever

 wrap your heads around.


I just hope your soul is ready.

I really do...







No comments: