If you read the article about the “Pegasus Project”, spyware created to infect cell phones that was marketed by Israeli intelligence through a company called NSO {Go Deep Here}, then you essentially know the background. Pegasus is “no click” targeting spyware that can be deployed against cellular phones, simply by inputting the phone number and transmitting to it.
The Guardian previously reported, “Claudio Guarnieri, who runs Amnesty International’s Security Lab, said once a phone was infected with Pegasus, a client of NSO could in effect take control of a phone, enabling them to extract a person’s messages, calls, photos and emails, secretly activate cameras or microphones, and read the contents of encrypted messaging apps such as WhatsApp, Telegram and Signal.”
Pegasus was deployed to target tens-of-thousands of cell phones by the people who Israel sold the spyware to. The Guardian, and a group of allied leftists in media, were previously granted access to a leaked batch of 50,000 phone numbers that the Pegasus software was operating in.
In a recent update from the New York Times they stated, “[it] has been used by police and intelligence services to hack the phones of drug kingpins and terrorists, but gained notoriety when it was revealed that governments, like Saudi Arabia, Mexico, Hungary and India, had deployed it against political dissidents, journalists and human rights workers.
It was also recently revealed the U.S. FBI under Director Chris Wray purchased the Pegasus program for “FBI experiments” and “exploration” into how the spyware program could be used domestically.
The FBI was initially reluctant to reveal their ownership of the Pegasus program, however, within FOIA documents related to the potential for domestic surveillance and concerns about fourth amendment constitutional protections, the FBI admitted they retain the capability – but promised it has not been deployed.
(New York Times) – […] The Times revealed in January that the F.B.I. had purchased Pegasus in 2018 and, over the next two years, tested the spyware at a secret facility in New Jersey. Since the bureau first purchased the tool, it has paid approximately $5 million to NSO.
Since that story was published, F.B.I. officials, including Mr. Wray, have gone further than they did during the closed meeting with senators last December. They acknowledged that the bureau did consider deploying Pegasus, though they still emphasized that the F.B.I.’s main goal was to test and evaluate it to assess how adversaries might use it. (read more)
Now, stay with me…
The FBI is not saying they will not use Pegasus, they simply said they would not use the spyware outside of the legal framework for deployment without legal and valid investigative baselines. Put another way, if there was a court ordered search warrant, Pegasus would be a tool for use in criminal investigations.
The latest discussions of Pegasus came around four days after the U.S. election, in a New York Times article November 12th. We know the general use of the New York Times as it pertains to the DOJ/FBI and their domestic public relations efforts. [Broadly, Main Justice (DOJ/FBI) use NYT/Politico, CIA use WaPo and State Dept use CNN]
Consider the timing of November 12th against the backdrop of Main Justic announcing the appointment of Special Counsel Jack Smith November 18. Media narratives often follow a data frequency, a rhyme or signal that you can sense amid the background operations.
So, here we have: (1) Pegasus, a stealth tool for surveillance and extraction of investigative evidence that can be deployed, covertly, without the target having any idea they are exposed. (2) We have concrete evidence the FBI has the Pegasus tool, and an understanding it would not be deployed without legally authorized authorities. And (3) we have a special counsel created to investigate congress under the auspices of the J6 ‘insurrection’…. Can you see where this is going?
The Special Counsel is authorized to conduct the ongoing investigation into whether any person or entity violated the law in connection with efforts to interfere with the lawful transfer of power following the 2020 presidential election or the certification of the Electoral College vote held on or about January 6, 2021, as well as any matters that arose or might arise directly from this investigation or that are within the scope of [Special Counsel Regulations 28 C.F.R. § 600.4(a)]. (pdf)
The special counsel appointment essentially means that congressional representatives are under investigation; and search warrants on their phones, text messages, emails, etc could be authorized. Then we overlay using DOJ-NSD defined terms of “national security threat” (that’s why they emphasized insurrection) and we find the pathway to gain legal search warrants on an incoming congressional caucus. Then the possibilities for Pegasus.
They didn’t just think this up overnight. They are using J6 as a weapon against their losing the House to republicans. The Democrats are now structurally targeting Republicans with the appointment of Jack Smith. The executive is now investigating the legislative branch; the legal structure of this eliminates the separation of powers issue.
The DOJ is not investigating republicans, they are investigating defined criminals; insurrectionists that are national security threats, that happen to be republicans. See how that works?
Contrast these recent events, tools and discoveries against the backstory of how the modern surveillance state was created {Go Deep}. Then overlay their recent Pegasus capabilities against the backdrop of a weaponized DOJ and FBI now targeting political opposition in congress.
In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it. The legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01, the short-sighted legislative reactions opened the door to allow the surveillance state to weaponize against domestic enemies.
After the Patriot Act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power. Simultaneously the mission of the intelligence community now encompassed monitoring domestic threats as defined by the people who operate the surveillance system.
The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the network of President Barack Obama did.
The Obama network took pre-assembled intelligence weapons (we should never have allowed to be created) and turned those weapons into political tools for his radical and fundamental change. The target was the essential fabric of our nation.
Ultimately, this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch. From that perspective the fundamental change was successful. (more)
This is the scale of corrupt political compromise on both sides of the DC dynamic that we are up against. Preserving this system is also what removing Donald Trump and all of the rebellious unaligned freedom believers is all about.
The question now becomes, will anyone in congress do anything about it now that they are within the target zone?
Support Ongoing CTH Research HERE
Except for Donald J. Trump, has the Republican party become obsolete? Obsolete- no longer useful, no longer in use.
The Republican Party are 100% useful to continue the false idea that there are two opposing parties. There is a “Uniparty” then everyone else. Just look at the lovefest between the members of the Senate Intelligent Committee. Burr and Braceface Warner were besties in the truest form. Does anyone think that Rubio is any less corrupt than the rest of them? He is absolutely in bed with the rest of the trash. All this talk about starting a nuclear war with Russia had one bright spot. That being that if one of Putin’s 1st targets would have been DC.
Always has been.
FBI WON’T use it, just like they don’t LIE and USE the FISA Courts to spy, entrap, listen, gather info.
THIS govt….
Believe in it if you may, NOT ME.
I DON’T TRUST, believe in any form, agency, division of govt, TO INCLUDE the White House and Congress.
That would be a nope
A special counsel to investigate
“whether any person or entity violated the law in connection with efforts to interfere with the lawful transfer of power following the 2020 presidential election.”
However, those involved in the J6 events assert that their sole purpose was to
“interfere with the UNLAWFUL transfer of power following A FRAUDULENT 2020 presidential election.”
The entirety of the J6 investigations is based upon false assumptions. Some of them may believe the assumptions to be true. Others undoubtedly are just using them as a political pretense. The end result is the same, however: anyone who disagrees with the globalist fascists about anything commits a criminal act. Your speech is violence and unlawful; my violence is speech and is protected.
Up is down, black is white, men are women, women are men. Strange times.
trapper wrote:
However, those involved in the J6 events assert that their sole purpose was to
“interfere with the UNLAWFUL transfer of power following A FRAUDULENT 2020 presidential election.”
what i would recommend to any congressional representatives or staffers is that they preemptively sue for an injunction to prevent these investigations, based upon the “fraudulence” of the election.
There’s not a judge who would touch that case. Nobody wants to be accused of “overturning the will of the people”.
The foundational lie that the government’s survival was threatened by a protest against the lack of hearing of charges of fraud in the election. As Joeseph Stolen himself said, you’d need F-15s and maybe some nuclear weapons to take on the US government. By any account of what happened on 1/6, it didn’t amount to an insurrection. They’ve made resistance to their tyranny illegal and torn up the social contract to do it.
“They’ve made resistance to their tyranny illegal..”Did you notice how they do that? They do it with false labels.
J6 was not an “insurrection.” It was a Constitutionally-protected assembly to attend a Presidential speech, which was infiltrated by the FIB with bad intent. If anybody initiated trouble, it was the Federal Government, with the intention to smear/ entrap their opposition.
They also throw the word “hate” around, willy nilly, as in ‘stop the hate’ and ‘hate crime.’ There is no such thing as a ‘hate’ crime.
A crime is a specific action, not an emotion randomly ascribed to others. Cultural Marxists abuse language in this way to criminalize opposing viewpoints, which is unconstitutional. We can’t continue to allow it.
Never forget Sharyl Attkisson’s testimony… the gubmint goon squad was “considering” planting child pornography on her husband’s computer. That was an fblie admission that they’re still Hoover’s blackmailing jackboots.
What the fblie, special council & the assorted 3 letter jackboots can extract is important to know but what they can plant is terrifying.
I think it’s clear that CONgress critters will say something & do nothing except what they’re told. They might consider making a backup & then ditching their voluntary tracking devices.
And THAT case is STILL TIED up in courts and she CANNOT get a trial…..TELLS YOU ALL YOU NEED TO EVER KNOW.
The US govt can be guilty, liable and crooked and avg citizen CAN’T DO ONE THING…..NADA.
Attkinson HAS ALL the evidence and it’s been presented time and time again. IT WAS THE GOVT….and that trail LED TO THE WH and BHO….
Just thought of something when I read “cannot get a trial.” The Bar Association has recommended doing away with the LSAT for law school entrance, so it’ll prob happen. Can you imagine the caliber of judges we’ll have then?
They’ll be on par with the jab-pushing doktors now working in many hospitals and clinics.
What about the caliber of Constitutional Law instructors, like the Pothead Dullard?
I wonder how he did on the LSAT.
Won’t they have to go back and revise all the crossword puzzles that have “LSAT” as an answer? It’s like naming “a Gabor sister”.
The only way to stop this is for the House to defund everything, starting with FBI, DOJ, IRS, CIA, and NSA. Defund it ALL. No budget money, period. When the Democrats come asking for some compromise, the answer is ‘no’. They want ‘scorched earth’? Give them ‘scorched earth’.
You atually think Congress WILL de-fund??????
CONGRESS WILL SAY NAIRY a word….count on that…
And likely very complicit.
The targets are the ones that are not yet complicit. The quislings have already denounced PDJT, the J6 political prisoners & us.
They’ll either comply or end up in Gitmo because there aren’t enough of them to effectively rebel.
I think he wisely said that would be the way to stop it, not that he thought they would….heh, big difference. None of us are living in Rainbow Land…
This current congress will give them raises to buy them off so they aren’t targeted.
No … they’ll be targeted anyway.
Homeland security is the overlord to all the other corrupt alphabet agencies.
Disband them first!
Could not agree more don’t believe it will happen but believe it should happen have a great day Frank
👍
Bongino covered it and “Phantom” long ago and repeatedly.
America’s Silence in the Face of Tyranny
By Kelleigh Nelson|November 22nd, 2022
https://newswithviews.com/americas-silence-in-the-face-of-tyranny/
I can’t get that site to open.
littleflower, it opened immediately in both my Brave and Safari browsers without any issues. You might try first copying the link and then paste it into a new browser window…
I contend that they have been using it for a while and have been compiling data for the SC to get the ball rolling – MTG would be an easy pick, M. Gaetz, C. Roy, and of course DJ Trump and anyone associated with him. No one is safe anymore – no one. Biden regime will use this like Obama used the NSA database.
Are Senate and House Seats Midterm 2022 Elections Void?
Cheating and stealing elections has now become the American way for the Democrat/Communist Party USA. They are supported by Democrat voters and a percentage of independent voters who have no clue but do have their hands out for more “free” from the teat of mother government.
https://newswithviews.com/are-senate-and-house-seats-midterm-2022-elections-void/
I’ve been saying this over & over – I guess I’ll say it one more time – I, too, was at the Jan 6th event [did not go into the Capital]….The most surreal day of my life….& the ONLY thing that makes any sense based on what I witnessed that day – The Breach of our Capital Building was Simply “ALLOWED” to happen!
Magnetic locks. FBI operatives in the crowd. Folks led into and around by Capitol Police like tour guides. The whole event was co-opted to become the lie they now call an insurrection.
not allowed, encouraged
Not encouraged, herded.
I “breached” the supermarket today when I simply walked through the entrance? I also “breached” my doctors office, my mom’s senior housing development and the DMV when I simply entered the buildings?
When doors to public places are unlocked, and even held open by guards, is this not an invitation to enter? What specifically defines an ‘illegal’ entry?
And, for that matter, do I bear guilt simply for being in the vicinity of a crime? If I happen to be standing in a bank and another customer commits a robbery, does this make ME a bank robber, as well? If I am stopped at a traffic light and the car beside me runs the red light, should I receive a ticket?
The whole idea is beyond ridiculous.
It’s like trying to take out a huge yellow jacket nest armed with a fly swatter.
You need a backhoe with a front end claw bucket to dig the whole nest out and set the nest on fire until it is completely burned.
This investigation has now bypassed the pretense of a FISA court using a fabricated pee pee document.
They don’t even want to be bothered to make up evidence for a search warrant.
I was listening to WAR ROOM this morning and a guest was the guy who has just releases a report on the contents of the the laptop. Garret Ziegler I believe is the man who spoke w/ Steve.
He told Bannon that he had run across all kinds of people who were worried their name might appear in an email in that laptop, even if they and HBiden had not exchanged correspondence. That is a major part of why very few people want this explored, even if they are guilty of nothing.
I would imagine anyone who has a public name is worried that their name would appear in those emails.
https://nypost.com/author/miranda-devine/
IMHO it’s an uphill climb to prove you’re “not guilty of anything” after communicating directly with Hunter (or any) Biden.
🤣 🤣
So this is basically parallel to the FISA warrant spying except that the red tape is removed and the ‘reach’ greatly amplified under the broad scope brief of Jack (Shitt) Smith.
So this tool Pegasus (aka Parasite) mines its way into ‘a’ cell phone – I gather it can look back to pre J6 phone data in addition to running RT capture going forward.
We must also presume China has a similar tool and does this to their citizens – re: dissent and such.
What stops any country/state group with this from spying on ‘everyone’?
Of course Dems and Leftists are NOT going to be in the dragnet.
China probably has already done this to most American phones. Tik-tok is likely the ineffective agent.
I doubt they get much from my flipfone.
You have to be the worst kind of person to want to be a part of any organization like the DOJ or FBI. Kind of like the type of person who want to be in the SS or Gestapo. Whether we want to believe it or not the deep state, democrats & RINOs have dehumanized Trump supporters to such an extent that nothing is off the table for them to do to us.
Personal opinion…wrongthink…er…Disinformation is now a serious offenseVice versa.
Reminder:
“The tracking of hundreds of Michigan Capitol protesters’ cellphones from two rallies this spring has raised questions about protecting privacy rights, while testing limits of what location data can predict about the spread of the novel coronavirus from packed public events.
A liberal advocacy group most recently pursued the anonymized cellphone location data from more than 400 devices from individuals who attended the American Patriots Rally on April 30 in Lansing against Gov. Gretchen Whitmer’s stay-home orders and used it to gauge their locations the next day in a bid to determine the potential spread of the virus from the demonstration.
The location of 422 cellphones within a roughly four-block radius of the Capitol showed individuals traveled back to areas throughout the state, including West Michigan, Metro Detroit, Northern Michigan and the Indiana border after the event, according to data obtained by VoteMap on behalf of the progressive group Committee to Protect Medicare and Affordable Care.”
The article discusses a different method of cellphone data tracking, but the principle is the same. If “liberal advocacy groups” are accessing such data, there is no way “public partners” such as the CIA, DHS, FBI, and NSA are restraining themselves. It is even possible, likely in some cases, the “public partners” are the ones collecting the data and laundering it through the “private” side.
Good lesson…more downside in cell phones than upside…leave them at home…
Informative post with a good punchline.
Thanks Sundance . dark times ahead act accordingly don’t give up
R.D.
That’s why the new Republican Congress needs to expel Nancy Pelosi, Adam Schiff, and anyone else involved in the Russia, Ukraine, and January 6th plots.
We well remember Adam Housley on the scene for Fox News after the “San Bernardino Shooters” went on their horrific rampage – he kept saying something about people with “weird names” – then the dilemma over getting Apple to give access to their phones to the FBI –
as I recall –
will this Pegasus program even be able to access info on an Apple phone or is that a bygone concern – that is, at some point, did Apple give the federal government the key to all Apple phones or is it not supposed to be “any big deal” . . .
“if you aren’t doing anything wrong, why are you worried about privacy?”
At the time, I wondered if Apple phones enjoyed a spike in purchases if people thought that Apple phones had your privacy ensured . . . or did they actually fall off as Apple was pressured to give access in the wake of the San Bernardino husband-and-wife terrorism.
Sounds like Pegasus was designed to penetrate any phone, no matter the OS.
This could get interesting.
Link
“A hearing set for last week was postponed after the government said that it had found a third-party that was able to unlock the iPhone. Reports suggested that it was Israeli firm Cellebrite. This was never confirmed by the company.
On Monday, the Department of Justice said it had managed to access the data on the iPhone in question and asked the judge to drop the case. The FBI said in a statement that it could not comment on the “technical aspects” of how the iPhone was unlocked nor the third-party that was involved.
Apple said that it ‘will continue to help law enforcement with their investigations, as we have done all along, and we will continue to increase the security of our products as the threats and attacks on our data’”.
So in 2016, there were rumors the FBI accessed a phone through the services of an Israeli company. Now inn 2022, the FBI admits it owns systems able to remotely hack cellphones, systems connected to Israeli intelligence.
That’s a big coincidence. It is also a coincidence which sidesteps the issue you asked about. With the existence of programs like Pegasus Apple and other Big Tech companies are relieved from the responsibility of openly granting government agencies backdoor access.
“if you aren’t doing anything wrong, why are you worried about privacy?”
Translation: Prove you’re not doing anything wrong by letting us snoop on you.
Like — I’ll only use my knife to spread butter.
Anyone remember Nellie Ohr’s ham license?
Just sayin’ to the wolverines listening.
To quote Paul Atreides in Dune…”I see the truth in it.”
First, I don’t believe for a second the FIB haven’t used Pegasus. Second, we all know how corrupt the FISA system is, and how easily an unsubstantiated warrant can be issued. Because the FIB do it, all the time.
I read about Pegasus some time ago and it is scary because it is so invasive. I have no doubt whatsoever that it is currently being used and will be used in the future for whatever purpose they desire.
There is another tool being used by the CIA. It’s call Psiphon. It is a free, open-source, smart phone application and computer program that allow anti-government people and groups in a country to circumvent government shut-downs of internet services.
It is being used to stoke the fires of regime change protests in countries where the US wants regime change…..such as Iran where Psiphon has been available since 2013. It also funnels all user data to the company.
When the gubmint sneaks Luciferase blood markers into your “vaccine” to ping your movements off their 5G surveillance towers, then all bets are off.
The lawfare government lackeys and their sycophants in the fake media keep referring to the supposed crime as an insurrection. It’s been almost two years now and none of the participants on Jan 6 have been charged with insurrection. How are they going to invent this out of whole cloth now?
Insurrection is a violent uprising against the government. Where was the violence, the arms, the weapons, and where is the evidence that a peaceful protest morphed into these protesters attempting to wrest control from the government? That also applies to Republican congressmen and congresswomen.
Definitely. If J6 was an “insurrection” then we have a whole different definition of the term
And we then need to be investigating the 300 Democrat insurrectionists that occupied two Senate buildings during the Kavanaugh hearings and the Dem insurrectionists that broke thru security into the Senate chamber interrupting the Kavanaugh hearings in progress and the group that tried to break into the Supreme court during that same period.
Also we need to investigate the Lafayette Park insurrectionists that in May 2020 injured 60 police officers and stormed toward the white house shouting they would drag PDJT out. I believe a few actually got up against the exterior of the White House.
Great point.
The idea may be more to intimidate.
The question now becomes, will anyone in congress do anything about it now that they are within the target zone?
The answer: is there anyone in Congress who is actually ‘clean’ enough to do so??
“a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power.”
It’s called authority. It’s “power” only when used. “Powers” in the 1700s meant “authority to do” stuff, but noting this new type of government being one of restraint, “power” does not mean it must be used for purposes contrary to the new American system. Thus, the Patriot Act is un-Constitutional and any other of these silly laws and acts foisted on the People. Modern federal laws are 98% un-Constitutional.
In any case, conservatives want this loss of freedom as they fear being responsible. Conservatives enjoy being helpless fools. Pretending nothing can be done to be Happy.
The so-called special counsel is solely to obstruct justice and will be removed when SCOTUS finds their “way” into reality.
But, with an increasing bankruptcy of the legal system, an injurious corrupt legal court, of the realm, also afraid of being responsible, our American System needs drastic intervention. But who or how . . . . NO not Trump, just the People.
I think Donald Trump is trying to show the American people how to regain control of our country. If we are too lazy to follow his lead, however, preferring to let others do the heavy lifting, we will find out the hard way that America cannot survive without the stewardship of all the American people.
This is stealth insurrection pure and simple. They are the barbarians at the gate.
Welcome to the USSA formally known as the USA. A Country that people fleeing are from to avoid political persecution.
You can’t make this crap up.
FJB, the WEF and the Syndicate that wants to control the World.
.
I posted a rant earlier against cell phones. It’s in moderation.
In the meantime, it might be good to recognize that it’s an object that can be tracked. Not “you”. Ditch the object.
.
Research has found the the 5G microwave radiation emitted by cell phones can cause health problems, I believe one of the studies was actually done in California so you know it has to be true.
In the meantime, it might be good to recognize that it’s an object that can be tracked. Not “you”.
Are you sure? Metallic covid-1984 shots anyone?
The Luciferase bioluminescent blood marker is the tracking mechanism in the mRNA injections. The “metallic” graphene oxide pings off 5G technology to intercept and redirect our thought processes.
Glad we live in a free country…
You so foney
Surely there must be a way for the end user to detect and remove this software, or prevent its installation just like you would with any other malware.
Unless they have it built in the hardware during production.
Ever try to get all that fakebook stuff off of your phone?
Can’t be done.
It can be done. You just need to enable root access on you phone and install a clean operating system, although most phone manufacturers make this process intentionally difficult.
A few days ago, Bongino was talking about it…and I think he said something along the lines of ya can’t delete the app, even if you find it…or if you do, it re-installs. I cannot say for sure, though.
.
The phone can transmit nothing when it’s inside a faraday bag. Put it in one and leave it home.
Download your pics and must-haves and then delete. Re-learn the exciting art of writing down people’s phone numbers and addresses on a piece of paper. Ditto directions to get places. Buy a real camera for pictures. Get a burner phone voice only — no internet — to carry for travel. emergencies, and keep it, and all “cards” in a faraday bag. Maybe have your 104-year-old Aunt Tillie with memory issues buy it for you and pay her back using a money order. Ditto hotel/other reservations. Carry cash. Get a checkbook. A free-standing GPS is not expensive if you must. Keep your business and financial records and stuff on real computers not connected to the internet, and not in “the cloud”, and separate from everything else (by the way, it’s super-easy to remove a disk drive and put it somewhere it can’t be found for safekeeping too, if that ever becomes necessary.) Don’t pay bills or do money or medical things “on-line”. Carry a cheap new I-pad type thing when you travel with absolutely nothing on it except a VPN if you think you will have to access the internet somewhere… Stop texting — it’s writing. The substance of voice calls are not accessible by the feds except with extreme difficulty. Much more. Live like you did in 1999.
.
Nice post!
At the end of the day, it’s a risk management problem. A refinement that is standard in the biz: not everything has to be protected. Figure out the priority scheme and allocate resources (or alternatives you note) accordingly.
Removing the battery until you need the phone would work for most models. Can’t track or upload to a device that has no power source in it. No path for transmitting or receiving.
.
Not necessarily true. There’s small battery in the motherboard, as well as apps that can track newer phones even without battery. Just put the thing into a faraday bag. These are cheap, and they come in all kinds of sizes.
.
I didn’t bother to reply to that previous comment, because I know from x-ray work that a cheap Faraday bag probably isn’t a Faraday bag at all, and won’t prevent sheet. We used to use them to test and calibrate the tubes. The waves go right on through, and you can see the phone’s components. Real Faraday cages surround the exam rooms. If you can get a cell signal inside when the door is closed, the room’s below spec.
.
Put the phone in one of the bags and then call it. Easy. Done.
.
The Stalinization of DOJ, FBI, et al.
People has never learned from history. Thanks, Sundance.
If this becomes reality, then the Republicans in the House have no option, but to cut off all funding to the DOJ and the FBI.
https://www.justice.gov/jmd/conflicts
9-11, J-6, USS Maine… all excuses to disregard the Constitution.
The more we see…the more we know. And what do we know? The system is rigged, the government is infiltrated almong with the judicial system, the DOJ and FBI have been weaponized against its citizenry, truth is censured and their trying to kill us with the ruse of this plandemic and the jab. And they are habitual liars. Never tell the truth. So if the FBI says they have Pegasus but have not used it….you can believe them! Remember how diligent and professional they were with the Russia Hoax. Even once they knew the Truth, attempted to pay a million dollars to get the version they wanted! We can believe them. We can trust them. HELLO? NO WE CAN’T…ever again!
Shocking Discovery that Lerner Connected to IRS Scandal in 2010
– Republican National Lawyers Association (rnla.org)
From May, 2014:
Republican National Lawyers Association:
“The House Oversight and Government Reform Committee recently obtained an email addressed to former IRS official Lois Lerner sent from Election Crimes Branch Director Richard Pilger at the Justice Department. The email addressed to Lerner stated that, “I have been asked to run something by you.” During the Committee’s investigation, Public Integrity Section Chief Jack Smith told investigators that officials at the Justice Department discussed targeting conservative nonprofit groups with Lerner as early as October 2010. The Committee reasons that, “[w]hile we knew that the Justice Department engaged with the IRS in May 2013 to consider prosecution of political active nonprofits, we were shocked to learn that this engagement started in October 2010.”
After connecting these two pieces of evidence, the Committee determined it was necessary to hear Smith’s testimony. Committee Chairman Darrel Issa and subcommittee chairman Jim Jordan have requested a transcribed interview with Jack Smith.
Pilger says that Smith asked him to arrange a meeting with Lerner. Pilger further stated that the agenda for the meeting was to discuss how the IRS could be, “more vigilant to the opportunities from more crime in the . . . 501(c)(4) area.”
THERE WAS NO “CRIME”.
THERE WERE JUST AMERICANS VOICING A DIFFERENT OPINION THAN OBAMA AND HIS GESTAPO GOON SQUAD.
THIS SHIT IS GOING TO STOP.
ONE WAY OR ANOTHER.
F*CKING NAZIS.
I’ll take another for 1,000 rounds, Alex.
One has to wonder if Apple & Android phones were developed for us consumers or for Spy agencies around the world. Ditto for “Smart T.V.’s
Remember Comey put a piece of tape over his laptop’s camera and microphone.
If I really believed the republicans would be doing more than grandstanding for the GOP base, I’d be concerned. They couldn’t get to the bottom of a cold pint of beer in 100-degree weather.
Remember too, the weaponization of federal law enforcement dates back many decades with the biggest power accumulation happening under republican leadership in the House and the WH. They helped to create the monster that will devour them (and us eventually).
Our government is compromised and has effectively turned every tool that was intended to keep it in check into a weapon to protect itself. Our justice system, our law enforcement, our legislature….all weaponized against the citizenry. Effective resistance depends upon communication and coordination…It depends on stealth and dedication to achieve any measure of success….. within the confines of the current surveillance state, the instant you speak the RIGHT word, you are compromised. Resistance IS FUTILE…you can only defend the ground on which you stand and you cannot expect outside assistance…. there may be more of us, but we have been effectively disarmed and neutralized….dig in.
So if i access my email on my phone Pegasus intercepts it, but if I access it on my laptop it safe (meaning needs other legal documentation to gain access)?
There’s always a way to surveil you if LE wants to. If they can’t do it high-tech, they can always do it old school.
My main defense is leading a life far too boring to be worth the budget required to follow me, a variation on THX-1138.
I don’t care if they do learn what stores I shop at, or which ATMs I get cash out of.
“For the good of the public” and to protect against “threats to our democracy” (MAGA), Mr. Wesley Mouch has initiated Directive 10-289 and authorized the use of Project X against deplorables. (Who is John Galt) 🤔
The current crew has made even the grisly murder of baby goats seem like smalltime.
Note that Pegasus requires the exploitation of heretofore unknown software vulnerabilities in the software that operates said phone, i.e. Android, iOS. There is a long running arms race between vulnerability intelligence and the exploitation of them by malicious actors. This has led to significant investment by those software vendors to secure the development life cycle and create generic defenses against future exploitation (i.e. DEP, ASLR, StackGuard, etc – for those familiar with these terms). These developments create a far longer lead time to the discovery and creation of new vulnerabilities and exploit code for use by tools like Pegasus. Especially as current vulnerabilities are leaked and patched.
Additionally, there is an entire cottage industry of vulnerability brokers, like BugCrowd, TrendMicro ZDI and formerly iDefense VCP to name a few. This creates a financial incentive for researchers to find these vulnerabilities first, and for the vendors to buy the intelligence and fix the issue before its widely exploited.
That said, this doesn’t preclude device manufacturers from building in backdoors. Nor does it prevent software supply chain attacks, like SolarWinds.
Can ya dumb it down a little for the analog folks?
Sure! A software vulnerability is a flaw in the code that makes up said software that allows a malicious actor to run arbitrary code on the device that the affected software is running on. This arbitrary code could be anything, such as a malicious program that monitors your activity on the device, like Pegasus.
A good analogy to generic software defenses are their counterparts in physical security, things like fences, man-traps and bollards. Each of these is designed to prevent/contain a specific threat regardless of the source(criminal, terrorist, mentally ill etc.). Generic defenses in software work in a similar fashion by preventing the execution of the malicious code regardless of where in the software code the flaw exists.
Technically speaking, vulnerabilities are measured against the security specs/requirements of a system.
You might want to add, from an economic perspective, that the rewards for discovered zero days offered by OEMs and so-called brokers often pail in comparison to the money that can be made in the underground of Darknet malware service providers.
Read daily on Kindle unlimited,at this time reading second book in series.(The Perseus Protocol: Cal Shepard Black-ops Thriller) same type program,targeting domestic right wing groups.
https://www.amazon.com/s?k=the+perseus+protocol&i=digital-text&crid=2PUW0MXFQW053&sprefix=the+perseus%2Cdigital-text%2C118&ref=nb_sb_ss_ts-doa-p_1_11
Software doesn’t target people. People/organizations acting on various motives design/use various vehicles to attack targets.
These times don’t call for force or bravado. These times call for reason and strategy. We have to thwart the Globalists in every step they make, and do it in such a way that they don’t even realize it’s happening. Kind of what Reagan did to the Soviet Union. Let’s start with elections. How do they steal elections? Let’s break it apart step by step and throw a monkey wrench into their works in each and every step. Let’s start with Georgia.
“Experiments” and “explorations” … the same word salad the thugocracy uses to defend its research on killer viruses in biolabs – you know, the biolabs that don’t exist, and never leak if they do exist.
One of these days, it’d be really nice to get our constitution back. Privacy is a basic, fundamental human right.
There’s a reason why Free Speech is the 1st amendment.
Speak out raise hell !
Exercise your first amendment!
Let what was our Government know we know what they are doing and why !
I want to love my country sadly those elected to serve and manage attain their positions of power to openly display how much they hate average Americans !
They despise us so much they continue to create a mandatory vaccine propaganda program designed to ultimately kill us
It really is a fool’s errand, at this point, to even try and HIDE what you believe and what you want, anymore.
Just SAY IT. DAMN THEM ALL.
“I tolerate with the utmost latitude the right of others to differ from me in opinion without imputing to them criminality.”
–Thomas Jefferson to Abigail Adams, 1804
“The oppressed should rebel, and they will continue to rebel and raise disturbance until their civil rights are fully restored to them and all partial distinctions, exclusions and incapacitations are removed.”
–Thomas Jefferson: Notes on Religion, 1776
The silence of the so called Republicans that should be flipping turds all over the place against this new witch hunt excuse for spying on our President Trump’s next run for President speak louder than any words ! Pukes from hell.
Hey this has been going all for at least a couple of decades. The only way to avoid it, is to find someplace totally off the grid and live like a mountain man.
I agree with you, but I don’t think I will live long enough to see the complacent middle class ever be described by a different adjective.