Survivalist News Network

Massive Global Cyber Attack Using NSA Hacking Tools Takes Down 45,000 Computers Across 74 Countries: “A Scale Never Seen Before”

By Mac Slavo

They’re calling it one of the biggest global cyber attack in history. Unprecedented in scale, Kaspersky Labs reports that some 45,000 devices have been compromised across 74 countries.

According to reports, America’s own National Security Agency (NSA) developed the very tools that have been used to break into computers around the world. The exploit, named “EternalBlue,” was released by a hacking group earlier this year and put up for sale.

It appears that someone took them up on the offer and is now using it to deliver Ransom Ware to target computers:

A hacking tool known as “eternal blue”, developed by US spies has been weaponised by the hackers to super-charge an existing form of ransomware known as WannaCry, three senior cyber security analysts said. Their reading of events was confirmed by western security officials who are still scrambling to contain the spread of the attack. The NSA’s eternal blue exploit allows the malware to spread through file-sharing protocols set up across organisations, many of which span the globe.

Continue Reading >>

Breaking/Treason: Nuclear First Strike on America, It will be Israel

By Ian Greenhalgh

US Finances “Jewish only” protection from nuclear radiation, builds massive “Jewish only” bunkers in Israel….to protect from US retaliatory strike

[Editor’s note: This is one of the most disturbing pieces of news I have read in quite some time. Here we have a technological development, funded by the US government, that allows the crazy Israeli leadership to believe that, in the event of a nuclear war, the population of Israel could be saved. This is disturbing because it makes more likely the possibility of Israel starting a nuclear war.

The US Army Corps of Engineers has spent billions of dollars of US taxpayers money to build a vast network of underground nuclear-proof shelters for the exclusive use of Israel’s Jewish population, including a command bunker for Netanyahu and his staff.

Continue Reading >>

Alert: Your Cell Phone is Spying on You! 4 Ways to Block Your Cell Phone and Prevent Being Monitored

By Jeremiah Johnson

“We are all just prisoners here…of our own device…” – “Hotel California,” by The Eagles

ReadyNutrition Guys and Gals, this piece is on the heels of an article released by RT News on 3/8/17, entitled “85% of World’s Smart Phones ‘Weaponized’ by CIA.”  The article is a very disturbing report; however, it isn’t something that just “surfaced” out of the zone of unpredictability.  The basis for the report stems from the recent WikiLeaks release of the CIA-documents and information that just occurred.  Here is an excerpt from that article:

 “Google’s Android operating system, used in 85 percent of the world’s smart phones, including Samsung and Sony, was found to have 24 ‘zero days’ – the code name used by the CIA to identify and exploit vulnerabilities for the purpose of secretly collecting data on individuals.  The techniques allow the CIA to access data from social messaging platforms, including WhatsApp, Weibo and Clockman before encryption, according to WikiLeaks.  Both audio and message data were vulnerable to the exploit through the CIA’s exploitation of gaps in the OS.”

Now mind you, Readers, this piece is not a “news article,” although this event was just reported on 3/8/17.  The purpose of this article is to serve as a “wake-up” call, in case you haven’t taken the measures already outlined in previous articles to protect yourself from your own devices tracking, recording, and (essentially) “spying” upon you.  You may research past articles on electronic security that you can do, and this piece is a “refresher” that will enable you to secure yourself…. from your own equipment.

4 Ways to Block Cell Phone and Prevent Being Monitored

As mentioned in times past, Mylar can be your best ally.  Mylar is simple to use, affordable, and it works at blocking the signals going to and from your happy cell-phone tracking and recording device.  Here are some inexpensive sources for the Mylar:

  1. Chip/Snack bags: An infinite variety of sizes are available, and you will have to gauge what size you use after taking the size of your phone/device into account.
  2. Mylar in the form of “ponchos” or “space blankets”: these are a little more expensive than the chips, but only slightly so. You will end up with more Mylar to use, and the pieces you cut will not need to be cleaned off of salt and other detritus as with the chip bags.
  3. Freezer bags: Also in a variety of sizes, such as ones that hold up to 30 lbs. of food/ice (for a laptop-sized device) or just a small 1’ x 1’ bag, such as a lunchbag-cooler size.
  4. Another thing to do is to place your device inside of an ammo can (military issue). In doing so, make sure the rubber gasket around the mouth seals efficiently for a tight seal.  There are other containers that can be used; however, you may have to reinforce the seams with something such as Aluminum HVAC duct tape (available for about $15 per roll from your local Home Depot), and cover them over.  With the ammo cans, the container is contiguous with only the lid needing that rubber gasket that works.

How to Test for Protection

There is a way to test it out with your phone to see if you have the protection.  Take your chip bag or bags.  If they’re small, be advised that you will need about three complete layers around the cell phone.  Also, place your phone in a plastic Ziploc bag before putting them into the chip bags.  This will keep them clean just in case you missed wiping all of the stuff out of them.  Wiping out the bags can best be accomplished with a dry paper towel: the oils, salts, and other filth will be caught up by the towel.  Just remember to cover/swipe the entire inside surface of the bag.

Then turn your phone on, and turn up the volume of its ring all the way.  Next, roll/wrap up your phone and fold it over in at least three complete layers of Mylar.  Then use your house phone/landline/etc. to dial your wrapped-up cell phone’s number, and hold the wrapped-up phone close to your ear.

If you did the job correctly, you will not hear a thing.  Also, make sure you only ring it 3 times.  Any more than that and it may go to a voice-mail/other function, that will send it stored to your cell phone after you unwrap it as a missed call.  This way it will not ring it, and the call will have been cancelled.

Remember what General David Petraeus mentioned about the “Internet of things?”  Well, those days are upon us.  So, what else?  You’ll have to figure out the best method for making your layers work and last a long time.  You can take the chip bags, cut them open with scissors, and make three premeasured layers.  Form a pouch, and cover them inside and out with duct tape.  Then you just slip in your phone, and secure the top (fold it over) with whatever type of clamp or clip works for you.

The continuous signal your cell phone sends out (every 4 seconds) will be interrupted.  Inconvenient?  No.  Coordinate with your family members when you will call and talk to them beforehand.  Emergency?  Pull the phone out of the pouch and use it.


Bottom line: It is a discipline that will have to be followed to enable your privacy…from your own device.


99% of all people carry that thing around with them everywhere.  They’re hooked to it more closely than a fetus to the umbilicus: they can’t function without it.  But the point I’m making is this: Do you own the phone, or does it own you?

You can accomplish the same thing with your laptops and other “smart” toys…your palm-pilots, blackberries, cameras, and all of the other damnable devices that have made you an unwitting prisoner to the powers and systems that set them in place…not for your “technological convenience,” but for the very purposes of control, dominion, and surveillance over you.

Ammo cans work.  The Mylar (when cleaned and fashioned properly) will work.  Now you just received confirmation that it is happening, and I’ve given you methods to use to stop it from happening to you.  The methods work.  I have tested and used them myself.  So, without further ado, figure out how much material you need and make one of these pouches for yourself.  Your privacy is guaranteed under the 4th Amendment from illegal searches and seizures by the government.  That right, however, needs to be exercised by action.  So, finish those Doritos, clean out that bag, and wrap that phone up!  We’d love to hear of any tips or improvements you have come to trust.  Keep fighting that good fight, and send us your comments!  JJ out!


Jeremiah Johnson is the Nom de plume of a retired Green Beret of the United States Army Special Forces (Airborne). Mr. Johnson was a Special Forces Medic, EMT and ACLS-certified, with comprehensive training in wilderness survival, rescue, and patient-extraction. Mr. Johnson is an ardent advocate for preparedness, self-sufficiency, and long-term disaster sustainability for families. He and his wife survived Hurricane Katrina and its aftermath. Cross-trained as a Special Forces Engineer, he is an expert in supply, logistics, transport, and long-term storage of perishable materials, having incorporated many of these techniques plus some unique innovations in his own homestead.


.

.


 

Will the CIA Assassinate Trump? “He’s Being Really Dumb For Questioning Russia Conclusions”

By Mac Slavo

It isn’t just that Donald Trump routinely thumbs his nose at the establishment, insults media figures he sees as unfair and bucks conventional wisdom.

It is that President-elect Trump is defying the will of the deep state, military industrial complex base of ultimate power in the United States. That is why he is treading dangerous waters, and risks the fate of JFK.

Trump publicly dissed the intelligence community assessments on Russian hacking; they retaliated with a made up dossier about the alleged Trump-Putin ‘golden shower’ episode.

While it may be a silly falsehood, it may also be serving as a final warning that they get to script reality, not him.

Perhaps they want Trump to feel blackmailed and controlled by alluding to fake dirt, while reminding him of the real dirt they hold on his activities (whatever it may be).

Continue Reading >>

‘Russian Hackers’ Penetrate US Power Grid with ‘outdated Ukrainian malware’

By Jim W. Dean

[ Editor’s Note:  This Russian hacking story is turning into a Three Stoogies movie rerun. Experienced Intel people, even those who are not intimate code people know that setting up blinds, dead ends and pasties as diversions for hacks is a operational staple.

When VT was running down our own hack attack, tracing the packets back, the trail was running through major university and some defense contractor servers where endless fingers could be in the pie. But with more digging the trail ended at a US military base where “training” was done for doing this very thing.

Continue Reading >>

Edward Snowden Breaks Silence On Donald Trump

source: topinfopost

Now that Donald Trump is President-elect of the United States of America, NSA whistleblower Edward Snowden breaks silence to offer some insight on the business tycoon’s recent win. Snowden, who is still a fugitive in the U.S. for leaking sensitive NSA documents revealing the government’s surveillance program, appeared on a camera via livestream to talk about privacy and, of course, the nation’s future president.

Continue Reading >>

The New World Order Is Melting In The Heat Of Its Own Contradiction

by Jonas E. Alexis

Julien Barnes-Dacey, a policy fellow at the European Council on Foreign Relations, and Daniel Levy, director of the council’s Middle East program, admitted in the New York Times in 2014 that ISIS was fighting against the Syrian government.

This was indeed a true statement, and it weakened the idea that the so-called “Syrian rebels” are “moderate.” But both writers, while indirectly admitting that ISIS and the “Syrian rebels” are almost two sides of the same coin, did not have the intellectual courage to make certain logical moves because they were operating with an incoherent system.

Continue Reading >>

WW3 Has Begun, And It Is Digital: Cyberattacks Took Down Major Sites

By Mac Slavo

Get ready – it seems that this will be an October Surprise to remember.

The Internet is under attack through the United States and UK… and there is every reason to think that more is coming.

Reports confirmed that a distributed denial of service attack (DDoS) was carried out against the company Dyn, and disrupted much of the East Coast, and later the West Coast and other parts of the U.S. as well, taking down hundreds of major websites – including Paypal, Twitter, Spotify, Netflix, Amazon, Tumblr and Reddit and more.

It took hours for many of them to come back online.

According to USA Today:

At least two successive waves of online attacks blocked multiple major websites Friday, at times making it impossible for many users on the East Coast to access Twitter, Spotify, Netflix, Amazon, Tumblr and Reddit.

[…]

The cause was a large-scale distributed denial of service attack (DDoS) against Internet performance company Dyn that blocked user access to many popular sites standstill.

Dyn … confirmed the attack, noting that “this attack is mainly impacting US East and is impacting Managed DNS customers in this region. Our Engineers are continuing to work on mitigating this issue.”

Here’s a log of updates for the attacks on Dyn Managed DNS infrastructure:

Speculation is that this could be a test run for larger attacks – and public demonstration of just how vulnerable Internet connected systems are. Things are coming to a head very quickly, and there is no telling what will happen as the U.S. election approaches. As the San Jose Mercury News reported:

“Say, not to panic anybody, but what if the (attacks) today were practice for 11/8 ?” high-profile pundit Keith Olbermann tweeted.

A hacking collective calling itself “New World Hackers” are taking credit – and they are based out of Russia and China, so there is little doubt that it will fuel the narrative for more war, tighter security and an age of online instability as the new world (where the dollar is no longer king) is sorted out. According to the Associated Press:

Members of a shadowy hacker collective that calls itself New World Hackers claimed responsibility for the attack via Twitter. They said they organized networks of connected “zombie” computers that threw a staggering 1.2 terabits per second of data at the Dyn-managed servers.

“We didn’t do this to attract federal agents, only test power,” two collective members who identified themselves as “Prophet” and “Zain” told an AP reporter via Twitter direct message exchange. They said more than 10 member participated in the attack. It was not immediately possible to verify the claim.

[…]

The collective has also claimed responsibility for cyber attacks against Islamic State. The two said about 30 people have access to the @NewWorkdHacking Twitter account. They said 20 are in Russia and 10 in China. “Prophet” said he is in India. “Zain” said he is in China. The two claimed to be taking “good actions.”

Perhaps, this major blackout of Internet services may even be a self-inflicted wound to make the establishment look like the victim, rather than the aggressor that Hillary’s legacy represents. Wikileaks has to be hurting her campaign, and it is difficult to say exactly how far things are going to reestablish credibility and take control of the situation.

Right now, Julian Assange is reportedly surrounded by police forces outside the Ecaudorian embassy in London – and his personal future, and that of Wikileaks remains up in the air. Only days ago, his Internet access was cut, with Ecuador under diplomatic pressure by the U.S.

Further Internet attacks are now pending, and it seems everything is potentially exposed. There is no way to be certain how massive future attacks could be – but the largest potential event would likely be an EMP, sending out an electromagnetic pulse powerful enough to take down the electric grid and fry virtually all unprotected electronics.

Individuals can and should prepare on two fronts – stored food and supplies necessary to sustain your family/group for a minimal of several weeks without power and essential services. People can also protect electronic equipment – primary or backup – in a Faraday cage (which will guard against EMP).

Additionally, emergency cash and alternative currency (such as gold and silver) reserves should kept on hands; identity protection measures should be put in place and all accounts, documents, paperwork and other sensitive items should be written down, photocopies and/or stored offline (on a USB, for example). A more detailed check list can be found here. Extra caution should be used with electronic banking and online payment systems.

The shadow government and its military forces have been preparing for extremes in all areas. Things are happening now that we have warned about for years – the cyber dimension of war means that everyone is on the battlefield:

The attack is “consistent with record-setting sized cyberattacks seen in the last few weeks,” [said Carl Herberger, vice president of security at security company Radware]

[…]

Others worried the attack could be from a nation-state rather than simply an individual seeking to wreak havoc.

“This not just an instant job, this is something that was probably worked on for weeks if not for months by really competent people,” he said. (source)

The power to shut down commerce, communication and news feeds could either start – or stop – the kind of 21st Century war that is only now taking shape.

In what is perhaps a bit of planned irony, or a tip off to the perpetrators of this attack, video surfaced of Hillary Clinton in 2010 (as Secretary of State) blathering on about the importance of cyber security and intelligence protection.

Empty words indeed.

In hindsight, no one could have done more to expose the United States’ secrets than the Madam Secretary herself – emails and more make this clear.

Will any of this stop her, or will she take power in spite of it all?


 

OTHER USEFUL RESOURCES:

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com


 

Facebook Accused Of Listening To Everything You Say — Here’s How To Stop It

By Jay Syrmopoulos

Recently, an expert has come out to claim that Facebook may be listening in on your conversations. Kelli Burns, a mass communication professor at the University of South Florida, believes the app might be using people’s microphones to gather data on the content of people’s conversations.

Facebook admits that the app is capable of listening to what’s happening around it — but claims the feature simply identifies what people are listening to or watching as means of conveniently posting about it.

Currently, the feature is only available in the U.S. and has been available for a couple of years according to Facebook, although recent warnings from Burns have drawn renewed interest.

According to a report in The Independent:

Professor Burns has said that the tool appears to be using the audio it gathers not simply to help out users, but might be doing so to listen in to discussions and serve them with relevant advertising. She says that to test the feature, she discussed certain topics around the phone and then found that the site appeared to show relevant ads.Though Professor Burns said she was not convinced that Facebook is listening in on conversations – it may have been that she was searching for the same things that she chose to discuss around the phone – but she said that it wouldn’t be a surprising move from the site.

The claim chimes with anecdotal reports online that the site appears to show ads for things that people have mentioned in passing.

Facebook accused of listening to everything you say and collects audio information from users – but that the two aren’t combined, and that no audio data is stored or correlated with advertising.

“Facebook does not use microphone audio to inform advertising or News Feed stories in any way. Businesses are able to serve relevant ads based on people’s interests and other demographic information, but not through audio collection,” said Facebook in a recent blog post. “We only access your microphone if you have given our app permission and if you are actively using a specific feature that requires audio. This might include recording a video or using an optional feature we introduced two years ago to include music or other audio in your status updates.”

Although Facebook claims they do not listen in on conversations, the catch here is that Facebook does have access to your phone’s microphone — as giving permission to access your microphone is a requirement to be able to download the site’s mobile app – thus giving the company the ability to access your phone’s mic at any time.

According to a report in Forbes:

This is not the first time Facebook was accused of listening to conversations using smartphone microphones. Reddit user NewHoustonian started a discussion last year about whether the Facebook app was listening to conversations for advertising purposes. NewHoustonian started off the discussion with a post — which has since been removed — about how he suspects the Facebook app was listening to him because he started seeing pest control ads after talking to his girlfriend about killing a cockroach. That Reddit thread now has over 1,700 comments in regards to Facebook listening to conversations and several of those comments refer to similar experiences.

Additionally, police in Belgium have warned citizens to not use Facebook’s recently added Reactions feature if they are concerned about safeguarding their personal privacy.

Whether or not Facebook is actually listening is debatable, but the ability to listen certainly exists given the fact that each person with the mobile app has already given the company permission to access their phone’s microphone. Thankfully, there is an easy solution for those that don’t trust the social media giant with access to their microphone.

One simple way is to uninstall the app altogether and simply access Facebook from the mobile site itself, thus never having to give any permissions to access your data or microphone.

Another fix is to turn off the microphone in a phone’s settings, which is relatively easy to do. Since this is done at the operating system level, doing so will mean that Facebook loses the ability to access your microphone completely.

On an iPhone this can be done by entering the app’s settings, going to privacy and then switching the slider for the microphone to the off position; on an Android phone, go to settings and then privacy, App permissions, Microphone, and from there you can change the permissions that the Facebook app is given.

 

While Facebook claims that they may not be actively listening to your conversations, the idea that you have given permission for the company to access your microphone and text message data simply by downloading and installing the app is certainly disconcerting for those completely unaware that they have given such privacy-shattering permissions to Facebook.

 

OTHER USEFUL RESOURCES:

 

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without

 


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com 


 

 

Preview Of World War III? Russia Is Putting On A Display Of Firepower That Is Shocking The World

The Russians have unleashed their own version of “shock and awe” in Syria, and the brutal efficiency of their airstrikes against ISIS targets has stunned many observers around the globe.  For more than a year, the Obama administration has claimed that its bombing campaign in Syria has been a “success”, and yet ISIS has continued to grow stronger and gain more territory. 

Continue Reading >>

Putin Sends Tanks to Syria: “Largest Deployment of Outside Russian Forces Since USSR Collapse”

Now that Syria is back in the news with the refugee crisis, Russia appears poised to raise another round of alarm bells about the prospect of wider war.
The pending deal with Iran could be broken at any time by all sides, including a preemptive nuclear strike by its enemies. The tensions over Syria – triangulated between Assad’s forces, ISIS terrorists and Western-backed “rebels” – are equally likely to boil over, as the attempts to oust Assad have been stymied.

Continue Reading >>

Windows 10 is spying on almost everything you do

Here’s how to opt out …

Windows 10 is amazing. Windows 10 is fantastic. Windows 10 is glorious. Windows 10 is faster, smoother and more user-friendly than any Windows operating system that has come before it. Windows 10 is everything Windows 8 should have been, addressing nearly all of the major problems users had with Microsoft’s previous-generation platform in one fell swoop.

Continue Reading >>

The Creator of This Amazing Internet Privacy Device Has Been Silenced: “Effective Immediately We Are Halting Further Development”

Data collection and invasive monitoring of American citizens has been at the forefront of government activities for decades. After revelations by Edward Snowden in recent years, the fringe conspiracy theorists who warned of Big Brother surveillance and had been laughed at by the general population were finally proven right.

But despite the literal hundreds of thousands of pages of information about government snooping and the Congressional

Continue Reading >>

Experts Say War With Russia Was Imminent “66 Times in Last 18 Months”

 

For many, the Cold War tensions with Russia had become a distant memory… until, of course, NATO and Russia squared off over the Ukraine issue.

Now, American-backed NATO forces have been brought back to the brink of World War III — an astounding 66 TIMES — just in the last year and a half.

Continue Reading >>

Lawmakers accuse Snowden of being Russian spy

Two of the top lawmakers within the United States intelligence community say that Congress is now considering whether any officials in the Russian government have influenced the actions of US National Security Agency leaker Edward Snowden.

Continue Reading >>

Obama expected to curb spying on foreign leaders, limit NSA access to phone records

The White House is in the midst of hosting a flurry of meetings with intelligence officials, civil libertarians and technology experts as the administration prepares to announce changes to some of the surveillance programs exposed by Edward Snowden.

Continue Reading >>

Suspicious of NSA spying, Microsoft moves to encrypt Internet traffic – report

Microsoft is moving to encrypt its Internet traffic based on assumptions the National Security Agency has broken into its internal global communications systems as it did with Google and Yahoo, according to sources familiar with the plans.

Continue Reading >>

NSA collected porn visits data to discredit Muslim ‘radicalizers’

The National Security Agency has been collecting a mountain of dirt on the online sexual activity of individuals, all of them Muslims, whom the agency seeks to discredit due to their ‘radicalizing’ efforts.

The expression ‘all’s fair in love and war’ just took on a whole  new meaning in the ongoing debate that pits national security  against personal privacy.

Continue Reading >>

US, UK officials worry Snowden still has ‘doomsday’ collection of classified material

US and British intelligence officials say they are concerned about a “doomsday” collection of highly classified, heavily encrypted materials they believe former National Security Agency contractor Edward Snowden may have stored away.

Continue Reading >>

‘ScareMail’ seeks to confuse NSA programs with nonsense

scaremail-nsa-tool-nonsense_siAn Illinois man has developed a Gmail browser extension designed to randomly insert fake, nonsensical stories into the signature of every email one sends to confuse the NSA’s surveillance operations.

Continue Reading >>