{"id":123492,"date":"2019-06-02T06:53:27","date_gmt":"2019-06-02T10:53:27","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=123492"},"modified":"2019-06-02T09:42:12","modified_gmt":"2019-06-02T13:42:12","slug":"ogate-the-transatlantic-obama-scandal-aka-the-occhionero-conspiracy","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=123492","title":{"rendered":"<b>Ogate<\/b>: The Transatlantic Obama Scandal aka the OCCHIONERO CONSPIRACY"},"content":{"rendered":"<hr \/>\n<p><strong><a href=\"http:\/\/themillenniumreport.com\/2019\/06\/the-occhionero-scandal-how-obama-and-renzi-conspired-to-frame-trump-using-the-innocent-giulio-occhionero\/\">TMR<\/a> Editor&#8217;s Note<\/strong>: Obama&#8217;s transatlantic scandal known as &#8220;The OCCHIONERO CONSPIRACY&#8221; has the potential to take down <em>Deep State<\/em>.\u00a0 \u00a0Yes, it&#8217;s that BIG! So big it&#8217;s also referred to as <em><strong>Ogate<\/strong><\/em>.<\/p>\n<p>But why?\u00a0 Because <em><strong>Ogate<\/strong><\/em> has all the captivating elements of a very broad and deep multi-nation conspiracy to execute a coup d&#8217;\u00e9tat against the POTUS that include gripping intrigue and startling subterfuge, naked sedition and outright treason.<\/p>\n<p>We could say much more but don&#8217;t want to spoil it for our audience.\u00a0 Just grab your popcorn &#8230; sit back and relax &#8230; and watch the show <strong>EXPLODE ACROSS THE INTERNET<\/strong>!<\/p>\n<p><a href=\"http:\/\/themillenniumreport.com\/2019\/06\/the-occhionero-scandal-how-obama-and-renzi-conspired-to-frame-trump-using-the-innocent-giulio-occhionero\/\">The Millennium Report<\/a><br \/>\nJune 2, 2019<\/p>\n<hr \/>\n<h1>The Occhionero Files: EternalBlue meets EyePyramid. #TheSilentOnes #Spygate #QAnon #GreatAwakening #NEONREVOLT<\/h1>\n<p><!--more-->by Neon Revolt<\/p>\n<div id=\"attachment_34042\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/cosmicconvergence.org\/wp-content\/uploads\/2019\/06\/120171020104357479983.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-34042\" class=\"wp-image-34042 size-full\" src=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/03\/brussels-654528.jpg\" alt=\"\" width=\"590\" height=\"350\" srcset=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/03\/brussels-654528.jpg 590w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/03\/brussels-654528-300x178.jpg 300w\" sizes=\"auto, (max-width: 590px) 100vw, 590px\" \/><\/a><p id=\"caption-attachment-34042\" class=\"wp-caption-text\">Giulio Occhionero and Francesca Maria Occhionero\u0089<\/p><\/div>\n<p>If you haven\u2019t read my previous article on\u00a0<a href=\"https:\/\/www.neonrevolt.com\/tag\/thesilentones\/\">#TheSilentOnes<\/a>\u00a0and the Italian Government\u2019s role in framing Giulio Occhionero in order to force Trump out of office by planting Hillary\u2019s classified emails on Occhionero\u2019s server (and then falsely connecting Occhionero to Trump)\u2026 it\u2019s absolutely essential that read that now, before diving in to this latest update.<\/p>\n<p>Before I begin, a hat tip to TheBigOldDog, Zatvornik, and Anglojibwe. Also, I\u2019ll address recent \u201cdrama\u201d at the END of this article. For now, I want to get right into this: It star\u2026<\/p>\n<p>A lot has happened since that article was published.<\/p>\n<p>First, The Gateway Pundit picked up an amplified the story.<\/p>\n<p>Then, I was told the story found its way to the desks of the Italian Prime Minister, as well as the Italian President (which sounds like panic, if you ask me).<\/p>\n<p>And perhaps most tellingly, former Italian PM Matteo Renzi just announced today that he may be stepping down as the head of\u00a0<em>Partito Democratico<\/em> \u2013 the radical Left party that previously held power at the same time as Obama (and, who you\u2019ll recall, was implicated as someone who was colluding with Obama during this whole framing operation):<\/p>\n<p><a href=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2019\/06\/crop.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-81084\" src=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2019\/06\/crop.jpg\" alt=\"\" width=\"636\" height=\"300\" \/><\/a><\/p>\n<p>Now another writer by the name of Full Spectrum Domino has added his own research into the mix:<br \/>\n<img decoding=\"async\" src=\"https:\/\/fullspectrumdominoes.files.wordpress.com\/2019\/05\/op-charlemagna-1.png\" alt=\"Was Operation Charlemagne the Trump Frame-Up That Got Away?\" \/><br \/>\n<a class=\"content_cards_title_link\" href=\"https:\/\/fullspectrumdominoes.wordpress.com\/2019\/05\/29\/nine-days-in-may-2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">Was Operation Charlemagne the Trump Frame-Up That Got Away?<\/a><\/p>\n<p>[Downloadable \u2018Nine Days in May\u2019 chart available here in PDF.] [Also, a 5\/30 blog update on the subject from NeonRevolt here.] ____________________ On May 15 just passed, Italian\u2026<\/p>\n<p><img decoding=\"async\" class=\"content_cards_favicon\" src=\"https:\/\/secure.gravatar.com\/blavatar\/0ab4534de2a127bbb335b4fdb1f92f59?s=32\" alt=\"Full-Spectrum Domino\" \/> FULL-SPECTRUM DOMINO<br \/>\n(Archive link:\u00a0<a href=\"https:\/\/archive.fo\/Sda00\">https:\/\/archive.fo\/Sda00<\/a>)<\/p>\n<p>Domino did some good work charting things out, but also speculates that\u00a0<a href=\"https:\/\/www.neonrevolt.com\/tag\/operationcharlemagne\/\">#OperationCharlemagne<\/a>\u00a0also leads back to Strzok and Page:<\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>Charted below is the critical Nine Day period with interwoven sub-plots.\u00a0\u00a0A higher-resolution version of the chart below appears\u00a0<a href=\"https:\/\/www.scribd.com\/document\/411800372\/Nine-Days-in-May-2017\">here in downloadable PDF<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11460\" src=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-22-58.png\" sizes=\"auto, (max-width: 1376px) 100vw, 1376px\" srcset=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-22-58.png 1376w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-22-58-300x169.png 300w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-22-58-768x431.png 768w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-22-58-1024x575.png 1024w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-22-58-600x337.png 600w\" alt=\"\" width=\"1376\" height=\"773\" \/><\/p>\n<p>Here too is a critical May 10, 2017 Strzok-Page message exchange:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11462\" src=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-40-20.png\" sizes=\"auto, (max-width: 832px) 100vw, 832px\" srcset=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-40-20.png 832w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-40-20-300x128.png 300w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-40-20-768x329.png 768w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-30_01-40-20-600x257.png 600w\" alt=\"\" width=\"832\" height=\"356\" \/><\/p>\n<p><strong>It\u2019s highly likely that \u2018the credible case\u2019 Peter Strzok and Lisa Page had been \u2018waiting on\u2019 was precisely the aborted Operation Charlemagne<\/strong><\/p><\/blockquote>\n<p>(Emphasis mine).<\/p>\n<p>Domino continues:<\/p>\n<blockquote><p>The indispensable\u00a0Conservative Treehouse blog\u00a0has speculated that the redacted word on the last 2017-05-10 05:29:00 entry is\u00a0<strong>POTUS<\/strong>. This theory acquires additional plausibility if, as Guilio Occhionero suggests:<\/p>\n<blockquote><p>In order to substantiate an allegation against Trump, they should find a\u00a0<u>proof of someone linked to Republicans (the Occhionero\u2019s) who were found in possession of the Hillary\u2019s emails<\/u>. So the plot was to deposit these emails (which we think Polizia Postale actually \u201chas\u201d) onto our servers in the US; and then\u00a0<u>make the bomb detonate<\/u>. But several things went wrong for them. First, while I had contacts with previous Republicans here, I had none to the Trump campaign. Second, during investigations, FBI isolated our servers so Polizia Postale was then\u00a0<u>unable to keep hacking into them<\/u>\u00a0in order to deposit Clinton\u2019s email. The other proofs they deposited in court in Italy (linking to the previous cyber attack in Italy that supposedly launched EyePyramid)\u00a0<u>they were so idiot to fabricate 5 days before this crime was committed<\/u>. So, the style of fabrication and the people involved\u00a0<u>immediately led me to De Gennaro and his gang<\/u>.<\/p><\/blockquote>\n<p>The Clinton email deposit fails. One Occhionero theory is that the prior investigation had ring-fenced his servers from further interference due to the earlier spear-phishing investigation into he and his sister. So in effect, the conspirators may have Inspector Clouseau-ed themselves.<\/p><\/blockquote>\n<p>I mentioned in the previous article that I was keeping in contact with Occhionero, and would provide any updates to the case, as they rolled on.<\/p>\n<p>While we were speaking, there was one particular aspect of the case Occhionero wanted to clarify, and that\u2019s in regards to the contents of these documents:<\/p>\n<table>\n<tbody>\n<tr>\n<td>Italian Source Doc<\/td>\n<td>Machine-translated English Docs<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/20180705-Procura-di-Perugia-PM-Gemma-Miliani.pdf\">20180705 Procura di Perugia \u2013 PM Gemma Miliani<\/a><\/td>\n<td><a href=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/Translated-20180705-Procura-di-Perugia-PM-Gemma-Miliani.it_.en_.pdf\">Translated 20180705 Procura di Perugia \u2013 PM Gemma Miliani.it.en<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Occhionero would write:<\/p>\n<blockquote><p>This happened last July.\u00a0<u>It is an attack they tried against my Gmail by the use of an infected attachment<\/u>. I was free at the time but probably\u00a0<i>someone was eager to know<\/i>\u00a0what my investigations were uncovering. I am quite confident\u00a0<u>the attack has been carried by a government agency<\/u>\u00a0because of the way it has been structured. If you read through the pdf you will see that I was corresponding with another person who was still in jail; but with whom I became friends with at the time. BTW, in jail you have nothing to do, so I used my time teaching math\/physics\/coding to other folks, writing their issues to magistrates, and also playing chess with them. This gave me some popularity which resulted in several invitations to excellent cooking and some new friendships.<\/p><\/blockquote>\n<p>Anyone else seeing shades of the Shawshank Redemption?<\/p>\n<p>I had to ask!<\/p>\n<blockquote><p>Back to the attack, someone took my email to him from the jail\u2019s mailbox and built a fake reply from Diego Paloni to me, attaching the infected file. I was immediately aware of the thing and filed to Perugia. Perugia apparently found no connection to its other cases and so bounced this matter back to Procura di Roma. Procura di Roma is now investigating case\u00a0<b>RG 148137\/2018<\/b>\u00a0under prosecutor\u00a0<b>Nicola Maiorano<\/b>; a case where Occhionero is a victim. The\u00a0<b>Certificate 335<\/b>\u00a0is attached.<\/p><\/blockquote>\n<p>Indeed, it was:<\/p>\n<p><a href=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2019\/06\/Screen-Shot-2019-06-02-at-6.24.26-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-81085\" src=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2019\/06\/Screen-Shot-2019-06-02-at-6.24.26-AM.png\" alt=\"\" width=\"575\" height=\"765\" \/><\/a><\/p>\n<blockquote><p>The very problem with this, and\u00a0<u>the reason it makes me think it has been a government agency to attack me<\/u>\u00a0(DIS, CNAIPIC, Polizia Postale\u2026) is that, in order to attack my Gmail, they had to read the correspondence of the jail first. So,\u00a0<u>only people with some government power can do this<\/u>. This also makes me think Perugia should better not bounce that\u00a0back to Rome. Because now, prosecutor Nicola Maiorano is perhaps\u00a0investigating on some colleagues, or perhaps on judiciary police in Rome.<\/p>\n<p><strong>The Exodus spyware case is grabbing attention these days because it was designed in 2016 for Italian Polizia Postale and for the intelligence agencies AISI and AISE<\/strong>. Guess who was the head of Polizia Postale in 2016?<\/p>\n<p><b><u>Roberto Di Legami<\/u><\/b><\/p><\/blockquote>\n<p>In other words, the Occhionero believes the Italian Government spoofed an email from a friend he had made in prison, in order to get him to download the Exodus malware they had commissioned, onto his phone. The malware was only recently discovered by Security Without Borders, who published a report on the malware in late March, 2019. Security Without Borders would write in their report:<\/p>\n<p><a href=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2019\/06\/crop.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-81086\" src=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2019\/06\/crop.png\" alt=\"\" width=\"636\" height=\"300\" \/><\/a><\/p>\n<h4><a href=\"https:\/\/securitywithoutborders.org\/blog\/2019\/03\/29\/exodus.html\" target=\"_blank\" rel=\"noopener noreferrer\">Security Without Borders<\/a><\/h4>\n<p class=\"description\">While details would vary, all of the identified copies of this spyware shared a similar disguise. In most cases they would be crafted to appear as applications distributed by unspecified mobile operators in Italy. Often the app description on the Play Store would reference some SMS messages the targets would supposedly receive leading them to the Play Store page.<br \/>\n<a class=\"action\" href=\"https:\/\/securitywithoutborders.org\/blog\/2019\/03\/29\/exodus.html\" target=\"_blank\" rel=\"noopener noreferrer\">Read this on securitywithoutborders.org &gt;<\/a><\/p>\n<blockquote>\n<ul>\n<li>We identified a new Android spyware platform we named <strong>Exodus<\/strong>, which is composed of two stages we call\u00a0<strong>Exodus One<\/strong>\u00a0and\u00a0<strong>Exodus Two<\/strong>. We have collected numerous samples spanning from 2016 to early 2019.<\/li>\n<li>Instances of this spyware were found on the Google Play Store, disguised as service applications from mobile operators. Both the Google Play Store pages and the decoys of the malicious apps are in Italian. According to publicly available statistics, as well as confirmation from Google,\u00a0<strong>most of these apps collected a few dozens installations each, with one case reaching over 350. All of the victims are located in Italy<\/strong>. All of these Google Play Store pages have been taken down by Google.<\/li>\n<li>We believe this spyware platform is developed by an Italian company called\u00a0<strong>eSurv<\/strong>, which primarily operates in the business of video surveillance. According to public records it appears that eSurv began to also develop intrusion software in 2016.<\/li>\n<li>Exodus is equipped with extensive collection and interception capabilities. Worryingly, some of the modifications enforced by\u00a0<strong>the spyware might expose the infected devices to further compromise or data tampering<\/strong>.<\/li>\n<\/ul>\n<\/blockquote>\n<p>This next bit is quite technical\u2026 so skim to the end if you have to, but I include it because it will demonstrate the capabilities of this malware, and why the authorities would try to trick Occhionero into downloading it by forging and email ostensibly from his friend:<\/p>\n<blockquote><p>Similarly to another Android spyware made in Italy, originally discovered by\u00a0Lukas Stefanko\u00a0and later named\u00a0Skygofree\u00a0and analyzed in depth by Kaspersky Labs, Exodus also takes advantage of \u201cprotectedapps\u201d,\u00a0<strong>a feature in Huawei phones<\/strong>\u00a0that allows to configure power-saving options for running applications. By manipulating a SQLite database, Exodus is able to keep itself running even when the screen goes off and the application would otherwise be suspended to reduce battery consumption.<\/p><\/blockquote>\n<p>I think the Huawei connection is especially notable here, given what we now know about their own clandestine activities. This looks like someone discovered an (intentional) vulnerability left behind by Huawei, and exploited it for their own ends.<\/p>\n<blockquote><p>After download,\u00a0<em>Exodus One<\/em>\u00a0would dynamically load and execute the primary stage 2 payload\u00a0<code>mike.jar<\/code>\u00a0using the Android API\u00a0DexClassLoader().\u00a0<code>mike.jar<\/code>\u00a0implements most of the data collection and exfiltration capabilities of this spyware.<\/p><\/blockquote>\n<p>Don\u2019t worry if you didn\u2019t quite understand that bit. For our purposes, all you need to know is there are two stages to installing this malware on a phone, and its stage 2 that\u2019s responsible for all the spying\/data collection:<\/p>\n<blockquote><p>Of the various binaries downloaded, the most interesting are\u00a0<code>null<\/code>, which serves as a local and reverse shell, and\u00a0<code>rootdaemon<\/code>, which takes care of privilege escalation and data acquisition.\u00a0<code>rootdaemon<\/code>\u00a0will first attempt to jailbreak the device using a modified version of the DirtyCow exploit.<\/p><\/blockquote>\n<p>Jailbreaking\/rooting the device would give a remote hacker administrative privileges over the entire file system. And seeing as this is a remote-controlled piece of malware, that means that someone, sitting a computer far away, could have access to every single file \u2013 even the system files \u2013 on the phone:<\/p>\n<p>Perhaps I should skip back momentarily and address how we know it\u2019s a remote-controlled system:<\/p>\n<blockquote><p>Firstly we can notice that, instead of generic domain names or IP addresses, these samples communicated with a Command &amp; Control server located at\u00a0<code>attiva.exodus.esurv[.]it<\/code>\u00a0(\u201c<em>attiva<\/em>\u201d is the Italian for \u201c<em>activate<\/em>\u201c).<\/p>\n<p><em>(We named the spyware \u201cExodus\u201d after this Command &amp; Control domain name.)<\/em><\/p><\/blockquote>\n<p>And this, ultimately, is what the spyware could provide hackers access to:<\/p>\n<blockquote><p>As mentioned,\u00a0<code>mike.jar<\/code>\u00a0equips the spyware with extensive collection capabilities, including:<\/p>\n<ul>\n<li>Retrieve a list of installed applications.<\/li>\n<li>Record surroundings using the built-in microphone in 3gp format.<\/li>\n<li>Retrieve the browsing history and bookmarks from Chrome and SBrowser (the browser shipped with Samsung phones).<\/li>\n<li>Extract events from the Calendar app.<\/li>\n<li>Extract the calls log.<\/li>\n<li>Record phone calls audio in 3gp format.<\/li>\n<li>Take pictures with the embedded camera.<\/li>\n<li>Collect information on surrounding cellular towers (BTS).<\/li>\n<li>Extract the address book.<\/li>\n<li>Extract the contacts list from the Facebook app.<\/li>\n<li>Extract logs from Facebook Messenger conversations.<\/li>\n<li>Take a screenshot of any app in foreground.<\/li>\n<li>Extract information on pictures from the Gallery.<\/li>\n<li>Extract information from th GMail app.<\/li>\n<li>Dump data from the IMO messenger app.<\/li>\n<li>Extract call logs, contacts and messages from the Skype app.<\/li>\n<li>Retrieve all SMS messages.<\/li>\n<li>Extract messages and the encryption key from the Telegram app.<\/li>\n<li>Dump data from the Viber messenger app.<\/li>\n<li>Extract logs from WhatsApp.<\/li>\n<li>Retrieve media exchanged through WhatsApp.<\/li>\n<li>Extract the Wi-Fi network\u2019s password.<\/li>\n<li>Extract data from WeChat app.<\/li>\n<li>Extract current GPS coordinates of the phone.<\/li>\n<\/ul>\n<\/blockquote>\n<p>So this was no amateur set-up, and justifies Occhionero\u2019s suspicions. Evidently, someone wanted to see every single bit of data flowing through Occhionero\u2019s phone, as he was building his case against\u00a0<a href=\"https:\/\/www.neonrevolt.com\/tag\/thesilentones\/\">#TheSilentOnes<\/a>, so that they could head him off at every pass.<\/p>\n<p>It didn\u2019t work, and Occhionero caught the fake app before it could be loaded on to his phone, because, as his testimony says, the email the app was sent with didn\u2019t contain the typical PDF he was used to seeing. It contained a word Doc (a deprecated file format that allows for executable code to be ran from within). Suspecting something was up, he then analyzed the email\u2019s headers and this confirmed his suspicion that this was a fake email, spurring him to avoid the attachment for the time being and investigate further.<\/p>\n<p>But all this talk of hacking brought be back to a conversation I had on Gab with @JuliansRum the day after I published my original article. Full credit to him for bringing this to my attention:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11447\" src=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-28_23-09-43.png\" sizes=\"auto, (max-width: 706px) 100vw, 706px\" srcset=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-28_23-09-43.png 706w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-28_23-09-43-300x258.png 300w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-28_23-09-43-600x517.png 600w\" alt=\"\" width=\"706\" height=\"608\" \/><\/p>\n<p>Julian lays out the case well, but I\u2019m going to attempt to expand on it, a bit, for those following along at home. The first of the two articles in question can be found here:<\/p>\n<p><iframe id=\"emb_galrlj\" class=\"embedly-card\" width=\"600\" height=\"516\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>And as Julian notes, this was an article Q himself referred back in 2017 to as a \u201cDIRECT ATTACK:\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11452\" src=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/firefox_2019-05-29_15-12-17.png\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" srcset=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/firefox_2019-05-29_15-12-17.png 520w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/firefox_2019-05-29_15-12-17-159x300.png 159w\" alt=\"\" width=\"520\" height=\"982\" \/><\/p>\n<p>Q would go on to implicate the \u201cClowns In America\u201d (the CIA) as being involved:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11453\" src=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/firefox_2019-05-29_15-13-25.png\" sizes=\"auto, (max-width: 521px) 100vw, 521px\" srcset=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/firefox_2019-05-29_15-13-25.png 521w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/firefox_2019-05-29_15-13-25-236x300.png 236w\" alt=\"\" width=\"521\" height=\"661\" \/><\/p>\n<p>The article is lengthy, but the basic gist is that a group calling themselves \u201cThe Shadow Brokers\u201d infiltrated the NSA and leaked stolen hacking applications online, which were then used by state actors and hackers around the world to compromise various systems.<\/p>\n<p>And if you follow Q, you know this was really a CIA operation, those leftover Nazi\/Cabal holdovers, designed to weaken the NSA from the inside-out.<\/p>\n<p>Essentially, these were secret cyber-weapons only the NSA had at their disposal; tools which gave the NSA a distinct advantage over everyone else\u2026<\/p>\n<p>But when the Shadow Brokers hit the scene, everyone suddenly had access to those same tools.<\/p>\n<p>And its with this in mind that that Julian noticed that the New York Times suddenly published a follow-up article on the Shadow Brokers, a mere day after I had published my article about Occhionero being hacked.<\/p>\n<p>This couldn\u2019t just be a coincidence. So let\u2019s see what they had to say in the latest:<\/p>\n<p><a href=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2019\/06\/crop-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-81088\" src=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2019\/06\/crop-1.jpg\" alt=\"\" width=\"636\" height=\"300\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.nytimes.com\/2019\/05\/25\/us\/nsa-hacking-tool-baltimore.html\" target=\"_blank\" rel=\"noopener noreferrer\">In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc<\/a><br \/>\nFor nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.<br \/>\n<a class=\"action\" href=\"https:\/\/www.nytimes.com\/2019\/05\/25\/us\/nsa-hacking-tool-baltimore.html\" target=\"_blank\" rel=\"noopener noreferrer\">Read the article on nytimes.com &gt;<\/a><\/p>\n<p>In this article, Nicole Perlroth and Scott Shane, two of the three writers of the original piece, go on to explain how one of the NSA\u2019s weapons \u2013 named EternalBlue \u2013 was now being turned against the aging infrastructure of certain towns and cities in America.<\/p>\n<blockquote><p>Since 2017, when the N.S.A. lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.\u2019s own backyard.<\/p>\n<p>It is not just in Baltimore. Security experts say EternalBlue attacks\u00a0have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.<\/p>\n<p>\u2026<br \/>\nThomas Rid, a cybersecurity expert at Johns Hopkins University, called the Shadow Brokers episode \u201cthe most destructive and costly N.S.A. breach in history,\u201d more damaging than the better-known leak in 2013 from Edward Snowden, the former N.S.A. contractor.<\/p>\n<p><strong>\u201cThe government has refused to take responsibility, or even to answer the most basic questions,\u201d Mr. Rid said. \u201cCongressional oversight appears to be failing. The American people deserve an answer.\u201d<\/strong><\/p><\/blockquote>\n<p>(Emphasis mine).<\/p>\n<p>See how they frame it?<\/p>\n<blockquote><p>Since that leak, foreign intelligence agencies and rogue actors have used EternalBlue to spread malware that has paralyzed hospitals, airports, rail and shipping operators, A.T.M.s and factories that produce critical vaccines. Now the tool is hitting the United States where it is most vulnerable, in local governments with aging digital infrastructure and fewer resources to defend themselves.<\/p>\n<p>Before it leaked, EternalBlue was one of the most useful exploits in the N.S.A.\u2019s cyberarsenal. According to three former N.S.A. operators who spoke on the condition of anonymity, analysts spent almost a year finding a flaw in Microsoft\u2019s software and writing the code to target it. Initially, they referred to it as EternalBluescreen because it often crashed computers \u2014 a risk that could tip off their targets. But it went on to become a reliable tool used in countless intelligence-gathering and counterterrorism missions.<\/p>\n<p>EternalBlue was so valuable, former N.S.A. employees said, that the agency never seriously considered alerting Microsoft about the vulnerabilities, and held on to it for more than five years before the breach forced its hand.<\/p><\/blockquote>\n<p>So, you can see, this is being used to say that the NSA needs more oversight, because they simply can\u2019t be trusted.<\/p>\n<p>Of course, the question to ask then\u2026 is which groups would want to see more restrictions placed on the NSA? Which groups would benefit from the NSA being handicapped in such a manner?<\/p>\n<p>And that\u2019s all a farce to begin with, since the attack against the NSA probably came from the CIA in the first place. If there\u2019s any rogue agency that needs more oversight, it\u2019s the CIA.<\/p>\n<blockquote><p>Brad Smith, Microsoft\u2019s president, has called for a\u00a0<a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2017\/02\/14\/need-digital-geneva-convention\/#sm.0001gnysbhjsod01z7q11hvz0xg2d\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cDigital Geneva Convention\u201d<\/a>\u00a0to govern cyberspace, including a pledge by governments to report vulnerabilities to vendors, rather than keeping them secret to exploit for espionage or attacks.<br \/>\nLast year, Microsoft, along with Google and Facebook, joined 50 countries in signing on to a similar call by French President Emmanuel Macron \u2014 the Paris Call for Trust and Security in Cyberspace \u2014 to end \u201cmalicious cyber activities in peacetime.\u201d<br \/>\nNotably absent from the signatories were the world\u2019s most aggressive cyberactors: China, Iran, Israel, North Korea, Russia \u2014 and the United States.<\/p><\/blockquote>\n<p>These exploits were patched by companies like Microsoft after they were made public in the wake of the \u201cShadow Brokers\u201d selling these tools online, but because towns and cities have limited budgets, skills, and foresight, they tend to rely on aging systems and all sorts of legacy architecture \u2013 which makes them vulnerable targets for these exploits, since, well, they can\u2019t pay an IT guy to come in, replace old hardware, or patch their legacy systems.<\/p>\n<p>In essence, the New York Times wants you to think these EternalBlue attacks are happening all over America, all the time, due to the NSA losing control, not doing their due-diligence, and generally just being irresponsible\u2026<\/p>\n<p>But as we all know, this isn\u2019t the case. The only reason the NSA lost control of those tools in the first place was because it had been infiltrated by CIA double-agents, who then took those tools and marketed them online using the bogus \u201cShadow Brokers\u201d moniker.<\/p>\n<p>But why would the New York Times suddenly be interested in making you think these EternalBlue attacks were so\u2026 common?<\/p>\n<p>It was clear to me they were covering for something\u2026 Could it possibly be related to the Occhionero case?<\/p>\n<p>I had to ask him:<\/p>\n<blockquote><p>You mention the Exodus spyware case again, but I want to ask you a question that, at first, may seem somewhat unrelated at first, but bear with me as I try to cover all the bases here\u2026<\/p>\n<p>The primary question I have is: do you think it\u2019s possible the Italian government used this EternalBlue program to hack your systems?<\/p><\/blockquote>\n<p>Occhionero responded almost immediately:<\/p>\n<blockquote><p>Hi Neon,<br \/>\nYour reference to\u00a0<b>EternalBlue<\/b>\u00a0<u>made me jump from the chair<\/u>.<\/p>\n<p>I don\u2019t have to speculate about it as\u00a0<strong>CNAIPIC\u00a0(in\u00a0December 2017) already affirmed using it to unlock my servers in\u00a0April 2017.<\/strong>As you see in my notes on the side,\u00a0<u>I already identified this, more than one year ago, as yet another indication of their hacking<\/u>. Obviously the date they mention is all but worth any credibility.<br \/>\nConsider that these idiots have also brought into court the hard disks from our servers\u00a0<u>which then showed last modification date of\u00a0<b>May 2017<\/b><\/u>, when both Francesca and I were in jail. I told you they aren\u2019t going for a Nobel prize\u2026<\/p><\/blockquote>\n<p>Can you believe that? The idiots actually put it in writing.<\/p>\n<p>For those who may not remember, the CNAIPIC is the special division of the Italian State Police \u2013 (translated literally, the National Anti-Crime Center for the Protection of Critical Computer Infrastructure).<\/p>\n<p>Now, this isn\u2019t a document I can share in full right now, as it relates to an ongoing case, but I can share this excerpt:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11448\" src=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/ApplicationFrameHost_2019-05-28_13-01-54.png\" sizes=\"auto, (max-width: 1008px) 100vw, 1008px\" srcset=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/ApplicationFrameHost_2019-05-28_13-01-54.png 1008w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/ApplicationFrameHost_2019-05-28_13-01-54-300x60.png 300w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/ApplicationFrameHost_2019-05-28_13-01-54-768x155.png 768w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/ApplicationFrameHost_2019-05-28_13-01-54-600x121.png 600w\" alt=\"\" width=\"1008\" height=\"203\" \/><\/p>\n<p>Translated: On April 14, 2017, an exploit was published in the Internet for the SMB protocol for Microsoft Windows operating systems, called EternalBlue<\/p>\n<p>Carmen G would later note on twitter:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11449\" src=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-28_23-08-45.png\" sizes=\"auto, (max-width: 677px) 100vw, 677px\" srcset=\"https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-28_23-08-45.png 677w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-28_23-08-45-170x300.png 170w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-28_23-08-45-581x1024.png 581w, https:\/\/www.neonrevolt.com\/wp-content\/uploads\/2019\/05\/dissenter_2019-05-28_23-08-45-600x1058.png 600w\" alt=\"\" width=\"677\" height=\"1194\" \/><\/p>\n<p>And this is, perhaps, the most interesting twist in this story so far, because the Tadaqueous malware listed above was, as Carmen notes, used against Hillary Clinton\u2019s private servers. It\u2019s worth noting that this piece of malware also comes from the \u201cShadow Brokers,\u201d the same group that released EternalBlue into the wild.<\/p>\n<p>Keep in mind that we also know that Clinton\u2019s private servers were kept intentionally insecure to allow for a pay-to-play scheme, wherein foreign State Actors would donate to the Clinton Foundation in exchange for all manner of state secrets.<\/p>\n<p>Tadaqueous works in a similar fashion to EternalBlue, albeit for Linux systems (as opposed to EternalBlue\u2019s targeting of Windows systems).<\/p>\n<p>And it was\u00a0<strong>specifically<\/strong>\u00a0built for Fortinet-secured Linux servers\u2026 (Fortinet is a commercial encryption product that Hillary used to ostensibly \u201cprotect\u201d her servers).<\/p>\n<p>So we have to pose the question:<\/p>\n<p>What if Hillary was also giving out the \u201ckey\u201d in the form of Tadaqueous malware, in exchange for Clinton Foundation donations the entire time?<\/p>\n<p>Think about it: this way should could claim that she was taking all necessary precautions to keep the contents of her server secure (if she was ever caught). This is basically the same as saying you locked the vault of a bank for the evening, while providing thieves access to the vault through a hole in the floorboards, and then acting all bewildered when you unlock the vault the next day and find it empty. Meanwhile, the thieves are leaving wads of cash in your mailbox.<\/p>\n<p>I found a brilliant thread from @The_War_Economy on Tadaqueous, earlier this year, going over times and dates in to great detail \u2013 and I think you\u2019ll come to the same conclusion I have, after reading it: this is how Hillary\u2019s server was accessed by foreign actors.<\/p>\n<p>https:\/\/twitter.com\/The_War_Economy\/status\/1083091217481695232\/photo\/1?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed&#038;ref_url=https%3A%2F%2Fwww.neonrevolt.com%2F2019%2F05%2F30%2Fthe-occhionero-files-eternalblue-meets-eyepyramid-thesilentones-spygate-qanon-greatawakening-neonrevolt%2F<\/p>\n<p>(Threadreader link:\u00a0<a href=\"https:\/\/threadreaderapp.com\/thread\/1083087388837113856.html\">https:\/\/threadreaderapp.com\/thread\/1083087388837113856.html<\/a>)<\/p>\n<p>It always goes back to that old witch, doesn\u2019t it?<\/p>\n<p>You had Tadaqueous to \u201chack\u201d Hillary\u2019s emails\u2026<\/p>\n<p>EternalBlue to help with the cover-up and framing of Occhionero and Trump\u2026<\/p>\n<p>And Exodus to make sure Occhionero couldn\u2019t fight back against the conspirators, the Silent Ones working against them all.<\/p>\n<p>Occhionero is extremely fortunate that these guys failed at so many junctures and thank God above, because had they been competent at their jobs\u2026 they probably would have gotten away with it, and now the would would be facing the devastation of President Hillary Clinton.<\/p>\n<p>___<br \/>\n<a href=\"https:\/\/www.neonrevolt.com\/2019\/05\/30\/the-occhionero-files-eternalblue-meets-eyepyramid-thesilentones-spygate-qanon-greatawakening-neonrevolt\/#comment-17956\">https:\/\/www.neonrevolt.com\/2019\/05\/30\/the-occhionero-files-eternalblue-meets-eyepyramid-thesilentones-spygate-qanon-greatawakening-neonrevolt\/#comment-17956<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TMR Editor&#8217;s Note: Obama&#8217;s transatlantic scandal known as &#8220;The OCCHIONERO CONSPIRACY&#8221; has the potential to take down Deep State.\u00a0 \u00a0Yes, it&#8217;s that BIG! So big it&#8217;s also referred to as Ogate. But why?\u00a0 Because Ogate has all the captivating elements &hellip; <a href=\"https:\/\/stateofthenation2012.com\/?p=123492\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-123492","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/123492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=123492"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/123492\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=123492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=123492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=123492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}