NEW HUGE EMAIL DUMP BY WIKILEAKS

wikileaks.org/hbgary-emails/?bb
wikileaks.org/hbgary-emails/?bb
wikileaks.org/hbgary-emails/?bb
wikileaks.org/hbgary-emails/?bb
wikileaks.org/hbgary-emails/?bb


If you've been wondering what COINTELPRO looks like in the 21st century, then today's your day. PALANTIR allying with Clinton's campaign, information about Aaron Swartz, """Fake News""", get it while it's hot.

reddit.com/r/WikiLeaks/
reddit.com/r/DNCleaks/
reddit.com/r/conspiracy/

Other urls found in this thread:

reddit.com/r/WikiLeaks/comments/5fm7jf/together_palantir_hbgary_and_berico_bring_the/
wikileaks.org/hbgary-emails/emailid/4249
wikileaks.org/hbgary-emails/emailid/39681
fbo.gov/index?s=opportunity&mode=form&id=d88e9d660336be91552fe8c1a51bacb2&tab=core&_cview=1
wikileaks.org/podesta-emails/emailid/57524
wikileaksdecrypted.com/bankofamerica-wikileaks-hbgary-palantir/
twitter.com/AnonBabble

If this is based Barrett, I wanna let you know I have nothing but respect for you. I know from mutual friends youre getting out soon.

Solidarity my brother.

Solidarity forever.

reddit.com/r/WikiLeaks/comments/5fm7jf/together_palantir_hbgary_and_berico_bring_the/

wikileaks.org/hbgary-emails/emailid/4249

Excerpts from the WL/Greenwald deck if you don't want the whole attachment

Strengths

–Their strength is their global following and volunteer staff. This allows them to have a very loose organization. Little if any direction or coordination is actually passed it is just inferred as part of the cause.

Julien pronounces and the minions follow. Larger infrastructure is fairly pointless to attack because they have so many other >points and organizations that are willing to distribute the >information and help them get new hosting services.

Weaknesses

–Financial: They are under increasing financial pressure because authorities are blocking their funding sources.

–Security: Need to get to the Swedish document submission server. Need to create doubt about their security and increase awareness that interaction with WikiLeaks will expose you.

–Mission: There is a fracture among the followers because of a belief that Julienis going astray from the cause and has selected his own mission of attacking the US.

•Despite the publicity, WikiLeaks is NOT in a healthy position right now. Their weakness are causing great stress in the >organization which can be capitalized on.

Proactive Tactics

Feed the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing >organization. Submit fake documents and then call out the error.

•Create concern over the security of the infrastructure. Create exposure stories. If the process is believed to not be secure they >are done.

•Cyber attacks against the infrastructure to get data on document submitters. This would kill the project. Since the >servers are now in Sweden and France putting a team together >to get access is more straightforward.

•Media campaign to push the radical and reckless nature of wikileaksactivities. Sustained pressure. Does nothing for the fanatics, but creates concern and doubt amongst moderates.

•Search for leaks. Use social media to profile and identify risky behavior of employees.

Have wikileaks not been compromised?

I don't believe so.

I hope so because the conspiracies I've been hearing surrounding Assange and wikileaks lately are pretty concerning.

Yeah, I know what you mean. I think all we can do at this point is just try to soberly examine what information we've been given and try to make of it what we can. I don't think it's been co-opted and is just another psy-op outlet, but you never know. Best to take everything with a grain of salt, especially since you can't really know who is on the other side of the screen.

Bump

I ain't got time to dig through this shit, what are the highlights that support this theory?

Just save your Princess Maker 2 file. Your waifu will be there for you when you're done.

wikileaks.org/hbgary-emails/emailid/39681

fbo.gov/index?s=opportunity&mode=form&id=d88e9d660336be91552fe8c1a51bacb2&tab=core&_cview=1

0001- Online Persona Management Service. 50 User Licenses, 10 Personas per user. Software will allow 10 personas per user, replete with background , history, supporting details, and cyber presences that are technically, culturally and geographacilly consistent. Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information.

0002- Secure Virtual Private Network (VPN). 1 each VPN provides the ability for users to daily and automatically obtain randomly selected IP addresses through which they can access the internet. The daily rotation of the user s IP address prevents compromise during observation of likely or targeted web sites or services, while hiding the existence of the operation. In addition, may provide traffic mixing, blending the user s traffic with traffic from multitudes of users from outside the organization. This traffic blending provides excellent cover and powerful deniability. Anonymizer Enterprise Chameleon or equal

0003- Static IP Address Management. 50 each Licence protects the identity of government agencies and enterprise organizations. Enables organizations to manage their persistent online personas by assigning static IP addresses to each persona. Individuals can perform static impersonations, which allow them to look like the same person over time. Also allows organizations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organization. Anonymizer IP Mapper License or equal

oh you mean a-crazy-rapists-playground.com?

Wikileaks has been compromised. Assange is dead. Take everything from that source with a grain of salt.

>>>/reddit/

0004- Virtual Private Servers, CONUS. 1 each Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated CONUS Light Geosite or equal

0005- Virtual Private Servers, OCONUS. 8 Each Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated OCONUS Light Geosite or equal

0006- Remote Access Secure Virtual Private Network. 1 each Secure Operating Environment provides a reliable and protected computing environment from which to stage and conduct operations. Every session uses a clean Virtual Machine (VM) image. The solution is accessed through sets of Virtual Private Network (VPN) devices located at each Customer facility. The fully-managed VDI (Virtual Desktop Infrastructure) is an environment that allows users remote access from their desktop into a VM. Upon session termination, the VM is deleted and any virus, worm, or malicious software that the user inadvertently downloaded is destroyed. Anonymizer Virtual Desktop Infrastructure (VDI) Solution or equal.

Source?

aaay podesta's back

wikileaks.org/podesta-emails/emailid/57524

On Jul 9, 2015 5:58 PM, "Haim Saban" > wrote:

Haim Saban = billionaire who owns Power Rangers and now The Onion btw

wikileaksdecrypted.com/bankofamerica-wikileaks-hbgary-palantir/

around ac6ons to sabotage or discredit the opposing organiza6on. Submit
fake documents and then call out the error.

stories. If the process is believed to not be secure they are done.

This would kill the project. Since the servers are now in Sweden and France
pupng a team together to get access is more straighqorward.

wikileaks ac6vi6es. Sustained pressure. Does nothing for the fana6cs, but creates concern and
doubt amongst moderates.

employees. '''

It really is FBIbook

Which conspiracies are you referring too? I'm out of the loop.

His internet connection at the Ecuadorian embassy got cut and apparently is still off. The current theory is that he's been black bagged and wikileaks' various social media accounts have been subverted and playing a Weekend at Bernie's in order to release bogus info and destroy wikileaks' credibility.

That or some variation of it.

But haven't there been live interviews with him aired after the blackout?

Why is Assange's internet not restored now that the election is over?

Nah, see, those interviews were recorded BEFORE and are just made to look like they are recent. /conspiracy


Probably because wikileaks keeps dropping cables and leaks and emails and airing the US's dirty laundry all over the fucking place.