Stratfor

Nothing to do with government or being paid to do zilch.

All it is is that any organisation/company has its amount of computer illiterate / cyber security unaware employees.

Keep in mind that the "security" these people deal with normally involves things like bomb threats, weapon deals, nuclear armament policy, etc... not cyber security.

::emp::
 


there are tens of thousands of government agencies like the NSA, FBI, DOJ, DOD and users in the list that deal with internet crimes and national computer security.

look at these cute lil marines and @nsa.gov users all using the same password:

1GHnO.png


it decrypts to usmcportal how adorable and sad!

from the NSA's website
The NSA/CSS core missions are to protect U.S. national security systems and to produce foreign signals intelligence information.

LOL ^

And people think the US government could control and manage something like SOPA safely ?? :(
 
Later this week,

CNN News: WickedFire shut down after reportedly aiding and abetting cyber terrorism by sharing secure login credentials of several top US governmental intelligence agencies.
 
there are tens of thousands of government agencies like the NSA, FBI, DOJ, DOD and users in the list that deal with internet crimes and national computer security.

look at these cute lil marines and @nsa.gov users all using the same password:

it decrypts to usmcportal how adorable and sad!

from the NSA's website


LOL ^

And people think the US government could control and manage something like SOPA safely ?? :(

Honestly, the only thing your password did, was to manage your email settings and what lists you were on. UNLESS these were paying subscribers and credit card info was available.

Now, having said all of that... there is an INCREDIBLE amount of work to be done for people using proper computer security protocols.

Believe it or not, .gov has made HUGE strides in security. Most agencies now use 2 factor authentication, requiring complex passwords, etc..

I'm with you on SOPA 100% though!
 
Any luck?

Anyone else having any luck? We're trying to get some offers rocking for the new year, but our inbox rates on this list are terrible!
 
Roughly 19,000 email addresses ending in the domain extension .mil for the US military were published in the leak. John Bumgarner, a cyber-security expert at the US Cyber Consequences Unit, mulled over the data for the UK’s Guardian and said that info on 173 individuals deployed in Iraq were among those published in the latest posting.
Anonymous' Stratfor hack outs intelligence officials across the world — RT

The cyber consequences unit will never be the same.
 
It's Wikileaks' Stratfor Payoff day!

Dudes, Wikileaks just dumped that stolen info all over the net... It's juicy stuff!

The Global Intelligence Files - List of Releases

For instance, here's one where they talk about how Obama Frauded his ass into the presidency in Nov 2008:

The Global Intelligence Files - RE: Insight - The Dems & Dirty Tricks ** Internal Use Only - Pls Do Not Forward **

And here's one more recently where they analyse the Anonymous v/s Zetas situation: The Global Intelligence Files - Anonymous vs. Zetas Amid Mexico's Cartel Violence

The 2011 folder has a long list of docs all worthy of their own thread here!

Get to reading... Great stuff.
 
  • Like
Reactions: greenleaves
If it's the next 9/11 or other type of conspiracy? Then I'd bet those anonymous folks have probably already breathed their last breaths.


Anyone that supports them, knows that 911 was an inside job.

:evil_laughter: