Twitter | Search | |
Search Refresh
DocRock1007 🇺🇸 Jun 13
Replying to @DocRock1007
14. Anons sleuth 's lead on feigning Russians hacking DNC servers & election systems & feigning China hacking Navy contractor's computer on a submarine in Washington via info release.
Reply Retweet Like
WikiLeaks May 15
Full doc: 8 Jan 2018 court transcript for suspected, but not indicted, CIA whistleblower Joshua Adam Schulte
Reply Retweet Like
WikiLeaks Mar 12
Kaspersky analysis of "Slingshot" malware which has been discovered infecting routers in Africa and the Middle East
Reply Retweet Like
WikiLeaks May 15
US gov says that it suspects a former a young New York CIA officer is WikiLeaks' source--because he complained to Congress of abuse in the CIA--but have no evidence to indict. So they put him in jail on improbable child porn accusations instead.
Reply Retweet Like
WikiLeaks May 15
Six articles said to be by the twenty-nine year old CIA officer the FBI claims it suspects being the whistleblower
Reply Retweet Like
x0rz May 16
Soooooo... some random internal CIA project was on GitHub and went unnoticed for months. Wow, what else is there to find?
Reply Retweet Like
WikiLeaks Mar 30
Replying to @AnarchoPakman
Daily reminder that after the Director of the CIA publicly vowed to destroy WikiLeaks in response to our series a great many fake Assange accounts appeared on social media speading fake messages--one of which you are quoting ('Assange' has only one 'n').
Reply Retweet Like
Chris Sampson May 15
As I said a year ago, inside contractors would be the lead suspects in leaks
Reply Retweet Like
WikiLeaks May 22
A year ago Trump's CIA vowed to "end" after it began publishing the largest leak in CIA history, .
Reply Retweet Like
WikiLeaks May 16
Please direct all media inquiries on the (so far, not enough evidence to indict) FBI investigation against suspected CIA whistleblower Joshua Adam to Sabrina Shroff, Federal Defender (New York), sabrina_shroff@fd.org, (212) 417-8713
Reply Retweet Like
Mrs. Christine Assange May 15
TODAY re-released its publications of & documents exposing the . The most concerning to me was the fact that the CIA had a program to frame anyone by falsifying their internet communications.
Reply Retweet Like
Anonymous 4thEstate Jun 9
How do we know China actually did it. We don’t. We won’t. China has denied it and Wikileaks’ release showed us the CIA can fake and mask IP addresses!!
Reply Retweet Like
x0rz May 15
tl;dr: a former CIA engineer on jail for possessing child pornography is being investigated for the leaks. During the searches, FBI agents didn't find any evidence he did so. Except that he used Tor... which is barely something worth mentioning
Reply Retweet Like
x0rz Mar 21
Fun fact: the CIA did continue its cyber operations after the release of documents, according to Kaspersky (and if the Slingshot APT was indeed the CIA)
Reply Retweet Like
DocRock1007 🇺🇸 Jun 13
Replying to @DocRock1007
7. indicates mask hacks with tools, then blame Russia (2016 election) or China (yesterday's sub missile in WA).
Reply Retweet Like
Chris Bing May 16
The alleged leaker, Joshua Schulte, seems to have been a big fan of Gateway Pundit, the alt-right conspiracy website. found his old Twitter account:
Reply Retweet Like
#UNLEASHED May 19
Rogue FBI/CIA/DOJ operatives used human assets to spy/manipulate Trump Campaign. Why stop there? Did Obama Administration also deploy, now leaked, CIA () cyber-espionage tools, implants, and vulnerabilities to spy on family & associates?
Reply Retweet Like
We Support 45 & The Wall! Jun 3
Retweeted We Support 45 & The Wall! (): Ronald Reagan explained Liberalism many years ago is Fascism! & Help @
Reply Retweet Like
Wendy Hijazi May 16
If the "proper channels" of reporting within agencies were working, would have never suffered. embarrassed CIA. Does it show strength that being embarrassed makes them all SO EMO?
Reply Retweet Like
#UNLEASHED May 19
Hack targeting traced to Obama/Holder DOJ. Sophisticated spyware was used to spy on her. Considering what we now know, would ANYONE be surprised if we learn that similar cyber-espionage tools were used against campaign?
Reply Retweet Like