Praying Medic
@prayingmedic
FireEye, one of America's largest cybersecurity firms, reports that a suite of hacking tools have been stolen by a state actor.
U.S. cybersecurity firm FireEye discloses breach, theft of internal hacking tools
reuters.com
https://mobile.twitter.com/prayingmedic/status/1336421981453832192
Quigley
@CarrollQuigley1
FireEye is owned by GA Senator David Perdue.
https://mobile.twitter.com/CarrollQuigley1/status/1336427432686084101
Quigley
@CarrollQuigley1
Replying to
@Avery1776
@BenKTallmadge
and
@TheLastRefuge2
<<⟨FireEye⟩>>
Here's where they fell into the maps I made awhile back.
https://littlesis.org/maps/3083-global-clownstrike
2. Eye
https://littlesis.org/maps/3118-see-ing-eye-aye
3. Detective
https://littlesis.org/maps/3013-private-eyes
4. Spider web
https://littlesis.org/maps/3022-military-intelligence-industrial-complex
Quigley
@CarrollQuigley1
Replying to
@ECEverett1
@JohnWHuber
and 2 others
Just randomly made a Pakastani connection.
Crowdstrike worked with several companies while investigating DNC hacks.
One of them is FireEye
In 2004, Ashar Aziz, a Pakistani American, founded FireEye with venture capital provided by Sequoia Capital.
https://mobile.twitter.com/CarrollQuigley1/status/995166677271744513
Johnny Deep
@Deepstate6969
Replying to
@CarrollQuigley1
and
@prayingmedic
1/FireEye is CIA/InQtel company, They are used for 'discreet' services, they were hacked a while ago (2014 if my memory is correct)..They were used to validate crowdstrikes attribution of the DNC hack, They were also used (mandiant)in the Alfa Hoax, they failed to investigate it
2/properly and used logs given from the NYT instead of using the faked 'A' records TeaLeaves put online as well as the network switch records the NYT supplied..The fake logs were available online from the 5th October...the same time they went to moscow to inspect the alfa server
3/i wish people would pay attention to the best analysis ever produced on the Faked server logs..
https://weaponizedautism.wordpress.com/2017/04/09/tru
4/the only logs that are real, are taken from a upstream sensor.
Not from 'ns1/2/3_cdcservices_com.log'..they have been faked to make them appear like server logs..(which is why they only produced text files.)
http://ljean.com/NetworkData.php
https://mobile.twitter.com/Deepstate6969/status/1336456837168689153
Sort: Top
[–] Trizzle1 ago
I knew it! I knew it!
[–] derram ago
https://archive.ph/wip/yN5SM
https://nitter.net/prayingmedic/status/1336421981453832192 :
https://archive.ph/wip/xsHNJ
https://nitter.net/CarrollQuigley1/status/1336427432686084101 :
https://archive.ph/wip/kljwH
https://nitter.net/CarrollQuigley1/status/995166677271744513 :
https://archive.ph/wip/8gAgm
https://nitter.net/Deepstate6969/status/1336456837168689153 :
This has been an automated message.