Democrat operative David Brock’s chat shows NSA surveillance used to identify and disable online Trump supporters

David Brock is a Clinton loyalist, apparatchik for the Democrat Party as founder of Media Matters, and the former boyfriend of Comet Ping Pong owner James Alefantis who, though a “mere” pizza restaurateur, was named by GQ magazine as 49th among the 50 most powerful people in Washington, D.C.

8 months ago in September 2016, someone hacked into Correct the Record — a Hillary super PAC founded by Brock — and obtained the transcript of a conversation between Brock and three other Democrat operatives the morning after the first presidential debate on Sept. 26 between Donald Trump and Hillary Clinton. The transcript was posted on Reddit and other sites.

Although the Sept. 26 debate was rigged to favor Hillary by outfitting her podium with a teleprompter (see “Hillary used a teleprompter during first debate with Trump”), the post-debate polls all had Trump as the winner, which prompted the morning-after chat between Brock and the three Democrat operatives:

  • ekim
  • efink: Elliot Fink, HR office manager/executive assistant of Correct the Record
  • cshaw: Connor Shaw (?), Special Projects, Correct the Record.

The chat is interesting and significant for at least two reasons:

(1) Referring to Hillary Clinton as “the sick thing,” Brock et al. were surprised by how good Hillary or her imposter looked in the debate (“whoever that was, she looked pretty good. how tf did they do that?” “i can’t talk. very hush hush.”) because just “a couple of weeks” before the debate, Hillary had performed poorly on two cognitive impairment tests:

  • A score of 3 on AMTS — Abbreviated Mental Test Score, a 10-question test to access elderly patients for the possibility of dementia. A score of 7-8 or less suggests cognitive impairment at the time of testing, although further and more formal tests are necessary to confirm a diagnosis of dementia, delirium or other causes of cognitive impairment.
  • A score of 22 on MMSE — Mini-Mental State Examination, a 30-point questionnaire that is used extensively in clinical and research settings to measure cognitive impairment and to screen for dementia. Any score below 24 can indicate severe (≤9 points), moderate (10–18 points) or mild (19–23 points) cognitive impairment.

(2) Panicking that Hillary had lost the debate (“we’re losing 100%”; “Trump made her look like a girl.”), and recognizing that Trump’s supporters are “enthusiastic” and “organized,” Brock et al. vowed they “have to stop the bleeding” and must “hit back hard” with new methods because “the usual means” of online trolling (“disruption scripts” and “down-voting”) “isn’t working” and because Trump supporters are sub-human “deplorables”.

Brock et al. said “we need to start hurting people” by deploying NSA spy software, specifically FOXACID, on Reddit, Twitter, 4chan and 8chan posters, identifying their leaders, getting their IP addresses, doxing (obtain personal information of an Internet poster, including real name, known aliases, address, phone number, SSN, credit card number, etc.), tracking their online activities , and infecting their computers with “magic lanterns” — viruses that log the keystrokes of the infected computer. For all of which Brock said “we have full clearance. Word of God.”

FOXACID is a National Security Agency (NSA) software designed to hack into  target computers with spam and QUANTUM — a program where servers deployed at key places on the Internet backbones impersonate legitimate Web sites and trick the target’s browser into visiting a FOXACID server. If the target’s browser is exploitable, further permanent “implants” (rootkits etc.) are deployed in the target computer, e.g. OLYMPUSFIRE for Windows, which give complete remote access to the infected machine.

The chat ended with Brock ordering the three operatives to compile a list of information on more than a thousand online posters. After Brock logged off the chat, one of the operatives asked what Brock would do with the information they’ll give him on the Trump supporters, the ominous answer was:

google Seth Rich and shut up about it.

Seth Rich, a DNC staffer believed to have provided thousands of damaging DNC emails to WikiLeaks, was murdered on July 10, 2½ months before the Trump-Hillary debate.

Below is the transcript of the Brock et al. chat:

Begin Transcript ekim [5:52 AM]

ekim [5:52 AM] set the channel purpose: clean up this mes

brock [5:52 AM] joined post-debate from an invitation by @ekim

brock [5:53 AM] go round up the others. i need some coffee.

ekim [5:53 AM] will do

efink [5:54 AM] motherfucker.

brock [5:54 AM] good morning to u to fink.

efink [5:55 AM] the only good thing about it was that whoever that was, she looked pretty good. how tf did they do that?

brock [5:56 AM] i can’t talk. very hush hush. still, we’ve lost every online poll and we need to get tough here. get this under control.

[5:56] still, i hope we put the sick thing to bed.

[5:56] i hope.

efink [5:57 AM] me 2. do i have time for coffee?

brock [5:57 AM] we’re all gonna need a lot of coffee.

ekim [5:58 AM] shaw is on his way sir.

[5:59] i don’t see what’s so bad. She looked really healthy! I thought she did GREAT!

efink [5:59 AM] she was scoring 3 on AMTS a couple of weeks ago and 22 on mmse. Yeah, whoever that was was normal.

[6:00] but the telemetry sucks. look at all the snap onlines: we’re losing 100%

[6:00] romney v obama numbers

ekim [6:01 AM] but those don’t mean anything

efink [6:01 AM] it means they’re enthusiastic. organized. if they can swarm a poll whats to stop them swarming a voting booth?

[6:01] it also creates a counter-nar. the free press will sniff it. we have to stop the bleeding.

ekim [6:01 AM] k

efink [6:02 AM] don’t worry. we have something. GET SHAW OUT OF BED.

[6:02] i’m going for coffee.

cshaw [6:05 AM] hello!

[6:06] hi Liz.

[6:06] I see we’re not happy :disappointed:

brock [6:06 AM] Not at all.

cshaw [6:06 AM] I read the round-up. It looked good?

brock [6:07 AM] the round up my burning ass. I’m talking about the real world. Trump made her look like a girl. Today we hit back. We hit back hard.

[6:07] Fink?

efink [6:07 AM] one sec.

[6:10] okay. guys, this is 18-2381 stuff. Got it?

cshaw [6:10 AM] yes

ekim [6:10 AM] yes sir.

efink [6:11 AM] alright. we need to move beyond the disruption scripts and down-voting. we need to start hurting people and that’s what this is about. This is about winning because we’ll never get a chance at this again. everything is justified. David?

brock [6:11 AM] dramatic.

[6:13] fuck–okay. so the Trump team is an emergent order. thirty million little chan and reddit assholes that bump around and then congeal to vote in a poll or push a meme or make a hashtag trend or whatever. This is new. It isn’t like fighting a centrally organized campaign.

[6:13] It’s more like fighting a disease.

[6:14] So what we need to do is break the pattern. The usual means isn’t working. Trump’s too charismatic. Morale is too high. This is an army of chaos folks.

[6:14] so we have full clearance. Word of God.

[6:15] Fink–let’s do this. I have a plane to catch.

efink [6:16 AM] uploaded and commented on an image: foxacid.jpg 1 Comment FOXACID

ekim [6:16 AM] Ew.

cshaw [6:16 AM] i like it! wtf is it??

efink [6:17 AM] This is manna from heaven, kids.

[6:18] We have the use of an NSA intrusion package. We are going to find the thought leaders. the meme-generators. the shit-posters. I need a target analysis for reddit, twitter, and the chans by tomorrow 5 PM.

[6:18] You will monitor, identify, and using the FA [foxacid] software set we have, identify/dox.

cshaw [6:18 AM] that will dox them??

efink [6:20 AM] It will man-on-the-side for the anon boards and intercept traffic. We can use that for IP addresses and loading tracking software and magic lantern onto their devices. Once we have them compromised

[6:20] David? How many do we need?

brock [6:21 AM] I want 150 from 4chan, whatever you can get from 8. I want 1000 top reddit drivers exposed and I want content analysis for their posts. I want the people who are really driving their narrative.

[6:22] I need all that in a packet by tomorrow afternoon with lexical analysis, proof of compromise. I want clips of memes. I want to up-vote patterns. All this has to be inside the US too. We can’t use externals.

cshaw [6:23 AM] It won’t work outside the US?

efink [6:23 AM] It works fine outside the us you idiot. That’s NSA stuff.

brock [6:24 AM] WE don’t work outside the US. Do you think this is fucking bean-bag?

[6:24] We are going to disrupt them before this shit goes any further.

[6:24] if they don’t have leaders, we’re going to get their thought leaders.

cshaw [6:24 AM] like pajama boy!

brock [6:25 AM] I AM NOT N THE MOOD cshaw

cshaw [6:25 AM] sorry

efink [6:26 AM] just get us the target profiles. Hit the numbers. Give us a matrix for each of them. Okay? PII, influence grid, recent activity, Q-rate. Like that.

[6:26] You know what to do.

cshaw [6:26 AM] Yes sir.

ekim [6:26 AM] What are we going to do with that?

brock [6:27 AM] dof u really want tio fucking know, kim?

ekim [6:27 AM] i’m good.

brock [6:28 AM] u better be. I am going to get a plane. You will be up ALL NIGHT. Keep the lab LOCKED. Fink bring in pizza or whatever to keep the kids going.

[6:28] I am out.

cshaw [6:28 AM] does it have to be We the Pizza?

efink [6:29 AM] Brock LIKES WtP. What do you want?

ekim [6:29 AM] Sushi. Sushi would be nice.

efink [6:30 AM] what do you think this is, the Trump campaign. We’re getting pizza from We.

[6:30] Get those files together.

ekim [6:30 AM] I’m on it. Do you know what brock is going to do with them? I do kind of want to know, sir.

efink [6:31 AM] google Seth Rich and shut up about it.

cshaw [6:31 AM] OOg.

[6:32] well, they are deplorable. idk. I think we should have done this a long time ago.

efink [6:32 AM] get working kids. I’ll check back in a couple. Have something for Brock before he hits the ground. k?

ekim [6:33 AM] I’m sick of We the Pizza.

cshaw [6:33 AM] me2.

[6:33] :confused:

ekim [6:33 AM] :confused:

Update (June 7, 2017):

In a series of comments (see below), blogger Max Insider of a hoax fake-news site called RealTrueNews — which is neither real nor true nor news — claims that he concocted the David Brock chat transcript and blames his deception on Trump supporters. See his December 27, 2016 fake post: “Inside Correct the Record: Post-Debate PLOT!“.

Notwithstanding Max Insider’s claim (whose alias is yet another lie as he is no “insider” of anything but hoaxes) that the Brock transcript is a hoax, it should be pointed out that the NSA in fact does engage in the nefarious activities described in the transcript — those of “doxing” online posters and deploying FoxAcid to attack and infect their computers. The following is from a UK Guardian article on Oct. 4, 2013:

“Secret servers and a privileged position on the internet’s backbone used to identify users and attack target computers

The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA’s application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world.

According to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The trick identified Tor users on the internet and then executes an attack against their Firefox web browser.

The NSA refers to these capabilities as CNE, or computer network exploitation.

The first step of this process is finding Tor users. To accomplish this, the NSA relies on its vast capability to monitor large parts of the internet. This is done via the agency’s partnership with US telecoms firms under programs codenamed Stormbrew, Fairview, Oakstar and Blarney.

The NSA creates “fingerprints” that detect http requests from the Tor network to particular servers. These fingerprints are loaded into NSA database systems like XKeyscore, a bespoke collection and analysis tool which NSA boasts allows its analysts to see “almost everything” a target does on the internet….

After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect those users to another set of secret internet servers, with the codename FoxAcid, to infect the user’s computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and attacks developed by the NSA, giving the agency opportunity to launch prepared attacks against their systems.

Once the computer is successfully attacked, it secretly calls back to a FoxAcid server, which then performs additional attacks on the target computer to ensure that it remains compromised long-term, and continues to provide eavesdropping information back to the NSA.

~Eowyn

Advertisements

53 responses to “Democrat operative David Brock’s chat shows NSA surveillance used to identify and disable online Trump supporters

  1. This is supposed to be a hoax.

    Like

      • Sorry–this is totally, completely faked. The origin of the piece is RealTrueNews–a satire website. Look at the front page (Seth Rich’s pockets were full of Uranium).

        Like

        • The fact is the NSA does “dox” online posters and use FoxAcid to attack and infect their computers. The following is from a UK Guardian article on Oct. 4, 2013:

          “Secret servers and a privileged position on the internet’s backbone used to identify users and attack target computers

          The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA’s application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world.

          According to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The trick identified Tor users on the internet and then executes an attack against their Firefox web browser.

          The NSA refers to these capabilities as CNE, or computer network exploitation.

          The first step of this process is finding Tor users. To accomplish this, the NSA relies on its vast capability to monitor large parts of the internet. This is done via the agency’s partnership with US telecoms firms under programs codenamed Stormbrew, Fairview, Oakstar and Blarney.

          The NSA creates “fingerprints” that detect http requests from the Tor network to particular servers. These fingerprints are loaded into NSA database systems like XKeyscore, a bespoke collection and analysis tool which NSA boasts allows its analysts to see “almost everything” a target does on the internet….

          After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect those users to another set of secret internet servers, with the codename FoxAcid, to infect the user’s computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and attacks developed by the NSA, giving the agency opportunity to launch prepared attacks against their systems.

          Once the computer is successfully attacked, it secretly calls back to a FoxAcid server, which then performs additional attacks on the target computer to ensure that it remains compromised long-term, and continues to provide eavesdropping information back to the NSA.

          Liked by 1 person

            • Since you wrote it, who then is ekim?

              You deserve all the confusion and our skepticism and disgust for writing a hoax. Why would you do such a thing anyway?

              Liked by 1 person

              • Ekim is one of the people from the CTR financials. I picked random names, except for Brock. There’s a longer story about why I did it–but essentially it’s this: I was asked by friend to help him out in social media arguments with Trump Supporters who were spreading fake news. After several lengthy arguments wherein I debunked the news–TO THEIR SATISFACTION–that is, they agreed that the news they’d spread was fake–they, again, spread more fake news.

                Alternatively they simply refused to acknowledge facts they didn’t like in favor of fake news they did. I just tried to explain to my Trump voting aunt that Hillary actually got more votes in 2016 than Trump. She doesn’t believe me.

                So what do you do? Well, I created RealTrueNews–a site that one look at will tell you is dodgy. The sourcing is all mysterious. Every single article on there is an over-the-top conspiracy. Absolutely none of it is believable. It hits every conspiracy marker. It goes into the realm of science fiction. Where it is well “crafted” it’s absurd. In most cases, it’s just funny (Barack and Michelle catch one of their kids running off to join ISIS and are very cross with her).

                The result, when it works, is that someone who finds it realizes that just because a “news site” uses “their language” and their signifiers (Brock is evil to the core, Obama is allowing murder, Trump-4-chan guys are virtuous) Doesn’t. Make. It. True.

                In the worst case scenario they believe it.

                In the middle case, they believe it until they run into someone slightly less susceptible–but who they will still listen to–and it gets debunked. That’s embarrassing–and unfortunate–but it’s better than running around believing a for the rest of your life.

                I predict there’s at least a 50% chance you’ll decide I’m a deep-state agent who has come after you to suppress the truth–but I’d love to be wrong.

                Like

                • Your contorted explanation does not justify your hoaxes and deception. All lies are of the devil and violation of the 9th Commandment. That others make fake news doesn’t justify what you do. You should be ashamed of yourself for lying, with full intent and knowledge of consequences, and sowing confusion.

                  I notice you haven’t responded to my comment quoting extensively from The Guardian article on the NSA doxing and deploying FoxAcid on online posters. Why is that? Do you dispute the fact that the NSA both has the capability and actually engages in this behavior?

                  Liked by 2 people

                  • It’s not a contorted explanation–it’s what happened. I’m not bearing false witness against my neighbors, either–and I’m sure not spreading lies to people who trust me. That, erm, would be you.

                    I, of course, looked up Fox Acid just like everyone else did. So, yes–it’s a real thing, a real capability. It’s not being used by Democratic Super PACs to try to take down 4chan kids. That was the ridiculous part. I imagine it–or things like it–are being used to hunt terrorists.

                    Like

          • Well, are you going to post a correction here? Tell people it’s not true?

            Like

    • They said pizzagate was a hoax too.

      Liked by 6 people

    • I must of slept through a bunch of stuff, however I do try to keep
      Up but I just plain didn’t understand what’s going on in this post. If it’s not not to long could someone explain it?
      Thanks,

      Like

      • It appears they planned to use some illegal means (NSA-level surveillance – hacking) to find the actual (IRL) IDs of Trump supporters from online chats/forums, and then do whatever it took to shut them up, perhaps permanently, in order to prevent Hillary’s (& the left’s) defeat by Trump.
        It also appears they were saying Hillary had been sick or looked sick, and that she had done quite poorly on mental-acuity exams recently, which may indicate she was showing signs of dementia. But that she looked better (but was losing, badly) at the 1st debate.

        Liked by 2 people

  2. Pingback: KOMMONSENTSJANE – Democrat operative David Brock’s chat shows NSA surveillance used to identify and disable online Trump supporters — Fellowship of the Minds | kommonsentsjane

  3. None of this is implausible considering the domestic enemies taking part in the conversation.

    Liked by 3 people

  4. This certainly puts chills up and down my spine! It just shows we have our work cut out for us.

    God Bless the USA and our President, Donald J Trump!

    Liked by 4 people

  5. Reblogged this on necltr and commented:

    Everybody to Abramovic’s for your last Spirit Cooking supper! See if you can get Soros to pay for it.

    Liked by 3 people

  6. Pingback: Democrat operative David Brock’s chat shows NSA surveillance used to identify and disable online Trump supporters - Grassyknoll

  7. Well, that helps explain something that happened right after the second debate… nice NSA-supported Media Matters arm-twisting there, Leftists.

    Liked by 2 people

  8. Our prayers were answered when President Trump was elected.

    Now I know it is folly to trust those running for office but the choice was clear and there is no going back.

    Unless this is fake news,which is up for debate regarding all the consequences, these are some sick MF’ERS.

    Liked by 3 people

  9. coincidences. jeez…….

    Like

  10. If this is true it is very disturbing to put it mildly

    Liked by 2 people

  11. A little something on the former CIA and NSA chief, Michael Vincent Hayden, a self-declared “North American Christian”, although Hayden is a Sephardic Jew surname.

    Stay with this. The talk ends at 1 hour 17 minutes. Among many things Hayden mentions is Woody Allen, which if you know the agenda, of all the people to whom he might have referred, isn’t as curious as it may seem. And Hayden even manages during the talk to get the words, “make it so” in there too, ala Captain Picard–not too obvious.

    This was a talk given at the American ‘Enterprise’ Institute sometime in 2016, before Trump’s election when Hayden was hawking ‘his’ new book.

    Hayden tries to come off as a kindly professor but in reality is a stone-cold killer. It gets very interesting (again, only if you haven’t been paying attention) at 1 hour 10 minutes. But again, stay with the entire talk. It’s worth it.
    https://www.c-span.org/video/?407240-1/conversation-former-nsa-cia-director-michael-hayden

    Liked by 3 people

  12. Also, Michael Hayden refers to Kennan’s “long telegraph” during his talk. I haven’t read it yet, but it should shed more light on his talking points.
    http://nsarchive.gwu.edu/coldwar/documents/episode-1/kennan.htm

    Liked by 1 person

  13. #BrockGate: Playbook Shows Media Matters Has Access to Raw Data From Facebook, Twitter, and More

    http://www.thegatewaypundit.com/2017/05/brockgate-playbook-shows-media-matters-access-raw-data-facebook-twitter/

    Liked by 3 people

  14. Richard ostergard

    This seems too pat. It feeds all of the conspiracy theories at once. Obvious question is why were they discussing Hillary’s mental health especially test scores. That isn’t called in the discussion and if the others already knew about it, what was the point of discussing the scores. Find some victims to support this post.

    Like

    • Do you ask the same questions of the MSM’s relentless Russiagate conspiracy theory, often quoting anonymous sources, despite Democrat after Democrat being forced to admit they have zero evidence?

      Liked by 2 people

    • You mean victims like Seth Rich, Andy Breitbart, Michael Hastings, John Noveske, and Beranton J. Whisenant Jr?

      Also, where the line “[6:10] okay. guys, this is 18-2381 stuff. Got it?” rests in the conversation, it refers to the US Code for treason. They know that what they’re discussing/doing constitutes treason.
      https://www.law.cornell.edu/uscode/text/18/2381

      Also also, if killary is now too retarded to stand on her own let alone run a country, who were they going to dress up in the Kim Jong tunic in her stead? Who is the puppet master?

      Liked by 1 person

  15. Pretty amazing! Did they ever “out” any Trumpers at Reddit, 4chan, Twitter, etc.?

    [6:13] It’s more like fighting a disease.

    –So we went from being Deplorable to being a Disease. Excellent. We caused them more “pain” than we realized.

    brock [6:25 AM] I AM NOT N THE MOOD cshaw

    –Brock seemed rather grouchy & desperate throughout the chat. No wonder he had a heart attack six months later (news headlines dated 3/22/17).

    [6:32] well, they are deplorable. idk. I think we should have done this a long time ago.

    –Yeah, haha, too little too late. Somebody was asleep on the job. They were duped by their own rigged polls. Deceived x 2 ! And the old bitty won’t shut up about her loss, even though Chelsea says it was a “blessing to their family” that Hillary lost. If that’s true, the old bat wouldn’t be whining all over the media every day.

    Liked by 3 people

  16. frank freeman

    let me get my head around this.
    there’s a debate. partisans of one side thinks their candidate lost. whether or not, and whether their opinion is correct or not, are alike immaterial.
    so partisans of side 1 decide that their strategy – in pursuit of revenge, of reversing the result, or for achieving future wins, is best served by doxing online commenters.
    this is surely a sign of mental weakness of the same order as that said to have been shown by their candidate before the debate.
    this leaves me thinking that side 1 is not a credible opponent of side 2.
    partisans of side 2 manage to worm out side 1’s discussions of said strategy. instead of laughing it off, these partisans are alarmed by the wiles of their enemies.
    from this, i conclude that both sides form the two wings of the idiocracy.

    Like

    • That you mock Americans who find it troubling that Democrats used the U.S. government’s National Security Agency to dox and harass Trump supporters, is actually a sign that you are an idiot.

      But then, your South Africa IP address says it all. Don’t you have enough trouble in your own country to troll a U.S. blog?

      Liked by 4 people

  17. Besides being a criminal, Brock looks like he’s wearing his mother’s wig.

    Liked by 2 people

  18. Pingback: Politics and Malware Attacks | Do What's Right

  19. Reblogged this on 50 Shades of Pissed Off and commented:

    This is VERY interesting. Especially the part where one of them refers to Hillary in her debate performance as “whoever that was. How tf did they do that?” And David Brock responds “I can’t talk. It’s very hush hush”.

    Because while I was watching that first debate between Trump & Hillary I KNEW without any doubt whatsoever that that wasn’t Hillary. She was way too sharp…she was completely unfazed the few times Trump hit it out of the park with his personal blows against her. And THAT right there especially was suspicious to me. Shes a fragile narcissist which is one of the reasons she was so shielded from any live TV appearances or interviews where she might be taken off guard and not be able to mask her rage/displeasure. So anyways I knew without a doubt that it wasn’t her. I wasn’t sure how they were doing it, but the elite have technology today that the public can’t even begin to imagine. Organic robotoids, consciousness transfer….the public has no clue….but this confirms what I had strongly suspected about her that night. It wasn’t her.

    Liked by 1 person

    • I remember seeing (when she had been shaking and rattling and rolling), there was a fake Hilary that was photographed ‘walking normally’ to a limo, and I remember in the infowar comments something about they were saying she had a ‘double’.

      Liked by 2 people

  20. one way to find out if this really was true or not is if any of the users on twitter, 4chan, etc got the foxacid virus on their computers or not.

    Like

    • I saw some comments that their computers became very very slow. Since this happened 8 months ago and chat boards like 4chan and 8chan delete their threads, it is difficult to find out now.

      Liked by 1 person

      • I guess nobody archives that stuff…? The transcripts that is. Hmmm, well does seem to point to ‘yes’ that someone hacked the truth out of that and foxacid was put on their computers. Wonder if any of the users there know about this? I got hit by a virus one time on a message board one time, though I don’t think it was that particular virus. I wonder if the usual antivirus software is even allowed to scan for NSA viruses…..

        Liked by 1 person

      • Some things that might explain such slowdowns is a man in the middle attack where the nsa or nsa proxy (such as the domestic enemies that are the subject of this story) sits between a poster and the forum and intercepts the traffic, to include log in creds. This takes some milliseconds to pull off so the entire connection is slowed to a degree. They (nsa and other asshats) can fake the/an entire site, parts of a site, or block access as long as they control access to that site via control over the network – which they get from the isp. With the stolen user creds they can fake posts, so if you see me ever praise any antimessiah cause you can be sure it’s not really me but a fake. They can also just sit and watch, logging everything, but this is left to the isp’s for the most part unless a site is of particular interest as fotm surely is. Nsa, you’re traitors but you’re not alone in federal service.

        Liked by 1 person

        • Without a doubt, there is a lot of nefarious stuff going on at the NSA. Snowden is a real patriot. I just can’t figure out why Trump isn’t pardoning him and Assange, unless he’s waiting until he can do his presidential pardons.
          Some sell their souls to the highest bidders, others sell ’em for a pizza.

          Liked by 1 person

  21. Pingback: Did DAVID BROCK and CORRECT THE RECORD, PLOT TO KILL TRUMP SUPPORTERS? – Turn it off.

  22. Reblogged this on Site Title and commented:

    I have seen Hillary make odd gestures, almost like glitches…..Cloning??

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s