Lada Ray: Why St. Petersburg Metro Bombing Coincided with Putin – Lukashenko St. Pete Talks

Very sad day, my condolences to the Russian people. Sad, ugly truth that ppl are used as sacrificial political pawns.

Futurist Trendcast

My deepest condolences to the city of St. Petersburg and all victims of the Sennaya Ploschad Station Metro Bombing!

The most important thing to understand is that this is NOT a coincidence! The immediate ‘verdict’ on the Internet and SM has been that’s it’s ISIS. But let’s look at the facts!

The facts are a stubborn thing. There is absolutely no doubt in my mind that Putin – Lukashenko St. Petersburg meeting and St. Pete Metro bombing are two links of the same chain!

And here’s the chain in question:

1. An ISIS terrorist would stick out like sore thumb in St. Petersburg. But ukro-nazis or SBU operatives from Kiev or Western Ukraine would blend right in. SBU is Ukraine intelligence, which has been trained, supervised and financed by CIA since at least 2014.

Since Putin has outplayed the Kiev junta on so many fronts, it is a lot more plausible…

View original post 2,378 more words

6 Ways Food Is Being Used As A Weapon


Dees Illustration

Activist Post

Hungry people will do anything for food, which means that those who have control over food can use it as leverage. In 1974, Henry Kissinger suggested using food as a weapon to induce targeted population reduction in a previously classified 200-page report, National Security Study Memorandum 200: Implications of Worldwide Population Growth for U.S. Security and Overseas Interests.  The primary tactic to be applied is that food aid would be withheld from developing nations until they submitted to birth control policies:

There is also some established precedent for taking account of family planning performance in appraisal of assistance requirements by AID [U.S. Agency for International Development] and consultative groups. Since population growth is a major determinant of increases in food demand, allocation of scarce PL 480 resources should take account of what steps a country is taking in population control as well as food production. In these sensitive relations, however, it is important in style as well as substance to avoid the appearance of coercion.

So, food was to be used as just another method of imperial colonization to force countries to conform their policies to those desired by the controllers. Notably, this tactic only works as a blunt weapon on territories enduring a severe economic collapse and with little resources for food production. Today, however, it appears that the entire globe is receiving an arsenal of food bombs as there appears to be a multifaceted attack on people’s access to food.  In other words, what has been an admitted tactic for nearly 40 years of controlling food aid for regional population reduction has now grown more complex and expansive.

Because of massive corporate consolidation of agriculture, centrally coordinated global regulations, a devalued commodity-dollar and unrestrained commodity speculation, chemical and genetic modification, and real or manipulated food shortages; there is indeed a war being waged — with food as the primary weapon.  Understand, this is a not purely a war on food, but rather a war on the general population. Therefore, it is crucial to understand these tactics in order to defend against them.

Here are six ways food is being used to wage war against the population:

1. Food inflation:

Crippling food inflation is now affecting every corner of the world with the poorest feeling the worst pangs.  The U.N.  Food and Agriculture Organization’s (FAO) food price index increased by 3 points to 234 points in June – a 39% increase on the year. These increases are causing mass starvation and rioting in many poor regions of the world, but they are also beginning to punish the middle-class in the Industrialized nations.  The price of food is inflating primarily because of a devalued commodity-dollar from excessive money printing and Wall Street commodity speculation.  Perhaps it’s more appropriate to call it commodity manipulation, not speculation.  As William Engdahl recently pointed out: “The ability to manipulate the price of essential foods worldwide at will — almost irrespective of today’s physical supply and demand for grains — is quite recent….Up until the grain crisis of the mid-1970s there was no single ‘world price’ for grain, the benchmark for the price of all foods and food products.”

What fuels commodity speculation is not just the obvious decline of the dollar and a flight to something tangible, but also genuine supply concerns based on a variety of factors that cause crop shortages like extreme weather or disease. Regardless of real or manipulated food shortages, food prices will continue to rise because of increased demand and an incrementally weaker dollar. Luckily, there are many ways to protect yourself from food inflation and the food war in general.

2. Shortages:

Through supply controls, food shortages have been used as a weapon to create regional conflicts, to encourage peacekeeping missions, and as a foreign policy carrot — as clearly outlined in Kissinger’s 1974, Memorandum 200. The most recent examples can be found with the current and ongoing negotiations with North Korea who perpetually holds a nuclear gun to the West’s head in exchange for food. Somalia, who was food self-sufficient until the 1970s, has become a “failed state” because of food shortages.  Significantly, the situation in Somalia and other large-scale famine are usually caused by a manipulated economic collapse.  In fact, many have reported that the lack of food was an underlying factor of the Egyptian revolution.

Because of corporate consolidation of staple crops such as corn, soybeans, and wheat — and the central control of food aid — it is now easy to manipulate food shortages. But, clearly, there are also catastrophic weather events that destroy production in entire regions such as the heat wave in Russia last summer that caused them to restrict wheat exports in what some referred to as food wars. Many countries who had contracts with Russia were not happy, and their protectionist move had global effects on the food prices.  In other words, imminent food shortages are typically a localized problem, but because the food system is so interconnected, local problems now affect the global community.

3. Chemical Additives:

Chemical additives, from pesticides to preservatives, can only be viewed as a weapon in the depopulation agenda. Clearly, laboratory-concocted chemicals were never meant for human consumption.  Therefore, they can only be attributed to an effort to deliberately and slowly poison the population. Many food and drink toxins like fluoride, aspartame, or monosodium glutamate (MSG) are now well-known to have negative health effects. Other lab creations like high fructose corn syrup (HFCS) are also beginning to prove very unhealthy with tests showing mercury in corn syrup.  Incidentally, we dare you to find any sweet food that doesn’t contain either aspartame or HFCS.  Even wholesome Campbell’s Tomato soup has HFCS, as does Heinz ketchup — while nearly every candy or gum contains aspartame.  It’s estimated that the average American consumes 12 teaspoons of HFCS per day, while the younger population consumes nearly double that. “Mercury is toxic in all its forms. Given how much high-fructose corn syrup is consumed by children, it could be a significant additional source of mercury never before considered,” said Dr. David Wallinga of the Agriculture and Trade Policy whose study found about a third of brand-name foods with HFCS had measurable amounts of mercury.

Pesticides fall into the chemical additive category — GM pesticides especially (called Bt toxins).  They are found in the blood stream of nearly all North Americans, and even in 80% of their unborn babies. It is presumed these toxins are acquired by eating genetically modified corn or soy, and from the livestock that feed on it.  A recent study proved that the chemical found in best-selling pesticides, glyphosate, causes birth defects among other ailments.  We must understand that although all of these toxins, and a host of others, are approved for consumption by the FDA, it doesn’t make them safe.  And even the ones that have exotic names but have yet to be proven to have ill effects surely have a cumulative impact on human health.  They’re so pervasive that it seems impossible to evade them, but there are still ways to eat like a human.

4. Regulations:

By restricting food freedom, regulatory agencies purposely increase dependence on the Big Ag monopoly cartel that fully controls the basic building blocks of food. Simply put, those who control the corn, wheat, soybeans and rice, control all food, since all livestock and all processed foods are dependent on those food sources.  In America, and increasingly around the world, this cartel places their cronies in government regulatory agencies like the USDA to weed out their competition through excessive regulation.  Furthermore, this restriction of food freedom is happening in concert across the globe, precisely because it is a top-down globalist initiative driven by international regulatory agencies such as the World Trade Organization and the United Nations. It is a complex, interwoven agenda that takes into account everything from health safety to land use rights in order to force independent food producers to conform in ways that only benefit a global corporate structure.  Regulatory agencies are one of the primary weapons deployed against independent living.

5. Genetic Modification:

There are many reasons to avoid eating genetically modified food, from health concerns to supporting a fundamentally evil food cartel.  Genetically modified foods are the path to monopolies over human life through patented technology and environmental destruction by chemical-heavy monoculture practices.  GMOs are so pervasive in the United States that it is estimated that 70% of the average American diet contains them.  Many European countries, and other regions, have rejected GMOs.  Hungary recently destroyed illegal GM corn crops and plans to make distributing seeds a felony offense. However, because of corporate/political pressure, most resistant countries are being forced to adopt them.  All of this despite the fact that environmental infection and contamination are proven effects of transgenic plants.  Meanwhile, the control is being implemented under convoluted patent laws, where the mutation itself signifies originality and control over the natural organism it imitates.

6. The Weather:

Weather undeniably affects food access and food costs.  One glance at maps across the globe reveals that food production areas are being especially hard hit, and we are seeing prices rise accordingly.  These natural events can be exploited both by speculators and governments. However, with the introduction of weather modification, invested in by those such as Bill Gates and openly promoted by elite globalist think tanks, concerns have been raised over the possibility that governments could use weather as a deliberate weapon to create food wars.  Accusations have already been leveled charging exactly that.  While some might dismiss the various possibilities of “steering the weather” for malevolent purposes as conspiracy, it is much more difficult to ignore the 1996 document presented to the Air Force titled Owning the Weather 2025 (PDF), which explicitly states as a heading on page 10: Applying Weather-modification to Military Operations.  One key section states that weather control could be virtual, as well as literal:

Offensive abilities could provide spoofing options to create virtual weather in the enemy’s sensory and information systems, making it more likely for them to make decisions producing results of our choosing rather than theirs. It would also allow for the capability to mask or disguise our weather-modification activities.


Also key to the feasibility of such a system is the ability to model the extremely complex nonlinear system of global weather in ways that can accurately predict the outcome of changes in the influencing variables.


Conceivably, with enough lead time and the right conditions, you could get “made-to-order” weather.

This would certainly be the ultimate endgame for anyone wishing to use food as a weapon of control and profit.  This possibility should not be easily dismissed, but rather it warrants open-minded investigation and research.

As we can see, food control is full spectrum, with wars being declared on the individual, states, and sovereign nations simultaneously.  Food controllers utilize health, politics, and economics to integrate their agenda.  Only full spectrum solutions can be employed as protection.  There is much hope to be offered through alternative markets, barter systems, and local co-ops.  We welcome your thoughts in the comments section below about other creative ideas we can implement to preserve our independence.

“True individual freedom cannot exist without economic security and independence. People who are hungry and out of a job are the stuff of which dictatorships are made.” — Franklin Roosevelt

Please visit Food Freedom for Rady Ananda’s contributions to this article, as well as for the latest information about health news, original commentary, and activism.

“I Know Nothing About This”: Rice Accused Of Ordering Unmasking Of Trump Aides and Then Lying About Her Knowledge [UPDATED]


Susan_Rice,_official_State_Dept_photo_portrait,_2009donald_trump_president-elect_portrait_croppedI have written about my mixed views of coverage of President Donald Trump. On one hand, he has caused much of the negative coverage with sensational and insulting tweets — as well as unforced errors by his White House staff.  On the other hand, I have never seen more biased coverage by some major outlets which fail to offer counterarguments in favor of Trump or ignore developments supporting his claims.  The recent disclosure that the unmasking of Trump aides may have been ordered by President Barack Obama’s national security adviser Susan Rice is a case in point.  The most recent story was published by Bloomberg News. The startling disclosure was all but ignored by major outlets and networks or given only passing attention.  As I have said on air, the unmasking allegation is a serious one and it is made all the more serious by the denials of Rice that she…

View original post 485 more words

A thousand fibers connect us with our fellow men

Lovely, timeless.



“We cannot live only for ourselves.
A thousand fibers connect us with our fellow men;
and among those fibers, as sympathetic threads, our actions run as causes,
and they come back to us as effects.”

~ Herman Melville

~ Image “Galactic Dreams” by Mikey Mackinven
Text & image source: The Garden Of Pensiveness

View original post

Here’s How The CIA Is Hacking Your Smart TV

WikiLeaks has begun publishing thousands of documents it claims to have taken from the CIA’s Center for Cyber Intelligence.

In what it called the “largest ever publication” of stolen CIA documents, WikiLeaks’ released documents that appear to describe hacking tools used by the agency. The organization is calling the leaks “Vault 7,” and said Tuesday’s document dump is only the first part of a series. The more than 8,700 documents and files published Tuesday are being called “Year Zero.”

WikiLeaks claims the leaks contain several hundred million lines of code showing the CIA has a dedicated team to develop hacks.



Hacker News: Over 85% Of Smart TVs Can Be Hacked Remotely Using Broadcasting Signals


The Internet-connected devices are growing at an exponential rate, and so are threats to them.

Due to the insecure implementation, a majority of Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, Security Cameras, and printers, are routinely being hacked and used as weapons in cyber attacks.

We have seen IoT botnets like Mirai – possibly the biggest IoT-based malware threat that emerged late last year and caused vast internet outage by launching massive DDoS attacks against DynDNS provider – which proves how easy it is to hack these connected devices.

Now, a security researcher is warning of another IoT threat involving Smart TVs that could allow hackers to take complete control of a wide range of Smart TVs at once without having any physical access to any of them.

Researcher Shows Live Hacking Demonstration


The proof-of-concept exploit for the attack, developed by Rafael Scheel of cyber security firm Oneconsult, uses a low-cost transmitter for embedding malicious commands into a rogue DVB-T (Digital Video Broadcasting — Terrestrial) signals.

Those rogue signals are then broadcast to nearby devices, allowing attackers to gain root access on the Smart TVs, and using those devices for nasty actions, such as launching DDoS attacks and spying on end users.

Scheel provided a live hacking demonstration of the attack during a presentation at the European Broadcasting Union (EBU) Media Cyber Security Seminar, saying about 90 percent of the Smart TVs sold in the last years are potential victims of similar attacks.

Scheel’s exploit relies on a transmitter based on DVB-T — a transmission standard that’s built into TVs that are connected to the Internet.

The attack exploits two known privilege escalation vulnerabilities in the web browsers running in the background and once compromised, attackers could remotely connect to the TV over the Internet using interfaces, allowing them to take complete control of the device.

Once compromised, the TV would be infected in a way that neither device reboots nor factory resets would help the victims get rid of the infection.

Scheel’s exploit is unique and much more dangerous than any smart TV hack we have seen so far.

Previous Smart TV hacks, including Weeping Angel (described in the CIA leaked documents), required physical access to the targeted device or relied on social engineering, which exposes hackers to the risk of being caught as well as limits the number of devices that can be hacked.

However, Scheel’s exploit eliminates the need for hackers to gain physical control of the device and can work against a vast majority of TV sets at once.

The hack once again underlines the risks of “Internet of Things” devices. Since the IoT devices are rapidly growing and changing the way we use technology, it drastically expands the attack surface, and when viewed from the vantage point of information security, IoT can be frightening.

Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.

Hacker News: WikiLeaks Reveals ‘Marble’ Source Code that CIA Used to Frame Russia and China Friday


WikiLeaks published hundreds of more files from the Vault 7 series today which, it claims, show how CIA can mask its hacking attacks to make it look like it came from other countries, including Russia, China, North Korea and Iran.

Dubbed “Marble,” the part 3 of CIA files contains 676 source code files of a secret anti-forensic Marble Framework, which is basically an obfuscator or a packer used to hide the true source of CIA malware.

The CIA’s Marble Framework tool includes a variety of different algorithm with foreign language text intentionally inserted into the malware source code to fool security analysts and falsely attribute attacks to the wrong nation.

The leaked files indicate that the Marble’s source code includes Chinese, Russian, Korean, Arabic and Farsi languages, as well as English, which shows that the CIA has engaged in clever hacking games.

“Marble is used to hamper[ing] forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA,” says the whistleblowing site.

“…for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains.

The released source code archive also contains a deobfuscator to reverse CIA text obfuscation.


Since the Marble framework has now been made public, forensic investigators and anti-virus firms would be able to connect patterns and missing dots in order to reveal wrongly attributed previous cyber attacks and viruses.

So far, Wikileaks has revealed the “Year Zero” batch which uncovered CIA hacking exploits for and security bugs in popular hardware and software, and the “Dark Matter” batch which focused on exploits and hacking techniques the agency designed to target iPhones and Macs.

While WikiLeaks suggests that Marble was in use as recently as 2016, the organization does not provide any evidence to back this claim. Experts are still analyzing the Marble release, so there’s no need to get too excited at this moment.

The White House has condemned the revelations made by Wikileaks, saying that those responsible for leaking classified information from the agency should be held accountable by the law.

Mohit Kumar - Hacking News
Entrepreneur, Hacker, Speaker, Founder and CEO — The Hacker News and The Hackers Conference.

Hacker News: Hackers stole $800,000 from ATMs using Fileless Malware


Hackers targeted at least 8 ATMs in Russia and stole $800,000 in a single night, but the method used by the intruders remained a complete mystery with CCTV footage just showing a lone culprit walking up to the ATM and collecting cash without even touching the machine.

Even the affected banks could not find any trace of malware on its ATMs or backend network or any sign of an intrusion. The only clue the unnamed bank’s specialists found from the ATM’s hard drive was — two files containing malware logs.

The log files included the two process strings containing the phrases: “Take the Money Bitch!” and “Dispense Success.”

This small clue was enough for the researchers from the Russian security firm Kaspersky, who have been investigating the ATM heists, to find malware samples related to the ATM attack.

In February, Kaspersky Labs reported that attackers managed to hit over 140 enterprises, including banks, telecoms, and government organizations, in the US, Europe and elsewhere with the ‘Fileless malware,’ but provided few details about the attacks.

According to the researchers, the attacks against banks were carried out using a Fileless malware that resides solely in the memory (RAM) of the infected ATMs, rather than on the hard drive.

Now during the Kaspersky Security Analyst Summit in St. Maarten on Monday, security researchers Sergey Golovanov and Igor Soumenkov delved into the ATM hacks that targeted two Russian banks, describing how the attackers used the fileless malware to gain a strong foothold into bank’s systems and cash out, ThreatPost reports.

Mysterious ATM Hack Uncovered by Researchers


Dubbed ATMitch, the malware — previously spotted in the wild in Kazakhstan and Russia — is remotely installed and executed on ATMs via its remote administration module, which gives hackers the ability to form an SSH tunnel, deploy the malware, and then sending the command to the ATM to dispense cash.

Since Fileless malware uses the existing legitimate tools on a machine so that no malware gets installed on the system, the ATM treats the malicious code as legitimate software, allowing remote operators to send the command at the time when their associates are present on the infected ATM to pick up the money.

This ATM theft takes just a few seconds to be completed without the operator physically going near the machine. Once the ATM has been emptied, the operator ‘signs off,’ leaving a very little trace, if any, of the malware.

However, this remote attack is possible only if an attacker tunnels in through the bank’s back-end network, a process which required far more sophisticated network intrusion skills.

A Very Precise Form of Physical Penetration

Since opening the ATM’s panel directly could also trigger an alarm, attackers switched to a very precise form of physical penetration: Drilling a golf-ball sized hole in ATM’s front panel to gain direct access to the cash dispenser panel using a serial distributed control (SDC RS485 standard) wire.

This method was revealed when Golovanov and Soumenkov were able to reverse engineer the ATM attack after police arrested a man dressed as a construction worker while he was drilling into an ATM to inject malicious commands in the middle of the day to trigger the machine’s cash dispenser.

The suspect was arrested with a laptop, cables, and a small box. Although the researchers did not name the affected ATM manufacturer or the banks, they warn that ATM burglars have already used the ATM drill attack across Russia and Europe.

In fact, this technique also affects ATMs around the world, leaving them vulnerable to having their cash drawn out in a matter of minutes.

Currently, the group or country behind these ATM hacks is unknown, but coding present in the attack contains references to the Russian language, and the tactics, techniques, and procedures bear a resemblance to those used by bank-robbing gangs Carbanak and GCMAN.

Fileless malware attacks are becoming more frequent. Just last month, researchers found a new fileless malware, dubbed DNSMessenger, that uses DNS queries to conduct malicious PowerShell commands on compromised computers, making the malware difficult to detect.

Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.